Scripting Question

Find all 32-bit applications on Mac OSX devices

10/11/2019 737 views

With the recent arrival of Catalina, and the fact it doesn't support 32-bit applications, I was wondering if anyone had a method to script or report all Macs that have 32-bit applications installed via Kace? Thanks for any suggestions.

0 Comments   [ + ] Show comments


All Answers


You can put following into a script or maybe a custom inventory rule.

If using a script you need to save the output to file and upload to the appliance.

system_profiler SPApplicationsDataType | grep -B 6 -A 2 "64-Bit (Intel): No"

Answered 10/11/2019 by: KevinG
7th Degree Black Belt

  • Thanks - This sounds like a good fix for running on individual Macs, but it might not be viable for running on all Macs at once (as the output file name in the script would be the same for all Macs, and I wouldn't be able to tell which file came from which mac). I'll mess around with it when I get a chance, thanks again.
    • If you pull in the results using a custom inventory field you will be able to create a report showing the result for each machine. The following custom inventory rule should work:
      ShellCommandTextReturn(system_profiler SPApplicationsDataType | grep -B 6 -A 2 "64-Bit (Intel): No")
      • I think this is just what I need - Thanks for your help!
  • For others implementing this, the raw output from the command is a bit much. I piped the output through another grep to just get the path of the apps:
    ShellCommandTextReturn(system_profiler SPApplicationsDataType | grep -B 6 -A 2 "64-Bit (Intel): No" | grep "Location:")
    • This is awesome, and makes the results a lot less painful to review! Thanks :)
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ