{"id":2527,"date":"2025-07-02T13:13:21","date_gmt":"2025-07-02T13:13:21","guid":{"rendered":"https:\/\/zecurit.com\/help\/?post_type=docs&#038;p=2527"},"modified":"2025-07-28T06:31:55","modified_gmt":"2025-07-28T06:31:55","slug":"software-reports","status":"publish","type":"docs","link":"https:\/\/zecurit.com\/help\/asset-management\/reports-analytics\/pre-built-reports\/software-reports\/","title":{"rendered":"Software Reports"},"content":{"rendered":"\n<p>Software Reports in Zecurit help IT administrators, MSPs and security teams monitor, manage, and audit all software installed across your organization\u2019s devices. These reports provide actionable insights into compliance, unauthorized applications, vendor usage trends and user-specific installations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>1. Prohibited Software Compliance Report<\/strong><\/h2>\n\n\n\n<p>This report identifies all software installed across endpoints that are marked as <strong>Prohibited<\/strong> or <strong>Allowed<\/strong>, helping ensure software policy compliance.<\/p>\n\n\n\n<p><strong>Use Case:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Quickly detect and flag unauthorized or blacklisted applications installed on corporate devices.<\/li>\n\n\n\n<li>Track software categories that violate internal security policies (e.g., file sharing tools, torrent clients, etc.).<\/li>\n\n\n\n<li>Maintain audit readiness and reduce security risks by enforcing application whitelists and blacklists.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Fields:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Software Name, Version, Manufacturer<\/li>\n\n\n\n<li>License Type (Commercial \/ Non-Commercial)<\/li>\n\n\n\n<li>Installations Count<\/li>\n\n\n\n<li>Access Type (Prohibited\/Allowed)<\/li>\n\n\n\n<li>Software Category<\/li>\n\n\n\n<li>Detected Time<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. Device Compliance with Specific Software<\/strong><\/h2>\n\n\n\n<p>This report shows whether a particular device is compliant based on the presence or absence of required software applications.<\/p>\n\n\n\n<p><strong>Use Case:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enforce mandatory software presence for compliance (e.g., antivirus, VPN client, encryption tools).<\/li>\n\n\n\n<li>Identify systems missing critical business or security applications.<\/li>\n\n\n\n<li>Validate licensing deployment across hardware assets.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Fields:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Device Name, Device Model<\/li>\n\n\n\n<li>Compliance Status (Compliant\/Non-Compliant)<\/li>\n\n\n\n<li>Number of Cores, Architecture, Physical Memory<\/li>\n\n\n\n<li>Service Tag, Serial Number<\/li>\n\n\n\n<li>OS CD Key, MAC Address, IP Address, Platform<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. Software Grouped by Manufacturer<\/strong><\/h2>\n\n\n\n<p>This report aggregates software data by publisher, helping you understand vendor-wise deployment across your organization.<\/p>\n\n\n\n<p><strong>Use Case:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analyze software vendor footprint (e.g., Microsoft, Adobe, Oracle).<\/li>\n\n\n\n<li>Review usage trends to optimize license procurement and support contracts.<\/li>\n\n\n\n<li>Identify unauthorized or unsupported publishers in the environment.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Fields:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Software Name, Version<\/li>\n\n\n\n<li>Manufacturer, License Type<\/li>\n\n\n\n<li>Installation Count<\/li>\n\n\n\n<li>Access Type (Allowed\/Prohibited)<\/li>\n\n\n\n<li>Detected Time, Software Category<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4. Recently Installed Software<\/strong><\/h2>\n\n\n\n<p>This report lists all software recently installed across devices, allowing administrators to track changes in the environment.<\/p>\n\n\n\n<p><strong>Use Case:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect newly installed unauthorized or risky applications.<\/li>\n\n\n\n<li>Monitor user or department-level software changes.<\/li>\n\n\n\n<li>Track the timeline of software rollouts for audit or troubleshooting.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Fields:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Software Name, Version<\/li>\n\n\n\n<li>Manufacturer, License Type (Commercial\/Non-Commercial)<\/li>\n\n\n\n<li>Installed Date, Installed Location<\/li>\n\n\n\n<li>Virtual Space, Domain Name, Platform<\/li>\n\n\n\n<li>Software Category<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5. User-Specific Software Report<\/strong><\/h2>\n\n\n\n<p>This report provides a user-wise breakdown of software installations across devices, allowing mapping of applications to users.<\/p>\n\n\n\n<p><strong>Use Case:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Track which users installed or are using specific applications.<\/li>\n\n\n\n<li>Identify license over-usage by users across multiple devices.<\/li>\n\n\n\n<li>Enforce role-based access to applications.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Fields:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Software Name, Version, Manufacturer<\/li>\n\n\n\n<li>User Name, Device Name, Platform<\/li>\n\n\n\n<li>Installation Count, License Type<\/li>\n\n\n\n<li>Software Category, Installed Location<\/li>\n\n\n\n<li>Detected Time, Installed Date, Access Type<\/li>\n\n\n\n<li>Domain<\/li>\n<\/ul>\n\n\n\n<p>These software reports offer clear visibility and actionable data for IT teams to manage compliance, security and software utilization across the organization. They form an integral part of audit readiness and IT governance.<\/p>\n","protected":false},"featured_media":0,"parent":2466,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","doc_tag":[],"class_list":["post-2527","docs","type-docs","status-publish","hentry"],"comment_count":0,"_links":{"self":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/types\/docs"}],"replies":[{"embeddable":true,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/comments?post=2527"}],"version-history":[{"count":3,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2527\/revisions"}],"predecessor-version":[{"id":2950,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2527\/revisions\/2950"}],"up":[{"embeddable":true,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2466"}],"wp:attachment":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/media?parent=2527"}],"wp:term":[{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/doc_tag?post=2527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}