Summary


  WPSecure wallpaper deployment helps organizations run robust internal marketing by promoting the company's objectives, products, and services to employees using desktop wallpapers. WPsecure wallpapers increase employee engagement with the company's goals and foster brand advocacy. Unlike traditional wallpaper deployment platforms that have expensive and complicated Server and Client components, the WPSecure wallpaper deployment process does...

Prerequisites


  The WPSecure wallpaper will only run on the below Windows Operating Systems. dotNet framework 4.6 or a higher variant is required. Windows 10 1709 and higher. All Windows 11 versions. Hide "Wallpaper settings page" but allow automatically changing wallpaper background. Remove these settings: Active Directory group policies or other policies that 'prevent changing desktop background' will interrupt and stop...

Total images and screen resolutions


  WPSecure wallpaper packages contain images for the following 80 + Screen resolutions; this includes portrait and landscape images. Message clarity is paramount for internal communications. The WPSecure wallpaper package prefers the use of an accurately fitting wallpaper for every screen resolution and screen orientation. However, if a fitting image is not available, WPSecure makes an...

WPSecure campaign manager


  WPSecure wallpaper deployment has been designed for the side-by-side deployment of wallpaper versions. This feature enables organisations to change a message, introduce a new message or have different messages for varying working groups. The WPSecure campaign manager controls this function. Please note: WPSecure wallpaper packages will work without the 'wpsecure.campaigns' file. If the 'wpsecure.campaigns' file...

Uninstallation


  Uninstallation can be done through the Control Panel or using the command line Open the control panel and look for the below items; then right-click and uninstall. WPSecure campaign manager (Only visible if Campaign manager is installed). WPSecure wallpaper (One or more). Command-line uninstall information WPSecure campaign manager Uninstall : msiexec /X"{05D36583-E25F-5C48-98D5-729FE979BC1B}" WPSecure wallpaper: Uninstall : msiexec /X"{product uninstall guid}" Powershell...

Location whitelisting (Optional)


  We recommend whitelisting the following folder and files. This is an optional recommendation Add whitelist for the "C:\Program Files (x86)\wpsecure" (64 bit devices) or "C:\Program Files\wpsecure"  (32 bit devices) folder and sub-folders. Whitelist the following files in the above location within your Antivirus or app locker products.   wpsecure.exe wpsecurecheck.exe wpsecureloader.exe wpsecureloaderrestart.exe wpsecureloadersp.exe wpsecureloaderuninstall.exe ...

Recording wallpaper history


  Administrators can configure WPSecure wallpaper package to record wallpaper usage history. Set the following registry value to '1' for wallpaper history to be recorded. For 64 bit machines: ComputerHKEY_LOCAL_MACHINESOFTWAREWOW6432Nodewpsecurehistory For 32 bit machines: ComputerHKEY_LOCAL_MACHINESOFTWAREwpsecurehistory Name: enablehistory (dword). Value: 0 (disable history), 1 (enable history). SCCM Hardware Inventory: To gather this information using SCCM hardware inventory add the following lines into your SCCM configuration.mof...

Location whitelisting (Optional)


Although this is only a remote possibility, ironically WPSecure's inbuilt Advanced Encryption Algorithms might trigger false-positive notifications from your installed security software, if the AV definitions are corrupted or stale. To prevent file deletion and service interruption; it is best practice to whitelist the following folder and files within your local Antivirus, Applocker, etc. Add...

Recording wallpaper history


Administrators can configure WPSecure wallpaper package to record wallpaper usage history. Set the following registry value to '1' for wallpaper history to be recorded. For 64 bit machines: ComputerHKEY_LOCAL_MACHINESOFTWAREWOW6432Nodewpsecurehistory For 32 bit machines: ComputerHKEY_LOCAL_MACHINESOFTWAREwpsecurehistory Name: enablehistory (dword). Value: 0 (disable history), 1 (enable history). SCCM Hardware Inventory: To gather this information using SCCM hardware inventory add the following lines into your SCCM configuration.mof...