Performing Software Installation with Group Policy
Key Terms
Assign Option used to deploy required applications to pertinent users and computers.
Basic User Strategy for enforcing restrictions that prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users.
certificate rule Software restriction rule that uses the signing certificate of an application to allow software from a trusted source to run or to prevent software that does not come from a trusted source from running. Certificate rules also can be used to run programs in disallowed areas of the operating system.
Disallowed Strategy for enforcing restrictions that prevents all applications from running except those that are specifically allowed.
distribution share Shared folder that is a network location from which users can download software. Also known as the software distribution point.
file-activated installation Method of distributing applications whereby an application is installed when a user opens a file associated with an application that does not currently exist on the user’s workstation.
hash Series of bytes with a fixed length that uniquely identifies a program or file.
hash algorithm Formula that generates a hash value.
hash rule Software restriction rule applied to an application executable that will check the file’s hash value and prevent the application from running if the hash value is incorrect.
hash value Value generated by a formula that makes it nearly impossible for another program to have the same hash.
Install This Application At Logon Deployment option that allows the application to be installed immediately rather than advertised on the Start menu.
.msi file Relational database file that is copied to the target computer system with the program files it deploys. In addition to