Solved

Problem with ghost 2003

Posted on 2004-08-13
4
285 Views
Last Modified: 2010-04-11
We have just purchased gosht 2003 for our w2k3 environment with all client on xp pro.

we are trying to create an image ussing the file share.

i have created the boot disk, the proc find all nicks and but when it comes time to validate the user and password it tells me that it could not be validated and I will nto have access to some network assets.

can any one tell me what is going on?

I am loging as the domain admin on the box and using that account for the ghost disK.

thanks in advance.
0
Comment
Question by:jriver12
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 5

Expert Comment

by:fmonroy
ID: 11795307
the default domain naming schema at w2k3 is like the dns dotted notation. be sure to using the netbios domain name
0
 
LVL 7

Expert Comment

by:crazijoe
ID: 11795614
Is this an Enterprise version of Ghost 2003?
0
 

Author Comment

by:jriver12
ID: 11809316
no it is just a standard version.
0
 
LVL 7

Accepted Solution

by:
crazijoe earned 500 total points
ID: 11809488
We have had problems with using a standard version of ghost over an AD network. On a couple of machines I didn't have a problem ghosting from a shared folder. But on a majority of the machines it would fail. The failure rate was to much so we went out and bought an Enterprise version and never had a problem since.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses
Course of the Month5 days, 13 hours left to enroll

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question