Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

SCCM custom Query

Posted on 2011-02-14
2
Medium Priority
?
1,036 Views
Last Modified: 2012-05-11
Is there a way to create a custom Query in SCCM, to pull software inventory off of Domain connected computers and move to .CSV file?  There is roughly 4300 pc's and the only way I see to do this, is by plugging in each hostname. So, I'm hoping there is a way for it to pull software for all computers then I can import the list into a spreadsheet.
0
Comment
Question by:Jeff2009
2 Comments
 

Author Comment

by:Jeff2009
ID: 34888247
There is roughly 4300 pc's and the only way I see to do this, is by plugging in each username. So, I'm hoping there is a way for it to pull software for all computers then I can import the list into a spreadsheet.
0
 
LVL 10

Accepted Solution

by:
Kezzi earned 2000 total points
ID: 34914761
I dont think there is a way to do this.  You might be able to run the reports for say 10 at a time, but there is not enough memory for the report to create thousands of pages.  You might want to try setting up a SQL export query on the SQL server itself.

Another way to do it may be to run a software report with a count of each inventoried application - so the number of machines that have the application.  you could link the report so that after you have your initial report,  you can open each linked report against each app to get a list of the machines that have that piece of software.
0

Featured Post

Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The top devops trends for 2017 are focused on improved deployment frequency, decreased lead time for change and decreased MTTR.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question