Citrix Virtual Apps File Evidence Report

IT Asset Management (Cloud)

The Citrix Virtual Apps File Evidence report, located on the Discovery and Inventory menu (in the Citrix group), lists details of all file evidence which has been imported for Citrix streamed applications. "File evidence" here means the executables associated with applications specified in a Citrix delivery group that delivers applications to end users.

You may wish to generate this report for one of the following reasons:

  • Quickly identifying unrecognised file evidence (the Assigned column will display No), so that it can be manually assigned to an application or submitted to Flexera for addition to the Application Recognition Library

  • Identifying all users who have access to applications in Citrix, and which endpoint devices the installation has been recorded against

  • Finding out what licenses are being consumed because of applications accessed through Citrix.

Generating a Citrix Virtual Apps File Evidence report

  1. Go to the Citrix Virtual Apps File Evidence page.
  2. Click Run report.

Reading a Citrix Virtual Apps File Evidence report

The following columns (listed alphabetically) are available in this list. By default, some are available through the column chooser.

Column name Description

Displays Yes when the evidence is matched to at least one application, and otherwise displays No. This assignment may have been done automatically through the Application Recognition Library rules, or manually by the operator.

Assigned application

The application to which the evidence is assigned. This value will differ from the Recognized application if any of the following is correct:
  • The evidence is assigned to an application but is set to Ignored and therefore it is not used for recognition
  • The application to which the evidence is assigned is part of a suite and that suite has been recognized instead of the individual application
  • The application to which the evidence is assigned was removed by precedence rules
  • The evidence existence rule is set to Not for recognition or Not allowed.

The name of the publisher as reported by the file evidence.

Connection name

The display name of the inventory connection where this evidence was found.


The file description retrieved from the file.

Endpoint device

The name of the device on which the user accessed the streamed applications. The device may be an inventory device (one within your enterprise from which you also report hardware and software inventory), or a remote device (a record created automatically when the endpoint is not within your enterprise).

Existence rule

The existence rule for this evidence. The following options are available:
  • At least one — The file evidence proves an application is installed. However, if multiple pieces of file evidence are marked as At least one, then the presence of any one of these items proves the installation of an application.
  • Not allowed — The file evidence actively prevents recognition of the application. However the same file evidence can be used to recognize another application on the same computer.
  • Not for recognition — The file evidence is found (and is accounted for) when the application is installed, but is not used in any way for application recognition.
  • Required — This file evidence proves that an application is installed, and it must be present for the application to be identified.

Displays Yes when the file evidence is ignored for application recognition purposes, and No when the evidence may be used for application recognition.

Inventory date

The most recent date when this evidence was imported. This is the same as the last import date for the associated connection.

License name

The license name may be:
  • Copied from the first-linked software product
  • Derived from the License Name field of the SKU in the first-linked purchase (or if there is no SKU, from the purchase Description field)
  • Created manually.


The file evidence name.

Recognized application

Name of the application that is shown as installed in the Application tab of the inventory device properties page for the endpoint device (if the evidence was used for recognition).


The name of the Citrix Site from which the evidence was imported.

Size (bytes)

Indicates the size of the evidence file.

User name

The name of a user who, as a member of the associated Citrix delivery group, has access to the virtual desktop infrastructure device(s) identified through that group.


The version of the installed application, as reported by the evidence.

IT Asset Management (Cloud)