Chapter 10 Security Policy Enforcement
Click Report > Security Policy Enforcement > Application Access Control >
Top Applications Allowed to open this screen.
Figure 230 Report > Security Policy Enforcement > Application Access Control >
Top Applications Allowed
495
Vantage Report User's Guide