This could technically be a technician using a USB drive to download a CSV file reported, then move it to his laptop to use Excel (on his laptop) to filter and sort the report as you do with Excel.
The problem is it's completely unmonitored. The little weasel could've done anything to that server and nobody would be the wiser.
This could technically be a technician using a USB drive to download a CSV file reported, then move it to his laptop to use Excel (on his laptop) to filter and sort the report as you do with Excel.
The problem is it's completely unmonitored. The little weasel could've done anything to that server and nobody would be the wiser.