> Security > Endpoint security > Device Control > View the unauthorized device list

View the unauthorized device list

On each computer, Device Control stores a connection and action history for devices that were connected.

You can view this information from the Network view by clicking Inventory on a device's shortcut menu. Then click Security > Device Control.

 


Was this article useful?    

The topic was:

Inaccurate

Incomplete

Not what I expected

Other