Application and Software Deployment SCCM – Part # 3 ( Detection Rules)   – Part 1 – Part 2   Part 3 Part 4  – Part 5

While we are done with the Concept of Applications in SCCM 2012 , We are aware that what are requirements in SCCM 2012 , We will now take up the concept of Detection Rules .

Detection Rules : A Detection rule is a concept by which we can find out if a Software has already been present on the user’s machine . If the software is present we may not want to install it again . As a direct benefit of this would be that we are not Utilizing the Network bandwidth for the software deployment which the user machine already has !!

Sample Flow Chart :


SCCM Detection Rule Window:


There are Three Types of Detection Rules in SCCM :

  • File System – This method allows you to detect whether a specified file or folder exists on a client device, thus indicating that the application is installed.
    The File system setting type does not support specifying a UNC path to a network share in the Path field. You can only specify a local path on the client device.
  • Registry – This method allows you to detect whether a specified registry key or registry value exists on a client device, thus indicating that the application is installed.
    Select the option This registry key is associated with a 32-bit application on 64-bit systems to check 32-bit registry locations for the specified registry key first. If the registry key is not found, then 64-bit locations will be searched.

    Windows Installer – This method allows you to detect whether a specified Windows Installer file exists on a client device, thus indicating that the application is installed.

Published by Abheek Dutta

A perennial thrill-seeker with an avid interest in transforming and improving lives around the globe through the wonderful gift of technology, I am the Senior Vice President of Henson Group . My specialties include Leadership, problem-solving, and putting cutting-edge technology (Cloud, Artificial Intelligence, Machine Learning) in the hands of corporates, startups, and professionals. I have been obsessed with the idea of using technology to solve real-world problems. Having previously worked with global software giants like TCS and IBM, I now usually sit at my office at the World Trade Center, New York and Chandigarh , India. Among my greatest achievements, increasing the revenue of Henson Group by ten-folds in the past two years, remains my favorite along with the fact that Henson Group’s India center has now become ‘a center of excellence’ with its entire technical team being Microsoft certified. On the delivery side, I helped Henson Group attain the prestigious “ Azure Expert MSP Certification “ with Microsoft . Hailing from Jammu, my team has grown from five to 150 employees and associates in just two years. Even during COVID-19 era, our growth has soared while helping corporates, industries and startups to tide over many hurdles and challenges. Henson Group is recently featured at rank 132 in the Inc. 5000 Rating. Skillsets: Cloud Services, Managed Services Provider (MSP), Computers & Networks, Artificial Intelligence, Machine Learning, Project management, Leadership , Cyber Security Mr. Dutta manages and monitors the performance of consultants and partners on engagements, communicating with the account executive, project teams, and customers. Works in close collaboration with the Microsoft project manager, providing hands-on project management expertise as required. Mr. Dutta provides direct oversight over the MSP Client Operations team responsible for managing MSP relationships with existing MSP clients and day to day operations of these accounts. Mr. Dutta oversees the Centralized Delivery Team that is responsible for high volume cloud migrations and MSP delivery to current clients. Team consists of over 120+ engineers and project managers.

4 thoughts on “Application and Software Deployment SCCM – Part # 3 ( Detection Rules)

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: