Droplet Droplets are self-contained applications (.exe or .app).  They do not require an installer and can be distributed like other software executables.  Below are tips for common distribution methods.


Droplets are cryptographically signed to prevent tampering and pass Gatekeeper restrictions.  They must be copied using Apple software, or compressed first using the Finder.  To compress a droplet, right-click or control-click on it in the Finder and select "Compress".  Then send the resulting .zip archive to end-users.  Copying through non-Apple software, including ExpeDat and third-party packaging and archiving utilities, without first compressing the application may prevent the droplet from launching or cause it to display the error "This DropDat application has been damaged."


Compressing Windows droplets prior to distributing them is recommended.  Droplets are cryptographically signed to prevent tampering and pass Windows Defender restrictions.  However, Windows systems with EnableCertPaddingCheck enabled are not compatible with DropDat and may prevent droplets from running.  Check with your security administrator if you receive warnings about droplets being unsigned or if they fail with "Unable to seek embedded configuration".

Windows 11 systems running on ARM hardware use code emulation to run x86 binaries. If droplets fail with "Unable to seek embedded configuration" on ARM hardware, you may need to adjust the emulation settings to "Disable application cache".

File Copy

The most reliable way to distribute a droplet is to copy it onto a shared file server, flash drive, or other sharable media.


Droplets can be made available for download on web, FTP, or ExpeDat servers.  You should package them as a .zip first.


Email is the simplest, but least reliable way to send an application.  Some email servers and security software will block or delete email messages that have applications attached.  They may even do this without notifying the sender or the receiver.  The following steps can be taken to maximize the chances of a droplet getting through by email.

White List
Notify recipients in advance and request that they add you to any white lists or trusted sender lists.

For Windows droplets, change the file extension to something other than .exe.  Let the recipient know that they will need to change it back.  This is not necessary or recommended for macOS droplets.

Package macOS droplets as a Finder .zip files.  The macOS Apple Mail program will do this automatically.

Send a separate email to the recipient right after you send the droplet, so that they know it should have arrived and can check their quarantine folder if it did not.