Solved

unattended setup

Posted on 2002-03-03
3
207 Views
Last Modified: 2010-04-13
When I create an unattended setup file for windows 2000 professional, it askes me for computer names to name the computers. I can type more than one in there. How does setup know which computer name to use?
0
Comment
Question by:Masterpjz9
3 Comments
 
LVL 16

Accepted Solution

by:
GUEEN earned 100 total points
ID: 6837936
Create a batch file:
WINNT /B /S:\\test\i386 /U:\\test\i386\unattend.txt /UDF:%1,test.udb


[UniqueIDs]
PC-01= UserData
PC-02= UserData


[PC-01:UserData]
ComputerName = PC-01

[PC-02:UserData]
ComputerName = PC-02

So in a nutshell %1 of your batch expects an argument. Which is the ComputerName. So you only have to start the install with %1 the batch expects a following argument. Which is the PC-Name.
So you can start the installation with the following Command:
start pc-01 or
start pc-02



0
 
LVL 11

Expert Comment

by:ewtaylor
ID: 8904353
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
[accept shekerra]
Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
[ewtaylor]
EE Cleanup Volunteer
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question