You are previewing Microsoft® Windows® Desktop Deployment Resource Kit.
O'Reilly logo
Microsoft® Windows® Desktop Deployment Resource Kit

Book Description

In-depth technical information and tools to help IT professionals deploy Microsoft Windows desktop operating systems and applications—straight from the source. Get definitive guidance, plus must-have tools, templates, and scripts on CD.

Table of Contents

  1. Microsoft® Windows® Desktop Deployment Resource Kit
    1. SPECIAL OFFER: Upgrade this ebook with O’Reilly
    2. A Note Regarding Supplemental Files
    3. Acknowledgments
    4. Introduction
      1. Windows Versions
      2. Some Terminology
      3. Companion CD
      4. System Requirements
      5. Companion Web Site
      6. Other Resources
      7. Lab Testing
      8. Resource Kit Support Policy
      9. Contacting Me
    5. I. Planning
      1. 1. Deployment Plan
        1. Planning Overview
          1. Scope and Objectives
          2. Current Environment
          3. Testing and Piloting
          4. Rolling Out
        2. Environment Plan
          1. Upgrade Paths
          2. Client Hardware
          3. Client Software
          4. Infrastructure
        3. Configuration Plan
          1. Management
          2. Networking
          3. Security
        4. Distribution Plan
          1. Clean Installations
          2. Multibooting
          3. Dynamic Update
          4. Windows Product Activation
        5. Distribution Methods
          1. Unattended Installation
          2. Disk Imaging with Sysprep
          3. Remote Installation Service
          4. Systems Management Server
        6. Best Practices
      2. 2. Application Compatibility
        1. Understanding Compatibility
          1. Why Applications Fail
          2. Windows Logo Requirements
        2. Compatibility Technologies
          1. Migration Technologies
          2. Compatibility Modes
          3. Application Help
          4. Compatibility Fixes
          5. Compatibility Databases
        3. Application Compatibility Toolkit
        4. Compatibility Inventory
          1. Taking the Inventory
          2. Scripting the Inventory
          3. Building the Test Lab
          4. Testing the Applications
          5. Finding Resolutions
        5. Compatibility Databases
        6. Distributing Compatibility Fixes
        7. Maintaining Compatibility
          1. Dynamic Update
          2. Windows Update
        8. Virtual PC as Safety Net
        9. Best Practices
      3. 3. Windows Configuration
        1. Management
          1. Desktop
          2. Laptop
        2. Connectivity
          1. TCP/IP Networks
          2. IPX Protocol
        3. Security
          1. Authentication
          2. Authorization
          3. Encryption
        4. Disk Partitions
        5. File Systems
          1. Converting versus Formatting
          2. File System Compatibility
        6. Hardware Devices
        7. Multilingual
        8. Accessibility
        9. Applications
        10. Settings
        11. Best Practices
      4. 4. Office Configuration
        1. Packages
        2. Environment
          1. Network Capacity
          2. Client Computers
        3. Preparation
          1. Administrative Installation
          2. Compressed CD Image
        4. Customization
          1. Removal
          2. Features
          3. Settings
          4. Files
          5. Shortcuts
        5. Distribution
        6. Best Practices
      5. 5. Office Migration
        1. Migration Issues
        2. Versions Compatibility
          1. Object Model Changes
          2. Virus Scanner Problems
          3. Automation Failures
          4. Legitimate Bugs
        3. Network Inventory
        4. Document Conversion
          1. Office
          2. WordPerfect
        5. Database Conversion
          1. Coexistence
          2. Conversion
          3. Common Issues
          4. Best Practices
        6. Security Migration
          1. Security Policy
        7. Solution Migration
          1. VBA Add-Ins
          2. COM Add-Ins
        8. Phased Rollouts
        9. Best Practices
    6. II. Configuring
      1. 6. Answer Files
        1. Getting Started
          1. Sample Answer File
          2. Settings Categories
        2. Editing Answer Files
          1. Setup Manager
          2. Text Editors
        3. Running Setup Fully Unattended
        4. Specializing Answer Files
          1. Custom Files
          2. User Settings
          3. Device Drivers
          4. Local Password
          5. Join Domain
          6. AutoLogon
          7. Run Once
          8. Components
          9. Remote Desktop
        5. Templating Answer Files
          1. Creating Templates
          2. Scripting Templates
        6. Scripting Domain Adds
        7. Best Practices
      2. 7. Distribution Points
        1. Getting Started
        2. Building a Development Server
          1. Hardware Recommendations
          2. Software Recommendations
        3. Creating the Distribution Point
          1. diskpart.txt
          2. setup32.cmd
          3. winnt32.cmd
          4. winnt.sif
        4. Copying the Source Files
        5. Creating the $OEM$ Folder
        6. Adding Third-Party Drivers
          1. Manual Process
          2. Scripted Process
        7. Fixing Long Filenames
          1. Manual Process
          2. Scripted Process
        8. Customizing the Sample Folder
        9. Integrating Service Packs
        10. Sharing Distribution Points
        11. Balancing Installation
        12. Office Distribution Points
          1. Administrative Installations
          2. Compressed CD Images
          3. Integrating Service Releases
          4. Distribution Point Contents
          5. Sharing Distribution Points
        13. Best Practices
      3. 8. Windows Settings
        1. Settings Overview
        2. Finding Settings
          1. Comparing .reg Files
          2. Monitoring a Sample
        3. Choosing a Technique
        4. Installing .inf Files
          1. Starting with a Template
          2. Linking Sections Together
          3. Adding Keys and Values
          4. Deleting Keys and Values
          5. Setting and Clearing Bits
          6. Using Strings in .inf Files
        5. Setting Values with .reg Files
          1. Exporting Settings to .reg Files
          2. Creating .reg Files Manually
          3. Encoding Special Characters
          4. Deleting Keys or Values Using a .reg File
        6. Editing from the Command Prompt
          1. Adding Keys and Values
          2. Querying Values
          3. Deleting Keys and Values
          4. Comparing Keys and Values
          5. Copying Keys and Values
          6. Exporting Keys to .reg Files
          7. Importing .reg Files
          8. Saving Keys to Hive Files
          9. Restoring Hive Files to Keys
          10. Loading Hive Files
          11. Unloading Hive Files
        7. Scripting Using Windows Script Host
          1. Creating Script Files
          2. Running Script Files
          3. Formatting Key and Value Names
          4. Adding and Updating Values
          5. Removing Keys and Values
          6. Querying Registry Values
        8. Creating Windows Installer Packages
        9. Configuring Specific Settings
        10. Best Practices
      4. 9. Office Settings
        1. Customization Methods
          1. Options
          2. Settings Files
          3. Transforms
          4. Precedence
        2. Customizing Features
          1. Installation States
          2. Hiding and Locking Features
          3. Preventing Network Features
          4. Configuring Feature State Migration
        3. Customizing Office Shortcuts
          1. Modifying Shortcuts
          2. Migrating Existing Shortcuts
          3. Removing Custom Shortcuts
        4. Adding Files to Office 2003
        5. Customizing User Settings
        6. Using the Profile Wizard
          1. Creating an OPS File
          2. Adding to a Transform
          3. Migrating Existing Settings
          4. Running During Setup
          5. Running After Installation
        7. Using a Transform
          1. Registry Values
          2. Office Security
          3. Outlook Settings
        8. Customizing Removal Behavior
          1. Removing Previous Versions
          2. Removing Small Business Tools
          3. Customizing the Removal Process
          4. Running the Removal Wizard Standalone
          5. Using a Custom OPC File
        9. Customizing Installation
          1. Compressed CD Images
          2. Local Installation Sources
        10. Best Practices
      5. 10. Internet Explorer Settings
        1. Overview
        2. Administration Kit
        3. Internet Settings Files
          1. Creating the Settings File
          2. Distributing the Settings File
        4. Unattended-Setup Answer Files
          1. Favorites
          2. Proxy Settings
          3. Important URLs
        5. Group Policy Settings
        6. Best Practices
      6. 11. Chaining Installations
        1. Chaining Overview
        2. Package Distribution
        3. Package Installation
          1. Cmdlines.txt
          2. [GuiRunOnce]
        4. Sample Distribution Folder
          1. Modifying a Folder
          2. Creating a New Folder
        5. Unattended Packages
          1. Windows Installer
          2. InstallShield
          3. PackagefortheWeb
          4. Wise Installation System
        6. Office Chaining
          1. Package Customization
          2. Requirements and Limitations
        7. Best Practices
      7. 12. User Profiles
        1. User Profiles Overview
        2. Exploring User Profiles
          1. Profile Hives
          2. Profile Folders
          3. Special Profiles
        3. Getting User Profiles
          1. Local Profiles
          2. Roaming Profiles
        4. Using Roaming User Profiles
          1. Managing Roaming User Profiles
          2. Understanding Fast Network Logon
          3. Understanding the New Merge
        5. Deploying Default User Profiles
          1. Customizing User Settings
          2. Cleaning User Profiles
          3. Creating Default User Folders
          4. Deploying Default User Folders
        6. Coexisting with Earlier Versions of Windows
        7. Migrating User Settings to Windows XP
          1. Files And Settings Transfer Wizard
          2. User State Migration Tool
        8. Scripting as an Alternative
          1. Logon Scripts
          2. RunOnce Key
          3. Combination of Both
        9. Controlling Just-in-Time Setup
          1. Outlook Express
          2. Windows Media Player
          3. Desktop Themes
          4. Other Shortcuts
        10. AutoProf Profile Maker
        11. Best Practices
    7. III. Distributing
      1. 13. Unattended Setup
        1. Distribution Methods
          1. Distribution Points
          2. Media Distribution
        2. Preinstallation Tasks
          1. State Migration
          2. Disk Configuration
          3. Dynamic Update
        3. Running Winnt.exe
          1. Creating Startup Media
          2. Installing from MS-DOS
        4. Running Winnt32.exe
          1. Clean Installation from Windows
          2. Upgrade Installation from Windows
        5. Using UDB Files
          1. Creating UDB Files
          2. Specifying UDB Files
        6. Post-Installation Tasks
        7. Office 2003 Editions
        8. Best Practices
      2. 14. Preinstallation Environment
        1. Exploring Windows PE
          1. Capabilities
          2. Limitations
        2. Using Windows PE as an Installation Platform
          1. Starting the Computer
          2. Configuring the Hard Disks
          3. Installing Windows
        3. Customizing Windows PE
          1. Command-Line Tools
          2. Optional Components
          3. Network Drivers
          4. Mass-Storage Drivers
          5. Languages
        4. Starting Windows PE
          1. CD-Based Installation
          2. RIS-Based Installation
          3. Disk-Based Installation
        5. Automating Installations
          1. Verifying Hardware Requirements
          2. Prompting Users for Data
          3. Looking Up Database Records
        6. Best Practices
      3. 15. Disk Imaging with Sysprep
        1. Overview
          1. Sysprep Requirements
          2. Disk-Imaging Tools
        2. Configuring Sysprep
          1. Creating Sysprep.inf
          2. Changes to Sysprep.inf
          3. Cleaning After Sysprep
        3. Automating Mini-Setup
        4. Reducing Image Count
          1. Manually
          2. Automated
        5. Running Sysprep
        6. Preparing a Disk Image
          1. Windows Installation
          2. Sysprep Configuration
        7. Starting with a Template
        8. Installing the Configuration
        9. Creating the Disk Image
        10. Deploying the Disk Image
          1. Disk-Imaging Programs
          2. Network Distribution
          3. Media Distribution
        11. Optimizing Disk Images
        12. Mapping Sysprep Settings
        13. Best Practices
      4. 16. Remote Installation Service
        1. Overview
          1. Server Requirements
          2. Client Requirements
          3. RIS Components
        2. Installing RIS
        3. Authorizing a RIS Server
        4. Configuring a RIS Server
          1. Network Configuration
          2. Server Properties
          3. Security Configuration
        5. Customizing the Client Installation Wizard
        6. Using CD-Based Images
          1. Templates
          2. Template Permissions
          3. $OEM$ Folder
        7. Creating RIS Images
        8. Restricting CIW Choices
        9. Best Practices
      5. 17. Systems Management Server
        1. SMS Overview
          1. Packages
          2. Distribution
          3. Advertising
        2. Packaging Windows XP
          1. Package Definition
          2. Upgrade Packages
          3. Answer Files
        3. Preparing for Distribution
          1. Site Servers
          2. Distribution Points
          3. Distribution Point Groups
          4. Sender Controls
          5. Fan-Out Distribution
          6. Test Site
        4. Distributing the Packages
          1. Testing the Distribution
          2. Expanding the Distribution
          3. Using the Courier Sender
        5. Monitoring the Distribution
          1. System Status Subsystem
          2. Reporting Distribution Status
        6. Troubleshooting Distributions
        7. Advertising the Packages
          1. Selecting Computers
          2. Preparing Computers
          3. Advertising the Packages
          4. Expanding Security
          5. Upgrading Computers
          6. Monitoring Advertisements
          7. Troubleshooting
        8. Distributing Office 2003
        9. Best Practices
      6. 18. User State Migration
        1. Planning Migration
        2. Using Files And Settings Transfer Wizard
        3. Deploying User State Migration Tool
          1. Running Scanstate.exe
          2. Running Loadstate.exe
          3. Using Migsys.inf
          4. Using Miguser.inf
          5. Using Migapps.inf
          6. Using Sysfiles.inf
        4. Using Third-Party Tools
          1. Eisenworld PC-Relocator
          2. PowerQuest DeployCenter Library 2.0
          3. Altiris eXpress Migration Suite
          4. Miramar Desktop DNA
        5. Using Scripted Tools
        6. Best Practices
    8. IV. Managing
      1. 19. Software Update Services
        1. SUS Overview
          1. Patch Analysis
          2. Server Component
          3. Client Component
          4. Security Features
        2. SUS Server Design
          1. Synchronized Servers
          2. Network Load Balancing (NLB)
        3. SUS Server Deployment
          1. Installing the Server Software
          2. Configuring the Server
          3. Creating Distribution Points
          4. Securing Administration
          5. Configuring for NLB
          6. Synchronizing Content
          7. Approving Updates
          8. Staging Content
        4. Automatic Updates Deployment
          1. Deploying Automatic Updates
          2. Using Automatic Updates
          3. Administering Automatic Updates
        5. Best Practices
      2. 20. Policy Management
        1. Overview
        2. Security Settings
          1. Password Security
          2. Account Lockout
          3. Audit Policy
          4. User Rights
          5. Security Options
          6. Restricted Groups
          7. System Services
          8. Registry ACLs
          9. File System ACLs
        3. Software Restriction
          1. Default Security Level
          2. Certificate Rules
          3. Hash Rules
          4. Internet Zone Rules
          5. Path Rules
          6. Registry Path Rules
        4. Folder Redirection
          1. Root Folder
          2. Specific Path
          3. Local Profile Location
          4. Home Directory
        5. AutoProf Policy Maker
        6. Administrative Templates
          1. Group Policy Storage
          2. Extending Registry-Based Policy
          3. Deploying Registry-Based Policy
        7. Using the Group Policy Tools
          1. Gpresult
          2. Gpupdate
          3. Help and Support Center
          4. Resultant Set of Policy
          5. Group Policy Management Console
        8. Best Practices
      3. 21. Desktop Management
        1. Management Overview
        2. Active Directory Environments
          1. User Data Management
          2. User Settings Management
          3. Computer Settings Management
          4. Group Policy Desktop Management
          5. Group Policy Software Distribution
        3. Non-Active Directory Environments
          1. Roaming User Profiles
          2. My Documents Redirection
          3. Internet Explorer Maintenance
          4. System Policy
          5. Local Group Policy Object
        4. UNIX and Novell Environments
          1. Standards-Based Management
          2. Telnet Client and Server
          3. Novell NetWare IPX Network
          4. Novell ZENworks
        5. Standardized Desktop Configurations
          1. Creating Managed Desktops
          2. Managing Mobile Users
          3. Managing New Users
          4. Managing Multiuser Desktops
          5. Replacing Computers
        6. Best Practices
      4. 22. Patch Management
        1. Obtaining Service Packs
          1. Extracting Service Packs
          2. Using Command-Line Options
        2. Planning Deployment
          1. Deployment Methods
          2. Deployment Tools
          3. Space Requirements
          4. Testing the Deployment
        3. Deploying Service Packs
          1. Local Installation
          2. Shared Installation
          3. SMS Deployment
          4. Windows Installer
        4. Slipstreaming Service Packs
        5. Deploying Hotfixes
          1. Update Installations
          2. Combination Installations
        6. Patching Microsoft Office
          1. Client Patches
          2. Administrative Patches
        7. Best Practices
      5. 23. Software Installation
        1. Overview
          1. User Privileges
          2. User Interaction
        2. Windows Installer
          1. Features
          2. Technology
        3. Using Windows Installer
          1. Installing a Package
          2. Creating Administrative Installations
          3. Repairing a Package
          4. Uninstalling a Package
          5. Advertising a Package
          6. Logging Results
          7. Applying a Patch
          8. Installing a Transform
          9. Advertising with a Transform
          10. Setting a User Interface Level
        4. Managing Windows Installer
          1. Installing with Elevated Privileges
          2. Caching Transforms in a Secure Location
          3. Locking Down Windows Installer
        5. Removing Windows Installer Data
          1. Msizap.exe
          2. Msicuu.exe
        6. Installing Office 2003
        7. Automating Legacy Installers
          1. Windows Installer
          2. InstallShield
          3. PackagefortheWeb
          4. Wise Installation System
        8. Repackaging Legacy Applications
        9. Third-Party Distribution Products
        10. Elevating Installation Privileges
          1. Group Policy
          2. Secondary Logon
          3. Scheduled Tasks
          4. AutoLogon
          5. Sysinternals Psexec
        11. Best Practices
    9. V. Appendixes
      1. A. Mobile Scenarios
        1. Overview
        2. Preparation
        3. Hardware Management
          1. Hardware Profile Creation
          2. Dynamic Device Configuration
          3. Docking and Undocking
        4. ACPI and APM
          1. ACPI Power Management
          2. APM Power Management
        5. Power Management Options
          1. Power Schemes
          2. Hibernation and Standby
          3. Group Policy Refresh Interval
          4. Battery Monitoring and Management
          5. Button and Switch Behavior
          6. Wake-On-LAN, Etc.
          7. Control Panel Policy
        6. User Profiles and Folder Redirection
          1. Roaming User Profiles
          2. Folder Redirection with Roaming
        7. Offline Files
          1. Files on a Network Share
          2. Synchronization for Offline Files
          3. Automatic Connection for Scheduled Synchronization
          4. Synchronization Over a Slow Link
          5. Offline Files Security
          6. Reinitializing Offline Files Folder
        8. Laptop Security
          1. Undocking Portable Computers
          2. BIOS Security
        9. Wireless Networking
          1. Roaming
          2. Zero Client Configuration
          3. Network Adapter Support
          4. Automatic Wireless Configuration
      2. B. Multilingual Scenarios
        1. Multilingual Overview
        2. Multilingual Features
          1. Built-In Language Support
          2. Support for Locales
          3. Standards And Formats
          4. Input Method Editors and Keyboard Layouts
          5. Unicode and Code Pages
          6. Language for Non-Unicode Programs
          7. User Interface Language Options
          8. Windows XP Language Versions
        3. Deployment Planning
          1. Language Requirements
          2. Hardware Requirements
          3. Roaming User Needs
          4. Upgrade Paths
          5. Single Global Images
          6. Regional Builds
        4. Configuring Desktops
          1. Regional and Language Options
          2. Regional and Language Support
          3. User Interface Language
          4. Localized Content
          5. Multiple Language Access
          6. Special Characters (Code Points)
          7. Group Policy Settings
        5. Unattended Installations
          1. Running Windows XP Setup
          2. Defining Settings in Answer Files
          3. Installing the MUI Pack
          4. Using Silent Configurations
          5. Changing Language and Regional Options
          6. Changing MUI Pack Defaults
          7. Using Windows Installer Packages
      3. C. Administrative Template Syntax
        1. Comments
        2. Strings
        3. Class
        4. Category
        5. Keyname
        6. Policy
          1. Explain
          2. Valuename
          3. Valueon and Valueoff
          4. Actionlist
        7. Part
          1. Checkbox
          2. Combobox
          3. Dropdownlist
          4. Edittext
          5. Listbox
          6. Numeric
          7. Text
      4. D. Answer File Syntax
        1. [Components]
        2. [Data]
          1. AutoPartition
          2. DisableAdminAccountOnDomainJoin
          3. MsDosInitiated
          4. UnattendedInstall
          5. UseBIOSToBoot
        3. [Display]
          1. BitsPerPel
          2. Vrefresh
          3. Xresolution
          4. Yresolution
        4. [GuiRunOnce]
        5. [GuiUnattended]
          1. AdminPassword
          2. Arguments
          3. AutoLogon
          4. AutoLogonCount
          5. DetachedProgram
          6. EMSBlankPassword
          7. EncryptedAdminPassword
          8. OEMSkipRegional
          9. OEMSkipWelcome
          10. ProfilesDir
          11. ServerWelcome
          12. TimeZone
        6. [Identification]
          1. DomainAdmin
          2. DomainAdminPassword
          3. JoinDomain
          4. JoinWorkgroup
          5. MachineObjectOU
        7. [RegionalSettings]
          1. InputLocale
          2. InputLocale_DefaultUser
          3. Language
          4. LanguageGroup
          5. SystemLocale
          6. UserLocale
          7. UserLocale_DefaultUser
        8. [SetupParams]
          1. UserExecute
        9. [TapiLocation]
          1. AreaCode
          2. CountryCode
          3. Dialing
          4. LongDistanceAccess
        10. [Unattended]
          1. ActivateProxy
          2. AutoActivate
          3. ComputerType
          4. CrashDumpSetting
          5. DisableVirtualOemDevices
          6. DUDisable
          7. DUShare
          8. DriverSigningPolicy
          9. ExtendOemPartition
          10. FactoryMode
          11. FileSystem
          12. ForceHALDetection
          13. Hibernation
          14. KeyboardLayout
          15. NtUpgrade
          16. OemFilesPath
          17. OemPnPDriversPath
          18. OemPreinstall
          19. OemSkipEula
          20. OverwriteOemFilesOnUpgrade
          21. Repartition
          22. TargetPath
          23. UnattendMode
          24. UnattendSwitch
          25. WaitForReboot
          26. Win9xUpgrade
        11. [UserData]
          1. ComputerName
          2. FullName
          3. OrgName
          4. ProductKey
      5. E. Batch Script Syntax
        1. Batch Parameters
        2. Cmd Options
          1. Using AutoRun
          2. Enabling Command Extensions
          3. Enabling Delayed Expansion
          4. Enabling Name Completion
          5. Preserving Quote Characters
        3. Batch Commands
          1. Call
          2. Echo
          3. Endlocal
          4. Exit
          5. For
          6. Goto
          7. If
          8. Pause
          9. Rem
          10. Set
          11. Setlocal
          12. Shift
          13. Start
      6. About the Author
    10. Index
    11. SPECIAL OFFER: Upgrade this ebook with O’Reilly