Available reports
Reports are the primary source of information about computers in your infrastructure and software that is installed on these computers.
General
Report | Description |
---|---|
Saved Reports | The report provides information about saved reports, for example:
For more information, see: Creating saved report views. |
Software Inventory
Report | Required Permissions | Description | Predefined Views |
---|---|---|---|
Software Summary | View Endpoints |
The report provides an overview of software inventory in your environment. Each row represents a set of software instances that are grouped by the selected columns. You can limit the instances in the groups by using the report filters. By default, you can see only the instances that are currently installed and are not suppressed. To change the way how the data is displayed, select different report columns. For example, you can filter the group by selecting a publisher. The Count column shows the number of software instances from the selected publisher. You can drill down the Software Summary report to view the Software Classification panel with detailed information about all software instances from the related group, including component name, component version, and installation path. |
N/A |
Software Installations | View Endpoints | The report provides information about computers in your infrastructure and software items that are installed on these computers. You can see a detailed report for a single software item, when you click the link in the Details column. The detailed view shows information about software signatures that were tried to detect the software or software identification tags that were discovered. The information is accompanied by the following icons:
If you believe that software was erroneously detected, you can use this information to examine how the signature or the software ID tag was evaluated. You can also view the installation path of software that was discovered by a file-based signature. If software was discovered by a complex signature, you can view the hierarchical structure of the signature. |
N/A |
Software Classification | View Endpoints or Manage Software Classification |
The report provides an overview of your software inventory and the relations between the discovered software components and licensable products. It provides a flat structure with software installations broken into single components, which makes it easier to view your software assets and manage relations between them. The Software Classification panel allows streamline management of your software inventory. To make your metric calculation accurate, assign each component to a product, exclude, or suppress the instances that should not be included in the calculation, and confirm your actions. After you classify all your components, and confirm all actions, software classification is complete. |
The report provides the following predefined views:
|
License Metrics
Report | Required Permission | Description | Predefined Views |
---|---|---|---|
All Metrics | View License Metrics |
The report provides information about the utilization of license metrics for products that are
installed on the computers in your infrastructure. For every product, you can see the maximum metric
utilization and its history over the specified period. You can also specify a metric threshold to
verify whether metric utilization is above or below your expectations. You can create a snapshot of
the report, and store it for audit purposes. For more information, see: License metric utilization.
Important: If the
report does not show products with a particular license metric, calculation of this metric might be
disabled for the computer group to which you are assigned. For information about enabling the
calculations, see: Setting up computer groups.
|
The report provides the following predefined views:
|
Audit Trail | View Audit Trail |
The report provides information about actions that have influence on the information that is
displayed on other reports. You can view details of each action, its type, date, and the user who
performed it.
Important: Audit trail shows actions that are performed only within the
computer group to which the user who views the report has access.
The actions that are shown on the report include:
|
N/A |
Resource Utilization | View License Metrics |
The report provides information about the utilization of license metrics for products that deliver .slmtags. The report shows the maximum metric utilization and its trend value over the last 30 days. For every product, you can see the type and subtype of license metrics that a product uses as well as the first and last time when each metric was reported. You can also see the path to the .slmtag file from which the data was retrieved. The report shows only products that deliver resource utilization data. It does not show products for which metric utilization is calculated and shown on the All Metrics report. For more information, see: Raw utilization of license metrics. |
N/A |
Infrastructure
Report | Required Permissions | Description | Predefined Views |
---|---|---|---|
Computers | View Endpoints |
The report provides information about computers in your infrastructure, such as their operating
systems, IP addresses, and other information that can be used to identify them. Additionally, you
can display information about the computer health, for example:
When you click a link in the Name column, detailed information about a particular computer is displayed. You can now view reports narrowed down to this computer. To do this, select the report from the upper left corner. You can decommission computers that are imported from the disconnected data source to remove them from the report. For more information, see: Decommissioning computers with disconnected scanners (disconnected scenario). |
The report provides the following predefined views:
The
following predefined report views are removed.
|
Computer Groups | Manage Computer Groups |
The report provides information about computer groups that are defined in your infrastructure. The information includes the ID of the computer group, its name, and description. You can find out how many computers and subgroups are in the computer group, and what software items are installed in that group. When you click a link in the Name column, detailed information about a particular computer group is displayed. You can now view the reports narrowed down to the computers that belong to the group. To do this, from the upper left corner, select the report that you want to view for this computer group. The report shows two types of computer groups: reporting and software template. Both types are visible to all entitled users. However, only an Administrator can create software template groups and modify software templates of existing groups of this type. For more information, see: Setting up computer groups. |
N/A |
Shared Disks | View Shared Disks |
The report provides information about shared disks that are used in your infrastructure. For each shared disk, you can view information about its type, the exported directory, and the number of computers on which the disk is mounted. You can drill down the report to view detailed information about the shared directory or the computers on which the disk is mounted. If you use automatic scanning of shared disks, the report also shows the status of the scan and the computer that is designated to scan the shared disk. To view information on the report, discover shared disks in your infrastructure. For more information, see: Discovering software on shared disks (BigFix scenario). |
N/A |
Hardware Inventory | View Hardware Inventory |
The report provides information about the state of BigFix clients in your infrastructure. For every computer on which a client is installed, you can view processor details, and the number of PVUs assigned to each core. If the PVU per core value that is assigned to a processor in your environment is incorrect, you can manually change it on the Hardware Inventory report to ensure that subcapacity licenses are properly calculated. For more information, see: Changing the PVU per core value. |
N/A |
Catalog
Report | Required Permissions | Description | Predefined Views |
---|---|---|---|
Products & Metrics (previously Software Catalog) | View Software Catalog and Signatures |
The report provides information about the content of the software catalog including software products and their publishers, part numbers that represent the products, and license metrics that the product uses.
|
N/A |
Signatures | View Software Catalog and Signatures |
The report provides information about signatures that are available in the software catalog. You can find out what signature is used to detect each software item that exists in the catalog. The report
is removed in application update 9.2.31 as it duplicates information that can already be found in
different places. If you are using breadcrumbs that are available at the top of the report to access
certain types of information, the information is available on different reports.
|
N/A |
Software Components | View Software Catalog and Signatures | The report provides information about software components that exist in the software catalog, including their names, GUIDs, and end-of-support dates. | N/A |