Job Management Partner 1/Software Distribution Administrator's Guide Volume 1

[Contents][Glossary][Index][Back][Next]

10.5.2 Checking for unauthorized software installation (Unauthorized Install List)

You use this job to check for installation of unauthorized software assets.

To set the permission to install registered software assets, use the Installed Software window. To specify settings for registering a new installed software name from the inventory information, use the Server Setup dialog box.

For details about how to specify settings in the Installed Software window, see 10.7.5 Changing information about installed software (Installed Software). For details about the installation permission settings for new registration from inventory information, see 10.2.5 Setting the link with JP1/SD in the manual Setup Guide.

To check for unauthorized software assets, start from the Unauthorized Install List window, which is displayed by clicking the Unauthorized Install List job menu item. The following figure shows the Unauthorized Install List window.

Figure 10-41 Unauthorized Install List window

[Figure]

Organization of this subsection
(1) Displaying a breakdown by group
(2) Displaying a list of devices on which a software asset has been installed
(3) Downloading the search results

(1) Displaying a breakdown by group

In summation results, clicking an Installed software name link displays the number of devices on which that software asset has been installed for each group.

The following figure shows the window that displays a breakdown by group of the number of devices on which a software asset has been installed.

Figure 10-42 Window displaying a breakdown by group (Unauthorized Install List)

[Figure]

(2) Displaying a list of devices on which a software asset has been installed

In the window that displays a breakdown by group, clicking a Group name link displays a list of devices on which the corresponding software asset has been installed. The following figure shows the window that displays the devices on which the software asset has been installed.

Figure 10-43 Window displaying the devices on which a software asset has been installed (Unauthorized Install List)

[Figure]

(3) Downloading the search results

You can download a list of search results as a CSV file. If you select the check box for software to be downloaded and then click the CSV button, the search result will be downloaded as a CSV file.

The information that is downloaded as a CSV file includes Installed software name, Installed software version, File name, File size, File date, Package ID, Package former attribute, Group name, Asset No., and User name.