Navigate to Inventory > Asset Logs to view the asset logs created by Threat Defender.
Click CREATE REPORT if you wish to create a downloadable PDF report on the asset logs. The report contains the entire asset logs.
The chart displays the events logged in the past 24 hours over time. Logged events are the creation, removal or change of assets.
The asset logs table displays the logged asset events.
You can filter the entries using the filter field above the table. Alternatively, you can filter the log table by hovering the mouse over one of the cells and clicking or . By clicking you include matching elements in the filtered results. By clicking you exclude the respective elements from the results.
The table contains the following information:
|Created At||The date and time the asset log event was created in Threat Defender.|
|State||The state of the logged event, i.e. whether it was successful or failed.|
|Tag||The tag assigns the event to a certain log.|
|Action||The action logged for the asset. Actions are
|Message||A message describing the event.|
|Username||The name of the user involved in the event.|
|User IP Address||The IP address of the user involved in the event.|
If you click in the last table column or double-click a log entry, you will be taken directly to the respective page in the audit logs.