Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Cloning hyper-v vm guests and SID

Posted on 2014-03-20
1
Medium Priority
?
555 Views
Last Modified: 2016-11-23
I am trying to create multiple clones of a virtual machine. First of all, this machine is in production, I don't want this machine to be reset after sysprep.
Am I correct if I run sysprep on this machine to prepare for creating clones, it will wipe out SID and I have to reconfigure name and others? How can I avoid this so that even I prepare this virtual machine as a base image using sysprep, I don't want to make change any to it? Is it possible?

Another question is, I have multiple Dell Optiplex machines, same model. I often create a image of the specific model and restore to multiple machines with the same model, didn't have any problem or SID issue. The only reason I want to generate a unique SID with sysprep is because as I read  online, it's requirement( though I have't really used, no problem). My question is now, is it really matter to have same SIDs on multiple computers? If then, why I didn't get any trouble till now?
0
Comment
Question by:crcsupport
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 35

Accepted Solution

by:
Dan Craciun earned 2000 total points
ID: 39943763
Clone it once, shut it down, run sysprep on the clone, then use that syprep'ed clone as base for future clones.

As for multiple SID's, my experience has been about the same: no problems. While I do usually sysprep the images, when I forgot nothing bad happened.

Admittedly, I only run small networks (dozens, not hundreds of computers) so other people's experience might vary.

HTH,
Dan
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root …
The Windows functions GetTickCount and timeGetTime retrieve the number of milliseconds since the system was started. However, the value is stored in a DWORD, which means that it wraps around to zero every 49.7 days. This article shows how to solve t…
This Micro Tutorial will give you a introduction in two parts how to utilize Windows Live Movie Maker to its maximum editing capability. This will be demonstrated using Windows Live Movie Maker on Windows 7 operating system.
Want to learn how to record your desktop screen without having to use an outside camera. Click on this video and learn how to use the cool google extension called "Screencastify"! Step 1: Open a new google tab Step 2: Go to the left hand upper corn…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question