Report columns

This glossary provides a brief description of every column that can be found in the reports that are available in BigFix InventoryBigFix Inventory.

A B C D E F G H I L M N O P Q R S T U V W X Y Z

Note: When the value of the column cannot be populated because there is no data, one of the following values is displayed.
  • <no data> when the data does not exist.
  • <not set> when the value is not yet set. You can set it using the dedicated option.

    If the <not set> value appears under the Product Name column, see: The <not set> value appears under the Product Name on Software Classification panel.

  • <n/a> when the data is not relevant for the particular report line.
  • The cell is empty when the value does not exist and cannot be populated.

A

Acquisition Cost
Overall cost of purchasing the license for the software product. It is the value that you specify while creating the contract.
Agent Version
Version of the BigFix agent that is deployed on the computer.
Always Not Charged
Indicates whether a component is always not charged.
Alternative User ID
An identifier of a user who currently uses or registered a software program. It is a number or a string specific to this software program.
Automatic Scan Status
Indicates whether the shared disk is scanned by using the automatic version of the optimized scanning mode. For more information, see: Step 2a: Optimized mode - Automatic scanning of remote shared disks. The column can have one of the following values:
  • Disabled
  • OK
  • Pending
When you hover over the Pending status, you can see more details why the action is pending.
Average Runs per Day
Average number of times a process or software item is started per day.
Average Run Time
Average amount of time during which a process or software was used. It is calculated by dividing the total run time by the number of total runs. The average run time is the same as the total run time when the total number of runs equals one.

B

Brand
Brand of the processor that was matched in the PVU table. If the brand is Other, the processor is not listed in the PVU table. For details of the processor read from the computer operating system, see: Processor Brand String.
Bundling Tag Used
Indicates whether the product assignment is based on a bundling tag.

C

Catalog Part Numbers
Part numbers that represent the product that are listed in the software catalog.
Catalog-provided
  • On the Products & Metrics report, it indicates whether the product and metric relation is provided in the software catalog. If the column value is No, the relation comes from the SWID tag, or is defined by a user.
  • On the Package Data report, it indicates whether the component from the particular vendor and in the specific version already exists in the software catalog.
Catalog Provider
Name of the catalog content originator.
Catalog Scan Results Missing
Indicates whether the catalog scan results are missing. The scan might be missing because the computer or a relay is offline, there is a network outage, or the last scan attempt was more than 30 days ago.
Catalog Scan Successful
Indicates whether the catalog scan was successful. The scan might be unsuccessful because the computer is out of space, it is misconfigured, or the scan was stopped.
Catalog Version
Version of the software catalog that is available on the computer. If different versions of the catalog are available on various computers, update the catalog.
Caused Detection
Indicates whether a file or a package contained enough information to cause detection of the related software. This column is not available by default. The data that is required to populate this column uses many resources, and the time to load and filter the reports will be extended, especially for huge environments.

To enable this column on the Scanned File Data and Package Data reports, go to Management > Advanced Server Settings and change the value of enable_caused_detection_data parameter to true. To display the column on the Scanned File Data or Package Data reports hover over the Manage Report View icon Manage Report View icon, and click Configure View. Select the appropriate check box.

In versions earlier than 9.2.9, the Caused Detection column can be enabled only on the Scanned File Data Report. To display it, enable the aggregation of unrecognized scan data. Go to Management > Unrecognized Scan Data and choose whether you want to aggregate the data after every import or after the next import only. Next, configure the report view.

Changed PVU per Core Value
Specifies whether the number of processor value units for a specific server was manually changed.
Charged
Indicates whether the relation between the component and the product is charged based on the license terms. If the relation is charged, the component contributes to the license metric utilization of the product to which it is assigned.
Children
Number of nested computer groups.
Cluster Cores
The total number of processor cores available within the cluster of host computer systems.
Cluster Name
Name of the cluster to which a particular host computer system belongs.
Comment
Extra technical information. Possible values on the server level include: Incomplete virtualization hierarchy and All instances are excluded. Possible values on the software instance level include reasons for excluding the instance from pricing calculations, and suppressing the product from the inventory.
Component Definition Source
Specifies the entity that provided the component definition. From application update 9.2.9, this column replaced the Software Catalog column.
Component Detailed Version
Detailed version of the software component that is installed on the computer. This information is provided for components that are discovered by the following means:
  • Software identification (SWID) tags. Supplemental SWID tags are not supported. Thus, if the fix pack version is embedded in the supplemental tag, it is not shown.
  • 9.2.11 Windows files in which the file version attribute is set and which is used as a software signature

For components that are discovered with other detection methods the values in Component Detailed Version and Component Version columns are duplicated.

Starting from application update 9.2.11, the column presents the highest reported version of the component. Versions are sorted in numerical order. If the version consists of digits and letters, it is sorted in numerical order and then the alphabetical order. Precision of sorting is up to four places per position, and up to four positions.

Component Name
Product component that was discovered on the computer.
Component Tags
Tags defined on the Software Components panel. These tags are common for all discovered instances of the same component.
Component Version
Version of the software component that is installed on the computer.
Computer Count
Number of computers on which the software is installed or the shared disk is mounted.
Computer Deletion Date
The date and time when the computer stopped being discovered, for example because it was removed from the infrastructure, the data source was removed, or the BigFix client was uninstalled.
Computer Name
Host name of the computer on which the data specific to the report was discovered. For VMware products displayed on the Resource Utilization report, the name of the computer where VM Manager Tool is installed.
Computer Type
Type of the computer: physical, virtual, or public cloud.
Computers
Number of computers.
Confidence
Reliability of the signature that is defined in the software catalog. The lowest confidence equals 0, the highest confidence equals 3.
Confirmed
Indicates whether the software classification was manually confirmed.
Contact Information
The column is not used.
Contracts
On the Computer Groups report, it is the number of contracts that are assigned to the computer group. On the Inventory Exploration report, it is the number of contracts that are defined for the software item.
Copies
Number of copies of the unrecognized file that are discovered on the computers in your infrastructure.
Cost Delta
Difference between the cost of purchasing the license for the particular software product, and the cost of used or unused instances of that product. If the cost delta is a positive number that is displayed in green, the number of product instances that are used does not exceed the license entitlement. The number indicates that you have some spare licenses that you can distribute in your enterprise or that you can reduce the license-related cost by not extending the excessive licenses. If the cost delta is a negative number that is displayed in red, the number of software product instances that are used exceeds the license entitlement. You must purchase licenses for more instances of the software product.
Cost per Seat
Cost of the license for an instance of the software product.
Count
The number of software instances in the group that is filtered based on the selected columns.
CPU Core Full Capacity
Total count of physical processor cores of the server on which the product is installed.
CPU Core Subcapacity
Number of processor cores that are used by a software product.
CPU Core Subcapacity Limit
Total count of physical cores of the server on which the product is installed. It is counted at the time when the subcapacity is maximum which means when the number of cores that are used by the product is the highest.
Creation
Date and time when the signature or software catalog entry was created.
Current Status
Details of the signature after modification.

D

Data Source Computer ID
An identifier of a computer as defined in BigFix.
Data Source Name
Name of the BigFix server from which the data is uploaded to BigFix Inventory.
Default Report
Indicates whether the saved report view is set as the default view for a particular report.
Default PVU Value
Indicates whether a default number of processor value units is assigned to the computer. The default number is assigned when the processor is not listed in the PVU table. The default value is 100 PVUs per core.
Designated Computer
Provides information about the computer that is designated to scan the particular share disk.
Description
Additional description of an item.
Details
On the Audit Trail, it is information about the type and date of action that influences data on other reports as well as the user who performed the action. On other reports, it is a link to detailed information about the software product.
Discovery
Indicates whether the signature is used for software discovery.
Discovery End
Date and time when the component instance was reported for the last time. If the component is still detected, the column shows <n/a>.
Discovery Start
Date and time when the component was first detected by BigFix Inventory. The Discovery Start date might be later than the First Used date.
DNS Name
Name of the computer that is specified in the Domain Name System.

E

Edition
Edition of the Oracle Database.
End of Support
Date when the software component reaches end of support.
Endpoint Scanner Catalog Version
Version of the custom software catalog that is available on the computer.
Entitled Computers
Number of computers that are entitled to use the software.
Entitlement End
Date of the end of entitlement for the product that was provided during the creation of the contract.
Entitlement Start
Date of the start of entitlement for the product that was provided during the creation of the contract.
Excluded
Indicates whether the product on a computer is currently excluded from the pricing calculations.
Exported Directory
Exported directory of the shared disk.

F

Feature
Feature of the Oracle Database.
File Name
Name of the file that is used by the signature to discover the software.
File Path
Directory in which the file is located.
File System Scan Results Missing
Indicates whether the file system scan results are missing. Scan results might be missing because the computer or a relay is offline, there is a network outage, or the last scan attempt was more than 30 days ago.
File System Scan Successful
Indicates whether the file system scan was successful. The scan might be unsuccessful because the computer is out of space, it is misconfigured, or the scan was stopped.
File Version
Version of the file.

Windows 9.2.11 Starting from application update 9.2.11, the column returns the full version of the file, not only version limited to the release number. If you upgrade from earlier versions of BigFix Inventory, reupload results of the file system scan to show the full version. Otherwise, it is shown only for newly discovered or updated files. To reupload the result, run the Force Reupload of Software Scan Results fixlet.

First Detected
Date and time when the software component was detected by the scanner for the first time.
First Measured
Date and time when the license metric was first measured.
First Seen
Date and time when the information about the computer was imported from BigFix for the first time.
First Used
Date and time when the information about the process was first collected by the BigFix client. The First Used date might be prior to the Discovery Start date.
FlexPoint Bundle
FlexPoint bundle to which the product and its components are assigned. For more information, see: Assigning products to FlexPoint bundles.
FlexPoints
Total utilization of FlexPoints by the FlexPoint bundle.
FlexPoints per Metric Unit
The factor by which the number of metric units is multiplied to obtain the number of FlexPoints that the products uses.
FlexPoint Quantity
Indicates the number of FlexPoints to which the product and related metric are assigned as a part of a FlexPoint bundle.
From Software Template
Indicates whether the software was discovered on a particular computer or was generated from a software template. In the latter case, the software is installed on a shared disk that is mounted on the particular computer. For more information, see: Discovering software on shared disks.

G

Global Default Report
Indicates whether the saved report view is set as a default view of the particular report for all users.

H

Has Low Disk Space
Indicates whether the computer has less than 100 MB of free disk space.
Has Missing Prerequisites
Indicates whether any scanner prerequisites are missing on the computer.
Has Outdated Version
Indicates whether the latest version of the BigFix agent is installed on the computer. For some operating systems, no newer version of the agent is available.
Has Usage
Indicates whether a usage signature exists for the particular software.

I

IBM-provided Bundling Option
Indicates whether the product has the selected component listed as a bundling option in the software catalog provided by BigFix.
ID
Identifier of a computer group.
Imported Part Numbers
Part numbers that you imported to BigFix Inventory. They represent BigFix products that you purchased.
Install Path
Installation path of the Oracle Database.
Installed Software
Number of software items that are installed on the computer.
Instance
Identifier of the software instance. For VMware products displayed on the Resource Utilization report, it specifies the license key, machine type and the host name.
Instance Tags
Tags for individually discovered instances of a software. These tags are independent from component tags in catalog. Discovery tags are set by using the dedicated option.
Instances Covered by Contracts
Number of software items by a particular vendor for which contracts are defined.
Internal Computer ID
Identifier of a computer as defined in BigFix Inventory.
IP Address
IP address of the computer.
Is Capped
Indicates whether the partition is capped, that is whether its access to processor resources is limited. Available only for AIX. For other operating systems, the column shows no data.
Is Out of Sync
Indicates whether the time that is set on the computer is at least an hour from the time that is set on the BigFix Inventory server.

L

Last Login
Date and time when the user last logged in to BigFix Inventory.
Last Scan Attempt
Date and time when the last scan was initiated.
Last Seen
Date and time when the agent connected to the BigFix server the last time.
Last Used
Date and time when the software item was last used or a process was last run.
Latest Scan Import
Date and time when scan data from a particular computer was last imported to BigFix Inventory. The date is only updated if there are changes in the content of the scan file. If scan data is unchanged after any new scan, the Latest Scan Import column will not be updated.
Licensed Computers
Number of computers that are entitled to use the software and have this software installed.
License Delta
Difference between the number of software product instances that you are entitled to under a particular license and the actual number of software instances that are used. If the license delta is a positive number that is displayed in green, the number of product instances that are used does not exceed the license entitlement. If the license delta is a negative number that is displayed in red, the number of product instances that are used exceeds the license entitlement.
Logical Processors
Number of processor cores that are assigned to the partition on which the BigFix agent is installed. The number takes into account hyper-threading on the x86 architecture.
LPAR Entitlement
Number of processor cores that are assigned to the logical partition. Available only for AIX. For other operating systems, the column shows no data.

M

Maintenance End
Date of the end of maintenance of the software that was provided during the creation of the contract.
Maintenance Start
Date of the start of maintenance of the software that was provided during the creation of the contract.
Maximal Trend Value
Maximum value of the license metric utilization over the last 30 days.
Maximal Trend Value History
Graphic representation of the history of license metric utilization over the last 30 days.
MD5
MD5 checksum calculated for a file. Checksums work as fingerprints of files, and can be compared to checksums of known virus signatures to recognize whether files were altered or tampered with. They are used to ensure file integrity and safety in advanced security scenarios.
Metric
Type of the metric used by the software item.
Metric Quantity
The highest number of metric units that the product used over the specified period.
Metric Quantity History
Graphic representation of the history of metric consumption over the specified time period. If you set the license threshold, the graph also includes a line that represents the threshold. For more information, see: Setting license metric threshold.
Metric Subtype
Subtype of the license metric. For VMware products displayed on the Resource Utilization report, metric subtype indicates if the count refers to the metric utilization or overall license capacity.
Metric Type
Type of the license metric.
Metric Units Convertible to FlexPoints
The number of metric units that are converted into FlexPoints. The number of convertible metric units can be lower than the overall number of units that are used by the product. It happens when some instance of the product are not a part of the FlexPoint bundle.
Model
Model of the processor.
Modification
Date and time when the item was modified.
Modification Date
Date and time when the item was modified.
Modification Type
Type of the modification.
Modified By
User who modified the item.
Modified Software
Software item that was modified.
Mounted Shared Disks
List of directories of all shared disks that are mounted on the computer. To see the data, run the Discover Remote Shared Disks task on the computer.

N

Name
Name of an item. It depends on the report on which the column is displayed.
Normalized Component Name
The component name that is suggested after the analysis of package details and current content of software catalog.
Normalized Component Vendor
The vendor that is suggested after the analysis of package details and current content of software catalog.
Normalized Component Version
The component version that is based on what is embedded in package details and rounded up to two decimal places.
Number of Packages
Number of specific packages that are identified in your environment.

O

One to One
Indicates whether the product to which the component is currently assigned is the only bundling option that is available in the software catalog.
Operating System
Operating system of the computer on which the BigFix agent is installed.

P

Package Scan Successful
Indicates whether the latest package scan was successful. The scan might be unsuccessful because the computer is out of space, it is misconfigured, or the scan was stopped.
Parent Organization
Organization that owns the content of the catalog.
Partition Cores
Specifies the number of processor cores that are assigned to the partition on which the BigFix agent is installed.

On the All Metrics report, when you click a product that is licensed under the PVU subcapacity or RVU MAPC subcapacity, and you drill down to information about a single computer, the column shows the number of partition cores measured when the peak of the metric value occurred. When you sum up partition cores from VMs running on a single server, the value might not be equal to the number of cores that contribute to metric utilization on the server level. It is in line with subcapacity pricing rules. For more information, see: Virtualization Capacity License Counting Rules.

Partition Virtual Processors
Number of virtual processors that are assigned to the partition on which the BigFix agent is installed. The value is used in further calculations when the endpoint works in the uncapped mode. Available only for AIX. For other operating systems, the column shows no data.
Path
Installation path of the software that was discovered on the computer or where the .slmtag file was discovered.
Physical Shared Pool Cores
Number of processors that work in the shared mode.
Peak Date
Indicates the date of license metric peak value for the reporting period.
Platform Name
Name of the platform on which the software is discovered by means of the particular signature.
Predefined End of Support
Indicates whether the end of support date was provided by BigFix or was specified manually by a user.
Present
Indicates whether the component instance is currently installed.
Private
Indicates whether the saved report view can be used only by its creator or by other users as well.
Process Name
Name of the process on which the calculation of software usage is based.
Processor
Details of the processor.
Processor Brand String
Full specification of the processor including its brand, model and speed as read from the computer operating system.
Product Definition Source
Specifies the entity that provided the product definition. From application update 9.2.9, this column replaced the Software Catalog column.
Product Name
Name of the product.
Product Version
Version of the software product.
Publisher
Name of the company that published the software item.
Publisher Definition Source
Specifies the entity that provided the publisher definition. From application update 9.2.9, this column replaced the Software Catalog column.
Publisher Name
Name of the company that published the software item.
PVU per Core
Number of processor value units that are assigned to a processor core on a computer system. By default, the value is taken from the PVU table. It can also be manually set on the Hardware Inventory report. For more information, see: Changing the PVU per core value. See also: Changed PVU per Core Value.
PVU Full Capacity
Number of processor value units that are used by a product that is installed on the server.
PVU Subcapacity
Number of processor value units that are used by a product that is installed on the server partition.
PVU Subcapacity Limit
Total count of processor value units for the server on which the product is deployed, counted at the time when subcapacity is maximum. Maximum subcapacity is when the number of cores that are used by the product is the highest.

R

Rank
The position of a file in the ranking of 1000 files that are most commonly encountered in your computer infrastructure but do not produce matches for any signature.
Recognized
Indicates whether the file was recognized as part of an existing signature.
Release
Release of the software product.
Release Definition Source
Specifies the entity that provided the release definition. From application update 9.2.9, this column replaced the Software Catalog column.
Reported Since
Date and time when the package or file was discovered for the first time.
Reputation
Indicates whether the file is a malware threat. Possible values:
  • <n/a> is when SHA-256 checksum is not collected.
  • <no data> is when the Tool for Reporting File Reputation is not installed.
  • <No threat> is when the file is not classified as a security threat.
  • <No reputation> is when the classification was done but the type of reputation is unknown.
  • <Threat> is when the file is classified as a security threat. This value is a link which directs you to BigFix website that contains details about the hash reputation. To see the information you must log in using your IBMid.
Reputation Details
Indicates the type of a threat. Possible values:
  • Trojan
  • Downloader
  • Spyware
  • Backdoor
  • Rootkit
  • Ransomware
  • Bot
  • Adware
  • Worm
  • Unwanted
  • Virus
  • Miner
Reputation Import
The date when the reputation was updated in BigFix Inventory.
Reputation Update
The date when the reputation was updated in the reputation data source.

S

Scanning Shared Disks
Indicates whether shared disks were scanned during the last software scan.
Server Active Sockets
Number of physical processor chips that are mounted on the server.
Server Cores
Number of processor cores that are used by the server.
Server ID
Identifier of the server. The format of the identifier is specified by the managedServerTagTemplate parameter for hosts from which data is collected by the VM Manager Tool or by the Run Capacity Scan on Virtualization Hosts fixlet or by the standaloneServerTagTemplate parameter for the remaining hosts. For more information about the parameters, see: Advanced server settings.
Server Name
A unique system in the enterprise. For a physical machine, it is the hardware manufacturer, type, and a machine serial number. For a virtual machine, it is the manufacturer and host name. For a virtual machine with an incomplete definition, it is a UUID that is prefixed with TLM_VM_.
SHA-256
SHA-256 checksum calculated for a file. Checksums work as fingerprints of files, and can be compared to checksums of known virus signatures to recognize whether files were altered or tampered with. They are used to ensure file integrity and safety in advanced security scenarios.
Shared
Indicates whether a component instance is shared between multiple products.
Shared Disk Type
Type of the shared disk.
Shared Mode
Indicates whether the logical partition works in the shared mode. Available only for AIX. For other operating systems, the column shows no data
Shared Pool ID
Identifier of the shared processor pool.
SID
Unique name of the Oracle Database instance.
Signature Creation
Date and time when the signature was created.
Signature Definition Source
Specifies the entity that provided the signature. From application update 9.2.9, this column replaced the Software Catalog column.
Signature ID
Identifier of the signature.
Signature Modification
Date and time when the signature was last modified.
Size
Size of the file in bytes.
Software Catalog
Software catalog that contains the signature for the software item. Starting from application update 9.2.9, the Software Catalog column is substituted with the following columns:
Software Component
Name of the software component.
Software ID
Identifier of the software to which the modification applies.
Software Level
Specifies the version, release, and modification number of a software item.
Software Name
Name of the software product.
Software Product
Name of the software product.
Software Release
Release of the software product.
Software Tags Scan Successful
Indicates whether the last software tags scan was successful.
Software Version
Version of the software product.
Status
Indicates whether data from a hypervisor is available.
System Model
Name of the hardware system or virtualization technology that is discovered by the agent.
Suppressed
Indicates whether the component is currently suppressed from the inventory.

T

Threshold
The maximum number of metric units that a product is entitled to use within a computer group. The value is set manually and is used to calculate the metric threshold delta.
Threshold Delta
It is calculated by subtracting the metric quantity from the threshold. If license utilization is lower than or equal to the threshold, the delta is displayed in green. Otherwise, it is displayed in red.
Top-level Directory
Indicates whether the shared disk is a top-level directory in the shared disk structure.
Total Acquisition Cost
On the Computer Groups report, it is the total cost of purchasing licenses for software items in the computer group. On the Inventory Exploration report, it is the cost of purchasing licenses for software items by a particular vendor.
Total Components
Number of components of software products that are listed in the catalog.
Total Licenses
Number of licenses for the particular software product that are available. If the product is licensed per computer, the number of computers that are entitled to use the product is provided. If an unlimited number of products can be deployed under the particular license, the column includes the abbreviation ELA (Enterprise Licensing Agreement). Higher-level users can define a contract that applies to a broad group. If lower-level users view a contract usage report that is defined in such a way, they see the larger total number of licenses for the product. However, when the lower-level users view the list of instances, they see only those instances of the product for which they have permissions.

For example, a global administrator defines a contract for 5000 instances of Lotus Notes, out of which 3500 instances are used. A lower-level user has an infrastructure that consists of 100 computers. The user is entitled to 100 instances of Lotus Notes, but only 70 instances of the product are used. If the global administrator makes the contract viewable to the lower-level user, the user sees that 3500 instances of Lotus Notes out of 5000 available instances are used. However, when lower-level users view the list of instances that are pertinent to their computer group, they see only the numbers that reflect the use of licenses in their computer group. The report shows 70 used instances of Lotus Notes out of 100 instances available under the particular license.

Total Maintenance Cost
On the Computer Groups report, it is the cost of maintaining all software items in the computer group. On the Inventory Exploration report, it is the cost of maintaining software items by a particular vendor.
Total Publishers
Number of software publishers that are listed in the catalog.
Total Releases
Number of releases of software products that are listed in the catalog.
Total Runs
Number of times a software item or process was started.
Total Run Time
Indicates how long the software item or process was running.
Total Signatures
Number of signatures that are listed in the catalog.
Total Software Products
Number of software products that are listed in the catalog.
Total Versions
Number of versions of software products that are listed in the catalog.
Type
  • On the Inventory Exploration report, it indicates whether the displayed item is a publisher, software product, version, release, or component.
  • On the Package Data report, it is the type of the package management system.
  • On the Computer Groups report, it indicates whether the type of the group is Reporting or Software Template. For more information, see: Setting up computer groups.
  • On other reports, it is the type of the processor according to number of cores.

U

Unique User ID
An identifier of a user who currently uses or registered a software program. It is a specific ID that is assigned to one user only, and can either be an e-mail, first name, last name, initials or a random string.
Unknown Use
Number of software instances for which use is not monitored. These instances are grouped based on the columns defined or selected by the user in the report view.
Unused
Number of software instances that were not used and that are grouped based on the columns defined or selected by the user in the report view.
Unused in the Last Month
Number of software instances that were not used within the last month and that are grouped based on the columns defined or selected by the user in the report view.
Unused in the Last Quarter
Number of software instances that were not used within the last three months and that are grouped based on the columns defined or selected by the user in the report view.
Unused in the Last Week
Number of software instances that were not used within the last seven days and that are grouped based on the columns defined or selected by the user in the report view.
Unused in the Last Year
Number of software instances that were not used within the last year and that are grouped based on the columns defined or selected by the user in the report view.
Used
Number of software instances that were used and that are grouped based on the columns defined or selected by the user in the report view.
Used in the Last Month
Number of software instances that were used within the last month and that are grouped based on the columns defined or selected by the user in the report view.
Used in the Last Quarter
Number of software instances that were used within the last three months and that are grouped based on the columns defined or selected by the user in the report view.
Used in the Last Week
Number of software instances that were used within the last seven days and that are grouped based on the columns defined or selected by the user in the report view.
Used in the Last Year
Number of software instances that were used within the last year and that are grouped based on the columns defined or selected by the user in the report view.
User Group Name
Specifies the source of the information related to software users.
User Name
Name of the user who created the custom report view.

V

Vendor
Vendor of the processor or of the software that is installed on the computer.
Version
Version of an item. It depends on the report on which the column is displayed.
Version Definition Source
Specifies the entity that provided the version definition. From application update 9.2.9, this column replaced the Software Catalog column.
Virtual Shared Pool Cores
Number of active processor cores in the virtual shared pool.
Vulnerability Risk (Preview)
Lists Common Vulnerabilities and Exposures matched with a given software component. The column can contain multiple values that are displayed after expanding.

W

Website
Website of the software publisher.

Y

Your Next Scheduled Export
Date and time when the saved report will be sent to the recipients that you specified in the schedule. The column does not contain sending dates scheduled by other users.