Managing Devices with Suspicious Activity
You can manage the devices in your network that are potentially under attack in .
Task |
User Action |
---|---|
Refresh the list |
Click |
Take action on devices |
For details, see Taking Action on Devices with Suspicious Activity. |
Search the list |
Next to Tip:
For advanced search options, click |
Sort by column |
Next to a column name, click |
Add a comment to a device |
Identify a device and
click |
View device activity records |
Identify a device and
click |