diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index ee3a92a1fd..42c0123ce0 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1572,12 +1572,12 @@ }, { "source_path": "windows/deploy/add-a-windows-10-operating-system-image-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/add-a-windows-10-operating-system-image-using-configuration-manager", "redirect_document_id": false }, { "source_path": "windows/deploy/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager", "redirect_document_id": false }, { @@ -1657,12 +1657,12 @@ }, { "source_path": "windows/deploy/create-a-custom-windows-pe-boot-image-with-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager", "redirect_document_id": false }, { "source_path": "windows/deploy/create-a-task-sequence-with-configuration-manager-and-mdt.md", - "redirect_url": "/windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-a-task-sequence-with-configuration-manager-and-mdt", "redirect_document_id": false }, { @@ -1672,7 +1672,7 @@ }, { "source_path": "windows/deploy/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-an-application-to-deploy-with-windows-10-using-configuration-manager", "redirect_document_id": false }, { @@ -1687,7 +1687,7 @@ }, { "source_path": "windows/deploy/deploy-windows-10-using-pxe-and-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager", "redirect_document_id": false }, { @@ -1707,7 +1707,7 @@ }, { "source_path": "windows/deploy/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager", "redirect_document_id": false }, { @@ -1857,7 +1857,7 @@ }, { "source_path": "windows/deploy/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", "redirect_document_id": false }, { @@ -1927,7 +1927,7 @@ }, { "source_path": "windows/deploy/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager", "redirect_document_id": false }, { @@ -1942,7 +1942,7 @@ }, { "source_path": "windows/deploy/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager", "redirect_document_id": false }, { @@ -2467,12 +2467,12 @@ }, { "source_path": "windows/deploy/windows-10-poc-sc-config-mgr.md", - "redirect_url": "/windows/deployment/windows-10-poc-sc-config-mgr", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/windows-10-poc-sc-config-mgr", "redirect_document_id": false }, { "source_path": "windows/deploy/windows-10-poc.md", - "redirect_url": "/windows/deployment/windows-10-poc", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/windows-10-poc", "redirect_document_id": false }, { diff --git a/.openpublishing.redirection.windows-deployment.json b/.openpublishing.redirection.windows-deployment.json index ee95e79780..02f03c3d20 100644 --- a/.openpublishing.redirection.windows-deployment.json +++ b/.openpublishing.redirection.windows-deployment.json @@ -7,7 +7,7 @@ }, { "source_path": "windows/deployment/deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/create-a-task-sequence-with-configuration-manager-and-mdt", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-a-task-sequence-with-configuration-manager-and-mdt", "redirect_document_id": false }, { @@ -17,7 +17,7 @@ }, { "source_path": "windows/deployment/deploy-windows-mdt/deploy-windows-10-with-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", "redirect_document_id": false }, { @@ -37,32 +37,32 @@ }, { "source_path": "windows/deployment/deploy-windows-sccm/add-a-windows-10-operating-system-image-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/add-a-windows-10-operating-system-image-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/add-a-windows-10-operating-system-image-using-configuration-manager", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/create-a-task-sequence-with-configuration-manager-and-mdt.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/create-a-task-sequence-with-configuration-manager-and-mdt", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-a-task-sequence-with-configuration-manager-and-mdt", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/create-an-application-to-deploy-with-windows-10-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-an-application-to-deploy-with-windows-10-using-configuration-manager", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/deploy-windows-10-using-pxe-and-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager", "redirect_document_id": false }, { @@ -72,12 +72,12 @@ }, { "source_path": "windows/deployment/deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager", "redirect_document_id": false }, { @@ -87,27 +87,27 @@ }, { "source_path": "windows/deployment/deploy-windows-sccm/integrate-configuration-manager-with-mdt.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager#integrate-configuration-manager-with-mdt", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager#integrate-configuration-manager-with-mdt", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/monitor-windows-10-deployment-with-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager#procedures", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager#procedures", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager", "redirect_document_id": false }, { "source_path": "windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md", - "redirect_url": "/windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager", "redirect_document_id": false }, { @@ -1505,6 +1505,76 @@ "redirect_url": "/windows/deployment/windows-autopatch/manage/windows-autopatch-manage-autopatch-groups", "redirect_document_id": true }, + { + "source_path": "windows/deployment/deploy-windows-cm/add-a-windows-10-operating-system-image-using-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/add-a-windows-10-operating-system-image-using-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/create-a-task-sequence-with-configuration-manager-and-mdt.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-a-task-sequence-with-configuration-manager-and-mdt", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/create-an-application-to-deploy-with-windows-10-using-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/windows-10-poc-sc-config-mgr.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/windows-10-poc-sc-config-mgr", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/windows-10-poc.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/windows-10-poc", + "redirect_document_id": false + }, + { + "source_path": "windows/deployment/windows-10-deployment-posters.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/deployment/windows-10-deployment-posters", + "redirect_document_id": false + }, { "source_path": "windows/deployment/windows-autopatch/prepare/windows-autopatch-enroll-tenant.md", "redirect_url": "/windows/deployment/windows-autopatch/prepare/windows-autopatch-feature-activation", diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml index aace1740e5..91c38a8b15 100644 --- a/windows/deployment/TOC.yml +++ b/windows/deployment/TOC.yml @@ -18,14 +18,6 @@ items: href: update/update-managed-unmanaged-devices.md - name: Prepare servicing strategy for Windows client updates href: update/waas-servicing-strategy-windows-10-updates.md - - name: Deployment proof of concept - items: - - name: 'Step by step guide: Configure a test lab to deploy Windows 10' - href: windows-10-poc.md - - name: Deploy Windows 10 in a test lab using Configuration Manager - href: windows-10-poc-sc-config-mgr.md - - name: Deployment process posters - href: windows-10-deployment-posters.md - name: Plan items: @@ -71,7 +63,7 @@ items: - name: Configure BranchCache for Windows client updates href: update/waas-branchcache.md - name: Prepare for deployment with Configuration Manager - href: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md + href: /previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager - name: Check release health href: update/check-release-health.md - name: Deploy @@ -82,16 +74,6 @@ items: href: /autopilot/ - name: Windows deployment scenarios and tools href: windows-deployment-scenarios-and-tools.md - - name: Deploy Windows client with Configuration Manager - items: - - name: Deploy to a new device - href: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md - - name: Refresh a device - href: deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md - - name: Replace a device - href: deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md - - name: In-place upgrade - href: deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md - name: Deploy Windows client updates items: - name: Assign devices to servicing channels diff --git a/windows/deployment/deploy-windows-cm/TOC.yml b/windows/deployment/deploy-windows-cm/TOC.yml deleted file mode 100644 index 13d898e1b5..0000000000 --- a/windows/deployment/deploy-windows-cm/TOC.yml +++ /dev/null @@ -1,28 +0,0 @@ -- name: Deploy Windows 10 with Microsoft Configuration Manager - items: - - name: Prepare for Windows 10 deployment with Configuration Manager - items: - - name: Prepare for Zero Touch Installation with Configuration Manager - href: prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md - - name: Create a custom Windows PE boot image with Configuration Manager - href: create-a-custom-windows-pe-boot-image-with-configuration-manager.md - - name: Add a Windows 10 operating system image using Configuration Manager - href: add-a-windows-10-operating-system-image-using-configuration-manager.md - - name: Create an application to deploy with Windows 10 using Configuration Manager - href: create-an-application-to-deploy-with-windows-10-using-configuration-manager.md - - name: Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager - href: add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md - - name: Create a task sequence with Configuration Manager and MDT - href: create-a-task-sequence-with-configuration-manager-and-mdt.md - - name: Finalize the operating system configuration for Windows 10 deployment with Configuration Manager - href: finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md - - name: Deploy Windows 10 with Configuration Manager - items: - - name: Deploy Windows 10 using PXE and Configuration Manager - href: deploy-windows-10-using-pxe-and-configuration-manager.md - - name: Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager - href: refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md - - name: Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager - href: replace-a-windows-7-client-with-windows-10-using-configuration-manager.md - - name: Perform an in-place upgrade to Windows 10 using Configuration Manager - href: upgrade-to-windows-10-with-configuration-manager.md diff --git a/windows/deployment/deploy-windows-cm/add-a-windows-10-operating-system-image-using-configuration-manager.md b/windows/deployment/deploy-windows-cm/add-a-windows-10-operating-system-image-using-configuration-manager.md deleted file mode 100644 index 078191014f..0000000000 --- a/windows/deployment/deploy-windows-cm/add-a-windows-10-operating-system-image-using-configuration-manager.md +++ /dev/null @@ -1,73 +0,0 @@ ---- -title: Add a Windows 10 operating system image using Configuration Manager -description: Operating system images are typically the production image used for deployment throughout the organization. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Add a Windows 10 operating system image using Configuration Manager - -*Applies to:* - -- Windows 10 - -Operating system images are typically the production image used for deployment throughout the organization. This article shows you how to add a Windows 10 operating system image created with Microsoft Configuration Manager, and how to distribute the image to a distribution point. - -## Infrastructure - -For the purposes of this guide, we'll use one server computer: CM01. - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. -- CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - -An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). - -> [!IMPORTANT] -> The procedures in this article require a reference image. Our reference images is named **REFW10-X64-001.wim**. If you have not already created a reference image, then perform all the steps in [Create a Windows 10 reference image](../deploy-windows-mdt/create-a-windows-10-reference-image.md) on CM01, replacing MDT01 with CM01. The final result will be a reference image located in the D:\MDTBuildLab\Captures folder that you can use for the procedure below. - -## Add a Windows 10 operating system image - - On **CM01**: - -1. Using File Explorer, in the **`D:\Sources\OSD\OS`** folder, create a subfolder named **Windows 10 Enterprise x64 RTM**. - -2. Copy the `REFW10-X64-001.wim` file to the **`D:\Sources\OSD\OS\Windows 10 Enterprise x64 RTM`** folder. - - ![figure 17.](../images/ref-image.png) - - The Windows 10 image being copied to the Sources folder structure. - -3. Using the Configuration Manager Console, in the **Software Library** workspace, right-click **Operating System Images**, and select **Add Operating System Image**. - -4. On the **Data Source** page, in the **Path:** text box, browse to **`\\CM01\Sources$\OSD\OS\Windows 10 Enterprise x64 RTM\REFW10-X64-001.wim`**, select x64 next to Architecture and choose a language, then select **Next**. - -5. On the **General** page, assign the name Windows 10 Enterprise x64 RTM, select **Next** twice, and then select **Close**. - -6. Distribute the operating system image to the CM01 distribution point by right-clicking the **Windows 10 Enterprise x64 RTM** operating system image and then clicking **Distribute Content**. - -7. In the Distribute Content Wizard, add the CM01 distribution point, select **Next** and select **Close**. - -8. View the content status for the Windows 10 Enterprise x64 RTM package. Don't continue until the distribution is completed (it might take a few minutes). You also can review the `D:\Program Files\Microsoft Configuration Manager\Logs\distmgr.log` file and look for the **STATMSG: ID=2301** line. - - ![figure 18.](../images/fig18-distwindows.png) - - The distributed Windows 10 Enterprise x64 RTM package. - -Next, see [Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md). - -## Related articles - -[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
-[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
-[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
-[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
-[Create a task sequence with Configuration Manager and MDT](./create-a-task-sequence-with-configuration-manager-and-mdt.md)
-[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
-[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
-[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
diff --git a/windows/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md b/windows/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md deleted file mode 100644 index 3e07ef2858..0000000000 --- a/windows/deployment/deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md +++ /dev/null @@ -1,114 +0,0 @@ ---- -title: Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager -description: Learn how to configure the Windows Preinstallation Environment (Windows PE) to include required network and storage drivers. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager - -*Applies to:* - -- Windows 10 - -In this article, you'll learn how to configure the Windows Preinstallation Environment (Windows PE) to include the network drivers required to connect to the deployment share and the storage drivers required to see the local storage on machines. Even though the Windows PE boot image and the Windows 10 operating system contain many out-of-the-box drivers, it's likely you'll have to add new or updated drivers to support all your hardware. In this section, you import drivers for both Windows PE and the full Windows 10 operating system. - -For the purposes of this guide, we'll use one server computer: CM01. - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - - An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). - -## Add drivers for Windows PE - -This section will show you how to import some network and storage drivers for Windows PE. - -> [!NOTE] -> Windows PE usually has a fairly comprehensive set of drivers out of the box, assuming that you are using a recent version of the Windows ADK. This is different than the full Windows OS which will often require drivers. You shouldn't add drivers to Windows PE unless you've an issue or are missing functionality, and in these cases you should only add the driver that you need. An example of a common driver that is added is the Intel I217 driver. Adding too many drivers can cause conflicts and lead to driver bloat in the Config Mgr database. This section shows you how to add drivers, but typically you can just skip this procedure. - -This section assumes you've downloaded some drivers to the **`D:\Sources\OSD\DriverSources\WinPE x64`** folder on CM01. - -![Drivers.](../images/cm01-drivers.png) - -Driver folder structure on CM01 - -On **CM01**: - -1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, right-click the **Drivers** node and select **Import Driver**. - -2. In the Import New Driver Wizard, on the **Specify a location to import driver** page, select the **Import all drivers in the following network path (UNC)** option, browse to the **`\\CM01\Sources$\OSD\DriverSources\WinPE x64`** folder and select **Next**. - -3. On the **Specify the details for the imported driver** page, select **Categories**, create a category named **WinPE x64**, and then select **Next**. - -4. On the **Select the packages to add the imported driver** page, select **Next**. - -5. On the **Select drivers to include in the boot image** page, select the **Zero Touch WinPE x64** boot image and select **Next**. - -6. In the popup window that appears, select **Yes** to automatically update the distribution point. - -7. Select **Next**, wait for the image to be updated, and then select **Close**. - - ![Add drivers to Windows PE step 1.](../images/fig21-add-drivers1.png)
- ![Add drivers to Windows PE step 2.](../images/fig21-add-drivers2.png)
- ![Add drivers to Windows PE step 3.](../images/fig21-add-drivers3.png)
- ![Add drivers to Windows PE step 4.](../images/fig21-add-drivers4.png) - - Add drivers to Windows PE - -## Add drivers for Windows 10 - -This section illustrates how to add drivers for Windows 10 using the HP EliteBook 8560w as an example. Use the HP Image Assistant from the [HP Client Management Solutions site](https://hp.com/go/clientmanagement). - -For the purposes of this section, we assume that you've downloaded the Windows 10 drivers for the HP EliteBook 8560w model and copied them to the **D:\Sources$\OSD\DriverSources\Windows 10 x64\Hewlett-Packard\HP EliteBook 8560w** folder on CM01. - -![Drivers in Windows.](../images/cm01-drivers-windows.png) - -Driver folder structure on CM01 - -On **CM01**: - -1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, right-click the **Drivers** node and select **Import Driver**. - -2. In the Import New Driver Wizard, on the **Specify a location to import driver** page, select the **Import all drivers in the following network path (UNC)** option, browse to the **`\\CM01\Sources$\OSD\DriverSources\Windows 10 x64\Hewlett-Packard\HP EliteBook 8560w`** folder and select **Next**. Wait a minute for driver information to be validated. - -3. On the **Specify the details for the imported driver** page, select **Categories**, create a category named **Windows 10 x64 - HP EliteBook 8560w**, select **OK**, and then select **Next**. - - ![Create driver categories.](../images/fig22-createcategories.png "Create driver categories") - - Create driver categories - -4. On the **Select the packages to add the imported driver** page, select **New Package**, use the following settings for the package, and then select **Next**: - - - Name: Windows 10 x64 - HP EliteBook 8560w - - Path: **`\\CM01\Sources$\OSD\DriverPackages\Windows 10 x64\Hewlett-Packard\HP EliteBook 8560w`** - - > [!NOTE] - > The package path does not yet exist so it has to be created by typing it in. The wizard will create the new package using the path you specify. - -5. On the **Select drivers to include in the boot image** page, don't select anything, and select **Next** twice. After the package has been created, select **Close**. - - > [!NOTE] - > If you want to monitor the driver import process more closely, you can open the SMSProv.log file during driver import. - - ![Drivers imported and a new driver package created.](../images/cm01-drivers-packages.png "Drivers imported and a new driver package created") - - Drivers imported and a new driver package created - -Next, see [Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md). - -## Related articles - -[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
-[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
-[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
-[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
-[Create a task sequence with Configuration Manager and MDT](./create-a-task-sequence-with-configuration-manager-and-mdt.md)
-[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
-[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
-[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
diff --git a/windows/deployment/deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md b/windows/deployment/deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md deleted file mode 100644 index cee1940d35..0000000000 --- a/windows/deployment/deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md +++ /dev/null @@ -1,112 +0,0 @@ ---- -title: Create a custom Windows PE boot image with Configuration Manager (Windows 10) -description: Learn how to create custom Windows Preinstallation Environment (Windows PE) boot images in Microsoft Configuration Manager. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Create a custom Windows PE boot image with Configuration Manager - -*Applies to:* - -- Windows 10 - -In Microsoft Configuration Manager, you can create custom Windows Preinstallation Environment (Windows PE) boot images that include extra components and features. This article shows you how to create a custom Windows PE 5.0 boot image with the Microsoft Deployment Toolkit (MDT) wizard. You can also add the Microsoft Diagnostics and Recovery Toolset (DaRT) 10 to the boot image as part of the boot image creation process. - -- The boot image that is created is based on the version of ADK that is installed. - -For the purposes of this guide, we'll use one server computer: CM01. - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - - An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). - -## Add DaRT 10 files and prepare to brand the boot image - -The steps below outline the process for adding DaRT 10 installation files to the MDT installation directory. You also copy a custom background image to be used later. These steps are optional. If you don't wish to add DaRT, skip the steps below to copy DaRT tools, and later skip adding the DaRT component to the boot image. - -We assume you've downloaded [Microsoft Desktop Optimization Pack (MDOP) 2015](https://my.visualstudio.com/Downloads?q=Desktop%20Optimization%20Pack%202015) and copied the x64 version of MSDaRT100.msi to the **C:\\Setup\\DaRT 10** folder on CM01. We also assume you've created a custom background image and saved it in **`C:\Setup\Branding`** on CM01. In this section, we use a custom background image named [ContosoBackground.png](../images/ContosoBackground.png) - -On **CM01**: - -1. Install DaRT 10 (**`C:\\Setup\\DaRT 10\\MSDaRT100.msi`**) using the default settings. - -2. Using File Explorer, navigate to the **`C:\Program Files\Microsoft DaRT\v10`** folder. - -3. Copy the Toolsx64.cab file to the **`C:\Program Files\Microsoft Deployment Toolkit\Templates\Distribution\Tools\x64`** folder. - -4. Copy the Toolsx86.cab file to the **`C:\Program Files\Microsoft Deployment Toolkit\Templates\Distribution\Tools\x86`** folder. - -5. Using File Explorer, navigate to the **`C:\Setup`** folder. - -6. Copy the **Branding** folder to **`D:\Sources\OSD`**. - -## Create a boot image for Configuration Manager using the MDT wizard - -By using the MDT wizard to create the boot image in Configuration Manager, you gain more options for adding components and features to the boot image. In this section, you create a boot image for Configuration Manager using the MDT wizard. - -On **CM01**: - -1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Boot Images**, and select **Create Boot Image using MDT**. - -2. On the **Package Source** page, in the **Package source folder to be created (UNC Path):** text box, enter **`\\CM01\Sources$\OSD\Boot\Zero Touch WinPE x64`** and select **Next**. - - > [!NOTE] - > The Zero Touch WinPE x64 folder does not yet exist. The folder will be created later by the wizard. - -3. On the **General Settings** page, assign the name **Zero Touch WinPE x64** and select **Next**. - -4. On the **Options** page, select the **x64** platform, and select **Next**. - -5. On the **Components** page, in addition to the default selected **Microsoft Data Access Components (MDAC/ADO)** support, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box and select **Next**. - - ![Add the DaRT component to the Configuration Manager boot image.](../images/mdt-06-fig16.png "Add the DaRT component to the Configuration Manager boot image") - - Add the DaRT component to the Configuration Manager boot image. - - >Note: Another common component to add here is Windows PowerShell to enable PowerShell support within Windows PE. - -6. On the **Customization** page, select the **Use a custom background bitmap file** check box, and in the **UNC path:** text box, browse to **`\\CM01\Sources$\OSD\Branding\ContosoBackground.bmp`** and then select **Next** twice. Wait a few minutes while the boot image is generated, and then select **Finish**. - -7. Distribute the boot image to the CM01 distribution point by selecting the **Boot images** node, right-clicking the **Zero Touch WinPE x64** boot image, and selecting **Distribute Content**. - -8. In the Distribute Content Wizard, add the CM01 distribution point, and complete the wizard. - -9. Using Configuration Manager Trace, review the `D:\Program Files\Microsoft Configuration Manager\Logs\distmgr.log` file. Don't continue until you can see that the boot image is distributed. Look for the line that reads **STATMSG: ID=2301**. You also can monitor Content Status in the Configuration Manager Console at **Monitoring** > **Overview** > **Distribution Status** > **Content Status** > **Zero Touch WinPE x64**. See the following examples: - - ![Content status for the Zero Touch WinPE x64 boot image step 1.](../images/fig16-contentstatus1.png)
- ![Content status for the Zero Touch WinPE x64 boot image step 2.](../images/fig16-contentstatus2.png) - - Content status for the Zero Touch WinPE x64 boot image - -10. Using the Configuration Manager Console, in the **Software Library** workspace, under **Boot Images**, right-click the **Zero Touch WinPE x64** boot image and select **Properties**. - -11. On the **Data Source** tab, select the **Deploy this boot image from the PXE-enabled distribution point** check box, and select **OK**. - -12. Using Configuration Manager Trace, review the D:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file and look for this text: **Expanding PS100009 to D:\\RemoteInstall\\SMSImages**. - -13. Review the **D:\\RemoteInstall\\SMSImages** folder. You should see three folders containing boot images. Two are from the default boot images, and the third folder (PS100009) is from your new boot image with DaRT. See the examples below: - - ![PS100009 step 1.](../images/ps100009-1.png)
- ![PS100009 step 2.](../images/ps100009-2.png) - ->Note: Depending on your infrastructure and the number of packages and boot images present, the Image ID might be a different number than PS100009. - -Next, see [Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md). - -## Related articles - -[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
-[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
-[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
-[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
-[Create a task sequence with Configuration Manager and MDT](./create-a-task-sequence-with-configuration-manager-and-mdt.md)
-[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
-[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
-[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
diff --git a/windows/deployment/deploy-windows-cm/create-a-task-sequence-with-configuration-manager-and-mdt.md b/windows/deployment/deploy-windows-cm/create-a-task-sequence-with-configuration-manager-and-mdt.md deleted file mode 100644 index 1f1fdf0411..0000000000 --- a/windows/deployment/deploy-windows-cm/create-a-task-sequence-with-configuration-manager-and-mdt.md +++ /dev/null @@ -1,158 +0,0 @@ ---- -title: Create a task sequence with Configuration Manager (Windows 10) -description: Create a Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Create a task sequence with Configuration Manager and MDT - -*Applies to:* - -- Windows 10 - -In this article, you'll learn how to create a Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard. Creating task sequences in Configuration Manager requires many more steps than creating task sequences for MDT Lite Touch installation. Luckily, the MDT wizard helps you through the process and also guides you through creating the needed packages. - -For the purposes of this guide, we'll use one server computer: CM01. - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - - An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). Note: Active Directory [permissions](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md#configure-active-directory-permissions) for the **CM_JD** account are required for the task sequence to work properly. - -## Create a task sequence using the MDT Integration Wizard - -This section walks you through the process of creating a Configuration Manager task sequence for production use. - -On **CM01**: - -1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create MDT Task Sequence**. - -2. On the **Choose Template** page, select the **Client Task Sequence** template and select **Next**. - -3. On the **General** page, assign the following settings and then select **Next**: - - Task sequence name: Windows 10 Enterprise x64 RTM - - Task sequence comments: Production image with Office 365 Pro Plus x64 - -4. On the **Details** page, assign the following settings and then select **Next**: - - Join a Domain - - Domain: contoso.com - - Account: contoso\\CM\_JD - - Password: pass@word1 - - Windows Settings - - User name: Contoso - - Organization name: Contoso - - Product key: *\* - -5. On the **Capture Settings** page, accept the default settings, and select **Next**. - -6. On the **Boot Image** page, browse and select the **Zero Touch WinPE x64** boot image package. Then select **Next**. - -7. On the **MDT Package** page, select **Create a new Microsoft Deployment Toolkit Files package**, and in the **Package source folder to be created (UNC Path):** text box, enter **`\\CM01\Sources$\OSD\MDT\MDT`**. Then select **Next**. - -8. On the **MDT Details** page, assign the name **MDT** and select **Next**. - -9. On the **OS Image** page, browse and select the **Windows 10 Enterprise x64 RTM** package. Then select **Next**. - -10. On the **Deployment Method** page, accept the default settings (Zero Touch installation) and select **Next**. - -11. On the **Client Package** page, browse and select the **Microsoft Corporation Configuration Manager Client Package** and select **Next**. - -12. On the **USMT Package** page, browse and select the **Microsoft Corporation User State Migration Tool for Windows** package and select **Next**. - -13. On the **Settings Package** page, select the **Create a new settings package** option, and in the **Package source folder to be created (UNC Path):** text box, enter **`\\CM01\Sources$\OSD\Settings\Windows 10 x64 Settings`** and select **Next**. - -14. On the **Settings Details** page, assign the name **Windows 10 x64 Settings** and select **Next**. - -15. On the **Sysprep Package** page, select **Next** twice. - -16. On the **Confirmation** page, select **Finish**. - -## Edit the task sequence - -After you create the task sequence, we recommend that you configure the task sequence for an optimal deployment experience. The configurations include enabling support for Unified Extensible Firmware Interface (UEFI), dynamic organizational unit (OU) allocation, computer replace scenarios, and more. - -On **CM01**: - -1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click the **Windows 10 Enterprise x64 RTM** task sequence, and select **Edit**. - -2. In the **Post Install** group, select **Apply Network Settings**, and configure the **Domain OU** value to use the **Contoso / Computers / Workstations** OU (browse for values). - -3. In the **Post Install** group, disable the **Auto Apply Drivers** action. (Disabling is done by selecting the action and, in the **Options** tab, selecting the **Disable this step** check box.) - -4. After the disabled **Post Install / Auto Apply Drivers** action, add a new group name: **Drivers**. - -5. After the **Post Install / Drivers** group, add an **Apply Driver Package** action with the following settings: - - - Name: HP EliteBook 8560w - - Driver Package: Windows 10 x64 - HP EliteBook 8560w - - Options tab - Add Condition: Task Sequence Variable: Model equals HP EliteBook 8560w - - > [!NOTE] - > You also can add a Query WMI condition with the following query: SELECT \* FROM Win32\_ComputerSystem WHERE Model LIKE '%HP EliteBook 8560w%' - - ![Driver package options.](../images/fig27-driverpackage.png "Driver package options") - - The driver package options - -6. In the **State Restore / Install Applications** group, select the **Install Application** action. - -7. Select the **Install the following applications** radio button, and add the OSD / Adobe Reader DC - OSD Install application to the list. - - ![Add an application to the task sequence.](../images/fig28-addapp.png "Add an application to the task sequence") - - Add an application to the Configuration Manager task sequence - - > [!NOTE] - > In recent versions of Configuration Manager the Request State Store and Release State Store actions described below are present by default. These actions are used for common computer replace scenarios. There's also the additional condition on the options tab: USMTOfflineMigration not equals TRUE. If these actions are not present, try updating to the latest Configuration Manager current branch release. - -8. In the **State Restore** group, after the **Set Status 5** action, verify there's a **User State \ Request State Store** action with the following settings: - - - Request state storage location to: Restore state from another computer - - If computer account fails to connect to state store, use the Network Access account: selected - - Options: Continue on error - - Options / Add Condition: - - Task Sequence Variable - - USMTLOCAL not equals True - -9. In the **State Restore** group, after the **Restore User State** action, verify there's a **Release State Store** action with the following settings: - - Options: Continue on error - - Options / Condition: - - Task Sequence Variable - - USMTLOCAL not equals True - -10. Select **OK**. - -## Organize your packages (optional) - -If desired, you can create a folder structure for packages. This folder structure is purely for organizational purposes and is useful if you need to manage a large number of packages. - -To create a folder for packages: - -On **CM01**: - -1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Application Management**, and then select **Packages**. - -2. Right-click **Packages**, point to **Folder**, select **Create Folder** and create the OSD folder. This process will create the Root \ OSD folder structure. - -3. Select the **MDT**, **User State Migration Tool for Windows**, and **Windows 10 x64 Settings** packages, right-click and select **Move**. - -4. In the **Move Selected Items** dialog box, select the **OSD** folder, and select **OK**. - -Next, see [Finalize the operating system configuration for Windows 10 deployment with Configuration Manager](finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md). - -## Related articles - -[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](../deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
-[Create a custom Windows PE boot image with Configuration Manager](../deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
-[Add a Windows 10 operating system image using Configuration Manager](../deploy-windows-cm/add-a-windows-10-operating-system-image-using-configuration-manager.md)
-[Create an application to deploy with Windows 10 using Configuration Manager](../deploy-windows-cm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
-[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](../deploy-windows-cm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
-[Deploy Windows 10 using PXE and Configuration Manager](../deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md)
-[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](../deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
-[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](../deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
diff --git a/windows/deployment/deploy-windows-cm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-cm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md deleted file mode 100644 index da0da8612c..0000000000 --- a/windows/deployment/deploy-windows-cm/create-an-application-to-deploy-with-windows-10-using-configuration-manager.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: Create an app to deploy with Windows 10 using Configuration Manager -description: Microsoft Configuration Manager supports deploying applications as part of the Windows 10 deployment process. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Create an application to deploy with Windows 10 using Configuration Manager - -*Applies to:* - -- Windows 10 - -Microsoft Configuration Manager supports deploying applications as part of the Windows 10 deployment process. In this section, you create an application in Microsoft Configuration Manager that you later configure the task sequence to use. - -For the purposes of this guide, we'll use one server computer: CM01. - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - -> [!NOTE] -> The [reference image](add-a-windows-10-operating-system-image-using-configuration-manager.md) used in this lab already contains some applications, such as Microsoft Office 365 Pro Plus x64. The procedure demonstrated in this article enables you to add some additional custom applications beyond those included in the reference image. - -## Example: Create the Adobe Reader application - -On **CM01**: - -1. Create the **`D:\Setup`** folder if it doesn't already exist. - -2. Download the Enterprise distribution version of [Adobe Acrobat Reader DC](https://get.adobe.com/reader/enterprise/) (ex: AcroRdrDC2000620034_en_US.exe) to **`D:\Setup\Adobe`** on CM01. The filename will differ depending on the version of Acrobat Reader. - -3. Extract the .exe file that you downloaded to a .msi. The source folder will differ depending on where you downloaded the file. See the following example: - - ```powershell - Set-Location C:\Users\administrator.CONTOSO\Downloads - .\AcroRdrDC2000620034_en_US.exe -sfx_o"d:\Setup\Adobe\" -sfx_ne - ``` - - > [!NOTE] - > The extraction process will create the "Adobe" folder. - -4. Using File Explorer, copy the **`D:\Setup\Adobe`** folder to the **`D:\Sources\Software\Adobe`** folder. - -5. In the Configuration Manager Console, in the **Software Library** workspace, expand **Application Management**. - -6. Right-click **Applications**, point to **Folder** and then select **Create Folder**. Assign the name **OSD**. - -7. Right-click the **OSD** folder, and select **Create Application**. - -8. In the Create Application Wizard, on the **General** page, use the following settings: - - - Automatically detect information about this application from installation files - - Type: Windows Installer (\*.msi file) - - Location: `\\CM01\Sources$\Software\Adobe\AcroRead.msi` - - ![The Create Application Wizard.](../images/mdt-06-fig20.png "The Create Application Wizard") - - The Create Application Wizard - -9. Select **Next**, and wait while Configuration Manager parses the MSI file. - -10. On the **Import Information** page, review the information and then select **Next**. - -11. On the **General Information** page, name the application Adobe Acrobat Reader DC - OSD Install, select **Next** twice, and then select **Close**. - - > [!NOTE] - > Because it is not possible to reference an application deployment type in the task sequence, you should have a single deployment type for applications deployed by the task sequence. If you are deploying applications via both the task sequence and normal application deployment, and you have multiple deployment types, you should have two applications of the same software. In this section, you add the "OSD Install" suffix to applications that are deployed via the task sequence. If using packages, you can still reference both package and program in the task sequence. - - ![Add the OSD Install suffix to the application name.](../images/mdt-06-fig21.png "Add the OSD Install suffix to the application name") - - Add the "OSD Install" suffix to the application name - -12. In the **Applications** node, select the Adobe Reader - OSD Install application, and select **Properties** on the ribbon bar (this path is another place to view properties, you can also right-click and select properties). - -13. On the **General Information** tab, select the **Allow this application to be installed from the Install Application task sequence action without being deployed** check box, and select **OK**. - -Next, see [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md). - -## Related articles - -[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
-[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
-[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
-[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
-[Create a task sequence with Configuration Manager and MDT](./create-a-task-sequence-with-configuration-manager-and-mdt.md)
-[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
-[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
-[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
diff --git a/windows/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md b/windows/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md deleted file mode 100644 index 1d0ee23b79..0000000000 --- a/windows/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md +++ /dev/null @@ -1,111 +0,0 @@ ---- -title: Deploy Windows 10 using PXE and Configuration Manager (Windows 10) -description: In this article, you'll learn how to deploy Windows 10 using Microsoft Configuration Manager deployment packages and task sequences. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Deploy Windows 10 using PXE and Configuration Manager - -*Applies to:* - -- Windows 10 - -In this article, you'll learn how to deploy Windows 10 using Microsoft Configuration Manager deployment packages and task sequences. This article will walk you through the process of deploying the Windows 10 Enterprise image to a Unified Extensible Firmware Interface (UEFI) computer named PC0001. An existing Configuration Manager infrastructure that is integrated with MDT is used for the procedures in this article. - -This article assumes that you've completed the following prerequisite procedures: - -- [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) -- [Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md) -- [Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md) -- [Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md) -- [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md) -- [Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md) -- [Finalize the operating system configuration for Windows 10 deployment with Configuration Manager](finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md) - -For the purposes of this guide, we'll use a minimum of two server computers (DC01 and CM01) and one client computer (PC0001). - -- DC01 is a domain controller and DNS server for the contoso.com domain. DHCP services are also available and optionally installed on DC01 or another server. Note: DHCP services are required for the client (PC0001) to connect to the Windows Deployment Service (WDS). - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. - - - CM01 is also running WDS that will be required to start PC0001 via PXE. - - > [!NOTE] - > Ensure that only CM01 is running WDS. - -- PC0001 is a client computer that is blank, or has an operating system that will be erased and replaced with Windows 10. The device must be configured to boot from the network. - -> [!NOTE] -> If desired, PC0001 can be a VM hosted on the server HV01, which is a Hyper-V host computer that we used previously to build a Windows 10 reference image. However, if PC0001 is a VM then you must ensure it has sufficient resources available to run the Configuration Manager OSD task sequence. 2GB of RAM or more is recommended. - -All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - -All server and client computers referenced in this guide are on the same subnet. This connection isn't required. But each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the `contoso.com` domain. Internet connectivity is also required to download OS and application updates. - -> [!NOTE] -> No WDS console configuration is required for PXE to work. Everything is done with the Configuration Manager console. - -## Procedures - -1. Start the PC0001 computer. At the Pre-Boot Execution Environment (PXE) boot menu, press **Enter** to allow it to PXE boot. - -2. On the **Welcome to the Task Sequence Wizard** page, enter in the password **pass\@word1** and select **Next**. - -3. On the **Select a task sequence to run** page, select **Windows 10 Enterprise x64 RTM** and select **Next**. - -4. On the **Edit Task Sequence Variables** page, double-click the **OSDComputerName** variable, and in the **Value** field, enter **PC0001** and select **OK**. Then select **Next**. - -5. The operating system deployment will take several minutes to complete. - -6. You can monitor the deployment on CM01 using the MDT Deployment Workbench. When you see the PC0001 entry, double-click **PC0001**, and then select **DaRT Remote Control** and review the **Remote Control** option. The task sequence will run and do the following steps: - - - Install the Windows 10 operating system. - - Install the Configuration Manager client and the client hotfix. - - Join the computer to the domain. - - Install the application added to the task sequence. - - > [!NOTE] - > You also can use the built-in reports to get information about ongoing deployments. For example, a task sequence report gives you a quick overview of the task sequence progress. - - ![MDT monitoring.](../images/pc0001-monitor.png) - - Monitoring the deployment with MDT. - -7. When the deployment is finished you'll have a domain-joined Windows 10 computer with the Adobe Reader application installed as well as the applications that were included in the reference image, such as Office 365 Pro Plus. - -Examples are provided below of various stages of deployment: - -![pc0001a.](../images/pc0001a.png)
-![pc0001b.](../images/pc0001b.png)
-![pc0001c.](../images/pc0001c.png)
-![pc0001d.](../images/pc0001d.png)
-![pc0001e.](../images/pc0001e.png)
-![pc0001f.](../images/pc0001f.png)
-![pc0001g.](../images/pc0001g.png)
-![pc0001h.](../images/pc0001h.png)
-![pc0001i.](../images/pc0001i.png)
-![pc0001j.](../images/pc0001j.png)
-![pc0001k.](../images/pc0001k.png)
-![pc0001l.](../images/pc0001l.png)
-![pc0001m.](../images/pc0001m.png)
-![pc0001n.](../images/pc0001n.png) - -Next, see [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md). - -## Related articles - -[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
-[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
-[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
-[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
-[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
-[Create a task sequence with Configuration Manager and MDT](./create-a-task-sequence-with-configuration-manager-and-mdt.md)
-[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
-[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
diff --git a/windows/deployment/deploy-windows-cm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md b/windows/deployment/deploy-windows-cm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md deleted file mode 100644 index ceea5b0432..0000000000 --- a/windows/deployment/deploy-windows-cm/finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md +++ /dev/null @@ -1,172 +0,0 @@ ---- -title: Finalize operating system configuration for Windows 10 deployment -description: This article provides a walk-through to finalize the configuration of your Windows 10 operating deployment. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Finalize the operating system configuration for Windows 10 deployment with Configuration Manager - -*Applies to:* - -- Windows 10 - -This article walks you through the steps to finalize the configuration of your Windows 10 operating deployment, which includes enabling optional MDT monitoring for Configuration Manager, logs folder settings, rules configuration, content distribution, and deployment of the previously created task sequence. - -For the purposes of this guide, we'll use one server computer: CM01. - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - - An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). - -## Enable MDT monitoring - -This section will walk you through the process of creating the **`D:\MDTProduction`** deployment share using the MDT Deployment Workbench to enable monitoring for Configuration Manager. - -On **CM01**: - -1. Open the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**. Use the following settings for the New Deployment Share Wizard: - - - Deployment share path: D:\\MDTProduction - - Share name: MDTProduction$ - - Deployment share description: MDT Production - - Options: *\* - -2. Right-click the **MDT Production** deployment share, and select **Properties**. On the **Monitoring** tab, select the **Enable monitoring for this deployment share** check box, and select **OK**. - - ![Enable MDT monitoring for Configuration Manager.](../images/mdt-06-fig31.png) - - Enable MDT monitoring for Configuration Manager - -## Configure the Logs folder - -The D:\Logs folder was [created previously](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md?#review-the-sources-folder-structure) and SMB permissions were added. Next, we'll add NTFS folder permissions for the Configuration Manager Network Access Account (CM_NAA), and enable server-side logging by modifying the CustomSettings.ini file used by the Configuration Manager task sequence. - -On **CM01**: - -1. To configure NTFS permissions using `icacls.exe`, enter the following command at an elevated Windows PowerShell prompt: - - ```cmd - icacls.exe D:\Logs /grant '"CM_NAA":(OI)(CI)(M)' - ``` - -2. Using File Explorer, navigate to the **`D:\Sources\OSD\Settings\Windows 10 x64 Settings`** folder. - -3. To enable server-side logging, edit the `CustomSetting.ini` file with `Notepad.exe` and enter the following settings: - - ```ini - [Settings] - Priority=Default - Properties=OSDMigrateConfigFiles,OSDMigrateMode - - [Default] - DoCapture=NO - ComputerBackupLocation=NONE - MachineObjectOU=ou=Workstations,ou=Computers,ou=Contoso,dc=contoso,dc=com - OSDMigrateMode=Advanced - OSDMigrateAdditionalCaptureOptions=/ue:*\* /ui:CONTOSO\* - OSDMigrateConfigFiles=Miguser.xml,Migapp.xml - SLSHARE=\\CM01\Logs$ - EventService=http://CM01:9800 - ApplyGPOPack=NO - ``` - - ![Settings package during deployment.](../images/fig30-settingspack.png) - - The Settings package, holding the rules and the `Unattend.xml` template used during deployment - -4. In the Configuration Manager console, update the distribution point for the **Windows 10 x64 Settings** package by right-clicking the **Windows 10 x64 Settings** package and selecting **Update Distribution Points**. Select **OK** in the popup dialog box. - - > [!NOTE] - > Although you haven't yet added a distribution point, you still need to select Update Distribution Points. This process also updates the Configuration Manager content library with changes. - -## Distribute content to the CM01 distribution portal - -In Configuration Manager, you can distribute all packages needed by a task sequence in a single task. In this section, you distribute packages that haven't yet been distributed to the CM01 distribution point. - -On **CM01**: - -1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems** and select **Task Sequences**. Right-click the **Windows 10 Enterprise x64 RTM** task sequence, and select **Distribute Content**. - -2. In the Distribute Content Wizard, select **Next** twice then on the **Specify the content destination** page add the Distribution Point: **CM01.CONTOSO.COM**, and then complete the wizard. - -3. Using the CMTrace tool, verify the distribution to the CM01 distribution point by reviewing the `distmgr.log` file, or use the Distribution Status / Content Status option in the Monitoring workspace. Don't continue until you see all the new packages being distributed successfully. - - ![Content status.](../images/cm01-content-status1.png) - - Content status - -## Create a deployment for the task sequence - -This section provides steps to help you create a deployment for the task sequence. - -On **CM01**: - -1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems** and select **Task Sequences**, right-click **Windows 10 Enterprise x64 RTM** and then select **Deploy**. - -2. In the Deploy Software Wizard, on the **General** page, select the **All Unknown Computers** collection and select **Next**. - -3. On the **Deployment Settings** page, use the below settings and then select **Next**: - - - Purpose: Available - - Make available to the following: Only media and PXE - - ![Configure the deployment settings.](../images/mdt-06-fig33.png) - - Configure the deployment settings - -4. On the **Scheduling** page, accept the default settings and select **Next**. - -5. On the **User Experience** page, accept the default settings and select **Next**. - -6. On the **Alerts** page, accept the default settings and select **Next**. - -7. On the **Distribution Points** page, accept the default settings, select **Next** twice, and then select **Close**. - - ![Task sequence deployed.](../images/fig32-deploywiz.png) - - The Windows 10 Enterprise x64 RTM task sequence deployed to the All Unknown Computers collections available for media and PXE - -## Configure Configuration Manager to prompt for the computer name during deployment (optional) - -You can have Configuration Manager prompt you for a computer name or you can use rules to generate a computer name. For more information on how to do this step, see [Configure MDT settings](../deploy-windows-mdt/configure-mdt-settings.md). - -This section provides steps to help you configure the All Unknown Computers collection to have Configuration Manager prompt for computer names. - -On **CM01**: - -1. Using the Configuration Manager console, in the **Asset and Compliance** workspace, select **Device Collections**, right-click **All Unknown Computers**, and select **Properties**. - -2. On the **Collection Variables** tab, create a new variable with the following settings: - - - Name: OSDComputerName - - Clear the **Do not display this value in the Configuration Manager console** check box. - -3. Select **OK**. - - > [!NOTE] - > Configuration Manager can prompt for information in many ways. Using a collection variable with an empty value is just one of them. Another option is the User-Driven Installation (UDI) wizard. - - ![Configure a collection variable.](../images/mdt-06-fig35.png) - - Configure a collection variable - -Next, see [Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md). - -## Related articles - -[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
-[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
-[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
-[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
-[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
-[Create a task sequence with Configuration Manager and MDT](./create-a-task-sequence-with-configuration-manager-and-mdt.md)
-[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
-[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
-[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
diff --git a/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md b/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md deleted file mode 100644 index 42526dd62d..0000000000 --- a/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md +++ /dev/null @@ -1,430 +0,0 @@ ---- -title: Prepare for Zero Touch Installation of Windows 10 with Configuration Manager -description: Learn how to prepare a Zero Touch Installation of Windows 10 with Configuration Manager, by integrating Configuration Manager with Microsoft Deployment Toolkit. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: how-to -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Prepare for Zero Touch Installation of Windows 10 with Configuration Manager - -*Applies to:* - -- Windows 10 - -This article walks you through the Zero Touch Installation (ZTI) process of Windows 10 OS deployment using Microsoft Configuration Manager [integrated](#why-integrate-mdt-with-configuration-manager) with Microsoft Deployment Toolkit (MDT). - -## Prerequisites - -In this article, you'll use [components](#components-of-configuration-manager-operating-system-deployment) of an existing Configuration Manager infrastructure to prepare for Windows 10 OSD. In addition to the base setup, the following configurations should be made in the Configuration Manager environment: - -- Configuration Manager current branch + all security and critical updates are installed. - - > [!NOTE] - > Procedures in this guide use Configuration Manager version 1910. For more information about the versions of Windows 10 supported by Configuration Manager, see [Support for Windows 10](/mem/configmgr/core/plan-design/configs/support-for-windows-10). - -- The [Active Directory Schema has been extended](/mem/configmgr/core/plan-design/network/extend-the-active-directory-schema) and System Management container created. - -- Active Directory Forest Discovery and Active Directory System Discovery are [enabled](/mem/configmgr/core/servers/deploy/configure/configure-discovery-methods). - -- IP range [boundaries and a boundary group](/mem/configmgr/core/servers/deploy/configure/define-site-boundaries-and-boundary-groups) for content and site assignment have been created. - -- The Configuration Manager [reporting services](/mem/configmgr/core/servers/manage/configuring-reporting) point role has been added and configured. - -- A file system folder structure and Configuration Manager console folder structure for packages has been created. Steps to verify or create this folder structure are [provided below](#review-the-sources-folder-structure). - -- The [Windows ADK](/windows-hardware/get-started/adk-install) version that is [supported for the version of Configuration Manager](/mem/configmgr/core/plan-design/configs/support-for-windows-adk) that is installed, including the Windows PE add-on. USMT should be installed as part of the Windows ADK install. - -- [MDT](https://www.microsoft.com/download/details.aspx?id=54259) version 8456 - -- DaRT 10 (part of [MDOP 2015](https://my.visualstudio.com/Downloads?q=Desktop%20Optimization%20Pack%202015)) are installed. - -- The [CMTrace tool](/configmgr/core/support/cmtrace) (cmtrace.exe) is installed on the distribution point. - - > [!NOTE] - > CMTrace is automatically installed with the current branch of Configuration Manager at **`Program Files\Microsoft Configuration Manager\tools\cmtrace.exe`**. - -For the purposes of this guide, we'll use three server computers: DC01, CM01 and HV01. - -- DC01 is a domain controller and DNS server for the contoso.com domain. DHCP services are also available and optionally installed on DC01 or another server. -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. -- HV01 is a Hyper-V host computer that is used to build a Windows 10 reference image. This computer doesn't need to be a domain member. - -All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - -All server and client computers referenced in this guide are on the same subnet. This interrelation isn't required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates. - -### Domain credentials - -The following generic credentials are used in this guide. You should replace these credentials as they appear in each procedure with your credentials. - -- **Active Directory domain name**: `contoso.com` -- **Domain administrator username**: `administrator` -- **Domain administrator password**: `pass@word1` - -## Create the OU structure - -> [!NOTE] -> If you've already [created the OU structure](../deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md#create-the-ou-structure) that was used in the OSD guide for MDT, the same structure is used here and you can skip this section. - -On **DC01**: - -To create the OU structure, you can use the Active Directory Users and Computers console (dsa.msc), or you can use Windows PowerShell. The procedure below uses Windows PowerShell. - -To use Windows PowerShell, copy the following commands into a text file and save it as `C:\Setup\Scripts\ou.ps1`. Ensure that you're viewing file extensions and that you save the file with the `.ps1` extension. - -```powershell -$oulist = Import-csv -Path c:\oulist.txt -ForEach($entry in $oulist){ - $ouname = $entry.ouname - $oupath = $entry.oupath - New-ADOrganizationalUnit -Name $ouname -Path $oupath -WhatIf - Write-Host -ForegroundColor Green "OU $ouname is created in the location $oupath" -} -``` - -Next, copy the following list of OU names and paths into a text file and save it as **C:\Setup\Scripts\oulist.txt** - -```text -OUName,OUPath -Contoso,"DC=CONTOSO,DC=COM" -Accounts,"OU=Contoso,DC=CONTOSO,DC=COM" -Computers,"OU=Contoso,DC=CONTOSO,DC=COM" -Groups,"OU=Contoso,DC=CONTOSO,DC=COM" -Admins,"OU=Accounts,OU=Contoso,DC=CONTOSO,DC=COM" -Service Accounts,"OU=Accounts,OU=Contoso,DC=CONTOSO,DC=COM" -Users,"OU=Accounts,OU=Contoso,DC=CONTOSO,DC=COM" -Servers,"OU=Computers,OU=Contoso,DC=CONTOSO,DC=COM" -Workstations,"OU=Computers,OU=Contoso,DC=CONTOSO,DC=COM" -Security Groups,"OU=Groups,OU=Contoso,DC=CONTOSO,DC=COM" -``` - -Lastly, open an elevated Windows PowerShell prompt on DC01 and run the ou.ps1 script: - -```powershell -Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force -Set-Location C:\Setup\Scripts -.\ou.ps1 -``` - -## Create the Configuration Manager service accounts - -A role-based model is used to configure permissions for the service accounts needed for operating system deployment in Configuration Manager. Perform the following steps to create the Configuration Manager **join domain** and **network access** accounts: - -On **DC01**: - -1. In the Active Directory Users and Computers console, browse to **contoso.com** > **Contoso** > **Service Accounts**. - -2. Select the Service Accounts OU and create the CM\_JD account using the following settings: - - - Name: CM\_JD - - User sign-in name: CM\_JD - - Password: `pass@word1` - - User must change password at next logon: Clear - - User can't change password: Selected - - Password never expires: Selected - -3. Repeat the step, but for the CM\_NAA account. - -4. After creating the accounts, assign the following descriptions: - - - CM\_JD: Configuration Manager Join Domain Account - - CM\_NAA: Configuration Manager Network Access Account - -## Configure Active Directory permissions - -In order for the Configuration Manager Join Domain Account (CM\_JD) to join machines into the contoso.com domain, you need to configure permissions in Active Directory. These steps assume you've downloaded the sample [Set-OUPermissions.ps1 script](https://go.microsoft.com/fwlink/p/?LinkId=619362) and copied it to `C:\Setup\Scripts` on DC01. - -On **DC01**: - -1. Sign in as contoso\administrator and enter the following commands at an elevated Windows PowerShell prompt: - - ```powershell - Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force - Set-Location C:\Setup\Scripts - .\Set-OUPermissions.ps1 -Account CM_JD -TargetOU "OU=Workstations,OU=Computers,OU=Contoso" - ``` - -2. The Set-OUPermissions.ps1 script allows the CM\_JD user account permissions to manage computer accounts in the Contoso / Computers / Workstations OU. The following list is that of permissions being granted: - - - Scope: This object and all descendant objects - - Create Computer objects - - Delete Computer objects - - Scope: Descendant Computer objects - - Read All Properties - - Write All Properties - - Read Permissions - - Modify Permissions - - Change Password - - Reset Password - - Validated write to DNS host name - - Validated write to service principal name - -## Review the Sources folder structure - -On **CM01**: - -To support the packages you create in this article, the following folder structure should be created on the Configuration Manager primary site server (CM01): - -- D:\\Sources -- D:\\Sources\\OSD -- D:\\Sources\\OSD\\Boot -- D:\\Sources\\OSD\\DriverPackages -- D:\\Sources\\OSD\\DriverSources -- D:\\Sources\\OSD\\MDT -- D:\\Sources\\OSD\\OS -- D:\\Sources\\OSD\\Settings -- D:\\Sources\\OSD\\Branding -- D:\\Sources\\Software -- D:\\Sources\\Software\\Adobe -- D:\\Sources\\Software\\Microsoft -- D:\\Logs - -> [!NOTE] -> In most production environments, the packages are stored on a Distributed File System (DFS) share or a "normal" server share, but in a lab environment you can store them on the site server. - -You can run the following commands from an elevated Windows PowerShell prompt to create this folder structure: - -```powershell -New-Item -ItemType Directory -Path "D:\Sources" -New-Item -ItemType Directory -Path "D:\Sources\OSD" -New-Item -ItemType Directory -Path "D:\Sources\OSD\Boot" -New-Item -ItemType Directory -Path "D:\Sources\OSD\DriverPackages" -New-Item -ItemType Directory -Path "D:\Sources\OSD\DriverSources" -New-Item -ItemType Directory -Path "D:\Sources\OSD\OS" -New-Item -ItemType Directory -Path "D:\Sources\OSD\Settings" -New-Item -ItemType Directory -Path "D:\Sources\OSD\Branding" -New-Item -ItemType Directory -Path "D:\Sources\OSD\MDT" -New-Item -ItemType Directory -Path "D:\Sources\Software" -New-Item -ItemType Directory -Path "D:\Sources\Software\Adobe" -New-Item -ItemType Directory -Path "D:\Sources\Software\Microsoft" -New-SmbShare -Name Sources$ -Path D:\Sources -FullAccess "NT AUTHORITY\INTERACTIVE", "BUILTIN\Administrators" -New-Item -ItemType Directory -Path "D:\Logs" -New-SmbShare -Name Logs$ -Path D:\Logs -ChangeAccess EVERYONE -``` - -## Integrate Configuration Manager with MDT - -To extend the Configuration Manager console with MDT wizards and templates, install MDT with the default settings and run the **Configure ConfigManager Integration** desktop app. In these steps, we assume you've already [downloaded MDT](https://www.microsoft.com/download/details.aspx?id=54259) and installed it with default settings. - -On **CM01**: - -1. Sign in as contoso\administrator. - -2. Ensure the Configuration Manager Console is closed before continuing. - -3. Select Start, type **Configure ConfigManager Integration**, and run the application with the following settings: - - - Site Server Name: CM01.contoso.com - - Site code: PS1 - -![figure 8.](../images/mdt-06-fig08.png) - -MDT integration with Configuration Manager. - -## Configure the client settings - -Most organizations want to display their name during deployment. In this section, you configure the default Configuration Manager client settings with the Contoso organization name. - -On **CM01**: - -1. Open the Configuration Manager Console, select the **Administration** workspace, then select **Client Settings**. - -2. In the right pane, right-click **Default Client Settings** and then select **Properties**. - -3. In the **Computer Agent** node, in the **Organization name displayed in Software Center** text box, enter in **Contoso** and select **OK**. - -![figure 9.](../images/mdt-06-fig10.png) - -Configure the organization name in client settings. - -![figure 10.](../images/fig10-contosoinstall.png) - -The Contoso organization name displayed during deployment. - -## Configure the Network Access account - -Configuration Manager uses the Network Access account during the Windows 10 deployment process to access content on the distribution points. In this section, you configure the Network Access account. - -On **CM01**: - -1. Using the Configuration Manager Console, in the **Administration** workspace, expand **Site Configuration** and select **Sites**. - -2. Right-click **PS1 - Primary Site 1**, point to **Configure Site Components**, and then select **Software Distribution**. - -3. On the **Network Access Account** tab, select **Specify the account that accesses network locations** and add the account **CONTOSO\\CM\_NAA** as the Network Access account (password: **pass@word1**). Use the new **Verify** option to verify that the account can connect to the **`\\DC01\sysvol`** network share. - -![figure 11.](../images/mdt-06-fig12.png) - -Test the connection for the Network Access account. - -## Enable PXE on the CM01 distribution point - -Configuration Manager has many options for starting a deployment, but starting via PXE is certainly the most flexible in a large environment. In this section, you enable PXE on the CM01 distribution point. - -On **CM01**: - -1. In the Configuration Manager Console, in the **Administration** workspace, select **Distribution Points**. - -2. Right-click the **\\\\CM01.CONTOSO.COM distribution point** and select **Properties**. - -3. On the **PXE** tab, use the following settings: - - - Enable PXE support for clients - - Allow this distribution point to respond to incoming PXE requests - - Enable unknown computer - - Require a password when computers use PXE - - Password and Confirm password: pass@word1 - - ![figure 12.](../images/mdt-06-fig13.png) - - Configure the CM01 distribution point for PXE. - - > [!NOTE] - > If you select **Enable a PXE responder without Windows Deployment Service**, then WDS won't be installed, or if it's already installed it will be suspended, and the **ConfigMgr PXE Responder Service** (**SccmPxe**) will be used instead of WDS. The ConfigMgr PXE Responder doesn't support multicast. For more information, see [Install and configure distribution points](/configmgr/core/servers/deploy/configure/install-and-configure-distribution-points#bkmk_config-pxe). - -4. Using the CMTrace tool, review the **`C:\Program Files\Microsoft Configuration Manager\Logs\distmgr.log`** file. Look for the **ConfigurePXE** and **CcmInstallPXE** lines. - - ![figure 13.](../images/mdt-06-fig14.png) - - The `distmgr.log` displays a successful configuration of PXE on the distribution point. - -5. Verify that you've seven files in each of the folders **`D:\RemoteInstall\SMSBoot\x86`** and **`D:\RemoteInstall\SMSBoot\x64`**. - - ![figure 14.](../images/mdt-06-fig15.png) - - The contents of the D:\\RemoteInstall\\SMSBoot\\x64 folder after you enable PXE. - - > [!NOTE] - > These files are used by WDS. They aren't used by the ConfigMgr PXE Responder. This article doesn't use the ConfigMgr PXE Responder. - -Next, see [Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md). - -## Components of Configuration Manager operating system deployment - -Operating system deployment with Configuration Manager is part of the normal software distribution infrastructure, but there are more components. For example, operating system deployment in Configuration Manager may use the State Migration Point role, which isn't used by normal application deployment in Configuration Manager. This section describes the Configuration Manager components involved with the deployment of an operating system, such as Windows 10. - -- **State migration point (SMP).** The state migration point is used to store user state migration data during computer replace scenarios. - -- **Distribution point (DP).** The distribution point is used to store all packages in Configuration Manager, including the operating system deployment-related packages. - -- **Software update point (SUP).** The software update point, which is normally used to deploy updates to existing machines, also can be used to update an operating system as part of the deployment process. You also can use offline servicing to update the image directly on the Configuration Manager server. - -- **Reporting services point.** The reporting services point can be used to monitor the operating system deployment process. - -- **Boot images.** Boot images are the Windows Preinstallation Environment (Windows PE) images Configuration Manager uses to start the deployment. - -- **Operating system images.** The operating system image package contains only one file, the custom .wim image. This image is typically the production deployment image. - -- **Operating system installers.** The operating system installers were originally added to create reference images using Configuration Manager. Instead, we recommend that you use MDT Lite Touch to create your reference images. For more information on how to create a reference image, see [Create a Windows 10 reference image](../deploy-windows-mdt/create-a-windows-10-reference-image.md). - -- **Drivers.** Like MDT Lite Touch, Configuration Manager also provides a repository (catalog) of managed device drivers. - -- **Task sequences.** The task sequences in Configuration Manager look and feel much like the sequences in MDT Lite Touch, and they're used for the same purpose. However, in Configuration Manager, the task sequence is delivered to the clients as a policy via the Management Point (MP). MDT provides more task sequence templates to Configuration Manager. - - > [!NOTE] - > The Windows Assessment and Deployment Kit (ADK) for Windows 10 is also required to support management and deployment of Windows 10. - -## Why integrate MDT with Configuration Manager - -As noted above, MDT adds many enhancements to Configuration Manager. While these enhancements are called Zero Touch, that name doesn't reflect how deployment is conducted. The following sections provide a few samples of the 280 enhancements that MDT adds to Configuration Manager. - -> [!NOTE] -> MDT installation requires the following: -> -> - The Windows ADK for Windows 10 (installed in the previous procedure) -> - Windows PowerShell ([version 5.1](https://www.microsoft.com/download/details.aspx?id=54616) is recommended; type **$host** to check) -> - Microsoft .NET Framework - -### MDT enables dynamic deployment - -When MDT is integrated with Configuration Manager, the task sequence processes more instructions from the MDT rules. In its most simple form, these settings are stored in a text file, the `CustomSettings.ini` file, but you can store the settings in Microsoft SQL Server databases, or have Microsoft Visual Basic Scripting Edition (VBScripts) or web services provide the settings used. - -The task sequence uses instructions that allow you to reduce the number of task sequences in Configuration Manager and instead store settings outside the task sequence. Here are a few examples: - -- The following settings instruct the task sequence to install the HP Hotkeys package, but only if the hardware is an HP EliteBook 8570w. You don't have to add the package to the task sequence. - - ```ini - [Settings] - Priority=Model - [HP EliteBook 8570w] - Packages001=PS100010:Install HP Hotkeys - ``` - -- The following settings instruct the task sequence to put laptops and desktops in different organizational units (OUs) during deployment, assign different computer names, and finally have the task sequence install the Cisco VPN client, but only if the machine is a laptop. - - ```ini - [Settings] - Priority= ByLaptopType, ByDesktopType - [ByLaptopType] - Subsection=Laptop-%IsLaptop% - [ByDesktopType] - Subsection=Desktop-%IsDesktop% - [Laptop-True] - Packages001=PS100012:Install Cisco VPN Client - OSDComputerName=LT-%SerialNumber% - MachineObjectOU=ou=laptops,ou=Contoso,dc=contoso,dc=com - [Desktop-True] - OSDComputerName=DT-%SerialNumber% - MachineObjectOU=ou=desktops,ou=Contoso,dc=contoso,dc=com - ``` - -![figure 2.](../images/fig2-gather.png) - -The Gather action in the task sequence is reading the rules. - -### MDT adds an operating system deployment simulation environment - -When testing a deployment, it's important to be able to quickly test any changes you make to the deployment without needing to run through an entire deployment. MDT rules can be tested quickly, saving significant testing time in a deployment project. For more information, see [Configure MDT settings](../deploy-windows-mdt/configure-mdt-settings.md). - -![figure 3.](../images/mdt-06-fig03.png) - -The folder that contains the rules, a few scripts from MDT, and a custom script (Gather.ps1). - -### MDT adds real-time monitoring - -With MDT integration, you can follow your deployments in real time, and if you've access to Microsoft Diagnostics and Recovery Toolkit (DaRT), you can even remote into Windows Preinstallation Environment (Windows PE) during deployment. The real-time monitoring data can be viewed from within the MDT Deployment Workbench, via a web browser, Windows PowerShell, the Event Viewer, or Microsoft Excel 2013. In fact, any script or app that can read an Open Data (OData) feed can read the information. - -![figure 4.](../images/mdt-06-fig04.png) - -View the real-time monitoring data with PowerShell. - -### MDT adds an optional deployment wizard - -For some deployment scenarios, you may need to prompt the user for information during deployment such as the computer name, the correct organizational unit (OU) for the computer, or which applications should be installed by the task sequence. With MDT integration, you can enable the User-Driven Installation (UDI) wizard to gather the required information, and customize the wizard using the UDI Wizard Designer. - -![figure 5.](../images/mdt-06-fig05.png) - -The optional UDI wizard opens in the UDI Wizard Designer. - -MDT Zero Touch simply extends Configuration Manager with many useful built-in operating system deployment components. By providing well-established, supported solutions, MDT reduces the complexity of deployment in Configuration Manager. - -### Why use MDT Lite Touch to create reference images - -You can create reference images for Configuration Manager in Configuration Manager, but in general it is recommended to create them in MDT Lite Touch for the following reasons: - -- You can use the same image for every type of operating system deployment - Microsoft Virtual Desktop Infrastructure (VDI), Microsoft System Center Virtual Machine Manager (VMM), MDT, Configuration Manager, Windows Deployment Services (WDS), and more. - -- Configuration Manager performs deployment in the LocalSystem context, which means that you can't configure the Administrator account with all of the settings that you would like to be included in the image. MDT runs in the context of the Local Administrator, which means you can configure the look and feel of the configuration and then use the CopyProfile functionality to copy these changes to the default user during deployment. - -- The Configuration Manager task sequence suppresses user interface interaction. - -- MDT Lite Touch supports a Suspend action that allows for reboots, which is useful when you need to perform a manual installation or check the reference image before it's automatically captured. - -- MDT Lite Touch doesn't require any infrastructure and is easy to delegate. - -## Related articles - -[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)\ -[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)\ -[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)\ -[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)\ -[Create a task sequence with Configuration Manager and MDT](./create-a-task-sequence-with-configuration-manager-and-mdt.md)\ -[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)\ -[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)\ -[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md) diff --git a/windows/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md deleted file mode 100644 index e6876a705b..0000000000 --- a/windows/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md +++ /dev/null @@ -1,150 +0,0 @@ ---- -title: Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager -description: Learn how to use Configuration Manager and Microsoft Deployment Toolkit (MDT) to refresh a Windows 7 SP1 client with Windows 10. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager - -*Applies to:* - -- Windows 10 - -This article will show you how to refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager and Microsoft Deployment Toolkit (MDT). A computer refresh isn't the same as an in-place upgrade. A computer refresh involves storing user data and settings from the old installation, wiping the hard drives, installing a new OS, and then restoring the user data at the end of the installation. - -A computer refresh with Configuration Manager works the same as it does with MDT Lite Touch installation. Configuration Manager also uses the User State Migration Tool (USMT) from the Windows Assessment and Deployment Kit (Windows ADK) 10 in the background. A computer refresh with Configuration Manager has the following steps: - -1. Data and settings are backed up locally in a backup folder. -2. The partition is wiped, except for the backup folder. -3. The new operating system image is applied. -4. Other applications are installed. -5. Data and settings are restored. - -## Infrastructure - -An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). - -For the purposes of this article, we'll use one server computer (CM01) and one client computer (PC0003). - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. - -- PC0003 is a domain member client computer running Windows 7 SP1, or a later version of Windows, with the Configuration Manager client installed, that will be refreshed to Windows 10. - -> [!NOTE] -> If desired, PC0003 can be a VM hosted on the server HV01, which is a Hyper-V host computer that we used previously to build a Windows 10 reference image. However, if PC0003 is a VM then you must ensure it has sufficient resources available to run the Configuration Manager OSD task sequence. 2GB of RAM or more is recommended. - -All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - -All server and client computers referenced in this guide are on the same subnet. This interrelation isn't required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates. - -> [!IMPORTANT] -> This article assumes that you have [configured Active Directory permissions](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md#configure-active-directory-permissions) in the specified OU for the **CM_JD** account, and the client's Active Directory computer account is in the **Contoso** > **Computers** > **Workstations** OU. Use the Active Directory Users and Computers console to review the location of computer objects and move them if needed. - -## Verify the Configuration Manager client settings - -To verify that PC003 is correctly assigned to the PS1 site: - -On **PC0003**: - -1. Open the Configuration Manager control panel (`control.exe smscfgrc`). - -2. On the **Site** tab, select **Configure Settings**, then select **Find Site**. - -3. Verify that Configuration Manager has successfully found a site to manage this client is displayed. See the following example. - -![Found a site to manage this client.](../images/pc0003a.png) - -## Create a device collection and add the PC0003 computer - -On **CM01**: - -1. Using the Configuration Manager console, in the **Asset and Compliance** workspace, expand **Overview**, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings: - - - General - - Name: Install Windows 10 Enterprise x64 - - Limited Collection: All Systems - - Membership rules - - Add Rule: Direct rule - - Resource Class: System Resource - - Attribute Name: Name - - Value: PC0003 - - Select Resources - - Select **PC0003** - - Use the default settings to complete the remaining wizard pages and select **Close**. - -2. Review the Install Windows 10 Enterprise x64 collection. Don't continue until you see the PC0003 machine in the collection. - - > [!NOTE] - > It may take a short while for the collection to refresh; you can view progress via the `Colleval.log` file. If you want to speed up the process, you can manually update membership on the Install Windows 10 Enterprise x64 collection by right-clicking the collection and selecting Update Membership. - -## Create a new deployment - -On **CM01**: - -Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64 RTM**, and then select **Deploy**. Use the below settings: - -- General - - Collection: Install Windows 10 Enterprise x64 -- Deployment Settings - - Purpose: Available - - Make available to the following: Configuration Manager clients, media and PXE - - > [!NOTE] - > It's not necessary to make the deployment available to media and Pre-Boot Execution Environment (PXE) for a computer refresh, but you will use the same deployment for bare-metal deployments later on and you will need it at that point. - -- Scheduling - - *\* -- User Experience - - *\* -- Alerts - - *\* -- Distribution Points - - *\* - -## Initiate a computer refresh - -Now you can start the computer refresh on PC0003. - -On **CM01**: - -1. Using the Configuration Manager console, in the **Assets and Compliance** workspace, select the **Install Windows 10 Enterprise x64** collection, right-click **PC0003**, point to **Client Notification**, select **Download Computer Policy**, and then select **OK** in the popup dialog box that appears. - -On **PC0003**: - -1. Open the Software Center (select Start and type **Software Center**, or select the **New software is available** balloon in the system tray), select **Operating Systems** and select the **Windows 10 Enterprise x64 RTM** deployment, then select **Install**. - -2. In the **Software Center** warning dialog box, select **Install Operating System**. - -3. The client computer will run the Configuration Manager task sequence, boot into Windows PE, and install the new OS and applications. See the following examples: - -![Task sequence example 1.](../images/pc0003b.png)
-![Task sequence example 2.](../images/pc0003c.png)
-![Task sequence example 3.](../images/pc0003d.png)
-![Task sequence example 4.](../images/pc0003e.png)
-![Task sequence example 5.](../images/pc0003f.png)
-![Task sequence example 6.](../images/pc0003g.png)
-![Task sequence example 7.](../images/pc0003h.png)
-![Task sequence example 8.](../images/pc0003i.png)
-![Task sequence example 9.](../images/pc0003j.png)
-![Task sequence example 10.](../images/pc0003k.png) - -Next, see [Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md). - -## Related articles - -[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
-[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
-[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
-[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
-[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
-[Create a task sequence with Configuration Manager and MDT](./create-a-task-sequence-with-configuration-manager-and-mdt.md)
-[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
-[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
diff --git a/windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md b/windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md deleted file mode 100644 index e26d5695c1..0000000000 --- a/windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager.md +++ /dev/null @@ -1,231 +0,0 @@ ---- -title: Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager -description: In this article, you'll learn how to replace a Windows 7 SP1 computer using Microsoft Configuration Manager. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager - -*Applies to:* - -- Windows 10 - -In this article, you'll learn how to replace a Windows 7 SP1 computer using Microsoft Configuration Manager. This process is similar to refreshing a computer, but since you're replacing the device, you have to run the backup job separately from the deployment of Windows 10. - -In this article, you'll create a backup-only task sequence that you run on PC0004 (the device you're replacing), deploy the PC0006 computer running Windows 10, and then restore this backup of PC0004 onto PC006. - -## Infrastructure - -An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). - -For the purposes of this article, we'll use one server computer (CM01) and two client computers (PC0004, PC0006). - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. - - Important: CM01 must include the **[State migration point](/configmgr/osd/get-started/manage-user-state#BKMK_StateMigrationPoint)** role for the replace task sequence used in this article to work. - -- PC0004 is a domain member client computer running Windows 7 SP1, or a later version of Windows, with the Configuration Manager client installed, that will be replaced. - -- PC0006 is a domain member client computer running Windows 10, with the Configuration Manager client installed, that will replace PC0004. - -> [!NOTE] -> PC0004 and PC006 can be VMs hosted on the server HV01, which is a Hyper-V host computer that we used previously to build a Windows 10 reference image. However, the VMs must have sufficient resources available to run the Configuration Manager OSD task sequence. 2GB of RAM or more is recommended. - -All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - -All server and client computers referenced in this guide are on the same subnet. This interrelation isn't required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates. - -> [!IMPORTANT] -> This article assumes that you have [configured Active Directory permissions](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md#configure-active-directory-permissions) in the specified OU for the **CM_JD** account, and the client's Active Directory computer account is in the **Contoso > Computers > Workstations** OU. Use the Active Directory Users and Computers console to review the location of computer objects and move them if needed. - -## Create a replace task sequence - -On **CM01**: - -1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create MDT Task Sequence**. - -2. On the **Choose Template** page, select the **Client Replace Task Sequence** template and select **Next**. - -3. On the **General** page, assign the following settings and select **Next**: - - - Task sequence name: Replace Task Sequence - - Task sequence comments: USMT backup only - -4. On the **Boot Image** page, browse and select the **Zero Touch WinPE x64** boot image package. Then select **Next**. - -5. On the **MDT Package** page, browse and select the **OSD / MDT** package. Then select **Next**. - -6. On the **USMT Package** page, browse and select the **OSD / Microsoft Corporation User State Migration Tool for Windows** package. Then select **Next**. - -7. On the **Settings Package** page, browse and select the **OSD / Windows 10 x64 Settings** package. Then select **Next**. - -8. On the **Summary** page, review the details and then select **Next**. - -9. On the **Confirmation** page, select **Finish**. - -10. Review the Replace Task Sequence. - - > [!NOTE] - > This task sequence has many fewer actions than the normal client task sequence. If it doesn't seem different, make sure you selected the **Client Replace Task Sequence** template when creating the task sequence. - -![The back-up only task sequence.](../images/mdt-06-fig42.png "The back-up only task sequence") - -The backup-only task sequence (named Replace Task Sequence). - -## Associate the new device with the old computer - -This section walks you through the process of associating a new, blank device (PC0006), with an existing computer (PC0004), for replacing PC0004 with PC0006. PC0006 can be either a physical or virtual machine. - -On **HV01** (if PC0006 is a VM) or in the PC0006 BIOS: - -1. Make a note of the MAC address for PC0006. (If PC0006 is a virtual machine, you can see the MAC Address in the virtual machine settings.) In our example, the PC0006 MAC Address is 00:15:5D:0A:6A:96. Don't attempt to PXE boot PC0006 yet. - -On **CM01**: - -1. When you're using the Configuration Manager console, in the **Assets and Compliance** workspace, right-click **Devices**, and then select **Import Computer Information**. - -2. On the **Select Source** page, select **Import single computer** and select **Next**. - -3. On the **Single Computer** page, use the following settings and then select **Next**: - - - Computer Name: PC0006 - - MAC Address: *\ - - Source Computer: PC0004 - - ![Create the computer association.](../images/mdt-06-fig43.png "Create the computer association") - - Creating the computer association between PC0004 and PC0006. - -4. On the **User Accounts** page, select **Capture and restore all user accounts** and select **Next**. - -5. On the **Data Preview** page, select **Next**. - -6. On the **Choose additional collections** page, select **Add** and then select the **Install Windows 10 Enterprise x64** collection. Now, select the checkbox next to the Install Windows 10 Enterprise x64 collection you just added, and then select **Next**. - -7. On the **Summary** page, select **Next**, and then select **Close**. - -8. Select the **User State Migration** node and review the computer association in the right hand pane. - -9. Right-click the **PC0004/PC0006** association and select **View Recovery Information**. A recovery key has been assigned already, but a user state store location hasn't. - -10. Review the **Install Windows 10 Enterprise x64** collection. Don't continue until you see the **PC0006** computer in the collection. You might have to update membership and refresh the collection again. - -## Create a device collection and add the PC0004 computer - -On **CM01**: - -1. When you're using the Configuration Manager console, in the **Asset and Compliance** workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings: - - - General - - Name: USMT Backup (Replace) - - Limited Collection: All Systems - - Membership rules: - - Add Rule: Direct rule - - Resource Class: System Resource - - Attribute Name: Name - - Value: PC0004 - - Select Resources: - - Select **PC0004** - - Use default settings for the remaining wizard pages, then select **Close**. - -2. Review the **USMT Backup (Replace)** collection. Don't continue until you see the **PC0004** computer in the collection. - -## Create a new deployment - -On **CM01**: - -Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Replace Task Sequence**, and then select **Deploy**. Use the following settings: - -- General - - Collection: USMT Backup (Replace) -- Deployment Settings - - Purpose: Available - - Make available to the following: Only Configuration Manager Clients -- Scheduling - - *\ -- User Experience - - *\ -- Alerts - - *\ -- Distribution Points - - *\ - -## Verify the backup - -This section assumes that you have a computer named PC0004 with the Configuration Manager client installed. - -On **PC0004**: - -1. If it's not already started, start the PC0004 computer and open the Configuration Manager control panel (**`control.exe smscfgrc`**). -2. On the **Actions** tab, select **Machine Policy Retrieval & Evaluation Cycle**, select **Run Now**, and then select **OK** in the popup dialog box that appears. - - > [!NOTE] - > You also can use the Client Notification option in the Configuration Manager console, as shown in [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md). - -3. Open the Software Center, select the **Replace Task Sequence** deployment and then select **Install**. - -4. Confirm you want to upgrade the operating system on this computer by clicking **Install** again. - -5. Allow the Replace Task Sequence to complete. The PC0004 computer will gather user data, boot into Windows PE and gather more data, then boot back to the full OS. The entire process should only take a few minutes. - -![Task sequence example.](../images/pc0004b.png) - -Capturing the user state - -On **CM01**: - -1. Open the state migration point storage folder (ex: D:\Migdata) and verify that a subfolder was created containing the USMT backup. - -2. Using the Configuration Manager console, in the **Assets and Compliance** workspace, select the **User State Migration** node, right-click the **PC0004/PC0006** association, and select **View Recovery Information**. The object now also has a user state store location. - - > [!NOTE] - > It may take a few minutes for the user state store location to be populated. - -## Deploy the new computer - -On **PC0006**: - -1. Start the PC0006 virtual machine (or physical computer), press **F12** to Pre-Boot Execution Environment (PXE) boot when prompted. Allow it to boot Windows Preinstallation Environment (Windows PE), and then complete the deployment wizard using the following settings: - - - Password: pass@word1 - - Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM - -2. The setup now starts and does the following steps: - - - Installs the Windows 10 operating system - - Installs the Configuration Manager client - - Joins it to the domain - - Installs the applications - - Restores the PC0004 backup - -When the process is complete, you'll have a new Windows 10 computer in your domain with user data and settings restored. See the following examples: - -![User data and setting restored example 1.](../images/pc0006a.png)
-![User data and setting restored example 2.](../images/pc0006b.png)
-![User data and setting restored example 3.](../images/pc0006c.png)
-![User data and setting restored example 4.](../images/pc0006d.png)
-![User data and setting restored example 5.](../images/pc0006e.png)
-![User data and setting restored example 6.](../images/pc0006f.png)
-![User data and setting restored example 7.](../images/pc0006g.png)
-![User data and setting restored example 8.](../images/pc0006h.png)
-![User data and setting restored example 9.](../images/pc0006i.png) - -Next, see [Perform an in-place upgrade to Windows 10 using Configuration Manager](upgrade-to-windows-10-with-configuration-manager.md). - -## Related articles - -- [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) -- [Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md) -- [Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md) -- [Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md) -- [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md) -- [Create a task sequence with Configuration Manager and MDT](./create-a-task-sequence-with-configuration-manager-and-mdt.md) -- [Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md) -- [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md) diff --git a/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md b/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md deleted file mode 100644 index ad22f1ed1a..0000000000 --- a/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md +++ /dev/null @@ -1,158 +0,0 @@ ---- -title: Perform in-place upgrade to Windows 10 via Configuration Manager -description: Learn how to perform an in-place upgrade to Windows 10 by automating the process with a Microsoft Configuration Manager task sequence. -manager: aaroncz -ms.author: frankroj -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.topic: conceptual -ms.subservice: itpro-deploy -ms.date: 10/27/2022 ---- - -# Perform an in-place upgrade to Windows 10 using Configuration Manager - -*Applies to:* - -- Windows 10 - -The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a Microsoft Configuration Manager task sequence to completely automate the process. - -> [!IMPORTANT] -> Beginning with Windows 10 and Windows Server 2016, Windows Defender is already installed. A management client for Windows Defender is also installed automatically if the Configuration Manager client is installed. However, previous Windows operating systems installed the System Center Endpoint Protection (SCEP) client with the Configuration Manager client. The SCEP client can block in-place upgrade to Windows 10 due to incompatibility, and must be removed from a device before performing an in-place upgrade to Windows 10. - -## Infrastructure - -An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). - -For the purposes of this article, we'll use one server computer (CM01) and one client computer (PC0004). - -- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. -- PC0004 is a domain member client computer running Windows 7 SP1, or a later version of Windows, with the Configuration Manager client installed, that will be upgraded to Windows 10. - -All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. - -All server and client computers referenced in this guide are on the same subnet. This interrelation isn't required. But each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the `contoso.com` domain. Internet connectivity is also required to download OS and application updates. - -## Add an OS upgrade package - -Configuration Manager Current Branch includes a native in-place upgrade task. This task sequence differs from the MDT in-place upgrade task sequence in that it doesn't use a default OS image, but rather uses an [OS upgrade package](/configmgr/osd/get-started/manage-operating-system-upgrade-packages). - -On **CM01**: - -1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Operating System Upgrade Packages**, and select **Add Operating System Upgrade Package**. - -2. On the **Data Source** page, under **Path**, select **Browse** and enter the UNC path to your media source. In this example, we've extracted the Windows 10 installation media to **`\\cm01\Sources$\OSD\UpgradePackages\Windows 10`**. - -3. If you have multiple image indexes in the installation media, select **Extract a specific image index from install.wim...** and choose the image index you want from the dropdown menu. In this example, we've chosen **Windows 10 Enterprise**. - -4. Next to **Architecture**, select **x64**, choose a language from the dropdown menu next to **Language**, and then select **Next**. - -5. Next to **Name**, enter **Windows 10 x64 RTM** and then complete the wizard by clicking **Next** and **Close**. - -6. Distribute the OS upgrade package to the CM01 distribution point by right-clicking the **Windows 10 x64 RTM** OS upgrade package and then clicking **Distribute Content**. - -7. In the Distribute Content Wizard, add the CM01 distribution point, select **Next** and select **Close**. - -8. View the content status for the Windows 10 x64 RTM upgrade package. Don't continue until the distribution is completed (it might take a few minutes). You also can review the **`D:\Program Files\Microsoft Configuration Manager\Logs\distmgr.log`** file and look for the **STATMSG: ID=2301** line. - -## Create an in-place upgrade task sequence - -On **CM01**: - -1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create Task Sequence**. - -2. On the **Create a new task sequence** page, select **Upgrade an operating system from an upgrade package** and select **Next**. - -3. Use the below settings to complete the wizard: - - - Task sequence name: Upgrade Task Sequence - - Description: In-place upgrade - - Upgrade package: Windows 10 x64 RTM - - Include software updates: Don't install any software updates - - Install applications: OSD \ Adobe Acrobat Reader DC - -4. Complete the wizard, and select **Close**. - -5. Review the Upgrade Task Sequence. - -![The upgrade task sequence.](../images/cm-upgrade-ts.png) - -The Configuration Manager upgrade task sequence - -## Create a device collection - -After you create the upgrade task sequence, you can create a collection to test a deployment. In this section, we assume you have the PC0004 computer running Windows 7 SP1, with the Configuration Manager client installed. - -On **CM01**: - -1. When you're using the Configuration Manager console, in the **Asset and Compliance** workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings: - - General - - Name: Windows 10 x64 in-place upgrade - - Limited Collection: All Systems - - Membership rules: - - Direct rule - - Resource Class: System Resource - - Attribute Name: Name - - Value: PC0004 - - Select Resources - - Select PC0004 - -2. Review the Windows 10 x64 in-place upgrade collection. Don't continue until you see PC0004 in the collection. - -## Deploy the Windows 10 upgrade - -In this section, you create a deployment for the Windows 10 Enterprise x64 Update application. - -On **CM01**: - -1. Using the Configuration Manager console, in the **Software Library** workspace, right-click the **Upgrade Task Sequence** task sequence, and then select **Deploy**. - -2. On the **General** page, browse and select the **Windows 10 x64 in-place upgrade** collection, and then select **Next**. - -3. On the **Content** page, select **Next**. - -4. On the **Deployment Settings** page, select **Next**: - -5. On the **Scheduling** page, accept the default settings, and then select **Next**. - -6. On the **User Experience** page, accept the default settings, and then select **Next**. - -7. On the **Alerts** page, accept the default settings, and then select **Next**. - -8. On the **Distribution Points** page, accept the default settings, and then select **Next**. - -9. On the **Summary** page, select **Next**, and then select **Close**. - -## Start the Windows 10 upgrade - -Next, run the in-place upgrade task sequence on PC0004. - -On **PC0004**: - -1. Open the Configuration Manager control panel (`control.exe smscfgrc`). - -2. On the **Actions** tab, select **Machine Policy Retrieval & Evaluation Cycle**, select **Run Now**, and then select **OK** in the popup dialog box that appears. - - > [!NOTE] - > You also can use the Client Notification option in the Configuration Manager console, as shown in [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md). - -3. Open the Software Center, select the **Upgrade Task Sequence** deployment and then select **Install**. - -4. Confirm you want to upgrade the operating system on this computer by clicking **Install** again. - -5. Allow the Upgrade Task Sequence to complete. The PC0004 computer will download the **Operating System Upgrade Package** (the Windows installation source files), perform an in-place upgrade, and install your added applications. See the following examples: - -![Upgrade task sequence example 1.](../images/pc0004-a.png)
-![Upgrade task sequence example 2.](../images/pc0004-b.png)
-![Upgrade task sequence example 3.](../images/pc0004-c.png)
-![Upgrade task sequence example 4.](../images/pc0004-d.png)
-![Upgrade task sequence example 5.](../images/pc0004-e.png)
-![Upgrade task sequence example 6.](../images/pc0004-f.png)
-![Upgrade task sequence example 7.](../images/pc0004-g.png) - -## Related articles - -- [Windows 10 deployment scenarios](../windows-deployment-scenarios.md). -- [Configuration Manager Team blog](https://techcommunity.microsoft.com/t5/configuration-manager-blog/bg-p/ConfigurationManagerBlog). diff --git a/windows/deployment/images/ContosoBackground.png b/windows/deployment/images/ContosoBackground.png deleted file mode 100644 index 12a04f0e83..0000000000 Binary files a/windows/deployment/images/ContosoBackground.png and /dev/null differ diff --git a/windows/deployment/images/ISE.png b/windows/deployment/images/ISE.png deleted file mode 100644 index edf53101f4..0000000000 Binary files a/windows/deployment/images/ISE.png and /dev/null differ diff --git a/windows/deployment/images/PoC.png b/windows/deployment/images/PoC.png deleted file mode 100644 index 6d7b7eb5af..0000000000 Binary files a/windows/deployment/images/PoC.png and /dev/null differ diff --git a/windows/deployment/images/cm-upgrade-ts.png b/windows/deployment/images/cm-upgrade-ts.png deleted file mode 100644 index 15c6b04400..0000000000 Binary files a/windows/deployment/images/cm-upgrade-ts.png and /dev/null differ diff --git a/windows/deployment/images/cm01-content-status1.png b/windows/deployment/images/cm01-content-status1.png deleted file mode 100644 index 2aa9f3bce1..0000000000 Binary files a/windows/deployment/images/cm01-content-status1.png and /dev/null differ diff --git a/windows/deployment/images/cm01-drivers-packages.png b/windows/deployment/images/cm01-drivers-packages.png deleted file mode 100644 index 9453c20588..0000000000 Binary files a/windows/deployment/images/cm01-drivers-packages.png and /dev/null differ diff --git a/windows/deployment/images/cm01-drivers-windows.png b/windows/deployment/images/cm01-drivers-windows.png deleted file mode 100644 index 16a6c031c7..0000000000 Binary files a/windows/deployment/images/cm01-drivers-windows.png and /dev/null differ diff --git a/windows/deployment/images/cm01-drivers.png b/windows/deployment/images/cm01-drivers.png deleted file mode 100644 index 57de49530b..0000000000 Binary files a/windows/deployment/images/cm01-drivers.png and /dev/null differ diff --git a/windows/deployment/images/configmgr-asset.png b/windows/deployment/images/configmgr-asset.png deleted file mode 100644 index 4dacaeb565..0000000000 Binary files a/windows/deployment/images/configmgr-asset.png and /dev/null differ diff --git a/windows/deployment/images/configmgr-client.png b/windows/deployment/images/configmgr-client.png deleted file mode 100644 index 45e0ad8883..0000000000 Binary files a/windows/deployment/images/configmgr-client.png and /dev/null differ diff --git a/windows/deployment/images/configmgr-collection.png b/windows/deployment/images/configmgr-collection.png deleted file mode 100644 index 01a1cca4a8..0000000000 Binary files a/windows/deployment/images/configmgr-collection.png and /dev/null differ diff --git a/windows/deployment/images/configmgr-install-os.png b/windows/deployment/images/configmgr-install-os.png deleted file mode 100644 index 53b314b132..0000000000 Binary files a/windows/deployment/images/configmgr-install-os.png and /dev/null differ diff --git a/windows/deployment/images/configmgr-post-refresh.png b/windows/deployment/images/configmgr-post-refresh.png deleted file mode 100644 index e116e04312..0000000000 Binary files a/windows/deployment/images/configmgr-post-refresh.png and /dev/null differ diff --git a/windows/deployment/images/configmgr-pxe.png b/windows/deployment/images/configmgr-pxe.png deleted file mode 100644 index 39cb22c075..0000000000 Binary files a/windows/deployment/images/configmgr-pxe.png and /dev/null differ diff --git a/windows/deployment/images/configmgr-site.png b/windows/deployment/images/configmgr-site.png deleted file mode 100644 index 92319fdbf7..0000000000 Binary files a/windows/deployment/images/configmgr-site.png and /dev/null differ diff --git a/windows/deployment/images/configmgr-software-cntr.png b/windows/deployment/images/configmgr-software-cntr.png deleted file mode 100644 index cd9520ed17..0000000000 Binary files a/windows/deployment/images/configmgr-software-cntr.png and /dev/null differ diff --git a/windows/deployment/images/disk2vhd-gen2.png b/windows/deployment/images/disk2vhd-gen2.png deleted file mode 100644 index 7f8d920f9d..0000000000 Binary files a/windows/deployment/images/disk2vhd-gen2.png and /dev/null differ diff --git a/windows/deployment/images/disk2vhd.png b/windows/deployment/images/disk2vhd.png deleted file mode 100644 index 7b9835f5f6..0000000000 Binary files a/windows/deployment/images/disk2vhd.png and /dev/null differ diff --git a/windows/deployment/images/disk2vhd4.png b/windows/deployment/images/disk2vhd4.png deleted file mode 100644 index 97f9448441..0000000000 Binary files a/windows/deployment/images/disk2vhd4.png and /dev/null differ diff --git a/windows/deployment/images/fig10-contosoinstall.png b/windows/deployment/images/fig10-contosoinstall.png deleted file mode 100644 index ac4eaf2aa0..0000000000 Binary files a/windows/deployment/images/fig10-contosoinstall.png and /dev/null differ diff --git a/windows/deployment/images/fig16-contentstatus1.png b/windows/deployment/images/fig16-contentstatus1.png deleted file mode 100644 index 32c6023e7c..0000000000 Binary files a/windows/deployment/images/fig16-contentstatus1.png and /dev/null differ diff --git a/windows/deployment/images/fig16-contentstatus2.png b/windows/deployment/images/fig16-contentstatus2.png deleted file mode 100644 index d28385f4ae..0000000000 Binary files a/windows/deployment/images/fig16-contentstatus2.png and /dev/null differ diff --git a/windows/deployment/images/fig18-distwindows.png b/windows/deployment/images/fig18-distwindows.png deleted file mode 100644 index 07ff1b74c6..0000000000 Binary files a/windows/deployment/images/fig18-distwindows.png and /dev/null differ diff --git a/windows/deployment/images/fig2-gather.png b/windows/deployment/images/fig2-gather.png deleted file mode 100644 index 01ffca2770..0000000000 Binary files a/windows/deployment/images/fig2-gather.png and /dev/null differ diff --git a/windows/deployment/images/fig21-add-drivers1.png b/windows/deployment/images/fig21-add-drivers1.png deleted file mode 100644 index 79b797a7d3..0000000000 Binary files a/windows/deployment/images/fig21-add-drivers1.png and /dev/null differ diff --git a/windows/deployment/images/fig21-add-drivers2.png b/windows/deployment/images/fig21-add-drivers2.png deleted file mode 100644 index 2f18c5b660..0000000000 Binary files a/windows/deployment/images/fig21-add-drivers2.png and /dev/null differ diff --git a/windows/deployment/images/fig21-add-drivers3.png b/windows/deployment/images/fig21-add-drivers3.png deleted file mode 100644 index 45f97d0835..0000000000 Binary files a/windows/deployment/images/fig21-add-drivers3.png and /dev/null differ diff --git a/windows/deployment/images/fig21-add-drivers4.png b/windows/deployment/images/fig21-add-drivers4.png deleted file mode 100644 index a6613d8718..0000000000 Binary files a/windows/deployment/images/fig21-add-drivers4.png and /dev/null differ diff --git a/windows/deployment/images/fig22-createcategories.png b/windows/deployment/images/fig22-createcategories.png deleted file mode 100644 index 664ffb2777..0000000000 Binary files a/windows/deployment/images/fig22-createcategories.png and /dev/null differ diff --git a/windows/deployment/images/fig27-driverpackage.png b/windows/deployment/images/fig27-driverpackage.png deleted file mode 100644 index cfb17d05ba..0000000000 Binary files a/windows/deployment/images/fig27-driverpackage.png and /dev/null differ diff --git a/windows/deployment/images/fig28-addapp.png b/windows/deployment/images/fig28-addapp.png deleted file mode 100644 index 34f6f44519..0000000000 Binary files a/windows/deployment/images/fig28-addapp.png and /dev/null differ diff --git a/windows/deployment/images/fig30-settingspack.png b/windows/deployment/images/fig30-settingspack.png deleted file mode 100644 index 4dd820aadf..0000000000 Binary files a/windows/deployment/images/fig30-settingspack.png and /dev/null differ diff --git a/windows/deployment/images/fig32-deploywiz.png b/windows/deployment/images/fig32-deploywiz.png deleted file mode 100644 index ad5052af7d..0000000000 Binary files a/windows/deployment/images/fig32-deploywiz.png and /dev/null differ diff --git a/windows/deployment/images/hyper-v-feature.png b/windows/deployment/images/hyper-v-feature.png deleted file mode 100644 index d7293d808e..0000000000 Binary files a/windows/deployment/images/hyper-v-feature.png and /dev/null differ diff --git a/windows/deployment/images/installing-drivers.png b/windows/deployment/images/installing-drivers.png deleted file mode 100644 index 22d7808fad..0000000000 Binary files a/windows/deployment/images/installing-drivers.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig03.png b/windows/deployment/images/mdt-06-fig03.png deleted file mode 100644 index 9d2786e46a..0000000000 Binary files a/windows/deployment/images/mdt-06-fig03.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig04.png b/windows/deployment/images/mdt-06-fig04.png deleted file mode 100644 index 216e1f371b..0000000000 Binary files a/windows/deployment/images/mdt-06-fig04.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig05.png b/windows/deployment/images/mdt-06-fig05.png deleted file mode 100644 index 3af74bb5ee..0000000000 Binary files a/windows/deployment/images/mdt-06-fig05.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig08.png b/windows/deployment/images/mdt-06-fig08.png deleted file mode 100644 index 25c8a0a445..0000000000 Binary files a/windows/deployment/images/mdt-06-fig08.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig10.png b/windows/deployment/images/mdt-06-fig10.png deleted file mode 100644 index 85b448ba87..0000000000 Binary files a/windows/deployment/images/mdt-06-fig10.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig12.png b/windows/deployment/images/mdt-06-fig12.png deleted file mode 100644 index a427be3f1d..0000000000 Binary files a/windows/deployment/images/mdt-06-fig12.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig13.png b/windows/deployment/images/mdt-06-fig13.png deleted file mode 100644 index a9f020b0da..0000000000 Binary files a/windows/deployment/images/mdt-06-fig13.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig14.png b/windows/deployment/images/mdt-06-fig14.png deleted file mode 100644 index 1d06c9c7e2..0000000000 Binary files a/windows/deployment/images/mdt-06-fig14.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig15.png b/windows/deployment/images/mdt-06-fig15.png deleted file mode 100644 index ffa5890a84..0000000000 Binary files a/windows/deployment/images/mdt-06-fig15.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig16.png b/windows/deployment/images/mdt-06-fig16.png deleted file mode 100644 index f448782602..0000000000 Binary files a/windows/deployment/images/mdt-06-fig16.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig20.png b/windows/deployment/images/mdt-06-fig20.png deleted file mode 100644 index 890c421227..0000000000 Binary files a/windows/deployment/images/mdt-06-fig20.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig21.png b/windows/deployment/images/mdt-06-fig21.png deleted file mode 100644 index 07b168ab89..0000000000 Binary files a/windows/deployment/images/mdt-06-fig21.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig31.png b/windows/deployment/images/mdt-06-fig31.png deleted file mode 100644 index 306f4a7980..0000000000 Binary files a/windows/deployment/images/mdt-06-fig31.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig33.png b/windows/deployment/images/mdt-06-fig33.png deleted file mode 100644 index 1529426830..0000000000 Binary files a/windows/deployment/images/mdt-06-fig33.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig35.png b/windows/deployment/images/mdt-06-fig35.png deleted file mode 100644 index a68750925d..0000000000 Binary files a/windows/deployment/images/mdt-06-fig35.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig42.png b/windows/deployment/images/mdt-06-fig42.png deleted file mode 100644 index e9cfe36083..0000000000 Binary files a/windows/deployment/images/mdt-06-fig42.png and /dev/null differ diff --git a/windows/deployment/images/mdt-06-fig43.png b/windows/deployment/images/mdt-06-fig43.png deleted file mode 100644 index c9a2c88306..0000000000 Binary files a/windows/deployment/images/mdt-06-fig43.png and /dev/null differ diff --git a/windows/deployment/images/pc0001-monitor.png b/windows/deployment/images/pc0001-monitor.png deleted file mode 100644 index 7ba8e198bf..0000000000 Binary files a/windows/deployment/images/pc0001-monitor.png and /dev/null differ diff --git a/windows/deployment/images/pc0001a.png b/windows/deployment/images/pc0001a.png deleted file mode 100644 index 0f2be5a865..0000000000 Binary files a/windows/deployment/images/pc0001a.png and /dev/null differ diff --git a/windows/deployment/images/pc0001b.png b/windows/deployment/images/pc0001b.png deleted file mode 100644 index 456f6071a9..0000000000 Binary files a/windows/deployment/images/pc0001b.png and /dev/null differ diff --git a/windows/deployment/images/pc0001c.png b/windows/deployment/images/pc0001c.png deleted file mode 100644 index d093e58d0a..0000000000 Binary files a/windows/deployment/images/pc0001c.png and /dev/null differ diff --git a/windows/deployment/images/pc0001d.png b/windows/deployment/images/pc0001d.png deleted file mode 100644 index 14f14a2e91..0000000000 Binary files a/windows/deployment/images/pc0001d.png and /dev/null differ diff --git a/windows/deployment/images/pc0001e.png b/windows/deployment/images/pc0001e.png deleted file mode 100644 index 41264f2c63..0000000000 Binary files a/windows/deployment/images/pc0001e.png and /dev/null differ diff --git a/windows/deployment/images/pc0001f.png b/windows/deployment/images/pc0001f.png deleted file mode 100644 index 8261c40953..0000000000 Binary files a/windows/deployment/images/pc0001f.png and /dev/null differ diff --git a/windows/deployment/images/pc0001g.png b/windows/deployment/images/pc0001g.png deleted file mode 100644 index 5fd7f8a4a7..0000000000 Binary files a/windows/deployment/images/pc0001g.png and /dev/null differ diff --git a/windows/deployment/images/pc0001h.png b/windows/deployment/images/pc0001h.png deleted file mode 100644 index 65bead5840..0000000000 Binary files a/windows/deployment/images/pc0001h.png and /dev/null differ diff --git a/windows/deployment/images/pc0001i.png b/windows/deployment/images/pc0001i.png deleted file mode 100644 index 76247a04df..0000000000 Binary files a/windows/deployment/images/pc0001i.png and /dev/null differ diff --git a/windows/deployment/images/pc0001j.png b/windows/deployment/images/pc0001j.png deleted file mode 100644 index 01d8fe22b7..0000000000 Binary files a/windows/deployment/images/pc0001j.png and /dev/null differ diff --git a/windows/deployment/images/pc0001k.png b/windows/deployment/images/pc0001k.png deleted file mode 100644 index 1f591d5164..0000000000 Binary files a/windows/deployment/images/pc0001k.png and /dev/null differ diff --git a/windows/deployment/images/pc0001l.png b/windows/deployment/images/pc0001l.png deleted file mode 100644 index a2d491cef7..0000000000 Binary files a/windows/deployment/images/pc0001l.png and /dev/null differ diff --git a/windows/deployment/images/pc0001m.png b/windows/deployment/images/pc0001m.png deleted file mode 100644 index d9e07b5d8a..0000000000 Binary files a/windows/deployment/images/pc0001m.png and /dev/null differ diff --git a/windows/deployment/images/pc0001n.png b/windows/deployment/images/pc0001n.png deleted file mode 100644 index 10819a15d9..0000000000 Binary files a/windows/deployment/images/pc0001n.png and /dev/null differ diff --git a/windows/deployment/images/pc0003a.png b/windows/deployment/images/pc0003a.png deleted file mode 100644 index 31d8d4068c..0000000000 Binary files a/windows/deployment/images/pc0003a.png and /dev/null differ diff --git a/windows/deployment/images/pc0003b.png b/windows/deployment/images/pc0003b.png deleted file mode 100644 index 8df2b066e6..0000000000 Binary files a/windows/deployment/images/pc0003b.png and /dev/null differ diff --git a/windows/deployment/images/pc0003c.png b/windows/deployment/images/pc0003c.png deleted file mode 100644 index 69db9cc567..0000000000 Binary files a/windows/deployment/images/pc0003c.png and /dev/null differ diff --git a/windows/deployment/images/pc0003d.png b/windows/deployment/images/pc0003d.png deleted file mode 100644 index d36e293f74..0000000000 Binary files a/windows/deployment/images/pc0003d.png and /dev/null differ diff --git a/windows/deployment/images/pc0003e.png b/windows/deployment/images/pc0003e.png deleted file mode 100644 index 09be89ba61..0000000000 Binary files a/windows/deployment/images/pc0003e.png and /dev/null differ diff --git a/windows/deployment/images/pc0003f.png b/windows/deployment/images/pc0003f.png deleted file mode 100644 index 6f48f797df..0000000000 Binary files a/windows/deployment/images/pc0003f.png and /dev/null differ diff --git a/windows/deployment/images/pc0003g.png b/windows/deployment/images/pc0003g.png deleted file mode 100644 index a5a935de32..0000000000 Binary files a/windows/deployment/images/pc0003g.png and /dev/null differ diff --git a/windows/deployment/images/pc0003h.png b/windows/deployment/images/pc0003h.png deleted file mode 100644 index 9e15738b48..0000000000 Binary files a/windows/deployment/images/pc0003h.png and /dev/null differ diff --git a/windows/deployment/images/pc0003i.png b/windows/deployment/images/pc0003i.png deleted file mode 100644 index 7c7b194399..0000000000 Binary files a/windows/deployment/images/pc0003i.png and /dev/null differ diff --git a/windows/deployment/images/pc0003j.png b/windows/deployment/images/pc0003j.png deleted file mode 100644 index b446bff1c2..0000000000 Binary files a/windows/deployment/images/pc0003j.png and /dev/null differ diff --git a/windows/deployment/images/pc0003k.png b/windows/deployment/images/pc0003k.png deleted file mode 100644 index ceead7b05b..0000000000 Binary files a/windows/deployment/images/pc0003k.png and /dev/null differ diff --git a/windows/deployment/images/pc0004-a.png b/windows/deployment/images/pc0004-a.png deleted file mode 100644 index afe954d28f..0000000000 Binary files a/windows/deployment/images/pc0004-a.png and /dev/null differ diff --git a/windows/deployment/images/pc0004-b.png b/windows/deployment/images/pc0004-b.png deleted file mode 100644 index caad109ace..0000000000 Binary files a/windows/deployment/images/pc0004-b.png and /dev/null differ diff --git a/windows/deployment/images/pc0004-c.png b/windows/deployment/images/pc0004-c.png deleted file mode 100644 index 21490d55a3..0000000000 Binary files a/windows/deployment/images/pc0004-c.png and /dev/null differ diff --git a/windows/deployment/images/pc0004-d.png b/windows/deployment/images/pc0004-d.png deleted file mode 100644 index db10b4ccdc..0000000000 Binary files a/windows/deployment/images/pc0004-d.png and /dev/null differ diff --git a/windows/deployment/images/pc0004-e.png b/windows/deployment/images/pc0004-e.png deleted file mode 100644 index d6472a4209..0000000000 Binary files a/windows/deployment/images/pc0004-e.png and /dev/null differ diff --git a/windows/deployment/images/pc0004-f.png b/windows/deployment/images/pc0004-f.png deleted file mode 100644 index 7752a700e0..0000000000 Binary files a/windows/deployment/images/pc0004-f.png and /dev/null differ diff --git a/windows/deployment/images/pc0004-g.png b/windows/deployment/images/pc0004-g.png deleted file mode 100644 index 93b4812149..0000000000 Binary files a/windows/deployment/images/pc0004-g.png and /dev/null differ diff --git a/windows/deployment/images/pc0004b.png b/windows/deployment/images/pc0004b.png deleted file mode 100644 index f1fb129bbe..0000000000 Binary files a/windows/deployment/images/pc0004b.png and /dev/null differ diff --git a/windows/deployment/images/pc0006a.png b/windows/deployment/images/pc0006a.png deleted file mode 100644 index 399f99885f..0000000000 Binary files a/windows/deployment/images/pc0006a.png and /dev/null differ diff --git a/windows/deployment/images/pc0006b.png b/windows/deployment/images/pc0006b.png deleted file mode 100644 index bef284d211..0000000000 Binary files a/windows/deployment/images/pc0006b.png and /dev/null differ diff --git a/windows/deployment/images/pc0006c.png b/windows/deployment/images/pc0006c.png deleted file mode 100644 index 1e8f075262..0000000000 Binary files a/windows/deployment/images/pc0006c.png and /dev/null differ diff --git a/windows/deployment/images/pc0006d.png b/windows/deployment/images/pc0006d.png deleted file mode 100644 index dca5a58c2a..0000000000 Binary files a/windows/deployment/images/pc0006d.png and /dev/null differ diff --git a/windows/deployment/images/pc0006e.png b/windows/deployment/images/pc0006e.png deleted file mode 100644 index 3b3ef3be99..0000000000 Binary files a/windows/deployment/images/pc0006e.png and /dev/null differ diff --git a/windows/deployment/images/pc0006f.png b/windows/deployment/images/pc0006f.png deleted file mode 100644 index 8da05473b3..0000000000 Binary files a/windows/deployment/images/pc0006f.png and /dev/null differ diff --git a/windows/deployment/images/pc0006g.png b/windows/deployment/images/pc0006g.png deleted file mode 100644 index 0cc69e2626..0000000000 Binary files a/windows/deployment/images/pc0006g.png and /dev/null differ diff --git a/windows/deployment/images/pc0006h.png b/windows/deployment/images/pc0006h.png deleted file mode 100644 index 3ae86b01ed..0000000000 Binary files a/windows/deployment/images/pc0006h.png and /dev/null differ diff --git a/windows/deployment/images/pc0006i.png b/windows/deployment/images/pc0006i.png deleted file mode 100644 index 42c8e2adfa..0000000000 Binary files a/windows/deployment/images/pc0006i.png and /dev/null differ diff --git a/windows/deployment/images/poc-computers.png b/windows/deployment/images/poc-computers.png deleted file mode 100644 index 6fd8039c56..0000000000 Binary files a/windows/deployment/images/poc-computers.png and /dev/null differ diff --git a/windows/deployment/images/ps100009-1.png b/windows/deployment/images/ps100009-1.png deleted file mode 100644 index 6bd970c352..0000000000 Binary files a/windows/deployment/images/ps100009-1.png and /dev/null differ diff --git a/windows/deployment/images/ps100009-2.png b/windows/deployment/images/ps100009-2.png deleted file mode 100644 index e960ad91d4..0000000000 Binary files a/windows/deployment/images/ps100009-2.png and /dev/null differ diff --git a/windows/deployment/images/ref-image.png b/windows/deployment/images/ref-image.png deleted file mode 100644 index 773a21e150..0000000000 Binary files a/windows/deployment/images/ref-image.png and /dev/null differ diff --git a/windows/deployment/images/svr_mgr2.png b/windows/deployment/images/svr_mgr2.png deleted file mode 100644 index dd2e6737c6..0000000000 Binary files a/windows/deployment/images/svr_mgr2.png and /dev/null differ diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 88de5ad0be..5d345bd4bb 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -106,7 +106,6 @@ landingContent: linkLists: - linkListType: reference links: - - text: Customize Windows PE boot images url: customize-boot-image.md - text: Convert a disk from MBR to GPT diff --git a/windows/deployment/media/windows10-autopilot-flowchart.png b/windows/deployment/media/windows10-autopilot-flowchart.png deleted file mode 100644 index 878c9d483d..0000000000 Binary files a/windows/deployment/media/windows10-autopilot-flowchart.png and /dev/null differ diff --git a/windows/deployment/media/windows10-deployment-config-manager.png b/windows/deployment/media/windows10-deployment-config-manager.png deleted file mode 100644 index 509e041741..0000000000 Binary files a/windows/deployment/media/windows10-deployment-config-manager.png and /dev/null differ diff --git a/windows/deployment/planning/windows-10-enterprise-faq-itpro.yml b/windows/deployment/planning/windows-10-enterprise-faq-itpro.yml index 3d8e2f154e..83e2ccae0c 100644 --- a/windows/deployment/planning/windows-10-enterprise-faq-itpro.yml +++ b/windows/deployment/planning/windows-10-enterprise-faq-itpro.yml @@ -77,7 +77,7 @@ sections: - question: | Can I upgrade computers from Windows 7 or Windows 8.1 without deploying a new image? answer: | - Computers running Windows 7 or Windows 8.1 can be upgraded directly to Windows 10 through the in-place upgrade process without a need to reimage the device. For more information, see [Upgrade to Windows 10 with Microsoft Configuration Manager](../deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md). + Computers running Windows 7 or Windows 8.1 can be upgraded directly to Windows 10 through the in-place upgrade process without a need to reimage the device. For more information, see [Upgrade to Windows 10 with Microsoft Configuration Manager](/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager). - question: | Can I upgrade from Windows 7 Enterprise or Windows 8.1 Enterprise to Windows 10 Enterprise for free? diff --git a/windows/deployment/planning/windows-10-infrastructure-requirements.md b/windows/deployment/planning/windows-10-infrastructure-requirements.md index f6e34ac694..5db0a13161 100644 --- a/windows/deployment/planning/windows-10-infrastructure-requirements.md +++ b/windows/deployment/planning/windows-10-infrastructure-requirements.md @@ -35,7 +35,7 @@ The latest version of the Microsoft Deployment Toolkit (MDT) is available for do For Configuration Manager, Windows 10 version specific support is offered with [various releases](/mem/configmgr/core/plan-design/configs/support-for-windows-10). -For more information about Microsoft Configuration Manager support for Windows 10, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](../deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). +For more information about Microsoft Configuration Manager support for Windows 10, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager). ## Management tools diff --git a/windows/deployment/windows-10-deployment-posters.md b/windows/deployment/windows-10-deployment-posters.md deleted file mode 100644 index aecea5c3dc..0000000000 --- a/windows/deployment/windows-10-deployment-posters.md +++ /dev/null @@ -1,38 +0,0 @@ ---- -title: Windows 10 deployment process posters -description: View and download Windows 10 deployment process flows for Microsoft Configuration Manager and Windows Autopilot. -manager: aaroncz -author: frankroj -ms.author: frankroj -ms.service: windows-client -ms.subservice: itpro-deploy -ms.localizationpriority: medium -ms.topic: reference -ms.date: 11/23/2022 ---- - -# Windows 10 deployment process posters - -*Applies to:* - -- Windows 10 - -The following posters step through various options for deploying Windows 10 with Windows Autopilot or Microsoft Configuration Manager. - -## Deploy Windows 10 with Autopilot - -The Windows Autopilot poster is two pages in portrait mode (11x17). Select the image to download a PDF version. - -[![Deploy Windows 10 with Autopilot.](./media/windows10-autopilot-flowchart.png)](https://download.microsoft.com/download/8/4/b/84b5e640-8f66-4b43-81a9-1c3b9ea18eda/Windows10AutopilotFlowchart.pdf) - -## Deploy Windows 10 with Microsoft Configuration Manager - -The Configuration Manager poster is one page in landscape mode (17x11). Select the image to download a PDF version. - -[![Deploy Windows 10 with Configuration Manager.](./media/windows10-deployment-config-manager.png)](https://download.microsoft.com/download/e/2/a/e2a70587-d3cc-4f1a-ba49-cfd724a1736b/Windows10DeploymentConfigManager.pdf) - -## See also - -[Overview of Windows Autopilot](/mem/autopilot/windows-autopilot) - -[Scenarios to deploy enterprise operating systems with Configuration Manager](/mem/configmgr/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems) diff --git a/windows/deployment/windows-10-poc-sc-config-mgr.md b/windows/deployment/windows-10-poc-sc-config-mgr.md deleted file mode 100644 index c481efb0a5..0000000000 --- a/windows/deployment/windows-10-poc-sc-config-mgr.md +++ /dev/null @@ -1,1181 +0,0 @@ ---- -title: Steps to deploy Windows 10 with Configuration Manager -description: Learn how to deploy Windows 10 in a test lab using Microsoft Configuration Manager. -ms.service: windows-client -ms.subservice: itpro-deploy -ms.localizationpriority: medium -manager: aaroncz -ms.author: frankroj -author: frankroj -ms.topic: tutorial -ms.date: 11/23/2022 ---- - -# Deploy Windows 10 in a test lab using Configuration Manager - -*Applies to:* - -- Windows 10 - -> [!IMPORTANT] -> This guide uses the proof of concept (PoC) environment, and some settings that are configured in the following guides: -> -> - [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md) -> - [Deploy Windows 10 in a test lab using the Microsoft Deployment Toolkit](windows-10-poc-mdt.md) -> -> Complete all steps in these guides before you start the procedures in this guide. If you want to skip the Windows 10 deployment procedures in the MDT guide, and move directly to this guide, at least install MDT and the Windows ADK before starting this guide. All steps in the first guide are required before attempting the procedures in this guide. - -The PoC environment is a virtual network running on Hyper-V with three virtual machines (VMs): - -- **DC1**: A contoso.com domain controller, DNS server, and DHCP server. -- **SRV1**: A dual-homed contoso.com domain member server, DNS server, and default gateway providing NAT service for the PoC network. -- **PC1**: A contoso.com member computer running Windows 7, Windows 8, or Windows 8.1 that has been cloned from a physical computer on your network for testing purposes. - -This guide uses the Hyper-V server role to perform procedures. If you don't complete all steps in a single session, consider using [checkpoints](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn818483(v=ws.11)) and [saved states](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee247418(v=ws.10)) to pause, resume, or restart your work. - -Multiple features and services are installed on SRV1 in this guide. This configuration isn't a typical installation, and is only done to set up a lab environment with a bare minimum of resources. However, if less than 4 GB of RAM is allocated to SRV1 in the Hyper-V console, some procedures will be slow to complete. If resources are limited on the Hyper-V host, consider reducing RAM allocation on DC1 and PC1, and then increasing the RAM allocation on SRV1. You can adjust RAM allocation for a VM by right-clicking the VM in the Hyper-V Manager console, select **Settings**, select **Memory**, and modify the value next to **Maximum RAM**. - -## In this guide - -This guide provides end-to-end instructions to install and configure Microsoft Configuration Manager, and use it to deploy a Windows 10 image. Depending on the speed of your Hyper-V host, the procedures in this guide will require 6-10 hours to complete. - -The procedures in this guide are summarized in the following table. An estimate of the time required to complete each procedure is also provided. Time required to complete procedures will vary depending on the resources available to the Hyper-V host and assigned to VMs, such as processor speed, memory allocation, disk speed, and network speed. - -|Procedure|Description|Time| -|--- |--- |--- | -|[Install prerequisites](#install-prerequisites)|Install prerequisite Windows Server roles and features, download, install and configure SQL Server, configure firewall rules, and install the Windows ADK.|60 minutes| -|[Install Microsoft Configuration Manager](#install-microsoft-configuration-manager)|Download Microsoft Configuration Manager, configure prerequisites, and install the package.|45 minutes| -|[Download MDOP and install DaRT](#download-mdop-and-install-dart)|Download the Microsoft Desktop Optimization Pack 2015 and install DaRT 10.|15 minutes| -|[Prepare for Zero Touch installation](#prepare-for-zero-touch-installation)|Prerequisite procedures to support Zero Touch installation.|60 minutes| -|[Create a boot image for Configuration Manager](#create-a-boot-image-for-configuration-manager)|Use the MDT wizard to create the boot image in Configuration Manager.|20 minutes| -|[Create a Windows 10 reference image](#create-a-windows-10-reference-image)|This procedure can be skipped if it was done previously, otherwise instructions are provided to create a reference image.|0-60 minutes| -|[Add a Windows 10 OS image](#add-a-windows-10-os-image)|Add a Windows 10 OS image and distribute it.|10 minutes| -|[Create a task sequence](#create-a-task-sequence)|Create a Configuration Manager task sequence with MDT integration using the MDT wizard|15 minutes| -|[Finalize the OS configuration](#finalize-the-os-configuration)|Enable monitoring, configure rules, and distribute content.|30 minutes| -|[Deploy Windows 10 using PXE and Configuration Manager](#deploy-windows-10-using-pxe-and-configuration-manager)|Deploy Windows 10 using Configuration Manager deployment packages and task sequences.|60 minutes| -|[Replace a client with Windows 10 using Configuration Manager](#replace-a-client-with-windows-10-using-configuration-manager)|Replace a client computer with Windows 10 using Configuration Manager.|90 minutes| -|[Refresh a client with Windows 10 using Configuration Manager](#refresh-a-client-with-windows-10-using-configuration-manager)|Use a task sequence to refresh a client with Windows 10 using Configuration Manager and MDT|90 minutes| - -## Install prerequisites - -1. Before installing Microsoft Configuration Manager, we must install prerequisite services and features. Enter the following command at an elevated Windows PowerShell prompt on SRV1: - - ```powershell - Install-WindowsFeature Web-Windows-Auth,Web-ISAPI-Ext,Web-Metabase,Web-WMI,BITS,RDC,NET-Framework-Features,Web-Asp-Net,Web-Asp-Net45,NET-HTTP-Activation,NET-Non-HTTP-Activ - ``` - - > [!NOTE] - > If the request to add features fails, retry the installation by typing the command again. - -2. Download [SQL Server](https://www.microsoft.com/evalcenter/evaluate-sql-server-2022) from the Microsoft Evaluation Center as an .ISO file on the Hyper-V host computer. Save the file to the **C:\VHD** directory. - - > [!NOTE] - > The rest of this article describes the installation of SQL Server 2014. If you download a different version of SQL Server, you may need to modify the installation steps. - -1. When you've downloaded the file **SQLServer2014SP2-FullSlipstream-x64-ENU.iso** and placed it in the C:\VHD directory, enter the following command at an elevated Windows PowerShell prompt on the Hyper-V host: - - ```powershell - Set-VMDvdDrive -VMName SRV1 -Path c:\VHD\SQLServer2014SP2-FullSlipstream-x64-ENU.iso - ``` - - This command mounts the .ISO file to drive D on SRV1. - -4. Enter the following command at an elevated Windows PowerShell prompt on SRV1 to install SQL Server: - - ```cmd - D:\setup.exe /q /ACTION=Install /ERRORREPORTING="False" /FEATURES=SQLENGINE,RS,IS,SSMS,TOOLS,ADV_SSMS,CONN /INSTANCENAME=MSSQLSERVER /INSTANCEDIR="C:\Program Files\Microsoft SQL Server" /SQLSVCACCOUNT="NT AUTHORITY\System" /SQLSYSADMINACCOUNTS="BUILTIN\ADMINISTRATORS" /SQLSVCSTARTUPTYPE=Automatic /AGTSVCACCOUNT="NT AUTHORITY\SYSTEM" /AGTSVCSTARTUPTYPE=Automatic /RSSVCACCOUNT="NT AUTHORITY\System" /RSSVCSTARTUPTYPE=Automatic /ISSVCACCOUNT="NT AUTHORITY\System" /ISSVCSTARTUPTYPE=Disabled /ASCOLLATION="Latin1_General_CI_AS" /SQLCOLLATION="SQL_Latin1_General_CP1_CI_AS" /TCPENABLED="1" /NPENABLED="1" /IAcceptSQLServerLicenseTerms - ``` - - Installation will take several minutes. When installation is complete, the following output will be displayed: - - ```console - Microsoft (R) SQL Server 2014 12.00.5000.00 - Copyright (c) Microsoft Corporation. All rights reserved. - - Microsoft (R) .NET Framework CasPol 2.0.50727.7905 - Copyright (c) Microsoft Corporation. All rights reserved. - - Success - Microsoft (R) .NET Framework CasPol 2.0.50727.7905 - Copyright (c) Microsoft Corporation. All rights reserved. - - Success - One or more affected files have operations pending. - You should restart your computer to complete this process. - ``` - -5. Enter the following commands at an elevated Windows PowerShell prompt on SRV1: - - ```powershell - New-NetFirewallRule -DisplayName "SQL Server" -Direction Inbound -Protocol TCP -LocalPort 1433 -Action allow - New-NetFirewallRule -DisplayName "SQL Admin Connection" -Direction Inbound -Protocol TCP -LocalPort 1434 -Action allow - New-NetFirewallRule -DisplayName "SQL Database Management" -Direction Inbound -Protocol UDP -LocalPort 1434 -Action allow - New-NetFirewallRule -DisplayName "SQL Service Broker" -Direction Inbound -Protocol TCP -LocalPort 4022 -Action allow - New-NetFirewallRule -DisplayName "SQL Debugger/RPC" -Direction Inbound -Protocol TCP -LocalPort 135 -Action allow - ``` - -6. Download and install the latest [Windows Assessment and Deployment Kit (ADK)](/windows-hardware/get-started/adk-install) on SRV1 using the default installation settings. The current version is the ADK for Windows 10, version 2004. Installation might require several minutes to acquire all components. - -## Install Microsoft Configuration Manager - -1. On SRV1, temporarily disable IE Enhanced Security Configuration for Administrators by typing the following commands at an elevated Windows PowerShell prompt: - - ```powershell - $AdminKey = "HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{A509B1A7-37EF-4b3f-8CFC-4F3A74704073}" - Set-ItemProperty -Path $AdminKey -Name "IsInstalled" -Value 0 - Stop-Process -Name Explorer - ``` - -2. Download [Microsoft Configuration Manager (current branch)](https://www.microsoft.com/evalcenter/evaluate-microsoft-endpoint-configuration-manager) and extract the contents on SRV1. - -3. Open the file, enter **C:\configmgr** for **Unzip to folder**, and select **Unzip**. The `C:\configmgr` directory will be automatically created. Select **OK** and then close the **WinZip Self-Extractor** dialog box when finished. - -4. Before starting the installation, verify that WMI is working on SRV1. See the following examples. Verify that **Running** is displayed under **Status** and **True** is displayed next to **TcpTestSucceeded**: - - ```powershell - Get-Service Winmgmt - - Status Name DisplayName - ------ ---- ----------- - Running Winmgmt Windows Management Instrumentation - - Test-NetConnection -ComputerName 192.168.0.2 -Port 135 -InformationLevel Detailed - - ComputerName : 192.168.0.2 - RemoteAddress : 192.168.0.2 - RemotePort : 135 - AllNameResolutionResults : - MatchingIPsecRules : - NetworkIsolationContext : Internet - InterfaceAlias : Ethernet - SourceAddress : 192.168.0.2 - NetRoute (NextHop) : 0.0.0.0 - PingSucceeded : True - PingReplyDetails (RTT) : 0 ms - TcpTestSucceeded : True - ``` - - You can also verify WMI using the WMI console by typing **wmimgmt.msc**, right-clicking **WMI Control (Local)** in the console tree, and then clicking **Properties**. - - If the WMI service isn't started, attempt to start it or reboot the computer. If WMI is running but errors are present, see [winmgmt](/windows/win32/wmisdk/winmgmt) for troubleshooting information. - -5. To extend the Active Directory schema, enter the following command at an elevated Windows PowerShell prompt: - - ```cmd - C:\configmgr\SMSSETUP\BIN\X64\extadsch.exe - ``` - -6. Temporarily switch to the DC1 VM, and enter the following command at an elevated command prompt on DC1: - - ```cmd - adsiedit.msc - ``` - -7. Right-click **ADSI Edit**, select **Connect to**, select **Default (Domain or server that you logged in to)** under **Computer** and then select **OK**. - -8. Expand **Default naming context**>**DC=contoso,DC=com**, and then in the console tree right-click **CN=System**, point to **New**, and then select **Object**. - -9. Select **container** and then select **Next**. - -10. Next to **Value**, enter **System Management**, select **Next**, and then select **Finish**. - -11. Right-click **CN=system Management** and then select **Properties**. - -12. On the **Security** tab, select **Add**, select **Object Types**, select **Computers**, and select **OK**. - -13. Under **Enter the object names to select**, enter **SRV1** and select **OK**. - -14. The **SRV1** computer account will be highlighted, select **Allow** next to **Full control**. - -15. Select **Advanced**, select **SRV1 (CONTOSO\SRV1$)** and select **Edit**. - -16. Next to **Applies to**, choose **This object and all descendant objects**, and then select **OK** three times. - -17. Close the ADSI Edit console and switch back to SRV1. - -18. To start Configuration Manager installation, enter the following command at an elevated Windows PowerShell prompt on SRV1: - - ```cmd - C:\configmgr\SMSSETUP\BIN\X64\Setup.exe - ``` - -19. Provide the following information in the Configuration Manager Setup Wizard: - - - **Before You Begin**: Read the text and select *Next*. - - **Getting Started**: Choose **Install a Configuration Manager primary site** and select the **Use typical installation options for a stand-alone primary site** checkbox. - - Select **Yes** in response to the popup window. - - **Product Key**: Choose **Install the evaluation edition of this Product**. - - **Microsoft Software License Terms**: Read the terms and then select the **I accept these license terms** checkbox. - - **Prerequisite Licenses**: Review license terms and select all three checkboxes on the page. - - **Prerequisite Downloads**: Choose **Download required files** and enter **c:\windows\temp** next to **Path**. - - **Site and Installation Settings**: Site code: **PS1**, Site name: **Contoso**. - - use default settings for all other options - - **Usage Data**: Read the text and select **Next**. - - **Service Connection Point Setup**: Accept the default settings (SRV1.contoso.com is automatically added under Select a server to use). - - **Settings Summary**: Review settings and select **Next**. - - **Prerequisite Check**: No failures should be listed. Ignore any warnings and select **Begin Install**. - - > [!NOTE] - > There should be at most three warnings present: WSUS on site server, configuration for SQL Server memory usage, and SQL Server process memory allocation. These warnings can safely be ignored in this test environment. - - Depending on the speed of the Hyper-V host and resources allocated to SRV1, installation can require approximately one hour. Select **Close** when installation is complete. - -20. If desired, re-enable IE Enhanced Security Configuration at this time on SRV1: - - ```powershell - Set-ItemProperty -Path $AdminKey -Name "IsInstalled" -Value 1 - Stop-Process -Name Explorer - ``` - -## Download MDOP and install DaRT - -> [!IMPORTANT] -> This step requires a Visual Studio subscription or volume license agreement. For more information, see [MDOP information experience](/microsoft-desktop-optimization-pack/). - -1. Download the Microsoft Desktop Optimization Pack 2015 to the Hyper-V host from Visual Studio Online or from the [Microsoft Volume Licensing website (MVLS)](https://go.microsoft.com/fwlink/p/?LinkId=166331) site. Download the .ISO file (mu_microsoft_desktop_optimization_pack_2015_x86_x64_dvd_5975282.iso, 2.79 GB) to the C:\VHD directory on the Hyper-V host. - -2. Enter the following command at an elevated Windows PowerShell prompt on the Hyper-V host to mount the MDOP file on SRV1: - - ```powershell - Set-VMDvdDrive -VMName SRV1 -Path c:\VHD\mu_microsoft_desktop_optimization_pack_2015_x86_x64_dvd_5975282.iso - ``` - -3. Enter the following command at an elevated Windows PowerShell prompt on SRV1: - - ```cmd - D:\DaRT\DaRT 10\Installers\en-us\x64\MSDaRT100.msi - ``` - -4. Install DaRT 10 using default settings. - -5. Enter the following commands at an elevated Windows PowerShell prompt on SRV1: - - ```powershell - Copy-Item "C:\Program Files\Microsoft DaRT\v10\Toolsx64.cab" -Destination "C:\Program Files\Microsoft Deployment Toolkit\Templates\Distribution\Tools\x64" - Copy-Item "C:\Program Files\Microsoft DaRT\v10\Toolsx86.cab" -Destination "C:\Program Files\Microsoft Deployment Toolkit\Templates\Distribution\Tools\x86" - ``` - -## Prepare for Zero Touch installation - -This section contains several procedures to support Zero Touch installation with Microsoft Configuration Manager. - -### Create a folder structure - -1. Enter the following commands at a Windows PowerShell prompt on SRV1: - - ```powershell - New-Item -ItemType Directory -Path "C:\Sources\OSD\Boot" - New-Item -ItemType Directory -Path "C:\Sources\OSD\OS" - New-Item -ItemType Directory -Path "C:\Sources\OSD\Settings" - New-Item -ItemType Directory -Path "C:\Sources\OSD\Branding" - New-Item -ItemType Directory -Path "C:\Sources\OSD\MDT" - New-Item -ItemType Directory -Path "C:\Logs" - New-SmbShare -Name Sources$ -Path C:\Sources -ChangeAccess EVERYONE - New-SmbShare -Name Logs$ -Path C:\Logs -ChangeAccess EVERYONE - ``` - -### Enable MDT ConfigMgr integration - -1. On SRV1, select **Start**, enter `configmgr`, and then select **Configure ConfigMgr Integration**. - -2. Enter `PS1` as the **Site code**, and then select **Next**. - -3. Verify **The process completed successfully** is displayed, and then select **Finish**. - -### Configure client settings - -1. On SRV1, select **Start**, enter **configuration manager**, right-click **Configuration Manager Console**, and then select **Pin to Taskbar**. - -2. Select **Desktop**, and then launch the Configuration Manager console from the taskbar. - -3. If the console notifies you that an update is available, select **OK**. It isn't necessary to install updates to complete this lab. - -4. In the console tree, open the **Administration** workspace (in the lower left corner) and select **Client Settings**. - -5. In the display pane, double-click **Default Client Settings**. - -6. Select **Computer Agent**, next to **Organization name displayed in Software Center** enter **Contoso**, and then select **OK**. - -### Configure the network access account - -1. in the **Administration** workspace, expand **Site Configuration** and select **Sites**. - -2. On the **Home** ribbon at the top of the console window, select **Configure Site Components** and then select **Software Distribution**. - -3. On the **Network Access Account** tab, choose **Specify the account that accesses network locations**. - -4. Select the yellow starburst and then select **New Account**. - -5. Select **Browse** and then under **Enter the object name to select**, enter **CM_NAA** and select **OK**. - -6. Next to **Password** and **Confirm Password**, enter **pass\@word1**, and then select **OK** twice. - -### Configure a boundary group - -1. in the **Administration** workspace, expand **Hierarchy Configuration**, right-click **Boundaries** and then select **Create Boundary**. - -2. Next to **Description**, enter **PS1**, next to **Type** choose **Active Directory Site**, and then select **Browse**. - -3. Choose **Default-First-Site-Name** and then select **OK** twice. - -4. in the **Administration** workspace, right-click **Boundary Groups** and then select **Create Boundary Group**. - -5. Next to **Name**, enter **PS1 Site Assignment and Content Location**, select **Add**, select the **Default-First-Site-Name** boundary and then select **OK**. - -6. On the **References** tab in the **Create Boundary Group** window, select the **Use this boundary group for site assignment** checkbox. - -7. Select **Add**, select the **\\\SRV1.contoso.com** checkbox, and then select **OK** twice. - -### Add the state migration point role - -1. in the **Administration** workspace, expand **Site Configuration**, select **Sites**, and then in on the **Home** ribbon at the top of the console select **Add Site System Roles**. - -2. In the Add site System Roles Wizard, select **Next** twice and then on the Specify roles for this server page, select the **State migration point** checkbox. - -3. Select **Next**, select the yellow starburst, enter **C:\MigData** for the **Storage folder**, and select **OK**. - -4. Select **Next**, and then verify under **Boundary groups** that **PS1 Site Assignment and Content Location** is displayed. - -5. Select **Next** twice and then select **Close**. - -### Enable PXE on the distribution point - -> [!IMPORTANT] -> Before enabling PXE in Configuration Manager, ensure that any previous installation of WDS does not cause conflicts. Configuration Manager will automatically configure the WDS service to manage PXE requests. To disable a previous installation, if it exists, enter the following commands at an elevated Windows PowerShell prompt on SRV1: - -```cmd -WDSUTIL.exe /Set-Server /AnswerClients:None -``` - -1. Determine the MAC address of the internal network adapter on SRV1. Enter the following command at an elevated Windows PowerShell prompt on SRV1: - - ```powershell - (Get-NetAdapter "Ethernet").MacAddress - ``` - - > [!NOTE] - > If the internal network adapter, assigned an IP address of 192.168.0.2, isn't named "Ethernet" then replace the name "Ethernet" in the previous command with the name of this network adapter. You can review the names of network adapters and the IP addresses assigned to them by typing **ipconfig**. - -2. In the Configuration Manager console, in the **Administration** workspace, select **Distribution Points**. - -3. In the display pane, right-click **SRV1.CONTOSO.COM** and then select **Properties**. - -4. On the PXE tab, select the following settings: - - - **Enable PXE support for clients**. Select **Yes** in the popup that appears. - - **Allow this distribution point to respond to incoming PXE requests** - - **Enable unknown computer support**. Select **OK** in the popup that appears. - - **Require a password when computers use PXE** - - **Password** and **Confirm password**: pass@word1 - - **Respond to PXE requests on specific network interfaces**: Select the yellow starburst and then enter the MAC address determined in the first step of this procedure. - - See the following example: - ![Config Mgr PXE.](images/configmgr-pxe.png) - -5. Select **OK**. - -6. Wait for a minute, then enter the following command at an elevated Windows PowerShell prompt on SRV1, and verify that the files displayed are present: - - ```cmd - dir /b C:\RemoteInstall\SMSBoot\x64 - - abortpxe.com - bootmgfw.efi - bootmgr.exe - pxeboot.com - pxeboot.n12 - wdsmgfw.efi - wdsnbp.com - ``` - - > [!NOTE] - > If these files aren't present in the C:\RemoteInstall directory, verify that the REMINST share is configured as C:\RemoteInstall. You can view the properties of this share by typing `net.exe share REMINST` at a command prompt. If the share path is set to a different value, then replace C:\RemoteInstall with your REMINST share path. - > - > You can also enter the following command at an elevated Windows PowerShell prompt to open CMTrace. In the tool, select **File**, select **Open**, and then open the **distmgr.log** file. If errors are present, they will be highlighted in red: - > - > ```cmd - > "C:\Program Files\Microsoft Configuration Manager\tools\cmtrace.exe" - > ``` - > - > The log file is updated continuously while Configuration Manager is running. Wait for Configuration Manager to repair any issues that are present, and periodically recheck that the files are present in the REMINST share location. Close CMTrace when done. You'll see the following line in distmgr.log that indicates the REMINST share is being populated with necessary files: - > - > `Running: WDSUTIL.exe /Initialize-Server /REMINST:"C:\RemoteInstall"` - > - > Once the files are present in the REMINST share location, you can close the CMTrace tool. - -### Create a branding image file - -1. If you have a bitmap (.BMP) image for suitable use as a branding image, copy it to the C:\Sources\OSD\Branding folder on SRV1. Otherwise, use the following step to copy a branding image. - -2. Enter the following command at an elevated Windows PowerShell prompt: - - ```powershell - Copy-Item -Path "C:\ProgramData\Microsoft\User Account Pictures\user.bmp" -Destination "C:\Sources\OSD\Branding\contoso.bmp" - ``` - - > [!NOTE] - > You can open C:\Sources\OSD\Branding\contoso.bmp in Microsoft Paint to customize this image. - -### Create a boot image for Configuration Manager - -1. In the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Boot Images**, and then select **Create Boot Image using MDT**. - -2. On the Package Source page, under **Package source folder to be created (UNC Path):**, enter **\\\SRV1\Sources$\OSD\Boot\Zero Touch WinPE x64**, and then select **Next**. - - - The Zero Touch WinPE x64 folder doesn't yet exist. The folder will be created later. - -3. On the General Settings page, enter **Zero Touch WinPE x64** next to **Name**, and select **Next**. - -4. On the Options page, under **Platform** choose **x64**, and select **Next**. - -5. On the Components page, in addition to the default selection of **Microsoft Data Access Components (MDAC/ADO) support**, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** checkbox, and select **Next**. - -6. On the Customization page, select the **Use a custom background bitmap file** checkbox, and under **UNC path**, enter or browse to **\\\SRV1\Sources$\OSD\Branding\contoso.bmp**, and then select **Next** twice. It will take a few minutes to generate the boot image. - -7. Select **Finish**. - -8. In the console display pane, right-click the **Zero Touch WinPE x64** boot image, and then select **Distribute Content**. - -9. In the Distribute Content Wizard, select **Next**, select **Add** and select **Distribution Point**, select the **SRV1.CONTOSO.COM** checkbox, select **OK**, select **Next** twice, and then select **Close**. - -10. Use the CMTrace application to view the **distmgr.log** file again and verify that the boot image has been distributed. To open CMTrace, enter the following command at an elevated Windows PowerShell prompt on SRV1: - - ```powershell - Invoke-Item 'C:\Program Files\Microsoft Configuration Manager\tools\cmtrace.exe' - ``` - - In the trace tool, select **Tools** on the menu and choose **Find**. Search for "**STATMSG: ID=2301**". For example: - - ```console - STATMSG: ID=2301 SEV=I LEV=M SOURCE="SMS Server" COMP="SMS_DISTRIBUTION_MANAGER" SYS=SRV1.CONTOSO.COM SITE=PS1 PID=924 TID=1424 GMTDATE=Tue Oct 09 22:36:30.986 2018 ISTR0="Zero Touch WinPE x64" ISTR1="PS10000A" ISTR2="" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=1 AID0=400 AVAL0="PS10000A" SMS_DISTRIBUTION_MANAGER 10/9/2018 3:36:30 PM 1424 (0x0590) - ``` - -11. You can also review status by clicking the **Zero Touch WinPE x64** image, and then clicking **Content Status** under **Related Objects** in the bottom right-hand corner of the console, or by entering **\Monitoring\Overview\Distribution Status\Content Status** on the location bar in the console. Double-click **Zero Touch WinPE x64** under **Content Status** in the console tree and verify that a status of **Successfully distributed content** is displayed on the **Success** tab. - -12. Next, in the **Software Library** workspace, double-click **Zero Touch WinPE x64** and then select the **Data Source** tab. - -13. Select the **Deploy this boot image from the PXE-enabled distribution point** checkbox, and select **OK**. - -14. Review the distmgr.log file again for "**STATMSG: ID=2301**" and verify that there are three folders under **C:\RemoteInstall\SMSImages** with boot images. See the following example: - - ```cmd - dir /s /b C:\RemoteInstall\SMSImages - - C:\RemoteInstall\SMSImages\PS100004 - C:\RemoteInstall\SMSImages\PS100005 - C:\RemoteInstall\SMSImages\PS100006 - C:\RemoteInstall\SMSImages\PS100004\boot.PS100004.wim - C:\RemoteInstall\SMSImages\PS100005\boot.PS100005.wim - C:\RemoteInstall\SMSImages\PS100006\WinPE.PS100006.wim - ``` - - > [!NOTE] - > The first two images (`*.wim` files) are default boot images. The third is the new boot image with DaRT. - -### Create a Windows 10 reference image - -If you've already completed steps in [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md) then you've already created a Windows 10 reference image. In this case, skip to the next procedure in this guide: [Add a Windows 10 OS image](#add-a-windows-10-os-image). If you've not yet created a Windows 10 reference image, complete the steps in this section. - -1. In [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md) the Windows 10 Enterprise .iso file was saved to the c:\VHD directory as **c:\VHD\w10-enterprise.iso**. The first step in creating a deployment share is to mount this file on SRV1. To mount the Windows 10 Enterprise DVD on SRV1, open an elevated Windows PowerShell prompt on the Hyper-V host computer and enter the following command: - - ```powershell - Set-VMDvdDrive -VMName SRV1 -Path c:\VHD\w10-enterprise.iso - ``` - -2. Verify that the Windows Enterprise installation DVD is mounted on SRV1 as drive letter D. - -3. The Windows 10 Enterprise installation files will be used to create a deployment share on SRV1 using the MDT deployment workbench. To open the deployment workbench, select **Start**, enter **deployment**, and then select **Deployment Workbench**. - -4. In the Deployment Workbench console, right-click **Deployment Shares** and select **New Deployment Share**. - -5. Use the following settings for the New Deployment Share Wizard: - - Deployment share path: **C:\MDTBuildLab** - - Share name: **MDTBuildLab$** - - Deployment share description: **MDT build lab** - - Options: Select **Next** to accept the default - - Summary: Select **Next** - - Progress: settings will be applied - - Confirmation: Select **Finish** - -6. Expand the **Deployment Shares** node, and then expand **MDT build lab**. - -7. Right-click the **Operating Systems** node, and then select **New Folder**. Name the new folder **Windows 10**. Complete the wizard using default values and select **Finish**. - -8. Right-click the **Windows 10** folder created in the previous step, and then select **Import Operating System**. - -9. Use the following settings for the Import Operating System Wizard: - - OS Type: **Full set of source files** - - Source: **D:\\** - - Destination: **W10Ent_x64** - - Summary: Select **Next** - - Confirmation: Select **Finish** - -10. For purposes of this test lab, we won't add applications, such as Microsoft Office, to the deployment share. For more information about adding applications, see [Add applications](deploy-windows-mdt/create-a-windows-10-reference-image.md#add-applications). - -11. The next step is to create a task sequence to reference the OS that was imported. To create a task sequence, right-click the **Task Sequences** node under **MDT Build Lab** and then select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard: - - - Task sequence ID: **REFW10X64-001** - - Task sequence name: **Windows 10 Enterprise x64 Default Image** - - Task sequence comments: **Reference Build** - - Template: **Standard Client Task Sequence** - - Select OS: Select **Windows 10 Enterprise Evaluation in W10Ent_x64 install.wim** - - Specify Product Key: **Do not specify a product key at this time** - - Full Name: **Contoso** - - Organization: **Contoso** - - Internet Explorer home page: **`http://www.contoso.com`** - - Admin Password: **Do not specify an Administrator password at this time** - - Summary: Select **Next** - - Confirmation: Select **Finish** - -12. Edit the task sequence to add the Microsoft NET Framework 3.5, which is required by many applications. To edit the task sequence, double-click **Windows 10 Enterprise x64 Default Image** that was created in the previous step. - -13. Select the **Task Sequence** tab. Under **State Restore**, select **Tattoo** to highlight it, then select **Add** and choose **New Group**. A new group will be added under Tattoo. - -14. On the Properties tab of the group that was created in the previous step, change the Name from New Group to **Custom Tasks (Pre-Windows Update)** and then select **Apply**. To see the name change, select **Tattoo**, then select the new group again. - -15. Select the **Custom Tasks (Pre-Windows Update)** group again, select **Add**, point to **Roles**, and then select **Install Roles and Features**. - -16. Under **Select the roles and features that should be installed**, select **.NET Framework 3.5 (includes .NET 2.0 and 3.0)** and then select **Apply**. - -17. Enable Windows Update in the task sequence by clicking the **Windows Update (Post-Application Installation)** step, clicking the **Options** tab, and clearing the **Disable this step** checkbox. - - > [!NOTE] - > Since we aren't installing applications in this test lab, there's no need to enable the Windows Update Pre-Application Installation step. However, you should enable this step if you're also installing applications. - -18. Select **OK** to complete editing the task sequence. - -19. The next step is to configure the MDT deployment share rules. To configure rules in the Deployment Workbench, right-click MDT build lab (C:\MDTBuildLab) and select **Properties**, and then select the **Rules** tab. - -20. Replace the default rules with the following text: - - ```ini - [Settings] - Priority=Default - - [Default] - _SMSTSORGNAME=Contoso - UserDataLocation=NONE - DoCapture=YES - OSInstall=Y - AdminPassword=pass@word1 - TimeZoneName=Pacific Standard TimeZoneName - OSDComputername=#Left("PC-%SerialNumber%",7)# - JoinWorkgroup=WORKGROUP - HideShell=YES - FinishAction=SHUTDOWN - DoNotCreateExtraPartition=YES - ApplyGPOPack=NO - SkipAdminPassword=YES - SkipProductKey=YES - SkipComputerName=YES - SkipDomainMembership=YES - SkipUserData=YES - SkipLocaleSelection=YES - SkipTaskSequence=NO - SkipTimeZone=YES - SkipApplications=YES - SkipBitLocker=YES - SkipSummary=YES - SkipRoles=YES - SkipCapture=NO - SkipFinalSummary=NO - ``` - -21. Select **Apply** and then select **Edit Bootstrap.ini**. Replace the contents of the Bootstrap.ini file with the following text, and save the file: - - ```ini - [Settings] - Priority=Default - - [Default] - DeployRoot=\\SRV1\MDTBuildLab$ - UserDomain=CONTOSO - UserID=MDT_BA - UserPassword=pass@word1 - SkipBDDWelcome=YES - ``` - -22. Select **OK** to complete the configuration of the deployment share. - -23. Right-click **MDT build lab (C:\MDTBuildLab)** and then select **Update Deployment Share**. - -24. Accept all default values in the Update Deployment Share Wizard by clicking **Next**. The update process will take 5 to 10 minutes. When it has completed, select **Finish**. - -25. Copy **c:\MDTBuildLab\Boot\LiteTouchPE_x86.iso** on SRV1 to the **c:\VHD** directory on the Hyper-V host computer. In MDT, the x86 boot image can deploy both x86 and x64 operating systems, except on computers based on Unified Extensible Firmware Interface (UEFI). - - > [!TIP] - > To copy the file, right-click the **LiteTouchPE_x86.iso** file, and select **Copy** on SRV1. Then open the **c:\VHD** folder on the Hyper-V host, right-click inside the folder, and select **Paste**. - -26. Open a Windows PowerShell prompt on the Hyper-V host computer and enter the following commands: - - ```powershell - New-VM -Name REFW10X64-001 -SwitchName poc-internal -NewVHDPath "c:\VHD\REFW10X64-001.vhdx" -NewVHDSizeBytes 60GB - Set-VMMemory -VMName REFW10X64-001 -DynamicMemoryEnabled $true -MinimumBytes 1024MB -MaximumBytes 1024MB -Buffer 20 - Set-VMDvdDrive -VMName REFW10X64-001 -Path c:\VHD\LiteTouchPE_x86.iso - Start-VM REFW10X64-001 - vmconnect localhost REFW10X64-001 - ``` - -27. In the Windows Deployment Wizard, select **Windows 10 Enterprise x64 Default Image**, and then select **Next**. - -28. Accept the default values on the Capture Image page, and select **Next**. OS installation will complete after 5 to 10 minutes and then the VM will reboot automatically. Allow the system to boot normally, don't press a key. The process is fully automated. - - Other system restarts will occur to complete updating and preparing the OS. Setup will complete the following procedures: - - - Install the Windows 10 Enterprise OS. - - Install added applications, roles, and features. - - Update the OS using Windows Update (or WSUS if optionally specified). - - Stage Windows PE on the local disk. - - Run System Preparation (Sysprep) and reboot into Windows PE. - - Capture the installation to a Windows Imaging (WIM) file. - - Turn off the virtual machine. - - This step requires from 30 minutes to 2 hours, depending on the speed of the Hyper-V host and your network's download speed. After some time, you'll have a Windows 10 Enterprise x64 image that is fully patched and has run through Sysprep. The image is located in the C:\MDTBuildLab\Captures folder on SRV1. The file name is **REFW10X64-001.wim**. - -### Add a Windows 10 OS image - -1. Enter the following commands at an elevated Windows PowerShell prompt on SRV1: - - ```powershell - New-Item -ItemType Directory -Path "C:\Sources\OSD\OS\Windows 10 Enterprise x64" - cmd /c copy /z "C:\MDTBuildLab\Captures\REFW10X64-001.wim" "C:\Sources\OSD\OS\Windows 10 Enterprise x64" - ``` - -2. In the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Operating System Images**, and then select **Add Operating System Image**. - -3. On the Data Source page, under **Path:**, enter or browse to **\\\SRV1\Sources$\OSD\OS\Windows 10 Enterprise x64\REFW10X64-001.wim**, and select **Next**. - -4. On the General page, next to **Name:**, enter **Windows 10 Enterprise x64**, select **Next** twice, and then select **Close**. - -5. Distribute the OS image to the SRV1 distribution point by right-clicking the **Windows 10 Enterprise x64** OS image and then clicking **Distribute Content**. - -6. In the Distribute Content Wizard, select **Next**, select **Add**, select **Distribution Point**, add the **SRV1.CONTOSO.COM** distribution point, select **OK**, select **Next** twice and then select **Close**. - -7. Enter **\Monitoring\Overview\Distribution Status\Content Status** on the location bar. (Make sure there's no space at the end of the location or you'll get an error.) Select **Windows 10 Enterprise x64** and monitor the status of content distribution until it's successful and no longer in progress. Refresh the view with the F5 key or by right-clicking **Windows 10 Enterprise x64** and clicking **Refresh**. Processing of the image on the site server can take several minutes. - - > [!NOTE] - > If content distribution isn't successful, verify that sufficient disk space is available. - -### Create a task sequence - -> [!TIP] -> Complete this section slowly. There are a large number of similar settings from which to choose. - -1. In the Configuration Manager console, in the **Software Library** workspace expand **Operating Systems**, right-click **Task Sequences**, and then select **Create MDT Task Sequence**. - -2. On the Choose Template page, select the **Client Task Sequence** template and select **Next**. - -3. On the General page, enter **Windows 10 Enterprise x64** under **Task sequence name:** and then select **Next**. - -4. On the Details page, enter the following settings: - - - Join a domain: **contoso.com** - - Account: Select **Set** - - User name: **contoso\CM_JD** - - Password: **pass@word1** - - Confirm password: **pass@word1** - - Select **OK** - - Windows Settings - - User name: **Contoso** - - Organization name: **Contoso** - - Product key: \ - - Administrator Account: **Enable the account and specify the local administrator password** - - Password: **pass@word1** - - Confirm password: **pass@word1** - - Select **Next** - -5. On the Capture Settings page, accept the default settings and select **Next**. - -6. On the Boot Image page, browse and select the **Zero Touch WinPE x64** boot image package, select **OK**, and then select **Next**. - -7. On the MDT Package page, select **Create a new Microsoft Deployment Toolkit Files package**, under **Package source folder to be created (UNC Path):**, enter **\\\SRV1\Sources$\OSD\MDT\MDT** (MDT is repeated here, not a typo), and then select **Next**. - -8. On the MDT Details page, next to **Name:** enter **MDT** and then select **Next**. - -9. On the OS Image page, browse and select the **Windows 10 Enterprise x64** package, select **OK**, and then select **Next**. - -10. On the Deployment Method page, accept the default settings for **Zero Touch Installation** and select **Next**. - -11. On the Client Package page, browse and select the **Microsoft Corporation Configuration Manager Client package**, select **OK**, and then select **Next**. - -12. On the USMT Package page, browse and select the **Microsoft Corporation User State Migration Tool for Windows 10.0.14393.0** package, select **OK**, and then select **Next**. - -13. On the Settings Package page, select **Create a new settings package**, and under **Package source folder to be created (UNC Path):**, enter **\\\SRV1\Sources$\OSD\Settings\Windows 10 x64 Settings**, and then select **Next**. - -14. On the Settings Details page, next to **Name:**, enter **Windows 10 x64 Settings**, and select **Next**. - -15. On the Sysprep Package page, select **Next** twice. - -16. On the Confirmation page, select **Finish**. - -### Edit the task sequence - -1. In the Configuration Manager console, in the **Software Library** workspace, select **Task Sequences**, right-click **Windows 10 Enterprise x64**, and then select **Edit**. - -2. Scroll down to the **Install** group and select the **Set Variable for Drive Letter** action. - -3. Change the Value under **OSDPreserveDriveLetter** from **False** to **True**, and then select **Apply**. - -4. In the **State Restore** group, select the **Set Status 5** action, select **Add** in the upper left corner, point to **User State**, and select **Request State Store**. This action adds a new step immediately after **Set Status 5**. - -5. Configure this **Request State Store** step with the following settings: - - - Request state storage location to: **Restore state from another computer** - - Select the **If computer account fails to connect to state store, use the Network Access account** checkbox. - - Options tab: Select the **Continue on error** checkbox. - - Add Condition: **Task Sequence Variable**: - - Variable: **USMTLOCAL** - - Condition: **not equals** - - Value: **True** - - Select **OK** - - Select **Apply** - -6. In the **State Restore** group, select **Restore User State**, select **Add**, point to **User State**, and select **Release State Store**. - -7. Configure this **Release State Store** step with the following settings: - - - Options tab: Select the **Continue on error** checkbox. - - Add Condition: **Task Sequence Variable**: - - Variable: **USMTLOCAL** - - Condition: **not equals** - - Value: **True** - - Select **OK** - - Select **OK** - -### Finalize the OS configuration - -> [!NOTE] -> If you completed all procedures in [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md) then the MDT deployment share is already present on SRV1. In this case, skip the first four steps below and begin with step 5 to edit CustomSettings.ini. - -1. In the MDT deployment workbench on SRV1, right-click **Deployment Shares** and then select **New Deployment Share**. - -2. Use the following settings for the New Deployment Share Wizard: - - Deployment share path: **C:\MDTProduction** - - Share name: **MDTProduction$** - - Deployment share description: **MDT Production** - - Options: Select **Next** to accept the default - - Summary: Select **Next** - - Progress: settings will be applied - - Confirmation: Select **Finish** - -3. Right-click the **MDT Production** deployment share, and select **Properties**. - -4. Select the **Monitoring** tab, select the **Enable monitoring for this deployment share** checkbox, and then select **OK**. - -5. Enter the following command at an elevated Windows PowerShell prompt on SRV1: - - ```cmd - notepad.exe "C:\Sources\OSD\Settings\Windows 10 x64 Settings\CustomSettings.ini" - ``` - -6. Replace the contents of the file with the following text, and then save the file: - - ```ini - [Settings] - Priority=Default - Properties=OSDMigrateConfigFiles,OSDMigrateMode - - [Default] - DoCapture=NO - ComputerBackupLocation=NONE - OSDMigrateMode=Advanced - OSDMigrateAdditionalCaptureOptions=/ue:*\* /ui:CONTOSO\* - OSDMigrateConfigFiles=Miguser.xml,Migapp.xml - SLSHARE=\\SRV1\Logs$ - EventService=http://SRV1:9800 - ApplyGPOPack=NO - ``` - - > [!NOTE] - > To migrate accounts other than those in the Contoso domain, then change the OSDMigrateAdditionalCaptureOptions option. For example, the following option will capture settings from all user accounts: - > - > ```ini - > OSDMigrateAdditionalCaptureOptions=/all - > ``` - -7. Return to the Configuration Manager console, and in the **Software Library** workspace, expand **Application Management**, select **Packages**, right-click **Windows 10 x64 Settings**, and then select **Update Distribution Points**. Select **OK** in the popup that appears. - -8. In the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64**, and then select **Distribute Content**. - -9. In the Distribute Content Wizard, select **Next** twice, select **Add**, select **Distribution Point**, select the **SRV1.CONTOSO.COM** distribution point, select **OK**, select **Next** twice and then select **Close**. - -10. Enter **\Monitoring\Overview\Distribution Status\Content Status\Windows 10 Enterprise x64** on the location bar, double-click **Windows 10 Enterprise x64**, and monitor the status of content distribution until it's successful and no longer in progress. Refresh the view with the F5 key or by right-clicking **Windows 10 Enterprise x64** and clicking **Refresh**. - -### Create a deployment for the task sequence - -1. In the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64**, and then select **Deploy**. - -2. On the General page, next to **Collection**, select **Browse**, select the **All Unknown Computers** collection, select **OK**, and then select **Next**. - -3. On the Deployment Settings page, use the following settings: - - Purpose: **Available** - - Make available to the following clients: **Only media and PXE** - - Select **Next**. -4. Select **Next** five times to accept defaults on the Scheduling, User Experience, Alerts, and Distribution Points pages. - -5. Select **Close**. - -## Deploy Windows 10 using PXE and Configuration Manager - -In this first deployment scenario, you'll deploy Windows 10 using PXE. This scenario creates a new computer that doesn't have any migrated users or settings. - -1. Enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host: - - ```powershell - New-VM -Name "PC4" -NewVHDPath "c:\vhd\pc4.vhdx" -NewVHDSizeBytes 40GB -SwitchName poc-internal -BootDevice NetworkAdapter -Generation 2 - Set-VMMemory -VMName "PC4" -DynamicMemoryEnabled $true -MinimumBytes 512MB -MaximumBytes 2048MB -Buffer 20 - Start-VM PC4 - vmconnect localhost PC4 - ``` - -2. Press ENTER when prompted to start the network boot service. - -3. In the Task Sequence Wizard, provide the password: **pass@word1**, and then select **Next**. - -4. Before you select **Next** in the Task Sequence Wizard, press the **F8** key. A command prompt will open. - -5. At the command prompt, enter **explorer.exe** and review the Windows PE file structure. - -6. The smsts.log file is critical for troubleshooting any installation problems that might be encountered. Depending on the deployment phase, the smsts.log file is created in different locations: - - X:\Windows\temp\SMSTSLog\smsts.log before disks are formatted. - - X:\smstslog\smsts.log after disks are formatted. - - C:\\_SMSTaskSequence\Logs\Smstslog\smsts.log before the Configuration Manager client is installed. - - C:\Windows\ccm\logs\Smstslog\smsts.log after the Configuration Manager client is installed. - - C:\Windows\ccm\logs\smsts.log when the task sequence is complete. - - Note: If a reboot is pending on the client, the reboot will be blocked as long as the command window is open. - -7. In the explorer window, select **Tools** and then select **Map Network Drive**. - -8. Don't map a network drive at this time. If you need to save the smsts.log file, you can use this method to save the file to a location on SRV1. - -9. Close the Map Network Drive window, the Explorer window, and the command prompt. - -10. The **Windows 10 Enterprise x64** task sequence is selected in the Task Sequence Wizard. Select **Next** to continue with the deployment. - -11. The task sequence will require several minutes to complete. You can monitor progress of the task sequence using the MDT Deployment Workbench under Deployment Shares > MDTProduction > Monitoring. The task sequence will: - - - Install Windows 10 - - Install the Configuration Manager client and hotfix - - Join the computer to the contoso.com domain - - Install any applications that were specified in the reference image - -12. When Windows 10 installation has completed, sign in to PC4 using the **contoso\administrator** account. - -13. Right-click **Start**, select **Run**, enter **control appwiz.cpl**, press ENTER, select **Turn Windows features on or off**, and verify that **.NET Framework 3.5 (includes .NET 2.0 and 3.0)** is installed. This feature is included in the reference image. - -14. Shut down the PC4 VM. - -> [!NOTE] -> The following two procedures 1) Replace a client with Windows 10 and 2) Refresh a client with Windows 10 have been exchanged in their order in this guide compared to the previous version. This is to avoid having to restore Hyper-V checkpoints to have access to PC1 before the OS is upgraded. If this is your first time going through this guide, you won't notice any change, but if you have tried the guide previously then this change should make it simpler to complete. - -## Replace a client with Windows 10 using Configuration Manager - -> [!NOTE] -> Before you start this section, you can delete computer objects from Active Directory that were created as part of previous deployment procedures. Use the Active Directory Users and Computers console on DC1 to remove stale entries under contoso.com\Computers, but do not delete the computer account (hostname) for PC1. There should be at least two computer accounts present in the contoso.com\Computers container: one for SRV1, and one for the hostname of PC1. It's not required to delete the stale entries, this action is only done to remove clutter. - -![contoso.com\Computers.](images/poc-computers.png) - -In the replace procedure, PC1 won't be migrated to a new OS. It's simplest to perform this procedure before performing the refresh procedure. After you refresh PC1, the OS will be new. The next (replace) procedure doesn't install a new OS on PC1 but rather performs a side-by-side migration of PC1 and another computer (PC4), to copy users and settings from PC1 to the new computer. - -### Create a replace task sequence - -1. On SRV1, in the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Task Sequences**, and then select **Create MDT Task Sequence**. - -2. On the Choose Template page, select **Client Replace Task Sequence** and select **Next**. - -3. On the General page, enter the following information: - - - Task sequence name: **Replace Task Sequence** - - Task sequence comments: **USMT backup only** - -4. Select **Next**, and on the Boot Image page, browse and select the **Zero Touch WinPE x64** boot image package. Select **OK** and then select **Next** to continue. - -5. On the MDT Package page, browse and select the **MDT** package. Select **OK** and then select **Next** to continue. - -6. On the USMT Package page, browse and select the **Microsoft Corporation User State Migration Tool for Windows** package. Select **OK** and then select **Next** to continue. - -7. On the Settings Package page, browse and select the **Windows 10 x64 Settings** package. Select **OK** and then select **Next** to continue. - -8. On the Summary page, review the details and then select **Next**. - -9. On the Confirmation page, select **Finish**. - -> [!NOTE] -> If an error is displayed at this stage, it can be caused by a corrupt MDT integration. To repair it, close the Configuration Manager console, remove MDT integration, and then restore MDT integration. - -### Deploy PC4 - -Create a VM named PC4 to receive the applications and settings from PC1. This VM represents a new computer that will replace PC1. To create this VM, enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host: - -```powershell -New-VM -Name "PC4" -NewVHDPath "c:\vhd\pc4.vhdx" -NewVHDSizeBytes 60GB -SwitchName poc-internal -BootDevice NetworkAdapter -Generation 2 -Set-VMMemory -VMName "PC4" -DynamicMemoryEnabled $true -MinimumBytes 1024MB -MaximumBytes 2048MB -Buffer 20 -Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF -``` - -> [!NOTE] -> Hyper-V lets you define a static MAC address on PC4. In a real-world scenario, you must determine the MAC address of the new computer. - -### Install the Configuration Manager client on PC1 - -1. Verify that the PC1 VM is running and in its original state, which was saved as a checkpoint and then restored in [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md). - -2. If you haven't already saved a checkpoint for PC1, then do it now. Enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host: - - ```powershell - Checkpoint-VM -Name PC1 -SnapshotName BeginState - ``` - -3. On SRV1, in the Configuration Manager console, in the **Administration** workspace, expand **Hierarchy Configuration** and select on **Discovery Methods**. - -4. Double-click **Active Directory System Discovery** and on the **General** tab select the **Enable Active Directory System Discovery** checkbox. - -5. Select the yellow starburst, select **Browse**, select **contoso\Computers**, and then select **OK** three times. - -6. When a popup dialog box asks if you want to run full discovery, select **Yes**. - -7. In the **Assets and Compliance** workspace, select **Devices** and verify that the computer account names for SRV1 and PC1 are displayed. See the following example (GREGLIN-PC1 is the computer account name of PC1 in this example): - - > [!TIP] - > If you don't see the computer account for PC1, select **Refresh** in the upper right corner of the console. - - The **Client** column indicates that the Configuration Manager client isn't currently installed. This procedure will be carried out next. - -8. Sign in to PC1 using the contoso\administrator account and enter the following command at an elevated command prompt to remove any pre-existing client configuration, if it exists. - - > [!Note] - > This command requires an elevated command prompt, not an elevated Windows PowerShell prompt. - - ```cmd - sc.exe stop ccmsetup - "\\SRV1\c$\Program Files\Microsoft Configuration Manager\Client\CCMSetup.exe" /Uninstall - ``` - - > [!NOTE] - > If PC1 still has Configuration Manager registry settings that were applied by Group Policy, startup scripts, or other policies in its previous domain, these might not all be removed by `CCMSetup /Uninstall` and can cause problems with installation or registration of the client in its new environment. It might be necessary to manually remove these settings if they are present. For more information, see [Manual removal of the Configuration Manager client](/archive/blogs/michaelgriswold/manual-removal-of-the-sccm-client). - -9. On PC1, temporarily stop Windows Update from queuing items for download and clear all BITS jobs from the queue. From an elevated command prompt, enter: - - ```cmd - net.exe stop wuauserv - net.exe stop BITS - ``` - - Verify that both services were stopped successfully, then enter the following command at an elevated command prompt: - - ```cmd - del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat" - net.exe start BITS - bitsadmin.exe /list /allusers - ``` - - Verify that BITSAdmin displays zero jobs. - -10. To install the Configuration Manager client as a standalone process, enter the following command at an elevated command prompt: - - ```cmd - "\\SRV1\c$\Program Files\Microsoft Configuration Manager\Client\CCMSetup.exe" /mp:SRV1.contoso.com /logon SMSSITECODE=PS1 - ``` - -11. On PC1, using file explorer, open the **C:\Windows\ccmsetup** directory. During client installation, files will be downloaded here. - -12. Installation progress will be captured in the file: **c:\windows\ccmsetup\logs\ccmsetup.log**. You can periodically open this file in notepad, or you can enter the following command at an elevated Windows PowerShell prompt to monitor installation progress: - - ```powershell - Get-Content -Path c:\windows\ccmsetup\logs\ccmsetup.log -Wait - ``` - - Installation might require several minutes, and display of the log file will appear to hang while some applications are installed. This behavior is normal. When setup is complete, verify that **CcmSetup is existing with return code 0** is displayed on the last line of the ccmsetup.log file. Then press **CTRL-C** to break out of the Get-Content operation. If you're viewing the log file in Windows PowerShell, the last line will be wrapped. A return code of `0` indicates that installation was successful and you should now see a directory created at **C:\Windows\CCM** that contains files used in registration of the client with its site. - -13. On PC1, open the Configuration Manager control panel applet by typing the following command from a command prompt: - - ```cmd - control.exe smscfgrc - ``` - -14. Select the **Site** tab, select **Configure Settings**, and select **Find Site**. The client will report that it has found the PS1 site. See the following example: - - ![site.](images/configmgr-site.png) - - If the client isn't able to find the PS1 site, review any error messages that are displayed in **C:\Windows\CCM\Logs\ClientIDManagerStartup.log** and **LocationServices.log**. A common reason the client can't locate the site code is because a previous configuration exists. For example, if a previous site code is configured at **HKLM\SOFTWARE\Microsoft\SMS\Mobile Client\GPRequestedSiteAssignmentCode**, delete or update this entry. - -15. On SRV1, in the **Assets and Compliance** workspace, select **Device Collections** and then double-click **All Desktop and Server Clients**. This node will be added under **Devices**. - -16. Select **All Desktop and Server Clients** and verify that the computer account for PC1 is displayed here with **Yes** and **Active** in the **Client** and **Client Activity** columns, respectively. You might have to refresh the view and wait few minutes for the client to appear here. See the following example: - - ![client.](images/configmgr-client.png) - - > [!NOTE] - > It might take several minutes for the client to fully register with the site and complete a client check. When it's complete you will see a green check mark over the client icon as shown above. To refresh the client, select it and then press **F5** or right-click the client and select **Refresh**. - -### Create a device collection and deployment - -1. On SRV1, in the Configuration Manager console, in the **Assets and Compliance** workspace, right-click **Device Collections** and then select **Create Device Collection**. - -2. Use the following settings in the **Create Device Collection Wizard**: - - - General > Name: **Install Windows 10 Enterprise x64** - - General > Limiting collection: **All Systems** - - Membership Rules > Add Rule: **Direct Rule** - - The **Create Direct Membership Rule Wizard** opens, select **Next** - - Search for Resources > Resource class: **System Resource** - - Search for Resources > Attribute name: **Name** - - Search for Resources > Value: **%** - - Select Resources > Value: Select the computername associated with the PC1 VM - - Select **Next** twice and then select **Close** in both windows (Next, Next, Close, then Next, Next, Close) - -3. Double-click the Install Windows 10 Enterprise x64 device collection and verify that the PC1 computer account is displayed. - -4. In the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64** and then select **Deploy**. - -5. Use the following settings in the Deploy Software wizard: - - General > Collection: Select Browse and select **Install Windows 10 Enterprise x64** - - Deployment Settings > Purpose: **Available** - - Deployment Settings > Make available to the following clients: **Configuration Manager clients, media and PXE** - - Scheduling > select **Next** - - User Experience > select **Next** - - Alerts > select **Next** - - Distribution Points > select **Next** - - Summary > select **Next** - - Verify that the wizard completed successfully and then select **Close** - -### Associate PC4 with PC1 - -1. On SRV1 in the Configuration Manager console, in the **Assets and Compliance** workspace, right-click **Devices** and then select **Import Computer Information**. - -2. On the Select Source page, choose **Import single computer** and select **Next**. - -3. On the Single Computer page, use the following settings: - - - Computer Name: **PC4** - - MAC Address: **00:15:5D:83:26:FF** - - Source Computer: \ - -4. Select **Next**, and on the User Accounts page choose **Capture and restore specified user accounts**, then select the yellow starburst next to **User accounts to migrate**. - -5. Select **Browse** and then under **Enter the object name to select** enter **user1** and select **OK** twice. - -6. Select the yellow starburst again and repeat the previous step to add the **contoso\administrator** account. - -7. Select **Next** twice, and on the Choose Target Collection page, choose **Add computers to the following collection**, select **Browse**, choose **Install Windows 10 Enterprise x64**, select **OK**, select **Next** twice, and then select **Close**. - -8. In the **Assets and Compliance** workspace, select **User State Migration** and review the computer association in the display pane. The source computer will be the computername of PC1 (GREGLIN-PC1 in this example), the destination computer will be **PC4**, and the migration enter will be **side-by-side**. - -9. Right-click the association in the display pane and then select **Specify User Accounts**. You can add or remove user account here. Select **OK**. - -10. Right-click the association in the display pane and then select **View Recovery Information**. You'll see that a recovery key has been assigned, but a user state store location hasn't. Select **Close**. - -11. Select **Device Collections** and then double-click **Install Windows 10 Enterprise x64**. Verify that **PC4** is displayed in the collection. You might have to update and refresh the collection, or wait a few minutes, but don't proceed until PC4 is available. See the following example: - - ![collection.](images/configmgr-collection.png) - -### Create a device collection for PC1 - -1. On SRV1, in the Configuration Manager console, in the **Assets and Compliance** workspace, right-click **Device Collections** and then select **Create Device Collection**. - -2. Use the following settings in the **Create Device Collection Wizard**: - - - General > Name: **USMT Backup (Replace)** - - General > Limiting collection: **All Systems** - - Membership Rules > Add Rule: **Direct Rule** - - The **Create Direct Membership Rule Wizard** opens, select **Next** - - Search for Resources > Resource class: **System Resource** - - Search for Resources > Attribute name: **Name** - - Search for Resources > Value: **%** - - Select Resources > Value: Select the computername associated with the PC1 VM (GREGLIN-PC1 in this example). - - Select **Next** twice and then select **Close** in both windows. - -3. Select **Device Collections** and then double-click **USMT Backup (Replace)**. Verify that the computer name/hostname associated with PC1 is displayed in the collection. Don't proceed until this name is displayed. - -### Create a new deployment - -In the Configuration Manager console, in the **Software Library** workspace, under **Operating Systems**, select **Task Sequences**, right-click **Replace Task Sequence**, select **Deploy**, and use the following settings: - -- General > Collection: **USMT Backup (Replace)** -- Deployment Settings > Purpose: **Available** -- Deployment Settings > Make available to the following clients: **Only Configuration Manager Clients** -- Scheduling: Select **Next** -- User Experience: Select **Next** -- Alerts: Select **Next** -- Distribution Points: Select **Next** -- Select **Next** and then select **Close**. - -### Verify the backup - -1. On PC1, open the Configuration Manager control panel applet by typing the following command in a command prompt: - - ```cmd - control.exe smscfgrc - ``` - -2. On the **Actions** tab, select **Machine Policy Retrieval & Evaluation Cycle**, select **Run Now**, select **OK**, and then select **OK** again. This method is one that you can use to run a task sequence in addition to the Client Notification method that will be demonstrated in the computer refresh procedure. - -3. Enter the following command at an elevated command prompt to open the Software Center: - - ```cmd - C:\Windows\CCM\SCClient.exe - ``` - -4. In Software Center, select **Available Software**, and then select the **Replace Task Sequence** checkbox. See the following example: - - ![software.](images/configmgr-software-cntr.png) - - > [!NOTE] - > If you don't see any available software, try running step #2 again to start the Machine Policy Retrieval & Evaluation Cycle. You should see an alert that new software is available. - -5. Select **INSTALL SELECTED** and then select **INSTALL OPERATING SYSTEM**. - -6. Allow the **Replace Task Sequence** to complete, then verify that the C:\MigData folder on SRV1 contains the USMT backup. - -### Deploy the new computer - -1. Start PC4 and press ENTER for a network boot when prompted. To start PC4, enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host: - - ```powershell - Start-VM PC4 - vmconnect localhost PC4 - ``` - -2. In the **Welcome to the Task Sequence Wizard**, enter **pass@word1** and select **Next**. - -3. Choose the **Windows 10 Enterprise X64** image. - -4. Setup will install the OS using the Windows 10 Enterprise x64 reference image, install the configuration manager client, join PC4 to the domain, and restore users and settings from PC1. - -5. Save checkpoints for all VMs if you wish to review their status at a later date. This action isn't required, as checkpoints do take up space on the Hyper-V host. - - > [!Note] - > The next procedure will install a new OS on PC1, and update its status in Configuration Manager and in Active Directory as a Windows 10 device. So you can't return to a previous checkpoint only on the PC1 VM without a conflict. Therefore, if you do create a checkpoint, you should do this action for all VMs. - - To save a checkpoint for all VMs, enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host: - - ```powershell - Checkpoint-VM -Name DC1 -SnapshotName cm-refresh - Checkpoint-VM -Name SRV1 -SnapshotName cm-refresh - Checkpoint-VM -Name PC1 -SnapshotName cm-refresh - ``` - -## Refresh a client with Windows 10 using Configuration Manager - -### Initiate the computer refresh - -1. On SRV1, in the **Assets and Compliance** workspace, select **Device Collections** and then double-click **Install Windows 10 Enterprise x64**. - -2. Right-click the computer account for PC1, point to **Client Notification**, select **Download Computer Policy**, and select **OK** in the popup dialog box. - -3. On PC1, in the notification area, select **New software is available** and then select **Open Software Center**. - -4. In the Software Center, select **Operating Systems**, select **Windows 10 Enterprise x64**, select **Install** and then select **INSTALL OPERATING SYSTEM**. See the following example: - - ![installOS.](images/configmgr-install-os.png) - - The computer will restart several times during the installation process. Installation includes downloading updates, reinstalling the Configuration Manager Client Agent, and restoring the user state. You can view status of the installation in the Configuration Manager console by accessing the **Monitoring** workspace, clicking **Deployments**, and then double-clicking the deployment associated with the **Install Windows 10 Enterprise x64** collection. Under **Asset Details**, right-click the device and then select **More Details**. Select the **Status** tab to see a list of tasks that have been performed. See the following example: - - ![asset.](images/configmgr-asset.png) - - You can also monitor progress of the installation by using the MDT deployment workbench and viewing the **Monitoring** node under **Deployment Shares\MDT Production**. - - When installation has completed, sign in using the contoso\administrator account or the contoso\user1 account and verify that applications and settings have been successfully backed up and restored to your new Windows 10 Enterprise OS. - - ![post-refresh.](images/configmgr-post-refresh.png) diff --git a/windows/deployment/windows-10-poc.md b/windows/deployment/windows-10-poc.md deleted file mode 100644 index fab9131baf..0000000000 --- a/windows/deployment/windows-10-poc.md +++ /dev/null @@ -1,1045 +0,0 @@ ---- -title: Configure a test lab to deploy Windows 10 -description: Learn about concepts and procedures for deploying Windows 10 in a proof of concept lab environment. -manager: aaroncz -ms.author: frankroj -author: frankroj -ms.service: windows-client -ms.subservice: itpro-deploy -ms.localizationpriority: medium -ms.topic: tutorial -ms.date: 11/23/2022 ---- - -# Step by step guide: Configure a test lab to deploy Windows 10 - -*Applies to:* - -- Windows 10 - -This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources. - -> [!NOTE] -> Microsoft also offers a pre-configured lab using an evaluation version of Configuration Manager. For more information, see [Windows and Office deployment and management lab kit](/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab). - -This lab guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After completing this guide, see [Step by step: Deploy Windows 10 in a test lab using Microsoft Configuration Manager](windows-10-poc-sc-config-mgr.md). - -The proof of concept (PoC) deployment guides are intended to provide a demonstration of Windows 10 deployment tools and processes for IT professionals that aren't familiar with these tools, and you want to set up a PoC environment. Don't use the instructions in this guide in a production setting. They aren't meant to replace the instructions found in production deployment guidance. - -Approximately 3 hours are required to configure the PoC environment. You'll need a Hyper-V capable computer running Windows 8.1 or later with at least 16 GB of RAM. Detailed [requirements](#hardware-and-software-requirements) are provided below. - -Windows PowerShell commands are provided to set up the PoC environment quickly. You don't need to be an expert in Windows PowerShell to complete the steps in the guide, however you'll need to customize some commands to your environment. - -> [!TIP] -> Instructions to "type" Windows PowerShell commands provided in this guide can be followed literally by typing the commands, but the preferred method is to copy and paste these commands. -> -> A Windows PowerShell window can be used to run all commands in this guide. However, when commands are specified for a command prompt, either type CMD at the Windows PowerShell prompt to enter the command prompt, or preface the command with `cmd /c`. You can also escape special characters in the command using the back-tick character (\`). In most cases, the simplest action is to type `cmd` and enter a command prompt, type the necessary commands, then type `exit` to return to Windows PowerShell. - -Hyper-V is installed, configured and used extensively in this guide. If you aren't familiar with Hyper-V, review the [terminology](#appendix-b-terminology-used-in-this-guide) used in this guide before starting. - -## In this guide - -This guide contains instructions for three general procedures: Install Hyper-V, configure Hyper-V, and configure VMs. If you already have a computer running Hyper-V, you can use this computer and skip the first procedure. In this case, modify your virtual switch settings to match the settings used in this guide. Alternatively, you can modify the steps in this guide to use your existing Hyper-V settings. - -After completing the instructions in this guide, you'll have a PoC environment that enables you to test Windows 10 deployment procedures by following instructions in companion guides that are written to use the PoC environment. Links are provided to download trial versions of Windows Server 2012, Windows 10 Enterprise, and all deployment tools necessary to complete the lab. - -The procedures in this guide are summarized in the following table. An estimate of the time required to complete each procedure is also provided. Time required to complete procedures will vary depending on the resources available to the Hyper-V host and assigned to VMs, such as processor speed, memory allocation, disk speed, and network speed. - -|Procedure|Description|Time| -|--- |--- |--- | -|[Hardware and software requirements](#hardware-and-software-requirements)|Prerequisites to complete this guide.|Informational| -|[Lab setup](#lab-setup)|A description and diagram of the PoC environment.|Informational| -|[Configure the PoC environment](#configure-the-poc-environment)|Parent section for procedures.|Informational| -|[Verify support and install Hyper-V](#verify-support-and-install-hyper-v)|Verify that installation of Hyper-V is supported, and install the Hyper-V server role.|10 minutes| -|[Download VHD and ISO files](#download-vhd-and-iso-files)|Download evaluation versions of Windows Server 2012 R2 and Windows 10 and prepare these files to be used on the Hyper-V host.|30 minutes| -|[Convert PC to VM](#convert-pc-to-vm)|Convert a physical computer on your network to a VM hosted in Hyper-V.|30 minutes| -|[Resize VHD](#resize-vhd)|Increase the storage capacity for one of the Windows Server VMs.|5 minutes| -|[Configure Hyper-V](#configure-hyper-v)|Create virtual switches, determine available RAM for virtual machines, and add virtual machines.|15 minutes| -|[Configure service and user accounts](#configure-vms)|Start virtual machines and configure all services and settings.|60 minutes| -|[Configure VMs](#configure-vms)|Start virtual machines and configure all services and settings.|60 minutes| -|[Appendix A: Verify the configuration](#appendix-a-verify-the-configuration)|Verify and troubleshoot network connectivity and services in the PoC environment.|30 minutes| -|[Appendix B: Terminology in this guide](#appendix-b-terminology-used-in-this-guide)|Terms used in this guide.|Informational| - -## Hardware and software requirements - -One computer that meets the hardware and software specifications below is required to complete the guide; A second computer is recommended to validate the upgrade process. - -- **Computer 1**: the computer you'll use to run Hyper-V and host virtual machines. This computer should have 16 GB or more of installed RAM and a multi-core processor. - -- **Computer 2**: a client computer from your network. It's shadow-copied to create a VM that can be added to the PoC environment, enabling you to test a mirror image of a computer on your network. If you don't have a computer to use for this simulation, you can download an evaluation VHD and use it to represent this computer. Subsequent guides use this computer to simulate Windows 10 replace and refresh scenarios, so the VM is required even if you can't create this VM using computer 2. - -Hardware requirements are displayed below: - -| |Computer 1 (required)|Computer 2 (recommended)| -|--- |--- |--- | -|**Role**|Hyper-V host|Client computer| -|**Description**|This computer will run Hyper-V, the Hyper-V management tools, and the Hyper-V Windows PowerShell module.|This computer is a Windows 8.1 client on your network that will be converted to a VM to demonstrate the upgrade process.| -|**OS**|Windows 8.1/10 or Windows Server 2012/2012 R2/2016|Windows 8.1 or a later| -|**Edition**|Enterprise, Professional, or Education|Any| -|**Architecture**|64-bit|Any

Retaining applications and settings requires that architecture (32-bit or 64-bit) is the same before and after the upgrade.| -|**RAM**|8-GB RAM (16 GB recommended) to test Windows 10 deployment with MDT.
16-GB RAM to test Windows 10 deployment with Microsoft Configuration Manager.|Any| -|**Disk**|200-GB available hard disk space, any format.|Any size, MBR formatted.| -|**CPU**|SLAT-Capable CPU|Any| -|**Network**|Internet connection|Any| - -## Lab setup - -The lab architecture is summarized in the following diagram: - -![PoC diagram.](images/poc.png) - -- Computer 1 is configured to host four VMs on a private, PoC network. - - - Two VMs are running Windows Server 2012 R2 with required network services and tools installed. - - - Two VMs are client systems: One VM is intended to mirror a host on your network (computer 2) and one VM is running Windows 10 Enterprise to demonstrate the hardware replacement scenario. - -> [!NOTE] -> If you have an existing Hyper-V host, you can use this host and skip the Hyper-V installation section in this guide. - -The two Windows Server VMs can be combined into a single VM to conserve RAM and disk space if necessary. However, instructions in this guide assume two server systems are used. Using two servers enables Active Directory Domain Services and DHCP to be installed on a server that isn't directly connected to the network. This action mitigates the risk of clients on the network receiving DHCP leases from the PoC network. In other words, a "rogue" DHCP server. It also limits NETBIOS service broadcasts. - -## Configure the PoC environment - -> [!TIP] -> Before you begin, ensure that Windows PowerShell is pinned to the taskbar for easy access. If the Hyper-V host is running Windows Server then Windows PowerShell is automatically pinned to the taskbar. To pin Windows PowerShell to the taskbar on Windows 8.1 or Windows 10: Click **Start**, type **power**, right click **Windows PowerShell**, and then click **Pin to taskbar**. After Windows PowerShell is pinned to the taskbar, you can open an elevated Windows PowerShell prompt by right-clicking the icon on the taskbar and then clicking **Run as Administrator**. - -### Procedures in this section - -- [Verify support and install Hyper-V](#verify-support-and-install-hyper-v) -- [Download VHD and ISO files](#download-vhd-and-iso-files) -- [Convert PC to VM](#convert-pc-to-vm) -- [Resize VHD](#resize-vhd) -- [Configure Hyper-V](#configure-hyper-v) -- [Configure VMs](#configure-vms) - -### Verify support and install Hyper-V - -1. To verify your computer supports SLAT, open an administrator command prompt, type **systeminfo**, press ENTER, and review the section displayed at the bottom of the output, next to Hyper-V Requirements. See the following example: - - ```cmd - C:\>systeminfo.exe - - ... - Hyper-V Requirements: VM Monitor Mode Extensions: Yes - Virtualization Enabled In Firmware: Yes - Second Level Address Translation: Yes - Data Execution Prevention Available: Yes - ``` - - In this example, the computer supports SLAT and Hyper-V. - - If one or more requirements are evaluated as **No**, then the computer doesn't support installing Hyper-V. However, if only the virtualization setting is incompatible, you might be able to enable virtualization in the BIOS and change the **Virtualization Enabled In Firmware** setting from **No** to **Yes**. The location of this setting will depend on the manufacturer and BIOS version, but is typically found associated with the BIOS security settings. - - You can also identify Hyper-V support using [tools](/archive/blogs/taylorb/hyper-v-will-my-computer-run-hyper-v-detecting-intel-vt-and-amd-v) provided by the processor manufacturer, the [msinfo32](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/cc731397(v=ws.11)) tool, or you can download the [coreinfo](/sysinternals/downloads/coreinfo) utility and run it, as shown in the following example: - - ```cmd - C:\>coreinfo.exe -v - - Coreinfo v3.31 - Dump information on system CPU and memory topology - Copyright (C) 2008-2014 Mark Russinovich - Sysinternals - www.sysinternals.com - - Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz - Intel64 Family 6 Model 42 Stepping 7, GenuineIntel - Microcode signature: 0000001B - HYPERVISOR - Hypervisor is present - VMX * Supports Intel hardware-assisted virtualization - EPT * Supports Intel extended page tables (SLAT) - ``` - - > [!NOTE] - > A 64-bit operating system is required to run Hyper-V. - -2. The Hyper-V feature isn't installed by default. To install it, open an elevated Windows PowerShell window and type the following command: - - ```powershell - Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V -All - ``` - - This command works on all operating systems that support Hyper-V, but on Windows Server operating systems you must type an extra command to add the Hyper-V Windows PowerShell module and the Hyper-V Manager console. This command will also install Hyper-V if it isn't already installed, so if desired you can just type the following command on Windows Server 2012 or 2016 instead of using the Enable-WindowsOptionalFeature command: - - ```powershell - Install-WindowsFeature -Name Hyper-V -IncludeManagementTools - ``` - - When you're prompted to restart the computer, choose **Yes**. The computer might restart more than once. After installation is complete, you can open Hyper-V Manager by typing **virtmgmt.msc** at an elevated command prompt. - - Alternatively, you can install Hyper-V using the Control Panel in Windows under **Turn Windows features on or off** for a client operating system, or using Server Manager's **Add Roles and Features Wizard** on a server operating system, as shown below: - - ![hyper-v features.](images/hyper-v-feature.png) - - ![hyper-v.](images/svr_mgr2.png) - - If you choose to install Hyper-V using Server Manager, accept all default selections. Also be sure to install both items under **Role Administration Tools\Hyper-V Management Tools**. - -### Download VHD and ISO files - -When you have completed installation of Hyper-V on the host computer, begin configuration of Hyper-V by downloading VHD and ISO files to the Hyper-V host. These files will be used to create the VMs used in the lab. - -1. Create a directory on your Hyper-V host named **C:\VHD**. Download a single VHD file for [Windows Server](https://www.microsoft.com/evalcenter/evaluate-windows-server-2022) to the **C:\VHD** directory. - - > [!NOTE] - > The currently available downloads are Windows Server 2019 or Windows Server 2022. The rest of this article refers to "Windows Server 2012 R2" and similar variations. - - > [!IMPORTANT] - > This guide assumes that VHDs are stored in the **C:\VHD** directory on the Hyper-V host. If you use a different directory to store VHDs, you must adjust steps in this guide appropriately. - -2. Download the file to the **C:\VHD** directory. When the download is complete, rename the VHD file that you downloaded to **2012R2-poc-1.vhd**. Do this action to make the filename simple to recognize and type. - -3. Copy the VHD to a second file also in the **C:\VHD** directory and name this VHD **2012R2-poc-2.vhd**. - -4. Download the [Windows 10 Enterprise](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise) ISO file to the **C:\VHD** directory on your Hyper-V host. - - You can select the type, version, and language of installation media to download. In this example, a Windows 10 Enterprise, 64 bit, English ISO is chosen. You can choose a different version. - - > [!NOTE] - > The evaluation version of Windows 10 doesn't support in-place upgrade**. - -5. Rename the ISO file that you downloaded to **w10-enterprise.iso**. This step is so that the filename is simple to type and recognize. - - After completing these steps, you'll have three files in the **C:\VHD** directory: **2012R2-poc-1.vhd**, **2012R2-poc-2.vhd**, **w10-enterprise.iso**. - - The following example displays the procedures described in this section, both before and after downloading files: - - ```cmd - C:>mkdir VHD - C:>cd VHD - C:\VHD>ren 9600*.vhd 2012R2-poc-1.vhd - C:\VHD>copy 2012R2-poc-1.vhd 2012R2-poc-2.vhd - 1 file(s) copied. - C:\VHD ren *.iso w10-enterprise.iso - C:\VHD>dir /B - 2012R2-poc-1.vhd - 2012R2-poc-2.vhd - w10-enterprise.iso - ``` - -### Convert PC to VM - -> [!IMPORTANT] -> Don't attempt to use the VM resulting from the following procedure as a reference image. Also, to avoid conflicts with existing clients, don't start the VM outside the PoC network. - - - -If you have a PC available to convert to VM (computer 2): - -1. Sign in on computer 2 using an account with Administrator privileges. - - > [!IMPORTANT] - > The account used in this step must have local administrator privileges. You can use a local computer account, or a domain account with administrative rights if domain policy allows the use of cached credentials. After converting the computer to a VM, you must be able to sign in on this VM with administrator rights while the VM is disconnected from the network. - -2. [Determine the VM generation and partition type](#determine-the-vm-generation-and-partition-type) that is required. - -3. Based on the VM generation and partition type, perform one of the following procedures: [Prepare a generation 1 VM](#prepare-a-generation-1-vm), [Prepare a generation 2 VM](#prepare-a-generation-2-vm), or [prepare a generation 1 VM from a GPT disk](#prepare-a-generation-1-vm-from-a-gpt-disk). - -#### Determine the VM generation and partition type - -When creating a VM in Hyper-V, you must specify either generation 1 or generation 2. The following table describes requirements for these two types of VMs. - -||Architecture|Operating system|Partition style| -|--- |--- |--- |--- | -|**Generation 1**|32-bit or 64-bit|Windows 7 or later|MBR| -|**Generation 2**|64-bit|Windows 8 or later|MBR or GPT| - -If the PC is running a 32-bit OS or the OS is Windows 7, it must be converted to a generation 1 VM. Otherwise, it can be converted to a generation 2 VM. - -- To determine the OS and architecture of a PC, type **systeminfo** at a command prompt and review the output next to **OS Name** and **System Type**. - -- To determine the partition style, open a Windows PowerShell prompt on the PC and type the following command: - - ```powershell - Get-WmiObject -Class Win32_DiskPartition | Select-Object -Property SystemName,Caption,Type - ``` - -If the **Type** column doesn't indicate GPT, then the disk partition format is MBR ("Installable File System" = MBR). In the following example, the disk is GPT: - -```powershell -Get-WmiObject -Class Win32_DiskPartition | Select-Object -Property SystemName,Caption,Type - -SystemName Caption Type ----------- ------- ---- -USER-PC1 Disk #0, Partition #0 GPT: System -USER-PC1 Disk #0, Partition #1 GPT: Basic Data -``` - -On a computer running Windows 8 or later, you can also type **Get-Disk** at a Windows PowerShell prompt to discover the partition style. The default output of this cmdlet displays the partition style for all attached disks. Both commands are displayed below. In this example, the client computer is running Windows 8.1 and uses a GPT style partition format: - -```powershell -Get-WmiObject -Class Win32_DiskPartition | Select-Object -Property SystemName,Caption,Type - -SystemName Caption Type ----------- ------- ---- -PC-X1 Disk #0, Partition #0 GPT: Unknown -PC-X1 Disk #0, Partition #1 GPT: System -PC-X1 Disk #0, Partition #2 GPT: Basic Data -PC-X1 Disk #0, Partition #3 GPT: Basic Data -PC-X1 Disk #0, Partition #4 GPT: Basic Data - -PS C:> Get-Disk - -Number Friendly Name OperationalStatus Total Size Partition Style ------- ------------- ----------------- ---------- --------------- -0 INTEL SSDSCMMW240A3L Online 223.57 GB GPT -``` - -##### Choosing a VM generation - -The following tables display the Hyper-V VM generation to choose based on the OS, architecture, and partition style. Links to procedures to create the corresponding VMs are included. - -###### Windows 7 MBR - -|Architecture|VM generation|Procedure| -|--- |--- |--- | -|32|1|[Prepare a generation 1 VM](#prepare-a-generation-1-vm)| -|64|1|[Prepare a generation 1 VM](#prepare-a-generation-1-vm)| - -###### Windows 7 GPT - -|Architecture|VM generation|Procedure| -|--- |--- |--- | -|32|N/A|N/A| -|64|1|[Prepare a generation 1 VM from a GPT disk](#prepare-a-generation-1-vm-from-a-gpt-disk)| - -###### Windows 8 or later MBR - -|Architecture|VM generation|Procedure| -|--- |--- |--- | -|32|1|[Prepare a generation 1 VM](#prepare-a-generation-1-vm)| -|64|1, 2|[Prepare a generation 1 VM](#prepare-a-generation-1-vm)| - -###### Windows 8 or later GPT - -|Architecture|VM generation|Procedure| -|--- |--- |--- | -|32|1|[Prepare a generation 1 VM from a GPT disk](#prepare-a-generation-1-vm-from-a-gpt-disk)| -|64|2|[Prepare a generation 2 VM](#prepare-a-generation-2-vm)| - -> [!NOTE] -> -> - If the PC is running Windows 7, it can only be converted and hosted in Hyper-V as a generation 1 VM. This Hyper-V requirement means that if the Windows 7 PC is also using a GPT partition style, the OS disk can be shadow copied, but a new system partition must be created. In this case, see [Prepare a generation 1 VM from a GPT disk](#prepare-a-generation-1-vm-from-a-gpt-disk). -> -> - If the PC is running Windows 8 or later and uses the GPT partition style, you can capture the disk image and create a generation 2 VM. To do this, you must temporarily mount the EFI system partition which is accomplished using the `mountvol` command. In this case, see [Prepare a generation 2 VM](#prepare-a-generation-2-vm). -> -> - If the PC is using an MBR partition style, you can convert the disk to VHD and use it to create a generation 1 VM. If you use the Disk2VHD tool described in this guide, it is not necessary to mount the MBR system partition, but it is still necessary to capture it. In this case, see [Prepare a generation 1 VM](#prepare-a-generation-1-vm). - -#### Prepare a generation 1 VM - -1. Download the [Disk2vhd utility](/sysinternals/downloads/disk2vhd), extract the .zip file and copy **disk2vhd.exe** to a flash drive or other location that is accessible from the computer you wish to convert. - - > [!TIP] - > You might experience timeouts if you attempt to run Disk2vhd from a network share, or specify a network share for the destination. To avoid timeouts, use local, portable media such as a USB drive. - -2. On the computer you wish to convert, double-click the disk2vhd utility to start the graphical user interface. - -3. Select the checkboxes next to the `C:\` and the **system reserved** (BIOS/MBR) volumes. The system volume isn't assigned a drive letter, but will be displayed in the Disk2VHD tool with a volume label similar to `\?\Volume{`. See the following example. - - > [!IMPORTANT] - > You must include the system volume in order to create a bootable VHD. If this volume isn't displayed in the disk2vhd tool, then the computer is likely to be using the GPT partition style. For more information, see [Choosing a VM generation](#choosing-a-vm-generation). - -4. Specify a location to save the resulting VHD or VHDX file (F:\VHD\w7.vhdx in the following example) and select **Create**. See the following example: - - ![disk2vhd 1.](images/disk2vhd.png) - - Disk2vhd can save VHDs to local hard drives, even if they're the same as the volumes being converted. Performance is better, however, when the VHD is saved on a disk different than the disks being converted, such as a flash drive. - -5. When the Disk2vhd utility has completed converting the source computer to a VHD, copy the VHDX file (w7.vhdx) to your Hyper-V host in the C:\VHD directory. There should now be four files in this directory: - - ```cmd - C:\vhd>dir /B - 2012R2-poc-1.vhd - 2012R2-poc-2.vhd - w10-enterprise.iso - w7.VHDX - ``` - -#### Prepare a generation 2 VM - -1. Download the [Disk2vhd utility](/sysinternals/downloads/disk2vhd), extract the .zip file and copy **disk2vhd.exe** to a flash drive or other location that is accessible from the computer you wish to convert. - - > [!TIP] - > You might experience timeouts if you attempt to run Disk2vhd from a network share, or specify a network share for the destination. To avoid timeouts, use local, portable media such as a USB drive. - -2. On the computer you wish to convert, open an elevated command prompt and type the following command: - - ```cmd - mountvol.exe s: /s - ``` - - This command temporarily assigns a drive letter of S to the system volume and mounts it. If the letter S is already assigned to a different volume on the computer, then choose one that is available (ex: mountvol z: /s). - -3. On the computer you wish to convert, double-click the disk2vhd utility to start the graphical user interface. - -4. Select the checkboxes next to the **C:\\** and the **S:\\** volumes, and clear the **Use Volume Shadow Copy checkbox**. Volume shadow copy won't work if the EFI system partition is selected. - - > [!IMPORTANT] - > You must include the EFI system partition in order to create a bootable VHD. The Windows RE tools partition (shown below) is not required, but it can also be converted if desired. - -5. Specify a location to save the resulting VHD or VHDX file (F:\VHD\PC1.vhdx in the following example) and select **Create**. See the following example: - - ![disk2vhd 2.](images/disk2vhd-gen2.png) - - Disk2vhd can save VHDs to local hard drives, even if they're the same as the volumes being converted. Performance is better however when the VHD is saved on a disk different than those disks being converted, such as a flash drive. - -6. When the Disk2vhd utility has completed converting the source computer to a VHD, copy the VHDX file (PC1.vhdx) to your Hyper-V host in the C:\VHD directory. There should now be four files in this directory: - - ```cmd - C:\vhd>dir /B - 2012R2-poc-1.vhd - 2012R2-poc-2.vhd - w10-enterprise.iso - PC1.VHDX - ``` - -#### Prepare a generation 1 VM from a GPT disk - -1. Download the [Disk2vhd utility](/sysinternals/downloads/disk2vhd), extract the .zip file and copy **disk2vhd.exe** to a flash drive or other location that is accessible from the computer you wish to convert. - - You might experience timeouts if you attempt to run Disk2vhd from a network share, or specify a network share for the destination. To avoid timeouts, use local, portable media such as a USB drive. - -2. On the computer you wish to convert, double-click the disk2vhd utility to start the graphical user interface. - -3. Select the checkbox next to the **C:\\** volume and clear the checkbox next to **Use Vhdx**. - - > [!NOTE] - > The system volume isn't copied in this scenario, it will be added later. - -4. Specify a location to save the resulting VHD file (F:\VHD\w7.vhd in the following example) and select **Create**. See the following example: - - ![disk2vhd 3.](images/disk2vhd4.png) - - Disk2vhd can save VHDs to local hard drives, even if they're the same as the volumes being converted. Performance is better however when the VHD is saved on a disk different than those disks being converted, such as a flash drive. - -5. When the Disk2vhd utility has completed converting the source computer to a VHD, copy the VHD file (w7.vhd) to your Hyper-V host in the C:\VHD directory. There should now be four files in this directory: - - ```cmd - C:\vhd>dir /B - 2012R2-poc-1.vhd - 2012R2-poc-2.vhd - w10-enterprise.iso - w7.VHD - ``` - - In its current state, the w7.VHD file isn't bootable. The VHD will be used to create a bootable VM later in the [Configure Hyper-V](#configure-hyper-v) section. - -### Enhanced session mode - -> [!IMPORTANT] -> Before proceeding, verify that you can take advantage of [enhanced session mode](/windows-server/virtualization/hyper-v/learn-more/Use-local-resources-on-Hyper-V-virtual-machine-with-VMConnect) when completing instructions in this guide. Enhanced session mode enables you to copy and paste the commands from the Hyper-V host to VMs, between VMs, and between RDP sessions. After copying some text, you can paste into a Windows PowerShell window by simply right-clicking. Before right-clicking, do not left click other locations as this can empty the clipboard. You can also copy and paste files directly from one computer to another by right-clicking and selecting copy on one computer, then right-clicking and selecting paste on another computer. - -To ensure that enhanced session mode is enabled on the Hyper-V host, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host: - -```powershell -Set-VMhost -EnableEnhancedSessionMode $TRUE -``` - -If enhanced session mode wasn't previously enabled, close any existing virtual machine connections and reopen them to enable access to enhanced session mode. As mentioned previously: instructions to "type" commands provided in this guide can be typed, but the preferred method is to copy and paste these commands. Most of the commands to this point in the guide have been brief, but many commands in sections below are longer and more complex. - -### Resize VHD - -The second Windows Server 2012 R2 VHD needs to be expanded in size from 40 GB to 100 GB to support installing imaging tools and storing OS images. - -1. To add available space for the partition, type the following commands at an elevated Windows PowerShell prompt on the Hyper-V host: - - ```powershell - Resize-VHD -Path c:\VHD\2012R2-poc-2.vhd -SizeBytes 100GB - $x = (Mount-VHD -Path c:\VHD\2012R2-poc-2.vhd -passthru | Get-Disk | Get-Partition | Get-Volume).DriveLetter - Resize-Partition -DriveLetter $x -Size (Get-PartitionSupportedSize -DriveLetter $x).SizeMax - ``` - -2. Verify that the mounted VHD drive is resized to 100 GB, and then dismount the drive: - - ```powershell - Get-Volume -DriveLetter $x - Dismount-VHD -Path c:\VHD\2012R2-poc-2.vhd - ``` - -### Configure Hyper-V - -1. Open an elevated Windows PowerShell window and type the following command to create two virtual switches named "poc-internal" and "poc-external": - - If the Hyper-V host already has an external virtual switch bound to a physical NIC, don't attempt to add a second external virtual switch. Attempting to add a second external switch will result in an error indicating that the NIC is **already bound to the Microsoft Virtual Switch protocol.** In this case, choose one of the following options: - - **A**: Remove the existing external virtual switch, then add the poc-external switch - - **B**: Rename the existing external switch to "poc-external" - - **C**: Replace each instance of "poc-external" used in this guide with the name of your existing external virtual switch - - If you choose B) or C), then don't run the second command below. - - ```powershell - New-VMSwitch -Name poc-internal -SwitchType Internal -Notes "PoC Network" - New-VMSwitch -Name poc-external -NetAdapterName (Get-NetAdapter |?{$_.Status -eq "Up" -and !$_.Virtual}).Name -Notes "PoC External" - ``` - - > [!NOTE] - > The second command above will temporarily interrupt network connectivity on the Hyper-V host. - - Since an external virtual switch is associated to a physical network adapter on the Hyper-V host, this adapter must be specified when adding the virtual switch. The previous commands automate this action by filtering for active non-virtual ethernet adapters using the Get-NetAdapter cmdlet (`$_.Status -eq "Up" -and !$_.Virtual`). If your Hyper-V host is dual-homed with multiple active ethernet adapters, this automation won't work, and the second command above will fail. In this case, you must edit the command used to add the "poc-external" virtual switch by inserting the appropriate NetAdapterName. The NetAdapterName value corresponds to the name of the network interface you wish to use. For example, if the network interface you use on the Hyper-V host to connect to the internet is named "Ethernet 2" then type the following command to create an external virtual switch: `New-VMSwitch -Name poc-external -NetAdapterName "Ethernet 2" -Notes "PoC External"` - -2. At the elevated Windows PowerShell prompt, type the following command to determine the megabytes of RAM that are currently available on the Hyper-V host: - - ```powershell - (Get-VMHostNumaNode).MemoryAvailable - ``` - - This command will display the megabytes of RAM available for VMs. On a Hyper-V host computer with 16 GB of physical RAM installed, 10,000 MB of RAM or greater should be available if the computer isn't also running other applications. On a computer with 8 GB of physical RAM installed, at least 4000 MB should be available. If the computer has less RAM available, try closing applications to free up more memory. - -3. Determine the available memory for VMs by dividing the available RAM by 4. For example: - - ```powershell - (Get-VMHostNumaNode).MemoryAvailable/4 - 2775.5 - ``` - - In this example, VMs can use a maximum of 2700 MB of RAM each, to run four VMs simultaneously. - -4. At the elevated Windows PowerShell prompt, type the following command to create two new VMs. Other VMs will be added later. - - > [!IMPORTANT] - > Replace the value of 2700MB for $maxRAM in the first command below with the RAM value that you calculated in the previous step. - - ```powershell - $maxRAM = 2700MB - New-VM -Name "DC1" -VHDPath c:\vhd\2012R2-poc-1.vhd -SwitchName poc-internal - Set-VMMemory -VMName "DC1" -DynamicMemoryEnabled $true -MinimumBytes 512MB -MaximumBytes $maxRAM -Buffer 20 - Enable-VMIntegrationService -Name "Guest Service Interface" -VMName DC1 - New-VM -Name "SRV1" -VHDPath c:\vhd\2012R2-poc-2.vhd -SwitchName poc-internal - Add-VMNetworkAdapter -VMName "SRV1" -SwitchName "poc-external" - Set-VMMemory -VMName "SRV1" -DynamicMemoryEnabled $true -MinimumBytes 512MB -MaximumBytes $maxRAM -Buffer 80 - Enable-VMIntegrationService -Name "Guest Service Interface" -VMName SRV1 - ``` - - > [!NOTE] - > The RAM values assigned to VMs in this step are not permanent, and can be easily increased or decreased later if needed to address performance issues. - -5. Using the same elevated Windows PowerShell prompt that was used in the previous step, type one of the following sets of commands, depending on the type of VM that was prepared in the [Choosing a VM generation](#choosing-a-vm-generation) section, either generation 1, generation 2, or generation 1 with GPT. - - To create a generation 1 VM (using c:\vhd\w7.vhdx): - - ```powershell - New-VM -Name "PC1" -VHDPath c:\vhd\w7.vhdx -SwitchName poc-internal - Set-VMMemory -VMName "PC1" -DynamicMemoryEnabled $true -MinimumBytes 512MB -MaximumBytes $maxRAM -Buffer 20 - Enable-VMIntegrationService -Name "Guest Service Interface" -VMName PC1 - ``` - - To create a generation 2 VM (using c:\vhd\PC1.vhdx): - - ```powershell - New-VM -Name "PC1" -Generation 2 -VHDPath c:\vhd\PC1.vhdx -SwitchName poc-internal - Set-VMMemory -VMName "PC1" -DynamicMemoryEnabled $true -MinimumBytes 512MB -MaximumBytes $maxRAM -Buffer 20 - Enable-VMIntegrationService -Name "Guest Service Interface" -VMName PC1 - ``` - - To create a generation 1 VM from a GPT disk (using c:\vhd\w7.vhd): - - > [!NOTE] - > The following procedure is more complex because it includes steps to convert the OS partition from GPT to MBR format. Steps are included to create a temporary VHD and attach it to the VM, the OS image is saved to this drive, the OS drive is then reformatted to MBR, the OS image restored, and the temporary drive is removed. - - First, type the following commands at an elevated Windows PowerShell prompt on the Hyper-V host to create a temporary VHD that will be used to save the OS image. Don't forget to include a pipe (`|`) at the end of the first five commands: - - ```powershell - New-VHD -Path c:\vhd\d.vhd -SizeBytes 1TB | - Mount-VHD -Passthru | - Get-Disk -Number {$_.DiskNumber} | - Initialize-Disk -PartitionStyle MBR -PassThru | - New-Partition -UseMaximumSize | - Format-Volume -Confirm:$false -FileSystem NTFS -force - Dismount-VHD -Path c:\vhd\d.vhd - ``` - - Next, create the PC1 VM with two attached VHDs, and boot to DVD ($maxram must be defined previously using the same Windows PowerShell prompt): - - ```powershell - New-VM -Name "PC1" -VHDPath c:\vhd\w7.vhd -SwitchName poc-internal - Add-VMHardDiskDrive -VMName PC1 -Path c:\vhd\d.vhd - Set-VMDvdDrive -VMName PC1 -Path c:\vhd\w10-enterprise.iso - Set-VMMemory -VMName "PC1" -DynamicMemoryEnabled $true -MinimumBytes 512MB -MaximumBytes $maxRAM -Buffer 20 - Enable-VMIntegrationService -Name "Guest Service Interface" -VMName PC1 - Start-VM PC1 - vmconnect localhost PC1 - ``` - - The VM will automatically boot into Windows Setup. In the PC1 window: - - 1. Select **Next**. - - 2. Select **Repair your computer**. - - 3. Select **Troubleshoot**. - - 4. Select **Command Prompt**. - - 5. Type the following command to save an image of the OS drive: - - ```cmd - dism.exe /Capture-Image /ImageFile:D:\c.wim /CaptureDir:C:\ /Name:Drive-C - ``` - - 6. Wait for the OS image to complete saving, and then type the following commands to convert the C: drive to MBR: - - ```cmd - diskpart.exe - select disk 0 - clean - convert MBR - create partition primary size=100 - format fs=ntfs quick - active - create partition primary - format fs=ntfs quick label=OS - assign letter=c - exit - ``` - - 7. Type the following commands to restore the OS image and boot files: - - ```cmd - dism.exe /Apply-Image /ImageFile:D:\c.wim /Index:1 /ApplyDir:C:\ - bcdboot.exe c:\windows - exit - ``` - - 8. Select **Continue** and verify the VM boots successfully. Don't boot from DVD. - - 9. Select **Ctrl+Alt+Del**, and then in the bottom right corner, select **Shut down**. - - 10. Type the following commands at an elevated Windows PowerShell prompt on the Hyper-V host to remove the temporary disks and drives from PC1: - - ```powershell - Remove-VMHardDiskDrive -VMName PC1 -ControllerType IDE -ControllerNumber 0 -ControllerLocation 1 - Set-VMDvdDrive -VMName PC1 -Path $null - ``` - -### Configure VMs - -1. At an elevated Windows PowerShell prompt on the Hyper-V host, start the first Windows Server VM and connect to it by typing the following commands: - - ```powershell - Start-VM DC1 - vmconnect localhost DC1 - ``` - -2. Select **Next** to accept the default settings, read the license terms and select **I accept**, provide a strong administrator password, and select **Finish**. - -3. Select **Ctrl+Alt+Del** in the upper left corner of the virtual machine connection window, and then sign in to DC1 using the Administrator account. - -4. Right-click **Start**, point to **Shut down or sign out**, and select **Sign out**. The VM connection will reset and a new connection dialog box will appear enabling you to choose a custom display configuration. Select a desktop size, select **Connect** and sign in again with the local Administrator account. - - > [!NOTE] - > Signing in this way ensures that [enhanced session mode](/windows-server/virtualization/hyper-v/learn-more/Use-local-resources-on-Hyper-V-virtual-machine-with-VMConnect) is enabled. It's only necessary to do this action the first time you sign in to a new VM. - -5. If DC1 is configured as described in this guide, it will currently be assigned an APIPA address, have a randomly generated hostname, and a single network adapter named "Ethernet." Open an elevated Windows PowerShell prompt on DC1 and type or paste the following commands to provide a new hostname and configure a static IP address and gateway: - - ```powershell - Rename-Computer DC1 - New-NetIPAddress -InterfaceAlias Ethernet -IPAddress 192.168.0.1 -PrefixLength 24 -DefaultGateway 192.168.0.2 - Set-DnsClientServerAddress -InterfaceAlias Ethernet -ServerAddresses 192.168.0.1,192.168.0.2 - ``` - - The default gateway at 192.168.0.2 will be configured later in this guide. - - > [!NOTE] - > A list of available tasks for an app will be populated the first time you run it on the taskbar. Because these tasks aren't available until the App has been run, you will not see the **Run as Administrator** task until you have left-clicked Windows PowerShell for the first time. In this newly created VM, you will need to left-click Windows PowerShell one time, and then you can right-click and choose Run as Administrator to open an elevated Windows PowerShell prompt. - -6. Install the Active Directory Domain Services role by typing the following command at an elevated Windows PowerShell prompt: - - ```powershell - Install-WindowsFeature -Name AD-Domain-Services -IncludeAllSubFeature -IncludeManagementTools - ``` - -7. Before promoting DC1 to a Domain Controller, you must reboot so that the name change in step 3 above takes effect. To restart the computer, type the following command at an elevated Windows PowerShell prompt: - - ```powershell - Restart-Computer - ``` - -8. When DC1 has rebooted, sign in again and open an elevated Windows PowerShell prompt. Now you can promote the server to be a domain controller. The directory services restore mode password must be entered as a secure string. Type the following commands at the elevated Windows PowerShell prompt: - - ```powershell - $pass = "pass@word1" | ConvertTo-SecureString -AsPlainText -Force - Install-ADDSForest -DomainName contoso.com -InstallDns -SafeModeAdministratorPassword $pass -Force - ``` - - Ignore any warnings that are displayed. The computer will automatically reboot upon completion. - -9. When the reboot has completed, reconnect to DC1, sign in using the CONTOSO\Administrator account, open an elevated Windows PowerShell prompt, and use the following commands to add a reverse lookup zone for the PoC network, add the DHCP Server role, authorize DHCP in Active Directory, and suppress the post-DHCP-install alert: - - ```powershell - Add-DnsServerPrimaryZone -NetworkID "192.168.0.0/24" -ReplicationScope Forest - Add-WindowsFeature -Name DHCP -IncludeManagementTools - netsh dhcp add securitygroups - Restart-Service DHCPServer - Add-DhcpServerInDC dc1.contoso.com 192.168.0.1 - Set-ItemProperty -Path registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\Roles\12 -Name ConfigurationState -Value 2 - ``` - -10. Next, add a DHCP scope and set option values: - - ```powershell - Add-DhcpServerv4Scope -Name "PoC Scope" -StartRange 192.168.0.100 -EndRange 192.168.0.199 -SubnetMask 255.255.255.0 -Description "Windows 10 PoC" -State Active - Set-DhcpServerv4OptionValue -ScopeId 192.168.0.0 -DnsDomain contoso.com -Router 192.168.0.2 -DnsServer 192.168.0.1,192.168.0.2 -Force - ``` - - The -Force option is necessary when adding scope options to skip validation of 192.168.0.2 as a DNS server because we haven't configured it yet. The scope should immediately begin issuing leases on the PoC network. The first DHCP lease that will be issued is to vEthernet interface on the Hyper-V host, which is a member of the internal network. You can verify this configuration by using the command: `Get-DhcpServerv4Lease -ScopeId 192.168.0.0` - -11. The DNS server role will also be installed on the member server, SRV1, at 192.168.0.2 so that we can forward DNS queries from DC1 to SRV1 to resolve internet names without having to configure a forwarder outside the PoC network. Since the IP address of SRV1 already exists on DC1's network adapter, it will be automatically added during the DCPROMO process. To verify this server-level DNS forwarder on DC1, type the following command at an elevated Windows PowerShell prompt on DC1: - - ```powershell - Get-DnsServerForwarder - ``` - - The following output should be displayed: - - ```console - UseRootHint : True - Timeout(s) : 3 - EnableReordering : True - IPAddress : 192.168.0.2 - ReorderedIPAddress : 192.168.0.2 - ``` - - If this output isn't displayed, you can use the following command to add SRV1 as a forwarder: - - ```powershell - Add-DnsServerForwarder -IPAddress 192.168.0.2 - ``` - - **Configure service and user accounts** - - Windows 10 deployment with Configuration Manager and MDT requires specific accounts to perform some actions. Service accounts will be created to use for these tasks. A user account is also added in the contoso.com domain that can be used for testing purposes. In the test lab environment, passwords are set to never expire. - - To keep this test lab relatively simple, we won't create a custom OU structure and set permissions. Required permissions are enabled by adding accounts to the Domain Admins group. To configure these settings in a production environment, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) - - On DC1, open an elevated Windows PowerShell prompt and type the following commands: - - ```powershell - New-ADUser -Name User1 -UserPrincipalName user1 -Description "User account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true - New-ADUser -Name MDT_BA -UserPrincipalName MDT_BA -Description "MDT Build Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true - New-ADUser -Name CM_JD -UserPrincipalName CM_JD -Description "Configuration Manager Join Domain Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true - New-ADUser -Name CM_NAA -UserPrincipalName CM_NAA -Description "Configuration Manager Network Access Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -Enabled $true - Add-ADGroupMember "Domain Admins" MDT_BA,CM_JD,CM_NAA - Set-ADUser -Identity user1 -PasswordNeverExpires $true - Set-ADUser -Identity administrator -PasswordNeverExpires $true - Set-ADUser -Identity MDT_BA -PasswordNeverExpires $true - Set-ADUser -Identity CM_JD -PasswordNeverExpires $true - Set-ADUser -Identity CM_NAA -PasswordNeverExpires $true - ``` - -12. Minimize the DC1 VM window but **do not stop** the VM. - - Next, the client VM will be started and joined to the contoso.com domain. This action is done before adding a gateway to the PoC network so that there's no danger of duplicate DNS registrations for the physical client and its cloned VM in the domain. - -13. If the PC1 VM isn't started yet, using an elevated Windows PowerShell prompt on the Hyper-V host, start the client VM (PC1), and connect to it: - - ```powershell - Start-VM PC1 - vmconnect localhost PC1 - ``` - -14. Sign in to PC1 using an account that has local administrator rights. - - PC1 will be disconnected from its current domain, so you can't use a domain account to sign on unless these credentials are cached and the use of cached credentials is permitted by Group Policy. If cached credentials are available and permitted, you can use these credentials to sign in. Otherwise, use an existing local administrator account. - -15. After you sign in, Windows detects that it's running in a new environment. New drivers will be automatically installed, including the network adapter driver. The network adapter driver must be updated before you can proceed, so that you'll be able to join the contoso.com domain. Depending on the resources allocated to PC1, installing the network adapter driver might take a few minutes. You can monitor device driver installation by clicking **Show hidden icons** in the notification area. - - ![PoC 1.](images/installing-drivers.png) - - If the client was configured with a static address, you must change this address to a dynamic one so that it can obtain a DHCP lease. - -16. When the new network adapter driver has completed installation, you'll receive an alert to set a network location for the contoso.com network. Select **Work network** and then select **Close**. When you receive an alert that a restart is required, select **Restart Later**. - -17. Open an elevated Windows PowerShell prompt on PC1 and verify that the client VM has received a DHCP lease and can communicate with the consoto.com domain controller. - - To open Windows PowerShell on Windows 7, select **Start**, and search for "**power**." Right-click **Windows PowerShell** and then select **Pin to Taskbar** so that it's simpler to use Windows PowerShell during this lab. Select **Windows PowerShell** on the taskbar, and then type `ipconfig` at the prompt to see the client's current IP address. Also type `ping dc1.contoso.com` and `nltest /dsgetdc:contoso.com` to verify that it can reach the domain controller. See the following examples of a successful network connection: - - ```cmd - ipconfig.exe - - Windows IP Configuration - - Ethernet adapter Local Area Connection 3: - Connection-specific DNS Suffix . : contoso.com - Link-local IPv6 Address . . . . . : fe80::64c2:4d2a:7403:6e02%18 - Ipv4 Address. . . . . . . . . . . : 192.168.0.101 - Subnet Mask . . . . . . . . . . . : 255.255.255.0 - Default Gateway . . . . . . . . . : 192.168.0.2 - - ping dc1.contoso.com - - Pinging dc1.contoso.com [192.168.0.1] with 32 bytes of data: - Reply from 192.168.0.1: bytes=32 time<1ms TTL=128 - Reply from 192.168.0.1: bytes=32 time<1ms TTL=128 - Reply from 192.168.0.1: bytes=32 time<1ms TTL=128 - Reply from 192.168.0.1: bytes=32 time<1ms TTL=128 - - nltest /dsgetdc:contoso.com - DC: \\DC1 - Address: \\192.168.0.1 - Dom Guid: fdbd0643-d664-411b-aea0-fe343d7670a8 - Dom Name: CONTOSO - Forest Name: contoso.com - Dc Site Name: Default-First-Site-Name - Our Site Name: Default-First-Site-Name - Flags: PDC GC DS LDAP KDC TIMESERV WRITABLE DNS_FOREST CLOSE_SITE FULL_SECRET WS 0xC000 - ``` - - > [!NOTE] - > If PC1 is running Windows 7, enhanced session mode might not be available, which means that you cannot copy and paste commands from the Hyper-V host to a Windows PowerShell prompt on PC1. However, it's possible to use integration services to copy a file from the Hyper-V host to a VM. The next procedure demonstrates this. If the Copy-VMFile command fails, then type the commands below at an elevated Windows PowerShell prompt on PC1 instead of saving them to a script to run remotely. If PC1 is running Windows 8 or a later operating system, you can use enhanced session mode to copy and paste these commands instead of typing them. - -18. Minimize the PC1 window and switch to the Hyper-V host computer. Open an elevated Windows PowerShell ISE window on the Hyper-V host (right-click Windows PowerShell and then select **Run ISE as Administrator**) and type the following commands in the (upper) script editor pane: - - ```powershell - (Get-WmiObject Win32_ComputerSystem).UnjoinDomainOrWorkgroup($null,$null,0) - $pass = "pass@word1" | ConvertTo-SecureString -AsPlainText -Force - $user = "contoso\administrator" - $cred = New-Object System.Management.Automation.PSCredential($user,$pass) - Add-Computer -DomainName contoso.com -Credential $cred - Restart-Computer - ``` - - If you don't see the script pane, select **View** and verify **Show Script Pane Top** is enabled. Select **File** and then select **New**. - - See the following example: - - :::image type="content" alt-text="ISE 1." source="images/ISE.png" lightbox="images/ISE.png"::: - -19. Select **File**, select **Save As**, and save the commands as **c:\VHD\pc1.ps1** on the Hyper-V host. - -20. In the (lower) terminal input window, type the following commands to enable Guest Service Interface on PC1 and then use this service to copy the script to PC1: - - ```powershell - Enable-VMIntegrationService -VMName PC1 -Name "Guest Service Interface" - Copy-VMFile "PC1" -SourcePath "C:\VHD\pc1.ps1" -DestinationPath "C:\pc1.ps1" -CreateFullPath -FileSource Host - ``` - - > [!NOTE] - > In order for this command to work properly, PC1 must be running the vmicguestinterface (Hyper-V Guest Service Interface) service. If this service is not enabled in this step, then the copy-VMFile command will fail. In this case, you can try updating integration services on the VM by mounting the Hyper-V Integration Services Setup (vmguest.iso), which is located in C:\Windows\System32 on Windows Server 2012 and 2012 R2 operating systems that are running the Hyper-V role service. - - If the copy-vmfile command doesn't work and you can't properly enable or upgrade integration services on PC1, then create the file c:\pc1.ps1 on the VM by typing the commands into this file manually. The copy-vmfile command is only used in this procedure as a demonstration of automation methods that can be used in a Hyper-V environment when enhanced session mode isn't available. After typing the script file manually, be sure to save the file as a Windows PowerShell script file with the `.ps1` extension and not as a text (`.txt`) file. - -21. On PC1, type the following commands at an elevated Windows PowerShell prompt: - - ```powershell - Get-Content c:\pc1.ps1 | powershell.exe -noprofile - - ``` - - The commands in this script might take a few moments to complete. If an error is displayed, check that you typed the command correctly, paying close attention to spaces. PC1 is removed from its domain in this step while not connected to the network so as to ensure the computer object in the domain is unaffected. PC1 is also not renamed to "PC1" in system properties so that it maintains some of its mirrored identity. However, if desired you can also rename the computer. - -22. Upon completion of the script, PC1 will automatically restart. When it has restarted, sign in to the contoso.com domain using the **Switch User** option, with the **user1** account you created in step 11 of this section. - - > [!IMPORTANT] - > The settings that will be used later to migrate user data specifically select only accounts that belong to the CONTOSO domain. However, this can be changed to migrate all user accounts, or only other specified accounts. If you wish to test migration of user data and settings with accounts other than those in the CONTOSO domain, you must specify these accounts or domains when you configure the value of **ScanStateArgs** in the MDT test lab guide. This value is specifically called out when you get to that step. If you wish to only migrate CONTOSO accounts, then you can log in with the user1 account or the administrator account at this time and modify some of the files and settings for later use in migration testing. - -23. Minimize the PC1 window but don't turn it off while the second Windows Server 2012 R2 VM (SRV1) is configured. This action verifies that the Hyper-V host has enough resources to run all VMs simultaneously. Next, SRV1 will be started, joined to the contoso.com domain, and configured with RRAS and DNS services. - -24. On the Hyper-V host computer, at an elevated Windows PowerShell prompt, type the following commands: - - ```powershell - Start-VM SRV1 - vmconnect localhost SRV1 - ``` - -25. Accept the default settings, read license terms and accept them, provide a strong administrator password, and select **Finish**. When you're prompted about finding PCs, devices, and content on the network, select **Yes**. - -26. Sign in to SRV1 using the local administrator account. In the same way that was done on DC1, sign out of SRV1 and then sign in again to enable enhanced session mode. Enhanced session mode will enable you to copy and paste Windows PowerShell commands from the Hyper-V host to the VM. - -27. Open an elevated Windows PowerShell prompt on SRV1 and type the following commands: - - ```powershell - Rename-Computer SRV1 - New-NetIPAddress -InterfaceAlias Ethernet -IPAddress 192.168.0.2 -PrefixLength 24 - Set-DnsClientServerAddress -InterfaceAlias Ethernet -ServerAddresses 192.168.0.1,192.168.0.2 - Restart-Computer - ``` - - > [!IMPORTANT] - > Verify that you are configuring the correct interface in this step. The commands in this step assume that the poc-internal interface on SRV1 is named "Ethernet." If you are unsure how to check the interface, see step #30 below for instructions and tips on how to verify and modify the interface name. - -28. Wait for the computer to restart, sign in again, then type the following commands at an elevated Windows PowerShell prompt: - - ```powershell - $pass = "pass@word1" | ConvertTo-SecureString -AsPlainText -Force - $user = "contoso\administrator" - $cred = New-Object System.Management.Automation.PSCredential($user,$pass) - Add-Computer -DomainName contoso.com -Credential $cred - Restart-Computer - ``` - -29. Sign in to the contoso.com domain on SRV1 using the domain administrator account (enter contoso\administrator as the user), open an elevated Windows PowerShell prompt, and type the following commands: - - ```powershell - Install-WindowsFeature -Name DNS -IncludeManagementTools - Install-WindowsFeature -Name WDS -IncludeManagementTools - Install-WindowsFeature -Name Routing -IncludeManagementTools - ``` - -30. Before configuring the routing service that was installed, verify that network interfaces were added to SRV1 in the right order, resulting in an interface alias of "Ethernet" for the private interface, and an interface alias of "Ethernet 2" for the public interface. Also verify that the external interface has a valid external DHCP IP address lease. - - To view a list of interfaces, associated interface aliases, and IP addresses on SRV1, type the following Windows PowerShell command. Example output of the command is also shown below: - - ```powershell - Get-NetAdapter | ? status -eq 'up' | Get-NetIPAddress -AddressFamily IPv4 | ft IPAddress, InterfaceAlias - - IPAddress InterfaceAlias - --------- -------------- - 10.137.130.118 Ethernet 2 - 192.168.0.2 Ethernet - ``` - - In this example, the poc-internal network interface at 192.168.0.2 is associated with the "Ethernet" interface and the internet-facing poc-external interface is associated with the "Ethernet 2" interface. If your interfaces are different, you must adjust the commands provided in the next step appropriately to configure routing services. Also note that if the "Ethernet 2" interface has an IP address in the 192.168.0.100-105 range then it likely is getting a DHCP lease from DC1 instead of your network. If so, you can try removing and readding the second network interface from the SRV1 VM through its Hyper-V settings. - - > [!TIP] - > Sometimes a computer will have hidden, disconnected interfaces that prevent you from naming a network adapter. When you attempt to rename an adapter, you will receive an error that the adapter name already exists. These disconnected devices can be viewed in device manager by clicking **View** and then clicking **Show hidden devices**. The disconnected device can then be uninstalled, enabling you to reuse the adapter name. - -31. To configure SRV1 with routing capability for the PoC network, type or paste the following commands at an elevated Windows PowerShell prompt on SRV1: - - ```powershell - Install-RemoteAccess -VpnType Vpn - cmd /c netsh routing ip nat install - cmd /c netsh routing ip nat add interface name="Ethernet 2" mode=FULL - cmd /c netsh routing ip nat add interface name="Ethernet" mode=PRIVATE - cmd /c netsh routing ip nat add interface name="Internal" mode=PRIVATE - ``` - -32. The DNS service on SRV1 also needs to resolve hosts in the `contoso.com` domain. This step can be accomplished with a conditional forwarder. Open an elevated Windows PowerShell prompt on SRV1 and type the following command: - - ```powershell - Add-DnsServerConditionalForwarderZone -Name contoso.com -MasterServers 192.168.0.1 - ``` - -33. In most cases, this process completes configuration of the PoC network. However, if your network has a firewall that filters queries from local DNS servers, you'll also need to configure a server-level DNS forwarder on SRV1 to resolve internet names. To test whether or not DNS is working without this forwarder, try to reach a name on the internet from DC1 or PC1, which are only using DNS services on the PoC network. You can test DNS with the ping command, for example: - - ```cmd - ping.exe www.microsoft.com - ``` - - If you see "Ping request couldn't find host `www.microsoft.com`" on PC1 and DC1, but not on SRV1, then you'll need to configure a server-level DNS forwarder on SRV1. To do this action, open an elevated Windows PowerShell prompt on SRV1 and type the following command. - - > [!NOTE] - > This command also assumes that "Ethernet 2" is the external-facing network adapter on SRV1. If the external adapter has a different name, replace "Ethernet 2" in the command below with that name: - - ```powershell - Add-DnsServerForwarder -IPAddress (Get-DnsClientServerAddress -InterfaceAlias "Ethernet 2").ServerAddresses - ``` - -34. If DNS and routing are both working correctly, you'll see the following output on DC1 and PC1 (the IP address might be different, but that's OK): - - ```cmd - ping www.microsoft.com - - Pinging e2847.dspb.akamaiedge.net [23.222.146.170] with 32 bytes of data: - Reply from 23.222.146.170: bytes=32 time=3ms TTL=51 - Reply from 23.222.146.170: bytes=32 time=2ms TTL=51 - Reply from 23.222.146.170: bytes=32 time=2ms TTL=51 - Reply from 23.222.146.170: bytes=32 time=1ms TTL=51 - - Ping statistics for 23.222.146.170: - Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), - Approximate round trip times in milli-seconds: - Minimum = 1ms, Maximum = 3ms, Average = 2ms - ``` - -35. Verify that all three VMs can reach each other, and the internet. See [Appendix A: Verify the configuration](#appendix-a-verify-the-configuration) for more information. -36. Lastly, because the client computer has different hardware after copying it to a VM, its Windows activation will be invalidated and you might receive a message that you must activate Windows in three days. To extend this period to 30 days, type the following commands at an elevated Windows PowerShell prompt on PC1: - - ```powershell - runas.exe /noprofile /env /user:administrator@contoso.com "cmd.exe /c slmgr -rearm" - Restart-Computer - ``` - -This process completes configuration of the starting PoC environment. More services and tools are installed in subsequent guides. - -## Appendix A: Verify the configuration - -Use the following procedures to verify that the PoC environment is configured properly and working as expected. - -1. On DC1, open an elevated Windows PowerShell prompt and type the following commands: - - ```powershell - Get-Service NTDS,DNS,DHCP - DCDiag -a - Get-DnsServerResourceRecord -ZoneName contoso.com -RRType A - Get-DnsServerForwarder - Resolve-DnsName -Server dc1.contoso.com -Name www.microsoft.com - Get-DhcpServerInDC - Get-DhcpServerv4Statistics - ipconfig.exe /all - ``` - - **Get-Service** displays a status of "Running" for all three services. - - **DCDiag** displays "passed test" for all tests. - - **Get-DnsServerResourceRecord** displays the correct DNS address records for DC1, SRV1, and the computername of PC1. Other address records for the zone apex (@), DomainDnsZones, and ForestDnsZones will also be registered. - - **Get-DnsServerForwarder** displays a single forwarder of 192.168.0.2. - - **Resolve-DnsName** displays public IP address results for `www.microsoft.com`. - - **Get-DhcpServerInDC** displays 192.168.0.1, `dc1.contoso.com`. - - **Get-DhcpServerv4Statistics** displays one scope with two addresses in use. These addresses belong to PC1 and the Hyper-V host. - - **ipconfig** displays a primary DNS suffix and suffix search list of `contoso.com`, IP address of 192.168.0.1, subnet mask of 255.255.255.0, default gateway of 192.168.0.2, and DNS server addresses of 192.168.0.1 and 192.168.0.2. - -2. On SRV1, open an elevated Windows PowerShell prompt and type the following commands: - - ```powershell - Get-Service DNS,RemoteAccess - Get-DnsServerForwarder - Resolve-DnsName -Server dc1.contoso.com -Name www.microsoft.com - ipconfig.exe /all - netsh.exe int ipv4 show address - ``` - - **Get-Service** displays a status of "Running" for both services. - - **Get-DnsServerForwarder** either displays no forwarders, or displays a list of forwarders you're required to use so that SRV1 can resolve internet names. - - **Resolve-DnsName** displays public IP address results for `www.microsoft.com`. - - **ipconfig** displays a primary DNS suffix of `contoso.com`. The suffix search list contains `contoso.com` and your domain. Two ethernet adapters are shown: Ethernet adapter "Ethernet" has an IP address of 192.168.0.2, subnet mask of 255.255.255.0, no default gateway, and DNS server addresses of 192.168.0.1 and 192.168.0.2. Ethernet adapter "Ethernet 2" has an IP address, subnet mask, and default gateway configured by DHCP on your network. - - **netsh** displays three interfaces on the computer: interface "Ethernet 2" with DHCP enabled = Yes and IP address assigned by your network, interface "Ethernet" with DHCP enabled = No and IP address of 192.168.0.2, and interface "Loopback Pseudo-Interface 1" with IP address of 127.0.0.1. - -3. On PC1, open an elevated Windows PowerShell prompt and type the following commands: - - ```cmd - whoami.exe - hostname.exe - nslookup.exe www.microsoft.com - ping.exe -n 1 dc1.contoso.com - tracert.exe www.microsoft.com - ``` - - **whoami.exe** displays the current user context, for example in an elevated Windows PowerShell prompt, contoso\administrator is displayed. - - **hostname.exe** displays the name of the local computer, for example W7PC-001. - - **nslookup.exe** displays the DNS server used for the query, and the results of the query. For example, server `dc1.contoso.com`, address 192.168.0.1, Name `e2847.dspb.akamaiedge.net`. - - **ping.exe** displays if the source can resolve the target name, and whether or not the target responds to ICMP. If it can't be resolved, "couldn't find host" will be displayed. If the target is found and also responds to ICMP, you'll see "Reply from" and the IP address of the target. - - **tracert.exe** displays the path to reach the destination, for example `srv1.contoso.com` [192.168.0.2] followed by a list of hosts and IP addresses corresponding to subsequent routing nodes between the source and the destination. - -## Appendix B: Terminology used in this guide - -|Term|Definition| -|--- |--- | -|**GPT**|GUID partition table (GPT) is an updated hard-disk formatting scheme that enables the use of newer hardware. GPT is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions.| -|**Hyper-V**|Hyper-V is a server role introduced with Windows Server 2008 that lets you create a virtualized computing environment. Hyper-V can also be installed as a Windows feature on Windows client operating systems, starting with Windows 8.| -|**Hyper-V host**|The computer where Hyper-V is installed.| -|**Hyper-V Manager**|The user-interface console used to view and configure Hyper-V.| -|**MBR**|Master Boot Record (MBR) is a legacy hard-disk formatting scheme that limits support for newer hardware. MBR is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions. MBR is in the process of being replaced by the GPT partition format.| -|**Proof of concept (PoC)**|Confirmation that a process or idea works as intended. A PoC is carried out in a test environment to learn about and verify a process.| -|**Shadow copy**|A copy or "snapshot" of a computer at a point in time, created by the Volume Shadow Copy Service (VSS), typically for backup purposes.| -|**Virtual machine (VM)**|A VM is a virtual computer with its own operating system, running on the Hyper-V host.| -|**Virtual switch**|A virtual network connection used to connect VMs to each other and to physical network adapters on the Hyper-V host.| -|**VM snapshot**|A point in time image of a VM that includes its disk, memory and device state. It can be used to return a virtual machine to a former state corresponding to the time the snapshot was taken.| - -## Next steps - -- [Windows 10 deployment scenarios](windows-deployment-scenarios.md) -- [Step by step: Deploy Windows 10 in a test lab using Microsoft Configuration Manager](windows-10-poc-sc-config-mgr.md) diff --git a/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md index 703d4ddb4b..5f9eee104c 100644 --- a/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md +++ b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md @@ -82,7 +82,7 @@ To be eligible for Windows Autopatch management, devices must meet a minimum set - Last Intune device check in completed within the last 28 days. > [!IMPORTANT] -> Windows Autopatch supports registering [Windows 10 Long-Term Servicing Channel (LTSC)](/windows/whats-new/ltsc/) devices that are being currently serviced by the [Windows LTSC](/windows/release-health/release-information). The service only supports managing the [Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md) workload for devices currently serviced by the LTSC. Windows Update for Business service and Windows Autopatch don't offer Windows feature updates for devices that are part of the LTSC. You must either use [LTSC media](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise) or the [Configuration Manager Operating System Deployment capabilities to perform an in-place upgrade](/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager) for Windows devices that are part of the LTSC. +> Windows Autopatch supports registering [Windows 10 Long-Term Servicing Channel (LTSC)](/windows/whats-new/ltsc/) devices that are being currently serviced by the [Windows LTSC](/windows/release-health/release-information). The service only supports managing the [Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md) workload for devices currently serviced by the LTSC. Windows Update for Business service and Windows Autopatch don't offer Windows feature updates for devices that are part of the LTSC. You must either use [LTSC media](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise) or the [Configuration Manager operating system deployment capabilities to perform an in-place upgrade](/mem/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version) for Windows devices that are part of the LTSC. For more information, see [Windows Autopatch Prerequisites](../prepare/windows-autopatch-prerequisites.md). diff --git a/windows/deployment/windows-autopatch/index.yml b/windows/deployment/windows-autopatch/index.yml index d8f637c20b..2a64ebfccd 100644 --- a/windows/deployment/windows-autopatch/index.yml +++ b/windows/deployment/windows-autopatch/index.yml @@ -11,7 +11,7 @@ metadata: author: tiaraquan #Required; your GitHub user alias, with correct capitalization. ms.author: tiaraquan #Required; microsoft alias of author; optional team alias. manager: aaroncz - ms.date: 05/30/2022 #Required; mm/dd/yyyy format. + ms.date: 08/27/2024 #Required; mm/dd/yyyy format. ms.service: windows-client ms.subservice: autopatch ms.collection: diff --git a/windows/deployment/windows-autopatch/manage/windows-autopatch-windows-feature-update-overview.md b/windows/deployment/windows-autopatch/manage/windows-autopatch-windows-feature-update-overview.md index 677478a775..233baa86f8 100644 --- a/windows/deployment/windows-autopatch/manage/windows-autopatch-windows-feature-update-overview.md +++ b/windows/deployment/windows-autopatch/manage/windows-autopatch-windows-feature-update-overview.md @@ -35,7 +35,7 @@ Windows Autopatch's service level objective for Windows feature updates aims to Windows Autopatch's device eligibility criteria for Windows feature updates aligns with [Windows Update for Business and Microsoft Intune's device eligibility criteria](/mem/intune/protect/windows-10-feature-updates#prerequisites). > [!IMPORTANT] -> Windows Autopatch supports registering [Windows 10 Long-Term Servicing Channel (LTSC)](/windows/whats-new/ltsc/) devices that are being currently serviced by the [Windows LTSC](/windows/release-health/release-information). The service only supports managing the [Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md) workload for devices currently serviced by the LTSC. Windows Update for Business service and Windows Autopatch don't offer Windows feature updates for devices that are part of the LTSC. You must either use [LTSC media](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise) or the [Configuration Manager Operating System Deployment capabilities to perform an in-place upgrade](/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager) for Windows devices that are part of the LTSC. +> Windows Autopatch supports registering [Windows 10 Long-Term Servicing Channel (LTSC)](/windows/whats-new/ltsc/) devices that are being currently serviced by the [Windows LTSC](/windows/release-health/release-information). The service only supports managing the [Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md) workload for devices currently serviced by the LTSC. Windows Update for Business service and Windows Autopatch don't offer Windows feature updates for devices that are part of the LTSC. You must either use [LTSC media](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise) or the [Configuration Manager operating system deployment capabilities to perform an in-place upgrade](/mem/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version) for Windows devices that are part of the LTSC. ## Key benefits diff --git a/windows/deployment/windows-autopatch/manage/windows-autopatch-windows-quality-update-overview.md b/windows/deployment/windows-autopatch/manage/windows-autopatch-windows-quality-update-overview.md index 5e98dae0ea..0295bf28bf 100644 --- a/windows/deployment/windows-autopatch/manage/windows-autopatch-windows-quality-update-overview.md +++ b/windows/deployment/windows-autopatch/manage/windows-autopatch-windows-quality-update-overview.md @@ -61,7 +61,7 @@ The service level objective for each of these states is calculated as: > Targeted deployment ring refers to the deployment ring value of the device in question. If a device has a five day deferral with a two day deadline, and two day grace period, the SLO for the device would be calculated to `5 + 2 + 5 = 12`-day service level objective from the second Tuesday of the month. The five day reporting period is one established by Windows Autopatch to allow enough time for device check-in reporting and data evaluation within the service. > [!IMPORTANT] -> Windows Autopatch supports registering [Windows 10 Long-Term Servicing Channel (LTSC)](/windows/whats-new/ltsc/) devices that are being currently serviced by the [Windows LTSC](/windows/release-health/release-information). The service only supports managing the [Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md) workload for devices currently serviced by the LTSC. Windows Update for Business service and Windows Autopatch don't offer Windows feature updates for devices that are part of the LTSC. You must either use [LTSC media](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise) or the [Configuration Manager Operating System Deployment capabilities to perform an in-place upgrade](/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager) for Windows devices that are part of the LTSC. +> Windows Autopatch supports registering [Windows 10 Long-Term Servicing Channel (LTSC)](/windows/whats-new/ltsc/) devices that are being currently serviced by the [Windows LTSC](/windows/release-health/release-information). The service only supports managing the [Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md) workload for devices currently serviced by the LTSC. Windows Update for Business service and Windows Autopatch don't offer Windows feature updates for devices that are part of the LTSC. You must either use [LTSC media](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise) or the [Configuration Manager operating system deployment capabilities to perform an in-place upgrade](/mem/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version) for Windows devices that are part of the LTSC. ## Import Update rings for Windows 10 and later diff --git a/windows/deployment/windows-autopatch/prepare/windows-autopatch-prerequisites.md b/windows/deployment/windows-autopatch/prepare/windows-autopatch-prerequisites.md index b9577e833f..ad60e63ad0 100644 --- a/windows/deployment/windows-autopatch/prepare/windows-autopatch-prerequisites.md +++ b/windows/deployment/windows-autopatch/prepare/windows-autopatch-prerequisites.md @@ -68,7 +68,7 @@ The following Windows 10 editions, build version and architecture are supported > While Windows Autopatch supports registering devices below the [minimum Windows OS version enforced by the service](../operate/windows-autopatch-windows-feature-update-overview.md), once registered, devices are automatically offered with the [minimum windows OS version](../operate/windows-autopatch-windows-feature-update-overview.md). The devices must be on a [minimum Windows OS currently serviced](/windows/release-health/release-information?msclkid=ee885719baa511ecb838e1a689da96d2) by the [Windows servicing channels](/windows/release-health/release-information?msclkid=ee885719baa511ecb838e1a689da96d2) to keep receiving monthly security updates that are critical to security and the health Windows. > [!NOTE] -> Windows Autopatch supports registering [Windows 10 Long-Term Servicing Channel (LTSC)](/windows/whats-new/ltsc/) devices that are being currently serviced by the [Windows LTSC](/windows/release-health/release-information). The service only supports managing the [Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md) workload for devices currently serviced by the LTSC. Windows Update for Business service and Windows Autopatch don't offer Windows feature updates for devices that are part of the LTSC. You must either use [LTSC media](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise) or the [Configuration Manager Operating System Deployment capabilities to perform an in-place upgrade](/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager) for Windows devices that are part of the LTSC. +> Windows Autopatch supports registering [Windows 10 Long-Term Servicing Channel (LTSC)](/windows/whats-new/ltsc/) devices that are being currently serviced by the [Windows LTSC](/windows/release-health/release-information). The service only supports managing the [Windows quality updates](../operate/windows-autopatch-windows-quality-update-overview.md) workload for devices currently serviced by the LTSC. Windows Update for Business service and Windows Autopatch don't offer Windows feature updates for devices that are part of the LTSC. You must either use [LTSC media](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise) or the [Configuration Manager operating system deployment capabilities to perform an in-place upgrade](/mem/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version) for Windows devices that are part of the LTSC. ## Configuration Manager co-management requirements diff --git a/windows/deployment/windows-deployment-scenarios-and-tools.md b/windows/deployment/windows-deployment-scenarios-and-tools.md index 876e0dec6c..74a32bf1f1 100644 --- a/windows/deployment/windows-deployment-scenarios-and-tools.md +++ b/windows/deployment/windows-deployment-scenarios-and-tools.md @@ -14,7 +14,7 @@ ms.subservice: itpro-deploy To successfully deploy the Windows 10 operating system and applications for your organization, understand the available tools to help with the process. In this article, you'll learn about the most commonly used tools for Windows 10 deployment. -Microsoft provides many tools, services, and solutions. These tools include Windows Deployment Services (WDS), the Volume Activation Management Tool (VAMT), the User State Migration Tool (USMT), Windows System Image Manager (Windows SIM), Windows Preinstallation Environment (Windows PE), and Windows Recovery Environment (Windows RE). These tools aren't a complete solution on their own. Combine these tools with solutions like [Configuration Manager](deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) to get a complete deployment solution. +Microsoft provides many tools, services, and solutions. These tools include Windows Deployment Services (WDS), the Volume Activation Management Tool (VAMT), the User State Migration Tool (USMT), Windows System Image Manager (Windows SIM), Windows Preinstallation Environment (Windows PE), and Windows Recovery Environment (Windows RE). These tools aren't a complete solution on their own. Combine these tools with solutions like [Configuration Manager](/mem/configmgr) to get a complete deployment solution. In this article, you also learn about different types of reference images that you can build, and why reference images are beneficial for most organizations @@ -39,7 +39,7 @@ Dism.exe /Online /Enable-Feature /FeatureName:NetFX3 /All /Source:D:\Sources\SxS In Windows 10, you can use Windows PowerShell for many of the functions done by DISM.exe. The equivalent command in Windows 10 using PowerShell is: ```powershell -Enable-WindowsOptionalFeature -Online -FeatureName NetFx3 -All +Enable-WindowsOptionalFeature -Online -FeatureName NetFx3 -All -Source D:\Sources\SxS -LimitAccess ``` @@ -179,7 +179,7 @@ MDT is a free deployment solution from Microsoft. It provides end-to-end guidanc MDT has two main parts: the first is Lite Touch, which is a stand-alone deployment solution; the second is Zero Touch, which is an extension to Configuration Manager. -**Note** +**Note** Lite Touch and Zero Touch are marketing names for the two solutions that MDT supports, and the naming has nothing to do with automation. You can fully automate the stand-alone MDT solution (Lite Touch), and you can configure the solution integration with Configuration Manager to prompt for information. ![The Deployment Workbench in, showing a task sequence.](images/mdt-11-fig13.png) diff --git a/windows/deployment/windows-deployment-scenarios.md b/windows/deployment/windows-deployment-scenarios.md index 622b83b41b..857188ae38 100644 --- a/windows/deployment/windows-deployment-scenarios.md +++ b/windows/deployment/windows-deployment-scenarios.md @@ -37,7 +37,7 @@ The following tables summarize various Windows deployment scenarios. The scenari |Scenario|Description|More information| |--- |--- |--- | |[Windows Autopilot](#windows-autopilot)|Customize the out-of-box-experience (OOBE) for an organization, and deploy a new system with apps and settings already configured|[Overview of Windows Autopilot](/autopilot/windows-autopilot)| -|[In-place upgrade](#in-place-upgrade)|Use Windows Setup to update the Windows version and migrate apps and settings. Rollback data is saved in Windows.old.|[Perform an in-place upgrade to Windows using Configuration Manager](/windows/deployment/deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager)| +|[In-place upgrade](#in-place-upgrade)|Use Windows Setup to update the Windows version and migrate apps and settings. Rollback data is saved in Windows.old.|[Perform an in-place upgrade to Windows using Configuration Manager](/mem/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version)| ### Dynamic @@ -51,9 +51,9 @@ The following tables summarize various Windows deployment scenarios. The scenari |Scenario|Description|More information| |--- |--- |--- | -|[Bare metal](#new-computer)|Deploy a new device, or wipe an existing device and deploy with a fresh image. |[Deploy Windows using PXE and Configuration Manager](/windows/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager)| -|[Refresh](#computer-refresh)|Also called wipe and load. Redeploy a device by saving the user state, wiping the disk, then restoring the user state. | [Refresh a Windows client with a currently supported version of Windows using Configuration Manager](/windows/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager)| -|[Replace](#computer-replace)|Replace an existing device with a new one by saving the user state on the old device and then restoring it to the new device.| [Replace a Windows client with a currently supported version of Windows using Configuration Manager](/windows/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager)| +|[Bare metal](#new-computer)|Deploy a new device, or wipe an existing device and deploy with a fresh image. |[Deploy Windows using PXE and Configuration Manager](/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager)| +|[Refresh](#computer-refresh)|Also called wipe and load. Redeploy a device by saving the user state, wiping the disk, then restoring the user state. | [Refresh a Windows client with a currently supported version of Windows using Configuration Manager](/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager)| +|[Replace](#computer-replace)|Replace an existing device with a new one by saving the user state on the old device and then restoring it to the new device.| [Replace a Windows client with a currently supported version of Windows using Configuration Manager](/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/replace-a-windows-7-client-with-windows-10-using-configuration-manager)| > [!IMPORTANT] > @@ -134,7 +134,7 @@ While Windows includes various provisioning settings and deployment mechanisms, In the past, organizations typically deployed Windows using an image-based process built on top of tools provided in: - [Windows Assessment and Deployment Kit](windows-adk-scenarios-for-it-pros.md). -- [Microsoft Configuration Manager](deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). +- [Microsoft Configuration Manager](/mem/configmgr). - Windows Deployment Services (WDS). - Microsoft Deployment Toolkit. @@ -198,8 +198,8 @@ The deployment process for the replace scenario is as follows: ## Related articles -- [Upgrade to Windows with Microsoft Configuration Manager](./deploy-windows-cm/upgrade-to-windows-10-with-configuration-manager.md). -- [Deploy Windows using PXE and Configuration Manager](deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md). +- [Upgrade to Windows with Microsoft Configuration Manager](/mem/configmgr/osd/deploy-use/upgrade-windows-to-the-latest-version). +- [Deploy Windows using PXE and Configuration Manager](/previous-versions/windows/it-pro/windows-10/deployment/deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager). - [Windows setup technical reference](/windows-hardware/manufacture/desktop/windows-setup-technical-reference). - [Windows Imaging and Configuration Designer](/windows/configuration/provisioning-packages/provisioning-install-icd). - [UEFI firmware](/windows-hardware/design/device-experiences/oem-uefi).