Logs > {Log Type} > {Endpoint name or IP address}
Clicking the host name or the IP address of an endpoint in a log reveals detailed information about the endpoint, including its policy compliance history. This screen contains a Details tab and a Related Threat Mitigation Logs tab.
This tab contains general information about the endpoint and about its compliance or noncompliance to policy. It displays information in the following fields:
Host name—endpoint host name.
IP address—endpoint IP address.
MAC address—endpoint MAC address.
Operating system—endpoint platform.
AV product installed—supported antivirus product currently installed on the endpoint.
Pattern version—version of the pattern used by the installed antivirus product.
Vulnerability list—vulnerabilities found on the endpoint.
System threat list—malware programs found on the endpoint.
Registry key list—prohibited entries in or entries missing from the system registry of the endpoint.
This tab displays the following sections to provide information about compliance or noncompliance to specific policies.
Passed Policies—this section includes information about policies to which the endpoint is compliant.
Policy Violations—this section includes information about policies that the endpoint has violated.
This tab contains information on detections made by Threat Discovery Appliance that are associated with the endpoint.