Tracking Network Assets and Users

The summer release of Threat Defender is here. This new version 20180814.0 includes asset tracking and user mapping – revealing new perspectives in network analytics, network reporting and risk evaluation.


As soon as Threat Defender is connected to the network, it starts tracking the MAC addresses of all devices it detects. Threat Defender uses this information to create enriched assets by storing metadata such as last seen IP addresses, operating system type, hostname etc.

Assets can also be edited manually. Assigning descriptive names, consolidating MAC addresses of devices with multiple network interfaces and mapping users to assets creates a clear network inventory. Identifying any new devices that connect to the network then becomes a piece of cake.


Threat Defender stores all asset and user information in dedicated logs that provide a clear overview of the network structure. Furthermore, the data in the drill-down reporting system can be filtered based on specific asset properties or by users. For example, they can be set up to display the activity of all Windows computers in the network or what assets and/or users triggered threat intelligence hits.


For a complete list of the new features and improvements, see the release notes.


Would you like to try out cognitix Threat Defender? Get your 30-day free trial version here.

Get our newsletter

Subscribe to our mailing list

* indicates required

cognitix GmbH will use the information you provide on this form to be in touch with you and to provide updates and marketing. Please let us know all the ways you would like to hear from us:

You can change your mind at any time by clicking the unsubscribe link in the footer of any email you receive from us, or by contacting us at We will treat your information with respect. For more information about our privacy practices please visit our website. By clicking below, you agree that we may process your information in accordance with these terms.

We use MailChimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to MailChimp for processing. Learn more about MailChimp's privacy practices here.