How do I Audit Device Activity?

How do I Audit Device Activity?

You can audit device activity on your employees’ computers using AccessPatrol’s device reports.

AccessPatrol can track and store information based on the devices connected to your computers and also the file operations being carried to and from USB devices.

There a 6 different reports you can generate that can be used to audit your network for data loss prevention.

Here is a sample report on all devices connected to computers in your network with the date and time.


Here is a sample report on file operations executed to and from devices with the date and time.


Here is a sample report of devices that were blocked by AccessPatrol and devices that were allowed.



    • Related Articles

    • How do I audit my operator’s activities on the Web Console?

      Audit logs help you answer “who did what, where, and when?” when it comes to configuration changes and data access within the CurrentWare Console. It documents every change made to your CurrentWare security policies, console settings and ...
    • Data Activity Reports

      Data Activity Reports provide administrators with robust tools to monitor user data integrity, and server-client communication performance to ensure the server is reporting the most up-to-date data. Quickly identify users with missing data to address ...
    • Release Notes

      Version 11.0.1 Jun 9, 2025 Cost Insights Dashboard - Software License Optimization: The new Cost Insights dashboard helps organizations optimize software spending by tracking application usage across the organization. You can identify underutilized ...
    • How do I temporarily allow device access?

      With AccessPatrol, you can temporarily grant users access to their devices by providing a unique access code. Users can input this code from their control panel to unlock full access. There are two methods to generate access codes. First, you can ...
    • Best practices to catch mouse mover software

      To protect against the potential for data manipulation through the use of mouse manipulation software or physical devices that mimic computer activity, it is essential to be aware of these potential sources of inaccuracy. Through BrowseReporter you ...