Automated Deployment of Windows 7 and Application Software on Large Installations of Computers Having Similar Hardware
|
|
|
- Baldric Hunter
- 10 years ago
- Views:
Transcription
1 Automated Deployment of Windows 7 and Application Software on Large Installations of Computers Having Similar Hardware Gopesh Tiwari and Narendra S. Rathore Abstract This paper describes an automated procedure to deploy a large number of identical computers with Windows 7 (preferably OEM version) along with a wide variety of application software. The normal Windows Deployment Service (WDS) has been tweaked with, to get a methodology which is suitable for a customized deployment. A quick overview of the setup, the scripts involved and overall methodology has been presented. The advantages over deployment method using conventional WDS and Windows Automated Installation Kit (WAIK) have been explained. Finally, the possibility to harness Intel vpro technology to remotely deploy the computers has been discussed. Index Terms Deployment, operating system, WDS, WAIK, cloning, imaging, automated installation, PXE, VPro. I. INTRODUCTION System administrators at an installation site having a large number of computers with similar hardware generally find it challenging to deploy OS and a long list of applications identically on all computers. Many times, they take up the longer way of installing OS and application software independently on each computer. There exists disk cloning software like Symantec Ghost, or Acronis Snap Deploy which can be used to do the initial disk cloning and thereafter to configure each computer separately. However, these approaches are not only time consuming but also prone to errors. Further this software requires lot of manual intervention in the post-cloning operation to complete the job. Computers today have a PXE boot support. There exist several solutions for computer deployment with Linux or Windows based on PXE boot. These solutions harness the PXE boot capability of the computer to boot it and then use a third party tool like Symantec Ghost or Acronis True Image to restore a preconfigured image on the client computers. But these approaches also lack total automation and simplicity. Post-cloning configurations are still necessitated. Generally, at such installation sites, it is required to have a system which can be used to deploy/redeploy the computers with minimum or no manual intervention by even a poor computer skilled person after a one time customization of the system. Manuscript received November 5, 2013; revised January 27, The authors are with the Computer Centre, Indian Institute of Technology Kanpur, Kanpur, India ( [email protected], [email protected]). A. Challenges in Developing an Automated OS and Application (Re) Deployment System A typical deployment procedure for deploying Windows OS and applications involves many steps. To start with, a reference image is created on a reference computer. The target computers are then booted via some boot image - through local DVD drive or through network. The reference image is restored to all target computers. After the restore the target computers are booted through local hard disk to log in with administrative privileges. The target computers either get the IP address through DHCP or they are given an IP address manually. A computer name is assigned to each computer and then they are joined to an Active Directory (AD) domain. Application software licensing is an added challenge. Software using network licensing pose no problem. But software using volume licensing, like the OS itself and MS Office, for example, make it necessary to include further scripting to manage their licenses. Once the target computers become members of AD domain they are ready for use. Very often one may need to redeploy the computers because of some malfunctioning software, or the requirement to update/add new software. Thus there is a need to create a system which not only automates all these steps involved in the deployment, but also provides a way to do the operation remotely without visiting the individual computers. In a typical scenario, size of the system image is large enough to consume a lot of time to deploy a single computer. This has motivated to design a procedure to support multiple servers for hosting the system image so that the operation can be done in parallel to reduce the overall total deployment time. Further, it helps not only to minimize the need of third party tools but also make the system easy to be operated by a person having no in-depth knowledge of the tools involved. II. PREPARING FOR THE SETUP Windows Deployment Service (WDS) [1] is installed and configured in the Active Directory. A DHCP server is essential for WDS. WAIK [2] is installed to add boot image for Windows PE as default option to the WDS boot images list. Further, it may be required to add the network driver for the target computer to the Windows PE boot image [3]. Using dism or imagex tool (components of WDS) the file statrecovery.bat [Listing1] is inserted in the WinPE boot image in the Windows\System32 folder. To do this, the DOI: /IJIEE.2014.V
2 WinPE WIM image is mounted to any directory using dism tool and then startrecovery.bat file is copied to the Windows\system32 folder available under the mounted directory. Now the WIM image is un-mounted using dism tool with commit switch. The target computers are tested to boot into Windows PE from the WDS using the PXE boot option. These computers must be configured for using the Intel vpro technology (optional) in case remote deployment option is required. Fig. 1. Setup showing all components involved. III. OUTLINE OF THE AUTOMATION SCRIPTS A bundle of nine batch files, ini files, and vbs scripts carry out the deployment process in an automated way. The function of each file is discussed below. 1) Start.reg 2) Start.bat 3) Ip2static.bat 4) Insert.reg 5) IPv4_pcName.vbs 6) JoinDomain.bat 7) Delete.reg 8) DiskOption.ini 9) JoinDomain.vbs Start.reg and Start.bat are the initialization scripts which start the automation process and call the other scripts in order of execution. Start.reg adds a value to the Run key: [HKEY_CURRENT_USER\Software\Microsoft\Wi ndows\currentversion\run] "AutoDep"="C:\Windows\Automate\Start.bat " Start.bat calls the remaining scripts in order of execution ip2static.bat first checks for availability of DHCP server. If DHCP response is not received, it shuts down the computer after popping up an error message. Otherwise, it retrieves the IP address of computer provided by DHCP server and converts the same IP address to static IP address with predefined subnet, default gateway primary DNS server. Insert.reg inserts a value to Run key. This is used once the computer reboots after executing the IPv4_pcName.vbs file (called by ip2static.bat ): [HKEY_CURRENT_USER\Software\Microsoft\Wi ndows\currentversion\run]"autodep"="c:\\ Windows\\Automate\\JoinDomain.Bat" IPv4_pcName.vbs retrieves the IP address to generate a computer name with the help of its last bit. The script issues command to open system properties dialog box. The function objshell.sendkeys is used to send key strokes to the open system properties dialog box. The computer is rebooted automatically after this script ends. 196
3 :: Filename startrecovery.bat to be integrated in the WinPE boot OFF Title Windows Recovery Tool For IIT Kanpur Color 7c net use y: \\<WDS Server>\Lab <password> /User:Administrator cls CALL \\<WDS Server>\Lab\server_assign.cmd :: Call the 'server_assign.cmd' file to select the backup server and start recovery process :: File name server_assign.cmd :: This file can be put on any network share on the WDS server with proper permissions so that users cannot access it. This file is not put in the WinPE image so that it can be easily edited as required for changing backup server Off SET token= for /F "delims=" %%i in (\\<WDS Server>\Lab\tokenPass.txt) do set token=%%i IF %token%==1 GOTO SERVER1 IF %token%==2 GOTO SERVER2.. IF %token%==9 GOTO SERVER9 :SERVER1 Color 0E net use z: /delete /yes net use z: \\<BackupServerIP>\Lab <PASSWORD> /User:Administrator cls Echo. Echo.Windows 7 Backup on Server 1 Echo. ping -n > nul :: Put a delay of 2 seconds SET tmp= Wbadmin get versions -backuptarget:\\<backupserverip>\lab FIND "Version" > %temp%\tmpversion.txt :: Find the backup version from the Backup Sever where backup is kept and :: store the Version value to 'tmpversion.txt' For /F "delims=" %%i in (%temp%\tmpversion.txt) do set tmp=%%i :: Extract the content of 'tmpversion.txt' file and store it to a variable 'tmp' del %temp%\tmpversion.txt Echo Backup Version = "%tmp:~20,16%" Echo. :: Display the Backup Version Echo 2 > \\<WDS Server>\Lab\tokenPass.txt :: Write the token value for using next backup server wbadmin start sysrecovery -recreatedisks -restoreallvolumes -version:%tmp:~20,16% - backuptarget:\\<backupserverip>\lab -quiet :: Start the system recovery process with 'WBADMIN' tool for full system recovery goto:quit :SERVER2 197
4 :: Same code with different backup server address goto:quit :: Similarly populate support for more servers :SERVER9 :: Same code with different backup server address Echo 1 > \\<WDS Server>\Lab\tokenPass.txt :: Write the token value 1 for selecting the first server again as this is the 9 th server. goto:quit :QUIT Wpeutil Reboot Listing 1. Contents of StartRecovery.bat and associated files. JoinDomain.bat first checks whether a domain controller is responding. It shuts down the computer if it does not get a response from any domain controller after displaying error message. Otherwise, the registry entry previously created by Insert.reg is deleted. Further, any pending software activations are taken care of at this stage. In our case the process of activation of Microsoft Office Standard 2010 executes by defining the KMS Server IP address and port number of KMS Server. In this batch file, a disk utility is also used for removing the drive letter of additional partition(s) with the help of DiskOption.ini file. At the end of this file JoinDomain.vbs is initiated for Domain joining process, which is mostly a collection of commands using the function objshell.sendkeys to send appropriate key strokes to dialog boxes, called by the script. A segment of the code explains it: objshell.sendkeys "{TAB}" objshell.sendkeys "{ENTER}" IV. OUTLINE OF OVERALL PROCEDURE One of the target computers is chosen as the reference computer. Application software as required by the site are installed on this computer which has Windows 7 OEM version pre-installed. After joining it to active directory domain, the settings of Windows and application software are customized as per preference of the site environment. Exhaustive testing of the settings is done for a nonprivileged user. Once satisfied, the reference computer is removed from the domain. '* Set System Performance Options (best performance) objshell.run "control sysdm.cpl" Do While objshell.appactivate("system Properties") = FALSE WScript.Sleep 500 '* loop sleep until window is available Loop objshell.sendkeys "{home}" '* ensure general tab focus (default focus on invoke) objshell.sendkeys "{right 3}" '* set focus on Advanced tab objshell.sendkeys "%c" '* Performance section, settings button objshell.sendkeys "{TAB}" objshell.sendkeys "%d" objshell.sendkeys "{TAB}" objshell.sendkeys "Your Domain" WScript.Sleep 500 Fig. 2. Process outline for preparing reference image. Automation scripts and registry settings are added to the appropriate path so that on reboot the computer would do all required post-imaging tasks after auto logon with administrative privileges. It gets an IP address from the DHCP server. The IP address is based on MAC reservation so that a particular computer always gets the same IP address. Though this would have worked, we further assign 198
5 the same IP address as static to the computer with predefined other network settings. We do this for two reasons. One is to avoid network outage in the lab in case of unavailability of DHCP server. Another reason is that there may be a mix of OS platforms. There is a common DHCP server for all platforms. In certain cases, for example, in conducting a computer based examination, it is required to segregate the lab computers from the overall network so that only the segment of the lab where the examination is to be conducted is on restricted network. The computers are locally connected to a server, which is normally a laptop, hosting the examination system. In this scenario, keeping the static IPs is very helpful. Moreover, the load on DHCP server is considerably reduced as it is only required when the computers are being (re)deployed. A. Naming the Computers We use a naming convention like WinPCXXX for the computer name where XXX is the last octet of the IP address. For example, the computer with IP could be assigned the name WinPC204. Using this convention, the script assigns a computer name to the computer. After this step the computer is joined to the domain. The naming convention limits the total number of computers deployable in a group to 254. However, this does not limit the total number of computers deployable in an institution. It is advisable to divide the computers into groups based on department or building or any other parameter, each group containing less than 255 computers. A different prefix based on the name of the group can then be used for the naming convention. In fact, different deployment system can be put for different groups. A system image of the reference computer is made using natively installed windows backup. This is done just after removing the computer from the domain and adding the automation scripts. Multiple copies of the system image are kept on a number of predefined shared locations. These shared locations are as defined in the file server_chooser.cmd [Listing 1] B. Initiating the (Re) Deployment The lab computers are configured to boot through network. By default, they boot with the local hard disk which is set as the default boot option in the PXE boot menu. For carrying out the deployment one uses the arrow keys to select the "recovery" boot loader which boots the system with Windows PE preconfigured to get the image from the predefined location and to start restoring to the drive of the computer. This is the only manual intervention required in the whole setup. Once the restore is complete, the system reboots and the automation scripts take over. A single hosting of the system image can be used to deploy up to two computers simultaneously without any significant loss in the rate of transfer of the image file. When more application software or some new settings are required to be put on all computers, the reference image is again deployed on one of the computers so that it is the reference computer. New applications settings are applied, tested and then the procedure for creating the image is followed. The old image file(s) on the shared location(s) is/are replaced with the new one and all the computers are redeployed with the new image. Users have no data on the local computers. Profiles and home directories are server based. Hence there is no issue even if a user herself redeploys the computer should she find any irregularity with the working of the computer. Fig. 3. Process outline for deploying the copies of reference image. The default boot option received from the PXE is reconfigurable. Hence this fact is exploited to remotely order a redeployment of any computer. The servers hosting the system image is predefined in the deployment setup so a new server is automatically chosen in round robin fashion so as to load balance the image hosting servers. V. WIM BASED DEPLOYMENT VS. SYSTEM IMAGE BASED DEPLOYMENT The normal setup as supported by Microsoft for WDS is through the use of WAIK to create WinPE environment. From WinPE environment, Imagex tool is used to make WIM image of the reference computer. This mode offers advantages for cases where dissimilar hardware is frequent, or in places where the hardware is changed very often. However, the creation of WIM image is time consuming. This is a serious disadvantage as compared to system image based deployment for similar hardware. The creation of system image is much easier and consumes much lesser time. In a typical scenario, generally, there is a need to update the reference image and redeploy all computers at least once in three-four months. This could be due to a variety of reasons need to add new software, need to provide OS and application updates, need to add new preference customizations etc. To add to the list, support for having several copies of WIM image at different hosted locations is lacking. Thus, when similar hardware is involved, the choice of system image based deployment is much more justified. Though system image based deployment is primarily suitable for similar hardware configurations, it can be easily adapted to make it suitable for installations with groups of computers having dissimilar hardware, if these groups each have considerable number of similar computers. Each group can then have a separate reference image. VI. SOME STATISTICS AND METHODS TO INCREASE TOTAL DEPLOYMENT SPEED Though no benchmark tests have been performed, we 199
6 have collected some statistics. For a system image size of 70 GB, a single target computer is made ready to be used by any Active Directory user in about minutes, with 1Gbps LAN. If the image is hosted on a server with SCSI/SAS based disks, the same copy of system image can be used to deploy up to two target computers simultaneously. In Computer Centre at Indian Institute of Technology Kanpur, we have four Windows labs having 161 computers. Two of the labs are in a different building. In this case, one lab of 48 computers is successfully deployed with a system image consisting of Windows 7 Professional 64-bit, and a long list of applications in duration of 4 hours. The applications in the category of Word processing, CAD/CAM, Statistics, Graphical presentation and other miscellaneous software make the image size a little over 70 GB. We have used five SATA disk based locations for hosting the system image. The maximum number of image hosting servers is limited to nine in a single setup. The use of multiple image hosting servers is a unique concept of this deployment system setup. Increasing the number of hosting locations increases the initial preparation time because the image has to be copied to each hosting location, but speeds up the overall deployment process. VII. PREPARING FOR REMOTE DEPLOYMENT USING INTEL VPRO The computer must support Intel vpro technology to carry out the deployment remotely. The computer s BIOS settings have to be configured [4]. After setting up the computer for Intel vpro and AMT, the computer can be fully monitored or controlled in the same way as one would do on physically visiting the computer. The only condition is that the computer should be receiving power and connected to network. For controlling the computers, Intel provides a software called Manageability Commander Tool. This is for testing and developing software that supports the Intel vpro technology. This software is available for development purpose only and not for commercial use. It contains all Intel vpro controlling features including remote commands to shutdown, reboot, redirect to network boot, redirect local CD/DVD or ISO image, lock remote keyboard & mouse etc. This Software contains two main remote control modules - Manageability Terminal Tool and Remote KVM. The Remote KVM is a Remote GUI tool, which shows a large logo of Real VNC. To get rid of this logo one has to purchase real VNC. Remote deployment option is more suitable in case of a few computers being reported as malfunctioning. The administrator can remotely start the redeployment process for the computer without physically visiting it. VIII. CONCLUSION AND SCOPE FOR FUTURE IMPROVEMENTS The procedure to install and restore a computer presented in this paper allows administrators of small and large sites to automate the deployment of Windows 7 and application software. After the initial configuration and customization, the system is very useful in maintaining large installations. In only a few years the investment on time and additional hardware is easily harvested. Support for including any changes in hardware of the target computers is to be explored. A concept of building a universal image which would work on computers of almost all makes is in the pipeline. Though such a system has been reported to be in use with Windows XP [5], it needs to be worked out and tested for the current setup. Though possibility of multicast deployment has been explored [6], it has been found to deteriorate the overall network performance. It is advisable to segregate the section of network where the multicast deployment is being carried out. The system is yet to be extended to support ipv6. ACKNOWLEDGMENT We acknowledge system administrators, faculty members and students of Indian Institute of Technology Kanpur to help in testing out the deployment setup and give timely feedbacks. REFERENCES [1] Microsoft. (July 2013). On Windows Deployment Services Getting Started Guide. Microsoft Technet [Online]. Available: [2] Microsoft. (June 2013). On the Windows Automated Installation Kit (AIK) for Windows 7. Microsoft Download Centre. [Online]. Available: [3] Microsoft. (July 2013). On How to Add Windows Device Drivers to a Boot Image. Microsoft Technet. [Online]. Available: [4] Intel. (June 2013). On Intel vpro Technology. Intel Website. [Online]. Available: [5] S. G. Lewis and Sara K. Rodgers, "Universal imaging: revolutionizing desktop support," presented at the 33rd annual ACM SIGUCCS fall conference, Monterey, CA, November 6-9, [6] Microsoft. (June 2013). On Performing Multicast Deployments. Microsoft Technet. [Online]. Available: Gopesh Tiwari received B.Tech. degree in electrical engineering from G.B. Pant University, Pantnagar, India, in 1992 and M.Tech. degree in electrical engineering from Institute of Technology, Banaras Hindu University, Varanasi, India, in He is currently a senior computer engineer at Indian Institute of Technology Kanpur, Kanpur, India. He was born in 1967 at Allahabad, India. His research interests are in the areas of automated large scale deployment of computers, virtualization, computer networking, remote monitoring of servers and lab computers. He may be contacted on his [email protected]. Narendra S. Rathore is appearing for MCA from Lovely Professional University, Jalandhar, India. He is currently working as a technical associate at Indian Institute of Technology Kanpur, Kanpur, India. He was born in 1981 at Kanpur, India. His field of interest is deployment and troubleshooting of Windows operating system and scripting in Visual Basic. 200
System Area Manager. Remote Management
System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for
Planning and Managing Windows 7 Desktop Deployments & Environments - 6294 Version 7
Planning and Managing Windows 7 Desktop Deployments & Environments - 6294 Version 7 Note This course is not scheduled to be released until January of 2010. Overview This five-day instructor-led course
Acronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent
UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0
UltraBac Documentation UBDR Gold Bare Metal Disaster Recovery Administrator Guide UBDR Gold v8.0 UBDR Administrator Guide UBDR Gold v8.0 The software described in this guide is furnished under a license
Installing and Upgrading to Windows 7
Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
Acronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Planning and Managing Windows 7 Desktop Deployments and Environments
Planning and Managing Windows 7 Desktop s and s Introduction This five-day instructor-led course is intended for desktop administrators who want to specialize in desktop deployment, configuration, and
Appendix B Lab Setup Guide
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
Dell NetVault Bare Metal Recovery 10.5. User s Guide
Dell NetVault Bare Metal Recovery 10.5 User s Guide Copyright 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the
MS-6294- Planning and Managing Windows 7 Desktop Deployment and Environments
MS-6294- Planning and Managing Windows 7 Desktop Deployment and Environments Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
Paragon Recovery Media Builder
PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com E-mail [email protected] Paragon
IT-Pruefungen.de. Hochwertige Qualität, neueste Prüfungsunterlagen. http://www.it-pruefungen.de
IT-Pruefungen.de Hochwertige Qualität, neueste Prüfungsunterlagen http://www.it-pruefungen.de Exam : 70-681 Title : TS: Windows 7 and Office 2010, Deploying Version : Demo 1. You have a single-domain Active
Acronis Backup & Recovery 10 Workstation. Installation Guide
Acronis Backup & Recovery 10 Workstation Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for Windows...
Planning and Managing Windows 7 Desktop Deployments and Environments
Planning and Managing Windows 7 Desktop Deployments and Environments Course Details Duration: Course code: 5 Days M6294 Overview: This five-day instructor-led course is intended for desktop administrators
Configuring and Using AMT on TS140 and TS440
Configuring and Using AMT on TS140 and TS440 Lenovo ThinkServer TS Series Servers Lenovo Enterprise Product Group Version 1.0 September 17, 2013 2013 Lenovo. All rights reserved. LENOVO PROVIDES THIS PUBLICATION
Windows Deployment Services
Windows Deployment Services WDS for Large Scale Enterprises and Small IT Shops Presented By: Ryan Drown [email protected] Systems Administrator for Krannert School of Management at Purdue University Owner
Configuring Virtual Blades
CHAPTER 14 This chapter describes how to configure virtual blades, which are computer emulators that reside in a WAE or WAVE device. A virtual blade allows you to allocate WAE system resources for use
Administering Windows-based HP Thin Clients with System Center 2012 R2 Configuration Manager SP1
Technical white paper Administering Windows-based HP Thin Clients with System Center 2012 R2 Configuration Manager SP1 Table of contents Executive summary... 3 Configuration Manager features... 3 Asset
Intel NUC. Installing Microsoft Windows* 7 from USB Flash Drives onto USB 3.0 Computers
Intel NUC Installing Microsoft Windows* 7 from USB Flash Drives onto USB 3.0 Computers July 2015 1 Introduction 1.1 Document Scope The following document details the installation of a non-xhci operating
Please ring the Service Desk on 8204 1866 or 1300 363 227 if you require assistance or encounter problems.
BEFORE YOU BEGIN Sites that do not have an Administration File Server are known as Peer to Peer sites. They have only Administration Workstations with one workstation that performs the nightly backup process.
NE-6294A Planning and Managing Windows 7 Desktop Deployments and Environments
NE-6294A Planning and Managing Windows 7 Desktop s and s Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 04 January 2010 300 Windows 7 Delivery Method Instructor-led
How To Manage Hard Disk Partitioning In Windows 8.1.2 (Windows 8) (Windows 7) (Powerbook) (For Windows 8) And Windows 8 (Pro) (Winstone) (Probation) (Perl
Exam : 70-688 Title : Managing and Maintaining Windows 8 Version : Demo 1 / 19 1.DRAG DROP Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not
Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA
Paul McFedries Microsoft Windows9 Home Server 2011 LEASHE Third Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration
Paragon Boot Media Builder
1 Paragon Boot Media Builder General guide on installing WAIK/ADK and using Boot Media Builder 2 Contents Introduction... 3 Key Features... 3 Building a WinPE Environment... 3 Download and Install the
Windows Embedded Standard 7 Technical Overview
Windows Embedded Standard 7 Technical Overview Introduction Windows Embedded Standard 7 is the next generation platform in the product family that includes Windows XP Embedded and Windows Embedded Standard
Cristie Automated Disaster Recovery. User Guide
User Guide Product Version: 6.3 Cristie Software Ltd. New Mill Chestnut Lane Stroud GL5 3EH United Kingdom Tel:+44(0)1453 847000 Fax:+44(0)1453 847001 [email protected] Cristie Data Products GmbH Nordring
FUJITSU Software ServerView Suite ServerView Installation Manager
User Guide - English FUJITSU Software ServerView Suite ServerView Installation Manager Edition July 2015 Comments Suggestions Corrections The User Documentation Department would like to know your opinion
Installing the Operating System or Hypervisor
Installing the Operating System or Hypervisor If you purchased E-Series Server Option 1 (E-Series Server without preinstalled operating system or hypervisor), you must install an operating system or hypervisor.
How to Integrate SmartDeploy with Windows Deployment Services
How to Integrate SmartDeploy with Windows Deployment Services SmartDeploy Revised: October 2014 Integrating custom Windows Imaging Format (WIM) images into Windows Deployment Services (WDS) lets you take
ALTIRIS Deployment Solution 6.8 Preboot Automation Environment
ALTIRIS Deployment Solution 6.8 Preboot Automation Environment The information contained in the Altiris knowledgebase is subject to the Terms of Use as outlined at http://www.altiris.com/legal/termsofuse.asp.
Microsoft Windows Compute Cluster Server 2003 Getting Started Guide
Microsoft Windows Compute Cluster Server 2003 Getting Started Guide Part Number 434709-003 March 2007 (Third Edition) Copyright 2006, 2007 Hewlett-Packard Development Company, L.P. The information contained
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Update 0 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for
Acronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Windows... 3 1.1.2 Management
Windows 7 Portable Command Guide: MOTS 70-680, and MCITP 70-685
Windows 7 Portable Command Guide: MOTS 70-680, and MCITP 70-685 and 70-686 Darril Gibson 800 East 96th Street Indianapolis, Indiana 46240 USA Table of Contents INTRODUCTION 1 PART I: Command Prompt Basics
Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
Acronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows
Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.
Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual
Course Outline. ttttttt
1300 86 87246 1300 TO TRAIN 50292 - Administering and Maintaining General Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer, maintain,
SPECOPS DEPLOY / OS 4.6 DOCUMENTATION
Technical documentation: SPECOPS DEPLOY / OS 4.6 DOCUMENTATION By Shay Byrne, Product Manager 1 Getting Started... 4 1.1 Specops Deploy / OS Supported Configurations...4 1.2 Specops Deploy and Active Directory...
DeployStudio Server Quick Install
DeployStudio Server Quick Install v1.7.0 The DeployStudio Team [email protected] Requirements OS X 10.7.5 to 10.11.1 DeployStudioServer_v1.7.x.pkg and later NetBoot based deployment 100 Mb/s switched
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
MDM Mass Configuration Tool User s Manual
User s Manual First Edition, October 2010 www.moxa.com/product 2010 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. User s Manual The software described in this manual is
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Windows Server 2008 R2 Essentials
Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution
Backup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3
NOC PS manual Copyright Maxnet 2009 2015 All rights reserved Page 1/45 Table of contents Installation...3 System requirements...3 Network setup...5 Installation under Vmware Vsphere...8 Installation under
Http://www.passcert.com
Http://www.passcert.com Exam: 70-681 Title : TS: Windows 7 and Office 2010, Deploying Version : DEMO 1 / 8 1. You have a single-domain Active Directory Domain Services (AD DS) forest. All servers run Windows
Image Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
Microsoft" Windows8 Home Server
Paul MeFedries Microsoft" Windows8 Home Server I UNLEASHED Second Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration
Networking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing
MCTS Guide to Microsoft Windows 7 Chapter 13 Enterprise Computing Objectives Understand Active Directory Use Group Policy to control Windows 7 Control device installation with Group Policy settings Plan
UNICORN 6.4. Administration and Technical Manual
UNICORN 6.4 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
What s New in Ghost Solution Suite 3.0
What s New in Ghost Solution Suite 3.0 This document highlights some of the most impactful new features of Ghost Solution Suite 3.0 For more comprehensive information, please view the Ghost Solution Suite
User Manual. Copyright Rogev LTD
User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's
Acronis Backup & Recovery 10 Advanced Server SBS Edition. Installation Guide
Acronis Backup & Recovery 10 Advanced Server SBS Edition Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1.
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics
Using iscsi with BackupAssist. User Guide
User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...
Installing Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
Enterprise Erase LAN
Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide 888.700.8560 toll free www.tabernus.com 11130 Jollyville Rd Suite 301 Austin, TX 78757 Table of Contents 1 Product
Step-by-Step Guide for Windows Deployment Services in Windows Server 2008 to be used as an internal resource only
Windows Deployment Services is the updated and redesigned version of Remote Installation Services (RIS). Windows Deployment Services enables you to deploy Windows operating systems over the network, which
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Image Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
How to Install Microsoft Windows Server 2008 R2 in VMware ESXi
How to Install Microsoft Windows Server 2008 R2 in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
Remote Backup Software User Manual V 2.0
Remote Backup Software User Manual V 2.0 Table of Contents Chapter 1 Welcome to Remote Backup Software... 2 1.1 Overview... 2 1.2 Computer Disposition Request... 2 1.3 Convention... 2 Chapter 2 Installing
5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual
5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75511R/VPMA-75511R) Operates... 1 1-1 SteelVine
Installing and Configuring Windows Server 2008. Module Overview 14/05/2013. Lesson 1: Planning Windows Server 2008 Installation.
Installing and Configuring Windows Server 2008 Tom Brett Module Overview Planning Windows Server 2008 Installations Performing a Windows Server 2008 Installation Configuring Windows Server 2008 Following
5nine Hyper-V Commander
5nine Hyper-V Commander 5nine Hyper-V Commander provides a local graphical user interface (GUI), and a Framework to manage Hyper-V R2 server and various functions such as Backup/DR, HA and P2V/V2V. It
Product Description. Licenses Notice. Introduction TC-200
User Manual TC-200 Introduction TC-200 Product Description The TC-200 provides the fastest Thin Client performance on the market, It runs embedded Linux, swing user interface, Citrix 6.3, Microsoft RDP
WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER
TECHNICAL NOTES WINDOWS SERVER 2008 OFFLINE SYSTEM RECOVERY USING WINDOWS SERVER BACKUP WITH NETWORKER NETWORKER RELEASE 7.4 SERVICE PACK 2 AND LATER TECHNICAL NOTE P/N 300-010-339 REV A02 Table of Contents
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led
Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer,
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
Apple Server Diagnostics User Guide. For Version 3X106
Apple Server Diagnostics User Guide For Version 3X106 KKApple Inc. 2009 Apple Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide
Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Microsoft Corporation Published: October 2010 Abstract This step-by-step guide walks you through the
Reborn Card NET. User s Manual
Reborn Card NET User s Manual Table of Contents Notice Before Installation:... 2 System Requirements... 3 1. First Installation... 4 2. Hardware Setup... 4 3. Express Installation... 6 4. How to setup
Windows Administration Terminal Services, AD and the Windows Registry. INLS 576 Spring 2011 Tuesday, February 24, 2011
Windows Administration Terminal Services, AD and the Windows Registry INLS 576 Spring 2011 Tuesday, February 24, 2011 Terminal Services Uses RDP (Remote Desktop Protocol), relies on TCP/IP, and falls under
ACP ThinManager Tech Notes Troubleshooting Guide
ACP ThinManager Tech Notes Troubleshooting Guide Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit www.thinmanager.com/technotes/ to download the manual, manual
Altiris Deployment Solution 6.9 SP5 from Symantec User s Guide
Altiris Deployment Solution 6.9 SP5 from Symantec User s Guide Copyright 2008, 2009, 2010 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Altiris and any Altiris or Symantec trademarks
How to Scale out SharePoint Server 2007 from a single server farm to a 3 server farm with Microsoft Network Load Balancing on the Web servers.
1 How to Scale out SharePoint Server 2007 from a single server farm to a 3 server farm with Microsoft Network Load Balancing on the Web servers. Back to Basics Series By Steve Smith, MVP SharePoint Server,
Installing Operating Systems
CHAPTER 6 The unattended operating system installation function helps you install the Microsoft Windows and RedHat Linux operating system families. UCS-SCU has integrated device drivers including RAID
Using the IPMI interface
Using the IPMI interface The T800, T1600 and T3200 server models are equipped with an IPMI interface with KVM / IP functionality. This enables you to access the server console if it becomes inaccessible
MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.
MS-50292: Administering and Maintaining Windows 7 This five-day instructor-led course provides students with the knowledge and skills to successfully install, maintain, and troubleshoot Windows 7 computers.
Preparing Hyper-V Templates for Windows Server 2008 in HC
Preparing Hyper-V Templates for Windows Server 2008 in HC Table Of Contents Proprietary Notice... 5 Target Audience... 6 Document Conventions... 6 About Virtualization and Hyper-V... 7 HC Help... 8 Creating
Paragon Protect & Restore
PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Email [email protected] Product website : www.protect-restore.com
UNICORN 7.0. Administration and Technical Manual
UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
EHCI Removal from 6 th Generation Intel Core Processor Family Platform Controller Hub (PCH)
EHCI Removal from 6 th Generation Intel Core Processor Family Platform Controller Hub (PCH) Technical White Paper September 2015 Revision 1.0 333136-001 You may not use or facilitate the use of this document
EaseUS Todo Backup PXE Server
EaseUS Todo Backup PXE Server ----New added in EaseUS Todo Backup 4.6 EaseUS Todo Backup 4.6 adds PXE Server in Todo Backup Server, Todo Backup Advanced Server and Todo Backup Technician. EaseUS Todo Backup
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
FOG Guide. IPBRICK International. July 17, 2013
FOG Guide IPBRICK International July 17, 2013 1 Copyright c IPBRICK International All rights reserved. The information in this manual is subject to change without prior notice. The presented explanations,
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
17 April 2014. Remote Scan
17 April 2014 Remote Scan 2014 Electronics For Imaging. The information in this publication is covered under Legal Notices for this product. Contents 3 Contents...5 Accessing...5 Mailboxes...5 Connecting
