diff --git a/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md b/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md index 86e37ab672..7436d5fb34 100644 --- a/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md +++ b/windows/deployment/deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md @@ -17,7 +17,6 @@ ms.topic: article # Prepare for Zero Touch Installation of Windows 10 with Configuration Manager - **Applies to** - Windows 10 @@ -40,26 +39,27 @@ In this topic, you will use an existing Configuration Manager server structure t - A Configuration Manager console folder structure for packages has been created. - Microsoft Endpoint Configuration Manager and any additional Windows 10 prerequisites are installed. -For the purposes of this topic, we will use two machines: DC01 and CM01. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. DC01 and CM01 are both members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md). +For the purposes of this guide, we will use three server computers: DC01, CM01 and HV01. +- DC01 is a domain controller for the contoso.com domain. +- CM01 is a domain member server and is configured as a Configuration Manager standalone primary site server. +- HV01 is a Hyper-V host computer that is used to build a Windows 10 reference image. This computer does not need to be a domain member. + +All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used. + +All server and client computers referenced in this guide are on the same subnet. This is not required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates. ## Create the Configuration Manager service accounts To configure permissions for the various service accounts needed for operating system deployment in Configuration Manager, you use a role-based model. To create the Configuration Manager Join Domain account as well as the Configuration Manager Network Access account, follow these steps: 1. On DC01, using Active Directory User and Computers, browse to **contoso.com / Contoso / Service Accounts**. - 2. Select the Service Accounts OU and create the CM\_JD account using the following settings: * Name: CM\_JD - * User logon name: CM\_JD - * Password: P@ssw0rd - * User must change password at next logon: Clear - * User cannot change password: Select - * Password never expires: Select 3. Repeat the step, but for the CM\_NAA account. @@ -67,20 +67,18 @@ To configure permissions for the various service accounts needed for operating s 4. After creating the accounts, assign the following descriptions: * CM\_JD: Configuration Manager Join Domain Account - * CM\_NAA: Configuration Manager Network Access Account ![figure 6](../images/mdt-06-fig06.png) -Figure 6. The Configuration Manager service accounts used for operating system deployment. +The Configuration Manager service accounts used for operating system deployment. -## Configure Active Directory permissions +## Configure Active Directory permissions In order for the Configuration Manager Join Domain Account (CM\_JD) to join machines into the contoso.com domain you need to configure permissions in Active Directory. These steps assume you have downloaded the sample [Set-OUPermissions.ps1 script](https://go.microsoft.com/fwlink/p/?LinkId=619362) and copied it to C:\\Setup\\Scripts on DC01. 1. On DC01, log on as Administrator in the CONTOSO domain using the password P@ssw0rd. - 2. In an elevated Windows PowerShell prompt (run as Administrator), run the following commands, pressing **Enter** after each command: ``` @@ -95,31 +93,19 @@ In order for the Configuration Manager Join Domain Account (CM\_JD) to join mach 3. The Set-OUPermissions.ps1 script allows the CM\_JD user account permissions to manage computer accounts in the Contoso / Computers / Workstations OU. The following is a list of the permissions being granted: * Scope: This object and all descendant objects - * Create Computer objects - * Delete Computer objects - * Scope: Descendant Computer objects - * Read All Properties - * Write All Properties - * Read Permissions - * Modify Permissions - * Change Password - * Reset Password - * Validated write to DNS host name - * Validated write to service principal name -## Review the Sources folder structure - +## Review the Sources folder structure To support the packages you create in this section, the following folder structure should be created on the Configuration Manager primary site server (CM01): @@ -127,124 +113,97 @@ To support the packages you create in this section, the following folder structu >In most production environments, the packages are stored on a Distributed File System (DFS) share or a "normal" server share, but in a lab environment you can store them on the site server. - E:\\Sources - - E:\\Sources\\OSD - - E:\\Sources\\OSD\\Boot - - E:\\Sources\\OSD\\DriverPackages - - E:\\Sources\\OSD\\DriverSources - - E:\\Sources\\OSD\\MDT - - E:\\Sources\\OSD\\OS - - E:\\Sources\\OSD\\Settings - - E:\\Sources\\Software - - E:\\Sources\\Software\\Adobe - - E:\\Sources\\Software\\Microsoft ![figure 7](../images/mdt-06-fig07.png) -Figure 7. The E:\\Sources\\OSD folder structure. - -## Integrate Configuration Manager with MDT +The E:\\Sources\\OSD folder structure. +## Integrate Configuration Manager with MDT To extend the Configuration Manager console with MDT wizards and templates, you install MDT in the default location and run the integration setup. In these steps, we assume you have downloaded MDT to the C:\\Setup\\MDT2013 folder on CM01. 1. On CM01, log on as Administrator in the CONTOSO domain using the password P@ssw0rd. - 2. Make sure the Configuration Manager Console is closed before continuing. - 3. Using File Explorer, navigate to the **C:\\Setup\\MDT** folder. - 4. Run the MDT setup (MicrosoftDeploymentToolkit2013\_x64.msi), and use the default options in the setup wizard. - 5. From the Start screen, run Configure ConfigManager Integration with the following settings: * Site Server Name: CM01.contoso.com - * Site code: PS1 ![figure 8](../images/mdt-06-fig08.png) -Figure 8. Set up the MDT integration with Configuration Manager. +Set up the MDT integration with Configuration Manager. -## Configure the client settings +## Configure the client settings Most organizations want to display their name during deployment. In this section, you configure the default Configuration Manager client settings with the Contoso organization name. 1. On CM01, using the Configuration Manager Console, in the Administration workspace, select **Client Settings**. - 2. In the right pane, right-click **Default Client Settings**, and select **Properties**. - 3. In the **Computer Agent** node, in the **Organization name displayed in Software Center** text box, type in **Contoso** and click **OK**. ![figure 9](../images/mdt-06-fig10.png) -Figure 9. Configure the organization name in client settings. +Configure the organization name in client settings. ![figure 10](../images/fig10-contosoinstall.png) -Figure 10. The Contoso organization name displayed during deployment. +The Contoso organization name displayed during deployment. -## Configure the Network Access account +## Configure the Network Access account Configuration Manager uses the Network Access account during the Windows 10 deployment process to access content on the distribution point(s). In this section, you configure the Network Access account. 1. Using the Configuration Manager Console, in the Administration workspace, expand **Site Configuration** and select **Sites**. - 2. Right-click **PS1 - Primary Site 1**, select **Configure Site Components**, and then select **Software Distribution**. - 3. In the **Network Access Account** tab, configure the **CONTOSO\\CM\_NAA** user account (select New Account) as the Network Access account. Use the new **Verify** option to verify that the account can connect to the **\\\\DC01\\sysvol** network share. ![figure 11](../images/mdt-06-fig12.png) -Figure 11. Test the connection for the Network Access account. - -## Enable PXE on the CM01 distribution point +Test the connection for the Network Access account. +## Enable PXE on the CM01 distribution point Configuration Manager has many options for starting a deployment, but starting via PXE is certainly the most flexible in a large environment. In this section, you enable PXE on the CM01 distribution point. 1. In the Configuration Manager Console, in the Administration workspace, select **Distribution Points**. - 2. Right-click the **\\\\CM01.CONTOSO.COM distribution point** and select **Properties**. - 3. In the **PXE** tab, select the following settings: * Enable PXE support for clients - * Allow this distribution point to respond to incoming PXE requests - * Enable unknown computer support - * Require a password when computers use PXE - * Password and Confirm password: Passw0rd! ![figure 12](../images/mdt-06-fig13.png) - Figure 12. Configure the CM01 distribution point for PXE. + Configure the CM01 distribution point for PXE. 4. Using the Configuration Manager Trace Log Tool, review the E:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file. Look for ConfigurePXE and CcmInstallPXE lines. ![figure 13](../images/mdt-06-fig14.png) - Figure 13. The distmgr.log displays a successful configuration of PXE on the distribution point. + The distmgr.log displays a successful configuration of PXE on the distribution point. 5. Verify that you have seven files in each of the folders **E:\\RemoteInstall\\SMSBoot\\x86** and **E:\\RemoteInstall\\SMSBoot\\x64**. ![figure 14](../images/mdt-06-fig15.png) - Figure 14. The contents of the E:\\RemoteInstall\\SMSBoot\\x64 folder after you enable PXE. + The contents of the E:\\RemoteInstall\\SMSBoot\\x64 folder after you enable PXE. ## Components of Configuration Manager operating system deployment