Desktop Asset Manager Help >> Operation Guide >>Desktop Control Audit>>Peripheral Use

Peripheral Use

Unauthorized peripheral usage logs records the information about unauthorized use of peripherals when the users access the network. You can query for the details about the unauthorized use of peripherals through basic query or advanced query.

The report provides the following information:

Functions