Views:

Review the table columns available in Endpoint Inventory.

The Endpoint Inventory table contains a wide range of columns which you can choose to show or hide from view, or change the order of. You can also use the column names to create filters when searching for endpoints.
The following table lists the available columns in alphabetical order. The columns might appear in a different order when you access Endpoint Inventory.

Column name
Description
Endpoint name
The name of the endpoint on your network
This column displays both endpoints with agents installed and unmanaged discoverable endpoints on your network. This column cannot be hidden.
Advanced risk telemetry
The status of the advanced risk telemetry feature
Configure in Endpoint Security Policies or by using the policy override.
Agent kernel support package version
The version of the agent kernel support package installed on the agent
Agent update policy
The expected version of agent update and compliance status
Displays the assigned version rule. For example, n, n - 1, Fixed.
Agent update status
The status of the agent update schedule
Displays the Scheduled, Paused status for the agent update.
Anti-malware
The configuration (enabled/disabled) and status of the Anti-malware protection module
Configure in Endpoint Security Policies or by using the policy override.
Application control
The configuration (enabled/disabled) and status of the Application control protection module
Configure in Endpoint Security Policies or by using the policy override.
Browser extension
The configuration (enabled/disabled) and status of the browser extension feature
Configure in Endpoint Security Policies or by using the policy override.
Cloned endpoint type
Whether the cloned endpoint is persistent or non-persistent
The installed agent determines the cloned type by analyzing certain system settings. Physical endpoints display "No cloning detected" for this column. Information is only available while the agent is active.
For more information about cloned endpoints, see Deployment using a golden image.
Cloned agent configuration
The configuration method for the cloned endpoint: either "auto detect configuration" or "image setup tool configuration"
Information comes from the method used when configuring the agent and golden image. Physical endpoints display "No cloning detected" for this column. Information is only available while the agent is active.
For more information about cloned endpoints, see Deployment using a golden image.
Component update policy
The expected version of component updates and compliance status
Displays the assigned version rule. For example, n, n - 1, n - 2.
Component update status
The status of the component update schedule
Displays the Scheduled, Paused status for the component update.
Container protection
The status of Container protection features
Configure in Cloud SecurityContainer Security.
CPU architecture
The CPU architecture running on the endpoint
Custom tags
The number of custom created tags assigned to the endpoint
Data security sensor
The status of the Data Security Sensor feature
Configure in Endpoint Security Policies or by using the policy override.
Device control
The status of the Device control protection module
Configure in Endpoint Security Policies or by using the policy override.
Device services
Services detected on the endpoint
Display name
The display name on your network for the endpoint
Endpoint group
The group name or domain name that the endpoint belongs to
Endpoint GUID
The unique alphanumeric string that identifies the endpoint in TrendAI Vision One™
Endpoint security assignment
The endpoint security assignment applied to the endpoint
Displays the name of the Assignment targeting the endpoint in Endpoint Security Policies.
Endpoint security policy
The endpoint security policy applied to the endpoint
Displays the name of the policy assigned in Endpoint Security Policies.
Endpoint Sensor version
The endpoint sensor version installed on the agent
Firewall
The configuration (enabled/disabled) and status of the Firewall protection module
Configure in Endpoint Security Policies or by using the policy override.
Identity security sensor - Active Directory
The configuration (enabled/disabled) and status of Identity security sensor features for Active Directory
Configure in Endpoint Security Policies or by using the policy override.
Installed components
The compliance patterns reported from the endpoint protection product
Displays the components installed on Standard Endpoint Protection and Server & Workload Protection managed endpoints.
Integrity monitoring
The configuration (enabled/disabled) and status of the Integrity monitoring protection module
Configure in Endpoint Security Policies or by using the policy override.
Intrusion prevention
The configuration (enabled/disabled) and status of the Intrusion prevention protection module
Configure in Endpoint Security Policies or by using the policy override.
Intrusion prevention advanced/workload rules
Indicates if Intrusion Prevention Rules that are part of the TrendAI Vision One™ Endpoint Security Pro package are enabled on the endpoint
Advanced and Workload rules refer to the same set of Intrusion Prevention Rules which are part of the Pro package. The label only indicates where the rules are configured. Manage Advanced rules in Endpoint Security Policies. Manage Workload rules in Server & Workload Protection.
IP address
The IP address of the endpoint
Isolation status
Indicates if an endpoint is isolated or not
Use Response Actions to isolate or restore endpoints.
Last agent status reported
The last time the agent connected with TrendAI Vision One™
The entry provides a range and exact time stamp for the last status report received.
Last IP used
The last IP address that logged on to the device
Last logged on user
The last user that logged on to the endpoint
Last scanned
The last time the endpoint protection features scanned the endpoint
Applies to Standard Endpoint Protection and Server & Workload Protection managed endpoints.
Log inspection
The configuration (enabled/disabled) and status of the Log Inspection protection module on the endpoint
Configure in Endpoint Security Policies or by using the policy override.
OS architecture
The operating system architecture running on the endpoint
Includes the common and specific name for the OS architecture. For example, 64-bit (x86-64).
OS kernel
The operating system kernel running on the endpoint
The specific Linux kernel. Only applies to Linux operating systems.
OS name
The name of the operating system running on the endpoint
For example, Windows 10, macOS Sonoma.
OS version
The version of the operating system running on the endpoint
The specific version and build number of the operating system. For example, a Windows 10 endpoint might display 10.0 (Build 19045).
Package
The features requiring credits that are enabled on the endpoint
Displays which Endpoint Security packages and paid features are enabled. Credit usage is normally determined by the number of endpoints with package features enabled in policies.
Packages include:
  • XDR for Endpoint (EDR)
  • Endpoint Security Core
  • Endpoint Security Essentials
  • Endpoint Security Pro
For more information about credit usage, see Credit requirements for TrendAI Vision One™ solutions.
Protection manager
The name of the Protection Manager instance that manages the agent installed on the endpoint
Endpoints not assigned to a Protection Manager instance, such as Endpoint Sensor only deployments, display a null (-) value.
Protection manager policy
The name of the policy assigned to the endpoint by a Protection Manager
Protection Manager policies are configured in Standard Endpoint Protection and Server & Workload Protection. Appears blank if the endpoint group is enrolled in Endpoint Security Policies.
Protection module last connected
Removed
This column has been replaced by Last agent status reported
Protection module status
Removed
This column has been replaced by Last agent status reported
Protection module version
The feature version of Standard Endpoint Protection or Server & Workload Protection installed on the agent
Recommendation scan
The status of Intrusion Prevention recommendation scan on the endpoint
Recommendation scan is an Endpoint Security Pro feature.
Sandbox analysis
The configuration (enabled/disabled) and status of the Sandbox analysis feature
Configure in Endpoint Security Policies or by using the policy override. Feature formerly called "Sandbox submission" or "Send to sandbox."
Sensor connectivity
Removed
This column has been replaced by Last agent status reported
Sensor kernel support package
The version of the Endpoint Sensor kernel support package installed on the agent
Sensor last connected
Removed
This column has been replaced by Last agent status reported
Service Gateway / proxy
The current connection method used by the endpoint
Scheduled scan
The next scheduled scan
Version control policy
The name of the version control policy the endpoint is assigned to
Displays the name of the policy assigned in Version Control Policies.
Web reputation
The configuration (enabled/disabled) and status of the Web reputation protection module
Configure in Endpoint Security Policies or by using the policy override.
XDR for Endpoints (EDR)
The configuration (enabled/disabled) and status of XDR for Endpoints (EDR) features
Configure in Endpoint Security Policies or by using the policy override settings.
Comments (0)