Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

RIS, change machine name during pre-installation

Posted on 2008-10-31
4
Medium Priority
?
347 Views
Last Modified: 2013-11-10
Installing and configuring an OS on a machine using RIS can be done using several methods. The method I want to use does not happen to be the Microsoft way. I want to get done that the machine name can be specified right after the username and password. However, when I verify if the name is used I have specified before, I find that that name is not used. Instead the naming convention specified by the RIS server is applied. There is a way to overrule the naming convention set by the RIS server, but I lost the documentation how it is done. The naming for servers can differ from the naming for workstations, these settings have to be changed on the RIS server. How do I overrule the settings specified by the RIS server? The changes have to be done mainly on the .osc and the .sif files.
Who can assist here?
0
Comment
Question by:mcp-pizza
  • 2
  • 2
4 Comments
 
LVL 8

Expert Comment

by:halejr1
ID: 24097032
MCP -- were you ever able to resolve this?
0
 

Author Comment

by:mcp-pizza
ID: 24102297
Yes, it is a matter of fact it did..
However, as stated earlier.. I do not know how it done again.
I lost the documentation..
0
 
LVL 8

Expert Comment

by:halejr1
ID: 24102311
well. glad to hear you found your solution.

Cheers!
0
 

Accepted Solution

by:
mcp-pizza earned 0 total points
ID: 24102364
Using RIS, one need to edit some files.
As stated earlier, one need to add and change some settings in files to make that happen.
Microsoft offers only some very limited options.
Editing those files will make this happen, I only do not recall what exactly has to be added or edited.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question