Browse Definitions :
File Extension

MSI File Format

Installer package (Microsoft Windows)

MSI file format

MSI is an installer package file format used by Windows. Its name comes from the program’s original title, Microsoft Installer, which has since changed to Windows Installer. MSI files are used for installation, storage, and removal of programs. The files are contained in a package, which is used with the program’s client-side installer service, an .EXE file, to open and install the program.

MIME: application/x-ole-storage, text/mspg-legacyinfo

Learn more about .MSI files:

Learn how to create your own MSI file to deploy applications.

Search for answers to .MSI-related questions on IT Knowledge Exchange.

This was last updated in August 2011
Browse File Extensions Alphabetically:

Join the conversation

15 comments

Send me notifications when other members comment.

Please create a username to comment.

I first heard of msi files while trying to install the tax office 2012 tax form. This msi file will not install.
Cancel
iTunes won't reinstall. Can't find msi file.
Cancel
In the last 8 years, I had always used Windows computers. It was if I had no control whenever I used them. Looked at hidden files, there were tons of MSI or EXE files. Once I found them, my computers crashed. Could not reinstall ever because no matter what version I installed, it would revert back to Windows NT. later found Remote Access reports.
Cancel
I was searching for untrusted files in Norton. Found several .msi files
Cancel
Was looking up how to root my droid. A file I downloaded was msi wanted to make sure I didnt need any thing else to use file
Cancel
The Microsoft tech who downloaded the msi file to help fix my Outlook can't open the msi file and run it. Funny huh? Not so.much
Cancel
I first used a msi when I installed a virus. LOL!
well not really "LOL". I had to buy a new pc.
Cancel
When I used the registry clean up it came up with msi?
Cancel
I came to be aware of .msi files after the unscrupulous Microsoft company caused awful corruption when I tried to upgrade to Win 10. From there its been a very long and expensive sad story with loss of critical text files.
Cancel
You can easily deploy MSI installers to remote computers in your network. Use SCCM or Total Software Deployment for this. Can save you some time no doubt.
Cancel
In trying to opening an MSI product, I didn't know how to open it. It is as simple as that, and I am still having trouble in making the program to work.
Cancel
From reading other comments, I can see that I'm not the only person who has had trouble either understanding msi files and how to get them to work. This an addition to my previous comment.
Cancel
Ok, from what I gather...
.msi are standardized for use with Microsoft Installer ( program is now "Windows Installer") and cause less of a headache for network admins than what was used before they came around. They should be considered more advanced and are often run hidden from view.

.exe are programs/apps that can be used to install programs and can run installers like .msi to accomplish that. Only 1 .msi can run at a time, so a .exe is often used to run them in sequence.

"I first used a msi when I installed a virus. LOL! well not really "LOL". I had to buy a new pc."

>_< This person can't be serious, you just have to do a clean install and walla fixed. No new computer needed.
Cancel
How do you convert .war file into .msi file
Cancel
I have a Samsung tablet and I need a program that will allow for an MSI program to run in it. Is there an app out there that will allow for this to take place?
Cancel

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close