mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
Deploy root code block standardization plus style updates FINAL
This commit is contained in:
parent
88a8bf9614
commit
dfdf916b8b
@ -3,7 +3,7 @@ title: Windows Autopilot EULA dismissal – important information
|
||||
description: A notice about EULA dismissal through Windows Autopilot
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/31/2022
|
||||
ms.date: 11/23/2022
|
||||
author: frankroj
|
||||
ms.author: frankroj
|
||||
manager: aaroncz
|
||||
@ -13,8 +13,8 @@ ms.technology: itpro-deploy
|
||||
---
|
||||
# Windows Autopilot EULA dismissal – important information
|
||||
|
||||
>[!IMPORTANT]
|
||||
>The information below isn't the EULA. It is a notice of awareness to the administrator that's configuring to skip End User License Agreement (EULA) during the OOBE (Out-of-Box Experience).
|
||||
> [!IMPORTANT]
|
||||
> The information below isn't the EULA. It is a notice of awareness to the administrator that's configuring to skip End User License Agreement (EULA) during the OOBE (Out-of-Box Experience).
|
||||
|
||||
Using this tool allows you to configure individual installations of Windows on devices managed by your organization. You may choose to suppress or hide certain set-up screens that are normally presented to users when setting up Windows, including the EULA acceptance screen.
|
||||
|
||||
|
@ -10,8 +10,8 @@ ms.localizationpriority: medium
|
||||
ms.topic: how-to
|
||||
ms.collection: highpri
|
||||
appliesto:
|
||||
- Windows 10
|
||||
- Windows 11
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
ms.date: 11/23/2022
|
||||
---
|
||||
|
||||
|
@ -6,7 +6,7 @@ manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
author: frankroj
|
||||
ms.date: 11/01/2022
|
||||
ms.date: 11/23/2022
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
@ -136,6 +136,9 @@ The default `MigUser.xml` file migrates the following data:
|
||||
> [!NOTE]
|
||||
> The asterisk (`*`) stands for zero or more characters.
|
||||
|
||||
> [!NOTE]
|
||||
> The OpenDocument extensions (`*.odt`, `*.odp`, `*.ods`) that Microsoft Office applications can use aren't migrated by default.
|
||||
|
||||
The default `MigUser.xml` file doesn't migrate the following data:
|
||||
|
||||
- Files tagged with both the **Hidden** and **System** attributes.
|
||||
|
@ -6,7 +6,7 @@ manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
author: frankroj
|
||||
ms.date: 11/01/2022
|
||||
ms.date: 11/23/2022
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
@ -78,6 +78,9 @@ This section describes the user data that USMT migrates by default, using the `M
|
||||
> [!NOTE]
|
||||
> The asterisk (`*`) stands for zero or more characters.
|
||||
|
||||
> [!NOTE]
|
||||
> The OpenDocument extensions (`*.odt`, `*.odp`, `*.ods`) that Microsoft Office applications can use aren't migrated by default.
|
||||
|
||||
- **Access control lists.** USMT migrates access control lists (ACLs) for specified files and folders from computers running both Windows® XP and Windows Vista. For example, if you migrate a file named `File1.txt` that is **read-only** for **User1** and **read/write** for **User2**, these settings will still apply on the destination computer after the migration.
|
||||
|
||||
> [!IMPORTANT]
|
||||
|
@ -9,16 +9,16 @@ manager: aaroncz
|
||||
ms.author: frankroj
|
||||
author: frankroj
|
||||
ms.topic: tutorial
|
||||
ms.date: 10/31/2022
|
||||
ms.date: 11/23/2022
|
||||
---
|
||||
|
||||
# Deploy Windows 10 in a test lab using Configuration Manager
|
||||
|
||||
*Applies to*
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
|
||||
> [!Important]
|
||||
> [!IMPORTANT]
|
||||
> This guide uses the proof of concept (PoC) environment, and some settings that are configured in the following guides:
|
||||
>
|
||||
> - [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md)
|
||||
@ -59,7 +59,7 @@ The procedures in this guide are summarized in the following table. An estimate
|
||||
|
||||
## Install prerequisites
|
||||
|
||||
1. Before installing Microsoft Configuration Manager, we must install prerequisite services and features. Type the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
1. Before installing Microsoft Configuration Manager, we must install prerequisite services and features. Enter the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```powershell
|
||||
Install-WindowsFeature Web-Windows-Auth,Web-ISAPI-Ext,Web-Metabase,Web-WMI,BITS,RDC,NET-Framework-Features,Web-Asp-Net,Web-Asp-Net45,NET-HTTP-Activation,NET-Non-HTTP-Activ
|
||||
@ -69,7 +69,7 @@ The procedures in this guide are summarized in the following table. An estimate
|
||||
> If the request to add features fails, retry the installation by typing the command again.
|
||||
|
||||
2. Download [SQL Server 2014 SP2](https://www.microsoft.com/evalcenter/evaluate-sql-server-2014-sp2) from the Microsoft Evaluation Center as an .ISO file on the Hyper-V host computer. Save the file to the **C:\VHD** directory.
|
||||
3. When you've downloaded the file **SQLServer2014SP2-FullSlipstream-x64-ENU.iso** and placed it in the C:\VHD directory, type the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
3. When you've downloaded the file **SQLServer2014SP2-FullSlipstream-x64-ENU.iso** and placed it in the C:\VHD directory, enter the following command at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
|
||||
```powershell
|
||||
Set-VMDvdDrive -VMName SRV1 -Path c:\VHD\SQLServer2014SP2-FullSlipstream-x64-ENU.iso
|
||||
@ -77,7 +77,7 @@ The procedures in this guide are summarized in the following table. An estimate
|
||||
|
||||
This command mounts the .ISO file to drive D on SRV1.
|
||||
|
||||
4. Type the following command at an elevated Windows PowerShell prompt on SRV1 to install SQL Server:
|
||||
4. Enter the following command at an elevated Windows PowerShell prompt on SRV1 to install SQL Server:
|
||||
|
||||
```cmd
|
||||
D:\setup.exe /q /ACTION=Install /ERRORREPORTING="False" /FEATURES=SQLENGINE,RS,IS,SSMS,TOOLS,ADV_SSMS,CONN /INSTANCENAME=MSSQLSERVER /INSTANCEDIR="C:\Program Files\Microsoft SQL Server" /SQLSVCACCOUNT="NT AUTHORITY\System" /SQLSYSADMINACCOUNTS="BUILTIN\ADMINISTRATORS" /SQLSVCSTARTUPTYPE=Automatic /AGTSVCACCOUNT="NT AUTHORITY\SYSTEM" /AGTSVCSTARTUPTYPE=Automatic /RSSVCACCOUNT="NT AUTHORITY\System" /RSSVCSTARTUPTYPE=Automatic /ISSVCACCOUNT="NT AUTHORITY\System" /ISSVCSTARTUPTYPE=Disabled /ASCOLLATION="Latin1_General_CI_AS" /SQLCOLLATION="SQL_Latin1_General_CP1_CI_AS" /TCPENABLED="1" /NPENABLED="1" /IAcceptSQLServerLicenseTerms
|
||||
@ -101,7 +101,7 @@ The procedures in this guide are summarized in the following table. An estimate
|
||||
You should restart your computer to complete this process.
|
||||
```
|
||||
|
||||
5. Type the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||
5. Enter the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```powershell
|
||||
New-NetFirewallRule -DisplayName "SQL Server" -Direction Inbound -Protocol TCP -LocalPort 1433 -Action allow
|
||||
@ -123,11 +123,11 @@ The procedures in this guide are summarized in the following table. An estimate
|
||||
Stop-Process -Name Explorer
|
||||
```
|
||||
|
||||
1. Download [Microsoft Configuration Manager (current branch)](https://www.microsoft.com/evalcenter/evaluate-microsoft-endpoint-configuration-manager) and extract the contents on SRV1.
|
||||
2. Download [Microsoft Configuration Manager (current branch)](https://www.microsoft.com/evalcenter/evaluate-microsoft-endpoint-configuration-manager) and extract the contents on SRV1.
|
||||
|
||||
1. Open the file, enter **C:\configmgr** for **Unzip to folder**, and select **Unzip**. The `C:\configmgr` directory will be automatically created. Select **OK** and then close the **WinZip Self-Extractor** dialog box when finished.
|
||||
3. Open the file, enter **C:\configmgr** for **Unzip to folder**, and select **Unzip**. The `C:\configmgr` directory will be automatically created. Select **OK** and then close the **WinZip Self-Extractor** dialog box when finished.
|
||||
|
||||
1. Before starting the installation, verify that WMI is working on SRV1. See the following examples. Verify that **Running** is displayed under **Status** and **True** is displayed next to **TcpTestSucceeded**:
|
||||
4. Before starting the installation, verify that WMI is working on SRV1. See the following examples. Verify that **Running** is displayed under **Status** and **True** is displayed next to **TcpTestSucceeded**:
|
||||
|
||||
```powershell
|
||||
Get-Service Winmgmt
|
||||
@ -156,36 +156,48 @@ The procedures in this guide are summarized in the following table. An estimate
|
||||
|
||||
If the WMI service isn't started, attempt to start it or reboot the computer. If WMI is running but errors are present, see [WMIDiag](https://blogs.technet.microsoft.com/askperf/2015/05/12/wmidiag-2-2-is-here/) for troubleshooting information.
|
||||
|
||||
1. To extend the Active Directory schema, type the following command at an elevated Windows PowerShell prompt:
|
||||
5. To extend the Active Directory schema, enter the following command at an elevated Windows PowerShell prompt:
|
||||
|
||||
```cmd
|
||||
C:\configmgr\SMSSETUP\BIN\X64\extadsch.exe
|
||||
```
|
||||
|
||||
1. Temporarily switch to the DC1 VM, and type the following command at an elevated command prompt on DC1:
|
||||
6. Temporarily switch to the DC1 VM, and enter the following command at an elevated command prompt on DC1:
|
||||
|
||||
```cmd
|
||||
adsiedit.msc
|
||||
```
|
||||
|
||||
1. Right-click **ADSI Edit**, select **Connect to**, select **Default (Domain or server that you logged in to)** under **Computer** and then select **OK**.
|
||||
1. Expand **Default naming context**>**DC=contoso,DC=com**, and then in the console tree right-click **CN=System**, point to **New**, and then select **Object**.
|
||||
1. Select **container** and then select **Next**.
|
||||
1. Next to **Value**, type **System Management**, select **Next**, and then select **Finish**.
|
||||
1. Right-click **CN=system Management** and then select **Properties**.
|
||||
1. On the **Security** tab, select **Add**, select **Object Types**, select **Computers**, and select **OK**.
|
||||
1. Under **Enter the object names to select**, type **SRV1** and select **OK**.
|
||||
1. The **SRV1** computer account will be highlighted, select **Allow** next to **Full control**.
|
||||
1. Select **Advanced**, select **SRV1 (CONTOSO\SRV1$)** and select **Edit**.
|
||||
1. Next to **Applies to**, choose **This object and all descendant objects**, and then select **OK** three times.
|
||||
1. Close the ADSI Edit console and switch back to SRV1.
|
||||
1. To start Configuration Manager installation, type the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
7. Right-click **ADSI Edit**, select **Connect to**, select **Default (Domain or server that you logged in to)** under **Computer** and then select **OK**.
|
||||
|
||||
8. Expand **Default naming context**>**DC=contoso,DC=com**, and then in the console tree right-click **CN=System**, point to **New**, and then select **Object**.
|
||||
|
||||
9. Select **container** and then select **Next**.
|
||||
|
||||
10. Next to **Value**, enter **System Management**, select **Next**, and then select **Finish**.
|
||||
|
||||
11. Right-click **CN=system Management** and then select **Properties**.
|
||||
|
||||
12. On the **Security** tab, select **Add**, select **Object Types**, select **Computers**, and select **OK**.
|
||||
|
||||
13. Under **Enter the object names to select**, enter **SRV1** and select **OK**.
|
||||
|
||||
14. The **SRV1** computer account will be highlighted, select **Allow** next to **Full control**.
|
||||
|
||||
15. Select **Advanced**, select **SRV1 (CONTOSO\SRV1$)** and select **Edit**.
|
||||
|
||||
16. Next to **Applies to**, choose **This object and all descendant objects**, and then select **OK** three times.
|
||||
|
||||
17. Close the ADSI Edit console and switch back to SRV1.
|
||||
|
||||
18. To start Configuration Manager installation, enter the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```cmd
|
||||
C:\configmgr\SMSSETUP\BIN\X64\Setup.exe
|
||||
```
|
||||
|
||||
1. Provide the following information in the Configuration Manager Setup Wizard:
|
||||
19. Provide the following information in the Configuration Manager Setup Wizard:
|
||||
|
||||
- **Before You Begin**: Read the text and select *Next*.
|
||||
- **Getting Started**: Choose **Install a Configuration Manager primary site** and select the **Use typical installation options for a stand-alone primary site** checkbox.
|
||||
- Select **Yes** in response to the popup window.
|
||||
@ -205,7 +217,7 @@ The procedures in this guide are summarized in the following table. An estimate
|
||||
|
||||
Depending on the speed of the Hyper-V host and resources allocated to SRV1, installation can require approximately one hour. Select **Close** when installation is complete.
|
||||
|
||||
1. If desired, re-enable IE Enhanced Security Configuration at this time on SRV1:
|
||||
20. If desired, re-enable IE Enhanced Security Configuration at this time on SRV1:
|
||||
|
||||
```powershell
|
||||
Set-ItemProperty -Path $AdminKey -Name "IsInstalled" -Value 1
|
||||
@ -216,24 +228,30 @@ The procedures in this guide are summarized in the following table. An estimate
|
||||
|
||||
> [!IMPORTANT]
|
||||
> This step requires an MSDN subscription or volume licence agreement. For more information, see [Ready for Windows 10: MDOP 2015 and more tools are now available](https://blogs.technet.microsoft.com/windowsitpro/2015/08/17/ready-for-windows-10-mdop-2015-and-more-tools-are-now-available/).
|
||||
<!--
|
||||
|
||||
THE LINK REFERENCED IN THE BELOW URL IS DEAD SO COMMENTING OUT
|
||||
|
||||
> If your organization qualifies and does not already have an MSDN subscription, you can obtain a [free MSDN subscription with BizSpark](/archive/blogs/zainnab/bizspark-free-msdn-subscription-for-start-up-companies/).
|
||||
-->
|
||||
|
||||
1. Download the [Microsoft Desktop Optimization Pack 2015](https://msdn.microsoft.com/subscriptions/downloads/#ProductFamilyId=597) to the Hyper-V host using an MSDN subscription. Download the .ISO file (mu_microsoft_desktop_optimization_pack_2015_x86_x64_dvd_5975282.iso, 2.79 GB) to the C:\VHD directory on the Hyper-V host.
|
||||
|
||||
2. Type the following command at an elevated Windows PowerShell prompt on the Hyper-V host to mount the MDOP file on SRV1:
|
||||
2. Enter the following command at an elevated Windows PowerShell prompt on the Hyper-V host to mount the MDOP file on SRV1:
|
||||
|
||||
```powershell
|
||||
Set-VMDvdDrive -VMName SRV1 -Path c:\VHD\mu_microsoft_desktop_optimization_pack_2015_x86_x64_dvd_5975282.iso
|
||||
```
|
||||
|
||||
3. Type the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
3. Enter the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```cmd
|
||||
D:\DaRT\DaRT 10\Installers\en-us\x64\MSDaRT100.msi
|
||||
```
|
||||
|
||||
4. Install DaRT 10 using default settings.
|
||||
5. Type the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
5. Enter the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```powershell
|
||||
Copy-Item "C:\Program Files\Microsoft DaRT\v10\Toolsx64.cab" -Destination "C:\Program Files\Microsoft Deployment Toolkit\Templates\Distribution\Tools\x64"
|
||||
@ -246,7 +264,7 @@ This section contains several procedures to support Zero Touch installation with
|
||||
|
||||
### Create a folder structure
|
||||
|
||||
1. Type the following commands at a Windows PowerShell prompt on SRV1:
|
||||
1. Enter the following commands at a Windows PowerShell prompt on SRV1:
|
||||
|
||||
```powershell
|
||||
New-Item -ItemType Directory -Path "C:\Sources\OSD\Boot"
|
||||
@ -261,56 +279,78 @@ This section contains several procedures to support Zero Touch installation with
|
||||
|
||||
### Enable MDT ConfigMgr integration
|
||||
|
||||
1. On SRV1, select **Start**, type `configmgr`, and then select **Configure ConfigMgr Integration**.
|
||||
2. Type `PS1` as the **Site code**, and then select **Next**.
|
||||
1. On SRV1, select **Start**, enter `configmgr`, and then select **Configure ConfigMgr Integration**.
|
||||
|
||||
2. Enter `PS1` as the **Site code**, and then select **Next**.
|
||||
|
||||
3. Verify **The process completed successfully** is displayed, and then select **Finish**.
|
||||
|
||||
### Configure client settings
|
||||
|
||||
1. On SRV1, select **Start**, type **configuration manager**, right-click **Configuration Manager Console**, and then select **Pin to Taskbar**.
|
||||
1. On SRV1, select **Start**, enter **configuration manager**, right-click **Configuration Manager Console**, and then select **Pin to Taskbar**.
|
||||
|
||||
2. Select **Desktop**, and then launch the Configuration Manager console from the taskbar.
|
||||
|
||||
3. If the console notifies you that an update is available, select **OK**. It isn't necessary to install updates to complete this lab.
|
||||
|
||||
4. In the console tree, open the **Administration** workspace (in the lower left corner) and select **Client Settings**.
|
||||
|
||||
5. In the display pane, double-click **Default Client Settings**.
|
||||
6. Select **Computer Agent**, next to **Organization name displayed in Software Center** type **Contoso**, and then select **OK**.
|
||||
|
||||
6. Select **Computer Agent**, next to **Organization name displayed in Software Center** enter **Contoso**, and then select **OK**.
|
||||
|
||||
### Configure the network access account
|
||||
|
||||
1. in the **Administration** workspace, expand **Site Configuration** and select **Sites**.
|
||||
|
||||
2. On the **Home** ribbon at the top of the console window, select **Configure Site Components** and then select **Software Distribution**.
|
||||
|
||||
3. On the **Network Access Account** tab, choose **Specify the account that accesses network locations**.
|
||||
|
||||
4. Select the yellow starburst and then select **New Account**.
|
||||
5. Select **Browse** and then under **Enter the object name to select**, type **CM_NAA** and select **OK**.
|
||||
6. Next to **Password** and **Confirm Password**, type **pass\@word1**, and then select **OK** twice.
|
||||
|
||||
5. Select **Browse** and then under **Enter the object name to select**, enter **CM_NAA** and select **OK**.
|
||||
|
||||
6. Next to **Password** and **Confirm Password**, enter **pass\@word1**, and then select **OK** twice.
|
||||
|
||||
### Configure a boundary group
|
||||
|
||||
1. in the **Administration** workspace, expand **Hierarchy Configuration**, right-click **Boundaries** and then select **Create Boundary**.
|
||||
2. Next to **Description**, type **PS1**, next to **Type** choose **Active Directory Site**, and then select **Browse**.
|
||||
|
||||
2. Next to **Description**, enter **PS1**, next to **Type** choose **Active Directory Site**, and then select **Browse**.
|
||||
|
||||
3. Choose **Default-First-Site-Name** and then select **OK** twice.
|
||||
|
||||
4. in the **Administration** workspace, right-click **Boundary Groups** and then select **Create Boundary Group**.
|
||||
5. Next to **Name**, type **PS1 Site Assignment and Content Location**, select **Add**, select the **Default-First-Site-Name** boundary and then select **OK**.
|
||||
|
||||
5. Next to **Name**, enter **PS1 Site Assignment and Content Location**, select **Add**, select the **Default-First-Site-Name** boundary and then select **OK**.
|
||||
|
||||
6. On the **References** tab in the **Create Boundary Group** window, select the **Use this boundary group for site assignment** checkbox.
|
||||
|
||||
7. Select **Add**, select the **\\\SRV1.contoso.com** checkbox, and then select **OK** twice.
|
||||
|
||||
### Add the state migration point role
|
||||
|
||||
1. in the **Administration** workspace, expand **Site Configuration**, select **Sites**, and then in on the **Home** ribbon at the top of the console select **Add Site System Roles**.
|
||||
|
||||
2. In the Add site System Roles Wizard, select **Next** twice and then on the Specify roles for this server page, select the **State migration point** checkbox.
|
||||
3. Select **Next**, select the yellow starburst, type **C:\MigData** for the **Storage folder**, and select **OK**.
|
||||
|
||||
3. Select **Next**, select the yellow starburst, enter **C:\MigData** for the **Storage folder**, and select **OK**.
|
||||
|
||||
4. Select **Next**, and then verify under **Boundary groups** that **PS1 Site Assignment and Content Location** is displayed.
|
||||
|
||||
5. Select **Next** twice and then select **Close**.
|
||||
|
||||
### Enable PXE on the distribution point
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Before enabling PXE in Configuration Manager, ensure that any previous installation of WDS does not cause conflicts. Configuration Manager will automatically configure the WDS service to manage PXE requests. To disable a previous installation, if it exists, type the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||
> Before enabling PXE in Configuration Manager, ensure that any previous installation of WDS does not cause conflicts. Configuration Manager will automatically configure the WDS service to manage PXE requests. To disable a previous installation, if it exists, enter the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```cmd
|
||||
WDSUTIL.exe /Set-Server /AnswerClients:None
|
||||
```
|
||||
|
||||
1. Determine the MAC address of the internal network adapter on SRV1. Type the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
1. Determine the MAC address of the internal network adapter on SRV1. Enter the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```powershell
|
||||
(Get-NetAdapter "Ethernet").MacAddress
|
||||
@ -320,8 +360,11 @@ WDSUTIL.exe /Set-Server /AnswerClients:None
|
||||
> If the internal network adapter, assigned an IP address of 192.168.0.2, isn't named "Ethernet" then replace the name "Ethernet" in the previous command with the name of this network adapter. You can review the names of network adapters and the IP addresses assigned to them by typing **ipconfig**.
|
||||
|
||||
2. In the Configuration Manager console, in the **Administration** workspace, select **Distribution Points**.
|
||||
|
||||
3. In the display pane, right-click **SRV1.CONTOSO.COM** and then select **Properties**.
|
||||
|
||||
4. On the PXE tab, select the following settings:
|
||||
|
||||
- **Enable PXE support for clients**. Select **Yes** in the popup that appears.
|
||||
- **Allow this distribution point to respond to incoming PXE requests**
|
||||
- **Enable unknown computer support**. Select **OK** in the popup that appears.
|
||||
@ -333,7 +376,8 @@ WDSUTIL.exe /Set-Server /AnswerClients:None
|
||||

|
||||
|
||||
5. Select **OK**.
|
||||
6. Wait for a minute, then type the following command at an elevated Windows PowerShell prompt on SRV1, and verify that the files displayed are present:
|
||||
|
||||
6. Wait for a minute, then enter the following command at an elevated Windows PowerShell prompt on SRV1, and verify that the files displayed are present:
|
||||
|
||||
```cmd
|
||||
dir /b C:\RemoteInstall\SMSBoot\x64
|
||||
@ -348,9 +392,9 @@ WDSUTIL.exe /Set-Server /AnswerClients:None
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> If these files aren't present in the C:\RemoteInstall directory, verify that the REMINST share is configured as C:\RemoteInstall. You can view the properties of this share by typing `net share REMINST` at a command prompt. If the share path is set to a different value, then replace C:\RemoteInstall with your REMINST share path.
|
||||
> If these files aren't present in the C:\RemoteInstall directory, verify that the REMINST share is configured as C:\RemoteInstall. You can view the properties of this share by typing `net.exe share REMINST` at a command prompt. If the share path is set to a different value, then replace C:\RemoteInstall with your REMINST share path.
|
||||
>
|
||||
> You can also type the following command at an elevated Windows PowerShell prompt to open the CMTrace. In the tool, select **File**, select **Open**, and then open the **distmgr.log** file. If errors are present, they will be highlighted in red:
|
||||
> You can also enter the following command at an elevated Windows PowerShell prompt to open CMTrace. In the tool, select **File**, select **Open**, and then open the **distmgr.log** file. If errors are present, they will be highlighted in red:
|
||||
>
|
||||
> ```cmd
|
||||
> "C:\Program Files\Microsoft Configuration Manager\tools\cmtrace.exe"
|
||||
@ -365,7 +409,8 @@ WDSUTIL.exe /Set-Server /AnswerClients:None
|
||||
### Create a branding image file
|
||||
|
||||
1. If you have a bitmap (.BMP) image for suitable use as a branding image, copy it to the C:\Sources\OSD\Branding folder on SRV1. Otherwise, use the following step to copy a branding image.
|
||||
2. Type the following command at an elevated Windows PowerShell prompt:
|
||||
|
||||
2. Enter the following command at an elevated Windows PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
Copy-Item -Path "C:\ProgramData\Microsoft\User Account Pictures\user.bmp" -Destination "C:\Sources\OSD\Branding\contoso.bmp"
|
||||
@ -377,16 +422,26 @@ WDSUTIL.exe /Set-Server /AnswerClients:None
|
||||
### Create a boot image for Configuration Manager
|
||||
|
||||
1. In the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Boot Images**, and then select **Create Boot Image using MDT**.
|
||||
2. On the Package Source page, under **Package source folder to be created (UNC Path):**, type **\\\SRV1\Sources$\OSD\Boot\Zero Touch WinPE x64**, and then select **Next**.
|
||||
|
||||
2. On the Package Source page, under **Package source folder to be created (UNC Path):**, enter **\\\SRV1\Sources$\OSD\Boot\Zero Touch WinPE x64**, and then select **Next**.
|
||||
|
||||
- The Zero Touch WinPE x64 folder doesn't yet exist. The folder will be created later.
|
||||
3. On the General Settings page, type **Zero Touch WinPE x64** next to **Name**, and select **Next**.
|
||||
|
||||
3. On the General Settings page, enter **Zero Touch WinPE x64** next to **Name**, and select **Next**.
|
||||
|
||||
4. On the Options page, under **Platform** choose **x64**, and select **Next**.
|
||||
|
||||
5. On the Components page, in addition to the default selection of **Microsoft Data Access Components (MDAC/ADO) support**, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** checkbox, and select **Next**.
|
||||
6. On the Customization page, select the **Use a custom background bitmap file** checkbox, and under **UNC path**, type or browse to **\\\SRV1\Sources$\OSD\Branding\contoso.bmp**, and then select **Next** twice. It will take a few minutes to generate the boot image.
|
||||
|
||||
6. On the Customization page, select the **Use a custom background bitmap file** checkbox, and under **UNC path**, enter or browse to **\\\SRV1\Sources$\OSD\Branding\contoso.bmp**, and then select **Next** twice. It will take a few minutes to generate the boot image.
|
||||
|
||||
7. Select **Finish**.
|
||||
|
||||
8. In the console display pane, right-click the **Zero Touch WinPE x64** boot image, and then select **Distribute Content**.
|
||||
|
||||
9. In the Distribute Content Wizard, select **Next**, select **Add** and select **Distribution Point**, select the **SRV1.CONTOSO.COM** checkbox, select **OK**, select **Next** twice, and then select **Close**.
|
||||
10. Use the CMTrace application to view the **distmgr.log** file again and verify that the boot image has been distributed. To open CMTrace, type the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
10. Use the CMTrace application to view the **distmgr.log** file again and verify that the boot image has been distributed. To open CMTrace, enter the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```powershell
|
||||
Invoke-Item 'C:\Program Files\Microsoft Configuration Manager\tools\cmtrace.exe'
|
||||
@ -399,8 +454,11 @@ WDSUTIL.exe /Set-Server /AnswerClients:None
|
||||
```
|
||||
|
||||
11. You can also review status by clicking the **Zero Touch WinPE x64** image, and then clicking **Content Status** under **Related Objects** in the bottom right-hand corner of the console, or by entering **\Monitoring\Overview\Distribution Status\Content Status** on the location bar in the console. Double-click **Zero Touch WinPE x64** under **Content Status** in the console tree and verify that a status of **Successfully distributed content** is displayed on the **Success** tab.
|
||||
|
||||
12. Next, in the **Software Library** workspace, double-click **Zero Touch WinPE x64** and then select the **Data Source** tab.
|
||||
|
||||
13. Select the **Deploy this boot image from the PXE-enabled distribution point** checkbox, and select **OK**.
|
||||
|
||||
14. Review the distmgr.log file again for "**STATMSG: ID=2301**" and verify that there are three folders under **C:\RemoteInstall\SMSImages** with boot images. See the following example:
|
||||
|
||||
```cmd
|
||||
@ -421,19 +479,19 @@ WDSUTIL.exe /Set-Server /AnswerClients:None
|
||||
|
||||
If you've already completed steps in [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md) then you've already created a Windows 10 reference image. In this case, skip to the next procedure in this guide: [Add a Windows 10 OS image](#add-a-windows-10-os-image). If you've not yet created a Windows 10 reference image, complete the steps in this section.
|
||||
|
||||
1. In [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md) the Windows 10 Enterprise .iso file was saved to the c:\VHD directory as **c:\VHD\w10-enterprise.iso**. The first step in creating a deployment share is to mount this file on SRV1. To mount the Windows 10 Enterprise DVD on SRV1, open an elevated Windows PowerShell prompt on the Hyper-V host computer and type the following command:
|
||||
1. In [Step by step guide: Deploy Windows 10 in a test lab](windows-10-poc.md) the Windows 10 Enterprise .iso file was saved to the c:\VHD directory as **c:\VHD\w10-enterprise.iso**. The first step in creating a deployment share is to mount this file on SRV1. To mount the Windows 10 Enterprise DVD on SRV1, open an elevated Windows PowerShell prompt on the Hyper-V host computer and enter the following command:
|
||||
|
||||
```powershell
|
||||
Set-VMDvdDrive -VMName SRV1 -Path c:\VHD\w10-enterprise.iso
|
||||
```
|
||||
|
||||
1. Verify that the Windows Enterprise installation DVD is mounted on SRV1 as drive letter D.
|
||||
2. Verify that the Windows Enterprise installation DVD is mounted on SRV1 as drive letter D.
|
||||
|
||||
1. The Windows 10 Enterprise installation files will be used to create a deployment share on SRV1 using the MDT deployment workbench. To open the deployment workbench, select **Start**, type **deployment**, and then select **Deployment Workbench**.
|
||||
3. The Windows 10 Enterprise installation files will be used to create a deployment share on SRV1 using the MDT deployment workbench. To open the deployment workbench, select **Start**, enter **deployment**, and then select **Deployment Workbench**.
|
||||
|
||||
1. In the Deployment Workbench console, right-click **Deployment Shares** and select **New Deployment Share**.
|
||||
4. In the Deployment Workbench console, right-click **Deployment Shares** and select **New Deployment Share**.
|
||||
|
||||
1. Use the following settings for the New Deployment Share Wizard:
|
||||
5. Use the following settings for the New Deployment Share Wizard:
|
||||
- Deployment share path: **C:\MDTBuildLab**
|
||||
- Share name: **MDTBuildLab$**
|
||||
- Deployment share description: **MDT build lab**
|
||||
@ -442,22 +500,23 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
- Progress: settings will be applied
|
||||
- Confirmation: Select **Finish**
|
||||
|
||||
1. Expand the **Deployment Shares** node, and then expand **MDT build lab**.
|
||||
6. Expand the **Deployment Shares** node, and then expand **MDT build lab**.
|
||||
|
||||
1. Right-click the **Operating Systems** node, and then select **New Folder**. Name the new folder **Windows 10**. Complete the wizard using default values and select **Finish**.
|
||||
7. Right-click the **Operating Systems** node, and then select **New Folder**. Name the new folder **Windows 10**. Complete the wizard using default values and select **Finish**.
|
||||
|
||||
1. Right-click the **Windows 10** folder created in the previous step, and then select **Import Operating System**.
|
||||
8. Right-click the **Windows 10** folder created in the previous step, and then select **Import Operating System**.
|
||||
|
||||
1. Use the following settings for the Import Operating System Wizard:
|
||||
9. Use the following settings for the Import Operating System Wizard:
|
||||
- OS Type: **Full set of source files**
|
||||
- Source: **D:\\**
|
||||
- Destination: **W10Ent_x64**
|
||||
- Summary: Select **Next**
|
||||
- Confirmation: Select **Finish**
|
||||
|
||||
1. For purposes of this test lab, we won't add applications, such as Microsoft Office, to the deployment share. For more information about adding applications, see [Add applications](deploy-windows-mdt/create-a-windows-10-reference-image.md#add-applications).
|
||||
10. For purposes of this test lab, we won't add applications, such as Microsoft Office, to the deployment share. For more information about adding applications, see [Add applications](deploy-windows-mdt/create-a-windows-10-reference-image.md#add-applications).
|
||||
|
||||
11. The next step is to create a task sequence to reference the OS that was imported. To create a task sequence, right-click the **Task Sequences** node under **MDT Build Lab** and then select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
|
||||
1. The next step is to create a task sequence to reference the OS that was imported. To create a task sequence, right-click the **Task Sequences** node under **MDT Build Lab** and then select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
- Task sequence ID: **REFW10X64-001**
|
||||
- Task sequence name: **Windows 10 Enterprise x64 Default Image**
|
||||
- Task sequence comments: **Reference Build**
|
||||
@ -466,31 +525,31 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
- Specify Product Key: **Do not specify a product key at this time**
|
||||
- Full Name: **Contoso**
|
||||
- Organization: **Contoso**
|
||||
- Internet Explorer home page: **http://www.contoso.com**
|
||||
- Internet Explorer home page: **`http://www.contoso.com`**
|
||||
- Admin Password: **Do not specify an Administrator password at this time**
|
||||
- Summary: Select **Next**
|
||||
- Confirmation: Select **Finish**
|
||||
|
||||
1. Edit the task sequence to add the Microsoft NET Framework 3.5, which is required by many applications. To edit the task sequence, double-click **Windows 10 Enterprise x64 Default Image** that was created in the previous step.
|
||||
12. Edit the task sequence to add the Microsoft NET Framework 3.5, which is required by many applications. To edit the task sequence, double-click **Windows 10 Enterprise x64 Default Image** that was created in the previous step.
|
||||
|
||||
1. Select the **Task Sequence** tab. Under **State Restore**, select **Tattoo** to highlight it, then select **Add** and choose **New Group**. A new group will be added under Tattoo.
|
||||
13. Select the **Task Sequence** tab. Under **State Restore**, select **Tattoo** to highlight it, then select **Add** and choose **New Group**. A new group will be added under Tattoo.
|
||||
|
||||
1. On the Properties tab of the group that was created in the previous step, change the Name from New Group to **Custom Tasks (Pre-Windows Update)** and then select **Apply**. To see the name change, select **Tattoo**, then select the new group again.
|
||||
14. On the Properties tab of the group that was created in the previous step, change the Name from New Group to **Custom Tasks (Pre-Windows Update)** and then select **Apply**. To see the name change, select **Tattoo**, then select the new group again.
|
||||
|
||||
1. Select the **Custom Tasks (Pre-Windows Update)** group again, select **Add**, point to **Roles**, and then select **Install Roles and Features**.
|
||||
15. Select the **Custom Tasks (Pre-Windows Update)** group again, select **Add**, point to **Roles**, and then select **Install Roles and Features**.
|
||||
|
||||
1. Under **Select the roles and features that should be installed**, select **.NET Framework 3.5 (includes .NET 2.0 and 3.0)** and then select **Apply**.
|
||||
16. Under **Select the roles and features that should be installed**, select **.NET Framework 3.5 (includes .NET 2.0 and 3.0)** and then select **Apply**.
|
||||
|
||||
1. Enable Windows Update in the task sequence by clicking the **Windows Update (Post-Application Installation)** step, clicking the **Options** tab, and clearing the **Disable this step** checkbox.
|
||||
17. Enable Windows Update in the task sequence by clicking the **Windows Update (Post-Application Installation)** step, clicking the **Options** tab, and clearing the **Disable this step** checkbox.
|
||||
|
||||
> [!NOTE]
|
||||
> Since we aren't installing applications in this test lab, there's no need to enable the Windows Update Pre-Application Installation step. However, you should enable this step if you're also installing applications.
|
||||
|
||||
1. Select **OK** to complete editing the task sequence.
|
||||
18. Select **OK** to complete editing the task sequence.
|
||||
|
||||
1. The next step is to configure the MDT deployment share rules. To configure rules in the Deployment Workbench, right-click MDT build lab (C:\MDTBuildLab) and select **Properties**, and then select the **Rules** tab.
|
||||
19. The next step is to configure the MDT deployment share rules. To configure rules in the Deployment Workbench, right-click MDT build lab (C:\MDTBuildLab) and select **Properties**, and then select the **Rules** tab.
|
||||
|
||||
1. Replace the default rules with the following text:
|
||||
20. Replace the default rules with the following text:
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
@ -525,7 +584,7 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
SkipFinalSummary=NO
|
||||
```
|
||||
|
||||
1. Select **Apply** and then select **Edit Bootstrap.ini**. Replace the contents of the Bootstrap.ini file with the following text, and save the file:
|
||||
21. Select **Apply** and then select **Edit Bootstrap.ini**. Replace the contents of the Bootstrap.ini file with the following text, and save the file:
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
@ -539,18 +598,18 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
SkipBDDWelcome=YES
|
||||
```
|
||||
|
||||
1. Select **OK** to complete the configuration of the deployment share.
|
||||
22. Select **OK** to complete the configuration of the deployment share.
|
||||
|
||||
1. Right-click **MDT build lab (C:\MDTBuildLab)** and then select **Update Deployment Share**.
|
||||
23. Right-click **MDT build lab (C:\MDTBuildLab)** and then select **Update Deployment Share**.
|
||||
|
||||
1. Accept all default values in the Update Deployment Share Wizard by clicking **Next**. The update process will take 5 to 10 minutes. When it has completed, select **Finish**.
|
||||
24. Accept all default values in the Update Deployment Share Wizard by clicking **Next**. The update process will take 5 to 10 minutes. When it has completed, select **Finish**.
|
||||
|
||||
1. Copy **c:\MDTBuildLab\Boot\LiteTouchPE_x86.iso** on SRV1 to the **c:\VHD** directory on the Hyper-V host computer. In MDT, the x86 boot image can deploy both x86 and x64 operating systems, except on computers based on Unified Extensible Firmware Interface (UEFI).
|
||||
25. Copy **c:\MDTBuildLab\Boot\LiteTouchPE_x86.iso** on SRV1 to the **c:\VHD** directory on the Hyper-V host computer. In MDT, the x86 boot image can deploy both x86 and x64 operating systems, except on computers based on Unified Extensible Firmware Interface (UEFI).
|
||||
|
||||
> [!TIP]
|
||||
> To copy the file, right-click the **LiteTouchPE_x86.iso** file, and select **Copy** on SRV1. Then open the **c:\VHD** folder on the Hyper-V host, right-click inside the folder, and select **Paste**.
|
||||
|
||||
1. Open a Windows PowerShell prompt on the Hyper-V host computer and type the following commands:
|
||||
26. Open a Windows PowerShell prompt on the Hyper-V host computer and enter the following commands:
|
||||
|
||||
```powershell
|
||||
New-VM -Name REFW10X64-001 -SwitchName poc-internal -NewVHDPath "c:\VHD\REFW10X64-001.vhdx" -NewVHDSizeBytes 60GB
|
||||
@ -560,9 +619,9 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
vmconnect localhost REFW10X64-001
|
||||
```
|
||||
|
||||
1. In the Windows Deployment Wizard, select **Windows 10 Enterprise x64 Default Image**, and then select **Next**.
|
||||
27. In the Windows Deployment Wizard, select **Windows 10 Enterprise x64 Default Image**, and then select **Next**.
|
||||
|
||||
1. Accept the default values on the Capture Image page, and select **Next**. OS installation will complete after 5 to 10 minutes and then the VM will reboot automatically. Allow the system to boot normally, don't press a key. The process is fully automated.
|
||||
28. Accept the default values on the Capture Image page, and select **Next**. OS installation will complete after 5 to 10 minutes and then the VM will reboot automatically. Allow the system to boot normally, don't press a key. The process is fully automated.
|
||||
|
||||
Other system restarts will occur to complete updating and preparing the OS. Setup will complete the following procedures:
|
||||
|
||||
@ -578,7 +637,7 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
|
||||
### Add a Windows 10 OS image
|
||||
|
||||
1. Type the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||
1. Enter the following commands at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```powershell
|
||||
New-Item -ItemType Directory -Path "C:\Sources\OSD\OS\Windows 10 Enterprise x64"
|
||||
@ -587,9 +646,9 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
|
||||
2. In the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Operating System Images**, and then select **Add Operating System Image**.
|
||||
|
||||
3. On the Data Source page, under **Path:**, type or browse to **\\\SRV1\Sources$\OSD\OS\Windows 10 Enterprise x64\REFW10X64-001.wim**, and select **Next**.
|
||||
3. On the Data Source page, under **Path:**, enter or browse to **\\\SRV1\Sources$\OSD\OS\Windows 10 Enterprise x64\REFW10X64-001.wim**, and select **Next**.
|
||||
|
||||
4. On the General page, next to **Name:**, type **Windows 10 Enterprise x64**, select **Next** twice, and then select **Close**.
|
||||
4. On the General page, next to **Name:**, enter **Windows 10 Enterprise x64**, select **Next** twice, and then select **Close**.
|
||||
|
||||
5. Distribute the OS image to the SRV1 distribution point by right-clicking the **Windows 10 Enterprise x64** OS image and then clicking **Distribute Content**.
|
||||
|
||||
@ -609,9 +668,10 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
|
||||
2. On the Choose Template page, select the **Client Task Sequence** template and select **Next**.
|
||||
|
||||
3. On the General page, type **Windows 10 Enterprise x64** under **Task sequence name:** and then select **Next**.
|
||||
3. On the General page, enter **Windows 10 Enterprise x64** under **Task sequence name:** and then select **Next**.
|
||||
|
||||
4. On the Details page, enter the following settings:
|
||||
|
||||
- Join a domain: **contoso.com**
|
||||
- Account: Select **Set**
|
||||
- User name: **contoso\CM_JD**
|
||||
@ -631,9 +691,9 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
|
||||
6. On the Boot Image page, browse and select the **Zero Touch WinPE x64** boot image package, select **OK**, and then select **Next**.
|
||||
|
||||
7. On the MDT Package page, select **Create a new Microsoft Deployment Toolkit Files package**, under **Package source folder to be created (UNC Path):**, type **\\\SRV1\Sources$\OSD\MDT\MDT** (MDT is repeated here, not a typo), and then select **Next**.
|
||||
7. On the MDT Package page, select **Create a new Microsoft Deployment Toolkit Files package**, under **Package source folder to be created (UNC Path):**, enter **\\\SRV1\Sources$\OSD\MDT\MDT** (MDT is repeated here, not a typo), and then select **Next**.
|
||||
|
||||
8. On the MDT Details page, next to **Name:** type **MDT** and then select **Next**.
|
||||
8. On the MDT Details page, next to **Name:** enter **MDT** and then select **Next**.
|
||||
|
||||
9. On the OS Image page, browse and select the **Windows 10 Enterprise x64** package, select **OK**, and then select **Next**.
|
||||
|
||||
@ -643,9 +703,9 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
|
||||
12. On the USMT Package page, browse and select the **Microsoft Corporation User State Migration Tool for Windows 10.0.14393.0** package, select **OK**, and then select **Next**.
|
||||
|
||||
13. On the Settings Package page, select **Create a new settings package**, and under **Package source folder to be created (UNC Path):**, type **\\\SRV1\Sources$\OSD\Settings\Windows 10 x64 Settings**, and then select **Next**.
|
||||
13. On the Settings Package page, select **Create a new settings package**, and under **Package source folder to be created (UNC Path):**, enter **\\\SRV1\Sources$\OSD\Settings\Windows 10 x64 Settings**, and then select **Next**.
|
||||
|
||||
14. On the Settings Details page, next to **Name:**, type **Windows 10 x64 Settings**, and select **Next**.
|
||||
14. On the Settings Details page, next to **Name:**, enter **Windows 10 x64 Settings**, and select **Next**.
|
||||
|
||||
15. On the Sysprep Package page, select **Next** twice.
|
||||
|
||||
@ -662,6 +722,7 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
4. In the **State Restore** group, select the **Set Status 5** action, select **Add** in the upper left corner, point to **User State**, and select **Request State Store**. This action adds a new step immediately after **Set Status 5**.
|
||||
|
||||
5. Configure this **Request State Store** step with the following settings:
|
||||
|
||||
- Request state storage location to: **Restore state from another computer**
|
||||
- Select the **If computer account fails to connect to state store, use the Network Access account** checkbox.
|
||||
- Options tab: Select the **Continue on error** checkbox.
|
||||
@ -675,6 +736,7 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
6. In the **State Restore** group, select **Restore User State**, select **Add**, point to **User State**, and select **Release State Store**.
|
||||
|
||||
7. Configure this **Release State Store** step with the following settings:
|
||||
|
||||
- Options tab: Select the **Continue on error** checkbox.
|
||||
- Add Condition: **Task Sequence Variable**:
|
||||
- Variable: **USMTLOCAL**
|
||||
@ -703,7 +765,7 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
|
||||
4. Select the **Monitoring** tab, select the **Enable monitoring for this deployment share** checkbox, and then select **OK**.
|
||||
|
||||
5. Type the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
5. Enter the following command at an elevated Windows PowerShell prompt on SRV1:
|
||||
|
||||
```cmd
|
||||
notepad.exe "C:\Sources\OSD\Settings\Windows 10 x64 Settings\CustomSettings.ini"
|
||||
@ -734,9 +796,9 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
> OSDMigrateAdditionalCaptureOptions=/all
|
||||
> ```
|
||||
|
||||
7. Return to the Configuration Manager console, and in the Software Library workspace, expand **Application Management**, select **Packages**, right-click **Windows 10 x64 Settings**, and then select **Update Distribution Points**. Select **OK** in the popup that appears.
|
||||
7. Return to the Configuration Manager console, and in the **Software Library** workspace, expand **Application Management**, select **Packages**, right-click **Windows 10 x64 Settings**, and then select **Update Distribution Points**. Select **OK** in the popup that appears.
|
||||
|
||||
8. In the Software Library workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64**, and then select **Distribute Content**.
|
||||
8. In the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64**, and then select **Distribute Content**.
|
||||
|
||||
9. In the Distribute Content Wizard, select **Next** twice, select **Add**, select **Distribution Point**, select the **SRV1.CONTOSO.COM** distribution point, select **OK**, select **Next** twice and then select **Close**.
|
||||
|
||||
@ -744,7 +806,7 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
|
||||
### Create a deployment for the task sequence
|
||||
|
||||
1. In the Software Library workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64**, and then select **Deploy**.
|
||||
1. In the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64**, and then select **Deploy**.
|
||||
|
||||
2. On the General page, next to **Collection**, select **Browse**, select the **All Unknown Computers** collection, select **OK**, and then select **Next**.
|
||||
|
||||
@ -760,7 +822,7 @@ If you've already completed steps in [Deploy Windows 10 in a test lab using Micr
|
||||
|
||||
In this first deployment scenario, you'll deploy Windows 10 using PXE. This scenario creates a new computer that doesn't have any migrated users or settings.
|
||||
|
||||
1. Type the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
1. Enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
|
||||
```powershell
|
||||
New-VM -Name "PC4" -NewVHDPath "c:\vhd\pc4.vhdx" -NewVHDSizeBytes 40GB -SwitchName poc-internal -BootDevice NetworkAdapter -Generation 2
|
||||
@ -775,7 +837,7 @@ In this first deployment scenario, you'll deploy Windows 10 using PXE. This scen
|
||||
|
||||
4. Before you select **Next** in the Task Sequence Wizard, press the **F8** key. A command prompt will open.
|
||||
|
||||
5. At the command prompt, type **explorer.exe** and review the Windows PE file structure.
|
||||
5. At the command prompt, enter **explorer.exe** and review the Windows PE file structure.
|
||||
|
||||
6. The smsts.log file is critical for troubleshooting any installation problems that might be encountered. Depending on the deployment phase, the smsts.log file is created in different locations:
|
||||
- X:\Windows\temp\SMSTSLog\smsts.log before disks are formatted.
|
||||
@ -795,6 +857,7 @@ In this first deployment scenario, you'll deploy Windows 10 using PXE. This scen
|
||||
10. The **Windows 10 Enterprise x64** task sequence is selected in the Task Sequence Wizard. Select **Next** to continue with the deployment.
|
||||
|
||||
11. The task sequence will require several minutes to complete. You can monitor progress of the task sequence using the MDT Deployment Workbench under Deployment Shares > MDTProduction > Monitoring. The task sequence will:
|
||||
|
||||
- Install Windows 10
|
||||
- Install the Configuration Manager client and hotfix
|
||||
- Join the computer to the contoso.com domain
|
||||
@ -802,7 +865,7 @@ In this first deployment scenario, you'll deploy Windows 10 using PXE. This scen
|
||||
|
||||
12. When Windows 10 installation has completed, sign in to PC4 using the **contoso\administrator** account.
|
||||
|
||||
13. Right-click **Start**, select **Run**, type **control appwiz.cpl**, press ENTER, select **Turn Windows features on or off**, and verify that **.NET Framework 3.5 (includes .NET 2.0 and 3.0)** is installed. This feature is included in the reference image.
|
||||
13. Right-click **Start**, select **Run**, enter **control appwiz.cpl**, press ENTER, select **Turn Windows features on or off**, and verify that **.NET Framework 3.5 (includes .NET 2.0 and 3.0)** is installed. This feature is included in the reference image.
|
||||
|
||||
14. Shut down the PC4 VM.
|
||||
|
||||
@ -820,19 +883,25 @@ In the replace procedure, PC1 won't be migrated to a new OS. It's simplest to pe
|
||||
|
||||
### Create a replace task sequence
|
||||
|
||||
1. On SRV1, in the Configuration Manager console, in the Software Library workspace, expand **Operating Systems**, right-click **Task Sequences**, and then select **Create MDT Task Sequence**.
|
||||
1. On SRV1, in the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Task Sequences**, and then select **Create MDT Task Sequence**.
|
||||
|
||||
2. On the Choose Template page, select **Client Replace Task Sequence** and select **Next**.
|
||||
|
||||
3. On the General page, type the following information:
|
||||
3. On the General page, enter the following information:
|
||||
|
||||
- Task sequence name: **Replace Task Sequence**
|
||||
- Task sequence comments: **USMT backup only**
|
||||
|
||||
4. Select **Next**, and on the Boot Image page, browse and select the **Zero Touch WinPE x64** boot image package. Select **OK** and then select **Next** to continue.
|
||||
|
||||
5. On the MDT Package page, browse and select the **MDT** package. Select **OK** and then select **Next** to continue.
|
||||
|
||||
6. On the USMT Package page, browse and select the **Microsoft Corporation User State Migration Tool for Windows** package. Select **OK** and then select **Next** to continue.
|
||||
|
||||
7. On the Settings Package page, browse and select the **Windows 10 x64 Settings** package. Select **OK** and then select **Next** to continue.
|
||||
|
||||
8. On the Summary page, review the details and then select **Next**.
|
||||
|
||||
9. On the Confirmation page, select **Finish**.
|
||||
|
||||
> [!NOTE]
|
||||
@ -840,7 +909,7 @@ In the replace procedure, PC1 won't be migrated to a new OS. It's simplest to pe
|
||||
|
||||
### Deploy PC4
|
||||
|
||||
Create a VM named PC4 to receive the applications and settings from PC1. This VM represents a new computer that will replace PC1. To create this VM, type the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
Create a VM named PC4 to receive the applications and settings from PC1. This VM represents a new computer that will replace PC1. To create this VM, enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
|
||||
```powershell
|
||||
New-VM -Name "PC4" -NewVHDPath "c:\vhd\pc4.vhdx" -NewVHDSizeBytes 60GB -SwitchName poc-internal -BootDevice NetworkAdapter -Generation 2
|
||||
@ -855,27 +924,31 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
||||
|
||||
1. Verify that the PC1 VM is running and in its original state, which was saved as a checkpoint and then restored in [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md).
|
||||
|
||||
1. If you haven't already saved a checkpoint for PC1, then do it now. Type the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
2. If you haven't already saved a checkpoint for PC1, then do it now. Enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
|
||||
```powershell
|
||||
Checkpoint-VM -Name PC1 -SnapshotName BeginState
|
||||
```
|
||||
|
||||
1. On SRV1, in the Configuration Manager console, in the **Administration** workspace, expand **Hierarchy Configuration** and select on **Discovery Methods**.
|
||||
1. Double-click **Active Directory System Discovery** and on the **General** tab select the **Enable Active Directory System Discovery** checkbox.
|
||||
1. Select the yellow starburst, select **Browse**, select **contoso\Computers**, and then select **OK** three times.
|
||||
1. When a popup dialog box asks if you want to run full discovery, select **Yes**.
|
||||
1. In the Assets and Compliance workspace, select **Devices** and verify that the computer account names for SRV1 and PC1 are displayed. See the following example (GREGLIN-PC1 is the computer account name of PC1 in this example):
|
||||
3. On SRV1, in the Configuration Manager console, in the **Administration** workspace, expand **Hierarchy Configuration** and select on **Discovery Methods**.
|
||||
|
||||
4. Double-click **Active Directory System Discovery** and on the **General** tab select the **Enable Active Directory System Discovery** checkbox.
|
||||
|
||||
5. Select the yellow starburst, select **Browse**, select **contoso\Computers**, and then select **OK** three times.
|
||||
|
||||
6. When a popup dialog box asks if you want to run full discovery, select **Yes**.
|
||||
|
||||
7. In the **Assets and Compliance** workspace, select **Devices** and verify that the computer account names for SRV1 and PC1 are displayed. See the following example (GREGLIN-PC1 is the computer account name of PC1 in this example):
|
||||
|
||||
> [!TIP]
|
||||
> If you don't see the computer account for PC1, select **Refresh** in the upper right corner of the console.
|
||||
|
||||
The **Client** column indicates that the Configuration Manager client isn't currently installed. This procedure will be carried out next.
|
||||
|
||||
1. Sign in to PC1 using the contoso\administrator account and type the following command at an elevated command prompt to remove any pre-existing client configuration, if it exists.
|
||||
8. Sign in to PC1 using the contoso\administrator account and enter the following command at an elevated command prompt to remove any pre-existing client configuration, if it exists.
|
||||
|
||||
> [!Note]
|
||||
> This command requires an elevated _command prompt_, not an elevated Windows PowerShell prompt.
|
||||
> This command requires an elevated command prompt, not an elevated Windows PowerShell prompt.
|
||||
|
||||
```cmd
|
||||
sc.exe stop ccmsetup
|
||||
@ -885,14 +958,14 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
||||
> [!NOTE]
|
||||
> If PC1 still has Configuration Manager registry settings that were applied by Group Policy, startup scripts, or other policies in its previous domain, these might not all be removed by `CCMSetup /Uninstall` and can cause problems with installation or registration of the client in its new environment. It might be necessary to manually remove these settings if they are present. For more information, see [Manual removal of the Configuration Manager client](/archive/blogs/michaelgriswold/manual-removal-of-the-sccm-client).
|
||||
|
||||
1. On PC1, temporarily stop Windows Update from queuing items for download and clear all BITS jobs from the queue. From an elevated command prompt, type:
|
||||
9. On PC1, temporarily stop Windows Update from queuing items for download and clear all BITS jobs from the queue. From an elevated command prompt, enter:
|
||||
|
||||
```cmd
|
||||
net.exe stop wuauserv
|
||||
net.exe stop BITS
|
||||
```
|
||||
|
||||
Verify that both services were stopped successfully, then type the following command at an elevated command prompt:
|
||||
Verify that both services were stopped successfully, then enter the following command at an elevated command prompt:
|
||||
|
||||
```cmd
|
||||
del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat"
|
||||
@ -902,14 +975,15 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
||||
|
||||
Verify that BITSAdmin displays zero jobs.
|
||||
|
||||
1. To install the Configuration Manager client as a standalone process, type the following command at an elevated command prompt:
|
||||
10. To install the Configuration Manager client as a standalone process, enter the following command at an elevated command prompt:
|
||||
|
||||
```cmd
|
||||
"\\SRV1\c$\Program Files\Microsoft Configuration Manager\Client\CCMSetup.exe" /mp:SRV1.contoso.com /logon SMSSITECODE=PS1
|
||||
```
|
||||
|
||||
1. On PC1, using file explorer, open the **C:\Windows\ccmsetup** directory. During client installation, files will be downloaded here.
|
||||
1. Installation progress will be captured in the file: **c:\windows\ccmsetup\logs\ccmsetup.log**. You can periodically open this file in notepad, or you can type the following command at an elevated Windows PowerShell prompt to monitor installation progress:
|
||||
11. On PC1, using file explorer, open the **C:\Windows\ccmsetup** directory. During client installation, files will be downloaded here.
|
||||
|
||||
12. Installation progress will be captured in the file: **c:\windows\ccmsetup\logs\ccmsetup.log**. You can periodically open this file in notepad, or you can enter the following command at an elevated Windows PowerShell prompt to monitor installation progress:
|
||||
|
||||
```powershell
|
||||
Get-Content -Path c:\windows\ccmsetup\logs\ccmsetup.log -Wait
|
||||
@ -917,21 +991,21 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
||||
|
||||
Installation might require several minutes, and display of the log file will appear to hang while some applications are installed. This behavior is normal. When setup is complete, verify that **CcmSetup is existing with return code 0** is displayed on the last line of the ccmsetup.log file. Then press **CTRL-C** to break out of the Get-Content operation. If you're viewing the log file in Windows PowerShell, the last line will be wrapped. A return code of `0` indicates that installation was successful and you should now see a directory created at **C:\Windows\CCM** that contains files used in registration of the client with its site.
|
||||
|
||||
1. On PC1, open the Configuration Manager control panel applet by typing the following command from a command prompt:
|
||||
13. On PC1, open the Configuration Manager control panel applet by typing the following command from a command prompt:
|
||||
|
||||
```cmd
|
||||
control.exe smscfgrc
|
||||
```
|
||||
|
||||
1. Select the **Site** tab, select **Configure Settings**, and select **Find Site**. The client will report that it has found the PS1 site. See the following example:
|
||||
14. Select the **Site** tab, select **Configure Settings**, and select **Find Site**. The client will report that it has found the PS1 site. See the following example:
|
||||
|
||||

|
||||
|
||||
If the client isn't able to find the PS1 site, review any error messages that are displayed in **C:\Windows\CCM\Logs\ClientIDManagerStartup.log** and **LocationServices.log**. A common reason the client can't locate the site code is because a previous configuration exists. For example, if a previous site code is configured at **HKLM\SOFTWARE\Microsoft\SMS\Mobile Client\GPRequestedSiteAssignmentCode**, delete or update this entry.
|
||||
|
||||
1. On SRV1, in the Assets and Compliance workspace, select **Device Collections** and then double-click **All Desktop and Server Clients**. This node will be added under **Devices**.
|
||||
15. On SRV1, in the **Assets and Compliance** workspace, select **Device Collections** and then double-click **All Desktop and Server Clients**. This node will be added under **Devices**.
|
||||
|
||||
1. Select **All Desktop and Server Clients** and verify that the computer account for PC1 is displayed here with **Yes** and **Active** in the **Client** and **Client Activity** columns, respectively. You might have to refresh the view and wait few minutes for the client to appear here. See the following example:
|
||||
16. Select **All Desktop and Server Clients** and verify that the computer account for PC1 is displayed here with **Yes** and **Active** in the **Client** and **Client Activity** columns, respectively. You might have to refresh the view and wait few minutes for the client to appear here. See the following example:
|
||||
|
||||

|
||||
|
||||
@ -940,9 +1014,10 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
||||
|
||||
### Create a device collection and deployment
|
||||
|
||||
1. On SRV1, in the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections** and then select **Create Device Collection**.
|
||||
1. On SRV1, in the Configuration Manager console, in the **Assets and Compliance** workspace, right-click **Device Collections** and then select **Create Device Collection**.
|
||||
|
||||
2. Use the following settings in the **Create Device Collection Wizard**:
|
||||
|
||||
- General > Name: **Install Windows 10 Enterprise x64**
|
||||
- General > Limiting collection: **All Systems**
|
||||
- Membership Rules > Add Rule: **Direct Rule**
|
||||
@ -955,7 +1030,7 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
||||
|
||||
3. Double-click the Install Windows 10 Enterprise x64 device collection and verify that the PC1 computer account is displayed.
|
||||
|
||||
4. In the Software Library workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64** and then select **Deploy**.
|
||||
4. In the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64** and then select **Deploy**.
|
||||
|
||||
5. Use the following settings in the Deploy Software wizard:
|
||||
- General > Collection: Select Browse and select **Install Windows 10 Enterprise x64**
|
||||
@ -970,24 +1045,25 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
||||
|
||||
### Associate PC4 with PC1
|
||||
|
||||
1. On SRV1 in the Configuration Manager console, in the Assets and Compliance workspace, right-click **Devices** and then select **Import Computer Information**.
|
||||
1. On SRV1 in the Configuration Manager console, in the **Assets and Compliance** workspace, right-click **Devices** and then select **Import Computer Information**.
|
||||
|
||||
2. On the Select Source page, choose **Import single computer** and select **Next**.
|
||||
|
||||
3. On the Single Computer page, use the following settings:
|
||||
|
||||
- Computer Name: **PC4**
|
||||
- MAC Address: **00:15:5D:83:26:FF**
|
||||
- Source Computer: \<type the hostname of PC1, or select **Search** twice, select the hostname, and select **OK**\>
|
||||
- Source Computer: \<enter the hostname of PC1, or select **Search** twice, select the hostname, and select **OK**\>
|
||||
|
||||
4. Select **Next**, and on the User Accounts page choose **Capture and restore specified user accounts**, then select the yellow starburst next to **User accounts to migrate**.
|
||||
|
||||
5. Select **Browse** and then under Enter the object name to select type **user1** and select OK twice.
|
||||
5. Select **Browse** and then under **Enter the object name to select** enter **user1** and select **OK** twice.
|
||||
|
||||
6. Select the yellow starburst again and repeat the previous step to add the **contoso\administrator** account.
|
||||
|
||||
7. Select **Next** twice, and on the Choose Target Collection page, choose **Add computers to the following collection**, select **Browse**, choose **Install Windows 10 Enterprise x64**, select **OK**, select **Next** twice, and then select **Close**.
|
||||
|
||||
8. In the Assets and Compliance workspace, select **User State Migration** and review the computer association in the display pane. The source computer will be the computername of PC1 (GREGLIN-PC1 in this example), the destination computer will be **PC4**, and the migration type will be **side-by-side**.
|
||||
8. In the **Assets and Compliance** workspace, select **User State Migration** and review the computer association in the display pane. The source computer will be the computername of PC1 (GREGLIN-PC1 in this example), the destination computer will be **PC4**, and the migration enter will be **side-by-side**.
|
||||
|
||||
9. Right-click the association in the display pane and then select **Specify User Accounts**. You can add or remove user account here. Select **OK**.
|
||||
|
||||
@ -999,9 +1075,10 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
||||
|
||||
### Create a device collection for PC1
|
||||
|
||||
1. On SRV1, in the Configuration Manager console, in the Assets and Compliance workspace, right-click **Device Collections** and then select **Create Device Collection**.
|
||||
1. On SRV1, in the Configuration Manager console, in the **Assets and Compliance** workspace, right-click **Device Collections** and then select **Create Device Collection**.
|
||||
|
||||
2. Use the following settings in the **Create Device Collection Wizard**:
|
||||
|
||||
- General > Name: **USMT Backup (Replace)**
|
||||
- General > Limiting collection: **All Systems**
|
||||
- Membership Rules > Add Rule: **Direct Rule**
|
||||
@ -1037,7 +1114,7 @@ In the Configuration Manager console, in the **Software Library** workspace, und
|
||||
|
||||
2. On the **Actions** tab, select **Machine Policy Retrieval & Evaluation Cycle**, select **Run Now**, select **OK**, and then select **OK** again. This method is one that you can use to run a task sequence in addition to the Client Notification method that will be demonstrated in the computer refresh procedure.
|
||||
|
||||
3. Type the following command at an elevated command prompt to open the Software Center:
|
||||
3. Enter the following command at an elevated command prompt to open the Software Center:
|
||||
|
||||
```cmd
|
||||
C:\Windows\CCM\SCClient.exe
|
||||
@ -1051,26 +1128,30 @@ In the Configuration Manager console, in the **Software Library** workspace, und
|
||||
> If you don't see any available software, try running step #2 again to start the Machine Policy Retrieval & Evaluation Cycle. You should see an alert that new software is available.
|
||||
|
||||
5. Select **INSTALL SELECTED** and then select **INSTALL OPERATING SYSTEM**.
|
||||
|
||||
6. Allow the **Replace Task Sequence** to complete, then verify that the C:\MigData folder on SRV1 contains the USMT backup.
|
||||
|
||||
### Deploy the new computer
|
||||
|
||||
1. Start PC4 and press ENTER for a network boot when prompted. To start PC4, type the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
1. Start PC4 and press ENTER for a network boot when prompted. To start PC4, enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
|
||||
```powershell
|
||||
Start-VM PC4
|
||||
vmconnect localhost PC4
|
||||
```
|
||||
|
||||
1. In the **Welcome to the Task Sequence Wizard**, enter **pass@word1** and select **Next**.
|
||||
1. Choose the **Windows 10 Enterprise X64** image.
|
||||
1. Setup will install the OS using the Windows 10 Enterprise x64 reference image, install the configuration manager client, join PC4 to the domain, and restore users and settings from PC1.
|
||||
1. Save checkpoints for all VMs if you wish to review their status at a later date. This action isn't required, as checkpoints do take up space on the Hyper-V host.
|
||||
2. In the **Welcome to the Task Sequence Wizard**, enter **pass@word1** and select **Next**.
|
||||
|
||||
3. Choose the **Windows 10 Enterprise X64** image.
|
||||
|
||||
4. Setup will install the OS using the Windows 10 Enterprise x64 reference image, install the configuration manager client, join PC4 to the domain, and restore users and settings from PC1.
|
||||
|
||||
5. Save checkpoints for all VMs if you wish to review their status at a later date. This action isn't required, as checkpoints do take up space on the Hyper-V host.
|
||||
|
||||
> [!Note]
|
||||
> The next procedure will install a new OS on PC1, and update its status in Configuration Manager and in Active Directory as a Windows 10 device. So you can't return to a previous checkpoint only on the PC1 VM without a conflict. Therefore, if you do create a checkpoint, you should do this action for all VMs.
|
||||
|
||||
To save a checkpoint for all VMs, type the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
To save a checkpoint for all VMs, enter the following commands at an elevated Windows PowerShell prompt on the Hyper-V host:
|
||||
|
||||
```powershell
|
||||
Checkpoint-VM -Name DC1 -SnapshotName cm-refresh
|
||||
@ -1082,14 +1163,17 @@ In the Configuration Manager console, in the **Software Library** workspace, und
|
||||
|
||||
### Initiate the computer refresh
|
||||
|
||||
1. On SRV1, in the Assets and Compliance workspace, select **Device Collections** and then double-click **Install Windows 10 Enterprise x64**.
|
||||
1. On SRV1, in the **Assets and Compliance** workspace, select **Device Collections** and then double-click **Install Windows 10 Enterprise x64**.
|
||||
|
||||
2. Right-click the computer account for PC1, point to **Client Notification**, select **Download Computer Policy**, and select **OK** in the popup dialog box.
|
||||
|
||||
3. On PC1, in the notification area, select **New software is available** and then select **Open Software Center**.
|
||||
|
||||
4. In the Software Center, select **Operating Systems**, select **Windows 10 Enterprise x64**, select **Install** and then select **INSTALL OPERATING SYSTEM**. See the following example:
|
||||
|
||||

|
||||
|
||||
The computer will restart several times during the installation process. Installation includes downloading updates, reinstalling the Configuration Manager Client Agent, and restoring the user state. You can view status of the installation in the Configuration Manager console by accessing the Monitoring workspace, clicking **Deployments**, and then double-clicking the deployment associated with the **Install Windows 10 Enterprise x64** collection. Under **Asset Details**, right-click the device and then select **More Details**. Select the **Status** tab to see a list of tasks that have been performed. See the following example:
|
||||
The computer will restart several times during the installation process. Installation includes downloading updates, reinstalling the Configuration Manager Client Agent, and restoring the user state. You can view status of the installation in the Configuration Manager console by accessing the **Monitoring** workspace, clicking **Deployments**, and then double-clicking the deployment associated with the **Install Windows 10 Enterprise x64** collection. Under **Asset Details**, right-click the device and then select **More Details**. Select the **Status** tab to see a list of tasks that have been performed. See the following example:
|
||||
|
||||

|
||||
|
||||
|
@ -9,12 +9,12 @@ ms.prod: windows-client
|
||||
ms.technology: itpro-deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: tutorial
|
||||
ms.date: 10/31/2022
|
||||
ms.date: 11/23/2022
|
||||
---
|
||||
|
||||
# Step by step guide: Configure a test lab to deploy Windows 10
|
||||
|
||||
*Applies to*
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
|
||||
@ -69,6 +69,7 @@ The procedures in this guide are summarized in the following table. An estimate
|
||||
One computer that meets the hardware and software specifications below is required to complete the guide; A second computer is recommended to validate the upgrade process.
|
||||
|
||||
- **Computer 1**: the computer you'll use to run Hyper-V and host virtual machines. This computer should have 16 GB or more of installed RAM and a multi-core processor.
|
||||
|
||||
- **Computer 2**: a client computer from your network. It's shadow-copied to create a VM that can be added to the PoC environment, enabling you to test a mirror image of a computer on your network. If you don't have a computer to use for this simulation, you can download an evaluation VHD and use it to represent this computer. Subsequent guides use this computer to simulate Windows 10 replace and refresh scenarios, so the VM is required even if you can't create this VM using computer 2.
|
||||
|
||||
Hardware requirements are displayed below:
|
||||
@ -92,7 +93,9 @@ The lab architecture is summarized in the following diagram:
|
||||

|
||||
|
||||
- Computer 1 is configured to host four VMs on a private, PoC network.
|
||||
|
||||
- Two VMs are running Windows Server 2012 R2 with required network services and tools installed.
|
||||
|
||||
- Two VMs are client systems: One VM is intended to mirror a host on your network (computer 2) and one VM is running Windows 10 Enterprise to demonstrate the hardware replacement scenario.
|
||||
|
||||
> [!NOTE]
|
||||
@ -225,13 +228,23 @@ When you have completed installation of Hyper-V on the host computer, begin conf
|
||||
|
||||
If you don't have a PC available to convert to VM, do the following steps to download an evaluation VM:
|
||||
|
||||
1. Open the [Download virtual machines](https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/) page.<!-- only works with locale :( -->
|
||||
1. Open the [Download virtual machines](https://developer.microsoft.com/microsoft-edge/tools/vms/) page.
|
||||
|
||||
> [!NOTE]
|
||||
> The above link may not be available in all locales.
|
||||
|
||||
2. Under **Virtual machine**, choose **IE11 on Win7**.
|
||||
|
||||
3. Under **Select platform**, choose **HyperV (Windows)**.
|
||||
|
||||
4. Select **Download .zip**. The download is 3.31 GB.
|
||||
|
||||
5. Extract the zip file. Three directories are created.
|
||||
|
||||
6. Open the **Virtual Hard Disks** directory and then copy **IE11 - Win7.vhd** to the **C:\VHD** directory.
|
||||
|
||||
7. Rename **IE11 - Win7.vhd** to **w7.vhd** (don't rename the file to w7.vhdx).
|
||||
|
||||
8. In step 5 of the [Configure Hyper-V](#configure-hyper-v) section, replace the VHD file name **w7.vhdx** with **w7.vhd**.
|
||||
|
||||
If you have a PC available to convert to VM (computer 2):
|
||||
@ -242,6 +255,7 @@ If you have a PC available to convert to VM (computer 2):
|
||||
> The account used in this step must have local administrator privileges. You can use a local computer account, or a domain account with administrative rights if domain policy allows the use of cached credentials. After converting the computer to a VM, you must be able to sign in on this VM with administrator rights while the VM is disconnected from the network.
|
||||
|
||||
2. [Determine the VM generation and partition type](#determine-the-vm-generation-and-partition-type) that is required.
|
||||
|
||||
3. Based on the VM generation and partition type, perform one of the following procedures: [Prepare a generation 1 VM](#prepare-a-generation-1-vm), [Prepare a generation 2 VM](#prepare-a-generation-2-vm), or [prepare a generation 1 VM from a GPT disk](#prepare-a-generation-1-vm-from-a-gpt-disk).
|
||||
|
||||
#### Determine the VM generation and partition type
|
||||
@ -256,6 +270,7 @@ When creating a VM in Hyper-V, you must specify either generation 1 or generatio
|
||||
If the PC is running a 32-bit OS or the OS is Windows 7, it must be converted to a generation 1 VM. Otherwise, it can be converted to a generation 2 VM.
|
||||
|
||||
- To determine the OS and architecture of a PC, type **systeminfo** at a command prompt and review the output next to **OS Name** and **System Type**.
|
||||
|
||||
- To determine the partition style, open a Windows PowerShell prompt on the PC and type the following command:
|
||||
|
||||
```powershell
|
||||
@ -293,34 +308,32 @@ Number Friendly Name OperationalStatus Tota
|
||||
0 INTEL SSDSCMMW240A3L Online 223.57 GB GPT
|
||||
```
|
||||
|
||||
<span id="determine-vm-generation"/>
|
||||
|
||||
**Choosing a VM generation**
|
||||
##### Choosing a VM generation
|
||||
|
||||
The following tables display the Hyper-V VM generation to choose based on the OS, architecture, and partition style. Links to procedures to create the corresponding VMs are included.
|
||||
|
||||
**Windows 7 MBR**
|
||||
###### Windows 7 MBR
|
||||
|
||||
|Architecture|VM generation|Procedure|
|
||||
|--- |--- |--- |
|
||||
|32|1|[Prepare a generation 1 VM](#prepare-a-generation-1-vm)|
|
||||
|64|1|[Prepare a generation 1 VM](#prepare-a-generation-1-vm)|
|
||||
|
||||
**Windows 7 GPT**
|
||||
###### Windows 7 GPT
|
||||
|
||||
|Architecture|VM generation|Procedure|
|
||||
|--- |--- |--- |
|
||||
|32|N/A|N/A|
|
||||
|64|1|[Prepare a generation 1 VM from a GPT disk](#prepare-a-generation-1-vm-from-a-gpt-disk)|
|
||||
|
||||
**Windows 8 or later MBR**
|
||||
###### Windows 8 or later MBR
|
||||
|
||||
|Architecture|VM generation|Procedure|
|
||||
|--- |--- |--- |
|
||||
|32|1|[Prepare a generation 1 VM](#prepare-a-generation-1-vm)|
|
||||
|64|1, 2|[Prepare a generation 1 VM](#prepare-a-generation-1-vm)|
|
||||
|
||||
**Windows 8 or later GPT**
|
||||
###### Windows 8 or later GPT
|
||||
|
||||
|Architecture|VM generation|Procedure|
|
||||
|--- |--- |--- |
|
||||
@ -347,7 +360,7 @@ The following tables display the Hyper-V VM generation to choose based on the OS
|
||||
3. Select the checkboxes next to the `C:\` and the **system reserved** (BIOS/MBR) volumes. The system volume isn't assigned a drive letter, but will be displayed in the Disk2VHD tool with a volume label similar to `\?\Volume{`. See the following example.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> You must include the system volume in order to create a bootable VHD. If this volume isn't displayed in the disk2vhd tool, then the computer is likely to be using the GPT partition style. For more information, see [Determine VM generation](#determine-vm-generation).
|
||||
> You must include the system volume in order to create a bootable VHD. If this volume isn't displayed in the disk2vhd tool, then the computer is likely to be using the GPT partition style. For more information, see [Choosing a VM generation](#choosing-a-vm-generation).
|
||||
|
||||
4. Specify a location to save the resulting VHD or VHDX file (F:\VHD\w7.vhdx in the following example) and select **Create**. See the following example:
|
||||
|
||||
@ -381,6 +394,7 @@ The following tables display the Hyper-V VM generation to choose based on the OS
|
||||
This command temporarily assigns a drive letter of S to the system volume and mounts it. If the letter S is already assigned to a different volume on the computer, then choose one that is available (ex: mountvol z: /s).
|
||||
|
||||
3. On the computer you wish to convert, double-click the disk2vhd utility to start the graphical user interface.
|
||||
|
||||
4. Select the checkboxes next to the **C:\\** and the **S:\\** volumes, and clear the **Use Volume Shadow Copy checkbox**. Volume shadow copy won't work if the EFI system partition is selected.
|
||||
|
||||
> [!IMPORTANT]
|
||||
@ -409,6 +423,7 @@ The following tables display the Hyper-V VM generation to choose based on the OS
|
||||
You might experience timeouts if you attempt to run Disk2vhd from a network share, or specify a network share for the destination. To avoid timeouts, use local, portable media such as a USB drive.
|
||||
|
||||
2. On the computer you wish to convert, double-click the disk2vhd utility to start the graphical user interface.
|
||||
|
||||
3. Select the checkbox next to the **C:\\** volume and clear the checkbox next to **Use Vhdx**.
|
||||
|
||||
> [!NOTE]
|
||||
@ -524,7 +539,7 @@ The second Windows Server 2012 R2 VHD needs to be expanded in size from 40 GB to
|
||||
> [!NOTE]
|
||||
> The RAM values assigned to VMs in this step are not permanent, and can be easily increased or decreased later if needed to address performance issues.
|
||||
|
||||
5. Using the same elevated Windows PowerShell prompt that was used in the previous step, type one of the following sets of commands, depending on the type of VM that was prepared in the [Determine VM generation](#determine-vm-generation) section, either generation 1, generation 2, or generation 1 with GPT.
|
||||
5. Using the same elevated Windows PowerShell prompt that was used in the previous step, type one of the following sets of commands, depending on the type of VM that was prepared in the [Choosing a VM generation](#choosing-a-vm-generation) section, either generation 1, generation 2, or generation 1 with GPT.
|
||||
|
||||
To create a generation 1 VM (using c:\vhd\w7.vhdx):
|
||||
|
||||
@ -574,9 +589,13 @@ The second Windows Server 2012 R2 VHD needs to be expanded in size from 40 GB to
|
||||
The VM will automatically boot into Windows Setup. In the PC1 window:
|
||||
|
||||
1. Select **Next**.
|
||||
|
||||
2. Select **Repair your computer**.
|
||||
|
||||
3. Select **Troubleshoot**.
|
||||
|
||||
4. Select **Command Prompt**.
|
||||
|
||||
5. Type the following command to save an image of the OS drive:
|
||||
|
||||
```cmd
|
||||
@ -608,7 +627,9 @@ The second Windows Server 2012 R2 VHD needs to be expanded in size from 40 GB to
|
||||
```
|
||||
|
||||
8. Select **Continue** and verify the VM boots successfully. Don't boot from DVD.
|
||||
|
||||
9. Select **Ctrl+Alt+Del**, and then in the bottom right corner, select **Shut down**.
|
||||
|
||||
10. Type the following commands at an elevated Windows PowerShell prompt on the Hyper-V host to remove the temporary disks and drives from PC1:
|
||||
|
||||
```powershell
|
||||
@ -626,8 +647,14 @@ The second Windows Server 2012 R2 VHD needs to be expanded in size from 40 GB to
|
||||
```
|
||||
|
||||
2. Select **Next** to accept the default settings, read the license terms and select **I accept**, provide a strong administrator password, and select **Finish**.
|
||||
|
||||
3. Select **Ctrl+Alt+Del** in the upper left corner of the virtual machine connection window, and then sign in to DC1 using the Administrator account.
|
||||
4. Right-click **Start**, point to **Shut down or sign out**, and select **Sign out**. The VM connection will reset and a new connection dialog box will appear enabling you to choose a custom display configuration. Select a desktop size, select **Connect** and sign in again with the local Administrator account. Note: Signing in this way ensures that [enhanced session mode](/windows-server/virtualization/hyper-v/learn-more/Use-local-resources-on-Hyper-V-virtual-machine-with-VMConnect) is enabled. It's only necessary to do this action the first time you sign in to a new VM.
|
||||
|
||||
4. Right-click **Start**, point to **Shut down or sign out**, and select **Sign out**. The VM connection will reset and a new connection dialog box will appear enabling you to choose a custom display configuration. Select a desktop size, select **Connect** and sign in again with the local Administrator account.
|
||||
|
||||
> [!NOTE]
|
||||
> Signing in this way ensures that [enhanced session mode](/windows-server/virtualization/hyper-v/learn-more/Use-local-resources-on-Hyper-V-virtual-machine-with-VMConnect) is enabled. It's only necessary to do this action the first time you sign in to a new VM.
|
||||
|
||||
5. If DC1 is configured as described in this guide, it will currently be assigned an APIPA address, have a randomly generated hostname, and a single network adapter named "Ethernet." Open an elevated Windows PowerShell prompt on DC1 and type or paste the following commands to provide a new hostname and configure a static IP address and gateway:
|
||||
|
||||
```powershell
|
||||
@ -1026,16 +1053,16 @@ Use the following procedures to verify that the PoC environment is configured pr
|
||||
|
||||
|Term|Definition|
|
||||
|--- |--- |
|
||||
|GPT|GUID partition table (GPT) is an updated hard-disk formatting scheme that enables the use of newer hardware. GPT is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions.|
|
||||
|Hyper-V|Hyper-V is a server role introduced with Windows Server 2008 that lets you create a virtualized computing environment. Hyper-V can also be installed as a Windows feature on Windows client operating systems, starting with Windows 8.|
|
||||
|Hyper-V host|The computer where Hyper-V is installed.|
|
||||
|Hyper-V Manager|The user-interface console used to view and configure Hyper-V.|
|
||||
|MBR|Master Boot Record (MBR) is a legacy hard-disk formatting scheme that limits support for newer hardware. MBR is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions. MBR is in the process of being replaced by the GPT partition format.|
|
||||
|Proof of concept (PoC)|Confirmation that a process or idea works as intended. A PoC is carried out in a test environment to learn about and verify a process.|
|
||||
|Shadow copy|A copy or "snapshot" of a computer at a point in time, created by the Volume Shadow Copy Service (VSS), typically for backup purposes.|
|
||||
|Virtual machine (VM)|A VM is a virtual computer with its own operating system, running on the Hyper-V host.|
|
||||
|Virtual switch|A virtual network connection used to connect VMs to each other and to physical network adapters on the Hyper-V host.|
|
||||
|VM snapshot|A point in time image of a VM that includes its disk, memory and device state. It can be used to return a virtual machine to a former state corresponding to the time the snapshot was taken.|
|
||||
|**GPT**|GUID partition table (GPT) is an updated hard-disk formatting scheme that enables the use of newer hardware. GPT is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions.|
|
||||
|**Hyper-V**|Hyper-V is a server role introduced with Windows Server 2008 that lets you create a virtualized computing environment. Hyper-V can also be installed as a Windows feature on Windows client operating systems, starting with Windows 8.|
|
||||
|**Hyper-V host**|The computer where Hyper-V is installed.|
|
||||
|**Hyper-V Manager**|The user-interface console used to view and configure Hyper-V.|
|
||||
|**MBR**|Master Boot Record (MBR) is a legacy hard-disk formatting scheme that limits support for newer hardware. MBR is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions. MBR is in the process of being replaced by the GPT partition format.|
|
||||
|**Proof of concept (PoC)**|Confirmation that a process or idea works as intended. A PoC is carried out in a test environment to learn about and verify a process.|
|
||||
|**Shadow copy**|A copy or "snapshot" of a computer at a point in time, created by the Volume Shadow Copy Service (VSS), typically for backup purposes.|
|
||||
|**Virtual machine (VM)**|A VM is a virtual computer with its own operating system, running on the Hyper-V host.|
|
||||
|**Virtual switch**|A virtual network connection used to connect VMs to each other and to physical network adapters on the Hyper-V host.|
|
||||
|**VM snapshot**|A point in time image of a VM that includes its disk, memory and device state. It can be used to return a virtual machine to a former state corresponding to the time the snapshot was taken.|
|
||||
|
||||
## Next steps
|
||||
|
||||
|
@ -9,7 +9,7 @@ ms.prod: windows-client
|
||||
ms.collection:
|
||||
- M365-modern-desktop
|
||||
ms.topic: article
|
||||
ms.date: 10/31/2022
|
||||
ms.date: 11/23/2022
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
|
||||
@ -37,20 +37,26 @@ Many other transformations are possible depending on which version and edition o
|
||||
| | Home | Not by any method | Not by any method | Not by any method |
|
||||
|
||||
Use the following information to switch to Windows 10 Pro through the Microsoft Store.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> While it's free to switch to Windows 10 Pro, it's not reversible. The only way to rollback this kind of switch is through a [bare-metal recovery (BMR)](/windows-hardware/manufacture/desktop/create-media-to-run-push-button-reset-features-s14) reset. This restores a Windows device to the factory state, even if the user needs to replace the hard drive or completely wipe the drive clean. If a device is switched out of S mode via the Microsoft Store, it will remain out of S mode even after the device is reset.
|
||||
|
||||
## Switch one device through the Microsoft Store
|
||||
|
||||
Use the following information to switch to Windows 10 Pro through the Microsoft Store or by navigating to **Settings** and then **Activation** on the device.
|
||||
|
||||
Note these differences affecting switching modes in various releases of Windows 10:
|
||||
|
||||
- In Windows 10, version 1709, you can switch devices one at a time from Windows 10 Pro in S mode to Windows 10 Pro by using the Microsoft Store or **Settings**. No other switches are possible.
|
||||
|
||||
- In Windows 10, version 1803, you can switch devices running any S mode edition to the equivalent non-S mode edition one at a time by using the Microsoft Store or **Settings**.
|
||||
- Windows 10, version 1809, you can switch devices running any S mode edition to the equivalent non-S mode edition one at a time by using the Microsoft Store, **Settings**, or you can switch multiple devices in bulk by using Intune. You can also block users from switching devices themselves.
|
||||
|
||||
- Windows 10, version 1809, you can switch devices running any S mode edition to the equivalent non-S mode edition one at a time by using the Microsoft Store, **Settings**, or you can switch multiple devices in bulk by using Intune. You can also block users from switching devices themselves.
|
||||
|
||||
1. Sign into the Microsoft Store using your Microsoft account.
|
||||
|
||||
2. Search for "S mode".
|
||||
|
||||
3. In the offer, select **Buy**, **Get**, or **Learn more.**
|
||||
|
||||
You'll be prompted to save your files before the switch starts. Follow the prompts to switch to Windows 10 Pro.
|
||||
@ -60,13 +66,14 @@ You'll be prompted to save your files before the switch starts. Follow the promp
|
||||
Starting with Windows 10, version 1809, if you need to switch multiple devices in your environment from Windows 10 Pro in S mode to Windows 10 Pro, you can use Microsoft Intune or any other supported mobile device management software. You can configure devices to switch out of S mode during OOBE or post-OOBE. Switching out of S mode gives you flexibility to manage Windows 10 in S mode devices at any point during the device lifecycle.
|
||||
|
||||
1. Start Microsoft Intune.
|
||||
2. Navigate to **Device configuration > Profiles > Windows 10 and later > Edition upgrade and mode switch**.
|
||||
|
||||
2. Navigate to **Device configuration** > **Profiles** > **Windows 10 and later** > **Edition upgrade and mode switch**.
|
||||
|
||||
3. Follow the instructions to complete the switch.
|
||||
|
||||
## Block users from switching
|
||||
|
||||
You can control which devices or users can use the Microsoft Store to switch out of S mode in Windows 10.
|
||||
To set this policy, go to **Device configuration > Profiles > Windows 10 and later > Edition upgrade and mode switch in Microsoft Intune**, and then choose **Keep in S mode**.
|
||||
You can control which devices or users can use the Microsoft Store to switch out of S mode in Windows 10. To set this policy, go to **Device configuration** > **Profiles** > **Windows 10 and later** > **Edition upgrade and mode switch in Microsoft Intune**, and then choose **Keep in S mode**.
|
||||
|
||||
## S mode management with CSPs
|
||||
|
||||
|
@ -13,7 +13,7 @@ ms.collection:
|
||||
search.appverid:
|
||||
- MET150
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/31/2022
|
||||
ms.date: 11/23/2022
|
||||
appliesto:
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
@ -98,7 +98,7 @@ The following list illustrates how deploying Windows client has evolved with eac
|
||||
> The following requirements don't apply to general Windows client activation on Azure. Azure activation requires a connection to Azure KMS only. It supports workgroup, hybrid, and Azure AD-joined VMs. In most scenarios, activation of Azure VMs happens automatically. For more information, see [Understanding Azure KMS endpoints for Windows product activation of Azure virtual machines](/troubleshoot/azure/virtual-machines/troubleshoot-activation-problems).
|
||||
|
||||
> [!IMPORTANT]
|
||||
> As of October 1, 2022, subscription activation is available for _commercial_ and _GCC_ tenants. It's currently not available on GCC High or DoD tenants.<!-- 6783128 --> For more information, see [Enable subscription activation with an existing EA](deploy-enterprise-licenses.md#enable-subscription-activation-with-an-existing-ea).
|
||||
> As of October 1, 2022, subscription activation is available for *commercial* and *GCC* tenants. It's currently not available on GCC High or DoD tenants.<!-- 6783128 --> For more information, see [Enable subscription activation with an existing EA](deploy-enterprise-licenses.md#enable-subscription-activation-with-an-existing-ea).
|
||||
|
||||
For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA), you must have the following requirements:
|
||||
|
||||
@ -144,7 +144,7 @@ You can benefit by moving to Windows as an online service in the following ways:
|
||||
> [!NOTE]
|
||||
> The following examples use Windows 10 Pro to Enterprise edition. The examples also apply to Windows 11, and Education editions.
|
||||
|
||||
The device is Azure AD-joined from **Settings > Accounts > Access work or school**.
|
||||
The device is Azure AD-joined from **Settings** > **Accounts** > **Access work or school**.
|
||||
|
||||
You assign Windows 10 Enterprise to a user:
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.author: frankroj
|
||||
manager: aaroncz
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/31/2022
|
||||
ms.date: 11/23/2022
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
@ -19,50 +19,50 @@ In previous releases of Windows, the Windows ADK docs were published on both Tec
|
||||
|
||||
Here are some key scenarios that will help you find the content on the MSDN Hardware Dev Center.
|
||||
|
||||
### Create a Windows image using command-line tools
|
||||
## Create a Windows image using command-line tools
|
||||
|
||||
[DISM](/windows-hardware/manufacture/desktop/dism---deployment-image-servicing-and-management-technical-reference-for-windows) is used to mount and service Windows images.
|
||||
|
||||
Here are some things you can do with DISM:
|
||||
|
||||
- [Mount an offline image](/windows-hardware/manufacture/desktop/mount-and-modify-a-windows-image-using-dism)
|
||||
- [Add drivers to an offline image](/windows-hardware/manufacture/desktop/add-and-remove-drivers-to-an-offline-windows-image)
|
||||
- [Enable or disable Windows features](/windows-hardware/manufacture/desktop/enable-or-disable-windows-features-using-dism)
|
||||
- [Add or remove packages](/windows-hardware/manufacture/desktop/add-or-remove-packages-offline-using-dism)
|
||||
- [Add language packs](/windows-hardware/manufacture/desktop/add-language-packs-to-windows)
|
||||
- [Add Universal Windows apps](/windows-hardware/manufacture/desktop/preinstall-apps-using-dism)
|
||||
- [Upgrade the Windows edition](/windows-hardware/manufacture/desktop/change-the-windows-image-to-a-higher-edition-using-dism)
|
||||
- [Mount an offline image](/windows-hardware/manufacture/desktop/mount-and-modify-a-windows-image-using-dism)
|
||||
- [Add drivers to an offline image](/windows-hardware/manufacture/desktop/add-and-remove-drivers-to-an-offline-windows-image)
|
||||
- [Enable or disable Windows features](/windows-hardware/manufacture/desktop/enable-or-disable-windows-features-using-dism)
|
||||
- [Add or remove packages](/windows-hardware/manufacture/desktop/add-or-remove-packages-offline-using-dism)
|
||||
- [Add language packs](/windows-hardware/manufacture/desktop/add-language-packs-to-windows)
|
||||
- [Add Universal Windows apps](/windows-hardware/manufacture/desktop/preinstall-apps-using-dism)
|
||||
- [Upgrade the Windows edition](/windows-hardware/manufacture/desktop/change-the-windows-image-to-a-higher-edition-using-dism)
|
||||
|
||||
[Sysprep](/windows-hardware/manufacture/desktop/sysprep--system-preparation--overview) prepares a Windows installation for imaging and allows you to capture a customized installation.
|
||||
|
||||
Here are some things you can do with Sysprep:
|
||||
|
||||
- [Generalize a Windows installation](/windows-hardware/manufacture/desktop/sysprep--generalize--a-windows-installation)
|
||||
- [Customize the default user profile](/windows-hardware/manufacture/desktop/customize-the-default-user-profile-by-using-copyprofile)
|
||||
- [Use answer files](/windows-hardware/manufacture/desktop/use-answer-files-with-sysprep)
|
||||
- [Generalize a Windows installation](/windows-hardware/manufacture/desktop/sysprep--generalize--a-windows-installation)
|
||||
- [Customize the default user profile](/windows-hardware/manufacture/desktop/customize-the-default-user-profile-by-using-copyprofile)
|
||||
- [Use answer files](/windows-hardware/manufacture/desktop/use-answer-files-with-sysprep)
|
||||
|
||||
[Windows PE (WinPE)](/windows-hardware/manufacture/desktop/winpe-intro) is a small operating system used to boot a computer that doesn't have an operating system. You can boot to Windows PE and then install a new operating system, recover data, or repair an existing operating system.
|
||||
|
||||
Here are ways you can create a WinPE image:
|
||||
|
||||
- [Create a bootable USB drive](/windows-hardware/manufacture/desktop/winpe-create-usb-bootable-drive)
|
||||
- [Create a Boot CD, DVD, ISO, or VHD](/windows-hardware/manufacture/desktop/winpe-create-usb-bootable-drive)
|
||||
- [Create a bootable USB drive](/windows-hardware/manufacture/desktop/winpe-create-usb-bootable-drive)
|
||||
- [Create a Boot CD, DVD, ISO, or VHD](/windows-hardware/manufacture/desktop/winpe-create-usb-bootable-drive)
|
||||
|
||||
[Windows Recovery Environment (Windows RE)](/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference) is a recovery environment that can repair common operating system problems.
|
||||
|
||||
Here are some things you can do with Windows RE:
|
||||
|
||||
- [Customize Windows RE](/windows-hardware/manufacture/desktop/customize-windows-re)
|
||||
- [Push-button reset](/windows-hardware/manufacture/desktop/push-button-reset-overview)
|
||||
- [Customize Windows RE](/windows-hardware/manufacture/desktop/customize-windows-re)
|
||||
- [Push-button reset](/windows-hardware/manufacture/desktop/push-button-reset-overview)
|
||||
|
||||
[Windows System Image Manager (Windows SIM)](/windows-hardware/customize/desktop/wsim/windows-system-image-manager-technical-reference) helps you create answer files that change Windows settings and run scripts during installation.
|
||||
|
||||
Here are some things you can do with Windows SIM:
|
||||
|
||||
- [Create answer file](/windows-hardware/customize/desktop/wsim/create-or-open-an-answer-file)
|
||||
- [Add a driver path to an answer file](/windows-hardware/customize/desktop/wsim/add-a-device-driver-path-to-an-answer-file)
|
||||
- [Add a package to an answer file](/windows-hardware/customize/desktop/wsim/add-a-package-to-an-answer-file)
|
||||
- [Add a custom command to an answer file](/windows-hardware/customize/desktop/wsim/add-a-custom-command-to-an-answer-file)
|
||||
- [Create answer file](/windows-hardware/customize/desktop/wsim/create-or-open-an-answer-file)
|
||||
- [Add a driver path to an answer file](/windows-hardware/customize/desktop/wsim/add-a-device-driver-path-to-an-answer-file)
|
||||
- [Add a package to an answer file](/windows-hardware/customize/desktop/wsim/add-a-package-to-an-answer-file)
|
||||
- [Add a custom command to an answer file](/windows-hardware/customize/desktop/wsim/add-a-custom-command-to-an-answer-file)
|
||||
|
||||
For a list of settings you can change, see [Unattended Windows Setup Reference](/windows-hardware/customize/desktop/unattend/) on the MSDN Hardware Dev Center.
|
||||
|
||||
@ -72,12 +72,12 @@ Introduced in Windows 10, [Windows Imaging and Configuration Designer (ICD)](/wi
|
||||
|
||||
Here are some things you can do with Windows ICD:
|
||||
|
||||
- [Build and apply a provisioning package](/windows/configuration/provisioning-packages/provisioning-create-package)
|
||||
- [Export a provisioning package](/windows/configuration/provisioning-packages/provisioning-create-package)
|
||||
- [Build and apply a provisioning package](/windows/configuration/provisioning-packages/provisioning-create-package)
|
||||
- [Export a provisioning package](/windows/configuration/provisioning-packages/provisioning-create-package)
|
||||
|
||||
### IT Pro Windows deployment tools
|
||||
|
||||
There are also a few tools included in the Windows ADK that are specific to IT Pros and this documentation is available on TechNet:
|
||||
|
||||
- [Volume Activation Management Tool (VAMT) Technical Reference](volume-activation/volume-activation-management-tool.md)
|
||||
- [User State Migration Tool (USMT) Technical Reference](usmt/usmt-technical-reference.md)
|
||||
- [Volume Activation Management Tool (VAMT) Technical Reference](volume-activation/volume-activation-management-tool.md)
|
||||
- [User State Migration Tool (USMT) Technical Reference](usmt/usmt-technical-reference.md)
|
||||
|
@ -6,7 +6,7 @@ ms.author: frankroj
|
||||
author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.topic: article
|
||||
ms.date: 10/31/2022
|
||||
ms.date: 11/23/2022
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
|
||||
@ -55,15 +55,15 @@ USMT is a backup and restore tool that allows you to migrate user state, data, a
|
||||
|
||||
USMT includes several command-line tools, the most important of which are ScanState and LoadState:
|
||||
|
||||
- **ScanState.exe.** This tool performs the user-state backup.
|
||||
- **LoadState.exe.** This tool performs the user-state restore.
|
||||
- **UsmtUtils.exe.** This tool supplements the functionality in ScanState.exe and LoadState.exe.
|
||||
- **ScanState.exe**: This tool performs the user-state backup.
|
||||
- **LoadState.exe**: This tool performs the user-state restore.
|
||||
- **UsmtUtils.exe**: This tool supplements the functionality in ScanState.exe and LoadState.exe.
|
||||
|
||||
In addition to these tools, there are also XML templates that manage which data is migrated. You can customize the templates, or create new ones, to manage the backup process at a high level of detail. USMT uses the following terms for its templates:
|
||||
|
||||
- **Migration templates.** The default templates in USMT.
|
||||
- **Custom templates.** Custom templates that you create.
|
||||
- **Config template.** An optional template called Config.xml which you can use to exclude or include components in a migration without modifying the other standard XML templates.
|
||||
- **Migration templates**: The default templates in USMT.
|
||||
- **Custom templates**: Custom templates that you create.
|
||||
- **Config template**: An optional template called Config.xml which you can use to exclude or include components in a migration without modifying the other standard XML templates.
|
||||
|
||||

|
||||
|
||||
@ -73,60 +73,21 @@ USMT supports capturing data and settings from Windows Vista and later, and rest
|
||||
|
||||
By default USMT migrates many settings, most of which are related to the user profile but also to Control Panel configurations, file types, and more. The default templates that are used in Windows 10 deployments are MigUser.xml and MigApp.xml. These two default templates migrate the following data and settings:
|
||||
|
||||
- Folders from each profile, including those folders from user profiles, and shared and public profiles. For example, the My Documents, My Video, My Music, My Pictures, desktop files, Start menu, Quick Launch settings, and Favorites folders are migrated.
|
||||
- Specific file types.
|
||||
<details>
|
||||
<summary>USMT templates migrate the following file types:</summary>
|
||||
- Folders from each profile, including those folders from user profiles, and shared and public profiles. For example, the My Documents, My Video, My Music, My Pictures, desktop files, Start menu, Quick Launch settings, and Favorites folders are migrated.
|
||||
|
||||
- `.accdb`
|
||||
- `.ch3`
|
||||
- `.csv`
|
||||
- `.dif`
|
||||
- `.doc*`
|
||||
- `.dot*`
|
||||
- `.dqy`
|
||||
- `.iqy`
|
||||
- `.mcw`
|
||||
- `.mdb*`
|
||||
- `.mpp`
|
||||
- `.one*`
|
||||
- `.oqy`
|
||||
- `.or6`
|
||||
- `.pot*`
|
||||
- `.ppa`
|
||||
- `.pps*`
|
||||
- `.ppt*`
|
||||
- `.pre`
|
||||
- `.pst`
|
||||
- `.pub`
|
||||
- `.qdf`
|
||||
- `.qel`
|
||||
- `.qph`
|
||||
- `.qsd`
|
||||
- `.rqy`
|
||||
- `.rtf`
|
||||
- `.scd`
|
||||
- `.sh3`
|
||||
- `.slk`
|
||||
- `.txt`
|
||||
- `.vl*`
|
||||
- `.vsd`
|
||||
- `.wk*`
|
||||
- `.wpd`
|
||||
- `.wps`
|
||||
- `.wq1`
|
||||
- `.wri`
|
||||
- `.xl*`
|
||||
- `.xla`
|
||||
- `.xlb`
|
||||
- `.xls*`
|
||||
</details>
|
||||
- The following specific file types:
|
||||
|
||||
`.accdb`, `.ch3`, `.csv`, `.dif`, `.doc*`, `.dot*`, `.dqy`, `.iqy`, `.mcw`, `.mdb*`, `.mpp`, `.one*`, `.oqy`, `.or6`, `.pot*`, `.ppa`, `.pps*`, `.ppt*`, `.pre`, `.pst`, `.pub`, `.qdf`, `.qel`, `.qph`, `.qsd`, `.rqy`, `.rtf`, `.scd`, `.sh3`, `.slk`, `.txt`, `.vl*`, `.vsd`, `.wk*`, `.wpd`, `.wps`, `.wq1`, `.wri`, `.xl*`, `.xla`, `.xlb`, `.xls*`
|
||||
|
||||
> [!NOTE]
|
||||
> The asterisk (`*`) stands for zero or more characters.
|
||||
|
||||
> [!NOTE]
|
||||
> The OpenDocument extensions (`*.odt`, `*.odp`, `*.ods`) that Microsoft Office applications can use aren't migrated by default.
|
||||
|
||||
- Operating system component settings
|
||||
- Application settings
|
||||
- Operating system component settings
|
||||
|
||||
- Application settings
|
||||
|
||||
These settings are migrated by the default MigUser.xml and MigApp.xml templates. For more information, see [What does USMT migrate?](./usmt/usmt-what-does-usmt-migrate.md) For more general information on USMT, see [USMT technical reference](./usmt/usmt-reference.md).
|
||||
|
||||
@ -178,7 +139,7 @@ A machine booted with the Windows ADK default Windows PE boot image.
|
||||
|
||||
For more information on Windows PE, see [Windows PE (WinPE)](/windows-hardware/manufacture/desktop/winpe-intro).
|
||||
|
||||
## <a href="" id="sec07"></a>Windows Recovery Environment
|
||||
## Windows Recovery Environment
|
||||
|
||||
Windows Recovery Environment (Windows RE) is a diagnostics and recovery toolset included in Windows Vista and later operating systems. The latest version of Windows RE is based on Windows PE. You can also extend Windows RE and add your own tools if needed. If a Windows installation fails to start and Windows RE is installed, you'll see an automatic failover into Windows RE.
|
||||
|
||||
@ -204,9 +165,9 @@ In some cases, you need to modify TFTP Maximum Block Size settings for performan
|
||||
|
||||
Also, there are a few new features related to TFTP performance:
|
||||
|
||||
- **Scalable buffer management.** Allows buffering an entire file instead of a fixed-size buffer for each client, enabling different sessions to read from the same shared buffer.
|
||||
- **Scalable port management.** Provides the capability to service clients with shared UDP port allocation, increasing scalability.
|
||||
- **Variable-size transmission window (Variable Windows Extension).** Improves TFTP performance by allowing the client and server to determine the largest workable window size.
|
||||
- **Scalable buffer management**: Allows buffering an entire file instead of a fixed-size buffer for each client, enabling different sessions to read from the same shared buffer.
|
||||
- **Scalable port management**: Provides the capability to service clients with shared UDP port allocation, increasing scalability.
|
||||
- **Variable-size transmission window (Variable Windows Extension)**: Improves TFTP performance by allowing the client and server to determine the largest workable window size.
|
||||
|
||||

|
||||
|
||||
@ -214,7 +175,6 @@ TFTP changes are now easy to perform.
|
||||
|
||||
## Microsoft Deployment Toolkit
|
||||
|
||||
|
||||
MDT is a free deployment solution from Microsoft. It provides end-to-end guidance, best practices, and tools for planning, building, and deploying Windows operating systems. MDT builds on top of the core deployment tools in the Windows ADK by contributing guidance, reducing complexity, and adding critical features for an enterprise-ready deployment solution.
|
||||
|
||||
MDT has two main parts: the first is Lite Touch, which is a stand-alone deployment solution; the second is Zero Touch, which is an extension to Configuration Manager.
|
||||
@ -242,16 +202,20 @@ MDOP is a suite of technologies available to Software Assurance customers throug
|
||||
|
||||
The following components are included in the MDOP suite:
|
||||
|
||||
- **Microsoft Application Virtualization (App-V).** App-V 5.0 provides an integrated platform, more flexible virtualization, and powerful management for virtualized applications. With the release of App-V 5.0 SP3, you have support to run virtual applications on Windows 10.
|
||||
- **Microsoft Application Virtualization (App-V).** App-V 5.0 provides an integrated platform, more flexible virtualization, and powerful management for virtualized applications. With the release of App-V 5.0 SP3, you have support to run virtual applications on Windows 10.
|
||||
|
||||
- **Microsoft User Experience Virtualization (UE-V).** UE-V monitors the changes that are made by users to application settings and Windows operating system settings. The user settings are captured and centralized to a settings storage location. These settings can then be applied to the different computers that are accessed by the user, including desktop computers, laptop computers, and virtual desktop infrastructure (VDI) sessions.
|
||||
- **Microsoft User Experience Virtualization (UE-V).** UE-V monitors the changes that are made by users to application settings and Windows operating system settings. The user settings are captured and centralized to a settings storage location. These settings can then be applied to the different computers that are accessed by the user, including desktop computers, laptop computers, and virtual desktop infrastructure (VDI) sessions.
|
||||
|
||||
- **Microsoft Advanced Group Policy Management (AGPM).** AGPM enables advanced management of Group Policy objects by providing change control, offline editing, and role-based delegation.
|
||||
- **Microsoft Diagnostics and Recovery Toolset (DaRT).** DaRT provides additional tools that extend Windows RE to help you troubleshoot and repair your machines.
|
||||
- **Microsoft BitLocker Administration and Monitoring (MBAM).** MBAM is an administrator interface used to manage BitLocker drive encryption. It allows you to configure your enterprise with the correct BitLocker encryption policy options, and monitor compliance with these policies.
|
||||
- **Microsoft Advanced Group Policy Management (AGPM).** AGPM enables advanced management of Group Policy objects by providing change control, offline editing, and role-based delegation.
|
||||
- **Microsoft Diagnostics and Recovery Toolset (DaRT).** DaRT provides additional tools that extend Windows RE to help you troubleshoot and repair your machines.
|
||||
- **Microsoft BitLocker Administration and Monitoring (MBAM).** MBAM is an administrator interface used to manage BitLocker drive encryption. It allows you to configure your enterprise with the correct BitLocker encryption policy options, and monitor compliance with these policies.
|
||||
|
||||
For more information on the benefits of an MDOP subscription, see [Microsoft Desktop Optimization Pack](/microsoft-desktop-optimization-pack/).
|
||||
|
||||
<!--
|
||||
|
||||
REMOVING SECTION SINCE INTERNET EXPLORER IS NO LONGER SUPPORTED
|
||||
|
||||
## Internet Explorer Administration Kit 11
|
||||
|
||||
There has been a version of IEAK for every version of Internet Explorer since 3.0. It gives you the capability to customize Internet Explorer as you would like. The end result of using IEAK is an Internet Explorer package that can be deployed unattended. The wizard creates one .exe file and one .msi file.
|
||||
@ -262,6 +226,8 @@ The User Experience selection screen in IEAK 11.
|
||||
|
||||
To download IEAK 11, see the [Internet Explorer Administration Kit (IEAK) Information and Downloads](/internet-explorer/ie11-ieak/ieak-information-and-downloads) page.
|
||||
|
||||
-->
|
||||
|
||||
## Windows Server Update Services
|
||||
|
||||
WSUS is a server role in Windows Server 2012 R2 that enables you to maintain a local repository of Microsoft updates and then distribute them to machines on your network. WSUS offers approval control and reporting of update status in your environment.
|
||||
@ -274,32 +240,31 @@ For more information on WSUS, see the [Windows Server Update Services Overview](
|
||||
|
||||
## Unified Extensible Firmware Interface
|
||||
|
||||
|
||||
For many years, BIOS has been the industry standard for booting a PC. BIOS has served us well, but it's time to replace it with something better. **UEFI** is the replacement for BIOS, so it's important to understand the differences between BIOS and UEFI. In this section, you learn the major differences between the two and how they affect operating system deployment.
|
||||
|
||||
### Introduction to UEFI
|
||||
|
||||
BIOS has been in use for approximately 30 years. Even though it clearly has proven to work, it has some limitations, including:
|
||||
|
||||
- 16-bit code
|
||||
- 1-MB address space
|
||||
- Poor performance on ROM initialization
|
||||
- MBR maximum bootable disk size of 2.2 TB
|
||||
- 16-bit code
|
||||
- 1-MB address space
|
||||
- Poor performance on ROM initialization
|
||||
- MBR maximum bootable disk size of 2.2 TB
|
||||
|
||||
As the replacement to BIOS, UEFI has many features that Windows can and will use.
|
||||
|
||||
With UEFI, you can benefit from:
|
||||
|
||||
- **Support for large disks.** UEFI requires a GUID Partition Table (GPT) based disk, which means a limitation of roughly 16.8 million TB in disk size and more than 100 primary disks.
|
||||
- **Faster boot time.** UEFI doesn't use INT 13, and that improves boot time, especially when it comes to resuming from hibernate.
|
||||
- **Multicast deployment.** UEFI firmware can use multicast directly when it boots up. In WDS, MDT, and Configuration Manager scenarios, you need to first boot up a normal Windows PE in unicast and then switch into multicast. With UEFI, you can run multicast from the start.
|
||||
- **Compatibility with earlier BIOS.** Most of the UEFI implementations include a compatibility support module (CSM) that emulates BIOS.
|
||||
- **CPU-independent architecture.** Even if BIOS can run both 32-bit and 64-bit versions of firmware, all firmware device drivers on BIOS systems must also be 16-bit, and this affects performance. One of the reasons is the limitation in addressable memory, which is only 64 KB with BIOS.
|
||||
- **CPU-independent drivers.** On BIOS systems, PCI add-on cards must include a ROM that contains a separate driver for all supported CPU architectures. That isn't needed for UEFI because UEFI has the ability to use EFI Byte Code (EBC) images, which allow for a processor-independent device driver environment.
|
||||
- **Flexible pre-operating system environment.** UEFI can perform many functions for you. You just need an UEFI application, and you can perform diagnostics and automatic repairs, and call home to report errors.
|
||||
- **Secure boot.** Windows 8 and later can use the UEFI firmware validation process, called secure boot, which is defined in UEFI 2.3.1. Using this process, you can ensure that UEFI launches only a verified operating system loader and that malware can't switch the boot loader.
|
||||
- **Support for large disks.** UEFI requires a GUID Partition Table (GPT) based disk, which means a limitation of roughly 16.8 million TB in disk size and more than 100 primary disks.
|
||||
- **Faster boot time.** UEFI doesn't use INT 13, and that improves boot time, especially when it comes to resuming from hibernate.
|
||||
- **Multicast deployment.** UEFI firmware can use multicast directly when it boots up. In WDS, MDT, and Configuration Manager scenarios, you need to first boot up a normal Windows PE in unicast and then switch into multicast. With UEFI, you can run multicast from the start.
|
||||
- **Compatibility with earlier BIOS.** Most of the UEFI implementations include a compatibility support module (CSM) that emulates BIOS.
|
||||
- **CPU-independent architecture.** Even if BIOS can run both 32-bit and 64-bit versions of firmware, all firmware device drivers on BIOS systems must also be 16-bit, and this affects performance. One of the reasons is the limitation in addressable memory, which is only 64 KB with BIOS.
|
||||
- **CPU-independent drivers.** On BIOS systems, PCI add-on cards must include a ROM that contains a separate driver for all supported CPU architectures. That isn't needed for UEFI because UEFI has the ability to use EFI Byte Code (EBC) images, which allow for a processor-independent device driver environment.
|
||||
- **Flexible pre-operating system environment.** UEFI can perform many functions for you. You just need an UEFI application, and you can perform diagnostics and automatic repairs, and call home to report errors.
|
||||
- **Secure boot.** Windows 8 and later can use the UEFI firmware validation process, called secure boot, which is defined in UEFI 2.3.1. Using this process, you can ensure that UEFI launches only a verified operating system loader and that malware can't switch the boot loader.
|
||||
|
||||
### Versions
|
||||
### UEFI versions
|
||||
|
||||
UEFI Version 2.3.1B is the version required for Windows 8 and later logo compliance. Later versions have been released to address issues; a few machines may need to upgrade their firmware to fully support the UEFI implementation in Windows 8 and later.
|
||||
|
||||
@ -307,10 +272,10 @@ UEFI Version 2.3.1B is the version required for Windows 8 and later logo complia
|
||||
|
||||
In regard to UEFI, hardware is divided into four device classes:
|
||||
|
||||
- **Class 0 devices.** The device of this class is the UEFI definition for a BIOS, or non-UEFI, device.
|
||||
- **Class 1 devices.** The devices of this class behave like a standard BIOS machine, but they run EFI internally. They should be treated as normal BIOS-based machines. Class 1 devices use a CSM to emulate BIOS. These older devices are no longer manufactured.
|
||||
- **Class 2 devices.** The devices of this class have the capability to behave as a BIOS- or a UEFI-based machine, and the boot process or the configuration in the firmware/BIOS determines the mode. Class 2 devices use a CSM to emulate BIOS. These are the most common type of devices currently available.
|
||||
- **Class 3 devices.** The devices of this class are UEFI-only devices, which means you must run an operating system that supports only UEFI. Those operating systems include Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2. Windows 7 isn't supported on these class 3 devices. Class 3 devices don't have a CSM to emulate BIOS.
|
||||
- **Class 0 devices.** The device of this class is the UEFI definition for a BIOS, or non-UEFI, device.
|
||||
- **Class 1 devices.** The devices of this class behave like a standard BIOS machine, but they run EFI internally. They should be treated as normal BIOS-based machines. Class 1 devices use a CSM to emulate BIOS. These older devices are no longer manufactured.
|
||||
- **Class 2 devices.** The devices of this class have the capability to behave as a BIOS- or a UEFI-based machine, and the boot process or the configuration in the firmware/BIOS determines the mode. Class 2 devices use a CSM to emulate BIOS. These are the most common type of devices currently available.
|
||||
- **Class 3 devices.** The devices of this class are UEFI-only devices, which means you must run an operating system that supports only UEFI. Those operating systems include Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2. Windows 7 isn't supported on these class 3 devices. Class 3 devices don't have a CSM to emulate BIOS.
|
||||
|
||||
### Windows support for UEFI
|
||||
|
||||
@ -322,10 +287,10 @@ With UEFI 2.3.1, there are both x86 and x64 versions of UEFI. Windows 10 support
|
||||
|
||||
There are many things that affect operating system deployment as soon as you run on UEFI/EFI-based hardware. Here are considerations to keep in mind when working with UEFI devices:
|
||||
|
||||
- Switching from BIOS to UEFI in the hardware is easy, but you also need to reinstall the operating system because you need to switch from MBR/NTFS to GPT/FAT32 and NTFS.
|
||||
- When you deploy to a Class 2 device, make sure the boot option you select matches the setting you want to have. It's common for old machines to have several boot options for BIOS but only a few for UEFI, or vice versa.
|
||||
- When deploying from media, remember the media has to be FAT32 for UEFI, and FAT32 has a file-size limitation of 4 GB.
|
||||
- UEFI doesn't support cross-platform booting; therefore, you need to have the correct boot media (32-bit or 64-bit).
|
||||
- Switching from BIOS to UEFI in the hardware is easy, but you also need to reinstall the operating system because you need to switch from MBR/NTFS to GPT/FAT32 and NTFS.
|
||||
- When you deploy to a Class 2 device, make sure the boot option you select matches the setting you want to have. It's common for old machines to have several boot options for BIOS but only a few for UEFI, or vice versa.
|
||||
- When deploying from media, remember the media has to be FAT32 for UEFI, and FAT32 has a file-size limitation of 4 GB.
|
||||
- UEFI doesn't support cross-platform booting; therefore, you need to have the correct boot media (32-bit or 64-bit).
|
||||
|
||||
For more information on UEFI, see the [UEFI firmware](/previous-versions/windows/it-pro/windows-8.1-and-8/hh824898(v=win.10)) overview and related resources.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user