I have a really unique situation right now; I am preparing to deploy out Internet Explorer 8 and have some 50 local policies, which are registries that need to be set. Upon examination, the majority of the policies are in the SID-user registry, which is very hard to script.
Anyhow, I compiled an exe that writes all my registries, so I can have a custom action in a binary table,as I am creating my own wrapper for this install,even though I use IEAK to create the distribution, except I created the policies in HKLM and HKCU, not HKU/SID.
So, my problem and question is: why won't the registry keys get created, even some of the HKCU keys are denied access to be written, while some HKLM keys will write, when you execute the custom action (exe/script that creates the policy registries) in a limitd user account. This seems very odd to me.
My 2d question is: what locations in the all the registry run/run once, where executables can be launched with admin rights regardless of being executed in a limited user account...The other part of this question is, do custom actions that launch an exe, also run with elevated rights? ie, the exe itself is executed with admin rights? From what I experience, this is not the case, unless I am configuring something wrong.
I would like to know more because I might resort to using a capture and active setup entry...
Any comments are appreciated.