Solved

The installation source for this product is not available

Posted on 2004-09-02
2
1,726 Views
Last Modified: 2008-01-09
I get this 102 error when using the computer configuration > software settings > software installation > through group policy. The computer is within the OU that the policy applies.  This .msi is in a folder which is shared so that everyone can access it. Any ideas?  I also get the following errors after event id 102:  

Event ID: 102

The install of application Windows 2000 Support Tools from policy Installers failed.  The error was : The installation source for this product is not available.  Verify that the source exists and that you can access it.

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.


Event ID: 108

Failed to apply changes to software installation settings.  Software changes could not be applied.  A previous log entry with details should exist.  The error was : The installation source for this product is not available.  Verify that the source exists and that you can access it.

Event ID:  1085

The Group Policy client-side extension Software Installation failed to execute. Please look for any errors reported earlier by that extension.
0
Comment
Question by:rgilbert
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Assisted Solution

by:BigC666
BigC666 earned 200 total points
ID: 11968449
0
 
LVL 15

Accepted Solution

by:
harleyjd earned 300 total points
ID: 11983118
When you set up the application, did you use a unc path to the file? The workstations must be able to see the files on the server, it's not the server pushing them out.

Did you check the security on the file, the folder and the share? If you've got the permissions wrong, then the computers are not going to be able to run the setup.

I ususally use \\server\apps$ to hide the share, then give authenicated users read permission to everything, and admin full control.

0

Featured Post

What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question