Solved

How can i use ghost images(.gho+.ghs files) in the modern process i.e. WDS and MDT

Posted on 2010-08-23
4
1,998 Views
Last Modified: 2013-12-02
Hi,
   We earlier used to reimage our systems using .gho image files. Now we have a WDS + MDT 2010 setup in place. Can we use our older ghost images(WIN XP) in our new environement? If yes, then how? Is there a way to convert (.gho+.ghs) files into a .wim file? How should i go ahead to boot the client systems? Can i create a single .iso file which would take me through the entire OS installation as is done using an OS media when we download it?
   Please suggest how should i go ahead to reimage our new systems?

Regards
Ravi
0
Comment
Question by:raviexchange
  • 2
  • 2
4 Comments
 
LVL 9

Expert Comment

by:Tomas Valenta
ID: 33498791
Look  in  ID:21430447 - there is no way to convert it.
Create a new images from your new deployment environment.
0
 

Author Comment

by:raviexchange
ID: 33498801
ok Tominov,
   So does that mean i need to reimage my reference computer using the older image and then recapture it through my WDS server after syspreping? So that i get a new .wim file for deploying ?

--Ravi
0
 
LVL 9

Accepted Solution

by:
Tomas Valenta earned 125 total points
ID: 33498900
Yes, If you need old image - then you must do it.
0
 

Author Closing Comment

by:raviexchange
ID: 33499119
thanks Tominov...
   Will try that.....

-- Ravi
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question