/build/static/layout/Breadcrumb_cap_w.png

Detecting installed software remotely by Powershell finds all but one piece of software.

Hi all,

I'm using the following Powershell to detect software on a remote computer. It finds all the software installed software as if you were looking at the list under 'Uninstall a program' in Control Panel, apart from one piece of software.


$SoftwareDetails = Get-WmiObject -class win32_product -ComputerName $Computer | select name, version | Sort-Object name

write-output $SoftwareDetails


That piece of software is Visual Studio Code which I packaged up by snapshot. It shows up in the Control Panel list but not in the Powershell script list. The software works as normal when used. Does Powershell pick up what's installed from a certain place in the registry?  Have I possibly packaged up the software wrongly so that the Powershell doesn't detect it's installed. I try and keep the snapshot clean and simple and may have deleted more files/registry entries than necessary. Would that have affected it?


0 Comments   [ + ] Show comments

Answers (1)

Posted by: rileyz 3 years ago
Red Belt
0

Check in the registry for the entry for Programs and Features (Add/remove programs), to see weather it is in the HKLM or HKCU.

I have a feeling VS can be installed into the user space?


Keep in mind what is in the registry for software is might not be the same as in WMI - you have to read up how they are populated. I guess what im saying here is WMI software list, and registry Add/Remove are diff sources.

Add/Remove gets data from registry via HKLM and HKCU for user profile installed software.


WMI, no idea how that is populated, never had a reason to find out.


 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ