Question

I have users who are using "secure-wave" security. Evidently it is some sort of white-listing application monitor.

With my click-once application, the name of the folders that are used are runtime generated, so the administrators are not able to properly whitelist the application and its files.

Any suggestions?

Was it helpful?

Solution

There's no way to override the ClickOnce installation location. As you said, it's runtime generated, and resides within the user ClickOnce App Cache within the individual users directory. Have you considered having having the admins whitelisting this specific folder?

I guess the only other way to handle it would be to switch to Windows Installer and implement your update code yourself, which is obviously less than idea. Whitelisting the Click Once cache would be the easiest way, but obviously bare in mind the security considerations of doing this.

Licensed under: CC-BY-SA with attribution
Not affiliated with StackOverflow
scroll top