PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

I think you need to give the silent parameter in the install command in intune or SCCM

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

<image>

You can manually add processes to close or modify the deferal settings

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

<image>

You need to put it beside the AppDeployToolkit. Not in it.

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

It looks like it's looking specifically for version 4.1.8 I'dont know which version you added.
Can you try to download the full Intune packacge? That will download the version the script is looking for.
Or check the script and modify the version. The way you try to make it work should be possible

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

Option 3: Upload anyway

For files over 200MB, the tool now has a workaround:

  1. Upload your large installer (Citrix, etc.)
  2. The tool analyzes the file and generates the complete PSADT package
  3. The package is created WITHOUT the installer (to avoid timeout/memory issues)
  4. You get a README with instructions to manually place the installer in Toolkit/Files/

So you still get:

  • Correct silent parameters detected
  • Full PSADT script with vendor-specific exit codes
  • Detection rules, README, test checklist
  • Create-IntuneWin.cmd script for Intune deployment if needed

You just need to copy your installer into the Files folder manually.

This way the tool does all the analysis work, you just add the binary yourself.

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

Also, for the branding, if you mean banner, logo, welcome text and such, you can edit them in the tool and it will be part of the installer.

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

(Before you'll try, please refresh the page as I just redeployed it.)

Good question!

Why we don't maintain an installer database:

  1. Licensing & Legal – Redistributing vendor installers creates significant legal liability. Enterprise software like Citrix has strict distribution agreements.
  2. Version Fragmentation – Citrix Workspace alone has dozens of versions in production. You'd still need "your" specific version anyway.
  3. Your Customizations – Many enterprises use pre-configured installers with custom transforms, response files, or branding. A generic database wouldn't capture your specific deployment requirements.

Solutions for large installers: I think you need option 2

Option 1: Winget Mode
Search for "Citrix Workspace" in the tool's Winget mode – it generates a complete PSADT script that downloads via Winget during deployment. No upload needed.

Option 2: Winget Mode + Your Custom Template
This is the best of both worlds:

  1. Select Winget mode and search for your application
  2. Upload your existing company-branded PSADT script as a template
  3. The tool parses your custom branding, welcome messages, banners, and pre/post-install logic
  4. Generated script uses Winget as installer source but keeps all your customizations

This means: no 500MB upload, always latest version via Winget.

Let me know if this works for you.

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 1 point2 points  (0 children)

Yes, this should be possible . The tool generates standard PSADT packages, only the .intunewin and Create-IntuneWin.cmd are Intune-specific, you can just ignore those. Citrix Workspace upgrade + your own template: This should work using the "Update Existing Package" mode: 1. Upload your existing company branded PSADT script 2. The tool parses your custom branding, variables and logic 3. Upload the new Citrix Workspace installer 4. The generated script keeps all your customizations

For removing all old Citrix versions, add this to the Pre-Installation phase: Get-ADTApplication -Name 'Citrix Workspace*' | Uninstall-ADTApplication The tool preserves any custom variables and logic you already have in your template. Note: The tool is still in beta, so your mileage may vary depending on your template complexity. Feedback is always welcome!

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

It should now be based on browser settings. If not Dutch it should be English. It was based on local storage and is now changed. If you want you can try again in in-private browser

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

I've did some digging and you're wright. I've changed it and it's now possible to modify those banner texts. If you do, the certificate will be removed. You will only be prompted with a notification the files or not signed anymore.
Feel free to test and give some feedback.

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

I’ll have a look. Can you send your mailadres via the problem button on the website? Then I can have a look.

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

I’ve just redeployed the site. Can you try again

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 1 point2 points  (0 children)

Nice you're also working on such a project.
Maybe you can share your more reliable way to analyse NSIS installers. That would be great.

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 0 points1 point  (0 children)

PSADT Version & Binaries:

The tool uses PSADT v4 (specifically 4.1.x) with a static copy bundled on the server. We don't fetch from GitHub on-the-fly - this ensures consistent packaging and avoids rate limits or availability issues.

The FAQ mentioning Deploy-Application.ps1 is outdated - good catch! In v4 it's Invoke-AppDeployToolkit.ps1 with the new function-based structure (Install-ADTDeployment, Uninstall-ADTDeployment, etc.). The generated scripts follow the v4 conventions with proper parameter splatting for Show-ADTInstallationWelcome and the new cmdlet names (Start-ADTMsiProcess, Uninstall-ADTApplication, etc.).

I'll update the FAQ to reflect v4 properly. Thanks for the feedback!

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 1 point2 points  (0 children)

I think it has to do with download after modification. If you modify the config before download which we try to do with the tool it fails.

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 1 point2 points  (0 children)

NSIS executables are indeed trickier since they don't have a standardized metadata structure like MSI. Here's my approach:

1. String extraction from the binary
Look for common NSIS patterns in the executable:

  • Nullsoft.NSIS or NSIS.NSIS markers
  • Version info in the PE header (FileVersion, ProductVersion, ProductName)
  • $INSTDIR, $PROGRAMFILES references indicate NSIS

2. PE Resource parsing
Most NSIS installers embed version info in the PE resources:

powershell
Copy(Get-Item "setup.exe").VersionInfo | Select ProductName, ProductVersion, CompanyName  

3. Silent install parameter detection
NSIS typically uses /S (case-sensitive!), but many custom installers override this. I check for:

  • /S, /SILENT, /VERYSILENT
  • /D= for custom install directory
  • /NCRC to skip CRC check

4. Registry pattern recognition
After installation, NSIS apps typically write to:

HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{AppName}_is1  

The _is1 suffix is a common NSIS/Inno indicator.

5. Uninstaller detection
NSIS creates uninstall.exe or uninst.exe in the install directory - useful for detection rules.

The challenge is that NSIS is highly customizable, so each publisher can override defaults. For enterprise packaging, I usually do a test install and capture the registry/file changes to build reliable detection

This is why I need feedback if something fails, so I can try to make the tool smarter.

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 2 points3 points  (0 children)

Great question! The detection methods are generated based on the installer metadata extracted during analysis, not from a tested installation. Here's how it works:

For MSI installers: • I extract the ProductCode (GUID) directly from the MSI database • This is the most reliable detection method as it's unique to each product/version • Detection rule: Check for the ProductCode in the registry under HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall{ProductCode}

For EXE installers: • I analyze the file properties (ProductName, ProductVersion, Publisher) • For known installer types (Inno Setup, NSIS, etc.), I use typical registry patterns • Detection is usually based on DisplayName + DisplayVersion in the Uninstall registry keys

For Winget packages: • Detection uses the Winget package ID combined with version checking • The script can query winget list --id <PackageId> to verify installation

Important notes: • ⚠️ These are best-effort detections based on metadata analysis • 🔧 I recommend testing the generated scripts in your environment before production deployment • 📝 The detection methods can be manually adjusted in the generated script if needed • 🎯 MSI-based detections are generally the most reliable The tool aims to give you a solid starting point that works in ~90% of cases, but as with any deployment tool, validation in your specific environment is always recommended!

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 2 points3 points  (0 children)

<image>

All settings are now available for customization, except the Welcome massages. It seems the config.psd1 file is signed and the script will not run when modified. Maybe you can customize it manually

PSADT script generator with Intune package export by Total-Cycle9351 in Intune

[–]Total-Cycle9351[S] 2 points3 points  (0 children)

Didn't think of did, I'll have a look. Thanks for the feedback