Settings allows admins to configure audit and alert settings.
To configure audit settings, Navigate to Device Control module on the Endpoint Central console -> Settings -> Audit Settings
Admins can configure audit settings to track and record events for monitoring and compliance.
Device audit report contains the details of recently connected devices and blocked devices attempting access.
Device Audit Reports can be configured to specify the retention period for device activity logs and to select the device types to be monitored.
Note: When this option is disabled, audit data will only be retained for one day. At the end of each day, all recorded data will be automatically erased.
File audit report contains the details of file tracing, including insights of accessed file, username, computers, and devices involved.
File Audit Reports can be configured to specify the retention period for file activity logs and to select the file actions to be monitored.
Note: When this option is disabled, audit data will only be retained for one day. At the end of each day, all recorded data will be automatically erased.
File shadow report contains the details of shadow copies, the network share path where it is stored, username, computers, and devices involved.
File shadow Reports can be configured to specify the retention period
Note: When this option is disabled, audit data will only be retained for one day. At the end of each day, all recorded data will be automatically erased.
The File Archive Report option enables the retention of selected reports for a specified period, in addition to the individually configured retention duration. When enabled, the selected audit reports are archived—removed from the database server and stored in the specified file path for the defined period.
Enter the retention period to specify how long the reports should be stored before they are deleted. Additionally, specify the file path where the reports must be archived.
Admins can configure alert settings to receive email notifications when a blocked device is connected to a managed computer or when a temporary access request is submitted.