27 Novell ZENworks Application Virtualization2.12 E DITING THE VIRTUAL REGISTRYZENworks Application Virtualization allows you to embed a virtual registry into yourexecutable. Embedded registry keys are accessible by your ZENworks Application Virtualization-processed application as if they were present in the real registry. Unlike data present in the registryon the host device, virtual registry keys and values are not visible from and do not require changesto the host device. In particular, the use of a virtual registry does not require any securityprivileges on the host device, even if the virtual registry entries reside in a privileged section of theregistry, such as HKEY_LOCAL_MACHINE. Also, because virtual registry entries areembedded in the application executable, other applications are unable to disrupt applicationexecution by inadvertent modification of registry entries required by the application.To add virtual registry data:• Click on the Registry button located on the left side of the ZENworks ApplicationVirtualization window.• Using the view on the right, add the registry keys and values you wish to embed in theapplication executable. When adding blob data, enter the values in hexadecimal format.The Classes root, Current user root, Local machine, and Users root folders correspond to theHKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, andHKEY_USERS keys on the host machine.Registry string values may include well-known root folder variables such as@PROGRAMFILES@ and @WINDIR@.2.12.1 Virtualization SemanticsIn the event of a collision between a key or value in the virtual filesystem and data present on thehost device registry, information in the virtual registry takes precedence.Keys may be virtualized in Full, Merge or Hide mode:• Full mode: Only values in the virtual registry will be visible to the application- even if acorresponding key exists on the host device- and writes are redirected to the user registryarea.• Merge mode: Values present in a virtual key will be merged with values in thecorresponding key on the host machine, if such a key exists. Writes to host keys arepassed through to the host registry and writes to virtual keys are redirected to the userregistry area.• Hide mode: Keys and values in the virtual registry or the corresponding host registry willnot be found by the application at runtime.Tip: To apply the selected isolation mode to all subkeys, right-click on the key, choose Isolation,click on the checkbox for Apply to subkeys, and click OK.2.12.2 Importing Registry Hive Files