By default, UninstallView shows only win32 apps which is more than enough for most users. You can toggle it to show apps from Microsoft Store, but it is not very friendly with this type of apps.
Ok, launch the app and wait a few seconds for the app to generate the list. Now you can export and save it for later use. Run the elevated Command Prompt use search and then run the app as Administrator , and execute the following command:. After a short wait, you will see a table with a list of names and versions of programs installed on your system. Wmic allows you to query remote computers through WMI. The following command lists the installed applications on the remote host:.
This command generates a CSV file with your computer name in the title. After command execution, open the drive C. There you will find a CSV file with your apps. Open this file using any text editor or Excel. Now, let us show you how to get a list of installed apps using PowerShell. The Control Panel uses the same registry to generate the list of installed apps, although you cannot export this list.
Running all three separate commands is not convenient, so let us show how to run them all simultaneously, so you can get the list of all apps installed on a PC:. As you can see, the resulting list contains the program name, version, publisher, and installation date. You can use the following PowerShell script to generate summary list both of x86 and x64 installed application and export it to a CSV formatted file:. In PowerShell Core 6. United States English. Post an article. Subscribe to Article RSS.
Click Sign In to add the tip, solution, correction or comment that will help other users. Report inappropriate content using these instructions. Native Auditing Run eventvwr. Server Fault is a question and answer site for system and network administrators. It only takes a minute to sign up. Connect and share knowledge within a single location that is structured and easy to search.
Depending on your logging level, you may be able to look through the event logs and see who called the installer. In fact, I just installed Adobe Reader on a default R2 VM, and did find that it recorded the user who installed the program. Sort of. If, of course, you're in the unfortunate position of not having that log entry, your best bet is to go through and see if you can determine when, precisely, it was installed, and correlate that with the Security Event Logs to determine with had an interactive logon session at that time.
The Adobe installer logs might be more helpful in narrowing down the precise time of install too, as it's possible your logging level didn't even log a non-MS application installation in the Event Logs. Either way, it's probably a matter of finding the precise time, and going through the Security logs to determine who had an open type 2 or type 10 logon during that time. It'll give you a pretty strong case as to who did it, but unless you have a high enough logging level to see which user called the installer, it's not going to be considered definitive proof.
Or at least I've never seen it taken that way. Very useful if you need to track who is installing what, when. Alternatively, you can filter the Application log for Event ID if you need to see who un installed an application. Information found through this website. Sign up to join this community. The best answers are voted up and rise to the top.
Stack Overflow for Teams — Collaborate and share knowledge with a private group. Create a free Team What is Teams?
0コメント