Introduction
Manual Conventions
Introduction to RayVentory Catalog
Prerequisites
Prerequisites for On-Premises
Windows Environment With Docker Desktop
Windows Environment Without Docker Desktop
Linux Environment
Prerequisites for SaaS
Overview
On-Premises or SaaS
Definition of Fingerprints
Interface
Home
Publisher
Products
Categories
Business Function Specific Software
Finance Accounting and Enterprise Resource Planning ERP Software
Computer Game or Entertainment Software
Content Authoring and Editing Software
Content Management Software
Data Management and Query Software
Development Software
Educational or Reference Software
Industry Specific Software
Network Applications Software
Network Management Software
Networking Software
Operating Environment Software
Security and Protection Software
Utility and Device Driver Software
Information Exchange Software
Electrical Equipment Software
System Management Software
Fingerprints
Unassigned
Ignored
Assigned
Vulnerabilities
Vulnerability Details
Configuration
Functions
Licenses
Normalization Rules
Synchronization
Status
Outgoing
Incoming
Administration
Users
Groups
Activities
Downloads
Custom Attributes
System Settings
Workflows
Add a New Custom Attribute
Add a New Function
Add a New Group
Add a New License
Add a New Normalization Rule
Add a New Product
Add a New Publisher
Add a New User
Add a New Version
Assign a Fingerprint
First Steps
Two Different Approaches to Assign a Fingerprint
Structure First
Evidence First
Assigning a Fingerprint
Create an API Key
Edit an Existing Custom Attribute
Edit an Existing Function
Edit an Existing Group
Edit an Existing License
Edit an Existing Normalization Rule
Edit an Existing Product
Edit an Existing Publisher
Edit an Existing User
Edit an Exisiting Version
Working with Data Hub
Prerequisites
Running Dependent Tasks
RayVentory Inventory Tasks
ECM (SCCM) Inventory Tasks
(ETL) Standardized Data Transformation
Running the Catalog Task
Reports and Dashboards
Working with RayManagesoft UEM
Prerequisites
Integration Setup
Software Information
Vulnerability Information
Glossary
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z