Editing The Virtual Registry - Novell ZENWORKS APPLICATION VIRTUALIZATION 8.0.2 - 11-2010 User Manual

Hide thumbs Also See for ZENWORKS APPLICATION VIRTUALIZATION 8.0.2 - 11-2010:
Table of Contents

Advertisement

3.12
E
DITING THE VIRTUAL REGISTRY
ZENworks Application Virtualization allows you to embed a virtual registry into your
executable. Embedded registry keys are accessible by your ZENworks Application Virtualization-
processed application as if they were present in the real registry. Unlike data present in the registry
on the host device, virtual registry keys and values are not visible from and do not require changes
to the host device. In particular, the use of a virtual registry does not require any security
privileges on the host device, even if the virtual registry entries reside in a privileged section of the
registry, such as HKEY_LOCAL_MACHINE. Also, because virtual registry entries are
embedded in the application executable, other applications are unable to disrupt application
execution by inadvertent modification of registry entries required by the application.
To add virtual registry data:
Click on the Registry button located on the left side of the ZENworks Application
Virtualization window.
Using the view on the right, add the registry keys and values you wish to embed in the
application executable. When adding blob data, enter the values in hexadecimal format.
The Classes root, Current user root, Local machine, and Users root folders correspond to the
HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, and
HKEY_USERS keys on the host machine.
Registry string values may include well-known root folder variables such as
@PROGRAMFILES@ and @WINDIR@.
3.12.1 Virtualization Semantics
In the event of a collision between a key or value in the virtual filesystem and data present on the
host device registry, information in the virtual registry takes precedence.
Keys may be virtualized in Full, Merge or Hide mode:
Full mode: Only values in the virtual registry will be visible to the application- even if a
corresponding key exists on the host device- and writes are redirected to the user registry
area.
Merge mode: Values present in a virtual key will be merged with values in the
corresponding key on the host machine, if such a key exists. Writes to host keys are
passed through to the host registry and writes to virtual keys are redirected to the user
registry area.
Hide mode: Keys and values in the virtual registry or the corresponding host registry will
not be found by the application at runtime.
Tip: To apply the selected isolation mode to all subkeys, right-click on the key, choose Isolation,
click on the checkbox for Apply to subkeys, and click OK.
3.12.2 Importing Registry Hive Files
29
Novell ZENworks Application Virtualization

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zenworks application virtualization 8.0.2

Table of Contents