?
Solved

Software Installation using Group Policy

Posted on 2007-03-23
3
Medium Priority
?
276 Views
Last Modified: 2010-04-18
I am rolling out a third party application to the network using Group Policy, with the MSI provided by the company and everything is fine. But, I need to give modify access to a folder it creates on the local pc as part of the installation. (eg. c:\program files\company\progam folder).

And I need to copy 3 small files from a file server to all local PCs for making this software work.

How can I do that using group policy?
0
Comment
Question by:Cromwellhospital
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 16

Accepted Solution

by:
AdamRobinson earned 2000 total points
ID: 18779192
You could push out a startup script/batch file that performs the copy for you.
0
 

Author Comment

by:Cromwellhospital
ID: 18779313
Thanks, But, what about the permission on the folder?
0
 

Author Comment

by:Cromwellhospital
ID: 18779706
I have edited the MSI and things are fine. Thanks Adam.
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Active Directory can easily get cluttered with unused service, user and computer accounts. In this article, I will show you the way I like to implement ADCleanup..
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question