Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

IEAK 9 Browser Deployment

Posted on 2012-04-12
1
Medium Priority
?
757 Views
Last Modified: 2012-06-27
i installed it on my server and created a file which was saved in C:builds/202202

now how do i go from there? i would like to distribute the configured IE thru GPO.

thx for help
0
Comment
Question by:quickslvr
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 83

Accepted Solution

by:
David Johnson, CD, MVP earned 2000 total points
ID: 37842506
You can follow the instructions located here for general instructions on how to Publish a Program for distribution.
You will need a wmi filter because there are 2 versions x86 and x64 versions that you have to distribute.  Also you should check that it is not already installed also via wmi or powershell or vbs scripting

Distributing the package using a network source

If you chose the File option on the Media Selection page of the Internet Explorer Customization Wizard 9, IEAK 9 creates a \Flat subdirectory within the \Builds folder. This sub-directory contains the setup file, IE9setup.exe, which can easily be copied to a shared network resource. You can then give your users a link to the Setup file.

Signing your custom packages

Internet Explorer has security features that help protect users from downloading harmful programs. Depending on the security level and the version, the user may be prevented from, or warned against, downloading programs that are not digitally signed.

The custom .cab files created by the Internet Explorer Customization Wizard 9 should be signed, unless you preconfigure your users' local intranet zone with a security setting of Low. Any custom components you distribute with your browser package for these platforms should also be signed.
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In threads here at EE, each comment has a unique Identifier (ID). It is easy to get the full path for an ID via the right-click context menu. However, we often want to post a short link within a thread rather than the full link. This article shows a…
Ever visit a website where you spotted a really cool looking Font, yet couldn't figure out which font family it belonged to, or how to get a copy of it for your own use? This article explains the process of doing exactly that, as well as showing how…
Viewers will learn how to maximize accessibility options in an Excel workbook for users with accessibility issues.
Viewers will learn the different options available in the Backstage view in Excel 2013.

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question