Skip to main content

Citrix Virtual Apps File Evidence Report

The Citrix Virtual Apps File Evidence report, lists details of all file evidence which has been imported for Citrix streamed applications. "File evidence" here means the executables associated with applications specified in a Citrix delivery group that delivers applications to end users.

info

File evidence collection for Citrix Virtual Apps is not supported by the Citrix Cloud Adapter. Running this report with data obtained from the Citrix Cloud Adapter will result in a blank report. To collect file evidence for Citrix Virtual Apps, use the Citrix XenApp Server Adapter provided by Flexera.

You may wish to generate this report for one of the following reasons:

  • Quickly identifying unrecognized file evidence (the Assigned column will display No ), so that it can be manually assigned to an application or submitted to Flexera for addition to the Application Recognition Library
  • Identifying all users who have access to applications in Citrix, and which endpoint devices the installation has been recorded against
  • Finding out what licenses are being consumed because of applications accessed through Citrix.

Generating the Report

To generate the report, perform the following steps.

To generate a Citrix Virtual Apps File Evidence report:

  1. Go to the Citrix Virtual Apps File Evidence report ( Reporting> Citrix Reports > Citrix Virtual Apps File Evidence ).
  2. Click Run report .

Reading the Report

The following columns (listed alphabetically within each group) are available. By default, some are available in the column chooser.

PropertyDescription
AssignedDisplays Yes when the evidence is matched to at least one application, and otherwise displays No. This assignment may have been done automatically through the Application Recognition Library rules, or manually by the operator.
Assigned applicationThe application to which the evidence is assigned. This value will differ from the Recognized application if any of the following is correct: The evidence is assigned to an application but is set to Ignored and therefore it is not used for recognition The application to which the evidence is assigned is part of a suite and that suite has been recognized instead of the individual application The application to which the evidence is assigned was removed by precedence rules The evidence existence rule is set to Not for recognition or Not allowed .
CompanyThe name of the publisher as reported by the file evidence.
Connection nameThe display name of the inventory connection where this evidence was found.
DescriptionThe file description retrieved from the file.
Endpoint deviceThe name of the device on which the user accessed the streamed applications. The device may be an inventory device (one within your enterprise from which you also report hardware and software inventory), or a remote device (a record created automatically when the endpoint is not within your enterprise).
Existence ruleThe existence rule for this evidence. The following options are available: At least one —The file evidence proves an application is installed. However, if multiple pieces of file evidence are marked as At least one, then the presence of any one of these items proves the installation of an application. Not allowed —The file evidence actively prevents recognition of the application. However the same file evidence can be used to recognize another application on the same computer. Not for recognition —The file evidence is found (and is accounted for) when the application is installed, but is not used in any way for application recognition. Required —This file evidence proves that an application is installed, and it must be present for the application to be identified.
IgnoredDisplays Yes when the file evidence is ignored for application recognition purposes, and No when the evidence may be used for application recognition.
Inventory dateThe most recent date when this evidence was imported. This is the same as the last import date for the associated connection.
License nameThe license name may be: Copied from the first-linked software product Derived from the License Name field of the SKU in the first-linked purchase (or if there is no SKU, from the purchase Description field) Created manually.
NameThe file evidence name.
Recognized applicationName of the application that is shown as installed in the Application tab of the inventory device properties page for the endpoint device (if the evidence was used for recognition).
SiteThe name of the Citrix Site from which the evidence was imported.
Size (bytes)Indicates the size of the evidence file.
User nameThe name of a user who, as a member of the associated Citrix delivery group, has access to the virtual desktop infrastructure device(s) identified through that group.
VersionThe version of the installed application, as reported by the evidence.