Having a hell of a time figuring out which installer to use for a 64 bit adobe reader deployment via intune win32 app. I located a good process at =TVAADl2J65Y for the 32 bit version, but I cant find an offline 64 bit installer that will let me extract the MSI from it.
To install Adobe Reader using MSI files, you need to download offline installer for Adobe reader from here Adobe Reader Enterprise. After Downloading, unzip de exe file with 7zip or WinRAR. Inside of folder, you will also find the msi file. You need to use the entire folder for installation, not only MSI installer.
Download Zip https://tlniurl.com/2yS3iX
I think i figured it out. The English US language selection does not give you a 64 bit DL. Unfortunately, I had to use the all languages MUI installer which is twice the size of the 32 bit version i first attempted. It works, but 1GB for an intune app... welcome to adobe enterprise standards i guess.
Hello,
After downloading the offline installer of Adobe Reader DC x64 (exe file) and extract its contents with 7zip, you get several files, including a msi and msp. But that standalone msi file is not the latest version of Reader DC, hence the msp file which probably contains the updates. However, I can only load a msi file in Intune, so how do I get a single msi files that corresponds to the latest version of Adobe Reader DC ?
Step 4
Use the files to create a package. I'm installing the up-to-date .msp with the msi (see here). Note that the msi is called acropro.msi but contains the reader. The msi can be executed like this:
Hi, I'm not sure about autopilot. But I usually deploy MSI packages in Intune using a win32 application though I wrap the application/installer in a powershell app deployment package. (example: -app-packaging-a-beginners-guide-part-1-win32/).
But you can also use a simple powershell script to start the installation -to-deploy-an-msi-using-powershell-script-and-intune/
Either way you add all the files to a directory (including the powershell script/batch script/PADT script), create the .intunewin file using IntuneWinAppUtil (you can download that from Microsoft), add a win32application to intune which executes the script you wrote and use the msi guid as dectection rule.
Tauri applications for Windows are either distributed as Microsoft Installers (.msi files) using the WiX Toolset v3 or starting with Tauri v1.3 as setup executables (-setup.exe files) using NSIS. The Tauri CLI bundles your application binary and additional resources. Please note that .msi installers can only be created on Windows as cross-compilation doesn't work yet. Cross-compilation for NSIS installers is experimental and being worked on.
Only the NSIS target supports ARM64 targets, so if you configured tauri to compile all bundle types you may want to change the above command to tauri build --target aarch64-pc-windows-msvc --bundles nsis to only build the NSIS installer.
By default, the Microsoft Installer (.msi) does not work on Windows 7 because it needs to download the WebView2 bootstrapper if not installed (which might fail if TLS 1.2 is not enabled in the operating system). Tauri includes an option to embed the WebView2 bootstrapper (see the Embedding the WebView2 Bootstrapper section below). The NSIS based installer (-setup.exe) also supports the downloadBootstrapper mode on Windows 7.
If your system requires the MSI bundle to be FIPS compliant you can set the TAURI_FIPS_COMPLIANT environment variable to true before running tauri build. In PowerShell you can set it for the current terminal session like this:
The installers by default download the WebView2 bootstrapper and executes it if the runtime is not installed. Alternatively, you can embed the bootstrapper, embed the offline installer, or use a fixed WebView2 runtime version. See the following table for a comparison between these methods:
This is the default setting for building the Windows Installer. It downloads the bootstrapper and runs it. Requires an internet connection but results in a smaller installer size. This is not recommended if you're going to be distributing to Windows 7 via .msi installers.
To embed the WebView2 Bootstrapper, set the webviewInstallMode to offlineInstaller. This increases the installer size by around 127MB, but allows your application to be installed even if an internet connection is not available.
Using the runtime provided by the system is great for security as the webview vulnerability patches are managed by Windows. If you want to control the WebView2 distribution on each of your applications (either to manage the release patches yourself or distribute applications on environments where an internet connection might not be available) Tauri can bundle the runtime files for you.
The .msi Windows Installer package is built using the WiX Toolset v3. Currently, apart from pre-defined configurations, you can change it by using a custom WiX source code (an XML file with a .wxs file extension) or through WiX fragments.
The Windows Installer XML defined by Tauri is configured to work for the common use case of simple webview-based applications (you can find it here). It uses handlebars so the Tauri CLI can brand your installer according to your tauri.conf.json definition. If you need a completely different installer, a custom template file can be configured on tauri.bundle.windows.wix.template.
Note that ComponentGroup, Component, FeatureGroup, Feature and Merge element ids must be referenced on the wix object of tauri.conf.json on the componentGroupRefs, componentRefs, featureGroupRefs, featureRefs and mergeRefs respectively to be included in the installer.
The NSIS Installer's .nsi script defined by Tauri is configured to work for the common use case of simple webview-based applications (you can find it here). It uses handlebars so the Tauri CLI can brand your installer according to your tauri.conf.json definition. If you need a completely different installer, a custom template file can be configured on tauri.bundle.windows.nsis.template on Tauri v1.4 and above.
The NSIS Installer is a multi-language installer, which means you always have a single installer which contains all the selected translations. You can specify which languages to include using the tauri.bundle.windows.nsis.languages property. A list of languages supported by NSIS is available in the NSIS GitHub project. There are a few Tauri-specific translations required, so if you see untranslated texts feel free to open a feature request in Tauri's main repo. Starting with v1.4 you can also provide custom translation files.
The WiX Installer is built using the en-US language by default. Internationalization (i18n) can be configured using the tauri.bundle.windows.wix.language property, defining the languages Tauri should build an installer against. You can find the language names to use in the Language-Culture column on Microsoft's website.
Currently, Tauri references the following locale strings: LaunchApp, DowngradeErrorMessage, PathEnvVarFeature and InstallAppFeature. You can define your own strings and reference them on your custom template or fragments with "!(loc.TheStringId)". See the WiX localization documentation for more information.
Is a live image suitable for me? Here are some thingsto consider that will help you decide.