Comodo Help
Find the desired product help
Comodo Endpoint Security Manager

Comodo Endpoint Security Manager

Administrator Guide v.3.5

English

Print Help Download Help
The Reports Area > Installed Software Inventory Report
  • Introduction To Comodo Endpoint Security Manager - Professional Edition
    • Software Components And System Requirements
    • Removing Incompatible Products
    • Key Concepts
    • Best Practices
    • Quick Start Guide
  • The Administrative Console
    • Logging-in To The Administrative Console
    • Using Assistance Manager
    • Using Task Manager
  • The Dashboard
  • The Computers Area
    • Endpoint Groups
      • Creating New Groups
      • Viewing And Managing Groups
    • Viewing Details And Managing Endpoints
      • Viewing General Properties
      • Viewing And Managing Group, Security Policy And Warranty Details
      • Viewing And Managing Endpoint Security Software
      • Viewing And Managing Installed Applications
      • Viewing And Managing Currently Loaded Services Or Daemons
      • Viewing And Managing Currently Loaded Processes
      • Viewing System Monitoring Alerts
      • Viewing And Managing Drives And Storage
      • Viewing Event Log
    • Adding Endpoint Computers To CESM
      • Importing Computers By Automatic Installation Of Agent
      • Adding Computers By Manual Installation Of Agent
      • Updating Comodo Software On Managed Computers
      • Importing Unmanaged Endpoints From Network
        • Importing Unmanaged Windows Computers For Centralized Management And Protection
        • Importing Unmanaged Mac OS X Computers For Centralized Management And Protection
        • Importing Unmanaged Linux Computers For Centralized Management
    • Running On-Demand Scan On Endpoints Or Groups
    • Updating Virus Database On Individual Endpoints Or Groups
    • Generating Reports For Endpoints Or Groups
    • Accessing Endpoints Through Remote Desktop Sharing Session
    • Managing Power Options On Endpoints
    • Reorganizing Groups And Sub Groups
  • The Policies Area
    • Creating A New Security Policy
      • Creating A New Security Policy For Windows Based Endpoints
      • Creating A New Security Policy For Mac OS Based Endpoints
    • Editing A Security Policy
      • General Properties
      • Selecting Target Groups
      • Configuring Antivirus Settings
        • Antivirus Scans
          • Creating A Custom Scan Profile
        • Exclusions
      • Configuring Firewall Settings
      • Configuring Website Filtering Settings
        • Adding And Managing Website Categories
        • Adding And Managing Whitelisted Websites
        • Adding And Managing Blacklisted Websites
      • Configuring Defense+ Settings
      • Configuring File Rating Settings
      • Configuring General Security Product Settings
      • Configuring Agent Settings
      • Configuring System Settings
    • Re-applying Security Policies To Endpoint Groups
  • Viewing And Managing Quarantined Items
  • Viewing And Managing Sandboxed Applications
  • Files Management
    • Viewing And Managing Unrecognized Files
    • Viewing And Managing Trusted Files List
    • Viewing And Managing Blocked Files List
  • Viewing And Managing Installed Applications
  • Viewing And Managing Currently Running Processes
  • Viewing And Managing Services
  • The Reports Area
    • Antivirus Scans Report
    • Antivirus Updates Report
    • Assistance Logs Report
    • Security Product Configuration Report
    • Security Product Logs Report
    • Computer Details Report
    • Computer Infections Report
    • Hardware Inventory Report
    • Installed Software Inventory Report
    • Malware Statistics Report
    • Policy Compliance Report
    • Policy Delta Report
    • Quarantined Items Report
    • Top 10 Malwares Report
    • Warranty Report
  • Viewing ESM Information
    • Viewing Server Information
    • Viewing Support Information
    • Viewing License Information
      • Upgrading Your License
    • Viewing The About Screen
  • Viewing And Managing Preferences
    • Configuring General Settings
    • Configuring Report Settings
    • Downloading ESM Packages
    • Managing Email Notifications
    • Viewing And Managing Dependent Servers
      • Adding A Dependent Server
      • Logging Into A Dependent Server
      • Importing Endpoints To A Dependent Server
      • Managing Endpoints Controlled By A Dependent Server
      • Editing Dependent Servers
      • Removing Dependent Servers
    • Auto Discovery Settings
  • Appendix 1 - The Service Configuration Tool
    • Starting And Stopping The ESM Service
    • Main Settings
    • Server Certificate
    • Network Settings
    • Caching Proxy Settings
    • Troubleshooting
    • Viewing And Managing CESM Database Files
    • Viewing Event Log
    • About
  • Appendix 2 - How To... Tutorials
    • How To Configure CESM Policies - An Introduction
    • How To Setup External Access From Internet
    • How To Install CES/CAVS On Windows Endpoints Which Were Added By Manually Installing The Agent
    • How To Install CAVM On Mac Endpoints Which Were Added By Manually Installing The Agent
  • About Comodo Security Solutions

Installed Software Inventory Report


The Installed Software Inventory report provides complete details of software installed at the target endpoint(s) such as name of the software, its version, publisher name including copyright information and when it was installed. The report also contains name of the computer, operating system installed and its version details.


To generate a Installed Software Inventory report

  • Open the 'Reports' area by choosing 'Reports' from the drop-down at the top left.
  • Click 'Add' and choose 'Installed Software Inventory Report'. The 'Create Installed Software Inventory Report' wizard will start.




Step 1 - Selecting Targets


The list of all the endpoint computers connected to CESM is displayed.


 


  • Use the filter buttons at the top right to choose whether Windows, Linux or Mac OS endpoints to be listed
  • Select the endpoint(s) for which you wish to generate the 'Installed Software Inventory' report. You can filter the computers by clicking the funnel icon on the column headers. 
  • Click the 'Finish' icon to start generating the report.
  • The report generation will be started or added to the queue. The progress will be displayed in the 'Reports' area.


Downloading the Report
The report is available in spreadsheet format only and can be downloaded by selecting the report in the 'Reports' area and clicking the download icon at the bottom or clicking the report file icon under the Report File column.


Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • EDR Services
  • Ransomware Prevention
  • Managed IT Support Services
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2022. All rights reserved.