Solved

how important is running sysprep on closed workstations in W2K domain?

Posted on 2004-04-08
7
146 Views
Last Modified: 2008-02-26
how important is running sysprep in W2K domain using W2000 and XP workstations? is it IMPERATIVE?

also, i tried using sysprep answerfile and input all the information before i burned an image. but after i imaged a machine, it STILL asked me for the 25 digit key code, and a few other things.

thanks for your help.
0
Comment
Question by:pinger
  • 5
  • 2
7 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 10785017
YES ITS IMPERITIVE !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!11
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10785032
Every workstation on the domain has a unique SID number if more than two are the same it will cause you no end of problems and loss of service, sysprepping is primarily geared towards removing this SID if you clone PC's without sysprepping them you have to Manually re-assign everyone a SID :(

Generating a New SID

If you’ve cloned without sysprep or are getting…….

"The Server could not bind to the transport \Device\NetBT_Tcpip because another computer on the network has the same name.  The server could not start".  

Then you have a SID Conflict use this on the offending machine.

NewSID
http://www.sysinternals.com/ntw2k/source/newsid.shtml

To find all the SIDS on your network and Identify Conflicts
PSGetSID
http://www.sysinternals.com/ntw2k/freeware/psgetsid.shtml


NB You can view a PC's SID in the registry under HKEY_Users (the folder near the end with the long alphanumeric name is the SID)
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10785053
>>also, i tried using sysprep answerfile and input all the information before i burned an image. but after i imaged a >>machine, it STILL asked me for the 25 digit key code, and a few other things.


Ahaa! hang on

see my Q here http://www.experts-exchange.com/Operating_Systems/Q_20882890.html
0
Free eBook: Backup on AWS

Everything you need to know about backup and disaster recovery with AWS, for FREE!

 
LVL 2

Expert Comment

by:The_Master_Chief
ID: 10785266
You probably made the answer file utilizing the old Windows 2000 setup manager.  Download the setup manager for XP and it has more options for the answer file.  :)  Not sure if you can download it.....google will know.  :)

Use the setup manager in the deploy.cab file found on any XP  Pro cd.

0
 
LVL 2

Expert Comment

by:The_Master_Chief
ID: 10785288
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 50 total points
ID: 10785635
Also be aware of the volume Licencing problem (see my link above) :)
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 11846235
ThanQ
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Application Deployment 2 266
Outlook 2013 Certicate error 1 301
Upgrading Windows 2000 SP4 to Windows XP SP2 5 387
Promote Server 2012 R2 on Server 2003 domain 13 27
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Original post  on Monitis Blog. Web performance monitoring is broken into two camps: passive and active. Passive monitoring is defined as looking at real-world historical performance by monitoring actual log-ins, site hits, clicks, requests for…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question