Management and Security powered by Landesk

> Security > Endpoint security > Device Control > View the unauthorized device list

View the unauthorized device list

On each computer, Device Control stores a connection and action history for devices that were connected.

You can view this information from the Network view by clicking Inventory on a device's shortcut menu. Then click Security > Device Control.


Was this article useful?    

The topic was:



Not what I expected