Solved

Best methods for image delivery : Ghosting about 80 PC's

Posted on 2004-08-17
11
242 Views
Last Modified: 2010-04-12
Hello All,

I will soon be in charge of the task to ghost about 80 new users desktops.  I have been charged with trying to estimate about how long this will take and what is the best method for deploying the images to the computers.

Can anyone lend some help by telling about  what they know, experiance, etc.  Thanks!
0
Comment
Question by:saidweintraub
  • 4
  • 2
  • 2
  • +3
11 Comments
 
LVL 69

Expert Comment

by:Callandor
ID: 11821154
I don't do this myself, but I have heard people use Sysprep to manage this task.
0
 
LVL 12

Expert Comment

by:Heem14
ID: 11821156
If you are deploying Windows - Check into RIS (Remote Installation Services)  - This is a microsoft service that will run on a win2k or 2k3 server - You can network boot your client PC's, create an image, and then deploy that image very easily. We've tried everything from hard drive copying to ghost and powerquest images - this is by far the most convenient method.

read more here:

http://www.microsoft.com/technet/prodtechnol/windows2000serv/deploy/depopt/remoteos.mspx
0
 

Author Comment

by:saidweintraub
ID: 11821237
All machines will be indentical and will be using Windows XP, and getting certain applications such as adobe reader, etc.

So i do not think this is a  job for RIS as I am pretty much looking to make 1 master, image it and deploy that image to all the other machines.
0
 
LVL 12

Expert Comment

by:Heem14
ID: 11821273
That is a PERFECT job for RIS. MAke one XP image the way you like it - send it back up to the RIS server, then go out and network boot your client boxes. Install the image and done. They will even be named properly in your active directory, instead of for example, ghost - where all the machines will have the same name and you'd have to go change each one manually.
0
 
LVL 7

Expert Comment

by:crazijoe
ID: 11821399
The Problem with Norton Ghost is you will need the Enterprise version and all the computers that will have the new image will have the same SID. You will have to change the SID on the cloned computers.
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 
LVL 15

Accepted Solution

by:
adamdrayer earned 500 total points
ID: 11822368
by syspreping a drive before you ghost the image you ensure that the new clones will have different SIDs... and different names.

I say use ghost.  I do it all the time with 50 network machines here.  Only problem with this is that each computer would need a bootup disk and that means creating 80 boot-up disks.  You could also create a boot-up image and use PXE to boot each machine.  Ghost also allows you to download and install the image from a commandline, so that the autoexec.bat can begin the installation without any user-intervention.

sysprep requires you to run setup manager to create sysprep.inf files to fully automate the installation, and you can create Uniqueness Databases to specify computer names if you do not want them to be random.  This can be a process in itself.

it may take you awhile to fully tweak an image... then it may take you awhile to create the right sysprep.inf... then it may take you awhile to configure the right PXE bootup, etc....

I would also recommend that you refrain from installing anything that can be installed with an .MSI file.  it will go much quicker and smoother if you keep the image barebones, and handle software installation through group policy.  Office is great to install through group policy and isn't on my Ghost Image.  But guess what?  you have to configure setup files so that you can install it through group policy with no user intervention possible.

Basically, to do it right and save you time in the future, you will proboably have to spend 1 week with just 1 computer and some software getting everything ready.  Then depending on your image size, I would recommend reserving 1-2 days for the deployment and final testing.  The downloading of the image and the mini-wizard on reboot.. depends on your collision domain and your network bandwidth, but shouldn't take more than an hour or so.  When i do 3-4 machines at a time it takes about 15 minutes for a 2GB partition.

If this is your first time and you are not familiar with PXE, RIS, Ghost, Sysprep, MSI, Group Policy, etc... then I really couldn't tell you how long it will take to do all this, but as someone who is somewhat familiar with the process, I would tell my boss about a week just to be on the safe side.  This includes creating automation files, testing, patching, syspreping, deployment, creating GPOs, UDBs, configuring of remote booting, etc...  You may need more.

This is a great way to create an image and deploy it.  It will make hardware failure and new computers a snap, not to mention upgrades and services packs if you go the GPO route for software.
0
 

Author Comment

by:saidweintraub
ID: 11822500
Great thanks so much for the info.  I myself am very excited to get started on this massive project.
0
 

Author Comment

by:saidweintraub
ID: 11824411
Can I do it by just having a switch or hub connecting all the computers to the ghost server?
0
 
LVL 15

Expert Comment

by:adamdrayer
ID: 11824453
yep
0
 

Author Comment

by:saidweintraub
ID: 11851463
Do I need to use a corporate edition of Ghost for this or can I use something like Norton ghost 2002?

Also if I do need to use the corporate ediition how does the licensing work for it, how can i determine how many licenses I will need.

Thanks
0
 

Expert Comment

by:Mkomis
ID: 13036575
You will have to get the corporate edition.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now