Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

deploying software methods in windows

Posted on 2006-10-25
1
224 Views
Last Modified: 2010-04-26
I have some questions that are kind of all related to each other and worth of 500 pts.

1-I would like to know what 's the difference between deploying application software through GPO or SMS.

2-What is the difference between Windows Installer and msi.
3-any step by step link to upgrade w2k pro to wxp from a single point instead of upgrading to xp from each individual PCs.
4-any step by step link to install a clean wxp from a single point instead of installing the xp in individual PCs.

5-when should I use Syprep and/or riprep to install or upgrade to WXP?

thanks



0
Comment
Question by:jskfan
1 Comment
 
LVL 4

Accepted Solution

by:
Beldoran earned 500 total points
ID: 17809738
1 - Deploying software through GPO is a standard feature of a Microsoft domain. You have the ability to install and remove msi based software easily. SMS is an enterprise level version which provides greater control and logging of the installation and maintenance process.

2 - The windows installer is the client/workstation engine for managing the installation of windows based software. It is effectively a component of the operating system. A MSI is one of the types of packages that the windows installer can use to install software. The MSI contains instructions (in the form of a database) on how and where to install files and settings. It can also contain the files themselves.

3 - http://www.microsoft.com/windowsxp/pro/upgrading/default.mspx is a good place to start

4 - RIS: see no 5 below

5 - Sysprep removes specific information from a system in preparation to be imaged. It allows the system to redetect and reconfigure after the image has been restored. If you want to use RIS to image your machines you can use riprep images or even build from scratch. To build a system using RIS (remote installation services) is not that hard to do, but you would need a Domain.

Other Links
SMS - http://www.microsoft.com/smserver/support/default.mspx
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question