The Defintive Guide to Windows Desktop

The Defintive Guide to Windows Desktop

realtimepublishers.comtm The Definitive Guidetm To Windows Desktop Administration Bob Kelly Chapter 2 Chapter 2: OS Deployment............................................................................................................23 The Workstation Baseline..............................................................................................................23 Benefits ..............................................................................................................................23 Increased Reliability ..............................................................................................23 Increased Deployment Speed.................................................................................23 Ease of Troubleshooting ........................................................................................24 Drawbacks..........................................................................................................................24 Baseline Components.........................................................................................................24 What to Leave In....................................................................................................25 What to Leave Out.................................................................................................25 Common Pitfalls to Avoid .................................................................................................25 MSI Source Resiliency ..........................................................................................25 Non-Essential Data ................................................................................................26 Classified or Company Proprietary Information....................................................26 Globally Unique Identifiers ...................................................................................27 Profiles ...................................................................................................................27 Security Identification Numbers............................................................................28 Initial Build Size ................................................................................................................30 Staging a Deployment....................................................................................................................32 Benefits ..............................................................................................................................32 Less Time Spent at the Users’ Desks.....................................................................32 Controlled Network Environment..........................................................................33 Early Identification of Failed Systems...................................................................33 Drawbacks..........................................................................................................................34 Location-Specific Actions .....................................................................................34 Slow Delivery in a Changing Environment...........................................................34 Deployment Methods.....................................................................................................................34 Manual Installation ............................................................................................................34 Unattended Installations.....................................................................................................36 Microsoft Solutions............................................................................................................37 Sysprep...................................................................................................................37 Unattend.txt............................................................................................................39 $OEM$...................................................................................................................40 i Chapter 2 Cmdlines.txt...........................................................................................................40 Third-Party Solutions.........................................................................................................40 Drive Imaging ....................................................................................................................41 Available Solutions................................................................................................43 Which Is Right For You?.......................................................................................46 Drive Duplication...............................................................................................................46 Available Solutions................................................................................................47 OS Deployment Best Practices ......................................................................................................47 Workstation Naming Conventions.....................................................................................47 System Build Information..................................................................................................49 Image Identification...........................................................................................................49 Summary........................................................................................................................................49 ii Chapter 2 Copyright Statement © 2003 Realtimepublishers.com, Inc. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtimepublishers.com, Inc. (the “Materials”) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtimepublishers.com, Inc or its web site sponsors. In no event shall Realtimepublishers.com, Inc. or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, non- commercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. If you have any questions about these terms, or if you would like information about licensing materials from Realtimepublishers.com, please contact us via e-mail at [email protected]. iii Chapter 2 Chapter 2: OS Deployment In the last chapter, we touched on each of the primary areas of desktop administration. In the remaining chapters, we will drill down into each of these topics in much more detail. This chapter covers the first of these subjects, operating system (OS) deployment. The deployment of new systems is the foundation on which the stability of the workstation will be set, no matter what the makeup of that new system—a new computer, a new version of Windows, or simply a new configuration. A poorly built image, a bad script, or poorly researched configuration options can result in wide-scale problems when you consider that all of your systems might reflect these same troubles. In this chapter, we will discuss some best practices and methods for handling the deployment of new systems, including the benefits and drawbacks of each. The Workstation Baseline A baseline is an established, common starting point from which all workstations begin. Regardless of whether you have a manual or automated process in place, there is normally some process that defines the makeup of your initial workstation installation and configuration. The typical makeup of a workstation baseline is the OS and applications common to all systems. From this point, things might change considerably, with each department (or even individual workstation) getting the additional software packages required for those users to accomplish their jobs. However, the installation of a consistent starting point, automated or not, is the most common first step in the workstation life cycle. Benefits Planning and discussing the many options that make up the installation of Windows and its common software is an important step in establishing a common baseline. With planning, a baseline allows for a reliable and consistent starting point, which brings the following benefits: increased reliability, faster deployments, and easier troubleshooting. Increased Reliability Through the consistency that comes

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    31 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us