You can view detailed information about the software items
that are installed in your infrastructure and the time and frequency
of use for that software.
Before you begin
You
must have the View Endpoints permission to perform this task.
Procedure
- To see the list of all software items that are installed
on all computers in your infrastructure, click .
- To filter the information down to the details report of
a single software item that is installed on a particular computer,
click the link in the Details column. In this
view, you can see information about a software title, and names of
a publisher, product, version, and component. You can also view the
time and frequency of its use, and the signatures that were tried
to detect that software item.
Note: The Has
Usage column indicates whether an application has a usage
monitoring signature or not. Usage data is only collected for applications
that use a monitoring signature. There are two types of signature:
recognition signatures are used to detect software, and monitoring
signatures are used to track usage. Some signatures have both of these
attributes, and are used to detect and monitor an application. For example,
the signature for Microsoft Word detects the application and tracks usage using
the word.exe process. For applications that have
only a recognition signature, usage data is not collected.
Results
The page with the details of a particular software item presents
information about the signatures that were tried to detect that software.
The signatures are accompanied by an icon that indicates whether the
signature matched the data:
-
All or part of the signature did not match the software item.
-
All or part of the signature matched the software item.
Other information that is presented on that page includes excerpts
of raw data from the viewed computer that was used to match the signature.
If you believe that the particular software was erroneously detected,
you can use that data to examine how the signature was evaluated.
You can also view the installation path of the matched software that
has file-based signatures. What is more, if a particular software
item uses a complex signature, you can use that page to view the hierarchical
structure of the signature to better understand the logic behind the
detection of the software item.