All Access Evidence
The Access evidence tab on the All Evidence page lists the collected access evidence records for the server applications that require Client Access License (CAL), including ignored, inactive, and unrecognized access evidence. For more information on access evidence, see Access Evidence.
Available actions
- Assign evidence to an application or unassign the linked evidence. See Assigning (or Unassigning) Evidence to (or from) an Application
- Ignore or recover an evidence record. See Excluding Evidence from Application Recognition
- Add or edit an evidence record. See Adding or Editing an Evidence Record
- Delete evidence. See Deleting an Evidence Record.
Available columns
This page displays the following columns (listed alphabetically). Some columns are displayed by default and others can be displayed through the column chooser. To manage columns and other UI options, see the topics under Managing Columns in a Table.
Name | Details |
---|---|
Active |
Indicates whether the evidence has been identified in your enterprise. A value of Yes indicates that the evidence has been found within your enterprise, as revealed in a previous license import. A value of No means that the evidence record is included in the Application Recognition Library, but not yet identified within your enterprise. |
Assigned |
Displays Yes when the evidence is matched to at least one application, and otherwise displays No. This assignment may have been done automatically through the Application Recognition Library rules, or manually by the operator. |
Edition |
The edition of the server application that was accessed from a client device, as reported by the access evidence. |
Ignored |
Displays Yes when the access evidence is ignored for application recognition purposes, and No when the access evidence may be used for application recognition. Ignored evidence remains linked to the application so that it does not clutter the list of unrecognized evidence. |
Matches |
Indicates the total number of times that this access evidence record was
matched by the most recent inventory import. For example, If two different instances of
Microsoft SQL Server (on different servers) were accessed (by one or more users through one
or more devices ) for 10 and 5 times each, and the access evidence in the imported inventory
matches this record, this field will display 15.
Note: A figure
displayed in the Matches column may not reflect the actual number
of access attempts. These figures may be different for the following reasons:
|
Name |
The name of the access evidence record, derived from (and often identical
to) the name of the application being accessed. Access evidence found in incoming inventory
that matches this evidence record count as access to the linked application.
Tip: Clicking the hyperlink on the Name value opens
the properties for that piece of access evidence. In those properties, selecting the
Devices tab lists all the inventory devices where that access
evidence has been reported in inventory.
|
Publisher |
The name of the publisher of the accessed server application, as reported by the access evidence. |
Source |
The source of this access evidence rule:
|
Version |
The version of the accessed server application as reported by the access evidence. |
FlexNet Manager Suite (On-Premises)
2022 R2