Report columns
This glossary provides a brief description of every column that can be found in the reports that are available in BigFix InventoryBigFix Inventory.
A B C D E F G H I L M N O P Q R S T U V W X Y Z
<no data>
when the data does not exist.<not set>
when the value is not yet set. You can set it using the dedicated option.If the
<not set>
value appears under the Product Name column, see: The <not set> value appears under the Product Name on Software Classification panel.<n/a>
when the data is not relevant for the particular report line.- The cell is empty when the value does not exist and cannot be populated.
A
- Acquisition Cost
- Overall cost of purchasing the license for the software product. It is the value that you specify while creating the contract.
- Agent Version
- Version of the BigFix agent that is deployed on the computer.
- Always Not Charged
- Indicates whether a component is always not charged.
- Alternative User ID
- An identifier of a user who currently uses or registered a software program. It is a number or a string specific to this software program.
- Automatic Scan Status
- Indicates whether the shared disk is scanned by using the automatic version of the optimized
scanning mode. For more information, see: Step 2a: Optimized mode - Automatic scanning of remote shared disks. The column can have one of
the following values:
- Disabled
- OK
- Pending
- Average Runs per Day
- Average number of times a process or software item is started per day.
- Average Run Time
- Average amount of time during which a process or software was used. It is calculated by dividing the total run time by the number of total runs. The average run time is the same as the total run time when the total number of runs equals one.
B
- Brand
- Brand of the processor that was matched in the PVU table. If the brand is
Other
, the processor is not listed in the PVU table. For details of the processor read from the computer operating system, see: Processor Brand String. - Bundling Tag Used
- Indicates whether the product assignment is based on a bundling tag.
C
- Catalog Part Numbers
- Part numbers that represent the product that are listed in the software catalog.
- Catalog-provided
-
- On the Products & Metrics report, it indicates whether the
product and metric relation is provided in the software catalog. If the column value is
No
, the relation comes from the SWID tag, or is defined by a user. - On the Package Data report, it indicates whether the component from the particular vendor and in the specific version already exists in the software catalog.
- On the Products & Metrics report, it indicates whether the
product and metric relation is provided in the software catalog. If the column value is
- Catalog Provider
- Name of the catalog content originator.
- Catalog Scan Results Missing
- Indicates whether the catalog scan results are missing. The scan might be missing because the computer or a relay is offline, there is a network outage, or the last scan attempt was more than 30 days ago.
- Catalog Scan Successful
- Indicates whether the catalog scan was successful. The scan might be unsuccessful because the computer is out of space, it is misconfigured, or the scan was stopped.
- Catalog Version
- Version of the software catalog that is available on the computer. If different versions of the catalog are available on various computers, update the catalog.
- Caused Detection
- Indicates whether a file or a package contained enough information to cause detection of the
related software. This column is not available by default. The data that is required to populate
this column uses many resources, and the time to load and filter the reports will be extended,
especially for huge environments.
To enable this column on the Scanned File Data and Package Data reports, go to enable_caused_detection_data parameter to true. To display the column on the Scanned File Data or Package Data reports hover over the Manage Report View icon , and click Configure View. Select the appropriate check box.
and change the value ofIn versions earlier than 9.2.9, the Caused Detection column can be enabled only on the Scanned File Data Report. To display it, enable the aggregation of unrecognized scan data. Go to
and choose whether you want to aggregate the data after every import or after the next import only. Next, configure the report view. - Changed PVU per Core Value
- Specifies whether the number of processor value units for a specific server was manually changed.
- Charged
- Indicates whether the relation between the component and the product is charged based on the license terms. If the relation is charged, the component contributes to the license metric utilization of the product to which it is assigned.
- Children
- Number of nested computer groups.
- Cluster Cores
- The total number of processor cores available within the cluster of host computer systems.
- Cluster Name
- Name of the cluster to which a particular host computer system belongs.
- Comment
- Extra technical information. Possible values on the server level include: Incomplete virtualization hierarchy and All instances are excluded. Possible values on the software instance level include reasons for excluding the instance from pricing calculations, and suppressing the product from the inventory.
- Component Definition Source
- Specifies the entity that provided the component definition. From application update 9.2.9, this column replaced the Software Catalog column.
- Component Detailed Version
- Detailed version of the software component that is installed on the computer. This
information is provided for components that are discovered by the following means:
- Software identification (SWID) tags. Supplemental SWID tags are not supported. Thus, if the fix pack version is embedded in the supplemental tag, it is not shown.
- Windows files in which the file version attribute is set and which is used as a software signature
For components that are discovered with other detection methods the values in Component Detailed Version and Component Version columns are duplicated.
Starting from application update 9.2.11, the column presents the highest reported version of the component. Versions are sorted in numerical order. If the version consists of digits and letters, it is sorted in numerical order and then the alphabetical order. Precision of sorting is up to four places per position, and up to four positions.
- Component Name
- Product component that was discovered on the computer.
- Component Tags
- Tags defined on the Software Components panel. These tags are common for all discovered instances of the same component.
- Component Version
- Version of the software component that is installed on the computer.
- Computer Count
- Number of computers on which the software is installed or the shared disk is mounted.
- Computer Deletion Date
- The date and time when the computer stopped being discovered, for example because it was removed from the infrastructure, the data source was removed, or the BigFix client was uninstalled.
- Computer Name
- Host name of the computer on which the data specific to the report was discovered. For VMware products displayed on the Resource Utilization report, the name of the computer where VM Manager Tool is installed.
- Computer Type
- Type of the computer: physical, virtual, or public cloud.
- Computers
- Number of computers.
- Confidence
- Reliability of the signature that is defined in the software catalog. The lowest confidence equals 0, the highest confidence equals 3.
- Confirmed
- Indicates whether the software classification was manually confirmed.
- Contact Information
- The column is not used.
- Contracts
- On the Computer Groups report, it is the number of contracts that are assigned to the computer group. On the Inventory Exploration report, it is the number of contracts that are defined for the software item.
- Copies
- Number of copies of the unrecognized file that are discovered on the computers in your infrastructure.
- Cost Delta
- Difference between the cost of purchasing the license for the particular software product, and the cost of used or unused instances of that product. If the cost delta is a positive number that is displayed in green, the number of product instances that are used does not exceed the license entitlement. The number indicates that you have some spare licenses that you can distribute in your enterprise or that you can reduce the license-related cost by not extending the excessive licenses. If the cost delta is a negative number that is displayed in red, the number of software product instances that are used exceeds the license entitlement. You must purchase licenses for more instances of the software product.
- Cost per Seat
- Cost of the license for an instance of the software product.
- Count
- The number of software instances in the group that is filtered based on the selected columns.
- CPU Core Full Capacity
- Total count of physical processor cores of the server on which the product is installed.
- CPU Core Subcapacity
- Number of processor cores that are used by a software product.
- CPU Core Subcapacity Limit
- Total count of physical cores of the server on which the product is installed. It is counted at the time when the subcapacity is maximum which means when the number of cores that are used by the product is the highest.
- Creation
- Date and time when the signature or software catalog entry was created.
- Current Status
- Details of the signature after modification.
D
- Data Source Computer ID
- An identifier of a computer as defined in BigFix.
- Data Source Name
- Name of the BigFix server from which the data is uploaded to BigFix Inventory.
- Default Report
- Indicates whether the saved report view is set as the default view for a particular report.
- Default PVU Value
- Indicates whether a default number of processor value units is assigned to the computer. The default number is assigned when the processor is not listed in the PVU table. The default value is 100 PVUs per core.
- Designated Computer
- Provides information about the computer that is designated to scan the particular share disk.
- Description
- Additional description of an item.
- Details
- On the Audit Trail, it is information about the type and date of action that influences data on other reports as well as the user who performed the action. On other reports, it is a link to detailed information about the software product.
- Discovery
- Indicates whether the signature is used for software discovery.
- Discovery End
- Date and time when the component instance was reported for the last time. If the component is
still detected, the column shows
<n/a>
. - Discovery Start
- Date and time when the component was first detected by BigFix Inventory. The Discovery Start date might be later than the First Used date.
- DNS Name
- Name of the computer that is specified in the Domain Name System.
E
- Edition
- Edition of the Oracle Database.
- End of Support
- Date when the software component reaches end of support.
- Endpoint Scanner Catalog Version
- Version of the custom software catalog that is available on the computer.
- Entitled Computers
- Number of computers that are entitled to use the software.
- Entitlement End
- Date of the end of entitlement for the product that was provided during the creation of the contract.
- Entitlement Start
- Date of the start of entitlement for the product that was provided during the creation of the contract.
- Excluded
- Indicates whether the product on a computer is currently excluded from the pricing calculations.
- Exported Directory
- Exported directory of the shared disk.
F
- Feature
- Feature of the Oracle Database.
- File Name
- Name of the file that is used by the signature to discover the software.
- File Path
- Directory in which the file is located.
- File System Scan Results Missing
- Indicates whether the file system scan results are missing. Scan results might be missing because the computer or a relay is offline, there is a network outage, or the last scan attempt was more than 30 days ago.
- File System Scan Successful
- Indicates whether the file system scan was successful. The scan might be unsuccessful because the computer is out of space, it is misconfigured, or the scan was stopped.
- File Version
- Version of the file.
Starting from application update 9.2.11, the column returns the full version of the file, not only version limited to the release number. If you upgrade from earlier versions of BigFix Inventory, reupload results of the file system scan to show the full version. Otherwise, it is shown only for newly discovered or updated files. To reupload the result, run the Force Reupload of Software Scan Results fixlet.
- First Detected
- Date and time when the software component was detected by the scanner for the first time.
- First Measured
- Date and time when the license metric was first measured.
- First Seen
- Date and time when the information about the computer was imported from BigFix for the first time.
- First Used
- Date and time when the information about the process was first collected by the BigFix client. The First Used date might be prior to the Discovery Start date.
- FlexPoint Bundle
- FlexPoint bundle to which the product and its components are assigned. For more information, see: Assigning products to FlexPoint bundles.
- FlexPoints
- Total utilization of FlexPoints by the FlexPoint bundle.
- FlexPoints per Metric Unit
- The factor by which the number of metric units is multiplied to obtain the number of FlexPoints that the products uses.
- FlexPoint Quantity
- Indicates the number of FlexPoints to which the product and related metric are assigned as a part of a FlexPoint bundle.
- From Software Template
- Indicates whether the software was discovered on a particular computer or was generated from a software template. In the latter case, the software is installed on a shared disk that is mounted on the particular computer. For more information, see: Discovering software on shared disks.
G
- Global Default Report
- Indicates whether the saved report view is set as a default view of the particular report for all users.
H
- Has Low Disk Space
- Indicates whether the computer has less than 100 MB of free disk space.
- Has Missing Prerequisites
- Indicates whether any scanner prerequisites are missing on the computer.
- Has Outdated Version
- Indicates whether the latest version of the BigFix agent is installed on the computer. For some operating systems, no newer version of the agent is available.
- Has Usage
- Indicates whether a usage signature exists for the particular software.
I
- IBM-provided Bundling Option
- Indicates whether the product has the selected component listed as a bundling option in the software catalog provided by BigFix.
- ID
- Identifier of a computer group.
- Imported Part Numbers
- Part numbers that you imported to BigFix Inventory. They represent BigFix products that you purchased.
- Install Path
- Installation path of the Oracle Database.
- Installed Software
- Number of software items that are installed on the computer.
- Instance
- Identifier of the software instance. For VMware products displayed on the Resource Utilization report, it specifies the license key, machine type and the host name.
- Instance Tags
- Tags for individually discovered instances of a software. These tags are independent from component tags in catalog. Discovery tags are set by using the dedicated option.
- Instances Covered by Contracts
- Number of software items by a particular vendor for which contracts are defined.
- Internal Computer ID
- Identifier of a computer as defined in BigFix Inventory.
- IP Address
- IP address of the computer.
- Is Capped
- Indicates whether the partition is capped, that is whether its access to processor resources is limited. Available only for AIX. For other operating systems, the column shows no data.
- Is Out of Sync
- Indicates whether the time that is set on the computer is at least an hour from the time that is set on the BigFix Inventory server.
L
- Last Login
- Date and time when the user last logged in to BigFix Inventory.
- Last Scan Attempt
- Date and time when the last scan was initiated.
- Last Seen
- Date and time when the agent connected to the BigFix server the last time.
- Last Used
- Date and time when the software item was last used or a process was last run.
- Latest Scan Import
- Date and time when scan data from a particular computer was last imported to BigFix Inventory. The date is only updated if there are changes in the content of the scan file. If scan data is unchanged after any new scan, the Latest Scan Import column will not be updated.
- Licensed Computers
- Number of computers that are entitled to use the software and have this software installed.
- License Delta
- Difference between the number of software product instances that you are entitled to under a particular license and the actual number of software instances that are used. If the license delta is a positive number that is displayed in green, the number of product instances that are used does not exceed the license entitlement. If the license delta is a negative number that is displayed in red, the number of product instances that are used exceeds the license entitlement.
- Logical Processors
- Number of processor cores that are assigned to the partition on which the BigFix agent is installed. The number takes into account hyper-threading on the x86 architecture.
- LPAR Entitlement
- Number of processor cores that are assigned to the logical partition. Available only for AIX. For other operating systems, the column shows no data.
M
- Maintenance End
- Date of the end of maintenance of the software that was provided during the creation of the contract.
- Maintenance Start
- Date of the start of maintenance of the software that was provided during the creation of the contract.
- Maximal Trend Value
- Maximum value of the license metric utilization over the last 30 days.
- Maximal Trend Value History
- Graphic representation of the history of license metric utilization over the last 30 days.
- MD5
- MD5 checksum calculated for a file. Checksums work as fingerprints of files, and can be compared to checksums of known virus signatures to recognize whether files were altered or tampered with. They are used to ensure file integrity and safety in advanced security scenarios.
- Metric
- Type of the metric used by the software item.
- Metric Quantity
- The highest number of metric units that the product used over the specified period.
- Metric Quantity History
- Graphic representation of the history of metric consumption over the specified time period. If you set the license threshold, the graph also includes a line that represents the threshold. For more information, see: Setting license metric threshold.
- Metric Subtype
- Subtype of the license metric. For VMware products displayed on the Resource Utilization report, metric subtype indicates if the count refers to the metric utilization or overall license capacity.
- Metric Type
- Type of the license metric.
- Metric Units Convertible to FlexPoints
- The number of metric units that are converted into FlexPoints. The number of convertible metric units can be lower than the overall number of units that are used by the product. It happens when some instance of the product are not a part of the FlexPoint bundle.
- Model
- Model of the processor.
- Modification
- Date and time when the item was modified.
- Modification Date
- Date and time when the item was modified.
- Modification Type
- Type of the modification.
- Modified By
- User who modified the item.
- Modified Software
- Software item that was modified.
- Mounted Shared Disks
- List of directories of all shared disks that are mounted on the computer. To see the data, run the Discover Remote Shared Disks task on the computer.
N
- Name
- Name of an item. It depends on the report on which the column is displayed.
- Normalized Component Name
- The component name that is suggested after the analysis of package details and current content of software catalog.
- Normalized Component Vendor
- The vendor that is suggested after the analysis of package details and current content of software catalog.
- Normalized Component Version
- The component version that is based on what is embedded in package details and rounded up to two decimal places.
- Number of Packages
- Number of specific packages that are identified in your environment.
O
- One to One
- Indicates whether the product to which the component is currently assigned is the only bundling option that is available in the software catalog.
- Operating System
- Operating system of the computer on which the BigFix agent is installed.
P
- Package Scan Successful
- Indicates whether the latest package scan was successful. The scan might be unsuccessful because the computer is out of space, it is misconfigured, or the scan was stopped.
- Parent Organization
- Organization that owns the content of the catalog.
- Partition Cores
- Specifies the number of processor cores that are assigned to the partition on which the BigFix agent is installed.
On the All Metrics report, when you click a product that is licensed under the PVU subcapacity or RVU MAPC subcapacity, and you drill down to information about a single computer, the column shows the number of partition cores measured when the peak of the metric value occurred. When you sum up partition cores from VMs running on a single server, the value might not be equal to the number of cores that contribute to metric utilization on the server level. It is in line with subcapacity pricing rules. For more information, see: Virtualization Capacity License Counting Rules.
- Partition Virtual Processors
- Number of virtual processors that are assigned to the partition on which the BigFix agent is installed. The value is used in further calculations when the endpoint works in the uncapped mode. Available only for AIX. For other operating systems, the column shows no data.
- Path
- Installation path of the software that was discovered on the computer or where the .slmtag file was discovered.
- Physical Shared Pool Cores
- Number of processors that work in the shared mode.
- Peak Date
- Indicates the date of license metric peak value for the reporting period.
- Platform Name
- Name of the platform on which the software is discovered by means of the particular signature.
- Predefined End of Support
- Indicates whether the end of support date was provided by BigFix or was specified manually by a user.
- Present
- Indicates whether the component instance is currently installed.
- Private
- Indicates whether the saved report view can be used only by its creator or by other users as well.
- Process Name
- Name of the process on which the calculation of software usage is based.
- Processor
- Details of the processor.
- Processor Brand String
- Full specification of the processor including its brand, model and speed as read from the computer operating system.
- Product Definition Source
- Specifies the entity that provided the product definition. From application update 9.2.9, this column replaced the Software Catalog column.
- Product Name
- Name of the product.
- Product Version
- Version of the software product.
- Publisher
- Name of the company that published the software item.
- Publisher Definition Source
- Specifies the entity that provided the publisher definition. From application update 9.2.9, this column replaced the Software Catalog column.
- Publisher Name
- Name of the company that published the software item.
- PVU per Core
- Number of processor value units that are assigned to a processor core on a computer system. By default, the value is taken from the PVU table. It can also be manually set on the Hardware Inventory report. For more information, see: Changing the PVU per core value. See also: Changed PVU per Core Value.
- PVU Full Capacity
- Number of processor value units that are used by a product that is installed on the server.
- PVU Subcapacity
- Number of processor value units that are used by a product that is installed on the server partition.
- PVU Subcapacity Limit
- Total count of processor value units for the server on which the product is deployed, counted at the time when subcapacity is maximum. Maximum subcapacity is when the number of cores that are used by the product is the highest.
R
- Rank
- The position of a file in the ranking of 1000 files that are most commonly encountered in your computer infrastructure but do not produce matches for any signature.
- Recognized
- Indicates whether the file was recognized as part of an existing signature.
- Release
- Release of the software product.
- Release Definition Source
- Specifies the entity that provided the release definition. From application update 9.2.9, this column replaced the Software Catalog column.
- Reported Since
- Date and time when the package or file was discovered for the first time.
- Reputation
- Indicates whether the file is a malware threat. Possible values:
<n/a>
is when SHA-256 checksum is not collected.<no data>
is when the Tool for Reporting File Reputation is not installed.<No threat>
is when the file is not classified as a security threat.<No reputation>
is when the classification was done but the type of reputation is unknown.<Threat>
is when the file is classified as a security threat. This value is a link which directs you to BigFix website that contains details about the hash reputation. To see the information you must log in using your IBMid.
- Reputation Details
- Indicates the type of a threat. Possible values:
- Trojan
- Downloader
- Spyware
- Backdoor
- Rootkit
- Ransomware
- Bot
- Adware
- Worm
- Unwanted
- Virus
- Miner
- Reputation Import
- The date when the reputation was updated in BigFix Inventory.
- Reputation Update
- The date when the reputation was updated in the reputation data source.
S
- Scanning Shared Disks
- Indicates whether shared disks were scanned during the last software scan.
- Server Active Sockets
- Number of physical processor chips that are mounted on the server.
- Server Cores
- Number of processor cores that are used by the server.
- Server ID
- Identifier of the server. The format of the identifier is specified by the managedServerTagTemplate parameter for hosts from which data is collected by the VM Manager Tool or by the Run Capacity Scan on Virtualization Hosts fixlet or by the standaloneServerTagTemplate parameter for the remaining hosts. For more information about the parameters, see: Advanced server settings.
- Server Name
- A unique system in the enterprise. For a physical machine, it is the hardware manufacturer,
type, and a machine serial number. For a virtual machine, it is the manufacturer and host name. For
a virtual machine with an incomplete definition, it is a UUID that is prefixed with
TLM_VM_
. - SHA-256
- SHA-256 checksum calculated for a file. Checksums work as fingerprints of files, and can be compared to checksums of known virus signatures to recognize whether files were altered or tampered with. They are used to ensure file integrity and safety in advanced security scenarios.
- Shared
- Indicates whether a component instance is shared between multiple products.
- Shared Disk Type
- Type of the shared disk.
- Shared Mode
- Indicates whether the logical partition works in the shared mode. Available only for AIX. For other operating systems, the column shows no data
- Shared Pool ID
- Identifier of the shared processor pool.
- SID
- Unique name of the Oracle Database instance.
- Signature Creation
- Date and time when the signature was created.
- Signature Definition Source
- Specifies the entity that provided the signature. From application update 9.2.9, this column replaced the Software Catalog column.
- Signature ID
- Identifier of the signature.
- Signature Modification
- Date and time when the signature was last modified.
- Size
- Size of the file in bytes.
- Software Catalog
- Software catalog that contains the signature for the software item. Starting from application update 9.2.9, the Software Catalog column is substituted with the following columns:
- Software Component
- Name of the software component.
- Software ID
- Identifier of the software to which the modification applies.
- Software Level
- Specifies the version, release, and modification number of a software item.
- Software Name
- Name of the software product.
- Software Product
- Name of the software product.
- Software Release
- Release of the software product.
- Software Tags Scan Successful
- Indicates whether the last software tags scan was successful.
- Software Version
- Version of the software product.
- Status
- Indicates whether data from a hypervisor is available.
- System Model
- Name of the hardware system or virtualization technology that is discovered by the agent.
- Suppressed
- Indicates whether the component is currently suppressed from the inventory.
T
- Threshold
- The maximum number of metric units that a product is entitled to use within a computer group. The value is set manually and is used to calculate the metric threshold delta.
- Threshold Delta
- It is calculated by subtracting the metric quantity from the threshold. If license utilization is lower than or equal to the threshold, the delta is displayed in green. Otherwise, it is displayed in red.
- Top-level Directory
- Indicates whether the shared disk is a top-level directory in the shared disk structure.
- Total Acquisition Cost
- On the Computer Groups report, it is the total cost of purchasing licenses for software items in the computer group. On the Inventory Exploration report, it is the cost of purchasing licenses for software items by a particular vendor.
- Total Components
- Number of components of software products that are listed in the catalog.
- Total Licenses
- Number of licenses for the particular software product that are available. If the product is
licensed per computer, the number of computers that are entitled to use the product is provided. If
an unlimited number of products can be deployed under the particular license, the column includes
the abbreviation ELA (Enterprise Licensing Agreement). Higher-level users can define a contract that
applies to a broad group. If lower-level users view a contract usage report that is defined in such
a way, they see the larger total number of licenses for the product. However, when the lower-level
users view the list of instances, they see only those instances of the product for which they have
permissions.
For example, a global administrator defines a contract for 5000 instances of Lotus Notes, out of which 3500 instances are used. A lower-level user has an infrastructure that consists of 100 computers. The user is entitled to 100 instances of Lotus Notes, but only 70 instances of the product are used. If the global administrator makes the contract viewable to the lower-level user, the user sees that 3500 instances of Lotus Notes out of 5000 available instances are used. However, when lower-level users view the list of instances that are pertinent to their computer group, they see only the numbers that reflect the use of licenses in their computer group. The report shows 70 used instances of Lotus Notes out of 100 instances available under the particular license.
- Total Maintenance Cost
- On the Computer Groups report, it is the cost of maintaining all software items in the computer group. On the Inventory Exploration report, it is the cost of maintaining software items by a particular vendor.
- Total Publishers
- Number of software publishers that are listed in the catalog.
- Total Releases
- Number of releases of software products that are listed in the catalog.
- Total Runs
- Number of times a software item or process was started.
- Total Run Time
- Indicates how long the software item or process was running.
- Total Signatures
- Number of signatures that are listed in the catalog.
- Total Software Products
- Number of software products that are listed in the catalog.
- Total Versions
- Number of versions of software products that are listed in the catalog.
- Type
-
- On the Inventory Exploration report, it indicates whether the displayed item is a publisher, software product, version, release, or component.
- On the Package Data report, it is the type of the package management system.
- On the Computer Groups report, it indicates whether the type of the group is Reporting or Software Template. For more information, see: Setting up computer groups.
- On other reports, it is the type of the processor according to number of cores.
U
- Unique User ID
- An identifier of a user who currently uses or registered a software program. It is a specific ID that is assigned to one user only, and can either be an e-mail, first name, last name, initials or a random string.
- Unknown Use
- Number of software instances for which use is not monitored. These instances are grouped based on the columns defined or selected by the user in the report view.
- Unused
- Number of software instances that were not used and that are grouped based on the columns defined or selected by the user in the report view.
- Unused in the Last Month
- Number of software instances that were not used within the last month and that are grouped based on the columns defined or selected by the user in the report view.
- Unused in the Last Quarter
- Number of software instances that were not used within the last three months and that are grouped based on the columns defined or selected by the user in the report view.
- Unused in the Last Week
- Number of software instances that were not used within the last seven days and that are grouped based on the columns defined or selected by the user in the report view.
- Unused in the Last Year
- Number of software instances that were not used within the last year and that are grouped based on the columns defined or selected by the user in the report view.
- Used
- Number of software instances that were used and that are grouped based on the columns defined or selected by the user in the report view.
- Used in the Last Month
- Number of software instances that were used within the last month and that are grouped based on the columns defined or selected by the user in the report view.
- Used in the Last Quarter
- Number of software instances that were used within the last three months and that are grouped based on the columns defined or selected by the user in the report view.
- Used in the Last Week
- Number of software instances that were used within the last seven days and that are grouped based on the columns defined or selected by the user in the report view.
- Used in the Last Year
- Number of software instances that were used within the last year and that are grouped based on the columns defined or selected by the user in the report view.
- User Group Name
- Specifies the source of the information related to software users.
- User Name
- Name of the user who created the custom report view.
V
- Vendor
- Vendor of the processor or of the software that is installed on the computer.
- Version
- Version of an item. It depends on the report on which the column is displayed.
- Version Definition Source
- Specifies the entity that provided the version definition. From application update 9.2.9, this column replaced the Software Catalog column.
- Virtual Shared Pool Cores
- Number of active processor cores in the virtual shared pool.
- Vulnerability Risk (Preview)
- Lists Common Vulnerabilities and Exposures matched with a given software component. The column can contain multiple values that are displayed after expanding.
W
- Website
- Website of the software publisher.
Y
- Your Next Scheduled Export
- Date and time when the saved report will be sent to the recipients that you specified in the schedule. The column does not contain sending dates scheduled by other users.