Besides device monitoring

What I REALLY want to be able to know is when my COMPUTER is being accessed by another device - not just a new device on my network.

Am I wrong to think these are two different issues?

Isn’t it possible for an attacker to get access to a computer through a web connection or malware without necessarily having their device detected?

1 Like

Hey @Vinkern,
you have a detailed log of all the connections and activity your computer establishes in the “log analysis” tab of the software.
Just be aware, you need to activate the alerts you want to receive from Settings>Security, in the menu.