IBM Endpoint Manager, Version 9.0

Viewing software inventory and usage

You can view detailed information about the software items that are installed in your infrastructure and the time and frequency of use for that software.

Before you begin

An icon representing a user. You must have the View Endpoints permission to perform this task.

Procedure

  1. To see the list of all software items that are installed on all computers in your infrastructure, click Reports > Software Installations.
  2. To filter the information down to the details report of a single software item that is installed on a particular computer, click the link in the Details column. In this view, you can see information about a software title, and names of a publisher, product, version, and component. You can also view the time and frequency of its use, and the signatures that were tried to detect that software item.
    Note: The Has Usage column indicates whether an application has a usage monitoring signature or not. Usage data is only collected for applications that use a monitoring signature. There are two types of signature: recognition signatures are used to detect software, and monitoring signatures are used to track usage. Some signatures have both of these attributes, and are used to detect and monitor an application. For example, the signature for Microsoft Word detects the application and tracks usage using the word.exe process. For applications that have only a recognition signature, usage data is not collected.

Results

The page with the details of a particular software item presents information about the signatures that were tried to detect that software. The signatures are accompanied by an icon that indicates whether the signature matched the data: Other information that is presented on that page includes excerpts of raw data from the viewed computer that was used to match the signature. If you believe that the particular software was erroneously detected, you can use that data to examine how the signature was evaluated. You can also view the installation path of the matched software that has file-based signatures. What is more, if a particular software item uses a complex signature, you can use that page to view the hierarchical structure of the signature to better understand the logic behind the detection of the software item.


Feedback