For each endpoint security assessment operation, the system generates a result entry on the Endpoint Security Assessment Result page under User Access Log. The entry records the endpoint information (such as MAC address), user information (such as username), and the endpoint's security score and risk level. You can drill down to the security assessment details to view the failed check items that cause degradations of the health score, query the result entries, and export desired entries.