Trustworthy Data Flashcards
Used to discover software installations. Software Asset Management automatically leverages SQL Server, Exchange, and Oracle Database discovery patterns, but you can perform steps for Software Asset Management to utilize additional discovery patterns, if needed.
Discovery Pattern
Software installed in your environment that discovery identifies and automatically populates into the Software Installation [cmdb_sam_sw_install] table.
Software Installation
Automatically created during discovery or import process to identify and normalize the software installed in an environment.
Software Discovery Model
A predefined set of conditions that determine which software discovery models get mapped to which software models.
Software Discovery Map
Used to normalize specific software products within an environment based on a common pattern.
Pattern Normalization Rule
Identifies the level of normalization match based on publisher, product, and version.
Normalization Status
Manual update of software discovery model data.
Manual Normalization
Provided automatically when there is a variance detected between standard normalization and a discovery model that has been manually normalized.
Normalization Suggestion
Used to generate accurate license positions from raw discovery data.
Machine Learning Normalization
What are Software Entitlements?
Software entitlements provide software license details that define user rights. They play a part in determining your compliance position (i.e. whether a user using a given software application has been correctly licensed to use the application).
What table stores the entitlement import records?
Entitlement import [samp_bulk_import]
What plug-ins need to be activated to use the Software Asset Workspace?
- Software Asset Management Professional (com.sn_samp_master)
- Software Asset Workspace (com.sn_sam_workspace)
When Discovery finds a software installation, what table is automatically populated with this information?
Software Installations table [cmdb_sam_sw_install]
Software installations are discovered using ____________ _______________.
Discovery Patterns
What are the four phases of Discovery?
- Scanning: “Are you there? How will I classify you?”
- Classification: “How should I classify you specifically?”
- Identification: “Have I seen you before?”
- Exploration: “What else can you tell me about yourself?”