Solved

SnapDeploy vs Ghost vs MDT/WDS

Posted on 2011-02-18
2
3,474 Views
Last Modified: 2016-10-27
I've got to roll out an imaging solution, mainly for desktops/laptops, for a medium sized enterprise .. ~150 - 200 systems.

Currently they're using WDS on Win2k3, but its busted, and has some problems. I've personally used Ghost and Acronis (for servers and laptops) more in the past, and have no experience w/ WDS, or MDT for that matter.

I wanted to ping the EE community and see if anyone has any substantial experience with the 3, and/or more importantly can make a good case why Acronis/Ghost is a far superior solution than WDS/MDT.

Anyone?
0
Comment
Question by:kapshure
2 Comments
 
LVL 6

Accepted Solution

by:
Kody-Burg earned 250 total points
ID: 34944273
Hello,

I personally use Windows Server 2008 to deploy machines using WDS/MDT 2010. It's pretty simple to setup once you have the MDT and the AIK downloaded. It'll take about an hour to configure. The benefits are awesome too. You can use the MDT wizard to backup user profiles. Then, when you finish the installation process, it will automatically put the user profile(s) back on the machine. Using MDT/WDS together also allows you to automatically join the domain and install all needed apps. If you use MDT/WDS together, you avoid activation issues. If you are just using WDS to capture and deploy, you will run into activation issues if you deploy and capture an image more than 3 times.

Here is a link to some info to help you setup MDT:

http://www.scribd.com/doc/34545158/MDT-2010-Setup-Step-by-Step

Here is a link to help you setup WDS:

http://technet.microsoft.com/en-us/library/cc771670(WS.10).aspx

Hope this helps,

Kody
0
 

Author Comment

by:kapshure
ID: 34946807
@Kody

nice!! that's pretty sweet. that will certainly save our Helpdesk group some time. thanks a ton for the info.

anyone else?
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every computer eventually fails. When that happens, your valuable data is only as safe as your current backup.
Three simple tips to quickly and efficiently back up and protect the contents of your PC and Mac®.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This Micro Tutorial will teach you the basics of configuring your computer to improve its speed. It will also teach you how to disable programs that are running in the background simultaneously. This will be demonstrated using Windows 7 operating…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question