Introduction to IT Audit and Software Compliance
An IT audit and software compliance review are essential components of effective IT asset management. They allow organizations to determine the actual state of their IT infrastructure, verify the legality of installed applications, and ensure alignment with internal security and operational policies. In practice, IT asset management includes both hardware inventory and detailed analysis of installed software. Codenica ITSM + ITAM, combined with the free Codenica PC Audit Scanner, enables a complete, repeatable, and fully documented audit-both internal and external. This process helps build a reliable IT inventory, forming the foundation for effective IT asset management.
Download the free Codenica PC Audit Scanner (ZIP):
https://codenica.pl/download/CodenicaPCScanner.zip

Codenica PC Audit Scanner is a free and lightweight tool designed for fast, agentless scanning of Windows PCs. It is typically run directly from a USB drive while moving from one workstation to another. The scanner automatically collects hardware configuration, installed applications, and essential system data without installing anything on the scanned machine. Each scan result is saved as a file named after the computer’s hostname. These files can then be imported into Codenica ITSM + ITAM to quickly build a centralized IT hardware and software inventory.
Who Can Perform an IT Audit?
An IT audit may be conducted by external companies-ranging from single-person consultancies to large organizations or internally by administrators within the company. An audit may be performed once or repeated regularly as part of a periodic audit cycle. Codenica ITSM + ITAM supports both internal and external audits without additional licensing costs. External auditors can maintain separate audit records for multiple clients, locations, or branches within a single Codenica license.
Why Is IT Auditing Important?
IT audits play a critical role in assessing the condition and legal compliance of an organization’s IT environment. Companies often choose to perform audits to better control IT assets, reduce licensing costs, and eliminate legal risks associated with unauthorized software. Software analysis reveals whether installed applications match the licenses held, while hardware inventory identifies obsolete, unused, or incorrectly documented devices. Regular IT inventory also helps budget planning, improves security posture, and provides data for long-term IT asset management strategies.
Collecting Software Legality Attributes
Software compliance relies on the so-called “legality attributes” - documents confirming legal ownership of software. These may include invoices, license certificates, COA labels, license books, or other manufacturer-required documentation. Detecting software on a computer does not prove legal ownership-only documentation does. Therefore, collecting and verifying legality attributes is a crucial stage of the software compliance process.
Hardware Inventory and Verification
IT auditing includes not only software analysis but also thorough verification of hardware assets. Codenica PC Audit Scanner enables agentless scanning without installing anything on end-user machines, fully meeting corporate security requirements. During on-site inspection, auditors verify COA labels, seals, device identifiers, and general hardware condition. Combined with scan data, this enables a complete and accurate IT asset inventory.

Hardware inventory performed using data from the Codenica PC Audit Scanner. The system automatically reads hardware configuration, enabling rapid creation of a complete IT asset record. This stage helps administrators determine the actual condition of devices, find unused computers, and compare physical hardware with documentation.
Computer Scanning Methods
The IT audit process may use several scanning approaches. The most commonly used method-especially in external audits is the Codenica PC Audit Scanner, which runs without installation and can be executed from a USB drive or network scripts. It detects hardware configuration, installed software, and selected license keys. All collected data is processed by Codenica ITSM + ITAM and transformed into structured objects: computers, devices, and software entries.
Ewida Audit (Codenica Audit) – Desktop Application
Codenica ITSM + ITAM is fully compatible with our dedicated desktop application Ewida Audit (also known as Codenica Audit). Ewida Audit allows you to perform detailed workstation scanning and activity monitoring, and all collected audit data can be imported directly into Codenica ITSM + ITAM for further analysis.
The PREMIUM OPEN perpetual license enables internal audits and costs 700 USD net. External audits require one of two temporary licenses: AUDITOR ONE (1 month, 500 USD net) or AUDITOR (12 months, 1000 USD net).
To order a license, please contact us using the e-mail address provided in the footer of this website.
Download link for Ewida Audit (also known as Codenica Audit), installer, langs: EN, ES, PL:
https://codenica.pl/download/eaudit-setup.exe
Processing Scanned Data in Codenica ITSM + ITAM
After scanning computers with the free Codenica PC Audit Scanner, the next step is to import the scan files into Codenica ITSM + ITAM. The system automatically recognizes each file and creates corresponding computer objects. Hardware details, detected software, and device information are unified into clean, structured IT inventory data, enabling quick interpretation and reporting.

Importing scan files into Codenica ITSM + ITAM. The system automatically creates computer objects, detects installed software, and identifies hardware devices. This significantly accelerates IT inventory, eliminates manual data entry, and reduces the risk of errors. Importing scans becomes an automated foundation for building the organization’s IT asset structure.
Assigning Computers to Users
A key stage of IT asset management is assigning computers to employees. Codenica ITSM + ITAM allows importing users from Entra ID (Azure), CSV, XML, JSON, or adding them manually. Linking users to devices enables accurate reporting, software usage analysis, security compliance verification, and clearer responsibility mapping across the organization.

User or client lists allow assigning computers to individuals, which is essential for effective IT asset management. This enables analysis of software usage, responsibility for equipment, and compliance with internal policies. Accurate employee–device mapping results in transparent and reliable IT inventory data.
Entering Licenses and Verifying Software Compliance
After loading scan data, organizations must enter the software licenses they legally own. The system does not assume that detected software is licensed-the only confirmation of legality is documentation. Licenses can be added manually or imported using CSV, XML, or JSON files. They can then be linked to computers, installations, and users, enabling full software compliance verification and identifying shortages, surpluses, or risks.

Software lists allow administrators to assign licenses to detected applications. This is a critical stage in software compliance management, enabling organizations to determine which applications are legally used. Licenses can be linked to computers, installations, and users, providing full control over the organization’s licensing posture and helping identify shortages or surpluses.
Completing the Audit
The final phase involves preparing formal documentation-report summaries, discrepancies, recommendations, and compliance conclusions. These may include license purchases, restructuring IT assets, employee training, or implementing new ITAM policies. Many organizations schedule routine follow-up audits to maintain ongoing compliance and control over IT assets.