USB-based devices are commonly used within organizations to store or transfer data, and often connect to other networks and systems outside of the organization. Without proper security controls in place, these devices have the potential to inject malware or exfiltrate confidential data. This report presents a high-level summary of USB device activity, information on attached devices and previously connected devices.