January 7, 2019 at 3:59 am #14084
Can somebody suggest resource where I can find information how to create different WMI queries for varios needs. For example I have Google Chrome Enterprise installed and I need to create query for GPO.
This one works in CMD, but very slowly and not for instances which were installed with .exe.
wmic.exe product where “name like ‘Google Chrome%'”
I appreciate any help how to create more efficient query for google chrome.
Thank you in advance,
Peeter.January 14, 2019 at 11:01 am #14087
Sorry for the delay. The WMI class win32_product, as you’ve discovered, is really problematic. We even have a blog posting about this. You might have a look at the blog posting and see some of the comments underneath it, as they have some suggestions in there. Bottom line is that you probably need to find some other evidence of Chrome (e.g. in the file system or registry) that you can query on besides win32_product. Here’s the blog link: https://sdmsoftware.com/group-policy-blog/wmi/why-win32_product-is-bad-news/
DarrenJanuary 15, 2019 at 3:44 am #14088
Thank you for your answer, I’ve checked all provided information and the following query didn’t throw any errors when I saved WMI Query for Chrome in Group Policy Management console. Now it’s time to verify that it’s working on different OS versions.
WMI Query for Google Chrome:
SELECT * FROM CIM_DataFile WHERE Drive=’C:’ AND Path=’\\%ProgramFiles(x86)%\\Google\\Chrome\\Application\\’ AND FileName=’Chrome’ AND Extension=’EXE’October 22, 2019 at 12:16 pm #14208
The syntax that “Peeter T” wrote is incorrect.
The correct WMI Query for Google Chrome is:
SELECT * FROM CIM_DataFile WHERE Drive=”C:” AND Path=”\\Program Files (x86)\\Google\\Chrome\\Application\\” AND FileName=”Chrome” AND Extension=”EXE”
You must be logged in to reply to this topic.
- Understanding the Registry Policy Archive File
- Hijacking Administrative Templates
- What Does Group Policy Do When It Can’t Contact a DC?
- Sending GPOs Down the Wrong Track–Redirecting the GPT
- Group Policy Security– Tinkering with External Paths