Solved

sysprep and imaging

Posted on 2003-11-11
8
691 Views
Last Modified: 2010-05-18
How can in intercept the sysprep reboot.  I want to image the disk just
before reboot.
0
Comment
Question by:hank1
  • 3
  • 3
8 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 9723547
Hi hank1,
To Create a PC Image (Windows 2000)

1.      Set up the PC/Laptop from its manufacturers Rescue discs to ensure the PC has all the correct Drivers.

2.      Ensure the correct Windows Service Pack has been applied

3.      Install and Register all your Applications.

4.      If you want All Pc’s to have a default Home Page and/or Proxy Server, Open a MMC Console (Start - Run - MMC - [ENTER]) Add the group policy snap in. Configure the home page as http://yourhomepage then configure the proxy as Your Proxy IP address

5.      Ensure the machine is set to get its IP address dynamically and is connected to the network. (Unless you use Static IP addressing!)

6.      Set the administrators password.

7.      If you use Novell Install and configure the Novell Client

8.      Apply I.E. Service Packs

9.      Apply MSOffice Service Packs

10.      To display a Login message on every machine Go to the following registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon   and in the followink keys paste in this text...

LegalNoticeCaption

<Title of the Message>

LegalNoticeText

<Text of the Message>

11.      If you use Host Files copy them to the following locations

      Win9x c:\windows
      Win2k c:\winnt\system32\drivers\etc

12.      Download the latest Sysprep files from http://www.microsoft.com/windows2000/downloads/tools/sysprep/default.asp  Create a directory on the root of the C:\ drive called “sysprep”. Extract all the files from the Deploy cabinet on the Windows 2000 CD to this directory, Then copy any newer files into this directory that you downloaded earlier

13.      If You need to create an unattended file (So you don’t have to fill in all the prompts that windows usually gives you run setupmgr.exe from the sysprep folder and follow the onscreen prompts.

14.      Press start - run - cmd [Enter]. At the command prompt type cd:\sysprep [Enter] then type sysprep -pnp [Enter]. Sysprep will now run and close the PC down. If you restart the PC it will rebuild itself. It is now ready for Ghosting/Cloning

15.      Before cloning your Hard Drive, ensure you have another hard drive (That Big enough to hold the image fitted to the machine being ghosted. (You cannot ghost to the same Hard Drive!)

16.      Arm yourself with a bootdisk from www.bootdisk.com (Ensure it had RAMDRIVE on it and it works!) And a copy of Ghost.exe from symantec

17.      Boot with your bootdisk

18.      Type ghost then return. (This will create one big image if you want to split the image up, to fit on CDROM’s type “ghost.exe -split=600 –auto”)

19.      At the welcome screen press enter to clear the message.

20.      Using the Cursor Keys select Local, Disk, To Image then return.

21.      At the select local source press enter

22.      At the file name to copy to screen, Use the Tab Keys to navigate to the image location your second Hard Drive.

23.      Press Tab to navigate to the filename box and give the image a name (i.e. delllat1)

24.      Keep pressing the Tab Key till Save is highlighted then press return.

25.      At the Compress Image screen Tab to "High" Then press return.

26.      At the proceed screen Tab to "Yes" then press return.

27.      When it is completed it should say, "Dump completed successfully"

28.      If you’re deploying from CDROM you can now burn the image “portions” to CDROM. Ensure the first disk is bootable and has a copy of ghost on it to restore the image to a new computer.

*****Links*****
http://www.anandtech.com/guides/viewfaq.html?i=115

Cheers!
0
 
LVL 1

Author Comment

by:hank1
ID: 9723646
I'm using True Image.  

I still have the same question though.
The question is how to you intercept the sysprep boot.  I want to run my imaging software
on the prepared disk just before the boot.
I think you avoided the bootup in step 17 above.  Am I right?

I notice that uS says the computer will reboot if it is ACPI complient.  I wonder if there's
a way to fake it out.

Thanks
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 9724242
Put in a boot floppy and launch you imaging software from that, it wont boot the OS then :0)

Pete
0
Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

 
LVL 1

Author Comment

by:hank1
ID: 9725069
That is one way  :-)
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 9725569
Well it works for me, and ive rolled out well over a thousand client machines :0)

Pete
0
 
LVL 1

Author Comment

by:hank1
ID: 9778429
And the answer is ...... use command line option -noreboot

Please delete this question
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 9802946
PAQed, with points refunded (100)

Computer101
E-E Admin
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Adding Computers to AD groups through an SCCM Task Sequence
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question