Solved

Can we make bootable media from windows deployment services

Posted on 2016-10-31
4
18 Views
Last Modified: 2016-11-08
I have machine which I wont want to pXE boot. So is there any way to create a bootable media USB or cd/DVD, So that I can install OS manually.
0
Comment
Question by:Dj 3094
  • 2
4 Comments
 
LVL 38

Expert Comment

by:Adam Brown
ID: 41867613
You can't do it with the WDS GUI, but you can use some of the stuff in WDS to create bootable media: http://www.eversity.nl/blog/2012/05/windows-deployment-services-how-to-create-a-bootable-deployment-iso/
0
 
LVL 56

Assisted Solution

by:Cliff Galiher
Cliff Galiher earned 500 total points
ID: 41867642
While not a direct answer to your question (it looks like Adam beat me to that anyways), it is worth nothing that *most* deployment experts do not use WDS standalone.  WDS is a back-end engine that drives SCCM or MDT.  And MDT is *free.*

One of the big benefits of MDT is that it can create a WIM file with all necessary drivers injected to get you going, and that can be easily imported into WDS and kicks off the install. So it uses WDS, but gives you a ton more flexibility.

But it *also* can optionally create a boot ISO, which also has all of the necessary drivers and files injected to kick off the MDT installation without needing PXE at all. And making a bootable DVD or USB stick with the ISO is trivial and doesn't take the hoops that the "native" WDS-only solutions require.  I'd strongly look at MDT as it'll save you a ton of headache in deployment and troubleshooting.
1
 

Accepted Solution

by:
Dj 3094 earned 0 total points
ID: 41872907
I found a solution. We can create discover image from Boot file in WDS and then we can boot it to media.
1
 

Author Closing Comment

by:Dj 3094
ID: 41878481
Fount the solution
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Recently Microsoft released a brand new function called CONCAT. It's supposed to replace its predecessor CONCATENATE. But how does it work? And what's new? In this article, we take a closer look at all of this - we even included an exercise file for…
You might have come across a situation when you have Exchange 2013 server in two different sites (Production and DR). After adding the Database copy in ECP console it displays Database copy status unknown for the DR exchange server. Issue is strange…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
This Micro Tutorial will give you a basic overview of Windows DVD Burner through its features and interface. This will be demonstrated using Windows 7 operating system.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now