Professional Documents
Culture Documents
100-002493-A
COURSE DEVELOPERS Copyright © 2008 Symantec Corporation. All rights reserved. Symantec,
Ken Baldwin the Symantec Logo, and VERITAS are trademarks or registered
Tom Salmond trademarks of Symantec Corporation or its affiliates in the U.S. and other
countries. Other names may be trademarks of their respective owners.
THIS PUBLICATION IS PROVIDED "AS IS" AND ALL EXPRESS OR
IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
LEAD SUBJECT MATTER
INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY,
EXPERT FITNESS FOR A PARTICULAR PURPOSE OR NON-
Renee McHugh INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT
THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY
INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE
FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN
CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE
OF THIS PUBLICATION. THE INFORMATION CONTAINED
TECHNICAL HEREIN IS SUBJECT TO CHANGE WITHOUT NOTICE.
CONTRIBUTORS AND
No part of the contents of this book may be reproduced or transmitted in
REVIEWERS
any form or by any means without the written permission of the publisher.
Renee McHugh
Casey Johnson Symantec Ghost Solution Suite 2.5 Administration
Jim Morrison Symantec Corporation
Hugo Parra 20330 Stevens Creek Blvd.
Krishantha Jayaratne Cupertino, CA 95014
Greg Haldeman http://www.symantec.com
Ray Cotrell
Table of Contents
Course Introduction
Course Introduction........................................................................................... Intro-3
Course Objectives............................................................................................. Intro-5
Intended Audience ............................................................................................ Intro-7
Course Materials ............................................................................................... Intro-8
VMware Environment........................................................................................ Intro-9
Virtual Machine Configuration ......................................................................... Intro-10
Introduction Lab: The VMware Lab Environment............................................ Intro-11
Lesson 11: Integrating and Configuring Windows Desktop Computers in the Ghost
Console
Purpose of the Ghost Console .............................................................................. 11-3
Preparing for Client Integration ............................................................................. 11-6
Installing the Console Client................................................................................ 11-10
Setting Global Properties for Managed Clients ................................................... 11-12
Grouping Clients in the Ghost Console............................................................... 11-16
Creating Tasks in the Ghost Console ................................................................. 11-19
Populating the Ghost Console with Client Information........................................ 11-22
Lesson 12: Using the Ghost Console to Create and Restore Images
Overview of Imaging Tasks................................................................................... 12-3
Configuring the Ghost Console to Use the Image Repository .............................. 12-4
Building and Running an Image Create Task ....................................................... 12-6
Building and Running a DeployAnywhere Clone Task.......................................... 12-8
Table of Contents v
Copyright © 2008 Symantec Corporation. All rights reserved.
vi Symantec Ghost Solution Suite 2.5 Administration
Copyright © 2008 Symantec Corporation. All rights reserved.
Course Introduction
Intro–2 Symantec Ghost Solution Suite 2.5 Administration
Copyright © 2008 Symantec Corporation. All rights reserved.
Course Introduction
• Lesson 1: Computer Lifecycle Managem ent and
Sym antec Products
• Lesson 2: Ghost Solution Suite Product Overview
• Lesson 3: Installing Ghost Solution Suite
• Lesson 4: Creating Boot Packages
• Lesson 5: Using Boot Packages
• Lesson 6: Creating and Restoring Images
• Lesson 7: Creating and Restoring Master Images
• Lesson 8: Deploying Images
• Lesson 9: Automating the Creation and
Restoration of Images
• Lesson 10: Creating AutoInstall Packages to
Autom ate Post-Deployment Customizations
• Lesson 11: Integrating and Configuring Windows
Desktop Computers in the Ghost Console
Course Introduction
The lessons in this course are designed to build your knowledge of Symantec
Ghost Solution Suite, enabling you to deploy systems across your network and
maintain client computers effectively and efficiently. The following lessons are
included in this course:
• Lesson 1: Computer Lifecycle Management and Symantec Products
• Lesson 2: Ghost Solution Suite Product Overview
• Lesson 3: Installing Ghost Solution Suite
• Lesson 4: Creating Boot Packages
• Lesson 5: Using Boot Packages
• Lesson 6: Creating and Restoring Images
• Lesson 7: Creating a Master Image File
• Lesson 8: Deploying Images
• Lesson 9: Automating the Creation and Restoration of Images
• Lesson 10: Creating AutoInstall Packages to Automate Post-Deployment
Customizations
• Lesson 11: Integrating and Configuring Windows Desktop Computers in the
Ghost Console
• Lesson 12: Using the Ghost Console to Create and Restore Images
• Lesson 13: Using the Ghost Console to Migrate OS-Based User Profiles
• Lesson 14: Using the Ghost Console to Perform Post-Deployment
Customizations
• Lesson 15: Using Client Inventory Reports in the Ghost Console
• Lesson 16: Preparing to Remove a Computer from Production
Course Objectives
This course includes practical exercises that enable you to test your new skills and
begin to transfer them into your working environment. By the end of this course,
you should be able to:
• Discuss the importance of managing the computer lifecycle and how Symantec
products can help with this task.
• Install the Ghost Solution Suite components.
• Use Ghost Solution Suite to create boot packages.
• Use boot packages to load a preOS environment and perform imaging tasks.
• Manually create and restore images using the preOS graphical user interfaces
for both Ghost and DeployCenter.
• Create a master image file you can use to deploy systems across a network.
• Use the multicasting technologies included in Ghost Solution Suite to deploy
images to systems across a network.
• Use Ghost’s command line interface and DeployCenter’s scripting language to
automate the creation and restoration of images.
Intended Audience
This course is for network and system administrators, IT managers, IT support
personnel, and other network operations staff who are responsible for:
• Deploying new computers across their organizations
• Managing ongoing software and hardware configuration tasks for computers
• Retiring obsolete computers
on b
ss La e
Le i de id
Gu Gu
Course Materials
At the beginning of the course, your instructor should provide you with the
following course materials:
• A lesson guide
• A lab guide
• A computer that has been configured for the lab exercises you will perform in
this class.
VMware Environment
You will complete the hands-on lab exercises in this course using VMware
Workstation.
VMware Workstation is virtual machine software for Intel x86-compatible
computers. VMware Workstation allows you to set up multiple x86 virtual
computers and to use one or more of these virtual machines simultaneously with
the hosting operating system. Each virtual machine instance can execute its own
guest operating system, such as Windows and Linux. In simple terms, VMware
Workstation allows one physical machine to run two or more operating systems
simultaneously.
To begin a VMware lab:
1 Start the virtual machine (or machines) you will be using for the lab.
If a lab instructs you to start multiple virtual machines, a good practice is to
start one virtual machine at a time and wait until the Windows login prompt is
displayed before starting up the next virtual machine. Attempting to load
multiple virtual machines simultaneously puts a heavy load on system
resources and considerably slows the loading process.
2 Mount any ISO images (virtual CDs) associated with the lab.
Some labs require you to access a product CD or other CD-based software. In
such cases, you will be directed to mount ISO image files to the CD drive of
your virtual machines. Once mounted, these files behave exactly as if they
were physical CDs, enabling you to browse the virtual CD drive inside the
virtual machine, install software, and so on. Instructions for mounting ISOs as
virtual CDs in VMware are included in the lab exercises.
3 Use Ctrl+Alt+Insert to bring up the Windows login prompt.
1
Overview of Computer Lifecycle Management
The term “computer lifecycle management” refers to the management of computer
assets from the time a business receives a new computer and prepares the
computer for employee use, until the computer is decommissioned from its
original role and either disposed of or repurposed.
There are numerous stages in the computer lifecycle, and these stages may vary
from company to company, depending on business needs. In most cases, however,
these stages can be categorized as follows:
• Asset identification: Accounting for and reconciling real IT assets with
physical locations, cost centers, and users within an organization
• Contract management: Keeping track of which licenses the business owns and
when leases and license agreements are set to expire
• Deployment and configuration: Creating OS images and deploying these
images to new computers or to computers that are being migrated to a new OS
• Application distribution: Creating and distributing application installation
packages to deliver corporate software or department-specific software to
employees
• Vulnerability and compliance: Ensuring that computers are protected from
system and network threats such as viruses, malware, unauthorized intrusion,
and data theft
• Patch management: Managing and delivering OS and application fixes and
updates across an organization
• System continuity: Ensuring system availability by regularly creating backups
to quickly recover from data loss or OS failure
1
• Asset • Deployment and • Ongoing Transition and
identification configuration distribution of migration
• Contract • Initial corporate-wide
management distribution of and department-
standard specific
corporate applications
applications • Vulnerability and
com pliance
• Patch
m anagement
• System continuity
• Monitor and track
• Problem
resolution
1
• File-based and sector-based
imaging for Windows and Linux
deployment and m igration
Symantec Ghost • Software distribution
Solution Suite • PC “personality” migration (user
provides small data, settings, and profiles)
businesses with: • Hardware and software inventory
• Secure system retirement
Note: Symantec Ghost Solution Suite should not be confused with Norton Ghost,
another Symantec imaging product. Norton Ghost is a consumer product designed
primarily for backing up home or small office computers, while Symantec Ghost
Solution Suite is a system deployment solution for business, with capabilities for
centralized management and unattended deployment of images across a network.
1
• Provides a centralized, unified
configuration management database
(CMDB) and asset repository
• Integrates help desk management and
asset management functions
Altiris Service and • Em powers the help desk to quickly
Asset Management resolve incidents
Suite: • Creates a baseline for security audits
• Enforces corporate standards
• Provides a foundation for
configuration management activities
(OS and user m igration, deployment
and provisioning, software packaging,
and so on)
1
• Captures backups of the entire live
Windows system
Symantec Backup • Provides rapid, reliable recovery —
Exec System even to dissimilar hardware and
virtual environments
Recovery:
• Provides centralized management
capabilities to simplify
administration
1
• Discovers com puters that attem pt to
access the network
• Determines if computers are
compliant with security policies
Symantec Network
• Quarantines, remediates, or gives
Ac cess Control:
limited network access to non-
compliant computers
• Monitors connected computers to
ensure ongoing com pliance
Procurement
• Altiris Client Management Suite (asset identification and contract
management)
Deployment
• Ghost Solution Suite (deployment and configuration for small businesses)
• Altiris Client Management Suite (deployment and configuration for medium to
large businesses)
Management
• Ghost Solution Suite (application distribution and monitoring and tracking
functionality for small businesses)
• Altiris Client Management Suite (application distribution, patch management,
and monitoring and tracking functionality for medium to large businesses)
• Altiris Service and Asset Management Suite (problem resolution)
• Symantec Backup Exec (system continuity)
• Symantec Backup Exec System Recovery (system continuity)
• Symantec Endpoint Protection (vulnerability and compliance)
• Symantec Network Access Control (vulnerability and compliance)
Key Points
In this lesson, you learned about:
– The definition of “computer lifecycle management”
– The various stages of the computer lifecycle
– Symantec products that address the needs of computer lifecycle
management
– The specific stages of the computer lifecycle that Symantec
products address
2
• Software distribution
• Hardware and software inventory
• Secure system retirement
2
(guideline for erasing magnetic media to guarantee all data previously
contained is permanently deleted) for hard disk drive wiping.
– Implement best practices that meet the highest industry standards.
2
Symantec Ghost DeployCenter
Deploy Toolkit
Ghost
Ghost Ghost Standard
Console AutoInstall Tools
Ghost Components
Ghost Console
The Ghost Console is a Windows server-based application for remote management
of computers. Using the Ghost Console, IT managers can group managed
computers and deploy tasks to them.
Ghost AutoInstall
Ghost AutoInstall has two components, AI Builder and AI Snapshot, that let you
create and customize application packages. You can use the Ghost Console to
deploy AutoInstall packages to computers.
2
Ghost for Linux
The Ghost executable for Linux (ghost) runs natively in Linux and is identical in
appearance and imaging capabilities to the Ghost executable for DOS.
Ghost for Windows
Ghost32.exe is a 32-bit version of Ghost.exe that runs on 32-bit versions of
Microsoft Windows Vista/XP/PE/2000.
Ghost64.exe is a 64-bit version of Ghost.exe that runs on 64-bit versions of
Microsoft Windows Vista/XP/PE.
Using Ghost32.exe or Ghost64.exe, you can create image files on hard
drives that are accessible from these operating systems, and communicate with the
GhostCast Server.
Note: To create an image file of the boot drive using the Ghost Windows
executables, you must run Ghost in Windows PE.
GDisk
GDisk is a complete replacement for the FDISK and FORMAT utilities that
enables:
• FAT and NTFS file system formatting
• Batch mode operation
• Hiding and unhiding of partitions
• Secure disk wiping to U.S. DoD requirements
• Extensive partition reporting
Unlike FDISK, which uses interactive menus and prompts, GDisk is command-
line driven and offers faster configuration of a disk’s partitions.
Version Description
GDisk.exe Runs in DOS
GDisk32.exe Runs from the command line in 32-bit Windows
GDisk64.exe Runs from the command line in 64-bit Windows
gdisk Runs in Linux
Ghost Walker
Ghost Walker assigns statistically unique security identifiers (SIDs) to restored
Microsoft Windows Vista/XP/2000/NT workstations. The SID is an important part
of the Windows Vista/XP/2000/NT security architecture because it provides a
unique identifier when a computer is networked.
The following table lists the Ghost Walker versions that are available:
Version Description
ghstwalk.exe Runs in DOS
GhWalk32.exe Runs from the command line in 32-bit Windows
Ghost Explorer
Ghost Explorer lists all of the files and directories within image files. On FAT,
NTFS, and Linux file systems, you can also use Ghost Explorer to add individual
directories and files to image files, as well as recover and delete directories and
files from image files.
Ghost Boot Wizard
The Ghost Boot Wizard enables you to create boot packages. A boot package can
be a boot disk, a Ghost image file, an ISO image, or a Preboot eXecution
Environment (PXE) image. Boot packages are used for cloning jobs, from creating
a simple boot disk for GhostCasting to providing a boot image for use with PXE
applications such as DynamicAccess boot services from 3Com or Microsoft
Remote Installation Service. The Ghost Boot Wizard guides you to the drivers
needed to create a boot package.
GhostCast Server
The GhostCast Server lets you deliver an image file to multiple computers
simultaneously through a single IP multicast transmission. A multicast
transmission can minimize the impact on network traffic. The GhostCast Server
sends and receives images to or from one or more computers. This method of
delivery usually is faster than accessing a mapped network drive.
Version Description
GhConfig.exe Runs in DOS
2
GhConfig32.exe Runs in 32-bit WinPE
GhConfig64.exe Runs in 64-bit WinPE
ghconfig Runs in Linux
GhRegEdit
GhRegEdit is a utility for editing the Windows registry.
The following table lists the GhRegEdit versions that are available:
Version Description
GhRegEdt.exe Runs in DOS
GhRegEdit32.exe Runs from the command line in 32-bit Windows
GhRegEdit64.exe Runs from the command line in 64-bit Windows
ghregedit Runs in Linux
OmniFS
OmniFS is a general-purpose utility for manipulating files and directories in a
locally attached NTFS or FAT file system (including FAT hidden partitions).
The following table lists the OmniFS versions that are available:
Version Description
OmniFS.exe Runs in DOS
OmniFS32.exe Runs from the command line in 32-bit Windows
OmniFS64.exe Runs from the command line in 64-bit Windows
omnifs Runs in Linux
Symantec DeployCenter
2
PQAccess
Boot Unicasting ImageExplorer VBE
Disk PQIDeploy
Builder PQA
PQDisk
PQIExtract
PQQuery
DeployCenter Components
PowerCasting
PowerCasting enables you to deploy an image to multiple computers
simultaneously. There are executables for DOS and Windows PowerCast servers
and a DOS PowerCast client.
Unicasting
Similar to PowerCasting, you can use Unicasting to connect workstations to a
server to create and deploy images. Unicasting differs from PowerCasting,
however, in that Unicasting uses a point-to-point transport connection and a
specific IP address on both the server and client sides instead of sending data using
a multicast (limited broadcast) IP address.
ImageExplorer
With ImageExplorer, you can copy image files, copy partitions within image files,
compress/uncompress partitions, and restore individual files from images.
VF Editor
VF Editor is based on WinImage technology. This tool enables you to easily open
and edit the contents of existing virtual floppies, create new virtual floppies, and
convert existing floppy diskettes into virtual floppies.
Virtual floppy technology, a patent-pending technology from Symantec, enables
you to boot any computer into DOS mode and execute tasks. Virtual floppy
technology is unique because it enables you to create an image of a physical boot
floppy and use that image to boot computers remotely. In addition, virtual floppy
technology operates independently of physical hard disk partitions and file
systems.
2
DOS environments when NTFS partitions (the primary partition type used by
Windows XP and Windows 2000 Server) are not visible and cannot be
accessed.
• PQIDeploy PQIDeploy.exe is a scripting-based Win32 version of ImageCenter
(included in the Deploy Toolkit) that runs on Microsoft Windows Vista/XP/PE/
2000. Using PQIDeploy.exe, you can create image files on hard drives that are
accessible from Windows Vista/XP/PE/2000, as well as perform a wide variety
of system management tasks such as partition manipulation, registry access
and manipulation, Sysprep and .inf file access and customization, messaging,
disk and partition queries, file system access, and so on.
• PQDisk is a scriptable version of Norton™ PartitionMagic®. PQDisk is
intended for use by PC configuration centers and corporations that need to
configure large numbers of PCs. It uses ASCII text script files to specify
operations that create and manipulate hard disk partitions.
• PQQuery is a DOS command line program that returns disk and partition
information in environment variables. PQQuery enables batch files or imaging
scripts to test environment variables and perform different actions depending
on the returned values.
• VBE (Virtual Boot Environment) enables any Windows-based computer to
reboot into DOS mode without using a floppy disk, CD-ROM, or any other
external or removable boot device. VBE is of great value to manufacturing
environments that use the DOS operating system in their PC manufacturing
and testing processes. VBE is also valuable to IS technicians that use DOS-
based imaging utilities or other DOS-based tools.
• PQA is an image addendum system that enables you to modify files or
directories on a visible or hidden partition on a hard disk. You can use PQA to
replace device driver files, provide patch files, rename files, and add or delete
files and directories. You build a package of changes, then apply the package to
the computers you want to change. With PQA, you avoid the necessity of
making new image files when you want to change a few files.
• PQIExtract enables you to restore individual files or directories from within
PQI image files. PQIExtract is useful when you want to restore individual files
or reinstall the operating system, but you do not want to lose customized
settings or applications that were installed after the image file was created.
Hardware/Software Requirement
Processor Pentium III or later
Monitor VGA, 1024 x 768 screen resolution
RAM 512 MB
Operating system • Windows Server 2008
• Windows Vista Business/Enterprise/Ultimate
2
• Windows Server 2003 Standard/Enterprise SP1
• Windows Server 2003 R2 Standard/Enterprise
• Windows XP SP2
• Windows 2000 Professional/Server SP4
Other To use the Ghost Boot Wizard to modify the
WinPE PreOS environment (for exam ple, to add
updated network or storage drivers), you m ust
install Microsoft Core XML Services (MSXML) 6.0
or later.
System Requirements
Ghost Console and Standard Tools
The minimum requirements for running the Ghost Console are:
Hardware/Software Requirement
Processor Pentium III or later
Monitor VGA, 1024 x 768 screen resolution
RAM 512 MB
Operating system • Windows Server 2008
• Windows Vista (Business/Enterprise/Ultimate)
• Windows Server 2003 Standard/Enterprise SP1
• Windows Server 2003 R2 Standard/Enterprise
• Windows XP Professional SP2
• Windows 2000 Professional/Server SP4
Other To use the Ghost Boot Wizard to modify the WinPE PreOS
environment (for example, to add updated network or storage
drivers), you must install Microsoft Core XML Services
(MSXML) 6.0 or later. You can download MSXML 6.0 from:
http://www.microsoft.com/downloads/details.aspx?
FamilyId=993c0bcf-3bcf-4009-be21-27e85e1857b1
&displaylang=en
Note: Ghost has been tested with the service packs listed in the preceding table.
Before installing Ghost, make sure you install the latest service packs available
from Microsoft.
Lesson 2 Ghost Solution Suite Product Overview 2–17
Copyright © 2008 Symantec Corporation. All rights reserved.
Ghost.exe
Hardware/Software Requirement
Platform IBM PC computer or 100% compatible
Processor Pentium or later
RAM 16 MB
Monitor VGA
Operating system • PC-DOS (included with Ghost)
• MS-DOS
Pointing device Microsoft-compatible mouse recommended
Ghost Executable
Ghost.exe
You can run Ghost.exe on a computer with the following minimum
requirements:
Hardware/Software Requirement
Platform IBM PC computer or 100% compatible
Processor Pentium or later
RAM 16 MB
Monitor VGA
Operating system • PC-DOS (included with Ghost)
• MS-DOS
Pointing device Microsoft-compatible mouse recommended
2
• SuSE Linux Enterprise Server 10 • Fedora Core 6 (Zod)
• Fedora Core 5 (Bordeaux)
Note: The hardware • Red Hat Linux 9
requirements for the Linux • Ubuntu 7.10 (Gutsy Gibbon)
version of the Ghost executable • Ubuntu 7.04 (Feisty Fawn)
are the same as the
requirements for the DOS • Ubuntu 6.10 (Edgy Eft)
version of Ghost. • Ubuntu 6.06 (Dapper Drake)
• SuSE Linux Enterprise Server 10
Ghost32.exe
You can run Ghost32.exe on the following operating systems:
• Windows Vista (Business/Enterprise/Ultimate)
• Windows XP
• Windows Server 2003
• Windows 2000
• WinPE
Ghost32.exe is supported on the following WinPE versions:
– Windows XP SP2 Version 2004
– Windows 2003 SP1 Version 2005
– Windows Vista Version 2.0
Note: Ghost also includes a 64-bit executable (Ghost64.exe) that runs on 64-
bit versions of Windows XP/Vista/PE.
2
Other • Single boot system
• DOS drivers for network card (when using DOS PreOS)
• Clients running WinPE PreOS must have at least 256 MB
RAM
• Limitations for AutoInstall and incremental backups: On
x64 platforms, you can only capture 32-bit applications
• Minimum requirements for user migration: Windows Vista
(Business/ Enterprise/Ultimate)/XP/2000
Hardware/Software Requirement
Operating system Networked computer running one of the following:
• Windows Vista (Business/Enterprise/Ultimate)
• Windows XP
• Windows Server 2003
• Windows 2000
Other • Single boot system
• DOS drivers for network card (if using a DOS PreOS boot
environment)
• If you want to run WinPE as the PreOS on client
computers, the clients must have at least 256 MB RAM
• Limitations for AutoInstall and incremental backups: On
x64 platforms, you can only capture 32-bit applications;
you cannot capture 64-bit applications
• Minimum requirements for the user migration feature:
Computer with Windows Vista (Business/Enterprise/
Ultimate)/XP/2000
Hardware/Software Requirement
Operating system • Windows Vista (Business/Enterprise/Ultimate)
• Windows XP Professional
• Windows 2000
Hardware/Software Requirement
Operating system • Windows Vista (Business/Enterprise/Ultimate)
• Windows XP
• Windows 2000
Hardware/Software Requirement
Processor Pentium or later
RAM 32 MB (working with large hard disks or
partitions may require significantly m ore
memory)
Diskette drive None; 3.5-inch diskette drive recom mended
CD drive Any speed; MMC-2 compliant IDE or SCSI CD-R
2
or CD-R/W required for creating images directly
to CD
Hard disk free space 52 MB
Operating system Windows 98, Windows NT 4.0, Windows 2000,
Windows XP, Windows 2003, DOS (only
ImageCenter and DOS utilities are supported
under DOS)
Monitor VGA; SVGA recommended
Pointing device None required; Microsoft mouse recommended
DeployCenter
The minimum system requirements for all DeployCenter components are as
follows:
Hardware/Software Requirement
Processor Pentium or later
RAM 32 MB (working with large hard disks or partitions may
require significantly more memory)
Diskette drive None; 3.5-inch diskette drive recommended
CD drive Any speed; MMC-2 compliant IDE or SCSI CD-R or CD-R/
W required for creating images directly to CD
Hard disk free space 52 MB
Operating system Windows 98, Windows NT 4.0, Windows 2000, Windows
XP, Windows 2003, DOS (only ImageCenter and DOS
utilities are supported under DOS)
Monitor VGA; SVGA recommended
Pointing device None required; Microsoft mouse recommended
Hardware/Software Requirement
Processor Pentium or later
RAM 16 MB
Operating system • WinPE 2.0
• Windows XP
• Windows 2000
• Windows 98
• Windows NT 4
Monitor 16-color VGA video or better
Deploy Toolkit
The minimum system requirements for the Deploy Toolkit utilities are as follows:
Hardware/Software Requirement
Processor Pentium or later
RAM 16 MB
Operating system • WinPE 2.0
• Windows XP
• Windows 2000
• Windows 98
• Windows NT 4
Monitor 16-color VGA video or better
2
Linux ext3
ImageCenter FAT
FAT32
NTFS
Linux ext2
Linux ext3
Linux swap
• Image
A replica of the contents of an entire hard disk or a partition
• Restore (Clone)/Deploy
Restore (clone): An image is laid down on a single computer’s hard disk.
Deploy: An image is pushed out to one or more computers.
• Master Image
A hardware-independent image
• Multicasting
Deployment of a single image simultaneously to multiple computers across a
network
• PXE
Preboot eXecution Environment; a network boot technology that enables computers
to boot to a remote server and perform tasks
• WinPE
Windows Preinstallation Environment; a lightweight version of Windows Vista,
Windows XP, or Windows Server 2003 that large corporations use to deploy
workstations and servers
Image
An image (or disk image) is a replica of the contents of an entire hard disk or a
partition. This replica is stored as a file (or, if the image is split, as a series of files)
that can be used to quickly place an OS on new systems or recover crashed
systems.
Restore (Clone)/Deploy
When you restore (or clone) an image to a computer, you lay down the image’s
data on a system’s hard disk. After the process is complete and the system is
rebooted, the restored system is identical to the original system from which the
image was created. Although “deploying” a disk image to a system is basically the
same as “restoring” the image, the term “deploy” applies more specifically to the
process of pushing out an image to one or more new systems that an organization
is adding to its network.
Master Image
A master image is a disk image of a computer that has had hardware-specific
information (such as device drivers, security identifier, computer name, and so on)
removed from it. The purpose of a master image is to minimize the number of disk
images needed to quickly place an OS on new systems that have different
Multicasting
Multicasting is the generic term for sending individual packets of data to multiple
computers at the same time. In the context of Ghost Solution Suite, multicasting
refers to deploying a single image simultaneously to multiple systems across a
network. Two multicasting engines are included with Ghost Solution Suite; each
has its advantages and disadvantages, depending on your needs. Ghost’s
multicasting piece is called “Ghostcasting” and DeployCenter’s multicasting piece
2
is called “Powercasting.” The differences between these components are discussed
in Lesson 8, “Deploying Images to Systems.”
Key Points
In this lesson, you learned about:
– The two separate imaging products that compose Ghost Solution
Suite—Ghost and DeployCenter
– The functionality, key features, and components included in
Ghost Solution Suite, and where the components are installed
2
– The definitions of some imaging-related terms that are frequently
used throughout this course
1
Launch the installation wizard.
2
Accept the licensing agreements.
3
Specify installation options.
4
Complete the installation.
3
Installing Ghost
Installing the Ghost Console and Standard Tools
To install the Ghost Console on a computer, you must have administrator rights on
the computer. When you install the Ghost Console, the Standard Tools are
automatically installed.
To install the Ghost Console:
1 Launch the installation wizard.
a Insert the Ghost Solution Suite CD into the CD-ROM drive, and when the
Ghost Solution Suite installation window appears, click Install Symantec
Ghost.
b Click Install Ghost Console and Ghost Standard Tools.
c At the installation wizard’s welcome screen, click Next.
2 Accept the licensing agreements.
a Accept the terms of the Symantec Software License Agreement, then click
Next.
b Accept the terms of the Thinstation License Agreement for Ghost’s Linux-
based PreOS environment, then click Next.
c Read and confirm that you understand the additional licensing information,
then click Next.
3 Specify installation options.
a At the User Information screen, verify that the user and organization names
are correct, then click Next.
3
Activating Ghost
Ghost is activated by a license. Before you can activate Ghost, you need the
following:
• A license certificate
The license certificate includes the serial number for your license. You must
register your serial number online to obtain a license file and to register your
maintenance agreement.
• A license file
The license file includes the license key that is required to activate the product.
For more information, see the instructions on your license certificate.
To obtain a license file, you must have the serial number that is printed on your
license certificate. The format of the serial number is a letter that is followed by 10
digits.
For example:
F8573329133
Symantec sends you the file by e-mail as a .zip file attachment. You should
ensure that your e-mail program is configured to allow incoming .zip file
attachments.
Note: License files are digitally signed. You should not attempt to modify the
license file.
3
Adding a License File
You must add the license file in the Ghost Console to activate Ghost. If you
purchase additional licenses, you receive an additional license file. You must add
this license file through the Ghost Console.
To add a license file:
1 In the Ghost Console, select Help —> Register Console.
2 In the Ghost Registration window, click Browse.
3 In the Open dialog box, browse to and open the license file (.slf) that you want
to import, then click OK.
1
Launch the installation wizard.
2
Enter user name and company nam e.
3
Accept the license agreement.
4
Select installation options.
5
Complete the installation.
Installing DeployCenter
To install DeployCenter:
1 Launch the installation wizard.
a Insert the Ghost Solution Suite CD into the CD-ROM drive, and when the
Ghost Solution Suite installation window appears, click Install Tools and
Utilities.
b Click Install DeployCenter.
c At the installation wizard’s welcome screen, click Next.
2 Make sure the User Name and Company Name fields contain the correct
information, then click Next.
3 At the License Agreement screen, click Yes.
4 Select installation options.
a At the Choose Destination Location screen, click Next to accept the default
installation folder.
b At the Select Features screen, select the features you want to install and
click Next.
c At the Select Program Folder screen, click Next.
5 Complete the installation.
a When DeployCenter is installed and the completion screen appears, click
Finish.
b If prompted, restart the system.
Image Repository
\\GSS Server\Reposit ory Share
3
Images Programs AutoInstall Boot
Packages Packages
Key Points
In this lesson, you learned how to:
– Install the Ghost Console and Standard Tools.
– Install DeployCenter
– Create an image repository for storing items your managed
clients need to access
4
To understand the need for boot packages in the computer deployment process, it
is necessary to first understand a basic fact about how Windows works. When
Windows is running, it requires constant access to the system disk to keep critical
system files updated. As a result, Windows prevents any application from having
full, unrestricted control of the system disk.
Although several modern disk imaging tools, including Ghost Solution Suite,
include “hot imaging” capabilities that work around Windows’s restrictions and
enable you to capture stable backups of live Windows systems, it is still not
possible to capture a hardware-independent master image of the system partition
while Windows is running. This is because imaging tools require full access to the
system disk so they can strip all system-specific information (hardware drivers,
security identifiers, and so on) from the operating system before the image is
captured. Consequently, a method is needed to boot computers to an operating
environment outside of Windows to capture a hardware-independent master image
for deployment purposes. This need is met by boot packages.
Boot packages are essentially boot images that contain all the individual files and
components needed to boot computers to an operating environment outside of
Windows (sometimes referred to as a “PreOS” environment) and perform any task
necessary for capturing or restoring an image—such as running Ghost or
ImageCenter, connecting to a network share where images are stored, and so forth.
Boot packages are a flexible, convenient method for providing all the pieces you
need to launch the image deployment process on your computers.
• Network
Boots a computer to a PreOS environment, loads drivers for
the computer’s network interface card, and maps a network
share
• Multicasting
Boots a computer to a PreOS environment, loads imaging
software, and connects the computer to a multicast server
• Stand-alone
Boots the local computer to a PreOS environment, runs
imaging software, and restores an image from a local hard
drive or CD
• Distributed
Boot packages are stored in a central location on the
network.
• Remote
Boot packages are integrated into a PXE server or a client
management console.
• Portable
Boot packages are placed on a bootable floppy diskette,
bootable USB device, or CD.
4
You can access and use boot packages in the following ways:
• Distributed: Boot packages are stored in a central location on the network
where they can be easily accessed and downloaded to create physical boot
disks (such as a bootable floppy or CD).
• Remote: Boot packages are integrated into a PXE server or a client
management console (such as Altiris Client Management Suite or Microsoft
SMS). Users either boot their computers to the network and select the boot
package from a network boot menu, or the client management console is used
to push out the boot package to managed clients.
• Portable: Boot packages are placed on a bootable floppy diskette, bootable
USB device, or CD. Users must insert the bootable media and manually boot
their computer.
1
Decide which type of boot package you want to create.
2
Decide how you want users to be able to use the boot package.
3
Collect all the components needed to build the boot package.
4
Use a boot package building tool to create the boot package.
Compatibility: Boot packages compatible with Compatibility: Boot packages compatible with
Ghost components (by default) and DeployCenter components only
DeployCenter components (by manually adding
components)
Can save boot packages to: Can save boot packages to:
•Floppy diskette •Floppy diskette
•VMware virtual floppy •Folder on hard drive
•USB flash driv e •Virtual boot disk
•ISO image
•CD/DVD
•One-click virtual partition
PXE support: Includes 3Com PXE Services, PXE support: Includes a PXE Server that is easy to
which is more complicated to set up and use set up and use
than DeployCenter PXE Server and is not
officially supported by Symantec
PreOS options: PC-DOS, MS-DOS, WinPE, Linux PreOS option: Caldera DOS (DR-DOS), MS-DOS
(Thinstation)
Note: For a more extensive list of differences, see the Symantec Ghost Solution Suite Lesson Guide.
4
Builders
The Ghost Solution Suite offers two different boot package building utilities—
Ghost Boot Wizard and Boot Disk Builder. Both utilities build the same basic
types of boot packages (that is, network, multicasting, and stand-alone boot
packages). However, there are a number of differences between these utilities to
consider when deciding which utility to use to build boot packages, as summarized
in the following table.
Note: Detailed procedures for creating each of these boot package types
can be found in the Sym antec Ghost Solution Suite Lesson Guide.
4
The Ghost Boot Wizard enables you to create the following types of boot
packages:
• Standard Ghost Boot Package
• Network Boot Package
• Drive Mapping Boot Package
• CD/DVD Startup Boot Package with Ghost
• Console Boot Partition
• TCP/IP Network Boot Image
• TCP/IP Network Ghost Client Boot Image
2
Select Standard Ghost Boot Disk package type.
3
Point to Ghost executable.
4
2 Click “Network Boot Package,” then click Next.
3 Select the Universal Packet Driver, then click Next.
If your hardware does not support the Universal Packet Driver, select the
option “Show all drivers” and select the driver for your NIC model, or click
Add and point the Ghost Boot Wizard to the appropriate driver.
When you select the Universal Packet Driver, information is displayed about
the options that must be enabled in the BIOS in order to use the driver. Review
this information and click OK.
4 In the Ghost.exe field, type the correct path if the executable has been moved
or you want to use a different version of Symantec Ghost.
The default path to ghost.exe appears in the Ghost.exe field.
5 In the Parameters field, type any required command-line parameters.
6 Click Next.
7 If you want to move control of USB devices from the BIOS to Ghost, enable
the option “Override BIOS USB control.”
This option is unavailable if you have previously included USB support in the
boot package.
Do not enable this option if you are creating a bootable USB device.
8 If you want to move control of FireWire devices from the BIOS to Ghost,
enable the option “Override BIOS FireWire control.”
9 Click Next.
4
7 Click Next.
8 If you want to move control of USB devices from the BIOS to Ghost, enable
the option “Override BIOS USB control.”
This option is unavailable if you have previously included USB support in the
boot package.
Do not enable this option if you are creating a bootable USB device.
9 If you want to move control of FireWire devices from the BIOS to Ghost,
enable the option “Override BIOS FireWire control.”
10 Click Next.
11 In the Client Computer Name field, type the name of the client computer.
This specifies the name of the computer after it starts from the package and
does not have to be the same name given to the computer in Windows. If you
create more than one package, a number is added to the computer name so that
the names for subsequent packages are unique.
12 In the User Name field, type the user name that the boot package will use to log
on to the network.
This user must exist on the network and have sufficient access rights to the
mapped network drive, files, and directories that you want to use.
13 In the Domain or Workgroup field, type the domain or workgroup to which the
user belongs.
14 From the Drive Letter drop-down list, select a drive letter to access a network
share through a mapped drive.
4
on CD and DVD drives that are not supported by Symantec Ghost. This kind of
package also contains the DOS system files and Ghost.exe.
To create a boot package with CD-ROM and DVD support:
1 On the first screen of the Ghost Boot Wizard, select PC-DOS or MS-DOS as
the PreOS, then click Next.
If you select MS-DOS and you are using the Ghost Boot Wizard for the first
time, you are prompted to insert an MS-DOS system disk that was formatted
on a Windows 95/98 computer. The Ghost Boot Wizard then copies the MS-
DOS system files from this disk.
2 Select “CD/DVD Startup Boot Package with Ghost,” then click Next.
3 In the Ghost.exe field, type the correct path if the executable has been moved
or you want to use a different version of Symantec Ghost.
The default path to Ghost.exe appears in the Ghost.exe field.
4 In the Parameters field, type any required command-line parameters.
5 Click Next.
4
attempting to find the multicast server. The default value of 16 lets Ghost find
the server as long as it is not more than 16 router hops away. This is sufficient
for most networks.
11 Click Next.
12 In the Image File field, specify a name for the image file and the location
where you want to save the file.
13 In the Description field, type a description for the image file.
14 Click Next.
15 Review the boot package details and click Next to create the boot package.
16 After the boot package is complete, click Finish to close the Ghost Boot
Wizard, or click Start Again to return to the main Ghost Boot Wizard window.
4
directory.
b WinPE: In the Name field, specify the name for the WinPE boot image you
are creating.
c Click Next.
13 Review the boot package details, then click Next to create the boot package.
14 After the boot package is complete, click Finish to close the Ghost Boot
Wizard, or click Start Again to return to the main Ghost Boot Wizard window.
4
creating.
c Click Next.
16 Review the boot package details, then click Next to create the boot package.
17 After the boot package is complete, click Finish to close the Ghost Boot
Wizard, or click Start Again to return to the main Ghost Boot Wizard window.
Note: Detailed procedures for creating each of these boot package types
can be found in the Sym antec Ghost Solution Suite Lesson Guide.
Run Getmslan.bat a second time to copy the Microsoft Client files to the
\BDBUILD\MS folder. After the files are copied locally, you can create TCP/IP
4
boot disks with Boot Disk Builder.
3
Specify how ImageCenter should be run.
4
e In the “Network adapter descriptive name” field, type the name of the
network adapter as you want it to appear in Boot Disk Builder’s adapter
list, and then click Next.
f If you chose to include a NetWare IPX DOS driver, browse to and select
the appropriate driver (.COM or .EXE), and then click Next.
g Browse to the network adapter’s NDIS2 DOS driver (.DOS or .EXE),
select the driver, and then click Finish.
The device is added to Boot Disk Builder’s network adapter list.
6 Perform one of the following, then click Next:
– Select “Obtain an IP address from a DHCP server” if a DHCP server is
used to assign client IP addresses.
– Select “Specify an IP address” if there is no DHCP server and you need to
use TCP/IP on the network. You must also enter a static IP address and
subnet mask.
7 Select a destination for the boot disk, then click Finish to build the boot
package. The available destinations are:
– To a floppy diskette set (for portability)
– To a network location (for distribution)
– As a virtual floppy (for remote use, such as PXE booting)
Client The Client is the workstation receiving the PowerCast session. If you
click Client, you must indicate the session name and the hard disk
number the client will use for PowerCasting.
When a client computer is booted from a PowerCast Client boot disk,
ImageCenter starts in PowerCast Client mode, connects to the
designated PowerCast session, and restores the image to the specified
hard disk. Any existing information on the client hard disk is
completely erased.
Server The Server is the computer PowerCasting the image to the client
workstations. When a PowerCast Server is booted from a PowerCast
Server boot disk, the diskette launches ImageCenter in PowerCast
Server mode, displays the server progress screen, waits for the
specified number of clients to attach, and PowerCasts the specified
image file. When it is finished, the server waits for additional clients to
attach until you click Close.
You can have the server start automatically by checking this option and
specifying a session name, image file path and filename, and autostart
client count.
4
server.
A virtual floppy disk file (.VFD) is created, which you can then place on
the PXE server. Use the Symantec PXE Configuration Utility to add the
virtual floppy to the user’s PXE boot menu.
– Select Microsoft TCP/IP, click Next, and select the Microsoft NDIS driver
you need.
5 Click Next.
6 Specify the location and any optional command-line parameters for
ImageCenter.
The Microsoft TCP/IP Boot Disk automatically boots a network workstation to
ImageCenter. Therefore, you must indicate where the ImageCenter program
files can be found.
7 Click Next.
4
Creating Standalone Boot Disks
To create standalone boot disks:
1 From the Boot Disk Builder main menu, select Standalone Boot Disks, and
then click Next.
2 Specify the location and parameters (optional) for ImageCenter, and then click
Next.
3 Select a destination for the boot disk (floppy disk, folder, or virtual boot disk
file).
4 Click Finish to build the boot package.
Key Points
In this lesson, you learned about:
– What boot packages are and what you can do with them
– The different types of boot packages you can create
– The process for building a boot package
– The main differences between the Ghost Boot Wizard and Boot
Disk Builder
– Using the Ghost Boot Wizard to create boot packages
– Using the DeployCenter Boot Disk Builder to create boot
packages
5
Physical floppy Portable; writable Very small capacity; slow; newer
diskette systems may not have a floppy
drive
VMware virtual Can be used to boot VMware Very small capacity; cannot be
floppy virtual machines to Ghost converted to physical boot
floppy
USB flash drive Very compact and portable; fast, Older computers may not
durable; large capacity; writable support bootable USB devices;
more expensive per unit than
floppy diskettes and CDs
ISO image Can be used to boot VMware Cannot be used to directly boot
virtual machines to Ghost; fast; physical machines (must be
large capacity; can be burned to burned to CD/DVD first)
physical CD/DVD media
CD/DVD-ROM Portable; larger capacity and Slower than flash memory or
faster than floppy diskettes hard drives
QuickBoot executables:
• Provide a quick and easy method for making
virtual floppies self-launching.
• Can be sent to users through e-mail, deployed
across the network, or packaged as an .MSI file.
5
is provided to run it. It is not possible to simply double-click the virtual floppy
.vfd file to make it run. Symantec has provided a quick and easy method for
making DeployCenter virtual floppies self-launching—QuickBoot executables.
Using the QuickBoot wizard in Boot Disk Builder, you can easily create an
executable file from a virtual floppy. When you double-click the QuickBoot
executable, it extracts the virtual floppy to the Windows temporary folder, writes a
pointer in the hard disk’s Master Boot Record that indicates where the virtual
floppy is stored, reboots the computer, and runs the contents of the virtual floppy.
After you create the QuickBoot executable, you can send it to users through
e-mail, deploy it across the network, or package it as an .MSI file. Users can then
run the QuickBoot executable on their computers just as they would any other
executable file. You can even use a management tool such as SMS or LANDesk to
push the QuickBoot executable out to remote machines, causing them to
automatically reboot and run the virtual floppy.
Note: Before you can build a QuickBoot executable, you must have created a
virtual boot disk using Boot Disk Builder. You cannot create a QuickBoot
executable if a virtual floppy does not exist.
5
you choose to run ImageCenter from the boot diskettes, that information is
recorded in pqdotask.bat.
Advantages:
• Supports WinPE boot images
• Supports Linux boot images
3Com Boot Services Disadvantages:
• More difficult to set up than
DeployCenter PXE
• Not officially supported by Symantec
Advantages:
• Very easy to set up
DeployCenter PXE • Fully supported by Sym antec
Server Disadvantages:
Only supports floppy (DOS) boot images
5
begin the imaging process. A PXE server is usually the best solution in such cases.
The Ghost Solution Suite includes two different versions of PXE server software:
3Com Boot Services and the DeployCenter PXE server. Following are some of the
main differences between the two versions.
In this lesson, we will discuss how to install and use 3Com Boot Services with
Ghost. A later topic in this lesson discusses how to configure and use the
DeployCenter PXE server.
5 Complete installation.
5
and Utilities.”
b Click “Install 3Com Boot Services PXE Server.”
c When the 3Com Boot Services wizard is displayed, click “Install 3Com
Boot Services.”
d At the Welcome screen, click Next.
2 To accept the licensing agreement, click Yes.
3 Select installation folders.
a To accept the default location for the 3Com Boot Services installation, at
the Choose Destination Location screen, click Next.
b To accept the default location for the TFTP boot directory
(C:\TFTPBOOT), at the Choose TFTP Boot Directory screen, click Next.
4 Select Server as the setup type and click Next.
5 Complete the installation.
a At the Select Program Folder screen, click Next.
b At the Boot Services Setup Complete screen, click Finish.
The C:\TFTPBOOT directory is created and the BOOTPTAB file is copied
to this directory.
1
In Ghost Boot Wizard, select WinPE as PreOS.
3
Accept default Ghost settings or add parameters.
4
Specify network settings.
Select
SelectStartÆProgramsÆ
StartÆProgramsÆ
3Com
3ComBoot
BootServicesÆ
ServicesÆ
TFTP
TFTP Server.
Server.
Select
SelectStartÆProgramsÆ
StartÆProgramsÆ
3Com
3ComBoot
BootServicesÆ
ServicesÆ
PXE
PXEServer.
Server.
1
Launch PXE Configuration Utility.
2
Add virtual floppy to PXE system.
3
Assign PXE client menu item to virtual floppy.
5
DeployCenter includes a PXE Configuration Utility that simplifies the setup and
use of the DeployCenter PXE service. To use this utility to configure the
DeployCenter PXE environment:
1 Launch the DeployCenter PXE Configuration Utility (Start—>Programs—
>Symantec DeployCenter—>DeployCenter Tools—>PXE Configuration
Utility).
2 Add a virtual floppy to the PXE system.
Note: Before you can add a virtual floppy to the PXE menu, you must have
created a virtual floppy using Boot Disk Builder. You cannot add a virtual
floppy if one does not exist.
a Click the PXE Virtual Floppies tab, then click Add.
b Specify the full path to the virtual floppy, including the filename, then click
OK.
The virtual floppy is now available to the PXE system. The location of
each virtual floppy you add is also specified in the list box.
Key Points
In this lesson, you learned about:
– The different ways you can use the boot packages you create
with the Ghost Solution Suite
– Using Boot Disk Builder to build a QuickBoot executable
– The different PXE versions included with Ghost Solution Suite
– Configuring 3Com Boot Services PXE in preparation for
performing remote deployments with Ghost
– Configuring DeployCenter PXE in preparation for performing
remote deployments with DeployCenter
Sector-Based Images
Both Ghost and ImageCenter can create sector-based images. With this image
type, the hard disk is copied sector by sector, sequentially.
The main advantage of this image type is that sector-based images capture a
precise copy of a hard drive. When the image is restored, all data is restored
exactly as it existed on the original drive, thus preserving all optimizations and
customizations from the original drive.
Disadvantages of this image type are:
• Since every hard drive sector is included in the image, image file sizes are
large.
• Since data is copied sequentially one sector at a time, sector-based images take
the longest to create.
• It is not possible to edit sector-based images.
File-Based Images
Ghost creates file-based images by default. With this image type, files are copied
one at a time from the hard drive to the image.
The advantages of this image type are:
• Provided that files are not heavily fragmented on the hard drive, file-based
images can be created faster than sector-based images.
• File-based images are smaller than sector-based images.
• It is easy to edit images (that is, add files to or remove files from images).
SmartSector-Based Images
ImageCenter’s default imaging mode is called “SmartSector” imaging.
SmartSector technology is a variation of sector-based imaging. It also performs a
sequential sector-by-sector copy of all data on a hard drive, but unlike normal
sector-based imaging, it skips sectors that do not contain data.
The main advantages of this image type are:
• Disk optimizations and customizations based on the location of file fragments
on a disk are preserved.
• SmartSector-based images can usually be created more quickly than either file-
based or normal sector-based images, since only used sectors are copied.
• SmartSector-based images are often much smaller than either file-based or
normal sector-based images.
Like sector-based images, the main disadvantage of this image type is that it is not
possible to edit images.
6
images.
6
Compression may affect the speed of your operation. When you select a
compression level, Ghost estimates the amount of space available for the
destination image file. If there is insufficient space, Ghost prompts you to enable
spanning of image files.
1
Boot to Ghost PreOS environment.
2
Specify source drive or partition to image.
3
Specify image file destination and name.
4
Select compression level.
5 Create image.
5 In the Proceed with partition image creation? dialog box, to proceed with the
image file creation, click Yes.
The system performs a quick integrity check of the file structure on the source
partitions, and then copies the source partitions to the destination image file. If
you need to abort the process, press Ctrl+C, but be aware that this action leaves
the destination image file in an unknown state.
If spanning is required, insert new media as prompted during the image
creation process.
6 After the image has been successfully created, verify the integrity of the image
file by selecting Local—>Check—>Image File, browsing to and selecting the
image, and clicking Yes when asked to proceed with the integrity check.
6
Browse at the Name Image File screen. You may need to set up removable
media or create boot disks to access network drives before you can create an
image.
1
Boot to ImageCenter PreOS environment.
2
Specify source to image.
3
Enter desired path and image filename.
5 Create image.
6
created, or verify disk writes, click Advanced Options.
5 To create the image file, click Finish.
If you entered a name of a current file, ImageCenter displays a message that
path and filename already exists. You can replace the existing file or
choose a new filename. If you click Replace, the existing image file is
immediately deleted.
If ImageCenter detects that you are saving your image file to a floppy drive or
removable media, it enables a media-spanning feature that spreads the image
file over a series of disks. You must have at least 128K of available space on
each disk in the series. If you use the media-spanning feature, ensure that you
number the disks in order because you must insert them in the correct sequence
when restoring the image file.
The Creating the Image dialog box is displayed.
1
Boot to Ghost PreOS environment.
2
Select image to restore.
3
Specify destination for image restore.
4 Restore image.
6
a In the Destination Drive dialog box, select the destination disk and then
click OK.
Choose carefully because this is the disk that will be overwritten.
The Destination Drive dialog box shows the details of every drive that
Ghost finds on the local computer.
b In the Destination Drive Details dialog box, confirm or change the
destination disk partition layout and click OK.
The Destination Drive Details dialog box shows a suggested partition
layout for the destination disk. By default, Ghost tries to maintain the same
size ratio between new disk partitions.
You can change the size of any target FAT, NTFS, or Linux Ext2/3 partition
by entering the new size in megabytes.
1
Boot to ImageCenter PreOS environment.
2
Enter path and filename of image file to restore.
3
Specify destination options.
5 Restore image.
6
image file. Symantec does not maintain image file passwords or have a
workaround for restoring password-protected images without the password.
You can restore an image from a hidden NTFS, FAT, or FAT32 partition by
choosing it from the Open Image File dialog box that appears when you click
Browse. A hidden NTFS partition will appear in the Drives list as
\\.\Diskn.Partm, where n is the number of the disk and m is the number of the
partition on that disk. To further identify the hidden partition, the volume label
will display, if available.
If you click Browse and select an image file, you will have an option to verify
the integrity of an image file before you attempt to restore it. Click Verify, and
ImageCenter will check to see that all of the files in the image are available for
you to open, the internal data structures in the image file match the data that is
Key Points
In this lesson, you learned about:
– The different types of images you can create with Ghost Solution
Suite
– Planning an effective imaging strategy in preparation for creating
images for deployment
– Creating an image using the Ghost PreOS GUI
– Creating an image using the ImageCenter PreOS GUI
– Restoring an image using the Ghost PreOS GUI
– Restoring an image using the ImageCenter PreOS GUI
6
environment.
•Restore an image using a PXE-based DeployCenter boot
environment.
SID duplication
When creating an
image to deploy an OS
to multiple computers, Computer name duplication
you m ust address the
issues of:
Hardware differences
any given time. This creates a problem when restoring an image to a new
system since by restoring your image, you are creating a system with a
duplicate computer name. If this issue is not addressed, the duplicated machine
will not be able to log on to the network.
• Hardware differences
When Windows is installed, it detects the devices in your system and loads
drivers for them. When you create an image of a machine, all this device
configuration information is included in the image. This becomes a concern
This lesson covers each of the preceding steps in detail, first for Windows 2000/
XP, and then for Windows Vista.
Sysprep Documentation
For Windows XP, detailed information about how to use Sysprep is contained in
7
the various .chm files in the deploy.cab file. Make sure to also refer to the
readme file for documentation updates and corrections.
Windows 2000 users should refer to the unattend.doc file for information
about using Sysprep. This document is contained in the deploy.cab file.
9 Create a folder named Sysprep on the root of the system partition (which is
usually C:\) and extract the contents of the deploy.cab file into the
Sysprep folder.
7
CAUTION If the Sysprep files are not placed in a folder on the root of the
system partition, the Sysprep answer file will not work correctly.
13 When asked which type of setup Sysprep is being used for, select Sysprep
setup.
15 Choose to fully automate the installation so that users do not have to accept
Microsoft’s End User License Agreement when the master image is restored to
their computers.
19 Enter the CD key for the operating system you have installed.
25 If desired, use the Run Once setting to specify a command that should be
executed the first time (and only the first time) the operating system boots.
Note: The Run Once setting is usually used to start an application installation
or to run an application that is already installed. An example would be starting
a migration utility to migrate previous user settings to the new operating
system.
27 In most cases, you can ignore the Identification String, since it is rarely used in
today’s computing environments, and click Finish to close the Setup Manager
wizard.
28 Save the Sysprep answer file (Sysprep.inf) to the same folder (that is, the
Sysprep folder) from which you executed the setupmgr.exe file
33 If you want to add OEM drivers to the Sysprep setup, perform the following
steps (as prescribed in Microsoft Knowledge Base article 314479):
a On the root of the volume where the %WinDir% folder is located, create a
folder structure to hold the drivers, then copy the drivers to their
appropriate subfolders.
For example, on the root of C:, create a Drivers folder. Within the Drivers
folder, create separate subfolders to hold the drivers for each hardware type
(NIC, Video, etc.).
34 Create a backup copy of the Sysprep folder on the root of the system drive.
The reason for doing this is that you should always test your Sysprep answer file
before you create a master image to make sure the Sysprep process runs successfully.
However, once Sysprep runs and applies the answer file, it automatically deletes the
Sysprep folder and all its contents. Without a backup copy, you would have to retrieve
all the Sysprep files again and create a new Sysprep answer file from scratch before
creating the master image.
36 Select Start—>Run, and enter the command line and switches needed to run Sysprep.
For example:
C:\Sysprep\Sysprep.exe -mini -reseal -quiet -reboot
The switches provide the following functionality:
-mini Tells Sysprep to use the answer file you created
-reseal Removes system-specific information from the Windows installation
-quiet Tells Sysprep to run without displaying user prompts
-reboot Tells Sysprep to reboot the system upon completion
In addition to the preceding switches, you can also use the -pnp switch to perform an
in-depth search of hardware and devices. This helps ensure that all devices will work
correctly once the image is restored. Be aware, however, that this switch causes
machines to run slowly for about 45 minutes to 2 hours while the detection process is
being performed.
There should be a slight delay while Sysprep strips information from the system, and
then the machine should automatically reboot.
If an error occurs during the Sysprep testing process, re-create and re-test the answer
file until the test is successful.
38 Copy the Sysprep folder to a centrally accessible location (for example, a network
drive) for future deployment projects.
;GuiRunOnce]
;"C:\SYSPREP\SYSPREP.EXE -clean"
[NetClients]
MS_MSClient=params.MS_MSClient
[data]
UseBIOSToBoot=1
3 Download the Windows AIK disk image for the version of Vista you are
deploying.
4 Burn the image to DVD and install Windows AIK on the computer where you
7
Note: As of July 2008, the developers of the Ghost Solution Suite 2.5 course were
unable to get Vista SP1 to successfully process a Sysprep answer file created with
the Windows AIK for Vista SP1. Consequently, Symantec recommends that you
use a pre-SP1 installation of Vista to create your answer file and your master
image, and then deploy SP1 as a software package to users’ computers.
Sysprep Documentation
You can find detailed information about how to use the Windows AIK in the
various .chm files in the \docs\chms folder on the Windows AIK DVD. You
can find Sysprep documentation in the waik.chm file under the topic
“Deployment Tools Technical Reference.” Also, refer to the readme.htm file for
documentation updates and corrections.
Additional Information
Following are some additional sources of information related to Vista deployment:
• Windows Vista Deployment Step by Step Guide
http://technet2.microsoft.com/WindowsVista/en/library/
88f80cb7-d44f-47f7-a10d-e23dd53bc3fa1033.mspx
• How Configuration Passes Work
http://technet2.microsoft.com/WindowsVista/en/library/
791eb40e-6624-4217-b913-82a02e07465d1033.mspx
• Comparing Windows XP and Windows Vista Deployment Technologies
http://technet2.microsoft.com/WindowsVista/en/library/
2957d7c4-02c7-4205-afb5-f03434d8f37d1033.mspx
• Deploying Vista with Sysprep and ImageX
http://www.svrops.com/svrops/articles/sysprepvista.htm
1 Insert the Windows Vista installation DVD, open the sources folder on the
7
DVD, and copy the file install.wim to a folder on your hard disk (for
example, C:\vista_install\install.wim).
The install.wim file is the Vista installation image. It will be used to
create a local catalog of Vista components that can be configured in the
Sysprep answer file.
4 Select the version of Windows Vista you are deploying, then click OK.
6 After the catalog file has been created, select File—>New Answer File.
An untitled answer file is added in the Answer File pane.
RunSynchronousCommand.”
b Configure the RunSynchronousCommand settings as follows:
› In the Order field, type the number 1.
This ensures that the command is run before any other commands.
› In the Path field, type:
net user administrator /active:yes
This enables Vista’s built-in administrator account.
17 Open a command prompt and enter the command line and switches needed to
perform a test run of the Sysprep answer file.
For example:
C:\Windows\system32\sysprep\sysprep.exe /oobe
/generalize /reboot /quiet
/unattend:C:\Windows\System32\sysprep\sysprep.xml
The switches provide the following functionality:
/oobe Tells Sysprep to use the answer file you created
/generalize Removes system-specific information from the Windows
installation
/reboot Tells Sysprep to reboot the system upon completion
/quiet Tells Sysprep to run without displaying user prompts
/unattend: Points Sysprep to the location of the answer file
After you run Sysprep, there is a slight delay while Sysprep strips information
from the system, and then the machine automatically reboots.
If errors occur during the Sysprep testing process, correct the problems and
retest the answer file until the test is successful.
<CustomDefaultThemeFile>C:\Windows\Resources\Themes\symantec.theme</
CustomDefaultThemeFile>
<DefaultThemesOff>false</DefaultThemesOff>
</Themes>
<ComputerName>*</ComputerName>
<CopyProfile>true</CopyProfile>
schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi="http://
www.w3.org/2001/XMLSchema-instance">
<OOBE>
<HideEULAPage>true</HideEULAPage>
<NetworkLocation>Work</NetworkLocation>
<ProtectYourPC>1</ProtectYourPC>
<SkipMachineOOBE>true</SkipMachineOOBE>
</OOBE>
<Value>UABhAHMAcwB3ADAAcgBkAEEAZABtAGkAbgBpAHMAdAByAGEAdABvAHIAUABhAHMAc
wB3AG8AcgBkAA==</Value>
<PlainText>false</PlainText>
</AdministratorPassword>
<LocalAccounts>
<LocalAccount wcm:action="add">
<Password>
<Value>UABhAHMAcwB3ADAAcgBkAFAAYQBzAHMAdwBvAHIAZAA=</Value>
<PlainText>false</PlainText>
</Password>
<Description>Required local account</Description>
<DisplayName>Local User</DisplayName>
<Group>Administrators</Group>
<Name>localuser</Name>
</LocalAccount>
</LocalAccounts>
</UserAccounts>
<RegisteredOrganization>Symantec</RegisteredOrganization>
<RegisteredOwner>Symantec Education Services</
RegisteredOwner>
</component>
</settings>
<cpi:offlineImage cpi:source="wim:c:/vista_image/install.wim#Windows
Vista ULTIMATE" xmlns:cpi="urn:schemas-microsoft-com:cpi" />
</unattend>
when you deploy the master image to the users’ computers, Sysprep
will not be able to automatically add the users’ computers to a
domain. Therefore, always make sure the machine you are using to
create the master image is not a member of a domain when you run
Sysprep.
4 The drivers for the following devices often prevent the reinstallation of Plug
and Play devices, so you must remove them from Device Manager:
– Network cards
– Modems
– USB hubs
– Audio
– Keyboard and mouse (Important: Do not reboot after uninstalling these
drivers, even if you are prompted to do so.)
– Video (Important: Uninstall this driver last. Also, do not reboot after
uninstalling the video driver, even if you are prompted to do so.)
6 Windows XP: Configure the Default User profile to comply with corporate
standards (for example, set wallpaper and screensavers to the corporate
standards, add corporate documents to the Documents folder, and so on). By
doing this, any user profile that is added to the computer in the future will be
automatically configured to comply with corporate standards.
To configure the Default User profile in Windows XP:
a Create a temporary administrative user.
b Log in as the temporary user and configure system settings as needed.
c Log off the temporary user and log in as Administrator.
d Run the User Profiles management tool (Control Panel —> System —>
Advanced tab —> User Profiles group box —> Settings) and copy the
temporary user’s profile settings to the Default User profile.
Note: In some cases, you may need to reboot the computer before you can
perform the copy operation.
e Delete the temporary user profile.
7 Install any additional applications that you want to include in your base image.
Include an application if at least 80 percent of your users need it. Also, install
important application patches. Do not install applications that are hardware-
related (Control Panel items, hardware utilities, and so on).
10 Clear out cached Internet Explorer documents, including Files, History, and
Cookies.
15 Windows XP: You may want to change how the Guest login account is used.
By default, Windows XP forces anyone attempting to connect to a remote
system to log in as “Guest.” To allow the connecting user to enter a name and
password instead of having to log in as “Guest,” perform the following:
a Run REGEDIT.EXE.
b Locate the following key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Forceguest
c Change the “Forceguest” value to 0.
Lesson 7 Creating and Restoring Master Images 7–29
Copyright © 2008 Symantec Corporation. All rights reserved.
Creating a Master Image of the
Reference Computer
1
Create PreOS boot package on physical media.
2
Copy Sysprep folder to reference computer.
3
Run Sysprep.
1 Because Sysprep powers off the system after it has run, you must create a
PreOS boot package that is capable of booting a powered-down system (in
other words, the boot package must be created on physical media, such as a
floppy disk, CD, PXE, or a USB bootable device).
For Ghost, the boot package should be created using the WinPE PreOS
environment, and you should choose to include the DeployAnywhere driver
database to ensure that all drivers that may be needed in your environment are
available in the boot package.
3 Run Sysprep.
Windows XP:
C:\Sysprep\Sysprep.exe -mini -reseal -quiet
5 Load the imaging engine that is compatible with the PreOS you are using (for
example, Ghost32 or PQIDeploy if you are imaging under WinPE).
7 After the master image has been created, be sure to test it.
You test the master image by restoring it to other computers with different
hardware configurations. Boot each computer you restored the image to, and
verify that each computer runs through the Setup Manager wizard properly. If
the test is successful, you should be able to use the image on all the other
computers in your organization.
Troubleshooting DeployAnywhere
• Issue: Error: “A test that safeguards the integrity of the program failed
unexpectedly. CHECK failed, Argument::GetInt323: .\
CommonArgumentTypes.cpp(156): false.
Solution: This error is reported if DeployAnywhere fails to find all the files it
needs to perform the retargeting process. One instance in which this error has
been encountered is when a system optimization tool removed the sp2.cab
and drivers.cab files from the C:\Windows\Driver Cache\i386
directory. In this case, the error was corrected by copying the missing
sp2.cab and drivers.cab files from a different system into the affected
system’s C:\Windows\Driver Cache\i386 directory.
Key Points
In this lesson, you learned about:
– The issues involved in deploying images on a network
– How Microsoft Sysprep solves image deployment issues
– Creating a Sysprep answer file in preparation for performing an
unattended deployment of Windows XP/2000
– Creating a Sysprep answer file in preparation for performing an
unattended deployment of Windows Vista
– Preparing a reference computer for imaging
– Creating a master image of the reference computer and
validating the image
– Using Ghost and ImageCenter to restore a master image, and
using Ghost’s DeployAnywhere feature to install drivers on the
target computer
Benefits:
• Simplifies the deployment process (especially if a hardware-
independent image is used).
• Dramatically reduces time required to deploy computers
(compared to manually installing an operating system on each
computer).
Challenges:
• Early image deployment methods required the administrator to
download a separate copy of the image from a network volume
to each machine.
• Copying a full image repeatedly across the network puts a
heavy burden on network bandwidth, leading to network
slowdowns and even instability.
Overview of Multicasting
Multicasting technology uses a “push” method of deployment. Each computer that
needs to receive the image must still be booted to the network and have imaging
software run on it. Each computer must also be joined to a multicast session. Once
these things are done, however, the image file is pushed out as packets of data from
a central computer simultaneously to all computers logged in to the multicast
session. In other words, the image file is sent out only once across the network, not
multiple times. This significantly reduces the impact on network performance and
stability.
GhostCasting PowerCasting
Can create and restore images Can restore images
Works with .gho, .v2i, .pqi, Only works with .pqi image file format
and.vmdk file formats
Is integrated into the Ghost Console Is not integrated into the Ghost Console
Select StartÆProgramsÆ
Symantec DeployCenterÆ
DeployCenter ToolsÆ
PowerCast Server.
Express Eliminate a decision step on the client side and have the
image file replace the entire contents of the hard disk
chosen by the client. The client does not have to choose a
destination partition or free space. Do not choose this
option unless you are confident you can replace the entire
contents of the hard disk.
Custom Let the client choose the destination (partition or free
space) and partition resize values.
If you are finished setting PowerCast Server options, you can either set advanced
options before launching the PowerCast session, or you can launch the PowerCast
session by clicking Start.
The selected image will be PowerCast to connected clients once the Autostart
client count is reached or you click Go.
To automatically join a
PowerCast session, boot
clients from a PowerCast
boot disk created with
Boot Disk Builder.
Key Points
In this lesson, you learned about:
– The benefits of deploying a single image to multiple computers at
the same time
– The basics of multicasting and how multicasting is implemented
in Ghost Solution Suite
– Deploying an image to multiple computers using GhostCasting
– Deploying an image to multiple computers using PowerCasting
9
1. The Ghost executable is called and Ghost
command-line switches are specified.
2. Error trapping and other commands are
specified as needed.
Note: For a com plete listing of Ghost command-line switches and their
usage, see Appendix C in the Symantec Ghost Solution Suite Lab Guide.
For a complete listing of Ghost command-line switches and their usage, please see
Appendix C in the Symantec Ghost Solution Suite Lab Guide.
9
• Image Creation
• Image Restoration
• Partition Manipulation
• Registry Access
• Access to Files on Visible and Hidden Partitions
• SYSPREP.INF Access and Manipulation
• .INI File Access and Manipulation
• Messaging
• Math Operations
• Disk and Partition Queries
• Scripting Logic
Automating ImageCenter
ImageCenter scripting provides a way to automate ImageCenter’s functions.
ImageCenter can be automated using the DOS (Pqimgctr.exe) or Windows
(PQIDeploy.exe) executable. For most automated solutions, WinPE is
recommended since it enables faster imaging speeds, improved network support,
and can be used to create much more robust solutions.
Using scripting requires forethought and preparation since you must manually
write script files that instruct ImageCenter what to do. However, when the scripts
run, no user interaction is required. Through scripting, the following functions can
be performed:
• Image Creation
• Image Restoration
• Partition Manipulation
• Registry Access
• Access to Files on Visible and Hidden Partitions
• Sysprep.Inf Access and Manipulation
• .INI File Access and Manipulation
• Messaging
• Math Operations
• Disk and Partition Queries
• Scripting Logic
To use ImageCenter scripting, you must first understand its three components—
program parameters, script files, and scripting commands.
9
Scripting parameter and path to script file
Usage: /CMD=<path to script file>
Example: /CMD=A:\Script.txt
While the parameters discussed thus far are required in order to activate
ImageCenter scripting, there are a number of additional parameters that can be
used to modify how ImageCenter functions. Remember that once a script is
running, no user interaction is involved. Any advanced options or other program
features that are available in the ImageCenter GUI can only be accessed in
scripting mode through the use of program parameters.
To view the additional program parameters available with ImageCenter, see
Appendix D in the Symantec Ghost Solution Suite Lab Guide.
CAUTION Because the script file executes without user intervention, use extra
care when developing the script file. For example, if the
DELETE ALL command is encountered, all the partitions on the
currently selected drive will be deleted without any warning or
confirmation message which would normally allow the user to
cancel the operation. Enter only one command per line; otherwise,
only the first command (if any) will successfully execute.
9
following scripting commands:
Select Drive 1
Select Partition All
Store With Compression High
These three commands tell ImageCenter to create an image file of all partitions on
the first drive and to compress the image file as much as possible.
A script to restore the partitions in the image file to two different hard drives might
consist of the following scripting commands:
Select Drive 1
Delete All
Select Drive 2
Delete All
Select Drive 1
Select Freespace Largest
Select Image 1
Resize Image Max
Restore
Select Drive 2
Select Freespace First
Select Image 2
Resize Image 850
Restore
Select Freespace Next
Select Image 3
Resize Image Max
Restore
SET REG
USE NONE
Following are some of the most commonly-used query commands (which are used to
determine the number of disks in the system, disk sizes, partition sizes, used and
unused space within partitions, file systems of partitions, etc.):
Multiple Disks Selected Disk Selected Partition Selected Free Space
(No Disks Selected)
GetTotalDisks GetCurrentDiskNum GetCurrentPartNum GetCurrentFreeSpaceNum
GetTotalUnallocatedSpaces GetUnusedPercent
GetUnallocatedSize GetPartitionLabel
GetUnallocatedPercent IsFAT
IsFAT32
IsNTFS
IsHPFS
IsLinuxEXT2
IsLinuxEXT3
IsLinuxSWAP
IsActive
IsHidden
IsPrimary
IsLogical
• GDisk
Offers such features as FAT and NTFS file system formatting, batch mode
operation, hiding and unhiding of partitions, secure disk wiping to U.S. DoD
requirements, and extensive partition reporting.
• GhConfig
Enables you to quickly apply post-deployment configuration settings to a
computer (such as changing a computer’s name immediately after an image is
deployed to the computer).
• GhRegedit
Enables you to edit Windows registry keys and values.
• Om niFS
Enables you to manipulate files and directories in a locally attached NTFS, FAT,
or EXT3 file system (including hidden partitions).
• PQAccess
9
Enables you to perform file-related operations on partitions that the active operating system
cannot recogniz e or acc ess.
• PQIDeploy
Creates and restores image files, and performs bas ic hard drive partitioning operations.
Has no GUI and can only be c ontrolled through scripting.
• PQDisk
Scriptable version of Norton PartitionMagic.
• PQQuery
DOS command-line program that returns disk and partition information in environment
variables.
• VBE
Enables Windows-based computers to reboot into DOS without using physical media
(floppy disk, CD-ROM, etc.)
• PQA
An image addendum utility that enables you to modif y files or directories on a visible or
hidden hard disk partition.
• PQIExtract
Enables you to restore individual files or directories from within PQI image files.
Deploy Toolkit
The Deploy Toolkit is a set of automation tools specifically designed to meet the
system configuration and deployment needs of equipment manufacturers,
configuration centers, and enterprise IT professionals.
The Deploy Toolkit reduces the time required to set up and configure new
workstations, deploy software applications across an entire network, and upgrade
systems to new operating systems and larger hard drives.
The following utilities are included in the Deploy Toolkit:
• PQAccess enables you to perform file-related operations on partitions that the
active operating system cannot recognize or access. This is especially useful in
DOS environments when NTFS partitions (the primary partition type used by
Windows XP and Windows 2000 Server) are not visible and cannot be
accessed.
• PQIDeploy is based on ImageCenter, the imaging component of DeployCenter.
PQIDeploy can create and restore image files, as well as perform basic hard
drive partitioning operations. Unlike ImageCenter, however, PQIDeploy does
not have a graphical user interface and can only be controlled through
scripting.
• PQDisk is a scriptable version of Norton™ PartitionMagic®. PQDisk is
intended for use by PC configuration centers and corporations that need to
configure large numbers of PCs. It uses ASCII text script files to specify
operations that create and manipulate hard disk partitions.
• PQQuery is a DOS command line program that returns disk and partition
information in environment variables. PQQuery enables batch files or imaging
Key Points
9
In this lesson, you learned about:
– Using Ghost command-line switches in batch files to automate
the image create and restore processes
– Using ImageCenter scripting to automate the image create and
restore processes
– Additional automation tools included in Ghost Solution Suite
10
Files
AutoInstall can
Registry entries
capture changes to:
AutoInstall Components
Symantec Ghost AutoInstall has the following components to help you create and
customize AI packages:
• AI Snapshot creates an installation script that records the changes to a model
computer when software is installed.
• AI Builder uses the installation script to create a package that duplicates the
changes made by the software installation. AI Builder also lets you customize
the package to meet your needs.
To use AutoInstall:
1. Install AI Builder and AI Snapshot on the model computer.
2. Scan the model computer to capture existing system
10
information.
3. On the model computer, install the software that you want to
deploy.
4. Scan the model computer a second time to capture the
changes to the system.
Using AutoInstall
To use AutoInstall, ensure that AI Builder is installed on the computer where the
Ghost Console is installed (AI Builder is included in the Console installation), and
then perform the following procedures:
1 Install AI Builder and AI Snapshot on the model computer.
2 Scan the model computer to capture existing system information.
3 On the model computer, install the software that you want to deploy.
4 Scan the model computer a second time to capture the changes to the system.
AI Builder automatically builds and saves the file created by AI Snapshot as an
executable AI package. You can use AI Builder to customize the installation
script, prior to building, or after building the executable, if necessary.
Creat e, cus tomize, and The Ghost Console The c lient w orks tations
build the applic ation deploys t he Aut oIns tall listen for ins tallation
package on the model pac kage to the c lient task s from the Ghost
comput er . w orks tations as a tas k. Console.
10
computers that will receive the finished package.
• Not have any other software besides the operating system
installed on it.
1
Capture pre-installation state of computer.
2
Monitor software installation.
3
Capture post-installation state of computer.
10
› Click Browse, and then navigate to the file.
b Click Monitor.
c During the installation, select the options in the application being installed
that you want to install on the target computers.
d Perform one of the following:
eType a name for the installation package when the software installation is
complete. The default name is INSTALL.
3 Capture computer information after the software installation.
a In the Is Software Installation Complete window, click Compare to check
the new configuration against the original configuration.
b Click OK when the installation script file name appears.
4 Build the AutoInstall package.
a At the Ready to Build screen, click Build.
Note: If you would like to customize the installation script or add an
uninstall command before building the package, click Modify. The script
opens in AI Builder, allowing you to make needed modifications. Once you
have modified the installation script, you should build the package before
any further changes are made to the model computer. This prevents the
changes from being included in the package.
b Click Finish.
10
Example: Select Prompts to change the messages displayed during
the installation.
System Changes Makes changes to Windows during the installation.
Example: Select Registry to insert or delete items in the Windows
registry.
If Conditions Lets you include If statements for unattended installations.
Example: Select IfMemory() to check a memory value during the
installation.
Defaults & Calls Sets up defaults and includes calls to external programs.
Example: Select RunAtExit to run an external program at the end of
the installation.
The following table outlines the command types that are available in AI Builder.
1
Edit installation script text file in AI Builder.
2
Build customized AI package.
10
Adding an Uninstall Command to the Installation Script
AI Builder places an uninstall program in the AI Builder working directory and
creates a hidden file, Uninstall.aic, that captures the changes made during
the installation. Successive installations modify the Uninstall.aic file so that
the uninstall program returns the system to the state before the first installation.
The uninstall program places an option on the Control Panel Add or Remove
Programs dialog box from which the user can uninstall the application.
To include an uninstall command in an AI package:
1 In the left pane of the builder options, select BASE INSTALLATION, and then
click UnInstall to include an uninstall package.
2 Check Remove Groups During Uninstall to remove any program groups that
were created during the installation.
Use this option cautiously, because some users may select an existing group for
the installation or add files to the group after installation.
3 Type the name for the uninstallation in the space provided.
This name appears on-screen when the uninstallation runs.
4 Click Add to record the options that you have chosen.
Key Points
In this lesson, you learned about:
– How AutoInstall works
– Setting up a model computer and installing AI Snapshot and AI
Builder on the computer
– Using AI Snapshot to generate an AutoInstall installation script
10
– Editing the installation script created by AI Snapshot
– The importance of validating AutoInstall packages and how the
validation process works
Preparing for Client Integr ation Prepare the Ghost environment for client
integration.
Installing the Console Client Install the Console Client.
Setting Global Pr operties for Configur e settings that apply automatically to
Managed Clients all client com puters detected by the Ghost
Console.
Gr ouping Clients in the G host Explain the benefits of using gr oups in the
Console Ghost Console and create a new group.
Creating Tasks in the Ghost Cr eate a basic task in the G host Console.
Console
Populating the G host Console with Populate the Ghost Console database w ith
Client Infor mation client inventory and configuration inform ation.
11
•Organizing and managing client computers, image files,
configuration sets, and other resources
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–3
Copyright © 2008 Symantec Corporation. All rights reserved.
Overview of Ghost Console Tasks
11
Prerequisites for Running Tasks on Clients
There are a number of procedures you need to perform before you can assign tasks
to clients. These procedures are as follows:
1 Install the Ghost Client Agent on all client computers.
2 Group the client computers in the Ghost Console to create a specific set of
target computers to receive the task.
3 Create the task and set up the appropriate task steps.
The preparation and procedure for remotely installing the Ghost Client Agent was
covered in the “Installing the Ghost Solution Suite” lesson. The procedures for
grouping computers and creating tasks are covered later in this lesson.
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–5
Copyright © 2008 Symantec Corporation. All rights reserved.
Preparing for Client Integration
11
supported domains list any domains that have previously been added with this
user. You then must add the domains to the new Console Service account.
To edit the Console Service account:
1 On the Console server, on the Windows taskbar, select Start—>Programs—>
Symantec Ghost—>Ghost Console.
2 On the Tools menu, click Supported Domains List.
3 In the Domain Administration dialog box, click Edit.
4 In the User Name field, type the Console Service account name.
5 In the Password field, type the Console Service password.
6 Click OK.
7 Click Close.
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–7
Copyright © 2008 Symantec Corporation. All rights reserved.
2 In the Start Search field, type Firewall.cpl.
3 On the Windows Firewall dialog box, click Change Settings.
4 Under the Exceptions tab, verify that File and Printer Sharing is checked.
5 Click OK.
To turn on the built-in Administrator account for Windows Vista:
1 On the client computer, log on as a user that has administrator rights.
2 On the Control Panel, click Classic View.
3 Click Administrative Tools.
4 Click Computer Management.
5 Select System Tools—>Local Users and Groups—>Users.
6 Double-click the Administrator user.
7 Uncheck Account is disabled.
8 Click OK.
9 Right-click Administrator and click Set Password.
10 Set a password for the Administrator account and click OK.
To disable the User Account Control in Windows Vista:
1 On the client computer, log on as a user that has administrator rights.
2 On the Control Panel, click User Accounts.
3 Click Turn User Account Control on or off.
4 Uncheck Use User Account Control (UAC) to help protect your computer.
5 Click OK.
6 Restart the computer.
11
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–9
Copyright © 2008 Symantec Corporation. All rights reserved.
Installing the Console Client
11
You can install the Console client directly on a client computer from the
installation CD.
To manually install the Console client:
1 Insert the Symantec Ghost Solution Suite CD into the CD-ROM drive of the
client computer.
2 In the Symantec Ghost Solution Suite installation window, click Install
Symantec Ghost Corporate Edition.
3 Click Install Console Client.
4 At the installation wizard’s welcome screen, click Next.
5 Accept the terms of the license agreement, and then click Next.
6 At the Connect to Server screen, type the computer name of the Ghost Console
server.
7 Click Next.
8 At the Destination Folder screen, confirm the installation location.
9 Click Next.
10 Click Install to start the installation process.
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–11
Copyright © 2008 Symantec Corporation. All rights reserved.
Setting Global Properties for Managed
Clients
In the Ghost
Console, select
ToolsÆOptions.
Property Description
Client Warning Warns users that the Ghost Console is
about to run a task and gives them the
option to cancel the task
Client Heartbeat Sets the frequency with which clients
send update messages to the Ghost
Console
Virtual Partition Default PreOS Sets the default PreOS used for the
Ghost virtual partition on all clients
Default DOS Network Template Sets the network driver that clients use
to connect to the network when running
tasks under DOS
Client User Interface Enables users to initiate tasks from the
11
Ghost Client Agent icon in their
com puter’s system tray
Following are descriptions of the global client properties you can set:
Property Description
Client Warning Warns users that the Ghost Console is about to run a task
and gives them the option to cancel the task.
Client Heartbeat Sets the frequency with which clients send update
messages to the Ghost Console. If your computers are
networked over a WAN, you might set this number lower
to reduce network traffic. If you set the client heartbeat to
0, the status of the client computer is indicated as
“Unavailable” on the Ghost Console.
Virtual Partition Default Symantec Ghost creates a virtual partition automatically
PreOS when a task that requires a computer to restart in a PreOS
environment is executed.
Both PC-DOS and WinPE are available, both of which are
supplied with Ghost. The default is WinPE. If you want to
use DOS but your computers don’t run under PC-DOS,
you need to provide Ghost with MS-DOS system files.
(For details on how to do this, see the topic “Creating Boot
Packages with the Ghost Boot Wizard” in the “Creating
Boot Packages” lesson.)
Two versions of WinPE are supplied with Ghost: WinPE,
which is designed to run on 256 MB RAM computers, and
WinPE-512, which is designed to run on 512 MB
computers. Win PE-512 includes more drivers and
packages.
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–13
Copyright © 2008 Symantec Corporation. All rights reserved.
Property Description
Virtual Partition Default The PreOS version you specify here is the default version
PreOS (continued) for all clients. You can choose a different PreOS version
for individual clients, by changing the client property
settings.
Note: When Ghost boots a client into WinPE from the
virtual partition, it boots into the WinPE Ramdisk
environment, removes the virtual partition from the
partition table, and restores the partition table and MBR to
exactly what was in the operating system before booting
into WinPE. It attempts to return the drive letters to what
they were in the operating system, with the exception of
X:, which is dedicated to the WinPE ramdisk. As soon as
the client reboots from WinPE it should go back to the
main operating system.
Default DOS Network Sets the network driver that clients use to connect to the
Template network when running tasks under DOS.
Client User Interface Enables users to initiate tasks from the Ghost Client Agent
icon in their computer’s system tray. This permits users to
execute tasks at their own convenience. It also permits
administrators to execute tasks immediately from a client
without having to return to the Ghost Console computer.
11
Overriding Global Properties for Individual Clients
To override global properties for individual clients:
1 In the Ghost Console, right-click the client whose properties you want to
modify, and then select Properties.
2 Click the Client tab.
3 Adjust client settings (client heartbeat, default PreOS, or default network
template) as needed.
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–15
Copyright © 2008 Symantec Corporation. All rights reserved.
Creating Groups
Creating Groups
The Ghost Console detects its client computers on the network and automatically
adds them to the Default group in the Machine Groups folder. You can use this
group if you want, or you can create new computer groups to suit your
requirements.
11
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–17
Copyright © 2008 Symantec Corporation. All rights reserved.
Adding Managed Computers to
Groups
11
Softwar e and File Actions Installs and uninstalls AutoInstall packages, transfer s
files and folder s, retrieves files, and executes
commands on clients
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–19
Copyright © 2008 Symantec Corporation. All rights reserved.
Task step Description
Software and File Actions Installs and uninstalls AutoInstall packages on client
computers, transfers files and folders to client computers,
retrieves files from client computers, and executes
commands on client computers.
Note: Image creation is not included in the preceding table because it exists as a
stand-alone task, not a task step, in the Ghost Console.
There are two categories of tasks you can create in the Ghost Console—normal
tasks and “image create” tasks. This topic discusses how to create normal tasks.
Image create tasks will be discussed in a later lesson.
To create a task:
1 In the Ghost Console’s left pane, expand the Tasks folder.
2 Expand the folder where you want to store the new task.
3 In the Tasks pane, right-click an empty area, and then select New Task from
the quick menu.
4 In the Properties For New Task window, type the name for the new task in the
Name field.
The name can be anything you want, up to a maximum of 50 characters, as
long as you do not duplicate the name of an existing task in the same folder.
5 Under Task Steps, select the task steps that you want to include in the task.
You must include at least one step in a task.
When you deselect a step, the corresponding tab is hidden. Only the tabs
relevant to the selected steps are shown.
6 Select the refresh steps that you want to include in the task.
These steps have no tab associated with them, since you do not need to set any
properties.
7 Under Target Machine Group/Machine, click Browse; select the computer,
machine group, or dynamic machine group to which you want to apply the
task; and then click OK.
8 If you want to be able to execute the task from the client computer, select the
option Allow Client Initiation.
This option does not become available until you complete all of the required
information in the task.
9 Click Set Password and type the authorization password that the client user
must provide to run the task.
You must retype the password in the box below to confirm the password. The
client users are prompted to type this password when they try to run the task.
10 If you want to override the default network properties for the task, make the
appropriate settings on the Network tab.
11 On each of the remaining tabs, set the properties for each step that you have
included in the task.
11
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–21
Copyright © 2008 Symantec Corporation. All rights reserved.
Populating the Ghost Console with
Client Information
Key Points
In this lesson, you learned about:
– The purpose of the Ghost Console.
– Preparing the Ghost environment for client integration.
– Installing the Console Client.
– Configuring settings that apply automatically to all client
computers detected by the Ghost Console.
– The benefits of using groups in the Ghost Console and create a
new group.
– Creating a basic task in the Ghost Console.
– Populating the Ghost Console database with client inventory and
configuration information.
11
Lab 11: Integrating and Configuring
Windows Desktops in the Ghost Console
In this lab, you:
•Prepare systems for integration with the Ghost Console.
•Remotely integrate systems into the Ghost Console.
•Group managed systems.
•Populate the Ghost Console database with client
information.
•Change client configurations.
Lesson 11 Integrating and Configuring Windows Desktop Computers in the Ghost Console 11–23
Copyright © 2008 Symantec Corporation. All rights reserved.
11–24 Symantec Ghost Solution Suite 2.5 Administration
Copyright © 2008 Symantec Corporation. All rights reserved.
Lesson 12
Using the Ghost Console to Create and
Restore Images
Lesson Introduction
Clone Task
A regular task in which you select and configure the “Clone”
task step; this task lets you restore an image file to one or
more client computers
12
Image Create Task
The image create task is a special task that enables you to capture an image of a
client computer.
When you build an image create task, you must select the reference computer (that
is, the computer you want to capture an image of), assign an image definition to
the task, and optionally set the network and Sysprep parameters.
Clone Task
The clone task is a regular task in which you select and configure the Clone task
step. This task lets you restore an image file to one or more client computers. You
can restore an image file to a single computer, or restore the same image to all the
computers in a computer group. If you have saved an image file locally on each of
the target computers using the same name and location, you can restore them all in
a single task.
Lesson 12 Using the Ghost Console to Create and Restore Images 12–3
Copyright © 2008 Symantec Corporation. All rights reserved.
Configuring the Ghost Console to Use
the Image Repository
1
Update Sysprep versions in Console (Win 2000/XP only).
2
Add Sysprep configuration to Console.
3
Add image definition to Console.
12
available in Microsoft’s Sysprep answer file creation tools.
g To save the Sysprep configuration, click OK.
3 Add an image definition to the Console’s configuration resources.
The image definition points the Console to your image repository, enabling
you to create and restore images from a central network location.
To create an image definition:
a In the Console’s left pane, expand the Configuration Resources folder and
select Images.
b In the Console’s right pane, right-click an empty area and select New
Image.
c In the Name field, type a name for the image definition (for example,
WinXP).
d In the Location field, type the UNC path to your image repository and
include the image filename in the path.
Note: If an image file with the name you specify already exists at that
location, the status of the image file is displayed, including the partitions
included in the image and the image description (if any).
e In the Properties for New Image window, click OK.
The image definition is added to the Console, and the Console is now
configured to use the image repository so you can create and restore
images across the network.
Lesson 12 Using the Ghost Console to Create and Restore Images 12–5
Copyright © 2008 Symantec Corporation. All rights reserved.
Building and Running an Image
Create Task
12
Lesson 12 Using the Ghost Console to Create and Restore Images 12–7
Copyright © 2008 Symantec Corporation. All rights reserved.
Building and Running a
DeployAnywhere Clone Task
3
Select computers you want to clone.
4
Configure clone settings.
6 Save task.
12
partition number.
d Under Image, click Browse, select the image configuration you want to
use, and click OK.
e If you want to restore a single partition in the image file, under Source
partition, select the appropriate partition from the drop-down list.
If the image file does not yet exist, no partitions are defined. You can type a
Source Partition number instead.
f If you want to preserve specific files or folders on the target computers,
click Preserve to set the file preservation options.
g If you want to add more advanced features to the task using the command
line, click Advanced to set the advanced feature options.
5 Configure DeployAnywhere settings.
a Click the DeployAnywhere tab.
b If you want the client to remain in the PreOS environment if the task fails
(for example, you want to troubleshoot the failure in the PreOS
environment), select the option “Remain in PreOS if DeployAnywhere
fails.”
c If you need to add NIC or storage drivers to the DeployAnywhere database,
click Manage Drivers, then use the Windows Driver Database Editor to add
the new drivers.
6 Click Save.
The new task is added to the Tasks folder.
7 Click Execute to run the task immediately, or schedule the task to run at a later
time.
Lesson 12 Using the Ghost Console to Create and Restore Images 12–9
Copyright © 2008 Symantec Corporation. All rights reserved.
Lesson Summary
Key Points
In this lesson, you learned about:
– The purpose of the image create task and the clone task.
– Configuring the Ghost Console to use an image repository for
storing all images in a central network location.
– Using the Ghost Console to build and run an image create task.
– Using the Ghost Console to build and run a DeployAnywhere
clone task.
User settings
You can use the
Ghost Console to Folders and files
capture and restore:
Registry entries
13
If you installed an updated version of an application that Ghost supports, the
restore task updates the user settings.
You can capture and restore the following user information:
User settings You can capture desktop and application settings. For
example, you can capture the following settings:
• The default printer that is selected in Microsoft Word
• A user’s screen saver or desktop wallpaper settings
• A user’s Internet settings
Folders and You can capture entire folders or individual files from any
files Windows-accessible partition on the computer (for example,
the My Documents folder).
Registry You can capture individual registry entries, keys, or user
entries hives.
Lesson 13 Using the Ghost Console to Migrate OS-Based User Profiles 13–3
Copyright © 2008 Symantec Corporation. All rights reserved.
Components of a Migration Template
Component Description
Application settings The applications for which you want to capture user
settings. The list contains all the applications that Symantec
Ghost supports.
Specified user files and A specified set of user files and folders to include or to
folders to include or exclude. Each set contains a directory path and file
exclude definition and may include variables and wildcard
characters.
You can select files based on creation or modification dates
and file size.
You can specify a destination path and replacement options
for the files that you want to include.
Specified registry keys to The specified set of registry entries to capture or exclude.
capture or exclude Each set contains a registry path and may include wildcard
characters.
You can specify a destination path and replacement options
for registry keys that you want to include.
Component Description
Application settings The applications for which you want to capture user settings. The list
contains all the applications that Symantec Ghost supports.
Specified user files and A specified set of user files and folders to include or to exclude.
folders to include or Each set contains a directory path and file definition and may include
exclude variables and wildcard characters. You can specify whether to
include or exclude particular sets of files. You can select files based
on creation or modification dates and file size.
You can specify a destination path and replacement options for the
files that you want to include.
Specified registry keys The specified set of registry entries to capture or exclude.
to capture or exclude Each set contains a registry path and may include wildcard
characters.
You can specify a destination path and replacement options for
registry keys that you want to include.
13
Lesson 13 Using the Ghost Console to Migrate OS-Based User Profiles 13–5
Copyright © 2008 Symantec Corporation. All rights reserved.
Capturing User Data
10 If you want to migrate only those users who have accessed their accounts
recently, check Only Users Accessed Within, and in the Days box, type the
appropriate number of days.
The maximum number of days that you can set is 365.
11 Under Migration Templates, click Browse.
12 In the Select Migration Template dialog box, expand User Migration
13
Templates, select a template, then click OK:
13 In the Logging Level drop-down list, select one of the following event logging
options:
14 In the Compression Level drop-down list, select the compression level for the
files in the package. The available options are:
– None
– Low
– Medium
– Full
Compression helps improve performance during package creation and
minimizes the storage requirements for the packages.
Lesson 13 Using the Ghost Console to Migrate OS-Based User Profiles 13–7
Copyright © 2008 Symantec Corporation. All rights reserved.
15 If you want the task to stop if a warning is issued, select Abort on Warning.
If multiple steps are included in the task, the task stops at the point of error and
does not attempt to run the rest of the steps. For example, if the task includes a
capture step, a clone step, and a restore step, and the capture step returns a
warning, then the task fails without running the clone and restore steps.
16 Click Save.
17 To run the task immediately, click Execute, or schedule the task to run later.
When you run a User Migration: Create task, the user settings on each
destination computer are stored in a user package. Each user package is an
.ump file and is saved on the Ghost Console computer or on the client
computer, according to the settings that you specified in the task. If the user
package is saved on the Ghost Console computer, the package definition is
added to the User Packages folder.
13
2 In the Tasks pane, right-click an empty area and select New Task from the
quick menu.
3 In the Properties for New Task window, type a name for the new task in the
Task Name field.
4 In the Task Steps list, select User Migration: Restore.
5 In the Target Machine Group/Machine box, click Browse, select the
destination computer or computer group from the folder structure, and then
click OK.
6 Click the User Migration: Restore tab.
7 Under Package, specify the location of the user packages to restore (the Ghost
Console computer or the client machines).
8 Perform one of the following:
– To select a package that has been named automatically, click “Select latest
Package based on Package’s Target Machine Name.”
The name format is: machinename (yyyy-mm-dd hh:mm:ss).
By default, the target computer name of a package is set to the source
computer name.
Lesson 13 Using the Ghost Console to Migrate OS-Based User Profiles 13–9
Copyright © 2008 Symantec Corporation. All rights reserved.
– To use the same naming convention that was selected in the capture step,
select “The package name is specified in the User Migration: Capture
step.”
– To specify a package name and location if a package is stored on the Ghost
Console, select “Specify a package name,” click Browse, and browse to the
appropriate package in the Configuration Resources folder.
– To specify a package name and location if a package is stored on the client
computer, select “Specify a package name,” click Edit, and type the drive
letter and path to the package on the client machine.
9 In the Logging Level drop-down list, select the level of event logging
information you want to capture (Low, Medium, or Full).
10 Click Save.
11 To run the task immediately, click Execute, or schedule the task to run later.
Key Points
In this lesson, you learned about:
– The types of user data you can capture and restore with the
Ghost Console
– Setting up a migration template by specifying the set of files,
application settings, and registry keys you want to capture
– Setting up and running a task in the Ghost Console to capture
user data from a computer
– Setting up and running a task in the Ghost Console to restore
user data to a computer
13
•Create a migration template.
•Create and execute a User Migration Capture task.
•Create and execute a User Migration Restore task.
Lesson 13 Using the Ghost Console to Migrate OS-Based User Profiles 13–11
Copyright © 2008 Symantec Corporation. All rights reserved.
13–12 Symantec Ghost Solution Suite 2.5 Administration
Copyright © 2008 Symantec Corporation. All rights reserved.
Lesson 14
Using the Ghost Console to Perform Post-
Deployment Customizations
Lesson Introduction
14
rights often cause customizations, such as application installations, to fail
when using such methods as login scripts.)
Action Functionality
Install an AI package Deploys AI packages to client computers
Uninstall an AI Removes installed AI packages from client
package computers
Transfer files and Copies files and folders from the Ghost Console
folders computer to the operating system or the Ghost
partition of the client computer
Retrieve a file Retrieves files from client com puters and stores
them in a specified location on the Ghost Console
computer
Execute a command Executes commands in the client’s operating
system or the Ghost partition
The package does When each package is built, you have the option to
not include an include an Uninstall command. If you do not include
Uninstall command. this command, you cannot uninstall the package in a
Deploy AI Package task. If you want to check whether
or not a package includes an Uninstall command, open
the package with AI Builder and view its contents.
The package has The rebuilt package cannot uninstall any software that
been rebuilt with a was installed with the package prior to the rebuild.
new identifying The application checks the GUID to ensure that the
number (GUID). package used to uninstall software is the same as the
package used to install the software.
14
client computer in a file transfer task. If you want to move files to the My
Documents folder, use the User Migration task steps. User Migration
automatically handles the required directory mapping.
14
2 In the AI Packages pane, right-click an empty area and select New AI Package.
3 In the Properties For New AI Package window, in the Name field, type the
name for the new AI package definition.
The name can be anything you want, up to a maximum of 50 characters.
4 If the AI package file is stored on the client computer, select “Package is
located on the Client machine,” click Edit, and enter the location of the AI
package file on the client.
5 If the AI package file is stored on the Ghost Console computer, a network
share, or an HTTP location, browse to and select the AI package file.
If the package is located on an HTTP path, click Validate to verify that the
package is a valid AI Package. If the package is a valid AI Package, the
Package GUID is displayed.
1
Create new Software and File Actions task.
2
Add “Install AI Package” action.
3
Add “Transfer Files and Folders” action.
14
c In the Properties for New Task dialog box, type a name for the new task in
the Task Name field.
The name can be anything you want, up to a maximum of 50 characters.
d In the Task Steps box, select Software and File Actions.
e In the Target Machine Group/Machine box, click Browse, select the
destination computer or computer group, then click OK.
2 Add and configure the “Install AI Package” action.
a Click the Software and File Actions tab.
b Click Add.
c Verify that the option “Install an AI package” is selected, then click Next.
14
Key Points
In this lesson, you learned about:
– The benefits of using the Ghost Console to deploy AI packages
and to perform other post-deployment customizations on client
computers
– The purpose and components of the Software and File Actions
task
– Creating an AI package definition to make an AI package
available for deployment
– Performing post-deployment customizations on client computers
by running a Software and File Actions task from the Ghost
Console
Resource Description
Collected Data Stores the collected data sets that define the type of
information you want to collect from other computers and
store in the inventory database
Filter Stores the filters that you use for querying the Inventory
database; a filter is a query that you apply to a computer
group
Report Stores the reports that you use for retrieving detailed
information for computers that match a specific filter; a
report typically contains a filter and a view and is applied
to a particular computer group
View Stores the views that you use for displaying property
data; a view is a list of properties that you want to display
Collected Stores the collected data sets that define the type of information
Data you want to collect from other computers and store in the
inventory database. You specify the WMI classes that you want
to collect from the client computers. You can assign user-
friendly names to the classes and properties. If you create a
new class, all properties are collected. You can turn off any
properties you do not want to collect.
Filter Stores the filters that you use for querying the Inventory
database. A filter is a query that you apply to a computer group.
It searches the Inventory database and selects all the computers
in the target group that match the filter conditions. You can set
up filters to search for any combination of properties and
property values that you want.
Report Stores the reports that you use for retrieving detailed
information for computers that match a specific filter. A report
typically contains a filter and a view, and is applied to a
particular computer group. The output of a report is the list of
computers that match the filter conditions and, for each
computer, the properties specified in the view. You can view
reports on the screen, print them, and save them as text files.
View Stores the views that you use for displaying property data. A
view is a list of properties that you want to display. You can
display the inventory information you are interested in by
applying the appropriate views to client computers or computer
groups. For example, you may want to set up views containing
groups of related properties (such as software, hardware, or
network) and apply them each time you want to view those
properties for a computer group.
The other folders that are used by the Client Inventory are as follows:
Dynamic Stores the dynamic machine groups that you have set up. A
Machine dynamic machine group is the result of a filter applied to a
Groups computer group, and contains the computers in the target
group that match the filter conditions. Each dynamic
machine group is treated as a virtual computer group, and
can be used as the target of a task.
to the documentation supplied by Microsoft. For more information see the article
at the following URL:
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/
wmisdk/wmi/wmi_classes.asp
You can add additional collected data sets to collect the information you require
from the client computers. There is no restriction on the WMI classes you can use.
They may be additional Microsoft WMI classes or third-party vendor classes.
in data collection.
You may want to set up a computer group that contains all the managed client
computers to ensure that the Inventory database is complete and up-to-date.
If a WMI class has instances with different properties on different computers,
the class properties are merged in the Inventory database.
If no instances of a WMI class are found on any client computers, the class
properties cannot be added to the database. If this occurs, you may want to
check that you have specified the WMI namespace and class name correctly in
the collected data set.
15
Creating Views
You can create new views and modify existing views at any time. When you create
a view, you select the properties that you want to include.
Note: Disabled properties have no values when you use a view in a report or to
display inventory information. If you want to see the values of these properties,
enable the properties in the collected data set, and then perform a refresh inventory
task to update the inventory database.
To create a view:
1 In the Ghost Console’s left pane, expand the Inventory folder.
2 Expand the View folder, and then select the subfolder where you want to place
the new view.
3 In the View pane, right-click an empty area and select New Inventory View
from the shortcut menu.
15
4 In the Properties for New Inventory View window, type the name of the new
view in the View Name field.
The name must be unique, and may contain up to 50 alphanumeric characters.
Choose a descriptive name that indicates which properties are contained in the
view.
5 In the Collected Data Sets list, select the collected data set that contains
properties that you want to add.
The Properties list shows the available properties for the selected data set. By
default, the available properties are those that are enabled in the collected data
set.
6 If you want to include disabled properties in the view, uncheck “Hide disabled
properties.”
This option is checked by default. When you uncheck it, the Properties list is
updated to show all properties of the selected data set, allowing you to select
the properties that you want. Remember that the disabled properties are not
collected from client computers until they have been enabled in the collected
data set and a refresh task has been executed.
7 In the Properties list, select the properties you want to add.
If you want to select all the properties in the collected data set, click Select All.
If you want to clear your selection, click Deselect All.
8 Click Add.
The selected properties are added to the list in the Preview pane.
9 Repeat steps 5 through 8 for each collected data set that has properties that you
want to include in the view.
15
15
Using Filters
A filter is a query that searches the Inventory database and returns all the records
that match the specified property conditions. You can set up filters to search for the
combination of properties you want. You can also set up filters to return all the
records that do not match the filter conditions.
Note: You can only use properties that are enabled in the collected data sets.
Disabled properties are not available. If you want to use any properties, you need
to enable them in the collected data set first.
The filters have been developed for US English client computers. As the data
provided by WMI is dependent on the language of the client operating system,
filters used with clients that are not US English may return an incorrect number of
clients.
The Filter folder stores all the available filters. You can create new filters to suit
your requirements, and can edit, copy or delete existing filters.
You can use filters in reports, to select the computers in a computer group that
have particular property values. You can also use filters in dynamic machine
groups, to set up virtual computer groups that contain the computers that match the
filter conditions.
A set of predefined filters is provided. These are examples that illustrate the use of
a filter. You can modify them to suit your requirements. The predefined filters
include filters that are based on the minimum requirements for Microsoft Vista as
defined by Microsoft.
5 In the Value field, specify the value against which you want to compare the
property as follows:
6 In the “Link with previous condition” drop-down list, select one of the
following:
– AND
– OR
15
– AND NOT
– OR NOT
The default is AND. If you are adding a new condition, you can specify the
link with the previous condition. If you are modifying a condition, you can
specify the link with the next condition.
7 Click OK.
If you are creating a new condition, it is added to the list in the filter’s
Properties window.
Grouping
You can group two or more conditions as a single unit within the list of conditions.
The grouped conditions are evaluated before the conditions outside the group.
A group may contain multiple nested levels of subgroups, but each subgroup must
be completely within its parent group. When a filter contains multiple levels of
grouping, the innermost group is evaluated first.
When you delete conditions from a group, the grouping is automatically adjusted
according to the remaining group start and end conditions. The grouping
adjustment depends on whether the deleted conditions are at the start or end of the
group, or in the middle as follows:
Grouping on Instance
If you need to apply two or more conditions to the same instance of a class, you
can group the conditions on instance. When you do this, all the conditions in the
group must be satisfied for properties of the same class instance. The same
restrictions as for a nested group apply, but you cannot create any subgroups on
instance.
For example, you might have a computer with two logical disks as follows:
• Drive C: NTFS, 10 gigabytes
• Drive D: FAT, 30 gigabytes
You can apply the following filter:
LogicalDisk.FileSystem = NTFS AND
LogicalDisk.Size > 20 Gb
By default, the filter returns this computer because both conditions are met, one on
each logical disk, even though the computer does not contain a disk that meets the
filter criteria.
15
To make the filter exclude the computer unless it contains a logical disk that
satisfies both the conditions, you need to group the conditions on instance:
( <* LogicalDisk.FileSystem = NTFS AND
*>LogicalDisk.Size > 20 Gb )
<* preceding the class name The first condition in the group on instance
* preceding the class name A condition (not the first or last) in the
group on instance
*> preceding the class name The last condition in the group on instance
Using Reports
A report is simply the association of one filter, one view, or one of each, and a
target computer group. You cannot have two or more filters or views in the same
report. If you run a report on a single computer, you must use a view; you cannot
use a filter.
The output of a report depends on whether or not it includes a view. If the report
has no view (just a filter), the output is the list of computers that satisfy the filter
criteria. If the report contains a view, the output is the list of computers in the target
computer group, and the values of the properties contained in the view.
You need to set up your filters and views before you can include them in a report.
If necessary, you can create a new filter or view as you set up your new report.
Creating Reports
You can create a new report at any time, and can use any combination of filters and
views. You can preview a report by running it immediately, or you can save it in
the Reports folder and run it later.
15
To create a report:
1 In the Ghost Console’s left pane, expand the Inventory folder.
2 Click the Report folder.
3 In the Report pane, right-click an empty area and select New Inventory Report
from the shortcut menu.
Running Reports
You can run a report to obtain inventory information from the database. You
should update the inventory database before running a report to ensure that the
report results are up-to-date.
The following formats are for report results, depending on whether or not a view is
included:
If the report contains a view The output is a table listing computers and the values
of the properties that were included in the view.
You can set the sort order for each column by clicking
the column headers.
If the report contains a filter and a view, the table
contains the computers that match the filter conditions.
If the report does not contain a filter, the table contains
all the computers in the target computer group.
If the report does not contain The output is the list of computers in the target
a view (just a filter) computer group that meet the filter criteria. For
15
You can print the report results, or export the results to a formatted text file or a
comma-separated file. You can also create a new dynamic machine group from the
report.
Note: You can also run a report directly from the report’s Properties window, by
clicking Run Report.
15
Dynamic machine groups are stored as folders within the Dynamic Machine
Groups folder. Each dynamic machine group can be used as the target of a task, in
the same way as a computer group.
Note: You may want to refresh the inventory database before you use a dynamic
machine group as the target of a task, to ensure the dynamic machine group
contains the appropriate computers. The inventory database is not updated
automatically.
Key Points
In this lesson, you learned about:
– The Ghost Console’s Client Inventory feature and the
requirements for using Client Inventory
– The purpose of collected data sets as they apply to the Client
Inventory feature, and how to set up collected data sets in the
Ghost Console
– Setting up views in the Ghost Console to control how information
is displayed in inventory reports
– Setting up and using filters in the Ghost Console to control
which clients show up in reports
– Creating and running reports in the Ghost Console
– The purpose of dynamic machine groups, and how to create a
dynamic machine group in the Ghost Console
15
16
GDisk:
•Is a multipurpose disk management utility that
includes a secure disk wiping feature
•Can wipe disks according to the U.S. Department of
Defense DoD 5220.22-M standard
•Comes in two versions:
− GDisk.exe (DOS)
− GDisk32.exe (Windows)
Command-line examples:
DOS
gdisk.exe 1 /diskwipe /dodwipe
Windows
gdisk32.exe 2 /diskwipe /dodwipe
Element Description
gdisk The GDisk executable; use GDisk.exe for the DOS
version and GDisk32.exe for the Windows version
disk Represents the physical fixed disk you want to wipe,
from 1 to 128
/diskwipe Instructs GDisk to perform a disk wipe
/dodwipe Makes six passes when deleting the data on the specified
disk
Key Points
In this lesson, you learned about:
– Why it is crucial for businesses to permanently erase sensitive
data from their hard disks before retiring computers
– Using GDisk to securely wipe a hard disk