I recently had a request from a client to add a description to the computer account entry in AD during the build process. The client required both the serial number of the machine and the model of the machine to be recorded in the description field of the AD computer account properties. I had seen a number of different ways of doing this in the past but wanted something that was quick an easy to implement that didn’t require a webservice or a editing the MDT xml files. Continue reading
One of the steps during the creation of the master Windows 7 or Windows 8 image is to patch the machine up to the latest set of released updates. I normally automate this as part of the build and capture process using and internal WSUS server however, I recently had a situation where the client I was working for didn’t have an internal WSUS server and was using a third party tool to patch their estate, as this required the installation of a client on the PC it wasn’t something I wanted to use during the build and capture process. Continue reading
During a recent migration from Windows XP to Windows 7 I had a couple of machines that were failing the user state capture part of the build process. The machines would start the user state capture and looked as though it was running, however after a couple of minutes the process would fail. Continue reading
In a previous post I showed you how to create a routable test environment using Windows Server 2008R2 and RRAS, since that post I have upgraded my laptop to Windows 8 to take advantage of the built in Hyper-V feature so I didn’t have to dual boot my system. This got me thinking about how I could setup a routable network on Windows 8 now that I didn’t have RRAS. I came across a piece of software called Vyatta which enables you to create virtual switches/routers to do this. This guide will show you how to setup a simple routable network on Windows 8 with Hyper-V and a Vyatta switch. Continue reading
One thing I have noticed when visiting different sites is that a lot of organisations are now moving away from the traditional method of delivering applications to the end user. Whilst there are still organisations installing applications physically on devices, more and more are now taking the approach of streaming applications to the end user. This is a great way to deliver applications if you are in an environment where users move around between desks or buildings. In the main most are using Citrix Xenapp to do this, however Microsoft also have a tool on the market capable of doing this – App-v. Continue reading
In the first part of this guide, I covered the initial configuration of primary site server and extending the AD schema. In the second part of the guide, I will cover the steps taken to install and configure a primary site server.
*Updated for SCCM 2012 SP1
I have previously published a series of posts around planning and deploying SCCM 2007, with the release of SCCM 2012, I thought that I would again put together a series of posts that will hopefully provide you with some guidance when installing SCCM 2012. Continue reading
One of the limitations I have found with having a lab environment running on a single machine is that everything is configured to use the same subnet. If you are fortunate enough to have a lab environment with switches and multiple network cards to allow you to have more realistic network environment i.e. multiple vlan’s then this isn’t an issue.
However in my case I am running everything from a single machine and recently found myself wanting to test setting up SCCM 2012 across multiple subnets to imitate a real world setup. After much digging around on the internet and reading numerous posts I had a plan for what needed to be done. Continue reading
One thing I have been looking at recently has been the ability to open Access database files with an older version of Access on a computer running Access 2010. The obvious solution here is to virtualise the older version of Access so that the two versions can run simultaneously which is a pretty straight forward excercise and works quite well. The next step is to then have the required database file open with the correct version of access.
I recently did some work on a project where the client wanted to enable Bitlocker as part of the build process, as part of this process the TPM chip also needed to be enabled as by default it is switched off. The enabling of Bitlocker and the TPM chip as part of the build process is relatively straight forward and there are plenty of examples of how to do this already available. However one thing that has caused problems in the past is what happens if the TPM chip is already enabled? Past experience has shown that if the TPM chip is already enabled then the step to enable the TPM chip will fail and if the option to continue on failure is not checked the task sequence will exit. Continue reading