Windows Installer Policy – User Windows installer user policy settings can be found in the registry under HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer Or managed in GPO under User Configuration>Policies>Administrative Templates>Windows Components>Windows Installer User Group Policy Management This table contains a description of what each value / setting controls from the image above. Value name Value data types … Continued
Windows Installer Features and Components Features and components are the 2 main organisational sets used in a windows installer to categorize all software data installation data such as files, registry, components, shortcuts, INI, xml and file type association information. Feature component View Features MSI authors use features to divide application features into separate containers … Continued
Windows Installer MSI theory Windows Installer is a software deployment technology that goes well beyond installation of a single application. Windows installer native installed software supports full application sociability with other natively installed applications and operating system dependencies, unlike application virtualisation technologies. Base Windows Installer MSI .MSI file contains an internal database which holds … Continued
Native EXE installers Native EXE software installers (or setup.exe) are still provided by some vendors as operating system agnostic delivery mechanism for software. An example of this is the Oracle Universal Installer (OUI) for example Oracle versions 9,10,1, which are designed to be executed on both Windows and Unix operating systems. Vendor native EXE installers … Continued
3 Common Vendor Installer Types There are three common vendor installer types that every application packager will come across. Knowing which type you have been given to work with is important in determining the best approach in which to apply the customisation requirements. Below we take look at the 3 types that are typically … Continued
Every business admin responsible for a company’s digital data should have a backup. Backup is king and when the day comes that ….. hits the fan, you will be the HERO! One of the timeless rules that can address any failure scenario is called the 3-2-1 backup rule. The 3-2-1 rule became a popular concept thanks … Continued
Businesses now have an ever-increasing dependency on electronic data as part of their daily operation, data created by employees across the sites daily, hourly, needs to be protected from external dangers such as hackers, server failure or natural disasters. Because of this, many businesses need assistance in creating a business continuity plan to make their … Continued
Feb 2017 One of the hassles of managing a corporate software catalog is the array of security updates from vendor applications or the dependency framework software they rely on. We’d like to help out by keeping you up to date about some of the main ones that may be of interest. Check them out below. … Continued
Preparing for your App-V client distribution? Here is a quick run down of some things to consider for new installation and upgrades as well as installation steps. Client Supported Configurations Client system requirements The following table lists the operating systems that are supported for the App-V 5.1 Client installation Operating system Service pack … Continued
Preparing for your App-V Sequencing environment? Here is a quick rundown of some of the things to consider as well as installation steps. Sequencer Supported Configurations Sequencer system requirements The following table lists the operating systems that are supported for the App-V 5.1 Sequencer installation Operating system Service pack System architecture Microsoft Windows … Continued
