How to Manage Windows Installer Local Policies

ID: Q227181


The information in this article applies to:
  • Microsoft Windows 2000


SUMMARY

The installation behavior of the Microsoft Windows Installer can be configured by an administrator using the Group Policy Editor (GPE) and the Active Directory.

There are also several user and machine policies that can be configured on a local computer. This article describes user polices and then the machine policies.


MORE INFORMATION

WARNING: Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk.

For information about how to edit the registry, view the "Changing Keys and Values" Help topic in Registry Editor (Regedit.exe) or the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe. Note that you should back up the registry before you edit it. If you are running Windows NT, you should also update your Emergency Repair Disk (ERD).

User polices can be configured in the local registry and are located under the following registry key:

HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer
The following list contains values for these entries:

Value Name: AlwaysInstallElevated
Value Data Types: REG_DWORD
Description: If this value is set to "1" and the corresponding machine value is also set, the Installer always installs with elevated privileges. Otherwise, the Installer uses elevated privileges to install managed applications and uses the current user's privilege level for non-managed applications.

Value Name: SearchOrder
Value Data Types: REG_SZ
Description: Order in which the Installer searches the three different types of sources:

"n" - network
"m" - media (CD-ROM or DVD)
"u" - URL (Uniform Resource Locator)

For example, a value of "nmu" instructs the Installer to search network sources first, media sources second, and URL sources last. Leaving out a letter removes the corresponding volume type from the search. Default order in absence of this value is network first, then media followed by URL.

Value Name: DisableBrowse
Value Data Types: REG_DWORD
Description: If this value exists and is set to "1", users are forbidden from browsing to locate installer sources. Also, the "Use feature from:" combo box for direct input is locked the "Browse..." button is disabled. See the source resiliency topic in the Windows Installer SDK for more details on source browsing.

Value Name: TransformsAtSource
Value Data Types: REG_DWORD
Description: If this value exists and is set to "1"; the Installer searches for transform files in the root of any network sources in the source list for the product. By default, transforms are stored in the Application Data folder of a user's profile.

Value Name: DisableRollback
Value Data Types: REG_DWORD
Description: If this value is set to "1", the Installer will not store rollback files during installation, disabling installation rollback. By default, rollback is enabled. Administrators are advised to not use this policy unless it is absolutely essential.

Machine polices can be configured under the following registry key:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Installer
Value Name: AlwaysInstallElevated
Value Data Types: REG_DWORD
Description: If this value is set to "1" and the corresponding user value is also set, the Installer always installs with elevated privileges. Otherwise, the Installer uses elevated privileges to install managed applications and uses the current user's privilege level for non-managed applications

Value Name: DisableMSI
Value Data Types: REG_DWORD
Description: If this value exists and is set to "2", the Installer is always disabled for all applications. If this value is set to "1", the Installer is disabled for non-managed applications but is still enabled for managed applications. If this value is set to "0', any other number, or is absent, the Installer is always enabled.

Value Name: Logging
Value Data Types: REG_SZ
Description: This policy is used only if logging has not been enabled by the "/L" command line option or MsiEnableLog. If policy is set in this case, a log file is created in the temp directory with the random name: MSI*.LOG. Specify the logging mode by setting the policy value to a string of characters. Use the same characters to specify logging mode policy as used by the '/L' command line option. See Command Line Options. Note that you cannot use "+" and "*" for the policy.

Value Name: DisablePatch
Value Data Types: REG_DWORD
Description: If this value is set to "1" the Installer does not apply patches. This policy can be used to provide security in environments where patching must be restricted.

More information about local polices and the Windows Installer can be found in the Windows 2000 Software Development Kit (SDK).

Additional query words: 2000

Keywords : kbnetwork kbtool kbWinOS2000 kbMSI kbDSupport
Version : WINDOWS:
Platform : WINDOWS
Issue type : kbinfo


Last Reviewed: October 21, 1999
© 2000 Microsoft Corporation. All rights reserved. Terms of Use.