Go to www.sekchek.com

List Installed Products Tool: Glossary

Prepared: 11 February 2013
Document Purpose and Introduction
This document defines the fields and terms used in the report from SekChek’s List Installed Products tool. The tool queries your system for software products installed by Windows Installer (MSI).
Products installed on your system by MSI
ProductThe commonly used product name. E.g. Microsoft Office Enterprise 2007.
PublisherThe name of the product supplier. Corresponds to the Vendor property in the product object in the Desktop Management Task Force (DMTF) Solution Exchange Standard.
Product VersionThe product version information. Corresponds to the Version property in the product object in the DMTF Solution Exchange Standard.
Product IdThe unique identification number for the product. Not always present.
Installation DateThe date that this product was installed on the system.
Installation LocationThe location of the installed product. E.g. C:\Program Files\Microsoft Office\
Package CacheThe location of the locally cached package for this product. E.g. C:\Windows\Installer\b4bc8.msi
Other free security and audit tools from SekChek...    [Top]
»   Tools Library | PC Auditor | Windows Firewall Auditor | List Missing Windows Updates | List Installed Products | Search Event Log | Query Active Directory | Query Access Permissions | Sid Resolver | Find Orphaned Sids | Ping

Copyright© 2008-2013, SekChek IPS. All rights reserved.
SekChek® is a registered trademark of SekChek IPS. All other trademarks are the property of their respective owners.
www.sekchek.com

About SekChek IPS
SekChek® IPS is a leading provider of computer security review, auditing and benchmarking tools and has served many of the world’s largest companies and public institutions in 130 countries since 1996. SekChek’s clients include security and audit professionals in IT departments, audit firms, internal audit functions, regulatory compliance and corporate governance departments. SekChek’s benchmarking features compare security policies and controls against a unique statistics database containing more than 30 million anonymous and real-life security measurements compiled from 70,000 computer systems across all major industry sectors.