Switch to the Tracking mode on the Details panel to access the tracking policy editor.
Tracking is used to mark software as must-have or forbidden on all or only specific computers. Computers that violate the policy are easy to spot and build reports on. Also, you can easily see the tracking summary for separate software items you choose to track.
By default, a software item is neither must-have nor forbidden: the corresponding lists in the policy editor are empty.
You may specify tracking rules of either kind (or both) by dragging assets or groups from the Network tree into the lists.
- The Must-have list contains computers that are obliged to have the software installed on them. If a copy of the software is not found, a violation is registered.
- The Forbidden list contains computers that are prohibited from having the software installed on them. If a copy of the software is found, a violation is registered.
Immediately after adding computers to a list, you can see all violations at a glance.
You can apply the policy to all computers at once by selecting for all from the drop-down menu in the header of each list.
Click the X next to a computer in the list to stop tracking it. In the for all mode, removing a computer creates an exception: the computer will not be reported as violating the policy regardless of the situation. To cancel the exception, remove the computer from the exceptions list.
Tracked software items are marked with a crosshair icon that appears to the right of its title in the software list and indicates its tracking status. You can limit the software list to only tracked at any time by applying the tracking filter.
To see all computers that violate tracking policy for any software item, use the Tracked software storage assistant.
For a quick printable report on tracking status of single software, click Tracking status or Tracking violations to the right of the tracking lists.