Solved

Bypass Open File - Security Warning

Posted on 2011-02-18
6
1,493 Views
Last Modified: 2012-05-11
I'm using Windows Deployment Services to build a Windows 2008 Server and I have configured an unattended build to run an additional installation VBScript via FirstLogonCommands Synchronous Commands to install things like Office, Acrobat, etc.  The VBScript calls many objShell.Run commands to install applications from a network drive.

Naturally, they are getting the Open File - Security Warning, because all my sources are on a network drive.

I know of two ways to get around this dialog - the first is to change your Internet Zones so that Intranet includes all UNC paths, and the second is to use GPO to make Attachment Manager have ".exe" as a low risk attachment.

I can do neither of these two because the machine does not join a domain and therefore cannot use GPO's, and it runs the scripts automatically even before a user can log on.

Does anybody have an idea how else I can circumvent this security warning - preferably in the way of a command line which I could run prior to installing the network shared apps.

I do not want to:

Use SCCM
Join to a Domain
Copy the sources over to the local volume and install from there

Thanks in advance.

Open File Security Warning
0
Comment
Question by:Lester_Clayton
  • 3
  • 2
6 Comments
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
ID: 34926515
instead of a gpo try changing the local security policy.
0
 
LVL 9

Author Comment

by:Lester_Clayton
ID: 34926615
I'm trying to do this in an automated way - there should be no interaction during the automated unattended installation.
0
 
LVL 9

Accepted Solution

by:
Lester_Clayton earned 0 total points
ID: 34926972
Easy fix :)

Adding this is doing it the same way by adding executables to Attachment Manager

WshShell.RegWrite "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations\LowRiskFileTypes", ".exe" ,"REG_EXPAND_SZ"

Open in new window

0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 9

Author Closing Comment

by:Lester_Clayton
ID: 34959130
Managed to find a solution myself
0
 

Expert Comment

by:Gogburn1
ID: 36132307
Lester,

Mind sharing the solution you found?
0
 

Expert Comment

by:Gogburn1
ID: 36132321
Whoops. Didn't realize the accepted solution was your own! :)
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

When you start your Windows 10 PC and got an "Operating system not found" error or just saw  "Auto repair for startup". After a while, you have entered a loop for Auto repair which does not fix anything and you will be in a  panic as all your work w…
A procedure for exporting installed hotfix details of remote computers using powershell
This Micro Tutorial will teach you how to change your appearance and customize your Windows 7 interface to your unique preference. This will be demonstrated using Windows 7 operating system.
This Micro Tutorial will give you basic overview of the control panel section on Windows 7. It will depth in Network and Internet, Hardware and Sound, etc. This will be demonstrated using Windows 7 operating system.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now