RIS: Automatic computer naming?

Posted on 2008-11-12
Last Modified: 2013-11-05
Hello Experts!

I'm trying to amend our RIS server install, as it has only ever been used to run a standard CD install off the network, never been configured for pre-configured images, automated installs, etc.

What I want to do, is assign computer name (C-XXX-YYY###; where XXX = company initals, YYY = department, and ### = incremental zero filled number).

Now, I can do this company wide from the "remote install" tab in the ADUC, but that would name all the computers the same name, irrelevant of department image (for example, setting the naming convention in ADUC to C-IBM-CUS%03# would get me C-IBM-CUS001, ...CUS002, ...CUS003 and so on). So setting this globally isn't really an option, as then all machines are labled as customer service.

Is there a way of tying this (and computer OU placement) at an IMAGE level rather than at server level? So that if a user who only has permission to install a Customer Services image gets name C-IBM-CUS012, but a Warehouse guy installing the Warehouse image gets C-IBM-WHS034?

Can this be done in the SIF file? Or elsewhere?

Question by:paradigital
    LVL 1

    Author Comment

    Well, this place is worth the membership fee.
    Guess I won't continue after the trial then...
    LVL 51

    Expert Comment

    No, there isn't a method via RIS/WDS that can differentiate machines like that.

    You'd have to rely on a script to do this and it can be quite complicated if you start using WMI.  Your IT could add an asset tag in the BIOS that could be read by a script and a computer name built from the result, but that's something that could be accomplished after the image is installed and mini-setup is finished.

    LVL 1

    Accepted Solution

    In the end I decided the easiest way was to generate the computer name from the user name, and create a user (C-XXX-YYY) for each department.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Numerous times I have been asked this questions that what is it that makes my machine log on so slow, there have been cases where computers took 23 minute exactly after taking password and getting to the desktop. Interesting thing was the fact th…
    Many of us need to configure DHCP server(s) in their environment. We can do that simply via DHCP console on server or using MMC snap-in on each computer with Administrative Tools installed in a network. But what if we have to configure many DHCP ser…
    Need more eyes on your posted question? Go ahead and follow the quick steps in this video to learn how to Request Attention to your question. *Log into your Experts Exchange account *Find the question you want to Request Attention for *Go to the e…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now