Solved

HOW DO I PULL A SOFTWARE INVENTORY OF A PC ACROSS A DOMAIN WITH STANDARD WINDOWS xp TOOLS

Posted on 2010-08-17
4
611 Views
Last Modified: 2013-11-11
I need to rebuild a PC. the target PC is in our UK office while i am located in NYC. I need to get an accurate list of the applications installed on this PC transparently with out distrubing the tuser so i can build a sister workstation. what XP imbedded tool can i use or is there something that can accomplish this 3rd party
0
Comment
Question by:Mista_Rocksteady
4 Comments
 
LVL 39

Accepted Solution

by:
Krzysztof Pytko earned 250 total points
ID: 33454870
use built-in regedit tool

run regedit on your PC and choose "File -> Connect to remote registry" type its IP and check

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

this is uninstall list of software available in Add/Remove software on his computer
0
 
LVL 2

Assisted Solution

by:cpoulter
cpoulter earned 250 total points
ID: 33454875
Download PSTools from www.sysinternals.com, unzip into the system32 folder and use PSINFO.exe with the following in a batch file

setlocal EnableDelayedExpansion
REM This txt file lists the computers to pull data from
set file=psinfo.txt
FOR /F %%i IN (%file%) DO (
set name=%%i
psinfo -s \\!name! >C:\\psinfo\!name!.txt
) 

pause

Open in new window

0
 

Author Closing Comment

by:Mista_Rocksteady
ID: 33455091
the PST tools package is extrememly helpful not just with this request but sevreal i have pending. thank you
0
 
LVL 95

Expert Comment

by:Lee W, MVP
ID: 33456757
System Information for Windows (SIW) is a single Executable.  Used in conjunction with PSEXEC, you can have it run a 2-4 minute system report which includes just about all the information you can dream up about a PC.  I'm currently writing an Access Database to import that data and subsequently flag systems that don't don't meet requirements or even troubleshoot systems that appear to have issues.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
In this article, I will show you HOW TO: Install VMware Tools for Windows on a VMware Windows virtual machine on a VMware vSphere Hypervisor 6.5 (ESXi 6.5) Host Server, using the VMware Host Client. The virtual machine has Windows Server 2016 instal…
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

26 Experts available now in Live!

Get 1:1 Help Now