Merge branch 'main' into ap-license-update
@ -62,16 +62,11 @@
|
||||
- name: Features removed or planned for replacement
|
||||
items:
|
||||
- name: Windows client features lifecycle
|
||||
href: planning/features-lifecycle.md
|
||||
- name: Features we're no longer developing
|
||||
items:
|
||||
- name: Windows deprecated features
|
||||
href: planning/windows-10-deprecated-features.md
|
||||
- name: Features we removed
|
||||
items:
|
||||
- name: Windows features removed
|
||||
href: planning/windows-10-removed-features.md
|
||||
|
||||
href: /windows/whats-new/feature-lifecycle?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Deprecated features
|
||||
href: /windows/whats-new/deprecated-features?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Removed features
|
||||
href: /windows/whats-new/removed-features?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Prepare
|
||||
items:
|
||||
- name: Prepare for Windows 11
|
||||
@ -182,129 +177,135 @@
|
||||
href: update/waas-wufb-group-policy.md
|
||||
- name: 'Walkthrough: use Intune to configure Windows Update for Business'
|
||||
href: update/deploy-updates-intune.md
|
||||
- name: Monitor Windows client updates
|
||||
- name: Monitor
|
||||
items:
|
||||
- name: Windows Update for Business reports
|
||||
items:
|
||||
- name: Windows Update for Business reports overview
|
||||
href: update/wufb-reports-overview.md
|
||||
- name: Enable Windows Update for Business reports
|
||||
items:
|
||||
- name: Windows Update for Business reports prerequisites
|
||||
href: update/wufb-reports-prerequisites.md
|
||||
- name: Enable Windows Update for Business reports
|
||||
href: update/wufb-reports-enable.md
|
||||
- name: Configure clients with a script
|
||||
href: update/wufb-reports-configuration-script.md
|
||||
- name: Configure clients manually
|
||||
href: update/wufb-reports-configuration-manual.md
|
||||
- name: Configure clients with Microsoft Intune
|
||||
href: update/wufb-reports-configuration-intune.md
|
||||
- name: Use Windows Update for Business reports
|
||||
items:
|
||||
- name: Monitor with Update Compliance (preview version)
|
||||
items:
|
||||
- name: Update Compliance overview
|
||||
href: update/update-compliance-v2-overview.md
|
||||
- name: Enable Update Compliance (preview)
|
||||
items:
|
||||
- name: Update Compliance prerequisites
|
||||
href: update/update-compliance-v2-prerequisites.md
|
||||
- name: Enable the Update Compliance solution
|
||||
href: update/update-compliance-v2-enable.md
|
||||
- name: Configure clients with a script
|
||||
href: update/update-compliance-v2-configuration-script.md
|
||||
- name: Configure clients manually
|
||||
href: update/update-compliance-v2-configuration-manual.md
|
||||
- name: Configure clients with Microsoft Endpoint Manager
|
||||
href: update/update-compliance-v2-configuration-mem.md
|
||||
- name: Use Update Compliance (preview)
|
||||
items:
|
||||
- name: Update Compliance workbook
|
||||
href: update/update-compliance-v2-workbook.md
|
||||
- name: Software updates in the Microsoft admin center (preview)
|
||||
href: update/update-status-admin-center.md
|
||||
- name: Use Update Compliance data
|
||||
href: update/update-compliance-v2-use.md
|
||||
- name: Feedback, support, and troubleshooting
|
||||
href: update/update-compliance-v2-help.md
|
||||
- name: Update Compliance schema reference (preview)
|
||||
items:
|
||||
- name: Update Compliance schema reference
|
||||
href: update/update-compliance-v2-schema.md
|
||||
- name: UCClient
|
||||
href: update/update-compliance-v2-schema-ucclient.md
|
||||
- name: UCClientReadinessStatus
|
||||
href: update/update-compliance-v2-schema-ucclientreadinessstatus.md
|
||||
- name: UCClientUpdateStatus
|
||||
href: update/update-compliance-v2-schema-ucclientupdatestatus.md
|
||||
- name: UCDeviceAlert
|
||||
href: update/update-compliance-v2-schema-ucdevicealert.md
|
||||
- name: UCServiceUpdateStatus
|
||||
href: update/update-compliance-v2-schema-ucserviceupdatestatus.md
|
||||
- name: UCUpdateAlert
|
||||
href: update/update-compliance-v2-schema-ucupdatealert.md
|
||||
- name: Monitor updates with Update Compliance
|
||||
href: update/update-compliance-monitor.md
|
||||
items:
|
||||
- name: Get started
|
||||
items:
|
||||
- name: Get started with Update Compliance
|
||||
href: update/update-compliance-get-started.md
|
||||
- name: Update Compliance configuration script
|
||||
href: update/update-compliance-configuration-script.md
|
||||
- name: Manually configuring devices for Update Compliance
|
||||
href: update/update-compliance-configuration-manual.md
|
||||
- name: Configuring devices for Update Compliance in Microsoft Endpoint Manager
|
||||
href: update/update-compliance-configuration-mem.md
|
||||
- name: Update Compliance monitoring
|
||||
items:
|
||||
- name: Use Update Compliance
|
||||
href: update/update-compliance-using.md
|
||||
- name: Need attention report
|
||||
href: update/update-compliance-need-attention.md
|
||||
- name: Security update status report
|
||||
href: update/update-compliance-security-update-status.md
|
||||
- name: Feature update status report
|
||||
href: update/update-compliance-feature-update-status.md
|
||||
- name: Safeguard holds report
|
||||
href: update/update-compliance-safeguard-holds.md
|
||||
- name: Delivery Optimization in Update Compliance
|
||||
href: update/update-compliance-delivery-optimization.md
|
||||
- name: Data handling and privacy in Update Compliance
|
||||
href: update/update-compliance-privacy.md
|
||||
- name: Schema reference
|
||||
items:
|
||||
- name: Update Compliance schema reference
|
||||
href: update/update-compliance-schema.md
|
||||
- name: WaaSUpdateStatus
|
||||
href: update/update-compliance-schema-waasupdatestatus.md
|
||||
- name: WaaSInsiderStatus
|
||||
href: update/update-compliance-schema-waasinsiderstatus.md
|
||||
- name: WaaSDeploymentStatus
|
||||
href: update/update-compliance-schema-waasdeploymentstatus.md
|
||||
- name: WUDOStatus
|
||||
href: update/update-compliance-schema-wudostatus.md
|
||||
- name: WUDOAggregatedStatus
|
||||
href: update/update-compliance-schema-wudoaggregatedstatus.md
|
||||
- name: Troubleshooting
|
||||
- name: Windows Update for Business reports workbook
|
||||
href: update/wufb-reports-workbook.md
|
||||
- name: Software updates in the Microsoft 365 admin center
|
||||
href: update/wufb-reports-admin-center.md
|
||||
- name: Use Windows Update for Business reports data
|
||||
href: update/wufb-reports-use.md
|
||||
- name: Feedback, support, and troubleshooting
|
||||
href: update/wufb-reports-help.md
|
||||
- name: Windows Update for Business reports schema reference
|
||||
items:
|
||||
- name: Resolve upgrade errors
|
||||
items:
|
||||
- name: Resolve Windows client upgrade errors
|
||||
href: upgrade/resolve-windows-10-upgrade-errors.md
|
||||
- name: Quick fixes
|
||||
href: /troubleshoot/windows-client/deployment/windows-10-upgrade-quick-fixes?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: SetupDiag
|
||||
href: upgrade/setupdiag.md
|
||||
- name: Troubleshooting upgrade errors
|
||||
href: /troubleshoot/windows-client/deployment/windows-10-upgrade-issues-troubleshooting?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Windows error reporting
|
||||
href: upgrade/windows-error-reporting.md
|
||||
- name: Upgrade error codes
|
||||
href: /troubleshoot/windows-client/deployment/windows-10-upgrade-error-codes?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Log files
|
||||
href: upgrade/log-files.md
|
||||
- name: Resolution procedures
|
||||
href: /troubleshoot/windows-client/deployment/windows-10-upgrade-resolution-procedures?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Submit Windows client upgrade errors
|
||||
href: upgrade/submit-errors.md
|
||||
- name: Troubleshoot Windows Update
|
||||
items:
|
||||
- name: How to troubleshoot Windows Update
|
||||
href: /troubleshoot/windows-client/deployment/windows-update-issues-troubleshooting?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Opt out of safeguard holds
|
||||
href: update/safeguard-opt-out.md
|
||||
- name: Determine the source of Windows Updates
|
||||
href: ./update/how-windows-update-works.md
|
||||
- name: Common Windows Update errors
|
||||
href: /troubleshoot/windows-client/deployment/common-windows-update-errors?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Windows Update error code reference
|
||||
href: update/windows-update-error-reference.md
|
||||
- name: Troubleshoot the Windows Update for Business deployment service
|
||||
href: update/deployment-service-troubleshoot.md
|
||||
- name: Windows Update for Business reports schema reference
|
||||
href: update/wufb-reports-schema.md
|
||||
- name: UCClient
|
||||
href: update/wufb-reports-schema-ucclient.md
|
||||
- name: UCClientReadinessStatus
|
||||
href: update/wufb-reports-schema-ucclientreadinessstatus.md
|
||||
- name: UCClientUpdateStatus
|
||||
href: update/wufb-reports-schema-ucclientupdatestatus.md
|
||||
- name: UCDeviceAlert
|
||||
href: update/wufb-reports-schema-ucdevicealert.md
|
||||
- name: UCDOAggregatedStatus
|
||||
href: update/wufb-reports-schema-ucdoaggregatedstatus.md
|
||||
- name: UCDOStatus
|
||||
href: update/wufb-reports-schema-ucdostatus.md
|
||||
- name: UCServiceUpdateStatus
|
||||
href: update/wufb-reports-schema-ucserviceupdatestatus.md
|
||||
- name: UCUpdateAlert
|
||||
href: update/wufb-reports-schema-ucupdatealert.md
|
||||
- name: Monitor updates with Update Compliance
|
||||
href: update/update-compliance-monitor.md
|
||||
items:
|
||||
- name: Get started
|
||||
items:
|
||||
- name: Get started with Update Compliance
|
||||
href: update/update-compliance-get-started.md
|
||||
- name: Update Compliance configuration script
|
||||
href: update/update-compliance-configuration-script.md
|
||||
- name: Manually configuring devices for Update Compliance
|
||||
href: update/update-compliance-configuration-manual.md
|
||||
- name: Configuring devices for Update Compliance in Microsoft Intune
|
||||
href: update/update-compliance-configuration-mem.md
|
||||
- name: Update Compliance monitoring
|
||||
items:
|
||||
- name: Use Update Compliance
|
||||
href: update/update-compliance-using.md
|
||||
- name: Need attention report
|
||||
href: update/update-compliance-need-attention.md
|
||||
- name: Security update status report
|
||||
href: update/update-compliance-security-update-status.md
|
||||
- name: Feature update status report
|
||||
href: update/update-compliance-feature-update-status.md
|
||||
- name: Safeguard holds report
|
||||
href: update/update-compliance-safeguard-holds.md
|
||||
- name: Delivery Optimization in Update Compliance
|
||||
href: update/update-compliance-delivery-optimization.md
|
||||
- name: Data handling and privacy in Update Compliance
|
||||
href: update/update-compliance-privacy.md
|
||||
- name: Schema reference
|
||||
items:
|
||||
- name: Update Compliance schema reference
|
||||
href: update/update-compliance-schema.md
|
||||
- name: WaaSUpdateStatus
|
||||
href: update/update-compliance-schema-waasupdatestatus.md
|
||||
- name: WaaSInsiderStatus
|
||||
href: update/update-compliance-schema-waasinsiderstatus.md
|
||||
- name: WaaSDeploymentStatus
|
||||
href: update/update-compliance-schema-waasdeploymentstatus.md
|
||||
- name: WUDOStatus
|
||||
href: update/update-compliance-schema-wudostatus.md
|
||||
- name: WUDOAggregatedStatus
|
||||
href: update/update-compliance-schema-wudoaggregatedstatus.md
|
||||
- name: Troubleshooting
|
||||
items:
|
||||
- name: Resolve upgrade errors
|
||||
items:
|
||||
- name: Resolve Windows client upgrade errors
|
||||
href: upgrade/resolve-windows-10-upgrade-errors.md
|
||||
- name: Quick fixes
|
||||
href: /troubleshoot/windows-client/deployment/windows-10-upgrade-quick-fixes?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: SetupDiag
|
||||
href: upgrade/setupdiag.md
|
||||
- name: Troubleshooting upgrade errors
|
||||
href: /troubleshoot/windows-client/deployment/windows-10-upgrade-issues-troubleshooting?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Windows error reporting
|
||||
href: upgrade/windows-error-reporting.md
|
||||
- name: Upgrade error codes
|
||||
href: /troubleshoot/windows-client/deployment/windows-10-upgrade-error-codes?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Log files
|
||||
href: upgrade/log-files.md
|
||||
- name: Resolution procedures
|
||||
href: /troubleshoot/windows-client/deployment/windows-10-upgrade-resolution-procedures?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Submit Windows client upgrade errors
|
||||
href: upgrade/submit-errors.md
|
||||
- name: Troubleshoot Windows Update
|
||||
items:
|
||||
- name: How to troubleshoot Windows Update
|
||||
href: /troubleshoot/windows-client/deployment/windows-update-issues-troubleshooting?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Opt out of safeguard holds
|
||||
href: update/safeguard-opt-out.md
|
||||
- name: Determine the source of Windows Updates
|
||||
href: ./update/how-windows-update-works.md
|
||||
- name: Windows Update security
|
||||
href: ./update/windows-update-security.md
|
||||
- name: Common Windows Update errors
|
||||
href: /troubleshoot/windows-client/deployment/common-windows-update-errors?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Windows Update error code reference
|
||||
href: update/windows-update-error-reference.md
|
||||
- name: Troubleshoot the Windows Update for Business deployment service
|
||||
href: update/deployment-service-troubleshoot.md
|
||||
|
||||
- name: Reference
|
||||
items:
|
||||
@ -434,7 +435,7 @@
|
||||
|
||||
- name: User State Migration Tool (USMT) technical reference
|
||||
items:
|
||||
- name: USMT overview topics
|
||||
- name: USMT overview articles
|
||||
items:
|
||||
- name: USMT overview
|
||||
href: usmt/usmt-overview.md
|
||||
@ -442,7 +443,7 @@
|
||||
href: usmt/getting-started-with-the-user-state-migration-tool.md
|
||||
- name: Windows upgrade and migration considerations
|
||||
href: upgrade/windows-upgrade-and-migration-considerations.md
|
||||
- name: USMT How-to topics
|
||||
- name: USMT How-to articles
|
||||
items:
|
||||
- name: Exclude Files and Settings
|
||||
href: usmt/usmt-exclude-files-and-settings.md
|
||||
@ -460,18 +461,6 @@
|
||||
href: usmt/usmt-reroute-files-and-settings.md
|
||||
- name: Verify the Condition of a Compressed Migration Store
|
||||
href: usmt/verify-the-condition-of-a-compressed-migration-store.md
|
||||
- name: USMT Troubleshooting
|
||||
href: usmt/usmt-troubleshooting.md
|
||||
- name: Common Issues
|
||||
href: usmt/usmt-common-issues.md
|
||||
- name: Frequently Asked Questions
|
||||
href: usmt/usmt-faq.yml
|
||||
- name: Log Files
|
||||
href: usmt/usmt-log-files.md
|
||||
- name: Return Codes
|
||||
href: usmt/usmt-return-codes.md
|
||||
- name: USMT Resources
|
||||
href: usmt/usmt-resources.md
|
||||
|
||||
- name: USMT Reference
|
||||
items:
|
||||
@ -539,7 +528,22 @@
|
||||
href: usmt/usmt-xml-elements-library.md
|
||||
- name: Offline Migration Reference
|
||||
href: usmt/offline-migration-reference.md
|
||||
|
||||
|
||||
- name: Troubleshoot USMT
|
||||
items:
|
||||
- name: USMT Troubleshooting
|
||||
href: usmt/usmt-troubleshooting.md
|
||||
- name: USMT Common Issues
|
||||
href: /troubleshoot/windows-client/deployment/usmt-common-issues
|
||||
- name: USMT Frequently Asked Questions
|
||||
href: usmt/usmt-faq.yml
|
||||
- name: USMT Log Files
|
||||
href: usmt/usmt-log-files.md
|
||||
- name: USMT Return Codes
|
||||
href: /troubleshoot/windows-client/deployment/usmt-return-codes
|
||||
- name: USMT Resources
|
||||
href: usmt/usmt-resources.md
|
||||
|
||||
- name: Application Compatibility Toolkit (ACT) Technical Reference
|
||||
items:
|
||||
- name: SUA User's Guide
|
||||
|
@ -1,19 +1,20 @@
|
||||
---
|
||||
title: Windows Autopilot EULA dismissal – important information
|
||||
description: A notice about EULA dismissal through Windows Autopilot
|
||||
ms.prod: w10
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 08/22/2017
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
manager: dougeby
|
||||
ms.date: 11/23/2022
|
||||
author: frankroj
|
||||
ms.author: frankroj
|
||||
manager: aaroncz
|
||||
ROBOTS: NOINDEX
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
# Windows Autopilot EULA dismissal – important information
|
||||
|
||||
>[!IMPORTANT]
|
||||
>The information below isn't the EULA. It is a notice of awareness to the administrator that's configuring to skip End User License Agreement (EULA) during the OOBE (Out-of-Box Experience).
|
||||
> [!IMPORTANT]
|
||||
> The information below isn't the EULA. It is a notice of awareness to the administrator that's configuring to skip End User License Agreement (EULA) during the OOBE (Out-of-Box Experience).
|
||||
|
||||
Using this tool allows you to configure individual installations of Windows on devices managed by your organization. You may choose to suppress or hide certain set-up screens that are normally presented to users when setting up Windows, including the EULA acceptance screen.
|
||||
|
||||
|
@ -1,79 +1,91 @@
|
||||
---
|
||||
title: Add Microsoft Store for Business applications to a Windows 10 image
|
||||
description: This article describes the correct way to add Microsoft Store for Business applications to a Windows 10 image.
|
||||
ms.prod: w10
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
author: frankroj
|
||||
ms.author: frankroj
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.date: 11/23/2022
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
|
||||
# Add Microsoft Store for Business applications to a Windows 10 image
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
This topic describes the correct way to add Microsoft Store for Business applications to a Windows 10 image. This will enable you to deploy Windows 10 with pre-installed Microsoft Store for Business apps.
|
||||
This article describes the correct way to add Microsoft Store for Business applications to a Windows 10 image. Adding Microsoft Store for Business applications to a Windows 10 image will enable you to deploy Windows 10 with pre-installed Microsoft Store for Business apps.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>In order for Microsoft Store for Business applications to persist after image deployment, these applications need to be pinned to Start prior to image deployment.
|
||||
> [!IMPORTANT]
|
||||
> In order for Microsoft Store for Business applications to persist after image deployment, these applications need to be pinned to Start prior to image deployment.
|
||||
|
||||
## Prerequisites
|
||||
|
||||
* [Windows Assessment and Deployment Kit (Windows ADK)](windows-adk-scenarios-for-it-pros.md) for the tools required to mount and edit Windows images.
|
||||
- [Windows Assessment and Deployment Kit (Windows ADK)](windows-adk-scenarios-for-it-pros.md) for the tools required to mount and edit Windows images.
|
||||
|
||||
* Download an offline signed app package and license of the application you would like to add through [Microsoft Store for Business](/microsoft-store/distribute-offline-apps#download-an-offline-licensed-app).
|
||||
* A Windows Image. For instructions on image creation, see [Create a Windows 10 reference image](deploy-windows-mdt/create-a-windows-10-reference-image.md).
|
||||
- Download an offline signed app package and license of the application you would like to add through [Microsoft Store for Business](/microsoft-store/distribute-offline-apps#download-an-offline-licensed-app).
|
||||
- A Windows Image. For instructions on image creation, see [Create a Windows 10 reference image](deploy-windows-mdt/create-a-windows-10-reference-image.md).
|
||||
|
||||
>[!NOTE]
|
||||
> [!NOTE]
|
||||
> If you'd like to add an internal LOB Microsoft Store application, please follow the instructions on **[Sideload line of business (LOB) apps in Windows client devices](/windows/application-management/sideload-apps-in-windows-10)**.
|
||||
|
||||
## Adding a Store application to your image
|
||||
|
||||
On a machine where your image file is accessible:
|
||||
|
||||
1. Open Windows PowerShell with administrator privileges.
|
||||
2. Mount the image. At the Windows PowerShell prompt, type:
|
||||
|
||||
2. Mount the image. At the Windows PowerShell prompt, enter:
|
||||
`Mount-WindowsImage -ImagePath c:\images\myimage.wim -Index 1 -Path C:\test`
|
||||
3. Use the Add-AppxProvisionedPackage cmdlet in Windows PowerShell to preinstall the app. Use the /PackagePath option to specify the location of the Store package and /LicensePath to specify the location of the license .xml file. In Windows PowerShell, type:
|
||||
|
||||
3. Use the Add-AppxProvisionedPackage cmdlet in Windows PowerShell to preinstall the app. Use the /PackagePath option to specify the location of the Store package and /LicensePath to specify the location of the license .xml file. In Windows PowerShell, enter:
|
||||
`Add-AppxProvisionedPackage -Path C:\test -PackagePath C:\downloads\appxpackage -LicensePath C:\downloads\appxpackage\license.xml`
|
||||
|
||||
>[!NOTE]
|
||||
>Paths and file names are examples. Use your paths and file names where appropriate.
|
||||
> [!NOTE]
|
||||
> Paths and file names are examples. Use your paths and file names where appropriate.
|
||||
>
|
||||
>Do not dismount the image, as you will return to it later.
|
||||
> Do not dismount the image, as you will return to it later.
|
||||
|
||||
## Editing the Start Layout
|
||||
|
||||
In order for Microsoft Store for Business applications to persist after image deployment, these applications need to be pinned to Start prior to image deployment.
|
||||
|
||||
On a test machine:
|
||||
|
||||
1. **Install the Microsoft Store for Business application you previously added** to your image.
|
||||
|
||||
2. **Pin these apps to the Start screen**, by typing the name of the app, right-clicking and selecting **Pin to Start**.
|
||||
|
||||
3. Open Windows PowerShell with administrator privileges.
|
||||
|
||||
4. Use `Export-StartLayout -path <path><file name>.xml` where *\<path>\<file name>* is the path and name of the xml file your will later import into your Windows Image.
|
||||
|
||||
5. Copy the XML file you created to a location accessible by the machine you previously used to add Store applications to your image.
|
||||
|
||||
Now, on the machine where your image file is accessible:
|
||||
1. Import the Start layout. At the Windows PowerShell prompt, type:
|
||||
|
||||
1. Import the Start layout. At the Windows PowerShell prompt, enter:
|
||||
`Import-StartLayout -LayoutPath "<path><file name>.xml" -MountPath "C:\test\"`
|
||||
2. Save changes and dismount the image. At the Windows PowerShell prompt, type:
|
||||
|
||||
2. Save changes and dismount the image. At the Windows PowerShell prompt, enter:
|
||||
`Dismount-WindowsImage -Path c:\test -Save`
|
||||
|
||||
>[!NOTE]
|
||||
>Paths and file names are examples. Use your paths and file names where appropriate.
|
||||
> [!NOTE]
|
||||
> Paths and file names are examples. Use your paths and file names where appropriate.
|
||||
>
|
||||
>For more information on Start customization see [Windows 10 Start Layout Customization](/archive/blogs/deploymentguys/windows-10-start-layout-customization)
|
||||
> For more information on Start customization, see [Windows 10 Start Layout Customization](/archive/blogs/deploymentguys/windows-10-start-layout-customization)
|
||||
|
||||
## Related articles
|
||||
|
||||
## Related topics
|
||||
* [Customize and export Start layout](/windows/configuration/customize-and-export-start-layout)
|
||||
* [Export-StartLayout](/powershell/module/startlayout/export-startlayout)
|
||||
* [Import-StartLayout](/powershell/module/startlayout/import-startlayout)
|
||||
* [Sideload line of business (LOB) apps in Windows client devices](/windows/application-management/sideload-apps-in-windows-10)
|
||||
* [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
|
||||
* [Deploy Windows 10 with the Microsoft Deployment Toolkit](./deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md)
|
||||
* [Windows Assessment and Deployment Kit (Windows ADK)](windows-adk-scenarios-for-it-pros.md)
|
||||
- [Customize and export Start layout](/windows/configuration/customize-and-export-start-layout)
|
||||
- [Export-StartLayout](/powershell/module/startlayout/export-startlayout)
|
||||
- [Import-StartLayout](/powershell/module/startlayout/import-startlayout)
|
||||
- [Sideload line of business (LOB) apps in Windows client devices](/windows/application-management/sideload-apps-in-windows-10)
|
||||
- [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
|
||||
- [Deploy Windows 10 with the Microsoft Deployment Toolkit](./deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md)
|
||||
- [Windows Assessment and Deployment Kit (Windows ADK)](windows-adk-scenarios-for-it-pros.md)
|
||||
|
@ -9,4 +9,16 @@ items:
|
||||
items:
|
||||
- name: Deployment
|
||||
tocHref: /troubleshoot/windows-client/deployment/
|
||||
topicHref: /windows/deployment/
|
||||
|
||||
- name: Learn
|
||||
tocHref: /
|
||||
topicHref: /
|
||||
items:
|
||||
- name: Windows
|
||||
tocHref: /windows/
|
||||
topicHref: /windows/resources/
|
||||
items:
|
||||
- name: Deployment
|
||||
tocHref: /windows/whats-new
|
||||
topicHref: /windows/deployment/
|
@ -1,27 +1,28 @@
|
||||
---
|
||||
title: Configure a PXE server to load Windows PE (Windows 10)
|
||||
description: This topic describes how to configure a PXE server to load Windows PE so that it can be used with an image file to install Windows 10 from the network.
|
||||
ms.prod: w10
|
||||
description: This article describes how to configure a PXE server to load Windows PE so that it can be used with an image file to install Windows 10 from the network.
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
author: frankroj
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.collection: highpri
|
||||
ms.date: 11/23/2022
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
|
||||
# Configure a PXE server to load Windows PE
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
This walkthrough describes how to configure a PXE server to load Windows PE by booting a client computer from the network. Using the Windows PE tools and a Windows 10 image file, you can install Windows 10 from the network.
|
||||
This walkthrough describes how to configure a PXE server to load Windows PE by booting a client computer from the network. Using the Windows PE tools and a Windows 10 image file, you can install Windows 10 from the network.
|
||||
|
||||
## Prerequisites
|
||||
|
||||
- A deployment computer: A computer with the [Windows Assessment and Deployment Kit](/windows-hardware/get-started/adk-install) (Windows ADK) and the Windows PE add-on with ADK installed.
|
||||
- A deployment computer: A computer with the [Windows Assessment and Deployment Kit](/windows-hardware/get-started/adk-install) (Windows ADK) and the Windows PE add-on with ADK installed.
|
||||
- A DHCP server: A DHCP server or DHCP proxy configured to respond to PXE client requests is required.
|
||||
- A PXE server: A server running the TFTP service that can host Windows PE boot files that the client will download.
|
||||
- A file server: A server hosting a network file share.
|
||||
@ -30,113 +31,128 @@ All four of the roles specified above can be hosted on the same computer or each
|
||||
|
||||
## Step 1: Copy Windows PE source files
|
||||
|
||||
1. On the deployment computer, click **Start**, and type **deployment**.
|
||||
1. On the deployment computer, select **Start**, and type **deployment**.
|
||||
|
||||
2. Right-click **Deployment and Imaging Tools Environment** and then click **Run as administrator**. The Deployment and Imaging Tools Environment shortcut opens a Command Prompt window and automatically sets environment variables to point to all the necessary tools.
|
||||
2. Right-click **Deployment and Imaging Tools Environment** and then select **Run as administrator**. The Deployment and Imaging Tools Environment shortcut opens a Command Prompt window and automatically sets environment variables to point to all the necessary tools.
|
||||
|
||||
3. Run the following command to copy the base Windows PE files into a new folder. The script requires two arguments: hardware architecture and destination location. The value of **<architecture>** can be **x86**, **amd64**, or **arm** and **<destination>** is a path to a local directory. If the directory doesn't already exist, it will be created.
|
||||
3. Run the following command to copy the base Windows PE files into a new folder. The script requires two arguments: hardware architecture and destination location. The value of **<architecture>** can be **x86**, **amd64**, or **arm** and **<destination>** is a path to a local directory. If the directory doesn't already exist, it will be created.
|
||||
|
||||
```
|
||||
```cmd
|
||||
copype.cmd <architecture> <destination>
|
||||
```
|
||||
|
||||
For example, the following command copies **amd64** architecture files to the **C:\winpe_amd64** directory:
|
||||
|
||||
```
|
||||
```cmd
|
||||
copype.cmd amd64 C:\winpe_amd64
|
||||
```
|
||||
|
||||
The script creates the destination directory structure and copies all the necessary files for that architecture. In the previous example, the following directories are created:
|
||||
|
||||
```
|
||||
|
||||
```cmd
|
||||
C:\winpe_amd64
|
||||
C:\winpe_amd64\fwfiles
|
||||
C:\winpe_amd64\media
|
||||
C:\winpe_amd64\mount
|
||||
```
|
||||
4. Mount the base Windows PE image (winpe.wim) to the \mount directory using the DISM tool. Mounting an image file unpacks the file contents into a folder so that you can make changes directly or by using tools such as DISM. See the following example.
|
||||
|
||||
4. Mount the base Windows PE image (winpe.wim) to the \mount directory using the DISM tool. Mounting an image file unpacks the file contents into a folder so that you can make changes directly or by using tools such as DISM. See the following example.
|
||||
|
||||
```cmd
|
||||
dism.exe /mount-image /imagefile:c:\winpe_amd64\media\sources\boot.wim /index:1 /mountdir:C:\winpe_amd64\mount
|
||||
```
|
||||
Dism /mount-image /imagefile:c:\winpe_amd64\media\sources\boot.wim /index:1 /mountdir:C:\winpe_amd64\mount
|
||||
```
|
||||
Verify that "The operation completed successfully" is displayed. Note: To view currently mounted images, type **dism /get-MountedWiminfo**.
|
||||
|
||||
Verify that the message **The operation completed successfully** is displayed.
|
||||
|
||||
> [!NOTE]
|
||||
> To view currently mounted images, enter **`dism.exe /get-MountedWiminfo`**.
|
||||
|
||||
5. Map a network share to the root TFTP directory on the PXE/TFTP server and create a \Boot folder. Consult your TFTP server documentation to determine the root TFTP server directory, then enable sharing for this directory, and verify it can be accessed on the network. In the following example, the PXE server name is PXE-1 and the TFTP root directory is shared using a network path of **\\\PXE-1\TFTPRoot**:
|
||||
|
||||
```
|
||||
net use y: \\PXE-1\TFTPRoot
|
||||
```cmd
|
||||
net.exe use y: \\PXE-1\TFTPRoot
|
||||
y:
|
||||
md Boot
|
||||
```
|
||||
|
||||
6. Copy the PXE boot files from the mounted directory to the \boot folder. For example:
|
||||
|
||||
```
|
||||
```cmd
|
||||
copy c:\winpe_amd64\mount\windows\boot\pxe\*.* y:\Boot
|
||||
```
|
||||
7. Copy the boot.sdi file to the PXE/TFTP server.
|
||||
|
||||
```
|
||||
7. Copy the boot.sdi file to the PXE/TFTP server.
|
||||
|
||||
```cmd
|
||||
copy C:\winpe_amd64\media\boot\boot.sdi y:\Boot
|
||||
```
|
||||
8. Copy the bootable Windows PE image (boot.wim) to the \boot folder.
|
||||
|
||||
```
|
||||
8. Copy the bootable Windows PE image (boot.wim) to the \boot folder.
|
||||
|
||||
```cmd
|
||||
copy C:\winpe_amd64\media\sources\boot.wim y:\Boot
|
||||
```
|
||||
9. (Optional) Copy true type fonts to the \boot folder
|
||||
|
||||
```
|
||||
9. (Optional) Copy TrueType fonts to the \boot folder
|
||||
|
||||
```cmd
|
||||
copy C:\winpe_amd64\media\Boot\Fonts y:\Boot\Fonts
|
||||
```
|
||||
|
||||
## Step 2: Configure boot settings and copy the BCD file
|
||||
|
||||
1. Create a BCD store using bcdedit.exe:
|
||||
1. Create a BCD store using bcdedit.exe:
|
||||
|
||||
```cmd
|
||||
bcdedit.exe /createstore c:\BCD
|
||||
```
|
||||
bcdedit /createstore c:\BCD
|
||||
```
|
||||
2. Configure RAMDISK settings:
|
||||
|
||||
2. Configure RAMDISK settings:
|
||||
|
||||
```cmd
|
||||
bcdedit.exe /store c:\BCD /create {ramdiskoptions} /d "Ramdisk options"
|
||||
bcdedit.exe /store c:\BCD /set {ramdiskoptions} ramdisksdidevice boot
|
||||
bcdedit.exe /store c:\BCD /set {ramdiskoptions} ramdisksdipath \Boot\boot.sdi
|
||||
bcdedit.exe /store c:\BCD /create /d "winpe boot image" /application osloader
|
||||
```
|
||||
bcdedit /store c:\BCD /create {ramdiskoptions} /d "Ramdisk options"
|
||||
bcdedit /store c:\BCD /set {ramdiskoptions} ramdisksdidevice boot
|
||||
bcdedit /store c:\BCD /set {ramdiskoptions} ramdisksdipath \Boot\boot.sdi
|
||||
bcdedit /store c:\BCD /create /d "winpe boot image" /application osloader
|
||||
```
|
||||
|
||||
The last command will return a GUID, for example:
|
||||
```
|
||||
|
||||
```console
|
||||
The entry {a4f89c62-2142-11e6-80b6-00155da04110} was successfully created.
|
||||
```
|
||||
|
||||
Copy this GUID for use in the next set of commands. In each command shown, replace "GUID1" with your GUID.
|
||||
|
||||
3. Create a new boot application entry for the Windows PE image:
|
||||
3. Create a new boot application entry for the Windows PE image:
|
||||
|
||||
```cmd
|
||||
bcdedit.exe /store c:\BCD /set {GUID1} device ramdisk=[boot]\Boot\boot.wim,{ramdiskoptions}
|
||||
bcdedit.exe /store c:\BCD /set {GUID1} path \windows\system32\winload.exe
|
||||
bcdedit.exe /store c:\BCD /set {GUID1} osdevice ramdisk=[boot]\Boot\boot.wim,{ramdiskoptions}
|
||||
bcdedit.exe /store c:\BCD /set {GUID1} systemroot \windows
|
||||
bcdedit.exe /store c:\BCD /set {GUID1} detecthal Yes
|
||||
bcdedit.exe /store c:\BCD /set {GUID1} winpe Yes
|
||||
```
|
||||
bcdedit /store c:\BCD /set {GUID1} device ramdisk=[boot]\Boot\boot.wim,{ramdiskoptions}
|
||||
bcdedit /store c:\BCD /set {GUID1} path \windows\system32\winload.exe
|
||||
bcdedit /store c:\BCD /set {GUID1} osdevice ramdisk=[boot]\Boot\boot.wim,{ramdiskoptions}
|
||||
bcdedit /store c:\BCD /set {GUID1} systemroot \windows
|
||||
bcdedit /store c:\BCD /set {GUID1} detecthal Yes
|
||||
bcdedit /store c:\BCD /set {GUID1} winpe Yes
|
||||
```
|
||||
4. Configure BOOTMGR settings (remember to replace GUID1 in the third command with your GUID):
|
||||
|
||||
```
|
||||
bcdedit /store c:\BCD /create {bootmgr} /d "boot manager"
|
||||
bcdedit /store c:\BCD /set {bootmgr} timeout 30
|
||||
bcdedit /store c:\BCD -displayorder {GUID1} -addlast
|
||||
```
|
||||
5. Copy the BCD file to your TFTP server:
|
||||
4. Configure BOOTMGR settings (remember to replace GUID1 in the third command with your GUID):
|
||||
|
||||
```cmd
|
||||
bcdedit.exe /store c:\BCD /create {bootmgr} /d "boot manager"
|
||||
bcdedit.exe /store c:\BCD /set {bootmgr} timeout 30
|
||||
bcdedit.exe /store c:\BCD -displayorder {GUID1} -addlast
|
||||
```
|
||||
|
||||
5. Copy the BCD file to your TFTP server:
|
||||
|
||||
```cmd
|
||||
copy c:\BCD \\PXE-1\TFTPRoot\Boot\BCD
|
||||
```
|
||||
|
||||
Your PXE/TFTP server is now configured. You can view the BCD settings that have been configured using the command bcdedit /store <BCD file location> /enum all. See the following example. Note: Your GUID will be different than the one shown below.
|
||||
Your PXE/TFTP server is now configured. You can view the BCD settings that have been configured using the command bcdedit.exe /store <BCD file location> /enum all. See the following example. Note: Your GUID will be different than the one shown below.
|
||||
|
||||
```
|
||||
C:\>bcdedit /store C:\BCD /enum all
|
||||
```cmd
|
||||
C:\>bcdedit.exe /store C:\BCD /enum all
|
||||
Windows Boot Manager
|
||||
--------------------
|
||||
identifier {bootmgr}
|
||||
@ -162,26 +178,46 @@ ramdisksdidevice boot
|
||||
ramdisksdipath \Boot\boot.sdi
|
||||
```
|
||||
|
||||
>[!TIP]
|
||||
>If you start the PXE boot process, but receive the error that "The boot configuration data for your PC is missing or contains errors" then verify that \\boot directory is installed under the correct TFTP server root directory. In the example used here the name of this directory is TFTPRoot, but your TFTP server might be different.
|
||||
> [!TIP]
|
||||
> If you start the PXE boot process, but receive the error **The boot configuration data for your PC is missing or contains error**, then verify that `\boot` directory is installed under the correct TFTP server root directory. In the example used here the name of this directory is TFTPRoot, but your TFTP server might be different.
|
||||
|
||||
## PXE boot process summary
|
||||
|
||||
The following process summarizes the PXE client boot.
|
||||
|
||||
>The following assumes that you have configured DHCP option 67 (Bootfile Name) to "boot\PXEboot.n12" which enables direct boot to PXE with no user interaction. For more information about DHCP options for network boot, see [Managing Network Boot Programs](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732351(v=ws.10)).
|
||||
<!--
|
||||
|
||||
1. A client is directed by DHCP options 066 and 067 to download boot\\PXEboot.n12 from the TFTP server.
|
||||
2. PXEboot.n12 immediately begins a network boot.
|
||||
3. The client downloads boot\\bootmgr.exe and the boot\\BCD file from the TFTP server. Note: The BCD store must reside in the \\boot directory on the TFTP server and must be named BCD.
|
||||
5. Bootmgr.exe reads the BCD operating system entries and downloads boot\\boot.sdi and the Windows PE image (boot\\boot.wim). Optional files that can also be downloaded include true type fonts (boot\\Fonts\\wgl4\_boot.ttf) and the hibernation state file (\\hiberfil.sys) if these files are present.
|
||||
6. Bootmgr.exe starts Windows PE by calling winload.exe within the Windows PE image.
|
||||
7. Windows PE loads, a command prompt opens and wpeinit.exe is run to initialize Windows PE.
|
||||
8. The Windows PE client provides access to tools like imagex, diskpart, and bcdboot using the Windows PE command prompt. With the help of these tools accompanied by a Windows 10 image file, the destination computer can be formatted properly to load a full Windows 10 operating system.
|
||||
DHCP OPTIONS ARE NOT RECOMMENDED AND IN SOME SCENARIOS NOT SUPPORTED. SWITCHING TO IP HELPERS.
|
||||
|
||||
## See Also
|
||||
>The following assumes that you have configured DHCP option 67 (Bootfile Name) to `boot\PXEboot.n12` which enables direct boot to PXE with no user interaction. For more information about DHCP options for network boot, see [Managing Network Boot Programs](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732351(v=ws.10)).
|
||||
|
||||
1. A client is directed by DHCP options 066 and 067 to download `boot\PXEboot.n12` from the TFTP server.
|
||||
-->
|
||||
|
||||
### Concepts
|
||||
> [!NOTE]
|
||||
> The following assumes that the client and PXE server are on the same network/subnet/vlan or that PXE requests have been appropriately forwarded from the client to the PXE server using IP helpers configured in the router or switch. For more information about IP helpers, see [Configuring Your Router to Forward Broadcasts](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732351(v=ws.10)#configuring-your-router-to-forward-broadcasts-recommended).
|
||||
|
||||
1. A client contacts the PXE server. When the client is on a different network/subnet/vlan as the PXE server, the client is routed to the PXE server using the IP helpers.
|
||||
|
||||
2. The PXE server sends DHCP options 060 (client identifier **PXEClient**), 066 (boot server host name) and 067 (boot file name) to the client.
|
||||
|
||||
3. The client downloads `boot\PXEboot.n12` from the TFTP server based on DHCP option 067 boot file name value received from the PXE server.
|
||||
|
||||
4. `PXEboot.n12` immediately begins a network boot.
|
||||
|
||||
5. The client downloads `boot\bootmgr.exe` and the `boot\BCD` file from the TFTP server.
|
||||
|
||||
> [!NOTE]
|
||||
> The BCD store must reside in the `\boot` directory on the TFTP server and must be named BCD.
|
||||
|
||||
6. `Bootmgr.exe` reads the BCD operating system entries and downloads `boot\boot.sdi` and the Windows PE image (`boot\boot.wim`). Optional files that can also be downloaded include TrueType fonts (`boot\Fonts\wgl4_boot.ttf`) and the hibernation state file (`\hiberfil.sys`) if these files are present.
|
||||
|
||||
7. `Bootmgr.exe` starts Windows PE by calling `winload.exe` within the Windows PE image.
|
||||
|
||||
8. Windows PE loads, a command prompt opens and `wpeinit.exe` is run to initialize Windows PE.
|
||||
|
||||
9. The Windows PE client provides access to tools like `imagex.exe`, `diskpart.exe`, and `bcdboot.exe` using the Windows PE command prompt. With the help of these tools accompanied by a Windows 10 image file, the destination computer can be formatted properly to load a full Windows 10 operating system.
|
||||
|
||||
### Related articles
|
||||
|
||||
[Windows PE Walkthroughs](/previous-versions/windows/it-pro/windows-vista/cc748899(v=ws.10))
|
||||
|
@ -1,17 +1,18 @@
|
||||
---
|
||||
title: Deploy Windows Enterprise licenses
|
||||
description: Steps to deploy Windows 10 Enterprise or Windows 11 Enterprise licenses for Windows Enterprise E3 or E5 subscription activation, or for Windows Enterprise E3 in CSP.
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
manager: dougeby
|
||||
author: frankroj
|
||||
ms.author: frankroj
|
||||
manager: aaroncz
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-deploy
|
||||
ms.technology: itpro-fundamentals
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: how-to
|
||||
ms.collection: highpri
|
||||
appliesto:
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
appliesto:
|
||||
- ✅ <b>Windows 10</b>
|
||||
- ✅ <b>Windows 11</b>
|
||||
ms.date: 11/23/2022
|
||||
---
|
||||
|
||||
# Deploy Windows Enterprise licenses
|
||||
@ -227,7 +228,7 @@ Figure 11 illustrates a device on which the Windows 10 Pro is activated, but the
|
||||
|
||||
Figure 11: Windows 10 Enterprise subscription lapsed or removed in Settings.
|
||||
|
||||
It displays the following error: "Windows 10 Enterprise subscription is not valid."
|
||||
It displays the following error: "Windows 10 Enterprise subscription isn't valid."
|
||||
|
||||
#### Device that's not activated and without an Enterprise subscription
|
||||
|
||||
@ -251,7 +252,7 @@ Use the following procedures to review whether a particular device meets these r
|
||||
|
||||
To determine if the computer has a firmware-embedded activation key, enter the following command at an elevated Windows PowerShell prompt:
|
||||
|
||||
```PowerShell
|
||||
```powershell
|
||||
(Get-CimInstance -query 'select * from SoftwareLicensingService').OA3xOriginalProductKey
|
||||
```
|
||||
|
||||
@ -287,7 +288,7 @@ If a device isn't able to connect to Windows Update, it can lose activation stat
|
||||
|
||||
- Make sure that the device doesn't have the following registry value: `HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\DoNotConnectToWindowsUpdateInternetLocations = 1 (REG_DWORD)`. If this registry value exists, it must be set to `0`.
|
||||
|
||||
- Make sure that the following group policy setting is **disabled**: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Do not connect to any Windows Update Internet locations.
|
||||
- Make sure that the following group policy setting is **disabled**: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Don't connect to any Windows Update Internet locations.
|
||||
|
||||
## Virtual Desktop Access (VDA)
|
||||
|
||||
|
@ -1,24 +1,26 @@
|
||||
---
|
||||
title: Deploy Windows 10 with Microsoft 365
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
description: Learn about deploying Windows 10 with Microsoft 365 and how to use a free 90-day trial account to review some of the benefits of Microsoft 365.
|
||||
ms.prod: w10
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.collection: M365-modern-desktop
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.date: 11/23/2022
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
|
||||
# Deploy Windows 10 with Microsoft 365
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
This topic provides a brief overview of Microsoft 365 and describes how to use a free 90-day trial account to review some of the benefits of Microsoft 365.
|
||||
This article provides a brief overview of Microsoft 365 and describes how to use a free 90-day trial account to review some of the benefits of Microsoft 365.
|
||||
|
||||
[Microsoft 365](https://www.microsoft.com/microsoft-365) is a new offering from Microsoft that combines [Windows 10](https://www.microsoft.com/windows/features) with [Office 365](https://www.microsoft.com/microsoft-365/office-365), and [Enterprise Mobility and Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) (EMS). See the [Microsoft 365 Enterprise poster](#microsoft-365-enterprise-poster) for an overview.
|
||||
|
||||
@ -27,46 +29,50 @@ For Windows 10 deployment, Microsoft 365 includes a fantastic deployment advisor
|
||||
- Windows Autopilot
|
||||
- In-place upgrade
|
||||
- Deploying Windows 10 upgrade with Intune
|
||||
- Deploying Windows 10 upgrade with Microsoft Endpoint Configuration Manager
|
||||
- Deploying a computer refresh with Microsoft Endpoint Configuration Manager
|
||||
- Deploying Windows 10 upgrade with Microsoft Configuration Manager
|
||||
- Deploying a computer refresh with Microsoft Configuration Manager
|
||||
|
||||
## Free trial account
|
||||
|
||||
**If you already have a Microsoft services subscription account and access to the Microsoft 365 Admin Center**
|
||||
### If you already have a Microsoft services subscription account and access to the Microsoft 365 Admin Center
|
||||
|
||||
From the [Microsoft 365 Admin Center](https://portal.office.com), go to Billing and then Purchase services.
|
||||
In the Enterprise Suites section of the service offerings, you'll find Microsoft 365 E3 and Microsoft 365 E5 tiles.
|
||||
There are "Start Free Trial" options available for your selection by hovering your mouse over the tiles.
|
||||
|
||||
**If you do not already have a Microsoft services subscription**
|
||||
### If you do not already have a Microsoft services subscription
|
||||
|
||||
You can check out the Microsoft 365 deployment advisor and other resources for free! Just follow the steps below.
|
||||
You can check out the Microsoft 365 deployment advisor and other resources for free! Just follow the steps below.
|
||||
|
||||
>[!NOTE]
|
||||
>If you have not run a setup guide before, you will see the **Prepare your environment** guide first. This is to make sure you have basics covered like domain verification and a method for adding users. At the end of the "Prepare your environment" guide, there will be a **Ready to continue** button that sends you to the original guide that was selected.
|
||||
> [!NOTE]
|
||||
> If you have not run a setup guide before, you will see the **Prepare your environment** guide first. This is to make sure you have basics covered like domain verification and a method for adding users. At the end of the "Prepare your environment" guide, there will be a **Ready to continue** button that sends you to the original guide that was selected.
|
||||
|
||||
1. [Obtain a free Microsoft 365 trial](/microsoft-365/commerce/try-or-buy-microsoft-365).
|
||||
2. Check out the [Microsoft 365 deployment advisor](https://aka.ms/microsoft365setupguide).
|
||||
3. Also check out the [Windows Analytics deployment advisor](/mem/configmgr/desktop-analytics/overview). This advisor will walk you through deploying [Desktop Analytics](/mem/configmgr/desktop-analytics/overview).
|
||||
|
||||
That's all there's to it!
|
||||
3. Also check out the [Windows Analytics deployment advisor](/mem/configmgr/desktop-analytics/overview). This advisor will walk you through deploying [Desktop Analytics](/mem/configmgr/desktop-analytics/overview).
|
||||
|
||||
Examples of these two deployment advisors are shown below.
|
||||
|
||||
- [Microsoft 365 deployment advisor example](#microsoft-365-deployment-advisor-example)
|
||||
- [Windows Analytics deployment advisor example](#windows-analytics-deployment-advisor-example)
|
||||
- [Deploy Windows 10 with Microsoft 365](#deploy-windows-10-with-microsoft-365)
|
||||
- [Free trial account](#free-trial-account)
|
||||
- [If you already have a Microsoft services subscription account and access to the Microsoft 365 Admin Center](#if-you-already-have-a-microsoft-services-subscription-account-and-access-to-the-microsoft-365-admin-center)
|
||||
- [If you do not already have a Microsoft services subscription](#if-you-do-not-already-have-a-microsoft-services-subscription)
|
||||
- [Microsoft 365 deployment advisor example](#microsoft-365-deployment-advisor-example)
|
||||
- [Windows Analytics deployment advisor example](#windows-analytics-deployment-advisor-example)
|
||||
- [Microsoft 365 Enterprise poster](#microsoft-365-enterprise-poster)
|
||||
- [Related articles](#related-articles)
|
||||
|
||||
## Microsoft 365 deployment advisor example
|
||||
|
||||

|
||||
|
||||
## Windows Analytics deployment advisor example
|
||||
|
||||
|
||||
## Microsoft 365 Enterprise poster
|
||||
|
||||
[](https://aka.ms/m365eposter)
|
||||
|
||||
## Related Topics
|
||||
## Related articles
|
||||
|
||||
[Windows 10 deployment scenarios](windows-10-deployment-scenarios.md)<br>
|
||||
[Modern Desktop Deployment Center](/microsoft-365/enterprise/desktop-deployment-center-home)
|
||||
|
@ -1,25 +1,26 @@
|
||||
---
|
||||
title: What's new in Windows client deployment
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
description: Use this article to learn about new solutions and online content related to deploying Windows in your organization.
|
||||
ms.localizationpriority: medium
|
||||
ms.prod: w10
|
||||
author: aczechowski
|
||||
ms.prod: windows-client
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.collection: highpri
|
||||
ms.date: 11/23/2022
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
|
||||
# What's new in Windows client deployment
|
||||
|
||||
**Applies to:**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 11
|
||||
|
||||
## In this topic
|
||||
|
||||
This topic provides an overview of new solutions and online content related to deploying Windows client in your organization.
|
||||
This article provides an overview of new solutions and online content related to deploying Windows client in your organization.
|
||||
|
||||
- For an all-up overview of new features in Windows 10, see [What's new in Windows 10](/windows/whats-new/index).
|
||||
|
||||
@ -30,18 +31,19 @@ When you deploy Windows 11 with Autopilot, you can enable users to view addition
|
||||
## Windows 11
|
||||
|
||||
Check out the following new articles about Windows 11:
|
||||
|
||||
- [Overview of Windows 11](/windows/whats-new/windows-11)
|
||||
- [Plan for Windows 11](/windows/whats-new/windows-11-plan)
|
||||
- [Prepare for Windows 11](/windows/whats-new/windows-11-prepare)
|
||||
|
||||
The [Windows ADK for Windows 11](/windows-hardware/get-started/adk-install) is available.<br>
|
||||
|
||||
## Deployment tools
|
||||
## Deployment tools
|
||||
|
||||
[SetupDiag](#setupdiag) is included with Windows 10, version 2004 and later, and Windows 11.<br>
|
||||
New capabilities are available for [Delivery Optimization](#delivery-optimization) and [Windows Update for Business](#windows-update-for-business).<br>
|
||||
VPN support is added to [Windows Autopilot](#windows-autopilot)<br>
|
||||
An in-place upgrade wizard is available in [Configuration Manager](#microsoft-endpoint-configuration-manager).<br>
|
||||
An in-place upgrade wizard is available in [Configuration Manager](#microsoft-configuration-manager).<br>
|
||||
The Windows 10 deployment and update [landing page](index.yml) has been redesigned, with more content added and more content coming soon.<br>
|
||||
|
||||
## The Modern Desktop Deployment Center
|
||||
@ -51,6 +53,7 @@ The [Modern Desktop Deployment Center](/microsoft-365/enterprise/desktop-deploym
|
||||
## Microsoft 365
|
||||
|
||||
Microsoft 365 is a new offering from Microsoft that combines
|
||||
|
||||
- Windows 10
|
||||
- Office 365
|
||||
- Enterprise Mobility and Security (EMS).
|
||||
@ -63,14 +66,15 @@ See [Deploy Windows 10 with Microsoft 365](deploy-m365.md) for an overview, whic
|
||||
|
||||
Windows PowerShell cmdlets for Delivery Optimization have been improved:
|
||||
|
||||
- **Get-DeliveryOptimizationStatus** has added the **-PeerInfo** option for a real-time peak behind the scenes on peer-to-peer activity (for example the peer IP Address, bytes received / sent).
|
||||
- **Get-DeliveryOptimizationStatus** has added the **-PeerInfo** option for a real-time peek behind the scenes on peer-to-peer activity (for example the peer IP Address, bytes received / sent).
|
||||
- **Get-DeliveryOptimizationLogAnalysis** is a new cmdlet that provides a summary of the activity in your DO log (# of downloads, downloads from peers, overall peer efficiency). Use the **-ListConnections** option to for in-depth look at peer-to-peer connections.
|
||||
- **Enable-DeliveryOptimizationVerboseLogs** is a new cmdlet that enables a greater level of logging detail to help in troubleshooting.
|
||||
|
||||
Other improvements in [Delivery Optimization](./do/waas-delivery-optimization.md) include:
|
||||
|
||||
- Enterprise network [throttling is enhanced](/windows-insider/archive/new-for-business#new-download-throttling-options-for-delivery-optimization-build-18917) to optimize foreground vs. background throttling.
|
||||
- Automatic cloud-based congestion detection is available for PCs with cloud service support.
|
||||
- Improved peer efficiency for enterprises and educational institutions with complex networks is enabled with [new policies](/windows/client-management/mdm/policy-csp-deliveryoptimization). These policies now support Microsoft 365 Apps for enterprise updates and Intune content, with Microsoft Endpoint Manager content coming soon!
|
||||
- Improved peer efficiency for enterprises and educational institutions with complex networks is enabled with [new policies](/windows/client-management/mdm/policy-csp-deliveryoptimization). These policies now support Microsoft 365 Apps for enterprise updates and Intune content.
|
||||
|
||||
The following Delivery Optimization policies are removed in the Windows 10, version 2004 release:
|
||||
|
||||
@ -84,12 +88,13 @@ The following Delivery Optimization policies are removed in the Windows 10, vers
|
||||
### Windows Update for Business
|
||||
|
||||
[Windows Update for Business](./update/waas-manage-updates-wufb.md) enhancements in this release include:
|
||||
|
||||
- Intune console updates: target version is now available allowing you to specify which version of Windows 10 you want devices to move to. Additionally, this capability enables you to keep devices on their current version until they reach end of service. Check it out in Intune, also available as a Group Policy and Configuration Service Provider (CSP) policy.
|
||||
- Validation improvements: To ensure devices and end users stay productive and protected, Microsoft uses safeguard holds to block devices from updating when there are known issues that would impact that device. Also, to better enable IT administrators to validate on the latest release, we've created a new policy that enables admins to opt devices out of the built-in safeguard holds.
|
||||
|
||||
- [**Automatic Restart Sign-on (ARSO)**](/windows-server/identity/ad-ds/manage/component-updates/winlogon-automatic-restart-sign-on--arso-): Windows will automatically sign in as the user and lock their device in order to complete the update, ensuring that when the user returns and unlocks the device, the update will be completed.
|
||||
- [**Windows Update for Business**](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523): There will now be a single, common start date for phased deployments (no more SAC-T designation). In addition, there will be a new notification and reboot scheduling experience for end users, the ability to enforce update installation and reboot deadlines, and the ability to provide end user control over reboots for a specific time period.
|
||||
- **Update rollback improvements**: You can now automatically recover from startup failures by removing updates if the startup failure was introduced after the installation of recent driver or quality updates. When a device is unable to start up properly after the recent installation of Quality of driver updates, Windows will now automatically uninstall the updates to get the device back up and run normally.
|
||||
- **Update rollback improvements**: You can now automatically recover from startup failures by removing updates if the startup failure was introduced after the installation of recent driver or quality updates. When a device is unable to start up properly after the recent installation of Quality of driver updates, Windows will now automatically uninstall the updates to get the device back up and running normally.
|
||||
- **Pause updates**: We've extended the ability to pause updates for both feature and monthly updates. This extension ability is for all editions of Windows 10, including Home. You can pause both feature and monthly updates for up to 35 days (seven days at a time, up to five times). Once the 35-day pause period is reached, you'll need to update your device before pausing again.
|
||||
- **Improved update notifications**: When there's an update requiring you to restart your device, you'll see a colored dot on the Power button in the Start menu and on the Windows icon in your taskbar.
|
||||
- **Intelligent active hours**: To further enhance active hours, users now can let Windows Update intelligently adjust active hours based on their device-specific usage patterns. You must enable the intelligent active hours feature for the system to predict device-specific usage patterns.
|
||||
@ -125,7 +130,7 @@ The following Windows Autopilot features are available in Windows 10, version 19
|
||||
- Windows Autopilot is self-updating during OOBE. From Windows 10 onward, version 1903 Autopilot functional and critical updates will begin downloading automatically during OOBE.
|
||||
- Windows Autopilot will set the [diagnostics data](/windows/privacy/windows-diagnostic-data) level to Full on Windows 10 version 1903 and later during OOBE.
|
||||
|
||||
### Microsoft Endpoint Configuration Manager
|
||||
### Microsoft Configuration Manager
|
||||
|
||||
An in-place upgrade wizard is available in Configuration Manager. For more information, see [Simplifying Windows 10 deployment with Configuration Manager](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/simplifying-windows-10-deployment-with-configuration-manager/ba-p/1214364).
|
||||
|
||||
@ -133,7 +138,7 @@ An in-place upgrade wizard is available in Configuration Manager. For more infor
|
||||
|
||||
Windows 10 Education support has been added to Windows 10 Subscription Activation.
|
||||
|
||||
With Windows 10, version 1903, you can step-up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions – Windows 10 Education. For more information, see [Windows 10 Subscription Activation](./windows-10-subscription-activation.md).
|
||||
With Windows 10, version 1903, you can step up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions - Windows 10 Education. For more information, see [Windows 10 Subscription Activation](./windows-10-subscription-activation.md).
|
||||
|
||||
### SetupDiag
|
||||
|
||||
@ -151,12 +156,11 @@ Upgrade Readiness helps you ensure that applications and drivers are ready for a
|
||||
|
||||
The development of Upgrade Readiness has been heavily influenced by input from the community; the development of new features is ongoing. To begin using Upgrade Readiness, add it to an existing Operation Management Suite (OMS) workspace or sign up for a new OMS workspace with the Upgrade Readiness solution enabled.
|
||||
|
||||
For more information about Upgrade Readiness, see the following topics:
|
||||
For more information about Upgrade Readiness, see the following articles:
|
||||
|
||||
- [Windows Analytics blog](https://aka.ms/blog/WindowsAnalytics/)
|
||||
- [Manage Windows upgrades with Upgrade Readiness](/mem/configmgr/desktop-analytics/overview)
|
||||
|
||||
|
||||
### Update Compliance
|
||||
|
||||
Update Compliance helps you to keep Windows 10 devices in your organization secure and up-to-date.
|
||||
@ -203,13 +207,13 @@ For more information, see the following guides:
|
||||
|
||||
- [Step by step guide: Configure a test lab to deploy Windows 10](windows-10-poc.md)
|
||||
- [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md)
|
||||
- [Deploy Windows 10 in a test lab using Microsoft Endpoint Configuration Manager](windows-10-poc-sc-config-mgr.md)
|
||||
- [Deploy Windows 10 in a test lab using Microsoft Configuration Manager](windows-10-poc-sc-config-mgr.md)
|
||||
|
||||
## Troubleshooting guidance
|
||||
|
||||
[Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) was published in October of 2016 and will continue to be updated with new fixes. The topic provides a detailed explanation of the Windows 10 upgrade process and instructions on how to locate, interpret, and resolve specific errors that can be encountered during the upgrade process.
|
||||
[Resolve Windows 10 upgrade errors](upgrade/resolve-windows-10-upgrade-errors.md) was published in October of 2016 and will continue to be updated with new fixes. The article provides a detailed explanation of the Windows 10 upgrade process and instructions on how to locate, interpret, and resolve specific errors that can be encountered during the upgrade process.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Overview of Windows as a service](update/waas-overview.md)<br>
|
||||
[Windows 10 deployment considerations](planning/windows-10-deployment-considerations.md)<br>
|
||||
|
@ -1,4 +1,4 @@
|
||||
- name: Deploy Windows 10 with Microsoft Endpoint Configuration Manager
|
||||
- name: Deploy Windows 10 with Microsoft Configuration Manager
|
||||
items:
|
||||
- name: Prepare for Windows 10 deployment with Configuration Manager
|
||||
items:
|
||||
|
@ -2,59 +2,68 @@
|
||||
title: Add a Windows 10 operating system image using Configuration Manager
|
||||
description: Operating system images are typically the production image used for deployment throughout the organization.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Add a Windows 10 operating system image using Configuration Manager
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
Operating system images are typically the production image used for deployment throughout the organization. This topic shows you how to add a Windows 10 operating system image created with Microsoft Endpoint Configuration Manager, and how to distribute the image to a distribution point.
|
||||
Operating system images are typically the production image used for deployment throughout the organization. This article shows you how to add a Windows 10 operating system image created with Microsoft Configuration Manager, and how to distribute the image to a distribution point.
|
||||
|
||||
## Infrastructure
|
||||
|
||||
For the purposes of this guide, we'll use one server computer: CM01.
|
||||
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server.
|
||||
- CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
|
||||
>[!IMPORTANT]
|
||||
>The procedures in this article require a reference image. Our reference images is named **REFW10-X64-001.wim**. If you have not already created a reference image, then perform all the steps in [Create a Windows 10 reference image](../deploy-windows-mdt/create-a-windows-10-reference-image.md) on CM01, replacing MDT01 with CM01. The final result will be a reference image located in the D:\MDTBuildLab\Captures folder that you can use for the procedure below.
|
||||
> [!IMPORTANT]
|
||||
> The procedures in this article require a reference image. Our reference images is named **REFW10-X64-001.wim**. If you have not already created a reference image, then perform all the steps in [Create a Windows 10 reference image](../deploy-windows-mdt/create-a-windows-10-reference-image.md) on CM01, replacing MDT01 with CM01. The final result will be a reference image located in the D:\MDTBuildLab\Captures folder that you can use for the procedure below.
|
||||
|
||||
## Add a Windows 10 operating system image
|
||||
## Add a Windows 10 operating system image
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using File Explorer, in the **D:\\Sources\\OSD\\OS** folder, create a subfolder named **Windows 10 Enterprise x64 RTM**.
|
||||
2. Copy the REFW10-X64-001.wim file to the **D:\\Sources\\OSD\\OS\\Windows 10 Enterprise x64 RTM** folder.
|
||||
1. Using File Explorer, in the **`D:\Sources\OSD\OS`** folder, create a subfolder named **Windows 10 Enterprise x64 RTM**.
|
||||
|
||||
2. Copy the `REFW10-X64-001.wim` file to the **`D:\Sources\OSD\OS\Windows 10 Enterprise x64 RTM`** folder.
|
||||
|
||||

|
||||
|
||||
The Windows 10 image being copied to the Sources folder structure.
|
||||
The Windows 10 image being copied to the Sources folder structure.
|
||||
|
||||
3. Using the Configuration Manager Console, in the Software Library workspace, right-click **Operating System Images**, and select **Add Operating System Image**.
|
||||
4. On the **Data Source** page, in the **Path:** text box, browse to \\\\CM01\\Sources$\\OSD\\OS\\Windows 10 Enterprise x64 RTM\\REFW10-X64-001.wim, select x64 next to Architecture and choose a language, then click **Next**.
|
||||
5. On the **General** page, assign the name Windows 10 Enterprise x64 RTM, click **Next** twice, and then click **Close**.
|
||||
6. Distribute the operating system image to the CM01 distribution point by right-clicking the **Windows 10 Enterprise x64 RTM** operating system image and then clicking **Distribute Content**.
|
||||
7. In the Distribute Content Wizard, add the CM01 distribution point, click **Next** and click **Close**.
|
||||
8. View the content status for the Windows 10 Enterprise x64 RTM package. Don't continue until the distribution is completed (it might take a few minutes). You also can review the D:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file and look for the **STATMSG: ID=2301** line.
|
||||
3. Using the Configuration Manager Console, in the **Software Library** workspace, right-click **Operating System Images**, and select **Add Operating System Image**.
|
||||
|
||||
4. On the **Data Source** page, in the **Path:** text box, browse to **`\\CM01\Sources$\OSD\OS\Windows 10 Enterprise x64 RTM\REFW10-X64-001.wim`**, select x64 next to Architecture and choose a language, then select **Next**.
|
||||
|
||||
5. On the **General** page, assign the name Windows 10 Enterprise x64 RTM, select **Next** twice, and then select **Close**.
|
||||
|
||||
6. Distribute the operating system image to the CM01 distribution point by right-clicking the **Windows 10 Enterprise x64 RTM** operating system image and then clicking **Distribute Content**.
|
||||
|
||||
7. In the Distribute Content Wizard, add the CM01 distribution point, select **Next** and select **Close**.
|
||||
|
||||
8. View the content status for the Windows 10 Enterprise x64 RTM package. Don't continue until the distribution is completed (it might take a few minutes). You also can review the `D:\Program Files\Microsoft Configuration Manager\Logs\distmgr.log` file and look for the **STATMSG: ID=2301** line.
|
||||
|
||||

|
||||
|
||||
The distributed Windows 10 Enterprise x64 RTM package.
|
||||
The distributed Windows 10 Enterprise x64 RTM package.
|
||||
|
||||
Next, see [Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md).
|
||||
Next, see [Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md).
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)<br>
|
||||
[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)<br>
|
||||
|
@ -2,36 +2,39 @@
|
||||
title: Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager
|
||||
description: Learn how to configure the Windows Preinstallation Environment (Windows PE) to include required network and storage drivers.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
In this topic, you'll learn how to configure the Windows Preinstallation Environment (Windows PE) to include the network drivers required to connect to the deployment share and the storage drivers required to see the local storage on machines. Even though the Windows PE boot image and the Windows 10 operating system contain many out-of-the-box drivers, it's likely you'll have to add new or updated drivers to support all your hardware. In this section, you import drivers for both Windows PE and the full Windows 10 operating system.
|
||||
In this article, you'll learn how to configure the Windows Preinstallation Environment (Windows PE) to include the network drivers required to connect to the deployment share and the storage drivers required to see the local storage on machines. Even though the Windows PE boot image and the Windows 10 operating system contain many out-of-the-box drivers, it's likely you'll have to add new or updated drivers to support all your hardware. In this section, you import drivers for both Windows PE and the full Windows 10 operating system.
|
||||
|
||||
For the purposes of this guide, we'll use one server computer: CM01.
|
||||
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
|
||||
## Add drivers for Windows PE
|
||||
|
||||
This section will show you how to import some network and storage drivers for Windows PE.
|
||||
This section will show you how to import some network and storage drivers for Windows PE.
|
||||
|
||||
>[!NOTE]
|
||||
>Windows PE usually has a fairly comprehensive set of drivers out of the box, assuming that you are using a recent version of the Windows ADK. This is different than the full Windows OS which will often require drivers. You shouldn't add drivers to Windows PE unless you've an issue or are missing functionality, and in these cases you should only add the driver that you need. An example of a common driver that is added is the Intel I217 driver. Adding too many drivers can cause conflicts and lead to driver bloat in the Config Mgr database. This section shows you how to add drivers, but typically you can just skip this procedure.
|
||||
> [!NOTE]
|
||||
> Windows PE usually has a fairly comprehensive set of drivers out of the box, assuming that you are using a recent version of the Windows ADK. This is different than the full Windows OS which will often require drivers. You shouldn't add drivers to Windows PE unless you've an issue or are missing functionality, and in these cases you should only add the driver that you need. An example of a common driver that is added is the Intel I217 driver. Adding too many drivers can cause conflicts and lead to driver bloat in the Config Mgr database. This section shows you how to add drivers, but typically you can just skip this procedure.
|
||||
|
||||
This section assumes you've downloaded some drivers to the **D:\\Sources\\OSD\\DriverSources\\WinPE x64** folder on CM01.
|
||||
This section assumes you've downloaded some drivers to the **`D:\Sources\OSD\DriverSources\WinPE x64`** folder on CM01.
|
||||
|
||||

|
||||
|
||||
@ -39,13 +42,19 @@ Driver folder structure on CM01
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click the **Drivers** node and select **Import Driver**.
|
||||
2. In the Import New Driver Wizard, on the **Specify a location to import driver** page, select the **Import all drivers in the following network path (UNC)** option, browse to the **\\\\CM01\\Sources$\\OSD\\DriverSources\\WinPE x64** folder and click **Next**.
|
||||
3. On the **Specify the details for the imported driver** page, click **Categories**, create a category named **WinPE x64**, and then click **Next**.
|
||||
4. On the **Select the packages to add the imported driver** page, click **Next**.
|
||||
5. On the **Select drivers to include in the boot image** page, select the **Zero Touch WinPE x64** boot image and click **Next**.
|
||||
6. In the popup window that appears, click **Yes** to automatically update the distribution point.
|
||||
7. Click **Next**, wait for the image to be updated, and then click **Close**.
|
||||
1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, right-click the **Drivers** node and select **Import Driver**.
|
||||
|
||||
2. In the Import New Driver Wizard, on the **Specify a location to import driver** page, select the **Import all drivers in the following network path (UNC)** option, browse to the **`\\CM01\Sources$\OSD\DriverSources\WinPE x64`** folder and select **Next**.
|
||||
|
||||
3. On the **Specify the details for the imported driver** page, select **Categories**, create a category named **WinPE x64**, and then select **Next**.
|
||||
|
||||
4. On the **Select the packages to add the imported driver** page, select **Next**.
|
||||
|
||||
5. On the **Select drivers to include in the boot image** page, select the **Zero Touch WinPE x64** boot image and select **Next**.
|
||||
|
||||
6. In the popup window that appears, select **Yes** to automatically update the distribution point.
|
||||
|
||||
7. Select **Next**, wait for the image to be updated, and then select **Close**.
|
||||
|
||||
<br>
|
||||
<br>
|
||||
@ -66,27 +75,28 @@ Driver folder structure on CM01
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click the **Drivers** node and select **Import Driver**.
|
||||
2. In the Import New Driver Wizard, on the **Specify a location to import driver** page, select the **Import all drivers in the following network path (UNC)** option, browse to the **\\\\CM01\\Sources$\\OSD\\DriverSources\\Windows 10 x64\\Hewlett-Packard\\HP EliteBook 8560w** folder and click **Next**. Wait a minute for driver information to be validated.
|
||||
3. On the **Specify the details for the imported driver** page, click **Categories**, create a category named **Windows 10 x64 - HP EliteBook 8560w**, click **OK**, and then click **Next**.
|
||||
1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, right-click the **Drivers** node and select **Import Driver**.
|
||||
|
||||
2. In the Import New Driver Wizard, on the **Specify a location to import driver** page, select the **Import all drivers in the following network path (UNC)** option, browse to the **`\\CM01\Sources$\OSD\DriverSources\Windows 10 x64\Hewlett-Packard\HP EliteBook 8560w`** folder and select **Next**. Wait a minute for driver information to be validated.
|
||||
|
||||
3. On the **Specify the details for the imported driver** page, select **Categories**, create a category named **Windows 10 x64 - HP EliteBook 8560w**, select **OK**, and then select **Next**.
|
||||
|
||||

|
||||
|
||||
Create driver categories
|
||||
|
||||
4. On the **Select the packages to add the imported driver** page, select **New Package**, use the following settings for the package, and then select **Next**:
|
||||
|
||||
4. On the **Select the packages to add the imported driver** page, click **New Package**, use the following settings for the package, and then click **Next**:
|
||||
- Name: Windows 10 x64 - HP EliteBook 8560w
|
||||
- Path: **`\\CM01\Sources$\OSD\DriverPackages\Windows 10 x64\Hewlett-Packard\HP EliteBook 8560w`**
|
||||
|
||||
* Name: Windows 10 x64 - HP EliteBook 8560w
|
||||
* Path: \\\\CM01\\Sources$\\OSD\\DriverPackages\\Windows 10 x64\\Hewlett-Packard\\HP EliteBook 8560w
|
||||
> [!NOTE]
|
||||
> The package path does not yet exist so it has to be created by typing it in. The wizard will create the new package using the path you specify.
|
||||
|
||||
>[!NOTE]
|
||||
>The package path does not yet exist, so you've to type it in. The wizard will create the new package using the path you specify.
|
||||
5. On the **Select drivers to include in the boot image** page, don't select anything, and select **Next** twice. After the package has been created, select **Close**.
|
||||
|
||||
5. On the **Select drivers to include in the boot image** page, don't select anything, and click **Next** twice. After the package has been created, click **Close**.
|
||||
|
||||
>[!NOTE]
|
||||
>If you want to monitor the driver import process more closely, you can open the SMSProv.log file during driver import.
|
||||
> [!NOTE]
|
||||
> If you want to monitor the driver import process more closely, you can open the SMSProv.log file during driver import.
|
||||
|
||||

|
||||
|
||||
@ -94,7 +104,7 @@ On **CM01**:
|
||||
|
||||
Next, see [Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md).
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)<br>
|
||||
[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)<br>
|
||||
|
@ -1,44 +1,53 @@
|
||||
---
|
||||
title: Create a custom Windows PE boot image with Configuration Manager (Windows 10)
|
||||
description: Learn how to create custom Windows Preinstallation Environment (Windows PE) boot images in Microsoft Endpoint Configuration Manager.
|
||||
description: Learn how to create custom Windows Preinstallation Environment (Windows PE) boot images in Microsoft Configuration Manager.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Create a custom Windows PE boot image with Configuration Manager
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
In Microsoft Configuration Manager, you can create custom Windows Preinstallation Environment (Windows PE) boot images that include extra components and features. This article shows you how to create a custom Windows PE 5.0 boot image with the Microsoft Deployment Toolkit (MDT) wizard. You can also add the Microsoft Diagnostics and Recovery Toolset (DaRT) 10 to the boot image as part of the boot image creation process.
|
||||
|
||||
In Microsoft Endpoint Configuration Manager, you can create custom Windows Preinstallation Environment (Windows PE) boot images that include extra components and features. This topic shows you how to create a custom Windows PE 5.0 boot image with the Microsoft Deployment Toolkit (MDT) wizard. You can also add the Microsoft Diagnostics and Recovery Toolset (DaRT) 10 to the boot image as part of the boot image creation process.
|
||||
- The boot image that is created is based on the version of ADK that is installed.
|
||||
|
||||
For the purposes of this guide, we'll use one server computer: CM01.
|
||||
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
|
||||
## Add DaRT 10 files and prepare to brand the boot image
|
||||
|
||||
The steps below outline the process for adding DaRT 10 installation files to the MDT installation directory. You also copy a custom background image to be used later. These steps are optional. If you don't wish to add DaRT, skip the steps below to copy DaRT tools and later skip adding the DaRT component to the boot image.
|
||||
The steps below outline the process for adding DaRT 10 installation files to the MDT installation directory. You also copy a custom background image to be used later. These steps are optional. If you don't wish to add DaRT, skip the steps below to copy DaRT tools, and later skip adding the DaRT component to the boot image.
|
||||
|
||||
We assume you've downloaded [Microsoft Desktop Optimization Pack (MDOP) 2015](https://my.visualstudio.com/Downloads?q=Desktop%20Optimization%20Pack%202015) and copied the x64 version of MSDaRT100.msi to the **C:\\Setup\\DaRT 10** folder on CM01. We also assume you've created a custom background image and saved it in **C:\\Setup\\Branding** on CM01. In this section, we use a custom background image named <a href="../images/ContosoBackground.png">ContosoBackground.bmp</a>.
|
||||
We assume you've downloaded [Microsoft Desktop Optimization Pack (MDOP) 2015](https://my.visualstudio.com/Downloads?q=Desktop%20Optimization%20Pack%202015) and copied the x64 version of MSDaRT100.msi to the **C:\\Setup\\DaRT 10** folder on CM01. We also assume you've created a custom background image and saved it in **`C:\Setup\Branding`** on CM01. In this section, we use a custom background image named [ContosoBackground.png](../images/ContosoBackground.png)
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Install DaRT 10 (C:\\Setup\\DaRT 10\\MSDaRT100.msi) using the default settings.
|
||||
2. Using File Explorer, navigate to the **C:\\Program Files\\Microsoft DaRT\\v10** folder.
|
||||
3. Copy the Toolsx64.cab file to the **C:\\Program Files\\Microsoft Deployment Toolkit\\Templates\\Distribution\\Tools\\x64** folder.
|
||||
4. Copy the Toolsx86.cab file to the **C:\\Program Files\\Microsoft Deployment Toolkit\\Templates\\Distribution\\Tools\\x86** folder.
|
||||
5. Using File Explorer, navigate to the **C:\\Setup** folder.
|
||||
6. Copy the **Branding** folder to **D:\\Sources\\OSD**.
|
||||
1. Install DaRT 10 (**`C:\\Setup\\DaRT 10\\MSDaRT100.msi`**) using the default settings.
|
||||
|
||||
2. Using File Explorer, navigate to the **`C:\Program Files\Microsoft DaRT\v10`** folder.
|
||||
|
||||
3. Copy the Toolsx64.cab file to the **`C:\Program Files\Microsoft Deployment Toolkit\Templates\Distribution\Tools\x64`** folder.
|
||||
|
||||
4. Copy the Toolsx86.cab file to the **`C:\Program Files\Microsoft Deployment Toolkit\Templates\Distribution\Tools\x86`** folder.
|
||||
|
||||
5. Using File Explorer, navigate to the **`C:\Setup`** folder.
|
||||
|
||||
6. Copy the **Branding** folder to **`D:\Sources\OSD`**.
|
||||
|
||||
## Create a boot image for Configuration Manager using the MDT wizard
|
||||
|
||||
@ -46,15 +55,18 @@ By using the MDT wizard to create the boot image in Configuration Manager, you g
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click **Boot Images**, and select **Create Boot Image using MDT**.
|
||||
2. On the **Package Source** page, in the **Package source folder to be created (UNC Path):** text box, type **\\\\CM01\\Sources$\\OSD\\Boot\\Zero Touch WinPE x64** and click **Next**.
|
||||
1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Boot Images**, and select **Create Boot Image using MDT**.
|
||||
|
||||
>[!NOTE]
|
||||
>The Zero Touch WinPE x64 folder does not yet exist. The folder will be created later by the wizard.
|
||||
2. On the **Package Source** page, in the **Package source folder to be created (UNC Path):** text box, enter **`\\CM01\Sources$\OSD\Boot\Zero Touch WinPE x64`** and select **Next**.
|
||||
|
||||
3. On the **General Settings** page, assign the name **Zero Touch WinPE x64** and click **Next**.
|
||||
4. On the **Options** page, select the **x64** platform, and click **Next**.
|
||||
5. On the **Components** page, in addition to the default selected **Microsoft Data Access Components (MDAC/ADO)** support, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box and click **Next**.
|
||||
> [!NOTE]
|
||||
> The Zero Touch WinPE x64 folder does not yet exist. The folder will be created later by the wizard.
|
||||
|
||||
3. On the **General Settings** page, assign the name **Zero Touch WinPE x64** and select **Next**.
|
||||
|
||||
4. On the **Options** page, select the **x64** platform, and select **Next**.
|
||||
|
||||
5. On the **Components** page, in addition to the default selected **Microsoft Data Access Components (MDAC/ADO)** support, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box and select **Next**.
|
||||
|
||||

|
||||
|
||||
@ -62,19 +74,25 @@ On **CM01**:
|
||||
|
||||
>Note: Another common component to add here is Windows PowerShell to enable PowerShell support within Windows PE.
|
||||
|
||||
6. On the **Customization** page, select the **Use a custom background bitmap file** check box, and in the **UNC path:** text box, browse to **\\\\CM01\\Sources$\\OSD\\Branding\\ContosoBackground.bmp** and then click **Next** twice. Wait a few minutes while the boot image is generated, and then click **Finish**.
|
||||
7. Distribute the boot image to the CM01 distribution point by selecting the **Boot images** node, right-clicking the **Zero Touch WinPE x64** boot image, and selecting **Distribute Content**.
|
||||
8. In the Distribute Content Wizard, add the CM01 distribution point, and complete the wizard.
|
||||
9. Using Configuration Manager Trace, review the D:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file. Don't continue until you can see that the boot image is distributed. Look for the line that reads **STATMSG: ID=2301**. You also can monitor Content Status in the Configuration Manager Console at **\Monitoring\Overview\Distribution Status\Content Status\Zero Touch WinPE x64**. See the following examples:
|
||||
6. On the **Customization** page, select the **Use a custom background bitmap file** check box, and in the **UNC path:** text box, browse to **`\\CM01\Sources$\OSD\Branding\ContosoBackground.bmp`** and then select **Next** twice. Wait a few minutes while the boot image is generated, and then select **Finish**.
|
||||
|
||||
7. Distribute the boot image to the CM01 distribution point by selecting the **Boot images** node, right-clicking the **Zero Touch WinPE x64** boot image, and selecting **Distribute Content**.
|
||||
|
||||
8. In the Distribute Content Wizard, add the CM01 distribution point, and complete the wizard.
|
||||
|
||||
9. Using Configuration Manager Trace, review the `D:\Program Files\Microsoft Configuration Manager\Logs\distmgr.log` file. Don't continue until you can see that the boot image is distributed. Look for the line that reads **STATMSG: ID=2301**. You also can monitor Content Status in the Configuration Manager Console at **Monitoring** > **Overview** > **Distribution Status** > **Content Status** > **Zero Touch WinPE x64**. See the following examples:
|
||||
|
||||
<br>
|
||||

|
||||
|
||||
Content status for the Zero Touch WinPE x64 boot image
|
||||
|
||||
10. Using the Configuration Manager Console, in the Software Library workspace, under **Boot Images**, right-click the **Zero Touch WinPE x64** boot image and select **Properties**.
|
||||
11. On the **Data Source** tab, select the **Deploy this boot image from the PXE-enabled distribution point** check box, and click **OK**.
|
||||
10. Using the Configuration Manager Console, in the **Software Library** workspace, under **Boot Images**, right-click the **Zero Touch WinPE x64** boot image and select **Properties**.
|
||||
|
||||
11. On the **Data Source** tab, select the **Deploy this boot image from the PXE-enabled distribution point** check box, and select **OK**.
|
||||
|
||||
12. Using Configuration Manager Trace, review the D:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file and look for this text: **Expanding PS100009 to D:\\RemoteInstall\\SMSImages**.
|
||||
|
||||
13. Review the **D:\\RemoteInstall\\SMSImages** folder. You should see three folders containing boot images. Two are from the default boot images, and the third folder (PS100009) is from your new boot image with DaRT. See the examples below:
|
||||
|
||||
<br>
|
||||
@ -84,7 +102,7 @@ On **CM01**:
|
||||
|
||||
Next, see [Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md).
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)<br>
|
||||
[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)<br>
|
||||
|
@ -2,23 +2,26 @@
|
||||
title: Create a task sequence with Configuration Manager (Windows 10)
|
||||
description: Create a Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Create a task sequence with Configuration Manager and MDT
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
In this article, you'll learn how to create a Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard. Creating task sequences in Configuration Manager requires many more steps than creating task sequences for MDT Lite Touch installation. Luckily, the MDT wizard helps you through the process and also guides you through creating the needed packages.
|
||||
|
||||
For the purposes of this guide, we'll use one server computer: CM01.
|
||||
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). Note: Active Directory [permissions](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md#configure-active-directory-permissions) for the **CM_JD** account are required for the task sequence to work properly.
|
||||
@ -29,33 +32,47 @@ This section walks you through the process of creating a Configuration Manager t
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create MDT Task Sequence**.
|
||||
2. On the **Choose Template** page, select the **Client Task Sequence** template and click **Next**.
|
||||
3. On the **General** page, assign the following settings and then click **Next**:
|
||||
* Task sequence name: Windows 10 Enterprise x64 RTM
|
||||
* Task sequence comments: Production image with Office 365 Pro Plus x64
|
||||
4. On the **Details** page, assign the following settings and then click **Next**:
|
||||
* Join a Domain
|
||||
* Domain: contoso.com
|
||||
* Account: contoso\\CM\_JD
|
||||
* Password: pass@word1
|
||||
* Windows Settings
|
||||
* User name: Contoso
|
||||
* Organization name: Contoso
|
||||
* Product key: <blank>
|
||||
1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create MDT Task Sequence**.
|
||||
|
||||
5. On the **Capture Settings** page, accept the default settings, and click **Next**.
|
||||
6. On the **Boot Image** page, browse and select the **Zero Touch WinPE x64** boot image package. Then click **Next**.
|
||||
7. On the **MDT Package** page, select **Create a new Microsoft Deployment Toolkit Files package**, and in the **Package source folder to be created (UNC Path):** text box, type **\\\\CM01\\Sources$\\OSD\\MDT\\MDT**. Then click **Next**.
|
||||
8. On the **MDT Details** page, assign the name **MDT** and click **Next**.
|
||||
9. On the **OS Image** page, browse and select the **Windows 10 Enterprise x64 RTM** package. Then click **Next**.
|
||||
10. On the **Deployment Method** page, accept the default settings (Zero Touch installation) and click **Next**.
|
||||
11. On the **Client Package** page, browse and select the **Microsoft Corporation Configuration Manager Client Package** and click **Next**.
|
||||
12. On the **USMT Package** page, browse and select the **Microsoft Corporation User State Migration Tool for Windows** package and click **Next**.
|
||||
13. On the **Settings Package** page, select the **Create a new settings package** option, and in the **Package source folder to be created (UNC Path):** text box, type **\\\\CM01\\Sources$\\OSD\\Settings\\Windows 10 x64 Settings** and click **Next**.
|
||||
14. On the **Settings Details** page, assign the name **Windows 10 x64 Settings** and click **Next**.
|
||||
15. On the **Sysprep Package** page, click **Next** twice.
|
||||
16. On the **Confirmation** page, click **Finish**.
|
||||
2. On the **Choose Template** page, select the **Client Task Sequence** template and select **Next**.
|
||||
|
||||
3. On the **General** page, assign the following settings and then select **Next**:
|
||||
- Task sequence name: Windows 10 Enterprise x64 RTM
|
||||
- Task sequence comments: Production image with Office 365 Pro Plus x64
|
||||
|
||||
4. On the **Details** page, assign the following settings and then select **Next**:
|
||||
- Join a Domain
|
||||
- Domain: contoso.com
|
||||
- Account: contoso\\CM\_JD
|
||||
- Password: pass@word1
|
||||
- Windows Settings
|
||||
- User name: Contoso
|
||||
- Organization name: Contoso
|
||||
- Product key: *\<blank\>*
|
||||
|
||||
5. On the **Capture Settings** page, accept the default settings, and select **Next**.
|
||||
|
||||
6. On the **Boot Image** page, browse and select the **Zero Touch WinPE x64** boot image package. Then select **Next**.
|
||||
|
||||
7. On the **MDT Package** page, select **Create a new Microsoft Deployment Toolkit Files package**, and in the **Package source folder to be created (UNC Path):** text box, enter **`\\CM01\Sources$\OSD\MDT\MDT`**. Then select **Next**.
|
||||
|
||||
8. On the **MDT Details** page, assign the name **MDT** and select **Next**.
|
||||
|
||||
9. On the **OS Image** page, browse and select the **Windows 10 Enterprise x64 RTM** package. Then select **Next**.
|
||||
|
||||
10. On the **Deployment Method** page, accept the default settings (Zero Touch installation) and select **Next**.
|
||||
|
||||
11. On the **Client Package** page, browse and select the **Microsoft Corporation Configuration Manager Client Package** and select **Next**.
|
||||
|
||||
12. On the **USMT Package** page, browse and select the **Microsoft Corporation User State Migration Tool for Windows** package and select **Next**.
|
||||
|
||||
13. On the **Settings Package** page, select the **Create a new settings package** option, and in the **Package source folder to be created (UNC Path):** text box, enter **`\\CM01\Sources$\OSD\Settings\Windows 10 x64 Settings`** and select **Next**.
|
||||
|
||||
14. On the **Settings Details** page, assign the name **Windows 10 x64 Settings** and select **Next**.
|
||||
|
||||
15. On the **Sysprep Package** page, select **Next** twice.
|
||||
|
||||
16. On the **Confirmation** page, select **Finish**.
|
||||
|
||||
## Edit the task sequence
|
||||
|
||||
@ -63,70 +80,74 @@ After you create the task sequence, we recommend that you configure the task seq
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, click **Task Sequences**, right-click the **Windows 10 Enterprise x64 RTM** task sequence, and click **Edit**.
|
||||
2. In the **Install** group (about halfway down), select the **Set Variable for Drive Letter** action and configure the following:
|
||||
* OSDPreserveDriveLetter: True
|
||||
|
||||
>[!NOTE]
|
||||
>If you don't change this value, your Windows installation will end up in D:\\Windows.
|
||||
1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click the **Windows 10 Enterprise x64 RTM** task sequence, and select **Edit**.
|
||||
|
||||
2. In the **Post Install** group, select **Apply Network Settings**, and configure the **Domain OU** value to use the **Contoso / Computers / Workstations** OU (browse for values).
|
||||
|
||||
3. In the **Post Install** group, disable the **Auto Apply Drivers** action. (Disabling is done by selecting the action and, in the **Options** tab, selecting the **Disable this step** check box.)
|
||||
|
||||
4. After the disabled **Post Install / Auto Apply Drivers** action, add a new group name: **Drivers**.
|
||||
|
||||
5. After the **Post Install / Drivers** group, add an **Apply Driver Package** action with the following settings:
|
||||
|
||||
- Name: HP EliteBook 8560w
|
||||
- Driver Package: Windows 10 x64 - HP EliteBook 8560w
|
||||
- Options tab - Add Condition: Task Sequence Variable: Model equals HP EliteBook 8560w
|
||||
|
||||
> [!NOTE]
|
||||
> You also can add a Query WMI condition with the following query: SELECT \* FROM Win32\_ComputerSystem WHERE Model LIKE '%HP EliteBook 8560w%'
|
||||
|
||||
3. In the **Post Install** group, select **Apply Network Settings**, and configure the **Domain OU** value to use the **Contoso / Computers / Workstations** OU (browse for values).
|
||||
4. In the **Post Install** group, disable the **Auto Apply Drivers** action. (Disabling is done by selecting the action and, in the **Options** tab, selecting the **Disable this step** check box.)
|
||||
5. After the disabled **Post Install / Auto Apply Drivers** action, add a new group name: **Drivers**.
|
||||
6. After the **Post Install / Drivers** group, add an **Apply Driver Package** action with the following settings:
|
||||
* Name: HP EliteBook 8560w
|
||||
* Driver Package: Windows 10 x64 - HP EliteBook 8560w
|
||||
* Options tab - Add Condition: Task Sequence Variable: Model equals HP EliteBook 8560w
|
||||
|
||||
>[!NOTE]
|
||||
>You also can add a Query WMI condition with the following query: SELECT \* FROM Win32\_ComputerSystem WHERE Model LIKE '%HP EliteBook 8560w%'
|
||||
|
||||

|
||||
|
||||
|
||||
The driver package options
|
||||
|
||||
7. In the **State Restore / Install Applications** group, select the **Install Application** action.
|
||||
8. Select the **Install the following applications** radio button, and add the OSD / Adobe Reader DC - OSD Install application to the list.
|
||||
6. In the **State Restore / Install Applications** group, select the **Install Application** action.
|
||||
|
||||
7. Select the **Install the following applications** radio button, and add the OSD / Adobe Reader DC - OSD Install application to the list.
|
||||
|
||||

|
||||
|
||||
Add an application to the Configuration Manager task sequence
|
||||
|
||||
>[!NOTE]
|
||||
>In recent versions of Configuration Manager the Request State Store and Release State Store actions described below are present by default. These actions are used for common computer replace scenarios. There's also the additional condition on the options tab: USMTOfflineMigration not equals TRUE. If these actions are not present, try updating to the Config Mgr current branch release.
|
||||
> [!NOTE]
|
||||
> In recent versions of Configuration Manager the Request State Store and Release State Store actions described below are present by default. These actions are used for common computer replace scenarios. There's also the additional condition on the options tab: USMTOfflineMigration not equals TRUE. If these actions are not present, try updating to the latest Configuration Manager current branch release.
|
||||
|
||||
9. In the **State Restore** group, after the **Set Status 5** action, verify there's a **User State \ Request State Store** action with the following settings:
|
||||
* Request state storage location to: Restore state from another computer
|
||||
* If computer account fails to connect to state store, use the Network Access account: selected
|
||||
* Options: Continue on error
|
||||
* Options / Add Condition:
|
||||
* Task Sequence Variable
|
||||
* USMTLOCAL not equals True
|
||||
8. In the **State Restore** group, after the **Set Status 5** action, verify there's a **User State \ Request State Store** action with the following settings:
|
||||
|
||||
10. In the **State Restore** group, after the **Restore User State** action, verify there's a **Release State Store** action with the following settings:
|
||||
* Options: Continue on error
|
||||
* Options / Condition:
|
||||
* Task Sequence Variable
|
||||
* USMTLOCAL not equals True
|
||||
- Request state storage location to: Restore state from another computer
|
||||
- If computer account fails to connect to state store, use the Network Access account: selected
|
||||
- Options: Continue on error
|
||||
- Options / Add Condition:
|
||||
- Task Sequence Variable
|
||||
- USMTLOCAL not equals True
|
||||
|
||||
11. Click **OK**.
|
||||
9. In the **State Restore** group, after the **Restore User State** action, verify there's a **Release State Store** action with the following settings:
|
||||
- Options: Continue on error
|
||||
- Options / Condition:
|
||||
- Task Sequence Variable
|
||||
- USMTLOCAL not equals True
|
||||
|
||||
10. Select **OK**.
|
||||
|
||||
## Organize your packages (optional)
|
||||
|
||||
If desired, you can create a folder structure for packages. This folder structure is purely for organizational purposes and is useful if you need to manage a large number of packages.
|
||||
If desired, you can create a folder structure for packages. This folder structure is purely for organizational purposes and is useful if you need to manage a large number of packages.
|
||||
|
||||
To create a folder for packages:
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager Console, in the Software Library workspace, expand **Application Management**, and then select **Packages**.
|
||||
2. Right-click **Packages**, point to **Folder**, click **Create Folder** and create the OSD folder. This process will create the Root \ OSD folder structure.
|
||||
3. Select the **MDT**, **User State Migration Tool for Windows**, and **Windows 10 x64 Settings** packages, right-click and select **Move**.
|
||||
4. In the **Move Selected Items** dialog box, select the **OSD** folder, and click **OK**.
|
||||
1. Using the Configuration Manager Console, in the **Software Library** workspace, expand **Application Management**, and then select **Packages**.
|
||||
|
||||
2. Right-click **Packages**, point to **Folder**, select **Create Folder** and create the OSD folder. This process will create the Root \ OSD folder structure.
|
||||
|
||||
3. Select the **MDT**, **User State Migration Tool for Windows**, and **Windows 10 x64 Settings** packages, right-click and select **Move**.
|
||||
|
||||
4. In the **Move Selected Items** dialog box, select the **OSD** folder, and select **OK**.
|
||||
|
||||
Next, see [Finalize the operating system configuration for Windows 10 deployment with Configuration Manager](finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md).
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](../deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)<br>
|
||||
[Create a custom Windows PE boot image with Configuration Manager](../deploy-windows-cm/create-a-custom-windows-pe-boot-image-with-configuration-manager.md)<br>
|
||||
|
@ -1,76 +1,89 @@
|
||||
---
|
||||
title: Create an app to deploy with Windows 10 using Configuration Manager
|
||||
description: Microsoft Endpoint Manager supports deploying applications as part of the Windows 10 deployment process.
|
||||
description: Microsoft Configuration Manager supports deploying applications as part of the Windows 10 deployment process.
|
||||
ms.assetid: 2dfb2f39-1597-4999-b4ec-b063e8a8c90c
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Create an application to deploy with Windows 10 using Configuration Manager
|
||||
|
||||
*Applies to:*
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
|
||||
- Windows 10
|
||||
|
||||
Microsoft Endpoint Manager supports deploying applications as part of the Windows 10 deployment process. In this section, you create an application in Microsoft Endpoint Manager that you later configure the task sequence to use.
|
||||
Microsoft Configuration Manager supports deploying applications as part of the Windows 10 deployment process. In this section, you create an application in Microsoft Configuration Manager that you later configure the task sequence to use.
|
||||
|
||||
For the purposes of this guide, we'll use one server computer: CM01.
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
>[!NOTE]
|
||||
>The [reference image](add-a-windows-10-operating-system-image-using-configuration-manager.md) used in this lab already contains some applications, such as Microsoft Office 365 Pro Plus x64. The procedure demonstrated in this article enables you to add some additional custom applications beyond those included in the reference image.
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
> [!NOTE]
|
||||
> The [reference image](add-a-windows-10-operating-system-image-using-configuration-manager.md) used in this lab already contains some applications, such as Microsoft Office 365 Pro Plus x64. The procedure demonstrated in this article enables you to add some additional custom applications beyond those included in the reference image.
|
||||
|
||||
## Example: Create the Adobe Reader application
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Create the **D:\Setup** folder if it doesn't already exist.
|
||||
1. Download the Enterprise distribution version of [Adobe Acrobat Reader DC](https://get.adobe.com/reader/enterprise/) (ex: AcroRdrDC2000620034_en_US.exe) to **D:\\Setup\\Adobe** on CM01. The filename will differ depending on the version of Acrobat Reader.
|
||||
2. Extract the .exe file that you downloaded to a .msi. The source folder will differ depending on where you downloaded the file. See the following example:
|
||||
1. Create the **`D:\Setup`** folder if it doesn't already exist.
|
||||
|
||||
```powershell
|
||||
Set-Location C:\Users\administrator.CONTOSO\Downloads
|
||||
.\AcroRdrDC2000620034_en_US.exe -sfx_o"d:\Setup\Adobe\" -sfx_ne
|
||||
```
|
||||
>Note: the extraction process will create the "Adobe" folder
|
||||
2. Download the Enterprise distribution version of [Adobe Acrobat Reader DC](https://get.adobe.com/reader/enterprise/) (ex: AcroRdrDC2000620034_en_US.exe) to **`D:\Setup\Adobe`** on CM01. The filename will differ depending on the version of Acrobat Reader.
|
||||
|
||||
3. Using File Explorer, copy the **D:\\Setup\\Adobe** folder to the **D:\\Sources\\Software\\Adobe** folder.
|
||||
4. In the Configuration Manager Console, in the Software Library workspace, expand **Application Management**.
|
||||
5. Right-click **Applications**, point to **Folder** and then click **Create Folder**. Assign the name **OSD**.
|
||||
6. Right-click the **OSD** folder, and click **Create Application**.
|
||||
7. In the Create Application Wizard, on the **General** page, use the following settings:
|
||||
3. Extract the .exe file that you downloaded to a .msi. The source folder will differ depending on where you downloaded the file. See the following example:
|
||||
|
||||
* Automatically detect information about this application from installation files
|
||||
* Type: Windows Installer (\*.msi file)
|
||||
* Location: \\\\CM01\\Sources$\\Software\\Adobe\\AcroRead.msi
|
||||
```powershell
|
||||
Set-Location C:\Users\administrator.CONTOSO\Downloads
|
||||
.\AcroRdrDC2000620034_en_US.exe -sfx_o"d:\Setup\Adobe\" -sfx_ne
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> The extraction process will create the "Adobe" folder.
|
||||
|
||||
4. Using File Explorer, copy the **`D:\Setup\Adobe`** folder to the **`D:\Sources\Software\Adobe`** folder.
|
||||
|
||||
5. In the Configuration Manager Console, in the **Software Library** workspace, expand **Application Management**.
|
||||
|
||||
6. Right-click **Applications**, point to **Folder** and then select **Create Folder**. Assign the name **OSD**.
|
||||
|
||||
7. Right-click the **OSD** folder, and select **Create Application**.
|
||||
|
||||
8. In the Create Application Wizard, on the **General** page, use the following settings:
|
||||
|
||||
- Automatically detect information about this application from installation files
|
||||
- Type: Windows Installer (\*.msi file)
|
||||
- Location: `\\CM01\Sources$\Software\Adobe\AcroRead.msi`
|
||||
|
||||

|
||||
|
||||
The Create Application Wizard
|
||||
|
||||
8. Click **Next**, and wait while Configuration Manager parses the MSI file.
|
||||
9. On the **Import Information** page, review the information and then click **Next**.
|
||||
10. On the **General Information** page, name the application Adobe Acrobat Reader DC - OSD Install, click **Next** twice, and then click **Close**.
|
||||
9. Select **Next**, and wait while Configuration Manager parses the MSI file.
|
||||
|
||||
>[!NOTE]
|
||||
>Because it is not possible to reference an application deployment type in the task sequence, you should have a single deployment type for applications deployed by the task sequence. If you are deploying applications via both the task sequence and normal application deployment, and you have multiple deployment types, you should have two applications of the same software. In this section, you add the "OSD Install" suffix to applications that are deployed via the task sequence. If using packages, you can still reference both package and program in the task sequence.
|
||||
10. On the **Import Information** page, review the information and then select **Next**.
|
||||
|
||||
11. On the **General Information** page, name the application Adobe Acrobat Reader DC - OSD Install, select **Next** twice, and then select **Close**.
|
||||
|
||||
> [!NOTE]
|
||||
> Because it is not possible to reference an application deployment type in the task sequence, you should have a single deployment type for applications deployed by the task sequence. If you are deploying applications via both the task sequence and normal application deployment, and you have multiple deployment types, you should have two applications of the same software. In this section, you add the "OSD Install" suffix to applications that are deployed via the task sequence. If using packages, you can still reference both package and program in the task sequence.
|
||||
|
||||

|
||||

|
||||
|
||||
Add the "OSD Install" suffix to the application name
|
||||
Add the "OSD Install" suffix to the application name
|
||||
|
||||
11. In the **Applications** node, select the Adobe Reader - OSD Install application, and click **Properties** on the ribbon bar (this path is another place to view properties, you can also right-click and select properties).
|
||||
12. On the **General Information** tab, select the **Allow this application to be installed from the Install Application task sequence action without being deployed** check box, and click **OK**.
|
||||
12. In the **Applications** node, select the Adobe Reader - OSD Install application, and select **Properties** on the ribbon bar (this path is another place to view properties, you can also right-click and select properties).
|
||||
|
||||
Next, see [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md).
|
||||
13. On the **General Information** tab, select the **Allow this application to be installed from the Install Application task sequence action without being deployed** check box, and select **OK**.
|
||||
|
||||
## Related topics
|
||||
Next, see [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md).
|
||||
|
||||
## Related articles
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)<br>
|
||||
[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)<br>
|
||||
|
@ -1,25 +1,27 @@
|
||||
---
|
||||
title: Deploy Windows 10 using PXE and Configuration Manager (Windows 10)
|
||||
description: In this topic, you'll learn how to deploy Windows 10 using Microsoft Endpoint Manager deployment packages and task sequences.
|
||||
description: In this article, you'll learn how to deploy Windows 10 using Microsoft Configuration Manager deployment packages and task sequences.
|
||||
ms.assetid: fb93f514-5b30-4f4b-99dc-58e6860009fa
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.collection: highpri
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Deploy Windows 10 using PXE and Configuration Manager
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
In this topic, you'll learn how to deploy Windows 10 using Microsoft Endpoint Manager deployment packages and task sequences. This topic will walk you through the process of deploying the Windows 10 Enterprise image to a Unified Extensible Firmware Interface (UEFI) computer named PC0001. An existing Configuration Manager infrastructure that is integrated with MDT is used for the procedures in this topic.
|
||||
In this article, you'll learn how to deploy Windows 10 using Microsoft Configuration Manager deployment packages and task sequences. This article will walk you through the process of deploying the Windows 10 Enterprise image to a Unified Extensible Firmware Interface (UEFI) computer named PC0001. An existing Configuration Manager infrastructure that is integrated with MDT is used for the procedures in this article.
|
||||
|
||||
This article assumes that you've completed the following prerequisite procedures:
|
||||
|
||||
This topic assumes that you've completed the following prerequisite procedures:
|
||||
- [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
|
||||
- [Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
|
||||
- [Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
|
||||
@ -29,37 +31,49 @@ This topic assumes that you've completed the following prerequisite procedures:
|
||||
- [Finalize the operating system configuration for Windows 10 deployment with Configuration Manager](finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md)
|
||||
|
||||
For the purposes of this guide, we'll use a minimum of two server computers (DC01 and CM01) and one client computer (PC0001).
|
||||
|
||||
- DC01 is a domain controller and DNS server for the contoso.com domain. DHCP services are also available and optionally installed on DC01 or another server. Note: DHCP services are required for the client (PC0001) to connect to the Windows Deployment Service (WDS).
|
||||
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server.
|
||||
- CM01 is also running WDS that will be required to start PC0001 via PXE. **Note**: Ensure that only CM01 is running WDS.
|
||||
|
||||
- CM01 is also running WDS that will be required to start PC0001 via PXE.
|
||||
|
||||
> [!NOTE]
|
||||
> Ensure that only CM01 is running WDS.
|
||||
|
||||
- PC0001 is a client computer that is blank, or has an operating system that will be erased and replaced with Windows 10. The device must be configured to boot from the network.
|
||||
|
||||
>[!NOTE]
|
||||
>If desired, PC0001 can be a VM hosted on the server HV01, which is a Hyper-V host computer that we used previously to build a Windows 10 reference image. However, if PC0001 is a VM then you must ensure it has sufficient resources available to run the Configuration Manager OSD task sequence. 2GB of RAM or more is recommended.
|
||||
> [!NOTE]
|
||||
> If desired, PC0001 can be a VM hosted on the server HV01, which is a Hyper-V host computer that we used previously to build a Windows 10 reference image. However, if PC0001 is a VM then you must ensure it has sufficient resources available to run the Configuration Manager OSD task sequence. 2GB of RAM or more is recommended.
|
||||
|
||||
All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
All server and client computers referenced in this guide are on the same subnet. This connection isn't required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates.
|
||||
All server and client computers referenced in this guide are on the same subnet. This connection isn't required. But each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the `contoso.com` domain. Internet connectivity is also required to download OS and application updates.
|
||||
|
||||
>[!NOTE]
|
||||
>No WDS console configuration is required for PXE to work. Everything is done with the Configuration Manager console.
|
||||
> [!NOTE]
|
||||
> No WDS console configuration is required for PXE to work. Everything is done with the Configuration Manager console.
|
||||
|
||||
## Procedures
|
||||
|
||||
1. Start the PC0001 computer. At the Pre-Boot Execution Environment (PXE) boot menu, press **Enter** to allow it to PXE boot.
|
||||
2. On the **Welcome to the Task Sequence Wizard** page, type in the password **pass\@word1** and click **Next**.
|
||||
3. On the **Select a task sequence to run** page, select **Windows 10 Enterprise x64 RTM** and click **Next**.
|
||||
4. On the **Edit Task Sequence Variables** page, double-click the **OSDComputerName** variable, and in the **Value** field, type **PC0001** and click **OK**. Then click **Next**.
|
||||
5. The operating system deployment will take several minutes to complete.
|
||||
6. You can monitor the deployment on CM01 using the MDT Deployment Workbench. When you see the PC0001 entry, double-click **PC0001**, and then click **DaRT Remote Control** and review the **Remote Control** option. The task sequence will run and do the following steps:
|
||||
|
||||
* Install the Windows 10 operating system.
|
||||
* Install the Configuration Manager client and the client hotfix.
|
||||
* Join the computer to the domain.
|
||||
* Install the application added to the task sequence.
|
||||
|
||||
>[!NOTE]
|
||||
>You also can use the built-in reports to get information about ongoing deployments. For example, a task sequence report gives you a quick overview of the task sequence progress.
|
||||
2. On the **Welcome to the Task Sequence Wizard** page, enter in the password **pass\@word1** and select **Next**.
|
||||
|
||||
3. On the **Select a task sequence to run** page, select **Windows 10 Enterprise x64 RTM** and select **Next**.
|
||||
|
||||
4. On the **Edit Task Sequence Variables** page, double-click the **OSDComputerName** variable, and in the **Value** field, enter **PC0001** and select **OK**. Then select **Next**.
|
||||
|
||||
5. The operating system deployment will take several minutes to complete.
|
||||
|
||||
6. You can monitor the deployment on CM01 using the MDT Deployment Workbench. When you see the PC0001 entry, double-click **PC0001**, and then select **DaRT Remote Control** and review the **Remote Control** option. The task sequence will run and do the following steps:
|
||||
|
||||
- Install the Windows 10 operating system.
|
||||
- Install the Configuration Manager client and the client hotfix.
|
||||
- Join the computer to the domain.
|
||||
- Install the application added to the task sequence.
|
||||
|
||||
> [!NOTE]
|
||||
> You also can use the built-in reports to get information about ongoing deployments. For example, a task sequence report gives you a quick overview of the task sequence progress.
|
||||
|
||||

|
||||
|
||||
@ -86,7 +100,7 @@ Examples are provided below of various stages of deployment:
|
||||
|
||||
Next, see [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md).
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)<br>
|
||||
[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)<br>
|
||||
|
@ -2,42 +2,45 @@
|
||||
title: Finalize operating system configuration for Windows 10 deployment
|
||||
description: This article provides a walk-through to finalize the configuration of your Windows 10 operating deployment.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Finalize the operating system configuration for Windows 10 deployment with Configuration Manager
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
This topic walks you through the steps to finalize the configuration of your Windows 10 operating deployment, which includes enabling optional MDT monitoring for Configuration Manager, logs folder settings, rules configuration, content distribution, and deployment of the previously created task sequence.
|
||||
This article walks you through the steps to finalize the configuration of your Windows 10 operating deployment, which includes enabling optional MDT monitoring for Configuration Manager, logs folder settings, rules configuration, content distribution, and deployment of the previously created task sequence.
|
||||
|
||||
For the purposes of this guide, we'll use one server computer: CM01.
|
||||
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server. CM01 is running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
|
||||
## Enable MDT monitoring
|
||||
|
||||
This section will walk you through the process of creating the D:\\MDTProduction deployment share using the MDT Deployment Workbench to enable monitoring for Configuration Manager.
|
||||
This section will walk you through the process of creating the **`D:\MDTProduction`** deployment share using the MDT Deployment Workbench to enable monitoring for Configuration Manager.
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Open the Deployment Workbench, right-click **Deployment Shares** and click **New Deployment Share**. Use the following settings for the New Deployment Share Wizard:
|
||||
1. Open the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**. Use the following settings for the New Deployment Share Wizard:
|
||||
|
||||
* Deployment share path: D:\\MDTProduction
|
||||
* Share name: MDTProduction$
|
||||
* Deployment share description: MDT Production
|
||||
* Options: <default settings>
|
||||
- Deployment share path: D:\\MDTProduction
|
||||
- Share name: MDTProduction$
|
||||
- Deployment share description: MDT Production
|
||||
- Options: *\<default settings\>*
|
||||
|
||||
2. Right-click the **MDT Production** deployment share, and click **Properties**. On the **Monitoring** tab, select the **Enable monitoring for this deployment share** check box, and click **OK**.
|
||||
2. Right-click the **MDT Production** deployment share, and select **Properties**. On the **Monitoring** tab, select the **Enable monitoring for this deployment share** check box, and select **OK**.
|
||||
|
||||

|
||||
|
||||
@ -49,16 +52,17 @@ The D:\Logs folder was [created previously](prepare-for-zero-touch-installation-
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. To configure NTFS permissions using icacls.exe, type the following command at an elevated Windows PowerShell prompt:
|
||||
1. To configure NTFS permissions using `icacls.exe`, enter the following command at an elevated Windows PowerShell prompt:
|
||||
|
||||
```
|
||||
icacls D:\Logs /grant '"CM_NAA":(OI)(CI)(M)'
|
||||
```cmd
|
||||
icacls.exe D:\Logs /grant '"CM_NAA":(OI)(CI)(M)'
|
||||
```
|
||||
|
||||
2. Using File Explorer, navigate to the **D:\\Sources\\OSD\\Settings\\Windows 10 x64 Settings** folder.
|
||||
3. To enable server-side logging, edit the CustomSetting.ini file with Notepad.exe and enter the following settings:
|
||||
2. Using File Explorer, navigate to the **`D:\Sources\OSD\Settings\Windows 10 x64 Settings`** folder.
|
||||
|
||||
```
|
||||
3. To enable server-side logging, edit the `CustomSetting.ini` file with `Notepad.exe` and enter the following settings:
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
Properties=OSDMigrateConfigFiles,OSDMigrateMode
|
||||
@ -77,12 +81,12 @@ On **CM01**:
|
||||
|
||||

|
||||
|
||||
The Settings package, holding the rules and the Unattend.xml template used during deployment
|
||||
The Settings package, holding the rules and the `Unattend.xml` template used during deployment
|
||||
|
||||
3. In the Configuration Manager console, update the distribution point for the **Windows 10 x64 Settings** package by right-clicking the **Windows 10 x64 Settings** package and selecting **Update Distribution Points**. Click **OK** in the popup dialog box.
|
||||
4. In the Configuration Manager console, update the distribution point for the **Windows 10 x64 Settings** package by right-clicking the **Windows 10 x64 Settings** package and selecting **Update Distribution Points**. Select **OK** in the popup dialog box.
|
||||
|
||||
>[!NOTE]
|
||||
>Although you haven't yet added a distribution point, you still need to select Update Distribution Points. This process also updates the Configuration Manager content library with changes.
|
||||
> [!NOTE]
|
||||
> Although you haven't yet added a distribution point, you still need to select Update Distribution Points. This process also updates the Configuration Manager content library with changes.
|
||||
|
||||
## Distribute content to the CM01 distribution portal
|
||||
|
||||
@ -90,9 +94,11 @@ In Configuration Manager, you can distribute all packages needed by a task seque
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager console, in the Software Library workspace, expand **Operating Systems** and select **Task Sequences**. Right-click the **Windows 10 Enterprise x64 RTM** task sequence, and select **Distribute Content**.
|
||||
2. In the Distribute Content Wizard, click **Next** twice then on the **Specify the content destination** page add the Distribution Point: **CM01.CONTOSO.COM**, and then complete the wizard.
|
||||
3. Using the CMTrace tool, verify the distribution to the CM01 distribution point by reviewing the distmgr.log file, or use the Distribution Status / Content Status option in the Monitoring workspace. Don't continue until you see all the new packages being distributed successfully.
|
||||
1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems** and select **Task Sequences**. Right-click the **Windows 10 Enterprise x64 RTM** task sequence, and select **Distribute Content**.
|
||||
|
||||
2. In the Distribute Content Wizard, select **Next** twice then on the **Specify the content destination** page add the Distribution Point: **CM01.CONTOSO.COM**, and then complete the wizard.
|
||||
|
||||
3. Using the CMTrace tool, verify the distribution to the CM01 distribution point by reviewing the `distmgr.log` file, or use the Distribution Status / Content Status option in the Monitoring workspace. Don't continue until you see all the new packages being distributed successfully.
|
||||
|
||||

|
||||
|
||||
@ -104,21 +110,26 @@ This section provides steps to help you create a deployment for the task sequenc
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager console, in the Software Library workspace, expand **Operating Systems** and select **Task Sequences**, right-click **Windows 10 Enterprise x64 RTM** and then click **Deploy**.
|
||||
2. In the Deploy Software Wizard, on the **General** page, select the **All Unknown Computers** collection and click **Next**.
|
||||
3. On the **Deployment Settings** page, use the following settings and then click **Next**:
|
||||
1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems** and select **Task Sequences**, right-click **Windows 10 Enterprise x64 RTM** and then select **Deploy**.
|
||||
|
||||
* Purpose: Available
|
||||
* Make available to the following: Only media and PXE
|
||||
2. In the Deploy Software Wizard, on the **General** page, select the **All Unknown Computers** collection and select **Next**.
|
||||
|
||||
3. On the **Deployment Settings** page, use the below settings and then select **Next**:
|
||||
|
||||
- Purpose: Available
|
||||
- Make available to the following: Only media and PXE
|
||||
|
||||

|
||||
|
||||
|
||||
Configure the deployment settings
|
||||
|
||||
4. On the **Scheduling** page, accept the default settings and click **Next**.
|
||||
5. On the **User Experience** page, accept the default settings and click **Next**.
|
||||
6. On the **Alerts** page, accept the default settings and click **Next**.
|
||||
7. On the **Distribution Points** page, accept the default settings, click **Next** twice, and then click **Close**.
|
||||
4. On the **Scheduling** page, accept the default settings and select **Next**.
|
||||
|
||||
5. On the **User Experience** page, accept the default settings and select **Next**.
|
||||
|
||||
6. On the **Alerts** page, accept the default settings and select **Next**.
|
||||
|
||||
7. On the **Distribution Points** page, accept the default settings, select **Next** twice, and then select **Close**.
|
||||
|
||||

|
||||
|
||||
@ -132,25 +143,25 @@ This section provides steps to help you configure the All Unknown Computers coll
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager console, in the Asset and Compliance workspace, select **Device Collections**, right-click **All Unknown Computers**, and click **Properties**.
|
||||
1. Using the Configuration Manager console, in the **Asset and Compliance** workspace, select **Device Collections**, right-click **All Unknown Computers**, and select **Properties**.
|
||||
|
||||
2. On the **Collection Variables** tab, create a new variable with the following settings:
|
||||
|
||||
* Name: OSDComputerName
|
||||
* Clear the **Do not display this value in the Configuration Manager console** check box.
|
||||
- Name: OSDComputerName
|
||||
- Clear the **Do not display this value in the Configuration Manager console** check box.
|
||||
|
||||
3. Click **OK**.
|
||||
3. Select **OK**.
|
||||
|
||||
> [!NOTE]
|
||||
> Configuration Manager can prompt for information in many ways. Using a collection variable with an empty value is just one of them. Another option is the User-Driven Installation (UDI) wizard.
|
||||
|
||||
>[!NOTE]
|
||||
>Configuration Manager can prompt for information in many ways. Using a collection variable with an empty value is just one of them. Another option is the User-Driven Installation (UDI) wizard.
|
||||
|
||||

|
||||
|
||||
|
||||
Configure a collection variable
|
||||
|
||||
Next, see [Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md).
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)<br>
|
||||
[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)<br>
|
||||
|
@ -2,21 +2,23 @@
|
||||
title: Prepare for Zero Touch Installation of Windows 10 with Configuration Manager
|
||||
description: Learn how to prepare a Zero Touch Installation of Windows 10 with Configuration Manager, by integrating Configuration Manager with Microsoft Deployment Toolkit.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: how-to
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Prepare for Zero Touch Installation of Windows 10 with Configuration Manager
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
|
||||
This article walks you through the Zero Touch Installation (ZTI) process of Windows 10 OS deployment using Microsoft Endpoint Configuration Manager [integrated](#why-integrate-mdt-with-configuration-manager) with Microsoft Deployment Toolkit (MDT).
|
||||
This article walks you through the Zero Touch Installation (ZTI) process of Windows 10 OS deployment using Microsoft Configuration Manager [integrated](#why-integrate-mdt-with-configuration-manager) with Microsoft Deployment Toolkit (MDT).
|
||||
|
||||
## Prerequisites
|
||||
|
||||
@ -26,18 +28,30 @@ In this article, you'll use [components](#components-of-configuration-manager-op
|
||||
|
||||
> [!NOTE]
|
||||
> Procedures in this guide use Configuration Manager version 1910. For more information about the versions of Windows 10 supported by Configuration Manager, see [Support for Windows 10](/mem/configmgr/core/plan-design/configs/support-for-windows-10).
|
||||
|
||||
- The [Active Directory Schema has been extended](/mem/configmgr/core/plan-design/network/extend-the-active-directory-schema) and System Management container created.
|
||||
|
||||
- Active Directory Forest Discovery and Active Directory System Discovery are [enabled](/mem/configmgr/core/servers/deploy/configure/configure-discovery-methods).
|
||||
|
||||
- IP range [boundaries and a boundary group](/mem/configmgr/core/servers/deploy/configure/define-site-boundaries-and-boundary-groups) for content and site assignment have been created.
|
||||
|
||||
- The Configuration Manager [reporting services](/mem/configmgr/core/servers/manage/configuring-reporting) point role has been added and configured.
|
||||
|
||||
- A file system folder structure and Configuration Manager console folder structure for packages has been created. Steps to verify or create this folder structure are [provided below](#review-the-sources-folder-structure).
|
||||
- The [Windows ADK](/windows-hardware/get-started/adk-install) (including USMT) version 1903, Windows PE add-on, WSIM 1903 update, [MDT](https://www.microsoft.com/download/details.aspx?id=54259) version 8456, and DaRT 10 (part of [MDOP 2015](https://my.visualstudio.com/Downloads?q=Desktop%20Optimization%20Pack%202015)) are installed.
|
||||
|
||||
- The [Windows ADK](/windows-hardware/get-started/adk-install) version that is [supported for the version of Configuration Manager](/mem/configmgr/core/plan-design/configs/support-for-windows-adk) that is installed, including the Windows PE add-on. USMT should be installed as part of the Windows ADK install.
|
||||
|
||||
- [MDT](https://www.microsoft.com/download/details.aspx?id=54259) version 8456
|
||||
|
||||
- DaRT 10 (part of [MDOP 2015](https://my.visualstudio.com/Downloads?q=Desktop%20Optimization%20Pack%202015)) are installed.
|
||||
|
||||
- The [CMTrace tool](/configmgr/core/support/cmtrace) (cmtrace.exe) is installed on the distribution point.
|
||||
|
||||
> [!NOTE]
|
||||
> CMTrace is automatically installed with the current branch of Configuration Manager at **Program Files\Microsoft Configuration Manager\tools\cmtrace.exe**.
|
||||
> CMTrace is automatically installed with the current branch of Configuration Manager at **`Program Files\Microsoft Configuration Manager\tools\cmtrace.exe`**.
|
||||
|
||||
For the purposes of this guide, we'll use three server computers: DC01, CM01 and HV01.
|
||||
|
||||
For the purposes of this guide, we'll use three server computers: DC01, CM01 and HV01.
|
||||
- DC01 is a domain controller and DNS server for the contoso.com domain. DHCP services are also available and optionally installed on DC01 or another server.
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server.
|
||||
- HV01 is a Hyper-V host computer that is used to build a Windows 10 reference image. This computer doesn't need to be a domain member.
|
||||
@ -52,18 +66,18 @@ The following generic credentials are used in this guide. You should replace the
|
||||
|
||||
- **Active Directory domain name**: `contoso.com`
|
||||
- **Domain administrator username**: `administrator`
|
||||
-**Domain administrator password**: `pass@word1`
|
||||
- **Domain administrator password**: `pass@word1`
|
||||
|
||||
## Create the OU structure
|
||||
|
||||
>[!NOTE]
|
||||
>If you've already [created the OU structure](../deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md#create-the-ou-structure) that was used in the OSD guide for MDT, the same structure is used here and you can skip this section.
|
||||
> [!NOTE]
|
||||
> If you've already [created the OU structure](../deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md#create-the-ou-structure) that was used in the OSD guide for MDT, the same structure is used here and you can skip this section.
|
||||
|
||||
On **DC01**:
|
||||
|
||||
To create the OU structure, you can use the Active Directory Users and Computers console (dsa.msc), or you can use Windows PowerShell. The procedure below uses Windows PowerShell.
|
||||
|
||||
To use Windows PowerShell, copy the following commands into a text file and save it as `C:\Setup\Scripts\ou.ps1` Ensure that you're viewing file extensions and that you save the file with the `.ps1` extension.
|
||||
To use Windows PowerShell, copy the following commands into a text file and save it as `C:\Setup\Scripts\ou.ps1`. Ensure that you're viewing file extensions and that you save the file with the `.ps1` extension.
|
||||
|
||||
```powershell
|
||||
$oulist = Import-csv -Path c:\oulist.txt
|
||||
@ -105,25 +119,27 @@ A role-based model is used to configure permissions for the service accounts nee
|
||||
|
||||
On **DC01**:
|
||||
|
||||
1. In the Active Directory Users and Computers console, browse to **contoso.com / Contoso / Service Accounts**.
|
||||
2. Select the Service Accounts OU and create the CM\_JD account using the following settings:
|
||||
1. In the Active Directory Users and Computers console, browse to **contoso.com** > **Contoso** > **Service Accounts**.
|
||||
|
||||
* Name: CM\_JD
|
||||
* User sign-in name: CM\_JD
|
||||
* Password: `pass@word1`
|
||||
* User must change password at next logon: Clear
|
||||
* User can't change password: Selected
|
||||
* Password never expires: Selected
|
||||
2. Select the Service Accounts OU and create the CM\_JD account using the following settings:
|
||||
|
||||
3. Repeat the step, but for the CM\_NAA account.
|
||||
4. After creating the accounts, assign the following descriptions:
|
||||
- Name: CM\_JD
|
||||
- User sign-in name: CM\_JD
|
||||
- Password: `pass@word1`
|
||||
- User must change password at next logon: Clear
|
||||
- User can't change password: Selected
|
||||
- Password never expires: Selected
|
||||
|
||||
* CM\_JD: Configuration Manager Join Domain Account
|
||||
* CM\_NAA: Configuration Manager Network Access Account
|
||||
3. Repeat the step, but for the CM\_NAA account.
|
||||
|
||||
4. After creating the accounts, assign the following descriptions:
|
||||
|
||||
- CM\_JD: Configuration Manager Join Domain Account
|
||||
- CM\_NAA: Configuration Manager Network Access Account
|
||||
|
||||
## Configure Active Directory permissions
|
||||
|
||||
In order for the Configuration Manager Join Domain Account (CM\_JD) to join machines into the contoso.com domain, you need to configure permissions in Active Directory. These steps assume you've downloaded the sample [Set-OUPermissions.ps1 script](https://go.microsoft.com/fwlink/p/?LinkId=619362) and copied it to C:\\Setup\\Scripts on DC01.
|
||||
In order for the Configuration Manager Join Domain Account (CM\_JD) to join machines into the contoso.com domain, you need to configure permissions in Active Directory. These steps assume you've downloaded the sample [Set-OUPermissions.ps1 script](https://go.microsoft.com/fwlink/p/?LinkId=619362) and copied it to `C:\Setup\Scripts` on DC01.
|
||||
|
||||
On **DC01**:
|
||||
|
||||
@ -137,18 +153,18 @@ On **DC01**:
|
||||
|
||||
2. The Set-OUPermissions.ps1 script allows the CM\_JD user account permissions to manage computer accounts in the Contoso / Computers / Workstations OU. The following list is that of permissions being granted:
|
||||
|
||||
* Scope: This object and all descendant objects
|
||||
* Create Computer objects
|
||||
* Delete Computer objects
|
||||
* Scope: Descendant Computer objects
|
||||
* Read All Properties
|
||||
* Write All Properties
|
||||
* Read Permissions
|
||||
* Modify Permissions
|
||||
* Change Password
|
||||
* Reset Password
|
||||
* Validated write to DNS host name
|
||||
* Validated write to service principal name
|
||||
- Scope: This object and all descendant objects
|
||||
- Create Computer objects
|
||||
- Delete Computer objects
|
||||
- Scope: Descendant Computer objects
|
||||
- Read All Properties
|
||||
- Write All Properties
|
||||
- Read Permissions
|
||||
- Modify Permissions
|
||||
- Change Password
|
||||
- Reset Password
|
||||
- Validated write to DNS host name
|
||||
- Validated write to service principal name
|
||||
|
||||
## Review the Sources folder structure
|
||||
|
||||
@ -156,9 +172,6 @@ On **CM01**:
|
||||
|
||||
To support the packages you create in this article, the following folder structure should be created on the Configuration Manager primary site server (CM01):
|
||||
|
||||
>[!NOTE]
|
||||
>In most production environments, the packages are stored on a Distributed File System (DFS) share or a "normal" server share, but in a lab environment you can store them on the site server.
|
||||
|
||||
- D:\\Sources
|
||||
- D:\\Sources\\OSD
|
||||
- D:\\Sources\\OSD\\Boot
|
||||
@ -171,11 +184,13 @@ To support the packages you create in this article, the following folder structu
|
||||
- D:\\Sources\\Software
|
||||
- D:\\Sources\\Software\\Adobe
|
||||
- D:\\Sources\\Software\\Microsoft
|
||||
- D:\\Logs
|
||||
|
||||
> [!NOTE]
|
||||
> In most production environments, the packages are stored on a Distributed File System (DFS) share or a "normal" server share, but in a lab environment you can store them on the site server.
|
||||
|
||||
You can run the following commands from an elevated Windows PowerShell prompt to create this folder structure:
|
||||
|
||||
>We'll also create the D:\Logs folder here which will be used later to support server-side logging.
|
||||
|
||||
```powershell
|
||||
New-Item -ItemType Directory -Path "D:\Sources"
|
||||
New-Item -ItemType Directory -Path "D:\Sources\OSD"
|
||||
@ -201,11 +216,13 @@ To extend the Configuration Manager console with MDT wizards and templates, inst
|
||||
On **CM01**:
|
||||
|
||||
1. Sign in as contoso\administrator.
|
||||
2. Ensure the Configuration Manager Console is closed before continuing.
|
||||
5. Select Start, type **Configure ConfigManager Integration**, and run the application the following settings:
|
||||
|
||||
* Site Server Name: CM01.contoso.com
|
||||
* Site code: PS1
|
||||
2. Ensure the Configuration Manager Console is closed before continuing.
|
||||
|
||||
3. Select Start, type **Configure ConfigManager Integration**, and run the application with the following settings:
|
||||
|
||||
- Site Server Name: CM01.contoso.com
|
||||
- Site code: PS1
|
||||
|
||||

|
||||
|
||||
@ -217,9 +234,11 @@ Most organizations want to display their name during deployment. In this section
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Open the Configuration Manager Console, select the Administration workspace, then select **Client Settings**.
|
||||
2. In the right pane, right-click **Default Client Settings** and then select **Properties**.
|
||||
3. In the **Computer Agent** node, in the **Organization name displayed in Software Center** text box, type in **Contoso** and select **OK**.
|
||||
1. Open the Configuration Manager Console, select the **Administration** workspace, then select **Client Settings**.
|
||||
|
||||
2. In the right pane, right-click **Default Client Settings** and then select **Properties**.
|
||||
|
||||
3. In the **Computer Agent** node, in the **Organization name displayed in Software Center** text box, enter in **Contoso** and select **OK**.
|
||||
|
||||

|
||||
|
||||
@ -235,9 +254,11 @@ Configuration Manager uses the Network Access account during the Windows 10 depl
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager Console, in the Administration workspace, expand **Site Configuration** and select **Sites**.
|
||||
2. Right-click **PS1 - Primary Site 1**, point to **Configure Site Components**, and then select **Software Distribution**.
|
||||
3. On the **Network Access Account** tab, select **Specify the account that accesses network locations** and add the *New Account* **CONTOSO\\CM\_NAA** as the Network Access account (password: pass@word1). Use the new **Verify** option to verify that the account can connect to the **\\\\DC01\\sysvol** network share.
|
||||
1. Using the Configuration Manager Console, in the **Administration** workspace, expand **Site Configuration** and select **Sites**.
|
||||
|
||||
2. Right-click **PS1 - Primary Site 1**, point to **Configure Site Components**, and then select **Software Distribution**.
|
||||
|
||||
3. On the **Network Access Account** tab, select **Specify the account that accesses network locations** and add the account **CONTOSO\\CM\_NAA** as the Network Access account (password: **pass@word1**). Use the new **Verify** option to verify that the account can connect to the **`\\DC01\sysvol`** network share.
|
||||
|
||||

|
||||
|
||||
@ -249,52 +270,64 @@ Configuration Manager has many options for starting a deployment, but starting v
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. In the Configuration Manager Console, in the Administration workspace, select **Distribution Points**.
|
||||
2. Right-click the **\\\\CM01.CONTOSO.COM distribution point** and select **Properties**.
|
||||
3. On the **PXE** tab, use the following settings:
|
||||
1. In the Configuration Manager Console, in the **Administration** workspace, select **Distribution Points**.
|
||||
|
||||
* Enable PXE support for clients
|
||||
* Allow this distribution point to respond to incoming PXE requests
|
||||
* Enable unknown computer
|
||||
* Require a password when computers use PXE
|
||||
* Password and Confirm password: pass@word1
|
||||
2. Right-click the **\\\\CM01.CONTOSO.COM distribution point** and select **Properties**.
|
||||
|
||||
3. On the **PXE** tab, use the following settings:
|
||||
|
||||
- Enable PXE support for clients
|
||||
- Allow this distribution point to respond to incoming PXE requests
|
||||
- Enable unknown computer
|
||||
- Require a password when computers use PXE
|
||||
- Password and Confirm password: pass@word1
|
||||
|
||||

|
||||
|
||||
Configure the CM01 distribution point for PXE.
|
||||
|
||||
>[!NOTE]
|
||||
>If you select **Enable a PXE responder without Windows Deployment Service**, then WDS won't be installed, or if it's already installed it will be suspended, and the **ConfigMgr PXE Responder Service** (SccmPxe) will be used instead of WDS. The ConfigMgr PXE Responder doesn't support multicast. For more information, see [Install and configure distribution points](/configmgr/core/servers/deploy/configure/install-and-configure-distribution-points#bkmk_config-pxe).
|
||||
> [!NOTE]
|
||||
> If you select **Enable a PXE responder without Windows Deployment Service**, then WDS won't be installed, or if it's already installed it will be suspended, and the **ConfigMgr PXE Responder Service** (**SccmPxe**) will be used instead of WDS. The ConfigMgr PXE Responder doesn't support multicast. For more information, see [Install and configure distribution points](/configmgr/core/servers/deploy/configure/install-and-configure-distribution-points#bkmk_config-pxe).
|
||||
|
||||
4. Using the CMTrace tool, review the C:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file. Look for ConfigurePXE and CcmInstallPXE lines.
|
||||
4. Using the CMTrace tool, review the **`C:\Program Files\Microsoft Configuration Manager\Logs\distmgr.log`** file. Look for the **ConfigurePXE** and **CcmInstallPXE** lines.
|
||||
|
||||

|
||||
|
||||
The distmgr.log displays a successful configuration of PXE on the distribution point.
|
||||
The `distmgr.log` displays a successful configuration of PXE on the distribution point.
|
||||
|
||||
5. Verify that you've seven files in each of the folders **D:\\RemoteInstall\\SMSBoot\\x86** and **D:\\RemoteInstall\\SMSBoot\\x64**.
|
||||
5. Verify that you've seven files in each of the folders **`D:\RemoteInstall\SMSBoot\x86`** and **`D:\RemoteInstall\SMSBoot\x64`**.
|
||||
|
||||

|
||||
|
||||
The contents of the D:\\RemoteInstall\\SMSBoot\\x64 folder after you enable PXE.
|
||||
|
||||
**Note**: These files are used by WDS. They aren't used by the ConfigMgr PXE Responder. This article doesn't use the ConfigMgr PXE Responder.
|
||||
> [!NOTE]
|
||||
> These files are used by WDS. They aren't used by the ConfigMgr PXE Responder. This article doesn't use the ConfigMgr PXE Responder.
|
||||
|
||||
Next, see [Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md).
|
||||
|
||||
## Components of Configuration Manager operating system deployment
|
||||
|
||||
Operating system deployment with Configuration Manager is part of the normal software distribution infrastructure, but there are more components. For example, operating system deployment in Configuration Manager may use the State Migration Point role, which isn't used by normal application deployment in Configuration Manager. This section describes the Configuration Manager components involved with the deployment of an operating system, such as Windows 10.
|
||||
Operating system deployment with Configuration Manager is part of the normal software distribution infrastructure, but there are more components. For example, operating system deployment in Configuration Manager may use the State Migration Point role, which isn't used by normal application deployment in Configuration Manager. This section describes the Configuration Manager components involved with the deployment of an operating system, such as Windows 10.
|
||||
|
||||
- **State migration point (SMP).** The state migration point is used to store user state migration data during computer replace scenarios.
|
||||
|
||||
- **Distribution point (DP).** The distribution point is used to store all packages in Configuration Manager, including the operating system deployment-related packages.
|
||||
|
||||
- **Software update point (SUP).** The software update point, which is normally used to deploy updates to existing machines, also can be used to update an operating system as part of the deployment process. You also can use offline servicing to update the image directly on the Configuration Manager server.
|
||||
|
||||
- **Reporting services point.** The reporting services point can be used to monitor the operating system deployment process.
|
||||
|
||||
- **Boot images.** Boot images are the Windows Preinstallation Environment (Windows PE) images Configuration Manager uses to start the deployment.
|
||||
|
||||
- **Operating system images.** The operating system image package contains only one file, the custom .wim image. This image is typically the production deployment image.
|
||||
|
||||
- **Operating system installers.** The operating system installers were originally added to create reference images using Configuration Manager. Instead, we recommend that you use MDT Lite Touch to create your reference images. For more information on how to create a reference image, see [Create a Windows 10 reference image](../deploy-windows-mdt/create-a-windows-10-reference-image.md).
|
||||
|
||||
- **Drivers.** Like MDT Lite Touch, Configuration Manager also provides a repository (catalog) of managed device drivers.
|
||||
|
||||
- **Task sequences.** The task sequences in Configuration Manager look and feel much like the sequences in MDT Lite Touch, and they're used for the same purpose. However, in Configuration Manager, the task sequence is delivered to the clients as a policy via the Management Point (MP). MDT provides more task sequence templates to Configuration Manager.
|
||||
|
||||
- **State migration point (SMP).** The state migration point is used to store user state migration data during computer replace scenarios.
|
||||
- **Distribution point (DP).** The distribution point is used to store all packages in Configuration Manager, including the operating system deployment-related packages.
|
||||
- **Software update point (SUP).** The software update point, which is normally used to deploy updates to existing machines, also can be used to update an operating system as part of the deployment process. You also can use offline servicing to update the image directly on the Configuration Manager server.
|
||||
- **Reporting services point.** The reporting services point can be used to monitor the operating system deployment process.
|
||||
- **Boot images.** Boot images are the Windows Preinstallation Environment (Windows PE) images Configuration Manager uses to start the deployment.
|
||||
- **Operating system images.** The operating system image package contains only one file, the custom .wim image. This image is typically the production deployment image.
|
||||
- **Operating system installers.** The operating system installers were originally added to create reference images using Configuration Manager. Instead, we recommend that you use MDT Lite Touch to create your reference images. For more information on how to create a reference image, see [Create a Windows 10 reference image](../deploy-windows-mdt/create-a-windows-10-reference-image.md).
|
||||
- **Drivers.** Like MDT Lite Touch, Configuration Manager also provides a repository (catalog) of managed device drivers.
|
||||
- **Task sequences.** The task sequences in Configuration Manager look and feel much like the sequences in MDT Lite Touch, and they're used for the same purpose. However, in Configuration Manager, the task sequence is delivered to the clients as a policy via the Management Point (MP). MDT provides more task sequence templates to Configuration Manager.
|
||||
> [!NOTE]
|
||||
> The Windows Assessment and Deployment Kit (ADK) for Windows 10 is also required to support management and deployment of Windows 10.
|
||||
|
||||
@ -302,28 +335,31 @@ Operating system deployment with Configuration Manager is part of the normal sof
|
||||
|
||||
As noted above, MDT adds many enhancements to Configuration Manager. While these enhancements are called Zero Touch, that name doesn't reflect how deployment is conducted. The following sections provide a few samples of the 280 enhancements that MDT adds to Configuration Manager.
|
||||
|
||||
>[!NOTE]
|
||||
>MDT installation requires the following:
|
||||
>- The Windows ADK for Windows 10 (installed in the previous procedure)
|
||||
>- Windows PowerShell ([version 5.1](https://www.microsoft.com/download/details.aspx?id=54616) is recommended; type **$host** to check)
|
||||
>- Microsoft .NET Framework
|
||||
> [!NOTE]
|
||||
> MDT installation requires the following:
|
||||
>
|
||||
> - The Windows ADK for Windows 10 (installed in the previous procedure)
|
||||
> - Windows PowerShell ([version 5.1](https://www.microsoft.com/download/details.aspx?id=54616) is recommended; type **$host** to check)
|
||||
> - Microsoft .NET Framework
|
||||
|
||||
### MDT enables dynamic deployment
|
||||
|
||||
When MDT is integrated with Configuration Manager, the task sequence takes more instructions from the MDT rules. In its most simple form, these settings are stored in a text file, the CustomSettings.ini file, but you can store the settings in Microsoft SQL Server databases, or have Microsoft Visual Basic Scripting Edition (VBScripts) or web services provide the settings used.
|
||||
When MDT is integrated with Configuration Manager, the task sequence processes more instructions from the MDT rules. In its most simple form, these settings are stored in a text file, the `CustomSettings.ini` file, but you can store the settings in Microsoft SQL Server databases, or have Microsoft Visual Basic Scripting Edition (VBScripts) or web services provide the settings used.
|
||||
|
||||
The task sequence uses instructions that allow you to reduce the number of task sequences in Configuration Manager and instead store settings outside the task sequence. Here are a few examples:
|
||||
- The following settings instruct the task sequence to install the HP Hotkeys package, but only if the hardware is an HP EliteBook 8570w. You don't have to add the package to the task sequence.
|
||||
|
||||
``` syntax
|
||||
- The following settings instruct the task sequence to install the HP Hotkeys package, but only if the hardware is an HP EliteBook 8570w. You don't have to add the package to the task sequence.
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Model
|
||||
[HP EliteBook 8570w]
|
||||
Packages001=PS100010:Install HP Hotkeys
|
||||
```
|
||||
- The following settings instruct the task sequence to put laptops and desktops in different organizational units (OUs) during deployment, assign different computer names, and finally have the task sequence install the Cisco VPN client, but only if the machine is a laptop.
|
||||
|
||||
``` syntax
|
||||
- The following settings instruct the task sequence to put laptops and desktops in different organizational units (OUs) during deployment, assign different computer names, and finally have the task sequence install the Cisco VPN client, but only if the machine is a laptop.
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
Priority= ByLaptopType, ByDesktopType
|
||||
[ByLaptopType]
|
||||
@ -371,13 +407,17 @@ MDT Zero Touch simply extends Configuration Manager with many useful built-in op
|
||||
|
||||
### Why use MDT Lite Touch to create reference images
|
||||
|
||||
You can create reference images for Configuration Manager in Configuration Manager, but in general we recommend creating them in MDT Lite Touch for the following reasons:
|
||||
You can create reference images for Configuration Manager in Configuration Manager, but in general it is recommended to create them in MDT Lite Touch for the following reasons:
|
||||
|
||||
- You can use the same image for every type of operating system deployment - Microsoft Virtual Desktop Infrastructure (VDI), Microsoft System Center Virtual Machine Manager (VMM), MDT, Configuration Manager, Windows Deployment Services (WDS), and more.
|
||||
- Configuration Manager performs deployment in the LocalSystem context, which means that you can't configure the Administrator account with all of the settings that you would like to be included in the image. MDT runs in the context of the Local Administrator, which means you can configure the look and feel of the configuration and then use the CopyProfile functionality to copy these changes to the default user during deployment.
|
||||
- The Configuration Manager task sequence doesn't suppress user interface interaction.
|
||||
- MDT Lite Touch supports a Suspend action that allows for reboots, which is useful when you need to perform a manual installation or check the reference image before it's automatically captured.
|
||||
- MDT Lite Touch doesn't require any infrastructure and is easy to delegate.
|
||||
- You can use the same image for every type of operating system deployment - Microsoft Virtual Desktop Infrastructure (VDI), Microsoft System Center Virtual Machine Manager (VMM), MDT, Configuration Manager, Windows Deployment Services (WDS), and more.
|
||||
|
||||
- Configuration Manager performs deployment in the LocalSystem context, which means that you can't configure the Administrator account with all of the settings that you would like to be included in the image. MDT runs in the context of the Local Administrator, which means you can configure the look and feel of the configuration and then use the CopyProfile functionality to copy these changes to the default user during deployment.
|
||||
|
||||
- The Configuration Manager task sequence suppresses user interface interaction.
|
||||
|
||||
- MDT Lite Touch supports a Suspend action that allows for reboots, which is useful when you need to perform a manual installation or check the reference image before it's automatically captured.
|
||||
|
||||
- MDT Lite Touch doesn't require any infrastructure and is easy to delegate.
|
||||
|
||||
## Related articles
|
||||
|
||||
|
@ -2,48 +2,52 @@
|
||||
title: Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager
|
||||
description: Learn how to use Configuration Manager and Microsoft Deployment Toolkit (MDT) to refresh a Windows 7 SP1 client with Windows 10.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
This topic will show you how to refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager and Microsoft Deployment Toolkit (MDT). A computer refresh isn't the same as an in-place upgrade. A computer refresh involves storing user data and settings from the old installation, wiping the hard drives, installing a new OS, and then restoring the user data at the end of the installation. Also see the MDT refresh procedure: [Refresh a Windows 7 computer with Windows 10](../deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md).
|
||||
This article will show you how to refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager and Microsoft Deployment Toolkit (MDT). A computer refresh isn't the same as an in-place upgrade. A computer refresh involves storing user data and settings from the old installation, wiping the hard drives, installing a new OS, and then restoring the user data at the end of the installation. Also see the MDT refresh procedure: [Refresh a Windows 7 computer with Windows 10](../deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10.md).
|
||||
|
||||
A computer refresh with Configuration Manager works the same as it does with MDT Lite Touch installation. Configuration Manager also uses the User State Migration Tool (USMT) from the Windows Assessment and Deployment Kit (Windows ADK) 10 in the background. A computer refresh with Configuration Manager has the following steps:
|
||||
|
||||
1. Data and settings are backed up locally in a backup folder.
|
||||
2. The partition is wiped, except for the backup folder.
|
||||
3. The new operating system image is applied.
|
||||
4. Other applications are installed.
|
||||
5. Data and settings are restored.
|
||||
1. Data and settings are backed up locally in a backup folder.
|
||||
2. The partition is wiped, except for the backup folder.
|
||||
3. The new operating system image is applied.
|
||||
4. Other applications are installed.
|
||||
5. Data and settings are restored.
|
||||
|
||||
## Infrastructure
|
||||
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
|
||||
For the purposes of this article, we'll use one server computer (CM01) and one client computer (PC0003).
|
||||
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server.
|
||||
|
||||
- PC0003 is a domain member client computer running Windows 7 SP1, or a later version of Windows, with the Configuration Manager client installed, that will be refreshed to Windows 10.
|
||||
|
||||
>[!NOTE]
|
||||
>If desired, PC0003 can be a VM hosted on the server HV01, which is a Hyper-V host computer that we used previously to build a Windows 10 reference image. However, if PC0003 is a VM then you must ensure it has sufficient resources available to run the Configuration Manager OSD task sequence. 2GB of RAM or more is recommended.
|
||||
> [!NOTE]
|
||||
> If desired, PC0003 can be a VM hosted on the server HV01, which is a Hyper-V host computer that we used previously to build a Windows 10 reference image. However, if PC0003 is a VM then you must ensure it has sufficient resources available to run the Configuration Manager OSD task sequence. 2GB of RAM or more is recommended.
|
||||
|
||||
All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
All server and client computers referenced in this guide are on the same subnet. This interrelation isn't required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>This article assumes that you have [configured Active Directory permissions](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md#configure-active-directory-permissions) in the specified OU for the **CM_JD** account, and the client's Active Directory computer account is in the **Contoso > Computers > Workstations** OU. Use the Active Directory Users and Computers console to review the location of computer objects and move them if needed.
|
||||
> [!IMPORTANT]
|
||||
> This article assumes that you have [configured Active Directory permissions](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md#configure-active-directory-permissions) in the specified OU for the **CM_JD** account, and the client's Active Directory computer account is in the **Contoso** > **Computers** > **Workstations** OU. Use the Active Directory Users and Computers console to review the location of computer objects and move them if needed.
|
||||
|
||||
## Verify the Configuration Manager client settings
|
||||
|
||||
@ -51,8 +55,10 @@ To verify that PC003 is correctly assigned to the PS1 site:
|
||||
|
||||
On **PC0003**:
|
||||
|
||||
1. Open the Configuration Manager control panel (control smscfgrc).
|
||||
2. On the **Site** tab, click **Configure Settings**, then click **Find Site**.
|
||||
1. Open the Configuration Manager control panel (`control.exe smscfgrc`).
|
||||
|
||||
2. On the **Site** tab, select **Configure Settings**, then select **Find Site**.
|
||||
|
||||
3. Verify that Configuration Manager has successfully found a site to manage this client is displayed. See the following example.
|
||||
|
||||

|
||||
@ -61,49 +67,49 @@ On **PC0003**:
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager console, in the Asset and Compliance workspace, expand **Overview**, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
||||
1. Using the Configuration Manager console, in the **Asset and Compliance** workspace, expand **Overview**, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
||||
|
||||
* General
|
||||
* Name: Install Windows 10 Enterprise x64
|
||||
* Limited Collection: All Systems
|
||||
* Membership rules
|
||||
* Add Rule: Direct rule
|
||||
* Resource Class: System Resource
|
||||
* Attribute Name: Name
|
||||
* Value: PC0003
|
||||
* Select Resources
|
||||
* Select **PC0003**
|
||||
- General
|
||||
- Name: Install Windows 10 Enterprise x64
|
||||
- Limited Collection: All Systems
|
||||
- Membership rules
|
||||
- Add Rule: Direct rule
|
||||
- Resource Class: System Resource
|
||||
- Attribute Name: Name
|
||||
- Value: PC0003
|
||||
- Select Resources
|
||||
- Select **PC0003**
|
||||
|
||||
Use the default settings to complete the remaining wizard pages and click **Close**.
|
||||
Use the default settings to complete the remaining wizard pages and select **Close**.
|
||||
|
||||
2. Review the Install Windows 10 Enterprise x64 collection. Don't continue until you see the PC0003 machine in the collection.
|
||||
2. Review the Install Windows 10 Enterprise x64 collection. Don't continue until you see the PC0003 machine in the collection.
|
||||
|
||||
>[!NOTE]
|
||||
>It may take a short while for the collection to refresh; you can view progress via the Colleval.log file. If you want to speed up the process, you can manually update membership on the Install Windows 10 Enterprise x64 collection by right-clicking the collection and selecting Update Membership.
|
||||
> [!NOTE]
|
||||
> It may take a short while for the collection to refresh; you can view progress via the `Colleval.log` file. If you want to speed up the process, you can manually update membership on the Install Windows 10 Enterprise x64 collection by right-clicking the collection and selecting Update Membership.
|
||||
|
||||
## Create a new deployment
|
||||
|
||||
On **CM01**:
|
||||
|
||||
Using the Configuration Manager console, in the Software Library workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64 RTM**, and then click **Deploy**. Use the following settings:
|
||||
Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Windows 10 Enterprise x64 RTM**, and then select **Deploy**. Use the below settings:
|
||||
|
||||
- General
|
||||
- Collection: Install Windows 10 Enterprise x64
|
||||
- Collection: Install Windows 10 Enterprise x64
|
||||
- Deployment Settings
|
||||
- Purpose: Available
|
||||
- Make available to the following: Configuration Manager clients, media and PXE
|
||||
- Purpose: Available
|
||||
- Make available to the following: Configuration Manager clients, media and PXE
|
||||
|
||||
>[!NOTE]
|
||||
>It's not necessary to make the deployment available to media and Pre-Boot Execution Environment (PXE) for a computer refresh, but you will use the same deployment for bare-metal deployments later on and you will need it at that point.
|
||||
> [!NOTE]
|
||||
> It's not necessary to make the deployment available to media and Pre-Boot Execution Environment (PXE) for a computer refresh, but you will use the same deployment for bare-metal deployments later on and you will need it at that point.
|
||||
|
||||
- Scheduling
|
||||
- <default>
|
||||
- *\<default\>*
|
||||
- User Experience
|
||||
- <default>
|
||||
- *\<default\>*
|
||||
- Alerts
|
||||
- <default>
|
||||
- *\<default\>*
|
||||
- Distribution Points
|
||||
- <default>
|
||||
- *\<default\>*
|
||||
|
||||
## Initiate a computer refresh
|
||||
|
||||
@ -111,12 +117,14 @@ Now you can start the computer refresh on PC0003.
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager console, in the Assets and Compliance workspace, click the **Install Windows 10 Enterprise x64** collection, right-click **PC0003**, point to **Client Notification**, click **Download Computer Policy**, and then click **OK** in the popup dialog box that appears.
|
||||
1. Using the Configuration Manager console, in the **Assets and Compliance** workspace, select the **Install Windows 10 Enterprise x64** collection, right-click **PC0003**, point to **Client Notification**, select **Download Computer Policy**, and then select **OK** in the popup dialog box that appears.
|
||||
|
||||
On **PC0003**:
|
||||
|
||||
1. Open the Software Center (click Start and type **Software Center**, or click the **New software is available** balloon in the system tray), select **Operating Systems** and click the **Windows 10 Enterprise x64 RTM** deployment, then click **Install**.
|
||||
2. In the **Software Center** warning dialog box, click **Install Operating System**.
|
||||
1. Open the Software Center (select Start and type **Software Center**, or select the **New software is available** balloon in the system tray), select **Operating Systems** and select the **Windows 10 Enterprise x64 RTM** deployment, then select **Install**.
|
||||
|
||||
2. In the **Software Center** warning dialog box, select **Install Operating System**.
|
||||
|
||||
3. The client computer will run the Configuration Manager task sequence, boot into Windows PE, and install the new OS and applications. See the following examples:
|
||||
|
||||
<br>
|
||||
@ -132,7 +140,7 @@ On **PC0003**:
|
||||
|
||||
Next, see [Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md).
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)<br>
|
||||
[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)<br>
|
||||
|
@ -1,69 +1,81 @@
|
||||
---
|
||||
title: Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager
|
||||
description: In this topic, you'll learn how to replace a Windows 7 SP1 computer using Microsoft Endpoint Configuration Manager.
|
||||
description: In this article, you'll learn how to replace a Windows 7 SP1 computer using Microsoft Configuration Manager.
|
||||
ms.assetid: 3c8a2d53-8f08-475f-923a-bca79ca8ac36
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager
|
||||
|
||||
**Applies to**
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
- Windows 10
|
||||
|
||||
In this topic, you'll learn how to replace a Windows 7 SP1 computer using Microsoft Endpoint Configuration Manager. This process is similar to refreshing a computer, but since you're replacing the device, you have to run the backup job separately from the deployment of Windows 10.
|
||||
In this article, you'll learn how to replace a Windows 7 SP1 computer using Microsoft Configuration Manager. This process is similar to refreshing a computer, but since you're replacing the device, you have to run the backup job separately from the deployment of Windows 10.
|
||||
|
||||
In this topic, you'll create a backup-only task sequence that you run on PC0004 (the device you're replacing), deploy the PC0006 computer running Windows 10, and then restore this backup of PC0004 onto PC006. This process is similar to the MDT replace process: [Replace a Windows 7 computer with a Windows 10 computer](../deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md).
|
||||
In this article, you'll create a backup-only task sequence that you run on PC0004 (the device you're replacing), deploy the PC0006 computer running Windows 10, and then restore this backup of PC0004 onto PC006. This process is similar to the MDT replace process: [Replace a Windows 7 computer with a Windows 10 computer](../deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer.md).
|
||||
|
||||
## Infrastructure
|
||||
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
|
||||
For the purposes of this article, we'll use one server computer (CM01) and two client computers (PC0004, PC0006).
|
||||
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server.
|
||||
- Important: CM01 must include the **[State migration point](/configmgr/osd/get-started/manage-user-state#BKMK_StateMigrationPoint)** role for the replace task sequence used in this article to work.
|
||||
- Important: CM01 must include the **[State migration point](/configmgr/osd/get-started/manage-user-state#BKMK_StateMigrationPoint)** role for the replace task sequence used in this article to work.
|
||||
|
||||
- PC0004 is a domain member client computer running Windows 7 SP1, or a later version of Windows, with the Configuration Manager client installed, that will be replaced.
|
||||
|
||||
- PC0006 is a domain member client computer running Windows 10, with the Configuration Manager client installed, that will replace PC0004.
|
||||
|
||||
>[!NOTE]
|
||||
>PC0004 and PC006 can be VMs hosted on the server HV01, which is a Hyper-V host computer that we used previously to build a Windows 10 reference image. However, the VMs must have sufficient resources available to run the Configuration Manager OSD task sequence. 2GB of RAM or more is recommended.
|
||||
> [!NOTE]
|
||||
> PC0004 and PC006 can be VMs hosted on the server HV01, which is a Hyper-V host computer that we used previously to build a Windows 10 reference image. However, the VMs must have sufficient resources available to run the Configuration Manager OSD task sequence. 2GB of RAM or more is recommended.
|
||||
|
||||
All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
All server and client computers referenced in this guide are on the same subnet. This interrelation isn't required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>This article assumes that you have [configured Active Directory permissions](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md#configure-active-directory-permissions) in the specified OU for the **CM_JD** account, and the client's Active Directory computer account is in the **Contoso > Computers > Workstations** OU. Use the Active Directory Users and Computers console to review the location of computer objects and move them if needed.
|
||||
> [!IMPORTANT]
|
||||
> This article assumes that you have [configured Active Directory permissions](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md#configure-active-directory-permissions) in the specified OU for the **CM_JD** account, and the client's Active Directory computer account is in the **Contoso > Computers > Workstations** OU. Use the Active Directory Users and Computers console to review the location of computer objects and move them if needed.
|
||||
|
||||
## Create a replace task sequence
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager console, in the Software Library workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create MDT Task Sequence**.
|
||||
2. On the **Choose Template** page, select the **Client Replace Task Sequence** template and click **Next**.
|
||||
3. On the **General** page, assign the following settings and click **Next**:
|
||||
1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create MDT Task Sequence**.
|
||||
|
||||
* Task sequence name: Replace Task Sequence
|
||||
* Task sequence comments: USMT backup only
|
||||
2. On the **Choose Template** page, select the **Client Replace Task Sequence** template and select **Next**.
|
||||
|
||||
4. On the **Boot Image** page, browse and select the **Zero Touch WinPE x64** boot image package. Then click **Next**.
|
||||
5. On the **MDT Package** page, browse and select the **OSD / MDT** package. Then click **Next**.
|
||||
6. On the **USMT Package** page, browse and select the **OSD / Microsoft Corporation User State Migration Tool for Windows** package. Then click **Next**.
|
||||
7. On the **Settings Package** page, browse and select the **OSD / Windows 10 x64 Settings** package. Then click **Next**.
|
||||
8. On the **Summary** page, review the details and then click **Next**.
|
||||
9. On the **Confirmation** page, click **Finish**.
|
||||
3. On the **General** page, assign the following settings and select **Next**:
|
||||
|
||||
10. Review the Replace Task Sequence.
|
||||
- Task sequence name: Replace Task Sequence
|
||||
- Task sequence comments: USMT backup only
|
||||
|
||||
>[!NOTE]
|
||||
>This task sequence has many fewer actions than the normal client task sequence. If it doesn't seem different, make sure you selected the **Client Replace Task Sequence** template when creating the task sequence.
|
||||
4. On the **Boot Image** page, browse and select the **Zero Touch WinPE x64** boot image package. Then select **Next**.
|
||||
|
||||
5. On the **MDT Package** page, browse and select the **OSD / MDT** package. Then select **Next**.
|
||||
|
||||
6. On the **USMT Package** page, browse and select the **OSD / Microsoft Corporation User State Migration Tool for Windows** package. Then select **Next**.
|
||||
|
||||
7. On the **Settings Package** page, browse and select the **OSD / Windows 10 x64 Settings** package. Then select **Next**.
|
||||
|
||||
8. On the **Summary** page, review the details and then select **Next**.
|
||||
|
||||
9. On the **Confirmation** page, select **Finish**.
|
||||
|
||||
10. Review the Replace Task Sequence.
|
||||
|
||||
> [!NOTE]
|
||||
> This task sequence has many fewer actions than the normal client task sequence. If it doesn't seem different, make sure you selected the **Client Replace Task Sequence** template when creating the task sequence.
|
||||
|
||||

|
||||
|
||||
@ -75,70 +87,78 @@ This section walks you through the process of associating a new, blank device (P
|
||||
|
||||
On **HV01** (if PC0006 is a VM) or in the PC0006 BIOS:
|
||||
|
||||
1. Make a note of the MAC address for PC0006. (If PC0006 is a virtual machine, you can see the MAC Address in the virtual machine settings.) In our example, the PC0006 MAC Address is 00:15:5D:0A:6A:96. Don't attempt to PXE boot PC0006 yet.
|
||||
1. Make a note of the MAC address for PC0006. (If PC0006 is a virtual machine, you can see the MAC Address in the virtual machine settings.) In our example, the PC0006 MAC Address is 00:15:5D:0A:6A:96. Don't attempt to PXE boot PC0006 yet.
|
||||
|
||||
On **CM01**:
|
||||
|
||||
2. When you're using the Configuration Manager console, in the Assets and Compliance workspace, right-click **Devices**, and then click **Import Computer Information**.
|
||||
3. On the **Select Source** page, select **Import single computer** and click **Next**.
|
||||
4. On the **Single Computer** page, use the following settings and then click **Next**:
|
||||
1. When you're using the Configuration Manager console, in the **Assets and Compliance** workspace, right-click **Devices**, and then select **Import Computer Information**.
|
||||
|
||||
* Computer Name: PC0006
|
||||
* MAC Address: <the mac address that you wrote down>
|
||||
* Source Computer: PC0004
|
||||
2. On the **Select Source** page, select **Import single computer** and select **Next**.
|
||||
|
||||
3. On the **Single Computer** page, use the following settings and then select **Next**:
|
||||
|
||||
- Computer Name: PC0006
|
||||
- MAC Address: *\<the mac address that you wrote down*\>
|
||||
- Source Computer: PC0004
|
||||
|
||||

|
||||
|
||||
Creating the computer association between PC0004 and PC0006.
|
||||
|
||||
5. On the **User Accounts** page, select **Capture and restore all user accounts** and click **Next**.
|
||||
6. On the **Data Preview** page, click **Next**.
|
||||
7. On the **Choose additional collections** page, click **Add** and then select the **Install Windows 10 Enterprise x64** collection. Now, select the checkbox next to the Install Windows 10 Enterprise x64 collection you just added, and then click **Next**.
|
||||
8. On the **Summary** page, click **Next**, and then click **Close**.
|
||||
9. Select the **User State Migration** node and review the computer association in the right hand pane.
|
||||
10. Right-click the **PC0004/PC0006** association and click **View Recovery Information**. A recovery key has been assigned already, but a user state store location hasn't.
|
||||
11. Review the **Install Windows 10 Enterprise x64** collection. Don't continue until you see the **PC0006** computer in the collection. You might have to update membership and refresh the collection again.
|
||||
4. On the **User Accounts** page, select **Capture and restore all user accounts** and select **Next**.
|
||||
|
||||
5. On the **Data Preview** page, select **Next**.
|
||||
|
||||
6. On the **Choose additional collections** page, select **Add** and then select the **Install Windows 10 Enterprise x64** collection. Now, select the checkbox next to the Install Windows 10 Enterprise x64 collection you just added, and then select **Next**.
|
||||
|
||||
7. On the **Summary** page, select **Next**, and then select **Close**.
|
||||
|
||||
8. Select the **User State Migration** node and review the computer association in the right hand pane.
|
||||
|
||||
9. Right-click the **PC0004/PC0006** association and select **View Recovery Information**. A recovery key has been assigned already, but a user state store location hasn't.
|
||||
|
||||
10. Review the **Install Windows 10 Enterprise x64** collection. Don't continue until you see the **PC0006** computer in the collection. You might have to update membership and refresh the collection again.
|
||||
|
||||
## Create a device collection and add the PC0004 computer
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. When you're using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
||||
1. When you're using the Configuration Manager console, in the **Asset and Compliance** workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
||||
|
||||
* General
|
||||
* Name: USMT Backup (Replace)
|
||||
* Limited Collection: All Systems
|
||||
* Membership rules:
|
||||
* Add Rule: Direct rule
|
||||
* Resource Class: System Resource
|
||||
* Attribute Name: Name
|
||||
* Value: PC0004
|
||||
* Select Resources:
|
||||
* Select **PC0004**
|
||||
- General
|
||||
- Name: USMT Backup (Replace)
|
||||
- Limited Collection: All Systems
|
||||
- Membership rules:
|
||||
- Add Rule: Direct rule
|
||||
- Resource Class: System Resource
|
||||
- Attribute Name: Name
|
||||
- Value: PC0004
|
||||
- Select Resources:
|
||||
- Select **PC0004**
|
||||
|
||||
Use default settings for the remaining wizard pages, then click **Close**.
|
||||
Use default settings for the remaining wizard pages, then select **Close**.
|
||||
|
||||
2. Review the **USMT Backup (Replace)** collection. Don't continue until you see the **PC0004** computer in the collection.
|
||||
2. Review the **USMT Backup (Replace)** collection. Don't continue until you see the **PC0004** computer in the collection.
|
||||
|
||||
## Create a new deployment
|
||||
|
||||
On **CM01**:
|
||||
|
||||
Using the Configuration Manager console, in the Software Library workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Replace Task Sequence**, and then select **Deploy**. Use the following settings:
|
||||
Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, select **Task Sequences**, right-click **Replace Task Sequence**, and then select **Deploy**. Use the following settings:
|
||||
|
||||
- General
|
||||
- Collection: USMT Backup (Replace)
|
||||
- Deployment Settings
|
||||
- Purpose: Available
|
||||
- Make available to the following: Only Configuration Manager Clients
|
||||
- Scheduling
|
||||
- <default>
|
||||
- User Experience
|
||||
- <default>
|
||||
- Alerts
|
||||
- <default>
|
||||
- Distribution Points
|
||||
- <default>
|
||||
- General
|
||||
- Collection: USMT Backup (Replace)
|
||||
- Deployment Settings
|
||||
- Purpose: Available
|
||||
- Make available to the following: Only Configuration Manager Clients
|
||||
- Scheduling
|
||||
- *\<default*\>
|
||||
- User Experience
|
||||
- *\<default*\>
|
||||
- Alerts
|
||||
- *\<default*\>
|
||||
- Distribution Points
|
||||
- *\<default*\>
|
||||
|
||||
## Verify the backup
|
||||
|
||||
@ -146,15 +166,17 @@ This section assumes that you have a computer named PC0004 with the Configuratio
|
||||
|
||||
On **PC0004**:
|
||||
|
||||
1. If it's not already started, start the PC0004 computer and open the Configuration Manager control panel (control smscfgrc).
|
||||
2. On the **Actions** tab, select **Machine Policy Retrieval & Evaluation Cycle**, click **Run Now**, and then click **OK** in the popup dialog box that appears.
|
||||
1. If it's not already started, start the PC0004 computer and open the Configuration Manager control panel (**`control.exe smscfgrc`**).
|
||||
2. On the **Actions** tab, select **Machine Policy Retrieval & Evaluation Cycle**, select **Run Now**, and then select **OK** in the popup dialog box that appears.
|
||||
|
||||
>[!NOTE]
|
||||
>You also can use the Client Notification option in the Configuration Manager console, as shown in [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md).
|
||||
> [!NOTE]
|
||||
> You also can use the Client Notification option in the Configuration Manager console, as shown in [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md).
|
||||
|
||||
3. Open the Software Center, select the **Replace Task Sequence** deployment and then click **Install**.
|
||||
4. Confirm you want to upgrade the operating system on this computer by clicking **Install** again.
|
||||
5. Allow the Replace Task Sequence to complete. The PC0004 computer will gather user data, boot into Windows PE and gather more data, then boot back to the full OS. The entire process should only take a few minutes.
|
||||
3. Open the Software Center, select the **Replace Task Sequence** deployment and then select **Install**.
|
||||
|
||||
4. Confirm you want to upgrade the operating system on this computer by clicking **Install** again.
|
||||
|
||||
5. Allow the Replace Task Sequence to complete. The PC0004 computer will gather user data, boot into Windows PE and gather more data, then boot back to the full OS. The entire process should only take a few minutes.
|
||||
|
||||

|
||||
|
||||
@ -162,11 +184,12 @@ Capturing the user state
|
||||
|
||||
On **CM01**:
|
||||
|
||||
6. Open the state migration point storage folder (ex: D:\Migdata) and verify that a subfolder was created containing the USMT backup.
|
||||
7. Using the Configuration Manager console, in the Assets and Compliance workspace, select the **User State Migration** node, right-click the **PC0004/PC0006** association, and select **View Recovery Information**. The object now also has a user state store location.
|
||||
1. Open the state migration point storage folder (ex: D:\Migdata) and verify that a subfolder was created containing the USMT backup.
|
||||
|
||||
>[!NOTE]
|
||||
>It may take a few minutes for the user state store location to be populated.
|
||||
2. Using the Configuration Manager console, in the **Assets and Compliance** workspace, select the **User State Migration** node, right-click the **PC0004/PC0006** association, and select **View Recovery Information**. The object now also has a user state store location.
|
||||
|
||||
> [!NOTE]
|
||||
> It may take a few minutes for the user state store location to be populated.
|
||||
|
||||
## Deploy the new computer
|
||||
|
||||
@ -174,16 +197,16 @@ On **PC0006**:
|
||||
|
||||
1. Start the PC0006 virtual machine (or physical computer), press **F12** to Pre-Boot Execution Environment (PXE) boot when prompted. Allow it to boot Windows Preinstallation Environment (Windows PE), and then complete the deployment wizard using the following settings:
|
||||
|
||||
* Password: pass@word1
|
||||
* Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM
|
||||
- Password: pass@word1
|
||||
- Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM
|
||||
|
||||
2. The setup now starts and does the following steps:
|
||||
2. The setup now starts and does the following steps:
|
||||
|
||||
* Installs the Windows 10 operating system
|
||||
* Installs the Configuration Manager client
|
||||
* Joins it to the domain
|
||||
* Installs the applications
|
||||
* Restores the PC0004 backup
|
||||
- Installs the Windows 10 operating system
|
||||
- Installs the Configuration Manager client
|
||||
- Joins it to the domain
|
||||
- Installs the applications
|
||||
- Restores the PC0004 backup
|
||||
|
||||
When the process is complete, you'll have a new Windows 10 computer in your domain with user data and settings restored. See the following examples:
|
||||
|
||||
@ -199,7 +222,7 @@ When the process is complete, you'll have a new Windows 10 computer in your doma
|
||||
|
||||
Next, see [Perform an in-place upgrade to Windows 10 using Configuration Manager](upgrade-to-windows-10-with-configuration-manager.md).
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)<br>
|
||||
[Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)<br>
|
||||
|
@ -1,39 +1,41 @@
|
||||
---
|
||||
title: Perform in-place upgrade to Windows 10 via Configuration Manager
|
||||
description: Learn how to perform an in-place upgrade to Windows 10 by automating the process with a Microsoft Endpoint Manager task sequence.
|
||||
description: Learn how to perform an in-place upgrade to Windows 10 by automating the process with a Microsoft Configuration Manager task sequence.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 10/27/2022
|
||||
---
|
||||
|
||||
# Perform an in-place upgrade to Windows 10 using Configuration Manager
|
||||
|
||||
*Applies to:*
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
|
||||
- Windows 10
|
||||
The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a Microsoft Configuration Manager task sequence to completely automate the process.
|
||||
|
||||
The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. You can use a Microsoft Endpoint Manager task sequence to completely automate the process.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Beginning with Windows 10 and Windows Server 2016, Windows Defender is already installed. A management client for Windows Defender is also installed automatically if the Configuration Manager client is installed. However, previous Windows operating systems installed the System Center Endpoint Protection (SCEP) client with the Configuration Manager client. The SCEP client can block in-place upgrade to Windows 10 due to incompatibility, and must be removed from a device before performing an in-place upgrade to Windows 10.
|
||||
> [!IMPORTANT]
|
||||
> Beginning with Windows 10 and Windows Server 2016, Windows Defender is already installed. A management client for Windows Defender is also installed automatically if the Configuration Manager client is installed. However, previous Windows operating systems installed the System Center Endpoint Protection (SCEP) client with the Configuration Manager client. The SCEP client can block in-place upgrade to Windows 10 due to incompatibility, and must be removed from a device before performing an in-place upgrade to Windows 10.
|
||||
|
||||
## Infrastructure
|
||||
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
An existing Configuration Manager infrastructure that is integrated with MDT is used for the following procedures. For more information about the setup for this article, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||
|
||||
For the purposes of this article, we'll use one server computer (CM01) and one client computer (PC0004).
|
||||
|
||||
- CM01 is a domain member server and Configuration Manager software distribution point. In this guide, CM01 is a standalone primary site server.
|
||||
- PC0004 is a domain member client computer running Windows 7 SP1, or a later version of Windows, with the Configuration Manager client installed, that will be upgraded to Windows 10.
|
||||
|
||||
All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
All servers are running Windows Server 2019. However, an earlier, supported version of Windows Server can also be used.
|
||||
|
||||
All server and client computers referenced in this guide are on the same subnet. This interrelation isn't required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates.
|
||||
All server and client computers referenced in this guide are on the same subnet. This interrelation isn't required. But each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the `contoso.com` domain. Internet connectivity is also required to download OS and application updates.
|
||||
|
||||
## Add an OS upgrade package
|
||||
|
||||
@ -41,30 +43,40 @@ Configuration Manager Current Branch includes a native in-place upgrade task. Th
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager console, in the Software Library workspace, expand **Operating Systems**, right-click **Operating System Upgrade Packages**, and click **Add Operating System Upgrade Package**.
|
||||
2. On the **Data Source** page, under **Path**, click **Browse** and enter the UNC path to your media source. In this example, we've extracted the Windows 10 installation media to **\\\\cm01\\Sources$\\OSD\\UpgradePackages\\Windows 10**.
|
||||
1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Operating System Upgrade Packages**, and select **Add Operating System Upgrade Package**.
|
||||
|
||||
2. On the **Data Source** page, under **Path**, select **Browse** and enter the UNC path to your media source. In this example, we've extracted the Windows 10 installation media to **`\\cm01\Sources$\OSD\UpgradePackages\Windows 10`**.
|
||||
|
||||
3. If you have multiple image indexes in the installation media, select **Extract a specific image index from install.wim...** and choose the image index you want from the dropdown menu. In this example, we've chosen **Windows 10 Enterprise**.
|
||||
4. Next to **Architecture**, select **x64**, choose a language from the dropdown menu next to **Language**, and then click **Next**.
|
||||
|
||||
4. Next to **Architecture**, select **x64**, choose a language from the dropdown menu next to **Language**, and then select **Next**.
|
||||
|
||||
5. Next to **Name**, enter **Windows 10 x64 RTM** and then complete the wizard by clicking **Next** and **Close**.
|
||||
6. Distribute the OS upgrade package to the CM01 distribution point by right-clicking the **Windows 10 x64 RTM** OS upgrade package and then clicking **Distribute Content**.
|
||||
7. In the Distribute Content Wizard, add the CM01 distribution point, click **Next** and click **Close**.
|
||||
8. View the content status for the Windows 10 x64 RTM upgrade package. Don't continue until the distribution is completed (it might take a few minutes). You also can review the D:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file and look for the **STATMSG: ID=2301** line.
|
||||
|
||||
6. Distribute the OS upgrade package to the CM01 distribution point by right-clicking the **Windows 10 x64 RTM** OS upgrade package and then clicking **Distribute Content**.
|
||||
|
||||
7. In the Distribute Content Wizard, add the CM01 distribution point, select **Next** and select **Close**.
|
||||
|
||||
8. View the content status for the Windows 10 x64 RTM upgrade package. Don't continue until the distribution is completed (it might take a few minutes). You also can review the **`D:\Program Files\Microsoft Configuration Manager\Logs\distmgr.log`** file and look for the **STATMSG: ID=2301** line.
|
||||
|
||||
## Create an in-place upgrade task sequence
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager console, in the Software Library workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create Task Sequence**.
|
||||
2. On the **Create a new task sequence** page, select **Upgrade an operating system from an upgrade package** and click **Next**.
|
||||
3. Use the following settings to complete the wizard:
|
||||
1. Using the Configuration Manager console, in the **Software Library** workspace, expand **Operating Systems**, right-click **Task Sequences**, and select **Create Task Sequence**.
|
||||
|
||||
* Task sequence name: Upgrade Task Sequence
|
||||
* Description: In-place upgrade
|
||||
* Upgrade package: Windows 10 x64 RTM
|
||||
* Include software updates: Do not install any software updates
|
||||
* Install applications: OSD \ Adobe Acrobat Reader DC
|
||||
2. On the **Create a new task sequence** page, select **Upgrade an operating system from an upgrade package** and select **Next**.
|
||||
|
||||
3. Use the below settings to complete the wizard:
|
||||
|
||||
- Task sequence name: Upgrade Task Sequence
|
||||
- Description: In-place upgrade
|
||||
- Upgrade package: Windows 10 x64 RTM
|
||||
- Include software updates: Don't install any software updates
|
||||
- Install applications: OSD \ Adobe Acrobat Reader DC
|
||||
|
||||
4. Complete the wizard, and select **Close**.
|
||||
|
||||
4. Complete the wizard, and click **Close**.
|
||||
5. Review the Upgrade Task Sequence.
|
||||
|
||||

|
||||
@ -73,13 +85,13 @@ The Configuration Manager upgrade task sequence
|
||||
|
||||
## Create a device collection
|
||||
|
||||
After you create the upgrade task sequence, you can create a collection to test a deployment. In this section, we assume you have the PC0004 computer running Windows 7 SP1, with the Configuration Manager client installed.
|
||||
After you create the upgrade task sequence, you can create a collection to test a deployment. In this section, we assume you have the PC0004 computer running Windows 7 SP1, with the Configuration Manager client installed.
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. When you're using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
||||
1. When you're using the Configuration Manager console, in the **Asset and Compliance** workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
||||
- General
|
||||
- Name: Windows 10 x64 in-place upgrade
|
||||
- Name: Windows 10 x64 in-place upgrade
|
||||
- Limited Collection: All Systems
|
||||
- Membership rules:
|
||||
- Direct rule
|
||||
@ -89,39 +101,50 @@ On **CM01**:
|
||||
- Select Resources
|
||||
- Select PC0004
|
||||
|
||||
2. Review the Windows 10 x64 in-place upgrade collection. Don't continue until you see PC0004 in the collection.
|
||||
2. Review the Windows 10 x64 in-place upgrade collection. Don't continue until you see PC0004 in the collection.
|
||||
|
||||
## Deploy the Windows 10 upgrade
|
||||
## Deploy the Windows 10 upgrade
|
||||
|
||||
In this section, you create a deployment for the Windows 10 Enterprise x64 Update application.
|
||||
In this section, you create a deployment for the Windows 10 Enterprise x64 Update application.
|
||||
|
||||
On **CM01**:
|
||||
|
||||
1. Using the Configuration Manager console, in the Software Library workspace, right-click the **Upgrade Task Sequence** task sequence, and then click **Deploy**.
|
||||
2. On the **General** page, browse and select the **Windows 10 x64 in-place upgrade** collection, and then click **Next**.
|
||||
3. On the **Content** page, click **Next**.
|
||||
4. On the **Deployment Settings** page, click **Next**:
|
||||
5. On the **Scheduling** page, accept the default settings, and then click **Next**.
|
||||
6. On the **User Experience** page, accept the default settings, and then click **Next**.
|
||||
7. On the **Alerts** page, accept the default settings, and then click **Next**.
|
||||
7. On the **Distribution Points** page, accept the default settings, and then click **Next**.
|
||||
8. On the **Summary** page, click **Next**, and then click **Close**.
|
||||
1. Using the Configuration Manager console, in the **Software Library** workspace, right-click the **Upgrade Task Sequence** task sequence, and then select **Deploy**.
|
||||
|
||||
## Start the Windows 10 upgrade
|
||||
2. On the **General** page, browse and select the **Windows 10 x64 in-place upgrade** collection, and then select **Next**.
|
||||
|
||||
3. On the **Content** page, select **Next**.
|
||||
|
||||
4. On the **Deployment Settings** page, select **Next**:
|
||||
|
||||
5. On the **Scheduling** page, accept the default settings, and then select **Next**.
|
||||
|
||||
6. On the **User Experience** page, accept the default settings, and then select **Next**.
|
||||
|
||||
7. On the **Alerts** page, accept the default settings, and then select **Next**.
|
||||
|
||||
8. On the **Distribution Points** page, accept the default settings, and then select **Next**.
|
||||
|
||||
9. On the **Summary** page, select **Next**, and then select **Close**.
|
||||
|
||||
## Start the Windows 10 upgrade
|
||||
|
||||
Next, run the in-place upgrade task sequence on PC0004.
|
||||
|
||||
On **PC0004**:
|
||||
|
||||
1. Open the Configuration Manager control panel (control smscfgrc).
|
||||
2. On the **Actions** tab, select **Machine Policy Retrieval & Evaluation Cycle**, click **Run Now**, and then click **OK** in the popup dialog box that appears.
|
||||
1. Open the Configuration Manager control panel (`control.exe smscfgrc`).
|
||||
|
||||
>[!NOTE]
|
||||
>You also can use the Client Notification option in the Configuration Manager console, as shown in [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md).
|
||||
2. On the **Actions** tab, select **Machine Policy Retrieval & Evaluation Cycle**, select **Run Now**, and then select **OK** in the popup dialog box that appears.
|
||||
|
||||
3. Open the Software Center, select the **Upgrade Task Sequence** deployment and then click **Install**.
|
||||
4. Confirm you want to upgrade the operating system on this computer by clicking **Install** again.
|
||||
5. Allow the Upgrade Task Sequence to complete. The PC0004 computer will download the install.wim file, perform an in-place upgrade, and install your added applications. See the following examples:
|
||||
> [!NOTE]
|
||||
> You also can use the Client Notification option in the Configuration Manager console, as shown in [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md).
|
||||
|
||||
3. Open the Software Center, select the **Upgrade Task Sequence** deployment and then select **Install**.
|
||||
|
||||
4. Confirm you want to upgrade the operating system on this computer by clicking **Install** again.
|
||||
|
||||
5. Allow the Upgrade Task Sequence to complete. The PC0004 computer will download the **Operating System Upgrade Package** (the Windows installation source files), perform an in-place upgrade, and install your added applications. See the following examples:
|
||||
|
||||
<br>
|
||||
<br>
|
||||
@ -131,7 +154,7 @@ On **PC0004**:
|
||||
<br>
|
||||

|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Windows 10 deployment scenarios](../windows-10-deployment-scenarios.md)<br>
|
||||
[Configuration Manager Team blog](https://techcommunity.microsoft.com/t5/configuration-manager-blog/bg-p/ConfigurationManagerBlog)
|
||||
|
@ -1,49 +1,57 @@
|
||||
---
|
||||
title: Assign applications using roles in MDT (Windows 10)
|
||||
description: This topic will show you how to add applications to a role in the MDT database and then assign that role to a computer.
|
||||
description: This article will show you how to add applications to a role in the MDT database and then assign that role to a computer.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Assign applications using roles in MDT
|
||||
|
||||
This topic will show you how to add applications to a role in the MDT database and then assign that role to a computer. For the purposes of this topic, the application we are adding is Adobe Reader XI. In addition to using computer-specific entries in the database, you can use roles in MDT to group settings together.
|
||||
This article will show you how to add applications to a role in the MDT database and then assign that role to a computer. For the purposes of this article, the application we're adding is Adobe Reader XI. In addition to using computer-specific entries in the database, you can use roles in MDT to group settings together.
|
||||
|
||||
## <a href="" id="sec01"></a>Create and assign a role entry in the database
|
||||
## Create and assign a role entry in the database
|
||||
|
||||
1. On MDT01, using Deployment Workbench, in the MDT Production deployment share, expand **Advanced Configuration** and then expand **Database**.
|
||||
2. In the **Database** node, right-click **Role**, select **New**, and create a role entry with the following settings:
|
||||
1. Role name: Standard PC
|
||||
2. Applications / Lite Touch Applications:
|
||||
3. Install - Adobe Reader XI - x86
|
||||
1. On MDT01, using Deployment Workbench, in the MDT Production deployment share, expand **Advanced Configuration** and then expand **Database**.
|
||||
|
||||
2. In the **Database** node, right-click **Role**, select **New**, and create a role entry with the following settings:
|
||||
|
||||
1. Role name: Standard PC
|
||||
2. Applications / Lite Touch Applications:
|
||||
3. Install - Adobe Reader XI - x86
|
||||
|
||||

|
||||
|
||||
Figure 12. The Standard PC role with the application added
|
||||
|
||||
## <a href="" id="sec02"></a>Associate the role with a computer in the database
|
||||
## Associate the role with a computer in the database
|
||||
|
||||
After creating the role, you can associate it with one or more computer entries.
|
||||
1. Using Deployment Workbench, expand **MDT Production**, expand **Advanced Configuration**, expand **Database**, and select **Computers**.
|
||||
2. In the **Computers** node, double-click the **PC00075** entry, and add the following setting:
|
||||
- Roles: Standard PC
|
||||
|
||||
1. Using Deployment Workbench, expand **MDT Production**, expand **Advanced Configuration**, expand **Database**, and select **Computers**.
|
||||
|
||||
2. In the **Computers** node, double-click the **PC00075** entry, and add the following setting:
|
||||
- Roles: Standard PC
|
||||
|
||||

|
||||
|
||||
Figure 13. The Standard PC role added to PC00075 (having ID 1 in the database).
|
||||
|
||||
## <a href="" id="sec03"></a>Verify database access in the MDT simulation environment
|
||||
## Verify database access in the MDT simulation environment
|
||||
|
||||
When the database is populated, you can use the MDT simulation environment to simulate a deployment. The applications are not installed, but you can see which applications would be installed if you did a full deployment of the computer.
|
||||
1. On PC0001, log on as **CONTOSO\\MDT\_BA**.
|
||||
2. Modify the C:\\MDT\\CustomSettings.ini file to look like the following:
|
||||
When the database is populated, you can use the MDT simulation environment to simulate a deployment. The applications aren't installed, but you can see which applications would be installed if you did a full deployment of the computer.
|
||||
|
||||
```
|
||||
1. On PC0001, log on as **CONTOSO\\MDT\_BA**.
|
||||
|
||||
2. Modify the C:\\MDT\\CustomSettings.ini file to look like below:
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=CSettings, CRoles, RApplications, Default
|
||||
[Default]
|
||||
@ -106,9 +114,9 @@ When the database is populated, you can use the MDT simulation environment to si
|
||||
Order=Sequence
|
||||
```
|
||||
|
||||
3. Using an elevated Windows PowerShell prompt (run as Administrator), run the following commands. Press **Enter** after each command:
|
||||
3. Using an elevated Windows PowerShell prompt (run as Administrator), run the following commands. Press **Enter** after each command:
|
||||
|
||||
``` powershell
|
||||
```powershell
|
||||
Set-Location C:\MDT
|
||||
.\Gather.ps1
|
||||
|
||||
@ -118,14 +126,12 @@ When the database is populated, you can use the MDT simulation environment to si
|
||||
|
||||
Figure 14. ZTIGather.log displaying the application GUID belonging to the Adobe Reader XI application that would have been installed if you deployed this machine.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
<BR>[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
<BR>[Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
<BR>[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
<BR>[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
<BR>[Use web services in MDT](use-web-services-in-mdt.md)
|
||||
<BR>[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
||||
|
||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
@ -1,32 +1,36 @@
|
||||
---
|
||||
title: Build a distributed environment for Windows 10 deployment (Windows 10)
|
||||
description: In this topic, you'll learn how to replicate your Windows 10 deployment shares to facilitate the deployment of Windows 10 in remote or branch locations.
|
||||
description: In this article, you'll learn how to replicate your Windows 10 deployment shares to facilitate the deployment of Windows 10 in remote or branch locations.
|
||||
ms.assetid: a6cd5657-6a16-4fff-bfb4-44760902d00c
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Build a distributed environment for Windows 10 deployment
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
|
||||
Perform the steps in this article to build a distributed environment for Windows 10 deployment. A distributed environment for deployment is useful when you have a segmented network, for example one that is segmented geographically into two branch locations. If you work in a distributed environment, replicating the deployment shares is an important part of a deployment solution because images of 5 GB or more in size can present bandwidth issues when deployed over the wire. Replicating this content enables clients to do local deployments.
|
||||
|
||||
Four computers are used in this topic: DC01, MDT01, MDT02, and PC0006. DC01 is a domain controller, MDT01 and MDT02 are domain member computers running Windows Server 2019, and PC0006 is a blank device where we'll deploy Windows 10. The second deployment server (MDT02) will be configured for a remote site (Stockholm) by replicating the deployment share on MDT01 at the original site (New York). All devices are members of the domain contoso.com for the fictitious Contoso Corporation.
|
||||
Four computers are used in this article: DC01, MDT01, MDT02, and PC0006. DC01 is a domain controller, MDT01 and MDT02 are domain member computers running Windows Server 2019, and PC0006 is a blank device where we'll deploy Windows 10. The second deployment server (MDT02) will be configured for a remote site (Stockholm) by replicating the deployment share on MDT01 at the original site (New York). All devices are members of the domain contoso.com for the fictitious Contoso Corporation.
|
||||
|
||||
For the purposes of this article, we assume that MDT02 is prepared with the same network and storage capabilities that were specified for MDT01, except that MDT02 is located on a different subnet than MDT01. For more information on the infrastructure setup for this topic, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
For the purposes of this article, we assume that MDT02 is prepared with the same network and storage capabilities that were specified for MDT01, except that MDT02 is located on a different subnet than MDT01. For more information on the infrastructure setup for this article, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||

|
||||
|
||||
Computers used in this topic.
|
||||
Computers used in this article.
|
||||
|
||||
>HV01 is also used in this topic to host the PC0006 virtual machine.
|
||||
> [!NOTE]
|
||||
> HV01 is also used in this topic to host the PC0006 virtual machine.
|
||||
|
||||
## Replicate deployment shares
|
||||
|
||||
@ -34,14 +38,14 @@ Replicating the content between MDT01 (New York) and MDT02 (Stockholm) can be do
|
||||
|
||||
> [!NOTE]
|
||||
> Robocopy has options that allow for synchronization between folders. It has a simple reporting function; it supports transmission retry; and, by default, it will only copy/remove files from the source that are newer than files on the target.
|
||||
|
||||
|
||||
### Linked deployment shares in MDT
|
||||
|
||||
LDS is a built-in feature in MDT for replicating content. However, LDS works best with strong connections such as LAN connections with low latency. For most WAN links, DFS-R is the better option.
|
||||
|
||||
### Why DFS-R is a better option
|
||||
|
||||
DFS-R isn't only fast and reliable, but it also offers central monitoring, bandwidth control, and a great delta replication engine. DFS-R will work equally well whether you have 2 sites or 90. When using DFS-R for MDT, we recommend running your deployment servers on Windows Server 2008 R2 or higher. From that version on, you can configure the replication targets as read-only, which is exactly what you want for MDT. This way, you can have your master deployment share centralized and replicate out changes as they happen. DFS-R will quickly pick up changes at the central deployment share in MDT01 and replicate the delta changes to MDT02.
|
||||
DFS-R isn't only fast and reliable, but it also offers central monitoring, bandwidth control, and a great delta replication engine. DFS-R will work equally well whether you have 2 sites or 90. When using DFS-R for MDT, we recommend running your deployment servers on Windows Server 2008 R2 or higher. From that version on, you can configure the replication targets as read-only, which is exactly what you want for MDT. This way, you can have your main deployment share centralized and replicate out changes as they happen. DFS-R will quickly pick up changes at the central deployment share in MDT01 and replicate the delta changes to MDT02.
|
||||
|
||||
## Set up Distributed File System Replication (DFS-R) for replication
|
||||
|
||||
@ -53,9 +57,9 @@ On **MDT01**:
|
||||
|
||||
1. Install the DFS Replication role on MDT01 by entering the following at an elevated Windows PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
Install-WindowsFeature -Name FS-DFS-Replication -IncludeManagementTools
|
||||
```
|
||||
```powershell
|
||||
Install-WindowsFeature -Name FS-DFS-Replication -IncludeManagementTools
|
||||
```
|
||||
|
||||
2. Wait for installation to complete, and then verify that the installation was successful. See the following output:
|
||||
|
||||
@ -73,9 +77,9 @@ On **MDT02**:
|
||||
|
||||
1. Perform the same procedure on MDT02 by entering the following at an elevated Windows PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
Install-WindowsFeature -Name FS-DFS-Replication -IncludeManagementTools
|
||||
```
|
||||
```powershell
|
||||
Install-WindowsFeature -Name FS-DFS-Replication -IncludeManagementTools
|
||||
```
|
||||
|
||||
2. Wait for installation to complete, and then verify that the installation was successful. See the following output:
|
||||
|
||||
@ -93,10 +97,10 @@ On **MDT02**:
|
||||
|
||||
1. Create and share the **D:\\MDTProduction** folder using default permissions by entering the following at an elevated command prompt:
|
||||
|
||||
```powershell
|
||||
mkdir d:\MDTProduction
|
||||
New-SmbShare -Name "MDTProduction$" -Path "D:\MDTProduction"
|
||||
```
|
||||
```powershell
|
||||
mkdir d:\MDTProduction
|
||||
New-SmbShare -Name "MDTProduction$" -Path "D:\MDTProduction"
|
||||
```
|
||||
|
||||
2. You should see the following output:
|
||||
|
||||
@ -110,11 +114,11 @@ On **MDT02**:
|
||||
|
||||
### Configure the deployment share
|
||||
|
||||
When you have multiple deployment servers sharing the same content, you need to configure the Bootstrap.ini file with information about which server to connect to based on where the client is located. In MDT, that can be done by using the DefaultGateway property.
|
||||
When you have multiple deployment servers sharing the same content, you need to configure the Bootstrap.ini file with information about which server to connect to based on where the client is located. In MDT that can be done by using the **DefaultGateway** property.
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Using Notepad, navigate to the **D:\\MDTProduction\\Control** folder and modify the Boostrap.ini file as follows. Under [DefaultGateway] enter the IP addresses for the client's default gateway in New York and Stockholm, respectively (replace 10.10.10.1 and 10.10.20.1 with your default gateways). The default gateway setting is what tells the client which deployment share (that is, server) to use.
|
||||
1. Using Notepad, navigate to the **D:\\MDTProduction\\Control** folder and modify the `Boostrap.ini` file as follows. Under `[DefaultGateway]` enter the IP addresses for the client's default gateway in New York and Stockholm, respectively (replace 10.10.10.1 and 10.10.20.1 with your default gateways). The default gateway setting is what tells the client which deployment share (that is, server) to use.
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
@ -136,130 +140,167 @@ On **MDT01**:
|
||||
UserPassword=pass@word1
|
||||
SkipBDDWelcome=YES
|
||||
```
|
||||
>[!NOTE]
|
||||
>The DeployRoot value needs to go into the Bootstrap.ini file, but you can use the same logic in the CustomSettings.ini file. For example, you can redirect the logs to the local deployment server (SLSHARE), or have the User State Migration Tool (USMT) migration store (UDDIR) local. To learn more about USMT, see [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md) and [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md).
|
||||
|
||||
2. Save the Bootstrap.ini file.
|
||||
|
||||
> [!NOTE]
|
||||
> The DeployRoot value needs to go into the Bootstrap.ini file, but you can use the same logic in the CustomSettings.ini file. For example, you can redirect the logs to the local deployment server (SLSHARE), or have the User State Migration Tool (USMT) migration store (UDDIR) local. To learn more about USMT, see [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md) and [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md).
|
||||
|
||||
2. Save the `Bootstrap.ini` file.
|
||||
|
||||
3. Using the Deployment Workbench, right-click the **MDT Production** deployment share and select **Update Deployment Share**. Use the default settings for the Update Deployment Share Wizard. This process will take a few minutes.
|
||||
|
||||
4. After the update is complete, use the Windows Deployment Services console on MDT01. In the **Boot Images** node, right-click the **MDT Production x64** boot image and select **Replace Image**.
|
||||
|
||||
5. Browse and select the **D:\\MDTProduction\\Boot\\LiteTouchPE\_x64.wim** boot image, and then complete Replace Boot Image Wizard using the default settings.
|
||||
|
||||

|
||||
|
||||
Replacing the updated boot image in WDS.
|
||||
|
||||
>[!TIP]
|
||||
>If you modify bootstrap.ini again later, be sure to repeat the process of updating the deployment share in the Deployment Workbench and replacing the boot image in the WDS console.
|
||||
> [!TIP]
|
||||
> If you modify bootstrap.ini again later, be sure to repeat the process of updating the deployment share in the Deployment Workbench and replacing the boot image in the WDS console.
|
||||
|
||||
## Replicate the content
|
||||
## Replicate the content
|
||||
|
||||
Once the MDT01 and MDT02 servers are prepared, you're ready to configure the actual replication.
|
||||
Once the MDT01 and MDT02 servers are prepared, you're ready to configure the actual replication.
|
||||
|
||||
### Create the replication group
|
||||
### Create the replication group
|
||||
|
||||
6. On MDT01, using DFS Management (dfsmgmt.msc), right-click **Replication**, and click **New Replication Group**.
|
||||
7. On the **Replication Group Type** page, select **Multipurpose replication group**, and click **Next**.
|
||||
8. On the **Name and Domain** page, assign the **MDTProduction** name, and click **Next**.
|
||||
9. On the **Replication Group Members** page, click **Add**, add **MDT01** and **MDT02**, and then click **Next**.
|
||||
1. On MDT01, using DFS Management (dfsmgmt.msc), right-click **Replication**, and select **New Replication Group**.
|
||||
|
||||
2. On the **Replication Group Type** page, select **Multipurpose replication group**, and select **Next**.
|
||||
|
||||
3. On the **Name and Domain** page, assign the **MDTProduction** name, and select **Next**.
|
||||
|
||||
4. On the **Replication Group Members** page, select **Add**, add **MDT01** and **MDT02**, and then select **Next**.
|
||||
|
||||

|
||||
|
||||
Adding the Replication Group Members.
|
||||
|
||||
10. On the **Topology Selection** page, select the **Full mesh** option and click **Next**.
|
||||
11. On the **Replication Group Schedule and Bandwidth** page, accept the default settings and click **Next**.
|
||||
12. On the **Primary Member** page, select **MDT01** and click **Next**.
|
||||
13. On the **Folders to Replicate** page, click **Add**, enter **D:\\MDTProduction** as the folder to replicate, click **OK**, and then click **Next**.
|
||||
14. On the **Local Path of MDTProduction** on the **Other Members** page, select **MDT02**, and click **Edit**.
|
||||
15. On the **Edit** page, select the **Enabled** option, type in **D:\\MDTProduction** as the local path of folder, select the **Make the selected replicated folder on this member read-only** check box, click **OK**, and then click **Next**.
|
||||
16. On the **Review Settings and Create Replication Group** page, click **Create**.
|
||||
17. On the **Confirmation** page, click **Close**.
|
||||
5. On the **Topology Selection** page, select the **Full mesh** option and select **Next**.
|
||||
|
||||
### Configure replicated folders
|
||||
6. On the **Replication Group Schedule and Bandwidth** page, accept the default settings and select **Next**.
|
||||
|
||||
7. On the **Primary Member** page, select **MDT01** and select **Next**.
|
||||
|
||||
8. On the **Folders to Replicate** page, select **Add**, enter **D:\\MDTProduction** as the folder to replicate, select **OK**, and then select **Next**.
|
||||
|
||||
9. On the **Local Path of MDTProduction** on the **Other Members** page, select **MDT02**, and select **Edit**.
|
||||
|
||||
10. On the **Edit** page, select the **Enabled** option, type in **D:\\MDTProduction** as the local path of folder, select the **Make the selected replicated folder on this member read-only** check box, select **OK**, and then select **Next**.
|
||||
|
||||
11. On the **Review Settings and Create Replication Group** page, select **Create**.
|
||||
|
||||
12. On the **Confirmation** page, select **Close**.
|
||||
|
||||
### Configure replicated folders
|
||||
|
||||
1. On **MDT01**, using DFS Management, expand **Replication** and then select **MDTProduction**.
|
||||
|
||||
2. In the middle pane, right-click the **MDT01** member and select **Properties**.
|
||||
|
||||
3. On the **MDT01 (MDTProduction) Properties** page, configure the following and then select **OK**:
|
||||
|
||||
1. In the **Staging** tab, set the quota to **20480 MB**.
|
||||
|
||||
2. In the **Advanced** tab, set the quota to **8192 MB**.
|
||||
|
||||
18. On **MDT01**, using DFS Management, expand **Replication** and then select **MDTProduction**.
|
||||
19. In the middle pane, right-click the **MDT01** member and click **Properties**.
|
||||
20. On the **MDT01 (MDTProduction) Properties** page, configure the following and then click **OK**:
|
||||
1. In the **Staging** tab, set the quota to **20480 MB**.
|
||||
2. In the **Advanced** tab, set the quota to **8192 MB**.
|
||||
In this scenario the size of the deployment share is known, but you might need to change the values for your environment. A good rule of thumb is to get the size of the 16 largest files and make sure they fit in the staging area. Below is a Windows PowerShell example that calculates the size of the 16 largest files in the D:\\MDTProduction deployment share:
|
||||
|
||||
``` powershell
|
||||
|
||||
```powershell
|
||||
(Get-ChildItem D:\MDTProduction -Recurse | Sort-Object Length -Descending | Select-Object -First 16 | Measure-Object -Property Length -Sum).Sum /1GB
|
||||
```
|
||||
|
||||
21. In the middle pane, right-click the **MDT02** member and select **Properties**.
|
||||
22. On the **MDT02 (MDTProduction) Properties** page, configure the following and then click **OK**:
|
||||
1. In the **Staging** tab, set the quota to **20480 MB**.
|
||||
2. In the **Advanced** tab, set the quota to **8192 MB**.
|
||||
4. In the middle pane, right-click the **MDT02** member and select **Properties**.
|
||||
|
||||
5. On the **MDT02 (MDTProduction) Properties** page, configure the following and then select **OK**:
|
||||
1. In the **Staging** tab, set the quota to **20480 MB**.
|
||||
|
||||
2. In the **Advanced** tab, set the quota to **8192 MB**.
|
||||
|
||||
> [!NOTE]
|
||||
> It will take some time for the replication configuration to be picked up by the replication members (MDT01 and MDT02). The time for the initial sync will depend on the WAN link speed between the sites. After that, delta changes are replicated quickly.
|
||||
|
||||
23. Verify that MDT01 and MDT02 are members of the MDTProduction replication group, with MDT01 being primary as follows using an elevated command prompt:
|
||||
6. Verify that MDT01 and MDT02 are members of the MDTProduction replication group, with MDT01 being primary as follows using an elevated command prompt:
|
||||
|
||||
```cmd
|
||||
C:\> dfsradmin membership list /rgname:MDTProduction /attr:MemName,IsPrimary
|
||||
MemName IsPrimary
|
||||
MDT01 Yes
|
||||
MDT02 No
|
||||
```
|
||||
```cmd
|
||||
C:\> dfsradmin membership list /rgname:MDTProduction /attr:MemName,IsPrimary
|
||||
MemName IsPrimary
|
||||
MDT01 Yes
|
||||
MDT02 No
|
||||
```
|
||||
|
||||
### Verify replication
|
||||
|
||||
On **MDT02**:
|
||||
|
||||
1. Wait until you start to see content appear in the **D:\\MDTProduction** folder.
|
||||
|
||||
2. Using DFS Management, expand **Replication**, right-click **MDTProduction**, and select **Create Diagnostics Report**.
|
||||
3. In the Diagnostics Report Wizard, on the **Type of Diagnostics Report or Test** page, choose **Health report** and click **Next**.
|
||||
4. On the **Path and Name** page, accept the default settings and click **Next**.
|
||||
5. On the **Members to Include** page, accept the default settings and click **Next**.
|
||||
6. On the **Options** page, accept the default settings and click **Next**.
|
||||
7. On the **Review Settings and Create Report** page, click **Create**.
|
||||
|
||||
3. In the Diagnostics Report Wizard, on the **Type of Diagnostics Report or Test** page, choose **Health report** and select **Next**.
|
||||
|
||||
4. On the **Path and Name** page, accept the default settings and select **Next**.
|
||||
|
||||
5. On the **Members to Include** page, accept the default settings and select **Next**.
|
||||
|
||||
6. On the **Options** page, accept the default settings and select **Next**.
|
||||
|
||||
7. On the **Review Settings and Create Report** page, select **Create**.
|
||||
|
||||
8. Open the report in Internet Explorer, and if necessary, select the **Allow blocked content** option.
|
||||
|
||||

|
||||

|
||||
The DFS Replication Health Report.
|
||||
|
||||
The DFS Replication Health Report.
|
||||
|
||||
>If there are replication errors you can review the DFS event log in Event Viewer under **Applications and Services Logs**.
|
||||
> [!NOTE]
|
||||
> If there are replication errors you can review the DFS event log in Event Viewer under **Applications and Services Logs**.
|
||||
|
||||
## Configure Windows Deployment Services (WDS) in a remote site
|
||||
|
||||
Like you did in the previous topic for MDT01, you need to add the MDT Production Lite Touch x64 Boot image to Windows Deployment Services on MDT02. For the following steps, we assume that WDS has already been installed on MDT02.
|
||||
Like you did in the previous article for MDT01, you need to add the MDT Production Lite Touch x64 Boot image to Windows Deployment Services on MDT02. For the following steps, we assume that WDS has already been installed on MDT02.
|
||||
|
||||
1. On MDT02, using the WDS console, right-click **Boot Images** and select **Add Boot Image**.
|
||||
|
||||
2. Browse to the **D:\\MDTProduction\\Boot\\LiteTouchPE\_x64.wim** file and add the image with the default settings.
|
||||
|
||||
## Deploy a Windows 10 client to the remote site
|
||||
## Deploy a Windows 10 client to the remote site
|
||||
|
||||
Now you should have a solution ready for deploying the Windows 10 client to the remote site: Stockholm, using the MDTProduction deployment share replica on MDT02. You can test this deployment with the following optional procedure.
|
||||
Now you should have a solution ready for deploying the Windows 10 client to the remote site: Stockholm, using the MDTProduction deployment share replica on MDT02. You can test this deployment with the following optional procedure.
|
||||
|
||||
>For demonstration purposes, the following procedure uses a virtual machine (PC0006) hosted by the Hyper-V server HV01. To use the remote site server (MDT02) the VM must be assigned a default gateway that matches the one you entered in the Boostrap.ini file.
|
||||
> [!NOTE]
|
||||
> For demonstration purposes, the following procedure uses a virtual machine (PC0006) hosted by the Hyper-V server HV01. To use the remote site server (MDT02) the VM must be assigned a default gateway that matches the one you entered in the `Boostrap.ini` file.
|
||||
|
||||
1. Create a virtual machine with the following settings:
|
||||
1. Name: PC0006
|
||||
2. Location: C:\\VMs
|
||||
3. Generation: 2
|
||||
4. Memory: 2048 MB
|
||||
5. Hard disk: 60 GB (dynamic disk)
|
||||
1. Create a virtual machine with the following settings:
|
||||
|
||||
1. **Name**: PC0006
|
||||
2. **Location**: C:\\VMs
|
||||
3. **Generation**: 2
|
||||
4. **Memory**: 2048 MB
|
||||
5. **Hard disk**: 60 GB (dynamic disk)
|
||||
6. Install an operating system from a network-based installation server
|
||||
2. Start the PC0006 virtual machine, and press **Enter** to start the Pre-Boot Execution Environment (PXE) boot. The VM will now load the Windows PE boot image from the WDS server.
|
||||
3. After Windows Preinstallation Environment (Windows PE) has booted, complete the Windows Deployment Wizard using the following settings:
|
||||
1. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Custom Image
|
||||
2. Computer Name: PC0006
|
||||
3. Applications: Select the Install - Adobe Reader
|
||||
4. Setup will now start and perform the following steps:
|
||||
1. Install the Windows 10 Enterprise operating system.
|
||||
2. Install applications.
|
||||
3. Update the operating system using your local Windows Server Update Services (WSUS) server.
|
||||
|
||||
2. Start the PC0006 virtual machine, and press **Enter** to start the Pre-Boot Execution Environment (PXE) boot. The VM will now load the Windows PE boot image from the WDS server.
|
||||
|
||||
3. After Windows Preinstallation Environment (Windows PE) has booted, complete the Windows Deployment Wizard using the following settings:
|
||||
|
||||
1. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Custom Image
|
||||
2. Computer Name: PC0006
|
||||
3. Applications: Select the Install - Adobe Reader
|
||||
|
||||
4. Setup will now start and perform the following steps:
|
||||
|
||||
1. Install the Windows 10 Enterprise operating system.
|
||||
2. Install applications.
|
||||
3. Update the operating system using your local Windows Server Update Services (WSUS) server.
|
||||
|
||||

|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)<br>
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)<br>
|
||||
[Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)<br>
|
||||
[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)<br>
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)<br>
|
||||
[Configure MDT settings](configure-mdt-settings.md)
|
||||
- [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
- [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
[Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||
- [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||
- [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
- [Configure MDT settings](configure-mdt-settings.md)
|
||||
|
@ -2,36 +2,39 @@
|
||||
title: Configure MDT deployment share rules (Windows 10)
|
||||
description: Learn how to configure the MDT rules engine to reach out to other resources for additional information instead of storing settings directly in the rules engine.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Configure MDT deployment share rules
|
||||
|
||||
In this topic, you'll learn how to configure the MDT rules engine to reach out to other resources, including external scripts, databases, and web services, for additional information instead of storing settings directly in the rules engine. The rules engine in MDT is powerful: most of the settings used for operating system deployments are retrieved and assigned via the rules engine. In its simplest form, the rules engine is the CustomSettings.ini text file.
|
||||
In this article, you'll learn how to configure the MDT rules engine to reach out to other resources, including external scripts, databases, and web services, for additional information instead of storing settings directly in the rules engine. The rules engine in MDT is powerful: most of the settings used for operating system deployments are retrieved and assigned via the rules engine. In its simplest form, the rules engine is the CustomSettings.ini text file.
|
||||
|
||||
## <a href="" id="sec01"></a>Assign settings
|
||||
## Assign settings
|
||||
|
||||
When using MDT, you can assign setting in three distinct ways:
|
||||
- You can pre-stage the information before deployment.
|
||||
- You can prompt the user or technician for information.
|
||||
- You can have MDT generate the settings automatically.
|
||||
|
||||
- You can pre-stage the information before deployment.
|
||||
- You can prompt the user or technician for information.
|
||||
- You can have MDT generate the settings automatically.
|
||||
|
||||
In order to illustrate these three options, let's look at some sample configurations.
|
||||
|
||||
## <a href="" id="sec02"></a>Sample configurations
|
||||
## Sample configurations
|
||||
|
||||
Before adding the more advanced components like scripts, databases, and web services, consider the commonly used configurations below; they demonstrate the power of the rules engine.
|
||||
|
||||
### Set computer name by MAC Address
|
||||
|
||||
If you have a small test environment, or simply want to assign settings to a limited number of machines, you can edit the rules to assign settings directly for a given MAC Address. If you have many machines, it makes sense to use the database instead.
|
||||
If you have a small test environment, or simply want to assign settings to a limited number of machines, you can edit the rules to assign settings directly for a given MAC Address. When you have many machines, it makes sense to use the database instead.
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=MacAddress, Default
|
||||
[Default]
|
||||
@ -46,7 +49,7 @@ In the preceding sample, you set the PC00075 computer name for a machine with a
|
||||
|
||||
Another way to assign a computer name is to identify the machine via its serial number.
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=SerialNumber, Default
|
||||
[Default]
|
||||
@ -61,7 +64,7 @@ In this sample, you set the PC00075 computer name for a machine with a serial nu
|
||||
|
||||
You also can configure the rules engine to use a known property, like a serial number, to generate a computer name on the fly.
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
[Default]
|
||||
@ -70,15 +73,15 @@ OSDComputerName=PC-%SerialNumber%
|
||||
```
|
||||
|
||||
In this sample, you configure the rules to set the computer name to a prefix (PC-) and then the serial number. If the serial number of the machine is CND0370RJ7, the preceding configuration sets the computer name to PC-CND0370RJ7.
|
||||
**Note**
|
||||
|
||||
Be careful when using the serial number to assign computer names. A serial number can contain more than 15 characters, but the Windows setup limits a computer name to 15 characters.
|
||||
|
||||
> [!NOTE]
|
||||
> Be careful when using the serial number to assign computer names. A serial number can contain more than 15 characters, but the Windows setup limits a computer name to 15 characters.
|
||||
|
||||
### Generate a limited computer name based on a serial number
|
||||
|
||||
To avoid assigning a computer name longer than 15 characters, you can configure the rules in more detail by adding VBScript functions, as follows:
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
[Default]
|
||||
@ -92,7 +95,7 @@ In the preceding sample, you still configure the rules to set the computer name
|
||||
|
||||
In the rules, you find built-in properties that use a Windows Management Instrumentation (WMI) query to determine whether the machine you're deploying is a laptop, desktop, or server. In this sample, we assume you want to add laptops to different OUs in Active Directory. Note that ByLaptopType isn't a reserved word; rather, it's the name of the section to read.
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=ByLaptopType, Default
|
||||
[Default]
|
||||
@ -103,18 +106,12 @@ Subsection=Laptop-%IsLaptop%
|
||||
MachineObjectOU=OU=Laptops,OU=Contoso,DC=contoso,DC=com
|
||||
```
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
|
||||
[Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
|
||||
[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
|
||||
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
|
||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
|
||||
[Use web services in MDT](use-web-services-in-mdt.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
@ -1,24 +1,26 @@
|
||||
---
|
||||
title: Configure MDT for UserExit scripts (Windows 10)
|
||||
description: In this topic, you will learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address.
|
||||
description: In this article, you'll learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Configure MDT for UserExit scripts
|
||||
|
||||
In this topic, you will learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address. MDT supports calling external VBScripts as part of the Gather process; these scripts are referred to as UserExit scripts. The script also removes the colons in the MAC Address.
|
||||
In this article, you'll learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address. MDT supports calling external VBScripts as part of the Gather process; these scripts are referred to as UserExit scripts. The script also removes the colons in the MAC Address.
|
||||
|
||||
## Configure the rules to call a UserExit script
|
||||
|
||||
You can call a UserExit by referencing the script in your rules. Then you can configure a property to be set to the result of a function of the VBScript. In this example, we have a VBScript named Setname.vbs (provided in the book sample files, in the UserExit folder).
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
[Default]
|
||||
@ -27,13 +29,13 @@ UserExit=Setname.vbs
|
||||
OSDComputerName=#SetName("%MACADDRESS%")#
|
||||
```
|
||||
|
||||
The UserExit=Setname.vbs calls the script and then assigns the computer name to what the SetName function in the script returns. In this sample the %MACADDRESS% variable is passed to the script
|
||||
The UserExit=Setname.vbs calls the script and then assigns the computer name to what the SetName function in the script returns. In this sample, the %MACADDRESS% variable is passed to the script
|
||||
|
||||
## The Setname.vbs UserExit script
|
||||
|
||||
The Setname.vbs script takes the MAC Address passed from the rules. The script then does some string manipulation to add a prefix (PC) and remove the semicolons from the MAC Address.
|
||||
|
||||
```
|
||||
```vb
|
||||
Function UserExit(sType, sWhen, sDetail, bSkip)
|
||||
UserExit = Success
|
||||
End Function
|
||||
@ -46,23 +48,18 @@ Function SetName(sMac)
|
||||
SetName = "PC" & re.Replace(sMac, "")
|
||||
End Function
|
||||
```
|
||||
|
||||
The first three lines of the script make up a header that all UserExit scripts have. The interesting part is the lines between Function and End Function. Those lines add a prefix (PC), remove the colons from the MAC Address, and return the value to the rules by setting the SetName value.
|
||||
|
||||
**Note**
|
||||
The purpose of this sample is not to recommend that you use the MAC Address as a base for computer naming, but to show you how to take a variable from MDT, pass it to an external script, make some changes to it, and then return the new value to the deployment process.
|
||||
|
||||
## Related topics
|
||||
> [!NOTE]
|
||||
> The purpose of this sample isn't to recommend that you use the MAC Address as a base for computer naming, but to show you how to take a variable from MDT, pass it to an external script, make some changes to it, and then return the new value to the deployment process.
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
## Related articles
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
|
||||
[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
|
||||
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
|
||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
|
||||
[Use web services in MDT](use-web-services-in-mdt.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
@ -3,39 +3,41 @@ title: Configure MDT settings (Windows 10)
|
||||
description: One of the most powerful features in Microsoft Deployment Toolkit (MDT) is its extension capabilities; there's virtually no limitation to what you can do in terms of customization.
|
||||
ms.assetid: d3e1280c-3d1b-4fad-8ac4-b65dc711f122
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Configure MDT settings
|
||||
|
||||
One of the most powerful features in Microsoft Deployment Toolkit (MDT) is its extension capabilities; there's virtually no limitation to what you can do in terms of customization. In this topic, you learn about configuring customizations for your environment.
|
||||
For the purposes of this topic, we'll use four machines: DC01, MDT01, HV01, and PC0001. DC01 is a domain controller, MDT01 is a Windows Server 2012 R2 Standard server, and PC0001 is a Windows 10 Enterprise x64 client used for the MDT simulation environment. OR01 has Microsoft System Center 2012 R2 Orchestrator installed. MDT01, OR01, and PC0001 are members of the domain contoso.com for the fictitious Contoso Corporation. For more information on the setup for this topic, see [Deploy Windows 10 with the Microsoft Deployment Toolkit](./prepare-for-windows-deployment-with-mdt.md).
|
||||
One of the most powerful features in Microsoft Deployment Toolkit (MDT) is its extension capabilities; there's virtually no limitation to what you can do in terms of customization. In this article, you learn about configuring customizations for your environment.
|
||||
For the purposes of this article, we'll use four machines: DC01, MDT01, HV01, and PC0001. DC01 is a domain controller, MDT01 is a Windows Server 2012 R2 Standard server, and PC0001 is a Windows 10 Enterprise x64 client used for the MDT simulation environment. OR01 has Microsoft System Center 2012 R2 Orchestrator installed. MDT01, OR01, and PC0001 are members of the domain contoso.com for the fictitious Contoso Corporation. For more information on the setup for this article, see [Deploy Windows 10 with the Microsoft Deployment Toolkit](./prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||

|
||||
|
||||
The computers used in this topic.
|
||||
The computers used in this article.
|
||||
|
||||
## In this section
|
||||
|
||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)<br>
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)<br>
|
||||
[Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)<br>
|
||||
[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)<br>
|
||||
[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)<br>
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
- [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
- [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
- [Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||
- [Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
||||
- [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||
- [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
|
@ -2,36 +2,40 @@
|
||||
title: Create a Windows 10 reference image (Windows 10)
|
||||
description: Creating a reference image is important because that image serves as the foundation for the devices in your organization.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Create a Windows 10 reference image
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
**Applies to:**
|
||||
|
||||
Creating a reference image is important because that image serves as the foundation for the devices in your organization. In this topic, you 'll learn how to create a Windows 10 reference image using the Microsoft Deployment Toolkit (MDT). You 'll create a deployment share, configure rules and settings, and import all the applications and operating system files required to build a Windows 10 reference image. After completing the steps outlined in this topic, you 'll have a Windows 10 reference image that can be used in your deployment solution.
|
||||
- Windows 10
|
||||
|
||||
>[!NOTE]
|
||||
>For more information about the server, client, and network infrastructure used in this guide, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
Creating a reference image is important because that image serves as the foundation for the devices in your organization. In this article, you 'll learn how to create a Windows 10 reference image using the Microsoft Deployment Toolkit (MDT). You 'll create a deployment share, configure rules and settings, and import all the applications and operating system files required to build a Windows 10 reference image. After completing the steps outlined in this article, you 'll have a Windows 10 reference image that can be used in your deployment solution.
|
||||
|
||||
> [!NOTE]
|
||||
> For more information about the server, client, and network infrastructure used in this guide, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||
For the purposes of this article, we'll use three computers: DC01, MDT01, and HV01.
|
||||
|
||||
- DC01 is a domain controller for the contoso.com domain.
|
||||
- MDT01 is a contoso.com domain member server.
|
||||
- HV01 is a Hyper-V server that will be used to build the reference image.
|
||||
|
||||
For the purposes of this topic, we'll use three computers: DC01, MDT01, and HV01.
|
||||
- DC01 is a domain controller for the contoso.com domain.
|
||||
- MDT01 is a contoso.com domain member server.
|
||||
- HV01 is a Hyper-V server that will be used to build the reference image.
|
||||
|
||||

|
||||
|
||||
Computers used in this topic.
|
||||
Computers used in this article.
|
||||
|
||||
## The reference image
|
||||
|
||||
The reference image described in this guide is designed primarily for deployment to physical devices. However, the reference image is typically created on a virtual platform, before being automatically run through the System Preparation (Sysprep) tool process and captured to a Windows Imaging (WIM) file. The reasons for creating the reference image on a virtual platform are:
|
||||
|
||||
- To reduce development time and can use snapshots to test different configurations quickly.
|
||||
- To rule out hardware issues. You get the best possible image, and if you've a problem, it's not likely to be hardware related.
|
||||
- To ensure that you won't have unwanted applications that could be installed as part of a driver install but not removed by the Sysprep process.
|
||||
@ -39,30 +43,36 @@ The reference image described in this guide is designed primarily for deployment
|
||||
|
||||
## Set up the MDT build lab deployment share
|
||||
|
||||
With Windows 10, there's no hard requirement to create reference images. However, to reduce the time needed for deployment, you might want to create a reference image that contains a few base applications and all of the latest updates. This section will show you how to create and configure the MDT Build Lab deployment share to create a Windows 10 reference image. Because reference images will be deployed only to virtual machines during the creation process and have specific settings (rules), you should always create a separate deployment share specifically for this process.
|
||||
With Windows 10, there's no hard requirement to create reference images. However, to reduce the time needed for deployment, you might want to create a reference image that contains a few base applications and all of the latest updates. This section will show you how to create and configure the MDT Build Lab deployment share to create a Windows 10 reference image. Because reference images will be deployed only to virtual machines during the creation process and have specific settings (rules), you should always create a separate deployment share specifically for this process.
|
||||
|
||||
### Create the MDT build lab deployment share
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
- Sign in as contoso\\administrator using a password of <b>pass@word1</b> (credentials from the [prepare for deployment](prepare-for-windows-deployment-with-mdt.md) topic).
|
||||
- Start the MDT deployment workbench, and pin this workbench to the taskbar for easy access.
|
||||
- Using the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**.
|
||||
- Use the following settings for the New Deployment Share Wizard:
|
||||
- Deployment share path: **D:\\MDTBuildLab**
|
||||
- Share name: **MDTBuildLab$**
|
||||
- Deployment share description: **MDT Build Lab**
|
||||
- Accept the default selections on the Options page and click **Next**.
|
||||
- Review the Summary page, click **Next**, wait for the deployment share to be created, then click **Finish**.
|
||||
- Verify that you can access the <b>\\\\MDT01\\MDTBuildLab$</b> share.
|
||||
1. Sign in as **contoso\\administrator** using a password of **pass@word1** (credentials from the [prepare for deployment](prepare-for-windows-deployment-with-mdt.md) article).
|
||||
|
||||
2. Start the MDT deployment workbench, and pin this workbench to the taskbar for easy access.
|
||||
|
||||
3. Using the Deployment Workbench, right-click **Deployment Shares** and select **New Deployment Share**.
|
||||
|
||||
4. Use the following settings for the New Deployment Share Wizard:
|
||||
|
||||
- Deployment share path: **D:\\MDTBuildLab**
|
||||
- Share name: **MDTBuildLab$**
|
||||
- Deployment share description: **MDT Build Lab**
|
||||
|
||||
5. Accept the default selections on the Options page and select **Next**.
|
||||
|
||||
6. Review the Summary page, select **Next**, wait for the deployment share to be created, then select **Finish**.
|
||||
|
||||
7. Verify that you can access the **\\\\MDT01\\MDTBuildLab$** share.
|
||||
|
||||

|
||||
|
||||
The Deployment Workbench with the MDT Build Lab deployment share.
|
||||
|
||||
### Enable monitoring
|
||||
|
||||
To monitor the task sequence as it happens, right-click the **MDT Build Lab** deployment share, click **Properties**, click the **Monitoring** tab, and select **Enable monitoring for this deployment share**. This step is optional.
|
||||
To monitor the task sequence as it happens, right-click the **MDT Build Lab** deployment share, select **Properties**, select the **Monitoring** tab, and select **Enable monitoring for this deployment share**. This step is optional.
|
||||
|
||||
### Configure permissions for the deployment share
|
||||
|
||||
@ -70,66 +80,76 @@ In order to read files in the deployment share and write the reference image bac
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Ensure you're signed in as **contoso\\administrator**.
|
||||
2. Modify the NTFS permissions for the **D:\\MDTBuildLab** folder by running the following command in an elevated Windows PowerShell prompt:
|
||||
1. Ensure you're signed in as **contoso\\administrator**.
|
||||
|
||||
``` powershell
|
||||
2. Modify the NTFS permissions for the **D:\\MDTBuildLab** folder by running the following command in an elevated Windows PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
icacls "D:\MDTBuildLab" /grant '"CONTOSO\MDT_BA":(OI)(CI)(M)'
|
||||
grant-smbshareaccess -Name MDTBuildLab$ -AccountName "Contoso\MDT_BA" -AccessRight Full -force
|
||||
```
|
||||
|
||||
## Add setup files
|
||||
|
||||
This section will show you how to populate the MDT deployment share with the Windows 10 operating system source files, commonly referred to as setup files, which will be used to create a reference image. Setup files are used during the reference image creation process and are the foundation for the reference image.
|
||||
This section will show you how to populate the MDT deployment share with the Windows 10 operating system source files, commonly referred to as setup files, which will be used to create a reference image. Setup files are used during the reference image creation process and are the foundation for the reference image.
|
||||
|
||||
### Add the Windows 10 installation files
|
||||
### Add the Windows 10 installation files
|
||||
|
||||
MDT supports adding both full source Windows 10 DVDs (ISOs) and custom images that you've created. In this case, you create a reference image, so you add the full source setup files from Microsoft.
|
||||
MDT supports adding both full source Windows 10 DVDs (ISOs) and custom images that you've created. In this case, you create a reference image, so you add the full source setup files from Microsoft.
|
||||
|
||||
>[!NOTE]
|
||||
>Due to the Windows limits on path length, we are purposely keeping the operating system destination directory short, using the folder name W10EX64RTM rather than a more descriptive name like Windows 10 Enterprise x64 RTM.
|
||||
|
||||
### Add Windows 10 Enterprise x64 (full source)
|
||||
> [!NOTE]
|
||||
> Due to the Windows limits on path length, we are purposely keeping the operating system destination directory short, using the folder name W10EX64RTM rather than a more descriptive name like Windows 10 Enterprise x64 RTM.
|
||||
|
||||
### Add Windows 10 Enterprise x64 (full source)
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Sign in as **contoso\\administrator** and copy the content of a Windows 10 Enterprise x64 DVD/ISO to the **D:\\Downloads\\Windows 10 Enterprise x64** folder on MDT01, or just insert the DVD or mount an ISO on MDT01. The following example shows the files copied to the D:\\Downloads folder, but you can also choose to import the OS directly from an ISO or DVD.
|
||||
1. Sign in as **contoso\\administrator** and copy the content of a Windows 10 Enterprise x64 DVD/ISO to the **D:\\Downloads\\Windows 10 Enterprise x64** folder on MDT01, or just insert the DVD or mount an ISO on MDT01. The following example shows the files copied to the D:\\Downloads folder, but you can also choose to import the OS directly from an ISO or DVD.
|
||||
|
||||

|
||||
|
||||
2. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Build Lab**.
|
||||
|
||||
3. Right-click the **Operating Systems** node, and create a new folder named **Windows 10**.
|
||||
|
||||
4. Expand the **Operating Systems** node, right-click the **Windows 10** folder, and select **Import Operating System**. Use the following settings for the Import Operating System Wizard:
|
||||
|
||||
- Full set of source files
|
||||
- Source directory: (location of your source files)
|
||||
- Destination directory name: <b>W10EX64RTM</b>
|
||||
5. After adding the operating system, in the **Operating Systems / Windows 10** folder, double-click it and change the name to: **Windows 10 Enterprise x64 RTM Default Image**. See the following example.
|
||||
- Destination directory name: **W10EX64RTM**
|
||||
|
||||
5. After adding the operating system, in the **Operating Systems** > **Windows 10** folder, double-click it and change the name to: **Windows 10 Enterprise x64 RTM Default Image**. See the following example.
|
||||
|
||||

|
||||
|
||||
>Depending on the DVD you used, there might be multiple editions available. For the purposes of this guide, we are using the Windows 10 Enterprise image, but other images will also work.
|
||||
> [!NOTE]
|
||||
> Depending on the DVD you used, there might be multiple editions available. For the purposes of this guide, we are using the Windows 10 Enterprise image, but other images will also work.
|
||||
|
||||
## Add applications
|
||||
|
||||
Before you create an MDT task sequence, you need to add any applications and scripts you wish to install to the MDT Build Lab share.
|
||||
Before you create an MDT task sequence, you need to add applications and scripts you wish to install to the MDT Build Lab share.
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
First, create an MDT folder to store the Microsoft applications that will be installed:
|
||||
|
||||
1. In the MDT Deployment Workbench, expand **Deployment Shares \\ MDT Build Lab \\ Applications**
|
||||
2. Right-click **Applications** and then click **New Folder**.
|
||||
|
||||
2. Right-click **Applications** and then select **New Folder**.
|
||||
|
||||
3. Under **Folder name**, type **Microsoft**.
|
||||
4. Click **Next** twice, and then click **Finish**.
|
||||
|
||||
The steps in this section use a strict naming standard for your MDT applications.
|
||||
- Use the "<b>Install - </b>" prefix for typical application installations that run a setup installer of some kind,
|
||||
- Use the "<b>Configure - </b>" prefix when an application configures a setting in the operating system.
|
||||
- You also add an "<b> - x86</b>", "<b> - x64</b>", or "<b>- x86-x64</b>" suffix to indicate the application's architecture (some applications have installers for both architectures).
|
||||
|
||||
Using a script naming standard is always recommended when using MDT as it helps maintain order and consistency.
|
||||
4. Select **Next** twice, and then select **Finish**.
|
||||
|
||||
By storing configuration items as MDT applications, it's easy to move these objects between various solutions, or between test and production environments.
|
||||
The steps in this section use a strict naming standard for your MDT applications.
|
||||
|
||||
- Use the **Install -** prefix for typical application installations that run a setup installer of some kind.
|
||||
- Use the **Configure -** prefix when an application configures a setting in the operating system.
|
||||
- You also add an **- x86**, **- x64**, or **- x86-x64** suffix to indicate the application's architecture (some applications have installers for both architectures).
|
||||
|
||||
Using a script naming standard is always recommended when using MDT as it helps maintain order and consistency.
|
||||
|
||||
By storing configuration items as MDT applications, it's easy to move these objects between various solutions, or between test and production environments.
|
||||
|
||||
In example sections, you 'll add the following applications:
|
||||
|
||||
@ -140,28 +160,31 @@ In example sections, you 'll add the following applications:
|
||||
>The 64-bit version of Microsoft Office 365 Pro Plus is recommended unless you need legacy app support. For more information, see [Choose between the 64-bit or 32-bit version of Office](https://support.office.com/article/choose-between-the-64-bit-or-32-bit-version-of-office-2dee7807-8f95-4d0c-b5fe-6c6f49b8d261)
|
||||
|
||||
Download links:
|
||||
|
||||
- [Office Deployment Tool](https://www.microsoft.com/download/details.aspx?id=49117)
|
||||
- [Microsoft Visual C++ Redistributable 2019 - x86](https://aka.ms/vs/16/release/VC_redist.x86.exe)
|
||||
- [Microsoft Visual C++ Redistributable 2019 - x64](https://aka.ms/vs/16/release/VC_redist.x64.exe)
|
||||
|
||||
Download all three items in this list to the D:\\Downloads folder on MDT01.
|
||||
Download all three items in this list to the D:\\Downloads folder on MDT01.
|
||||
|
||||
**Note**: For the purposes of this lab, we'll leave the MSVC files in the D:\\Downloads folder and the Office365 files will be extracted to a child folder. If you prefer, you can place each application in its own separate child folder and then modify the $ApplicationSourcePath below as needed (instead of just D:\\Downloads).
|
||||
> [!NOTE]
|
||||
> For the purposes of this lab, we'll leave the MSVC files in the D:\\Downloads folder and the Office365 files will be extracted to a child folder. If you prefer, you can place each application in its own separate child folder, and then modify the $ApplicationSourcePath below as needed (instead of just D:\\Downloads).
|
||||
|
||||
> [!NOTE]
|
||||
> All the Microsoft Visual C++ downloads can be found on [The latest supported Visual C++ downloads](https://go.microsoft.com/fwlink/p/?LinkId=619523). Visual C++ 2015, 2017 and 2019 all share the same redistributable files.
|
||||
|
||||
>[!NOTE]
|
||||
>All the Microsoft Visual C++ downloads can be found on [The latest supported Visual C++ downloads](https://go.microsoft.com/fwlink/p/?LinkId=619523). Visual C++ 2015, 2017 and 2019 all share the same redistributable files.
|
||||
|
||||
### Create configuration file: Microsoft Office 365 Professional Plus x64
|
||||
|
||||
1. After downloading the most current version of the Office Deployment tool from the Microsoft Download Center using the link provided above, run the self-extracting executable file and extract the files to **D:\\Downloads\\Office365**. The Office Deployment Tool (setup.exe) and several sample configuration.xml files will be extracted.
|
||||
1. After downloading the most current version of the Office Deployment tool from the Microsoft Download Center using the link provided above, run the self-extracting executable file and extract the files to **D:\\Downloads\\Office365**. The Office Deployment Tool (setup.exe) and several sample configuration.xml files will be extracted.
|
||||
|
||||
2. Using a text editor (such as Notepad), create an XML file in the D:\\Downloads\\Office365 directory with the installation settings for Microsoft 365 Apps for enterprise that are appropriate for your organization. The file uses an XML format, so the file you create must have an extension of .xml but the file can have any filename.
|
||||
|
||||
For example, you can use the following configuration.xml file, which provides these configuration settings:
|
||||
- Install the 64-bit version of Microsoft 365 Apps for enterprise in English directly from the Office Content Delivery Network (CDN) on the internet.
|
||||
- Install the 64-bit version of Microsoft 365 Apps for enterprise in English directly from the Office Content Delivery Network (CDN) on the internet.
|
||||
> [!NOTE]
|
||||
> 64-bit is now the default and recommended edition.
|
||||
- Use the General Availability Channel and get updates directly from the Office CDN on the internet.
|
||||
- Perform a silent installation. You won’t see anything that shows the progress of the installation and you won’t see any error messages.
|
||||
> 64-bit is now the default and recommended edition.
|
||||
- Use the General Availability Channel and get updates directly from the Office CDN on the internet.
|
||||
- Perform a silent installation. You won't see anything that shows the progress of the installation and you won't see any error messages.
|
||||
|
||||
```xml
|
||||
<Configuration>
|
||||
@ -175,43 +198,47 @@ Download all three items in this list to the D:\\Downloads folder on MDT01.
|
||||
</Configuration>
|
||||
```
|
||||
|
||||
When you use these settings, any time you build the reference image you’ll be installing the most up-to-date General Availability Channel version of Microsoft 365 Apps for enterprise.
|
||||
When you use these settings, anytime you build the reference image you'll be installing the most up-to-date General Availability Channel version of Microsoft 365 Apps for enterprise.
|
||||
|
||||
>[!TIP]
|
||||
>You can also use the web-based interface of the [Office Customization Tool](https://config.office.com/) to help you create your configuration.xml file.
|
||||
|
||||
For more information, see [Configuration options for the Office Deployment Tool](/deployoffice/configuration-options-for-the-office-2016-deployment-tool) and [Overview of the Office Deployment Tool](/DeployOffice/overview-of-the-office-2016-deployment-tool).
|
||||
> [!TIP]
|
||||
> You can also use the web-based interface of the [Office Customization Tool](https://config.office.com/) to help you create your configuration.xml file.
|
||||
|
||||
For more information, see [Configuration options for the Office Deployment Tool](/deployoffice/configuration-options-for-the-office-2016-deployment-tool) and [Overview of the Office Deployment Tool](/DeployOffice/overview-of-the-office-2016-deployment-tool).
|
||||
|
||||
3. Ensure the configuration.xml file is in the D:\\Downloads\\Office365 folder. See the following example of the extracted files plus the configuration.xml file in the Downloads\\Office365 folder:
|
||||
|
||||

|
||||
|
||||
Assuming you've named the file "configuration.xml" as shown above, we'll use the command "**setup.exe /configure configuration.xml**" when we create the application in MDT. This command execution will perform the installation of Microsoft 365 Apps for enterprise using the configuration settings in the configuration.xml file. Don't perform this step yet.
|
||||
Assuming you've named the file `configuration.xml` as shown above, we'll use the command **`setup.exe /configure configuration.xml`** when we create the application in MDT. This command execution will perform the installation of Microsoft 365 Apps for enterprise using the configuration settings in the configuration.xml file. Don't perform this step yet.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>After Microsoft 365 Apps for enterprise is installed on the reference image, do NOT open any Office programs. if you open an Office program, you're prompted to sign-in, which activates the installation of Microsoft 365 Apps for enterprise. Even if you don't sign in and you close the Sign in to set up Office dialog box, a temporary product key is installed. You don't want any kind of product key for Microsoft 365 Apps for enterprise installed as part of your reference image.
|
||||
> [!IMPORTANT]
|
||||
> After Microsoft 365 Apps for enterprise is installed on the reference image, do NOT open any Office programs. if you open an Office program, you're prompted to sign-in, which activates the installation of Microsoft 365 Apps for enterprise. Even if you don't sign in and you close the Sign in to set up Office dialog box, a temporary product key is installed. You don't want any kind of product key for Microsoft 365 Apps for enterprise installed as part of your reference image.
|
||||
|
||||
Additional information
|
||||
- Microsoft 365 Apps for enterprise is updated on a monthly basis with security updates and other quality updates (bug fixes), and possibly new features (depending on which update channel you’re using). That means that once you’ve deployed your reference image, Microsoft 365 Apps for enterprise will most likely need to download and install the latest updates that have been released since you created your reference image.
|
||||
|
||||
- **Note**: With the installing Office Deployment Tool being used as part of the reference image, Microsoft 365 Apps for enterprise is installed immediately after the reference image is deployed to the user’s device, rather than including Office apps part of the reference image. This way the user will have the most up-to-date version of Microsoft 365 Apps for enterprise right away and won’t have to download any new updates (which is most likely what would happen if Microsoft 365 Apps for enterprise was installed as part of the reference image.)
|
||||
- When you're creating your reference image, instead of installing Microsoft 365 Apps for enterprise directly from the Office CDN on the internet, you can install Microsoft 365 Apps for enterprise from a location on your local network, such as a file share. To do that, you would use the Office Deployment Tool in /download mode to download the installation files to that file share. Then you could use the Office Deployment Tool in /configure mode to install Microsoft 365 Apps for enterprise from that location on to your reference image. As part of that process, you’ll need to point to that location in your configuration.xml file so that the Office Deployment Tool knows where to get the Microsoft 365 Apps for enterprise files. If you decide to do this step, the next time you create a new reference image, you’ll want to be sure to use the Office Deployment Tool to download the most up-to-date installation files for Microsoft 365 Apps for enterprise to that location on your internal network. That way your new reference image will have a more up-to-date installation of Microsoft 365 Apps for enterprise.
|
||||
- Microsoft 365 Apps for enterprise is updated on a monthly basis with security updates and other quality updates (bug fixes), and possibly new features (depending on which update channel you're using). That means that once you've deployed your reference image, Microsoft 365 Apps for enterprise will most likely need to download and install the latest updates that have been released since you created your reference image.
|
||||
|
||||
> [!NOTE]
|
||||
> With the installing Office Deployment Tool being used as part of the reference image, Microsoft 365 Apps for enterprise is installed immediately after the reference image is deployed to the user's device, rather than including Office apps part of the reference image. This way the user will have the most up-to-date version of Microsoft 365 Apps for enterprise right away and won't have to download any new updates (which is most likely what would happen if Microsoft 365 Apps for enterprise was installed as part of the reference image.)
|
||||
|
||||
- When you're creating your reference image, instead of installing Microsoft 365 Apps for enterprise directly from the Office CDN on the internet, you can install Microsoft 365 Apps for enterprise from a location on your local network, such as a file share. To do that, you would use the Office Deployment Tool in /download mode to download the installation files to that file share. Then you could use the Office Deployment Tool in /configure mode to install Microsoft 365 Apps for enterprise from that location on to your reference image. As part of that process, you'll need to point to that location in your configuration.xml file so that the Office Deployment Tool knows where to get the Microsoft 365 Apps for enterprise files. If you decide to do this step, the next time you create a new reference image, you'll want to be sure to use the Office Deployment Tool to download the most up-to-date installation files for Microsoft 365 Apps for enterprise to that location on your internal network. That way your new reference image will have a more up-to-date installation of Microsoft 365 Apps for enterprise.
|
||||
|
||||
### Connect to the deployment share using Windows PowerShell
|
||||
|
||||
If you need to add many applications, you can take advantage of the PowerShell support that MDT has. To start using PowerShell against the deployment share, you must first load the MDT PowerShell snap-in and then make the deployment share a PowerShell drive (PSDrive).
|
||||
If you need to add many applications, you can take advantage of the PowerShell support that MDT has. To start using PowerShell against the deployment share, you must first load the MDT PowerShell snap-in, and then make the deployment share a PowerShell drive (PSDrive).
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Ensure you're signed in as **contoso\\Administrator**.
|
||||
2. Import the snap-in and create the PSDrive by running the following commands in an elevated PowerShell prompt:
|
||||
1. Ensure you're signed in as **contoso\\Administrator**.
|
||||
2. Import the snap-in and create the PSDrive by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
``` powershell
|
||||
```powershell
|
||||
Import-Module "C:\Program Files\Microsoft Deployment Toolkit\bin\MicrosoftDeploymentToolkit.psd1"
|
||||
New-PSDrive -Name "DS001" -PSProvider MDTProvider -Root "D:\MDTBuildLab"
|
||||
```
|
||||
>[!TIP]
|
||||
>Use "Get-Command -module MicrosoftDeploymentToolkit" to see a list of available cmdlets
|
||||
|
||||
> [!TIP]
|
||||
> Use `Get-Command -module MicrosoftDeploymentToolkit` to see a list of available cmdlets
|
||||
|
||||
### Create the install: Microsoft Office 365 Pro Plus - x64
|
||||
|
||||
@ -219,10 +246,11 @@ In these steps, we assume that you've downloaded the Office Deployment Tool. You
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Ensure you're signed on as **contoso\\Administrator**.
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
1. Ensure you're signed on as **contoso\\Administrator**.
|
||||
|
||||
``` powershell
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
$ApplicationName = "Install - Office365 ProPlus - x64"
|
||||
$CommandLine = "setup.exe /configure configuration.xml"
|
||||
$ApplicationSourcePath = "D:\Downloads\Office365"
|
||||
@ -230,7 +258,8 @@ On **MDT01**:
|
||||
```
|
||||
|
||||
Upon successful installation, the following text is displayed:
|
||||
```
|
||||
|
||||
```output
|
||||
VERBOSE: Performing the operation "import" on target "Application".
|
||||
VERBOSE: Beginning application import
|
||||
VERBOSE: Copying application source files from D:\Downloads\Office365 to D:\MDTBuildLab\Applications\Install -
|
||||
@ -245,17 +274,18 @@ On **MDT01**:
|
||||
|
||||
### Create the install: Microsoft Visual C++ Redistributable 2019 - x86
|
||||
|
||||
>[!NOTE]
|
||||
>We have abbreviated "Microsoft Visual C++ Redistributable" in the $ApplicationName below as "MSVC" to avoid the path name exceeding the maxiumum allowed length of 248 characters.
|
||||
> [!NOTE]
|
||||
> We have abbreviated "Microsoft Visual C++ Redistributable" in the $ApplicationName below as "MSVC" to avoid the path name exceeding the maxiumum allowed length of 248 characters.
|
||||
|
||||
In these steps, we assume that you've downloaded Microsoft Visual C++ Redistributable 2019 - x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to D:\\Downloads.
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Ensure you're signed on as **contoso\\Administrator**.
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
1. Ensure you're signed on as **contoso\\Administrator**.
|
||||
|
||||
``` powershell
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
$ApplicationName = "Install - MSVC 2019 - x86"
|
||||
$CommandLine = "vc_redist.x86.exe /Q"
|
||||
$ApplicationSourcePath = "D:\Downloads"
|
||||
@ -263,7 +293,8 @@ On **MDT01**:
|
||||
```
|
||||
|
||||
Upon successful installation, the following text is displayed:
|
||||
```
|
||||
|
||||
```output
|
||||
VERBOSE: Performing the operation "import" on target "Application".
|
||||
VERBOSE: Beginning application import
|
||||
VERBOSE: Copying application source files from D:\Downloads to D:\MDTBuildLab\Applications\Install - MSVC 2019 - x86
|
||||
@ -281,10 +312,11 @@ In these steps, we assume that you've downloaded Microsoft Visual C++ Redistribu
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Ensure you're signed on as **contoso\\Administrator**.
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
1. Ensure you're signed on as **contoso\\Administrator**.
|
||||
|
||||
``` powershell
|
||||
2. Create the application by running the following commands in an elevated PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
$ApplicationName = "Install - MSVC 2019 - x64"
|
||||
$CommandLine = "vc_redist.x64.exe /Q"
|
||||
$ApplicationSourcePath = "D:\Downloads"
|
||||
@ -293,114 +325,134 @@ On **MDT01**:
|
||||
|
||||
## Create the reference image task sequence
|
||||
|
||||
In order to build and capture your Windows 10 reference image for deployment using MDT, you 'll create a task sequence. The task sequence will reference the operating system and applications that you previously imported into the MDT Build Lab deployment share to build a Windows 10 reference image.
|
||||
In order to build and capture your Windows 10 reference image for deployment using MDT, you 'll create a task sequence. The task sequence will reference the operating system and applications that you previously imported into the MDT Build Lab deployment share to build a Windows 10 reference image.
|
||||
After creating the task sequence, you configure it to enable patching against the Windows Server Update Services (WSUS) server. The Task Sequence Windows Update action supports getting updates directly from Microsoft Update, but you get more stable patching if you use a local WSUS server. WSUS also allows for an easy process of approving the patches that you're deploying.
|
||||
|
||||
### Drivers and the reference image
|
||||
|
||||
Because we use modern virtual platforms for creating our reference images, we don’t need to worry about drivers when creating reference images for Windows 10. We use Hyper-V in our environment, and Windows Preinstallation Environment (Windows PE) already has all the needed drivers built-in for Hyper-V.
|
||||
Because we use modern virtual platforms for creating our reference images, we don't need to worry about drivers when creating reference images for Windows 10. We use Hyper-V in our environment, and Windows Preinstallation Environment (Windows PE) already has all the needed drivers built-in for Hyper-V.
|
||||
|
||||
### Create a task sequence for Windows 10 Enterprise
|
||||
|
||||
To create a Windows 10 reference image task sequence, the process is as follows:
|
||||
To create a Windows 10 reference image task sequence, the process is as follows:
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. When you're using the Deployment Workbench, under **Deployment Shares > MDT Build Lab** right-click **Task Sequences**, and create a **New Folder** named **Windows 10**.
|
||||
|
||||
2. Right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
1. Task sequence ID: REFW10X64-001
|
||||
2. Task sequence name: Windows 10 Enterprise x64 RTM Default Image
|
||||
3. Task sequence comments: Reference Build
|
||||
4. Template: Standard Client Task Sequence
|
||||
5. Select OS: Windows 10 Enterprise x64 RTM Default Image
|
||||
6. Specify Product Key: Don't specify a product key at this time
|
||||
7. Full Name: Contoso
|
||||
8. Organization: Contoso
|
||||
9. Internet Explorer home page: http://www.contoso.com
|
||||
10. Admin Password: Don't specify an Administrator Password at this time
|
||||
|
||||
### Edit the Windows 10 task sequence
|
||||
1. **Task sequence ID**: REFW10X64-001
|
||||
2. **Task sequence name**: Windows 10 Enterprise x64 RTM Default Image
|
||||
3. **Task sequence comments**: Reference Build
|
||||
4. **Template**: Standard Client Task Sequence
|
||||
5. **Select OS**: Windows 10 Enterprise x64 RTM Default Image
|
||||
6. **Specify Product Key**: Don't specify a product key at this time
|
||||
7. **Full Name**: Contoso
|
||||
8. **Organization**: Contoso
|
||||
9. **Internet Explorer home page**: `http://www.contoso.com`
|
||||
10. **Admin Password**: Don't specify an Administrator Password at this time
|
||||
|
||||
The steps below walk you through the process of editing the Windows 10 reference image task sequence to include the actions required to update the reference image with the latest updates from WSUS, install roles and features, and utilities, and install Microsoft Office365 ProPlus x64.
|
||||
### Edit the Windows 10 task sequence
|
||||
|
||||
The steps below walk you through the process of editing the Windows 10 reference image task sequence to include the actions required to update the reference image with the latest updates from WSUS, install roles and features, and utilities, and install Microsoft Office365 ProPlus x64.
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. In the **Task Sequences / Windows 10** folder, right-click the **Windows 10 Enterprise x64 RTM Default Image** task sequence, and select **Properties**.
|
||||
2. On the **Task Sequence** tab, configure the Windows 10 Enterprise x64 RTM Default Image task sequence with the following settings:
|
||||
1. **State Restore > Windows Update (Pre-Application Installation)** action: Enable this action by clicking the **Options** tab and clearing the **Disable this step** check box.
|
||||
|
||||
2. **State Restore > Windows Update (Post-Application Installation)** action: Also enable this action.
|
||||
3. **State Restore**: After the **Tattoo** action, add a new **Group** action (click **Add** then click **New Group**) with the following setting:
|
||||
- Name: **Custom Tasks (Pre-Windows Update)**
|
||||
4. **State Restore**: After **Windows Update (Post-Application Installation)** action, rename **Custom Tasks** to **Custom Tasks (Post-Windows Update)**.
|
||||
- **Note**: The reason for adding the applications after the Tattoo action but before running Windows Update is simply to save time during the deployment. This way we can add all applications that will upgrade some of the built-in components and avoid unnecessary updating.
|
||||
5. **State Restore > Custom Tasks (Pre-Windows Update)**: Add a new **Install Roles and Features** action with the following settings:
|
||||
1. Name: Install - Microsoft NET Framework 3.5.1
|
||||
2. Select the operating system for which roles are to be installed: Windows 10
|
||||
3. Select the roles and features that should be installed: .NET Framework 3.5 (includes .NET 2.0 and 3.0)
|
||||
|
||||
>[!IMPORTANT]
|
||||
>This is probably the most important step when creating a reference image. Many applications need the .NET Framework, and we strongly recommend having it available in the image. The one thing that makes this different from other components is that .NET Framework 3.5.1 is not included in the WIM file. It's installed from the **Sources\\SxS** folder on the media, and that makes it more difficult to add after the image has been deployed.
|
||||
|
||||
1. In the **Task Sequences / Windows 10** folder, right-click the **Windows 10 Enterprise x64 RTM Default Image** task sequence, and select **Properties**.
|
||||
|
||||
2. On the **Task Sequence** tab, configure the Windows 10 Enterprise x64 RTM Default Image task sequence with the following settings:
|
||||
- **State Restore > Windows Update (Pre-Application Installation)** action: Enable this action by clicking the **Options** tab and clearing the **Disable this step** check box.
|
||||
|
||||
- **State Restore > Windows Update (Post-Application Installation)** action: Also enable this action.
|
||||
|
||||
- **State Restore**: After the **Tattoo** action, add a new **Group** action (select **Add** then select **New Group**) with the following setting:
|
||||
- Name: **Custom Tasks (Pre-Windows Update)**
|
||||
|
||||
- **State Restore**: After **Windows Update (Post-Application Installation)** action, rename **Custom Tasks** to **Custom Tasks (Post-Windows Update)**.
|
||||
> [!NOTE]
|
||||
> The reason for adding the applications after the Tattoo action but before running Windows Update is simply to save time during the deployment. This way we can add all applications that will upgrade some of the built-in components and avoid unnecessary updating.
|
||||
|
||||
- **State Restore > Custom Tasks (Pre-Windows Update)**: Add a new **Install Roles and Features** action with the following settings:
|
||||
|
||||
- **Name**: Install - Microsoft NET Framework 3.5.1
|
||||
|
||||
- **Select the operating system for which roles are to be installed**: Windows 10
|
||||
|
||||
- **Select the roles and features that should be installed**: .NET Framework 3.5 (includes .NET 2.0 and 3.0)
|
||||
|
||||
> [!IMPORTANT]
|
||||
> This is probably the most important step when creating a reference image. Many applications need the .NET Framework, and we strongly recommend having it available in the image. The one thing that makes this different from other components is that .NET Framework 3.5.1 is not included in the WIM file. It's installed from the **Sources\\SxS** folder on the media, and that makes it more difficult to add after the image has been deployed.
|
||||
|
||||

|
||||
|
||||
The task sequence after creating the Custom Tasks (Pre-Windows Update) group and adding the Install - Microsoft NET Framework 3.5.1 action.
|
||||
|
||||
6. **State Restore > Custom Tasks (Pre-Windows Update)**: After the **Install - Microsoft NET Framework 3.5.1** action, add a new **Install Application** action (selected from the **General** group) with the following settings:
|
||||
1. Name: Microsoft Visual C++ Redistributable 2019 - x86
|
||||
2. Install a Single Application: browse to **Install - MSVC 2019 - x86**
|
||||
7. Repeat these steps (add a new **Install Application**) to add Microsoft Visual C++ Redistributable 2019 - x64 and Microsoft 365 Apps for enterprise as well.
|
||||
3. Click **OK**.
|
||||
- **State Restore > Custom Tasks (Pre-Windows Update)**: After the **Install - Microsoft NET Framework 3.5.1** action, add a new **Install Application** action (selected from the **General** group) with the following settings:
|
||||
|
||||

|
||||
- **Name**: Microsoft Visual C++ Redistributable 2019 - x86
|
||||
|
||||
- **Install a Single Application**: browse to **Install - MSVC 2019 - x86**
|
||||
|
||||
- Repeat these steps (add a new **Install Application**) to add Microsoft Visual C++ Redistributable 2019 - x64 and Microsoft 365 Apps for enterprise as well.
|
||||
|
||||
3. Select **OK**.
|
||||
|
||||

|
||||
|
||||
### Optional configuration: Add a suspend action
|
||||
|
||||
The goal when creating a reference image is to automate everything. But sometimes you've a special configuration or application setup that is too time-consuming to automate. If you need to do some manual configuration, you can add a little-known feature called Lite Touch Installation (LTI) Suspend. If you add the LTISuspend.wsf script as a custom action in the task sequence, it will suspend the task sequence until you click the Resume Task Sequence shortcut icon on the desktop. In addition to using the LTI Suspend feature for manual configuration or installation, you can also use it simply for verifying a reference image before you allow the task sequence to continue and use Sysprep and capture the virtual machine.
|
||||
The goal when creating a reference image is to automate everything. But sometimes you've a special configuration or application setup that is too time-consuming to automate. If you need to do some manual configuration, you can add a little-known feature called Lite Touch Installation (LTI) Suspend. If you add the LTISuspend.wsf script as a custom action in the task sequence, it will suspend the task sequence until you select the Resume Task Sequence shortcut icon on the desktop. In addition to using the LTI Suspend feature for manual configuration or installation, you can also use it simply for verifying a reference image before you allow the task sequence to continue and use Sysprep and capture the virtual machine.
|
||||
|
||||

|
||||
|
||||
A task sequence with optional Suspend action (LTISuspend.wsf) added.
|
||||
|
||||

|
||||
|
||||
The Windows 10 desktop with the Resume Task Sequence shortcut.
|
||||
|
||||
### Edit the Unattend.xml file for Windows 10 Enterprise
|
||||
### Edit the Unattend.xml file for Windows 10 Enterprise
|
||||
|
||||
When using MDT, you don't need to edit the Unattend.xml file often because most configurations are taken care of by MDT. However if, for example, you want to configure Internet Explorer behavior, then you can edit the Unattend.xml. Editing the Unattend.xml for basic Internet Explorer settings is easy, but for more advanced settings, you 'll want to use the Internet Explorer Administration Kit (IEAK).
|
||||
When using MDT, you don't need to edit the Unattend.xml file often because most configurations are taken care of by MDT. However if, for example, you want to configure Internet Explorer behavior, then you can edit the Unattend.xml. Editing the Unattend.xml for basic Internet Explorer settings is easy, but for more advanced settings, you 'll want to use the Internet Explorer Administration Kit (IEAK).
|
||||
|
||||
>[!WARNING]
|
||||
>Don't use **SkipMachineOOBE** or **SkipUserOOBE** in your Unattend.xml file. These settings are deprecated and can have unintended effects if used.
|
||||
> [!WARNING]
|
||||
> Don't use **SkipMachineOOBE** or **SkipUserOOBE** in your Unattend.xml file. These settings are deprecated and can have unintended effects if used.
|
||||
|
||||
>[!NOTE]
|
||||
>You also can use the Unattend.xml to enable components in Windows 10, like the Telnet Client or Hyper-V client. Normally we prefer to do this via the **Install Roles and Features** action, or using Deployment Image Servicing and Management (DISM) command-line tools, because then we can add that as an application, being dynamic, having conditions, and so forth. Also, if you're adding packages via Unattend.xml, it's version specific, so Unattend.xml must match the exact version of the operating system you're servicing.
|
||||
|
||||
Follow these steps to configure Internet Explorer settings in Unattend.xml for the Windows 10 Enterprise x64 RTM Default Image task sequence:
|
||||
> [!NOTE]
|
||||
> You also can use the Unattend.xml to enable components in Windows 10, like the Telnet Client or Hyper-V client. Normally we prefer to do this via the **Install Roles and Features** action, or using Deployment Image Servicing and Management (DISM) command-line tools, because then we can add that as an application, being dynamic, having conditions, and so forth. Also, if you're adding packages via Unattend.xml, it's version specific, so Unattend.xml must match the exact version of the operating system you're servicing.
|
||||
|
||||
Follow these steps to configure Internet Explorer settings in Unattend.xml for the Windows 10 Enterprise x64 RTM Default Image task sequence:
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. When you're using the Deployment Workbench, under **Deployment Shares > MDT Build Lab > Task Sequences** right-click the **Windows 10 Enterprise x64 RTM Default Image** task sequence and select **Properties**.
|
||||
2. In the **OS Info** tab, click **Edit Unattend.xml**. MDT now generates a catalog file. This file generation process will take a few minutes, and then Windows System Image Manager (Windows SIM) will start.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> The ADK version 1903 has a [known issue](/windows-hardware/get-started/what-s-new-in-kits-and-tools#whats-new-in-the-windows-adk-for-windows-10-version-1903) generating a catalog file for Windows 10, version 1903 or 1909 X64 install.wim. You might see the error "Could not load file or assembly" in in the console output. To avoid this issue, [install the ADK, version 2004 or a later version](/windows-hardware/get-started/adk-install). A workaround is also available for the ADK version 1903:
|
||||
> - Close the Deployment Workbench and install the [WSIM 1903 update](https://go.microsoft.com/fwlink/?linkid=2095334). This will update imagecat.exe and imgmgr.exe to version 10.0.18362.144.
|
||||
> - Manually run imgmgr.exe (C:\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Deployment Tools\\WSIM\\imgmgr.exe).
|
||||
> - Generate a catalog (Tools/Create Catalog) for the selected install.wim (ex: D:\\MDTBuildLab\\Operating Systems\\W10EX64RTM\\sources\\install.wim).
|
||||
> - After manually creating the catalog file (ex: D:\\MDTBuildLab\\Operating Systems\\W10EX64RTM\\sources\\install_Windows 10 Enterprise.clg), open the Deployment Workbench and proceed to edit unattend.xml.
|
||||
2. In the **OS Info** tab, select **Edit Unattend.xml**. MDT now generates a catalog file. This file generation process will take a few minutes, and then Windows System Image Manager (Windows SIM) will start.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> The ADK version 1903 has a [known issue](/windows-hardware/get-started/what-s-new-in-kits-and-tools#whats-new-in-the-windows-adk-for-windows-10-version-1903) generating a catalog file for Windows 10, version 1903 or 1909 X64 install.wim. You might see the error **Could not load file or assembly** in in the console output. To avoid this issue, [install the ADK, version 2004 or a later version](/windows-hardware/get-started/adk-install). A workaround is also available for the ADK version 1903:
|
||||
>
|
||||
> - Close the Deployment Workbench and install the [WSIM 1903 update](https://go.microsoft.com/fwlink/?linkid=2095334). This will update imagecat.exe and imgmgr.exe to version 10.0.18362.144.
|
||||
>
|
||||
> - Manually run imgmgr.exe (C:\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Deployment Tools\\WSIM\\imgmgr.exe).
|
||||
>
|
||||
> - Generate a catalog (Tools/Create Catalog) for the selected install.wim (ex: D:\\MDTBuildLab\\Operating Systems\\W10EX64RTM\\sources\\install.wim).
|
||||
>
|
||||
> - After manually creating the catalog file (ex: D:\\MDTBuildLab\\Operating Systems\\W10EX64RTM\\sources\\install_Windows 10 Enterprise.clg), open the Deployment Workbench and proceed to edit unattend.xml.
|
||||
|
||||
3. In Windows SIM, expand the **4 specialize** node in the **Answer File** pane and select the amd64\_Microsoft-Windows-IE-InternetExplorer\_neutral entry.
|
||||
|
||||
4. In the **amd64\_Microsoft-Windows-IE-InternetExplorer\_neutral properties** window (right-hand window), set the following values:
|
||||
- DisableDevTools: true
|
||||
|
||||
- **DisableDevTools**: true
|
||||
|
||||
5. Save the Unattend.xml file, and close Windows SIM.
|
||||
|
||||
> [!NOTE]
|
||||
> If errors are reported that certain display values are incorrect, you can ignore this message or browse to **7oobeSystem\\amd64_Microsoft-Windows-Shell-Setup__neutral\\Display** and enter the following: ColorDepth 32, HorizontalResolution 1, RefreshRate 60, VerticalResolution 1.
|
||||
6. On the Windows 10 Enterprise x64 RTM Default Image Properties, click **OK**.
|
||||
|
||||
6. On the Windows 10 Enterprise x64 RTM Default Image Properties, select **OK**.
|
||||
|
||||

|
||||
|
||||
Windows System Image Manager with the Windows 10 Unattend.xml.
|
||||
|
||||
## Configure the MDT deployment share rules
|
||||
@ -409,16 +461,17 @@ Understanding rules is critical to successfully using MDT. Rules are configured
|
||||
|
||||
### MDT deployment share rules overview
|
||||
|
||||
In MDT, there are always two rule files: the **CustomSettings.ini** file and the **Bootstrap.ini** file. You can add almost any rule to either. However, the Bootstrap.ini file is copied from the Control folder to the boot image, so the boot image needs to be updated every time you change that file. For this reason, add only a minimal set of rules to Bootstrap.ini, such as which deployment server and share to connect to - the DEPLOYROOT value. Put the other rules in CustomSettings.ini because that file is updated immediately when you click OK.
|
||||
In MDT, there are always two rule files: the **CustomSettings.ini** file and the **Bootstrap.ini** file. You can add almost any rule to either. However, the Bootstrap.ini file is copied from the Control folder to the boot image, so the boot image needs to be updated every time you change that file. For this reason, add only a minimal set of rules to Bootstrap.ini, such as which deployment server and share to connect to - the DEPLOYROOT value. Put the other rules in CustomSettings.ini because that file is updated immediately when you select OK.
|
||||
|
||||
To configure the rules for the MDT Build Lab deployment share:
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Using the Deployment Workbench, right-click the **MDT Build Lab** deployment share and select **Properties**.
|
||||
2. Select the **Rules** tab and replace the existing content with the following information (edit the settings as needed to match your deployment). For example, If you don't have a WSUS server in your environment, delete the **WSUSServer** line from the configuration:
|
||||
1. Using the Deployment Workbench, right-click the **MDT Build Lab** deployment share and select **Properties**.
|
||||
|
||||
```
|
||||
2. Select the **Rules** tab and replace the existing content with the following information (edit the settings as needed to match your deployment). For example, If you don't have a WSUS server in your environment, delete the **WSUSServer** line from the configuration:
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
|
||||
@ -453,12 +506,11 @@ On **MDT01**:
|
||||
```
|
||||
|
||||

|
||||
|
||||
The server-side rules for the MDT Build Lab deployment share.
|
||||
|
||||
3. Click **Edit Bootstrap.ini** and modify using the following information:
|
||||
|
||||
```
|
||||
3. Select **Edit Bootstrap.ini** and modify using the following information:
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
|
||||
@ -471,32 +523,38 @@ On **MDT01**:
|
||||
SkipBDDWelcome=YES
|
||||
```
|
||||
|
||||
>[!NOTE]
|
||||
>For security reasons, you normally don't add the password to the Bootstrap.ini file; however, because this deployment share is for creating reference image builds only, and should not be published to the production network, it's acceptable to do so in this situation. Obviously if you're not using the same password (pass@word3) that is provided in this lab, you must enter your own custom password on the Rules tab and in Bootstrap.ini.
|
||||
|
||||
4. On the **Windows PE** tab, in the **Platform** drop-down list, select **x86**.
|
||||
5. In the **Lite Touch Boot Image Settings** area, configure the following settings:
|
||||
1. Image description: MDT Build Lab x86
|
||||
2. ISO file name: MDT Build Lab x86.iso
|
||||
6. On the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
7. In the **Lite Touch Boot Image Settings** area, configure the following settings:
|
||||
1. Image description: MDT Build Lab x64
|
||||
2. ISO file name: MDT Build Lab x64.iso
|
||||
8. Click **OK**.
|
||||
> [!NOTE]
|
||||
> For security reasons, you normally don't add the password to the Bootstrap.ini file; however, because this deployment share is for creating reference image builds only, and should not be published to the production network, it's acceptable to do so in this situation. Obviously if you're not using the same password (pass@word3) that is provided in this lab, you must enter your own custom password on the Rules tab and in Bootstrap.ini.
|
||||
|
||||
4. On the **Windows PE** tab, in the **Platform** drop-down list, select **x86**.
|
||||
|
||||
5. In the **Lite Touch Boot Image Settings** area, configure the following settings:
|
||||
|
||||
- **Image description**: MDT Build Lab x86
|
||||
- **ISO file name**: MDT Build Lab x86.iso
|
||||
|
||||
6. On the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
|
||||
7. In the **Lite Touch Boot Image Settings** area, configure the following settings:
|
||||
|
||||
- **Image description**: MDT Build Lab x64
|
||||
- **ISO file name**: MDT Build Lab x64.iso
|
||||
|
||||
8. Select **OK**.
|
||||
|
||||
> [!NOTE]
|
||||
> In MDT, the x86 boot image can deploy both x86 and x64 operating systems (except on computers based on Unified Extensible Firmware Interface).
|
||||
|
||||
>[!NOTE]
|
||||
>In MDT, the x86 boot image can deploy both x86 and x64 operating systems (except on computers based on Unified Extensible Firmware Interface).
|
||||
|
||||
### Update the deployment share
|
||||
|
||||
After the deployment share has been configured, it needs to be updated. This update-process is the one when the Windows PE boot images are created.
|
||||
|
||||
1. In the Deployment Workbench, right-click the **MDT Build Lab** deployment share and select **Update Deployment Share**.
|
||||
2. Use the default options for the Update Deployment Share Wizard.
|
||||
1. In the Deployment Workbench, right-click the **MDT Build Lab** deployment share and select **Update Deployment Share**.
|
||||
2. Use the default options for the Update Deployment Share Wizard.
|
||||
|
||||
> [!NOTE]
|
||||
> The update process will take 5 to 10 minutes.
|
||||
|
||||
>[!NOTE]
|
||||
>The update process will take 5 to 10 minutes.
|
||||
|
||||
### The rules explained
|
||||
|
||||
Now that the MDT Build Lab deployment share (the share used to create the reference images) has been configured, it's time to explain the various settings used in the Bootstrap.ini and CustomSettings.ini files.
|
||||
@ -505,14 +563,14 @@ The Bootstrap.ini and CustomSettings.ini files work together. The Bootstrap.ini
|
||||
|
||||
The CustomSettings.ini file is normally stored on the server, in the Deployment share\\Control folder, but also can be stored on the media (when using offline media).
|
||||
|
||||
>[!NOTE]
|
||||
>The settings, or properties, that are used in the rules (CustomSettings.ini and Bootstrap.ini) are listed in the MDT documentation, in the Microsoft Deployment Toolkit Reference / Properties / Property Definition section.
|
||||
|
||||
> [!NOTE]
|
||||
> The settings, or properties, that are used in the rules (CustomSettings.ini and Bootstrap.ini) are listed in the MDT documentation, in the Microsoft Deployment Toolkit Reference / Properties / Property Definition section.
|
||||
|
||||
### The Bootstrap.ini file
|
||||
|
||||
The Bootstrap.ini file is available via the deployment share's Properties dialog box, or via the D:\\MDTBuildLab\\Control folder on MDT01.
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
[Default]
|
||||
@ -524,23 +582,26 @@ SkipBDDWelcome=YES
|
||||
```
|
||||
|
||||
So, what are these settings?
|
||||
- **Priority.** This setting determines the order in which different sections are read. This Bootstrap.ini has only one section, named \[Default\].
|
||||
- **DeployRoot.** This location is of the deployment share. Normally, this value is set by MDT, but you need to update the DeployRoot value if you move to another server or other share. If you don't specify a value, the Windows Deployment Wizard prompts you for a location.
|
||||
- **UserDomain, UserID, and UserPassword.** These values are used for automatic sign in to the deployment share. Again, if they aren't specified, the wizard prompts you.
|
||||
|
||||
>[!WARNING]
|
||||
>Caution is advised. These values are stored in clear text on the boot image. Use them only for the MDT Build Lab deployment share and not for the MDT Production deployment share that you learn to create in the next topic.
|
||||
|
||||
- **SkipBDDWelcome.** Even if it's nice to be welcomed every time we start a deployment, we prefer to skip the initial welcome page of the Windows Deployment Wizard.
|
||||
- **Priority**: This setting determines the order in which different sections are read. This Bootstrap.ini has only one section, named \[Default\].
|
||||
|
||||
- **DeployRoot**: This location is of the deployment share. Normally, this value is set by MDT, but you need to update the DeployRoot value if you move to another server or other share. If you don't specify a value, the Windows Deployment Wizard prompts you for a location.
|
||||
|
||||
- **UserDomain, UserID, and UserPassword**: These values are used for automatic sign in to the deployment share. Again, if they aren't specified, the wizard prompts you.
|
||||
|
||||
> [!WARNING]
|
||||
> Caution is advised. These values are stored in clear text on the boot image. Use them only for the MDT Build Lab deployment share and not for the MDT Production deployment share that you learn to create in the next topic.
|
||||
|
||||
- **SkipBDDWelcome**: Even if it's nice to be welcomed every time we start a deployment, we prefer to skip the initial welcome page of the Windows Deployment Wizard.
|
||||
|
||||
> [!NOTE]
|
||||
> All properties beginning with "Skip" control only whether to display that pane in the Windows Deployment Wizard. Most of the panes also require you to actually set one or more values.
|
||||
|
||||
>[!NOTE]
|
||||
>All properties beginning with "Skip" control only whether to display that pane in the Windows Deployment Wizard. Most of the panes also require you to actually set one or more values.
|
||||
|
||||
### The CustomSettings.ini file
|
||||
|
||||
The CustomSettings.ini file, whose content you see on the Rules tab of the deployment share Properties dialog box, contains most of the properties used in the configuration.
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
[Default]
|
||||
@ -572,78 +633,114 @@ SkipRoles=YES
|
||||
SkipCapture=NO
|
||||
SkipFinalSummary=YES
|
||||
```
|
||||
- **Priority.** Has the same function as in Bootstrap.ini. Priority determines the order in which different sections are read. This CustomSettings.ini has only one section, named \[Default\]. In general, if you've multiple sections that set the same value, the value from the first section (higher priority) wins. The rare exceptions are listed in the ZTIGather.xml file.
|
||||
- **\_SMSTSORGNAME.** The organization name displayed in the task sequence progress bar window during deployment.
|
||||
- **UserDataLocation.** Controls the settings for user state backup. You don't need to use when building and capturing a reference image.
|
||||
- **DoCapture.** Configures the task sequence to run the System Preparation (Sysprep) tool and capture the image to a file when the operating system is installed.
|
||||
- **OSInstall.** Must be set to Y or YES (the code just looks for the Y character) for the setup to proceed.
|
||||
- **AdminPassword.** Sets the local Administrator account password.
|
||||
- **TimeZoneName.** Establishes the time zone to use. Don't confuse this value with TimeZone, which is only for legacy operating systems (Windows 7 and Windows Server 2003).
|
||||
|
||||
**Note**: The easiest way to find the current time zone name on a Windows 10 machine is to run tzutil /g in a command prompt. You can also run tzutil /l to get a listing of all available time zone names.
|
||||
|
||||
- **JoinWorkgroup.** Configures Windows to join a workgroup.
|
||||
- **HideShell.** Hides the Windows Shell during deployment. This hide-operation is especially useful for Windows 10 deployments in which the deployment wizard will otherwise appear behind the tiles.
|
||||
- **FinishAction.** Instructs MDT what to do when the task sequence is complete.
|
||||
- **DoNotCreateExtraPartition.** Configures the task sequence not to create the extra partition for BitLocker. There's no need to do this configuration for your reference image.
|
||||
- **WSUSServer.** Specifies which Windows Server Update Services (WSUS) server (and port, if needed) to use during the deployment. Without this option MDT will use Microsoft Update directly, which will increase deployment time and limit your options of controlling which updates are applied.
|
||||
- **SLSHARE.** Instructs MDT to copy the log files to a server share if something goes wrong during deployment, or when a deployment is successfully completed.
|
||||
- **ApplyGPOPack.** Allows you to deploy local group policies created by Microsoft Security Compliance Manager (SCM).
|
||||
- **SkipAdminPassword.** Skips the pane that asks for the Administrator password.
|
||||
- **SkipProductKey.** Skips the pane that asks for the product key.
|
||||
- **SkipComputerName.** Skips the Computer Name pane.
|
||||
- **SkipDomainMemberShip.** Skips the Domain Membership pane. If set to Yes, you need to configure either the JoinWorkgroup value or the JoinDomain, DomainAdmin, DomainAdminDomain, and DomainAdminPassword properties.
|
||||
- **SkipUserData.** Skips the pane for user state migration.
|
||||
- **SkipLocaleSelection.** Skips the pane for selecting language and keyboard settings.
|
||||
- **SkipTimeZone.** Skips the pane for setting the time zone.
|
||||
- **SkipApplications.** Skips the Applications pane.
|
||||
- **SkipBitLocker.** Skips the BitLocker pane.
|
||||
- **SkipSummary.** Skips the initial Windows Deployment Wizard summary pane.
|
||||
- **SkipRoles.** Skips the Install Roles and Features pane.
|
||||
- **SkipCapture.** Skips the Capture pane.
|
||||
- **SkipFinalSummary.** Skips the final Windows Deployment Wizard summary. Because you use FinishAction=Shutdown, you don't want the wizard to stop in the end so that you need to click OK before the machine shuts down.
|
||||
- **Priority**: Has the same function as in Bootstrap.ini. Priority determines the order in which different sections are read. This CustomSettings.ini has only one section, named \[Default\]. In general, if you've multiple sections that set the same value, the value from the first section (higher priority) wins. The rare exceptions are listed in the ZTIGather.xml file.
|
||||
|
||||
- **\_SMSTSORGNAME**: The organization name displayed in the task sequence progress bar window during deployment.
|
||||
|
||||
- **UserDataLocation**: Controls the settings for user state backup. You don't need to use when building and capturing a reference image.
|
||||
|
||||
- **DoCapture**: Configures the task sequence to run the System Preparation (Sysprep) tool and capture the image to a file when the operating system is installed.
|
||||
|
||||
- **OSInstall**: Must be set to Y or YES (the code just looks for the Y character) for the setup to proceed.
|
||||
|
||||
- **AdminPassword**: Sets the local Administrator account password.
|
||||
|
||||
- **TimeZoneName**: Establishes the time zone to use. Don't confuse this value with TimeZone, which is only for legacy operating systems (Windows 7 and Windows Server 2003).
|
||||
|
||||
> [!NOTE]
|
||||
> The easiest way to find the current time zone name on a Windows 10 machine is to run tzutil /g in a command prompt. You can also run tzutil /l to get a listing of all available time zone names.
|
||||
|
||||
- **JoinWorkgroup**: Configures Windows to join a workgroup.
|
||||
|
||||
- **HideShell**: Hides the Windows Shell during deployment. This hide-operation is especially useful for Windows 10 deployments in which the deployment wizard will otherwise appear behind the tiles.
|
||||
|
||||
- **FinishAction**: Instructs MDT what to do when the task sequence is complete.
|
||||
|
||||
- **DoNotCreateExtraPartition**: Configures the task sequence not to create the extra partition for BitLocker. There's no need to do this configuration for your reference image.
|
||||
|
||||
- **WSUSServer**: Specifies which Windows Server Update Services (WSUS) server (and port, if needed) to use during the deployment. Without this option MDT will use Microsoft Update directly, which will increase deployment time and limit your options of controlling which updates are applied.
|
||||
|
||||
- **SLSHARE**: Instructs MDT to copy the log files to a server share if something goes wrong during deployment, or when a deployment is successfully completed.
|
||||
|
||||
- **ApplyGPOPack**: Allows you to deploy local group policies created by Microsoft Security Compliance Manager (SCM).
|
||||
|
||||
- **SkipAdminPassword**: Skips the pane that asks for the Administrator password.
|
||||
|
||||
- **SkipProductKey**: Skips the pane that asks for the product key.
|
||||
|
||||
- **SkipComputerName**: Skips the Computer Name pane.
|
||||
|
||||
- **SkipDomainMemberShip**: Skips the Domain Membership pane. If set to Yes, you need to configure either the JoinWorkgroup value or the JoinDomain, DomainAdmin, DomainAdminDomain, and DomainAdminPassword properties.
|
||||
|
||||
- **SkipUserData**: Skips the pane for user state migration.
|
||||
|
||||
- **SkipLocaleSelection**: Skips the pane for selecting language and keyboard settings.
|
||||
|
||||
- **SkipTimeZone**: Skips the pane for setting the time zone.
|
||||
|
||||
- **SkipApplications**: Skips the Applications pane.
|
||||
|
||||
- **SkipBitLocker**: Skips the BitLocker pane.
|
||||
|
||||
- **SkipSummary**: Skips the initial Windows Deployment Wizard summary pane.
|
||||
|
||||
- **SkipRoles**: Skips the Install Roles and Features pane.
|
||||
|
||||
- **SkipCapture**: Skips the Capture pane.
|
||||
|
||||
- **SkipFinalSummary**: Skips the final Windows Deployment Wizard summary. Because you use FinishAction=Shutdown, you don't want the wizard to stop in the end so that you need to select OK before the machine shuts down.
|
||||
|
||||
## Build the Windows 10 reference image
|
||||
|
||||
As previously described, this section requires a Hyper-V host. For more information, see [Hyper-V requirements](prepare-for-windows-deployment-with-mdt.md#hyper-v-requirements).
|
||||
|
||||
Once you've created your task sequence, you're ready to create the Windows 10 reference image. This image creation will be performed by launching the task sequence from a virtual machine that will then automatically perform the reference image creation and capture process.
|
||||
Once you've created your task sequence, you're ready to create the Windows 10 reference image. This image creation will be performed by launching the task sequence from a virtual machine that will then automatically perform the reference image creation and capture process.
|
||||
|
||||
The steps below outline the process used to boot a virtual machine using an ISO boot image created by MDT, and then run the reference image task sequence image to create and capture the Windows 10 reference image.
|
||||
|
||||
1. Copy D:\\MDTBuildLab\\Boot\\MDT Build Lab x86.iso on MDT01 to C:\\ISO on your Hyper-V host (HV01).
|
||||
|
||||
**Note**: Remember, in MDT you can use the x86 boot image to deploy both x86 and x64 operating system images. That's why you can use the x86 boot image instead of the x64 boot image.
|
||||
> [!NOTE]
|
||||
> Remember, in MDT you can use the x86 boot image to deploy both x86 and x64 operating system images. That's why you can use the x86 boot image instead of the x64 boot image.
|
||||
|
||||
On **HV01**:
|
||||
|
||||
2. Create a new virtual machine with the following settings:
|
||||
|
||||
1. Create a new virtual machine with the following settings:
|
||||
|
||||
1. Name: REFW10X64-001
|
||||
2. Store the virtual machine in a different location: C:\VM
|
||||
3. Generation 1
|
||||
4. Memory: 1024 MB
|
||||
5. Network: Must be able to connect to \\MDT01\MDTBuildLab$
|
||||
7. Hard disk: 60 GB (dynamic disk)
|
||||
8. Install OS with image file: C:\\ISO\\MDT Build Lab x86.iso
|
||||
1. Before you start the VM, add a checkpoint for REFW10X64-001, and name it **Clean with MDT Build Lab x86 ISO**.
|
||||
6. Hard disk: 60 GB (dynamic disk)
|
||||
7. Install OS with image file: C:\\ISO\\MDT Build Lab x86.iso
|
||||
|
||||
**Note**: Checkpoints are useful if you need to restart the process and want to make sure you can start clean.
|
||||
|
||||
4. Start the REFW10X64-001 virtual machine and connect to it.
|
||||
2. Before you start the VM, add a checkpoint for REFW10X64-001, and name it **Clean with MDT Build Lab x86 ISO**.
|
||||
|
||||
**Note**: Up to this point we haven't discussed IP addressing or DHCP. In the initial setup for this guide, DC01 was provisioned as a DHCP server to provide IP address leases to client computers. You might have a different DHCP server on your network that you wish to use. The REFW10X64-001 virtual machine requires an IP address lease that provides it with connectivity to MDT01 so that it can connect to the \\MDT01\MDTBuildLab$ share. In the current scenario, this connectivity is accomplished with a DHCP scope that provides IP addresses in the 10.10.10.100 - 10.10.10.200 range, as part of a /24 subnet so that the client can connect to MDT01 at 10.10.10.11.
|
||||
> [!NOTE]
|
||||
> Checkpoints are useful if you need to restart the process and want to make sure you can start clean.
|
||||
|
||||
3. Start the REFW10X64-001 virtual machine and connect to it.
|
||||
|
||||
> [!NOTE]
|
||||
> Up to this point we haven't discussed IP addressing or DHCP. In the initial setup for this guide, DC01 was provisioned as a DHCP server to provide IP address leases to client computers. You might have a different DHCP server on your network that you wish to use. The REFW10X64-001 virtual machine requires an IP address lease that provides it with connectivity to MDT01 so that it can connect to the \\MDT01\MDTBuildLab$ share. In the current scenario, this connectivity is accomplished with a DHCP scope that provides IP addresses in the 10.10.10.100 - 10.10.10.200 range, as part of a /24 subnet so that the client can connect to MDT01 at 10.10.10.11.
|
||||
|
||||
After booting into Windows PE, complete the Windows Deployment Wizard with the following settings:
|
||||
1. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Default Image
|
||||
2. Specify whether to capture an image: Capture an image of this reference computer
|
||||
- Location: \\\\MDT01\\MDTBuildLab$\\Captures
|
||||
3. File name: REFW10X64-001.wim
|
||||
|
||||
- **Select a task sequence to execute on this computer**: Windows 10 Enterprise x64 RTM Default Image
|
||||
|
||||
- **Specify whether to capture an image**: Capture an image of this reference computer
|
||||
|
||||
- Location: \\\\MDT01\\MDTBuildLab$\\Captures
|
||||
|
||||
- **File name**: REFW10X64-001.wim
|
||||
|
||||

|
||||
|
||||
The Windows Deployment Wizard for the Windows 10 reference image.
|
||||
|
||||
5. The setup now starts and does the following steps:
|
||||
4. The setup now starts and does the following steps:
|
||||
|
||||
1. Installs the Windows 10 Enterprise operating system.
|
||||
2. Installs the added applications, roles, and features.
|
||||
3. Updates the operating system via your local Windows Server Update Services (WSUS) server.
|
||||
@ -652,28 +749,28 @@ On **HV01**:
|
||||
6. Captures the installation to a Windows Imaging (WIM) file.
|
||||
7. Turns off the virtual machine.
|
||||
|
||||
After some time, you 'll have a Windows 10 Enterprise x64 image that is fully patched and has run through Sysprep, located in the D:\\MDTBuildLab\\Captures folder on your deployment server. The file name is REFW10X64-001.wim.
|
||||
After some time, you 'll have a Windows 10 Enterprise x64 image that is fully patched and has run through Sysprep, located in the D:\\MDTBuildLab\\Captures folder on your deployment server. The file name is REFW10X64-001.wim.
|
||||
|
||||

|
||||
|
||||
## Troubleshooting
|
||||
|
||||
> [!IMPORTANT]
|
||||
> If you encounter errors applying the image when using a BIOS firmware type, see [Windows 10 deployments fail with Microsoft Deployment Toolkit on computers with BIOS type firmware](https://support.microsoft.com/topic/windows-10-deployments-fail-with-microsoft-deployment-toolkit-on-computers-with-bios-type-firmware-70557b0b-6be3-81d2-556f-b313e29e2cb7). This
|
||||
> If you encounter errors applying the image when using a BIOS firmware type, see [Windows 10 deployments fail with Microsoft Deployment Toolkit on computers with BIOS type firmware](https://support.microsoft.com/topic/windows-10-deployments-fail-with-microsoft-deployment-toolkit-on-computers-with-bios-type-firmware-70557b0b-6be3-81d2-556f-b313e29e2cb7).
|
||||
|
||||
If you [enabled monitoring](#enable-monitoring), you can check the progress of the task sequence.
|
||||
|
||||

|
||||
|
||||
If there are problems with your task sequence, you can troubleshoot in Windows PE by pressing F8 to open a command prompt. There are several [MDT log files](/configmgr/mdt/troubleshooting-reference#mdt-logs) created that can be helpful determining the origin of an error, such as BDD.log. From the command line in Windows PE, you can copy these logs from the client to your MDT server for viewing with CMTrace. For example: copy BDD.log \\\\mdt01\\logs$.
|
||||
If there are problems with your task sequence, you can troubleshoot in Windows PE by pressing F8 to open a command prompt. There are several [MDT log files](/configmgr/mdt/troubleshooting-reference#mdt-logs) created that can be helpful determining the origin of an error, such as BDD.log. From the command line in Windows PE, you can copy these logs from the client to your MDT server for viewing with CMTrace. For example: copy BDD.log \\\\mdt01\\logs$.
|
||||
|
||||
After some time, you 'll have a Windows 10 Enterprise x64 image that is fully patched and has run through Sysprep, located in the D:\\MDTBuildLab\\Captures folder on your deployment server. The file name is REFW10X64-001.wim.
|
||||
After some time, you 'll have a Windows 10 Enterprise x64 image that is fully patched and has run through Sysprep, located in the D:\\MDTBuildLab\\Captures folder on your deployment server. The file name is REFW10X64-001.wim.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)<br>
|
||||
[Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)<br>
|
||||
[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)<br>
|
||||
[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)<br>
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)<br>
|
||||
[Configure MDT settings](configure-mdt-settings.md)
|
||||
- [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
- [Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||
- [Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
||||
- [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||
- [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
- [Configure MDT settings](configure-mdt-settings.md)
|
||||
|
@ -1,45 +1,50 @@
|
||||
---
|
||||
title: Deploy a Windows 10 image using MDT (Windows 10)
|
||||
description: This topic will show you how to take your reference image for Windows 10, and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT).
|
||||
description: This article will show you how to take your reference image for Windows 10, and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT).
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.collection:
|
||||
- highpri
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Deploy a Windows 10 image using MDT
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
**Applies to:**
|
||||
|
||||
This topic will show you how to take your reference image for Windows 10 (that was [created](create-a-windows-10-reference-image.md)), and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT).
|
||||
- Windows 10
|
||||
|
||||
This article will show you how to take your reference image for Windows 10 (that was [created](create-a-windows-10-reference-image.md)), and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT).
|
||||
|
||||
We'll prepare for this deployment by creating an MDT deployment share that is used solely for image deployment. Separating the processes of creating reference images from the processes used to deploy them in production allows greater control of on both processes. We'll configure Active Directory permissions, configure the deployment share, create a new task sequence, and add applications, drivers, and rules.
|
||||
|
||||
For the purposes of this topic, we'll use four computers: DC01, MDT01, HV01 and PC0005.
|
||||
For the purposes of this article, we'll use four computers: DC01, MDT01, HV01 and PC0005.
|
||||
|
||||
- DC01 is a domain controller
|
||||
- MDT01 is a domain member server
|
||||
- HV01 is a Hyper-V server
|
||||
- PC0005 is a blank device to which we'll deploy Windows 10
|
||||
- DC01 is a domain controller
|
||||
- MDT01 is a domain member server
|
||||
- HV01 is a Hyper-V server
|
||||
- PC0005 is a blank device to which we'll deploy Windows 10
|
||||
|
||||
MDT01 and PC0005 are members of the domain contoso.com for the fictitious Contoso Corporation. HV01 used to test deployment of PC0005 in a virtual environment.
|
||||
MDT01 and PC0005 are members of the domain contoso.com for the fictitious Contoso Corporation. HV01 used to test deployment of PC0005 in a virtual environment.
|
||||
|
||||

|
||||
|
||||
>[!NOTE]
|
||||
>For details about the setup for the procedures in this article, please see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
> [!NOTE]
|
||||
> For details about the setup for the procedures in this article, please see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||
## Step 1: Configure Active Directory permissions
|
||||
|
||||
These steps will show you how to configure an Active Directory account with the permissions required to deploy a Windows 10 machine to the domain using MDT. These steps assume you've The account is used for Windows Preinstallation Environment (Windows PE) to connect to MDT01. In order for MDT to join machines into the contoso.com domain you need to create an account and configure permissions in Active Directory.
|
||||
These steps will show you how to configure an Active Directory account with the permissions required to deploy a Windows 10 machine to the domain using MDT. These steps assume you've The account is used for Windows Preinstallation Environment (Windows PE) to connect to MDT01. In order for MDT to join machines into the contoso.com domain you need to create an account and configure permissions in Active Directory.
|
||||
|
||||
On **DC01**:
|
||||
|
||||
1. Download the [Set-OUPermissions.ps1 script](https://go.microsoft.com/fwlink/p/?LinkId=619362) and copy it to the **C:\\Setup\\Scripts** directory on **DC01**. This script configures permissions to allow the **MDT_JD** account to manage computer accounts in the contoso > Computers organizational unit.
|
||||
1. Download the [Set-OUPermissions.ps1 script](https://go.microsoft.com/fwlink/p/?LinkId=619362) and copy it to the **C:\\Setup\\Scripts** directory on **DC01**. This script configures permissions to allow the **MDT_JD** account to manage computer accounts in the contoso > Computers organizational unit.
|
||||
|
||||
2. Create the **MDT_JD** service account by running the following command from an elevated **Windows PowerShell prompt**:
|
||||
|
||||
@ -81,14 +86,17 @@ On **MDT01**:
|
||||
The steps for creating the deployment share for production are the same as when you created the deployment share for creating the custom reference image:
|
||||
|
||||
1. Ensure you're signed on as: contoso\administrator.
|
||||
|
||||
2. In the Deployment Workbench console, right-click **Deployment Shares** and select **New Deployment Share**.
|
||||
3. On the **Path** page, in the **Deployment share path** text box, type **D:\\MDTProduction** and click **Next**.
|
||||
|
||||
4. On the **Share** page, in the **Share name** text box, type **MDTProduction$** and click **Next**.
|
||||
3. On the **Path** page, in the **Deployment share path** text box, type **D:\\MDTProduction** and select **Next**.
|
||||
|
||||
5. On the **Descriptive Name** page, in the **Deployment share description** text box, type **MDT Production** and click **Next**.
|
||||
4. On the **Share** page, in the **Share name** text box, type **MDTProduction$** and select **Next**.
|
||||
|
||||
5. On the **Descriptive Name** page, in the **Deployment share description** text box, type **MDT Production** and select **Next**.
|
||||
|
||||
6. On the **Options** page, accept the default settings and select **Next** twice, and then select **Finish**.
|
||||
|
||||
6. On the **Options** page, accept the default settings and click **Next** twice, and then click **Finish**.
|
||||
7. Using File Explorer, verify that you can access the **\\\\MDT01\\MDTProduction$** share.
|
||||
|
||||
### Configure permissions for the production deployment share
|
||||
@ -97,37 +105,39 @@ To read files in the deployment share, you need to assign NTFS and SMB permissio
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Ensure you're signed in as **contoso\\administrator**.
|
||||
2. Modify the NTFS permissions for the **D:\\MDTProduction** folder by running the following command in an elevated Windows PowerShell prompt:
|
||||
1. Ensure you're signed in as **contoso\\administrator**.
|
||||
|
||||
``` powershell
|
||||
icacls "D:\MDTProduction" /grant '"CONTOSO\MDT_BA":(OI)(CI)(M)'
|
||||
2. Modify the NTFS permissions for the **D:\\MDTProduction** folder by running the following command in an elevated Windows PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
icacls.exe "D:\MDTProduction" /grant '"CONTOSO\MDT_BA":(OI)(CI)(M)'
|
||||
grant-smbshareaccess -Name MDTProduction$ -AccountName "Contoso\MDT_BA" -AccessRight Full -force
|
||||
```
|
||||
|
||||
## Step 3: Add a custom image
|
||||
|
||||
The next step is to add a reference image into the deployment share with the setup files required to successfully deploy Windows 10. When adding a custom image, you still need to copy setup files (an option in the wizard) because Windows 10 stores other components in the Sources\\SxS folder that is outside the image and may be required when installing components.
|
||||
The next step is to add a reference image into the deployment share with the setup files required to successfully deploy Windows 10. When adding a custom image, you still need to copy setup files (an option in the wizard) because Windows 10 stores other components in the Sources\\SxS folder that is outside the image and may be required when installing components.
|
||||
|
||||
### Add the Windows 10 Enterprise x64 RTM custom image
|
||||
### Add the Windows 10 Enterprise x64 RTM custom image
|
||||
|
||||
In these steps, we assume that you've completed the steps in the [Create a Windows 10 reference image](create-a-windows-10-reference-image.md) topic, so you've a Windows 10 reference image at **D:\\MDTBuildLab\\Captures\REFW10X64-001.wim** on MDT01.
|
||||
In these steps, we assume that you've completed the steps in the [Create a Windows 10 reference image](create-a-windows-10-reference-image.md) article, so you've a Windows 10 reference image at **D:\\MDTBuildLab\\Captures\REFW10X64-001.wim** on MDT01.
|
||||
|
||||
1. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Production**; select the **Operating Systems** node, and create a folder named **Windows 10**.
|
||||
2. Right-click the **Windows 10** folder and select **Import Operating System**.
|
||||
1. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Production**; select the **Operating Systems** node, and create a folder named **Windows 10**.
|
||||
|
||||
3. On the **OS Type** page, select **Custom image file** and click **Next**.
|
||||
2. Right-click the **Windows 10** folder and select **Import Operating System**.
|
||||
|
||||
4. On the **Image** page, in the **Source file** text box, browse to **D:\\MDTBuildLab\\Captures\\REFW10X64-001.wim** and click **Next**.
|
||||
3. On the **OS Type** page, select **Custom image file** and select **Next**.
|
||||
|
||||
5. On the **Setup** page, select the **Copy Windows 7, Windows Server 2008 R2, or later setup files from the specified path** option; in the **Setup source directory** text box, browse to **D:\\MDTBuildLab\\Operating Systems\\W10EX64RTM** and click **Next**.
|
||||
4. On the **Image** page, in the **Source file** text box, browse to **D:\\MDTBuildLab\\Captures\\REFW10X64-001.wim** and select **Next**.
|
||||
|
||||
6. On the **Destination** page, in the **Destination directory name** text box, type **W10EX64RTM**, click **Next** twice, and then click **Finish**.
|
||||
7. After adding the operating system, double-click the added operating system name in the **Operating Systems / Windows 10** node and change the name to **Windows 10 Enterprise x64 RTM Custom Image**.
|
||||
5. On the **Setup** page, select the **Copy Windows 7, Windows Server 2008 R2, or later setup files from the specified path** option; in the **Setup source directory** text box, browse to **D:\\MDTBuildLab\\Operating Systems\\W10EX64RTM** and select **Next**.
|
||||
|
||||
>[!NOTE]
|
||||
>The reason for adding the setup files has changed since earlier versions of MDT. MDT 2010 used the setup files to install Windows. MDT uses DISM to apply the image; however, you still need the setup files because some components in roles and features are stored outside the main image.
|
||||
|
||||
6. On the **Destination** page, in the **Destination directory name** text box, type **W10EX64RTM**, select **Next** twice, and then select **Finish**.
|
||||
|
||||
7. After adding the operating system, double-click the added operating system name in the **Operating Systems / Windows 10** node and change the name to **Windows 10 Enterprise x64 RTM Custom Image**.
|
||||
|
||||
> [!NOTE]
|
||||
> The reason for adding the setup files has changed since earlier versions of MDT. MDT 2010 used the setup files to install Windows. MDT uses DISM to apply the image; however, you still need the setup files because some components in roles and features are stored outside the main image.
|
||||
|
||||

|
||||
|
||||
@ -139,40 +149,43 @@ When you configure your MDT Build Lab deployment share, you can also add applica
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Download the Enterprise distribution version of [Adobe Acrobat Reader DC](https://get.adobe.com/reader/enterprise/) (AcroRdrDC2100520060_en_US.exe) to **D:\\setup\\adobe** on MDT01.
|
||||
2. Extract the .exe file that you downloaded to a .msi (ex: .\AcroRdrDC2100520060_en_US.exe -sfx_o"d:\setup\adobe\install\" -sfx_ne).
|
||||
1. Download the Enterprise distribution version of [Adobe Acrobat Reader DC](https://get.adobe.com/reader/enterprise/) (AcroRdrDC2200320282_en_US.exe) to **D:\\setup\\adobe** on MDT01.
|
||||
|
||||
2. Extract the .exe file that you downloaded to a .msi (ex: .\AcroRdrDC2200320282_en_US.exe -sfx_o"d:\setup\adobe\install\" -sfx_ne).
|
||||
|
||||
3. In the Deployment Workbench, expand the **MDT Production** node and navigate to the **Applications** node.
|
||||
|
||||
4. Right-click the **Applications** node, and create a new folder named **Adobe**.
|
||||
|
||||
5. In the **Applications** node, right-click the **Adobe** folder and select **New Application**.
|
||||
|
||||
6. On the **Application Type** page, select the **Application with source files** option and click **Next**.
|
||||
6. On the **Application Type** page, select the **Application with source files** option and select **Next**.
|
||||
|
||||
7. On the **Details** page, in the **Application Name** text box, type **Install - Adobe Reader** and click *Next**.
|
||||
7. On the **Details** page, in the **Application Name** text box, type **Install - Adobe Reader** and select *Next**.
|
||||
|
||||
8. On the **Source** page, in the **Source Directory** text box, browse to **D:\\setup\\adobe\\install** and click **Next**.
|
||||
8. On the **Source** page, in the **Source Directory** text box, browse to **D:\\setup\\adobe\\install** and select **Next**.
|
||||
|
||||
9. On the **Destination** page, in the **Specify the name of the directory that should be created** text box, type **Install - Adobe Reader** and click **Next**.
|
||||
9. On the **Destination** page, in the **Specify the name of the directory that should be created** text box, type **Install - Adobe Reader** and select **Next**.
|
||||
|
||||
10. On the **Command Details** page, in the **Command Line** text box, type **msiexec /i AcroRead.msi /q**, click **Next** twice, and then click **Finish**.
|
||||
10. On the **Command Details** page, in the **Command Line** text box, type **msiexec /i AcroRead.msi /q**, select **Next** twice, and then select **Finish**.
|
||||
|
||||

|
||||
|
||||
The Adobe Reader application added to the Deployment Workbench.
|
||||
|
||||
## Step 5: Prepare the drivers repository
|
||||
|
||||
In order to deploy Windows 10 with MDT successfully, you need drivers for the boot images and for the actual operating system. This section will show you how to add drivers for the boot image and operating system, using the following hardware models as examples:
|
||||
- Lenovo ThinkPad T420
|
||||
- Dell Latitude 7390
|
||||
- HP EliteBook 8560w
|
||||
- Microsoft Surface Pro
|
||||
In order to deploy Windows 10 with MDT successfully, you need drivers for the boot images and for the actual operating system. This section will show you how to add drivers for the boot image and operating system, using the following hardware models as examples:
|
||||
|
||||
- Lenovo ThinkPad T420
|
||||
- Dell Latitude 7390
|
||||
- HP EliteBook 8560w
|
||||
- Microsoft Surface Pro
|
||||
|
||||
For boot images, you need to have storage and network drivers; for the operating system, you need to have the full suite of drivers.
|
||||
|
||||
>[!NOTE]
|
||||
>You should only add drivers to the Windows PE images if the default drivers don't work. Adding drivers that are not necessary will only make the boot image larger and potentially delay the download time.
|
||||
|
||||
> [!NOTE]
|
||||
> You should only add drivers to the Windows PE images if the default drivers don't work. Adding drivers that are not necessary will only make the boot image larger and potentially delay the download time.
|
||||
|
||||
### Create the driver source structure in the file system
|
||||
|
||||
The key to successful management of drivers for MDT, and for any other deployment solution, is to have a good driver repository. From this repository, you import drivers into MDT for deployment, but you should always maintain the repository for future use.
|
||||
@ -182,41 +195,50 @@ On **MDT01**:
|
||||
> [!IMPORTANT]
|
||||
> In the steps below, it's critical that the folder names used for various computer makes and models exactly match the results of **wmic computersystem get model,manufacturer** on the target system.
|
||||
|
||||
1. Using File Explorer, create the **D:\\drivers** folder.
|
||||
2. In the **D:\\drivers** folder, create the following folder structure:
|
||||
1. WinPE x86
|
||||
2. WinPE x64
|
||||
3. Windows 10 x64
|
||||
3. In the new Windows 10 x64 folder, create the following folder structure:
|
||||
- Dell Inc.
|
||||
- Latitude E7450
|
||||
- Hewlett-Packard
|
||||
- HP EliteBook 8560w
|
||||
- Lenovo
|
||||
- ThinkStation P500 (30A6003TUS)
|
||||
- Microsoft Corporation
|
||||
- Surface Laptop
|
||||
1. Using File Explorer, create the **D:\\drivers** folder.
|
||||
|
||||
2. In the **D:\\drivers** folder, create the following folder structure:
|
||||
|
||||
1. WinPE x86
|
||||
2. WinPE x64
|
||||
3. Windows 10 x64
|
||||
|
||||
3. In the new Windows 10 x64 folder, create the following folder structure:
|
||||
|
||||
- Dell Inc.
|
||||
- Latitude E7450
|
||||
- Hewlett-Packard
|
||||
- HP EliteBook 8560w
|
||||
- Lenovo
|
||||
- ThinkStation P500 (30A6003TUS)
|
||||
- Microsoft Corporation
|
||||
- Surface Laptop
|
||||
|
||||
> [!NOTE]
|
||||
> Even if you're not going to use both x86 and x64 boot images, we still recommend that you add the support structure for future use.
|
||||
|
||||
|
||||
### Create the logical driver structure in MDT
|
||||
|
||||
When you import drivers to the MDT driver repository, MDT creates a single instance folder structure based on driver class names. However, you can, and should, mimic the driver structure of your driver source repository in the Deployment Workbench. This mimic is done by creating logical folders in the Deployment Workbench.
|
||||
1. On MDT01, using Deployment Workbench, select the **Out-of-Box Drivers** node.
|
||||
2. In the **Out-Of-Box Drivers** node, create the following folder structure:
|
||||
1. WinPE x86
|
||||
2. WinPE x64
|
||||
3. Windows 10 x64
|
||||
3. In the **Windows 10 x64** folder, create the following folder structure:
|
||||
- Dell Inc.
|
||||
- Latitude E7450
|
||||
- Hewlett-Packard
|
||||
- HP EliteBook 8560w
|
||||
- Lenovo
|
||||
- 30A6003TUS
|
||||
- Microsoft Corporation
|
||||
- Surface Laptop
|
||||
|
||||
1. On MDT01, using Deployment Workbench, select the **Out-of-Box Drivers** node.
|
||||
|
||||
2. In the **Out-Of-Box Drivers** node, create the following folder structure:
|
||||
|
||||
1. WinPE x86
|
||||
2. WinPE x64
|
||||
3. Windows 10 x64
|
||||
|
||||
3. In the **Windows 10 x64** folder, create the following folder structure:
|
||||
|
||||
- Dell Inc.
|
||||
- Latitude E7450
|
||||
- Hewlett-Packard
|
||||
- HP EliteBook 8560w
|
||||
- Lenovo
|
||||
- 30A6003TUS
|
||||
- Microsoft Corporation
|
||||
- Surface Laptop
|
||||
|
||||
The preceding folder names should match the actual make and model values that MDT reads from devices during deployment. You can find out the model values for your machines by using the following command in Windows PowerShell:
|
||||
|
||||
@ -226,36 +248,40 @@ Get-WmiObject -Class:Win32_ComputerSystem
|
||||
|
||||
Or, you can use this command in a normal command prompt:
|
||||
|
||||
```console
|
||||
wmic csproduct get name
|
||||
```cmd
|
||||
wmic.exe csproduct get name
|
||||
```
|
||||
|
||||
If you want a more standardized naming convention, try the **ModelAliasExit.vbs script** from the Deployment Guys blog post, entitled [Using and Extending Model Aliases for Hardware Specific Application Installation](/archive/blogs/deploymentguys/using-and-extending-model-aliases-for-hardware-specific-application-installation).
|
||||
|
||||

|
||||
|
||||
The Out-of-Box Drivers structure in the Deployment Workbench.
|
||||
|
||||
### Create the selection profiles for boot image drivers
|
||||
|
||||
By default, MDT adds any storage and network drivers that you import to the boot images. However, you should add only the drivers that are necessary to the boot image. You can control which drivers are added by using selection profiles.
|
||||
The drivers that are used for the boot images (Windows PE) are Windows 10 drivers. If you can’t locate Windows 10 drivers for your device, a Windows 7 or Windows 8.1 driver will most likely work, but Windows 10 drivers should be your first choice.
|
||||
|
||||
The drivers that are used for the boot images (Windows PE) are Windows 10 drivers. If you can't locate Windows 10 drivers for your device, a Windows 7 or Windows 8.1 driver will most likely work, but Windows 10 drivers should be your first choice.
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. In the Deployment Workbench, under the **MDT Production** node, expand the **Advanced Configuration** node, right-click the **Selection Profiles** node, and select **New Selection Profile**.
|
||||
2. In the New Selection Profile Wizard, create a selection profile with the following settings:
|
||||
1. Selection Profile name: WinPE x86
|
||||
2. Folders: Select the WinPE x86 folder in Out-of-Box Drivers.
|
||||
3. Click **Next**, **Next** and **Finish**.
|
||||
3. Right-click the **Selection Profiles** node again, and select **New Selection Profile**.
|
||||
4. In the New Selection Profile Wizard, create a selection profile with the following settings:
|
||||
1. Selection Profile name: WinPE x64
|
||||
2. Folders: Select the WinPE x64 folder in Out-of-Box Drivers.
|
||||
3. Click **Next**, **Next** and **Finish**.
|
||||
1. In the Deployment Workbench, under the **MDT Production** node, expand the **Advanced Configuration** node, right-click the **Selection Profiles** node, and select **New Selection Profile**.
|
||||
|
||||
2. In the **New Selection Profile Wizard**, create a selection profile with the following settings:
|
||||
|
||||
- **Selection Profile name**: WinPE x86
|
||||
- **Folders**: Select the WinPE x86 folder in Out-of-Box Drivers.
|
||||
- Select **Next**, **Next** and **Finish**.
|
||||
|
||||
3. Right-click the **Selection Profiles** node again, and select **New Selection Profile**.
|
||||
|
||||
4. In the New Selection Profile Wizard, create a selection profile with the following settings:
|
||||
|
||||
- **Selection Profile name**: WinPE x64
|
||||
- **Folders**: Select the WinPE x64 folder in Out-of-Box Drivers.
|
||||
- Select **Next**, **Next** and **Finish**.
|
||||
|
||||

|
||||
|
||||
Creating the WinPE x64 selection profile.
|
||||
|
||||
### Extract and import drivers for the x64 boot image
|
||||
@ -265,11 +291,17 @@ Windows PE supports all the hardware models that we have, but here you learn to
|
||||
On **MDT01**:
|
||||
|
||||
1. Download **PROWinx64.exe** from Intel.com (ex: [PROWinx64.exe](https://downloadcenter.intel.com/downloads/eula/25016/Intel-Network-Adapter-Driver-for-Windows-10?httpDown=https%3A%2F%2Fdownloadmirror.intel.com%2F25016%2Feng%2FPROWinx64.exe)).
|
||||
2. Extract PROWinx64.exe to a temporary folder - in this example to the **C:\\Tmp\\ProWinx64** folder.
|
||||
a. **Note**: Extracting the .exe file manually requires an extraction utility. You can also run the .exe and it will self-extract files to the **%userprofile%\AppData\Local\Temp\RarSFX0** directory. This directory is temporary and will be deleted when the .exe terminates.
|
||||
3. Using File Explorer, create the **D:\\Drivers\\WinPE x64\\Intel PRO1000** folder.
|
||||
4. Copy the content of the **C:\\Tmp\\PROWinx64\\PRO1000\\Winx64\\NDIS64** folder to the **D:\\Drivers\\WinPE x64\\Intel PRO1000** folder.
|
||||
5. In the Deployment Workbench, expand the **MDT Production** > **Out-of-Box Drivers** node, right-click the **WinPE x64** node, and select **Import Drivers**, and use the following Driver source directory to import drivers: **D:\\Drivers\\WinPE x64\\Intel PRO1000**.
|
||||
|
||||
2. Extract PROWinx64.exe to a temporary folder - in this example to the **C:\\Tmp\\ProWinx64** folder.
|
||||
|
||||
> [!NOTE]
|
||||
> Extracting the .exe file manually requires an extraction utility. You can also run the .exe and it will self-extract files to the **%userprofile%\AppData\Local\Temp\RarSFX0** directory. This directory is temporary and will be deleted when the .exe terminates.
|
||||
|
||||
3. Using File Explorer, create the **D:\\Drivers\\WinPE x64\\Intel PRO1000** folder.
|
||||
|
||||
4. Copy the content of the **C:\\Tmp\\PROWinx64\\PRO1000\\Winx64\\NDIS64** folder to the **D:\\Drivers\\WinPE x64\\Intel PRO1000** folder.
|
||||
|
||||
5. In the Deployment Workbench, expand the **MDT Production** > **Out-of-Box Drivers** node, right-click the **WinPE x64** node, and select **Import Drivers**, and use the following Driver source directory to import drivers: **D:\\Drivers\\WinPE x64\\Intel PRO1000**.
|
||||
|
||||
### Download, extract, and import drivers
|
||||
|
||||
@ -277,8 +309,7 @@ On **MDT01**:
|
||||
|
||||
For the ThinkStation P500 model, you use the Lenovo ThinkVantage Update Retriever software to download the drivers. With Update Retriever, you need to specify the correct Lenovo Machine Type for the actual hardware (the first four characters of the model name). As an example, the Lenovo ThinkStation P500 model has the 30A6003TUS model name, meaning the Machine Type is 30A6.
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||

|
||||
|
||||
To get the updates, download the drivers from the Lenovo ThinkVantage Update Retriever using its export function. You can also download the drivers by searching PC Support on the [Lenovo website](https://go.microsoft.com/fwlink/p/?LinkId=619543).
|
||||
|
||||
@ -288,7 +319,7 @@ On **MDT01**:
|
||||
|
||||
1. In the Deployment Workbench, in the **MDT Production** > **Out-Of-Box Drivers** > **Windows 10 x64** node, expand the **Lenovo** node.
|
||||
|
||||
2. Right-click the **30A6003TUS** folder and select **Import Drivers** and use the following Driver source directory to import drivers:
|
||||
2. Right-click the **30A6003TUS** folder and select **Import Drivers** and use the following Driver source directory to import drivers:
|
||||
|
||||
**D:\\Drivers\\Windows 10 x64\\Lenovo\\ThinkStation P500 (30A6003TUS)**
|
||||
|
||||
@ -304,9 +335,9 @@ On **MDT01**:
|
||||
|
||||
1. In the **Deployment Workbench**, in the **MDT Production** > **Out-Of-Box Drivers** > **Windows 10 x64** node, expand the **Dell Inc.** node.
|
||||
|
||||
2. Right-click the **Latitude E7450** folder and select **Import Drivers** and use the following Driver source directory to import drivers:
|
||||
2. Right-click the **Latitude E7450** folder and select **Import Drivers** and use the following Driver source directory to import drivers:
|
||||
|
||||
**D:\\Drivers\\Windows 10 x64\\Dell Inc.\\Latitude E7450**
|
||||
**`D:\Drivers\Windows 10 x64\Dell Inc.\Latitude E7450`**
|
||||
|
||||
### For the HP EliteBook 8560w
|
||||
|
||||
@ -316,11 +347,11 @@ In these steps, we assume you've downloaded and extracted the drivers for the HP
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. In the **Deployment Workbench**, in the **MDT Production** > **Out-Of-Box Drivers** > **Windows 10 x64** node, expand the **Hewlett-Packard** node.
|
||||
1. In the **Deployment Workbench**, in the **MDT Production** > **Out-Of-Box Drivers** > **Windows 10 x64** node, expand the **Hewlett-Packard** node.
|
||||
|
||||
2. Right-click the **HP EliteBook 8560w** folder and select **Import Drivers** and use the following Driver source directory to import drivers:
|
||||
2. Right-click the **HP EliteBook 8560w** folder and select **Import Drivers** and use the following Driver source directory to import drivers:
|
||||
|
||||
**D:\\Drivers\\Windows 10 x64\\Hewlett-Packard\\HP EliteBook 8560w**
|
||||
**`D:\Drivers\Windows 10 x64\Hewlett-Packard\HP EliteBook 8560w`**
|
||||
|
||||
### For the Microsoft Surface Laptop
|
||||
|
||||
@ -328,11 +359,11 @@ For the Microsoft Surface Laptop model, you find the drivers on the Microsoft we
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. In the Deployment Workbench, in the **MDT Production** > **Out-Of-Box Drivers** > **Windows 10 x64** node, expand the **Microsoft** node.
|
||||
1. In the Deployment Workbench, in the **MDT Production** > **Out-Of-Box Drivers** > **Windows 10 x64** node, expand the **Microsoft** node.
|
||||
|
||||
2. Right-click the **Surface Laptop** folder and select **Import Drivers**; and use the following Driver source directory to import drivers:
|
||||
2. Right-click the **Surface Laptop** folder and select **Import Drivers**; and use the following Driver source directory to import drivers:
|
||||
|
||||
**D:\\Drivers\\Windows 10 x64\\Microsoft\\Surface Laptop**
|
||||
**`D:\Drivers\Windows 10 x64\Microsoft\Surface Laptop`**
|
||||
|
||||
## Step 6: Create the deployment task sequence
|
||||
|
||||
@ -345,6 +376,7 @@ On **MDT01**:
|
||||
1. In the Deployment Workbench, under the **MDT Production** node, right-click **Task Sequences**, and create a folder named **Windows 10**.
|
||||
|
||||
2. Right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
|
||||
- Task sequence ID: W10-X64-001
|
||||
- Task sequence name: Windows 10 Enterprise x64 RTM Custom Image
|
||||
- Task sequence comments: Production Image
|
||||
@ -362,26 +394,27 @@ On **MDT01**:
|
||||
|
||||
2. On the **Task Sequence** tab, configure the **Windows 10 Enterprise x64 RTM Custom Image** task sequence with the following settings:
|
||||
|
||||
1. Preinstall: After the **Enable BitLocker (Offline)** action, add a **Set Task Sequence Variable** action with the following settings:
|
||||
1. Name: Set DriverGroup001
|
||||
2. Task Sequence Variable: DriverGroup001
|
||||
3. Value: Windows 10 x64\\%Make%\\%Model%
|
||||
1. Preinstall: After the **Enable BitLocker (Offline)** action, add a **Set Task Sequence Variable** action with the following settings:
|
||||
|
||||
2. Configure the **Inject Drivers** action with the following settings:
|
||||
- Choose a selection profile: Nothing
|
||||
- Install all drivers from the selection profile
|
||||
- **Name**: Set DriverGroup001
|
||||
- **Task Sequence Variable**: DriverGroup001
|
||||
- **Value**: Windows 10 x64\\%Make%\\%Model%
|
||||
|
||||
> [!NOTE]
|
||||
> The configuration above indicates that MDT should only use drivers from the folder specified by the DriverGroup001 property, which is defined by the "Choose a selection profile: Nothing" setting, and that MDT shouldn't use plug and play to determine which drivers to copy, which is defined by the "Install all drivers from the selection profile" setting.
|
||||
|
||||
3. State Restore. Enable the **Windows Update (Pre-Application Installation)** action.
|
||||
2. Configure the **Inject Drivers** action with the following settings:
|
||||
|
||||
4. State Restore. Enable the **Windows Update (Post-Application Installation)** action.
|
||||
- **Choose a selection profile**: Nothing
|
||||
- Install all drivers from the selection profile
|
||||
|
||||
3. Click **OK**.
|
||||
> [!NOTE]
|
||||
> The configuration above indicates that MDT should only use drivers from the folder specified by the DriverGroup001 property, which is defined by the "Choose a selection profile: Nothing" setting, and that MDT shouldn't use plug and play to determine which drivers to copy, which is defined by the "Install all drivers from the selection profile" setting.
|
||||
|
||||
3. State Restore. Enable the **Windows Update (Pre-Application Installation)** action.
|
||||
|
||||
4. State Restore. Enable the **Windows Update (Post-Application Installation)** action.
|
||||
|
||||
3. Select **OK**.
|
||||
|
||||

|
||||
|
||||
The task sequence for production deployment.
|
||||
|
||||
## Step 7: Configure the MDT production deployment share
|
||||
@ -396,9 +429,10 @@ In this section, you'll learn how to configure the MDT Build Lab deployment shar
|
||||
On **MDT01**:
|
||||
|
||||
1. Right-click the **MDT Production** deployment share and select **Properties**.
|
||||
|
||||
2. Select the **Rules** tab and replace the existing rules with the following information (modify the domain name, WSUS server, and administrative credentials to match your environment):
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
|
||||
@ -435,9 +469,9 @@ On **MDT01**:
|
||||
SkipFinalSummary=NO
|
||||
```
|
||||
|
||||
3. Click **Edit Bootstrap.ini** and modify using the following information:
|
||||
3. Select **Edit Bootstrap.ini** and modify using the following information:
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
|
||||
@ -457,11 +491,11 @@ On **MDT01**:
|
||||
|
||||
- Image description: MDT Production x86
|
||||
- ISO file name: MDT Production x86.iso
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
>
|
||||
> Because you're going to use Pre-Boot Execution Environment (PXE) later to deploy the machines, you don't need the ISO file; however, we recommend creating ISO files because they're useful when troubleshooting deployments and for quick tests.
|
||||
|
||||
|
||||
6. On the **Drivers and Patches** sub tab, select the **WinPE x86** selection profile and select the **Include all drivers from the selection profile** option.
|
||||
|
||||
7. On the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
@ -477,11 +511,11 @@ On **MDT01**:
|
||||
|
||||
10. In the **Monitoring** tab, select the **Enable monitoring for this deployment share** check box.
|
||||
|
||||
11. Click **OK**.
|
||||
11. Select **OK**.
|
||||
|
||||
> [!NOTE]
|
||||
> It will take a while for the Deployment Workbench to create the monitoring database and web service.
|
||||
|
||||
>[!NOTE]
|
||||
>It will take a while for the Deployment Workbench to create the monitoring database and web service.
|
||||
|
||||

|
||||
|
||||
The Windows PE tab for the x64 boot image.
|
||||
@ -490,13 +524,13 @@ On **MDT01**:
|
||||
|
||||
The rules for the MDT Production deployment share are different from those rules for the MDT Build Lab deployment share. The biggest differences are that you deploy the machines into a domain instead of a workgroup.
|
||||
|
||||
You can optionally remove the **UserID** and **UserPassword** entries from Bootstrap.ini so that users performing PXE boot are prompted to provide credentials with permission to connect to the deployment share. Setting **SkipBDDWelcome=NO** enables the welcome screen that displays options to run the deployment wizard, run DaRT tools (if installed), exit to a Windows PE command prompt, set the keyboard layout, or configure a static IP address. In this example, we're skipping the welcome screen and providing credentials.
|
||||
You can optionally remove the **UserID** and **UserPassword** entries from Bootstrap.ini so that users performing PXE boot are prompted to provide credentials with permission to connect to the deployment share. Setting **SkipBDDWelcome=NO** enables the welcome screen that displays options to run the deployment wizard, run DaRT tools (if installed), exit to a Windows PE command prompt, set the keyboard layout, or configure a static IP address. In this example, we're skipping the welcome screen and providing credentials.
|
||||
|
||||
### The Bootstrap.ini file
|
||||
|
||||
This file is the MDT Production Bootstrap.ini:
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
|
||||
@ -512,7 +546,7 @@ SkipBDDWelcome=YES
|
||||
|
||||
This file is the CustomSettings.ini file with the new join domain information:
|
||||
|
||||
```
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default
|
||||
|
||||
@ -551,14 +585,15 @@ EventService=http://MDT01:9800
|
||||
```
|
||||
|
||||
Some properties to use in the MDT Production rules file are as follows:
|
||||
- **JoinDomain.** The domain to join.
|
||||
- **DomainAdmin.** The account to use when joining the machine to the domain.
|
||||
- **DomainAdminDomain.** The domain for the join domain account.
|
||||
- **DomainAdminPassword.** The password for the join domain account.
|
||||
- **MachineObjectOU.** The organizational unit (OU) to which to add the computer account.
|
||||
- **ScanStateArgs.** Arguments for the User State Migration Tool (USMT) ScanState command.
|
||||
- **USMTMigFiles(\*).** List of USMT templates (controlling what to back up and restore).
|
||||
- **EventService.** Activates logging information to the MDT monitoring web service.
|
||||
|
||||
- **JoinDomain.** The domain to join.
|
||||
- **DomainAdmin.** The account to use when joining the machine to the domain.
|
||||
- **DomainAdminDomain.** The domain for the join domain account.
|
||||
- **DomainAdminPassword.** The password for the join domain account.
|
||||
- **MachineObjectOU.** The organizational unit (OU) to which to add the computer account.
|
||||
- **ScanStateArgs.** Arguments for the User State Migration Tool (USMT) ScanState command.
|
||||
- **USMTMigFiles(\*).** List of USMT templates (controlling what to back up and restore).
|
||||
- **EventService.** Activates logging information to the MDT monitoring web service.
|
||||
|
||||
> [!NOTE]
|
||||
> For more information about localization support, see the following articles:
|
||||
@ -574,7 +609,6 @@ If your organization has a Microsoft Software Assurance agreement, you also can
|
||||
|
||||
If you've licensing for MDOP and DaRT, you can add DaRT to the boot images using the steps in this section. If you don't have DaRT licensing, or don't want to use it, skip to the next section, [Update the Deployment Share](#update-the-deployment-share). To enable the remote connection feature in MDT, you need to do the following steps:
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> DaRT 10 is part of [MDOP 2015](/microsoft-desktop-optimization-pack/#how-to-get-mdop).
|
||||
>
|
||||
@ -588,34 +622,33 @@ On **MDT01**:
|
||||
|
||||

|
||||
|
||||
2. Copy the two tools CAB files from **C:\\Program Files\\Microsoft DaRT\\v10** (**Toolsx86.cab** and **Toolsx64.cab**) to the production deployment share at **D:\\MDTProduction\\Tools\\x86** and **D:\\MDTProduction\\Tools\\x64**, respectively.
|
||||
3. Copy the two tools CAB files from **C:\\Program Files\\Microsoft DaRT\\v10** (**Toolsx86.cab** and **Toolsx64.cab**) to the production deployment share at **D:\\MDTProduction\\Tools\\x86** and **D:\\MDTProduction\\Tools\\x64**, respectively.
|
||||
|
||||
3. In the Deployment Workbench, right-click the **MDT Production** deployment share and select **Properties**.
|
||||
4. In the Deployment Workbench, right-click the **MDT Production** deployment share and select **Properties**.
|
||||
|
||||
4. On the **Windows PE** tab, in the **Platform** drop-down list, make sure **x86** is selected.
|
||||
5. On the **Windows PE** tab, in the **Platform** drop-down list, make sure **x86** is selected.
|
||||
|
||||
5. On the **Features** sub tab, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** checkbox.
|
||||
6. On the **Features** sub tab, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** checkbox.
|
||||
|
||||

|
||||
|
||||
Selecting the DaRT 10 feature in the deployment share.
|
||||
|
||||
8. In the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
7. In the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
|
||||
9. In the **Features** sub tab, in addition to the default selected feature pack, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box.
|
||||
8. In the **Features** sub tab, in addition to the default selected feature pack, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box.
|
||||
|
||||
10. Click **OK**.
|
||||
9. Select **OK**.
|
||||
|
||||
### Update the deployment share
|
||||
|
||||
Like the MDT Build Lab deployment share, the MDT Production deployment share needs to be updated after it has been configured. This update-process is the one during which the Windows PE boot images are created.
|
||||
|
||||
1. Right-click the **MDT Production** deployment share and select **Update Deployment Share**.
|
||||
1. Right-click the **MDT Production** deployment share and select **Update Deployment Share**.
|
||||
|
||||
2. Use the default options for the Update Deployment Share Wizard.
|
||||
2. Use the default options for the Update Deployment Share Wizard.
|
||||
|
||||
>[!NOTE]
|
||||
>The update process will take 5 to 10 minutes.
|
||||
> [!NOTE]
|
||||
> The update process will take 5 to 10 minutes.
|
||||
|
||||
## Step 8: Deploy the Windows 10 client image
|
||||
|
||||
@ -634,12 +667,11 @@ On **MDT01**:
|
||||
3. Browse to the **D:\\MDTProduction\\Boot\\LiteTouchPE\_x64.wim** file and add the image with the default settings.
|
||||
|
||||

|
||||
|
||||
The boot image added to the WDS console.
|
||||
|
||||
### Deploy the Windows 10 client
|
||||
### Deploy the Windows 10 client
|
||||
|
||||
At this point, you should have a solution ready for deploying the Windows 10 client. We recommend starting by trying a few deployments at a time until you're confident that your configuration works as expected. We find it useful to try some initial tests on virtual machines before testing on physical hardware. These tests help rule out hardware issues when testing or troubleshooting. Here are the steps to deploy your Windows 10 image to a virtual machine:
|
||||
At this point, you should have a solution ready for deploying the Windows 10 client. We recommend starting by trying a few deployments at a time until you're confident that your configuration works as expected. We find it useful to try some initial tests on virtual machines before testing on physical hardware. These tests help rule out hardware issues when testing or troubleshooting. Here are the steps to deploy your Windows 10 image to a virtual machine:
|
||||
|
||||
On **HV01**:
|
||||
|
||||
@ -653,19 +685,18 @@ On **HV01**:
|
||||
- Hard disk: 60 GB (dynamic disk)
|
||||
- Installation Options: Install an operating system from a network-based installation server
|
||||
|
||||
2. Start the PC0005 virtual machine, and press **Enter** to start the PXE boot. The VM will now load the Windows PE boot image from the WDS server.
|
||||
2. Start the PC0005 virtual machine, and press **Enter** to start the PXE boot. The VM will now load the Windows PE boot image from the WDS server.
|
||||
|
||||

|
||||
|
||||
The initial PXE boot process of PC0005.
|
||||
|
||||
3. After Windows PE has booted, complete the Windows Deployment Wizard using the following setting:
|
||||
3. After Windows PE has booted, complete the Windows Deployment Wizard using the following setting:
|
||||
|
||||
- Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Custom Image
|
||||
- Computer Name: **PC0005**
|
||||
- Applications: Select the **Install - Adobe Reader** checkbox.
|
||||
|
||||
4. Setup now begins and does the following steps:
|
||||
4. Setup now begins and does the following steps:
|
||||
|
||||
- Installs the Windows 10 Enterprise operating system.
|
||||
- Installs the added application.
|
||||
@ -685,14 +716,13 @@ Since you've enabled the monitoring on the MDT Production deployment share, you
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. In the Deployment Workbench, expand the **MDT Production** deployment share folder.
|
||||
1. In the Deployment Workbench, expand the **MDT Production** deployment share folder.
|
||||
|
||||
2. Select the **Monitoring** node, and wait until you see PC0005.
|
||||
2. Select the **Monitoring** node, and wait until you see PC0005.
|
||||
|
||||
3. Double-click PC0005, and review the information.
|
||||
3. Double-click PC0005, and review the information.
|
||||
|
||||

|
||||
|
||||
The Monitoring node, showing the deployment progress of PC0005.
|
||||
|
||||
### Use information in the Event Viewer
|
||||
@ -700,7 +730,6 @@ On **MDT01**:
|
||||
When monitoring is enabled, MDT also writes information to the event viewer on MDT01. This information can be used to trigger notifications via scheduled tasks when deployment is completed. For example, you can configure scheduled tasks to send an email when a certain event is created in the event log.
|
||||
|
||||

|
||||
|
||||
The Event Viewer showing a successful deployment of PC0005.
|
||||
|
||||
## Multicast deployments
|
||||
@ -717,18 +746,20 @@ Setting up MDT for multicast is straightforward. You enable multicast on the dep
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. In the Deployment Workbench, right-click the **MDT Production** deployment share folder and select **Properties**.
|
||||
2. On the **General** tab, select the **Enable multicast for this deployment share (requires Windows Server 2008 R2 Windows Deployment Services)** check box, and click **OK**.
|
||||
3. Right-click the **MDT Production** deployment share folder and select **Update Deployment Share**.
|
||||
4. After updating the deployment share, use the Windows Deployment Services console to, verify that the multicast namespace was created.
|
||||
1. In the Deployment Workbench, right-click the **MDT Production** deployment share folder and select **Properties**.
|
||||
|
||||
2. On the **General** tab, select the **Enable multicast for this deployment share (requires Windows Server 2008 R2 Windows Deployment Services)** check box, and select **OK**.
|
||||
|
||||
3. Right-click the **MDT Production** deployment share folder and select **Update Deployment Share**.
|
||||
|
||||
4. After updating the deployment share, use the Windows Deployment Services console to, verify that the multicast namespace was created.
|
||||
|
||||

|
||||
|
||||
The newly created multicast namespace.
|
||||
|
||||
## Use offline media to deploy Windows 10
|
||||
## Use offline media to deploy Windows 10
|
||||
|
||||
In addition to network-based deployments, MDT supports the use of offline media-based deployments of Windows 10. You can easily generate an offline version of your deployment share - either the full deployment share or a subset of it - by using selection profiles. The generated offline media can be burned to a DVD or copied to a USB stick for deployment.
|
||||
In addition to network-based deployments, MDT supports the use of offline media-based deployments of Windows 10. You can easily generate an offline version of your deployment share - either the full deployment share or a subset of it - by using selection profiles. The generated offline media can be burned to a DVD or copied to a USB stick for deployment.
|
||||
|
||||
Offline media are useful not only when you don't have network connectivity to the deployment share, but also when you've limited connection to the deployment share and don't want to copy 5 GB of data over the wire. Offline media can still join the domain, but you save the transfer of operating system images, drivers, and applications over the wire.
|
||||
|
||||
@ -738,19 +769,19 @@ To filter what is being added to the media, you create a selection profile. When
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. In the Deployment Workbench, under the **MDT Production / Advanced Configuration** node, right-click **Selection Profiles**, and select **New Selection Profile**.
|
||||
1. In the Deployment Workbench, under the **MDT Production / Advanced Configuration** node, right-click **Selection Profiles**, and select **New Selection Profile**.
|
||||
|
||||
2. Use the following settings for the New Selection Profile Wizard:
|
||||
2. Use the following settings for the New Selection Profile Wizard:
|
||||
|
||||
- General Settings
|
||||
- Selection profile name: Windows 10 Offline Media
|
||||
- General Settings
|
||||
- **Selection profile name**: Windows 10 Offline Media
|
||||
|
||||
- Folders
|
||||
- Applications / Adobe
|
||||
- Operating Systems / Windows 10
|
||||
- Out-Of-Box Drivers / WinPE x64
|
||||
- Out-Of-Box Drivers / Windows 10 x64
|
||||
- Task Sequences / Windows 10
|
||||
- Folders
|
||||
- Applications / Adobe
|
||||
- Operating Systems / Windows 10
|
||||
- Out-Of-Box Drivers / WinPE x64
|
||||
- Out-Of-Box Drivers / Windows 10 x64
|
||||
- Task Sequences / Windows 10
|
||||
|
||||

|
||||
|
||||
@ -758,17 +789,18 @@ On **MDT01**:
|
||||
|
||||
In these steps, you generate offline media from the MDT Production deployment share. To filter what is being added to the media, you use the previously created selection profile.
|
||||
|
||||
1. On MDT01, using File Explorer, create the **D:\\MDTOfflineMedia** folder.
|
||||
1. On MDT01, using File Explorer, create the **D:\\MDTOfflineMedia** folder.
|
||||
|
||||
>[!NOTE]
|
||||
>When creating offline media, you need to create the target folder first. It's crucial that you don't create a subfolder inside the deployment share folder because it will break the offline media.
|
||||
|
||||
2. In the Deployment Workbench, under the **MDT Production / Advanced Configuration** node, right-click the **Media** node, and select **New Media**.
|
||||
> [!NOTE]
|
||||
> When creating offline media, you need to create the target folder first. It's crucial that you don't create a subfolder inside the deployment share folder because it will break the offline media.
|
||||
|
||||
3. Use the following settings for the New Media Wizard:
|
||||
- General Settings
|
||||
- Media path: **D:\\MDTOfflineMedia**
|
||||
- Selection profile: **Windows 10 Offline Media**
|
||||
2. In the Deployment Workbench, under the **MDT Production / Advanced Configuration** node, right-click the **Media** node, and select **New Media**.
|
||||
|
||||
3. Use the following settings for the New Media Wizard:
|
||||
|
||||
- General Settings
|
||||
- Media path: **D:\\MDTOfflineMedia**
|
||||
- Selection profile: **Windows 10 Offline Media**
|
||||
|
||||
### Configure the offline media
|
||||
|
||||
@ -776,24 +808,25 @@ Offline media has its own rules, its own Bootstrap.ini and CustomSettings.ini fi
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Copy the CustomSettings.ini file from the **D:\MDTProduction\Control** folder to **D:\\MDTOfflineMedia\\Content\\Deploy\\Control**. Overwrite the existing files.
|
||||
1. Copy the CustomSettings.ini file from the **D:\MDTProduction\Control** folder to **D:\\MDTOfflineMedia\\Content\\Deploy\\Control**. Overwrite the existing files.
|
||||
|
||||
2. In the Deployment Workbench, under the **MDT Production / Advanced Configuration / Media** node, right-click the **MEDIA001** media, and select **Properties**.
|
||||
2. In the Deployment Workbench, under the **MDT Production / Advanced Configuration / Media** node, right-click the **MEDIA001** media, and select **Properties**.
|
||||
|
||||
3. In the **General** tab, configure the following:
|
||||
3. In the **General** tab, configure the following:
|
||||
- Clear the Generate x86 boot image check box.
|
||||
- ISO file name: Windows 10 Offline Media.iso
|
||||
|
||||
4. On the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
4. On the **Windows PE** tab, in the **Platform** drop-down list, select **x64**.
|
||||
|
||||
5. On the **General** sub tab, configure the following settings:
|
||||
- In the **Lite Touch Boot Image Settings** area:
|
||||
- Image description: MDT Production x64
|
||||
- In the **Windows PE Customizations** area, set the Scratch space size to 128.
|
||||
5. On the **General** sub tab, configure the following settings:
|
||||
|
||||
6. On the **Drivers and Patches** sub tab, select the **WinPE x64** selection profile and select the **Include all drivers from the selection profile** option.
|
||||
- In the **Lite Touch Boot Image Settings** area:
|
||||
- **Image description**: MDT Production x64
|
||||
- In the **Windows PE Customizations** area, set the Scratch space size to 128.
|
||||
|
||||
7. Click **OK**.
|
||||
6. On the **Drivers and Patches** sub tab, select the **WinPE x64** selection profile and select the **Include all drivers from the selection profile** option.
|
||||
|
||||
7. Select **OK**.
|
||||
|
||||
### Generate the offline media
|
||||
|
||||
@ -801,30 +834,36 @@ You've now configured the offline media deployment share, however the share hasn
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. In the Deployment Workbench, navigate to the **MDT Production / Advanced Configuration / Media** node.
|
||||
1. In the Deployment Workbench, navigate to the **MDT Production / Advanced Configuration / Media** node.
|
||||
|
||||
2. Right-click the **MEDIA001** media, and select **Update Media Content**. The Update Media Content process now generates the offline media in the **D:\\MDTOfflineMedia\\Content** folder. The process might require several minutes.
|
||||
2. Right-click the **MEDIA001** media, and select **Update Media Content**. The Update Media Content process now generates the offline media in the **D:\\MDTOfflineMedia\\Content** folder. The process might require several minutes.
|
||||
|
||||
### Create a bootable USB stick
|
||||
|
||||
The ISO that you got when updating the offline media item can be burned to a DVD and used directly (it will be bootable), but it's often more efficient to use USB sticks instead since they're faster and can hold more data. (A dual-layer DVD is limited to 8.5 GB.)
|
||||
|
||||
>[!TIP]
|
||||
>In this example, the .wim file is 5.5 GB in size. However, bootable USB sticks are formatted with the FAT32 file system which limits file size to 4.0 GB. You can place the image on a different drive (ex: E:\Deploy\Operating Systems\W10EX64RTM\REFW10X64-001.swm) and then modify E:\Deploy\Control\OperatingSystems.xml to point to it. Alternatively to keep using the USB you must split the .wim file, which can be done using DISM: <br> <br>Dism /Split-Image /ImageFile:D:\MDTOfflinemedia\Content\Deploy\Operating Systems\W10EX64RTM\REFW10X64-001.wim /SWMFile:E:\sources\install.swm /FileSize:3800. <br> <br>Windows Setup automatically installs from this file, provided you name it install.swm. The file names for the next files include numbers, for example: install2.swm, install3.swm. <br> <br>To enable split image in MDT, the Settings.xml file in your deployment share (ex: D:\MDTProduction\Control\Settings.xml) must have the **SkipWimSplit** value set to **False**. By default this value is set to True (`<SkipWimSplit>True</SkipWimSplit>`), so this must be changed and the offline media content updated.
|
||||
> [!TIP]
|
||||
> In this example, the .wim file is 5.5 GB in size. However, bootable USB sticks are formatted with the FAT32 file system which limits file size to 4.0 GB. You can place the image on a different drive (ex: E:\Deploy\Operating Systems\W10EX64RTM\REFW10X64-001.swm) and then modify E:\Deploy\Control\OperatingSystems.xml to point to it. Alternatively to keep using the USB you must split the .wim file, which can be done using DISM:
|
||||
>
|
||||
> **`Dism.exe /Split-Image /ImageFile:D:\MDTOfflinemedia\Content\Deploy\Operating Systems\W10EX64RTM\REFW10X64-001.wim /SWMFile:E:\sources\install.swm /FileSize:3800.`**
|
||||
>
|
||||
> Windows Setup automatically installs from this file, provided you name it install.swm. The file names for the next files include numbers, for example: install2.swm, install3.swm.
|
||||
>
|
||||
> To enable split image in MDT, the Settings.xml file in your deployment share (ex: D:\MDTProduction\Control\Settings.xml) must have the **SkipWimSplit** value set to **False**. By default this value is set to True (`<SkipWimSplit>True</SkipWimSplit>`), so this must be changed and the offline media content updated.
|
||||
|
||||
Follow these steps to create a bootable USB stick from the offline media content:
|
||||
|
||||
1. On a physical machine running Windows 7 or later, insert the USB stick you want to use.
|
||||
1. On a physical machine running Windows 7 or later, insert the USB stick you want to use.
|
||||
|
||||
2. Copy the content of the **MDTOfflineMedia\\Content** folder to the root of the USB stick.
|
||||
2. Copy the content of the **MDTOfflineMedia\\Content** folder to the root of the USB stick.
|
||||
|
||||
3. Start an elevated command prompt (run as Administrator), and start the Diskpart utility by typing **Diskpart** and pressing **Enter**.
|
||||
3. Start an elevated command prompt (run as Administrator), and start the Diskpart utility by typing **Diskpart** and pressing **Enter**.
|
||||
|
||||
4. In the Diskpart utility, you can type **list volume** (or the shorter **list vol**) to list the volumes, but you only need to remember the drive letter of the USB stick to which you copied the content. In our example, the USB stick had the drive letter F.
|
||||
4. In the Diskpart utility, you can type **list volume** (or the shorter **list vol**) to list the volumes, but you only need to remember the drive letter of the USB stick to which you copied the content. In our example, the USB stick had the drive letter F.
|
||||
|
||||
5. In the Diskpart utility, type **select volume F** (replace F with your USB stick drive letter).
|
||||
5. In the Diskpart utility, type **select volume F** (replace F with your USB stick drive letter).
|
||||
|
||||
6. In the Diskpart utility, type **active**, and then type **exit**.
|
||||
6. In the Diskpart utility, type **active**, and then type **exit**.
|
||||
|
||||
## Unified Extensible Firmware Interface (UEFI)-based deployments
|
||||
|
||||
@ -834,11 +873,11 @@ As referenced in [Windows 10 deployment scenarios and tools](../windows-deployme
|
||||
|
||||
The partitions when deploying an UEFI-based machine.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)<br>
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)<br>
|
||||
[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)<br>
|
||||
[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)<br>
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)<br>
|
||||
[Configure MDT settings](configure-mdt-settings.md)<br>
|
||||
- [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
- [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
- [Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
||||
- [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||
- [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
- [Configure MDT settings](configure-mdt-settings.md)
|
||||
|
@ -1,29 +1,34 @@
|
||||
---
|
||||
title: Get started with the Microsoft Deployment Toolkit (MDT) (Windows 10)
|
||||
description: This topic will help you gain a better understanding of how to use the Microsoft Deployment Toolkit (MDT), as part of a Windows operating system deployment.
|
||||
description: This article will help you gain a better understanding of how to use the Microsoft Deployment Toolkit (MDT), as part of a Windows operating system deployment.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.collection:
|
||||
- highpri
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Get started with MDT
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This article provides an overview of the features, components, and capabilities of the [Microsoft Deployment Toolkit (MDT)](/mem/configmgr/mdt/). When you have finished reviewing this information, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||
## About MDT
|
||||
|
||||
MDT is a unified collection of tools, processes, and guidance for automating desktop and server deployment. You can use it to create reference images or as a complete deployment solution. MDT is one of the most important tools available to IT professionals today.
|
||||
MDT is a unified collection of tools, processes, and guidance for automating desktop and server deployment. You can use it to create reference images or as a complete deployment solution. MDT is one of the most important tools available to IT professionals today.
|
||||
|
||||
In addition to reducing deployment time and standardizing desktop and server images, MDT enables you to more easily manage security and ongoing configurations. MDT builds on top of the core deployment tools in the [Windows Assessment and Deployment Kit](/windows-hardware/get-started/adk-install) (Windows ADK) with more guidance and features designed to reduce the complexity and time required for deployment in an enterprise environment.
|
||||
|
||||
MDT supports the deployment of Windows 10, and Windows 7, Windows 8.1, and Windows Server. It also includes support for zero-touch installation (ZTI) with [Microsoft Endpoint Configuration Manager](/configmgr/).
|
||||
MDT supports the deployment of Windows 10, and Windows 7, Windows 8.1, and Windows Server. It also includes support for zero-touch installation (ZTI) with [Microsoft Configuration Manager](/configmgr/).
|
||||
|
||||
> [!IMPORTANT]
|
||||
> For more information about MDT supported platforms, see [MDT Release Notes](/mem/configmgr/mdt/release-notes#supported-platforms) and [MDT FAQ](/mem/configmgr/mdt/faq#is-this-release-only-supported-with-version--x--of-windows-client--windows-adk--or-configuration-manager-).
|
||||
@ -33,49 +38,68 @@ MDT supports the deployment of Windows 10, and Windows 7, Windows 8.1, and Wi
|
||||
MDT has been in existence since 2003, when it was first introduced as Business Desktop Deployment (BDD) 1.0. The toolkit has evolved, both in functionality and popularity, and today it's considered fundamental to Windows operating system and enterprise application deployment.
|
||||
|
||||
MDT has many useful features, such as:
|
||||
- **Windows Client support.** Supports Windows 7, Windows 8.1, and Windows 10.
|
||||
- **Windows Server support.** Supports Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019.
|
||||
- **Additional operating systems support.** Supports Windows Thin PC and [Windows Embedded POSReady 7](https://www.microsoft.com/en-us/download/details.aspx?id=26558), and Windows 8.1 Embedded Industry.
|
||||
- **UEFI support.** Supports deployment to machines using Unified Extensible Firmware Interface (UEFI) version 2.3.1.
|
||||
- **GPT support.** Supports deployment to machines that require the new GPT partition table format. This feature is related to UEFI.
|
||||
- **Enhanced Windows PowerShell support.** Provides support for running PowerShell scripts.
|
||||
|
||||
- **Windows Client support**: Supports Windows 7, Windows 8.1, and Windows 10.
|
||||
|
||||
- **Windows Server support**: Supports Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019.
|
||||
|
||||
- **Additional operating systems support**: Supports Windows Thin PC and [Windows Embedded POSReady 7](https://www.microsoft.com/download/details.aspx?id=26558), and Windows 8.1 Embedded Industry.
|
||||
|
||||
- **UEFI support**: Supports deployment to machines using Unified Extensible Firmware Interface (UEFI) version 2.3.1.
|
||||
|
||||
- **GPT support**: Supports deployment to machines that require the new GPT partition table format. This feature is related to UEFI.
|
||||
|
||||
- **Enhanced Windows PowerShell support**: Provides support for running PowerShell scripts.
|
||||
|
||||

|
||||
|
||||
The deployment share mounted as a standard PSDrive allows for administration using PowerShell.
|
||||
|
||||
- **Add local administrator accounts.** Allows you to add multiple user accounts to the local Administrators group on the target computers, either via settings or the deployment wizard.
|
||||
- **Automated participation in CEIP and WER.** Provides configuration for participation in Windows Customer Experience Improvement Program (CEIP) and Windows Error Reporting (WER).
|
||||
- **Deploy Windows RE.** Enables deployment of a customized Windows Recovery Environment (Windows RE) as part of the task sequence.
|
||||
- **Deploy to VHD.** Provides ready-made task sequence templates for deploying Windows into a virtual hard disk (VHD) file.
|
||||
- **Improved deployment wizard.** Provides more progress information and a cleaner UI for the Lite Touch Deployment Wizard.
|
||||
- **Monitoring.** Allows you to see the status of currently running deployments.
|
||||
- **Apply GPO Pack.** Allows you to deploy local group policy objects created by Microsoft Security Compliance Manager (SCM).
|
||||
- **Partitioning routines.** Provides improved partitioning routines to ensure that deployments work regardless of the current hard drive structure.
|
||||
- **Offline BitLocker.** Provides the capability to have BitLocker enabled during the Windows Preinstallation Environment (Windows PE) phase, thus saving hours of encryption time.
|
||||
- **USMT offline user-state migration.** Provides support for running the User State Migration Tool (USMT) capture offline, during the Windows PE phase of the deployment.
|
||||
- **Add local administrator accounts**: Allows you to add multiple user accounts to the local Administrators group on the target computers, either via settings or the deployment wizard.
|
||||
|
||||
- **Automated participation in CEIP and WER**: Provides configuration for participation in Windows Customer Experience Improvement Program (CEIP) and Windows Error Reporting (WER).
|
||||
|
||||
- **Deploy Windows RE**: Enables deployment of a customized Windows Recovery Environment (Windows RE) as part of the task sequence.
|
||||
|
||||
- **Deploy to VHD**: Provides ready-made task sequence templates for deploying Windows into a virtual hard disk (VHD) file.
|
||||
|
||||
- **Improved deployment wizard**: Provides more progress information and a cleaner UI for the Lite Touch Deployment Wizard.
|
||||
|
||||
- **Monitoring**: Allows you to see the status of currently running deployments.
|
||||
|
||||
- **Apply GPO Pack**: Allows you to deploy local group policy objects created by Microsoft Security Compliance Manager (SCM).
|
||||
|
||||
- **Partitioning routines**: Provides improved partitioning routines to ensure that deployments work regardless of the current hard drive structure.
|
||||
|
||||
- **Offline BitLocker**: Provides the capability to have BitLocker enabled during the Windows Preinstallation Environment (Windows PE) phase, thus saving hours of encryption time.
|
||||
|
||||
- **USMT offline user-state migration**: Provides support for running the User State Migration Tool (USMT) capture offline, during the Windows PE phase of the deployment.
|
||||
|
||||

|
||||
|
||||
The offline USMT backup in action.
|
||||
|
||||
- **Install or uninstall Windows roles or features.** Enables you to select roles and features as part of the deployment wizard. MDT also supports uninstall of roles and features.
|
||||
- **Microsoft System Center Orchestrator integration.** Provides the capability to use Orchestrator runbooks as part of the task sequence.
|
||||
- **Support for DaRT.** Supports optional integration of the DaRT components into the boot image.
|
||||
- **Support for Microsoft Office.** Provides added support for deploying Microsoft Office.
|
||||
- **Support for Modern UI app package provisioning.** Provisions applications based on the new Windows app package standard, which is used in Windows 8 and later.
|
||||
- **Extensibility.** Provides the capability to extend MDT far beyond the built-in features by adding custom scripts, web services, System Center Orchestrator runbooks, PowerShell scripts, and VBScripts.
|
||||
- **Upgrade task sequence.** Provides a new upgrade task sequence template that you can use to upgrade existing Windows 7, Windows 8, and Windows 8.1 systems directly to Windows 10, automatically preserving all data, settings, applications, and drivers. For more information about using this new upgrade task sequence, see the [Microsoft Deployment Toolkit resource page](/mem/configmgr/mdt/).
|
||||
- **Install or uninstall Windows roles or features**: Enables you to select roles and features as part of the deployment wizard. MDT also supports uninstall of roles and features.
|
||||
|
||||
- **Microsoft System Center Orchestrator integration**: Provides the capability to use Orchestrator runbooks as part of the task sequence.
|
||||
|
||||
- **Support for DaRT**: Supports optional integration of the DaRT components into the boot image.
|
||||
|
||||
- **Support for Microsoft Office**: Provides added support for deploying Microsoft Office.
|
||||
|
||||
- **Support for Modern UI app package provisioning**: Provisions applications based on the new Windows app package standard, which is used in Windows 8 and later.
|
||||
|
||||
- **Extensibility**: Provides the capability to extend MDT far beyond the built-in features by adding custom scripts, web services, System Center Orchestrator runbooks, PowerShell scripts, and VBScripts.
|
||||
|
||||
- **Upgrade task sequence**: Provides a new upgrade task sequence template that you can use to upgrade existing Windows 7, Windows 8, and Windows 8.1 systems directly to Windows 10, automatically preserving all data, settings, applications, and drivers. For more information about using this new upgrade task sequence, see the [Microsoft Deployment Toolkit resource page](/mem/configmgr/mdt/).
|
||||
|
||||
## MDT Lite Touch components
|
||||
|
||||
Many features in MDT support Lite Touch Installation (LTI) for Windows 10. An LTI deployment strategy requires little infrastructure or user interaction, and can be used to deploy an operating system from a network share or from a physical media, such as a USB flash drive or disk.
|
||||
Many features in MDT support Lite Touch Installation (LTI) for Windows 10. An LTI deployment strategy requires little infrastructure or user interaction, and can be used to deploy an operating system from a network share or from a physical media, such as a USB flash drive or disk.
|
||||
|
||||
When the Windows operating system is being deployed using MDT, most of the administration and configuration is done through the Deployment Workbench, but you also can perform many of the tasks using Windows PowerShell. The easiest way to find out how to use PowerShell in MDT is to use the Deployment Workbench to perform an operation and at the end of that task, click **View Script**. You're provided the PowerShell command.
|
||||
When the Windows operating system is being deployed using MDT, most of the administration and configuration is done through the Deployment Workbench, but you also can perform many of the tasks using Windows PowerShell. The easiest way to find out how to use PowerShell in MDT is to use the Deployment Workbench to perform an operation and at the end of that task, select **View Script**. You're provided the PowerShell command.
|
||||
|
||||

|
||||
|
||||
If you click **View Script** on the right side, you'll get the PowerShell code that was used to perform the task.
|
||||
If you select **View Script** on the right side, you'll get the PowerShell code that was used to perform the task.
|
||||
|
||||
## Deployment shares
|
||||
|
||||
@ -84,6 +108,7 @@ A deployment share is essentially a folder on the server that is shared and cont
|
||||
## Rules
|
||||
|
||||
The rules (CustomSettings.ini and Bootstrap.ini) make up the brain of MDT. The rules control the Windows Deployment Wizard on the client and, for example, can provide the following settings to the machine being deployed:
|
||||
|
||||
- Computer name
|
||||
- Domain to join, and organizational unit (OU) in Active Directory to hold the computer object
|
||||
- Whether to enable BitLocker
|
||||
@ -91,17 +116,15 @@ The rules (CustomSettings.ini and Bootstrap.ini) make up the brain of MDT. The r
|
||||
You can manage hundreds of settings in the rules. For more information, see the [Microsoft Deployment Toolkit resource center](/mem/configmgr/mdt/).
|
||||
|
||||

|
||||
|
||||
Example of an MDT rule. In this example, the new computer name is being calculated based on PC- plus the first seven (Left) characters from the serial number
|
||||
|
||||
## Boot images
|
||||
|
||||
Boot images are the Windows Preinstallation Environment (Windows PE) images that are used to start the deployment. They can be started from a CD or DVD, an ISO file, a USB device, or over the network using a Pre-Boot Execution Environment (PXE) server. The boot images connect to the deployment
|
||||
share on the server and start the deployment.
|
||||
Boot images are the Windows Preinstallation Environment (Windows PE) images that are used to start the deployment. They can be started from a CD or DVD, an ISO file, a USB device, or over the network using a Pre-Boot Execution Environment (PXE) server. The boot images connect to the deployment share on the server and start the deployment.
|
||||
|
||||
## Operating systems
|
||||
|
||||
Using the Deployment Workbench, you import the operating systems you want to deploy. You can import either the full source (like the full Windows 10 DVD/ISO) or a custom image that you've created. The full-source operating systems are primarily used to create reference images; however, they also can be used for normal deployments.
|
||||
Using the Deployment Workbench, you import the operating systems you want to deploy. You can import either the full source (like the full Windows 10 DVD/ISO) or a custom image that you've created. The full-source operating systems are primarily used to create reference images; however, they also can be used for normal deployments.
|
||||
|
||||
## Applications
|
||||
|
||||
@ -120,33 +143,44 @@ With the Deployment Workbench, you can add any Microsoft packages that you want
|
||||
Task sequences are the heart and soul of the deployment solution. When creating a task sequence, you need to select a template. The templates are located in the Templates folder in the MDT installation directory, and they determine which default actions are present in the sequence.
|
||||
|
||||
You can think of a task sequence as a list of actions that need to be executed in a certain order. Each action can also have conditions. Some examples of actions are as follows:
|
||||
- **Gather.** Reads configuration settings from the deployment server.
|
||||
- **Format and Partition.** Creates the partition(s) and formats them.
|
||||
- **Inject Drivers.** Finds out which drivers the machine needs and downloads them from the central driver repository.
|
||||
- **Apply Operating System.** Uses ImageX to apply the image.
|
||||
- **Windows Update.** Connects to a WSUS server and updates the machine.
|
||||
|
||||
- **Gather**: Reads configuration settings from the deployment server.
|
||||
- **Format and Partition**: Creates the partition(s) and formats them.
|
||||
- **Inject Drivers**: Finds out which drivers the machine needs and downloads them from the central driver repository.
|
||||
- **Apply Operating System**: Applies the Windows image.
|
||||
- **Windows Update**: Connects to a WSUS server and updates the machine.
|
||||
|
||||
## Task sequence templates
|
||||
|
||||
MDT comes with nine default task sequence templates. You can also create your own templates. As long as you store them in the Templates folder, they'll be available when you create a new task sequence.
|
||||
- **Sysprep and Capture task sequence.** Used to run the System Preparation (Sysprep) tool and capture an image of a reference computer.
|
||||
|
||||
- **Sysprep and Capture task sequence**: Used to run the System Preparation (Sysprep) tool and capture an image of a reference computer.
|
||||
|
||||
> [!NOTE]
|
||||
> It's preferable to use a complete build and capture instead of the Sysprep and Capture task sequence. A complete build and capture can be automated, whereas Sysprep and Capture can't.
|
||||
|
||||
- **Standard Client task sequence.** The most frequently used task sequence. Used for creating reference images and for deploying clients in production.
|
||||
- **Standard Client Replace task sequence.** Used to run User State Migration Tool (USMT) backup and the optional full Windows Imaging (WIM) backup action. Can also be used to do a secure wipe of a machine that is going to be decommissioned.
|
||||
- **Custom task sequence.** As the name implies, a custom task sequence with only one default action (one Install Application action).
|
||||
- **Standard Server task sequence.** The default task sequence for deploying operating system images to servers. The main difference between this template and the Standard Client task sequence template is that it doesn't contain any USMT actions because USMT isn't supported on servers.
|
||||
- **Lite Touch OEM task sequence.** Used to preload operating systems images on the computer hard drive. Typically used by computer original equipment manufacturers (OEMs) but some enterprise organizations also use this feature.
|
||||
- **Post OS Installation task sequence.** A task sequence prepared to run actions after the operating system has been deployed. Useful for server deployments but not often used for client deployments.
|
||||
- **Deploy to VHD Client task sequence.** Similar to the Standard Client task sequence template but also creates a virtual hard disk (VHD) file on the target computer and deploys the image to the VHD file.
|
||||
- **Deploy to VHD Server task sequence.** Same as the Deploy to VHD Client task sequence but for servers.
|
||||
- **Standard Client Upgrade task sequence.** A simple task sequence template used to perform an in-place upgrade from Windows 7, Windows 8, or Windows 8.1 directly to Windows 10, automatically preserving existing data, settings, applications, and drivers.
|
||||
|
||||
- **Standard Client task sequence**: The most frequently used task sequence. Used for creating reference images and for deploying clients in production.
|
||||
|
||||
- **Standard Client Replace task sequence**: Used to run User State Migration Tool (USMT) backup and the optional full Windows Imaging (WIM) backup action. Can also be used to do a secure wipe of a machine that is going to be decommissioned.
|
||||
|
||||
- **Custom task sequence**: As the name implies, a custom task sequence with only one default action (one Install Application action).
|
||||
|
||||
- **Standard Server task sequence**: The default task sequence for deploying operating system images to servers. The main difference between this template and the Standard Client task sequence template is that it doesn't contain any USMT actions because USMT isn't supported on servers.
|
||||
|
||||
- **Lite Touch OEM task sequence**: Used to preload operating systems images on the computer hard drive. Typically used by computer original equipment manufacturers (OEMs) but some enterprise organizations also use this feature.
|
||||
|
||||
- **Post OS Installation task sequence**: A task sequence prepared to run actions after the operating system has been deployed. Useful for server deployments but not often used for client deployments.
|
||||
|
||||
- **Deploy to VHD Client task sequence**: Similar to the Standard Client task sequence template but also creates a virtual hard disk (VHD) file on the target computer and deploys the image to the VHD file.
|
||||
|
||||
- **Deploy to VHD Server task sequence**: Same as the Deploy to VHD Client task sequence but for servers.
|
||||
|
||||
- **Standard Client Upgrade task sequence**: A simple task sequence template used to perform an in-place upgrade from Windows 7, Windows 8, or Windows 8.1 directly to Windows 10, automatically preserving existing data, settings, applications, and drivers.
|
||||
|
||||
## Selection profiles
|
||||
|
||||
Selection profiles, which are available in the Advanced Configuration node, provide a way to filter content in the Deployment Workbench. Selection profiles are used for several purposes in the Deployment Workbench and in Lite Touch deployments. For example, they can be used to:
|
||||
|
||||
- Control which drivers and packages are injected into the Lite Touch (and generic) boot images.
|
||||
- Control which drivers are injected during the task sequence.
|
||||
- Control what is included in any media that you create.
|
||||
@ -157,8 +191,8 @@ Selection profiles, which are available in the Advanced Configuration node, prov
|
||||
|
||||
MDT uses many log files during operating system deployments. By default the logs are client side, but by configuring the deployment settings, you can have MDT store them on the server, as well.
|
||||
|
||||
**Note**
|
||||
The easiest way to view log files is to use Configuration Manager Trace (CMTrace), which is included in the [Configuration Manager Toolkit](https://go.microsoft.com/fwlink/p/?LinkId=734717).
|
||||
> [!NOTE]
|
||||
> The easiest way to view log files is to use Configuration Manager Trace (CMTrace), which is included in the [Configuration Manager Toolkit](https://go.microsoft.com/fwlink/p/?LinkId=734717).
|
||||
|
||||
## Monitoring
|
||||
|
||||
@ -166,4 +200,4 @@ On the deployment share, you also can enable monitoring. After you enable monito
|
||||
|
||||
## See next
|
||||
|
||||
[Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md)
|
||||
- [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md)
|
||||
|
@ -1,19 +1,24 @@
|
||||
---
|
||||
title: Prepare for deployment with MDT (Windows 10)
|
||||
description: This topic will walk you through the steps necessary to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT).
|
||||
description: This article will walk you through the steps necessary to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT).
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.collection:
|
||||
- highpri
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Prepare for deployment with MDT
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This article will walk you through the steps necessary to prepare your network and server infrastructure to deploy Windows 10 with the Microsoft Deployment Toolkit (MDT). It covers the installation of the necessary system prerequisites, the creation of shared folders and service accounts, and the configuration of security permissions in the file system and in Active Directory.
|
||||
|
||||
@ -23,47 +28,56 @@ The procedures in this guide use the following names and infrastructure.
|
||||
|
||||
### Network and servers
|
||||
|
||||
For the purposes of this topic, we will use three server computers: **DC01**, **MDT01**, and **HV01**.
|
||||
- All servers are running Windows Server 2019.
|
||||
- You can use an earlier version of Windows Server with minor modifications to some procedures.
|
||||
- Note: Although MDT supports Windows Server 2008 R2, at least Windows Server 2012 R2 or later is required to perform the procedures in this guide.
|
||||
- **DC01** is a domain controller, DHCP server, and DNS server for <b>contoso.com</b>, representing the fictitious Contoso Corporation.
|
||||
- **MDT01** is a domain member server in contoso.com with a data (D:) drive that can store at least 200GB. MDT01 will host deployment shares and run the Windows Deployment Service. Optionally, MDT01 is also a WSUS server.
|
||||
- A second MDT server (**MDT02**) configured identically to MDT01 is optionally used to [build a distributed environment](build-a-distributed-environment-for-windows-10-deployment.md) for Windows 10 deployment. This server is located on a different subnet than MDT01 and has a different default gateway.
|
||||
For the purposes of this article, we'll use three server computers: **DC01**, **MDT01**, and **HV01**.
|
||||
|
||||
- All servers are running Windows Server 2019.
|
||||
|
||||
- You can use an earlier version of Windows Server with minor modifications to some procedures.
|
||||
|
||||
- **DC01** is a domain controller, DHCP server, and DNS server for **contoso.com**, representing the fictitious Contoso Corporation.
|
||||
|
||||
- **MDT01** is a domain member server in contoso.com with a data (D:) drive that can store at least 200 GB. MDT01 will host deployment shares and run the Windows Deployment Service. Optionally, MDT01 is also a WSUS server.
|
||||
|
||||
- A second MDT server (**MDT02**) configured identically to MDT01 is optionally used to [build a distributed environment](build-a-distributed-environment-for-windows-10-deployment.md) for Windows 10 deployment. This server is located on a different subnet than MDT01 and has a different default gateway.
|
||||
|
||||
- **HV01** is a Hyper-V host computer that is used to build a Windows 10 reference image.
|
||||
- See [Hyper-V requirements](#hyper-v-requirements) below for more information about HV01.
|
||||
- See [Hyper-V requirements](#hyper-v-requirements) below for more information about HV01.
|
||||
|
||||
### Client computers
|
||||
|
||||
Several client computers are referenced in this guide with hostnames of PC0001 to PC0007.
|
||||
|
||||
- **PC0001**: A computer running Windows 10 Enterprise x64, fully patched with the latest security updates, and configured as a member in the contoso.com domain.
|
||||
- **PC0001**: A computer running Windows 10 Enterprise x64, fully patched with the latest security updates, and configured as a member in the contoso.com domain.
|
||||
|
||||
- Client name: PC0001
|
||||
- IP Address: DHCP
|
||||
- **PC0002**: A computer running Windows 7 SP1 Enterprise x64, fully patched with the latest security updates, and configured as a member in the contoso.com domain. This computer is referenced during the migration scenarios.
|
||||
|
||||
- **PC0002**: A computer running Windows 7 SP1 Enterprise x64, fully patched with the latest security updates, and configured as a member in the contoso.com domain. This computer is referenced during the migration scenarios.
|
||||
|
||||
- Client name: PC0002
|
||||
- IP Address: DHCP
|
||||
|
||||
- **PC0003 - PC0007**: These are other client computers similar to PC0001 and PC0002 that are used in this guide and another guide for various scenarios. The device names are incremented for clarity within each scenario. For example, PC0003 and PC0004 are running Windows 7 just like PC0002, but are used for Configuration Manager refresh and replace scenarios, respectively.
|
||||
|
||||
### Storage requirements
|
||||
|
||||
MDT01 and HV01 should have the ability to store up to 200 GB of files on a data drive (D:). If you use a computer with a single system partition (C:), you will need to adjust some procedures in this guide to specify the C: drive instead of the D: drive.
|
||||
MDT01 and HV01 should have the ability to store up to 200 GB of files on a data drive (D:). If you use a computer with a single system partition (C:), you'll need to adjust some procedures in this guide to specify the C: drive instead of the D: drive.
|
||||
|
||||
### Hyper-V requirements
|
||||
|
||||
If you do not have access to a Hyper-V server, you can install Hyper-V on a Windows 10 or Windows 8.1 computer temporarily to use for building reference images. For instructions on how to enable Hyper-V on Windows 10, see the [Verify support and install Hyper-V](../windows-10-poc.md#verify-support-and-install-hyper-v) section in the Windows 10 deployment test lab guide. This guide is a proof-of-concept guide that has detailed instructions for installing Hyper-V.
|
||||
If you don't have access to a Hyper-V server, you can install Hyper-V on a Windows 10 or Windows 8.1 computer temporarily to use for building reference images. For instructions on how to enable Hyper-V on Windows 10, see the [Verify support and install Hyper-V](../windows-10-poc.md#verify-support-and-install-hyper-v) section in the Windows 10 deployment test lab guide. This guide is a proof-of-concept guide that has detailed instructions for installing Hyper-V.
|
||||
|
||||
### Network requirements
|
||||
|
||||
All server and client computers referenced in this guide are on the same subnet. This is not required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates.
|
||||
All server and client computers referenced in this guide are on the same subnet. This isn't required, but each server and client computer must be able to connect to each other to share files, and to resolve all DNS names and Active Directory information for the contoso.com domain. Internet connectivity is also required to download OS and application updates.
|
||||
|
||||
### Domain credentials
|
||||
|
||||
The following generic credentials are used in this guide. You should replace these credentials as they appear in each procedure with your credentials.
|
||||
|
||||
**Active Directory domain name**: contoso.com<br>
|
||||
**Domain administrator username**: administrator<br>
|
||||
**Domain administrator password**: pass@word1
|
||||
- **Active Directory domain name**: contoso.com
|
||||
- **Domain administrator username**: administrator
|
||||
- **Domain administrator password**: pass@word1
|
||||
|
||||
### Organizational unit structure
|
||||
|
||||
@ -77,34 +91,40 @@ These steps assume that you have the MDT01 member server running and configured
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
Visit the [Download and install the Windows ADK](/windows-hardware/get-started/adk-install) page and download the following items to the **D:\\Downloads\\ADK** folder on MDT01 (you will need to create this folder):
|
||||
Visit the [Download and install the Windows ADK](/windows-hardware/get-started/adk-install) page and download the following items to the **D:\\Downloads\\ADK** folder on MDT01 (you'll need to create this folder):
|
||||
|
||||
- [The Windows ADK for Windows 10](https://go.microsoft.com/fwlink/?linkid=2086042)
|
||||
- [The Windows PE add-on for the ADK](https://go.microsoft.com/fwlink/?linkid=2087112)
|
||||
- [The Windows System Image Manager (WSIM) 1903 update](https://go.microsoft.com/fwlink/?linkid=2095334)
|
||||
- (Optional) [The MDT_KB4564442 patch for BIOS firmware](https://download.microsoft.com/download/3/0/6/306AC1B2-59BE-43B8-8C65-E141EF287A5E/KB4564442/MDT_KB4564442.exe)
|
||||
- This patch is needed to resolve a bug that causes detection of BIOS-based machines as UEFI-based machines. If you have a UEFI deployment, you do not need this patch.
|
||||
- This patch is needed to resolve a bug that causes detection of BIOS-based machines as UEFI-based machines. If you have a UEFI deployment, you don't need this patch.
|
||||
|
||||
>[!TIP]
|
||||
>You might need to temporarily disable IE Enhanced Security Configuration for administrators in order to download files from the Internet to the server. This setting can be disabled by using Server Manager (Local Server/Properties).
|
||||
> [!TIP]
|
||||
> You might need to temporarily disable IE Enhanced Security Configuration for administrators in order to download files from the Internet to the server. This setting can be disabled by using Server Manager (Local Server/Properties).
|
||||
|
||||
1. On **MDT01**, ensure that you're signed in as an administrator in the CONTOSO domain.
|
||||
|
||||
- For the purposes of this guide, we're using a Domain Admin account of **administrator** with a password of **pass@word1**. You can use your own administrator username and password as long as you properly adjust all steps in this guide that use these login credentials.
|
||||
|
||||
2. Start the **ADK Setup** (D:\\Downloads\\ADK\\adksetup.exe), select **Next** twice to accept the default installation parameters, select **Accept** to accept the license agreement, and then on the **Select the features you want to install** page accept the default list of features by clicking **Install**. This will install deployment tools and the USMT. Verify that the installation completes successfully before moving to the next step.
|
||||
|
||||
3. Start the **WinPE Setup** (D:\\Downloads\\ADK\\adkwinpesetup.exe), select **Next** twice to accept the default installation parameters, select **Accept** to accept the license agreement, and then on the **Select the features you want to install** page select **Install**. This will install Windows PE for x86, AMD64, ARM, and ARM64. Verify that the installation completes successfully before moving to the next step.
|
||||
|
||||
1. On **MDT01**, ensure that you are signed in as an administrator in the CONTOSO domain.
|
||||
- For the purposes of this guide, we are using a Domain Admin account of **administrator** with a password of <b>pass@word1</b>. You can use your own administrator username and password as long as you properly adjust all steps in this guide that use these login credentials.
|
||||
2. Start the **ADK Setup** (D:\\Downloads\\ADK\\adksetup.exe), click **Next** twice to accept the default installation parameters, click **Accept** to accept the license agreement, and then on the **Select the features you want to install** page accept the default list of features by clicking **Install**. This will install deployment tools and the USMT. Verify that the installation completes successfully before moving to the next step.
|
||||
3. Start the **WinPE Setup** (D:\\Downloads\\ADK\\adkwinpesetup.exe), click **Next** twice to accept the default installation parameters, click **Accept** to accept the license agreement, and then on the **Select the features you want to install** page click **Install**. This will install Windows PE for x86, AMD64, ARM, and ARM64. Verify that the installation completes successfully before moving to the next step.
|
||||
4. Extract the **WSIM 1903 update** (D:\\Downloads\ADK\\WSIM1903.zip) and then run the **UpdateWSIM.bat** file.
|
||||
- You can confirm that the update is applied by viewing properties of the ImageCat.exe and ImgMgr.exe files at **C:\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Deployment Tools\\WSIM** and verifying that the **Details** tab displays a **File version** of **10.0.18362.144** or later.
|
||||
5. If you downloaded the optional MDT_KB4564442 patch for BIOS based deployment, see [this support article](https://support.microsoft.com/en-us/topic/windows-10-deployments-fail-with-microsoft-deployment-toolkit-on-computers-with-bios-type-firmware-70557b0b-6be3-81d2-556f-b313e29e2cb7) for instructions on how to install the patch.
|
||||
|
||||
5. If you downloaded the optional MDT_KB4564442 patch for BIOS based deployment, see [this support article](https://support.microsoft.com/topic/windows-10-deployments-fail-with-microsoft-deployment-toolkit-on-computers-with-bios-type-firmware-70557b0b-6be3-81d2-556f-b313e29e2cb7) for instructions on how to install the patch.
|
||||
|
||||
## Install and initialize Windows Deployment Services (WDS)
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Open an elevated Windows PowerShell prompt and enter the following command:
|
||||
|
||||
|
||||
```powershell
|
||||
Install-WindowsFeature -Name WDS -IncludeManagementTools
|
||||
WDSUTIL /Verbose /Progress /Initialize-Server /Server:MDT01 /RemInst:"D:\RemoteInstall"
|
||||
WDSUTIL /Set-Server /AnswerClients:All
|
||||
WDSUTIL.exe /Verbose /Progress /Initialize-Server /Server:MDT01 /RemInst:"D:\RemoteInstall"
|
||||
WDSUTIL.exe /Set-Server /AnswerClients:All
|
||||
```
|
||||
|
||||
## Optional: Install Windows Server Update Services (WSUS)
|
||||
@ -113,26 +133,32 @@ If you wish to use MDT as a WSUS server using the Windows Internal Database (WID
|
||||
|
||||
To install WSUS on MDT01, enter the following at an elevated Windows PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
Install-WindowsFeature -Name UpdateServices, UpdateServices-WidDB, UpdateServices-Services, UpdateServices-RSAT, UpdateServices-API, UpdateServices-UI
|
||||
cmd /c "C:\Program Files\Update Services\Tools\wsusutil.exe" postinstall CONTENT_DIR=C:\WSUS
|
||||
```
|
||||
```powershell
|
||||
Install-WindowsFeature -Name UpdateServices, UpdateServices-WidDB, UpdateServices-Services, UpdateServices-RSAT, UpdateServices-API, UpdateServices-UI
|
||||
"C:\Program Files\Update Services\Tools\wsusutil.exe" postinstall CONTENT_DIR=C:\WSUS
|
||||
```
|
||||
|
||||
>To use the WSUS that you have installed on MDT01, you must also [configure Group Policy](../update/waas-manage-updates-wsus.md#configure-automatic-updates-and-update-service-location) on DC01 and perform the neccessary post-installation configuration of WSUS on MDT01.
|
||||
> [!NOTE]
|
||||
> To use the WSUS that you have installed on MDT01, you must also [configure Group Policy](../update/waas-manage-updates-wsus.md#configure-automatic-updates-and-update-service-location) on DC01 and perform the necessary post-installation configuration of WSUS on MDT01.
|
||||
|
||||
## Install MDT
|
||||
|
||||
>[!NOTE]
|
||||
>MDT installation requires the following:
|
||||
>- The Windows ADK for Windows 10 (installed in the previous procedure)
|
||||
>- Windows PowerShell ([version 5.1](https://www.microsoft.com/download/details.aspx?id=54616) is recommended; type **$host** to check)
|
||||
>- Microsoft .NET Framework
|
||||
> [!NOTE]
|
||||
> MDT installation requires the following:
|
||||
>
|
||||
> - The Windows ADK for Windows 10 (installed in the previous procedure)
|
||||
> - Windows PowerShell ([version 5.1](https://www.microsoft.com/download/details.aspx?id=54616) is recommended; enter `$host` to check)
|
||||
> - Microsoft .NET Framework
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Visit the [MDT resource page](/mem/configmgr/mdt/) and click **Download MDT**.
|
||||
2. Save the **MicrosoftDeploymentToolkit_x64.msi** file to the D:\\Downloads\\MDT folder on MDT01.
|
||||
- **Note**: As of the publishing date for this guide, the current version of MDT is 8456 (6.3.8456.1000), but a later version will also work.
|
||||
1. Visit the [MDT resource page](/mem/configmgr/mdt/) and select **Download MDT**.
|
||||
|
||||
2. Save the **MicrosoftDeploymentToolkit_x64.msi** file to the D:\\Downloads\\MDT folder on MDT01.
|
||||
|
||||
> [!NOTE]
|
||||
> As of the publishing date for this guide, the current version of MDT is 8456 (6.3.8456.1000), but a later version will also work.
|
||||
|
||||
3. Install **MDT** (D:\\Downloads\\MDT\\MicrosoftDeploymentToolkit_x64.exe) with the default settings.
|
||||
|
||||
## Create the OU structure
|
||||
@ -157,7 +183,7 @@ Workstations,"OU=Computers,OU=Contoso,DC=CONTOSO,DC=COM"
|
||||
Security Groups,"OU=Groups,OU=Contoso,DC=CONTOSO,DC=COM"
|
||||
```
|
||||
|
||||
Next, copy the following commands into a file and save it as `~\Setup\Scripts\ou.ps1`. Be sure that you are viewing file extensions and that you save the file with the `.ps1` extension.
|
||||
Next, copy the following commands into a file and save it as `~\Setup\Scripts\ou.ps1`. Be sure that you're viewing file extensions and that you save the file with the `.ps1` extension.
|
||||
|
||||
```powershell
|
||||
Import-CSV -Path $home\Setup\Scripts\oulist.csv | ForEach-Object {
|
||||
@ -182,20 +208,27 @@ To use the Active Directory Users and Computers console (instead of PowerShell):
|
||||
|
||||
On **DC01**:
|
||||
|
||||
1. Using the Active Directory Users and Computers console (dsa.msc), in the contoso.com domain level, create a top-level OU named **Contoso**.
|
||||
2. In the **Contoso** OU, create the following OUs:
|
||||
1. Accounts
|
||||
2. Computers
|
||||
3. Groups
|
||||
3. In the **Contoso / Accounts** OU, create the following underlying OUs:
|
||||
1. Admins
|
||||
2. Service Accounts
|
||||
3. Users
|
||||
4. In the **Contoso / Computers** OU, create the following underlying OUs:
|
||||
1. Servers
|
||||
2. Workstations
|
||||
5. In the **Contoso / Groups** OU, create the following OU:
|
||||
1. Security Groups
|
||||
1. Using the Active Directory Users and Computers console (dsa.msc), in the contoso.com domain level, create a top-level OU named **Contoso**.
|
||||
|
||||
2. In the **Contoso** OU, create the following OUs:
|
||||
|
||||
- Accounts
|
||||
- Computers
|
||||
- Groups
|
||||
|
||||
3. In the **Contoso / Accounts** OU, create the following underlying OUs:
|
||||
|
||||
- Admins
|
||||
- Service Accounts
|
||||
- Users
|
||||
|
||||
4. In the **Contoso / Computers** OU, create the following underlying OUs:
|
||||
|
||||
- Servers
|
||||
- Workstations
|
||||
|
||||
5. In the **Contoso / Groups** OU, create the following OU:
|
||||
- Security Groups
|
||||
|
||||
The final result of either method is shown below. The **MDT_BA** account will be created next.
|
||||
|
||||
@ -208,16 +241,18 @@ To create an MDT build account, open an elevated Windows PowerShell prompt on DC
|
||||
```powershell
|
||||
New-ADUser -Name MDT_BA -UserPrincipalName MDT_BA -path "OU=Service Accounts,OU=Accounts,OU=Contoso,DC=CONTOSO,DC=COM" -Description "MDT Build Account" -AccountPassword (ConvertTo-SecureString "pass@word1" -AsPlainText -Force) -ChangePasswordAtLogon $false -PasswordNeverExpires $true -Enabled $true
|
||||
```
|
||||
|
||||
If you have the Active Directory Users and Computers console open you can refresh the view and see this new account in the **Contoso\Accounts\Service Accounts** OU as shown in the screenshot above.
|
||||
|
||||
## Create and share the logs folder
|
||||
|
||||
By default MDT stores the log files locally on the client. In order to capture a reference image, you will need to enable server-side logging and, to do that, you will need to have a folder in which to store the logs. For more information, see [Create a Windows 10 reference image](create-a-windows-10-reference-image.md).
|
||||
By default MDT stores the log files locally on the client. In order to capture a reference image, you'll need to enable server-side logging and, to do that, you'll need to have a folder in which to store the logs. For more information, see [Create a Windows 10 reference image](create-a-windows-10-reference-image.md).
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Sign in as **CONTOSO\\administrator**.
|
||||
2. Create and share the **D:\\Logs** folder by running the following commands in an elevated Windows PowerShell prompt:
|
||||
1. Sign in as **CONTOSO\\administrator**.
|
||||
|
||||
2. Create and share the **D:\\Logs** folder by running the following commands in an elevated Windows PowerShell prompt:
|
||||
|
||||
```powershell
|
||||
New-Item -Path D:\Logs -ItemType directory
|
||||
@ -231,7 +266,7 @@ See the following example:
|
||||
|
||||
## Use CMTrace to read log files (optional)
|
||||
|
||||
The log files in MDT Lite Touch are formatted to be read by Configuration Manager Trace ([CMTrace](/sccm/core/support/cmtrace)), which is available as part of the [Microsoft System 2012 R2 Center Configuration Manager Toolkit](https://go.microsoft.com/fwlink/p/?LinkId=734717). You should also download this tool.
|
||||
The log files in MDT Lite Touch are formatted to be read by Configuration Manager Trace ([CMTrace](/sccm/core/support/cmtrace)), which is available as part of the [Microsoft System 2012 R2 Center Configuration Manager Toolkit](https://go.microsoft.com/fwlink/p/?LinkId=734717). You should also download this tool.
|
||||
You can use Notepad (example below):
|
||||
|
||||

|
||||
@ -244,12 +279,13 @@ After installing the ConfigMgrTools.msi file, you can search for **cmtrace** and
|
||||
|
||||
## Next steps
|
||||
|
||||
When you have completed all the steps in this section to prepare for deployment, see [Create a Windows 10 reference image](create-a-windows-10-reference-image.md).
|
||||
When you've completed all the steps in this section to prepare for deployment, see [Create a Windows 10 reference image](create-a-windows-10-reference-image.md).
|
||||
|
||||
## Appendix
|
||||
|
||||
**Sample files**
|
||||
### Sample files
|
||||
|
||||
The following sample files are also available to help automate some MDT deployment tasks. This guide doesn't use these files, but they're made available here so you can see how some tasks can be automated with Windows PowerShell.
|
||||
|
||||
The following sample files are also available to help automate some MDT deployment tasks. This guide does not use these files, but they are made available here so you can see how some tasks can be automated with Windows PowerShell.
|
||||
- [Set-OUPermissions.ps1](https://go.microsoft.com/fwlink/p/?LinkId=619362). This sample Windows PowerShell script creates a domain account and then configures OU permissions to allow the account to join machines to the domain in the specified OU.
|
||||
- [MDTSample.zip](https://go.microsoft.com/fwlink/p/?LinkId=619363). This sample web service shows you how to configure a computer name dynamically using MDT.
|
||||
|
@ -1,114 +1,122 @@
|
||||
---
|
||||
title: Refresh a Windows 7 computer with Windows 10 (Windows 10)
|
||||
description: This topic will show you how to use MDT Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the computer refresh process.
|
||||
description: This article will show you how to use MDT Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the computer refresh process.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Refresh a Windows 7 computer with Windows 10
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
**Applies to:**
|
||||
|
||||
This topic will show you how to use MDT Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the online computer refresh process. The computer refresh scenario is a reinstallation of an updated operating system on the same computer. You can also use this procedure to reinstall the same OS version. In this article, the computer refresh will be done while the computer is online. MDT also supports an offline computer refresh. For more info on that scenario, see the USMTOfflineMigration property on the [MDT resource page](/mem/configmgr/mdt/).
|
||||
- Windows 10
|
||||
|
||||
This article will show you how to use MDT Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the online computer refresh process. The computer refresh scenario is a reinstallation of an updated operating system on the same computer. You can also use this procedure to reinstall the same OS version. In this article, the computer refresh will be done while the computer is online. MDT also supports an offline computer refresh. For more info on that scenario, see the USMTOfflineMigration property on the [MDT resource page](/mem/configmgr/mdt/).
|
||||
|
||||
For the purposes of this article, we'll use three computers: DC01, MDT01, and PC0001.
|
||||
|
||||
For the purposes of this topic, we'll use three computers: DC01, MDT01, and PC0001.
|
||||
- DC01 is a domain controller for the contoso.com domain.
|
||||
- MDT01 is domain member server that hosts your deployment share.
|
||||
- PC0001 is a domain member computer running a previous version of Windows that is going to be refreshed to a new version of Windows 10, with data and settings restored. The example used here is a computer running Windows 7 SP1.
|
||||
- PC0001 is a domain member computer running a previous version of Windows that is going to be refreshed to a new version of Windows 10, with data and settings restored. The example used here is a computer running Windows 7 SP1.
|
||||
|
||||
Both DC01 and MDT01 are running Windows Server 2019; however any supported version of Windows Server can be used. For more details on the setup for this topic, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
Both DC01 and MDT01 are running Windows Server 2019; however any supported version of Windows Server can be used. For more information on the setup for this article, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||

|
||||
|
||||
The computers used in this topic.
|
||||
The computers used in this article.
|
||||
|
||||
## The computer refresh process
|
||||
|
||||
A computer refresh isn't the same as an in-place upgrade because a computer refresh involves exporting user data and settings then wiping the device before installing a fresh OS and restoring the user's data and settings.
|
||||
|
||||
For a computer refresh with MDT, you use the User State Migration Tool (USMT), which is part of the Windows Assessment and Deployment Kit (ADK) for Windows 10, to migrate user data and settings. To complete a computer refresh, you will:
|
||||
For a computer refresh with MDT, you use the User State Migration Tool (USMT), which is part of the Windows Assessment and Deployment Kit (ADK) for Windows 10, to migrate user data and settings. To complete a computer refresh, you will:
|
||||
|
||||
1. Back up data and settings locally, in a backup folder.
|
||||
2. Wipe the partition, except for the backup folder.
|
||||
3. Apply the new operating system image.
|
||||
4. Install other applications.
|
||||
5. Restore data and settings.
|
||||
1. Back up data and settings locally, in a backup folder.
|
||||
2. Wipe the partition, except for the backup folder.
|
||||
3. Apply the new operating system image.
|
||||
4. Install other applications.
|
||||
5. Restore data and settings.
|
||||
|
||||
During the computer refresh, USMT uses a feature called Hard-Link Migration Store. When you use this feature, the files are linked in the file system, which allows for fast migration, even when there's a lot of data.
|
||||
During the computer refresh, USMT uses a feature called Hard-Link Migration Store. When you use this feature, the files are linked in the file system, which allows for fast migration, even when there's many files.
|
||||
|
||||
> [!NOTE]
|
||||
> In addition to the USMT backup, you can enable an optional full Windows Imaging (WIM) backup of the machine by configuring the MDT rules. If you do this, a .wim file is created in addition to the USMT backup. The .wim file contains the entire volume from the computer and helpdesk personnel can extract content from it if needed. Please note that this is a data WIM backup only. Using this backup to restore the entire computer is not a supported scenario.
|
||||
|
||||
>[!NOTE]
|
||||
>In addition to the USMT backup, you can enable an optional full Windows Imaging (WIM) backup of the machine by configuring the MDT rules. If you do this, a .wim file is created in addition to the USMT backup. The .wim file contains the entire volume from the computer and helpdesk personnel can extract content from it if needed. Please note that this is a data WIM backup only. Using this backup to restore the entire computer is not a supported scenario.
|
||||
|
||||
### Multi-user migration
|
||||
|
||||
By default, ScanState in USMT backs up all profiles on the machine, including local computer profiles. If you have a computer that has been in your environment for a while, it likely has several domain-based profiles on it, including those of former users. You can limit which profiles are backed up by configuring command-line switches to ScanState (added as rules in MDT).
|
||||
|
||||
For example, the following line configures USMT to migrate only domain user profiles and not profiles from the local SAM account database: ScanStateArgs=/ue:\*\\\* /ui:CONTOSO\\\*
|
||||
For example, the following line configures USMT to migrate only domain user profiles and not profiles from the local SAM account database: `ScanStateArgs=/ue:*\* /ui:CONTOSO\*`
|
||||
|
||||
> [!NOTE]
|
||||
> You also can combine the preceding switches with the /uel switch, which excludes profiles that have not been accessed within a specific number of days. For example, adding /uel:60 will configure ScanState (or LoadState) not to include profiles that haven't been accessed for more than 60 days.
|
||||
|
||||
>[!NOTE]
|
||||
>You also can combine the preceding switches with the /uel switch, which excludes profiles that have not been accessed within a specific number of days. For example, adding /uel:60 will configure ScanState (or LoadState) not to include profiles that haven't been accessed for more than 60 days.
|
||||
|
||||
### Support for additional settings
|
||||
|
||||
In addition to the command-line switches that control which profiles to migrate, [XML templates](../usmt/understanding-migration-xml-files.md) control exactly what data is being migrated. You can control data within and outside the user profiles.
|
||||
|
||||
### Multicast
|
||||
|
||||
Multicast is a technology designed to optimize simultaneous deployment to multiple devices. If you have a limited number of simultaneous deployments, you should disable multicast which was [configured in a previous procedure](deploy-a-windows-10-image-using-mdt.md#set-up-mdt-for-multicast) in this guide. Disabling multicast will speed up deployment for a small number of computers. You'll need to update the deployment share after changing this setting.
|
||||
Multicast is a technology designed to optimize simultaneous deployment to multiple devices. If you have a limited number of simultaneous deployments, you should disable multicast which was [configured in a previous procedure](deploy-a-windows-10-image-using-mdt.md#set-up-mdt-for-multicast) in this guide. Disabling multicast will speed up deployment there are only a few computers. You'll need to update the deployment share after changing this setting.
|
||||
|
||||
## Refresh a Windows 7 SP1 client
|
||||
## Refresh a Windows 7 SP1 client
|
||||
|
||||
In this section, we assume that you've already performed the prerequisite procedures in the following topics, so that you have a deployment share named **MDTProduction$** on MDT01:
|
||||
In this section, we assume that you've already performed the prerequisite procedures in the following articles, so that you have a deployment share named **MDTProduction$** on MDT01:
|
||||
|
||||
- [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md)
|
||||
- [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
- [Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||
|
||||
It is also assumed that you have a domain member client computer named PC0001 in your environment running Windows 7, 8.1 or 10 that is ready for a refresh to the latest version of Windows 10. For demonstration purposes, we'll be refreshing a Windows 7 SP1 PC to Windows 10, version 1909.
|
||||
|
||||
### Upgrade (refresh) a Windows 7 SP1 client
|
||||
It's also assumed that you have a domain member client computer named PC0001 in your environment running Windows 7, 8.1 or 10 that is ready for a refresh to the latest version of Windows 10. For demonstration purposes, we'll be refreshing a Windows 7 SP1 PC to Windows 10, version 1909.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Domain join details [specified in the deployment share rules](deploy-a-windows-10-image-using-mdt.md#configure-the-rules) will be used to rejoin the computer to the domain during the refresh process. If the Windows 7 client is domain-jonied in a different OU than the one specified by MachineObjectOU, the domain join process will initially fail and then retry without specifying an OU. If the domain account that is specified (ex: **MDT_JD**) has [permissions limited to a specific OU](deploy-a-windows-10-image-using-mdt.md#step-1-configure-active-directory-permissions) then the domain join will ultimately fail, the refresh process will proceed, and the client computer object will be orphaned in Active Directory. In the current guide, computer objects should be located in Contoso > Computers > Workstations. Use the Active Directory Users and Computers console to review the location of computer objects and move them if needed. To diagnose MDT domain join errors, see **ZTIDomainJoin.log** in the C:\Windows\Temp\DeploymentLogs directory on the client computer.
|
||||
### Upgrade (refresh) a Windows 7 SP1 client
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Domain join details [specified in the deployment share rules](deploy-a-windows-10-image-using-mdt.md#configure-the-rules) will be used to rejoin the computer to the domain during the refresh process. If the Windows 7 client is domain-jonied in a different OU than the one specified by MachineObjectOU, the domain join process will initially fail and then retry without specifying an OU. If the domain account that is specified (ex: **MDT_JD**) has [permissions limited to a specific OU](deploy-a-windows-10-image-using-mdt.md#step-1-configure-active-directory-permissions) then the domain join will ultimately fail, the refresh process will proceed, and the client computer object will be orphaned in Active Directory. In the current guide, computer objects should be located in **Contoso** > **Computers** > **Workstations**. Use the Active Directory Users and Computers console to review the location of computer objects and move them if needed. To diagnose MDT domain join errors, see **ZTIDomainJoin.log** in the C:\Windows\Temp\DeploymentLogs directory on the client computer.
|
||||
|
||||
1. On PC0001, sign in as **contoso\\Administrator** and start the Lite Touch Deploy Wizard by opening **\\\\MDT01\\MDTProduction$\\Scripts\\Litetouch.vbs**.
|
||||
|
||||
1. On PC0001, sign in as **contoso\\Administrator** and start the Lite Touch Deploy Wizard by opening **\\\\MDT01\\MDTProduction$\\Scripts\\Litetouch.vbs**.
|
||||
2. Complete the deployment guide using the following settings:
|
||||
|
||||
* Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Custom Image
|
||||
* Computer name: <default>
|
||||
* Specify where to save a complete computer backup: Do not back up the existing computer
|
||||
>[!NOTE]
|
||||
>Skip this optional full WIM backup that we are choosing not to perform. The USMT backup will still run.
|
||||
* Select one or more applications to install: Install - Adobe Reader
|
||||
|
||||
- Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Custom Image
|
||||
|
||||
- **Computer name**: *\<default\>*
|
||||
|
||||
- **Specify where to save a complete computer backup**: Don't back up the existing computer
|
||||
|
||||
> [!NOTE]
|
||||
> Skip this optional full WIM backup that we are choosing not to perform. The USMT backup will still run.
|
||||
|
||||
- **Select one or more applications to install**: Install - Adobe Reader
|
||||
|
||||

|
||||
|
||||
4. Setup starts and does the following:
|
||||
|
||||
* Backs up user settings and data using USMT.
|
||||
* Installs the Windows 10 Enterprise x64 operating system.
|
||||
* Installs any added applications.
|
||||
* Updates the operating system using your local Windows Server Update Services (WSUS) server.
|
||||
* Restores user settings and data using USMT.
|
||||
3. Setup starts and performs the following actions:
|
||||
|
||||
5. You can monitor progress of the deployment using the deployment workbench on MDT01. See the following example:
|
||||
- Backs up user settings and data using USMT.
|
||||
- Installs the Windows 10 Enterprise x64 operating system.
|
||||
- Installs any added applications.
|
||||
- Updates the operating system using your local Windows Server Update Services (WSUS) server.
|
||||
- Restores user settings and data using USMT.
|
||||
|
||||
4. You can monitor progress of the deployment using the deployment workbench on MDT01. See the following example:
|
||||
|
||||

|
||||
|
||||
6. After the refresh process completes, sign in to the Windows 10 computer and verify that user accounts, data and settings were migrated.
|
||||
5. After the refresh process completes, sign in to the Windows 10 computer and verify that user accounts, data and settings were migrated.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)<br>
|
||||
[Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md)<br>
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)<br>
|
||||
[Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)<br>
|
||||
[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)<br>
|
||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)<br>
|
||||
[Configure MDT settings](configure-mdt-settings.md)
|
||||
- [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
- [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md)
|
||||
- [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
- [Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||
- [Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
||||
- [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
- [Configure MDT settings](configure-mdt-settings.md)
|
||||
|
@ -3,32 +3,35 @@ title: Replace a Windows 7 computer with a Windows 10 computer (Windows 10)
|
||||
description: In this article, you'll learn how to replace a Windows 7 device with a Windows 10 device.
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Replace a Windows 7 computer with a Windows 10 computer
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
**Applies to:**
|
||||
|
||||
A computer replace scenario for Windows 10 is similar to a computer refresh for Windows 10. However, because you're replacing a device, you can't store the backup on the old computer. Instead you need to store the backup to a location where the new computer can read it. The User State Migration Tool (USMT) will be used to back up and restore data and settings.
|
||||
- Windows 10
|
||||
|
||||
A computer replace scenario for Windows 10 is similar to a computer refresh for Windows 10. However, because you're replacing a device, you can't store the backup on the old computer. Instead you need to store the backup to a location where the new computer can read it. The User State Migration Tool (USMT) will be used to back up and restore data and settings.
|
||||
|
||||
For the purposes of this article, we'll use four computers: DC01, MDT01, PC0002, and PC0007.
|
||||
|
||||
For the purposes of this topic, we'll use four computers: DC01, MDT01, PC0002, and PC0007.
|
||||
- DC01 is a domain controller for the contoso.com domain.
|
||||
- MDT01 is domain member server that hosts your deployment share.
|
||||
- PC0002 is an old computer running Windows 7 SP1 that will be replaced by PC0007.
|
||||
- PC0002 is an old computer running Windows 7 SP1 that will be replaced by PC0007.
|
||||
- PC0007 is a new computer will have the Windows 10 OS installed prior to data from PC0002 being migrated. Both PC0002 and PC0007 are members of the contoso.com domain.
|
||||
|
||||
For more details on the setup for this topic, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
For more details on the setup for this article, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||

|
||||
|
||||
The computers used in this topic.
|
||||
The computers used in this article.
|
||||
|
||||
>HV01 is also used in this topic to host the PC0007 virtual machine for demonstration purposes, however typically PC0007 is a physical computer.
|
||||
|
||||
@ -41,7 +44,9 @@ The computers used in this topic.
|
||||
On **MDT01**:
|
||||
|
||||
1. Open the Deployment Workbench, under **Deployment Shares** right-click **MDT Production**, select **Properties**, and then select the **Rules** tab.
|
||||
|
||||
2. Change the **SkipUserData=YES** option to **NO**, and select **OK**.
|
||||
|
||||
3. Right-click on **MDT Production** and select **Update Deployment Share**. Then select **Next**, **Next**, and **Finish** to complete the Update Deployment Share Wizard with the default settings.
|
||||
|
||||
### Create and share the MigData folder
|
||||
@ -49,23 +54,25 @@ On **MDT01**:
|
||||
On **MDT01**:
|
||||
|
||||
1. Create and share the **D:\\MigData** folder by running the following three commands in an elevated Windows PowerShell prompt:
|
||||
``` powershell
|
||||
|
||||
```powershell
|
||||
New-Item -Path D:\MigData -ItemType directory
|
||||
New-SmbShare -Name MigData$ -Path D:\MigData -ChangeAccess EVERYONE
|
||||
icacls D:\MigData /grant '"MDT_BA":(OI)(CI)(M)'
|
||||
```
|
||||
### Create a backup only (replace) task sequence
|
||||
|
||||
2. In Deployment Workbench, under the **MDT Production** deployment share, select the **Task Sequences** node and create a new folder named **Other**.
|
||||
### Create a backup only (replace) task sequence
|
||||
|
||||
3. Right-click the **Other** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
1. In Deployment Workbench, under the **MDT Production** deployment share, select the **Task Sequences** node and create a new folder named **Other**.
|
||||
|
||||
* Task sequence ID: REPLACE-001
|
||||
* Task sequence name: Backup Only Task Sequence
|
||||
* Task sequence comments: Run USMT to backup user data and settings
|
||||
* Template: Standard Client Replace Task Sequence
|
||||
2. Right-click the **Other** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
|
||||
4. In the **Other** folder, double-click **Backup Only Task Sequence**, and then in the **Task Sequence** tab, review the sequence. Notice that it only contains a subset of the normal client task sequence actions.
|
||||
- Task sequence ID: REPLACE-001
|
||||
- Task sequence name: Backup Only Task Sequence
|
||||
- Task sequence comments: Run USMT to back up user data and settings
|
||||
- Template: Standard Client Replace Task Sequence
|
||||
|
||||
3. In the **Other** folder, double-click **Backup Only Task Sequence**, and then in the **Task Sequence** tab, review the sequence. Notice that it only contains a subset of the normal client task sequence actions.
|
||||
|
||||

|
||||
|
||||
@ -73,38 +80,41 @@ On **MDT01**:
|
||||
|
||||
## Perform the computer replace
|
||||
|
||||
During a computer replace, these are the high-level steps that occur:
|
||||
During a computer replace, the following are the high-level steps that occur:
|
||||
|
||||
1. On the computer you're replacing, a special replace task sequence runs the USMT backup and, if you configured it, runs the optional full Windows Imaging (WIM) backup.
|
||||
2. On the new computer, you perform a standard bare-metal deployment. At the end of the bare-metal deployment, the USMT backup from the old computer is restored.
|
||||
1. On the computer you're replacing, a special replace task sequence runs the USMT backup and, if you configured it, runs the optional full Windows Imaging (WIM) backup.
|
||||
|
||||
2. On the new computer, you perform a standard bare-metal deployment. At the end of the bare-metal deployment, the USMT backup from the old computer is restored.
|
||||
|
||||
### Run the replace task sequence
|
||||
|
||||
On **PC0002**:
|
||||
|
||||
1. Sign in as **CONTOSO\\Administrator** and verify that you have write access to the **\\\\MDT01\\MigData$** share.
|
||||
2. Run **\\\\MDT01\\MDTProduction$\\Scripts\\LiteTouch.vbs**.
|
||||
3. Complete the Windows Deployment Wizard using the following settings:
|
||||
1. Sign in as **CONTOSO\\Administrator** and verify that you have write access to the **\\\\MDT01\\MigData$** share.
|
||||
|
||||
1. Select a task sequence to execute on this computer: Backup Only Task Sequence
|
||||
* Specify where to save your data and settings: Specify a location
|
||||
* Location: \\\\MDT01\\MigData$\\PC0002
|
||||
|
||||
>[!NOTE]
|
||||
>If you are replacing the computer at a remote site you should create the MigData folder on MDT02 and use that share instead.
|
||||
|
||||
2. Specify where to save a complete computer backup: Do not back up the existing computer
|
||||
2. Run **\\\\MDT01\\MDTProduction$\\Scripts\\LiteTouch.vbs**.
|
||||
|
||||
3. Complete the **Windows Deployment Wizard** using the following settings:
|
||||
|
||||
- **Select a task sequence to execute on this computer**: Backup Only Task Sequence
|
||||
|
||||
- **Specify where to save your data and settings**: Specify a location
|
||||
|
||||
- **Location**: \\\\MDT01\\MigData$\\PC0002
|
||||
|
||||
> [!NOTE]
|
||||
> If you are replacing the computer at a remote site you should create the MigData folder on MDT02 and use that share instead.
|
||||
|
||||
- **Specify where to save a complete computer backup**: Don't back up the existing computer
|
||||
|
||||
The task sequence will now run USMT (Scanstate.exe) to capture user data and settings of the computer.
|
||||
|
||||

|
||||
|
||||
The new task sequence running the Capture User State action on PC0002.
|
||||
|
||||
4. On **MDT01**, verify that you have an USMT.MIG compressed backup file in the **D:\\MigData\\PC0002\\USMT** folder.
|
||||
4. On **MDT01**, verify that you have a USMT.MIG compressed backup file in the **D:\\MigData\\PC0002\\USMT** folder.
|
||||
|
||||

|
||||
|
||||
The USMT backup of PC0002.
|
||||
|
||||
### Deploy the replacement computer
|
||||
@ -113,47 +123,47 @@ To demonstrate deployment of the replacement computer, HV01 is used to host a vi
|
||||
|
||||
On **HV01**:
|
||||
|
||||
1. Create a virtual machine with the following settings:
|
||||
1. Create a virtual machine with the following settings:
|
||||
|
||||
* Name: PC0007
|
||||
* Location: C:\\VMs
|
||||
* Generation: 2
|
||||
* Memory: 2048 MB
|
||||
* Hard disk: 60 GB (dynamic disk)
|
||||
* Install an operating system from a network-based installation server
|
||||
- **Name**: PC0007
|
||||
- **Location**: C:\\VMs
|
||||
- **Generation**: 2
|
||||
- **Memory**: 2048 MB
|
||||
- **Hard disk**: 60 GB (dynamic disk)
|
||||
- Install an operating system from a network-based installation server
|
||||
|
||||
2. Start the PC0007 virtual machine, and press **Enter** to start the Pre-Boot Execution Environment (PXE) boot. The VM will now load the Windows PE boot image from MDT01 (or MDT02 if at a remote site).
|
||||
2. Start the PC0007 virtual machine, and press **Enter** to start the Pre-Boot Execution Environment (PXE) boot. The VM will now load the Windows PE boot image from MDT01 (or MDT02 if at a remote site).
|
||||
|
||||

|
||||
|
||||
The initial PXE boot process of PC0007.
|
||||
|
||||
3. After Windows Preinstallation Environment (Windows PE) has booted, complete the Windows Deployment Wizard using the following settings:
|
||||
3. After Windows Preinstallation Environment (Windows PE) has booted, complete the Windows Deployment Wizard using the following settings:
|
||||
|
||||
* Select a task sequence to execute on this computer:
|
||||
* Windows 10 Enterprise x64 RTM Custom Image
|
||||
* Computer Name: PC0007
|
||||
* Move Data and Settings: Do not move user data and settings.
|
||||
* User Data (Restore) > Specify a location: \\\\MDT01\\MigData$\\PC0002
|
||||
* Applications: Adobe > Install - Adobe Reader
|
||||
- Select a task sequence to execute on this computer:
|
||||
- Windows 10 Enterprise x64 RTM Custom Image
|
||||
- **Computer Name**: PC0007
|
||||
- **Move Data and Settings**: Don't move user data and settings.
|
||||
- **User Data (Restore)** > **Specify a location**: \\\\MDT01\\MigData$\\PC0002
|
||||
- **Applications**: Adobe > Install - Adobe Reader
|
||||
|
||||
4. Setup now starts and does the following:
|
||||
4. Setup now starts and does the following actions:
|
||||
|
||||
* Partitions and formats the disk.
|
||||
* Installs the Windows 10 Enterprise operating system.
|
||||
* Installs the application.
|
||||
* Updates the operating system via your local Windows Server Update Services (WSUS) server.
|
||||
* Restores the USMT backup from PC0002.
|
||||
- Partitions and formats the disk.
|
||||
- Installs the Windows 10 Enterprise operating system.
|
||||
- Installs the application.
|
||||
- Updates the operating system via your local Windows Server Update Services (WSUS) server.
|
||||
- Restores the USMT backup from PC0002.
|
||||
|
||||
You can view progress of the process by clicking the Monitoring node in the Deployment Workbench on MDT01.
|
||||
|
||||

|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)<br>
|
||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)<br>
|
||||
[Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)<br>
|
||||
[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)<br>
|
||||
[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)<br>
|
||||
[Configure MDT settings](configure-mdt-settings.md)
|
||||
- [Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
- [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
- [Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||
- [Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
||||
- [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||
- [Configure MDT settings](configure-mdt-settings.md)
|
||||
|
@ -1,24 +1,27 @@
|
||||
---
|
||||
title: Set up MDT for BitLocker (Windows 10)
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
description: Learn how to configure your environment for BitLocker, the disk volume encryption built into Windows 10 Enterprise and Windows 10 Pro, using MDT.
|
||||
ms.prod: w10
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-mar2020
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Set up MDT for BitLocker
|
||||
|
||||
This topic will show you how to configure your environment for BitLocker, the disk volume encryption built into Windows 10 Enterprise and Windows 10 Pro, using MDT. BitLocker in Windows 10 has two requirements in regard to an operating system deployment:
|
||||
This article will show you how to configure your environment for BitLocker, the disk volume encryption built into Windows 10 Enterprise and Windows 10 Pro, using MDT. BitLocker in Windows 10 has two requirements in regard to an operating system deployment:
|
||||
|
||||
- A protector, which can either be stored in the Trusted Platform Module (TPM) chip, or stored as a password. Technically, you can also use a USB stick to store the protector, but it's not a practical approach as the USB stick can be lost or stolen. We, therefore, recommend that you instead use a TPM chip and/or a password.
|
||||
|
||||
- Multiple partitions on the hard drive.
|
||||
|
||||
To configure your environment for BitLocker, you will need to do the following:
|
||||
To configure your environment for BitLocker, you'll need to do the following actions:
|
||||
|
||||
1. Configure Active Directory for BitLocker.
|
||||
2. Download the various BitLocker scripts and tools.
|
||||
@ -27,16 +30,14 @@ To configure your environment for BitLocker, you will need to do the following:
|
||||
|
||||
> [!NOTE]
|
||||
> Even though it is not a BitLocker requirement, we recommend configuring BitLocker to store the recovery password in Active Directory. For more information about this feature, see [Backing Up BitLocker and TPM Recovery Information to AD DS](/windows/security/information-protection/tpm/backup-tpm-recovery-information-to-ad-ds).
|
||||
If you have access to Microsoft BitLocker Administration and Monitoring (MBAM), which is part of Microsoft Desktop Optimization Pack (MDOP), you have additional management features for BitLocker.
|
||||
>
|
||||
> If you have access to Microsoft BitLocker Administration and Monitoring (MBAM), which is part of Microsoft Desktop Optimization Pack (MDOP), you have additional management features for BitLocker.
|
||||
|
||||
> [!NOTE]
|
||||
> Backing up TPM to Active Directory was supported only on Windows 10 version 1507 and 1511.
|
||||
|
||||
For the purposes of this topic, we will use DC01, a domain controller that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, see [Deploy Windows 10 with the Microsoft Deployment Toolkit](./prepare-for-windows-deployment-with-mdt.md).
|
||||
For the purposes of this article, we'll use DC01, a domain controller that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more information on the setup for this article, see [Deploy Windows 10 with the Microsoft Deployment Toolkit](./prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||
## Configure Active Directory for BitLocker
|
||||
|
||||
To enable BitLocker to store the recovery key and TPM information in Active Directory, you need to create a Group Policy for it in Active Directory. For this section, we are running Windows Server 2012 R2, so you do not need to extend the Schema. You do, however, need to set the appropriate permissions in Active Directory.
|
||||
To enable BitLocker to store the recovery key and TPM information in Active Directory, you need to create a Group Policy for it in Active Directory. For this section, we're running Windows Server 2012 R2, so you don't need to extend the Schema. You do, however, need to set the appropriate permissions in Active Directory.
|
||||
|
||||
> [!NOTE]
|
||||
> Depending on the Active Directory Schema version, you might need to update the Schema before you can store BitLocker information in Active Directory.
|
||||
@ -51,19 +52,25 @@ The BitLocker Recovery information on a computer object in the contoso.com domai
|
||||
|
||||
The BitLocker Drive Encryption Administration Utilities are added as features via Server Manager (or Windows PowerShell):
|
||||
|
||||
1. On DC01, log on as **CONTOSO\\Administrator**, and, using Server Manager, click **Add roles and features**.
|
||||
2. On the **Before you begin** page, click **Next**.
|
||||
3. On the **Select installation type** page, select **Role-based or feature-based installation**, and click **Next**.
|
||||
4. On the **Select destination server** page, select **DC01.contoso.com** and click **Next**.
|
||||
5. On the **Select server roles** page, click **Next**.
|
||||
6. On the **Select features** page, expand **Remote Server Administration Tools**, expand **Feature Administration Tools**, select the following features, and then click **Next**:
|
||||
1. On DC01, log on as **CONTOSO\\Administrator**, and, using Server Manager, select **Add roles and features**.
|
||||
|
||||
2. On the **Before you begin** page, select **Next**.
|
||||
|
||||
3. On the **Select installation type** page, select **Role-based or feature-based installation**, and select **Next**.
|
||||
|
||||
4. On the **Select destination server** page, select **DC01.contoso.com** and select **Next**.
|
||||
|
||||
5. On the **Select server roles** page, select **Next**.
|
||||
|
||||
6. On the **Select features** page, expand **Remote Server Administration Tools**, expand **Feature Administration Tools**, select the following features, and then select **Next**:
|
||||
|
||||
1. BitLocker Drive Encryption Administration Utilities
|
||||
2. BitLocker Drive Encryption Tools
|
||||
3. BitLocker Recovery Password Viewer
|
||||
7. On the **Confirm installation selections** page, click **Install**, and then click **Close**.
|
||||
|
||||
7. On the **Confirm installation selections** page, select **Install**, and then select **Close**.
|
||||
|
||||

|
||||
|
||||
Selecting the BitLocker Drive Encryption Administration Utilities.
|
||||
|
||||
### Create the BitLocker Group Policy
|
||||
@ -71,32 +78,41 @@ Selecting the BitLocker Drive Encryption Administration Utilities.
|
||||
Following these steps, you enable the backup of BitLocker and TPM recovery information to Active Directory. You also enable the policy for the TPM validation profile.
|
||||
|
||||
1. On DC01, using Group Policy Management, right-click the **Contoso** organizational unit (OU), and select **Create a GPO in this domain, and Link it here**.
|
||||
|
||||
2. Assign the name **BitLocker Policy** to the new Group Policy.
|
||||
3. Expand the **Contoso** OU, right-click the **BitLocker Policy**, and select **Edit**. Configure the following policy settings:
|
||||
Computer Configuration / Policies / Administrative Templates / Windows Components / BitLocker Drive Encryption / Operating System Drives
|
||||
1. Enable the **Choose how BitLocker-protected operating system drives can be recovered** policy, and configure the following settings:
|
||||
1. Allow data recovery agent (default)
|
||||
2. Save BitLocker recovery information to Active Directory Domain Services (default)
|
||||
3. Do not enable BitLocker until recovery information is stored in AD DS for operating system drives
|
||||
2. Enable the **Configure TPM platform validation profile for BIOS-based firmware configurations** policy.
|
||||
3. Enable the **Configure TPM platform validation profile for native UEFI firmware configurations** policy.
|
||||
|
||||
3. Expand the **Contoso** OU, right-click the **BitLocker Policy**, and select **Edit**. Configure the following policy settings found under **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Operating System Drives**
|
||||
|
||||
1. Enable the **Choose how BitLocker-protected operating system drives can be recovered** policy, and configure the following settings:
|
||||
|
||||
- Allow data recovery agent (default)
|
||||
- Save BitLocker recovery information to Active Directory Domain Services (default)
|
||||
- Don't enable BitLocker until recovery information is stored in AD DS for operating system drives
|
||||
|
||||
2. Enable the **Configure TPM platform validation profile for BIOS-based firmware configurations** policy.
|
||||
|
||||
3. Enable the **Configure TPM platform validation profile for native UEFI firmware configurations** policy.
|
||||
|
||||
> [!NOTE]
|
||||
> If you consistently get the error "Windows BitLocker Drive Encryption Information. The system boot information has changed since BitLocker was enabled. You must supply a BitLocker recovery password to start this system." after encrypting a computer with BitLocker, you might have to change the various "Configure TPM platform validation profile" Group Policies, as well. Whether or not you need to do this will depend on the hardware you are using.
|
||||
> If you consistently get the error:
|
||||
>
|
||||
> **Windows BitLocker Drive Encryption Information. The system boot information has changed since BitLocker was enabled. You must supply a BitLocker recovery password to start this system.**
|
||||
>
|
||||
> after encrypting a computer with BitLocker, you might have to change the various **Configure TPM platform validation profile** Group Policies, as well. Whether or not you need to do this will depend on the hardware you are using.
|
||||
|
||||
### Set permissions in Active Directory for BitLocker
|
||||
|
||||
In addition to the Group Policy created previously, you need to configure permissions in Active Directory to be able to store the TPM recovery information. In these steps, we assume you have downloaded the [Add-TPMSelfWriteACE.vbs script](https://raw.githubusercontent.com/DeploymentArtist/DF4/master/BitLocker%20and%20TPM/Add-TPMSelfWriteACE.vbs) to C:\\Setup\\Scripts on DC01.
|
||||
In addition to the Group Policy created previously, you need to configure permissions in Active Directory to be able to store the TPM recovery information. In these steps, we assume you've downloaded the [Add-TPMSelfWriteACE.vbs script](https://raw.githubusercontent.com/DeploymentArtist/DF4/master/BitLocker%20and%20TPM/Add-TPMSelfWriteACE.vbs) to C:\\Setup\\Scripts on DC01.
|
||||
|
||||
1. On DC01, start an elevated PowerShell prompt (run as Administrator).
|
||||
|
||||
2. Configure the permissions by running the following command:
|
||||
|
||||
```dos
|
||||
cscript C:\Setup\Scripts\Add-TPMSelfWriteACE.vbs
|
||||
```cmd
|
||||
cscript.exe C:\Setup\Scripts\Add-TPMSelfWriteACE.vbs
|
||||
```
|
||||
|
||||

|
||||
|
||||
Running the Add-TPMSelfWriteACE.vbs script on DC01.
|
||||
|
||||
## Add BIOS configuration tools from Dell, HP, and Lenovo
|
||||
@ -109,9 +125,9 @@ If you want to automate enabling the TPM chip as part of the deployment process,
|
||||
|
||||
### Add tools from HP
|
||||
|
||||
The HP tools are part of HP System Software Manager. The executable file from HP is named BiosConfigUtility.exe. This utility uses a configuration file for the BIOS settings. Here is a sample command to enable TPM and set a BIOS password using the BiosConfigUtility.exe tool:
|
||||
The HP tools are part of HP System Software Manager. The executable file from HP is named BiosConfigUtility.exe. This utility uses a configuration file for the BIOS settings. Here's a sample command to enable TPM and set a BIOS password using the BiosConfigUtility.exe tool:
|
||||
|
||||
```dos
|
||||
```cmd
|
||||
BIOSConfigUtility.EXE /SetConfig:TPMEnable.REPSET /NewAdminPassword:Password1234
|
||||
```
|
||||
|
||||
@ -131,34 +147,37 @@ Embedded Security Device Availability
|
||||
|
||||
### Add tools from Lenovo
|
||||
|
||||
The Lenovo tools are a set of VBScripts available as part of the Lenovo BIOS Setup using Windows Management Instrumentation Deployment Guide. Lenovo also provides a separate download of the scripts. Here is a sample command to enable TPM using the Lenovo tools:
|
||||
The Lenovo tools are a set of VBScripts available as part of the Lenovo BIOS Setup using Windows Management Instrumentation Deployment Guide. Lenovo also provides a separate download of the scripts. Here's a sample command to enable TPM using the Lenovo tools:
|
||||
|
||||
```dos
|
||||
```cmd
|
||||
cscript.exe SetConfig.vbs SecurityChip Active
|
||||
```
|
||||
|
||||
## Configure the Windows 10 task sequence to enable BitLocker
|
||||
|
||||
When configuring a task sequence to run any BitLocker tool, either directly or using a custom script, it is helpful if you also add some logic to detect whether the BIOS is already configured on the machine. In the following task sequence, we are using a sample script (ZTICheckforTPM.wsf) from the Deployment Guys web page to check the status on the TPM chip. You can download this script from the Deployment Guys Blog post, [Check to see if the TPM is enabled](/archive/blogs/deploymentguys/check-to-see-if-the-tpm-is-enabled).
|
||||
When configuring a task sequence to run any BitLocker tool, either directly or using a custom script, it's helpful if you also add some logic to detect whether the BIOS is already configured on the machine. In the following task sequence, we're using a sample script (ZTICheckforTPM.wsf) from the Deployment Guys web page to check the status on the TPM chip. You can download this script from the Deployment Guys Blog post, [Check to see if the TPM is enabled](/archive/blogs/deploymentguys/check-to-see-if-the-tpm-is-enabled).
|
||||
|
||||
In the following task sequence, we added five actions:
|
||||
|
||||
- **Check TPM Status.** Runs the ZTICheckforTPM.wsf script to determine if TPM is enabled. Depending on the status, the script will set the TPMEnabled and TPMActivated properties to either true or false.
|
||||
- **Configure BIOS for TPM.** Runs the vendor tools (in this case, HP, Dell, and Lenovo). To ensure this action is run only when necessary, add a condition so the action is run only when the TPM chip is not already activated. Use the properties from the ZTICheckforTPM.wsf.
|
||||
|
||||
- **Configure BIOS for TPM.** Runs the vendor tools (in this case, HP, Dell, and Lenovo). To ensure this action is run only when necessary, add a condition so the action is run only when the TPM chip isn't already activated. Use the properties from the ZTICheckforTPM.wsf.
|
||||
|
||||
> [!NOTE]
|
||||
> It is common for organizations to wrap these tools in scripts to get additional logging and error handling.
|
||||
|
||||
- **Restart computer.** Self-explanatory, reboots the computer.
|
||||
|
||||
- **Check TPM Status.** Runs the ZTICheckforTPM.wsf script one more time.
|
||||
|
||||
- **Enable BitLocker.** Runs the built-in action to activate BitLocker.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)<br>
|
||||
[Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)<br>
|
||||
[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)<br>
|
||||
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)<br>
|
||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)<br>
|
||||
[Use web services in MDT](use-web-services-in-mdt.md)<br>
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
@ -1,23 +1,27 @@
|
||||
---
|
||||
title: Simulate a Windows 10 deployment in a test environment (Windows 10)
|
||||
description: This topic will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT.
|
||||
description: This article will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Simulate a Windows 10 deployment in a test environment
|
||||
|
||||
This topic will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT. When working with advanced settings and rules, especially those like database calls, it is most efficient to be able to test the settings without having to run through a complete deployment. Luckily, MDT enables you to perform a simulated deployment by running the Gather process by itself. The simulation works best when you are using a domain-joined client.
|
||||
This article will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT. When working with advanced settings and rules, especially those like database calls, it's most efficient to be able to test the settings without having to run through a complete deployment. Luckily, MDT enables you to perform a simulated deployment by running the Gather process by itself. The simulation works best when you're using a domain-joined client.
|
||||
|
||||
## Test environment
|
||||
|
||||
- A Windows 10 client named **PC0001** will be used to simulate deployment. The client is joined to the contoso.com domain and has access to the Internet to required download tools and scripts.
|
||||
- It is assumed that you have performed (at least) the following procedures so that you have an MDT service account and an MDT production deployment share:
|
||||
|
||||
- It's assumed that you've performed (at least) the following procedures so that you have an MDT service account and an MDT production deployment share:
|
||||
|
||||
- [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md)
|
||||
- [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
- [Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||
@ -27,6 +31,7 @@ This topic will walk you through the process of creating a simulated environment
|
||||
On **PC0001**:
|
||||
|
||||
1. Sign as **contoso\\Administrator**.
|
||||
|
||||
2. Copy the following to a PowerShell script named gather.ps1 and copy it to a directory named **C:\MDT** on PC0001.
|
||||
|
||||
```powershell
|
||||
@ -46,15 +51,22 @@ On **PC0001**:
|
||||
```
|
||||
|
||||
3. Download and install the free [Configuration Manager Toolkit](https://go.microsoft.com/fwlink/p/?LinkId=734717) on PC0001 so that you have access to the Configuration Manager Trace (cmtrace.exe) tool.
|
||||
|
||||
4. Using Local Users and Groups (lusrmgr.msc), add the **contoso\\MDT\_BA** user account to the local **Administrators** group.
|
||||
|
||||
5. Sign off, and then sign on to PC0001 as **contoso\\MDT\_BA**.
|
||||
|
||||
6. Open the **\\\\MDT01\\MDTProduction$\\Scripts** folder and copy the following files to **C:\\MDT**:
|
||||
1. ZTIDataAccess.vbs
|
||||
2. ZTIGather.wsf
|
||||
3. ZTIGather.xml
|
||||
4. ZTIUtility.vbs
|
||||
|
||||
- ZTIDataAccess.vbs
|
||||
- ZTIGather.wsf
|
||||
- ZTIGather.xml
|
||||
- ZTIUtility.vbs
|
||||
|
||||
7. From the **\\\\MDT01\\MDTProduction$\\Control** folder, copy the CustomSettings.ini file to **C:\\MDT**.
|
||||
|
||||
8. In the **C:\\MDT** folder, create a subfolder named **X64**.
|
||||
|
||||
9. From the **\\\\MDT01\\MDTProduction$\\Tools\\X64** folder, copy the Microsoft.BDD.Utility.dll file to **C:\\MDT\\X64**.
|
||||
|
||||

|
||||
@ -62,27 +74,30 @@ On **PC0001**:
|
||||
The C:\\MDT folder with the files added for the simulation environment.
|
||||
|
||||
10. Type the following at an elevated Windows PowerShell prompt:
|
||||
``` powershell
|
||||
|
||||
```powershell
|
||||
Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Scope Process -Force
|
||||
Set-Location C:\MDT
|
||||
.\Gather.ps1
|
||||
```
|
||||
|
||||
When prompted, press **R** to run the gather script.
|
||||
|
||||
11. Review the ZTIGather.log in the **C:\\MININT\\SMSOSD\\OSDLOGS** folder using CMTrace.
|
||||
**Note**
|
||||
Warnings or errors with regard to the Wizard.hta are expected. If the log file looks okay, you are ready to try a real deployment.
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> Warnings or errors regarding the Wizard.hta are expected. If the log file looks okay, you're ready to try a real deployment.
|
||||
|
||||

|
||||
|
||||
The ZTIGather.log file from PC0001.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)<br>
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)<br>
|
||||
[Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)<br>
|
||||
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)<br>
|
||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)<br>
|
||||
[Use web services in MDT](use-web-services-in-mdt.md)<br>
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
@ -1,108 +1,124 @@
|
||||
---
|
||||
title: Perform an in-place upgrade to Windows 10 with MDT (Windows 10)
|
||||
description: The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade.
|
||||
description: The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Perform an in-place upgrade to Windows 10 with MDT
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
**Applies to:**
|
||||
|
||||
The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade.
|
||||
- Windows 10
|
||||
|
||||
>[!TIP]
|
||||
>In-place upgrade is the preferred method to use when migrating from Windows 10 to a later release of Windows 10, and is also a preferred method for upgrading from Windows 7 or 8.1 if you do not plan to significantly change the device's configuration or applications. MDT includes an in-place upgrade task sequence template that makes the process really simple.
|
||||
The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade.
|
||||
|
||||
In-place upgrade differs from [computer refresh](refresh-a-windows-7-computer-with-windows-10.md) in that you cannot use a custom image to perform the in-place upgrade. In this article we will add a default Windows 10 image to the production deployment share specifically to perform an in-place upgrade.
|
||||
> [!TIP]
|
||||
> In-place upgrade is the preferred method to use when migrating from Windows 10 to a later release of Windows 10, and is also a preferred method for upgrading from Windows 7 or 8.1 if you do not plan to significantly change the device's configuration or applications. MDT includes an in-place upgrade task sequence template that makes the process really simple.
|
||||
|
||||
Three computers are used in this topic: DC01, MDT01, and PC0002.
|
||||
In-place upgrade differs from [computer refresh](refresh-a-windows-7-computer-with-windows-10.md) in that you can't use a custom image to perform the in-place upgrade. In this article, we'll add a default Windows 10 image to the production deployment share specifically to perform an in-place upgrade.
|
||||
|
||||
Three computers are used in this article: DC01, MDT01, and PC0002.
|
||||
|
||||
- DC01 is a domain controller for the contoso.com domain
|
||||
- MDT01 is a domain member server
|
||||
- PC0002 is a domain member computer running Windows 7 SP1, targeted for the Windows 10 upgrade
|
||||
- MDT01 is a domain member server
|
||||
- PC0002 is a domain member computer running Windows 7 SP1, targeted for the Windows 10 upgrade
|
||||
|
||||

|
||||
The computers used in this article.
|
||||
|
||||
The computers used in this topic.
|
||||
|
||||
>[!NOTE]
|
||||
>For details about the setup for the procedures in this article, please see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||
> [!NOTE]
|
||||
> For details about the setup for the procedures in this article, please see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
>
|
||||
>If you have already completed all the steps in [Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md), then you already have a production deployment share and you can skip to [Add Windows 10 Enterprise x64 (full source)](#add-windows-10-enterprise-x64-full-source).
|
||||
|
||||
## Create the MDT production deployment share
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Ensure you are signed on as: contoso\administrator.
|
||||
1. Ensure you're signed on as **contoso\administrator**.
|
||||
|
||||
2. In the Deployment Workbench console, right-click **Deployment Shares** and select **New Deployment Share**.
|
||||
3. On the **Path** page, in the **Deployment share path** text box, type **D:\\MDTProduction** and click **Next**.
|
||||
4. On the **Share** page, in the **Share name** text box, type **MDTProduction$** and click **Next**.
|
||||
5. On the **Descriptive Name** page, in the **Deployment share description** text box, type **MDT Production** and click **Next**.
|
||||
6. On the **Options** page, accept the default settings and click **Next** twice, and then click **Finish**.
|
||||
|
||||
3. On the **Path** page, in the **Deployment share path** text box, type **D:\\MDTProduction** and select **Next**.
|
||||
|
||||
4. On the **Share** page, in the **Share name** text box, type **MDTProduction$** and select **Next**.
|
||||
|
||||
5. On the **Descriptive Name** page, in the **Deployment share description** text box, type **MDT Production** and select **Next**.
|
||||
|
||||
6. On the **Options** page, accept the default settings and select **Next** twice, and then select **Finish**.
|
||||
|
||||
7. Using File Explorer, verify that you can access the **\\\\MDT01\\MDTProduction$** share.
|
||||
|
||||
## Add Windows 10 Enterprise x64 (full source)
|
||||
|
||||
>If you have already have a Windows 10 [reference image](create-a-windows-10-reference-image.md) in the **MDT Build Lab** deployment share, you can use the deployment workbench to copy and paste this image from the MDT Build Lab share to the MDT Production share and skip the steps in this section.
|
||||
> [!NOTE]
|
||||
> If you have already have a Windows 10 [reference image](create-a-windows-10-reference-image.md) in the **MDT Build Lab** deployment share, you can use the deployment workbench to copy and paste this image from the MDT Build Lab share to the MDT Production share and skip the steps in this section.
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Sign in as contoso\\administrator and copy the content of a Windows 10 Enterprise x64 DVD/ISO to the **D:\\Downloads\\Windows 10 Enterprise x64** folder on MDT01, or just insert the DVD or mount an ISO on MDT01.
|
||||
1. Sign in as contoso\\administrator and copy the content of a Windows 10 Enterprise x64 DVD/ISO to the **D:\\Downloads\\Windows 10 Enterprise x64** folder on MDT01, or just insert the DVD or mount an ISO on MDT01.
|
||||
|
||||
2. Using the Deployment Workbench, expand the **Deployment Shares** node, and then expand **MDT Production**.
|
||||
|
||||
3. Right-click the **Operating Systems** node, and create a new folder named **Windows 10**.
|
||||
|
||||
4. Expand the **Operating Systems** node, right-click the **Windows 10** folder, and select **Import Operating System**. Use the following settings for the Import Operating System Wizard:
|
||||
|
||||
- Full set of source files
|
||||
- Source directory: (location of your source files)
|
||||
- Destination directory name: <b>W10EX64RTM</b>
|
||||
- **Source directory**: (location of your source files)
|
||||
- **Destination directory name**: `W10EX64RTM`
|
||||
|
||||
5. After adding the operating system, in the **Operating Systems / Windows 10** folder, double-click it and change the name to: **Windows 10 Enterprise x64 RTM Default Image**.
|
||||
|
||||
## Create a task sequence to upgrade to Windows 10 Enterprise
|
||||
## Create a task sequence to upgrade to Windows 10 Enterprise
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Using the Deployment Workbench, select **Task Sequences** in the **MDT Production** node, and create a folder named **Windows 10**.
|
||||
2. Right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
- Task sequence ID: W10-X64-UPG
|
||||
- Task sequence name: Windows 10 Enterprise x64 RTM Upgrade
|
||||
- Template: Standard Client Upgrade Task Sequence
|
||||
- Select OS: Windows 10 Enterprise x64 RTM Default Image
|
||||
- Specify Product Key: Do not specify a product key at this time
|
||||
- Organization: Contoso
|
||||
- Admin Password: Do not specify an Administrator password at this time
|
||||
1. Using the Deployment Workbench, select **Task Sequences** in the **MDT Production** node, then create a folder named **Windows 10**.
|
||||
|
||||
## Perform the Windows 10 upgrade
|
||||
2. Right-click the new **Windows 10** folder and select **New Task Sequence**. Use the following settings for the **New Task Sequence Wizard**:
|
||||
|
||||
- **Task sequence ID**: W10-X64-UPG
|
||||
- **Task sequence name**: Windows 10 Enterprise x64 RTM Upgrade
|
||||
- **Template**: Standard Client Upgrade Task Sequence
|
||||
- **Select OS**: Windows 10 Enterprise x64 RTM Default Image
|
||||
- **Specify Product Key**: Don't specify a product key at this time
|
||||
- **Organization**: Contoso
|
||||
- **Admin Password**: Don't specify an Administrator password at this time
|
||||
|
||||
## Perform the Windows 10 upgrade
|
||||
|
||||
To initiate the in-place upgrade, perform the following steps on PC0002 (the device to be upgraded).
|
||||
|
||||
On **PC0002**:
|
||||
|
||||
1. Start the MDT deployment wizard by running the following command: **\\\\MDT01\\MDTProduction$\\Scripts\\LiteTouch.vbs**
|
||||
2. Select the **Windows 10 Enterprise x64 RTM Upgrade** task sequence, and then click **Next**.
|
||||
|
||||
2. Select the **Windows 10 Enterprise x64 RTM Upgrade** task sequence, and then select **Next**.
|
||||
|
||||
3. Select one or more applications to install (will appear if you use custom image): Install - Adobe Reader
|
||||
4. On the **Ready** tab, click **Begin** to start the task sequence.
|
||||
When the task sequence begins, it automatically initiates the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers.
|
||||
|
||||
4. On the **Ready** tab, select **Begin** to start the task sequence.
|
||||
|
||||
When the task sequence begins, it automatically initiates the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers.
|
||||
|
||||

|
||||
|
||||
<br>
|
||||
|
||||

|
||||
|
||||
<br>
|
||||
|
||||

|
||||
|
||||
After the task sequence completes, the computer will be fully upgraded to Windows 10.
|
||||
After the task sequence completes, the computer will be fully upgraded to Windows 10.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Windows 10 deployment scenarios](../windows-10-deployment-scenarios.md)<br>
|
||||
[Microsoft Deployment Toolkit downloads and resources](/mem/configmgr/mdt/)
|
||||
- [Windows 10 deployment scenarios](../windows-10-deployment-scenarios.md)
|
||||
- [Microsoft Deployment Toolkit downloads and resources](/mem/configmgr/mdt/)
|
||||
|
@ -2,45 +2,57 @@
|
||||
title: Use Orchestrator runbooks with MDT (Windows 10)
|
||||
description: Learn how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Use Orchestrator runbooks with MDT
|
||||
|
||||
This topic will show you how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions.
|
||||
This article will show you how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions.
|
||||
|
||||
MDT can integrate with System Center 2012 R2 Orchestrator, which is a component that ties the Microsoft System Center products together, as well as other products from both Microsoft and third-party vendors. The difference between using Orchestrator and "normal" web services, is that with Orchestrator you have a rich drag-and-drop style interface when building the solution, and little or no coding is required.
|
||||
|
||||
**Note**
|
||||
If you are licensed to use Orchestrator, we highly recommend that you start using it. To find out more about licensing options for System Center 2012 R2 and Orchestrator, visit the [System Center 2012 R2](https://go.microsoft.com/fwlink/p/?LinkId=619553) website.
|
||||
|
||||
## <a href="" id="sec01"></a>Orchestrator terminology
|
||||
> [!NOTE]
|
||||
> If you are licensed to use Orchestrator, we highly recommend that you start using it. To find out more about licensing options for System Center 2012 R2 and Orchestrator, visit the [System Center 2012 R2](https://go.microsoft.com/fwlink/p/?LinkId=619553) website.
|
||||
|
||||
Before diving into the core details, here is a quick course in Orchestrator terminology:
|
||||
- **Orchestrator Server.** This is a server that executes runbooks.
|
||||
- **Runbooks.** A runbook is similar to a task sequence; it is a series of instructions based on conditions. Runbooks consist of workflow activities; an activity could be Copy File, Get User from Active Directory, or even Write to Database.
|
||||
- **Orchestrator Designer.** This is where you build the runbooks. In brief, you do that by creating an empty runbook, dragging in the activities you need, and then connecting them in a workflow with conditions and subscriptions.
|
||||
- **Subscriptions.** These are variables that come from an earlier activity in the runbook. So if you first execute an activity in which you type in a computer name, you can then subscribe to that value in the next activity. All these variables are accumulated during the execution of the runbook.
|
||||
- **Orchestrator Console.** This is the Microsoft Silverlight-based web page you can use interactively to execute runbooks. The console listens to TCP port 81 by default.
|
||||
- **Orchestrator web services.** These are the web services you use in the Microsoft Deployment Toolkit to execute runbooks during deployment. The web services listen to TCP port 82 by default.
|
||||
- **Integration packs.** These provide additional workflow activities you can import to integrate with other products or solutions, like the rest of Active Directory, other System Center 2012 R2 products, or Microsoft Exchange Server, to name a few.
|
||||
## Orchestrator terminology
|
||||
|
||||
**Note**
|
||||
To find and download additional integration packs, see [Integration Packs for System Center 2012 - Orchestrator](/previous-versions/system-center/packs/hh295851(v=technet.10)).
|
||||
Before diving into the core details, here's a quick course in Orchestrator terminology:
|
||||
|
||||
- **Orchestrator Server**: This is a server that executes runbooks.
|
||||
|
||||
- **Runbooks**: A runbook is similar to a task sequence; it's a series of instructions based on conditions. Runbooks consist of workflow activities; an activity could be Copy File, Get User from Active Directory, or even Write to Database.
|
||||
|
||||
- **Orchestrator Designer**: This is where you build the runbooks. In brief, you do that by creating an empty runbook, dragging in the activities you need, and then connecting them in a workflow with conditions and subscriptions.
|
||||
|
||||
- **Subscriptions**: These are variables that come from an earlier activity in the runbook. So if you first execute an activity in which you type in a computer name, you can then subscribe to that value in the next activity. All these variables are accumulated during the execution of the runbook.
|
||||
|
||||
- **Orchestrator Console**: This is the Microsoft Silverlight-based web page you can use interactively to execute runbooks. The console listens to TCP port 81 by default.
|
||||
|
||||
- **Orchestrator web services**: These are the web services you use in the Microsoft Deployment Toolkit to execute runbooks during deployment. The web services listen to TCP port 82 by default.
|
||||
|
||||
- **Integration packs**: These provide additional workflow activities you can import to integrate with other products or solutions, like the rest of Active Directory, other System Center 2012 R2 products, or Microsoft Exchange Server, to name a few.
|
||||
|
||||
> [!NOTE]
|
||||
> To find and download additional integration packs, see [Integration Packs for System Center 2012 - Orchestrator](/previous-versions/system-center/packs/hh295851(v=technet.10)).
|
||||
|
||||
## <a href="" id="sec02"></a>Create a sample runbook
|
||||
## Create a sample runbook
|
||||
|
||||
This section assumes you have Orchestrator 2012 R2 installed on a server named OR01. In this section, you create a sample runbook, which is used to log some of the MDT deployment information into a text file on OR01.
|
||||
|
||||
1. On OR01, using File Explorer, create the **E:\\Logfile** folder, and grant Users modify permissions (NTFS).
|
||||
|
||||
2. In the **E:\\Logfile** folder, create the DeployLog.txt file.
|
||||
**Note**
|
||||
Make sure File Explorer is configured to show known file extensions so the file is not named DeployLog.txt.txt.
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> Make sure File Explorer is configured to show known file extensions so the file isn't named DeployLog.txt.txt.
|
||||
|
||||

|
||||
|
||||
Figure 23. The DeployLog.txt file.
|
||||
@ -52,11 +64,16 @@ This section assumes you have Orchestrator 2012 R2 installed on a server named O
|
||||
Figure 24. Folder created in the Runbooks node.
|
||||
|
||||
4. In the **Runbooks** node, right-click the **1.0 MDT** folder, and select **New / Runbook**.
|
||||
5. On the ribbon bar, click **Check Out**.
|
||||
|
||||
5. On the ribbon bar, select **Check Out**.
|
||||
|
||||
6. Right-click the **New Runbook** label, select **Rename**, and assign the name **MDT Sample**.
|
||||
|
||||
7. Add (using a drag-and-drop operation) the following items from the **Activities** list to the middle pane:
|
||||
1. Runbook Control / Initialize Data
|
||||
2. Text File Management / Append Line
|
||||
|
||||
- Runbook Control / Initialize Data
|
||||
- Text File Management / Append Line
|
||||
|
||||
8. Connect **Initialize Data** to **Append Line**.
|
||||
|
||||

|
||||
@ -64,15 +81,19 @@ This section assumes you have Orchestrator 2012 R2 installed on a server named O
|
||||
Figure 25. Activities added and connected.
|
||||
|
||||
9. Right-click the **Initialize Data** activity, and select **Properties**
|
||||
10. On **the Initialize Data Properties** page, click **Add**, change **Parameter 1** to **OSDComputerName**, and then click **Finish**.
|
||||
|
||||
10. On **the Initialize Data Properties** page, select **Add**, change **Parameter 1** to **OSDComputerName**, and then select **Finish**.
|
||||
|
||||

|
||||
|
||||
Figure 26. The Initialize Data Properties window.
|
||||
|
||||
11. Right-click the **Append Line** activity, and select **Properties**.
|
||||
|
||||
12. On the **Append Line Properties** page, in the **File** text box, type **E:\\Logfile\\DeployLog.txt**.
|
||||
|
||||
13. In the **File** encoding drop-down list, select **ASCII**.
|
||||
|
||||
14. In the **Append** area, right-click inside the **Text** text box and select **Expand**.
|
||||
|
||||

|
||||
@ -85,23 +106,32 @@ This section assumes you have Orchestrator 2012 R2 installed on a server named O
|
||||
|
||||
Figure 28. Subscribing to data.
|
||||
|
||||
16. In the **Published Data** window, select the **OSDComputerName** item, and click **OK**.
|
||||
16. In the **Published Data** window, select the **OSDComputerName** item, and select **OK**.
|
||||
|
||||
17. After the **{OSDComputerName from "Initialize Data"}** text, type in **has been deployed at** and, once again, right-click and select **Subscribe / Published Data**.
|
||||
18. In the **Published Data** window, select the **Show common Published Data** check box, select the **Activity end time** item, and click **OK**.
|
||||
|
||||
18. In the **Published Data** window, select the **Show common Published Data** check box, select the **Activity end time** item, and select **OK**.
|
||||
|
||||

|
||||
|
||||
Figure 29. The expanded text box after all subscriptions have been added.
|
||||
|
||||
19. On the **Append Line Properties** page, click **Finish**.
|
||||
## <a href="" id="sec03"></a>Test the demo MDT runbook
|
||||
After the runbook is created, you are ready to test it.
|
||||
20. On the ribbon bar, click **Runbook Tester**.
|
||||
21. Click **Run**, and in the **Initialize Data Parameters** dialog box, use the following setting and then click **OK**:
|
||||
- OSDComputerName: PC0010
|
||||
22. Verify that all activities are green (for additional information, see each target).
|
||||
23. Close the **Runbook Tester**.
|
||||
24. On the ribbon bar, click **Check In**.
|
||||
19. On the **Append Line Properties** page, select **Finish**.
|
||||
## Test the demo MDT runbook
|
||||
|
||||
After the runbook is created, you're ready to test it.
|
||||
|
||||
1. On the ribbon bar, select **Runbook Tester**.
|
||||
|
||||
2. Select **Run**, and in the **Initialize Data Parameters** dialog box, use the following setting and then select **OK**:
|
||||
|
||||
- **OSDComputerName**: PC0010
|
||||
|
||||
3. Verify that all activities are green (for more information, see each target).
|
||||
|
||||
4. Close the **Runbook Tester**.
|
||||
|
||||
5. On the ribbon bar, select **Check In**.
|
||||
|
||||

|
||||
|
||||
@ -109,23 +139,33 @@ Figure 30. All tests completed.
|
||||
|
||||
## Use the MDT demo runbook from MDT
|
||||
|
||||
1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, select the **Task Sequences** node, and create a folder named **Orchestrator**.
|
||||
2. Right-click the **Orchestrator** node, and select **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||
1. Task sequence ID: OR001
|
||||
2. Task sequence name: Orchestrator Sample
|
||||
3. Task sequence comments: <blank>
|
||||
4. Template: Custom Task Sequence
|
||||
3. In the **Orchestrator** node, double-click the **Orchestrator Sample** task sequence, and then select the **Task Sequence** tab.
|
||||
4. Remove the default **Application Install** action.
|
||||
5. Add a **Gather** action and select the **Gather only local data (do not process rules)** option.
|
||||
6. After the **Gather** action, add a **Set Task Sequence Variable** action with the following settings:
|
||||
1. Name: Set Task Sequence Variable
|
||||
2. Task Sequence Variable: OSDComputerName
|
||||
3. Value: %hostname%
|
||||
7. After the **Set Task Sequence Variable** action, add a new **Execute Orchestrator Runbook** action with the following settings:
|
||||
1. Orchestrator Server: OR01.contoso.com
|
||||
2. Use Browse to select **1.0 MDT / MDT Sample**.
|
||||
8. Click **OK**.
|
||||
1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, select the **Task Sequences** node, and create a folder named **Orchestrator**.
|
||||
|
||||
2. Right-click the **Orchestrator** node, and select **New Task Sequence**. Use the following settings for the **New Task Sequence Wizard**:
|
||||
|
||||
- **Task sequence ID**: OR001
|
||||
- **Task sequence name**: Orchestrator Sample
|
||||
- **Task sequence comments**: *\<blank\>*
|
||||
- **Template**: Custom Task Sequence
|
||||
|
||||
3. In the **Orchestrator** node, double-click the **Orchestrator Sample** task sequence, and then select the **Task Sequence** tab.
|
||||
|
||||
4. Remove the default **Application Install** action.
|
||||
|
||||
5. Add a **Gather** action and select the **Gather only local data (do not process rules)** option.
|
||||
|
||||
6. After the **Gather** action, add a **Set Task Sequence Variable** action with the following settings:
|
||||
|
||||
- **Name**: Set Task Sequence Variable
|
||||
- **Task Sequence Variable**: OSDComputerName
|
||||
- **Value**: %hostname%
|
||||
|
||||
7. After the **Set Task Sequence Variable** action, add a new **Execute Orchestrator Runbook** action with the following settings:
|
||||
|
||||
- **Orchestrator Server**: OR01.contoso.com
|
||||
- Use **Browse** to select **1.0 MDT / MDT Sample**.
|
||||
|
||||
8. Select **OK**.
|
||||
|
||||

|
||||
|
||||
@ -133,40 +173,41 @@ Figure 31. The ready-made task sequence.
|
||||
|
||||
## Run the orchestrator sample task sequence
|
||||
|
||||
Since this task sequence just starts a runbook, you can test this on the PC0001 client that you used for the MDT simulation environment.
|
||||
**Note**
|
||||
Make sure the account you are using has permissions to run runbooks on the Orchestrator server. For more information about runbook permissions, see [Runbook Permissions](/previous-versions/system-center/system-center-2012-R2/hh403774(v=sc.12)).
|
||||
|
||||
1. On PC0001, log on as **CONTOSO\\MDT\_BA**.
|
||||
2. Using an elevated command prompt (run as Administrator), type the following command:
|
||||
Since this task sequence just starts a runbook, you can test the task sequence on the PC0001 client that you used for the MDT simulation environment.
|
||||
|
||||
``` syntax
|
||||
cscript \\MDT01\MDTProduction$\Scripts\Litetouch.vbs
|
||||
> [!NOTE]
|
||||
> Make sure the account you're using has permissions to run runbooks on the Orchestrator server. For more information about runbook permissions, see [Runbook Permissions](/previous-versions/system-center/system-center-2012-R2/hh403774(v=sc.12)).
|
||||
|
||||
1. On PC0001, log on as **CONTOSO\\MDT\_BA**.
|
||||
|
||||
2. Using an elevated command prompt (run as Administrator), type the following command:
|
||||
|
||||
```cmd
|
||||
cscript.exe \\MDT01\MDTProduction$\Scripts\Litetouch.vbs
|
||||
```
|
||||
3. Complete the Windows Deployment Wizard using the following information:
|
||||
1. Task Sequence: Orchestrator Sample
|
||||
2. Credentials:
|
||||
1. User Name: MDT\_BA
|
||||
2. Password: P@ssw0rd
|
||||
3. Domain: CONTOSO
|
||||
4. Wait until the task sequence is completed and then verify that the DeployLog.txt file in the E:\\Logfile folder on OR01 was updated.
|
||||
|
||||
3. Complete the **Windows Deployment Wizard** using the following information:
|
||||
|
||||
1. **Task Sequence**: Orchestrator Sample
|
||||
|
||||
2. **Credentials**:
|
||||
|
||||
- **User Name**: MDT\_BA
|
||||
- **Password**: P@ssw0rd
|
||||
- **Domain**: CONTOSO
|
||||
|
||||
4. Wait until the task sequence is completed and then verify that the DeployLog.txt file in the E:\\Logfile folder on OR01 was updated.
|
||||
|
||||

|
||||
|
||||
Figure 32. The ready-made task sequence.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
|
||||
[Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
|
||||
[Simulate a Windows10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
|
||||
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
|
||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
|
||||
[Use web services in MDT](use-web-services-in-mdt.md)
|
||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
- [Simulate a Windows10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
|
@ -2,91 +2,99 @@
|
||||
title: Use MDT database to stage Windows 10 deployment info (Windows 10)
|
||||
description: Learn how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Use the MDT database to stage Windows 10 deployment information
|
||||
|
||||
This topic is designed to teach you how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database, rather than include the information in a text file (CustomSettings.ini). You can use this process, for example, to add the client machines you want to deploy, specify their computer names and IP addresses, indicate applications to be deployed, and determine many additional settings for the machines.
|
||||
This article is designed to teach you how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database, rather than include the information in a text file (CustomSettings.ini). You can use this process, for example, to add the client machines you want to deploy, specify their computer names and IP addresses, indicate applications to be deployed, and determine many more settings for the machines.
|
||||
|
||||
## <a href="" id="sec01"></a>Database prerequisites
|
||||
## Database prerequisites
|
||||
|
||||
MDT can use either SQL Server Express or full SQL Server, but since the deployment database isn't big, even in large enterprise environments, we recommend using the free SQL Server 2012 SP1 Express database in your environment.
|
||||
MDT can use either SQL Server Express or full SQL Server. However, since the deployment database isn't large, even in large enterprise environments, we recommend using the free SQL Server 2012 SP1 Express database in your environment.
|
||||
|
||||
>[!NOTE]
|
||||
>Be sure to enable Named Pipes when configuring the SQL Server 2012 SP1 Express database. Although it is a legacy protocol, Named Pipes has proven to work well when connecting from Windows Preinstallation Environment (Windows PE) to the SQL Server database.
|
||||
|
||||
## <a href="" id="sec02"></a>Create the deployment database
|
||||
> [!NOTE]
|
||||
> Be sure to enable Named Pipes when configuring the SQL Server 2012 SP1 Express database. Although it is a legacy protocol, Named Pipes has proven to work well when connecting from Windows Preinstallation Environment (Windows PE) to the SQL Server database.
|
||||
|
||||
## Create the deployment database
|
||||
|
||||
The MDT database is by default created and managed from the Deployment Workbench. In these steps, we assume you have installed SQL Server 2012 SP1 Express on MDT01.
|
||||
|
||||
>[!NOTE]
|
||||
>Since SQL Server 2012 SP1 Express runs by default on a separate instance (SQLEXPRESS), the SQL Server Browser service must be running, and the firewall configured to allow traffic to it. Port 1433 TCP and port 1434 UDP need to be opened for inbound traffic on MDT01.
|
||||
|
||||
1. On MDT01, using Deployment Workbench, expand the MDT Production deployment share, expand **Advanced Configuration**, right-click **Database**, and select **New Database**.
|
||||
2. In the New DB Wizard, on the **SQL Server Details** page, enter the following settings and click **Next**:
|
||||
1. SQL Server Name: MDT01
|
||||
2. Instance: SQLEXPRESS
|
||||
3. Port: <blank>
|
||||
4. Network Library: Named Pipes
|
||||
3. On the **Database** page, select **Create a new database**; in the **Database** field, type **MDT** and click **Next**.
|
||||
4. On the **SQL Share** page, in the **SQL Share** field, type **Logs$** and click **Next**. Click **Next** again and then click **Finish**.
|
||||
> [!NOTE]
|
||||
> Since SQL Server 2012 SP1 Express runs by default on a separate instance (SQLEXPRESS), the SQL Server Browser service must be running, and the firewall configured to allow traffic to it. Port 1433 TCP and port 1434 UDP need to be opened for inbound traffic on MDT01.
|
||||
|
||||
1. On MDT01, using Deployment Workbench, expand the MDT Production deployment share, expand **Advanced Configuration**, right-click **Database**, and select **New Database**.
|
||||
|
||||
2. In the New DB Wizard, on the **SQL Server Details** page, enter the following settings and select **Next**:
|
||||
|
||||
1. SQL Server Name: MDT01
|
||||
2. Instance: SQLEXPRESS
|
||||
3. Port: <blank>
|
||||
4. Network Library: Named Pipes
|
||||
|
||||
3. On the **Database** page, select **Create a new database**; in the **Database** field, type **MDT** and select **Next**.
|
||||
|
||||
4. On the **SQL Share** page, in the **SQL Share** field, type **Logs$** and select **Next**. Select **Next** again and then select **Finish**.
|
||||
|
||||

|
||||
|
||||
Figure 8. The MDT database added to MDT01.
|
||||
|
||||
## <a href="" id="sec03"></a>Configure database permissions
|
||||
## Configure database permissions
|
||||
|
||||
After creating the database, you need to assign permissions to it. In MDT, the account you used to run the deployment is used to access the database. In this environment, the network access account is MDT\_BA.
|
||||
1. On MDT01, start SQL Server Management Studio.
|
||||
2. In the **Connect to Server** dialog box, in the **Server name** list, select **MDT01\\SQLEXPRESS** and click **Connect**.
|
||||
3. In the **Object Explorer** pane, expand the top-level **Security** node, right-click **Logins**, and select **New Login**.
|
||||
|
||||
1. On MDT01, start SQL Server Management Studio.
|
||||
|
||||
2. In the **Connect to Server** dialog box, in the **Server name** list, select **MDT01\\SQLEXPRESS** and select **Connect**.
|
||||
|
||||
3. In the **Object Explorer** pane, expand the top-level **Security** node, right-click **Logins**, and select **New Login**.
|
||||
|
||||

|
||||
|
||||
Figure 9. The top-level Security node.
|
||||
|
||||
4. On the **Login - New** page, next to the **Login** name field, click **Search**, and search for **CONTOSO\\MDT\_BA**. Then in the left pane, select **User Mapping**. Select the **MDT** database, and assign the following roles:
|
||||
1. db\_datareader
|
||||
2. db\_datawriter
|
||||
3. public (default)
|
||||
5. Click **OK**, and close SQL Server Management Studio.
|
||||
4. On the **Login - New** page, next to the **Login** name field, select **Search**, and search for **CONTOSO\\MDT\_BA**. Then in the left pane, select **User Mapping**. Select the **MDT** database, and assign the following roles:
|
||||
|
||||
1. db\_datareader
|
||||
2. db\_datawriter
|
||||
3. public (default)
|
||||
|
||||
5. Select **OK**, and close SQL Server Management Studio.
|
||||
|
||||

|
||||
|
||||
Figure 10. Creating the login and settings permissions to the MDT database.
|
||||
|
||||
## <a href="" id="sec04"></a>Create an entry in the database
|
||||
## Create an entry in the database
|
||||
|
||||
To start using the database, you add a computer entry and assign a description and computer name. Use the computer's MAC Address as the identifier.
|
||||
1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, expand **Advanced Configuration**, and expand **Database**.
|
||||
2. Right-click **Computers**, select **New**, and add a computer entry with the following settings:
|
||||
1. Description: New York Site - PC00075
|
||||
2. MacAddress: <PC00075 MAC Address in the 00:00:00:00:00:00 format>
|
||||
3. Details Tab / OSDComputerName: PC00075
|
||||
|
||||
1. On MDT01, using the Deployment Workbench, in the MDT Production deployment share, expand **Advanced Configuration**, and expand **Database**.
|
||||
|
||||
2. Right-click **Computers**, select **New**, and add a computer entry with the following settings:
|
||||
|
||||
1. Description: New York Site - PC00075
|
||||
2. MacAddress: <PC00075 MAC Address in the 00:00:00:00:00:00 format>
|
||||
3. Details Tab / OSDComputerName: PC00075
|
||||
|
||||

|
||||
|
||||
Figure 11. Adding the PC00075 computer to the database.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
|
||||
[Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
|
||||
[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
|
||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
|
||||
[Use web services in MDT](use-web-services-in-mdt.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
@ -1,93 +1,112 @@
|
||||
---
|
||||
title: Use web services in MDT (Windows 10)
|
||||
description: Learn how to create a simple web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment.
|
||||
description: Learn how to create a web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
author: frankroj
|
||||
ms.topic: article
|
||||
ms.technology: itpro-deploy
|
||||
ms.date: 11/28/2022
|
||||
---
|
||||
|
||||
# Use web services in MDT
|
||||
|
||||
In this topic, you will learn how to create a simple web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment. Web services provide a powerful way to assign settings during a deployment. Simply put, web services are web applications that run code on the server side, and MDT has built-in functions to call these web services.
|
||||
Using a web service in MDT is straightforward, but it does require that you have enabled the Web Server (IIS) role on the server. Developing web services involves a little bit of coding, but for most web services used with MDT, you can use the free Microsoft Visual Studio Express 2013 for Web.
|
||||
In this article, you'll learn how to create a simple web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment. Web services provide a powerful way to assign settings during a deployment. Web services are web applications that run code on the server side, and MDT has built-in functions to call these web services.
|
||||
Using a web service in MDT is straightforward, but it does require that you've enabled the Web Server (IIS) role on the server. Developing web services involves some coding, but for most web services used with MDT, you can use the free Microsoft Visual Studio Express 2013 for Web.
|
||||
|
||||
## <a href="" id="sec01"></a>Create a sample web service
|
||||
## Create a sample web service
|
||||
|
||||
In these steps we assume you have installed Microsoft Visual Studio Express 2013 for Web on PC0001 (the Windows 10 client) and downloaded the [MDT Sample Web Service](https://www.microsoft.com/download/details.aspx?id=42516) from the Microsoft Download Center and extracted it to C:\\Projects.
|
||||
1. On PC0001, using Visual Studio Express 2013 for Web, open the C:\\Projects\\MDTSample\\ MDTSample.sln solution file.
|
||||
2. On the ribbon bar, verify that Release is selected.
|
||||
3. In the **Debug** menu, select the **Build MDTSample** action.
|
||||
4. On MDT01, create a folder structure for **E:\\MDTSample\\bin**.
|
||||
5. From PC0001, copy the C:\\Projects\\MDTSample\\obj\\Release\\MDTSample.dll file to the **E:\\MDTSample\\bin** folder on MDT01.
|
||||
6. From PC0001, copy the following files from C:\\Projects\\MDTSample file to the **E:\\MDTSample** folder on MDT01:
|
||||
1. Web.config
|
||||
2. mdtsample.asmx
|
||||
In these steps, we assume you have installed Microsoft Visual Studio Express 2013 for Web on PC0001 (the Windows 10 client) and downloaded the [MDT Sample Web Service](https://www.microsoft.com/download/details.aspx?id=42516) from the Microsoft Download Center and extracted it to C:\\Projects.
|
||||
|
||||

|
||||
1. On PC0001, using Visual Studio Express 2013 for Web, open the C:\\Projects\\MDTSample\\ MDTSample.sln solution file.
|
||||
|
||||
Figure 15. The sample project in Microsoft Visual Studio Express 2013 for Web.
|
||||
2. On the ribbon bar, verify that Release is selected.
|
||||
|
||||
## <a href="" id="sec02"></a>Create an application pool for the web service
|
||||
3. In the **Debug** menu, select the **Build MDTSample** action.
|
||||
|
||||
This section assumes that you have enabled the Web Server (IIS) role on MDT01.
|
||||
1. On MDT01, using Server Manager, install the **IIS Management Console** role (available under Web Server (IIS) / Management Tools).
|
||||
2. Using Internet Information Services (IIS) Manager, expand the **MDT01 (CONTOSO\\Administrator)** node. If prompted with the "Do you want to get started with Microsoft Web Platform?" question, select the **Do not show this message** check box and then click **No**.
|
||||
3. Right-click **Application Pools**, select **Add Application Pool**, and configure the new application pool with the following settings:
|
||||
1. Name: MDTSample
|
||||
2. .NET Framework version: .NET Framework 4.0.30319
|
||||
3. Manage pipeline mode: Integrated
|
||||
4. Select the **Start application pool immediately** check box.
|
||||
5. Click **OK**.
|
||||
4. On MDT01, create a folder structure for **E:\\MDTSample\\bin**.
|
||||
|
||||

|
||||
5. From PC0001, copy the C:\\Projects\\MDTSample\\obj\\Release\\MDTSample.dll file to the **E:\\MDTSample\\bin** folder on MDT01.
|
||||
|
||||
Figure 16. The new MDTSample application.
|
||||
6. From PC0001, copy the following files from C:\\Projects\\MDTSample file to the **E:\\MDTSample** folder on MDT01:
|
||||
|
||||
## <a href="" id="sec03"></a>Install the web service
|
||||
- Web.config
|
||||
- mdtsample.asmx
|
||||
|
||||
1. On MDT01, using Internet Information Services (IIS) Manager, expand **Sites**, right-click **Default Web Site**, and select **Add Application**. Use the following settings for the application:
|
||||
1. Alias: MDTSample
|
||||
2. Application pool: MDTSample
|
||||
3. Physical Path: E:\\MDTSample
|
||||

|
||||
|
||||
Figure 15. The sample project in Microsoft Visual Studio Express 2013 for Web.
|
||||
|
||||
## Create an application pool for the web service
|
||||
|
||||
This section assumes that you've enabled the Web Server (IIS) role on MDT01.
|
||||
|
||||
1. On MDT01, using Server Manager, install the **IIS Management Console** role (available under Web Server (IIS) / Management Tools).
|
||||
|
||||
2. Using Internet Information Services (IIS) Manager, expand the **MDT01 (CONTOSO\\Administrator)** node. If prompted with the **Do you want to get started with Microsoft Web Platform?** question, select the **Do not show this message** check box and then select **No**.
|
||||
|
||||
3. Right-click **Application Pools**, select **Add Application Pool**, and configure the new application pool with the following settings:
|
||||
|
||||
- **Name**: MDTSample
|
||||
- **.NET Framework version**: .NET Framework 4.0.30319
|
||||
- **Manage pipeline mode**: Integrated
|
||||
- Select the **Start application pool immediately** check box.
|
||||
- Select **OK**.
|
||||
|
||||

|
||||
|
||||
Figure 16. The new MDTSample application.
|
||||
|
||||
## Install the web service
|
||||
|
||||
1. On MDT01, using Internet Information Services (IIS) Manager, expand **Sites**, right-click **Default Web Site**, and select **Add Application**. Use the following settings for the application:
|
||||
|
||||
- **Alias**: MDTSample
|
||||
- **Application pool**: MDTSample
|
||||
- **Physical Path**: E:\\MDTSample
|
||||
|
||||

|
||||
|
||||
Figure 17. Adding the MDTSample web application.
|
||||
|
||||
2. In the **Default Web Site** node, select the MDTSample web application, and in the right pane, double-click **Authentication**. Use the following settings for the **Authentication** dialog box:
|
||||
1. Anonymous Authentication: Enabled
|
||||
2. ASP.NET Impersonation: Disabled
|
||||
2. In the **Default Web Site** node, select the MDTSample web application, and in the right pane, double-click **Authentication**. Use the following settings for the **Authentication** dialog box:
|
||||
|
||||

|
||||
- **Anonymous Authentication**: Enabled
|
||||
- **ASP.NET Impersonation**: Disabled
|
||||
|
||||
Figure 18. Configuring Authentication for the MDTSample web service.
|
||||

|
||||
|
||||
## <a href="" id="sec04"></a>Test the web service in Internet Explorer
|
||||
Figure 18. Configuring Authentication for the MDTSample web service.
|
||||
|
||||
1. On PC0001, using Internet Explorer, navigate to: **http://MDT01/MDTSample/mdtsample.asmx**.
|
||||
2. Click the **GetComputerName** link.
|
||||
## Test the web service in Internet Explorer
|
||||
|
||||
1. On PC0001, using Internet Explorer, navigate to: **`http://MDT01/MDTSample/mdtsample.asmx'**.
|
||||
|
||||
2. Select the **GetComputerName** link.
|
||||
|
||||

|
||||
|
||||
Figure 19. The MDT Sample web service.
|
||||
3. On the **GetComputerName** page, type in the following settings, and click **Invoke**:
|
||||
1. Model: Hewlett-Packard
|
||||
2. SerialNumber: 123456789
|
||||
|
||||

|
||||
3. On the **GetComputerName** page, type in the following settings, and select **Invoke**:
|
||||
|
||||
Figure 20. The result from the MDT Sample web service.
|
||||
- **Model**: Hewlett-Packard
|
||||
- **SerialNumber**: 123456789
|
||||
|
||||
## <a href="" id="sec05"></a>Test the web service in the MDT simulation environment
|
||||

|
||||
|
||||
After verifying the web service using Internet Explorer, you are ready to do the same test in the MDT simulation environment.
|
||||
Figure 20. The result from the MDT Sample web service.
|
||||
|
||||
## Test the web service in the MDT simulation environment
|
||||
|
||||
After verifying the web service using Internet Explorer, you're ready to do the same test in the MDT simulation environment.
|
||||
|
||||
1. On PC0001, edit the CustomSettings.ini file in the **C:\\MDT** folder to look like the following:
|
||||
```
|
||||
|
||||
```ini
|
||||
[Settings]
|
||||
Priority=Default, GetComputerName
|
||||
[Default]
|
||||
@ -97,35 +116,32 @@ After verifying the web service using Internet Explorer, you are ready to do the
|
||||
Parameters=Model,SerialNumber
|
||||
OSDComputerName=string
|
||||
```
|
||||
|
||||

|
||||
|
||||
Figure 21. The updated CustomSettings.ini file.
|
||||
|
||||
2. Save the CustomSettings.ini file.
|
||||
|
||||
3. Using an elevated Windows PowerShell prompt (run as Administrator), run the following commands. Press **Enter** after each command:
|
||||
```
|
||||
|
||||
```powershell
|
||||
Set-Location C:\MDT
|
||||
.\Gather.ps1
|
||||
```
|
||||
|
||||
4. Review the ZTIGather.log in the **C:\\MININT\\SMSOSD\\OSDLOGS** folder.
|
||||
|
||||

|
||||

|
||||
|
||||
Figure 22. The OSDCOMPUTERNAME value obtained from the web service.
|
||||
Figure 22. The OSDCOMPUTERNAME value obtained from the web service.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
|
||||
[Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
|
||||
[Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
|
||||
[Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
|
||||
[Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
|
||||
[Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
|
||||
[Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||
|
@ -1,57 +1,57 @@
|
||||
---
|
||||
title: Deploy Windows To Go in your organization (Windows 10)
|
||||
description: Learn how to deploy Windows To Go in your organization through a wizard in the user interface as well as programatically with Windows PowerShell.
|
||||
description: Learn how to deploy Windows To Go in your organization through a wizard in the user interface and programatically with Windows PowerShell.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
author: frankroj
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-deploy
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.date: 11/23/2022
|
||||
---
|
||||
|
||||
# Deploy Windows To Go in your organization
|
||||
|
||||
*Applies to:*
|
||||
|
||||
- Windows 10
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
|
||||
This topic helps you to deploy Windows To Go in your organization. Before you begin deployment, make sure that you've reviewed the topics [Windows To Go: feature overview](planning/windows-to-go-overview.md) and [Prepare your organization for Windows To Go](planning/prepare-your-organization-for-windows-to-go.md) to ensure that you have the correct hardware and are prepared to complete the deployment. You can then use the steps in this topic to start your Windows To Go deployment.
|
||||
This article helps you to deploy Windows To Go in your organization. Before you begin deployment, make sure that you've reviewed the articles [Windows To Go: feature overview](planning/windows-to-go-overview.md) and [Prepare your organization for Windows To Go](planning/prepare-your-organization-for-windows-to-go.md) to ensure that you have the correct hardware and are prepared to complete the deployment. You can then use the steps in this article to start your Windows To Go deployment.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Windows To Go is removed in Windows 10, version 2004 and later operating systems. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs.
|
||||
|
||||
## Deployment tips
|
||||
|
||||
The following is a list of items that you should be aware of before you start the deployment process:
|
||||
The below list is items that you should be aware of before you start the deployment process:
|
||||
|
||||
* Only use recommended USB drives for Windows To Go. Use of other drives isn't supported. Check the list at [Windows To Go: feature overview](planning/windows-to-go-overview.md) for the latest USB drives certified for use as Windows To Go drives.
|
||||
- Only use recommended USB drives for Windows To Go. Use of other drives isn't supported. Check the list at [Windows To Go: feature overview](planning/windows-to-go-overview.md) for the latest USB drives certified for use as Windows To Go drives.
|
||||
|
||||
* After you provision a new workspace, always eject a Windows To Go drive using the **Safely Remove Hardware and Eject Media** control that can be found in the notification area or in Windows Explorer. Removing the drive from the USB port without ejecting it first can cause the drive to become corrupted.
|
||||
- After you provision a new workspace, always eject a Windows To Go drive using the **Safely Remove Hardware and Eject Media** control that can be found in the notification area or in Windows Explorer. Removing the drive from the USB port without ejecting it first can cause the drive to become corrupted.
|
||||
|
||||
* When running a Windows To Go workspace, always shutdown the workspace before unplugging the drive.
|
||||
- When running a Windows To Go workspace, always shut down the workspace before unplugging the drive.
|
||||
|
||||
* Configuration Manager SP1 and later includes support for user self-provisioning of Windows To Go drives. For more information on this deployment option, see [How to Provision Windows To Go in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/jj651035(v=technet.10)).
|
||||
- Configuration Manager SP1 and later includes support for user self-provisioning of Windows To Go drives. For more information on this deployment option, see [How to Provision Windows To Go in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/jj651035(v=technet.10)).
|
||||
|
||||
* If you're planning on using a USB drive duplicator to duplicate Windows To Go drives, don't configure offline domain join or BitLocker on the drive.
|
||||
- If you're planning on using a USB drive duplicator to duplicate Windows To Go drives, don't configure offline domain join or BitLocker on the drive.
|
||||
|
||||
## Basic deployment steps
|
||||
|
||||
Unless you're using a customized operating system image, your initial Windows To Go workspace won't be domain joined and won't contain applications. This is exactly like a new installation of Windows on a desktop or laptop computer. When planning your deployment, you should develop methods to join Windows to Go drives to the domain and install the standard applications that users in your organization require. These methods probably will be similar to the ones used for setting up desktop and laptop computers with domain privileges and applications. This section describes the instructions for creating the correct disk layout on the USB drive, applying the operating system image and the core Windows To Go specific configurations to the drive. The following steps are used in both small-scale and large-scale Windows To Go deployment scenarios.
|
||||
Unless you're using a customized operating system image, your initial Windows To Go workspace won't be domain joined, and won't contain applications. This is exactly like a new installation of Windows on a desktop or laptop computer. When planning your deployment, you should develop methods to join Windows to Go drives to the domain, and install the standard applications that users in your organization require. These methods probably will be similar to the ones used for setting up desktop and laptop computers with domain privileges and applications. This section describes the instructions for creating the correct disk layout on the USB drive, applying the operating system image and the core Windows To Go specific configurations to the drive. The steps that follow are used in both small-scale and large-scale Windows To Go deployment scenarios.
|
||||
|
||||
Completing these steps will give you a generic Windows To Go drive that can be distributed to your users and then customized for their usage as needed. This drive is also appropriate for use with USB drive duplicators. Your specific deployment scenarios will involve more than just these basic steps but these additional deployment considerations are similar to traditional PC deployment and can be incorporated into your Windows To Go deployment plan. For more information, see [Windows Deployment Options](/previous-versions/windows/it-pro/windows-8.1-and-8/hh825230(v=win.10)).
|
||||
|
||||
>[!WARNING]
|
||||
>If you plan to use the generic Windows To Go drive as the master drive in a USB duplicator, the drive should not be booted. If the drive has been booted inadvertently it should be reprovisioned prior to duplication.
|
||||
> [!WARNING]
|
||||
> If you plan to use the generic Windows To Go drive as the master drive in a USB duplicator, the drive should not be booted. If the drive has been booted inadvertently it should be reprovisioned prior to duplication.
|
||||
|
||||
### Create the Windows To Go workspace
|
||||
|
||||
In this step we're creating the operating system image that will be used on the Windows To Go drives. You can use the Windows To Go Creator Wizard or you can [do this manually](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)) using a combination of Windows PowerShell and command-line tools.
|
||||
|
||||
>[!WARNING]
|
||||
>The preferred method to create a single Windows To Go drive is to use the Windows To Go Creator Wizard included in Windows 10 Enterprise and Windows 10 Education.
|
||||
> [!WARNING]
|
||||
> The preferred method to create a single Windows To Go drive is to use the Windows To Go Creator Wizard included in Windows 10 Enterprise and Windows 10 Education.
|
||||
|
||||
#### To create a Windows To Go workspace with the Windows To Go Creator Wizard
|
||||
|
||||
@ -59,39 +59,33 @@ In this step we're creating the operating system image that will be used on the
|
||||
|
||||
2. Insert the USB drive that you want to use as your Windows To Go drive into your PC.
|
||||
|
||||
3. Verify that the .wim file location (which can be a network share, a DVD , or a USB drive) is accessible and that it contains a valid Windows 10 Enterprise or Windows 10 Education image that has been generalized using sysprep. Many environments can use the same image for both Windows To Go and desktop deployments.
|
||||
3. Verify that the `.wim` file location (which can be a network share, a DVD, or a USB drive) is accessible and that it contains a valid Windows 10 Enterprise or Windows 10 Education image that has been generalized using sysprep. Many environments can use the same image for both Windows To Go and desktop deployments.
|
||||
|
||||
>[!NOTE]
|
||||
>For more information about .wim files, see [Windows System Image Manager (Windows SIM) Technical Reference](/previous-versions/windows/it-pro/windows-8.1-and-8/hh824929(v=win.10)). For more information about using sysprep, see [Sysprep Overview](/previous-versions/windows/it-pro/windows-8.1-and-8/hh825209(v=win.10)).
|
||||
> [!NOTE]
|
||||
> For more information about `.wim` files, see [Windows System Image Manager (Windows SIM) Technical Reference](/previous-versions/windows/it-pro/windows-8.1-and-8/hh824929(v=win.10)). For more information about using sysprep, see [Sysprep Overview](/previous-versions/windows/it-pro/windows-8.1-and-8/hh825209(v=win.10)).
|
||||
|
||||
4. Using Cortana, search for **Windows To Go** and then press **Enter**. If the **User Account Control** dialog box appears, confirm that the action it displays is what you want, and then click **Yes**. The **Windows To Go Creator Wizard** opens.
|
||||
4. Search for **Windows To Go** and then press **Enter**. If the **User Account Control** dialog box appears, confirm that the action it displays is what you want, and then select **Yes**. The **Windows To Go Creator Wizard** opens.
|
||||
|
||||
5. On the **Choose the drive you want to use** page select the drive that represents the USB drive you inserted previously, then click **Next.**
|
||||
5. On the **Choose the drive you want to use** page select the drive that represents the USB drive you inserted previously, then select **Next.**
|
||||
|
||||
6. On the **Choose a Windows image** page, click **Add Search Location** and then navigate to the .wim file location and click select folder. The wizard will display the installable images present in the folder; select the Windows 10 Enterprise or Windows 10 Education image you wish to use and then click **Next**.
|
||||
6. On the **Choose a Windows image** page, select **Add Search Location** and then navigate to the `.wim` file location and select folder. The wizard will display the installable images present in the folder; select the Windows 10 Enterprise or Windows 10 Education image you wish to use and then select **Next**.
|
||||
|
||||
7. (Optional) On the **Set a BitLocker password (optional)** page, you can select **Use BitLocker with my Windows To Go Workspace** to encrypt your Windows To Go drive. If you don't wish to encrypt the drive at this time, click **Skip**. If you decide you want to add BitLocker protection later, see [Enable BitLocker protection for your Windows To Go drive](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)) for instructions.
|
||||
r
|
||||
7. (Optional) On the **Set a BitLocker password (optional)** page, you can select **Use BitLocker with my Windows To Go Workspace** to encrypt your Windows To Go drive. If you don't wish to encrypt the drive at this time, select **Skip**. If you decide you want to add BitLocker protection later, for instructions see [Enable BitLocker protection for your Windows To Go drive](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)).
|
||||
|
||||
>[!WARNING]
|
||||
>If you plan to use a USB-Duplicator to create multiple Windows To Go drives, do not enable BitLocker. Drives protected with BitLocker should not be duplicated.
|
||||
> [!WARNING]
|
||||
> If you plan to use a USB-Duplicator to create multiple Windows To Go drives, do not enable BitLocker. Drives protected with BitLocker should not be duplicated.
|
||||
|
||||
If you choose to encrypt the Windows To Go drive now:
|
||||
If you choose to encrypt the Windows To Go drive now, enter a password that is at least eight characters long and conforms to your organizations password complexity policy. This password will be provided before the operating system is started so any characters you use must be able to be interpreted by the firmware. Some firmware doesn't support non-ASCII characters.
|
||||
|
||||
- Type a password that is at least eight characters long and conforms to your organizations password complexity policy. This password will be provided before the operating system is started so any characters you use must be able to be interpreted by the firmware. Some firmware doesn't support non-ASCII characters.
|
||||
> [!IMPORTANT]
|
||||
> The BitLocker recovery password will be saved in the documents library of the computer used to create the workspace automatically. If your organization is using Active Directory Domain Services (AD DS) to store recovery passwords it will also be saved in AD DS under the computer account of the computer used to create the workspace. This password will be used only if you need to recover access to the drive because the BitLocker password specified in the previous step is not available, such as if a password is lost or forgotten. For more information about BitLocker and AD DS, see [Active Directory Domain Services considerations](/previous-versions/windows/it-pro/windows-8.1-and-8/jj592683(v=ws.11)).
|
||||
|
||||
8. Verify that the USB drive inserted is the one you want to provision for Windows To Go and then select **Create** to start the Windows To Go workspace creation process.
|
||||
|
||||
~~~
|
||||
>[!IMPORTANT]
|
||||
>The BitLocker recovery password will be saved in the documents library of the computer used to create the workspace automatically. If your organization is using Active Directory Domain Services (AD DS) to store recovery passwords it will also be saved in AD DS under the computer account of the computer used to create the workspace. This password will be used only if you need to recover access to the drive because the BitLocker password specified in the previous step is not available, such as if a password is lost or forgotten. For more information about BitLocker and AD DS, see [Active Directory Domain Services considerations](/previous-versions/windows/it-pro/windows-8.1-and-8/jj592683(v=ws.11)).
|
||||
~~~
|
||||
> [!WARNING]
|
||||
> The USB drive identified will be reformatted as part of the Windows To Go provisioning process and any data on the drive will be erased.
|
||||
|
||||
8. Verify that the USB drive inserted is the one you want to provision for Windows To Go and then click **Create** to start the Windows To Go workspace creation process.
|
||||
|
||||
>[!WARNING]
|
||||
>The USB drive identified will be reformatted as part of the Windows To Go provisioning process and any data on the drive will be erased.
|
||||
|
||||
9. Wait for the creation process to complete, which can take 20 to 30 minutes. A completion page will be displayed that tells you when your Windows To Go workspace is ready to use. From the completion page you can configure the Windows To Go startup options to configure the current computer as a Windows To Go host computer.
|
||||
9. Wait for the creation process to complete, which can take 20 to 30 minutes. A completion page will be displayed that tells you when your Windows To Go workspace is ready to use. From the completion page, you can configure the Windows To Go startup options to configure the current computer as a Windows To Go host computer.
|
||||
|
||||
Your Windows To Go workspace is now ready to be started. You can now [prepare a host computer](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)) using the Windows To Go startup options and boot your Windows To Go drive.
|
||||
|
||||
@ -99,33 +93,37 @@ Your Windows To Go workspace is now ready to be started. You can now [prepare a
|
||||
|
||||
The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints. This procedure can only be used on PCs that are running Windows 10. Before starting, ensure that only the USB drive that you want to provision as a Windows To Go drive is connected to the PC.
|
||||
|
||||
1. Using Cortana, search for **powershell**, right-click **Windows PowerShell**, and then select **Run as administrator**.
|
||||
1. Search for **powershell**, right-click **Windows PowerShell**, and then select **Run as administrator**.
|
||||
|
||||
2. In the Windows PowerShell session type, the following commands to partition a master boot record (MBR) disk for use with a FAT32 system partition and an NTFS-formatted operating system partition. This disk layout can support computers that use either UEFI or BIOS firmware:
|
||||
2. In the Windows PowerShell session, enter the following commands to partition a master boot record (MBR) disk for use with a FAT32 system partition and an NTFS-formatted operating system partition. This disk layout can support computers that use either UEFI or BIOS firmware:
|
||||
|
||||
```
|
||||
<br>
|
||||
<details>
|
||||
<summary>Expand to show PowerShell commands to partition an MBR disk</summary>
|
||||
|
||||
```powershell
|
||||
# The following command will set $Disk to all USB drives with >20 GB of storage
|
||||
|
||||
$Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot }
|
||||
|
||||
#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with 'New-Partition…) Validate that this is the correct disk that you want to completely erase.
|
||||
#
|
||||
# To skip the confirmation prompt, append –confirm:$False
|
||||
Clear-Disk –InputObject $Disk[0] -RemoveData
|
||||
# To skip the confirmation prompt, append -confirm:$False
|
||||
Clear-Disk -InputObject $Disk[0] -RemoveData
|
||||
|
||||
# This command initializes a new MBR disk
|
||||
Initialize-Disk –InputObject $Disk[0] -PartitionStyle MBR
|
||||
Initialize-Disk -InputObject $Disk[0] -PartitionStyle MBR
|
||||
|
||||
# This command creates a 350 MB system partition
|
||||
$SystemPartition = New-Partition –InputObject $Disk[0] -Size (350MB) -IsActive
|
||||
$SystemPartition = New-Partition -InputObject $Disk[0] -Size (350MB) -IsActive
|
||||
|
||||
# This formats the volume with a FAT32 Filesystem
|
||||
# To skip the confirmation dialog, append –Confirm:$False
|
||||
# To skip the confirmation dialog, append -Confirm:$False
|
||||
Format-Volume -NewFileSystemLabel "UFD-System" -FileSystem FAT32 `
|
||||
-Partition $SystemPartition
|
||||
|
||||
# This command creates the Windows volume using the maximum space available on the drive. The Windows To Go drive should not be used for other file storage.
|
||||
$OSPartition = New-Partition –InputObject $Disk[0] -UseMaximumSize
|
||||
$OSPartition = New-Partition -InputObject $Disk[0] -UseMaximumSize
|
||||
Format-Volume -NewFileSystemLabel "UFD-Windows" -FileSystem NTFS `
|
||||
-Partition $OSPartition
|
||||
|
||||
@ -137,28 +135,31 @@ The following Windows PowerShell cmdlet or cmdlets perform the same function as
|
||||
Set-Partition -InputObject $OSPartition -NoDefaultDriveLetter $TRUE
|
||||
```
|
||||
|
||||
3. Next you need to apply the operating system image that you want to use with Windows To Go to the operating system partition you just created on the disk (this may take 30 minutes or longer, depending on the size of the image and the speed of your USB connection). The following command shows how this can be accomplished using the [Deployment Image Servicing and Management](/windows-hardware/manufacture/desktop/dism---deployment-image-servicing-and-management-technical-reference-for-windows) command-line tool (DISM):
|
||||
</details>
|
||||
|
||||
>[!TIP]
|
||||
>The index number must be set correctly to a valid Enterprise image in the .WIM file.
|
||||
3. Next you need to apply the operating system image that you want to use with Windows To Go to the operating system partition you created on the disk (this may take 30 minutes or longer, depending on the size of the image and the speed of your USB connection). The following command shows how this can be accomplished using the [Deployment Image Servicing and Management](/windows-hardware/manufacture/desktop/dism---deployment-image-servicing-and-management-technical-reference-for-windows) command-line tool (DISM):
|
||||
|
||||
```
|
||||
> [!TIP]
|
||||
> The index number must be set correctly to a valid Enterprise image in the `.wim` file.
|
||||
|
||||
```cmd
|
||||
#The WIM file must contain a sysprep generalized image.
|
||||
dism /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /index:1 /applydir:W:\
|
||||
dism.exe /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /index:1 /applydir:W:\
|
||||
```
|
||||
|
||||
4. Now use the [bcdboot](/previous-versions/windows/it-pro/windows-8.1-and-8/hh824874(v=win.10)) command line tool to move the necessary boot components to the system partition on the disk. This helps ensure that the boot components, operating system versions, and architectures match. The `/f ALL` parameter indicates that boot components for UEFI and BIOS should be placed on the system partition of the disk. The following example illustrates this step:
|
||||
4. Now use the [bcdboot](/previous-versions/windows/it-pro/windows-8.1-and-8/hh824874(v=win.10)) command line tool to move the necessary boot components to the system partition on the disk. This helps ensure that the boot components, operating system versions, and architectures match. The `/f ALL` parameter indicates that boot components for UEFI and BIOS should be placed on the system partition of the disk. The following example illustrates this step:
|
||||
|
||||
|
||||
~~~
|
||||
```
|
||||
W:\Windows\System32\bcdboot W:\Windows /f ALL /s S:
|
||||
```
|
||||
~~~
|
||||
```cmd
|
||||
W:\Windows\System32\bcdboot.exe W:\Windows /f ALL /s S:
|
||||
```
|
||||
|
||||
5. Apply SAN policy—OFFLINE\_INTERNAL - "4" to prevent the operating system from automatically bringing online any internally connected disk. This is done by creating and saving a **san\_policy.xml** file on the disk. The following example illustrates this step:
|
||||
|
||||
```
|
||||
<br>
|
||||
<details>
|
||||
<summary>Expand to show example san_policy.xml file</summary>
|
||||
|
||||
```xml
|
||||
<?xml version='1.0' encoding='utf-8' standalone='yes'?>
|
||||
<unattend xmlns="urn:schemas-microsoft-com:unattend">
|
||||
<settings pass="offlineServicing">
|
||||
@ -188,15 +189,21 @@ W:\Windows\System32\bcdboot W:\Windows /f ALL /s S:
|
||||
</unattend>
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
6. Place the **san\_policy.xml** file created in the previous step into the root directory of the Windows partition on the Windows To Go drive (W: from the previous examples) and run the following command:
|
||||
|
||||
```
|
||||
```cmd
|
||||
Dism.exe /Image:W:\ /Apply-Unattend:W:\san_policy.xml
|
||||
```
|
||||
|
||||
7. Create an answer file (unattend.xml) that disables the use of Windows Recovery Environment with Windows To Go. You can use the following code sample to create a new answer file or you can paste it into an existing answer file:
|
||||
|
||||
```
|
||||
<br>
|
||||
<details>
|
||||
<summary>Expand to show example san_policy.xml file</summary>
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<unattend xmlns="urn:schemas-microsoft-com:unattend">
|
||||
<settings pass="oobeSystem">
|
||||
@ -220,88 +227,86 @@ W:\Windows\System32\bcdboot W:\Windows /f ALL /s S:
|
||||
</unattend>
|
||||
```
|
||||
|
||||
After the answer file has been saved, copy unattend.xml into the sysprep folder on the Windows To Go drive (for example, W:\\Windows\\System32\\sysprep\)
|
||||
</details>
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Setup unattend files are processed based on their location. Setup will place a temporary unattend file into the **%systemroot%\\panther** folder which is the first location that setup will check for installation information. You should make sure that folder does not contain a previous version of an unattend.xml file to ensure that the one you just created is used.
|
||||
After the answer file has been saved, copy `unattend.xml` into the sysprep folder on the Windows To Go drive (for example, `W:\Windows\System32\sysprep\`)
|
||||
|
||||
If you do not wish to boot your Windows To Go device on this computer and want to remove it to boot it on another PC, be sure to use the **Safely Remove Hardware and Eject Media** option to safely disconnect the drive before physically removing it from the PC.
|
||||
> [!IMPORTANT]
|
||||
> Setup unattend files are processed based on their location. Setup will place a temporary unattend file into the **`%systemroot%\panther`** folder which is the first location that setup will check for installation information. You should make sure that folder does not contain a previous version of an unattend.xml file to ensure that the one you just created is used.
|
||||
|
||||
If you don't wish to boot your Windows To Go device on this computer and want to remove it to boot it on another PC, be sure to use the **Safely Remove Hardware and Eject Media** option to safely disconnect the drive before physically removing it from the PC.
|
||||
|
||||
Your Windows To Go workspace is now ready to be started. You can now [prepare a host computer](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)) using the Windows To Go startup options to test your workspace configuration, [configure the workspace for offline domain join](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)), or [enable BitLocker protection for your Windows To Go drive](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)).
|
||||
|
||||
|
||||
### To prepare a host computer
|
||||
|
||||
Computers running Windows 8 and later can be configured as host computers that use Windows To Go automatically whenever a Windows To Go workspace is available at startup. When the Windows To Go startup options are enabled on a host computer, Windows will divert startup to the Windows To Go drive whenever it is attached to the computer. This makes it easy to switch from using the host computer to using the Windows To Go workspace.
|
||||
Computers running Windows 8 and later can be configured as host computers that use Windows To Go automatically whenever a Windows To Go workspace is available at startup. When the Windows To Go startup options are enabled on a host computer, Windows will divert startup to the Windows To Go drive whenever it's attached to the computer. This makes it easy to switch from using the host computer to using the Windows To Go workspace.
|
||||
|
||||
>[!TIP]
|
||||
>If you will be using a PC running Windows 7 as your host computer, see [Tips for configuring your BIOS settings to work with Windows To Go](https://go.microsoft.com/fwlink/p/?LinkId=618951) for information to help you prepare the host computer.
|
||||
> [!TIP]
|
||||
> If you will be using a PC running Windows 7 as your host computer, see [Tips for configuring your BIOS settings to work with Windows To Go](https://go.microsoft.com/fwlink/p/?LinkId=618951) for information to help you prepare the host computer.
|
||||
|
||||
|
||||
If you want to use the Windows To Go workspace, simply shut down the computer, plug in the Windows To Go drive, and turn on the computer. To use the host computer, shut down the Windows To Go workspace, unplug the Windows To Go drive, and turn on the computer.
|
||||
If you want to use the Windows To Go workspace, shut down the computer, plug in the Windows To Go drive, and turn on the computer. To use the host computer, shut down the Windows To Go workspace, unplug the Windows To Go drive, and turn on the computer.
|
||||
|
||||
To set the Windows To Go Startup options for host computers running Windows 10:
|
||||
|
||||
1. Using Cortana, search for **Windows To Go startup options** and then press **Enter**.
|
||||
1. Search for **Windows To Go startup options** and then press **Enter**.
|
||||
|
||||
2. In the **Windows To Go Startup Options** dialog box, select **Yes**, and then click **Save Changes** to configure the computer to boot from USB
|
||||
2. In the **Windows To Go Startup Options** dialog box, select **Yes**, and then select **Save Changes** to configure the computer to boot from USB
|
||||
|
||||
For host computers running Windows 8 or Windows 8.1:
|
||||
|
||||
1. Press **Windows logo key+W**, search for **Windows To Go startup options**, and then press **Enter**.
|
||||
|
||||
2. In the **Windows To Go Startup Options** dialog box, select **Yes**, and then click **Save Changes** to configure the computer to boot from USB.
|
||||
2. In the **Windows To Go Startup Options** dialog box, select **Yes**, and then select **Save Changes** to configure the computer to boot from USB.
|
||||
|
||||
You can configure your organization's computers to automatically start from the USB drive by enabling the following Group Policy setting:
|
||||
|
||||
**\\\\Computer Configuration\\Administrative Templates\\Windows Components\\Portable Operating System\\Windows To Go Default Startup Options**
|
||||
**Computer Configuration** > **Administrative Templates** > **Windows Components** > **Portable Operating System** > **Windows To Go Default Startup Options**
|
||||
|
||||
After this policy setting is enabled, automatic starting of a Windows To Go workspace will be attempted when a USB drive is connected to the computer when it is started. Users will not be able to use the Windows To Go Startup Options to change this behavior. If you disable this policy setting, booting to Windows To Go when a USB drive is connected will not occur unless a user configures the option manually in the firmware. If you do not configure this policy setting, users who are members of the Administrators group can enable or disable booting from a USB drive using the Windows To Go Startup Options.
|
||||
After this policy setting is enabled, automatic starting of a Windows To Go workspace will be attempted when a USB drive is connected to the computer when it's started. Users won't be able to use the Windows To Go Startup Options to change this behavior. If you disable this policy setting, booting to Windows To Go when a USB drive is connected won't occur unless a user configures the option manually in the firmware. If you don't configure this policy setting, users who are members of the Administrators group can enable or disable booting from a USB drive using the Windows To Go Startup Options.
|
||||
|
||||
Your host computer is now ready to boot directly into Windows To Go workspace when it is inserted prior to starting the computer. Optionally you can perform [Configure Windows To Go workspace for offline domain join](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)) and [Enable BitLocker protection for your Windows To Go drive](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)).
|
||||
Your host computer is now ready to boot directly into Windows To Go workspace when it's inserted prior to starting the computer. Optionally you can perform [Configure Windows To Go workspace for offline domain join](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)) and [Enable BitLocker protection for your Windows To Go drive](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)).
|
||||
|
||||
### Booting your Windows To Go workspace
|
||||
|
||||
After you have configured your host PC to boot from USB, you can use the following procedure to boot your Windows To Go workspace:
|
||||
After you've configured your host PC to boot from USB, you can use the following procedure to boot your Windows To Go workspace:
|
||||
|
||||
**To boot your workspace**
|
||||
**To boot your workspace:**
|
||||
|
||||
1. Make sure that the host PC is not in a sleep state. If the computer is in a sleep state, either shut it down or hibernate it.
|
||||
1. Make sure that the host PC isn't in a sleep state. If the computer is in a sleep state, either shut it down or hibernate it.
|
||||
|
||||
2. Insert the Windows To Go USB drive directly into a USB 3.0 or USB 2.0 port on the PC. Do not use a USB hub or extender.
|
||||
2. Insert the Windows To Go USB drive directly into a USB 3.0 or USB 2.0 port on the PC. Don't use a USB hub or extender.
|
||||
|
||||
3. Turn on the PC. If your Windows To Go drive is protected with BitLocker you will be asked to type the password, otherwise the workspace will boot directly into the Windows To Go workspace.
|
||||
3. Turn on the PC. If your Windows To Go drive is protected with BitLocker you'll be asked to enter the password, otherwise the workspace will boot directly into the Windows To Go workspace.
|
||||
|
||||
## Advanced deployment steps
|
||||
|
||||
|
||||
The following steps are used for more advanced deployments where you want to have further control over the configuration of the Windows To Go drives, ensure that they are correctly configured for remote access to your organizational resources, and have been protected with BitLocker Drive Encryption.
|
||||
The following steps are used for more advanced deployments where you want to have further control over the configuration of the Windows To Go drives, ensure that they're correctly configured for remote access to your organizational resources, and have been protected with BitLocker Drive Encryption.
|
||||
|
||||
### Configure Windows To Go workspace for remote access
|
||||
|
||||
Making sure that Windows To Go workspaces are effective when used off premises is essential to a successful deployment. One of the key benefits of Windows To Go is the ability for your users to use the enterprise managed domain joined workspace on an unmanaged computer which is outside your corporate network. To enable this usage, typically you would provision the USB drive as described in the basic deployment instructions and then add the configuration to support domain joining of the workspace, installation of any line-of-business applications, and configuration of your chosen remote connectivity solution such as a virtual private network client or DirectAccess. Once these configurations have been performed the user can work from the workspace using a computer that is off-premises. The following procedure allows you to provision domain joined Windows To Go workspaces for workers that do not have physical access to your corporate network.
|
||||
Making sure that Windows To Go workspaces are effective when used off premises is essential to a successful deployment. One of the key benefits of Windows To Go is the ability for your users to use the enterprise managed domain joined workspace on an unmanaged computer that is outside your corporate network. To enable this usage, typically you would provision the USB drive as described in the basic deployment instructions and then add the configuration to support domain joining of the workspace, installation of any line-of-business applications, and configuration of your chosen remote connectivity solution such as a virtual private network client or DirectAccess. Once these configurations have been performed the user can work from the workspace using a computer that is off-premises. The following procedure allows you to provision domain joined Windows To Go workspaces for workers that don't have physical access to your corporate network.
|
||||
|
||||
**Prerequisites for remote access scenario**
|
||||
**Prerequisites for remote access scenario:**
|
||||
|
||||
- A domain-joined computer running Windows 8 or later and is configured as a Windows To Go host computer
|
||||
- A domain-joined computer running Windows 8 or later and is configured as a Windows To Go host computer
|
||||
|
||||
- A Windows To Go drive that hasn't been booted or joined to the domain using unattend settings.
|
||||
- A Windows To Go drive that hasn't been booted or joined to the domain using unattend settings.
|
||||
|
||||
- A domain user account with rights to add computer accounts to the domain and is a member of the Administrator group on the Windows To Go host computer
|
||||
- A domain user account with rights to add computer accounts to the domain and is a member of the Administrator group on the Windows To Go host computer
|
||||
|
||||
- [DirectAccess](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831539(v=ws.11)) configured on the domain
|
||||
- [DirectAccess](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831539(v=ws.11)) configured on the domain
|
||||
|
||||
**To configure your Windows To Go workspace for remote access**
|
||||
**To configure your Windows To Go workspace for remote access:**
|
||||
|
||||
1. Start the host computer and sign in using a user account with privileges to add workstations to the domain and then run the following command from an elevated command prompt replacing the example placeholder parameters (denoted by <>) with the ones applicable for your environment:
|
||||
|
||||
```
|
||||
djoin /provision /domain <exampledomain.com> /machine <examplewindowstogo_workspace_name> /certtemplate <WorkstationAuthentication_template> /policynames <DirectAccess Client Policy: {GUID}> /savefile <C:\example\path\domainmetadatafile> /reuse
|
||||
```cmd
|
||||
djoin.exe /provision /domain <exampledomain.com> /machine <examplewindowstogo_workspace_name> /certtemplate <WorkstationAuthentication_template> /policynames <DirectAccess Client Policy: {GUID}> /savefile <C:\example\path\domainmetadatafile> /reuse
|
||||
```
|
||||
|
||||
>[!NOTE]
|
||||
>The **/certtemplate** parameter supports the use of certificate templates for distributing certificates for DirectAccess, if your organization is not using certificate templates you can omit this parameter. Additionally, if are using djoin.exe with Windows Server 2008-based Domain Controllers, append the /downlevel switch during provisioning. For more information see the [Offline Domain Join Step-by-Step guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd392267(v=ws.10)).
|
||||
> [!NOTE]
|
||||
> The **/certtemplate** parameter supports the use of certificate templates for distributing certificates for DirectAccess, if your organization is not using certificate templates you can omit this parameter. Additionally, if are using `djoin.exe` with Windows Server 2008-based Domain Controllers, append the /downlevel switch during provisioning. For more information, see the [Offline Domain Join Step-by-Step guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd392267(v=ws.10)).
|
||||
|
||||
2. Insert the Windows To Go drive.
|
||||
|
||||
@ -309,29 +314,33 @@ Making sure that Windows To Go workspaces are effective when used off premises i
|
||||
|
||||
4. From the Windows PowerShell command prompt run:
|
||||
|
||||
```
|
||||
<br>
|
||||
<details>
|
||||
<summary>Expand this section to show PowerShell commands to run</summary>
|
||||
|
||||
```powershell
|
||||
# The following command will set $Disk to all USB drives with >20 GB of storage
|
||||
|
||||
$Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot }
|
||||
|
||||
#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with 'New-Partition…) Validate that this is the correct disk that you want to completely erase.
|
||||
#
|
||||
# To skip the confirmation prompt, append –confirm:$False
|
||||
Clear-Disk –InputObject $Disk[0] -RemoveData
|
||||
# To skip the confirmation prompt, append -confirm:$False
|
||||
Clear-Disk -InputObject $Disk[0] -RemoveData
|
||||
|
||||
# This command initializes a new MBR disk
|
||||
Initialize-Disk –InputObject $Disk[0] -PartitionStyle MBR
|
||||
Initialize-Disk -InputObject $Disk[0] -PartitionStyle MBR
|
||||
|
||||
# This command creates a 350 MB system partition
|
||||
$SystemPartition = New-Partition –InputObject $Disk[0] -Size (350MB) -IsActive
|
||||
$SystemPartition = New-Partition -InputObject $Disk[0] -Size (350MB) -IsActive
|
||||
|
||||
# This formats the volume with a FAT32 Filesystem
|
||||
# To skip the confirmation dialog, append –Confirm:$False
|
||||
# To skip the confirmation dialog, append -Confirm:$False
|
||||
Format-Volume -NewFileSystemLabel "UFD-System" -FileSystem FAT32 `
|
||||
-Partition $SystemPartition
|
||||
|
||||
# This command creates the Windows volume using the maximum space available on the drive. The Windows To Go drive should not be used for other file storage.
|
||||
$OSPartition = New-Partition –InputObject $Disk[0] -UseMaximumSize
|
||||
$OSPartition = New-Partition -InputObject $Disk[0] -UseMaximumSize
|
||||
Format-Volume -NewFileSystemLabel "UFD-Windows" -FileSystem NTFS `
|
||||
-Partition $OSPartition
|
||||
|
||||
@ -343,28 +352,31 @@ Making sure that Windows To Go workspaces are effective when used off premises i
|
||||
Set-Partition -InputObject $OSPartition -NoDefaultDriveLetter $TRUE
|
||||
```
|
||||
|
||||
5. Next you need to apply the operating system image that you want to use with Windows To Go to the operating system partition you just created on the disk (this may take 30 minutes or longer, depending on the size of the image and the speed of your USB connection). The following command shows how this can be accomplished using the [Deployment Image Servicing and Management](/windows-hardware/manufacture/desktop/dism---deployment-image-servicing-and-management-technical-reference-for-windows) command-line tool (DISM):
|
||||
</details>
|
||||
|
||||
5. Next you need to apply the operating system image that you want to use with Windows To Go to the operating system partition you created on the disk (this may take 30 minutes or longer, depending on the size of the image and the speed of your USB connection). The following command shows how this can be accomplished using the [Deployment Image Servicing and Management](/windows-hardware/manufacture/desktop/dism---deployment-image-servicing-and-management-technical-reference-for-windows) command-line tool (DISM):
|
||||
|
||||
~~~
|
||||
>[!TIP]
|
||||
>The index number must be set correctly to a valid Enterprise image in the .WIM file.
|
||||
```cmd
|
||||
#The WIM file must contain a sysprep generalized image.
|
||||
dism.exe /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /index:1 /applydir:W:\
|
||||
```
|
||||
|
||||
```
|
||||
#The WIM file must contain a sysprep generalized image.
|
||||
dism /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /index:1 /applydir:W:\
|
||||
```
|
||||
~~~
|
||||
> [!TIP]
|
||||
> The index number must be set correctly to a valid Enterprise image in the `.wim` file.
|
||||
|
||||
6. After those commands have completed, run the following command:
|
||||
|
||||
```
|
||||
djoin /requestodj /loadfile C:\example\path\domainmetadatafile /windowspath W:\Windows
|
||||
```cmd
|
||||
djoin.exe /requestodj /loadfile C:\example\path\domainmetadatafile /windowspath W:\Windows
|
||||
```
|
||||
|
||||
7. Next, we will need to edit the unattend.xml file to configure the first run (OOBE) settings. In this example we are hiding the Microsoft Software License Terms (EULA) page, configuring automatic updates to install important and recommended updates automatically, and identifying this workspace as part of a private office network. You can use other OOBE settings that you have configured for your organization if desired. For more information about the OOBE settings, see [OOBE](/previous-versions/windows/it-pro/windows-8.1-and-8/ff716016(v=win.10)):
|
||||
7. Next, we'll need to edit the unattend.xml file to configure the first run (OOBE) settings. In this example we're hiding the Microsoft Software License Terms (EULA) page, configuring automatic updates to install important and recommended updates automatically, and identifying this workspace as part of a private office network. You can use other OOBE settings that you've configured for your organization if desired. For more information about the OOBE settings, see [OOBE](/previous-versions/windows/it-pro/windows-8.1-and-8/ff716016(v=win.10)):
|
||||
|
||||
```
|
||||
<br>
|
||||
<details>
|
||||
<summary>Expand this section to show example unattend.xml file</summary>
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<unattend xmlns="urn:schemas-microsoft-com:unattend">
|
||||
<settings pass="oobeSystem">
|
||||
@ -398,51 +410,61 @@ dism /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /ind
|
||||
</unattend>
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
8. Safely remove the Windows To Go drive.
|
||||
|
||||
9. From a host computer, either on or off premises, start the computer and boot the Windows To Go workspace.
|
||||
|
||||
* If on premises using a host computer with a direct network connection, sign on using your domain credentials.
|
||||
- If on premises using a host computer with a direct network connection, sign on using your domain credentials.
|
||||
|
||||
* If off premises, join a wired or wireless network with internet access and then sign on again using your domain credentials.
|
||||
- If off premises, join a wired or wireless network with internet access and then sign on again using your domain credentials.
|
||||
|
||||
>[!NOTE]
|
||||
>Depending on your DirectAccess configuration you might be asked to insert your smart card to log on to the domain.
|
||||
> [!NOTE]
|
||||
> Depending on your DirectAccess configuration you might be asked to insert your smart card to log on to the domain.
|
||||
|
||||
You should now be able to access your organization's network resources and work from your Windows To Go workspace as you would normally work from your standard desktop computer on premises.
|
||||
|
||||
### Enable BitLocker protection for your Windows To Go drive
|
||||
|
||||
Enabling BitLocker on your Windows To Go drive will help ensure that your data is protected from unauthorized use and that if your Windows To Go drive is lost or stolen it will not be easy for an unauthorized person to obtain confidential data or use the workspace to gain access to protected resources in your organization. When BitLocker is enabled, each time you boot your Windows To Go drive, you will be asked to provide the BitLocker password to unlock the drive. The following procedure provides the steps for enabling BitLocker on your Windows To Go drive:
|
||||
Enabling BitLocker on your Windows To Go drive will help ensure that your data is protected from unauthorized use and that if your Windows To Go drive is lost or stolen it will not be easy for an unauthorized person to obtain confidential data or use the workspace to gain access to protected resources in your organization. When BitLocker is enabled, each time you boot your Windows To Go drive, you'll be asked to provide the BitLocker password to unlock the drive. The following procedure provides the steps for enabling BitLocker on your Windows To Go drive:
|
||||
|
||||
#### Prerequisites for enabling BitLocker scenario
|
||||
|
||||
* A Windows To Go drive that can be successfully provisioned.
|
||||
- A Windows To Go drive that can be successfully provisioned.
|
||||
|
||||
* A computer running Windows 8 configured as a Windows To Go host computer
|
||||
- A computer running Windows 8 configured as a Windows To Go host computer
|
||||
|
||||
* Review the following Group Policy settings for BitLocker Drive Encryption and modify the configuration as necessary:
|
||||
- Review the following Group Policy settings for BitLocker Drive Encryption and modify the configuration as necessary:
|
||||
|
||||
**\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives\\Require additional authentication at startup**. This policy allows the use of a password key protector with an operating system drive; this policy must be enabled to configure BitLocker from within the Windows To Go workspace. This policy setting allows you to configure whether BitLocker requires additional authentication each time the computer starts and whether you are using BitLocker with or without a Trusted Platform Module (TPM). You must enable this setting and select the **Allow BitLocker without a compatible TPM** check box and then enable the **Configure use of passwords for operating system drives** setting.
|
||||
- **Windows Components** > **BitLocker Drive Encryption** > **Operating System Drives** > **Require additional authentication at startup**
|
||||
|
||||
**\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives\\Configure use of passwords for operating system drives**. This policy setting enables passwords to be used to unlock BitLocker-protected operating system drives and provides the means to configure complexity and length requirements on passwords for Windows To Go workspaces. For the complexity requirement setting to be effective the Group Policy setting **Password must meet complexity requirements** located in **Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy\\** must be also enabled.
|
||||
This policy allows the use of a password key protector with an operating system drive; this policy must be enabled to configure BitLocker from within the Windows To Go workspace. This policy setting allows you to configure whether BitLocker requires additional authentication each time the computer starts and whether you're using BitLocker with or without a Trusted Platform Module (TPM). You must enable this setting and select the **Allow BitLocker without a compatible TPM** check box and then enable the **Configure use of passwords for operating system drives** setting.
|
||||
|
||||
**\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives\\Enable use of BitLocker authentication requiring preboot keyboard input on slates**. This policy setting allows users to enable authentication options that require user input from the preboot environment even if the platform indicates a lack of preboot input capability. If this setting is not enabled, passwords cannot be used to unlock BitLocker-protected operating system drives.
|
||||
- **Windows Components** > **BitLocker Drive Encryption** > **Operating System Drives** > **Configure use of passwords for operating system drives**
|
||||
|
||||
This policy setting enables passwords to be used to unlock BitLocker-protected operating system drives and provides the means to configure complexity and length requirements on passwords for Windows To Go workspaces. For the complexity requirement setting to be effective the Group Policy setting **Password must meet complexity requirements** located in **Computer Configuration** > **Windows Settings** > **Security Settings** > **Account Policies** > **Password Policy** must be also enabled.
|
||||
|
||||
- **Windows Components** > **BitLocker Drive Encryption** > **Operating System Drives** > **Enable use of BitLocker authentication requiring preboot keyboard input on slates**
|
||||
|
||||
This policy setting allows users to enable authentication options that require user input from the preboot environment even if the platform indicates a lack of preboot input capability. If this setting isn't enabled, passwords can't be used to unlock BitLocker-protected operating system drives.
|
||||
|
||||
You can choose to enable BitLocker protection on Windows To Go drives before distributing them to users as part of your provisioning process or you can allow your end-users to apply BitLocker protection to them after they have taken possession of the drive. A step-by-step procedure is provided for both scenarios.
|
||||
|
||||
Enabling BitLocker during provisioning ensures that your operating system image is always protected by BitLocker. When enabling BitLocker during the provisioning process you can significantly reduce the time required for encrypting the drive by enabling BitLocker after configuring the disk and just prior to applying the image. If you use this method, you will need to give users their BitLocker password when you give then their Windows To Go workspace. Also, you should instruct your users to boot their workspace and change their BitLocker password as soon as possible (this can be done with standard user privileges).
|
||||
Enabling BitLocker during provisioning ensures that your operating system image is always protected by BitLocker. When enabling BitLocker during the provisioning process you can significantly reduce the time required for encrypting the drive by enabling BitLocker after configuring the disk and just prior to applying the image. If you use this method, you'll need to give users their BitLocker password when you give then their Windows To Go workspace. Also, you should instruct your users to boot their workspace and change their BitLocker password as soon as possible (this can be done with standard user privileges).
|
||||
|
||||
Enabling BitLocker after distribution requires that your users turn on BitLocker. This means that your Windows To Go workspaces are unprotected until the user enables BitLocker. Administrative rights on the Windows To Go workspace are required to enable BitLocker. For more information about BitLocker see the [BitLocker Overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831713(v=ws.11)).
|
||||
Enabling BitLocker after distribution requires that your users turn on BitLocker. This means that your Windows To Go workspaces are unprotected until the user enables BitLocker. Administrative rights on the Windows To Go workspace are required to enable BitLocker. For more information about BitLocker, see the [BitLocker Overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831713(v=ws.11)).
|
||||
|
||||
#### BitLocker recovery keys
|
||||
|
||||
BitLocker recovery keys are the keys that can be used to unlock a BitLocker protected drive if the standard unlock method fails. It is recommended that your BitLocker recovery keys be backed up to Active Directory Domain Services (AD DS). If you do not want to use AD DS to store recovery keys you can save recovery keys to a file or print them. How BitLocker recovery keys are managed differs depending on when BitLocker is enabled.
|
||||
BitLocker recovery keys are the keys that can be used to unlock a BitLocker protected drive if the standard unlock method fails. It's recommended that your BitLocker recovery keys be backed up to Active Directory Domain Services (AD DS). If you don't want to use AD DS to store recovery keys you can save recovery keys to a file or print them. How BitLocker recovery keys are managed differs depending on when BitLocker is enabled.
|
||||
|
||||
- If BitLocker protection is enabled during provisioning, the BitLocker recovery keys will be stored under the computer account of the computer used for provisioning the drives. If backing up recovery keys to AD DS is not used, the recovery keys will need to be printed or saved to a file for each drive. The IT administrator must track which keys were assigned to which Windows To Go drive.
|
||||
- If BitLocker protection is enabled during provisioning, the BitLocker recovery keys will be stored under the computer account of the computer used for provisioning the drives. If backing up recovery keys to AD DS isn't used, the recovery keys will need to be printed or saved to a file for each drive. The IT administrator must track which keys were assigned to which Windows To Go drive.
|
||||
|
||||
- **Warning**
|
||||
If BitLocker is enabled after distribution, the recovery key will be backed up to AD DS under the computer account of the workspace. If backing up recovery keys to AD DS is not used, they can be printed or saved to a file by the user. If the IT administrator wants a central record of recovery keys, a process by which the user provides the key to the IT department must be put in place.
|
||||
- If BitLocker is enabled after distribution, the recovery key will be backed up to AD DS under the computer account of the workspace. If backing up recovery keys to AD DS isn't used, they can be printed or saved to a file by the user.
|
||||
|
||||
> [!WARNING]
|
||||
> If backing up recovery keys to AD DS isn't used and the IT administrator wants a central record of recovery keys, a process by which the user provides the key to the IT department must be put in place.
|
||||
|
||||
#### To enable BitLocker during provisioning
|
||||
|
||||
@ -454,32 +476,36 @@ BitLocker recovery keys are the keys that can be used to unlock a BitLocker prot
|
||||
|
||||
4. Provision the Windows To Go drive using the following cmdlets:
|
||||
|
||||
>[!NOTE]
|
||||
>If you used the [manual method for creating a workspace](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)) you should have already provisioned the Windows To Go drive. If so, you can continue on to the next step.
|
||||
> [!NOTE]
|
||||
> If you used the [manual method for creating a workspace](/previous-versions/windows/it-pro/windows-8.1-and-8/jj721578(v=ws.11)) you should have already provisioned the Windows To Go drive. If so, you can continue on to the next step.
|
||||
|
||||
```
|
||||
<br>
|
||||
<details>
|
||||
<summary>Expand this section to show PowerShell commands to run</summary>
|
||||
|
||||
```powershell
|
||||
# The following command will set $Disk to all USB drives with >20 GB of storage
|
||||
|
||||
$Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot }
|
||||
|
||||
#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with 'New-Partition…) Validate that this is the correct disk that you want to completely erase.
|
||||
#
|
||||
# To skip the confirmation prompt, append –confirm:$False
|
||||
Clear-Disk –InputObject $Disk[0] -RemoveData
|
||||
# To skip the confirmation prompt, append -confirm:$False
|
||||
Clear-Disk -InputObject $Disk[0] -RemoveData
|
||||
|
||||
# This command initializes a new MBR disk
|
||||
Initialize-Disk –InputObject $Disk[0] -PartitionStyle MBR
|
||||
Initialize-Disk -InputObject $Disk[0] -PartitionStyle MBR
|
||||
|
||||
# This command creates a 350 MB system partition
|
||||
$SystemPartition = New-Partition –InputObject $Disk[0] -Size (350MB) -IsActive
|
||||
$SystemPartition = New-Partition -InputObject $Disk[0] -Size (350MB) -IsActive
|
||||
|
||||
# This formats the volume with a FAT32 Filesystem
|
||||
# To skip the confirmation dialog, append –Confirm:$False
|
||||
# To skip the confirmation dialog, append -Confirm:$False
|
||||
Format-Volume -NewFileSystemLabel "UFD-System" -FileSystem FAT32 `
|
||||
-Partition $SystemPartition
|
||||
|
||||
# This command creates the Windows volume using the maximum space available on the drive. The Windows To Go drive should not be used for other file storage.
|
||||
$OSPartition = New-Partition –InputObject $Disk[0] -UseMaximumSize
|
||||
$OSPartition = New-Partition -InputObject $Disk[0] -UseMaximumSize
|
||||
Format-Volume -NewFileSystemLabel "UFD-Windows" -FileSystem NTFS `
|
||||
-Partition $OSPartition
|
||||
|
||||
@ -491,25 +517,27 @@ BitLocker recovery keys are the keys that can be used to unlock a BitLocker prot
|
||||
Set-Partition -InputObject $OSPartition -NoDefaultDriveLetter $TRUE
|
||||
```
|
||||
|
||||
Next you need to apply the operating system image that you want to use with Windows To Go to the operating system partition you just created on the disk (this may take 30 minutes or longer, depending on the size of the image and the speed of your USB connection). The following command shows how this can be accomplished using the [Deployment Image Servicing and Management](/windows-hardware/manufacture/desktop/dism---deployment-image-servicing-and-management-technical-reference-for-windows) command-line tool (DISM):
|
||||
</details>
|
||||
|
||||
>[!TIP]
|
||||
>The index number must be set correctly to a valid Enterprise image in the .WIM file.
|
||||
Next you need to apply the operating system image that you want to use with Windows To Go to the operating system partition you created on the disk (this may take 30 minutes or longer, depending on the size of the image and the speed of your USB connection). The following command shows how this can be accomplished using the [Deployment Image Servicing and Management](/windows-hardware/manufacture/desktop/dism---deployment-image-servicing-and-management-technical-reference-for-windows) command-line tool (DISM):
|
||||
|
||||
```
|
||||
> [!TIP]
|
||||
> The index number must be set correctly to a valid Enterprise image in the `.wim` file.
|
||||
|
||||
```cmd
|
||||
#The WIM file must contain a sysprep generalized image.
|
||||
dism /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /index:1 /applydir:W:\
|
||||
dism.exe /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /index:1 /applydir:W:\
|
||||
```
|
||||
|
||||
5. In the same PowerShell session use the following cmdlet to add a recovery key to the drive:
|
||||
5. In the same PowerShell session, use the following cmdlet to add a recovery key to the drive:
|
||||
|
||||
```
|
||||
```powershell
|
||||
$BitlockerRecoveryProtector = Add-BitLockerKeyProtector W: -RecoveryPasswordProtector
|
||||
```
|
||||
|
||||
6. Next, use the following cmdlets to save the recovery key to a file:
|
||||
|
||||
```
|
||||
```powershell
|
||||
#The BitLocker Recovery key is essential if for some reason you forget the BitLocker password
|
||||
#This recovery key can also be backed up into Active Directory using manage-bde.exe or the
|
||||
#PowerShell cmdlet Backup-BitLockerKeyProtector.
|
||||
@ -519,61 +547,60 @@ BitLocker recovery keys are the keys that can be used to unlock a BitLocker prot
|
||||
|
||||
7. Then, use the following cmdlets to add the password as a secure string. If you omit the password the cmdlet will prompt you for the password before continuing the operation:
|
||||
|
||||
```
|
||||
```powershell
|
||||
# Create a variable to store the password
|
||||
$spwd = ConvertTo-SecureString -String <password> -AsplainText –Force
|
||||
$spwd = ConvertTo-SecureString -String <password> -AsplainText -Force
|
||||
Enable-BitLocker W: -PasswordProtector $spwd
|
||||
```
|
||||
|
||||
>[!WARNING]
|
||||
>To have BitLocker only encrypt used space on the disk append the parameter `–UsedSpaceOnly` to the `Enable-BitLocker` cmdlet. As data is added to the drive BitLocker will encrypt additional space. Using this parameter will speed up the preparation process as a smaller percentage of the disk will require encryption. If you are in a time critical situation where you cannot wait for encryption to complete you can also safely remove the Windows To Go drive during the encryption process. The next time the drive is inserted in a computer it will request the BitLocker password. Once the password is supplied, the encryption process will continue. If you do this, make sure your users know that BitLocker encryption is still in process and that they will be able to use the workspace while the encryption completes in the background.
|
||||
> [!WARNING]
|
||||
> To have BitLocker only encrypt used space on the disk append the parameter `-UsedSpaceOnly` to the `Enable-BitLocker` cmdlet. As data is added to the drive BitLocker will encrypt additional space. Using this parameter will speed up the preparation process as a smaller percentage of the disk will require encryption. If you are in a time critical situation where you cannot wait for encryption to complete you can also safely remove the Windows To Go drive during the encryption process. The next time the drive is inserted in a computer it will request the BitLocker password. Once the password is supplied, the encryption process will continue. If you do this, make sure your users know that BitLocker encryption is still in process and that they will be able to use the workspace while the encryption completes in the background.
|
||||
|
||||
8. Copy the numerical recovery password and save it to a file in a safe location. The recovery password will be required if the password is lost or forgotten.
|
||||
|
||||
>[!WARNING]
|
||||
>If the **Choose how BitLocker-protected removable data drives can be recovered** Group Policy setting has been configured to back up recovery information to Active Directory Domain Services, the recovery information for the drive will be stored under the account of the host computer used to apply the recovery key.
|
||||
> [!WARNING]
|
||||
> If the **Choose how BitLocker-protected removable data drives can be recovered** Group Policy setting has been configured to back up recovery information to Active Directory Domain Services, the recovery information for the drive will be stored under the account of the host computer used to apply the recovery key.
|
||||
|
||||
If you want to have the recovery information stored under the account of the Windows To Go workspace you can turn BitLocker from within the Windows To Go workspace using the BitLocker Setup Wizard from the BitLocker Control Panel item as described in [To enable BitLocker after distribution](#enable-bitlocker).
|
||||
If you want to have the recovery information stored under the account of the Windows To Go workspace, you can turn BitLocker from within the Windows To Go workspace using the BitLocker Setup Wizard from the BitLocker Control Panel item as described in [To enable BitLocker after distribution](#to-enable-bitlocker-after-distribution).
|
||||
|
||||
9. Safely remove the Windows To Go drive.
|
||||
|
||||
The Windows To Go drives are now ready to be distributed to users and are protected by BitLocker. When you distribute the drives, make sure the users know the following:
|
||||
The Windows To Go drives are now ready to be distributed to users and are protected by BitLocker. When you distribute the drives, make sure the users know the following information:
|
||||
|
||||
* Initial BitLocker password that they will need to boot the drives.
|
||||
- Initial BitLocker password that they'll need to boot the drives.
|
||||
|
||||
* Current encryption status.
|
||||
- Current encryption status.
|
||||
|
||||
* Instructions to change the BitLocker password after the initial boot.
|
||||
- Instructions to change the BitLocker password after the initial boot.
|
||||
|
||||
* Instructions for how to retrieve the recovery password if necessary. This may be a help desk process, an automated password retrieval site, or a person to contact.
|
||||
- Instructions for how to retrieve the recovery password if necessary. These instructions may be a help desk process, an automated password retrieval site, or a person to contact.
|
||||
|
||||
<a href="" id="enable-bitlocker"></a>
|
||||
#### To enable BitLocker after distribution
|
||||
|
||||
1. Insert your Windows To Go drive into your host computer (that is currently shut down) and then turn on the computer and boot into your Windows To Go workspace
|
||||
|
||||
2. Press **Windows logo key+W** to open **Search Settings**, type BitLocker and then select the item for BitLocker Drive Encryption.
|
||||
|
||||
3. The drives on the workspace are displayed, click **Turn BitLocker On** for the C: drive. The **BitLocker Setup Wizard** appears.
|
||||
3. The drives on the workspace are displayed, select **Turn BitLocker On** for the C: drive. The **BitLocker Setup Wizard** appears.
|
||||
|
||||
4. Complete the steps in the **BitLocker Setup Wizard** selecting the password protection option.
|
||||
|
||||
>[!NOTE]
|
||||
>If you have not configured the Group Policy setting **\\Windows Components\\BitLocker Drive Encryption\\Operating System Drives\\Require additional authentication at startup** to specify **Allow BitLocker without a compatible TPM** you will not be able to enable BitLocker from within the Windows To Go workspace.
|
||||
> [!NOTE]
|
||||
> If you have not configured the Group Policy setting **Windows Components** > **BitLocker Drive Encryption** > **Operating System Drives** > **Require additional authentication at startup** to specify **Allow BitLocker without a compatible TPM** you will not be able to enable BitLocker from within the Windows To Go workspace.
|
||||
|
||||
### Advanced deployment sample script
|
||||
|
||||
The following sample script supports the provisioning of multiple Windows To Go drives and the configuration of offline domain join.
|
||||
|
||||
The sample script creates an unattend file that streamlines the deployment process so that the initial use of the Windows To Go drive does not prompt the end user for any additional configuration information before starting up.
|
||||
The sample script creates an unattend file that streamlines the deployment process so that the initial use of the Windows To Go drive doesn't prompt the end user for any additional configuration information before starting up.
|
||||
|
||||
#### Prerequisites for running the advanced deployment sample script
|
||||
|
||||
* To run this sample script you must open a Windows PowerShell session as an administrator from a domain-joined computer using an account that has permission to create domain accounts.
|
||||
- To run this sample script, you must open a Windows PowerShell session as an administrator from a domain-joined computer using an account that has permission to create domain accounts.
|
||||
|
||||
* Using offline domain join is required by this script, since the script does not create a local administrator user account. However, domain membership will automatically put "Domain admins" into the local administrators group. Review your domain policies. If you are using DirectAccess you will need to modify the djoin.exe command to include the `policynames` and potentially the `certtemplate` parameters.
|
||||
- Using offline domain join is required by this script, since the script doesn't create a local administrator user account. However, domain membership will automatically put "Domain admins" into the local administrators group. Review your domain policies. If you're using DirectAccess, you'll need to modify the `djoin.exe` command to include the `policynames` and potentially the `certtemplate` parameters.
|
||||
|
||||
* The script needs to use drive letters, so you can only provision half as many drives as you have free drive letters.
|
||||
- The script needs to use drive letters, so you can only provision half as many drives as you have free drive letters.
|
||||
|
||||
#### To run the advanced deployment sample script
|
||||
|
||||
@ -583,22 +610,26 @@ The sample script creates an unattend file that streamlines the deployment proce
|
||||
|
||||
3. Configure the PowerShell execution policy. By default PowerShell's execution policy is set to Restricted; that means that scripts won't run until you have explicitly given them permission to. To configure PowerShell's execution policy to allow the script to run, use the following command from an elevated PowerShell prompt:
|
||||
|
||||
```
|
||||
```powershell
|
||||
Set-ExecutionPolicy RemoteSigned
|
||||
```
|
||||
|
||||
The RemoteSigned execution policy will prevent unsigned scripts from the internet from running on the computer, but will allow locally created scripts to run. For more information on execution policies, see [Set-ExecutionPolicy](/powershell/module/microsoft.powershell.security/set-executionpolicy).
|
||||
|
||||
> [!TIP]
|
||||
> To get online help for any Windows PowerShell cmdlet, whether or not it is installed locally type the following cmdlet, replacing <cmdlet-name> with the name of the cmdlet you want to see the help for:
|
||||
>
|
||||
> To get online help for any Windows PowerShell cmdlet, whether or not it is installed locally, enter the following cmdlet, replacing `<cmdlet-name>` with the name of the cmdlet you want to see the help for:
|
||||
>
|
||||
> `Get-Help <cmdlet-name> -Online`
|
||||
>
|
||||
>
|
||||
> This command causes Windows PowerShell to open the online version of the help topic in your default Internet browser.
|
||||
|
||||
#### Windows To Go multiple drive provisioning sample script
|
||||
|
||||
```
|
||||
<br>
|
||||
<details>
|
||||
<summary>Expand this section to view Windows To Go multiple drive provisioning sample script</summary>
|
||||
|
||||
```powershell
|
||||
<#
|
||||
.SYNOPSIS
|
||||
Windows To Go multiple drive provisioning sample script.
|
||||
@ -837,7 +868,7 @@ if ($Disks -eq $null)
|
||||
#We want to make sure that all non-boot connected USB drives are online, writeable and cleaned.
|
||||
#This command will erase all data from all USB drives larger than 20Gb connected to your machine
|
||||
#To automate this step you can add: -confirm:$False
|
||||
Clear-Disk –InputObject $Disks -RemoveData -erroraction SilentlyContinue
|
||||
Clear-Disk -InputObject $Disks -RemoveData -erroraction SilentlyContinue
|
||||
|
||||
# Currently the provisioning script needs drive letters (for dism and bcdboot.exe) and the script is more
|
||||
# reliable when the main process determines all of the free drives and provides them to the sub-processes.
|
||||
@ -863,15 +894,15 @@ foreach ($disk in $Disks)
|
||||
$policyFilePath = $args[6]
|
||||
|
||||
#For compatibility between UEFI and legacy BIOS we use MBR for the disk.
|
||||
Initialize-Disk –InputObject $Disk -PartitionStyle MBR
|
||||
Initialize-Disk -InputObject $Disk -PartitionStyle MBR
|
||||
|
||||
#A short sleep between creating a new partition and formatting helps ensure the partition
|
||||
#is ready before formatting.
|
||||
$SystemPartition = New-Partition –InputObject $Disk -Size (350MB) -IsActive
|
||||
$SystemPartition = New-Partition -InputObject $Disk -Size (350MB) -IsActive
|
||||
Sleep 1
|
||||
Format-Volume -Partition $SystemPartition -FileSystem FAT32 -NewFileSystemLabel "UFD-System" -confirm:$False | Out-Null
|
||||
|
||||
$OSPartition = New-Partition –InputObject $Disk -UseMaximumSize
|
||||
$OSPartition = New-Partition -InputObject $Disk -UseMaximumSize
|
||||
Sleep 1
|
||||
Format-Volume -NewFileSystemLabel "UFD-Windows" -FileSystem NTFS -Partition $OSPartition -confirm:$False | Out-Null
|
||||
|
||||
@ -966,21 +997,22 @@ write-output "Provsioning completed in: $elapsedTime (hh:mm:ss.000)"
|
||||
write-output "" "Provisioning script complete."
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
## Considerations when using different USB keyboard layouts with Windows To Go
|
||||
|
||||
In the PowerShell provisioning script, after the image has been applied, you can add the following commands that will correctly set the keyboard settings. The following example uses the Japanese keyboard layout:
|
||||
|
||||
```
|
||||
reg load HKLM\WTG-Keyboard ${OSDriveLetter}:\Windows\System32\config\SYSTEM > info.log
|
||||
reg add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v LayerDriver /d JPN:kbd106dll /t REG_SZ /f
|
||||
reg add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v OverrideKeyboardIdentifier /d PCAT_106KEY /t REG_SZ /f
|
||||
reg add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v OverrideKeyboardSubtype /d 2 /t REG_DWORD /f
|
||||
reg add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v OverrideKeyboardType /d 7 /t REG_DWORD /f
|
||||
reg unload HKLM\WTG-Keyboard
|
||||
```cmd
|
||||
reg.exe load HKLM\WTG-Keyboard ${OSDriveLetter}:\Windows\System32\config\SYSTEM > info.log
|
||||
reg.exe add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v LayerDriver /d JPN:kbd106dll /t REG_SZ /f
|
||||
reg.exe add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v OverrideKeyboardIdentifier /d PCAT_106KEY /t REG_SZ /f
|
||||
reg.exe add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v OverrideKeyboardSubtype /d 2 /t REG_DWORD /f
|
||||
reg.exe add HKLM\WTG-Keyboard\ControlSet001\Services\i8042prt\Parameters /v OverrideKeyboardType /d 7 /t REG_DWORD /f
|
||||
reg.exe unload HKLM\WTG-Keyboard
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
## Related articles
|
||||
|
||||
[Windows To Go: feature overview](planning/windows-to-go-overview.md)
|
||||
|
||||
|
@ -2,34 +2,35 @@
|
||||
title: Deploy Windows 10 (Windows 10)
|
||||
description: Learn about Windows 10 upgrade options for planning, testing, and managing your production deployment.
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
manager: aaroncz
|
||||
author: frankroj
|
||||
ms.author: frankroj
|
||||
ms.prod: windows-client
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.date: 11/23/2022
|
||||
ms.technology: itpro-deploy
|
||||
---
|
||||
|
||||
# Deploy Windows 10
|
||||
|
||||
Windows 10 upgrade options are discussed and information is provided about planning, testing, and managing your production deployment. Procedures are provided to help you with a new deployment of the Windows 10 operating system, or to upgrade from a previous version of Windows to Windows 10. The following sections and topics are available.
|
||||
Windows 10 upgrade options are discussed and information is provided about planning, testing, and managing your production deployment. Procedures are provided to help you with a new deployment of the Windows 10 operating system, or to upgrade from a previous version of Windows to Windows 10. The following sections and articles are available.
|
||||
|
||||
|
||||
|Topic |Description |
|
||||
|Article |Description |
|
||||
|------|------------|
|
||||
|[Overview of Windows Autopilot](/mem/autopilot/windows-autopilot) |This topic provides an overview of Windows Autopilot deployment, a new zero-touch method for deploying Windows 10 in the enterprise. |
|
||||
|[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) |This topic provides information about support for upgrading directly to Windows 10 from a previous operating system. |
|
||||
|[Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) |This topic provides information about support for upgrading from one edition of Windows 10 to another. |
|
||||
|[Windows 10 volume license media](windows-10-media.md) |This topic provides information about updates to volume licensing media in the current version of Windows 10. |
|
||||
|[Manage Windows upgrades with Upgrade Readiness](/mem/configmgr/desktop-analytics/overview) |With Upgrade Readiness, enterprises now have the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With Windows diagnostic data enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. |
|
||||
|[Windows 10 deployment test lab](windows-10-poc.md) |This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources. The guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After completing this guide, additional guides are provided to deploy Windows 10 in the test lab using [Microsoft Deployment Toolkit](windows-10-poc-mdt.md) or [Microsoft Endpoint Configuration Manager](windows-10-poc-sc-config-mgr.md). |
|
||||
|[Plan for Windows 10 deployment](planning/index.md) | This section describes Windows 10 deployment considerations and provides information to assist in Windows 10 deployment planning. |
|
||||
|[Deploy Windows 10 with the Microsoft Deployment Toolkit](./deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md) |This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT). |
|
||||
|[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) |If you have Microsoft Endpoint Manager in your environment, you will most likely want to use it to deploy Windows 10. This topic will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT) or. |
|
||||
|[Windows 10 deployment tools](windows-10-deployment-tools-reference.md) |Learn about available tools to deploy Windows 10, such as the Windows ADK, DISM, USMT, WDS, MDT, Windows PE and more. |
|
||||
|[How to install fonts that are missing after upgrading to Windows 10](windows-10-missing-fonts.md)|Windows 10 introduced changes to the fonts that are included in the image by default. Learn how to install additional fonts from **Optional features** after you install Windows 10 or upgrade from a previous version.|
|
||||
|[Overview of Windows Autopilot](/mem/autopilot/windows-autopilot) |This article provides an overview of Windows Autopilot deployment, a new zero-touch method for deploying Windows 10 in the enterprise. |
|
||||
|[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) |This article provides information about support for upgrading directly to Windows 10 from a previous operating system. |
|
||||
|[Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) |This article provides information about support for upgrading from one edition of Windows 10 to another. |
|
||||
|[Windows 10 volume license media](windows-10-media.md) |This article provides information about updates to volume licensing media in the current version of Windows 10. |
|
||||
|[Manage Windows upgrades with Upgrade Readiness](/mem/configmgr/desktop-analytics/overview) |With Upgrade Readiness, enterprises now have the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With Windows diagnostic data enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they're known to Microsoft. The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. |
|
||||
|[Windows 10 deployment test lab](windows-10-poc.md) |This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources. The guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After you complete this guide, more guides are provided to deploy Windows 10 in the test lab using [Microsoft Deployment Toolkit](windows-10-poc-mdt.md) or [Microsoft Configuration Manager](windows-10-poc-sc-config-mgr.md). |
|
||||
|[Plan for Windows 10 deployment](planning/index.md) | This section describes Windows 10 deployment considerations and provides information to help Windows 10 deployment planning. |
|
||||
|[Deploy Windows 10 with the Microsoft Deployment Toolkit](./deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md) |This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT). |
|
||||
|[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md) |If you have Microsoft Configuration Manager in your environment, you'll most likely want to use it to deploy Windows 10. This article will show you how to set up Configuration Manager for operating system deployment and how to integrate Configuration Manager with the Microsoft Deployment Toolkit (MDT). |
|
||||
|[Windows 10 deployment tools](windows-10-deployment-tools-reference.md) |Learn about available tools to deploy Windows 10, such as the Windows ADK, DISM, USMT, WDS, MDT, Windows PE and more. |
|
||||
|[How to install fonts that are missing after upgrading to Windows 10](windows-10-missing-fonts.md)|Windows 10 introduced changes to the fonts that are included in the image by default. Learn how to install more fonts from **Optional features** after you install Windows 10 or upgrade from a previous version.|
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Modern Desktop Deployment Center](/microsoft-365/enterprise/desktop-deployment-center-home)
|
||||
|
@ -1,49 +1,67 @@
|
||||
- name: Delivery Optimization for Windows client
|
||||
- name: Delivery Optimization for Windows client and Microsoft Connected Cache
|
||||
href: index.yml
|
||||
- name: What's new
|
||||
href: whats-new-do.md
|
||||
items:
|
||||
- name: Get started
|
||||
items:
|
||||
- name: What is Delivery Optimization
|
||||
href: waas-delivery-optimization.md
|
||||
- name: What's new
|
||||
href: whats-new-do.md
|
||||
- name: Delivery Optimization Frequently Asked Questions
|
||||
href: waas-delivery-optimization-faq.yml
|
||||
|
||||
|
||||
|
||||
- name: Configure Delivery Optimization
|
||||
- name: Delivery Optimization
|
||||
items:
|
||||
- name: What is Delivery Optimization
|
||||
href: waas-delivery-optimization.md
|
||||
- name: Delivery Optimization Frequently Asked Questions
|
||||
href: waas-delivery-optimization-faq.yml
|
||||
- name: Configure Delivery Optimization for Windows clients
|
||||
items:
|
||||
- name: Windows client Delivery Optimization settings
|
||||
href: waas-delivery-optimization-setup.md#recommended-delivery-optimization-settings
|
||||
- name: Configure Delivery Optimization settings using Microsoft Intune
|
||||
href: /mem/intune/configuration/delivery-optimization-windows
|
||||
- name: Resources for Delivery Optimization
|
||||
items:
|
||||
- name: Set up Delivery Optimization for Windows
|
||||
href: waas-delivery-optimization-setup.md
|
||||
- name: Delivery Optimization reference
|
||||
href: waas-delivery-optimization-reference.md
|
||||
- name: Delivery Optimization client-service communication
|
||||
href: delivery-optimization-workflow.md
|
||||
- name: Using a proxy with Delivery Optimization
|
||||
href: delivery-optimization-proxy.md
|
||||
- name: Microsoft Connected Cache
|
||||
items:
|
||||
- name: Microsoft Connected Cache overview
|
||||
href: waas-microsoft-connected-cache.md
|
||||
- name: MCC for Enterprise and Education
|
||||
items:
|
||||
- name: Configure Windows Clients
|
||||
items:
|
||||
- name: Windows Delivery Optimization settings
|
||||
href: waas-delivery-optimization-setup.md#recommended-delivery-optimization-settings
|
||||
- name: Windows Delivery Optimization Frequently Asked Questions
|
||||
href: ../do/waas-delivery-optimization-faq.yml
|
||||
- name: Configure Microsoft Endpoint Manager
|
||||
items:
|
||||
- name: Delivery Optimization settings in Microsoft Intune
|
||||
href: /mem/intune/configuration/delivery-optimization-windows
|
||||
|
||||
- name: Microsoft Connected Cache
|
||||
- name: Requirements
|
||||
href: mcc-enterprise-prerequisites.md
|
||||
- name: Deploy Microsoft Connected Cache
|
||||
href: mcc-enterprise-deploy.md
|
||||
- name: Update or uninstall MCC
|
||||
href: mcc-enterprise-update-uninstall.md
|
||||
- name: Appendix
|
||||
href: mcc-enterprise-appendix.md
|
||||
- name: MCC for ISPs
|
||||
items:
|
||||
- name: MCC overview
|
||||
href: waas-microsoft-connected-cache.md
|
||||
- name: MCC for Enterprise and Education
|
||||
href: mcc-enterprise.md
|
||||
- name: MCC for ISPs
|
||||
- name: How-to guides
|
||||
items:
|
||||
- name: Operator sign up and service onboarding
|
||||
href: mcc-isp-signup.md
|
||||
- name: Create, provision, and deploy the cache node in Azure portal
|
||||
href: mcc-isp-create-provision-deploy.md
|
||||
- name: Verify cache node functionality and monitor health and performance
|
||||
href: mcc-isp-verify-cache-node.md
|
||||
- name: Update or uninstall your cache node
|
||||
href: mcc-isp-update.md
|
||||
- name: Resources
|
||||
items:
|
||||
- name: Frequently Asked Questions
|
||||
href: mcc-isp-faq.yml
|
||||
- name: Enhancing VM performance
|
||||
href: mcc-isp-vm-performance.md
|
||||
- name: Support and troubleshooting
|
||||
href: mcc-isp-support.md
|
||||
- name: MCC for ISPs (early preview)
|
||||
href: mcc-isp.md
|
||||
- name: Content endpoints for Delivery Optimization and Microsoft Connected Cache
|
||||
href: delivery-optimization-endpoints.md
|
||||
|
||||
- name: Resources
|
||||
items:
|
||||
- name: Set up Delivery Optimization for Windows
|
||||
href: waas-delivery-optimization-setup.md
|
||||
- name: Delivery Optimization reference
|
||||
href: waas-delivery-optimization-reference.md
|
||||
- name: Delivery Optimization client-service communication
|
||||
href: delivery-optimization-workflow.md
|
||||
- name: Using a proxy with Delivery Optimization
|
||||
href: delivery-optimization-proxy.md
|
||||
- name: Content endpoints for Delivery Optimization and Microsoft Connected Cache
|
||||
href: delivery-optimization-endpoints.md
|
||||
|
||||
|
||||
|
@ -2,10 +2,10 @@
|
||||
title: Delivery Optimization and Microsoft Connected Cache content endpoints
|
||||
description: List of fully qualified domain names, ports, and associated content types to use Delivery Optimization and Microsoft Connected Cache.
|
||||
ms.date: 07/26/2022
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: reference
|
||||
ms.localizationpriority: medium
|
||||
ms.localizationpriority: medium
|
||||
author: cmknox
|
||||
ms.author: carmenf
|
||||
ms.reviewer: mstewart
|
||||
@ -26,12 +26,12 @@ This article lists the endpoints that need to be allowed through the firewall to
|
||||
|
||||
|Domain Name |Protocol/Port(s) | Content Type | Additional Information | Version |
|
||||
|---------|---------|---------------|-------------------|-----------------|
|
||||
| *.b1.download.windowsupdate.com, *.dl.delivery.mp.microsoft.com, *.download.windowsupdate.com, *.au.download.windowsupdate.com, *.au.b1.download.windowsupdate.com, *.tlu.dl.delivery.mp.microsoft.com, *.emdl.ws.microsoft.com, *.ctldl.windowsupdate.com | HTTP / 80 | Windows Update </br> Windows Defender </br> Windows Drivers | [Complete list](/windows/privacy/manage-windows-2004-endpoints) of endpoints for Windows Update services and payload. | Microsoft Endpoint Configuration Manager Distribution Point |
|
||||
| *.delivery.mp.microsoft.com | HTTP / 80 | Edge Browser | [Complete list](/deployedge/microsoft-edge-security-endpoints) of endpoints for Edge Browser. | Microsoft Endpoint Configuration Manager Distribution Point |
|
||||
| *.officecdn.microsoft.com.edgesuite.net, *.officecdn.microsoft.com, *.cdn.office.net | HTTP / 80 | Office CDN updates | [Complete list](/office365/enterprise/office-365-endpoints) of endpoints for Office CDN updates. | Microsoft Endpoint Configuration Manager Distribution Point |
|
||||
| *.manage.microsoft.com, *.swda01.manage.microsoft.com, *.swda02.manage.microsoft.com, *.swdb01.manage.microsoft.com, *.swdb02.manage.microsoft.com, *.swdc01.manage.microsoft.com, *.swdc02.manage.microsoft.com, *.swdd01.manage.microsoft.com, *.swdd02.manage.microsoft.com, *.swda01-mscdn.manage.microsoft.com, *.swda02-mscdn.manage.microsoft.com, *.swdb01-mscdn.manage.microsoft.com, *.swdb02-mscdn.manage.microsoft.com, *.swdc01-mscdn.manage.microsoft.com, *.swdc02-mscdn.manage.microsoft.com, *.swdd01-mscdn.manage.microsoft.com, *.swdd02-mscdn.manage.microsoft.com | HTTP / 80 </br> HTTPs / 443 | Intune Win32 Apps | [Complete list](/mem/intune/fundamentals/intune-endpoints) of endpoints for Intune Win32 Apps updates. | Microsoft Endpoint Configuration Manager Distribution Point |
|
||||
| *.statics.teams.cdn.office.net | HTTP / 80 </br> HTTPs / 443 | Teams | | Microsoft Endpoint Configuration Manager Distribution Point |
|
||||
| *.assets1.xboxlive.com, *.assets2.xboxlive.com, *.dlassets.xboxlive.com, *.dlassets2.xboxlive.com, *.d1.xboxlive.com, *.d2.xboxlive.com, *.assets.xbox.com, *.xbl-dlassets-origin.xboxlive.com, *.assets-origin.xboxlive.com, *.xvcb1.xboxlive.com, *.xvcb2.xboxlive.com, *.xvcf1.xboxlive.com, *.xvcf2.xboxlive.com | HTTP / 80 | Xbox | | Microsoft Endpoint Configuration Manager Distribution Point |
|
||||
| *.tlu.dl.adu.microsoft.com, *.nlu.dl.adu.microsoft.com, *.dcsfe.prod.adu.microsoft.com | HTTP / 80 | Device Update | [Complete list](/azure/iot-hub-device-update/) of endpoints for Device Update updates. | Microsoft Endpoint Configuration Manager Distribution Point |
|
||||
| *.b1.download.windowsupdate.com, *.dl.delivery.mp.microsoft.com, *.download.windowsupdate.com, *.au.download.windowsupdate.com, *.au.b1.download.windowsupdate.com, *.tlu.dl.delivery.mp.microsoft.com, *.emdl.ws.microsoft.com, *.ctldl.windowsupdate.com | HTTP / 80 | Windows Update </br> Windows Defender </br> Windows Drivers | [Complete list](/windows/privacy/manage-windows-2004-endpoints) of endpoints for Windows Update services and payload. | Microsoft Configuration Manager Distribution Point |
|
||||
| *.delivery.mp.microsoft.com | HTTP / 80 | Edge Browser | [Complete list](/deployedge/microsoft-edge-security-endpoints) of endpoints for Edge Browser. | Microsoft Configuration Manager Distribution Point |
|
||||
| *.officecdn.microsoft.com.edgesuite.net, *.officecdn.microsoft.com, *.cdn.office.net | HTTP / 80 | Office CDN updates | [Complete list](/office365/enterprise/office-365-endpoints) of endpoints for Office CDN updates. | Microsoft Configuration Manager Distribution Point |
|
||||
| *.manage.microsoft.com, *.swda01.manage.microsoft.com, *.swda02.manage.microsoft.com, *.swdb01.manage.microsoft.com, *.swdb02.manage.microsoft.com, *.swdc01.manage.microsoft.com, *.swdc02.manage.microsoft.com, *.swdd01.manage.microsoft.com, *.swdd02.manage.microsoft.com, *.swda01-mscdn.manage.microsoft.com, *.swda02-mscdn.manage.microsoft.com, *.swdb01-mscdn.manage.microsoft.com, *.swdb02-mscdn.manage.microsoft.com, *.swdc01-mscdn.manage.microsoft.com, *.swdc02-mscdn.manage.microsoft.com, *.swdd01-mscdn.manage.microsoft.com, *.swdd02-mscdn.manage.microsoft.com | HTTP / 80 </br> HTTPs / 443 | Intune Win32 Apps | [Complete list](/mem/intune/fundamentals/intune-endpoints) of endpoints for Intune Win32 Apps updates. | Microsoft Configuration Manager Distribution Point |
|
||||
| *.statics.teams.cdn.office.net | HTTP / 80 </br> HTTPs / 443 | Teams | | Microsoft Configuration Manager Distribution Point |
|
||||
| *.assets1.xboxlive.com, *.assets2.xboxlive.com, *.dlassets.xboxlive.com, *.dlassets2.xboxlive.com, *.d1.xboxlive.com, *.d2.xboxlive.com, *.assets.xbox.com, *.xbl-dlassets-origin.xboxlive.com, *.assets-origin.xboxlive.com, *.xvcb1.xboxlive.com, *.xvcb2.xboxlive.com, *.xvcf1.xboxlive.com, *.xvcf2.xboxlive.com | HTTP / 80 | Xbox | | Microsoft Configuration Manager Distribution Point |
|
||||
| *.tlu.dl.adu.microsoft.com, *.nlu.dl.adu.microsoft.com, *.dcsfe.prod.adu.microsoft.com | HTTP / 80 | Device Update | [Complete list](/azure/iot-hub-device-update/) of endpoints for Device Update updates. | Microsoft Configuration Manager Distribution Point |
|
||||
| *.do.dsp.mp.microsoft.com | HTTP / 80 </br> HTTPs / 443 | Microsoft Connected Cache -> Delivery Optimization Services communication | [Complete list](../do/waas-delivery-optimization-faq.yml) of endpoints for Delivery Optimization only. | Microsoft Connected Cache Managed in Azure |
|
||||
| *.azure-devices.net, *.global.azure-devices-provisioning.net, *.azurecr.io, *.blob.core.windows.net, *.mcr.microsoft.com | AMQP / 5671 </br> MQTT / 8883 </br> HTTPs / 443 | IoT Edge / IoT Hub communication| [Complete list](/azure/iot-hub/iot-hub-devguide-protocols) of Azure IoT Hub communication protocols and ports. [Azure IoT Guide](/azure/iot-hub/iot-hub-devguide-endpoints) to understanding Azure IoT Hub endpoints. | Microsoft Connected Cache Managed in Azure |
|
||||
| *.azure-devices.net, *.global.azure-devices-provisioning.net, *.azurecr.io, *.blob.core.windows.net, *.mcr.microsoft.com, github.com | AMQP / 5671 </br> MQTT / 8883 </br> HTTPs / 443 | IoT Edge / IoT Hub communication| [Complete list](/azure/iot-hub/iot-hub-devguide-protocols) of Azure IoT Hub communication protocols and ports. [Azure IoT Guide](/azure/iot-hub/iot-hub-devguide-endpoints) to understanding Azure IoT Hub endpoints. | Microsoft Connected Cache Managed in Azure |
|
||||
|
@ -2,12 +2,13 @@
|
||||
title: Using a proxy with Delivery Optimization
|
||||
manager: dansimp
|
||||
description: Settings to use with various proxy configurations to allow Delivery Optimization to work
|
||||
ms.prod: w10
|
||||
ms.prod: windows-client
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
ms.collection: M365-modern-desktop
|
||||
ms.topic: article
|
||||
ms.technology: itpro-updates
|
||||
---
|
||||
|
||||
# Using a proxy with Delivery Optimization
|
||||
|
209
windows/deployment/do/delivery-optimization-test.md
Normal file
@ -0,0 +1,209 @@
|
||||
---
|
||||
title: Testing Delivery Optimization
|
||||
description: Explanation of Delivery Optimization distributed cache and high-level design. Demonstrate how Delivery Optimization peer-to-peer works in different test scenarios.
|
||||
ms.date: 11/08/2022
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: reference
|
||||
ms.localizationpriority: medium
|
||||
author: cmknox
|
||||
ms.author: carmenf
|
||||
ms.reviewer: mstewart
|
||||
manager: naengler
|
||||
---
|
||||
|
||||
# Testing Delivery Optimization
|
||||
|
||||
## Overview
|
||||
|
||||
Delivery Optimization is a powerful and useful tool to help enterprises manage bandwidth usage for downloading Microsoft content. It's a solution designed to be used in large-scale environments with large numbers of devices, various content sizes, etc. Delivery Optimization is native to Win10+ and provides default configuration to get the most out of the typical customer environment. It's used to deliver many different types of content, so Microsoft customers enjoy the best possible download experience for their environment. There are three components to Delivery Optimization, 1) HTTP downloader, 2) Peer-to-peer (P2P) cloud technology, and 3) Microsoft Connected Cache. One of the most powerful advantages of using Delivery Optimization is the ability to fine-tune settings that empower users to dial in Microsoft content delivery to meet the needs of specific environments.
|
||||
|
||||
## Monitoring The Results
|
||||
|
||||
Since Delivery Optimization is on by default, you'll be able to monitor the value either through the Windows Settings for ‘Delivery Optimization’, using Delivery Optimization PowerShell [cmdlets.](waas-delivery-optimization-setup.md), and/or via the [Windows Update for Business Report.](../update/wufb-reports-workbook.md) experience in Azure.
|
||||
|
||||
In the case where Delivery Optimization isn't working in your environment, it's important to investigate to get to the root of the problem. We recommend a test environment be created to easily evaluate typical devices to ensure Delivery Optimization is working properly. For starters, ‘Scenario 1: Basic Setup’ should be created to test the use of Delivery Optimization between two machines. This scenario is designed to eliminate any noise in the environment to ensure there's nothing preventing Delivery Optimization from working on the devices. Once you have a baseline, you can expand the test environment for more sophisticated tests.
|
||||
|
||||
## Expectations and Goals
|
||||
|
||||
The focus of the testing scenarios in this article is primarily centered on demonstrating the Delivery Optimization policies centered around the successful downloading of bytes using P2P. More specifically, the goal will be to show peer to peer is working as expected, using the following criteria:
|
||||
|
||||
* Peers can find each other (for example on the same LAN / subnet / Group – matching your 'Download Mode' policy).
|
||||
* Files are downloading in the expected 'Download Mode' policy setting (validates connectivity to DO cloud, HTTP, and local configs).
|
||||
* At least some downloads happening via P2P (validates connectivity between peers).
|
||||
|
||||
Several elements that influence overall peering, using Delivery Optimization. The most common, impactful environment factors should be considered.
|
||||
|
||||
* **The number of files in the cache and** **the** **number of devices have a big effect on overall peering.** There's a set number of files available for peering at a time, from each client, so the peering device may not be serving a particular file.
|
||||
* **File size** **and** **internet connection** **reliability matter.** There's a Delivery Optimization setting to determine the minimum file size to use P2P. In addition, an internet connection must be open and reliable enough to let the Delivery Optimization client make cloud service API calls and download metadata files before starting a file download.
|
||||
* **Delivery Optimization Policies can play a role.** In general, it's important to familiarize yourself with the Delivery Optimization settings and defaults [Delivery Optimization reference - Windows Deployment | Microsoft Docs.](waas-delivery-optimization-reference.md).
|
||||
|
||||
### Delivery Optimization is a Hybrid P2P Platform
|
||||
|
||||
* Delivery Optimization’s hybrid approach to downloading from multiple sources (HTTP and peer) in parallel is especially critical for large-scale environments, constantly assessing the optimal source from which to deliver the content. In conjunction, the distribution of content cache, across participating devices, contributes to Delivery Optimization’s ability to find bandwidth savings as more peers become available.
|
||||
|
||||
* At the point a download is initiated, the DO client starts downloading from the HTTP source and discovering peers simultaneously. With a smaller file, most of the bytes could be downloaded from an HTTP source before connecting to a peer, even though peers are available. With a larger file and quality LAN peers, it might reduce the HTTP request rate to near zero, but only after making those initial requests from HTTP.
|
||||
|
||||
* In the next section, you'll see how the two testing scenarios produce differing results in the number of bytes coming from HTTP vs. peers, which shows Delivery Optimization continuously evaluating the optimal location from which to download the content.
|
||||
|
||||
## Test Scenarios
|
||||
|
||||
### Scenario 1: Basic Setup
|
||||
|
||||
**Goal:**
|
||||
Demonstrate how Delivery Optimization peer-to-peer technology works using two machines in a controlled test environment
|
||||
|
||||
**Expected Results:**
|
||||
Machine 1 will download zero bytes from peers and Machine 2 will download 50-99% from peers.
|
||||
|
||||
#### Test Machine Setup
|
||||
|
||||
|Setup Checklist| Value/Explanation
|
||||
|--------|-------------------------------|
|
||||
|Number of machines used| 2 |
|
||||
|Virtual Machines/physical devices| 2 |
|
||||
|Windows OS version | Windows 10 (21H2) and Windows 11 (21H2) |
|
||||
|RAM | 8 GB |
|
||||
|Disk size | 127 GB |
|
||||
|Network | Connected to same network, one that is representative of the corporate network. |
|
||||
|Pause Windows Updates | This controls the test environment so no other content is made available during the test, and potentially altering the outcome of the test. If there are problems and no peering happens, use 'Get-DeliveryOptimizationStatus' on the first machine to return a real-time list of the connected peers. |
|
||||
|Ensure all Store apps are up to date | This will help prevent any new, unexpected updates to download during testing. |
|
||||
|Delivery Optimization 'Download Mode' Policy | 2 (Group)(set on each machine) |
|
||||
|Delivery Optimization 'GroupID' Policy | Set the *same* 'GUID' on each test machine. A GUID is a required value, which can be generated using PowerShell, ‘[[guid]::NewGuid().](https://blogs.technet.microsoft.com/heyscriptingguy/2013/07/25/powertip-create-a-new-guid-by-using-powershell/)’. |
|
||||
|**Required on Windows 11 devices only** set Delivery Optimization 'Restrict Peer Selection' policy | 0-NAT (set on each machine). The default behavior in Windows 11 is set to '2-Local Peer Discovery'. For testing purposes, this needs to be scoped to the NAT. |
|
||||
|
||||
#### Test Instructions
|
||||
|
||||
The following set of instructions will be used for each machine:
|
||||
|
||||
1. Open PowerShell console as 'Administrator'.
|
||||
* Clear the DO cache: 'Delete-DeliveryOptimizationCache'.
|
||||
* Run 'Get-DeliveryOptimizationStatus'.
|
||||
2. Open MS Store and search for 'Asphalt Legends 9'. Select *Get* to initiate the download of the content (content size: ~3.4 GB).
|
||||
|
||||
**On machine #1**
|
||||
|
||||
* Run 'Test Instructions'
|
||||
|
||||
|Windows 10 | Windows 11
|
||||
|--------|-------------------------------|
|
||||
| :::image type="content" source="images/test-scenarios/win10/m1-basic-complete.png" alt-text="Windows 10 21H2 - Machine 1 - Basic Test." lightbox="images/test-scenarios/win10/m1-basic-complete.png"::: | :::image type="content" source="images/test-scenarios/win11/m1-basic-complete.png" alt-text="Windows 11 21H2 - Machine 1 - Basic Test." lightbox="images/test-scenarios/win11/m1-basic-complete.png"::: |
|
||||
| **Observations** | |
|
||||
| * No peers were found on the first machine downloading the content.<br>* 'TotalBytesDownloaded' is equal to the file size.<br>* Status is set to 'Caching' the content so future peers can use it.<br>* Download was happening in the foreground.<br>* DownloadMode is set to 'Group' and no peers were found.<br>* No distinct observations seen between Window 10 and Windows 11 devices. |
|
||||
|
||||
*Wait 5 minutes*.
|
||||
|
||||
**On machine #2**
|
||||
|
||||
* Run 'Test Instructions'
|
||||
|
||||
|Windows 10 | Windows 11 |
|
||||
|--------|--------------------------------|
|
||||
| :::image type="content" source="images/test-scenarios/win10/m2-basic-complete.png" alt-text="Windows 10 21H2 - Machine 2 - Basic Test." lightbox="images/test-scenarios/win10/m2-basic-complete.png"::: | :::image type="content" source="images/test-scenarios/win11/m2-basic-complete.png" alt-text="Windows 11 21H2 - Machine 2 - Basic Test." lightbox="images/test-scenarios/win11/m2-basic-complete.png":::|
|
||||
| **Observations** | **Observations**|
|
||||
| * A peer was found for the content and 87% of total bytes came from the peer. <br> * One peer was found for the piece of content, which is expected as there are only two devices in the peering group. <br> * Download mode was set to 'Group', but since group mode includes both LAN and Group devices, Delivery Optimization prioritizes LAN peers, if found. Therefore, 'BytesFromLanPeers' shows bytes where 'BytesFromGroupPeers' doesn't. <br> * 'DownloadDuration' is roughly the same between machines.|* A peer was found for the content and 90% of total bytes came from the peer. <br> * All other points are the same as Windows 10 results. |
|
||||
|
||||
### Scenario 2: Advance Setup
|
||||
|
||||
**Goal:**
|
||||
Demonstrate how Delivery Optimization peer-to-peer technology works in a non-controlled environment and expanding to three machines
|
||||
**Expected Results:**
|
||||
Machine 1 will download zero bytes from peers and Machine 2 will find peers and download 50-99% from peers. Machine 3 will find two peers and download 50-99% from peers.
|
||||
|
||||
#### Test Machine Setup
|
||||
|
||||
|Setup Checklist| Value/Explanation |
|
||||
|--------|-------------------------------|
|
||||
|Number of machines used| 3 |
|
||||
|Virtual Machines| 3 |
|
||||
|Windows OS version | Windows 10 (21H2) |
|
||||
|RAM | 8 GB |
|
||||
|Disk size | 127 GB |
|
||||
|Network | Connected to same network, one that is representative of the corporate network. |
|
||||
|Delivery Optimization 'Download Mode' Policy| 2 (Group)(set on each machine) |
|
||||
|Delivery Optimization 'Group ID' Policy| Set the *same* 'GUID' on each test machine. A GUID is required value, which can be generated using PowerShell, '[guid]::NewGuid().](https://blogs.technet.microsoft.com/heyscriptingguy/2013/07/25/powertip-create-a-new-guid-by-using-powershell/)'. |
|
||||
|Delivery Optimization 'Delay background download from http' Policy | 60 (set on each machine) |
|
||||
|Delivery Optimization 'Delay foreground download from http Policy |60 (set on each machine) |
|
||||
|
||||
#### Testing Instructions
|
||||
|
||||
The following set of instructions will be used for each machine:
|
||||
|
||||
1. Clear the DO cache: ‘Delete-DeliveryOptimizationCache’.
|
||||
2. Open MS Store and search for 'Asphalt Legends 9'. Select *Get* to initiate the download of the content (content size: ~3.4 GB).
|
||||
3. Open PowerShell console as Administrator. Run 'Get-DeliveryOptimizationStatus'.
|
||||
|
||||
**On machine #1:**
|
||||
|
||||
* Run ‘Test Instructions’
|
||||
|
||||
**Output: Windows 10 (21H2)**
|
||||
|
||||

|
||||
|
||||
**Observations**
|
||||
|
||||
* The first download in the group of devices shows all bytes coming from HTTP, 'BytesFromHttp'.
|
||||
* Download is in the ‘Foreground’ because the Store app is doing the download and in the foreground on the device because it is initiated by the user in the Store app.
|
||||
* No peers are found.
|
||||
|
||||
*Wait 5 minutes*.
|
||||
|
||||
**On machine #2:**
|
||||
|
||||
* Run ‘Test Instructions’
|
||||
|
||||
**Output** Windows 10 (21H2)
|
||||
|
||||

|
||||
|
||||
**Observations**
|
||||
|
||||
* 'PercentPeerCaching' is 99.8%
|
||||
* There are still 'BytesFromHttp' source being used
|
||||
* One peer was found
|
||||
* All peering was done from device on the LAN, as shown with 'BytesFromLanPeers'
|
||||
|
||||
**On machine #3:**
|
||||
|
||||
* Run ‘Test Instructions’
|
||||
|
||||
**Output:** Windows 10 (21H2)
|
||||
|
||||

|
||||
|
||||
**Observations**
|
||||
|
||||
* 'PercentPeerCaching' is roughly the same as machine #2, at 99.7%.
|
||||
* Now, two peers are found.
|
||||
* Still downloading from HTTP source as seen with 'BytesFromHttp' value.
|
||||
|
||||
## Peer sourcing observations for all machines in the test group
|
||||
|
||||
The distributed nature of the Delivery Optimization technology is obvious when you rerun the ‘Get-DeliveryOptimizationStatus’ cmdlet on each of the test machines. For each, there's a new value populated for the ‘BytesToLanPeers’ field. This demonstrates that as more peers become available, the requests to download bytes are distributed across the peering group and act as the source for the peering content. Each peer plays a role in servicing the other.
|
||||
|
||||
**Output:** Machine 1
|
||||
|
||||
'BytesToPeers' sourced from Machine 1 are '5704426044'. This represents the total number of bytes downloaded by the two peers in the group.
|
||||
|
||||

|
||||
|
||||
**Output:** Machine 2
|
||||
|
||||
'BytesToPeers' sourced from Machine 2 are '1899143740'. When there are two peers in the group with bytes available, notice that the distribution of bytes comes from either Machine 1 or Machine 2.
|
||||
|
||||

|
||||
|
||||
**Output:** Machine 3
|
||||
|
||||
'BytesToPeers' sourced from Machine 3 are '0'. This means that no other peers are downloading bytes from this peer, which is expected since it was the last machine in the group.
|
||||
|
||||

|
||||
|
||||
## Conclusion
|
||||
|
||||
Using Delivery Optimization can help make a big impact in customer environments to optimize bandwidth. The peer-to-peer technology offers many configurations designed to be flexible for any organization. Delivery Optimization uses a distributed cache across different sources to ensure the most optimal download experience, while limiting the resources used on each device.
|
||||
|
||||
The testing scenarios found in this document help to show a controlled test environment, helping to prevent updates from interrupting the peering results. The other, a more real-world case, demonstrates how content available across peers will be used as the source of the content.
|
||||
|
||||
If there are issues found while testing, the Delivery Optimization PowerShell [cmdlets.](waas-delivery-optimization-setup.md) can be a helpful tool to help explain what is happening in the environment.
|
@ -2,12 +2,13 @@
|
||||
title: Delivery Optimization client-service communication explained
|
||||
manager: dougeby
|
||||
description: Details of how Delivery Optimization communicates with the server when content is requested to download.
|
||||
ms.prod: w10
|
||||
ms.prod: windows-client
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
ms.collection: M365-modern-desktop
|
||||
ms.topic: article
|
||||
ms.technology: itpro-updates
|
||||
---
|
||||
|
||||
# Delivery Optimization client-service communication explained
|
||||
|
BIN
windows/deployment/do/images/addcachenode.png
Normal file
After Width: | Height: | Size: 334 KiB |
@ -0,0 +1,30 @@
|
||||
---
|
||||
title: Don't Remove images under do/images/elixir_ux - used by Azure portal Diagnose/Solve feature UI
|
||||
manager: aaroncz
|
||||
description: Elixir images read me file
|
||||
keywords: updates, downloads, network, bandwidth
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: nidos
|
||||
ms.localizationpriority: medium
|
||||
ms.author: nidos
|
||||
ms.collection: M365-modern-desktop
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Read Me
|
||||
|
||||
This file contains the images that are included in this GitHub repository that are used by the Azure UI for Diagnose and Solve. The following images _shouldn't be removed_ from the repository:
|
||||
|
||||
:::image type="content" source="ux-check-verbose-2.png" alt-text="A screenshot that shows 6 out of the 22 checks raising errors.":::
|
||||
|
||||
:::image type="content" source="ux-check-verbose-1.png" alt-text="A screenshot that all checks passing after the iotedge check command.":::
|
||||
|
||||
:::image type="content" source="ux-connectivity-check.png" alt-text="A screenshot of green checkmarks, showing that all of the connectivity checks are successful.":::
|
||||
|
||||
:::image type="content" source="ux-edge-agent-failed.png" alt-text="A screenshot of the terminal after the command 'iotedge list', which shows three containers and the edgeAgent container failing.":::
|
||||
|
||||
:::image type="content" source="ux-iot-edge-list.png" alt-text="A screenshot of the terminal after the command 'iotedge list', showing all three containers running successfully.":::
|
||||
|
||||
:::image type="content" source="ux-mcc-failed.png" alt-text="A screenshot of the terminal after the command 'iotedge list', showing the MCC container in a failure state.":::
|
BIN
windows/deployment/do/images/elixir_ux/ux-check-verbose-1.png
Normal file
After Width: | Height: | Size: 98 KiB |
BIN
windows/deployment/do/images/elixir_ux/ux-check-verbose-2.png
Normal file
After Width: | Height: | Size: 54 KiB |
BIN
windows/deployment/do/images/elixir_ux/ux-connectivity-check.png
Normal file
After Width: | Height: | Size: 96 KiB |
BIN
windows/deployment/do/images/elixir_ux/ux-edge-agent-failed.png
Normal file
After Width: | Height: | Size: 12 KiB |
BIN
windows/deployment/do/images/elixir_ux/ux-iot-edge-list.png
Normal file
After Width: | Height: | Size: 12 KiB |
BIN
windows/deployment/do/images/elixir_ux/ux-mcc-failed.png
Normal file
After Width: | Height: | Size: 11 KiB |
Before Width: | Height: | Size: 28 KiB |
Before Width: | Height: | Size: 44 KiB |
Before Width: | Height: | Size: 21 KiB After Width: | Height: | Size: 21 KiB |
Before Width: | Height: | Size: 132 KiB After Width: | Height: | Size: 132 KiB |
Before Width: | Height: | Size: 79 KiB After Width: | Height: | Size: 79 KiB |
Before Width: | Height: | Size: 45 KiB After Width: | Height: | Size: 45 KiB |
Before Width: | Height: | Size: 36 KiB After Width: | Height: | Size: 36 KiB |
Before Width: | Height: | Size: 73 KiB After Width: | Height: | Size: 73 KiB |
After Width: | Height: | Size: 36 KiB |
Before Width: | Height: | Size: 27 KiB After Width: | Height: | Size: 27 KiB |
BIN
windows/deployment/do/images/ent-mcc-create-cache-failed.png
Normal file
After Width: | Height: | Size: 27 KiB |
Before Width: | Height: | Size: 61 KiB After Width: | Height: | Size: 61 KiB |
Before Width: | Height: | Size: 109 KiB After Width: | Height: | Size: 109 KiB |
Before Width: | Height: | Size: 28 KiB After Width: | Height: | Size: 28 KiB |
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 14 KiB |
Before Width: | Height: | Size: 32 KiB After Width: | Height: | Size: 32 KiB |
Before Width: | Height: | Size: 71 KiB After Width: | Height: | Size: 71 KiB |
Before Width: | Height: | Size: 246 KiB After Width: | Height: | Size: 246 KiB |
Before Width: | Height: | Size: 66 KiB After Width: | Height: | Size: 66 KiB |
Before Width: | Height: | Size: 86 KiB After Width: | Height: | Size: 86 KiB |
Before Width: | Height: | Size: 7.2 KiB After Width: | Height: | Size: 7.2 KiB |
Before Width: | Height: | Size: 206 KiB After Width: | Height: | Size: 206 KiB |
Before Width: | Height: | Size: 447 KiB After Width: | Height: | Size: 447 KiB |
Before Width: | Height: | Size: 28 KiB After Width: | Height: | Size: 28 KiB |
Before Width: | Height: | Size: 135 KiB After Width: | Height: | Size: 135 KiB |
Before Width: | Height: | Size: 11 KiB After Width: | Height: | Size: 11 KiB |
Before Width: | Height: | Size: 144 KiB After Width: | Height: | Size: 144 KiB |
Before Width: | Height: | Size: 845 KiB After Width: | Height: | Size: 845 KiB |
Before Width: | Height: | Size: 148 KiB After Width: | Height: | Size: 148 KiB |
Before Width: | Height: | Size: 336 KiB After Width: | Height: | Size: 336 KiB |
Before Width: | Height: | Size: 79 KiB After Width: | Height: | Size: 79 KiB |
Before Width: | Height: | Size: 65 KiB After Width: | Height: | Size: 65 KiB |
Before Width: | Height: | Size: 28 KiB |
Before Width: | Height: | Size: 147 KiB |
Before Width: | Height: | Size: 262 KiB |
Before Width: | Height: | Size: 262 KiB |
Before Width: | Height: | Size: 265 KiB |
Before Width: | Height: | Size: 63 KiB |
Before Width: | Height: | Size: 68 KiB After Width: | Height: | Size: 68 KiB |
Before Width: | Height: | Size: 47 KiB After Width: | Height: | Size: 47 KiB |
Before Width: | Height: | Size: 54 KiB After Width: | Height: | Size: 54 KiB |
Before Width: | Height: | Size: 52 KiB After Width: | Height: | Size: 52 KiB |
Before Width: | Height: | Size: 134 KiB After Width: | Height: | Size: 134 KiB |
Before Width: | Height: | Size: 26 KiB After Width: | Height: | Size: 26 KiB |
Before Width: | Height: | Size: 18 KiB After Width: | Height: | Size: 18 KiB |
Before Width: | Height: | Size: 70 KiB After Width: | Height: | Size: 70 KiB |
Before Width: | Height: | Size: 29 KiB After Width: | Height: | Size: 29 KiB |
Before Width: | Height: | Size: 62 KiB After Width: | Height: | Size: 62 KiB |