About gathering stand-alone software inventory

Article:HOWTO63578  |  Created: 2011-12-16  |  Updated: 2012-04-20  |  Article URL http://www.symantec.com/docs/HOWTO63578
Article Type
How To


About gathering stand-alone software inventory

(Windows only)

Starting from the SP2 release of Inventory Solution 7.1, stand-alone inventory lets you benefit from the Software Management Framework Agent functionality when you gather software inventory on the unmanaged computers. Stand-alone inventory packages perform Software Discovery scan and gather inventory data of the installed software with Software Management Framework Agent API (application programming interface). You can gather more detailed and accurate software inventory data from unmanaged computers. The new type of gathered data is not limited to Add/Remove Program information from the scans of the Uninstall registry key entries.

For more information, see the topics about Software Management Framework Agent and the Software Discovery scan in the Symantec Management Platform User Guide.

On managed computers, Software Management Framework Agent is installed along with Symantec Management Agent. During stand-alone inventory on unmanaged computers, Software Management Framework Agent does not depend on Symantec Management Agent. When you create a stand-alone inventory package, Software Management Framework Agent is picked up from the following location on your Notification Server computer:

%InstallDir%\Altiris\Altiris Agent\Agents\SoftwareManagement

When the stand-alone inventory package runs, Software Management Framework Agent stores the software discovery information in files with an NSE extension at the location that you specified for the package.

See Gathering inventory using stand-alone packages.

With the enhanced stand-alone software inventory that scans the Uninstall registry key entries, MSI cache, and other locations on the unmanaged computer, you can gather the following inventory data:

  • Add/Remove Program information

  • Installed software information

  • MSI information


Stand-alone software inventory with Software Management Framework Agent invokes Software Discovery scan and can take more resources and more time (up to 30 minutes) than the scan of registry key entries. However, this inventory method lets you gather more detailed and reliable inventory data of the software that is installed in your environment.

You can view the results of stand-alone software inventory in the following reports:

Newly Discovered Software report

A list of software applications that have been discovered using software inventory and have not matched the list of known applications and predefined software products.

To view the report, in the Symantec Management Console, on the Manage menu, click Software, and then in the left pane, under Installed Software, click Newly Discovered Software.

Installed Software report

A list of the software that is marked as installed, its version, count, and company name.

To view the report, in the Symantec Management Console, on the Reports menu, click All Reports > Discovery and Inventory > Inventory > Cross-platform > Software/Applications > Software.

To view additional details such as the computers on which the software is installed, right-click the software and click View Details.

See About viewing inventory data.


To gather complete software inventory with stand-alone inventory packages from the Inventory Solution versions that are earlier than 7.1 SP2, you have to recreate and redistribute the packages. You recreate the stand-alone inventory packages by editing them and saving the changes.

See Creating, editing, or cloning stand-alone inventory packages.

Stand-alone software inventory helps you track the count of installed software but does not provide the count of computers that use the installed software. Thus you cannot harvest unused software licenses for unmanaged computers. For license harvesting, you need to install the Application Metering plug-in that runs within Symantec Management Agent only on managed computers.

See About metering and denying applications.

Legacy ID


Article URL http://www.symantec.com/docs/HOWTO63578

Terms of use for this information are found in Legal Notices