You are previewing Mastering Windows® 7 Deployment.
O'Reilly logo
Mastering Windows® 7 Deployment

Book Description

Get professional-level instruction on Windows 7 deployment tools

Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.

  • Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system administrators and IT professionals need comprehensive instruction on Microsoft's deployment tools

  • This complete guide provides clear, step-by-step instruction on planning, installing, configuring, deploying, and troubleshooting deployment methods for each tool

  • Covers the Microsoft Assessment and Planning (MAP) Toolkit, Application Compatibility Toolkit (ACT), Windows PE, Windows Automated Installation Kit (WAIK), Windows System Image Manager (WSIM), Easy Transfer, User State Migration Toolkit (USMT), Windows Deployment Services, Microsoft Deployment Toolkit 2010, System Center Configuration Manager, Key Management Service, and Volume Activation Management Tool (VAMT)

  • Illustrated with plenty of real-world scenarios, Mastering Windows Deployment provides the hands-on instruction you need to fully understand and use each deployment technology.

    Table of Contents

    1. Copyright
    2. Dear Reader,
    3. Acknowledgments
    4. About the Authors
    5. About the Contributing Author
    6. Introduction
      1. Who Should Read This Book
        1. How to Use This Book
        2. What You Need
      2. What Is Covered in This Book
      3. How to Contact the Authors
    7. 1. Does Your Hardware Measure Up?
      1. 1.1. Meet Windows 7
      2. 1.2. Windows 7 Hardware Requirements
      3. 1.3. Using the Microsoft Assessment and Planning Toolkit
        1. 1.3.1. Planning and Installing MAP
          1. 1.3.1.1. MAP System Requirements
          2. 1.3.1.2. Network Configuration
          3. 1.3.1.3. Installing MAP on The Server
        2. 1.3.2. Performing a Windows 7 Readiness Assessment
      4. 1.4. Produce MAP Reports and Proposals
      5. 1.5. The Bottom Line
    8. 2. Evaluating Applications for Windows 7 Compatibility
      1. 2.1. Application Compatibility
      2. 2.2. The Application Compatibility Toolkit
        1. 2.2.1. Choosing an ACT Architecture
        2. 2.2.2. Installing ACT
        3. 2.2.3. Using the Application Compatibility Manager
          1. 2.2.3.1. Gathering Application Compatibility Data
          2. 2.2.3.2. Using the Application Compatibility Data
          3. 2.2.3.3. Testing Application Compatibility
        4. 2.2.4. Resolving Application Compatibility Issues with Shims
          1. 2.2.4.1. Using the Standard User Analyzer and Standard User Analyzer Wizard
          2. 2.2.4.2. Creating Shims
      3. 2.3. Deploying XP Mode
        1. 2.3.1. Installing Virtual PC for Windows 7
        2. 2.3.2. Installing XP Mode
        3. 2.3.3. Advanced Deployment of XP Mode
          1. 2.3.3.1. Silent Installation
      4. 2.4. The Bottom Line
    9. 3. Installing Windows 7: Meet the Panther
      1. 3.1. Choosing the Right Edition of Windows 7
        1. 3.1.1. Windows 7 Professional
        2. 3.1.2. Windows 7 Enterprise
        3. 3.1.3. Windows 7 Ultimate
        4. 3.1.4. The N, E, K, and KN Editions
      2. 3.2. Speaking the Language: Four Ways to Use Windows Setup
        1. 3.2.1. Deploying New Bare-Metal Computers
        2. 3.2.2. Upgrading Computers
        3. 3.2.3. Refreshing Computers
        4. 3.2.4. Replacing Computers
      3. 3.3. Windows Setup in Detail
        1. 3.3.1. Preinstallation Phase
        2. 3.3.2. Online Configuration Phase
        3. 3.3.3. Windows Welcome Phase
      4. 3.4. Performing the Windows 7 Installation
        1. 3.4.1. Performing a Clean Installation
        2. 3.4.2. Performing an In-Place Upgrade
      5. 3.5. The Last Step: Licensing and Activation
        1. 3.5.1. Understanding Windows Activation
        2. 3.5.2. Activating a New Computer
        3. 3.5.3. Discovering the Four Types of Licenses
          1. 3.5.3.1. The Volume Activation Management Tool
          2. 3.5.3.2. Software Licensing Management Tool
      6. 3.6. The Bottom Line
    10. 4. Cloning the Panther: Automating Windows 7 Installation
      1. 4.1. Getting Familiar with Microsoft Images
        1. 4.1.1. Image Types: VHD and WIM
        2. 4.1.2. Creating a Bootable VHD Image
        3. 4.1.3. Creating a Bootable WinPE Image
        4. 4.1.4. Creating Operating System Images
      2. 4.2. Creating Your First Image
      3. 4.3. Using the Windows Automated Installation Kit
      4. 4.4. Creating Bootable WinPE Media
      5. 4.5. Preparing a System with Sysprep
      6. 4.6. Capturing an Image Using ImageX
      7. 4.7. Applying an Image Using ImageX
      8. 4.8. Customizing Images Using Deployment Image Servicing and Management
        1. 4.8.1. Viewing Information about an Image with DISM
        2. 4.8.2. Mounting an Image
        3. 4.8.3. Servicing Drivers in an Image
        4. 4.8.4. Servicing the Operating System in an Image
        5. 4.8.5. Committing an Image
      9. 4.9. Using Windows System Image Manager
        1. 4.9.1. Exploring the Panes: An Overview of WSIM
        2. 4.9.2. Understanding Catalog Files
        3. 4.9.3. Exploring the Components of an Answer File
          1. 4.9.3.1. Pass 1: windowsPE
          2. 4.9.3.2. Pass 2: offlineServicing
          3. 4.9.3.3. Pass 3: generalize
          4. 4.9.3.4. Pass 4: specialize
          5. 4.9.3.5. Pass 5: auditSystem
          6. 4.9.3.6. Pass 6: auditUser
          7. 4.9.3.7. Pass 7: oobeSystemi
        4. 4.9.4. Creating an Unattended Answer File
          1. 4.9.4.1. Adding an Image to WSIM
          2. 4.9.4.2. Adding Components to the Answer File
          3. 4.9.4.3. Configuring the Components in the Answer File
          4. 4.9.4.4. Testing and Saving the Answer File
          5. 4.9.4.5. Viewing Sample Answer Files
      10. 4.10. The Bottom Line
    11. 5. Migrating the Existing User Data
      1. 5.1. Exploring User Data and Settings
        1. 5.1.1. User Data
        2. 5.1.2. Application Settings Data
        3. 5.1.3. Migrating User Data
      2. 5.2. Working with Windows Easy Transfer
        1. 5.2.1. Capturing Data with Windows Easy Transfer
        2. 5.2.2. Restoring Data with Windows Easy Transfer
      3. 5.3. Working with the User State Migration Tool
        1. 5.3.1. Using the USMT in Four Deployment Scenarios
          1. 5.3.1.1. Refresh Scenario
          2. 5.3.1.2. Replace Scenario
        2. 5.3.2. Setting Up the Source Computer
        3. 5.3.3. Gathering Data by Running ScanState
          1. 5.3.3.1. Using the /auto Switch
          2. 5.3.3.2. Creating XML Files
          3. 5.3.3.3. Identifying Users to Migrate
          4. 5.3.3.4. Encrypting the Migration Store
          5. 5.3.3.5. Creating a Hard-Link Migration Store
          6. 5.3.3.6. Identifying Users and Files That Will Be Migrated
          7. 5.3.3.7. Migrating Files Encrypted with EFS
          8. 5.3.3.8. Running ScanState to Create the Migration Store
        4. 5.3.4. Applying the Data and Settings Using LoadState
          1. 5.3.4.1. Common LOADSTATE Switches
          2. 5.3.4.2. Using the /auto Switch
          3. 5.3.4.3. Decrypting the Migration Store
          4. 5.3.4.4. Retrieving Data from a Hard-Link Migration
          5. 5.3.4.5. Retrieving Data from Windows.old
        5. 5.3.5. Getting Extra Mileage Out of the USMT
          1. 5.3.5.1. Modify the MigDocs.xml File to Exclude Files
          2. 5.3.5.2. Building a USB Drive to Simplify Migrations
          3. 5.3.5.3. Deleting the Hard-Link Store
          4. 5.3.5.4. Deleting the Windows.old Folder
      4. 5.4. The Bottom Line
    12. 6. Windows Deployment Services: The Basics
      1. 6.1. Understanding WDS
        1. 6.1.1. The History of WDS
        2. 6.1.2. How Does WDS Work?
          1. 6.1.2.1. Boot Up with PXE
          2. 6.1.2.2. Downloading a Boot Image Using Trivial FTP
          3. 6.1.2.3. Booting Up the WDS Client
      2. 6.2. Deploying WDS
        1. 6.2.1. Designing a WDS Solution
        2. 6.2.2. WDS Requirements
        3. 6.2.3. Installing WDS
        4. 6.2.4. Configure the WDS Installation
      3. 6.3. Image Management
        1. 6.3.1. Managing Boot Images
          1. 6.3.1.1. Adding a Boot Image
          2. 6.3.1.2. Adding Drivers to the WDS Server
          3. 6.3.1.3. Adding Drivers to Boot Images
          4. 6.3.1.4. Creating a Capture Image
          5. 6.3.1.5. Creating a Discover Image
        2. 6.3.2. Managing Installation Images
          1. 6.3.2.1. Managing Image Groups and Single-Instance Storage
          2. 6.3.2.2. Adding Installation Images
          3. 6.3.2.3. Securing Installation Images
        3. 6.3.3. Exploring the WDS Image Store
      4. 6.4. Modifying PXE Client Response Policy
      5. 6.5. The Bottom Line
    13. 7. WDS from the Client's View
      1. 7.1. Employing the PXE Client
        1. 7.1.1. Booting a PXE Client
        2. 7.1.2. Configuring PXE Response
        3. 7.1.3. Selecting a Boot Image
        4. 7.1.4. Customizing the PXE Boot Process
      2. 7.2. Creating a Customized Installation Image
        1. 7.2.1. Prepare a Reference Machine
        2. 7.2.2. Create an Image
      3. 7.3. Using Unattended Answer Files with WDS
        1. 7.3.1. Preparing WSIM
        2. 7.3.2. Automating the Boot Image
        3. 7.3.3. Automating Image Installation
      4. 7.4. Monitoring, Logging, and Troubleshooting WDS
        1. 7.4.1. Monitoring WDS Performance
        2. 7.4.2. WDS Logging
          1. 7.4.2.1. Logging on the WDS Server
          2. 7.4.2.2. Logging on the WDS Client
        3. 7.4.3. Troubleshooting WDS
      5. 7.5. The Bottom Line
    14. 8. Tweaking Your WDS Server
      1. 8.1. Using WDS to Name Machines
        1. 8.1.1. Developing a Naming Standard
        2. 8.1.2. Naming a Computer Using WDS
          1. 8.1.2.1. Configuring a WDS Client Naming Policy
          2. 8.1.2.2. How WDS Implements the Client Naming Policy
      2. 8.2. Manage Domain Membership Using WDS
        1. 8.2.1. Advanced Domain Controller Settings
      3. 8.3. Using WDS for Multicast Deployments
        1. 8.3.1. Why Multicast Deployments Are Needed
        2. 8.3.2. How WDS Multicast Works
        3. 8.3.3. Creating a Multicast Deployment
        4. 8.3.4. Troubleshooting a Multicast Deployment
          1. 8.3.4.1. Slow Multicast Image Download
          2. 8.3.4.2. Network Flooding with IGMP Snooping Disabled
      4. 8.4. The Bottom Line
    15. 9. Microsoft Deployment Toolkit 2010
      1. 9.1. Setting Up Your Deployment Server
        1. 9.1.1. Hardware Requirements
        2. 9.1.2. Software Requirements
        3. 9.1.3. Supported Operating Systems
      2. 9.2. Installing MDT 2010 Update 1
        1. 9.2.1. Meeting the Deployment Workbench
        2. 9.2.2. Exploring the Active Parts of the Deployment Workbench
      3. 9.3. Creating and Populating a Deployment Share
        1. 9.3.1. Creating a Deployment Share
        2. 9.3.2. Populating the Deployment Share
          1. 9.3.2.1. Importing Operating Systems
          2. 9.3.2.2. Importing Applications
          3. 9.3.2.3. Importing Drivers
          4. 9.3.2.4. Importing Packages
        3. 9.3.3. Creating a Task Sequence
        4. 9.3.4. Updating the Deployment Share
      4. 9.4. Deploying Your First Image
      5. 9.5. The Bottom Line
    16. 10. MDT's Client Wizard
      1. 10.1. Customizing the Deployment Share
      2. 10.2. Operating System Properties
      3. 10.3. Application Properties
      4. 10.4. Driver Properties
      5. 10.5. Package Properties
      6. 10.6. Task Sequence Properties
        1. 10.6.1. General Tab
        2. 10.6.2. Task Sequence Tab
        3. 10.6.3. The OS Info Tab
      7. 10.7. Automating the MDT Deployment Wizard
      8. 10.8. The Bottom Line
    17. 11. Fine-Tuning MDT Deployments
      1. 11.1. Discovering Selection Profiles
      2. 11.2. Creating a Linked Deployment Share
        1. 11.2.1. Understanding Linked Deployment Shares
        2. 11.2.2. Maintaining Linked Deployment Shares
          1. 11.2.2.1. Using DFS-R as a Replication Mechanism
          2. 11.2.2.2. Removing Hard References to the Deployment Share
        3. 11.2.3. Securing Linked Deployment Shares
      3. 11.3. Deploying from DVD
      4. 11.4. Working with the MDT Database
        1. 11.4.1. Creating the MDT Database
        2. 11.4.2. Using the MDT Database
          1. 11.4.2.1. Defining Computers
          2. 11.4.2.2. Defining Roles
          3. 11.4.2.3. Defining Locations
          4. 11.4.2.4. Defining Make and Model
          5. 11.4.2.5. Modifying CustomSettings.ini to Use the Database
        3. 11.4.3. Filling the MDT Database Using PowerShell
          1. 11.4.3.1. Setting Up the Module
          2. 11.4.3.2. Creating the CSV File
          3. 11.4.3.3. Using the CSV File with the PowerShell Module
        4. 11.4.4. Extending the MDT Database with Custom Settings
      5. 11.5. The Bottom Line
    18. 12. Zero Touch Installations
      1. 12.1. Understanding Configuration Manager
        1. 12.1.1. Introducing Configuration Manager
        2. 12.1.2. Why Use Configuration Manager for OSD?
        3. 12.1.3. Understanding the ZTI Flow
      2. 12.2. Installing Configuration Manager 2007
        1. 12.2.1. Prepare for a ConfigMgr Installation
          1. 12.2.1.1. Prepare Active Directory
          2. 12.2.1.2. Prepare the ConfigMgr Site Server
        2. 12.2.2. Install the Site Server
          1. 12.2.2.1. Install Configuration Manager 2007 with Service Pack 2
          2. 12.2.2.2. Upgrade to Configuration Manager 2007 R2
          3. 12.2.2.3. Install MDT 2010
        3. 12.2.3. Configure the Site Server
          1. 12.2.3.1. Configure the Site
          2. 12.2.3.2. Add Site Roles
      3. 12.3. Preparing and Configuring Boot Images
        1. 12.3.1. Creating Boot Images
        2. 12.3.2. Adding Drivers to a Boot Image
      4. 12.4. Creating and Capturing a Reference Image
        1. 12.4.1. Install Packages on the Distribution Points
        2. 12.4.2. Create a Collection and a Computer Association
        3. 12.4.3. Advertise the Reference Image Task Sequence
        4. 12.4.4. Run the Reference Image Task Sequence
      5. 12.5. Identifying and Targeting Machines for Rebuilding
        1. 12.5.1. A Deployment Strategy
        2. 12.5.2. Creating a Collection for Windows 7 Deployment
        3. 12.5.3. New Computers
      6. 12.6. Deploying Windows 7
        1. 12.6.1. Create a New Deployment Task Sequence
        2. 12.6.2. Edit the Deployment Task Sequence
        3. 12.6.3. Advertise for Bare-Metal Installation
        4. 12.6.4. Performing the Zero Touch Installation
      7. 12.7. Monitoring Deployment Progress
      8. 12.8. The Bottom Line
    19. 13. Taking Advantage of Volume Licensing
      1. 13.1. Choosing the Right Volume License Key for Windows
      2. 13.2. Tracking Your Licenses with the Key Management Service
        1. 13.2.1. Learning the KMS Process
        2. 13.2.2. Choosing Your KMS Host
        3. 13.2.3. Selecting the KMS Host Manually
        4. 13.2.4. Installing and Initializing KMS
        5. 13.2.5. Configuring DNS to Let KMS Clients Find the KMS Server
          1. 13.2.5.1. Using Multiple Key Management Servers In Your Environment
          2. 13.2.5.2. Configuring DNS In a Multiple-Domain Situation
        6. 13.2.6. Uninstalling KMS
        7. 13.2.7. Troubleshooting the KMS and the KMS Client
        8. 13.2.8. Configuring KMS for Activation of Office 2010
        9. 13.2.9. Monitoring the KMS Servers
        10. 13.2.10. Using Asset Intelligence Reports in SCCM 2007
      3. 13.3. KMS and the Client
        1. 13.3.1. Using a KMS Client Key and MAK During OS Installation
        2. 13.3.2. Changing the Client License Type After Installation
          1. 13.3.2.1. Converting Retail and OEM Editions to Volume Licensing
          2. 13.3.2.2. Converting MAK Clients to KMS and KMS Clients to MAK
        3. 13.3.3. Postponing Activation
          1. 13.3.3.1. Postponing Activation Using Rearm
          2. 13.3.3.2. Working with Reduced Functionality Mode
        4. 13.3.4. Recovering from a Nongenuine State
        5. 13.3.5. Understanding the Windows Software Licensing Management Tool
        6. 13.3.6. Configuring Windows Firewall Settings When Using SLMGR Remotely
        7. 13.3.7. Allowing Standard Users to Perform Activation
        8. 13.3.8. Controlling Activation Notifications and Timing
        9. 13.3.9. Using Group Policy to Control Activation Behavior
      4. 13.4. Tracking Your Licenses: The Volume Activation Management Tool
        1. 13.4.1. Understanding the VAMT Requirements
        2. 13.4.2. Exploring What the VAMT Can Do for You
          1. 13.4.2.1. Reporting
          2. 13.4.2.2. MAK Proxy Activation
          3. 13.4.2.3. Command-Line Interface
      5. 13.5. The Bottom Line
    20. A. The Bottom Line
      1. A.1. Chapter 1: Does Your Hardware Measure Up?
      2. A.2. Chapter 2: Evaluating Applications for Windows 7 Compatibility
      3. A.3. Chapter 3: Installing Windows 7: Meet the Panther
      4. A.4. Chapter 4: Cloning the Panther: Automating Windows 7 Installation
      5. A.5. Chapter 5: Migrating the Existing User Data
      6. A.6. Chapter 6: Windows Deployment Services: The Basics
      7. A.7. Chapter 7: WDS from the Client's View
      8. A.8. Chapter 8: Tweaking Your WDS Server
      9. A.9. Chapter 9: Microsoft Deployment Toolkit 2010
      10. A.10. Chapter 10: MDT's Client Wizard
      11. A.11. Chapter 11: Fine-Tuning MDT Deployments
      12. A.12. Chapter 12: Zero Touch Installations
      13. A.13. Chapter 13: Maintenance and Monitoring