This Users report offers a comprehensive overview of users and their corresponding software usage, presenting detailed data on user identification, organizational affiliation, and specifics related to software installations. By capturing information such as usernames, department or business unit, and the software products installed on each user’s devices, the report enables organizations to monitor software deployment, ensure compliance with licensing requirements, and optimize resource allocation. This granular level of detail supports effective user and software management, facilitates audit readiness, and enhances overall IT governance.
Usage
This delivers an in-depth analysis of users and their software usage patterns throughout the organization. By offering detailed insights into how software is deployed and utilized by individual users, the report supports effective license management, facilitates thorough user audits, and enables informed decision-making in software Asset management. This comprehensive approach ensures that organizations can optimize software resources, maintain compliance with licensing agreements, and enhance their overall IT operational efficiency.
Example
During a quarterly internal audit, the Software Asset Manager utilizes the Users – Users report to validate active user accounts and verify how many software applications each user is consuming.
The report identifies several accounts marked as “Has Installs = No”, indicating users who no longer require certain licensed applications. Based on this insight, the IT team reclaims unused licenses and reallocates them to active employees who need them.
Additionally, mismatches in “Current Data Origin” help the Compliance Team detect directory synchronization inconsistencies across systems like Active Directory and HR feeds. This supports data hygiene, ensures audit accuracy, and contributes to timely remediation of discrepancies.
This data‑driven approach enables proactive license optimization and strengthens governance maturity.
Steps
To view the report, follow the steps below:
1.Navigate to Reports > Asset Management to access the dashboards list and search for Users - Users report.

Figure: Dashboard
2.Select Users – Users from the displayed dashboards and the report page is displayed.
(5).png?sv=2022-11-02&spr=https&st=2026-03-04T02%3A01%3A40Z&se=2026-03-04T02%3A13%3A40Z&sr=c&sp=r&sig=E1hy8EHxA%2Fk4Mhwne22howzeglNjwXOPIEoBS%2BJxpgA%3D)
Figure: Users – Users Report
Filters
A set of filters is available on the left panel to refine user results for deeper analysis.

Figure: Filters
The following table outlines key fields in the report along with concise descriptions of their purpose and usage.
Field | Description |
|---|---|
Country | The country where the user is located or employed. |
Location Site | The specific site or office location associated with the user. |
User Name | The name or unique identifier of the user. |
Current Data Origin | The source system currently reporting user data. |
Has Installs | Indicates whether the user has software installations linked to their account. |
Is Confirmed | Specifies if the user’s data has been verified. |
Company | The organization or employer of the user. |
Department | The division or business unit the user belongs to within the company. |
Job Title | The role or position held by the user. |
Employee ID | The unique identifier assigned to the user within the company’s HR or asset systems. |
Distinguished Name | The user’s full directory path or unique network identifier (often from Active Directory). |
Address | The physical or mailing address of the user. |
User specified 1 | Custom field 1 for additional user-specific data as defined by the organization. |
User specified 2 | Custom field 2 for additional user-specific data as defined by the organization. |
User specified 3 | Custom field 3 for additional user-specific data as defined by the organization. |
User specified 4 | Custom field 4 for additional user-specific data as defined by the organization. |
Software usage items | A count of software applications used by the user. |