Top used USB devices


 

This report shows three groups of the most frequently used USB devices sorted according to the number of access requests:

 

 

 

 

By default, the report lists the first 10 devices in each group but you can specify any number of devices.

 

The report consists of three sections: the Report Header, Report Parameters, and Report Results.

 

The Report Header section contains the report title that appears at the very beginning of the report. The report title shows the report type.

 

The Report Parameters section contains information on the report parameters you specify when generating the report. This information includes: 

 

 

 

 

The Report Results section contains three tables with detailed results of the report. Table 1 lists the top N (where N is a specific number) USB devices having both allowed and denied access. Table 2 lists the top N (where N is a specific number) USB devices having allowed access. Table 3 lists the top N (where N is a specific number) USB devices having denied access. These tables have the following columns:  

 

 

 

 

Right-click Top used USB devices in the console tree to display the following commands:

 

 

 

 

When you select Top used USB devices in the console tree, in the details pane you can view report execution information regarding all reports based on this template. Report execution information includes the following: 

 

 

 

 

 

 

        • The report is not included in the e-mail delivery.

                                     

           - OR -

 

        • The report included in the e-mail delivery did not reach all of the intended recipients.

 

If an error occurs during the e-mail delivery of a report, you can use Server Log Viewer to determine the reason. If your computer has anti-virus or anti-spam software installed and running and an error occurs during the e-mail delivery of a report, the error information may not be reported in the DeviceLock Enterprise Server log. This behavior occurs because anti-virus and anti-spam products, for example, Symantec Norton AntiVirus, can automatically intercept e-mail traffic.

 

 

       • Click the error report to display the error message.

                                     

           - OR -

 

       • Use Server Log Viewer. 

 

 

Right-click a report in the details pane  to display the following commands: