Asset Logs
Navigate to Inventory > Asset Logs to view the asset logs created by Threat Defender.
Click Create Report if you wish to create a downloadable PDF report on the asset logs. The report contains the entire asset logs.
The chart displays the events logged in the past 24 hours over time. Logged events are the creation, removal or change of assets.
The asset logs table displays the logged asset events. You can filter the entries using the filter field above the table. Alternatively, you can filter the log table by hovering the mouse over one of the cells and clicking to include or to exclude matching elements in the filtered results.
The table contains the following information:
Field |
Description |
---|---|
Created At |
The date and time the asset log event was created in Threat Defender. |
State |
The state of the logged event, i.e. whether it was successful or failed. |
Tag |
The tag assigns the event to a certain log. |
Action |
The action logged for the asset. Actions are |
Message |
A message describing the event. |
Username |
The name of the user involved in the event. |
User IP Address |
The IP address of the user involved in the event. |