DeviceLock Reports : Report Categories and Types : Audit Log Reports : Top active processes
  
Top active processes
This report shows the most active processes (applications) sorted according to the number of allowed and denied access requests sent by each process. By default, the report lists the first 10 processes but you can specify any number of processes.
The report consists of three sections: the Report Header, Report Parameters, and Report Results.
The Report Header displays the report type.
The Report Parameters section contains information on the report parameters you specify when generating the report. This information includes:
Period - Shows the start and end date and time of the log records range included in the report, according to the Report period setting in the report creation task.
The date/time format for the Period from: and to: fields is determined by the date/time format for the user account under which DeviceLock Enterprise Server is running.
Computer(s) - Shows the computers that were specified for the report.
Channel(s) - Shows the device types and/or protocols that were selected for the report.
 
Note:  
Reports with the Other protocol selected also count access requests via unidentified protocol types logged by Protocols White List rules (Any or SSL protocol) and Basic IP Firewall rules.
When the Block Tor Browser traffic security setting is in effect, reports with the Other protocol specified also count attempts to use the Tor Browser (considered as denied access requests via the Other protocol).
The Report Results section contains two tables with detailed results of the report. Table 1 lists the top N (where N is a specific number) processes having allowed access. Table 2 lists the top N (where N is a specific number) processes having denied access. These tables have the following columns:
Process Name - Shows a process name.
Access Count - Shows the number of access requests. Values in this column are sorted in descending order.