Managing netbootGuid

The attribute on AD computer objects netbootGuid is very important to allowing some deployment options (RIS and WDS) to locate the computer object the hardware belongs to.  Unfortunately certain activities, such as replacing the system board, swapping in new hardware but using a pre-existing computer name, or creating a new VM using an existing VHD…

3

Little Shop of Drivers

I take all my drivers and put them in %DRIVERS_ROOT_PATH% (see batch code below) and the install images I want to mess with in %FILES_ROOT_PATH%.  One folder per driver, the script iterates through each of the folders, and runs imagex /inf for each folder.  As I’m testing, this makes it much easier to start over…

0

Idiosyncratic Windows Deployment Server Vista Setup Options

I found getting both of the below topics to work the way I wanted in Windows Deployment Server (WDS) to be surprisingly tricky and fraught with unexpected results that took me quite a while to figure out.  After all, one has to run through some large portion of the OS install before finding out that…

7

Trials and Tribulations of Learning the Vista Automated Installation Functionality

I’ve pretty much come to the end of my initial learning curve on how to automate Vista installations using the AIK.  There is some great documentation out there on how to execute the specific tasks necessary to add drivers and packages to the image.  However, there are some gaps on how to tie it all together.  It’s…

0

Performance Optimization Philosophy

Optimizing performance is not just about making things run faster, it is about making them run appropriately fast based on perception and cost. Several questions may be posed at this junction: Why does philosophy need to be discussed? Isn’t performance just about making things run faster? There is a common misconception that performance optimization is about…

0

NTLMv2 or not NTLMv2, that is the question.

Enabling NTLMv2 is a project always fraught with challenges, mostly due to the lack of visibility into exactly which authentication protocol is being used by a client machine.  Management often is not gung-ho about the try it and see what breaks methodology of identifying systems that can not support NTLMv2.  As such, many administrators have often…

0