Unrecognized Access Evidence
The Access evidence tab of the Unrecognized Evidence page displays the access evidence records that are not recognized by the Application Recognition Library. For more information on access evidence, see Access Evidence.
Available actions
- Assign evidence to an application or unassign the linked evidence. See Assigning (or Unassigning) Evidence to (or from) an Application
- Ignore or recover an evidence record. See Excluding Evidence from Application Recognition
- Delete an evidence record. See Deleting an Evidence Record.
Available columns
This page displays the following columns (listed alphabetically). Some columns are displayed by default and others can be displayed through the column chooser. To manage columns and other UI options, see the topics under Managing Columns in a Table.
Name | Details |
---|---|
Assigned |
Displays Yes when the evidence is matched to at least one application, and otherwise displays No. This assignment may have been done automatically through the Application Recognition Library rules, or manually by the operator. |
Edition |
The edition of the server application that was accessed from a client device, as reported by the access evidence. |
Matches |
Indicates the total number of times that this access evidence record was
matched by the most recent inventory import. For example, If two different instances of
Microsoft SQL Server (on different servers) were accessed (by one or more users through one
or more devices ) for 10 and 5 times each, and the access evidence in the imported inventory
matches this record, this field will display 15.
Note: A figure
displayed in the Matches column may not reflect the actual number
of access attempts. These figures may be different for the following reasons:
|
Name |
The name of the access evidence record, derived from (and often identical
to) the name of the application being accessed. Access evidence found in incoming inventory
that matches this evidence record count as access to the linked application.
Tip: Clicking the hyperlink on the Name value opens
the properties for that piece of access evidence. In those properties, selecting the
Devices tab lists all the inventory devices where that access
evidence has been reported in inventory.
|
Publisher |
The name of the publisher of the accessed server application, as reported by the access evidence. |
Source |
The source of this access evidence rule:
|
Version |
The version of the accessed server application as reported by the access evidence. |
IT Asset Management (Cloud)
Current