View Client Inventory

The Clients list provides you with high-level information about installed instances of ZTC and associated end-users. To download a CSV with this information, see Download CSV with client inventory.

You can also view the summary panel that gives you an overview of the users population.

📘

If a client is not active for 60 days, it is removed from the inventory list.

How to

  1. Log in to ​Control Center​.
  2. In the Account menu, select the account or contract you need.
  3. Go to > ENTERPRISE SECURITY > Enterprise Center.
  4. Select Application Access or Threat Protection from the navigation menu, depending on which one is available to you. If both are available, select either one.
  5. Go to Clients & Connectors > ​Akamai​ ​Zero Trust Client​s.
    ​Akamai​ ​Zero Trust Client​s inventory opens.
    The user metrics panel displays the total number of ZTC users, aggregated by user statuses.
  6. To view users that have a selected status, click the status name. For example, click Authenticated to display a filtered list of all authenticated users.

Each row in the client table corresponds to an individual ZTC user and lets you view the following data:

  • Hostname/ID. Clicking the Hostname/ID opens detailed information about the end-user's device and its status.
  • Remote Access Status. See the current status of the user's ZTC Access component.
  • Threat Protection. See the current status of the user's ZTC Threat Protection component.
  • Client Version. See the ZTC version installed on the user's computer.
  • Device Local User. See the username of the ZTC user.
  • Last Update. See the timestamp of the most recent ZTC signal update.

Search and filter the client inventory

For troubleshooting purposes, you can search and filter devices in the inventory. Your filtering criteria include the following options:

  • Hostname. To apply this criterion, select Hostname from the Search drop-down list and enter the hostname or Connector ID.
  • Platform. To apply this criterion, select Platform from the Search drop-down list, and then select one of the following platforms:
    • Windows
    • Mac
    • Linux
  • Mac Address. To apply this criterion, select Mac Address from the Search drop-down list, and enter the MAC address.
  • Client Version. To apply this criterion, select Client Version from the Search drop-down list, and enter the Zero Trust Client version number.
  • Device Local User. To apply this criterion, select Device Local User from the Search drop-down list, and enter the username.
  • IDP Username. To apply this criterion, select IDP username from the Search drop-down list, and enter the IDP username.
  • Remote Access Status. To apply this criterion, select Remote Access Status from the Search drop-down list, and select one of the following statuses:
    • In Progress
    • Unsubscribed
    • Authenticated
    • Non Authenticated
    • Disabled by User
    • EAA Fault
    • Not Authenticated
  • Threat Protection. To apply this criterion, select Threat Protection from the Search drop-down list, and select one of the following statuses:
    • Protected
    • Not Protected
    • Not Activated
    • Not Available
    • Disabled By User
    • Subscribed
    • Unsubscribed

Clicking the down or up arrow in each of these columns lets you sort the data displayed in these columns in ascending or descending order:

  • Hostname / ID
  • Remote Access Status
  • Threat Protection
  • Client Version
  • Device Local User
  • Last Update

To search or filter the client inventory:

  1. In the Application Access or Threat Protection menu of Enterprise Center, select Clients & Connectors > Akamai Zero Trust Clients.
  2. To search, enter the search criteria in Search. For example, to search for a hostname, select Hostname from the drop-down menu, and enter the hostname.
  3. To sort the data displayed in the list, click the arrow in one of the table headers. This lets you display the content of the selected column either in alphabetical order or in ascending/descending order.

Audit admin actions

The Actions history feature provides a robust mechanism to track and audit Enterprise Center administrative actions performed on devices running the client.

Each row in the Actions history table corresponds to an individual action and lets you view the following data:

  • Device Name / ID. This is the device that the action was performed on.
  • Action. The action that was performed by admin. This tool can track the following actions:
    • Log generation request
    • Log level change request
  • Action date. Timestamp indicating when the action was performed.
  • Action Status / Status from. Status of the action. It can be one of the following:
    • In progress
    • Completed
    • Failed
    • Expired
  • Requested by. Username of the admin who requested the action.

You can optionally filter the actions history. The filtering criteria include the following options:

  • All. To apply this criterion, select All from the drop-down list of filters, and enter your search prompt.
  • Device Name. To apply this criterion, select Device Name from the drop-down list of filters, and enter the device name.
  • Device ID. To apply this criterion, select Device ID from the drop-down list of filters, and enter the device ID.
  • Requested By. To apply this criterion, select Requested By from the drop-down list of filters, and enter the admin’s username.
  • Requested Action. To apply this criterion, select Requested Action from the drop-down list of filters, and select one of the following actions:
    • Log generation request
    • Log level change request
  • Action Status. To apply this criterion, select Action Status from the drop-down list of filters, and select one of the following statuses:
    • In progress
    • Completed
    • Failed
    • Expired

To view the actions history:

  1. In the Application Access or Threat Protection menu of Enterprise Center, select Clients & Connectors > Akamai Zero Trust Clients.

  2. Click Actions history.

    Actions history page opens.

  3. To search or filter the list, select your criterion from the drop-down menu. For example, to view all actions that are in progress, click the filter drop-down menu, select Action Status, and click In progress.

  4. To sort the data displayed in the list, click the arrow in one of the table headers. This allows you to display the content of the selected column either in alphabetical order or in ascending/descending order.

Download CSV with client inventory

You can download a CSV that contains a list of clients. The CSV contains the hostname of each client, status of service, client version, username, platform of client, and more.

To download a CSV with client inventory:

  1. In the Application Access or Threat Protection menu of Enterprise Center, select Clients & Connectors > Akamai Zero Trust Clients.
  2. At the top of the page, click the download icon to download the CSV file.

Next steps

View device details

Hide client in inventory

In the client inventory, you can hide any client. You may want to do this if the client is no longer in an active state or the device where the client is installed is no longer in use.

This option does not uninstall or disable the client on a device.

📘

While an administrator can hide a client, a client is automatically removed from the inventory list if it’s inactive for 60 days. If the client becomes active again, it will appear in the inventory.

If you hide a client and it returns to an active state, you can restore it to the inventory. For more information, see Restore client to inventory.

To hide a client in the inventory:

  1. In the Application Access or Threat Protection menu of Enterprise Center, select Clients & Connectors >Akamai​ ​Zero Trust Client​s. The client inventory list appears.
  2. Click the client hostname to view client details.
  3. In the panel to the right of the details page, go to the Hide client toggle and click the toggle to enable it.
  4. Click Yes to confirm that you want to hide the client in the inventory.

Restore client to inventory

If a client returns to an active state after an administrator hid it, you can restore it to the inventory. This can occur, for example, if you decide to upgrade a client that was previously hidden.

To view hidden clients that are currently active, see View hidden clients.

To restore a client to the inventory:

  1. In the Application Access or Threat Protection menu of Enterprise Center, select Clients & Connectors >Akamai​ ​Zero Trust Client​s. The inventory list appears.
  2. If you cannot find the active client you need, click the magnifying glass icon at the top of the page. In the menu, select the search criteria that you want to use for your search. You can search for clients that are hidden. For more information, see View hidden clients.
  3. In the panel to the right of the details page, go to the Hide client toggle. Disable the toggle.
  4. Click Yes to confirm that you want to restore the client to the inventory.

View hidden clients

If you or another administrator hid a client from the inventory and it returns to an active state, you can search for the client.

If the hidden client is not in an active state, you cannot view it in the inventory.

To view hidden clients:

  1. In the Application Access or Threat Protection menu of Enterprise Center, select Clients & Connectors >Akamai​ ​Zero Trust Client​s. The inventory list of clients appears.
  2. Click the magnifying glass icon at the top of the page.
  3. In the menu, select Hidden and click Yes to search for clients that are currently active and configured to be hidden in the inventory.