Solved

WQL query on WMIC command line

Posted on 2007-04-10
4
3,788 Views
Last Modified: 2008-05-31
How do I enter a WQL query on the WMIC command line? An example query I'd lke to run is below...

"SELECT * FROM Win32_QuickFixEngineering WHERE Name="KB123456"

Thank you!
JohnD
0
Comment
Question by:johndarby
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 67

Expert Comment

by:sirbounty
ID: 18884554
Did you try using the single apostrophe?

SELECT * FROM Win32_QuickFixEngineering WHERE Name='KB123456'
0
 
LVL 67

Accepted Solution

by:
sirbounty earned 500 total points
ID: 18884614
Oh, I misread this - you're using the command line wmic...
Use something like this:

wmic QFE get CSName, Description, FixComments, HotFixID, InstalledBy, InstalledOn, Name |find /i "123456"

Otherwise, drop the output into a csv file and sort it in excel.

Could get more specific output using a vbs, if you're interested...
0
 
LVL 1

Author Comment

by:johndarby
ID: 18884656
As ever, you are the font of useful information! Thank you!
JohnD
0
 
LVL 67

Expert Comment

by:sirbounty
ID: 18884666
:^)
Glad I could help you again!  
Thanx for the grade.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question