Access Evidence Property Reference
• | Unrecognized Access Evidence |
• | Discovered Access Evidence |
• | Inactive Access Evidence |
• | Ignored Access Evidence |
• | All Access Evidence |
Note:Most lists in IT Asset Management only show a selection of the properties in the underlying database. Some columns are displayed by default and others can be displayed using the column chooser control, including any custom properties that you have added. For information on using the column chooser, see Managing Columns in a Table.
Column Name |
Details |
|||||||||
Assigned |
Displays Yes when the evidence is matched to at least one application, and otherwise displays No. This assignment may have been done automatically through the Application Recognition Library rules, or manually by the operator. |
|||||||||
Edition |
The edition of the server application that was accessed from a client device, as reported by the access evidence. |
|||||||||
Matches |
Indicates the total number of times that this access evidence record was matched by the most recent inventory import. For example, If two different instances of Microsoft SQL Server (on different servers) were accessed (by one or more users through one or more devices ) for 10 and 5 times each, and the access evidence in the imported inventory matches this record, this field will display 15. Note:A figure displayed in the Matches column may not reflect the actual number of access attempts. These figures may be different for the following reasons:
|
|||||||||
Name |
The name of the access evidence record, derived from (and often identical to) the name of the application being accessed. Access evidence found in incoming inventory that matches this evidence record count as access to the linked application. Tip:Clicking the hyperlink on the Name value opens the properties for that piece of access evidence. In those properties, selecting the Devices tab lists all the inventory devices where that access evidence has been reported in inventory. |
|||||||||
Publisher |
The name of the publisher of the accessed server application, as reported by the access evidence. |
|||||||||
Source |
The source of this access evidence rule:
|
|||||||||
Version |
The version of the accessed server application as reported by the access evidence. |