llkamama.blogg.se

Toad authorization key
Toad authorization key










toad authorization key

It's not perfect-several times while we were trying to use it, I had to modify it because of finding more and more places where the data files actually "lived" on a client, so you may encounter that as well-you "think" you have all 80 different locations

toad authorization key

, and I'll forward you the scripts and mof edit. I have a routine-it's dated-it's from late 2011 which is a really 4 scripts: 1 to run the other 3 (and that's what you advertise) and 3 different ones that get the payload:, 1 to find all the various locationsįor the data, the 2nd is from Quest themselves, which pulls the information out of those files, and the 3rd is to take that information (now that we have it) and populated WMI.Īnd then, finally, we can pull that out via hardware inventory (now that it's in WMI). Quest serial numbers are definitely a pia.












Toad authorization key