Browse Definitions:
File Extension

MSI File Format

Installer package (Microsoft Windows)

MSI file format

MSI is an installer package file format used by Windows. Its name comes from the program’s original title, Microsoft Installer, which has since changed to Windows Installer. MSI files are used for installation, storage, and removal of programs. The files are contained in a package, which is used with the program’s client-side installer service, an .EXE file, to open and install the program.

MIME: application/x-ole-storage, text/mspg-legacyinfo

Learn more about .MSI files:

Learn how to create your own MSI file to deploy applications.

Search for answers to .MSI-related questions on IT Knowledge Exchange.

This was last updated in August 2011
Browse File Extensions Alphabetically:

Join the conversation

13 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

I first heard of msi files while trying to install the tax office 2012 tax form. This msi file will not install.
Cancel
iTunes won't reinstall. Can't find msi file.
Cancel
In the last 8 years, I had always used Windows computers. It was if I had no control whenever I used them. Looked at hidden files, there were tons of MSI or EXE files. Once I found them, my computers crashed. Could not reinstall ever because no matter what version I installed, it would revert back to Windows NT. later found Remote Access reports.
Cancel
I was searching for untrusted files in Norton. Found several .msi files
Cancel
Was looking up how to root my droid. A file I downloaded was msi wanted to make sure I didnt need any thing else to use file
Cancel
The Microsoft tech who downloaded the msi file to help fix my Outlook can't open the msi file and run it. Funny huh? Not so.much
Cancel
I first used a msi when I installed a virus. LOL!
well not really "LOL". I had to buy a new pc.
Cancel
When I used the registry clean up it came up with msi?
Cancel
I came to be aware of .msi files after the unscrupulous Microsoft company caused awful corruption when I tried to upgrade to Win 10. From there its been a very long and expensive sad story with loss of critical text files.
Cancel
You can easily deploy MSI installers to remote computers in your network. Use SCCM or Total Software Deployment for this. Can save you some time no doubt.
Cancel
In trying to opening an MSI product, I didn't know how to open it. It is as simple as that, and I am still having trouble in making the program to work.
Cancel
From reading other comments, I can see that I'm not the only person who has had trouble either understanding msi files and how to get them to work. This an addition to my previous comment.
Cancel
Ok, from what I gather...
.msi are standardized for use with Microsoft Installer ( program is now "Windows Installer") and cause less of a headache for network admins than what was used before they came around. They should be considered more advanced and are often run hidden from view.

.exe are programs/apps that can be used to install programs and can run installers like .msi to accomplish that. Only 1 .msi can run at a time, so a .exe is often used to run them in sequence.

"I first used a msi when I installed a virus. LOL! well not really "LOL". I had to buy a new pc."

>_< This person can't be serious, you just have to do a clean install and walla fixed. No new computer needed.
Cancel

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close