In many reports we are given the name of the device and IP>
This is fine but in large companies, this adds an additional step during manual remediation.
In reports relating to vulnerabilities, could the last logged in user also be added as a column to help identify which users device is effected.
If this report is also being shown to the client, this ads some context to the report.