How do I Audit Device Activity?

How do I Audit Device Activity?

You can audit device activity on your employees’ computers using AccessPatrol’s device reports.

AccessPatrol can track and store information based on the devices connected to your computers and also the file operations being carried to and from USB devices.

There a 6 different reports you can generate that can be used to audit your network for data loss prevention.

Here is a sample report on all devices connected to computers in your network with the date and time.


Here is a sample report on file operations executed to and from devices with the date and time.


Here is a sample report of devices that were blocked by AccessPatrol and devices that were allowed.



    • Related Articles

    • How do I audit my operator’s activities on the Web Console?

      Audit logs help you answer “who did what, where, and when?” when it comes to configuration changes and data access within the CurrentWare Console. It documents every change made to your CurrentWare security policies, console settings and ...
    • Release Notes

      Version 11.0.2 Oct 9, 2025 SIEM Integration: Introducing compatibility with SIEM platforms for centralized security monitoring. Prevent Idle by Specific Applications/Websites: Enhanced idle detection by excluding specific apps and websites. Workforce ...
    • AccessPatrol Web Dashboards

      AccessPatrol has 7 dashboards, giving you visibilities on file operations and device activities from your entire organization. With AccessPatrol’s web dashboard, you will gain the insights you need to enforce your removable media policy with great ...
    • Data Activity Reports

      Data Activity Reports provide administrators with robust tools to monitor user data integrity, and server-client communication performance to ensure the server is reporting the most up-to-date data. Quickly identify users with missing data to address ...
    • How do I temporarily allow device access?

      With AccessPatrol, you can temporarily grant users access to their devices by providing a unique access code. Users can input this code from their control panel to unlock full access. There are two methods to generate access codes. First, you can ...