Virtual Desktops File Evidence Report
The Virtual Desktops File Evidence report lists details of all application file evidence found on Citrix Virtual Desktop Infrastructure (VDI) servers associated with Citrix delivery groups, and VMware Horizon non-persistent virtual desktop infrastructure(s) (VDI) delivering Desktops to end-users.
You may wish to generate this report for one of the following reasons:
- Quickly identifying unrecognized file evidence (the Assigned column will display No ), so that it can be manually assigned to an application or submitted to Flexera for addition to the Application Recognition Library
- Identifying all users who have access to applications in Citrix and VMware Horizon, and which endpoint devices the installation has been recorded against
- Finding out what licenses are being consumed because of applications available to end-users through the virtual desktop.
Generating the Report
To generate the report, perform the following steps.
To generate a Virtual Desktops File Evidence report:
- Go to the Virtual Desktops File Evidence report ( Reporting > Virtual Desktops > Virtual Desktops File Evidence ).
- Click Run report .
Reading the Report
The following columns (listed alphabetically within each group) are available. By default, some are available in the column chooser.
| Property | Description |
|---|---|
| Access Mode | Indicates which platform the file evidence originated from. This field can have one of the following values: Citrix Virtual Desktops Horizon Virtual Desktops |
| Assigned | Displays Yes when the evidence is matched to at least one application, and otherwise displays No . This assignment may have been done automatically through the Application Recognition Library rules, or manually by the operator. |
| Assigned application | The application to which the evidence is assigned. This value will differ from the Recognized application if any of the following is correct: The evidence is assigned to an application but is set to Ignored and therefore it is not used for recognition The application to which the evidence is assigned is part of a suite and that suite has been recognized instead of the individual application The application to which the evidence is assigned was removed by precedence rules The evidence existence rule is set to Not for recognition or Not allowed . |
| Company | The name of the publisher as reported by the file evidence. |
| Description | The file description retrieved from the file. |
| Endpoint device | The name of the device on which the user accessed the streamed applications. The device may be an inventory device (one within your enterprise from which you also report hardware and software inventory), or a remote device (a record created automatically when the endpoint is not within your enterprise). |
| Existence rule | The existence rule for this evidence. The following options are available: At least one —The file evidence proves an application is installed. However, if multiple pieces of file evidence are marked as At least one, then the presence of any one of these items proves the installation of an application. Not allowed —The file evidence actively prevents recognition of the application. However the same file evidence can be used to recognize another application on the same computer. Not for recognition —The file evidence is found (and is accounted for) when the application is installed, but is not used in any way for application recognition. Required —This file evidence proves that an application is installed, and it must be present for the application to be identified. |
| Group | The name of the virtual desktop infrastructure group that the end-user has access to. If a user group is permitted to access a remote device, all the members of the group can remotely access the applications available in the template. |
| Ignored | Displays Yes when the file evidence is ignored for application recognition purposes, and No when the evidence may be used for application recognition. |
| Inventory date | The most recent date when inventory was collected from the desktop template. |
| License name | The license name may be: Copied from the first-linked software product Derived from the License Name field of the SKU in the first-linked purchase (or if there is no SKU, from the purchase Description field) Created manually. |
| Name | The file evidence name. |
| Recognized application | Name of the application that is shown as installed in the Application tab of the inventory device properties page for the endpoint device (if the evidence was used for recognition). |
| Site | The name of the Citrix Site from which the evidence was imported. |
| Size (bytes) | Indicates the size of the evidence file. |
| Template | The name of the virtual desktop template (or, in Citrix terminology, "Catalog") from which the virtual desktop instance was spawned. |
| User name | The name of a user who, as a member of the associated Citrix delivery group, has access to the virtual desktop infrastructure device(s) identified through that group. |
| VDI device | The name of the virtual desktop infrastructure device accessed. |
| Version | The version of the installed application, as reported by the evidence. |