Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.

* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them
Endpoint Protector Knowledge Base

Below you can explore FAQs related to Endpoint Protector and find the information you need. For any other additional questions, suggestions, and improvements please contact the support team.

Where can I see the file tracing logs?

You can see the file tracing logs (i.e. files that are copied to USB device, DVDs etc.) inside the Endpoint Protector Interface under Reports & Analysis -> Log Report. The Log Report option allows the administrator to see exactly what actions took place and at what time. It also provides additional information, such as the computer name, user and device used and also the action performed and what files were accessed.
Was this article helpful?
Can you please tell us how we can improve this article.
Thank you for your feedback!