mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
more content and fixes
This commit is contained in:
parent
2dbd860d36
commit
4446a78eea
@ -30,6 +30,7 @@ Description here.
|
|||||||
## Install the Microsoft Deployment Toolkit (MDT)
|
## Install the Microsoft Deployment Toolkit (MDT)
|
||||||
|
|
||||||
1. On SRV1, temporarily disable IE Enhanced Security Configuration for Administrators by typing the following commands at an elevated Windows PowerShell prompt:
|
1. On SRV1, temporarily disable IE Enhanced Security Configuration for Administrators by typing the following commands at an elevated Windows PowerShell prompt:
|
||||||
|
|
||||||
```
|
```
|
||||||
$AdminKey = "HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{A509B1A7-37EF-4b3f-8CFC-4F3A74704073}"
|
$AdminKey = "HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{A509B1A7-37EF-4b3f-8CFC-4F3A74704073}"
|
||||||
Set-ItemProperty -Path $AdminKey -Name “IsInstalled” -Value 0
|
Set-ItemProperty -Path $AdminKey -Name “IsInstalled” -Value 0
|
||||||
@ -40,6 +41,7 @@ Description here.
|
|||||||
3. Download and install the latest [Windows Assessment and Deployment Kit (ADK)](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) on SRV1 using the default installation settings. The current version is the ADK for Windows 10, version 1607. Installation might require several minutes to acquire all components.
|
3. Download and install the latest [Windows Assessment and Deployment Kit (ADK)](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) on SRV1 using the default installation settings. The current version is the ADK for Windows 10, version 1607. Installation might require several minutes to acquire all components.
|
||||||
|
|
||||||
3. If desired, re-enable IE Enhanced Security Configuration:
|
3. If desired, re-enable IE Enhanced Security Configuration:
|
||||||
|
|
||||||
```
|
```
|
||||||
Set-ItemProperty -Path $AdminKey -Name “IsInstalled” -Value 1
|
Set-ItemProperty -Path $AdminKey -Name “IsInstalled” -Value 1
|
||||||
Stop-Process -Name Explorer
|
Stop-Process -Name Explorer
|
||||||
@ -48,6 +50,7 @@ Description here.
|
|||||||
## Create a deployment share
|
## Create a deployment share
|
||||||
|
|
||||||
1. In [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md) the Windows 10 Enterprise .iso file was saved to the c:\VHD directory as **c:\VHD\w10-enterprise.iso**. The first step in creating a deployment share is to mount this file on SRV1. To mount the Windows 10 Enterprise DVD on SRV1, open an elevated Windows PowerShell prompt on the Hyper-V host computer and type the following command:
|
1. In [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md) the Windows 10 Enterprise .iso file was saved to the c:\VHD directory as **c:\VHD\w10-enterprise.iso**. The first step in creating a deployment share is to mount this file on SRV1. To mount the Windows 10 Enterprise DVD on SRV1, open an elevated Windows PowerShell prompt on the Hyper-V host computer and type the following command:
|
||||||
|
|
||||||
```
|
```
|
||||||
Set-VMDvdDrive -VMName SRV1 -Path c:\VHD\w10-enterprise.iso
|
Set-VMDvdDrive -VMName SRV1 -Path c:\VHD\w10-enterprise.iso
|
||||||
```
|
```
|
||||||
@ -147,6 +150,7 @@ Description here.
|
|||||||
```
|
```
|
||||||
|
|
||||||
20. Click **Apply** and then click **Edit Bootstrap.ini**. Replace the contents of the Bootstrap.ini file with the following text, and save the file:
|
20. Click **Apply** and then click **Edit Bootstrap.ini**. Replace the contents of the Bootstrap.ini file with the following text, and save the file:
|
||||||
|
|
||||||
```
|
```
|
||||||
[Settings]
|
[Settings]
|
||||||
Priority=Default
|
Priority=Default
|
||||||
@ -291,6 +295,7 @@ This procedure will demonstrate how to deploy the reference image to the PoC env
|
|||||||
>In this example a **MachineObjectOU** entry is not provided. Normally this entry describes the specific OU where new client computer objects are created in Active Directory. However, for the purposes of this test lab clients are added to the default computers OU, which requires that this parameter be unspecified.
|
>In this example a **MachineObjectOU** entry is not provided. Normally this entry describes the specific OU where new client computer objects are created in Active Directory. However, for the purposes of this test lab clients are added to the default computers OU, which requires that this parameter be unspecified.
|
||||||
|
|
||||||
4. Click **Edit Bootstap.ini** and replace text in the file with the following text:
|
4. Click **Edit Bootstap.ini** and replace text in the file with the following text:
|
||||||
|
|
||||||
```
|
```
|
||||||
[Settings]
|
[Settings]
|
||||||
Priority=Default
|
Priority=Default
|
||||||
@ -378,6 +383,7 @@ This procedure will demonstrate how to deploy the reference image to the PoC env
|
|||||||
This topic will demonstrate how to export user data from an existing client computer, wipe the computer, install a new operating system, and then restore user data and settings. The scenario will use PC1, a computer that was cloned from a physical device to a VM, as described in [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md).
|
This topic will demonstrate how to export user data from an existing client computer, wipe the computer, install a new operating system, and then restore user data and settings. The scenario will use PC1, a computer that was cloned from a physical device to a VM, as described in [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md).
|
||||||
|
|
||||||
1. Create a checkpoint for the PC1 VM so that it can easily be reverted to its current state for troubleshooting purposes and to perform additional scenarios. Checkpoints are also known as snapshots. To create a checkpoint for the PC1 VM, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
1. Create a checkpoint for the PC1 VM so that it can easily be reverted to its current state for troubleshooting purposes and to perform additional scenarios. Checkpoints are also known as snapshots. To create a checkpoint for the PC1 VM, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||||
|
|
||||||
```
|
```
|
||||||
Checkpoint-VM -Name PC1 -SnapshotName BeginState
|
Checkpoint-VM -Name PC1 -SnapshotName BeginState
|
||||||
```
|
```
|
||||||
@ -410,10 +416,12 @@ This topic will demonstrate how to export user data from an existing client comp
|
|||||||
7. Sign in with the CONTOSO\Administrator account and verify that all CONTOSO domain user accounts and data have been migrated to the new operating system.
|
7. Sign in with the CONTOSO\Administrator account and verify that all CONTOSO domain user accounts and data have been migrated to the new operating system.
|
||||||
|
|
||||||
8. Create another checkpoint for the PC1 VM so that you can review results of the computer refresh later. To create a checkpoint, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
8. Create another checkpoint for the PC1 VM so that you can review results of the computer refresh later. To create a checkpoint, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||||
|
|
||||||
```
|
```
|
||||||
Checkpoint-VM -Name PC1 -SnapshotName RefreshState
|
Checkpoint-VM -Name PC1 -SnapshotName RefreshState
|
||||||
```
|
```
|
||||||
9. Restore the PC1 VM to it's previous state in preparation for the replace procedure. To restore a checkpoint, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
9. Restore the PC1 VM to it's previous state in preparation for the replace procedure. To restore a checkpoint, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||||
|
|
||||||
```
|
```
|
||||||
Restore-VMSnapshot -VMName PC1 -Name BeginState -Confirm:$false
|
Restore-VMSnapshot -VMName PC1 -Name BeginState -Confirm:$false
|
||||||
Start-VM PC1
|
Start-VM PC1
|
||||||
@ -432,6 +440,7 @@ At a high level, the computer replace process consists of:<BR>
|
|||||||
1. On SRV1, in the deployment workbench console, right-click the MDT Production deployment share, click **Properties**, click the **Rules** tab, and change the line **SkipUserData=YES** to **SkipUserData=NO**.
|
1. On SRV1, in the deployment workbench console, right-click the MDT Production deployment share, click **Properties**, click the **Rules** tab, and change the line **SkipUserData=YES** to **SkipUserData=NO**.
|
||||||
2. Click **OK**, right-click **MDT Production**, click **Update Deployment Share** and accept the default options in the wizard to update the share.
|
2. Click **OK**, right-click **MDT Production**, click **Update Deployment Share** and accept the default options in the wizard to update the share.
|
||||||
3. Type the following commands at an elevated Windows PowerShell prompt on SRV1:
|
3. Type the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||||
|
|
||||||
```
|
```
|
||||||
New-Item -Path C:\MigData -ItemType directory
|
New-Item -Path C:\MigData -ItemType directory
|
||||||
New-SmbShare -Name MigData$ -Path C:\MigData -ChangeAccess EVERYONE
|
New-SmbShare -Name MigData$ -Path C:\MigData -ChangeAccess EVERYONE
|
||||||
@ -450,16 +459,19 @@ At a high level, the computer replace process consists of:<BR>
|
|||||||
#### Run the backup-only task sequence
|
#### Run the backup-only task sequence
|
||||||
|
|
||||||
1. If you are not already signed on to PC1 as **contoso\administrator**, sign in using this account. To verify the currently signed in account, type the following command at an elevated command prompt:
|
1. If you are not already signed on to PC1 as **contoso\administrator**, sign in using this account. To verify the currently signed in account, type the following command at an elevated command prompt:
|
||||||
|
|
||||||
```
|
```
|
||||||
whoami
|
whoami
|
||||||
```
|
```
|
||||||
2. To ensure a clean environment before running the backup task sequence, type the following at an elevated Windows PowerShell prompt:
|
2. To ensure a clean environment before running the backup task sequence, type the following at an elevated Windows PowerShell prompt:
|
||||||
|
|
||||||
```
|
```
|
||||||
Remove-Item c:\minint -recurse
|
Remove-Item c:\minint -recurse
|
||||||
Remove-Item c:\_SMSTaskSequence -recurse
|
Remove-Item c:\_SMSTaskSequence -recurse
|
||||||
Restart-Computer
|
Restart-Computer
|
||||||
```
|
```
|
||||||
2. Sign in to PC1 using the contoso\administrator account, and then type the following at an elevated command prompt:
|
2. Sign in to PC1 using the contoso\administrator account, and then type the following at an elevated command prompt:
|
||||||
|
|
||||||
```
|
```
|
||||||
cscript \\SRV1\MDTProd$\Scripts\Litetouch.vbs
|
cscript \\SRV1\MDTProd$\Scripts\Litetouch.vbs
|
||||||
```
|
```
|
||||||
@ -470,6 +482,7 @@ At a high level, the computer replace process consists of:<BR>
|
|||||||
4. While the task sequence is running on PC1, open the deployment workbench console on SRV1 and click the **Monitoring* node. Press F5 to refresh the console, and view the status of current tasks.
|
4. While the task sequence is running on PC1, open the deployment workbench console on SRV1 and click the **Monitoring* node. Press F5 to refresh the console, and view the status of current tasks.
|
||||||
5. Verify that **The user state capture was completed successfully** is displayed, and click **Finish** when the capture is complete.
|
5. Verify that **The user state capture was completed successfully** is displayed, and click **Finish** when the capture is complete.
|
||||||
6. On SRV1, verify that the file **USMT.MIG** was created in the **C:\MigData\PC1\USMT** directory. See the following example:
|
6. On SRV1, verify that the file **USMT.MIG** was created in the **C:\MigData\PC1\USMT** directory. See the following example:
|
||||||
|
|
||||||
```
|
```
|
||||||
PS C:\> dir C:\MigData\PC1\USMT
|
PS C:\> dir C:\MigData\PC1\USMT
|
||||||
|
|
||||||
@ -482,15 +495,18 @@ At a high level, the computer replace process consists of:<BR>
|
|||||||
#### Deploy PC3
|
#### Deploy PC3
|
||||||
|
|
||||||
1. On the Hyper-V host, type the following commands at an elevated Windows PowerShell prompt:
|
1. On the Hyper-V host, type the following commands at an elevated Windows PowerShell prompt:
|
||||||
|
|
||||||
```
|
```
|
||||||
New-VM –Name "PC3" –NewVHDPath "c:\vhd\pc3.vhdx" -NewVHDSizeBytes 60GB -SwitchName poc-internal -BootDevice NetworkAdapter -Generation 2
|
New-VM –Name "PC3" –NewVHDPath "c:\vhd\pc3.vhdx" -NewVHDSizeBytes 60GB -SwitchName poc-internal -BootDevice NetworkAdapter -Generation 2
|
||||||
Set-VMMemory -VMName "PC3" -DynamicMemoryEnabled $true -MinimumBytes 512MB -MaximumBytes 2048MB -Buffer 20
|
Set-VMMemory -VMName "PC3" -DynamicMemoryEnabled $true -MinimumBytes 512MB -MaximumBytes 2048MB -Buffer 20
|
||||||
```
|
```
|
||||||
2. Temporarily disable the external network adapter on SRV1 again, so that we can successfully boot PC3 from WDS. To disable the adapter, type the following command at an elevated Windows PowerShell prompt on SRV1:
|
2. Temporarily disable the external network adapter on SRV1 again, so that we can successfully boot PC3 from WDS. To disable the adapter, type the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||||
|
|
||||||
```
|
```
|
||||||
Disable-NetAdapter "Ethernet 2" -Confirm:$false
|
Disable-NetAdapter "Ethernet 2" -Confirm:$false
|
||||||
```
|
```
|
||||||
3. Start and connect to PC3 by typing the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
3. Start and connect to PC3 by typing the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||||
|
|
||||||
```
|
```
|
||||||
Start-VM PC3
|
Start-VM PC3
|
||||||
vmconnect localhost PC3
|
vmconnect localhost PC3
|
||||||
@ -502,6 +518,7 @@ At a high level, the computer replace process consists of:<BR>
|
|||||||
- **Move Data and Settings**: Do not move user data and settings
|
- **Move Data and Settings**: Do not move user data and settings
|
||||||
- **User Data (Restore)**: Specify a location: **\\SRV1\MigData$\PC1**
|
- **User Data (Restore)**: Specify a location: **\\SRV1\MigData$\PC1**
|
||||||
5. When OS installation has started on PC1, re-enable the external network adapter on SRV1 by typing the following command on SRV1:
|
5. When OS installation has started on PC1, re-enable the external network adapter on SRV1 by typing the following command on SRV1:
|
||||||
|
|
||||||
```
|
```
|
||||||
Enable-NetAdapter "Ethernet 2"
|
Enable-NetAdapter "Ethernet 2"
|
||||||
```
|
```
|
||||||
|
@ -25,6 +25,8 @@ The PoC environment is a virtual network running on Hyper-V with three virtual m
|
|||||||
|
|
||||||
This guide leverages the Hyper-V server role to perform procedures. If you do not complete all steps in a single session, consider using [checkpoints](https://technet.microsoft.com/library/dn818483.aspx) and [saved states](https://technet.microsoft.com/library/ee247418.aspx) to pause, resume, or restart your work.
|
This guide leverages the Hyper-V server role to perform procedures. If you do not complete all steps in a single session, consider using [checkpoints](https://technet.microsoft.com/library/dn818483.aspx) and [saved states](https://technet.microsoft.com/library/ee247418.aspx) to pause, resume, or restart your work.
|
||||||
|
|
||||||
|
>Multiple features and services are installed on SRV1 in this guide. If less than 4 GB of RAM is allocated to SRV1, some procedures will require more time to complete. If resources are limited on the Hyper-V host, consider reducing RAM allocation on DC1 and PC1 to 2 GB and 1 GB respectively, and then increasing the RAM allocation on SRV1. You can adjust RAM allocation for a VM by right-clicking the VM in the Hyper-V Manager console, clicking **Settings**, clicking **Memory**, and modifying the value next to **Maximum RAM**.
|
||||||
|
|
||||||
## In this guide
|
## In this guide
|
||||||
|
|
||||||
Description here.
|
Description here.
|
||||||
@ -37,6 +39,8 @@ Description here.
|
|||||||
Install-WindowsFeature Web-Windows-Auth,Web-ISAPI-Ext,Web-Metabase,Web-WMI,BITS,RDC,NET-Framework-Features,Web-Asp-Net,Web-Asp-Net45,NET-HTTP-Activation,NET-Non-HTTP-Activ
|
Install-WindowsFeature Web-Windows-Auth,Web-ISAPI-Ext,Web-Metabase,Web-WMI,BITS,RDC,NET-Framework-Features,Web-Asp-Net,Web-Asp-Net45,NET-HTTP-Activation,NET-Non-HTTP-Activ
|
||||||
```
|
```
|
||||||
|
|
||||||
|
>If the command displays an error stating that the request to add or remove features failed, retry the installation by typing the command again.
|
||||||
|
|
||||||
2. Download [SQL Server 2012 SP2](https://www.microsoft.com/en-us/evalcenter/evaluate-sql-server-2014-sp2) from the Microsoft Evaluation Center as an .ISO file on the Hyper-V host computer. Save the file to the **C:\VHD** directory.
|
2. Download [SQL Server 2012 SP2](https://www.microsoft.com/en-us/evalcenter/evaluate-sql-server-2014-sp2) from the Microsoft Evaluation Center as an .ISO file on the Hyper-V host computer. Save the file to the **C:\VHD** directory.
|
||||||
3. When you have downloaded the file **SQLServer2014SP2-FullSlipstream-x64-ENU.iso** and placed it in the C:\VHD directory, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
3. When you have downloaded the file **SQLServer2014SP2-FullSlipstream-x64-ENU.iso** and placed it in the C:\VHD directory, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||||
|
|
||||||
@ -66,28 +70,60 @@ Description here.
|
|||||||
|
|
||||||
Success
|
Success
|
||||||
```
|
```
|
||||||
5. Type the following command at an elevated Windows PowerShell prompt on SRV1:
|
5. Type the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||||
|
|
||||||
```
|
```
|
||||||
netsh firewall set portopening protocol = TCP port = 1433 name = SQLPort mode = ENABLE scope = SUBNET profile = CURRENT
|
New-NetFirewallRule -DisplayName “SQL Server” -Direction Inbound –Protocol TCP –LocalPort 1433 -Action allow
|
||||||
|
New-NetFirewallRule -DisplayName “SQL Admin Connection” -Direction Inbound –Protocol TCP –LocalPort 1434 -Action allow
|
||||||
|
New-NetFirewallRule -DisplayName “SQL Database Management” -Direction Inbound –Protocol UDP –LocalPort 1434 -Action allow
|
||||||
|
New-NetFirewallRule -DisplayName “SQL Service Broker” -Direction Inbound –Protocol TCP –LocalPort 4022 -Action allow
|
||||||
|
New-NetFirewallRule -DisplayName “SQL Debugger/RPC” -Direction Inbound –Protocol TCP –LocalPort 135 -Action allow
|
||||||
```
|
```
|
||||||
5. On SRV1, temporarily disable IE Enhanced Security Configuration for Administrators by typing the following commands at an elevated Windows PowerShell prompt:
|
6. On SRV1, temporarily disable IE Enhanced Security Configuration for Administrators by typing the following commands at an elevated Windows PowerShell prompt:
|
||||||
|
|
||||||
```
|
```
|
||||||
$AdminKey = "HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{A509B1A7-37EF-4b3f-8CFC-4F3A74704073}"
|
$AdminKey = "HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{A509B1A7-37EF-4b3f-8CFC-4F3A74704073}"
|
||||||
Set-ItemProperty -Path $AdminKey -Name “IsInstalled” -Value 0
|
Set-ItemProperty -Path $AdminKey -Name “IsInstalled” -Value 0
|
||||||
Stop-Process -Name Explorer
|
Stop-Process -Name Explorer
|
||||||
```
|
```
|
||||||
6. Download and install the latest [Windows Assessment and Deployment Kit (ADK)](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) on SRV1 using the default installation settings. The current version is the ADK for Windows 10, version 1607. Installation might require several minutes to acquire all components.
|
7. Download and install the latest [Windows Assessment and Deployment Kit (ADK)](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) on SRV1 using the default installation settings. The current version is the ADK for Windows 10, version 1607. Installation might require several minutes to acquire all components.
|
||||||
|
|
||||||
## Install System Center Configuration Manager
|
## Install System Center Configuration Manager
|
||||||
|
|
||||||
1. Download [System Center Configuration Manager and Endpoint Protection](https://www.microsoft.com/en-us/evalcenter/evaluate-system-center-configuration-manager-and-endpoint-protection) on SRV1, double-click the file, enter **C:\configmgr** for **Unzip to folder**, and click **Unzip**. The C:\configmgr directory will be automatically created. Click **OK** and then close the **WinZip Self-Extractor** dialog box when finished.
|
1. Download [System Center Configuration Manager and Endpoint Protection](https://www.microsoft.com/en-us/evalcenter/evaluate-system-center-configuration-manager-and-endpoint-protection) on SRV1, double-click the file, enter **C:\configmgr** for **Unzip to folder**, and click **Unzip**. The C:\configmgr directory will be automatically created. Click **OK** and then close the **WinZip Self-Extractor** dialog box when finished.
|
||||||
|
|
||||||
2. To start installation, type the following command at an elevated command prompt:
|
2. Before starting the installation, verify that WMI is working on SRV1. See the following examples. Verify that **Running** is displayed under **Status** and **True** is displayed next to **TcpTestSucceeded**:
|
||||||
|
|
||||||
```
|
```
|
||||||
C:\configmgr\SMSSETUP\BIN\X64\Setup.exe
|
Get-Service Winmgmt
|
||||||
|
|
||||||
|
Status Name DisplayName
|
||||||
|
------ ---- -----------
|
||||||
|
Running Winmgmt Windows Management Instrumentation
|
||||||
|
|
||||||
|
Test-NetConnection -ComputerName 192.168.0.2 -Port 135 -InformationLevel Detailed
|
||||||
|
|
||||||
|
ComputerName : 192.168.0.2
|
||||||
|
RemoteAddress : 192.168.0.2
|
||||||
|
RemotePort : 135
|
||||||
|
AllNameResolutionResults :
|
||||||
|
MatchingIPsecRules :
|
||||||
|
NetworkIsolationContext : Internet
|
||||||
|
InterfaceAlias : Ethernet
|
||||||
|
SourceAddress : 192.168.0.2
|
||||||
|
NetRoute (NextHop) : 0.0.0.0
|
||||||
|
PingSucceeded : True
|
||||||
|
PingReplyDetails (RTT) : 0 ms
|
||||||
|
TcpTestSucceeded : True
|
||||||
|
```
|
||||||
|
To verify WMI using the WMI console, type **wmimgmt.msc**, right-click **WMI Control (Local)** in the console tree, and then click **Properties**.
|
||||||
|
|
||||||
|
If the WMI service is not started, attempt to start it or reboot the computer. If WMI is running but errors are present, see [WMIDiag](https://blogs.technet.microsoft.com/askperf/2015/05/12/wmidiag-2-2-is-here/) for troubleshooting information.
|
||||||
|
|
||||||
|
2. To start installation, type the following command at an elevated Windows PowerShell prompt:
|
||||||
|
|
||||||
|
```
|
||||||
|
cmd /c C:\configmgr\SMSSETUP\BIN\X64\Setup.exe
|
||||||
```
|
```
|
||||||
3. Provide the following in the System Center Configuration Manager Setup Wizard:
|
3. Provide the following in the System Center Configuration Manager Setup Wizard:
|
||||||
- **Before You Begin**: Read the text and click *Next*.
|
- **Before You Begin**: Read the text and click *Next*.
|
||||||
@ -102,7 +138,26 @@ Description here.
|
|||||||
- **Usage Data**: Read the text and click **Next**.
|
- **Usage Data**: Read the text and click **Next**.
|
||||||
- **Service Connection Point Setup**: Accept the default settings (SRV1.contoso.com is automatically added under Select a server to use).
|
- **Service Connection Point Setup**: Accept the default settings (SRV1.contoso.com is automatically added under Select a server to use).
|
||||||
- **Settings Summary**: Review settings and click **Next**.
|
- **Settings Summary**: Review settings and click **Next**.
|
||||||
- **Prerequisite Check**:
|
- **Prerequisite Check**: No failures should be listed. Ignore any warnings and click **Begin Install**.
|
||||||
|
|
||||||
|
Depending on the speed of the Hyper-V host and resources allocated to SRV1, installation can require approximately one hour. Click **Close** when installation is complete.
|
||||||
|
|
||||||
|
## Install the Microsoft Deployment Toolkit (MDT)
|
||||||
|
|
||||||
|
1. Download and install the 64-bit version of [Microsoft Deployment Toolkit (MDT) 2013 Update 2](https://www.microsoft.com/en-us/download/details.aspx?id=50407) on SRV1 using the default options.
|
||||||
|
|
||||||
|
2. If desired, re-enable IE Enhanced Security Configuration at this time:
|
||||||
|
|
||||||
|
```
|
||||||
|
Set-ItemProperty -Path $AdminKey -Name “IsInstalled” -Value 1
|
||||||
|
Stop-Process -Name Explorer
|
||||||
|
```
|
||||||
|
|
||||||
|
## Enable MDT ConfigMgr integration
|
||||||
|
|
||||||
|
1. Click **Start**, type **configmgr**, and then click **Configure ConfigMgr Integration**.
|
||||||
|
2. Type PS1 next to Site code, and then click **Next**.
|
||||||
|
3. Verify **The process completed successfully** is displayed, and then click **Finish**.
|
||||||
|
|
||||||
## Related Topics
|
## Related Topics
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user