/build/static/layout/Breadcrumb_cap_w.png

Software Deployment Question


SCCMs Programs deployment to HKCU

03/30/2017 628 views
When you goto SCCM Software Library --- > Packages ---> Select a package ---> Click Programs Tab----> Select Properties ---> Under the Environment ( Selecting to deploy only when user is logged on have two Run Mode, one is Run with User's Right, two is Run with Administrator rights.)

Now if you are making changes to Regedit with (HKCU) what setting should you select? Because user don't have rights to Regedit or make changes under Regedit.
Should i select Run the Program "Only when user is logged on" then select Run with Admin? To by pass the right?
0 Comments   [ + ] Show comments

Comments


All Answers

0
If you run with admin rights, you're going to have to create a script that has to divine the user's SID, loops through HKEY_USERS to find that SID then write the registry value. Much simpler would be to unblock RegEdit (what exactly do you believe that achieves, when the registry is controlled by permissioning anyway?) and use a much simpler script, run via Active Setup.

Or, if the package is an MSI, you can do it the "proper" sway by creating a user feature and adjusting the MSI's feature tree so that the feature containing an advertised entry-point (e.g. a shortcut) triggers self-healing.
Answered 03/31/2017 by: VBScab
Red Belt

0
Hi,
have you considered the PSAppDeploy toolkit...
I use it as the standard interface between package and deployment tool, and if you really need to do things like HKCU it has built in functionality to do this (even without using Active Setup), basically what Ian is suggesting.

Cheers
Phil
Answered 04/01/2017 by: Pressanykey
Red Belt

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ