We have a network folder location that contains some applications used by a mixture of non-privileged users . Some of these install source files have .MSI while some have .EXE. When my users run it, they get filtered into the catch all app group instead of the app definition I created. I just used \\networkshare\folder1\* with no publishers, drive is network and App requires elevation (UAC). I know this is not very secure but that is the only way I know that would allow my users to run the install themselves without asking help from our deskside support.
This application group by the way sits above the priority list before the catch all and is also using rule filter for those specific users only.
My problem is that it does not get triggered from that definition. Has somebody got any similar definition in place that I can follow that works?