Listing the applications installed on discovered servers

Started by DHAYES

I'm currently using version 6.0.5 of Network Scanner and finding it incredibly useful. However I'm having trouble finding a way of listing the applications installed on discovered servers!

One way investigated was to utilise the WMI32_Products query though it seems this instigates a consistency check on the remote server and as such is not very desirable. My next line of inquiry was to check against the HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall thread and to check each subkey and select out the DisplayName parameter however I can't seem to find a way to read subkeys.

Any advice or pointers for a different approach?

Thanks in advance.
Dean
SoftPerfect Support forum - Andrew avatar image

Re: Listing the applications installed on discovered servers   23 July 2015, 08:32

There's an option specifically for reading the list of installed applications. It reads the Uninstall registry key, filters out duplicates and reads version info:

SoftPerfect support forum
I can't believe I missed that shocked or surprised

Thanks for saving me aeons of time smile

Reply to this topic

Sometimes you can find a solution faster if you try the forum search, have a look at the knowledge base, or check the software user manual to see if your question has already been answered.

Our forum rules are simple:

  • Be polite.
  • Do not spam.
  • Write in English. If possible, check your spelling and grammar.

Author:

Email:

Subject

A brief and informative title for your message, approximately 4–8 words:

     

Spam prevention: please enter the following code in the input field below.

  *******   ********    *******    ******   **      ** 
 **     **  **     **  **     **  **    **  **  **  ** 
 **         **     **  **         **        **  **  ** 
 ********   ********   ********   **        **  **  ** 
 **     **  **         **     **  **        **  **  ** 
 **     **  **         **     **  **    **  **  **  ** 
  *******   **          *******    ******    ***  ***  

Message: