Peripheral Use
Unauthorized peripheral usage logs records the information about unauthorized use of peripherals when the users access the network. You can query for the details about the unauthorized use of peripherals through basic query or advanced query.
- Basic query: You can perform a basic query by setting the conditions, asset number and owner.
- You can perform an advanced query by specifying much more detailed conditions, such as the asset number, asset name, owner, group name, operation time range (the server time), peripheral management policy, device type, device instance path and so on.
The report provides the following information:
- Device Instance Path: Device instance path of the asset connecting peripherals.
- Device Type: Type of peripherals. The types include: DVD/CD-ROM, floppy, serial port, parallel port, 1394, Bluetooth, Modem, USB, PCMCIA and infrared.
- Device Item Type: Subtype of peripherals. For example, there are three USB subtypes: storage, nonstorage and unknown.
- Operation Type: It can be plug and unplug. This parameter is applicable to USB devices only.
- Operation Time (Server): System time of the server when the illegal operation happened.
- Operation Time (Client): System time of the client when the illegal operation happened.
- Disable Result: Result of disabling the peripheral. Options include Success, Failure, or Non-handler. DAM displays Non-handler, if the iNode client has disabled the peripheral successfully. For example, if the iNode client disables an USB device successfully the first time it is inserted, DAM will display Non-handler for subsequent use of the USB device.
Functions