Solved

Copying files (ghost images)

Posted on 2004-07-31
2
216 Views
Last Modified: 2010-04-11
I had to upgrade some Dell machines running Windows XP Home Edition to W2K. After doing all the necessary configuring, I created disks I was going to use to clone the other machines. Unfortunately, one of the disks would not install properly due to some corruption. Is there a way I can copy the contents of the drive I installed and did all the configuring on, onto the other machines by going disk to disk? If so, how do I accomplish this?

Peter
0
Comment
Question by:Peter_Fabri
2 Comments
 
LVL 5

Assisted Solution

by:Chireru
Chireru earned 100 total points
ID: 11684975
If this is a network environment, you could use GhostCast server, and dump the disk image of the configured machine to the Server.  Then configure all of the clients, and multicast it out to all of them at once.

To do disk-to-disk, you would need to place the source and destination harddrives both in the same machine and do the copy.
0
 
LVL 1

Accepted Solution

by:
Sheldonh earned 150 total points
ID: 11691748
Yes

You would use Symantec Ghost to do this. You could definitely do a disk to disk clone, shouldn't be any problems there, but that would be the simple, yet long solution. Once you have cloned one, two, three disks etc. just use those newly cloned disks to clone all the others, before you know it you will be done.

If you want to use GhostCast and clone over the network then it could be easier, but you would need a GhostCast server running, it must have the clone image on it to distribute to the other machines and then the cloning might take long depending on your network speed. The only not so nice thing is the setting up of the whole server and client thing.

I normally just do a disk to disk...
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question