Asset Logs

Navigate to Inventory > Asset Logs to view the asset logs created by Threat Defender.

Click Create Report if you wish to create a downloadable PDF report on the asset logs. The report contains the entire asset logs.

The chart displays the events logged in the past 24 hours over time. Logged events are the creation, removal or change of assets.

The asset logs table displays the logged asset events. You can filter the entries using the filter_icon filter field above the table. Alternatively, you can filter the log table by hovering the mouse over one of the cells and clicking filter_icon to include or filter-remove_icon to exclude matching elements in the filtered results.

The table contains the following information:



Created At

The date and time the asset log event was created in Threat Defender.


The state of the logged event, i.e. whether it was successful or failed.


The tag assigns the event to a certain log.


The action logged for the asset. Actions are create, change or remove.


A message describing the event.


The name of the user involved in the event.

User IP Address

The IP address of the user involved in the event.