Running a script every logon

Run registry key causes programs to run each time that a user logs on. The data value for a key is a command line. By default, these keys are ignored when the computer is started in Safe Mode.   The key to use is the following:   Just create a new entry, for example:   … Read more

Re-caching then Repairing MSI

This documentation details the way to re-cache a MSI file then launch its reparation. It can help for example if we have to re-run an Active Setup whether the MSI has been deleted from the cache…   1. Copy MSI First thing to do is to copy the MSI in a cache location. That location … Read more

Active Setup

1. What is Active Setup Active Setup is a component of Windows.   It’s a registry key present in HKLM:   And HKCU:   In HKLM, each sub-key contains the following entries: [KeyName] is the name of the Sub-Key (Usually the UpgradeCode of the MSI) ComponentID is usually the name of the Application (“ProductName” MSI … Read more

Assemblies Silent Install

To install assembly files, gacutil must be used. So it must first be copied on the workstation if it’s not present.   The following command can be used to perform a silent installation:

Allowing Remote Management

Some tools (For example Client Center for Configuration Manager, very useful to manage SCCM client on workstation – cache size, re-installation of the agent, re-run advertisements…) need the remote management to be activated on the client machine to work properly.   To enable it: Open a command prompt in administrative context and type the following … Read more

Check if Citrix

To verify if a server is a Citrix server, the best solution is to check if the “Broker Agent” service exists on the machine. . Registry If the service “Broker Agent” exists on the machine, the following registry key is set:

Reliability History

Reliability History is a very helpful tool for troubleshooting. . . This tool help you to see the overall status messages that are in the Event Viewer in a friendlier manner. You will be able to see the critical errors per day and have a better understanding of what is happening on the computer. .

Files and Folders Security with VBS

The following script allows to modify the security of files or folders (including sub-folders and content). In the following example, the following actions are executed: Creation of an INF file in C:\Temp (Security.inf) This INF allows to grant read and write access rights to the folder C:\Program Files\Soft\Folder and the file C:\Windows\system32\File Execution of the INF … Read more

ODBC Connections

This article details the way to manage ODBC connections manually using the registry. These registry entries can be added in an installation package (in a MSI, MST, or imported using a script). No reboot or log-off / logon is required. . Create a New Data Source to SQL Server . Registry Create a .reg file … Read more

MSU Silent Install

MSU are the Microsoft Update files. To install a MSU file, wusa.exe can be used. To perform a logged silent installation, the following command can be used: wusa.exe “C:\Workdir\MyFile.msu” /quiet /norestart /log:C:\Logs\MyFile-Install.evtx