/build/static/layout/Breadcrumb_cap_w.png

Custom Kace Report needed

Our Kace subscriptions where having a problem. While troubleshooting the issue, we ended up pushing out 40 unwanted pieces of new software to several hundred PCs in our environment. I need to run a report that will show all software, not patches, pushed out by Kace patching on November 1st. Any way to do that? We had turned off the appliance when we realized what was happening. I since opened a case, and got the issue resolved, but they could not help me with this report. Thanks to all who may answer - I appreciate your time.

0 Comments   [ + ] Show comments

Answers (1)

Posted by: chucksteel 6 years ago
Red Belt
1
The easiest way to track this might be through the asset history logs which will show when software was installed on machines. This report will show all of the computers where iTunes was installed on 2017-11-01:
SELECT ASSET_HISTORY.ASSET_ID, 
ASSET_HISTORY.TIME, 
ASSET_HISTORY.VALUE1,
ASSET_HISTORY.VALUE2,
ASSET_HISTORY.USER_TEXT,
MACHINE.NAME
FROM  ASSET_HISTORY
JOIN ASSET ON ASSET.ID = ASSET_HISTORY.ASSET_ID
JOIN MACHINE ON ASSET.NAME = MACHINE.BIOS_SERIAL_NUMBER
WHERE CHANGE_TYPE = "Detected"
AND FIELD_NAME = "SOFTWARE"
AND ASSET_HISTORY.TIME like "2017-11-01%"
AND VALUE1 = "iTunes"
You could either run separate reports for the software titles which were pushed or create one report that looked for all of them.

I could not find a table that contains the software titles that the K1000 pushes via patching so I don't know if there is a more elegant way to do this. 

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login

Share

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ