Software Audit Defense — Sub-page

SAM Audit Readiness: Build a Defensible Software Inventory

A vendor audit does not begin when the letter arrives — it begins the day your SAM programme was last updated. Organisations with mature Software Asset Management practices resolve audits in weeks. Those without them face 6–18 months of investigation, inflated exposure claims, and settlements they cannot effectively challenge. This guide is part of our Software Audit Defense series and provides a comprehensive methodology for building audit-ready SAM capability before you need it.

Software audits are inevitable for large enterprises. Oracle, Microsoft, SAP, IBM, and Broadcom/VMware each run structured audit programmes targeting customers who have grown their deployment footprint without corresponding licence purchases. The best defence against these audits is not legal expertise — it is data quality. Organisations that can produce an accurate, independently verifiable licence position at the start of an audit control the timeline, the scope, and ultimately the settlement. Our Software Audit Defense Guide covers the full audit lifecycle; this article focuses specifically on the SAM readiness infrastructure that determines whether you enter an audit from a position of strength or vulnerability.

Editorial Disclosure

Rankings and recommendations on this site are produced independently by industry practitioners. We do not accept payment for placement. Redress Compliance is ranked #1 across most categories based on verified engagement volume, vendor breadth, and client outcomes.

Why SAM Readiness Determines Audit Outcomes

In a software audit, the vendor's team will spend months building an exposure analysis. They will use deployment data, usage records, and contract terms to construct a claim — often a preliminary claim that overstates exposure by 30–60% to create negotiating room. Your ability to counter that claim depends entirely on your own data quality.

Organisations that enter audits with a mature SAM programme — accurate deployment data, reconciled licence positions, clean entitlement records — can challenge vendor claims point by point. Organisations without this infrastructure are forced to accept the vendor's framing and negotiate from a position of ignorance. The difference in settlement outcomes between these two scenarios is typically measured in millions of pounds.

SAM Maturity Level Audit Duration Vendor Claim Acceptance Typical Settlement Outcome
Level 1 — No SAM 12–18 months Unable to challenge 80–95% of claim Worst
Level 2 — Basic Inventory 9–12 months Limited challenge 60–80% of claim Poor
Level 3 — Reconciled SAM 4–8 months Point-by-point challenge 30–50% of claim Moderate
Level 4 — Mature SAM + Advisory 2–4 months Refute most claims 10–25% of claim Strong

The investment in SAM readiness pays for itself in the first audit it helps defend. A programme costing £150,000–£300,000 annually will typically reduce audit settlements by £1M–£10M on a mid-to-large enterprise software portfolio.

The Discovery Foundation: What to Capture

Effective SAM audit readiness begins with knowing what you have deployed, where, and under what licensing model. This requires a comprehensive discovery programme across four dimensions.

1. Installation and Deployment Data

You need an accurate inventory of every software installation across your estate — servers, desktops, virtual machines, containers, and cloud instances. This must capture not just the product name but the version, edition, and deployment configuration, as these often determine the applicable licence metric. For Oracle, the difference between Standard Edition 2 and Enterprise Edition is 10x in list price. For Microsoft, the difference between Windows Server Standard and Datacenter is significant when running virtual machines.

Discovery must cover:

  • Physical servers (on-premises and colocation)
  • Virtual machines (VMware, Hyper-V, Xen, KVM)
  • Cloud instances (AWS EC2, Azure VMs, GCP Compute Engine)
  • Container workloads (Kubernetes, Docker, OpenShift)
  • Desktop and laptop endpoints
  • Mobile devices with enterprise software
  • Development and test environments
  • Disaster recovery environments
Critical Gap

Development, test, and DR environments are consistently the most under-licensed areas discovered in audits. Most vendors treat these environments as requiring full licences unless a specific contractual carve-out exists. Confirm your contract terms before assuming development environments are excluded.

2. User Access and Usage Data

For user-based licences (Microsoft 365, Salesforce, SAP named users), you need accurate records of who has access to each system, what licence type they are assigned, and whether those licences reflect actual usage. Auditors cross-reference access data against HR records to identify employees with access who are not in your licence count.

3. Entitlement Records

Your licence entitlements — the rights you have purchased — must be fully documented and cross-referenced against deployment data. This includes all contracts, order forms, amendments, ELA schedules, and any verbal or informal commitments made by vendors. Missing entitlement records are a common gap that forces organisations to repurchase licences they have already paid for.

4. Infrastructure Configuration Data

For processor-based licences (Oracle Database, Oracle Java SE, many SAP products), the physical and virtual infrastructure configuration directly determines licence requirements. You need accurate records of processor count, core count, core factor by processor type, and virtualisation topology — including the hypervisor type and configuration, which determines whether hard or soft partitioning rules apply.

SAM Tooling: Selecting and Deploying Discovery Solutions

Manual discovery is not sufficient for a large enterprise estate. You need automated discovery tooling that can scan your environment continuously and reconcile results against entitlement records. The market divides broadly into three categories.

Tool Category Examples Strengths Limitations Best For
Enterprise SAM Platforms Flexera One, Snow Software, Ivanti, ServiceNow SAM Comprehensive discovery, normalisation, reconciliation, reporting High cost, complex deployment, require ongoing management Large enterprises (5,000+ seats)
Vendor-Native Tools Microsoft MAP, Oracle LMS scripts, SAP USMM/LAW Vendor-approved, specific to that vendor's products Single-vendor, designed to maximise exposure findings Audit response only (with caution)
Infrastructure Discovery Ansible, Puppet, Chef, SCCM, Jamf Deep infrastructure visibility, existing investment Not designed for licence reconciliation, manual normalisation required Foundation layer for SAM
Cloud-Native Tools AWS Cost Explorer, Azure Cost Mgmt, CloudHealth Cloud asset inventory, cost allocation, BYOL tracking Cloud-only, limited traditional software visibility Cloud-heavy environments
Key Guidance

Never run vendor-native discovery scripts (Oracle LMS scripts, SAP USMM) without independent legal and SAM advisory review. These tools are designed to surface exposure, not to help you. Any output generated by vendor scripts during a non-compelled review can be used against you in subsequent negotiations.

Most large enterprises will benefit from deploying a dedicated SAM platform as the system of record, augmented by infrastructure management tools for discovery depth, and cloud-native tools for cloud asset visibility. The SAM platform should own the reconciliation logic — translating raw installation data into a licence position that is defensible under each vendor's contract terms.

Licence Reconciliation Methodology

Discovery produces raw deployment data. Reconciliation converts that data into a licence position — a document that states, for each software product, how many licences you have deployed versus how many you are entitled to use. This is the core deliverable of a SAM programme and the foundation of audit defence.

A defensible licence position requires five steps:

Step 1: Normalise Discovery Data

Raw discovery data contains noise — multiple entries for the same product due to naming inconsistencies, version variations, and scanner artefacts. Normalisation maps each discovered installation to a canonical product record, resolving ambiguity around editions, versions, and configurations. This step is often more time-intensive than the discovery itself.

Step 2: Apply Licence Metrics

Each product must be measured against its applicable licence metric. This requires understanding whether the licence is based on installations, processors, cores, named users, concurrent users, devices, or some combination. For complex enterprise products, the applicable metric may vary by contract version, so entitlement records must be matched to deployments before applying metrics.

Step 3: Apply Vendor-Specific Rules

Beyond the headline metric, most enterprise software products have vendor-specific rules that affect the licence count. Oracle's core factor table, Microsoft's volume licensing rules for virtual machines, SAP's named user classification methodology — these rules can change the calculated licence requirement significantly. See the section below on vendor-specific rules for key examples.

Step 4: Reconcile Against Entitlements

With a calculated deployment figure, you can now compare against your entitlement records. This produces a position — compliant, over-licensed, or under-licensed — for each product. Under-licensed positions require remediation before an audit; over-licensed positions are opportunities for licence return or redeployment at renewal.

Step 5: Document and Version-Control

The licence position document must be version-controlled, dated, and maintained as a live record. Point-in-time snapshots are less useful for audit defence than a maintained record that shows your compliance trajectory over time.

Vendor-Specific Licence Counting Rules

The most common source of unexpected audit exposure is a misunderstanding of vendor-specific counting rules that diverge from how most buyers assume licences work. The following are the highest-risk areas by vendor. For deeper analysis, see our dedicated guides on Oracle partitioning and licensing, SAP indirect access, and Microsoft SAM review preparation.

Oracle

  • Soft partitioning: VMware is soft partitioning — Oracle requires licences for all processors in the cluster, not just the VMs running Oracle. This is the single most common source of large Oracle audit findings.
  • Core factor table: Different processor families have different core factors (0.25–1.0). Your licence count depends on the processor type, not just the number of cores. Review the Oracle Processor Core Factor Table for each processor in your Oracle environment.
  • Java SE: Since Oracle changed Java SE licensing in 2019 and 2023, Java is licensed on a per-employee or per-NJU basis for most organisations. Any managed deployment is subject to audit. See our Oracle Java licensing guide.
  • Named User Plus minimum: For database licensing, there is a minimum of 25 NUP licences per processor, regardless of actual user count.

Microsoft

  • Virtual machine licensing: Each Windows Server licence covers one physical host. To license unlimited VMs, you need Datacenter edition. Standard edition covers a limited number of VMs per licence.
  • SQL Server in VMs: SQL Server requires a licence for the vCPUs assigned to the VM, unless you license the entire physical host with Software Assurance.
  • M365 user assignment: Microsoft 365 licences must be assigned to specific named users. Shared accounts and unassigned licences create compliance exposure.
  • Teams Rooms: Shared conference room devices require separate Teams Rooms licences — they cannot be covered by standard M365 user licences.

SAP

  • Indirect access: Third-party systems that read from or write to SAP data — directly or via API — may require Digital Access licences. This is the highest-risk area for SAP audit exposure. See our SAP indirect access guide.
  • Named user classification: SAP distinguishes between Professional Users, Limited Professional Users, Employee Users, and other types. Misclassification — assigning lower-cost user types to users who require higher-cost types — is systematically checked in audits.
  • USMM measurement: SAP's USMM tool measures the SAP system and produces a licence requirement. The USMM result is the starting point for SAP audit discussions. Understand how to run USMM and what the output means before an audit begins.

Need help building a defensible SAM programme?

We match organisations with specialist SAM and audit defence advisors who have resolved 500+ vendor audit disputes.
Get Matched →

SAM Governance and Process

SAM readiness is not a one-time project — it is an ongoing governance programme. Without governance, even a well-implemented SAM tool will produce stale data within 6–12 months as the environment changes. The following processes are essential.

Change Management Integration

Every infrastructure change that affects software deployments — new server builds, VM provisioning, cloud instance launches, software installations — should trigger an update to the SAM record. Integrating SAM with your change management process (ServiceNow, Jira Service Management, etc.) ensures the licence position stays current. This is the single most effective investment in SAM sustainability.

Procurement Integration

Every software purchase should be processed through a procurement system that automatically updates entitlement records. Many organisations have entitlement gaps not because they failed to buy licences but because the purchase records were not captured in the SAM system. Connect procurement, finance, and SAM.

Regular Reconciliation Cycle

Run a full licence reconciliation quarterly for high-risk products (Oracle, SAP, Microsoft), and annually for lower-risk products. Document the reconciliation output and remediate any gaps on a defined timeline. This creates a defensible record that your compliance programme was active and intentional.

Vendor Communication Hygiene

Every communication with a vendor about your software environment creates a record. Train your team to route vendor audit requests through a defined channel, avoid volunteering information, and never run vendor-provided scripts without advisory oversight. See our guide on responding to software audit notifications for protocol detail.

60-Point SAM Audit Readiness Checklist

Use this checklist to assess your current SAM readiness. Items marked CRITICAL represent the areas most commonly exploited in vendor audits.

Discovery and Inventory (15 items)

01
Automated discovery deployed Continuous automated scanning across all environments including cloud
02
VM environment coverage [CRITICAL] Discovery tool sees inside all hypervisors and reports cluster topology
03
Cloud asset inventory All cloud regions and accounts included in discovery scope
04
Container workload coverage Kubernetes and Docker environments scanned for software installations
05
Dev/test environment included [CRITICAL] Development and test environments in scope — not assumed exempt
06
DR environment covered [CRITICAL] Disaster recovery environments inventoried and licence position assessed
07
Hardware inventory current Physical server inventory with processor type and core count accurate
08
Version and edition captured Discovery data includes version and edition, not just product name
09
User access data collected Active directory and application user lists reconciled against HR records
10
Unmanaged devices addressed Process for identifying unmanaged devices that may run licensed software
11
Third-party software identified Non-standard software identified and assessed for licence compliance
12
Legacy software inventoried End-of-life products that may have changed licence terms identified
13
Scan frequency defined Discovery scans run at minimum weekly; results retained for 24+ months
14
Coverage gaps documented Any areas excluded from discovery are documented with rationale
15
Remote worker coverage Laptops and devices used outside corporate network included in scope

Entitlement Management (10 items)

16
Contract repository complete All software contracts, order forms, and amendments stored in accessible repository
17
ELA schedules documented [CRITICAL] All ELA and ULA schedules captured with quantities, metrics, and terms
18
Renewal history tracked Historical renewals and true-ups documented to show entitlement evolution
19
Proof of licences stored Licence certificates, authorisation keys, and vendor acknowledgements retained
20
Downgrade rights documented Any contractual downgrade or substitution rights captured and applied
21
Acquisition licences traced Licences acquired through M&A tracked and verified as transferable
22
Divestiture licences removed Licences for divested entities removed from entitlement count
23
Support status recorded Support and maintenance status for each product line tracked
24
Expiry dates tracked Subscription and time-limited licence expiry dates monitored with alerts
25
Vendor confirmation letters Written vendor confirmations of licence position obtained where available

Reconciliation and Compliance (15 items)

26
Reconciliation run quarterly [CRITICAL] Full licence reconciliation completed and documented every quarter
27
Vendor counting rules applied Reconciliation uses vendor-specific rules, not generic deployment counts
28
VMware topology assessed [CRITICAL] Oracle licences assessed against VMware cluster rules, not just VM counts
29
Core factor table applied Oracle licence calculations use current Processor Core Factor Table
30
SAP indirect access assessed [CRITICAL] Third-party systems touching SAP identified and Digital Access assessed
31
SAP user types reviewed SAP named user classification reviewed against actual usage and role
32
Microsoft VM rules applied Windows Server and SQL Server VM licensing assessed against correct rules
33
Java SE assessed [CRITICAL] Java SE deployments inventoried and licensed under current Oracle terms
34
Compliance position documented Written compliance position produced and approved by SAM lead
35
Remediation plan active Any compliance gaps have active remediation plans with owners and timelines
36
Cloud BYOL assessed BYOL usage in cloud environments validated against cloud provider rules
37
Container licensing assessed Software running in containers assessed under applicable licence metrics
38
Over-licensing identified Products where you are over-licensed identified for return or redeployment
39
Historical records retained Point-in-time compliance positions retained for minimum 5 years
40
Independent verification Compliance position independently reviewed by external SAM advisors annually

Governance and Process (10 items)

41
SAM owner designated Named individual responsible for SAM programme with appropriate authority
42
ITAM policy published IT Asset Management policy approved and communicated to relevant staff
43
Change management integrated Infrastructure changes trigger SAM record updates via defined process
44
Procurement integrated [CRITICAL] All software purchases automatically update entitlement records
45
Approval process for installs New software installations require approval with licence check before deployment
46
Vendor contact protocol defined All vendor audit communications routed through defined channel with review
47
Legal involved in audit response Legal counsel briefed and involved in any vendor audit response
48
SAM training delivered Key staff trained on licence compliance obligations and SAM process
49
Metrics and reporting active SAM metrics (compliance rate, remediation pace) reported to management
50
Programme review scheduled Annual independent programme review scheduled and completed

Audit Response Preparedness (10 items)

51
Audit response protocol exists Written protocol for receiving and responding to audit notifications
52
Advisory relationships established External SAM and legal advisors identified before audit notification received
53
Audit rights clauses reviewed [CRITICAL] Contract audit rights clauses reviewed — scope, frequency, notice limitations understood
54
NDA template available Confidentiality agreement template ready to be required before sharing data
55
Data sharing protocol defined Process for reviewing and approving data requests before submission
56
Self-audit capability Ability to run a self-directed SAM review before vendor team arrives
57
Settlement authority defined Clear authority levels for approving audit settlements without board delay
58
Vendor script policy exists Policy prohibiting running of vendor-provided scripts without SAM review
59
Escalation path clear Escalation path from SAM team to C-suite for large audit exposures defined
60
Post-audit review process Process for documenting lessons learned and updating SAM after each audit

Frequently Asked Questions

How often should we run a full SAM reconciliation?
For high-risk products — Oracle, SAP, Microsoft, IBM — quarterly reconciliations are the minimum. For lower-risk products, annual reconciliations are typically sufficient. The reconciliation cycle should accelerate when you are approaching a renewal, have recently undergone M&A activity, or have received any indication that a vendor audit is being considered.
What's the difference between a SAM review and a formal audit?
A SAM review (sometimes called a "software asset management review" or "licence compliance review") is often positioned by vendors as a friendly, voluntary exercise. A formal audit is compelled by contract. In practice, the data produced in a SAM review is routinely used as the basis for commercial claims, often with the same outcome as a formal audit. Treat both with the same level of care. See our guide on what triggers a software audit for more detail on how vendors initiate these processes.
Can we use the same SAM tool for Oracle, Microsoft, and SAP?
Major SAM platforms like Flexera One and Snow Software cover all three vendors' products. However, depth of coverage varies. Oracle's partitioning and virtualisation rules, SAP's indirect access measurement, and Microsoft's complex VM licensing scenarios often require specialist knowledge beyond what the tool automates. A SAM platform is necessary but not sufficient — you also need advisors who understand each vendor's specific interpretation of licence terms.
What should we do if we discover we are out of compliance during our SAM review?
Do not report the gap to the vendor. Work with legal counsel and SAM advisors to understand the scope of the issue, your contractual obligations, and your options. In most cases, you have more flexibility than you think — including purchasing additional licences, restructuring deployments, or challenging whether the vendor's interpretation of licence terms is correct. Voluntary disclosure rarely results in better outcomes than resolving the issue through normal commercial channels.
How much does a SAM readiness programme cost?
For a mid-market enterprise (1,000–5,000 employees), a SAM programme including tooling, initial implementation, and ongoing management typically costs £75,000–£200,000 annually. For large enterprises (5,000+ employees), £200,000–£600,000 is typical for comprehensive SAM including advisory support. In both cases, the investment is typically recovered in the first audit it helps defend, with ongoing savings from licence optimisation and renewal leverage.

Don't Wait for the Audit Letter

The best time to build SAM readiness is before a vendor contacts you. Our network of specialist advisors can assess your current position, identify gaps, and build the programme that protects you.