Content Description in winows deployment

Source: Internet
Author: User
I. Deployment category
Add new projext-> projects types-> setup
And delplyment Optional. Category Type and function:
Setup Project Template: used for Region Creation Windows Install and deploy the attachment package Windows ApplicationProgram.
Web Setup
Projext Template: used for Security Testing Web Application
Merge Module Project Template: used for Region Creation Windows Installer Merge mode. The combined mode is the security program file, which can be included in multiple Micorsoft Installer In the installation package. For an assembly composed of multiple security programs, you can create a combined mode to include this mode in the security component package.
Setup Wizard : This is a way to select other templates. Different Root selection options can be created Windows Installation Package, combination model, or Cab File.
Cab Project Template: Create a secret file (Cabinet file) . The compile program file can be used to aggregate multiple programs into one file and then Parse them.
Smart device cab Project Template: This template can be used by the smart configuration application program to create an security component package.

Ii. Windows
InstallerZookeeper

Upload package: Contains one or more feature packages.Microsoft install (MSI)Data transmission.
Function: describes the features of a product, which are composed of multiple functions and components.
Component: The legal representative's opinion on the security department. It is the smallest unit element of the security department and is composed of one or more files.
A single component can be included in multiple functions, and a function cannot be included in multiple functions.

Iii. Regulation on security content

3.1What files does the application need?
Is a readable row file and some Assembly sets.

3.2What category should I use?
Application files should be installed inProgram Files "Application
NameMedium or somewhere else

3.3How can I access the application using the response?
You canStartSet shortcuts for configurable rows of files in the menu, and set the targets on the desktop.

3.4What is the quality of agency?
You want to put the installation package inCD, Website, etc.

3.5 Users can accept acceptable information, details readme files and security channels.


Iv. zhujian Project
File->
Add project-> new projectMedium SelectionSetup ProjectCase. OpenSetup ProjectThe adequacy of the case.
The optional parameter descriptions in the suite case drop-down list are as follows:
1)As an example: store all programs and data files in the same format without any further modification.
2)In the security case: Merge and merge all filesMsiFile.
3)In the Encapsulation Scheme case:MsiFile libraries are used for encryption and securityCabFile. UseCabYou can set the file size.
Note: The filing name isMsi,MsiIs the number of mobile security devices. We can decide how to package files for security protection.

2, Configure the content of the first security period (that is, the conditions that must be installed before the security application)
There are only a few required items, some of which are described as follows:
1) Windows
Installation 2.0 : Windows
Installation 2.0 Used through Visual
Studio2005 Install the security component. If the target system is Windows XP Or Servers 2003 The security program has been installed on the system.
2) Microsoft
Visual J #. Net redistributable package : If the application needs Visual J # Assembly, which can be selected.
3) SQL Server
2005 express Edition : If you want to have a data volume in the guest system, you can select a number.
4) CRYSTAL
Reports for. net : Crystal Reports You can create a two-dimensional table.
5) Microsoft Data
Access Components 2.8 : Microsft Data Access Components (MDAC) Include OLE DB Providers, ODBC Program and Microsoft
SQL SERVER network libraries. MDAC Of 8.0 Version is Windows
Servers 2003 . In . NET 2.0 No longer needed MDAC .

5. Security token Generator

Deploy a category in the selection, and select a menuView-> Editor. The menu is as follows:
File System: You can specify files and shortcuts, and use them to add files to the hosts file package.
Registry: You can create a sequence table for the Application worker.
File Types: Used to display the name of the application program license history file.
User Interface: You can add and configure a dialog box for display during the security program period.
Custom Actions: Allows you to activate the software during the security and unloading periods.
Launch Conditions: Specifies the requirements for applications.

VI,File SystemInspector
6.1: View-> Editor-> File System The menu can be opened on this menu. After the menu is opened, three special columns marked as fixed are displayed.
6.1.1 : Application folder : Used to store objects that can upload row files and objects. The location is "System Administrators ". "Program Files" " Manufacture " " " Productname "」. " Manufacture And Productname "Contents" Manufacture And Productname Restricted definition.
6.1.2 : User's desktop : Use the guest desktop, which is located in "System Administrators" "Documents and
Settings" " Username " "Desktop "Or" System Administrators" "Documents and Settings" All
Users "Desktop ", This is determined by a single user or multiple users.
6.1.3 : User's programsmenu : Program menu, which is located in "system orders" "Documents and
Settings" " Username " "Start Menu" " Programs "」

6.2: Right-click the system and select"Add special folder". Some of the objects are as follows:
6.2.1:Global Assembly Cache folerIndicates the File Repository of the shared assembly, which is used to share the Assembly among multiple applications.
6.2.2:User psersonal data folderUse the statement to save the statement. System Administrators"Documents and
Settings""Username""My doumentsIs the default router interface 」.
6.2.3:User send to menu: Can be renewedSendAbout the dish list. This menu is used. It is usually used as a marker to send files to the target location.

6.3File modularity

Ondition

With this feature, you can define a condition to determine whether a file should be installed.

Exclude

Whether to install this file,TrueRestless

Packagas

The method by which the duplicate file is added to the secure parts package.

Permanent

Whether the file is retained on the target computer after unloadingTrueTo retain.

Readonly

Set only hosts files during security

Vital

This indicates that this file is very important. If the security file is missing, it will stop the complete security process and can only be rolled back.

6.4: Add a file to the installation package
Project-> Add-> Project outpu, Medium SelectionPrimary output. Increase major outgoing traffic

Note: to create a shortcut, you must firstApplication folerMedium SelectionPrimary output from simpleeditorOrders, in the menuAction-. Create export cut to primary output from simpleeditor.And drag and drop the shortcutUser's progrms menu.

VII,File TypesInspector
If a custom file type is used for the application program, note the extension name of the file, and you want to use the extension name to automatically apply the application, you can useFile TypesThe volume generator. The following lists the features of the file development:

Name

Description file type. This parameter is shown inFile Type Editor. It must be unique.

Command

Specifies the program of the rows.

Description

Description

Extensions

Name of the file to be added to the notebooks table

Icon

Document display name


8,Launch
ConditionInspector

You can specify some requirements for the target system before installing. The connector has two parts.
Search target machine: Specify the file to be searched or the dynamic tables Table
Lanch Conditons. Define a publish message.

IX,User
InterfaxeInspector

You can define the conversation box 1 that the user sees when configuring the security. There are two security modes: Security and Management Security.
The security mode is used for security applications on the target system.
Manage the security mode to share the images of security applications on the network, and then use the images and security applications on the network.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.