Prohibit non-administrators from applying vendor signed updates

This policy setting controls the ability of non-administrators to install updates that have been digitally signed by the application vendor. Non-administrator updates provide a mechanism for the author of an application to create digitally signed updates that can be applied by non-privileged users. If you enable this policy setting only administrators or users with administrative privileges can apply updates to Windows Installer based applications. If you disable or do not configure this policy setting users without administrative privileges can install non-administrator updates.

Allow user control over installs

This policy setting permits users to change installation options that typically are available only to system administrators. If you enable this policy setting some of the security features of Windows Installer are bypassed. It permits installations to complete that otherwise would be halted due to a security violation. If you disable or do not configure this policy setting the security features of Windows Installer prevent users from changing installation options typically reserved for system administrators such as specifying the directory to which files are installed. If Windows Installer detects that an installation package has permitted the user to change a protected option it stops the installation and displays a message. These security features operate only when the installation program is running in a privileged security context in which it has access to directories denied to the user. This policy setting is designed for less restrictive environments. It can be used to circumvent errors in an installation program that prevents software from being installed.

Prohibit rollback

This policy setting prohibits Windows Installer from generating and saving the files it needs to reverse an interrupted or unsuccessful installation. If you enable this policy setting Windows Installer is prevented from recording the original state of the system and sequence of changes it makes during installation. It also prevents Windows Installer from retaining files it intends to delete later. As a result Windows Installer cannot restore the computer to its original state if the installation does not complete. This policy setting is designed to reduce the amount of temporary disk space required to install programs. Also it prevents malicious users from interrupting an installation to gather data about the internal state of the computer or to search secure system files. However because an incomplete installation can render the system or a program inoperable do not use this policy setting unless it is essential. This policy setting appears in the Computer Configuration and User Configuration folders. If the policy setting is enabled in either folder it is considered be enabled even if it is explicitly disabled in the other folder.

Prevent users from using Windows Installer to install updates and upgrades

This policy setting prevents users from using Windows Installer to install patches. If you enable this policy setting users are prevented from using Windows Installer to install patches. Patches are updates or upgrades that replace only those program files that have changed. Because patches can be easy vehicles for malicious programs some installations prohibit their use. Note: This policy setting applies only to installations that run in the user’s security context. If you disable or do not configure this policy setting by default users who are not system administrators cannot apply patches to installations that run with elevated system privileges such as those offered on the desktop or in Add or Remove Programs. Also see the “Enable user to patch elevated products” policy setting.

Turn off Windows Installer

This policy setting restricts the use of Windows Installer. If you enable this policy setting you can prevent users from installing software on their systems or permit users to install only those programs offered by a system administrator. You can use the options in the Disable Windows Installer box to establish an installation setting. — The “Never” option indicates Windows Installer is fully enabled. Users can install and upgrade software. This is the default behavior for Windows Installer on Windows 2000 Professional Windows XP Professional and Windows Vista when the policy is not configured. — The “For non-managed applications only” option permits users to install only those programs that a system administrator assigns (offers on the desktop) or publishes (adds them to Add or Remove Programs). This is the default behavior of Windows Installer on Windows Server 2003 family when the policy is not configured. — The “Always” option indicates that Windows Installer is disabled. This policy setting affects Windows Installer only. It does not prevent users from using other methods to install and upgrade programs.

Turn off logging via package settings

This policy setting controls Windows Installer’s processing of the MsiLogging property. The MsiLogging property in an installation package can be used to enable automatic logging of all install operations for the package. If you enable this policy setting you can use the options in the Disable logging via package settings box to control automatic logging via package settings behavior. — The “Logging via package settings on” option instructs Windows Installer to automatically generate log files for packages that include the MsiLogging property. — The “Logging via package settings off” option turns off the automatic logging behavior when specified via the MsiLogging policy. Log files can still be generated using the logging command line switch or the Logging policy. If you disable or do not configure this policy setting Windows Installer will automatically generate log files for those packages that include the MsiLogging property.

Prohibit flyweight patching

This policy setting controls the ability to turn off all patch optimizations. If you enable this policy setting all Patch Optimization options are turned off during the installation. If you disable or do not configure this policy setting it enables faster application of patches by removing execution of unnecessary actions. The flyweight patching mode is primarily designed for patches that just update a few files or registry values. The Installer will analyze the patch for specific changes to determine if optimization is possible. If so the patch will be applied using a minimal set of processing.

Prohibit use of Restart Manager

This policy setting controls Windows Installer’s interaction with the Restart Manager. The Restart Manager API can eliminate or reduce the number of system restarts that are required to complete an installation or update. If you enable this policy setting you can use the options in the Prohibit Use of Restart Manager box to control file in use detection behavior. — The “Restart Manager On” option instructs Windows Installer to use Restart Manager to detect files in use and mitigate a system restart when possible. — The “Restart Manager Off” option turns off Restart Manager for file in use detection and the legacy file in use behavior is used. — The “Restart Manager Off for Legacy App Setup” option applies to packages that were created for Windows Installer versions lesser than 4. 0. This option lets those packages display the legacy files in use UI while still using Restart Manager for detection. If you disable or do not configure this policy setting Windows Installer will use Restart Manager to detect files in use and mitigate a system restart when possible.

Always install with elevated privileges

This policy setting directs Windows Installer to use elevated permissions when it installs any program on the system. If you enable this policy setting privileges are extended to all programs. These privileges are usually reserved for programs that have been assigned to the user (offered on the desktop) assigned to the computer (installed automatically) or made available in Add or Remove Programs in Control Panel. This profile setting lets users install programs that require access to directories that the user might not have permission to view or change including directories on highly restricted computers. If you disable or do not configure this policy setting the system applies the current user’s permissions when it installs programs that a system administrator does not distribute or offer. Note: This policy setting appears both in the Computer Configuration and User Configuration folders. To make this policy setting effective you must enable it in both folders. Caution: Skilled users can take advantage of the permissions this policy setting grants to change their privileges and gain permanent access to restricted files and folders. Note that the User Configuration version of this policy setting is not guaranteed to be secure.

Allow users to patch elevated products

This policy setting allows users to patch elevated products. If you enable this policy setting all users are permitted to install patches even when the installation program is running with elevated system privileges. Patches are updates or upgrades that replace only those program files that have changed. Because patches can easily be vehicles for malicious programs some installations prohibit their use. If you disable or do not configure this policy setting by default only system administrators can apply patches during installations with elevated privileges such as installations offered on the desktop or displayed in Add or Remove Programs. This policy setting does not affect installations that run in the user’s security context. By default users can install patches to programs that run in their own security context. Also see the “Prohibit patching” policy setting.