Citrix Virtual Apps File Evidence Report
Important:File evidence collection for Citrix Virtual Apps is not supported by the Citrix Cloud Adapter. Running this report with data obtained from the Citrix Cloud Adapter will result in a blank report. To collect file evidence for Citrix Virtual Apps, use the Citrix XenApp Server Adapter provided by Flexera.
You may wish to generate this report for one of the following reasons:
• | Quickly identifying unrecognized file evidence (the Assigned column will display No), so that it can be manually assigned to an application or submitted to Flexera for addition to the Application Recognition Library |
• | Identifying all users who have access to applications in Citrix, and which endpoint devices the installation has been recorded against |
• | Finding out what licenses are being consumed because of applications accessed through Citrix. |
Generating the Report
To generate the report, perform the following steps.
To generate a Citrix Virtual Apps File Evidence report:
1. | Go to the Citrix Virtual Apps File Evidence report (Reporting> Citrix Reports > Citrix Virtual Apps File Evidence). |
2. | Click Run report. |
Reading the Report
The following columns (listed alphabetically within each group) are available. By default, some are available in the column chooser.
Property |
Description |
||||||||||||
Assigned |
Displays Yes when the evidence is matched to at least one application, and otherwise displays No. This assignment may have been done automatically through the Application Recognition Library rules, or manually by the operator. |
||||||||||||
Assigned application |
The application to which the evidence is assigned. This value will differ from the Recognized application if any of the following is correct:
|
||||||||||||
Company |
The name of the publisher as reported by the file evidence. |
||||||||||||
Connection name |
The display name of the inventory connection where this evidence was found. |
||||||||||||
Description |
The file description retrieved from the file. |
||||||||||||
Endpoint device |
The name of the device on which the user accessed the streamed applications. The device may be an inventory device (one within your enterprise from which you also report hardware and software inventory), or a remote device (a record created automatically when the endpoint is not within your enterprise). |
||||||||||||
Existence rule |
The existence rule for this evidence. The following options are available:
|
||||||||||||
Ignored |
Displays Yes when the file evidence is ignored for application recognition purposes, and No when the evidence may be used for application recognition. |
||||||||||||
Inventory date |
The most recent date when this evidence was imported. This is the same as the last import date for the associated connection. |
||||||||||||
License name |
The license name may be:
|
||||||||||||
Name |
The file evidence name. |
||||||||||||
Recognized application |
Name of the application that is shown as installed in the Application tab of the inventory device properties page for the endpoint device (if the evidence was used for recognition). |
||||||||||||
Site |
The name of the Citrix Site from which the evidence was imported. |
||||||||||||
Size (bytes) |
Indicates the size of the evidence file. |
||||||||||||
User name |
The name of a user who, as a member of the associated Citrix delivery group, has access to the virtual desktop infrastructure device(s) identified through that group. |
||||||||||||
Version |
The version of the installed application, as reported by the evidence. |