That's a fair and logical answer, and I appreciate it. However, my company's proprietary applications were installed via IT through an encrypted installer.
I can't recreate that environment, despite very much wanting to do so I'm afraid.
But now that you mention it, I suppose I could...