Changes

Jump to: navigation, search

MSSecurityEssentials

3,283 bytes added, 22:09, 23 October 2013
Alternate installer with registry changes
Note that an upgrade line is required because although the program updates itself automatically using Windows Automatic Updates (though only for minor updates, not upgrades such as from version 1 to 2), if you bump the revision number then WPKG will want to run an 'upgrade'.
 
== Alternate package with registry edits and 64-bit aware ==
This is an alternate installation package with the following changes:
* Registry changes are implemented (in my case, run daily, even if computer isn't idle, at 4PM; also, ignore UltraVNC). This works even if you aren't running as SYSTEM.
* Bypassing the registry permissions is done with the freeware SetACL (http://helgeklein.com/setacl/). It may also be possible with Microsoft's subinacl.exe, but see this first: http://support.microsoft.com/kb/296865.
* This also assumes you've renamed the 64-bit version of the installer to mseinstall_64.exe.
 
<source lang="xml">
<package
id="microsoftsecurityessentials"
name="Microsoft Security Essentials"
revision="4.3.0219"
reboot="false"
priority="1">
 
<check
type="uninstall"
condition="exists"
path="Microsoft Security Essentials"/>
 
<variable name="INSTALLER_NAME" value="mseinstall.exe" />
<variable name="INSTALLER_NAME" value="mseinstall_64.exe" architecture="x64" />
 
<install cmd='%SOFTWARE%\microsoftsecurityessentials\%INSTALLER_NAME% /s /o /runwgacheck' />
 
<!-- Change the registry permissions to allow Administrator to edit these registry entries. Unneeded if you're running as SYSTEM (e.g. wpkg client) -->
<install cmd='%SOFTWARE%\microsoftsecurityessentials\SetACL.exe -on "hklm\software\Microsoft\Microsoft Antimalware\Scan" -ot reg -actn ace -ace "n:Administrators;p:full"' />
<install cmd='%SOFTWARE%\microsoftsecurityessentials\SetACL.exe -on "hklm\software\Microsoft\Microsoft Antimalware\Exclusions\Paths" -ot reg -actn ace -ace "n:Administrators;p:full"' />
 
<!-- Change registry settings on these registry entries -->
<install cmd='%COMSPEC% /C REG ADD "HKLM\Software\Microsoft\Microsoft Antimalware\Scan" /v ScheduleDay /t REG_DWORD /d 0x00000000 /f' />
<install cmd='%COMSPEC% /C REG ADD "HKLM\Software\Microsoft\Microsoft Antimalware\Scan" /v ScheduleTime /t REG_DWORD /d 0x000003c0 /f' />
<install cmd='%COMSPEC% /C REG ADD "HKLM\Software\Microsoft\Microsoft Antimalware\Scan" /v ScanOnlyIfIdle /t REG_DWORD /d 0x00000000 /f' />
<!-- This whitelists UltraVNC.exe -->
<install cmd='%COMSPEC% /C REG ADD "HKLM\Software\Microsoft\Microsoft Antimalware\Exclusions\Paths" /v "C:\Program Files\UltraVNC\winvnc.exe" /t REG_DWORD /d 0x00000000 /f' />
<install cmd='%COMSPEC% /C REG ADD "HKLM\Software\Microsoft\Microsoft Antimalware\Exclusions\Paths" /v "C:\Program Files\uvnc bvba\UltraVNC\winvnc.exe" /t REG_DWORD /d 0x00000000 /f' />
 
<!-- Set the registry permissions back the way they were -->
<install cmd='%SOFTWARE%\microsoftsecurityessentials\SetACL.exe -on "hklm\software\Microsoft\Microsoft Antimalware\Scan" -ot reg -actn ace -ace "n:Administrators;p:read"' />
<install cmd='%SOFTWARE%\microsoftsecurityessentials\SetACL.exe -on "hklm\software\Microsoft\Microsoft Antimalware\Exclusions\Paths" -ot reg -actn ace -ace "n:Administrators;p:read"' />
 
<upgrade include="install" />
 
 
<remove
cmd='%SOFTWARE%\microsoftsecurityessentials\%INSTALLER_NAME% /s /u'/>
</package>
 
</source>
 
== Installer command-line switches ==
2
edits

Navigation menu