Managing Devices with Suspicious Activity
You can manage the devices in your network that are potentially under attack in .
Task |
User Action |
---|---|
Refresh the list |
Click . |
Take action on devices |
For details, see Taking Action on Devices with Suspicious Activity. |
Search the list |
Next to , enter keywords. Tip:
For advanced search options, click . |
Sort by column |
Next to a column name, click , , or . |
Add a comment to a device |
Identify a device and click . |
View device activity records |
Identify a device and click . |