WiseTime Desktop App supports enterprise deployment with centralized control over auto-update functionality. IT administrators can disable auto-updates via Windows registry policy, allowing them to manage updates through their preferred deployment mechanisms (MSI, SCCM, etc.).
The article covers:
- Windows Registry Configuration
- Behavior When Auto-Update is Disabled
- Verification
- Deployment Scenarios
- Best Practices
- Troubleshooting
- Security Considerations
- Compatibility
- Support
Windows Registry Configuration
Registry Location
-
Registry Hive:
HKEY_LOCAL_MACHINE -
Key Path:
SOFTWARE\PracticeInsight\WiseTime -
Value Name:
DisableAutoUpdate -
Value Type:
DWORD (32-bit) -
Value Data:
-
1= Disable auto-updates (enterprise managed) -
0or absent = Enable auto-updates (default behavior)
-
Configuration Methods
Method 1: PowerShell (Recommended for automation)
# Run as Administrator New-Item -Path "HKLM:\SOFTWARE\PracticeInsight" -Name "WiseTime" -Force Set-ItemProperty -Path "HKLM:\SOFTWARE\PracticeInsight\WiseTime" -Name "DisableAutoUpdate" -Value 1 -Type DWORD # To re-enable auto-updates Set-ItemProperty -Path "HKLM:\SOFTWARE\PracticeInsight\WiseTime" -Name "DisableAutoUpdate" -Value 0 -Type DWORD # To remove the policy (reverts to default behavior) Remove-ItemProperty -Path "HKLM:\SOFTWARE\PracticeInsight\WiseTime" -Name "DisableAutoUpdate" -ErrorAction SilentlyContinue
Method 2: Registry Editor (regedit)
- Open Registry Editor as Administrator
- Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE - Create key structure:
PracticeInsight\WiseTime(if not exists) - Right-click in the right pane → New → DWORD (32-bit) Value
- Name:
DisableAutoUpdate - Value:
1to disable,0to enable
Method 3: Registry File (.reg)
Create a .reg file and deploy via Group Policy or run manually:
To disable auto-updates:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\PracticeInsight\WiseTime]
"DisableAutoUpdate"=dword:00000001
To enable auto-updates:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\PracticeInsight\WiseTime]
"DisableAutoUpdate"=dword:00000000
Method 4: Group Policy Deployment
- Create custom ADM/ADMX template or use registry preferences
- Deploy to target computers via Group Policy
- Registry setting will be applied on next policy refresh
Behavior When Auto-Update is Disabled
When the DisableAutoUpdate registry key is set to 1:
Automatic Updates
- Periodic background update checks are disabled
- Automatic download and installation is disabled
- Update notifications are not shown
User Interface Changes
- "Check for Updates" menu items are hidden from:
- Application main menu (WiseTime → Check for Updates)
- System tray context menu
- Updates tab is hidden from Preferences dialog
- Manual update checks via UI are disabled
Manual Update Attempts
- If user somehow triggers update check, they will see an error state
- No update-related network requests are made
Verification
Check Current Policy Status
# Check if auto-update is disabled by policy
$regPath = "HKLM:\SOFTWARE\PracticeInsight\WiseTime"
$regName = "DisableAutoUpdate"
if (Test-Path $regPath) {
$value = Get-ItemProperty -Path $regPath -Name $regName -ErrorAction SilentlyContinue
if ($value.$regName -eq 1) {
Write-Host "Auto-update is DISABLED by enterprise policy"
} elseif ($value.$regName -eq 0) {
Write-Host "Auto-update is ENABLED by enterprise policy"
} else {
Write-Host "Auto-update policy not set (default: ENABLED)"
}
} else {
Write-Host "Auto-update policy not set (default: ENABLED)"
}
Application Logs
The application logs will show:
AppUpdater: Registry key SOFTWARE\PracticeInsight\WiseTime/DisableAutoUpdate = 1, auto-update disabled: true AppUpdater: Auto-update is disabled by enterprise policy, skipping periodic checking
Deployment Scenarios
Scenario 1: Fresh Installation with Policy
- Deploy MSI with auto-update policy pre-configured
- Application will start without auto-update functionality
- IT can manage updates centrally via MSI upgrades
Scenario 2: Existing Installation - Disable Updates
- Deploy registry policy to existing installations
- Restart application (or wait for next launch)
- Auto-update functionality will be disabled
Scenario 3: Mixed Environment
- Some machines with policy (managed updates)
- Some machines without policy (auto-updates enabled)
- Both configurations can coexist
Best Practices
For IT Administrators
- Test policy in development environment first
- Use Group Policy for centralized deployment
- Document update management procedures
- Plan regular update cycles for managed machines
- Monitor application logs for policy verification
For Deployment
- Set policy before first application launch if possible
- Include registry configuration in MSI deployment scripts
- Verify policy deployment across target machines
- Provide fallback procedure if policy needs to be reverted
Troubleshooting
Policy Not Working
- Verify registry path and value name are correct
- Check registry permissions (should be readable by all users)
- Restart the application
- Check application logs for policy detection
Policy Deployment Issues
- Verify Group Policy is applied (
gpupdate /force) - Check registry on target machines manually
- Ensure PowerShell scripts run with Administrator privileges
- Validate .reg file syntax if using registry files
Reverting Policy
# Remove the registry value entirely Remove-ItemProperty -Path "HKLM:\SOFTWARE\PracticeInsight\WiseTime" -Name "DisableAutoUpdate" -ErrorAction SilentlyContinue # Or set to 0 to explicitly enable Set-ItemProperty -Path "HKLM:\SOFTWARE\PracticeInsight\WiseTime" -Name "DisableAutoUpdate" -Value 0 -Type DWORD
Security Considerations
- Registry key is in HKLM (requires administrator access to modify)
- User-level registry (HKCU) is not checked to prevent user override
- Policy affects all users on the machine
- No sensitive data is stored in the registry key
Compatibility
- Supported Platforms: Windows only
- Registry Location: Machine-wide (HKLM)
- Application Versions: v4.0+ (with enterprise policy support)
- Windows Versions: Windows 10, Windows 11, Windows Server 2016+
Support
For enterprise deployment support:
- Contact: support@wisetime.com
- Include application version and deployment method in support requests.