Skip to content

Deployment Guide (Enterprise Edition)

WireSock Secure Connect provides deployment automation options designed for enterprise environments.
These options allow administrators to centrally control application behavior, restrict end-user access to specific functionality, and automate profile and license provisioning.

This guide describes supported command-line parameters, deployment modes, usage examples, and integration with Microsoft Intune, SCCM, MDT, and Group Policy (GPO).

NOTE

This section applies only to the Pro version of the application.

1. Silent Installation Requirement

For automated deployments, silent mode is mandatory.

Use the /s parameter:

text
/s

This ensures that the installation runs without user interaction.

2. .NET 10 Prerequisite

WireSock Secure Connect requires .NET 10 to run. Install .NET 10 before installing the application.

You can download the latest .NET 10 Desktop Runtime from Microsoft:
https://dotnet.microsoft.com/en-us/download/dotnet/10.0

Automatic .NET installation during setup

During installation, WireSock Secure Connect will automatically download and install .NET if it is not detected on the system.

To prevent the installer from installing .NET, use the following installer switch:

text
InstallDotNet=false

Important: If .NET 10 is not installed, WireSock Secure Connect will not run.

3. Command-Line Deployment Parameters

Supported syntax:

text
wiresock-secure-connect-pro-x64-<version>.exe /s [InstallDotNet=false] Deployment=<mode> Profile=<path> License=<path>

Parameters

  • /s — Silent installation mode (required for automated deployment)
  • InstallDotNet=false — Skip .NET installation during setup (requires .NET 10 to be installed separately)
  • Deployment — Defines the user interface and feature availability mode
  • Profile — Path to a profile file or directory containing profiles
  • License — Path to a license file

4. Deployment Modes

The Deployment parameter limits the functionality available to end users.

Mode Comparison Table

ModeAuto startAuto connectSystem tray iconNotificationsContext menuConnect/DisconnectProfile selectionMain window
tinyYesYesStatus onlyNoNoNoNoNo
tiny1YesYesYesYesNoNoNoNo
tiny2YesYesYesYesExit onlyNoNoNo
smallYesNoYesYesYesYesNoNo
small1YesNoYesYesYesYesYesNo
largeYesNoYesYesYesYesYesYes

Deployment Modes Diagram

Deployment Modes Diagram

5. Profile Parameter

text
Profile=<full_path_to_profile_or_directory>
  • Accepts a single profile file or a directory containing multiple profiles.
  • Profiles are automatically deployed and stored in encrypted form.
  • In restricted modes (tiny, tiny1, tiny2, small), deploying a single profile is recommended.

6. License Parameter

text
License=<full_path_to_license_file>
  • The license file may contain multiple licenses.
  • Licenses must be separated by an empty line.
  • The base license must appear before overlays.
  • Recommended: use the license file downloaded from your account dashboard.

7. Deployment Examples

Example 1 — Fully Locked-Down Corporate Deployment

text
wiresock-secure-connect-pro-x64-3.3.3.1.exe /s Deployment=tiny Profile=C:\deploy\corp.conf License=C:\deploy\license.txt

Example 2 — Controlled Deployment with Manual Connect

text
wiresock-secure-connect-pro-x64-3.3.3.1.exe /s Deployment=small Profile=C:\deploy\profiles\ License=C:\deploy\license.txt

Example 3 — Full UI Deployment

text
wiresock-secure-connect-pro-x64-3.3.3.1.exe /s Deployment=large Profile=C:\deploy\profiles\ License=C:\deploy\license.txt

8. Microsoft Intune Deployment

WireSock Secure Connect can be deployed using Microsoft Intune as a Win32 application.

High-level steps

  1. Package the installer using the Microsoft Win32 Content Prep Tool.
  2. Use an install command that includes /s and the desired parameters.
  3. Configure detection rules (for example, a registry key or installed executable).
  4. Assign the application to device or user groups.

9. SCCM Deployment

For Microsoft Configuration Manager (SCCM):

  1. Create a new Application.
  2. Specify the install command (example):
text
wiresock-secure-connect-pro-x64-3.3.3.1.exe /s Deployment=tiny Profile=\\fileserver\deploy\corp.conf License=\\fileserver\deploy\license.txt
  1. Configure a detection method (for example, file version or registry).
  2. Deploy to collections.

10. MDT Deployment

For Microsoft Deployment Toolkit (MDT):

  1. Add the installer to your Applications.
  2. Use a silent install command with /s.
  3. Add the application to the Task Sequence.
  4. Ensure profiles and licenses are accessible during deployment (local media or a reachable network share).

12. Silent Upgrade

Upgrading can be performed by running the new installer version with /s.
The installer performs an in-place upgrade while preserving profiles and licenses.

Example:

text
wiresock-secure-connect-pro-x64-3.4.0.exe /s Deployment=tiny

13. Logging and Troubleshooting (Silent Install)

Silent deployments typically fail due to environmental issues (permissions, blocked driver binaries, disabled Windows services, or security software). Use the checklist below to diagnose quickly.

13.1 Collect installer logs

  • Check %TMP% for installer logs that start with WireSock (for example, WireSock*.log).
  • If the installation includes a kernel driver, the driver installer may generate a separate driver log file. Include it when reporting issues.

13.2 Validate prerequisites and environment

  • Ensure the installer is executed with sufficient permissions (enterprise deployments usually run under SYSTEM).
  • Verify required Windows services are running (commonly involved):
    • Plug and Play
    • Windows Management Instrumentation (Winmgmt)
    • Cryptographic Services (CryptSvc)

13.3 Check security software (common cause)

Some antivirus/EDR products may quarantine or block driver files immediately after extraction.

  • Review antivirus/EDR logs for blocked items (for example, the driver file ndiswgc.sys, if applicable).
  • If this is confirmed as a false positive, consider a controlled workaround:
    • temporary exclusion for the installer and driver files during deployment, or
    • a short-lived maintenance window policy exception

13.4 Confirm network access (for profile/license delivery)

If Profile= or License= points to a network share, ensure the deployment context (SYSTEM/user) can reach that path.

  • Prefer local staging (copy files locally first) when deploying through Intune/SCCM/MDT.
  • If using UNC paths, validate permissions explicitly for the deployment identity.

When deploying via scripts, capture the installer exit code and log it centrally. This helps correlate failure causes across the fleet.

14. Known Issues

Antivirus/EDR may block driver files

Some security products can quarantine or block kernel driver binaries immediately after extraction (for example, ndiswgc.sys, if applicable).
If installation fails, review antivirus/EDR logs and consider deploying an exclusion or temporary policy exception in a controlled manner.

Installation may fail if required Windows services are disabled

If any of the following services are disabled, driver installation and system integration may fail:

  • Plug and Play
  • Windows Management Instrumentation (Winmgmt)
  • Cryptographic Services (CryptSvc)

Network share access in SYSTEM context

When deploying via Intune/SCCM/MDT, the installer often runs under the SYSTEM account.
UNC paths for Profile= and License= may not be accessible in that context. Prefer staging files locally or explicitly granting access to the deployment identity.

.NET 10 is required at runtime

If .NET 10 is not installed, WireSock Secure Connect will not run. If you use InstallDotNet=false, ensure .NET 10 is deployed separately.

15. Best Practices

  • Always use /s in automated environments.
  • Test deployment modes in a staging ring before mass rollout.
  • Use tiny for fully managed endpoints; use small / small1 when limited user interaction is required.
  • Store profile and license files securely.
  • Validate antivirus/EDR compatibility before mass deployment.

For enterprise deployment assistance, contact WireSock support.

16. Winget Deployment

WireSock Secure Connect is available via Windows Package Manager (winget) under the following ID:

text
NTKERNEL.WireSockVPNClient

Winget can be used for installation, upgrade, and removal scenarios.
For enterprise deployments, it is recommended to combine winget with a configuration staging mechanism (Intune, SCCM, MDT, or scripts).

16.1 Basic Installation

powershell
winget install --id NTKERNEL.WireSockVPNClient --exact --silent
  • --exact ensures the correct package is selected.
  • --silent triggers silent installation (if defined in the manifest).

16.2 Installation with Deployment Parameters

To pass installer parameters (such as /s, Deployment=, Profile=, License=, or InstallDotNet=false), use the --override switch:

powershell
winget install `
  --id NTKERNEL.WireSockVPNClient `
  --exact `
  --silent `
  --override "/s Deployment=tiny Profile=C:\ProgramData\WireSock\corp.conf License=C:\ProgramData\WireSock\license.txt"

Ensure that profile and license files exist on the system before running the command.

If .NET is pre-installed and should not be installed automatically:

powershell
--override "/s InstallDotNet=false Deployment=tiny"

Winget does not deploy configuration files automatically.
Use a two-step deployment approach:

Step 1 — Stage configuration files

powershell
New-Item -ItemType Directory -Force -Path "C:\ProgramData\WireSock"

Copy-Item "\\fileserver\deploy\corp.conf" "C:\ProgramData\WireSock\corp.conf"
Copy-Item "\\fileserver\deploy\license.txt" "C:\ProgramData\WireSock\license.txt"

When deploying via Intune or SCCM, installation typically runs under the SYSTEM account.
Ensure the SYSTEM account has access to network paths or stage files locally first.

Step 2 — Install via winget

powershell
winget install `
  --id NTKERNEL.WireSockVPNClient `
  --exact `
  --silent `
  --override "/s Deployment=tiny Profile=C:\ProgramData\WireSock\corp.conf License=C:\ProgramData\WireSock\license.txt"

16.4 Upgrade via winget

powershell
winget upgrade --id NTKERNEL.WireSockVPNClient --exact --silent

To preserve a specific deployment mode:

powershell
winget upgrade `
  --id NTKERNEL.WireSockVPNClient `
  --exact `
  --silent `
  --override "/s Deployment=tiny"

16.5 Uninstall via winget

powershell
winget uninstall --id NTKERNEL.WireSockVPNClient --exact --silent

16.6 Limitations of Winget Deployment

  • Winget does not automatically distribute profile or license files.
  • UNC paths may not be accessible in SYSTEM context.
  • Installer arguments rely on correct manifest behavior.
  • Compliance reporting may be limited compared to Intune/SCCM Win32 applications.

Winget is well suited for automated upgrades and lightweight rollout scenarios.
For fully controlled enterprise deployments (application + configuration in one package), consider Intune Win32, SCCM, or MDT-based distribution.