Solved

script to uninstall sccm client

Posted on 2008-06-26
2
4,757 Views
Last Modified: 2013-12-04
Script to uninstall sccm client
0
Comment
Question by:sms_admin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 5

Expert Comment

by:madhusk
ID: 21873788
You can use the following script to uninstall sccm client, just copy all the below script to text file and rename it to .vbs file
0
 
LVL 5

Accepted Solution

by:
madhusk earned 125 total points
ID: 21873790
Sorry missed the script, here is the script.

strComputer = InputBox("Enter Machine Name")

strApplicationName = "Configuration Manager Client"

 

Set wshShell = WScript.CreateObject("WScript.Shell")

Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")

 

Set colSoftware = objWMIService.ExecQuery ("Select * From Win32_Product where Name = '" & strApplicationName & "'")

For Each objSoftware in colSoftware

 

If objSoftware.Name = strApplicationName Then

ApplicationFound = True

MsgBox "Removing The " & strApplicationName & " From " & UCase(strComputer)

objSoftware.Uninstall()

MsgBox "Done"

End If

Next

 

If ApplicationFound <> True Then

MsgBox strApplicationName & " Is Not Installed On "  & UCase(strComputer)

End If
0

Featured Post

What, When and Where - Security Threats from Q1

Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Suggested Courses

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question