{"id":2538,"date":"2025-07-02T13:14:15","date_gmt":"2025-07-02T13:14:15","guid":{"rendered":"https:\/\/zecurit.com\/help\/?post_type=docs&#038;p=2538"},"modified":"2025-07-22T10:17:26","modified_gmt":"2025-07-22T10:17:26","slug":"software-details","status":"publish","type":"docs","link":"https:\/\/zecurit.com\/help\/asset-management\/asset-management\/software-asset-management\/software-details\/","title":{"rendered":"Software Details"},"content":{"rendered":"\n<p>The <strong>Software Details<\/strong> section under the Inventory module provides a centralized view of installed software across all managed devices. It helps IT administrators monitor software usage, detect prohibited or non-compliant applications and manage software licensing efficiently.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Overview Tab<\/h2>\n\n\n\n<p>The <strong>Overview<\/strong> tab offers high-level analytics to help you quickly understand the software environment across your network.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1.1 Software Type Summary<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visual representation of software distribution by type:\n<ul class=\"wp-block-list\">\n<li><strong>Prohibited<\/strong><\/li>\n\n\n\n<li><strong>Commercial<\/strong><\/li>\n\n\n\n<li><strong>Non-commercial<\/strong><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Helps identify licensing risks and policy violations.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">1.2 Software Type Trend<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Timeline-based view showing how software types change over time.<\/li>\n\n\n\n<li>Useful for tracking installation\/uninstallation activities.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">1.3 Software License Summary<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Status of software license compliance:\n<ul class=\"wp-block-list\">\n<li><strong>In-Compliance<\/strong>: Devices using licensed software correctly<\/li>\n\n\n\n<li><strong>Over Licensed<\/strong>: Licenses purchased exceed installation<\/li>\n\n\n\n<li><strong>Under Licensed<\/strong>: Installed software exceeds available licenses<\/li>\n\n\n\n<li><strong>License Expired<\/strong>: Indicates expired software licenses<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">1.4 Recently Installed Software<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>List of latest software installed across managed devices.<\/li>\n\n\n\n<li>Enables rapid detection of suspicious or unauthorized installations.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">2. Network Software Tab<\/h2>\n\n\n\n<p>This section provides detailed insights and management options for all discovered software across the network.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2.1 Software Insights<\/h3>\n\n\n\n<p>Key statistics across the entire environment:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Total Software<\/strong> detected<\/li>\n\n\n\n<li><strong>Devices with Prohibited Software<\/strong><\/li>\n\n\n\n<li><strong>Software Compliance Summary<\/strong>:\n<ul class=\"wp-block-list\">\n<li><strong>Compliant<\/strong><\/li>\n\n\n\n<li><strong>Non-Compliant<\/strong><\/li>\n\n\n\n<li><strong>Not Evaluated<\/strong><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Software by Manufacturer<\/strong>: Aggregated by vendor for easy analysis.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2.2 Software List<\/h3>\n\n\n\n<p>Tabular view of every software item, including key attributes and configurable fields:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Column<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td><strong>Software Name<\/strong><\/td><td>Application name<\/td><\/tr><tr><td><strong>Manufacturer<\/strong><\/td><td>Vendor or publisher name<\/td><\/tr><tr><td><strong>All Devices<\/strong><\/td><td>Number of devices with this software installed<\/td><\/tr><tr><td><strong>Managed Devices<\/strong><\/td><td>Count of enrolled devices with the software<\/td><\/tr><tr><td><strong>License Type<\/strong><\/td><td>Set as: <em>Commercial<\/em>, <em>Non-Commercial<\/em> or <em>Not Assigned<\/em><\/td><\/tr><tr><td><strong>Category<\/strong><\/td><td>Group software into categories (e.g., Productivity, Security) \u2014 admin can select or create categories<\/td><\/tr><tr><td><strong>Access Type<\/strong><\/td><td>Control usage: <em>Allowed<\/em>, <em>Prohibited<\/em>, <em>Not Assigned<\/em><\/td><\/tr><tr><td><strong>Action<\/strong><\/td><td>View details or manage settings for each software item<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Use Case: Mark software like torrent clients or pirated tools as Prohibited to trigger alerts.<\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">2.3 Software Details View<\/h3>\n\n\n\n<p>Clicking a software entry opens a detailed view:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Basic Info<\/strong>: Name, version, publisher, category<\/li>\n\n\n\n<li><strong>Installed Devices<\/strong>: Table showing where the software is installed with version and compliance status<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">3. Device Details View \u2192 Software Tab<\/h2>\n\n\n\n<p>Each individual device profile includes its installed software list, providing detailed per-device visibility.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Field<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td><strong>App Name<\/strong><\/td><td>Name of the installed application<\/td><\/tr><tr><td><strong>Version<\/strong><\/td><td>Installed version<\/td><\/tr><tr><td><strong>Manufacturer<\/strong><\/td><td>Publisher or vendor<\/td><\/tr><tr><td><strong>Compatibility<\/strong><\/td><td>Indicates 32-bit or 64-bit version<\/td><\/tr><tr><td><strong>License Type<\/strong><\/td><td>Commercial \/ Non-commercial \/ Not assigned<\/td><\/tr><tr><td><strong>Category<\/strong><\/td><td>Category assigned for management<\/td><\/tr><tr><td><strong>Access Type<\/strong><\/td><td>Allowed \/ Prohibited \/ Not assigned<\/td><\/tr><tr><td><strong>Installed Location<\/strong><\/td><td>Folder path on the device<\/td><\/tr><tr><td><strong>Source<\/strong><\/td><td>How the software was installed (manual, script, etc.)<\/td><\/tr><tr><td><strong>Installed On<\/strong><\/td><td>Date and time of installation<\/td><\/tr><tr><td><strong>Uninstall String<\/strong><\/td><td>Command to uninstall the software<\/td><\/tr><tr><td><strong>Status<\/strong><\/td><td>Installation health <\/td><\/tr><tr><td><strong>Action<\/strong><\/td><td>Option to uninstall or review license\/compliance status<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Why It Matters<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify and remove <strong>prohibited software<\/strong> for better compliance.<\/li>\n\n\n\n<li>Monitor <strong>commercial software usage<\/strong> for cost savings.<\/li>\n\n\n\n<li>Improve <strong>IT security posture<\/strong> by detecting outdated or risky apps.<\/li>\n\n\n\n<li>Simplify <strong>audits<\/strong> with real-time visibility and license tracking.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Related Article:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/zecurit.com\/help\/docs\/asset-manager\/asset-management\/software-asset-management\/software-license-management\/\">Managing Software Licenses<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zecurit.com\/help\/docs\/asset-manager\/asset-management\/software-asset-management\/software-category\/\">Managing Softwate Category<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zecurit.com\/help\/docs\/asset-manager\/asset-management\/alerts-compliance\/alert-policy\/\">Alerts Policy<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"featured_media":0,"parent":2537,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","doc_tag":[],"class_list":["post-2538","docs","type-docs","status-publish","hentry"],"comment_count":0,"_links":{"self":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/types\/docs"}],"replies":[{"embeddable":true,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/comments?post=2538"}],"version-history":[{"count":6,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2538\/revisions"}],"predecessor-version":[{"id":2909,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2538\/revisions\/2909"}],"up":[{"embeddable":true,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/docs\/2537"}],"wp:attachment":[{"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/media?parent=2538"}],"wp:term":[{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/zecurit.com\/help\/wp-json\/wp\/v2\/doc_tag?post=2538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}