Review the table columns available in Endpoint Inventory.
The Endpoint Inventory table contains a wide range of columns which you can choose
to show or hide from view, or change the order of. You can also use the column names
to create filters when searching for endpoints.
The following table lists the available columns in alphabetical order. The columns
might appear in a different order when you access Endpoint Inventory.
|
Column name
|
Description
|
|
Endpoint name
|
The name of the endpoint on your network
This column displays both endpoints with agents installed and unmanaged discoverable
endpoints on your network. This column cannot be hidden.
|
|
Advanced risk telemetry
|
The status of the advanced risk telemetry feature
Configure in Endpoint Security Policies or by using the policy override.
|
|
Agent kernel support package version
|
The version of the agent kernel support package installed on the agent
|
|
Agent update policy
|
The expected version of agent update and compliance status
Displays the assigned version rule. For example, n, n - 1, Fixed.
|
|
Agent update status
|
The status of the agent update schedule
Displays the Scheduled, Paused status for the agent update.
|
|
Anti-malware
|
The configuration (enabled/disabled) and status of the Anti-malware protection module
Configure in Endpoint Security Policies or by using the policy override.
|
|
Application control
|
The configuration (enabled/disabled) and status of the Application control protection
module
Configure in Endpoint Security Policies or by using the policy override.
|
|
Browser extension
|
The configuration (enabled/disabled) and status of the browser extension feature
Configure in Endpoint Security Policies or by using the policy override.
|
|
Cloned endpoint type
|
Whether the cloned endpoint is persistent or non-persistent
The installed agent determines the cloned type by analyzing certain system settings.
Physical endpoints display "No cloning detected" for this column. Information is only available while the agent is active.
For more information about cloned endpoints, see Deployment using a golden image.
|
|
Cloned agent configuration
|
The configuration method for the cloned endpoint: either "auto detect configuration"
or "image setup tool configuration"
Information comes from the method used when configuring the agent and golden image.
Physical endpoints display "No cloning detected" for this column. Information is only available while the agent is active.
For more information about cloned endpoints, see Deployment using a golden image.
|
|
Component update policy
|
The expected version of component updates and compliance status
Displays the assigned version rule. For example, n, n - 1, n - 2.
|
|
Component update status
|
The status of the component update schedule
Displays the Scheduled, Paused status for the component update.
|
|
Container protection
|
The status of Container protection features
Configure in .
|
|
CPU architecture
|
The CPU architecture running on the endpoint
|
|
Custom tags
|
The number of custom created tags assigned to the endpoint
|
|
Data security sensor
|
The status of the Data Security Sensor feature
Configure in Endpoint Security Policies or by using the policy override.
|
|
Device control
|
The status of the Device control protection module
Configure in Endpoint Security Policies or by using the policy override.
|
|
Device services
|
Services detected on the endpoint
|
|
Display name
|
The display name on your network for the endpoint
|
|
Endpoint group
|
The group name or domain name that the endpoint belongs to
|
|
Endpoint GUID
|
The unique alphanumeric string that identifies the endpoint in
TrendAI Vision One™
|
|
Endpoint security assignment
|
The endpoint security assignment applied to the endpoint
Displays the name of the Assignment targeting the endpoint in Endpoint Security Policies.
|
|
Endpoint security policy
|
The endpoint security policy applied to the endpoint
Displays the name of the policy assigned in Endpoint Security Policies.
|
|
Endpoint Sensor version
|
The endpoint sensor version installed on the agent
|
|
Firewall
|
The configuration (enabled/disabled) and status of the Firewall protection module
Configure in Endpoint Security Policies or by using the policy override.
|
|
Identity security sensor - Active Directory
|
The configuration (enabled/disabled) and status of Identity security sensor features
for Active Directory
Configure in Endpoint Security Policies or by using the policy override.
|
|
Installed components
|
The compliance patterns reported from the endpoint protection product
Displays the components installed on Standard Endpoint Protection and Server & Workload
Protection managed endpoints.
|
|
Integrity monitoring
|
The configuration (enabled/disabled) and status of the Integrity monitoring protection
module
Configure in Endpoint Security Policies or by using the policy override.
|
|
Intrusion prevention
|
The configuration (enabled/disabled) and status of the Intrusion prevention protection
module
Configure in Endpoint Security Policies or by using the policy override.
|
|
Intrusion prevention advanced/workload rules
|
Indicates if Intrusion Prevention Rules that are part of the
TrendAI Vision One™ Endpoint Security Pro package are enabled on the endpoint
Advanced and Workload rules refer to the same set of Intrusion Prevention Rules which
are part of the Pro package. The label only indicates where the rules are configured.
Manage Advanced rules in Endpoint Security Policies. Manage Workload rules in Server
& Workload Protection.
|
|
IP address
|
The IP address of the endpoint
|
|
Isolation status
|
Indicates if an endpoint is isolated or not
Use Response Actions to isolate or restore endpoints.
|
|
Last agent status reported
|
The last time the agent connected with
TrendAI Vision One™
The entry provides a range and exact time stamp for the last status report received.
|
|
Last IP used
|
The last IP address that logged on to the device
|
|
Last logged on user
|
The last user that logged on to the endpoint
|
|
Last scanned
|
The last time the endpoint protection features scanned the endpoint
Applies to Standard Endpoint Protection and Server & Workload Protection managed endpoints.
|
|
Log inspection
|
The configuration (enabled/disabled) and status of the Log Inspection protection module
on the endpoint
Configure in Endpoint Security Policies or by using the policy override.
|
|
OS architecture
|
The operating system architecture running on the endpoint
Includes the common and specific name for the OS architecture. For example,
64-bit (x86-64). |
|
OS kernel
|
The operating system kernel running on the endpoint
The specific Linux kernel. Only applies to Linux operating systems.
|
|
OS name
|
The name of the operating system running on the endpoint
For example, Windows 10, macOS Sonoma.
|
|
OS version
|
The version of the operating system running on the endpoint
The specific version and build number of the operating system. For example, a Windows
10 endpoint might display
10.0 (Build 19045). |
|
Package
|
The features requiring credits that are enabled on the endpoint
Displays which Endpoint Security packages and paid features are enabled. Credit usage
is normally determined by the number of endpoints with package features enabled in
policies.
Packages include:
For more information about credit usage, see Credit requirements for TrendAI Vision One™ solutions.
|
|
Protection manager
|
The name of the Protection Manager instance that manages the agent installed on the
endpoint
Endpoints not assigned to a Protection Manager instance, such as Endpoint Sensor only
deployments, display a null (-) value.
|
|
Protection manager policy
|
The name of the policy assigned to the endpoint by a Protection Manager
Protection Manager policies are configured in Standard Endpoint Protection and Server
& Workload Protection. Appears blank if the endpoint group is enrolled in Endpoint
Security Policies.
|
|
Protection module last connected
|
Removed
This column has been replaced by Last agent status reported
|
|
Protection module status
|
Removed
This column has been replaced by Last agent status reported
|
|
Protection module version
|
The feature version of Standard Endpoint Protection or Server & Workload Protection
installed on the agent
|
|
Recommendation scan
|
The status of Intrusion Prevention recommendation scan on the endpoint
Recommendation scan is an Endpoint Security Pro feature.
|
|
Sandbox analysis
|
The configuration (enabled/disabled) and status of the Sandbox analysis feature
Configure in Endpoint Security Policies or by using the policy override. Feature formerly called "Sandbox submission" or
"Send to sandbox."
|
|
Sensor connectivity
|
Removed
This column has been replaced by Last agent status reported
|
|
Sensor kernel support package
|
The version of the Endpoint Sensor kernel support package installed on the agent
|
|
Sensor last connected
|
Removed
This column has been replaced by Last agent status reported
|
|
Service Gateway / proxy
|
The current connection method used by the endpoint
|
|
Scheduled scan
|
The next scheduled scan
|
|
Version control policy
|
The name of the version control policy the endpoint is assigned to
Displays the name of the policy assigned in Version Control Policies.
|
|
Web reputation
|
The configuration (enabled/disabled) and status of the Web reputation protection module
Configure in Endpoint Security Policies or by using the policy override.
|
|
XDR for Endpoints (EDR)
|
The configuration (enabled/disabled) and status of XDR for Endpoints (EDR) features
Configure in Endpoint Security Policies or by using the policy override settings.
|
