Available reports
Reports are the primary source of information about computers in your infrastructure and software that is installed on these computers.
General
Report | Description |
---|---|
Saved Reports | The report provides information about saved reports, for example:
For more information, see: Creating saved report views. |
Software Inventory
Report | Description |
---|---|
Software Summary (Preview) |
For example, you can filter the group by selecting a publisher. In the column Count you get the number of software instances only from the selected publisher. Note: You cannot filter the report by selecting columns that aggregate the values, for
example: Count, Used and
Unused.
Drill down You can drill down the Software Summary report to view the Software Classification panel with the detailed information about all software instances from the related group, including component name, component version, and installation path.
Summary of the usage statistics This report also provides software usage statistics that contain details about the usage of specific software on the listed instances. You can check how many instances of a product within the group were used and how many were not. You can see an overview of software usage statistics from the last month, the last quarter, and the last year. You can track the number of software instances within the group where software usage is monitored and where it is not. Limitations
In case of problems with opening links in Internet Explorer, see: User interface problems. |
Inventory Exploration |
The report provides information about software items that are installed in your infrastructure. The items are structured into hierarchies that consist of the publisher, software titles, their versions, releases, and components. You can drill down through the hierarchy to gather detailed information about software usage including its time and frequency. For each product, its version and release, you can also view information about contracts to which this product is assigned. The report shows the number of software instances that are covered by contracts and the cost of acquisition and maintenance of the licenses for that product. You can use the report to efficiently manage your software inventory by monitoring the cost of software licenses and the use of the particular software products. |
Software Installations |
The report provides information about computers in your infrastructure and software items that are installed on these computers. You can see a detailed report for a single software item, when you click the link in the Details column. The detailed view shows information about software signatures that were tried to detect the software or software identification tags that were discovered. The information is accompanied by the following icons:
If you believe that software was erroneously detected, you can use this information to examine how the signature or the software ID tag was evaluated. You can also view the installation path of software that was discovered by a file-based signature. If software was discovered by a complex signature, you can view the hierarchical structure of the signature. In
this view, you can also see information about software usage. When a usage signature exists and
matches a process listed on the Metering Data report, statistics about usage time and frequency are
shown. If the information cannot be gathered for the particular software, one of the following
messages is displayed:
|
Software Classification |
The report provides an overview of your software inventory and the relations between the discovered software components and licensable products. It provides a flat structure with software installations broken into single components, which makes it easier to view your software assets and manage relations between them. The Software Classification panel allows streamline management of your software inventory. To make your metric calculation accurate, assign each component to a product, exclude, or suppress the instances that should not be included in the calculation, and confirm your actions. After you classify all your components, and confirm all actions, software classification is complete.
The report provides the following predefined views:
|
![]() |
The report lists and counts the packages that are installed on the computers in your infrastructure. The report is calculated on demand only. You can find out what is the name of every package, its version, vendor, description, and type. You can use this information to create custom software signatures. For more information, see: Creating signatures from package data. To refresh the report, open it, and click Calculate. The data is calculated immediately, unless the import is in progress. In this case, the report is calculated after the import completes. If new data arrives, information that the report is not up-to-date is displayed. The report might not be up-to-date it in the following situations:
|
Package Data |
The report provides information about packages that are installed on each computer in your infrastructure. The information is retrieved from the Windows registry and UNIX RPM database. You can find out what is the name of every package, its version, vendor, description, and type. You can use this information to create custom software signatures. For more information, see: Creating signatures from package data. |
Scanned File Data |
The report provides information about files that were found on the computers in your infrastructure. You can find out what is the location, size, and version of each file. The files that are displayed on the report are detected basing on the discovery of particular file extensions, or the processes that run on the computers in your environment. You can use this information to create custom software signatures. For more information, see: Creating signatures from scanned file data. The report provides the following predefined views:
The tool and the fixlets related to getting file reputation are not available anymore as this preview feature has been withdrawn. However, the historical data is still displayed, and the predefined views are still available. |
Unrecognized Files |
The report provides a ranking of 1000 files that are most commonly encountered in your computer infrastructure but do not produce matches for any signature. The ranking is separate for each computer group. It is based on the number of computers on which the files were detected, the number of copies of a particular file, and the alphabetical order. The files are listed by name with no regard to their size or version. You can use this report to investigate unrecognized files that can be used to create custom signatures. Because aggregation of unrecognized scan data slows down imports, particularly in large
deployments, it is disabled by default. To enable it, perform the following steps:
|
Metering Data |
The report provides information about processes that run on the computers in your infrastructure. You can track when the process was used for the first and the last time as well as what is the frequency and the total time of its usage. You can also see what is the average run time of each process and the average number of its runs per day. This report provides aggregated usage statistics from all instances that are discovered on each endpoint based on given binary file. In this report you cannot track individual installations on one endpoint.
|
![]() |
The report provides information about the frequency and time of using software products that are installed on the computers in your infrastructure. For every product you can see what was the frequency and the total time of its use per computer as well as when it was used for the first and last time. You can also see what is the average run time of each product and the average number of its runs per day. By default, the report is calculated after every import. To change this behavior so that the report is calculated on demand, go to calculate_during_import/product_usage parameter. , and change the value of theAfter you change the parameter, the report must be refreshed on demand. To refresh the report, open it, and click Calculate. The data is calculated immediately, unless the import is in progress. In this case, the report is calculated after the import completes. If new data arrives, information about the need of recalculating the data is displayed on the report.
|
Business Applications
Report | Description |
---|---|
Oracle Databases |
The report provides information about the edition (Standard or Enterprise), options, and Management Packs (including Oracle Real Application Cluster, RAC) of Oracle Databases that are deployed in your environment. When you combine this information with the collected hardware inventory data, you can use it to calculate the demand for Oracle Database licenses. For more information, see: Extended discovery of Oracle Database. |
License Metrics
Report | Description |
---|---|
All Metrics |
The report provides information about the utilization of license metrics for products that are installed on the computers in your infrastructure. For every product, you can see the maximum metric utilization and its history over the specified period. You can also specify a metric threshold to verify whether metric utilization is above or below your expectations. You can create a snapshot of the report, and store it for audit purposes. For more information, see: License metric utilization. Important: If the report does not show products with a particular license metric,
calculation of this metric might be disabled for the computer group to which you are assigned. For
information about enabling the calculations, see: Setting up computer groups.
![]()
|
Audit Trail |
The report provides information about actions that have influence on the information that is
displayed on other reports. You can view details of each action, its type, date, and the user who
performed it.
Important: Audit trail shows actions that are performed only within the
computer group to which the user who views the report has access. The actions that are shown on the report include:
|
![]() |
The report provides information about the utilization of license metrics for products that deliver .slmtags. The report shows the maximum metric utilization and its trend value over the last 30 days. For every product, you can see the type and subtype of license metrics that a product uses as well as the first and last time when each metric was reported. You can also see the path to the .slmtag file from which the data was retrieved. The report shows only products that deliver resource utilization data. It does not show products for which metric utilization is calculated and shown on the All Metrics report. For more information, see: Raw utilization of license metrics. |
Users
Report | Description |
---|---|
![]() |
Scope of the report
Overview The report provides information about the current users of software and their details. Users are matched with the instance of the product to which they are registered with the given ID. By clicking the product name, you are redirected to the Software Classification panel. The report shows a list of users who use or registered Microsoft Office 365 and a set of Adobe CC components on the computers in your environment. They have a unique user ID, that might be an e-mail address, or an alternative user ID, which is an identifier that is specific to the particular software. User details The user information that is collected might include the personal data. By default, the user personal data, such as an e-mail address, is obfuscated with SHA-1 and is not shown on the report or stored in the database. If you would like to collect and display it, select the Store and show user names on reports when initiating software scans. For more information, see: Initiating software scans. If you no longer need to view information about software users on the Software Users report, go
to remove_user_information parameter
to True. After the next import of data, the user information is removed and the
report is emptied. To repopulate the report, run the Initiate Software Scan fixlet. Removing user
information also removes all historical data related to the Registered User metric on the All
Metrics report.
, and change the value of the Important: BigFix Inventory is GDPR compliant. By default, BigFix Inventory does not collect any personal data
about the users. Gathering personal data is optional and should be enabled consciously. Personal
data is stored and used by BigFix Inventory
only. It is not passed or used outside BigFix Inventory. |
Infrastructure
Report | Description |
---|---|
Computers |
The report provides information about computers in your infrastructure, such as their operating
systems, IP addresses, and other information that can be used to identify them. Additionally, you
can display information about the computer health, for example:
When you click a link in the Name column, detailed information about a particular computer is displayed. You can now view reports narrowed down to this computer. To do this, select the report from the upper left corner.
The report provides the following predefined views:
|
Computer Groups |
The report provides information about computer groups that are defined in your infrastructure. The information includes the ID of the computer group, its name, and description. You can find out how many computers and subgroups are in the computer group, and what software items are installed in that group. The report also provides information about the contracts that are assigned to a computer group, with the acquisition and maintenance cost for each contract. When you click a link in the Name column, detailed information about a particular computer group is displayed. You can now view the reports narrowed down to the computers that belong to the group. To do this, from the upper left corner, select the report that you want to view for this computer group.
|
![]() |
The report provides information about shared disks that are used in your infrastructure. For each shared disk, you can view information about its type, the exported directory, and the number of computers on which the disk is mounted. You can drill down the report to view detailed information about the shared directory or the computers on which the disk is mounted. If you use automatic scanning of shared disks, the report also shows the status of the scan and the computer that is designated to scan the shared disk. To view information on the report, discover shared disks in your infrastructure. For more information, see: Discovering software on shared disks. |
Hardware Inventory |
The report provides information about the state of BigFix clients in your infrastructure. For every computer on which a client is installed, you can view processor details, and the number of PVUs assigned to each core. If the PVU per core value that is assigned to a processor in your environment is incorrect, you can manually change it on the Hardware Inventory report to ensure that subcapacity licenses are properly calculated. For more information, see: Changing the PVU per core value. |
![]() |
The report provides information that is intended to help the IBM Support team troubleshoot problems with BigFix Inventory. When you open a support case, generate a CSV or PDF version of this report and provide it to the HCL Support team. |
Catalog
Report | Description |
---|---|
![]() |
The report provides information about the content of the software catalog including software products and their publishers, part numbers that represent the products, and license metrics that the product uses.
|
Signatures |
The report provides information about signatures that are available in the software catalog. You can find out what signature is used to detect each software item that exists in the catalog. |
Catalog Audit |
The report provides information about modifications that were made to the content of your custom software catalog. For each modification, you can see detailed information about the current status of the software entity, as well as its status before and after modification. |
Contracts
Report | Description |
---|---|
Contract Usage Data |
The report provides information about contracts that you created for the software items. You can see the relationship between the number of software products that you are entitled to use and the actual number of software instances that are used. You can use the report to eliminate unused licenses and track computers that use unlicensed instances of a software product. |