Asset Logs

Navigate to Inventory > Asset Logs to view the asset logs created by Threat Defender.

Click CREATE REPORT if you wish to create a downloadable PDF report on the asset logs. The report contains the entire asset logs.

The chart displays the events logged in the past 24 hours over time. Logged events are the creation, removal or change of assets.

The asset logs table displays the logged asset events.
You can filter the entries using the filter field above the table. Alternatively, you can filter the log table by hovering the mouse over one of the cells and clicking or . By clicking you include matching elements in the filtered results. By clicking you exclude the respective elements from the results.

The table contains the following information:

Field Description
Created At The date and time the asset log event was created in Threat Defender.
State The state of the logged event, i.e. whether it was successful or failed.
Tag The tag assigns the event to a certain log.
Action The action logged for the asset. Actions are create, change or remove.
Message A message describing the event.
Username The name of the user involved in the event.
User IP Address The IP address of the user involved in the event.

If you click in the last table column or double-click a log entry, you will be taken directly to the respective page in the audit logs.

results matching ""

    No results matching ""