We had to reboot a device remotely, and did so from the mobile app. In the device’s event log, all we see is the following:
For security compliance, we would like to identify who makes requests like the one pictured above.