Solved

Using MDT 2008 how to add computer to domain

Posted on 2009-04-03
2
612 Views
Last Modified: 2012-05-06
Started to USE MDT 2008 and having an issue with adding to the domain. Well actaully a full unatended image deployment. I have got to the stage where I can PXE boot to the image and can use the wizzard and fill in all the details. But I want this to be fully unattended and unable to find anything out adding to the domain, or should say, accurate info.

Anyone know how to at least at the computer to the domain unattended and/or a good place to find clear consise instructions on how to do an unattended install.
0
Comment
Question by:GPPSD2357
2 Comments
 
LVL 31

Expert Comment

by:merowinger
ID: 24155398
In MDT open your task sequence and click on "Edit unattend.xml" in tab OS info
Now you can specifiy your values e.g. phase 4 - unattended join
0
 
LVL 2

Accepted Solution

by:
Mike_Sundstrom earned 250 total points
ID: 24392889
I have this in my customsettings.ini and I don't have to edit all my sequences like the above example.

UserID=XXX
UserDomain=XXX
UserPassword=XXX
SkipDomainMembership=NO (Set to yes to skip the question in the wizard, but if you're going to capture an image now and then, leave it at NO)
JoinDomain=XXX

/Mike
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question