Solved

How can i use ghost images(.gho+.ghs files) in the modern process i.e. WDS and MDT

Posted on 2010-08-23
4
1,980 Views
Last Modified: 2013-12-02
Hi,
   We earlier used to reimage our systems using .gho image files. Now we have a WDS + MDT 2010 setup in place. Can we use our older ghost images(WIN XP) in our new environement? If yes, then how? Is there a way to convert (.gho+.ghs) files into a .wim file? How should i go ahead to boot the client systems? Can i create a single .iso file which would take me through the entire OS installation as is done using an OS media when we download it?
   Please suggest how should i go ahead to reimage our new systems?

Regards
Ravi
0
Comment
Question by:raviexchange
  • 2
  • 2
4 Comments
 
LVL 9

Expert Comment

by:Tomas Valenta
Comment Utility
Look  in  ID:21430447 - there is no way to convert it.
Create a new images from your new deployment environment.
0
 

Author Comment

by:raviexchange
Comment Utility
ok Tominov,
   So does that mean i need to reimage my reference computer using the older image and then recapture it through my WDS server after syspreping? So that i get a new .wim file for deploying ?

--Ravi
0
 
LVL 9

Accepted Solution

by:
Tomas Valenta earned 125 total points
Comment Utility
Yes, If you need old image - then you must do it.
0
 

Author Closing Comment

by:raviexchange
Comment Utility
thanks Tominov...
   Will try that.....

-- Ravi
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
vSphere client error 503 5 72
Robocopy Question 5 62
Barracuda Bsckup Server 690 6 66
how to run a TSM script twice a day? 9 36
VM backups can be lost due to a number of reasons: accidental backup deletion, backup file corruption, disk failure, lost or stolen hardware, malicious attack, or due to some other undesired and unpredicted event. Thus, having more than one copy of …
Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now