Tag: Computer Configuration
Specify the types of events Windows Installer records in its transaction log
Specifies the types of events that Windows Installer records in its transaction log for each installation. The log Msi. log appears in the Temp directory of the system volume. When you enable this policy setting you can specify the types of events you want Windows Installer to record. To indicate that an event type is recorded type the letter representing the event type. You can type the letters in any order and list as many or as few event types as you want. To disable logging delete all of the letters from the box. If you disable or do not configure this policy setting Windows Installer logs the default event types represented by the letters “iweap. “
Control maximum size of baseline file cache
This policy controls the percentage of disk space available to the Windows Installer baseline file cache. The Windows Installer uses the baseline file cache to save baseline files modified by binary delta difference updates. The cache is used to retrieve the baseline file for future updates. The cache eliminates user prompts for source media when new updates are applied. If you enable this policy setting you can modify the maximum size of the Windows Installer baseline file cache. If you set the baseline cache size to 0 the Windows Installer will stop populating the baseline cache for new updates. The existing cached files will remain on disk and will be deleted when the product is removed. If you set the baseline cache to 100 the Windows Installer will use available free space for the baseline file cache. If you disable or do not configure this policy setting the Windows Installer will uses a default value of 10 percent for the baseline file cache maximum size.
Enforce upgrade component rules
This policy setting causes the Windows Installer to enforce strict rules for component upgrades. If you enable this policy setting strict upgrade rules will be enforced by the Windows Installer which may cause some upgrades to fail. Upgrades can fail if they attempt to do one of the following:(1) Remove a component from a feature. This can also occur if you change the GUID of a component. The component identified by the original GUID appears to be removed and the component as identified by the new GUID appears as a new component. (2) Add a new feature to the top or middle of an existing feature tree. The new feature must be added as a new leaf feature to an existing feature tree. If you disable or do not configure this policy setting the Windows Installer will use less restrictive rules for component upgrades.
Prohibit User Installs
This policy setting allows you to configure user installs. To configure this policy setting set it to enabled and use the drop-down list to select the behavior you want. If you do not configure this policy setting or if the policy setting is enabled and “Allow User Installs” is selected the installer allows and makes use of products that are installed per user and products that are installed per computer. If the installer finds a per-user install of an application this hides a per-computer installation of that same product. If you enable this policy setting and “Hide User Installs” is selected the installer ignores per-user applications. This causes a per-computer installed application to be visible to users even if those users have a per-user install of the product registered in their user profile.
Support Email Address
Specifies the e-mail address to be used when sending the log files that are generated by NCA to the network administrator. When the user sends the log files to the Administrator NCA uses the default e-mail client to open a new message with the support email address in the To: field of the message then attaches the generated log files as a . html file. The user can review the message and add additional information before sending the message.
Allow the Network Access Protection client to support the 802.1x Enforcement Client component
This policy setting allows the Network Access Protection (NAP) client to support the Windows XP version of the 802. 1x Enforcement Client component. If you enable this policy setting NAP allows the Windows XP version of the 802. 1x Wireless Enforcement Client to participate. If you disable or do not configure this policy setting the Windows XP version of the 802. 1x Wireless Enforcement Client cannot participate in NAP.
Prevent embedded UI
This policy setting controls the ability to prevent embedded UI. If you enable this policy setting no packages on the system can run embedded UI. If you disable or do not configure this policy setting embedded UI is allowed to run.
Remove browse dialog box for new source
This policy setting prevents users from searching for installation files when they add features or components to an installed program. If you enable this policy setting the Browse button beside the “Use feature from” list in the Windows Installer dialog box is disabled. As a result users must select an installation file source from the “Use features from” list that the system administrator configures. This policy setting applies even when the installation is running in the user’s security context. If you disable or do not configure this policy setting the Browse button is enabled when an installation is running in the user’s security context. But only system administrators can browse when an installation is running with elevated system privileges such as installations offered on the desktop or in Add or Remove Programs. This policy setting affects Windows Installer only. It does not prevent users from selecting other browsers such as File Explorer or Network Locations to search for installation files. Also see the “Enable user to browse for source while elevated” policy setting.
Turn off creation of System Restore checkpoints
This policy setting prevents Windows Installer from creating a System Restore checkpoint each time an application is installed. System Restore enables users in the event of a problem to restore their computers to a previous state without losing personal data files. If you enable this policy setting the Windows Installer does not generate System Restore checkpoints when installing applications. If you disable or do not configure this policy setting by default the Windows Installer automatically creates a System Restore checkpoint each time an application is installed so that users can restore their computer to the state it was in before installing the application.
Prohibit removal of updates
This policy setting controls the ability for users or administrators to remove Windows Installer based updates. This policy setting should be used if you need to maintain a tight control over updates. One example is a lockdown environment where you want to ensure that updates once installed cannot be removed by users or administrators. If you enable this policy setting updates cannot be removed from the computer by a user or an administrator. The Windows Installer can still remove an update that is no longer applicable to the product. If you disable or do not configure this policy setting a user can remove an update from the computer only if the user has been granted privileges to remove the update. This can depend on whether the user is an administrator whether “Disable Windows Installer” and “Always install with elevated privileges” policy settings are set and whether the update was installed in a per-user managed per-user unmanaged or per-machine context. “