How do I Audit Device Activity?

How do I Audit Device Activity?

You can audit device activity on your employees’ computers using AccessPatrol’s device reports.

AccessPatrol can track and store information based on the devices connected to your computers and also the file operations being carried to and from USB devices.

There a 6 different reports you can generate that can be used to audit your network for data loss prevention.

Here is a sample report on all devices connected to computers in your network with the date and time.


Here is a sample report on file operations executed to and from devices with the date and time.


Here is a sample report of devices that were blocked by AccessPatrol and devices that were allowed.



    • Related Articles

    • How do I audit my operator’s activities on the Web Console?

      Audit logs help you answer “who did what, where, and when?” when it comes to configuration changes and data access within the CurrentWare Console. It documents every change made to your CurrentWare security policies, console settings and ...
    • Data Activity Reports

      Data Activity Reports provide administrators with robust tools to monitor user data integrity, and server-client communication performance to ensure the server is reporting the most up-to-date data. Quickly identify users with missing data to address ...
    • Release Notes

      Version 10.0.2 Oct 15, 2024 BrowseReporter - Subscribe to Dashboards: Easily share user activity data from your BrowseReporter dashboards or widgets as an email PDF report to designated inboxes by on a set schedule. Sync Active Directory Security ...
    • How do I temporarily allow device access?

      With AccessPatrol, you can temporarily grant users access to their devices by providing a unique access code. Users can input this code from their control panel to unlock full access. There are two methods to generate access codes. First, you can ...
    • Device Warning Message

      AccessPatrol is a powerful security solution that provides endpoint control and data leakage prevention. It allows administrators to control and restrict access to USB and other removable devices, thus preventing the theft or loss of sensitive data. ...