Understanding MSIX
Microsoft uses a preferred package format called MSIX that combines the benefits of MSI, .appx, App-V, and ClickOnce. The packaging format maximizes flexibility and security and is the preferred installer for the Laurel Windows Assistant.
To dive deeper, visit Microsoft's official guide.
MSIX Autoupdates
The Laurel Windows Assistant MSIXup is configured to automatically update to provide the latest and best experience for Laurel users (along with improved security) when not deploying with Microsoft Intune.
Please use the MSI or MSIX installer if you would like to avoid autoupdates.
Please visit our Laurel Windows Assistant download page to find the latest installers suitable for your team. Our team will update you through Intercom and email when new installers are available for upgrade.
Deploying the MSIX Laurel Windows Assistants
Different Installers
Depending on your installation needs and Windows version we have created multiple installers.
AppInstaller - This version works on Windows 10 and 11 and WILL self-update
MSIX - This version works on Windows 10 and 11 and will NOT self-update
MSI - This version works on Windows 10 and 11 and will NOT self-update (Use this version if your SCCM can't install MSIX packages)
Citrix Environments
Deploying MSIX applications through Citrix Virtual Apps is possible with these steps:
Package Creation: Just like in the System Center Configuration Manager (SCCM) process, you should convert your existing applications to MSIX using the MSIX Packaging Tool.
Application Publishing: With your MSIX package, you can now publish it using Citrix Studio. Make sure your Delivery Controllers are updated to the latest version to fully support MSIX.
Managing Roaming Profiles
To properly support per user roaming installations, the Citrix server must have the Citrix Personalization component installed on the server. Once that is setup, you create an app-v package
for distribution which utilizes private storage for each user to manage their personal setting.
The entire process is covered in the following official documentation:
Installation via MSIX Walk Throughs
Via Basic App Installer Locally
Navigate to: https://download.laurel.ai/installer/windows/index.html
Click "Get the app"
After download is complete, double click the Laurel.Installer file and walk through each step for installation.
Note: This method works well for individual users and the app will check for updates during each launch. It is our easiest and most simple way to install Laurel Assistant.
Via Powershell Locally
Uninstalling
Uninstalling assistant by running the Powershell script below:
Remove-AppPackage -Package (Get-AppxPackage Laurel.Assistant).PackageFullName
Note: Powershell may need to be run in “Admin” mode.
Installing
Download the .msix file from: https://www.laurel.ai/downloads/windows
Install via Powershell using the following Powershell script:
Add-AppxPackage -Path "C:\Users\<username>\Downloads\Laurel.Installer_<file version>_x86.msix"
After installation is complete you can now launch Assistant from the Start Menu. Under the About option you will see the new version installed
Note: You can additionally launch the app as an administrator with the following Powershell command:
Start-Process -file explorer.exe -ArgumentList "shell:AppsFolder\$((Get-AppXPackage Laurel.Assistant).PackageFamilyName)!LaurelAssistant"
Via SCCM
Installation Steps
Note: You need to have SCCM already installed in your environment.
Note: Your SCCM version should be updated to at least 1806, which supports MSIX packages.
Note: The devices you want to install the MSIX package on should be running at least Windows 10 version 1809.
Download the .msix file this from: https://www.laurel.ai/downloads/windows
Once the x86.msix package is downloaded please use SCCM to deploy.
There are no additional switches required during deployment.
To verify that Laurel Assistant has been deployed it should appear as an application on the Users device and can be launched as normal
Via Microsoft Intune
Deployment Steps
Log in to the Microsoft Endpoint Manager admin center.
Go to Apps > All apps and click Add.
Select the app type you want to deploy. Select "Windows 10 and later."
A wizard will ask you to configure information shared with users about your app. The default settings should be acceptable for most organizations, but feel free to edit as needed. Then, click "Next."
The second step, Configure app suite, is the place where the actual configuration takes place. Most of the settings are pretty self-explanatory, possibly except for the ones I list below, so let’s quickly discuss them:
Once you finish setting everything up, click Next.
Configuration settings format – leave the default setting (Configuration designer) to use a user-friendly GUI in Intune to configure the Microsoft 365 Apps. The other option requires you to prepare a special XML file. Learn more
Use shared computer activation – allows you to deploy Microsoft 365 Apps on computers accessed by many users and override the Microsoft 365 device limit. Learn more
Install background service for Microsoft Search in Bing – allows you to deploy a Chrome extension to facilitate searching e.g. people, files or internal sites in your organization. Learn more
Note: You can get information on each item by simply clicking the info icon next to it .
Scope tags is an Intune feature that allows you to decide which admins in your organization will have access to a specific configuration or policy. To limit access to this Microsoft 365 Apps configuration and be able to select appropriate scope tags, you have to define and assign them to specific groups of users first. Learn more
If you don’t want to use Scope tags, simply click Next.
Assignments is an important step. Here, you can decide for which users or on which devices the Microsoft 365 Apps will be installed (the Required section), available to install (the Available for enrolled devices section), or removed (the Uninstall section). If you would like to make assignments according to AAD groups (the Add group option), remember to create appropriate public AAD group(s) beforehand.
Since you want to deploy Microsoft 365 Apps to all users, you should use the Add all users option under Required and click Next.
The last step, Review + create, allows you to review the whole configuration for Microsoft 365 Apps. If you’re fine with all the settings, click Create to start the deployment.
See Additional References: https://learn.microsoft.com/en-us/mem/intune/fundamentals/get-started-with-intune
Via MSIX App Attach
Creating Azure AD Domain Services
Create a new Azure AD Domain Services (Azure AD DS).
Note: This is used to provide managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos/NTLM authentication.
To create an Azure AD DS, click on the Create button and input the required details.
Creating a File Share in Azure Portal
Navigate to the Azure portal and search for Storage Accounts.
Then, click on Create and address the following:
Subscription
Resource Group (make sure it is in the same resource group as your Azure Virtual Desktop)
Storage Account name
Region
Redundancy (Storage type)
You can further customize the storage as you wish, or continue by clicking on Review + Create.
Once the storage account is created, it’s time to add a new file share to it. Navigate to the created storage account and click on the File shares option.
Now, press the +File share button. This will bring up a window where you can input the Name of your share and which Tier you want to opt in for.
Click on the Review +Create button.
Syncing the File Share with Azure Active Directory
Navigate back to your Storage accounts, select File shares and click on the Active Directory button.
You will be prompted with a new window where you choose the Azure Active Directory Domain Services and click on Configure.
Check the Enable Azure Active Directory Domain Services (Azure AD DS) for this file share checkbox (in the upper right corner)
Setting Permissions
Navigate to the Storage accounts
Select your previously created storage account
Go to Access Control(IAM)
Click on Add and add the following roles:
Storage Account Contributor
Storage Blob Data Contributor
Storage Blob Data Reader
Storage File Data SMB Share Contributor
Virtual Machine Administrator Login
Virtual Machine Contributor
Note: For each of these roles, your account and virtual machine must be added like this:
Assign MSIX packages via App Attach
Navigate to Azure Virtual Desktop and select your Host Pools.
In your host pool, you will see the MSIX Packages option. Click on the +Add option.
As you will see, this will require an MSIX image path - this path must correspond to the your storage account path that we previously created.
Add files to your Storage Account, navigate to the file share and click on Upload.
Note: The path that must be specified to MSIX App Attach is as follows:
\\STORAGEACCOUTNAME.file.core.windows.net\FILESHARENAME\filename.vhd
Once the path is provided to Azure, a few options will appear such as Display name, Registration Type and State (it must be set to active).
To create the application group for assignment, click on Application Groups in your host pool.
Next, in the app group, select Applications and click on the +Add option:
Select your MSIX package from the list and press Save.
Note: The sync with AD will take some time, but the application will appear on your virtual machine after a few minutes.
See Additional References: https://learn.microsoft.com/en-us/azure/virtual-desktop/what-is-app-attach
Via KACE Distribution
First gather up all the installation files required and zip them up into a single zip file.
Note: Be careful the files are at the root of the zip and not in a folder at the root of the zip file (This could cause failures).
Save the zipped file to a location accessible when uploading to the KACE web interface.
Now, log into your KACE environment and pull up a current inventoried PC that already has all software in the zip file installed.
Under the Manage Operating Systems, ensure all OS versions you plan to distribute this version to are selected
Note: that with version 8 release of KACE, you can select entire OS Versions instead of individual versions as an option.
Click on the Browse button, browse to and select the zipped file you have saved.
After selecting the file, change the Category and Threat Level as needed. Click Save button when finished.
Navigate to Home>Label Management, then click Labels
Complete Name, Description and selections for Restrict Label Usage To.
Navigate to Distribution > Managed Installations. Under File, click New.
Configure Name, Execution; choose the software from the drop down options (Choose the one you uploaded earlier)
Note that with Version 8 you can choose Cataloged Software or Software from the Software list. Your uploaded zip file will be associated under Software.
Now choose the installation commands. Most often you will choose Override Default Installation to include switches such as silent installation.
Under Deploy, click Manage Associated Labels and select the label you created for this distribution and click apply.
Configure Notifications to give the user warnings and completion messages.
Configure Schedules as needed (What times it is permitted to install and how many attempts until it reports failed, etc.) Click Save when complete.
Now apply the new Label to any device you wish to install it on. After the device inventories next, it will install per configured settings.
See Additional Resources: https://support.quest.com/kace-systems-deployment-appliance/9.2/technical-documents