In the event of an Audit or Breach, you may be required to demonstrate a list of your assets and their cyber posture. Your NIST-based Asset Inventory Report documents endpoints and their cyber settings, cyber tools and their configuration. This provides evidence of security policy enforcement and regulation compliance. For example, a brief review can confirm complex password is enforced or Antivirus is installed, enabled, and operating most recent version on all devices. As a best practice, routinely evaluate your Asset Inventory Report for device count and confirmation of in-good-order status.