Browse Definitions:
File Extension

MSI File Format

Installer package (Microsoft Windows)

MSI file format

MSI is an installer package file format used by Windows. Its name comes from the program’s original title, Microsoft Installer, which has since changed to Windows Installer. MSI files are used for installation, storage, and removal of programs. The files are contained in a package, which is used with the program’s client-side installer service, an .EXE file, to open and install the program.

MIME: application/x-ole-storage, text/mspg-legacyinfo

Learn more about .MSI files:

Learn how to create your own MSI file to deploy applications.

Search for answers to .MSI-related questions on IT Knowledge Exchange.

This was last updated in August 2011
Browse File Extensions Alphabetically:

Ask a Question. Find an Answer.

Ask your peers a question about this file extension.

Ask a Question

Join the conversation

15 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

I first heard of msi files while trying to install the tax office 2012 tax form. This msi file will not install.
Cancel
iTunes won't reinstall. Can't find msi file.
Cancel
In the last 8 years, I had always used Windows computers. It was if I had no control whenever I used them. Looked at hidden files, there were tons of MSI or EXE files. Once I found them, my computers crashed. Could not reinstall ever because no matter what version I installed, it would revert back to Windows NT. later found Remote Access reports.
Cancel
I was searching for untrusted files in Norton. Found several .msi files
Cancel
Was looking up how to root my droid. A file I downloaded was msi wanted to make sure I didnt need any thing else to use file
Cancel
The Microsoft tech who downloaded the msi file to help fix my Outlook can't open the msi file and run it. Funny huh? Not so.much
Cancel
I first used a msi when I installed a virus. LOL!
well not really "LOL". I had to buy a new pc.
Cancel
When I used the registry clean up it came up with msi?
Cancel
I came to be aware of .msi files after the unscrupulous Microsoft company caused awful corruption when I tried to upgrade to Win 10. From there its been a very long and expensive sad story with loss of critical text files.
Cancel
You can easily deploy MSI installers to remote computers in your network. Use SCCM or Total Software Deployment for this. Can save you some time no doubt.
Cancel
In trying to opening an MSI product, I didn't know how to open it. It is as simple as that, and I am still having trouble in making the program to work.
Cancel
From reading other comments, I can see that I'm not the only person who has had trouble either understanding msi files and how to get them to work. This an addition to my previous comment.
Cancel
Ok, from what I gather...
.msi are standardized for use with Microsoft Installer ( program is now "Windows Installer") and cause less of a headache for network admins than what was used before they came around. They should be considered more advanced and are often run hidden from view.

.exe are programs/apps that can be used to install programs and can run installers like .msi to accomplish that. Only 1 .msi can run at a time, so a .exe is often used to run them in sequence.

"I first used a msi when I installed a virus. LOL! well not really "LOL". I had to buy a new pc."

>_< This person can't be serious, you just have to do a clean install and walla fixed. No new computer needed.
Cancel
How do you convert .war file into .msi file
Cancel
I have a Samsung tablet and I need a program that will allow for an MSI program to run in it. Is there an app out there that will allow for this to take place?
Cancel

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • Red Hat OpenStack Platform

    Red Hat OpenStack Platform is a commercially supported distribution of open source OpenStack software designed to build and ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close