Listing the applications installed on discovered servers

Started by DHAYES

I'm currently using version 6.0.5 of Network Scanner and finding it incredibly useful. However I'm having trouble finding a way of listing the applications installed on discovered servers!

One way investigated was to utilise the WMI32_Products query though it seems this instigates a consistency check on the remote server and as such is not very desirable. My next line of inquiry was to check against the HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall thread and to check each subkey and select out the DisplayName parameter however I can't seem to find a way to read subkeys.

Any advice or pointers for a different approach?

Thanks in advance.
Dean
SoftPerfect Support forum - Andrew avatar image

Re: Listing the applications installed on discovered servers   23 July 2015, 08:32

There's an option specifically for reading the list of installed applications. It reads the Uninstall registry key, filters out duplicates and reads version info:

SoftPerfect support forum
I can't believe I missed that shocked or surprised

Thanks for saving me aeons of time smile

Reply to this topic

Sometimes you can find a solution faster if you try the forum search, have a look at the knowledge base, or check the software user manual to see if your question has already been answered.

Our forum rules are simple:

  • Be polite.
  • Do not spam.
  • Write in English. If possible, check your spelling and grammar.

Author:

Email:

Subject

A brief and informative title for your message, approximately 4–8 words:

     

Spam prevention: please enter the following code in the input field below.

 ********         **  ********  ********   *******  
 **     **        **     **     **    **  **     ** 
 **     **        **     **         **           ** 
 ********         **     **        **      *******  
 **     **  **    **     **       **             ** 
 **     **  **    **     **       **      **     ** 
 ********    ******      **       **       *******  

Message: