Solved

WDS deploy XP

Posted on 2009-07-01
3
1,596 Views
Last Modified: 2012-05-07
Hi there,

we have installed WDS on our server 2003 standard edition (running in mixed mode with RIS)

we have managed to create a boot wim and a capture wim and successfully taken an image of 1 pc.

when we try and deploy the image back to the same pc that we imaged, we get an error saying that no images are available. but if we manually use the imagex command the image applies fine.

we've done loads of surfing and don't believe it to be a HAL issue as its deploying to the same pc that was imaged? we have turned on architecture discovery and that reveals that the HW is x64 (but the image was x86 - is this the problem?)

the PC is a Dell Optiplex 755 with the latest BIOS and network drivers provided (we also have a Dell 760 that refuses to even take a capture wim because of the network drivers.... anyone heard anymore on Dell's supposed driver update on this model?)

in the setupact/setuperror log we just get no images are available 0x80070002 & gle=0x00000002

any help really would be appreciated.

0
Comment
Question by:aidanjohnson
  • 2
3 Comments
 
LVL 1

Author Comment

by:aidanjohnson
ID: 24771684
we have just tried a vista image and again it says no images are available.

Its looking like their is something mis-configure in the server settings? can anybody shed anymore light please?

event ID 260, source WDSIMGSRV shows with error information 0x5 but I cant seem to find any meaningful information about this.

thanks

0
 
LVL 1

Accepted Solution

by:
aidanjohnson earned 0 total points
ID: 24812369
the remote installation share must have authenticated users as modify permission.

we were explicitly naming the user on the share for security reasons, but for some microsoft reason, this isn't acceptable!
0
 

Expert Comment

by:npdodge
ID: 25850927
This worked for me too.  I've been messing with this for the past two days and nobody seemed to have had the answer anywhere else.  Setting the Remote Installation share for the Authenticated Users to "modify" worked!
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Most of the time we are in fix when all of sudden our systems behave weirdly.  Such problems cost time and effort... so it's best to take some preventive actions so that we can avoid such issues or overcome such problems more easily. Preventive M…
If you have done a reformat of your hard drive and proceeded to do a successful Windows XP installation, you may notice that a choice between two operating systems when you start up the machine. Here is how to get rid of this: Click Start Clic…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now