[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

unattended install with WDS2012

Posted on 2013-10-29
3
Medium Priority
?
278 Views
Last Modified: 2013-11-06
Hi Experts,

I have set up a server for deployment.
With the basic tasks it is working fine.
I have running two scripts.

But now I want to know which features are the best and necessary to deploy ?
What kind of tips you have for this ?

Is it possible to deploy a special computer name in a range ?
0
Comment
Question by:Eprs_Admin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 

Author Comment

by:Eprs_Admin
ID: 39608063
is it also possible to join the Domain Users to the local Administrators Group within the unattended install ?
0
 

Author Comment

by:Eprs_Admin
ID: 39608145
can I also deploy images with MDT ?
0
 
LVL 24

Accepted Solution

by:
Sandeshdubey earned 2000 total points
ID: 39609935
You can create answer file using windows AIK which will add machine to domain and later create gpo to add domain user to local admin group

Once the machine is join to domain you can add users to local admin group by restricted group GPO.Ensure that restricted group policy is configured correctly else it will not only add required members to local Administratiors, but it will remove any members that were in local Admins previously.You need to select the bottom box under "This Group is a member of," so it won't wipe out current members on all machines.http://www.frickelsoft.net/blog/?p=13

Alternately you can add users/groups to local admin by script.
NET localgroup Administrators /add "domain_name\domain_Userid"
NET localgroup Administrators /add "domain_name\domain_group
0

Featured Post

Learn Veeam advantages over legacy backup

Every day, more and more legacy backup customers switch to Veeam. Technologies designed for the client-server era cannot restore any IT service running in the hybrid cloud within seconds. Learn top Veeam advantages over legacy backup and get Veeam for the price of your renewal

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
In this Micro Tutorial viewers will learn how to restore their server from Bare Metal Backup image created with Windows Server Backup feature. As an example Windows 2012R2 is used.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question