Skip to main content

Software Inventory

Overview

The Software page gives you visibility into all software installed across your enrolled devices and any MCP (Model Context Protocol) configurations detected. Navigate to DevicesSoftware to access it.

Software Inventory

The Software tab displays all software detected across your device fleet.

Table Columns

ColumnDescription
NameSoftware name
VersionInstalled version
SourceWhere the software was installed from
DevicesNumber of devices with this software installed
VulnerabilitiesNumber of known vulnerabilities for this software

Filtering

Use the toolbar to narrow down results:

  • Search — Filter by software name
  • Devices — Filter by specific devices

Vulnerability Tracking

The vulnerabilities column highlights software with known CVEs. Hover over the vulnerability count to see the individual CVE identifiers. Software with vulnerabilities is flagged to help you prioritize remediation.

MCP Configurations

The MCP tab shows Model Context Protocol server configurations found across your devices.

Table Columns

ColumnDescription
NameMCP server name
PathFile path of the configuration
DeviceDevice where the configuration was found
TypeKnown MCP server type
IssuesNumber of security issues detected
ConfigView the full MCP configuration

Security Issues

MCP configurations are evaluated for security issues. Hover over the issues column to see specific concerns. Configurations without issues are marked as Secure.

Filtering

  • Search — Filter by MCP server name
  • Devices — Filter by specific devices
  • Type — Filter by known MCP server type

Best Practices

Review Vulnerable Software

Regularly review software with known vulnerabilities and prioritize updates for widely deployed applications.

Audit MCP Configurations

Review MCP configurations for security issues, especially on devices handling sensitive data.

Track Shadow IT

Use the software inventory to identify unauthorized applications installed across your fleet.

Next Steps