/build/static/layout/Breadcrumb_cap_w.png

Dynamics 365 (for Outlook) installer - how to run without UAC prompts?

Our CRM admin gave us a .bat (it checks 32 vs 64 bit, closes Outlook, runs the installer and then adds our CRM config) I set up as an online KScript in our K1000 but it presents with UAC prompts. Realized it's not his script causing the problem though -- it's the client executable from Microsoft. No matter what I do, I can't get the CRM2016*.exe installer to proceed silently without UAC prompts (for testing, I simply tried this via non-administrative command prompt). Has anyone had any success rolling out the CRM2016 Outlook client via KACE, without end-user interaction?


0 Comments   [ + ] Show comments

Answers (3)

Answer Summary:
Posted by: kcasey 2 years ago
Senior Yellow Belt
0

Does anyone have a silent uninstall script for Microsoft Dynamics 365?


Posted by: ljg_gencode 4 years ago
Yellow Belt
0

Top Answer

Local System account didn't work ... but I managed to do this by using a dedicated (local admin) domain account. I had assumed "logged in user" would be sufficient for my testing as I am a domain admin but KACE needed me to specify credentials. I think I got it ... thanks though.

Posted by: anonymous_9363 4 years ago
Red Belt
-1
for testing, I simply tried this via non-administrative command prompt

If there was a way to bypass UAC when running executable files, would that, in your opinion, present a teensy-weensy security problemette? Your clue on how to proceed: local System account.

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login

Share

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ