You can if you wish, limit customers from presenting or running undertakings in Windows 10/8/7 similarly as Windows Vista/XP/2000 and Windows Server family. You can do all things considered by using certain Group Policy settings to control the lead of the Windows Installer, shield certain tasks from running or farthest point by methods for the Registry Editor.
The Windows Installer, msiexec.exe, as of late known as Microsoft Installer, is an engine for the foundation, upkeep, and ejection of programming on present day Microsoft Windows systems.
Snap here to visit : Norton setup
In this post, we will see how to square foundation of programming in Windows 10/8/7.
Challenged person or cutoff the use of Windows Installer by methods for Group Policy
Type gpedit.msc in start request and hit Enter to open the Group Policy Editor. Investigate to Computer Configurations > Administrative Templates > Windows Components > Windows Installer. In RHS sheet twofold tap on Disable Windows Installer. Orchestrate the decision as required.
This setting can shield customers from presenting programming on their structures or give customers to present only those tasks offered by a system director. If you engage this setting, you can use the options in the Disable Windows Installer box to set up a foundation setting.
The “Never” decision indicates Windows Installer is totally enabled. Customers can present and redesign programming. This is the default lead for Windows Installer on Windows 2000 Professional, Windows XP Professional, and Windows Vista when the methodology isn’t planned.
The “For non-directed applications simply” decision gifts customers to present only those undertakings that a structure chief delegates (offers on the work region) or conveys (adds them to Add or Remove Programs). This is the default lead of Windows Installer on Windows Server 2003 family when the course of action isn’t structured.
The “Constantly” elective demonstrates that Windows Installer is weakened.
This setting impacts Windows Installer figuratively speaking. It doesn’t shield customers from using various methods to present and upgrade programs.
Ceaselessly present with raised advantages :
In the Group Policy Editor, investigate to User Configuration > Administrative Templates > Windows Components. Look down and click Windows Installer and orchestrate it to Always present with raised advantages.
This setting facilitates Windows Installer to use system assents when it presents any program on the structure.
This setting stretches out raised advantages to all activities. These advantages are commonly held for activities that have been alloted to the customer (offered on the work zone), doled out to the PC (presented normally), or made available in Add or Remove Programs in Control Panel. This setting allows customers to acquaint programs that expect access with files that the customer most likely won’t have approval to view or change, including vaults on exceptionally bound PCs.
In case you cripple this setting or don’t plan it, the system applies the present customer’s assents when it presents programs that a structure official does not scatter or offer.
This setting appears to be both in the Computer Configuration and User Configuration envelopes. To make this setting amazing, you ought to enable the setting in the two envelopes.
Skilled customers can abuse the assents this setting stipends to change their advantages and expansion never-ending access to restricted records and coordinators. Note that the User Configuration type of this setting isn’t bound to be secure.
Make an effort not to run showed Windows applications
In the Group Policy Editor, investigate to User Configuration > Administrative Templates > System
Here in RHS sheet, twofold tap Don’t run demonstrated Windows applications and in the new window which opens select Enabled. By and by Under Options snap Show. In the new windows which opens enter the method for the application you wish to won’t; for this circumstance : msiexec.exe.
This will decline Windows Installer which is arranged in C:\Windows\System32\ coordinator from running.
This setting shields Windows from running the undertakings you show in this setting. If you engage this setting, customers can’t run extends that you add to the summary of denied applications.
This setting just shields customers from running undertakings that are started by the Windows Explorer process. It doesn’t shield customers from running undertakings, for instance, Task Manager, that are started by the system technique or by various methods. In like manner, if you concede customers to get to the request brief, cmd.exe, this setting does not shield them from starting ventures toward the path window that they are not permitted to start by using Windows Explorer. Note: To make a summary of precluded applications, click Show. In the Show Contents talk box, in the Value segment, type the application executable name (e.g., msiexec.exe).
Limit Programs from being presented by methods for Registry Editor
Open Registry Editor and investigate to the going with key:
Make String a motivating force with any name, like 1 and set its motivator to the program’s EXE record.
For example, If you have to restrict msiexec, by then make a String regard 1 and set its motivating force to msiexec.exe. If you have to limit more tasks, by then simply make also String characteristics with names 2, 3, and so on and set their characteristics to the program’s exe.
You may need to restart your PC.