DeviceLock Reports : Report Categories and Types : Shadow Log Reports : Top active computers
  
Top active computers
This report shows the most frequently used computers sorted according to the number of copied files and total size of all copied files. By default, the report lists the first 10 computers but you can specify any number of computers.
The report consists of three sections: the Report Header, Report Parameters, and Report Results.
The Report Header displays the report type.
The Report Parameters section contains information on the report parameters you specify when generating the report. This information includes:
Period - Shows the start and end date and time of the log records range included in the report, according to the Report period setting in the report creation task.
The date/time format for the Period from: and to: fields is determined by the date/time format for the user account under which DeviceLock Enterprise Server is running.
Channel(s) - Shows the device types and/or protocols that were specified for the report.
File Name - Shows the files that were specified for the report.
The Report Results section contains six tables with detailed results of the report. Table 1 lists the top N (where N is a specific number) computers having both allowed and denied access by the number of copied files. Table 2 lists the top N (where N is a specific number) computers having both allowed and denied access by the amount of copied data. Table 3 lists the top N (where N is a specific number) computers having allowed access by the number of copied files. Table 4 lists the top N (where N is a specific number) computers having allowed access by the amount of copied data. Table 5 lists the top N (where N is a specific number) computers having denied access by the number of copied files. Table 6 lists the top N (where N is a specific number) computers having denied access by the amount of copied data.
Tables 1, 3 and 5 have the following columns:
Computer Name - Shows a computer name.
Access Count - Shows the number of access requests. Values in this column are sorted in descending order.
Tables 2, 4 and 6 have the following columns:
Computer Name - Shows a computer name.
Data Size - Shows the total size of all copied files. Values in this column are sorted in descending order.