Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit 2010
|
|
- Myra McBride
- 5 years ago
- Views:
Transcription
1 Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit 2010 Microsoft Corporation Published: December 2010 Abstract The optimized desktop enables flexible provisioning and management by integrating Windows 7, the Microsoft Desktop Optimization Pack (MDOP), Forefront, and Office This white paper provides step-by-step guidance for using the Microsoft Deployment Toolkit 2010 to automate the installation and configuration of the core optimized desktop technologies.
2 This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes Microsoft Corporation. All rights reserved.
3 Contents Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit Add Optimized Desktop Applications to a Deployment Share... 4 Add the App-V Client... 4 Add the Forefront Client Security Agent... 5 Add Asset Inventory Service Client... 7 Create a Task Sequence for Deployment... 7 Customize the Task Sequence for Cached Office 2010Subsection Heading... 8 Use DaRT to Customize the Windows Recovery Environment... 9 Extract the Boot.wim File from an ERD... 9 Add the Custom Script Files to the Scripts Folder Modify the New Deployment Task Sequence Configure Folder Redirection Create and Share the Root Path Create GPO for Folder Redirection Configure Settings for Offline Files Configure Roaming User Profiles Create and Share the Parent Folder Configure Roaming user Profiles... 14
4 Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit 2010 The optimized desktop enables flexible provisioning and management by integrating Windows 7, the Microsoft Desktop Optimization Pack (MDOP), Forefront, and Office This white paper describes how to use the Microsoft Deployment Toolkit (MDT) 2010 to automate the installation and configuration of the core optimized desktop technologies. Core optimized desktop technologies include the Application Virtualization (App-V) client, the Diagnostic and Recovery Toolset (DaRT) recovery image, Forefront client, BitLocker, and Office 2010 virtual application cache. By installing these technologies during deployment, client computers will be ready for optimized desktop management immediately after installation. This white paper describes how to: Add optimized desktop applications to a deployment share Use DaRT to customize the Windows Recovery Environment Configure Folder Redirection Configure Roaming User Profiles This white paper assumes that you have a server computer with MDT 2010 installed and a deployment share stocked with applications, operating system source files, and so on. It also assumes that you are able to configure Group Policy settings for your organization and have access to the MDOP installation files. For a web version of this document, see Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit 2010 in the Windows 7 Technical Library ( Add Optimized Desktop Applications to a Deployment Share The first step is to add the optimized desktop applications to your MDT 2010 deployment share. These include the App-V client, Forefront client, and the Asset Inventory Service (AIS) client. Then, you create a deployment task sequence, customizing it to deploy the Office 2010 cache. The following sections describe each major step to add the optimized desktop applications to your deployment share. Add the App-V Client To add the App-V client to a deployment share: 1. Start the Deployment Workbench. Click Start, Microsoft Deployment Toolkit, Deployment Workbench. 4
5 2. In the Deployment Workbench console tree, click Applications. Applications is under Deployment Shares, Share Name, where Share Name is the name of the deployment share that you re configuring. 3. In the Actions pane, click New Application. 4. On the Application Type page, click Application with source files and click Next. 5. On the Details page, enter the following information, and click Next: Publisher: Microsoft Application Name: Application Virtualization ClientReplaceThisText Version: 4.6 Language: English 6. On the Source page, click Browse, and open the folder containing the App-V client, and then click Next. 7. On the Destination page, click Next. 8. On the Command Details page, in the Command line box, type the command to silently install the App-V client silently, and click Next. For example, type: msiexec.exe /I setup.msi ALLOWINDEPENDENTFILESTREAMING=TRUE SWIPUBSVRDISPLAY= Woodgrove Bank SWIPUBSVRYPE=RTSP SWIPUBSVRHOST= SEA-DC-01 /q Where: ALLOWINDEPENDENTFILESTREAMING allows applications to load regardless of how you ve configured the client application source root. SWIPUBSVRDISPLAY is the display name for the streaming server. SWIPUBSVRYPE is the publishing server type: HTTP or RTSP. If using a secure protocol, the /secure switch must be used. SWIPUBSVRHOST is the IP address or host name of the publishing server. 9. On the Summary page, review the settings and click Next. 10. Click Finish. The App-V Client requires the following prerequisites on the client computer: Microsoft Application Error Reporting Microsoft Visual C SP1 Redistributable Package (x86) Microsoft Visual C SP1 Redistributable Package (x86) Microsoft Core XML Services (MSXML) 6.0 SP1 Add the Forefront Client Security Agent To add the Forefront client to a deployment share:the procedure title 1. If necessary, start the Deployment Workbench. Click Start, Microsoft Deployment Toolkit, Deployment Workbench. 2. If necessary, in the Deployment Workbench console tree, click Applications. 5
6 Applications is under Deployment Shares, Share Name, where Share Name is the name of the deployment share that you re configuring. 3. In the Actions pane, click New Application. 4. On the Application Type page, click Application with source files and click Next. 5. On the Details page, enter the following information, and click Next: Publisher: Microsoft Application Name: Forefront Client Security Version: x86 Language: English 6. On the Source page, click Browse, open the folder containing the Forefront client, and click then Next. 7. On the Destination page, click Next. 8. On the Command Details page, in the Command line box, type command to install the Forefront client silently, and then click Next. For example, type: ClientSetup /CG ForefrontClientSecurity /MS SEA-FCS-01 Where: /I InstallationFolder specifies the location in which you want to install Client Security. This parameter is optional. The default installation folder is %Program Files%\Microsoft Forefront\Client Security\client. Application Name: Forefront Client Security /L LoggingFolder specifies the location in which you want Client Security to log issues encountered during the installation. This parameter is optional. The default logging folder is %Program Files%\Microsoft Forefront\Client Security\client\logs. /NOMOM installs everything except the MOM agent. If you use the /NOMOM flag, do not use the /CG and /MS flags. /CG ManagementGroup specifies the name of the management group. If you do not specify the management group, the name will be retrieved automatically from the Client Security policy deployed to the client computer. This parameter must be used with the /MS parameter. /MS CollectionServer specifies the name of the collection server. If you do not specify the collection server, the name will be retrieved automatically from the Client Security policy deployed to the client computer. This parameter must be used with the /CG parameter. /R reinstalls the Client Security agent and the MOM agent. This parameter first verifies that the existing version is older than or equal to the currently installed version; then, it triggers a reinstall. 9. On the Summary page, review the settings and click Next. 10. Click Finish. 6
7 Add Asset Inventory Service Client To add the AIS client to a deployment share: 1. If necessary, start the Deployment Workbench. Click Start, Microsoft Deployment Toolkit, Deployment Workbench. 2. If necessary, in the Deployment Workbench console tree, click Applications. Applications is under Deployment Shares, Share Name, where Share Name is the name of the deployment share that you re configuring. 3. In the Actions pane, click New Application. 4. On the Application Type page, click Application with source files and click Next. 5. On the Details page, enter the following information, and click Next: Publisher: Microsoft Application Name: Asset Inventory Service Client 6. On the Source page, click Browse, open the folder containing the AIS client, and click Next. Note: The AIS client software installation package is unique to your enterprise and contains account identifiers, so you must download it from the AIS Web site after you have logged on with properly licensed account credentials. 7. On the Destination page, click Next. 8. On the Command Details page, type msiexec.exe /i SCOnlineClient.msi /q in the Command line box, and then click Next. 9. On the Summary page, review the settings and click Next. 10. Click Finish. Create a Task Sequence for Deployment To create a deployment task sequence: 1. If necessary, start the Deployment Workbench. Click Start, Microsoft Deployment Toolkit, Deployment Workbench. 2. In the Deployment Workbench console tree, click Task Sequences. Task Sequences is under Deployment Shares, Share Name, where Share Name is the name of the deployment share that you re configuring. 3. In the Actions pane, click New Task Sequence. 4. On the General Settings page, enter the following information, and click Next: Task sequence ID (such as: ODDeploy) Task sequence name (such as: Optimized Desktop Deployment Task Sequence) Task sequence comments (such as: This task sequence will be used to deploy the Microsoft Optimized Desktop Core Infrastructure) 5. On the Select Template page, click Next. 7
8 6. On the Select OS install, select a Windows 7 operating system image that you want to install, and then click Next. Note: This white paper assumes that you ve already stocked the deployment share with Windows 7 images. 7. On the Specify Product Key page, click Next. 8. On the OS Settings page, enter the following information, and click Next: Full Name (such as: WGBUser) Organization (such as: Woodgrove Bank) Internet Explorer Home Page (such as: 9. On the Admin Password page, type and confirm a password, and click Next. 10. On the Summary page, review the settings and click Next. 11. Click Finish. Customize the Task Sequence for Cached Office 2010Subsection Heading The last step is to add two custom actions to the task sequence. The first action adds Office 2010 to the App-V client by using the SFTMIME tool. To add an application, you specify the name of the package, the path to the application manifest, an XML file detailing information about the applications in the package, and the path to the SFT file which is the actual virtualized application bits. Finally, you define a logging path in case there are any problems with the command. The second action streams the package to the cache on the client computer. You need to specify the security context under which this SFTMIME command is run. Since the application is already added locally, you use the LOAD PACKAGE command with the path to the SFT file to manually stream the virtualized application to the client and cache it locally. To add custom actions for Office 2010 to the task sequence: 1. If necessary, start the Deployment Workbench. Click Start, Microsoft Deployment Toolkit, Deployment Workbench. 2. In the Deployment Workbench console tree, click Task Sequences. Task Sequences is under Deployment Shares, Share Name, where Share Name is the name of the deployment share that you re configuring. 3. Double-click the task sequence that you want to customize with Office In the Properties window, click the Task Sequence tab. 5. In the console pane of the task sequence, under State Restore, click Custom Tasks. 6. Click Add, General, Run Command Line. 7. Enter the following information into the custom task Properties pane, and click Apply: Name: Add Virtualized Application Package Command line: SFTMIME ADD PACKAGE: Microsoft Office 2010 Professional /MANIFEST xmlfile /OVERRIDEURL sftfile /LOG:logfile, where: 8
9 xmlfile is the path and file name of the package s manifest file. sftfile is the path and file name of the package s SFT file. logfile is the path and file name of the log file to create. Start in: C:\Program Files\Microsoft Application Virtualization Client Run this step as the following account: Enabled (Click Set to provide credentials) Organization (such as: Woodgrove Bank) Load the user s profile: Enabled 8. Click Add, General, Run Command Line. 9. Enter the following information into the custom task Properties pane, and click Apply: Name: Add Virtualized Application Package Command line: SFTMIME LOAD PACKAGE: Microsoft Office 2010 Professional /SFTPATH sftpath, where sftpath is the path and file name of the package s SFT file. Start in: C:\Program Files\Microsoft Application Virtualization Client Run this step as the following account: Enabled (Click Set to provide credentials) Load the user s profile: Enabled 10. Click OK to close the Properties window. Use DaRT to Customize the Windows Recovery Environment If you use an MDT 2010 task sequence to deploy BitLocker to a client computer as part of the deployment process, the Windows Recovery Environment (RE) will remain on the partition that is protected with BitLocker; therefore, it will be inaccessible when the F8 boot option is selected. To move the Windows RE image from default location on the C:\ drive of the computer during a Windows 7 deployment using MDT 2010, you can use a custom script to move this boot image file. This section also shows you how to incorporate the DaRT tools into the Windows RE environment to provide additional resources for service desk technicians to use to support client computers. Extract the Boot.wim File from an ERD To extract the boot.wim from an ERD: 1. Generate an Emergency Repair Disk (ERD) by using the DaRT ERD Commander. 2. Copy the boot.wim file from the Sources folder of the ERD to the Scripts directory of your deployment share (such as: D:\DeploymentShare\Scripts). 3. Rename the boot.wim file to winre.wim so that the Windows RE environment will work correctly. 9
10 Add the Custom Script Files to the Scripts Folder Accompanying this white paper are three scripts: ZCustomWindowsRE.wsf ( ZDiskPart1.txt ( ZDiskPart2.txt ( The ZCustomWindowsRE.wsf script moves the winre.wim file from the C:\MDT_DS\Scripts directory to the hidden BDEDrive partition on the client computer. It uses a scripted Diskpart command to unhide and hide this hidden partition along with the ZDiskPart text files. 1. Copy these three script files to the Scripts folder of your deployment share (such as: D:\DeploymentShare\Scripts). 2. Using Notepad, open the ZCustomWindowsRE.wsf script file from the Scripts folder of your deployment share and review the script. 3. Modify lines 136 and 137 of the ZCustomWindowsRE.wsf script file to support moving the newly created boot image to the correct location on the Windows 7 client computer (In Notepad, press Ctrl+G to go to a specific line number), and then save your changes: Line Before After 136 ologging.createentry "move " & ssyspath & "Recovery\winre.wim S:\Recovery\WindowsRE", LogTypeInfo 137 oexec.stdin.writeline "move " & ssyspath & "Recovery\winre.wim S:\Recovery\WindowsRE" ologging.createentry "copy " & sscriptroot & "\winre.wim S:\Recovery\WindowsRE", LogTypeInfo oexec.stdin.writeline "copy " & sscriptroot & "\winre.wim S:\Recovery\WindowsRE" Modify the New Deployment Task Sequence To add the customer script to the deployment task sequence: 1. If necessary, start the Deployment Workbench. Click Start, Microsoft Deployment Toolkit, Deployment Workbench. 2. In the Deployment Workbench console tree, click Task Sequences. Task Sequences is under Deployment Shares, Share Name, where Share Name is the name of the deployment share that you re configuring. 3. Double-click the task sequence that you created earlier. 4. In the task sequence s Properties window, click the Task Sequence tab. 5. In the console pane of the task sequence, under State Restore, click Custom Tasks. 6. Click the Add, General, Run Command Line. 7. Enter the following information into the custom task Properties pane, and click Apply: 10
11 Name: Install Windows RE with DaRT Command line: cscript.exe %SCRIPTROOT%\ZCustomWindowsRE.wsf 8. Click OK to close the Properties window. Configure Folder Redirection Folder Redirection enables specific folders within user profiles to be redirected to locations on network servers. Windows 7 supports the redirection of the following 13 folders found within user profiles: AppData\Roaming Documents Links Saved Games Videos Contacts Downloads Music Searches Desktop Favorites Pictures Start Menu Folder Redirection replicates file based information, and you configure it by using Group Policy. You can apply different settings to different organizational units (OUs) in Active Directory Domain Services (AD DS) to create customized solutions. Folder Redirection can also be used to significantly reduce the size of roaming user profiles, which results in faster logon/logoff times. Create and Share the Root Path Before configuring Folder Redirection, you must create and share a folder to which you want to redirect folders. Create a folder on the network and configure its access control list as shown in Table 1. Also, share the folder and give the security group of users that you re redirecting Full Control. User Account Creator Owner Administrator Security group of users that need to put data on share Minimum Permissions Required Full Control, Subfolders and Files Only None List Folder/Read Data, Create Folders/Append Data - This Folder Only 11
12 User Account Everyone Local System Minimum Permissions Required No Permissions Full Control, This Folder, Subfolders and Files Create GPO for Folder Redirection The procedure title 1. In the Group Policy Management Console, create and edit a new GPO called Folder Redirection. 2. In the Local Group Policy Editor, configure the following policy settings: Policy Location Value Use localized subfolder names when redirecting Start Menu and My Documents Verify old and new Folder Redirection targets point to the same share before redirecting Do not automatically make redirected folders available offline Use localized subfolder names when redirecting Start Menu and My Documents Computer Configuration\Policies\Administrative Templates\System\Folder Redirection Computer Configuration\Policies\Administrative Templates\Windows Components \Windows Explorer User Configuration\Policies\Administrative Templates\System\Folder Redirection User Configuration\Policies\Administrative Templates\System\Folder Redirection Enabled Enabled Enabled Enabled 3. Open User Configuration\Policies\Windows Settings\Folder Redirection, and do the following: a. Right-click AppData(Roaming) and click Properties. b. Select Basic Redirect everyone s folder to the same location. c. In the Root Path type the path of the network share to which you want to redirect folders (such as: \\SEA-DC-01\USERDATA$\). d. Click the Settings tab. e. Select the Also apply redirection policy to Windows 2000, Windows
13 Server, Windows XP, and Windows Server 2003 operating systems check box. f. Click Apply and in the warning click Yes. g. Click OK. 4. Repeat the previous steps for the following folders: Contacts Desktop Documents Downloads Favorites Links Music Pictures Saved Games Searches Start Menu Videos Configure Settings for Offline Files To configure settings for offline files: 1. Edit the Folder Redirection GPO you created in the previous section. 2. Open Computer Configuration\Policies\Administrative Templates\Network\Offline Files,and enable the following policy settings: Configure Background Sync Limit disk space used by offline files Exclude files from being cached: In the Extensions field, add *.MP4 Enable Transparent Caching Turn on economical application of administratively assigned Offline Files Configure Roaming User Profiles Roaming User Profiles enables user profiles to be stored in a folder shared from a network server and then downloaded to the user s computer whenever the user logs on using their domain credentials. After the profile has been downloaded and applied to the user s computer, the user will see his personalized desktop with all its application settings and operating system preferences, such as network drive mappings, printer connections, and wallpaper selections. When the user logs off, any updated profile information is uploaded to the network server. Roaming User Profiles replicates user profiles that contain both user data files and user settings (registry based information) to the server, and synchronizes it to users computers. It enables 13
14 users to log on to any managed computer on the network and download their profiles to experience their personalized desktop environments. Create and Share the Parent Folder Before configuring Roaming User Profiles, you must create and share a folder to which you want to store them. Create a folder on the network and configure its access control list as shown in Table 2. Also, share the folder and give the security group of users with Roaming User Profiles Full Control. User Account Creator Owner Administrator Security group of users needing to put data on share Everyone Local System Minimum Permissions Required Full Control, Subfolders and Files Only None List Folder/Read Data, Create Folders/Append Data - This Folder Only No permissions Full Control, This Folder, Subfolders and Files Configure Roaming user Profiles To configure Roaming User Profiles: 1. In the Group Policy Management Console, create and edit a new GPO called Roaming User Profiles. 2. Open Computer Configuration\Policies\Administrative Templates\System\User Profiles. 3. Enable Set roaming profile path for all users logging onto this computer. In the Options pane, type the path of the network share to which you want to store roaming user profiles (such as: \\SEA-DC-01\USERDATA$\%USERNAME%). 4. Enable Background upload of a roaming user profile s registry file while user is logged on. 5. Enable Set maximum wait time for the network if a user has a roaming user profile or remote home directory. 14
Microsoft User Experience Virtualization Deployment Guide
Microsoft User Experience Virtualization Deployment Guide Microsoft User Experience Virtualization (UE-V) is an enterprise-scalable user state virtualization solution that can provide users a consistent
More informationInstallation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationList of Virtual Machines Used in This Lab
INF204x Module 3 Lab1: Deploying Windows 10 to a New Computer by Using Microsoft Deployment Toolkit Lab: Using Microsoft Deployment Toolkit 2013 Update 1 Preview to Deploy Operating Systems Overview of
More informationDeploying Windows 8.1 with ConfigMgr 2012 R2 and MDT 2013
Deploying Windows 8.1 with ConfigMgr 2012 R2 and MDT 2013 Windows 8.1 Hands-on lab In this lab, you will learn how to deploy a Windows 8.1 image with ConfigMgr 2012 R2 and MDT 2013. Produced by Deployment
More informationEventTracker Manual Agent Deployment User Manual
EventTracker Manual Agent Deployment User Manual Publication Date: August 14, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract EventTracker agent deployment processes
More informationEnable the Always Offline Mode to Provide Faster Access to Files
Enable the Always Offline Mode to Provide Faster Access to Files 13 out of 16 rated this helpful - Rate this topic Published: April 18, 2012 Updated: July 3, 2013 Applies To: Windows 8, Windows 8.1, Windows
More informationEventTracker Manual Agent Deployment User Manual Version 7.x
EventTracker Manual Agent Deployment User Manual Version 7.x Publication Date: Nov 12, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract EventTracker Agent deployment
More informationms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm
Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management
More informationPassword Reset Utility. Configuration
Password Reset Utility Configuration 1 Table of Contents 1. Uninstalling Legacy Password Reset... 2 2. Password Reset Utility: How to deploy and configure via Group Policy... 2 3. Configuring Group Policy
More informationLab: Implementing SMS 2003 SP1 Features
Lab: Implementing SMS 2003 SP1 Features Objectives After completing this lab, you will be able to: Identify an SMS 2003 SP1 site. Implement SMS 2003 SP1 folders. Implement a configurable HTTP port in SMS
More informationDeploying Windows 7 Using MDT UDI
The Microsoft Deployment Toolkit (MDT) supports three types of deployments Zero Touch Installation (ZTI), Lite Touch Installation (LTI), and User Driven Installation (UDI). However each deployment type
More informationExam Questions
Exam Questions 70-685 Pro: Windows 7, Enterprise Desktop Support Technician https://www.2passeasy.com/dumps/70-685/ 1.Portable computer users report that they can use Internet Explorer to browse Internet
More informationInstalling and Configuring VMware User Environment Manager
Installing and Configuring VMware User Environment Manager VMware User Environment Manager 9.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationUpgrade to Office 365 ProPlus
Upgrade to Office 365 ProPlus Page 1 Index 1 Purpose of this document... 3 2 Assumptions... 3 3 Create and Distribute Office 365 ProPlus 2016... 5 3.1 Prepare the Office 365 ProPlus installation files
More informationManaging Group Policy application and infrastructure
CHAPTER 5 Managing Group Policy application and infrastructure There is far more to managing Group Policy than knowing the location of specific policy items. After your environment has more than a couple
More informationRAP as a Service Active Directory Security: Prerequisites
RAP as a Service Active Directory Security: Prerequisites This document explains the required steps to configure the RAP as a Service for Active Directory Security. There are two scenarios available to
More informationIBM Endpoint Manager. OS Deployment V3.5 User's Guide
IBM Endpoint Manager OS Deployment V3.5 User's Guide IBM Endpoint Manager OS Deployment V3.5 User's Guide Note Before using this information and the product it supports, read the information in Notices
More information6293A Troubleshooting and Supporting Windows 7 in the Enterprise
6293A Troubleshooting and Supporting Windows 7 in the Enterprise Course Number: 6293A Course Length: 3 Days Course Overview This course is designed for Information Technology (IT) professionals who have
More informationDOWNLOAD PDF REDIRECT FOR WINDOWS 7
Chapter 1 : Deploy Folder Redirection with Offline Files Microsoft Docs From your description, it sounds as if you cannot access the redirection path in Windows Explorer, is that correct? before folder
More informationCisco TelePresence Management Suite Extension for Microsoft Exchange
Cisco TelePresence Management Suite Extension for Microsoft Exchange Administrator Guide Software version 2.2 D14197.06 February 2011 Contents Contents... 2 Introduction... 4 Pre-Installation Information...
More informationChoosing an Appropriate User State Virtualization Solution
Choosing an Appropriate User State Virtualization Solution Microsoft Windows Family of Operating Systems Microsoft Corporation Published: May 2010 Abstract User state virtualization describes the separation
More informationInstalling and Configuring VMware User Environment Manager. VMware User Environment Manager 9.2
Installing and Configuring VMware User Environment Manager VMware User Environment Manager 9.2 Installing and Configuring VMware User Environment Manager You can find the most up-to-date technical documentation
More informationCOPYRIGHTED MATERIAL. Contents. Assessment Test
Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home
More informationVMware Mirage Web Manager Guide
Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationInstalling and Configuring VMware User Environment Manager. VMware User Environment Manager 9.3
Installing and Configuring VMware User Environment Manager VMware User Environment Manager 9.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationVMware Mirage Getting Started Guide
Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationWindows 7, Enterprise Desktop Support Technician
Windows 7, Enterprise Desktop Support Technician Course 50331D; 5 days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills needed to isolate,
More informationVMware View Persona Management DEPLOYMENT GUIDE
VMware View Persona Management DEPLOYMENT GUIDE Table of Contents Introduction to View Persona Management.... 3 User Profiles.... 3 Advantages of View Persona Management.... 3 System Requirements and Recommended
More informationDeploying a System Center 2012 R2 Configuration Manager Hierarchy
Deploying a System Center 2012 R2 Configuration Manager Hierarchy This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION
More informationQ&A. DEMO Version
Managing and Maintaining Windows 8 Q&A DEMO Version Copyright (c) 2013 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag
More informationSetting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000
Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify
More informationProvisioning the K1000 Agent
Provisioning the K1000 Agent Agent provisioning is the task of installing the K1000 Agent on devices you want to add to K1000 inventory using the Agent. About the K1000 Agent The K1000 Agent is an application
More informationUSER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5
USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationVMware Mirage Web Management Guide. VMware Mirage 5.9.1
VMware Mirage Web Management Guide VMware Mirage 5.9.1 VMware Mirage Web Management Guide You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The
More informationInstallation and configuration guide
Winfrasoft HAS Installation and Configuration Guide Installation and configuration guide Winfrasoft HAS for Microsoft Forefront UAG 2010 Published: October 2011 Applies to: Winfrasoft HAS (Build 2.0.2300.4)
More informationCourse Outline 20742B
Course Outline 20742B Module 1: Installing and configuring domain controllers This module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations
More informationIBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute)
IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) Note Before
More informationAcronis Backup & Recovery 11 Beta Advanced Editions
Acronis Backup & Recovery 11 Beta Advanced Editions Quick Start Guide Table of contents 1 Main components... 3 2 Supported operating systems... 3 3 Where do I install the components?... 3 4 What you need
More informationDesktop DNA r11.1. PC DNA Management Challenges
Data Sheet Unicenter Desktop DNA r11.1 Unicenter Desktop DNA is a scalable migration solution for the management, movement and maintenance of a PC s DNA (including user settings, preferences and data).
More informationPearson System of Courses (PSC) Deploying PSC with System Center Configuration Manager (SCCM) for Windows
Pearson System of Courses (PSC) Deploying PSC with System Center Configuration Manager (SCCM) for Windows Table of Contents Deployment Process Overview...3 Prerequisites and Assumptions:...4 1. PSC Prerequisites...
More informationDeploying Windows Devices and Enterprise Apps
Course 20695A: Deploying Windows Devices and Enterprise Apps Course Details Course Outline Module 1: Assessing the Network Environment for Supporting Operating System and Application Deployment This module
More informationSupporting Windows Vista and Applications in the Enterprise COURSE OVERVIEW PREREQUISITES AUDIENCE OBJECTIVES COURSE OUTLINE. Course No.
COURSE OVERVIEW This course provides IT Professionals with the knowledge and skills to support the Windows Vista operating system and applications in the Enterprise. You will learn how to configure and
More informationIdentity with Windows Server 2016
Identity with Windows Server 2016 Course 20742B - 5 Days - Instructor-led, Hands on Introduction This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain
More informationInstall and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.
Install and upgrade Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik
More informationPASS4TEST 専門 IT 認証試験問題集提供者
PASS4TEST 専門 IT 認証試験問題集提供者 http://www.pass4test.jp 1 年で無料進級することに提供する Exam : 70-697 Title : Configuring Windows Devices Vendor : Microsoft Version : DEMO Get Latest & Valid 70-697 Exam's Question and Answers
More informationDeploying Windows Devices and Enterprise Apps
Deploying Windows Devices and Enterprise Apps Course 20695B - Five days - Instructor-led - Hands-on Introduction This 5-day instructor-led course describes how to assess operating system and application
More informationGetting Started with VMware View View 3.1
Technical Note Getting Started with VMware View View 3.1 This guide provides an overview of how to install View Manager components and provision virtual desktops. Additional View Manager documentation
More informationGroup Policy settings and preferences
CHAPTER 6 Group Policy settings and preferences Rather than having to configure settings such as mapped network drives and configured network printers on a per-computer basis, Group Policy enables you
More informationKYOCERA Net Admin Installation Guide
KYOCERA Net Admin Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for
More informationEML10 Best Practces for Implementing Deployment Solution Hands-On Lab
EML10 Best Practces for Implementing Deployment Solution Hands-On Lab Description This hands-on lab demonstrates the steps necessary to configure and use the latest version of Deployment Solution. You
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
More informationMCSA Windows 10. A Success Guide to Prepare- Microsoft Configuring Windows Devices. edusum.com
70-697 MCSA Windows 10 A Success Guide to Prepare- Microsoft Configuring Windows Devices edusum.com Table of Contents Introduction to 70-697 Exam on Microsoft Configuring Windows Devices... 2 Microsoft
More informationLepideAuditor for File Server. Installation and Configuration Guide
LepideAuditor for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationActive Directory Services with Windows Server
Active Directory Services with Windows Server 10969B; 5 days, Instructor-led Course Description Get hands on instruction and practice administering Active Directory technologies in Windows Server 2012
More informationAdministration Guide - NetApp File Archiver
Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method
More informationM20742-Identity with Windows Server 2016
M20742-Identity with Windows Server 2016 Course Number: M20742 Category: Technical Microsoft Duration: 5 days Certification: 70-742 Overview This five-day instructor-led course teaches IT Pros how to deploy
More informationCourse CLD221x: Enabling Office 365 Clients
Course CLD221x: Enabling Office 365 Clients Student Lab Manual Lab Design There are five exercises in this lab, each of which contains one or more tasks. For a successful outcome to the lab, the exercises
More informationImplementing a Desktop Infrastructure
Implementing a Desktop Infrastructure Duration: 5 Days Course Code: 20415 About this course This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement
More informationTS: Windows Server 2008 R2, Desktop Virtualization
TS: Windows Server 2008 R2, Desktop Virtualization Number: 070-669 Passing Score: 700 Time Limit: 120 min File Version: 1.2 http://www.gratisexam.com/ Microsoft EXAM 70-669 TS:Windows Server 2008 R2,Desktop
More informationVendor: Microsoft. Exam Code: Exam Name: Implementing a Desktop Infrastructure. Version: Demo
Vendor: Microsoft Exam Code: 70-415 Exam Name: Implementing a Desktop Infrastructure Version: Demo Testlet 1 Proseware Inc Overview Proseware, Inc. is an independent software vendor. The company has a
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain Services (Course 6425A)
Duration Five days Introduction This five-day instructor-led course provides to teach Active Directory Technology Specialists with the knowledge and skills to configure in a distributed environment, implement
More informationVMware User Environment Manager SyncTool Administration Guide. VMware User Environment Manager 9.1
VMware User Environment Manager SyncTool Administration Guide VMware User Environment Manager 9.1 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/
More informationWindows Client, Enterprise Desktop Support Technician
Course 50331D: Windows Client, Enterprise Desktop Support Technician Page 1 of 11 Windows Client, Enterprise Desktop Support Technician Course 50331D: 3 days; Instructor-Led Introduction (Updated for Windows
More informationForeScout Extended Module for IBM BigFix
ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...
More informationManually Refresh Group Policy Server 2008 R2
Manually Refresh Group Policy Server 2008 R2 Windows Xp To deploy printer connections to users or computers by using Group Policy, Windows adds the printer connections during background policy refresh.
More informationTzunami Deployer Lotus Notes Exporter Guide
Tzunami Deployer Lotus Notes Exporter Guide Version 2.5 Copyright 2010. Tzunami Inc. All rights reserved. All intellectual property rights in this publication are owned by Tzunami, Inc. and protected by
More informationIdentity with Windows Server 2016
Identity with Windows Server 2016 20742B; 5 days, Instructor-led Course Description This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain Services (AD
More informationPractical 23 Manage Desktop Configuration using group policy and remote installation services.
Practical 23 Manage Desktop Configuration using group policy and remote installation services. Group Policy Collection:- Group Policy is an infrastructure that allows you to implement specific configurations
More informationApplication Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode.
Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode. Abstract This Application Note describes the steps required for installing and configuring
More informationLab: Deploying Operating System Images Using SMS 2003
Lab: Deploying Operating System Images Using SMS 2003 Objectives After completing this lab, you will be able to: Install the OS Deployment Feature Pack. Install USMT 2.6 to capture and restore user state
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationPart I. Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL
Part I Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL Chapter 1 What s New in Windows XP? Windows XP suffers somewhat from a dual personality. In some ways it is a significant release,
More information20742: Identity with Windows Server 2016
Course Content Course Description: This five-day instructor-led course teaches IT Pros how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More informationMCSE- Windows Server 2012
COURSE CONTENT MCSE- Windows Server 2012 Course 20413C: Designing and Implementing a Server Infrastructure 1. Planning Server Upgrade and Migration Considerations for Upgrades and Migrations Creating a
More informationMETHODOLOGY This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises.
CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: IDENTITY WITH WINDOWS SERVER 2016 Course 20742: 5 days; Instructor-Led INTRODUCTION This five-day instructor-led course teaches IT Pros how to deploy and configure
More informationSecure Mobile Access Module
Secure Mobile Access Module Administration Guide Version 1.0 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800)
More information"Charting the Course... MOC B Implementing a Desktop Infrastructure. Course Summary
Course Summary Description This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and implement a Windows 8 desktop infrastructure. The course provides guidance
More informationSupporting and Troubleshooting Windows 10 va. Overview
Supporting and Troubleshooting Windows 10 va Overview This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows
More informationImplementing a Desktop Infrastructure
Course 20415: Implementing a Desktop Infrastructure Page 1 of 7 Implementing a Desktop Infrastructure Course 20415: 4 days; Instructor-Led Introduction This 4-day instructor-led course provides you with
More informationDEPLOY PERSYSTENT AGENT
Persystent Suite 6.0 DEPLOY PERSYSTENT AGENT Best Practices Persystent Suite supports no-touch installation for existing client computers. Installing Persystent Suite on your existing computers will help
More informationManaging Windows-based Dell Wyse Thin Clients using System Center Configuration Manager Administrator s Guide
Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager 2016 Administrator s Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps
More informationThis video is part of the Microsoft Virtual Academy.
This video is part of the Microsoft Virtual Academy. 1 In this session we re going to talk about building for the private cloud using the Microsoft deployment toolkit 2012, my name s Mike Niehaus, I m
More informationMonitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker
Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Publication Date: June 12, 2012 Abstract EventTracker allows you to effectively manage your systems and provides operational efficiencies
More informationXIA Links. Administrator's Guide. Version: 3.0. Copyright 2017, CENTREL Solutions
Administrator's Guide Version: 3.0 Copyright 2017, CENTREL Solutions Table of contents About... 4 Installation... 6 Installation Requirements (Server)... 7 Prerequisites (Windows Server 2016)... 9 Prerequisites
More informationVMware User Environment Manager SyncTool Administration Guide
VMware User Environment Manager SyncTool Administration Guide VMware User Environment Manager 9.2 This document supports the version of each product listed and supports all subsequent versions until the
More informationPrinter and Driver Management
2017 PrinterLogic, All Rights reserved. Business Problem From an end user s perspective, printing is easy click Print and pick up the document at a nearby printer. What they don t know is all that s involved
More informationIntegrate Veeam Backup and Replication. EventTracker v9.x and above
Integrate Veeam Backup and Replication EventTracker v9.x and above Publication Date: September 27, 2018 Abstract This guide provides instructions to configure VEEAM to send the event logs to EventTracker
More informationUsing the Orchestration Console in System Center 2012 R2 Orchestrator
Using the Orchestration Console in System Center 2012 R2 Orchestrator Microsoft Corporation Published: November 1, 2013 Applies To System Center 2012 - Orchestrator Orchestrator in System Center 2012 SP1
More informationZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018
ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationDeploying Windows Mobile 6 with Windows Small Business Server 2008
Deploying Windows Mobile 6 with Windows Small Business Server 2008 Microsoft Corporation Draft: October, 2008 Abstract This document provides step-by-step instructions for deploying devices powered with
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationInstallation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:
EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install
More informationREVISED 1 AUGUST REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes and later
REVISED 1 AUGUST 2018 REVIEWER'S GUIDE FOR VMWARE APP VOLUMES VMware App Volumes 2.13.1 and later Table of Contents Introduction Audience What You Will Learn Navigating This Document for App Volumes Use
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationIMPLEMENTING A DESKTOP INFRASTRUCTURE. Course: 20415A Duration: 5 Days; Instructor-led
CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: IMPLEMENTING A DESKTOP INFRASTRUCTURE Course: 20415A Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This 5-day instructor-led course provides you with
More informationREVISED 1 AUGUST QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes and later
REVISED 1 AUGUST 2018 QUICK-START TUTORIAL FOR VMWARE APP VOLUMES VMware App Volumes 2.13.1 and later Table of Contents Introduction Audience What You Will Learn Navigating This Document for App Volumes
More informationDeploying Windows Desktops and Enterprise Applications. Course Code: 20695D; Duration: 5 days; Instructor-led
Deploying Windows Desktops and Enterprise Applications Course Code: 20695D; Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course is intended for IT professionals who deploy, manage,
More informationTestpassport.
Testpassport http://www.testpassport.cn Exam : 70-688 Title : Managing and Maintaining Windows 8.1 Version : Demo 1 / 10 1.DRAG DROP Your company recently purchased 25 new laptops. All 25 laptops have
More information