A software vendor audit is not a casual review. It is a structured commercial process designed to identify licence shortfalls, generate a settlement demand, and convert that demand into either additional licence purchases or a multi-year commercial agreement. Vendors have legal rights to audit your licence compliance under contract, and their audit teams are experienced at finding findings that justify the time and cost of the exercise.

The enterprises that navigate audits most effectively share one characteristic: they ran their own internal measurement before the vendor did. They knew their compliance position — including its gaps — and had a strategy for each finding before the vendor's first communication. The enterprises that negotiate from weakness are those who received an audit notification, panicked, and handed control of the narrative to the vendor's audit team.

This checklist covers 30 preparation steps organised across six phases. It is designed for use as an ongoing audit readiness programme — not just as a reactive response once the audit letter arrives. The most valuable use of this checklist is to run through it annually, so that when an audit comes, you are already at step 25 rather than starting from scratch.

⚠ If you have already received an audit notification: Stop any internal cleanup activity immediately. Deleting, uninstalling, or reconfiguring software after receiving an audit notification can be characterised as evidence spoliation. Engage external audit defence specialists before taking any remediation action. Read on to understand what preparation looks like before that point.

Phase 1: Contract and Entitlement Foundation (Steps 1–6)

No Save, No Pay

Overpaying for Audit Defence? We handle software audit defence on a 25% gainshare basis — you keep 75% of every dollar saved. No retainer. No risk.

Get a free Audit Defence savings estimate →

Contracts & Licence Entitlements

01
Locate and consolidate all software licence agreements

Gather every signed contract, order form, purchase order, and addendum for each major vendor. Include original agreements, amendments, and any side letters. Gaps in your contract documentation are gaps in your entitlement defence.

02
Map licence entitlements by product, version, and metric

Create an entitlement register documenting exactly what you are licensed to use — processor licences, named users, employee metrics, device licences. For Oracle, this means mapping each product to its licence metric. For SAP, each user type and quantity.

03
Review audit rights clauses in each contract

Know exactly what audit rights your vendors have: how much notice they must give, what data they can require, and what limitations exist on audit frequency and scope. Oracle's audit rights are broad; SAP's are more prescribed. These clauses define what you must provide and what you can legitimately decline.

04
Identify end-of-maintenance and end-of-support dates

Know which products are approaching or have passed vendor support end dates. Running software beyond extended maintenance windows creates both support exposure and potential licence compliance issues that can appear as audit findings.

05
Document any licence transfers or assignments from acquisitions

Licences acquired through M&A activity require explicit contractual assignment to be valid. Licences used by an acquired company before proper assignment can represent exposure. Review all acquisition integration documentation for gaps.

06
Compile purchase history and proof-of-licence documentation

Ensure you have documentary evidence for every licence purchase: invoices, licence certificates, order confirmations. Verbal agreements and informal email approvals are not licence entitlement — if you can't document it, you likely can't defend it in audit.

Phase 2: Infrastructure and Deployment Discovery (Steps 7–13)

Infrastructure & Deployment Inventory

07
Run a complete software discovery scan across all environments

Use your SAM tool (ServiceNow, Flexera, Snow Software, or equivalent) to discover all installed software instances across on-premises, virtual, and cloud environments. The scan must cover all devices — endpoints, servers, VMs, containers — including assets that may not be on the standard management domain.

08
Identify all virtualisation and cloud deployments for Oracle products

Oracle's licensing rules for virtualised and cloud environments are uniquely complex and are the most common source of Oracle audit findings. Identify every server running Oracle software and document whether it is physical, VMware, AWS, Azure, or OCI — each has different licensing implications. The Oracle cloud licensing rules are particularly punitive.

09
Verify IBM ILMT or SLMT is deployed and functional

For IBM products licenced on sub-capacity terms, ILMT (IBM Licence Metric Tool) or SLMT must be continuously running and generating reports. Gaps in ILMT coverage — servers not reporting, scan failures, configuration errors — eliminate your right to sub-capacity licensing and can result in full-capacity billing for all unlicensed periods. This is a contractual requirement, not a best practice.

10
Document all SAP landscape components and integration connections

Map every SAP system (ECC, S/4HANA, BW, CRM, SRM, PI/PO) and all third-party systems connecting to them. SAP's indirect/digital access exposure arises from integrations, not from direct named users. Knowing your integration landscape is prerequisite to understanding your true SAP compliance position.

11
Inventory all development and test environments

Development and test deployments often use production software licences without proper authorisation or use licences that don't cover non-production use. Identify every non-production environment and verify its licence coverage — including whether developer licences are being used for builds that access production data.

12
Check for end-of-life software versions still in use

Software running on versions that have exited standard support may have different licensing terms — or may not be covered by your current licence agreement at all. This is particularly relevant for Oracle Database versions prior to 19c and SAP ECC components approaching 2027 end-of-maintenance.

13
Document processor counts and VM configuration for all Oracle servers

Oracle processor licensing is calculated based on physical core counts adjusted by Oracle's processor core factor table. For VMware environments, Oracle's policy (disputed by VMware) is that you must licence all physical cores in the VMware cluster unless using hard partitioning. Get independent legal advice before relying on soft partitioning defences.

Our software audit defence service has resolved over $200M in compliance exposure across Oracle, SAP, IBM, and Microsoft audits. We work on a 25% gainshare basis — you only pay when we reduce the exposure. Get independent advice before your vendor does their measurement.

Talk to an Audit Defence Specialist

Phase 3: Compliance Gap Analysis (Steps 14–19)

Compliance Position Assessment

14
Perform your own licence position calculation before the vendor does

Calculate your effective licence consumption against your entitlements using the same methodology the vendor will use. For Oracle, run the LMS data collection scripts in a test environment to understand exactly what they will see. For SAP, run USMM. For IBM, generate the ILMT PVU report. Know the number before they do.

15
Categorise any compliance gaps by risk level and remediation options

Not all compliance gaps are equal. A 5% shortfall in named users is different from a fundamental mis-deployment of Oracle on VMware. Categorise each gap by: potential financial exposure, strength of your contractual defence, and available remediation options. This is the foundation of your audit negotiation strategy.

16
Identify any entitlements you have that offset potential findings

ULA (Unlimited Licence Agreement) certifications, unused licence credits from prior true-ups, rights granted in legacy agreements, or entitlements from acquisitions may offset findings. These require careful contractual analysis — vendors will not volunteer offset entitlements they've identified if you haven't claimed them.

17
Review any prior audit findings or settlement agreements

Prior audit settlements sometimes include provisions that affect current compliance status — warranties about licence sufficiency, commitments to purchase additional licences, or representations about deployment configurations. These documents are relevant context for any new audit process.

18
Assess Microsoft EA true-up accuracy for current period

Microsoft's annual true-up requires you to report deployment increases accurately. Under-reporting creates cumulative exposure. Review your Microsoft 365 deployment data — user counts, E3 vs E5 assignments, Azure subscription usage, Dynamics deployments — against your currently licenced quantities. The licence right-sizing process can significantly reduce your true-up number.

19
Engage external legal counsel to review contractual ambiguities

Several major vendor licence agreements contain genuinely ambiguous provisions that have never been tested in court — Oracle's virtualisation policy being the most prominent example. Independent legal advice on these ambiguities, obtained before an audit, is significantly more valuable than advice obtained after the audit notification arrives.

Phase 4: Governance and Process Controls (Steps 20–24)

Process & Governance Controls

20
Establish a software procurement policy that creates licence records at purchase

The most common source of audit vulnerability is licences purchased but not properly documented. Every software purchase should generate: a licence entitlement record in your SAM tool, a stored copy of the licence agreement, and a clear record of the metric and quantity purchased. Implement this before the audit — not as a response to it.

21
Implement a software decommission process that updates your entitlement register

When software is removed from production, the associated licences should either be reallocated or noted as available inventory. Unused licences that appear as entitlements but have no corresponding deployment record are audit assets — they can offset findings in other areas. Don't let them disappear from your records.

22
Designate an audit response lead and define response protocols in advance

When an audit notification arrives, who has authority to respond to the vendor? Who can commit the organisation to data sharing? Who decides whether to accept or challenge findings? These decisions should be made before the audit, not in the 48 hours after notification. An undefined response process means the vendor controls the pace and direction.

23
Train procurement and IT staff on what constitutes licence-triggering access

Indirect access, sub-licensing, BYOL rules, and virtualisation licensing are all areas where well-intentioned infrastructure decisions by non-licensing staff create audit exposure. Annual training on the major licence metrics for your top vendors reduces the rate of accidental non-compliance.

24
Schedule annual self-assessment using vendor measurement tools

Run USMM, ILMT reports, Oracle LMS scripts, and Microsoft 365 licence reports on an annual cycle. The goal is not to fix compliance issues — it is to know your position so that any audit is not a discovery process but a validation exercise. The element of surprise belongs to you, not the vendor.

Phase 5: Vendor Relationship and Commercial Context (Steps 25–28)

Commercial & Relationship Context

25
Document your commercial relationship history with each vendor

Audit outcomes are not purely compliance outcomes — they are commercial outcomes. A vendor's willingness to negotiate an audit settlement is influenced by your overall commercial relationship, renewal history, and strategic value as a customer. Know your commercial leverage before the audit discussion begins.

26
Understand the vendor's audit team structure and objectives

For Oracle, the LMS (Licence Management Services) team operates separately from the sales organisation and has a quota tied to audit findings. For SAP, the LAM (License Audit Management) process is similarly detached from account management. Understanding that the audit team and your account team have different incentives is essential to managing the dual-track relationship during an audit.

27
Identify whether you're approaching a renewal — and whether audit timing is strategic

Vendors frequently initiate audits in the 6-12 months before a major contract renewal. The timing is not coincidental. An audit finding creates commercial pressure to resolve findings through a renewal agreement. Knowing this pattern allows you to anticipate audit risk in renewal cycles and negotiate from prepared positions rather than reactive ones.

28
Assess your strategic roadmap for vendor dependency

Your ability to negotiate an audit settlement is affected by your strategic dependence on the vendor. An organisation with a credible migration path away from Oracle has more leverage in Oracle audit negotiations than one that just signed a 5-year Oracle Cloud commitment. Document your realistic alternatives before the commercial discussion begins.

Phase 6: Response Readiness (Steps 29–30)

Audit Response Readiness

29
Engage external audit defence advisors before you need them

The time to identify your external audit defence specialists is not after you receive the audit letter — it is 6-12 months before, during the preparation phase. Understand your options, brief potential advisors on your environment, and have engagement terms agreed so that activation is immediate when needed. We work on gainshare — you pay nothing unless we reduce your exposure.

30
Prepare a data-sharing protocol for audit requests

When a vendor requests data, you have rights to control the format, scope, and method of data collection. Establish in advance what data you will provide directly, what data will be reviewed on-site, and what data you will challenge as outside the scope of contractual audit rights. Enterprises that accept every vendor data request without challenge consistently produce audit reports that overstate exposure.

Further Reading

class="cta-inline">

Running this checklist and want expert guidance on the findings? Our software audit defence team offers a one-day audit readiness assessment that maps your compliance position across your top five vendors and identifies the highest-priority preparation actions. 25% gainshare only — no fee unless we reduce your exposure. Download our Software Audit Defence Manual for the complete response playbook.

Get Your Audit Readiness Assessment

Vendor-Specific Audit Priorities

Each major vendor has specific audit patterns that warrant prioritised attention beyond the generic checklist above.

Oracle LMS audits consistently focus on: VMware virtualisation (full cluster licensing), cloud deployments (BYOL rules on AWS and Azure), Java SE (employee metric non-compliance), and Oracle options and packs deployed but not licenced. Our analysis of Oracle's LMS audit process covers these in detail.

SAP LAM audits focus on: Digital Access (third-party integrations), named user type misclassification (Professional vs Limited Professional), USMM measurement accuracy, and BTP usage beyond licenced parameters. The SAP indirect access guide is essential reading for any organisation with third-party systems connecting to SAP.

IBM audits focus almost entirely on ILMT compliance — whether the tool is running, whether all servers are covered, and whether sub-capacity reports are complete and current. IBM's right to charge full-capacity pricing for any period where ILMT is not properly deployed is contractual and well-documented.

Microsoft audits focus on: M365 licence under-reporting in true-ups, Azure Reserved Instance compliance, Dynamics 365 user access vs licenced quantities, and — increasingly — Copilot and AI service access beyond licenced subscriptions.

The Fundamental Rule: Know Your Position Before the Vendor Does

Every step on this checklist serves one strategic objective: ensuring that when the audit notification arrives, you have complete knowledge of your compliance position, your contractual rights, your commercial leverage, and your response strategy. Organisations with this preparation in place consistently resolve audits at 40-60% of the vendor's initial demand. Organisations without it typically settle at 80-100% of the first demand.

The software audit defence services we provide are engaged most effectively when we are involved before the audit begins — as a proactive preparation advisor — rather than as a reactive crisis response. Our gainshare model means there is no cost barrier to early engagement: we charge 25% of the exposure we reduce, with nothing owed if we don't reduce it.