Solved

How Do I Add a Product Key to an RIS Image?

Posted on 2004-09-02
6
270 Views
Last Modified: 2008-03-17
How can I add my XP Pro Corporate key to my RIS image so that it won't prompt the user for it when installing? I have added a lot of other unattended features, but I can't get the product key to work. Let me know if you need any more information.
0
Comment
Question by:Grime121
  • 3
  • 3
6 Comments
 
LVL 23

Accepted Solution

by:
rhandels earned 500 total points
ID: 11970600
Hi,

Go to the cd image or riprep image dir and add this option to the .sif file, that should do the trick..

[UserData]

ProductID = "F7HX9-FP3F6-2VCBR-6487B-62DQD"
0
 
LVL 1

Author Comment

by:Grime121
ID: 11972249
Ah, I had ProductKey = "ABCDE......" under the [GUIUnattended] :). I was close.....
0
 
LVL 1

Author Comment

by:Grime121
ID: 11983299
Hmmm.. that didn't work....
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 23

Expert Comment

by:rhandels
ID: 11983488
Hi,

This should be working, i also got it working using that key above. Only thing is that you need to add this rule to every .sif file you have. So if you created more than one image, you need to add, change this in every .sif file that is related to that image..
0
 
LVL 1

Author Comment

by:Grime121
ID: 11983631
Only one image. It's Win XP Pro Corporate w/ SP2 slipstreamed. I added it to the answer file in both the i386\ and the i386\templates\ folders. Still no worky. You want me to post my answer file?
0
 
LVL 23

Expert Comment

by:rhandels
ID: 11983715
Hi,

Yes please do. Also try to add all values to the User Data section...
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Preface Having the need * to contact many different companies with different infrastructures * do remote maintenance in their network required us to implement a more flexible routing solution. As RAS, PPTP, L2TP and VPN Client connections are no…
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now