mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-17 11:23:45 +00:00
draft
This commit is contained in:
@ -40,7 +40,7 @@ Visit the [Download and install the Windows ADK](https://go.microsoft.com/fwlink
|
|||||||
- [The Windows PE add-on for the ADK](https://go.microsoft.com/fwlink/?linkid=2087112)
|
- [The Windows PE add-on for the ADK](https://go.microsoft.com/fwlink/?linkid=2087112)
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
>You might need to temporarily disable IE Enhanced Security Configuration for administrators in order to download files from the Internet to the server.
|
>You might need to temporarily disable IE Enhanced Security Configuration for administrators in order to download files from the Internet to the server. This setting can be disabled by using Server Manager (Local Server/Properties).
|
||||||
|
|
||||||
1. On MDT01, sign in as an administrator in the CONTOSO domain.
|
1. On MDT01, sign in as an administrator in the CONTOSO domain.
|
||||||
- For the purposes of this guide, we are using a Domain Admin account of **admin** with a password of <b>pass@word3</b>. You can use your own administrator username and password as long as you properly adjust all steps in this guide that use login these credentials.
|
- For the purposes of this guide, we are using a Domain Admin account of **admin** with a password of <b>pass@word3</b>. You can use your own administrator username and password as long as you properly adjust all steps in this guide that use login these credentials.
|
||||||
|
@ -22,7 +22,7 @@ ms.topic: article
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
A computer replace scenario for Windows 10 is quite similar to a computer refresh for Windows 10; however, because you are replacing a machine, you cannot store the backup on the old computer. Instead you need to store the backup to a location where the new computer can read it.
|
A computer replace scenario for Windows 10 is quite similar to a computer refresh for Windows 10; however, because you are replacing a machine, you cannot store the backup on the old computer. Instead you need to store the backup to a location where the new computer can read it.
|
||||||
For the purposes of this topic, we will use four machines: DC01, MDT01, PC0002, and PC0007. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard server. PC0002 is an old machine running Windows 7 SP1. It is going to be replaced by a new Windows 10 machine, PC0007. User State Migration Tool (USMT) will be used to backup and restore data and settings. MDT01, PC0002, and PC0007 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
For the purposes of this topic, we will use four machines: DC01, MDT01, PC0002, and PC0007. DC01 is a domain controller and MDT01 is a Windows Server 2012 R2 standard server. PC0002 is an old machine running Windows 7 SP1. It is going to be replaced by a new Windows 10 machine, PC0007. User State Migration Tool (USMT) will be used to backup and restore data and settings. MDT01, PC0002, and PC0007 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -32,9 +32,9 @@ To configure your environment for BitLocker, you will need to do the following:
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Even though it is not a BitLocker requirement, we recommend configuring BitLocker to store the recovery key and TPM owner information in Active Directory. For additional information about these features, see [Backing Up BitLocker and TPM Recovery Information to AD DS](https://go.microsoft.com/fwlink/p/?LinkId=619548). If you have access to Microsoft BitLocker Administration and Monitoring (MBAM), which is part of Microsoft Desktop Optimization Pack (MDOP), you have additional management features for BitLocker.
|
>Even though it is not a BitLocker requirement, we recommend configuring BitLocker to store the recovery key and TPM owner information in Active Directory. For additional information about these features, see [Backing Up BitLocker and TPM Recovery Information to AD DS](https://go.microsoft.com/fwlink/p/?LinkId=619548). If you have access to Microsoft BitLocker Administration and Monitoring (MBAM), which is part of Microsoft Desktop Optimization Pack (MDOP), you have additional management features for BitLocker.
|
||||||
|
|
||||||
For the purposes of this topic, we will use DC01, a domain controller that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
For the purposes of this topic, we will use DC01, a domain controller that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
||||||
|
|
||||||
## <a href="" id="sec01"></a>Configure Active Directory for BitLocker
|
## Configure Active Directory for BitLocker
|
||||||
|
|
||||||
To enable BitLocker to store the recovery key and TPM information in Active Directory, you need to create a Group Policy for it in Active Directory. For this section, we are running Windows Server 2012 R2, so you do not need to extend the Schema. You do, however, need to set the appropriate permissions in Active Directory.
|
To enable BitLocker to store the recovery key and TPM information in Active Directory, you need to create a Group Policy for it in Active Directory. For this section, we are running Windows Server 2012 R2, so you do not need to extend the Schema. You do, however, need to set the appropriate permissions in Active Directory.
|
||||||
|
|
||||||
@ -45,7 +45,7 @@ In Windows Server 2012 R2 (as well as in Windows Server 2008 R2 and Windows Serv
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Figure 2. The BitLocker Recovery information on a computer object in the contoso.com domain.
|
The BitLocker Recovery information on a computer object in the contoso.com domain.
|
||||||
|
|
||||||
### Add the BitLocker Drive Encryption Administration Utilities
|
### Add the BitLocker Drive Encryption Administration Utilities
|
||||||
|
|
||||||
@ -64,7 +64,7 @@ The BitLocker Drive Encryption Administration Utilities are added as features vi
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Figure 3. Selecting the BitLocker Drive Encryption Administration Utilities.
|
Selecting the BitLocker Drive Encryption Administration Utilities.
|
||||||
|
|
||||||
### Create the BitLocker Group Policy
|
### Create the BitLocker Group Policy
|
||||||
|
|
||||||
@ -97,7 +97,7 @@ In addition to the Group Policy created previously, you need to configure permis
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Figure 4. Running the Add-TPMSelfWriteACE.vbs script on DC01.
|
Running the Add-TPMSelfWriteACE.vbs script on DC01.
|
||||||
|
|
||||||
## <a href="" id="sec02"></a>Add BIOS configuration tools from Dell, HP, and Lenovo
|
## <a href="" id="sec02"></a>Add BIOS configuration tools from Dell, HP, and Lenovo
|
||||||
|
|
||||||
@ -135,7 +135,7 @@ The Lenovo tools are a set of VBScripts available as part of the Lenovo BIOS Set
|
|||||||
``` syntax
|
``` syntax
|
||||||
cscript.exe SetConfig.vbs SecurityChip Active
|
cscript.exe SetConfig.vbs SecurityChip Active
|
||||||
```
|
```
|
||||||
## <a href="" id="sec03"></a>Configure the Windows 10 task sequence to enable BitLocker
|
## Configure the Windows 10 task sequence to enable BitLocker
|
||||||
|
|
||||||
When configuring a task sequence to run any BitLocker tool, either directly or using a custom script, it is helpful if you also add some logic to detect whether the BIOS is already configured on the machine. In the following task sequence, we are using a sample script (ZTICheckforTPM.wsf) from the Deployment Guys web page to check the status on the TPM chip. You can download this script from the Deployment Guys Blog post, [Check to see if the TPM is enabled](https://go.microsoft.com/fwlink/p/?LinkId=619549).
|
When configuring a task sequence to run any BitLocker tool, either directly or using a custom script, it is helpful if you also add some logic to detect whether the BIOS is already configured on the machine. In the following task sequence, we are using a sample script (ZTICheckforTPM.wsf) from the Deployment Guys web page to check the status on the TPM chip. You can download this script from the Deployment Guys Blog post, [Check to see if the TPM is enabled](https://go.microsoft.com/fwlink/p/?LinkId=619549).
|
||||||
|
|
||||||
@ -151,16 +151,10 @@ In the following task sequence, we added five actions:
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)<br>
|
||||||
|
[Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)<br>
|
||||||
[Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)<br>
|
||||||
|
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)<br>
|
||||||
[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)<br>
|
||||||
|
[Use web services in MDT](use-web-services-in-mdt.md)<br>
|
||||||
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
|
||||||
|
|
||||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
|
||||||
|
|
||||||
[Use web services in MDT](use-web-services-in-mdt.md)
|
|
||||||
|
|
||||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||||
|
Reference in New Issue
Block a user