CHAPTER 22
Operating System Deployment

One of an organization’s most difficult information technology (IT) tasks is managing operating systems (OSs); this includes upgrading to new versions, migrating to new hardware, performing clean installs, and more. To help address these needs, Microsoft includes operating system deployment (OSD) components in System Center Configuration Manager (ConfigMgr). ConfigMgr first included OSD components with ConfigMgr 2007. OSD was refined in ConfigMgr 2012 and continues to be enhanced with ConfigMgr Current Branch to meet today’s many needs from an OSD perspective.

OSD involves delivering a mass deployment of a new instance of the Windows OS to compatible devices. While that may seem simple, due to the philosophy and architecture of Windows, it is not always as easy as it sounds. Mass delivery of the Windows OS is nothing new; enterprises have been creating an image of a single system and copying it to other systems since Windows became the de facto standard OS for businesses.

Following are some reasons OSD is the tool to use for this task:

images OSD is about automating the entire process, from image creation and image maintenance to actual image deployment.

images OSD is not just about creating and deploying an image. It is an entire process that allows you to define actions before the image is applied to a system. This includes partitioning and formatting the drive or even BIOS upgrades and actions after applying the image, such as software update installation or application deployment.

images OSD is dynamic, enabling different yet automatic deployment time behavior based on an unbounded set of criteria, including hardware type, location, and intended user or system roles.

images OSD is extensible to meet the needs of any organization. The Microsoft Deployment Toolkit (MDT) and its subset feature, User Driven Installation (UDI), are excellent examples of this extensibility.

images OSD is integrated into ConfigMgr, enabling you to utilize the other powerful features of the product, including software distribution, software updates, and reporting, all from a single management console in a seamless manner.

This chapter covers OSD in depth, including applicable scenarios, detailed use, guidance, best practices, and troubleshooting. This single chapter cannot and does not cover the complete range of information and knowledge required to deploy Windows fully in an enterprise environment, nor does it cover supplemental tools such as MDT.

What’s New with OSD in Current Branch

While OSD has not changed much from its original concept, each new version of ConfigMgr fixes issues, adds new features, and has tweaks to code so that it performs better. These new features give OSD a rich set of commands, variables, and task sequence (TS) items. The following items are new to ConfigMgr Current Branch:

images Upgrade an Operating System from an Upgrade Package: This TS type, found in the Create Task Sequence Wizard, creates steps to upgrade systems from Windows 7, 8, and 8.1 to Windows 10.

images WinPE Peer Cache: This allows systems running a TS to download content from a local peer machine while in Windows Preinstallation Environment (WinPE).

images Windows 10 Servicing: While not completely an OSD item, Windows 10 servicing allows you to upgrade Windows 10 devices from one version of the Semi-Annual Channel to another version, using the software updates feature. For a complete overview of this process, which can help keep your Windows 10 devices current, see Chapter 15, “Managing Software Updates.”

images Evaluate Software Updates from Cached Scan Results: This is a check box in the Install Software Updates TS step. If it is unchecked, the system can connect to the software update point (SUP) and download the latest software updates catalog to scan against and determine what software updates are needed.

images The SMSTSSoftwareUpdateScanTimeout Variable: This TS variable controls the timeout for the software updates scan during the install software updates TS step.

images OSDPreserveDriveLetter Variable Has Been Deprecated: This TS variable allowed you to choose the drive letter to use during OSD; this is now automatically determined by Windows Setup.

images Customize the RamDisk TFTP Window Size: You can customize the window size for the RamDisk Trivial File Transfer Protocol (TFTP) when using Preboot eXecution Environment (PXE), so you can optimize the traffic across the network.

images The TSUEFIDrive Variable: This variable allows you to customize an OSD TS so the restart computer step prepares a FAT32 partition on the hard drive for transition to Unified Extensible Firmware Interface (UEFI).

images Prepare ConfigMgr Client for Capture TS Step: This step now completely removes the Configuration Manager client instead of only removing key information.

images Secure Boot Information Is Now Collected with Hardware Inventory: There is a new WMI class called SMS_Firmware, which allows ConfigMgr to collect the UEFI and secure boot information from machines that have these newer updates to their hardware. This class is enabled by default in the hardware inventory classes.

images Collapsible Task Sequence Groups: This new item allows you to collapse or expand groups with a TS. This can be a big benefit for large TSs with many groups inside them. Collapsing allows the user to more easily focus on specific areas of the TS. The groups can be expanded or collapsed all at once with buttons at the top of the TS, or they can be expanded or collapsed individually with the plus (+) or minus (-) on the left-hand side of the TS.

images Reload Boot Images with the Current WinPE Version: The 1706 version of ConfigMgr Current Branch provides the option to reload the latest version of WinPE installed on the machine with the Windows Assessment and Deployment Kit (ADK) when you update your distribution points (DPs). When choosing to update the boot image on the DPs, a new wizard page is displayed that shows the current version of the boot image, OS version, and ConfigMgr client version, as well as the installed version of the ADK. To update to the newer ADK version, select the check box at the bottom of the screen, and the boot image will be updated using the ADK version that is installed.

OSD Deployment Scenarios

Microsoft defines four Windows deployment scenarios, which generally encompass how to deploy Windows to any organization. Minor variations are possible, and implementation details may vary depending on the tools used or your deployment goals. These are the four scenarios:

images Upgrade: Involves an in-place upgrade of the current OS to a new OS. It preserves user data and applications, and some consider it the best choice when moving an organization to a new OS. The downside is it preserves misconfigurations, unauthorized software, and any existing malware.

images New Computer: This name is a little misleading as it can apply to new systems out of the box or to those that are being completely reloaded. Its distinguishing factor is that any user data and applications on an existing system are ignored. Often referred to as bare-metal or wipe-and-load, this scenario assumes that nothing on the system is valid, and the system should be built from scratch or bare metal.

images Refresh: Involves installing a fresh, new OS on an existing system while preserving applicable user data and reinstalling authorized applications—in effect refreshing just the OS. This reload can result in a variety of situations:

images The version of Windows is updated from an older version to a newer version.

images The current OS installation is broken beyond repair.

images The OS installation does not meet current standards.

TIP: CONFUSING UPGRADE AND REFRESH SCENARIOS

The upgrade and refresh scenarios sound similar and even have similar results; however, they are very different. The upgrade scenario literally runs setup.exe in the existing OS, with Windows Setup upgrading the OS in-place. The refresh scenario backs up the user data, wipes the disk (not necessarily formatting it), installs a clean version of Windows, and adds back the user data.

images Replace: While similar to the refresh scenario, the replace scenario involves replacing the physical system. It also preserves applicable user data and reinstalls authorized applications.

NOTE: ORIGINAL EQUIPMENT MANUFACTURER IMAGES

Another scenario is similar to the new computer scenario in that the current user state is not involved. However, this scenario is explicitly for new systems delivered from the original equipment manufacturer (OEM)/vendor. It involves delivering a seed image to the OEM for use during the factory’s system build process. Because the OEM cannot join a system to your domain or install applications from your internal network, the seed image, once booted, kicks off the rest of the process when the system is physically on your internal network, finishing the deployment. The disadvantage is that you will probably end up maintaining at least two sets of images: one for in-house scenarios, and one for the OEM scenario. Each vendor may also have varying states of support, procedures, and supplemental tools for this method. Contact your vendor for guidance and recommendations before pursuing this option.

Tools Used with OSD

OSD relies on additional tools to help complete the process of deploying the Windows OS. Some are built into OSD; others are installed as part of prerequisites to installing ConfigMgr Current Branch. Knowing how OSD uses these tools and each tool’s function is beneficial—perhaps even critical—for setting up a deployment and troubleshooting any problems. Tools include System Preparation (Sysprep), the Windows Assessment and Deployment Kit (ADK), and the User State Migration Tool (USMT), covered in the next sections.

Using Sysprep to Assist with Imaging

The Microsoft tool Sysprep removes system-specific information from the OS so it can be used to image multiple devices. It also configures the installation to run the GUI-based mini-setup when the system restarts. The mini-setup does the following:

images Generates new and unique identifiers for the system

images Enables the input of a new Windows product key

images Reruns the plug-and-play hardware detection

images Reruns the driver installation process

OSD fully automates the mini-setup process with the unattend.xml configuration file. It builds the appropriate file or uses one that is supplied, inserting information automatically into the file, including the product key, organization name, networking information, and domain credentials. Incorporating this functionality increases OSD’s flexibility by eliminating the need to maintain multiple Sysprep files supporting multiple deployment scenarios.

Incorporating the Windows ADK

The Windows ADK, a prerequisite to installing ConfigMgr, is a set of tools designed to automate a Windows installation. It is a separate download and includes the WinPE 10 boot images. ConfigMgr automatically uses some of these tools (such as ImageX and the Deployment Image Servicing and Management [DISM] tool) during the deployment process. The ADK includes user guides on how to use these tools, reference documents on the unattended setup file, and WinPE.

Using OSD fully automates and completely integrates the many details of using the tools in the ADK. You can also use it to manipulate images outside OSD. The tools in the ADK follow:

images WinPE: A mini-operating system based on Windows 10, WinPE includes support for networking, Windows Management Instrumentation (WMI), VBScript, batch files, and database access. Its advantage is that it is much smaller than the full-blown OS, loads from a read-only disk, and runs in a RAM disk (a minimum of 512MB of memory is required for the version of WinPE included with and used by OSD in ConfigMgr) suitable for booting from a CD/DVD or over the network using PXE. OSD uses WinPE as a boot environment, ensuring that the currently installed operating system will not interfere with the deployment process.

images Windows System Image Manager (WSIM): This GUI tool builds unattended answer files for Windows. You do not need to worry about the syntax of the answer file because WSIM graphically presents all available options and generates the unattend.xml file for you. This same file format is utilized for Sysprep files used by the mini-setup to complete setup of Windows systems.

images Deployment Image Servicing and Management: This command-line tool manually services and manages Windows and WinPE images. Servicing changes an image’s content; managing involves listing the content of the image file or combining two image files together. Servicing specifically includes adding updates and drivers to the image; OSD uses DISM for both. Images can be offline or online; offline can be in a Windows Imaging (WIM) file or extracted to disk, making managing many aspects of Windows seamless, regardless of where the OS is located or its state.

Microsoft ties the ADK to the version of Windows you are using but makes it backward compatible; for example, the Windows 8 version of the ADK works with Windows 8 and Windows 7, so the question is when to upgrade the ADK. The authors recommend upgrading when you upgrade Windows; this lets you keep everything tightly integrated with support for the current version and backward compatibility with older versions of Windows that are not yet upgraded.

Using the User State Migration Tool

USMT is an extensive tool that searches a system for all user data and settings and packages them into a single archive file for import onto another system, restoring user data and settings. USMT’s default configuration captures all known Microsoft-centric settings and data, such as wallpaper, color scheme, Microsoft Office documents, favorites, and all files in the user’s Documents folder. You can customize these defaults based on your requirements. USMT is part of the Windows 10 ADK and is installed when the ADK is installed. It is also a prerequisite for ConfigMgr installation. Microsoft provides documentation on USMT at https://technet.microsoft.com/itpro/windows/deploy/usmt-reference.

The information USMT captures is highly customizable by modifying or creating a series of Extensible Markup Language (XML) configuration files that describe the files, folders, and Registry entries to capture; you can specify exact filenames and Registry locations or perform wildcard searches to locate data or settings in these files. USMT uses these configuration files to capture all specified data and settings and place them into an archive used to restore to a destination system. To accomplish this, USMT uses the following tools:

images LoadState.exe

images ScanState.exe

As their names imply, ScanState.exe captures the data and settings whereas LoadState.exe restores them.

Planning for OSD

Planning is key to the success or failure of OSD. The old saying An ounce of prevention is worth a pound of cure is extremely accurate here. If not planned and tested thoroughly, OSD can be a major problem instead of a cost-saving move for your organization. Planning involves defining the who, what, and when of Windows deployment for your organization. The answers to the following questions will guide how you go about technically implementing the process and making it work.

images Who: Who are you deploying Windows to—or for? To your entire organization or a subset? Who initiates deployment to each system? End users, field technicians, you, or someone else?

images What: What OS are you deploying? What version and edition? Do different users or systems get different versions or editions? What applications will be deployed with the OS? Will they differ for different user or system roles? Are there other customizations to make to the OS or applications? To which hardware models are you deploying?

images When: When will you deploy? Do you need to meet a deadline? Are you going to deploy during the day or after hours?

images Other: Do you care about user data? How does your organization update Windows and other software? What other desktop standards must be part of a Windows deployment?

These questions and their answers will guide your efforts; the answers provide a blueprint for your Windows rollout. Depending on your organization, you may not be able to answer all these questions yourself, and it may take time to gain consensus from all the key players. Knowing the answers ahead of time will save you work or rework later.

When you understand the requirements and are equipped with the answers to the previous questions, you can move forward. The following items may assist in this planning process:

images Preparation: You need to start gathering the needed resources, importing them into your ConfigMgr lab, and performing any necessary ConfigMgr changes to meet those requirements. Resources include OS source media, application source files, drivers, configuration scripts, test systems, and storage space. Many of these must be imported into ConfigMgr for use in OSD. Based on your organization’s physical nature, you may need to add site systems or modify current site systems. For example, to support PXE, you may need to add that role to your DPs as well as modify the network to allow PXE packets to cross routers.

images Creation: The core of the OSD process is putting in place all the requirements to deploy Windows. This part of the process is usually the second-most time-consuming step. It involves taking all the information gathered so far and putting it together to form a Windows image you can use for testing. This is often a repetitive process, involving building a basic structure, testing, adding to the basic structure, testing again, and so on. As requirements change, the repetitive process continues even after implementing OSD into production.

images Testing: This is the most time-consuming process of OSD. It is a self-explanatory step that is often overlooked and rarely given the time or attention it deserves. So many different permutations and factors exist even in smaller and simpler environments that you can probably never test all of them; however, not properly and thoroughly testing as many as possible results in poor results, lost data, and sleepless nights. Test against every scenario and hardware model possible for your organization. While it may seem that much of your time is watching progress bars or waiting for the OS image to download, without this testing, you will never actually know if your design work will result in the desired outcome of properly deployed Windows that meets all your requirements.

Be sure to perform all your imports and testing in a lab environment. You may find that you did not need all those drivers after all, or maybe you do not need to modify your WinPE image. Once testing is complete and you have a successful image, move all the needed items over to your production hierarchy.

Using the Console

The ConfigMgr console has many sections that form the OSD area. Knowing these sections and how they are used can help you understand how to fit them together to create and deploy your image. To access the OSD area of the console, navigate to Software Library -> Overview -> Operating Systems. Several sections are listed in this area, as shown in Figure 22.1.

OSD section of the ConfigMgr console is shown.

FIGURE 22.1 OSD section of the console.

Using Drivers and Driver Packages

Windows setup is very good at installing the correct drivers needed for Windows OS deployment; however, certain hardware components require a manufacturer’s driver to function correctly. You must import these drivers into the ConfigMgr driver catalog in order for them to be available to OSD. Each imported driver must be part of a driver package distributed to the DPs, where the OSD process downloads the driver. The driver package can be pre-created before the driver import or as part of the import. Not all drivers added to the catalog are used; Windows setup makes the ultimate decision about which of them to install and use. The process of importing the drivers into ConfigMgr is handled by the Import New Driver Wizard, accessed by navigating to Software Library -> Overview -> Operating Systems -> Drivers and choosing Import Driver either from the ribbon bar or after right-clicking Drivers. Figure 22.2 displays the Import New Driver Wizard.

A screenshot shows Locate Driver page of the Import New Driver Wizard dialog box.

FIGURE 22.2 The Import New Driver Wizard.

The wizard has seven pages, three of which are the standard Summary, Progress, and Completion pages included in all ConfigMgr wizards. The following sections cover the pages that are unique to this wizard.

Locate Driver Page

The Locate Driver page of the wizard has three options for the user to complete:

images Import All Drivers in the Following Network Path (UNC): Use this radio button to import a number of drivers at once. The path you specify to the folder containing the drivers must be in Universal Naming Convention (UNC) format; you cannot specify a drive letter. Some hardware manufacturers create a file with all the drivers for a specific model of their hardware; once this file is expanded to a folder containing all the drivers, you can use this option to import all those drivers at once.

images Import a Specific Driver by Specifying the Network Path (UNC) to its .inf or txtsetup.oem File: If you need to test a specific driver and not a whole package, use this option to import that single driver. Again, the path must be a UNC path and point to an .inf file or a .txtsetup.oem file. These two file types are part of the driver files you download.

images Specify the Option for Duplicate Drivers: This dropdown menu allows you to select how the import wizard should handle a duplicate driver. These are the options:

images Import the driver and append a new category to the existing categories.

images Import the driver and overwrite the existing categories.

images Do not import the driver.

Driver Details Page

After selecting the correct information in the “Locate Driver Page” section, click Next to display the Validate Driver Information box. The ConfigMgr provider reads the folder location, validates file permissions, and reads driver attributes; this may take some time, depending on the number of drivers to import. If you think this process might be hung, check the SMS_Prov log file, where this information is logged. Once ConfigMgr has the driver information, the Driver Details page appears, shown in Figure 22.3.

A screenshot shows Driver Details page of the Import New Driver Wizard dialog box.

FIGURE 22.3 Driver Details page.

This page includes a lot of information, and the more drivers you add, the busier it looks. The first part of the page shows the path location from where the drivers will be imported. Two check boxes follow:

images Hide Drivers That Are Not in a Storage or Network Class (for Boot Images): Select this check box to allow the user to filter out drivers that would not be used in a boot image.

images Hide Drivers That Are Not Digitally Signed: This is checked by default. If a driver is not digitally signed, it should not be loaded; this is a security precaution.

The middle of the page contains a list box listing the drivers found by the wizard. If you chose to install a single driver, details are shown for that driver only. There is a check box beside each driver; all are checked by default. To skip importing a driver, uncheck its box. The list box also shows the class, architecture, version, and whether the driver is signed.

The following options are available at the bottom of the page:

images Enable These Drivers and Allow Computers to Install Them: This check box determines if the driver is enabled or disabled after the import completes. Uncheck the box to disable the drivers so they are not usable when the import finishes.

images Assign This Driver to One or More Categories for Filtering: This option allows you to choose an existing category or create a new one to which to add the drivers. You can either create a new category or click Categories to see categories already created and choose one.

Add Driver to Packages Page

Before drivers can be used by OSD, they must be part of a driver package. You can add them to an existing package or create a new package. Figure 22.4 shows this page, which allows you to choose between existing packages and creating a new one.

A screenshot shows Add Driver to Packages page of the Import New Driver Wizard dialog box.

FIGURE 22.4 Add Driver to Packages page.

The driver packages are in the list box; choose one or more or all. At the bottom of the list box, click New Package to create a new package if you are not using any existing packages.

TIP: IDENTIFYING DRIVER PACKAGES

When creating driver packages, either before the driver import or as part of the import, the authors recommend creating a folder structure that starts with the system manufacturer name, model number, and folders for each component of that model number for which you will need a driver. Doing so creates many driver packages but allows you to keep the drivers in separate folders, which makes maintenance and upkeep easier.

Pre-create a driver package by navigating to Software Library -> Overview -> Operating Systems -> Driver Packages and choosing Create Driver Package from the ribbon bar or after right-clicking Driver Package. You get a dialog box where you enter a name, comment, and the path of the package, using UNC format. The path specified must be an empty folder. This is not the path you imported the drivers from or will import them from; it is the source location used to populate the DPs. From the same menu, you can also choose to import a driver package.

Add Driver to Boot Images Page

The Add Driver to Boot Images page, shown in Figure 22.5, allows you to inject drivers into the boot images, which may be necessary if the driver is for a network card or mass storage driver that allows access to a disk drive. You must have these drivers at boot time to complete the OSD TS steps to deploy the OS.

A screenshot shows Add Driver to Boot Image page of the Import New Driver Wizard dialog box.

FIGURE 22.5 Add Driver to Boot Images page.

The middle of the page displays a list box showing all boot images. None are checked by default. Place a checkmark next to each image into which you want to inject the drivers. You can choose more than one boot image. If you do not want to inject drivers into a boot image, leave its check box unchecked.

After importing the drivers, you must distribute the driver package or packages; if you are injecting drivers into the boot image or images, they also must be distributed to DPs. Right-click the driver package or boot image and choose Distribute Content to open the Distribute Content Wizard, where the only page allows you to choose the DPs to which to distribute the content. The authors recommend choosing all DPs if using OSD in multiple locations.

Using Operating System Images

The Operating System Images console node lists all OS images imported into ConfigMgr. OS images are captured images in the form of a WIM file, used to mass-deploy Windows. This node also lists data images. These WIM files do not contain an installed OS; they are a collection of files stored in the WIM that you would like to deploy to a system. Add an OS image by navigating to Software Library -> Overview -> Operating Systems -> Operating System Images. Choose Add Operating System Image from the ribbon bar or after right-clicking Operating System Images to launch a wizard that has five pages. The last three pages are the standard Summary, Progress, and Completion pages. The other two have items you must complete:

images Data Source: Enter the full path to the OS image you want to add. The path must be a UNC path that points all the way to the .wim file. You do not need to create a unique folder for each WIM file, as the path must point to the actual file. If you are not using unique folders, the authors recommend assigning a complete and descriptive name for each .wim file so you can distinguish between them.

images General: Define the name, version, and comments about the WIM image you are adding. The name is automatically filled in based on what is in the WIM; change it to anything you want.

After adding the OS image to ConfigMgr, you must distribute it to your DPs to be available for use in OSD. Right-click the image and choose Distribute Content to open the Distribute Content Wizard; the only page asks you to choose DPs to which you want to distribute the content. The authors recommend choosing all DPs if using OSD in multiple locations.

NOTE: USING A DEFAULT OS IMAGE

While this is not a preferred option, rather than capture a reference system and use it as your OS image, you can use the default OS image included with the Windows OS media, located in <operating system source path>Sources and named install.wim. This image installs a basic vanilla OS; you must customize each deployed OS for your environment and install any needed applications and software updates. For these reasons, the authors recommend creating a reference image with all needed customizations, applications, and software updates and then capturing that reference system and using it to deploy images.

Using Operating System Upgrade Packages

An OS update package contains all the source files that come with your Windows media, which are imported into a package inside ConfigMgr and distributed to your DPs. The files are used to upgrade a Windows OS from one version to another, such as from Windows 7 to Windows 10. Your upgrade package must be the same edition, architecture, and language as the clients you are upgrading. Add the package to ConfigMgr by navigating to Software Library -> Overview -> Operating Systems -> Operating System Upgrade Packages. From the ribbon bar or after right-clicking on Operating System Upgrade Packages, choose Add Operating System Upgrade Package to launch a five-page wizard. The last three pages of the wizard are the standard Summary, Progress, and Completion pages; the other two include items you must complete:

images Data Source: Enter the path to the Windows source files used for the upgrade. These should be the files from your Windows install media. The path must be a UNC and point to the folder containing setup.exe.

images General: Define the name, version, and comments about the upgrade package you are adding. The name is automatically filled in, based on the name of the source folder name; you can change this to anything you want for the name.

When the OS upgrade package is added to ConfigMgr, distribute it to your DPs to be available for use in OSD. Right-click the package and choose Distribute Content to open the Distribute Content Wizard; the only page allows you to choose the DPs to which to distribute the content. The authors recommend choosing all DPs when using OSD in multiple locations.

After adding your OS images and/or OS upgrade packages to ConfigMgr, you must update them when new security updates are released. The authors recommend updating quarterly. Navigate to Software Library -> Overview -> Operating Systems -> Operating System Images or Software Library -> Overview -> Operating Systems -> Operating System Upgrade Packages. Select the image or upgrade package and choose Schedule Updates to launch the Schedule Updates Wizard, shown in Figure 22.6. This wizard has five pages, the last three of which are the standard Summary, Progress, and Completion pages. You must complete two pages:

images Choose Updates: This page is filled in automatically, though it might take several seconds or longer for this to occur. ConfigMgr opens the image or update package and compares it with known software updates. It determines which updates are needed and shows them in the list box on this page. Uncheck any of them that you do not want to apply.

images Set Schedule: Decide when to apply the software updates; either select to apply them as soon as possible or set a custom date and time. You can also choose to stop applying updates if an error occurs or continue regardless of errors, and you can update the DPs after the process has completed.

A screenshot shows Choose Updates page of the Schedule Updates Wizard dialog box.

FIGURE 22.6 Schedule Updates Wizard.

Using Boot Images

A ConfigMgr boot image is a WinPE image used during OSD to start a computer; this is a minimal operating system with limited components and services that prepares the destination computer for Windows installation. Two boot images are supplied by default when ConfigMgr is installed: one to support x86 platforms, and one for x64. These are the basic boot images installed with the Windows 10 ADK. These images are required because the main operations of the deployment cannot occur within a full install of Windows; formatting the disk and applying an image file cannot happen while the target disk drive is in use and must be initiated from something that does not live on or run from that disk.

WinPE is ideal because it is small, easy to deliver, and fast, and it runs from a RAM disk without needing persistent storage. It also shares the core kernel and driver model with Windows itself, can run any valid native Windows executable, and provides much of the same automation-enabling functionality, including batch scripting and VBScript.

The default boot images work for most organizations for OSD requirements, but there may be a time when you need to add a separate boot image to ConfigMgr. This is fully supported—but only when you use a boot image based on a supported version of WinPE:

images WinPE 10: This version of WinPE is part of the Windows 10 ADK and installed as a prerequisite for ConfigMgr. It is also the version of WinPE on which the default boot images are based. This version is customizable from within the ConfigMgr console.

images WinPE 5: This version comes from the Windows 8.1 ADK. It cannot be customized from the ConfigMgr console. The boot images are supported but must be customized elsewhere, using the version of DISM installed with the Windows 8.1 ADK.

images WinPE 3.1: From the Windows Automated Installation Kit (AIK) supplement for Windows 7 Service Pack (SP) 1, this version is an upgrade to the Windows 7 AIK. You cannot customize it in the ConfigMgr console.

For complete information on how to customize older versions of WinPE, see https://docs.microsoft.com/sccm/osd/get-started/customize-boot-images.

To add a boot image to ConfigMgr, navigate to Software Library -> Overview -> Operating Systems -> Boot Images. Choose Add Boot Image from the ribbon bar or after right-clicking Boot Images to launch a five-page wizard. The last three wizard pages are the standard Summary, Progress, and Completion pages. The other two pages have items you must fill in:

images Data Source: Enter the path to the boot image you want to add. The path must be in UNC format and point to the actual .wim file.

images General: Define the name, version, and comments about the boot image you are adding. The name and version are filled in automatically, although you can change the name to anything you want. The authors recommend adding comments to explain what this boot image is for, to avoid confusion with other boot images.

After adding or customizing a boot image, it must be distributed before being used by OSD. Right-click an image and choose Distribute Content to open the Distribute Content Wizard, whose only page allows you to choose the DPs to distribute the content. The authors recommend choosing all DPs if you plan to use OSD in multiple locations.

View a boot image’s properties by right-clicking it and choosing Properties to open the Boot Image Properties dialog box. Figure 22.7 displays the Customization tab selected.

A screenshot shows Boot image (x64) Properties dialog box. Customization tab is selected at top. Prestart command settings and Windows PE Background sections are displayed. Windows PE Scratch Space (MB) dropdown box is set as 32.

FIGURE 22.7 Viewing boot image properties.

While you can create completely custom boot images from scratch, this generally is not necessary as the built-in boot images are sufficiently customizable to meet nearly any need. The following customizations are available in the Customization tab shown in Figure 22.7:

images Prestart Commands: Prestart commands run before the OSD process. They are typically used to display information and prompt the interactive user for input such as the system’s location, desired name, or role. There are no predefined prestart commands; this type of customization is completely up to your needs and abilities. In general, any valid Windows script (batch, VBScript, Jscript, or PowerShell script) will work. Prestart commands often require additional files, such as executables or scripts that are not part of the default boot image. Add these files by specifying the folder containing them in the Properties dialog. Using this section to add files to the boot image is helpful even if not using a prestart command; these could be diagnostic scripts that help in troubleshooting. Add cmd/c to the start of the command line that runs any program; otherwise, the command will not close after it runs, forcing the deployment to wait for the command to finish and putting you in a loop where nothing else starts.

You can also enter prestart commands when you create specific boot media, which means you can create the media and commands at the same time. More information about the prestart commands can be found at https://docs.microsoft.com/sccm/osd/understand/prestart-commands-for-task-sequence-media.

images Windows PE Background: Specify an image to use as the background during OSD instead of the default provided by Microsoft. You can customize the background to your organization’s logo and color scheme, for example, so users know the OSD process is from your organization.

images Windows PE Scratch Space (MB): This is temporary RAM-based storage used by WinPE applications that need to write temporary files. WinPE points the application to this area, and the application sees it as a hard drive to write the files it needs.

images Enable Command Support (Testing Only): Check this check box to launch a command prompt anytime during the OSD process by pressing F8. This is useful for troubleshooting. When the process is working correctly, the authors recommend unchecking this box so users are not able to open the command prompt.

The Drivers tab is another area you might want to customize in the Boot Image Properties dialog. It allows you to inject drivers into the image so they can be used at boot time. Click the yellow starburst icon to bring up the Select a driver dialog box, which lists all the drivers imported into ConfigMgr and allows you to pick drivers to add to the image. The authors recommend using only boot-critical drivers, such as network and mass storage drivers. Ensure that the drivers you are adding match the architecture of the boot image: x64 drivers for an x64 image, x86 drivers for an x86 boot image.

NOTE: USING A BOOT IMAGE WITH PXE

When users PXE boot, they must use a boot image that matches the system’s architecture, so if you use PXE, ensure that the x86 and x64 boot images allow PXE boots. This is configured on the Data Source tab of the Boot Image Properties dialog: Check the check box Deploy this boot image from a PXE enabled distribution point. It is checked by default, but the authors recommend verifying that it is selected.

After making any changes to your boot images, update the DPs by right-clicking the boot image and choosing Update Distribution Points; if the boot images have not been distributed to the DPs, choose Distribute Content.

Using Task Sequences

Task sequences (TSs) are the heart of OSD. A TS is a series of customizable tasks or sequentially performed steps. With OSD you build steps into the TS to accomplish deployment, application installation, software update installation, application of drivers, and so on to create an OS for your users. ConfigMgr comes with several standard TSs built in to allow you to perform a variety of functions; it also includes the capability to create a custom TS to use for OSD or non-OSD applications. (For more about using TSs for non-OSD applications, see Chapter 13, “Creating and Managing Packages and Programs.”) Access the TS menu by navigating to Software Library -> Overview -> Operating Systems -> Task Sequences and choosing Create Task Sequence from the ribbon bar or after right-clicking Task Sequences. Figure 22.8 shows the Task Sequence menu.

A screenshot shows Create Task Sequence Wizard dialog box.

FIGURE 22.8 Task Sequence menu.

Figure 22.8 shows several different TSs you can choose from. Each presents some different pages as well as some of the same pages as in the Create Task Sequence Wizard.

Install an Existing Image Package

Use this TS to deploy an OS added to the Operating System Images section of the ConfigMgr console. This wizard has 10 pages, with the last 3 being the standard Summary, Progress, and Completion. These are the other 7 pages:

images Task Sequence Information: Provide a name and description. The page also allows you to pick a boot image; click Browse to bring up a list of boot images to choose from. Select a boot image whose architecture will work on the destination hardware, such as an x64 boot image for x64 hardware; do not pick an x64 boot image for x86 hardware.

images Install Windows: Choose an OS image package to deploy, the image index if the image has more than one, and whether to partition and format the target computer before installing the OS. A check box allows you to configure the TS for use with BitLocker encryption software. Enter your product key and server licensing mode. At the bottom, choose to use a randomly generated password for the administrator account and disable the account or enter a password and enable the account.

images Configure Network: Specify your connection to a domain or a workgroup. If choosing a workgroup, enter its name; for a domain, enter the domain and organizational unit (OU) in which to create the computer account. Click Browse to select these settings if you do not want to enter them manually. The last option is to enter an account with permissions to join the machine to the domain. Use Set to search for an account to use or enter it manually in the format domainuser.

images Install Configuration Manager Client: Enter the parameters needed to install the ConfigMgr client. There are two settings: Package and Installation properties. The information is prepopulated from the site’s client push settings; change these to any valid settings you like.

images State Migration: Specify some of the basic configuration for using the state migration tools. Use a check box to capture users’ settings or not; if this box is checked, choose the USMT package to use (this is prepopulated). You can also specify using a state migration point (SMP) to save user files and settings, or you can capture and store it locally by using hard links. Choose whether to capture network and Windows settings.

images Include Updates: Specify whether to have software updates installed as part of the OSD process. Choose to install the required mandatory software updates only, to install all software updates, or not to install any software updates.

images Install Applications: Add applications to install into the TS. Use the yellow starburst icon to select from a list of applications; choose as many as needed. A check box allows the TS to continue installing applications if one of the applications fails to install.

After creating your TS, edit its properties to verify that the correct boot image is selected, among other items. Edit the properties by right-clicking the TS and choosing Properties or highlighting the TS and then choosing Properties from the ribbon bar.

images General: Use this tab to change the name of the TS, add a description for the TS, add a category for the TS, and choose between using the default text Running: <task sequence name> or creating a custom text entry to show the user when the TS is executing.

images Advanced: This tab has several options you can select:

images Run Another Program First: This check box is valid only for TSs started while in an existing OS. It runs the specified program from the specified package before executing the TS if the program has not been previously run on the system. If the Always run this program first option is selected, the specified program is always run, regardless of its previous run status or result.

images Suppress Task Sequence Notifications: Checking this check box turns off any notifications to the user that the TS is available for execution.

images Disable Task Sequence on Computers Where It Is Deployed: You can select this option to disable the TS.

images Maximum Allowed Run Time (Minutes): The number of minutes specified for this option is used when calculating whether a TS should run in an available maintenance window. If a TS exceeds this time, it is terminated.

images Use a Boot Image: Choose the boot image to use for this TS. For non-OSD TSs, such as those used to deploy applications or a complex series of ordered tasks that may involve some advanced conditional logic available in a TS, you can choose to use no boot image.

images Run on Any Platform or Run Only on the Specified Platforms: Use this option to limit the platforms on which a TS can run. Choose from a series of Windows versions or choose to run on any platform.

Build and Capture a Reference Operating System Image

Use this TS to build a new reference system and capture that system to use as the image to deploy out to new machines. A reference system is sometimes referred to as a gold image. It is a system customized with your organization’s color schema, Windows settings, applications, and office productivity software. You can capture that image and use it as your corporate image to deploy. Start the process by confirming that you added a default install.wim file from valid Windows media. You can then use this WIM file as the basis for your reference image. The wizard that builds these TSs has some of the same pages used by the TS in the previous section, as well as the following three different pages:

images System Preparation: Select the package that contains the appropriate version of Sysprep to use to capture the reference computer’s settings. This page is grayed out for Windows Vista or later because Vista was the first version of Windows to automatically include Sysprep as part of the OS.

images Image Properties: Add information about the image in terms of who created it, what version it is, and a description of the image.

images Capture Image: Enter the details of where the captured image is stored. The path is entered as a UNC (\<servername><sharename><filename>); click Browse to select the path to avoid entering it manually. The account you enter must have permissions to access the share and the folder where the image is created. Full admin permissions are not required but suggested by the authors to help prevent problems with the capture process.

TIP: CAPTURING A REFERENCE SYSTEM

If you previously created a reference system and just want to capture that system, you can create a custom TS, edit it, and add a step to capture the system. If the system has a ConfigMgr client installed, add a step in the TS that prepares the ConfigMgr client for capture. This step must be added before the step to capture the system. If you would rather not use a TS, you can use the DISM tool from the ADK to capture the image.

Install an Existing Image Package to a Virtual Hard Disk

This TS enables ConfigMgr to deploy Windows to a new virtual hard disk (VHD) and update an existing instance of Windows within a VHD it previously created. It also directly uploads a VHD to an instance of Virtual Machine Manager (VMM) for use within your enterprise. To utilize this new feature set, install the ConfigMgr console on a 64-bit Windows 8 or 8.1 system or on Windows Server 2012 R2 or 2016 where Hyper-V is fully enabled and operational. To upload the VHDs to VMM, you must also install the VMM console on a system where the ConfigMgr console is loaded. This does not need to be the same system where you are creating and maintaining VHDs. All VHD management is performed from the Virtual Hard Disks node under Software Library -> Overview -> Operating Systems. This node is visible on all systems running the console; however, if a system does not meet the necessary OS requirements, the Virtual Hard Disks nodes actions are grayed out.

These TSs use the same pages that the Install an existing image package page uses except for the following pages that are removed from the TS:

images State Migration

images Include Updates

For more in-depth information on this TS and about how to use VHDs within ConfigMgr, reference https://docs.microsoft.com/sccm/osd/deploy-use/use-a-task-sequence-to-manage-virtual-hard-disks.

Upgrade an Operating System from an Upgrade Package

Use this TS to upgrade a Windows 7, 8, or 8.1 system to Windows 10 and take advantage of the OS upgrade packages in ConfigMgr. The TS wizard automatically creates the steps needed to perform the upgrade, with one page different from those of the other TSs.

Use the Upgrade the Windows Operating System page to select an upgrade package to use; the middle of the page then shows the package’s OS version, edition, language, and architecture. This allows you to verify that you selected the correct upgrade package to use. At the bottom of the page is a dropdown menu to choose the correct index of the Windows edition you want to use. You can enter your product key as well. Figure 22.9 shows the upgrade TS created with this wizard in Edit mode.

The TS adds in a Pre-Upgrade group and a Post-Upgrade group that allow the upgrade to Windows 10 to occur with checks and balances:

images Prepare for Upgrade: This adds the step Check readiness for upgrade to the TS to ensure the target system has enough memory, processor speed, and free disk space to meet Windows 10 prerequisites. If the target system does not meet these standards, the TS fails. You may need to modify the settings for your organization’s standards. You can add additional steps to uninstall applications, drivers, or other items known to not be compatible with Windows 10.

images Post-Processing: Add applications, drivers, or other items to install after the upgrade finishes.

images Rollback: This is added by default and should not be removed. If an error occurs during the upgrade, the TS variable _SMSTSSetupRollback is set to True. This step has a condition to check that variable; if it is set to True, the TS rolls back the upgrade to the previously installed OS. If there are additional steps you need to take after that rollback occurs, add them to this group.

A screenshot shows Upgrade an OS to Windows 10 Task Sequence Editor dialog box.

FIGURE 22.9 The Upgrade to Windows 10 TS page.

Create a New Custom Task Sequence

This TS wizard creates a blank TS with no steps, allowing you to create your own customized TS from scratch. The only page is the Task Sequence Information page, which allows you to name the TS, provide a description, and choose a boot image if you need to use one.

These custom TSs are usually created for non-OSD tasks that typically must be executed in a particular set of steps. These TSs are the perfect solution for those deployments. For more information about steps to add to these custom TSs, see https://docs.microsoft.com/sccm/osd/understand/task-sequence-steps.

Using Tasks and Variables in a Task Sequence

With your TS created and its properties defined, you may find that you need to add or delete tasks in the TS through the edit process. ConfigMgr provides a very rich set of tasks you can add to the TS to provide it with more flexibility. These tasks and TSs are similar to a macro-based programming language or a storyboard where you put together high-level steps and instructions using a graphical tool, without having to know or learn the syntax of the underlying language to fully take advantage of it.

To edit a TS, navigate to Software Library -> Overview -> Operating Systems -> Task Sequences and right-click the TS, or select the TS, and from the ribbon bar choose Edit to launch the TS editor. Figure 22.10 shows the TS editor for a TS created using the Install an Existing Image Package Wizard.

A screenshot shows Install OS Image Task Sequence Editor dialog box.

FIGURE 22.10 Editing a Task Sequence.

Using Tasks

The wizard creates a very basic TS, which you must customize for your organization. You can add, delete, or move steps in the TS. To delete a step or group from the TS, highlight the item and choose Remove from the menu; to move an item up or down in the TS list, highlight the item and then click the Move up or Move down icon on the menu.

To add a group or a task, select the Add menu item. Tasks are divided into seven categories, with tasks under each one. Figure 22.11 shows the first of these built-in categories and the tasks in the General category.

The tasks in the General category are listed.

FIGURE 22.11 General Group of Tasks.

When you add a task to the TS (see the “Add Condition” bullet in the Options tab discussion that follows), the editor adds the task below the current highlighted step. Each task has its own set of parameters that must be filled for the task to execute correctly. When a task is added to the TS, it shows an icon with a red X beside the name, indicating that it has a required parameter that must be completed; once all parameters are filled in, the icon turns into a green checkmark, indicating that the step is ready to execute. Each task has two tabs:

images Properties

images Options

The Properties tab contains all parameters that must be completed for the task to become execution ready. In-depth information on each task and its parameters can be found at https://docs.microsoft.com/sccm/osd/understand/task-sequence-steps.

The Options tab generally has the same settings for each task; sometimes there is an additional parameter, but none are required. The Options tab always has the following items:

images Disable This Step: Allows you to disable the step so it is not performed when the TS executes. A common use for this is when you are creating a TS and are not sure if all steps need to be performed.

images Continue on Error: Allows the TS to continue running if the step that is running fails. The error is logged in the SMSTS.log file, and the TS continues to the next step. This is handy for troubleshooting issues when a step in the TS keeps failing but you need to execute the rest of the TS.

images Add Condition: Allows you to add logical conditions to the step. If a condition evaluates to true, the step executes; if the condition is false, the step is skipped. The most common use for conditions is when installing drivers. For example, you may have a driver package for each model of system you are deploying. You would want to check the model number of the system to see if the drivers should be applied.

Conditions can be combined by using If statements to form a master conditional statement. This is a collection of substatements that evaluate to either True or False, based on the logical evaluation of those substatements. There are three types of master statements, and each type of evaluation affects how the master statement is evaluated:

images All child statements must be true.

images Any child statement is true.

images No child statements are true.

You can chain If statements together to form complex logical statements. If statements in this context closely resemble the traditional logical operators AND/OR, and can be used in a similar way.

Using Variables

A major advantage of TSs over ConfigMgr’s traditional software delivery mechanism is that they maintain state between steps. This state is embodied in a series of built-in variables and custom variables that survive reboots because they are stored in a locally persistent file, allowing you to pass data or configuration items from one step to the next. In fact, the task the TS is currently executing is also part of the state of the TS. Variables are encrypted for security when transmitted between ConfigMgr and the target system. Three types of variables are available:

images Action: These variables specify parameters for specific tasks. The variable is used by a single step in the TS and is initialized before the step is run and is only available while the step is running. The value for the variable is removed after the step finishes. Nearly all action variables are directly editable using the task sequence editor.

images Custom: This is a simple name/value pair that you can define as you see fit.

images Built-in: These variables are almost always read-only. They start with an underscore and are automatically generated by the TS; they generally describe the environment where the TS executes. The value of the variable is available throughout the entire TS.

Find a full list of TS action variables at https://docs.microsoft.com/sccm/osd/understand/task-sequence-action-variables and a list of the built-in variables at https://docs.microsoft.com/sccm/osd/understand/task-sequence-built-in-variables.

Each GUI field shown in a task in the TS editor has a corresponding TS variable. Setting these values in the GUI defines the action’s runtime behavior, making your TS static for the most part. Setting TS variables based on collection membership or using a script while executing the TS makes your TSs dynamic, performing tasks differently or even performing different tasks based on runtime conditions. You can set action variables and custom variables in a number of ways:

images Use a Set Task Sequence Variable task.

images Statically assign one to a specific computer resource.

images Statically assign one to a collection.

images Use the Microsoft.SMS.TSEnvironment COM object in a script or other COM-aware tool, development environment, or language. See http://msdn.microsoft.com/library/cc145669.aspx for more information on using this COM object; the page refers to ConfigMgr 2007 but also applies to ConfigMgr Current Branch.

You can also set a TS variable on a device collection or computer resource in the ConfigMgr console. For device collections, open the collection’s Properties page and navigate to the Collection variables tab; for computer resources, open the resource’s Properties page and select the Variables tab. TSs initiated on applicable resources will have all variables initially set. If you leave the value of a collection or computer variable blank, the built-in TS UI prompts the user for values for these empty variables.

Finally, there is an order to the precedence of TS variables:

1. Task sequence variables set at runtime (using a Set Task Sequence Variable task or the Microsoft.SMS.TSEnvironment COM object)

2. Task sequence variables set on computer resources

3. Task sequence variables set on collections

4. Task sequence variables set at design time in the GUI

Site System Roles for OSD

Depending on the choices made within a TS, some tasks will require adding additional site system roles; for example, you would need an SMP if you used the state migration package and needed a place to store the users’ data other than locally. Following are additional site system roles that play a part in the OSD process, some of which you may use and some of which you may not. These are discussed in the next sections.

images Distribution Point

images PXE Point (part of the DP role)

images Multicast (part of the DP role)

images State Migration Point

Using Distribution Points

You probably already have a DP that is used for software distribution. OSD uses the DP in the same manner—as a storage place for content needed for OSD and for the client to download the content when needed while deploying the OS. Following are types of software stored on the DP for use in OSD:

images Applications

images Boot images

images Driver packages

images Operating system images

images Operating system upgrade packages

images Software distribution packages

images Software update deployment packages

While the system is executing the TS, it requests these types of content as needed. The content is downloaded from the DP to the local client and processed according to the step in the TS. Not all of the package may be used; it depends on the tasks in the TS.

Using a PXE Point

In simple terms, PXE is a standard client/server environment that allows a machine to boot an OS that is retrieved from the network. The client side must have a network interface card (NIC) that is PXE-boot capable; the server side handles a process that intercepts the PXE packet, reads it, and delivers the OS to the client requesting it. PXE is not a ConfigMgr concept or even a Microsoft concept; it is more of an industry-wide concept implemented in different flavors across a wide multitude of server OSs. For in-depth information on PXE, see https://en.wikipedia.org/wiki/Preboot_Execution_Environment. ConfigMgr uses PXE in conjunction with Windows Deployment Services (WDS) on Windows Server.

Starting with ConfigMgr 2012, the PXE point is included as part of the DP properties. Install PXE and configure it by navigating to Administration -> Overview -> Distribution Points; then either right-click the DP name and select Properties or select the DP and from the ribbon bar, choose Properties, and click the PXE tab. Figure 22.12 shows the PXE tab of a DP’s properties.

A screenshot shows PXE tab of the ATHENA.ODYSSEY.COM Properties dialog box.

FIGURE 22.12 PXE tab of a DP’s properties.

The first step in installing and configuring the PXE point is to check the box Enable PXE support for clients. You see a warning popup dialog box, as shown in Figure 22.13. The warning explains that PXE uses certain ports to transfer packets across the network. These ports must be open to allow traffic through the firewall on systems and routers for PXE to work correctly. If you are using a Windows firewall, ConfigMgr opens the ports for you. Click Yes in the warning dialog box to be presented with the PXE tab to configure; click No, and the checkbox remains unchecked with the rest of the PXE tab grayed out.

A screenshot shows “Review Required Ports for PXE” dialog box displaying a warning message that if Windows firewall is used, Configuration Manager automatically configures rules to allow ports else the other firewalls must be configured manually.

FIGURE 22.13 PXE port warning message.

NOTE: WINDOWS DEPLOYMENT SERVICES

ConfigMgr takes full advantage of WDS to implement PXE services. In prior versions, WDS installed separately, which could cause issues in terms of how it was configured. ConfigMgr now installs WDS during the PXE point install and configures it as needed to work correctly with ConfigMgr and PXE. Smaller organizations that might have WDS and Dynamic Host Configuration Protocol (DHCP) on the same machine must configure WDS to use a different port. For more information on WDS, see https://docs.microsoft.com/sccm/osd/plan-design/infrastructure-requirements-for-operating-system-deployment#BKMK_WDS.

The PXE tab has several other items to complete:

images Allow This Distribution Point to Respond to Incoming PXE Requests: Checking this box sets up WDS on this DP/PXE point to respond to any incoming PXE requests. Unchecking it stops or disables the ability to answer incoming PXE requests.

images Enable Unknown Computer Support: Checking this option allows the WDS/PXE server to respond to incoming requests from systems not managed by ConfigMgr. A system without the ConfigMgr client installed or discovered by ConfigMgr is an unknown system. In OSD terms, these typically are bare-metal systems without an installed OS. If this option is checked, you see a warning popup dialog box, as shown in Figure 22.14, explaining that when these types of systems PXE boot, they can run any of the deployed TSs to the unknown computer collection. This could result in formatting the hard drive and losing data. Click OK to turn on this support.

A screenshot shows Configuration Manager dialog box displaying a warning message that if unknown computer support is enabled, any unknown computers using PXE-initiated operating system deployments will run task sequences that will destroy all data on those systems.

FIGURE 22.14 Unknown computer support warning message.

images Require a Password When Computers Use PXE: Selecting this option requires a password for the system to complete a PXE boot; the boot aborts if the password is not returned by the user of the system. If this option is enabled, you must enter your password and confirm it in the second box. This is a good way to prevent users from PXE booting and running a TS that is not meant for them.

images User Device Affinity: For this option, you can select one of three options: Do not use device affinity, Allow user device affinity with manual approval, or Allow user device affinity with automatic approval. Device affinity allows you to marry a user to a single device. For more about this, see https://docs.microsoft.com/sccm/osd/get-started/associate-users-with-a-destination-computer.

images Network Interfaces: This option allows you to specify that either all NICs respond to the PXE requests or only specific NICs respond, assuming that you have multiple NICs on this DP/PXE server. If you choose to use specific NICs, use the yellow starburst icon to open a dialog box where you can enter the media access control (MAC) addresses of the NICs you want to respond.

images Specify the PXE Server Response Delay (Seconds): Use this option to delay the response from this PXE point to the incoming PXE request. If you have multiple DP/PXE servers, you might want to establish a precedence for which responds first. This setting allows you to tune the response from each DP/PXE server. It is not an exact way to set prioritization, but it does work.

TIP: EXCLUDING SYSTEMS FROM PXE BOOTING

There may be specific systems you do not want to PXE boot; these could be systems from executive employees, point-of-sale systems, or systems in charge of manufacturing plants. You can create an exclusion list for such devices. Create a text file on the DP/PXE point and add to it the MAC address of each system you want to exclude. Use colons to separate the MAC address values and put each MAC address on a separate line. Save the text file to any location on the system. Next, navigate to the HKLMSoftwareMicrosoftSMSDP Registry key on the DP/PXE server. Create a new string value called MACIgnoreListFile and set its value to the full path of your exclusion text file. You must do this on all DP/PXE points if you have multiple DP/PXE systems.

How exactly does PXE work? At a high level, the steps are as follows:

1. The system boots, and because no OS is installed or the user presses the F12 key, the NIC attempts to get a DHCP address and start the process of PXE booting; the PXE packet is sent to the DHCP server.

2. The PXE-enabled DP sends back a packet that contains the boot filename and location along with the WDS network boot program.

3. The client opens a session and starts transferring boot files from the server.

4. The system boots into WinPE, and the TS boot shell is started from the SMS folder that is in the WinPE image.

For more detailed information about how PXE works and several processes in-between these steps, see the complete walkthrough at https://support.microsoft.com/help/10082/troubleshooting-pxe-boot-issues-in-configuration-manager-2012. This article is for ConfigMgr 2012 but also applies to ConfigMgr Current Branch.

Using Multicast

Multicast is group communication in which information is simultaneously addressed to a group of destination computers. Say you have 10 systems that need to download an OSD image; normally each system downloads the image, for a total of 10 downloads. Multicasting means only one image is downloaded for all 10 systems, assuming that they all need the same image. Note that multicasting requires considerable network configuration and bandwidth tuning. In addition, OSD imaging packages and packages included as part of the TS are the only items that can use multicasting in ConfigMgr, and it occurs only inside WinPE. This section does not cover multicasting in depth—just enough to set it up. For complete information, see https://blogs.msdn.microsoft.com/steverac/2008/10/18/setting-up-multicasting-in-sccm. While written for ConfigMgr 2012 R2, this blog post also applies to ConfigMgr Current Branch.

Multicasting is configured as part of the DP properties; you can install multicasting and configure it by navigating to Administration -> Overview -> Distribution Points and right-clicking the DP name and selecting Properties or selecting the DP and from the ribbon bar choosing Properties and clicking the Multicast tab. Figure 22.15 shows the Multicast tab of a DP’s properties.

A screenshot shows Multicast tab of the ATHENA.ODYSSEY.COM Properties dialog box.

FIGURE 22.15 Multicast tab of a DP’s properties.

Once the box is checked to enable multicast to simultaneously send data to multiple clients, the following options are available:

images Multicast Connection Account: This account, which by default is the local machine account, is used to communicate with the site database. If you choose to use a different account, Set becomes available, and you can select between using an existing account ConfigMgr already knows about or using a new account.

images Multicast Address Settings: Use the default range of IPv4 addresses from a DHCP server or enter an IPv4 address range to use.

images UDP Port Range for Multicast: Choose the User Datagram Protocol (UDP) range of ports you want to use. The default set of ports is entered automatically but can be changed. Remember that no matter what ports you set, they must be allowed through any firewalls or routers.

images Client Transfer Rate: Set the speed at which the content is downloaded. Take care to ensure that not all of the bandwidth is consumed on the network.

images Maximum Clients: Set the maximum number of clients that can download content at the same time.

images Enable Schedule Multicast: Control the schedule at which systems are allowed to download the content. When this option is checked, you can set the session start delay time, which is 15 minutes by default. This is the amount of time set aside before the first clients start to download the content. The minimum session size also becomes available; it is 20 by default but can be changed. This is the number of clients that must request the content before it is available for download.

While there are many options on this page, most organizations can enable multicasting and leave all settings at their default values.

If you intend to use multicasting, the next step in the process is to enable the OS image packages and any packages used during WinPE to use multicast. Navigate to Software Library -> Overview -> Operating Systems -> Operating System Images and select your OS image. Then choose Properties either from the ribbon bar or after right-clicking on the OS image. Select the Distribution Settings tab of the properties dialog that appears. At the bottom of the page, look for the Operating system deployment settings section, which offers these options:

images Allow This Package to Be Transferred via Multicast (WinPE Only): Allows the OS image package to be transferred to the client by multicast. If this option is unchecked, multicast is not used.

images Encrypt Multicast Packages: Allows ConfigMgr to encrypt the data in packages sent by multicast. Packages sent via multicast go over the network in clear text; if they have any sensitive information, the authors recommend checking this box.

images Transfer This Package Only via Multicast: Allows the package to be transferred only via a multicast session. The image package cannot be downloaded by any other method.

Using State Migration Points

If a user is having severe problems with his or her system; it might be determined that rather than spend too many hours trying to fix it, it is best to reimage the system and format the hard drive. Or perhaps a user gets a new bare-metal system and needs his or her data transferred to the new system and a new OS installed. In these types of cases, you may find that you need a place to store the user’s data and settings so you can restore them after the machine is reimaged or the new OS installed. You can use an SMP to store this information securely.

SMPs can be installed on new servers added to the ConfigMgr hierarchy or on existing servers such as DPs that are already part of the hierarchy. There are some considerations to take into account when deciding where to put your SMP:

images User State Size: User state data usually consists of the user’s data stored in the Documents folder. This is a mix of documents, pictures, music, and other data, and it could be quite large, depending on the organization’s policy for user data. For example, if you include Outlook Personal Store (PST) files, this can be many gigabytes of data. How many migrations will occur at the same time? These all must be taken into account when considering the amount of space to allocate for the SMP.

images Retention Policies: These policies deal with the amount of time to keep user data on the SMP. It may not be as simple as capture the data, restore the data, and then delete it. What happens if a user has issues a day or a week after the data was deleted? How do you deal with a user who says not all the data has been restored to the new system? Consider these questions when determining how much space is needed and how long that space will be in use on an SMP; you may determine that you need to place SMPs in different locations or even on separate servers.

After gathering the SMP information, answering the questions, creating the policies, and creating the SMP’s server layout, you can install the SMP. Navigate to Administration -> Overview -> Site Configuration -> Servers and Site System Roles. If adding the role to an existing server, highlight that server and either right-click it and choose Add Site System Roles or from the ribbon bar choose Add Site System Roles. If adding the SMP role to a new server to the ConfigMgr hierarchy from the ribbon bar, choose Create Site System Server. Both options launch a wizard with very similar pages:

images General: Click Browse and select the FQDN name, add a site code from a dropdown list, select an FQDN for the system to use if it will be on the Internet, define whether the site server will initiate connections to this site system, and choose what site system installation account to use. If adding the SMP role to an existing server, some fields are grayed out.

images Proxy: This page allows you to define what proxy to use if one is needed.

images System Role Selection: This page lists all roles that can be installed on this server. If using an existing server, roles that are already installed on the server do not display. Place a checkmark in the box for State Migration Point.

images State Migration Point: As shown in Figure 22.16, this page allows you to configure options for the SMP. You must complete three options:

images Folder details: Define the folder to use for SMP data. Clicking the yellow starburst icon allows you to choose a folder location, which must already exist. You can also select the maximum number of clients and the minimum amount of free disk space.

images Deletion Policy: Select when you want to remove the SMP data marked for deletion: immediately or after a certain number of days or hours.

images Restore-Only Mode: Set the SMP in a restore-only mode so no new SMP data can be written to it. This might be useful when disk space is filling up. You can turn this on, wait for data to be restored, and delete the data and turn it back off.

images Boundary Groups: This page allows you to associate an SMP to a boundary group so clients know which SMP to use. The Add and Create choices allow you to add a previously created boundary group or create a new boundary group.

The final three pages of this wizard are the standard Summary, Progress, and Completion pages.

A screenshot shows State migration point page of the Add Site System Roles Wizard dialog box.

FIGURE 22.16 SMP settings page.

TIP: USING THE USER STATE MIGRATION TOOL

After configuring and installing the SMP, you will want to look at USMT in depth. There are many layers to USMT, its tools, the configuration files, gathering the user’s data, storing the data, restoring the data, and marking data for deletion. This chapter does not go into detail on USMT or using it; for more information on USMT, see https://docs.microsoft.com/sccm/osd/get-started/manage-user-state and see https://technet.microsoft.com/library/hh397289.aspx for a flowchart on user state capture and restore. This last link refers to ConfigMgr 2012 R2 and USMT 5.0 but also applies to ConfigMgr Current Branch and USMT 10.0.

Getting Ready for Deployment

With everything set up and configured and the TS created, the next steps are to distribute the content and deploy the TS. As the TS executes, each step may require some form of content from a DP. If the content is not found on the DPs, that step in the TS fails, which could lead to a complete failure of the TS and, ultimately, the OS imaging process. Before executing the TS, you must deploy it to a collection of systems. After booting into WinPE, the TSs deployed to this system are downloaded and shown to the user; once the user selects a TS to execute, the OSD process begins.

Distributing the Content

Some of the content your TS uses may have to be distributed. If you reference applications or packages previously used in software distribution, that content may already be on the DPs. You could edit the TS and get a list of all content needed and then use the console to check each of those items and distribute those that need it, but there is an easier way. Navigate in the ConfigMgr console to Software Library -> Overview -> Operating Systems -> Task Sequences and select your TS, then either from the ribbon bar or after right-clicking the TS, choose Distribute Content to launch the Distribute Content Wizard. Figure 22.17 shows the Content Destination page of this wizard.

A screenshot shows Content Destination page of the Distribute Content Wizard dialog box.

FIGURE 22.17 TS Distribute Content Wizard.

There are six pages to the wizard; the last three are the standard Summary, Progress, and Completion pages. The following are the unique pages:

images General: This page provides information only, and there is really nothing to configure. It shows the TS you selected, and at the bottom a check box is automatically checked to allow detection of any associated content dependencies to the TS.

images Content: This is another information-only page. You might notice a slight delay in moving from the General page to this page; this is because of the content detection occurring in the background. This page shows all the content associated with the TS, and this content is now added to the distribution, which means you can distribute all the content at one time.

images Content Destination: Select a collection, a DP, or a DP group to which to send the content by using the dropdown menu under Add. If you have DP groups, the authors recommend using that as your choice, to get the content to every DP in the group.

Depending on the content already distributed, the number of DPs to which you are sending content, the size of the content, and how many sites are in the hierarchy, it may take some time to finish distributing the content to the DPs. It is not unusual for a TS to need over 10GB of content. The images can be quite large, depending on what is actually in them. Before proceeding to the next step of deploying the TS, the authors recommend waiting for all the content to be distributed.

You may run into an issue with a low-bandwidth site where it takes too long for content to reach the DP. Solve this by prestaging the content. Select the TS in the console and choose Create Prestaged Content File from the ribbon bar to bring up a wizard that walks you through creating the prestaged content file. After creating the file, use other means to get the content copied over to the DP. When the file is on the DP, use the Extract Content tool to add the content to your DP. For more information about prestaging content, see https://docs.microsoft.com/sccm/core/servers/deploy/configure/deploy-and-manage-content#a-namebkmkprestagea-use-prestaged-content.

To monitor distribution status, navigate to Monitoring-> Overview -> Distribution Status and choose Content Status or Distribution Point Group Status. If you choose Content Status, you must search each content item and check its status. If you choose Distribution Point Group Status, highlight the DP group you select and choose View Status from the ribbon bar to open a status window where you see a pie chart, a list of content, and current status.

Deploying the Task Sequence

To execute the TS, you must deploy it to a collection of machines. If the TS is for new systems only, it is deployed to the unknown computer collection; if for refresh scenarios, the collection might be a query-based collection to determine the age of the systems and those that might fall out of support and need to be refreshed. Whatever the collection is, the TS must be deployed to it. To deploy a TS, navigate to Software Library -> Overview -> Operating Systems -> Task Sequences and select your TS, and then either from the ribbon bar or after right-clicking the TS, choose Deploy to launch the Deploy Software Wizard. This wizard has nine pages, of which the last three are the standard Summary, Progress, and Completion pages. The following sections describe the other pages of this wizard, and Figure 22.18 shows the Deployment Settings page of this wizard.

A screenshot shows Deployment Settings page of the Deploy Software Wizard dialog box.

FIGURE 22.18 Task Sequence Deploy Software Wizard.

TIP: DEPLOY IS GRAYED OUT

When trying to deploy the TS, you may find that the Deploy option is grayed out. This occurs when the TS has a reference to a task, an application, a package, a driver, a boot image, or something else that is invalid. For example, if you import a TS created in your lab or in another ConfigMgr hierarchy, that TS will have references to the old environment and must be edited. If you find yourself in such a situation, edit the TS to find the invalid item, fix it, and then save your TS and retry the deployment option.

General Page

The first page of the wizard, General, has five items to complete, and some of them are required before moving to the next page:

images Task Sequence: Filled automatically with the name of the TS you selected to deploy. Change the default by clicking Browse.

images Collection: Required; allows you to select the collection to which you want to deploy the TS. Click Browse to select a collection from the list. You can select only one collection.

CAUTION: HIGH-RISK DEPLOYMENTS

A TS that deploys an OS is considered a high-risk deployment. Clicking Browse to select a collection brings up a high-risk warning message, as shown in Figure 22.19. The message explains that these types of deployments can be high risk, so it only shows you collections that have members that are greater than what is set in the Deployment Verification tab of the site properties. Click OK to continue. Notice at the top of the General page the check box to hide collections with a member count greater than the site’s minimum site configuration; this check box is checked by default. The authors recommend that you not uncheck this box.

A screenshot shows Configuration Manager warning message dialog box which indicates that Install OS Image could be a high risk deployment. So it only shows collections that have members that are greater than what is set in the Deployment Verification.

FIGURE 22.19 High-risk warning message.

images Use Default Distribution Point Groups Associated to This Collection: This option is grayed out unless the collection you chose has been associated with a DP group. Associate a collection to a DP group by navigating to Administration -> Overview -> Distribution Point Groups and selecting the DP group, and then either from the ribbon bar or after right-clicking the DP group, choose Properties. In the Collections tab of the properties dialog, click Add to choose the collection to associate with this DP group. You can add as many collections as you like.

images Automatically Distribute Content for Dependencies: This option is grayed out unless applications in the TS have a dependency assigned to them.

images Comments: This is an optional field for entering comments about the deployment.

Deployment Settings Page

On the Deployment Settings page, the Action menu dropdown is grayed out and always set to Install; you cannot uninstall an OS deployment. The page offers different options if Purpose is set to Required. The Deployment Settings offers the following options:

images Purpose: Select whether the deployment is mandatory. There are two choices from a dropdown menu:

images Required

images Available

images Require Administrator Approval if Users Request This Application: This option appears only when Purpose is set to Available. This option is usually grayed out for TSs that are imaging a device.

images Send Wake-up Packets: This option appears only when Purpose is set to Required. If this option is checked, ConfigMgr uses its built-in Wake on LAN functionally to send the magic packet that wakes up the client. Before using this option, computers and the network must be configured for Wake on LAN.

images Allow Clients on a Metered Internet Connection to Download Content After the Installation Deadline, Which Might Incur Additional Costs: This option appears only when Purpose is set to Required. Checking this option tells the client it can download content while using a metered Internet connection. Some Internet network providers charge based on the amount of data you send and receive with your Internet connection. The authors recommend that you not enable this option.

images Make Available to the Following: This option allows you to choose to whom the TS is available. There are four choices:

images Only Configuration Manager Clients: With this choice selected, any ConfigMgr client in the collection can see this deployment in Software Center. TS media and PXE booting systems are not able to see this deployment.

images Configuration Manager Clients, Media, and PXE: With this choice selected, ConfigMgr clients can see the deployment in Software Center, and TS media and PXE-booted machines can also see the deployment.

images Only Media and PXE: With this choice selected, TS media and PXE-booted systems can see the deployment, and ConfigMgr clients do not see the deployment.

images Only Media and PXE (Hidden): With this choice selected, the deployment is hidden from the TS media and PXE-booted systems, making it an automated TS. You must set up your TS to be completely automated if you want to use this option.

For most OS imaging deployments, the authors recommend using the option Only Media and PXE to make the deployment available to TS media and PXE-booted systems only.

Scheduling Page

The Scheduling page allows you to select information about when the deployment will be scheduled to become available or executed. It has four options:

images Schedule When This Deployment Will Become Available: Select the day and time for the TS deployment to become available.

images Schedule When This Deployment Will Expire: Select the day and time when this TS deployment will expire.

images Assignment Schedule: This option is available only if Purpose on the Deployment Settings page is set to Required. It allows you to set a schedule for when the TS deployment becomes mandatory. You can choose an exact date and time, or you can assign it to become mandatory as soon as possible, after a logon event, or after a logoff event.

images Rerun Behavior: This option is available only if Purpose on the Deployment Settings page is set to Required. It provides a dropdown menu that allows you to choose how ConfigMgr will handle reruns of the deployment. These are the options:

images Never rerun deployed program

images Always rerun program (default option)

images Rerun if failed previous attempt

images Rerun if succeeded on previous attempt

User Experience Page

Use the User Experience page to customize the end user’s deployment experience. Some choices are dependent on the Purpose setting on the Deployment Settings page. These are the areas to configure:

images Notification Settings: Choose what the user can see and run. There are two choices:

images Allow Users to Run the Program Independently of Assignments: This option is available only if the Purpose setting on the Deployment Settings page is set to Required. If this option is checked, the end user can see this TS deployment in Software Center and run it at will.

images Show Task Sequence Progress: This option allows the user to see the progress bar the TS shows when running each step of the TS. Unchecking this box allows the non-OSD TS to run silently.

images Activities Performed Outside of the Maintenance Window: This option allows you to select between allowing software installation and system restarts to occur if the available time of the deployment falls outside a scheduled maintenance window assigned to the collection.

images Write Filter Handling for Windows Embedded Devices: Check this box to commit the changes at the deadline or during a maintenance window. Windows Embedded Systems (WES) use an overlay to store changes made to the OS; those changes are removed when the device is restarted, and the device is restored back to its original state. When you check this box and the WES gets a TS deployment, the ConfigMgr client requires the WES to reboot and enter service mode, allowing only administrators to log in. ConfigMgr then executes the TS and restarts the WES back into normal mode.

images Allow Task Sequence to Run for a Client on the Internet: This option allows a non-OSD TS to run on an Internet-based client. OSD imaging is not supported on these clients.

Alerts Page

Use the Alerts page to configure the criteria to create an alert inside the ConfigMgr console when the threshold is met. Two options are available:

images Threshold for Successful Deployment: This option is available only if the Purpose setting on the Deployment Settings page is set to Required. If this option is checked, you must choose the percentage amount that must be successful by a date and time you choose. If the percentage is not met by that time, an alert is generated inside the ConfigMgr console.

images Threshold for Failed Deployment: When this option is checked, you can pick a percentage number for the failed deployments. When the deployments reach that failed percentage, an alert is generated inside the ConfigMgr console.

Distribution Points Page

Use the Distribution Points page to customize how the client downloads the content from the DP. There are options to deal with no local DP with content, boundary groups, and BranchCache:

images Download Content Locally When Needed by the Running Task Sequence: This option appears in a dropdown menu but is the only item on the menu. TS deployments always require the content to be downloaded locally to the machine running the TS.

images When No Local Distribution Point Is Available Use a Remote Distribution Point: Selecting this option allows you to have the TS download content from a remote DP if the content is not found on a DP within its boundary. The authors recommend considering this setting carefully. OSD imaging content can be very large—10GB or greater in some cases. If the remote DP is across a slow network link, this could cause network errors.

images Allow Clients to Use Distribution Points from the Default Site Boundary Group: Selecting this option allows the system to fall back to the default site boundary group to find and download content when a local DP within its own boundary group does not have the content available.

images Allow Clients to Share Content with Other Clients on the Same Subnet: Selecting this option allows clients to use BranchCache for content downloads. If BranchCache is not installed on the clients, this item does not affect the content download.

Creating the TS Media

The next step in deploying your OS is creating TS media. Unless you plan to PXE boot all the systems on which you are going to use OSD TSs, you must have some type of TS media to start the process. TS media lets you boot the machine into WinPE so the TSs available for use can be shown to the user. There are four types of TS media you can create:

images Stand-alone media

images Bootable media

images Capture media

images Prestaged media

To create the TS media, navigate in the console to Software Library -> Overview -> Operating Systems -> Task Sequences and either from the ribbon bar or by right-clicking Task Sequences, choose Create Task Sequence Media to launch the Create Task Sequence Media Wizard. This wizard has different pages, depending the type of media you choose to create; in all cases, the last three pages are the standard Summary, Progress, and Completion. Figure 22.20 shows the wizard.

A screenshot shows Select Media Type page of the Create Task Sequence Media Wizard dialog box.

FIGURE 22.20 The Create Task Sequence Media Wizard.

Creating Stand-alone Media

Use stand-alone media when you have systems without a network connection or with a very slow connection and no local DP from which to pull content. Creating stand-alone media involves copying your entire OS deployment with content to the media of your choice, allowing the system to be booted with a USB stick or DVD, and enabling the OSD process to complete without a network connection. If your TS includes tasks that require a network connection, such as joining a domain, those tasks will fail. Using the wizard to create this type of media includes five pages that require user input, discussed in the next sections.

Media Type Page

Use the Media Type page to select the type of media to which you want to write the content:

images Removable USB Drive: Create media using a USB drive plugged into the machine running the console; if you remoted into the site server, the USB drive must be plugged into that site server. Selecting this option makes the Drive box available so you can select the USB drive. You can also format the drive and make it bootable. One caution on using a USB drive: Be sure it is large enough to hold the full set of media. Stand-alone media includes all drivers, packages, applications, boot images, and the OS image. It is not unheard of for the stand-alone media to be 32GB or more.

images CD/DVD Set: Choose the media size from a dropdown menu; 650MB, 4.7GB, 8.5GB, or unlimited. The sizes correspond to sizes of CD and DVD media. The thought is that you write the information to an ISO file and then burn the ISO file to CD or DVD for the machine to be booted with it. Before choosing the media size, have a good estimate of the content size. If the content is more than 8.5GB, you can make multiple files of the size you choose, or you can choose unlimited and create only one file.

images Media File: This option, which is available when the CD/DVD set is chosen, allows you to click Browse and select a folder and filename to use. You can also enter the path and filename (ending with .iso) in the list box. If you did not start the ConfigMgr console with the Run as Administrator option and UAC is enabled, you may receive an error saying you do not have write permissions to the location. Solve this by right-clicking the console icon and choosing Run as Administrator.

Security Page

Stand-alone media contains everything needed to deploy an organization’s image, and it is possible that some sensitive information may be contained on the device where the media is being written. The Security page allows you to require a password to be entered before someone can start the OSD process once WinPE boots. If you check the box Protect media with a password, you must enter and confirm the password.

Stand-Alone CD/DVD Page

On the Stand-Alone CD/DVD page, choose the TS to use for this stand-alone media selection. You can choose only one TS per stand-alone media. Click Browse to see a list of all TSs and then choose one from the list. The middle of the page then shows the content associated with that TS, allowing you to see all of the content items on one page. The check box at the bottom of the page, Detect associated application dependencies and add them to this media, is checked by default. This box checks any applications in the content list and adds any dependencies the applications have to the content list. Unchecking the box could mean that those dependencies are not included in the stand-alone media, which may cause application installations to fail. The authors recommend leaving this box checked.

Distribution Points Page

The upper section of the Distribution Points page shows a list of DPs with the content needed to create the stand-alone media. The list contains any DPs that have any part of the content stored on the DP. It also shows you how many packages of the total number of packages are on the DP (for example, 8 of 10 packages).

The purpose of this page is to select the DP or DPs with all the packages you need to create the stand-alone media. It may be that all packages are distributed to all the DPs; in this case, you might end up selecting multiple DPs so that all of the content is covered.

TIP: CHOOSING THE CORRECT DPS

As the list on the Distribution Points page is in no particular order, take note of the DPs since you will want to select those with the fastest link or DPs that are local to your location. Stand-alone media is created by copying the content in the list from the DP or DPs to the local machine where the console is running. If you pick a DP across a slower network link, it takes much longer to create the media.

Customization Page

Use the Customization page to add any custom commands (which run before the TS begins) to the stand-alone media:

images Variables: At the top of the page, add any OSD variables you want to use. Clicking the yellow starburst icon launches a dialog box that allows you to add the variable name and value and then confirm the value. There is also a box that allows you to hide the value from the ConfigMgr console. For a refresher on OSD variables, see the “Using Variables” section, earlier in this chapter.

images Enable Prestart Command: Checking this box enables a text box where you enter the command you want to run before the TS begins. There is also a check box to include any files you might need for the prestart command. Check this box to select the package that the files are in by using the Set option; click Browse to choose what DP that package is on so it can be downloaded by the stand-alone media installer. An example might be that you need to run a script to check the ConfigMgr database to see if the machine running the stand-alone media is already in the database. You might need to delete that entry for the TS to run correctly. More in-depth information is available at https://blogs.msdn.microsoft.com/steverac/2015/04/22/power-belongs-to-youthe-osd-prestart-command/.

Creating Bootable Media

When you create bootable media, you create an ISO file or a USB drive that allows the system to boot into WinPE. Bootable media contains only the files needed to boot the system; it does not contain any content or image files. Those files must be downloaded across the network from a DP. Using bootable media means that the systems being imaged require network connections. Most of the pages in the wizard for creating bootable media are the same as for creating stand-alone media; the following sections describe those that are different.

Media Management Page

Use the Media Management page to choose how clients will find a management point (MP) so they can download information about the deployment that points them to the correct DPs. Since this is bootable media, no content is included with the media. There are two options:

images Dynamic Media: Allows the media to query MPs to find the correct MP, based on the site boundary for the IP address of that system.

images Site-Based Media: Allows you to pick an MP to use during the OSD process. That MP will be used until the ConfigMgr client is installed, at which point it will find an MP based on the site boundary information.

Security Page

The Security page for bootable media is similar to the Security page in the stand-alone media in that you can choose a password to protect the media; you can also select the certificate you want to use. These are the available options on the page:

images Enable Unknown Computer Support: Checking this option allows the bootable media to work with an unknown computer. In ConfigMgr, an unknown computer is any system without the ConfigMgr client installed or a system that has not been discovered.

images Create Self-Signed Media Certificate: Checking this option allows the Create TS Media Wizard to create a self-signed certificate using the date and time you choose for the start and expiration dates. This certificate is included with the boot media used to authenticate the system running the bootable media with the MP, telling the MP this is a real client that needs access and not a rogue client. The default length of time for the certificate is one year; when the certificate expires, the boot media will no longer work. Using this option allows communication over HTTP.

images Import PKI Certificate: Select this option to import a certificate from your organization’s certificate authority. Browse to select the certificate to import. You must include the password associated with the certificate you want to import. Using this option allows communication over HTTPS.

images User Device Affinity: Use this option to choose how to set up device affinity for the user. User device affinity is the ability for ConfigMgr to understand which device is the user’s primary device. When this option is set for a device, that device becomes the user’s primary device. Applications or other items can then be targeted to the primary device. There are three options to choose from:

images Do not allow user device affinity (default option)

images Allow user device affinity pending administrator approval

images Allow user device affinity with auto-approval

Boot Image Page

Use the Boot Image Page to choose what boot image, DP, and MPs to use for this media. If you chose Site based media in the Media Management page, this option changes, and you can only pick one MP to use. The following options are available on this page:

images Boot Image: Pick the boot image you want to use for this media creation. Choose the boot image that will work with the systems you are imaging; for example, if imaging x86 systems, pick an x86 boot image.

images Distribution Point: Choose the DP from which the wizard will download the boot image. When creating the boot media, the wizard must download the boot image to a local folder on the system running the console. If no DPs are shown when you click Browse, you must distribute the boot image content to your DPs.

images Associated Management Points: The option varies depending on the option you selected on the Media Management page. If you choose Dynamic Media, a list box appears, allowing you to click Add to select multiple MPs for the boot media to use when starting communication. If you choose Site Media, the box is a single list box where you can click Browse to select a single MP to use for that initial communication.

NOTE: IMAGING SYSTEMS WITHOUT A WIRE-BASED NIC

The increase in systems like Microsoft Surface without a wire-based connection to the network make it harder to successfully image these devices from a bare-metal framework or as a reimage. To solve these issues, a ConfigMgr administrator can use a dongle that allows for a network connection using a USB port on the device. This works great as long as the drivers for the dongle are injected into the boot image. The problem has long been with ConfigMgr and its ability to manage hardware identifiers. The issue occurs when the dongle is moved from machine A to machine B. ConfigMgr would now consider machine B to be a known machine, causing issues with OSD when TSs were only targeted to the unknown computers collection. The ConfigMgr administrator would then have to delete the entry from the database so the machine would again become unknown. ConfigMgr Current Branch fixes this problem by allowing you to add hardware identifiers to a list so ConfigMgr will ignore them, allowing you to move dongles from machine to machine without any issues. Access this list by navigating to Administration -> Overview -> Site Configurations -> Sites and then either from the ribbon bar or after right-clicking Sites, choose Hierarchy Settings. In the dialog that appears, choose the Client Approval and Conflicting Records tab. At the bottom of the tab, in the Duplicate hardware identifiers section, click Add to enter the MAC address or SMBIOS GUID of the hardware you want to ignore.

Creating Capture Media

Capture media is created and used when you need to capture an entire image from a reference computer. The reference system is a clean system that has been installed from scratch, configured with the organization’s settings, installed with the appropriate applications, and updated with the current software updates. The capture media allows you to boot into WinPE and capture this image into a WIM file so it can be added into ConfigMgr and used to deploy the OS to other systems.

The wizard has only two pages besides the standard Summary, Progress, and Completion pages—the Media type and Boot image pages. These pages are described earlier in this chapter for other media creations. The capture media contains the ConfigMgr binary files as well as the boot image that you selected in the wizard.

Creating Prestaged Media

Prestaged media allows you to create an image to be used by an OEM to image devices your organization purchases before they leave the manufacturer. Prestaged media is used at large organizations that have a staging center in place but no access to ConfigMgr. Prestaged media contains the boot and OS image; the TS you use with this type of media is not included in the WIM file the wizard creates. An example of how this would work follows: You deliver the WIM file to the OEM, which applies it to the bare-metal machine, which is then sent to the end user or staging center and plugged into the network and turned on. The machine locates an MP from where it will download the TS and starts executing the remaining tasks, eventually completing and giving the end user or staging center a completely imaged corporate machine.

The wizard has several pages, some of which have been discussed before. The Task Sequence page of this wizard is the same page as the Stand-Alone CD/DVD seen in the wizard for stand-alone media. The following sections discuss pages of the wizard that are different.

Media Properties Page

Use the Media Properties page to define the following properties for this WIM file and the actual filename to use:

images Created by

images Version

images Comment

images Media file

Images Page

Use the Images page to choose the image you want to use for the prestaged media. It is automatically populated from the TS chosen in earlier pages of the wizard. It provides the following options:

images Image Package: Click Browse and select the image package that you want to use with this media.

images Image Index: Sometimes an image WIM file contains multiple images, which are separated in the WIM file by different indexes. You see this mostly on OS images that come from the OS manufacturer. An example is the Windows 10 image file, which can contain the Home, Professional, and Enterprise versions in the same WIM file. Use this option to choose the index you want to use from a dropdown menu.

images Distribution Point: Click Browse and choose the DP you want the wizard to use to pull the content from when creating the prestaged media WIM file.

Select Application, Select Package, and Select Driver Package Pages

Three pages are discussed in this section because they are all very similar in layout and in terms of what needs to be entered:

images Select Application

images Select Package

images Select Driver Package

Each page has a list box with Add and Remove choices to select from a list of applications, packages, and driver packages, allowing you to add those items to the WIM file. This allows the content to be stored locally in the WIM file so that if a step in the TS references it, the content is pulled from the local store and not from a DP across the network. It allows you to add tasks into the TS that will install applications, packages, and drivers without having the system connected to the network.

NOTE: ALLOWING UNATTENDED OPERATING SYSTEM DEPLOYMENT

At the bottom of the Select Media Type page in the Create Task Sequence Media Wizard, shown in Figure 22.20, is a check box that allows you to set up the media for an unattended deployment of the OS. If you check this box, the user running the OS deployment is not prompted for any network configuration information or any optional TSs. The required TS runs automatically. The user is still prompted to enter a password if that option was selected when the TS media was created.

Troubleshooting OSD Deployments

OSD is one of the more complex areas of ConfigMgr. It includes several parts: the OS image, drivers, boot images, TSs, and TS media. It has many steps and places where things can and do go wrong. Most of the time, the components and processes work together to complete an OS deployment. When things go wrong or when the completed process is not what you thought it should be, there are places to look, logs to review, steps to monitor, and reports that explain what did not go as expected. The next sections discuss how to monitor and troubleshoot OSD, with some tips to make the experience better for all.

Monitoring OSD

In past versions of ConfigMgr, monitoring could be a difficult and clumsy task. Starting with ConfigMgr 2012 and more so in ConfigMgr Current Branch, monitoring involves a rich set of tools an administrator can use to understand where a system is in the process and what has occurred with that system. The first step to monitoring the OSD process is to navigate to Monitoring -> Overview -> Deployments. Find your OSD deployment in the list and select it. If it is difficult to find the OSD deployment among all the other deployments in this list, sort the list by feature type: Just click the Feature Type column. When you find your OSD deployment and select it, the bottom of the page shows a pie chart with the current summarization status of the deployment, which can provide a quick update. Choose View Status from the ribbon bar or from the right-click context menu to open the Deployment Status page, which shows the following five states possible for the deployment:

images Success: Machines listed here are those that have successfully completed the OSD deployment. They report in green.

images In Process: These machines are currently running the OSD deployment but are not yet finished. These are reported in yellow.

images Error: These machines received the OSD deployment but ran into an error when trying to download the content or execute the deployment. Dig deeper by looking at the lower part of the page to see the asset details. One of the details is the error code returned from the client; use this as a starting point to look for the issue with that client.

images Requirements Not Met: Machines in this state received the deployment but did not meet the rules that allow the deployment to run.

images Unknown: All systems appear in this state after the deployment is created. When a system returns a state message, it moves out of this state. If you see machines in this state after the deployment runs for some time, they did not receive the deployment and could be broken clients.

The Monitoring view can help you understand the deployment status and where machines are in the process (successful or still work in progress), but if you need to dig a little deeper, reporting might be your next step. ConfigMgr has an extensive report library you can access by navigating to Monitoring -> Overview -> Reporting -> Reports.

With each version of ConfigMgr, the number of reports has increased, and Current Branch has 478 reports. Of these reports, 28 of them deal specifically with OSD and TSs. By default the reports are sorted by the Name column in the ConfigMgr console. To focus solely on OSD reports, click the Category column and look for Task Sequence. If using the SQL Server Reporting Services (SSRS) web interface, you see the reports divided between four categories:

images Task Sequence-Deployment Status

images Task Sequence-Deployments

images Task Sequence-Progress

images Task Sequence-References

Some of the 28 reports are more helpful than others. The authors recommend looking at the following 3 reports as a starting point:

images Status Summary of a Specific Task Sequence Deployment: This report provides an overall summary of all resources targeted by the deployment.

images History of a Task Sequence Deployment on a Computer: Use this report to view what the TS executed on the target system and the output or exit code. This is a good report when you are seeing issues with the TS running tasks on the target system, as it shows what tasks were completed and the status message IDs.

images Summary Report for a Task Sequence Deployment: This report summarizes the number of systems that executed the TS, start and end times, and how many failed. While more of a 30,000-foot view, it is a great overall report if you just want a quick summary.

Boot Image Command-Line Support

When problems occur inside WinPE or before the OS image is applied, you may feel like you are inside a black box without knowing where to look. Enabling command-line support inside the boot image can help ease the burden of the black box. To enable this feature, navigate to Software Library -> Overview -> Operating Systems -> Boot Images, select the boot image, and choose Properties from the ribbon bar or after right-clicking Boot Images. Select the Customization tab (refer to Figure 22.7). For more information on the settings in this tab, see the “Using Boot Images” section, earlier in this chapter.

To enable command support, ensure that the box Enable command support (testing only) is checked. If you change the boot image here or in one of the other tabs, you must redistribute the boot image to your DPs before the change becomes active in WinPE. Once the box is checked and a system boots that boot image, pressing the F8 key on the keyboard opens a command window where you can run commands. For example, if you need to verify the IP address, you can run ipconfig /all in the window to return the IP information. A command that administrators commonly run to test network connectivity is the ping command. Use this command to verify that you can reach other network locations.

CAUTION: COMMAND SUPPORT SECURITY RISK

You cannot restrict access to the command line during a TS once it is enabled in a boot image. Internals of the OSD and Windows deployment process are accessible from the command line, including certain passwords stored in clear text.

In general, most organizations consider enabling command line support an acceptable risk as it is relatively hidden and obscure. And without command line support, there is no way to troubleshoot connectivity or other startup issues experienced in the OSD process. If you follow sound security practices, the accounts used and embedded in the process should be least-privilege accounts that can only do their specific tasks.

Using OSD Log Files

When monitoring and reporting is not enough to narrow down the issue, you can dig into the logs. Logging for the OSD process can occur in many places, depending on the process you are looking for and where the TS is in that process.

When creating TS media, the log file is CreateTsMedia.log, found on the site server in the ConfigMgr installation folder AdminConsoleAdminUILog. If on a remote machine running the console, the log is located in %ProgramFiles(x86)%Microsoft Configuration ManagerAdminConsoleAdminUILog. The filename is the same.

The log file when using TSs for deployments is SMSTS.log. This log file lives in different places, depending on the stage of the deployment process. It contains a detailed record of every TS-related action on the target system and usually contains any error that occurred as well as successful executions of TS steps. Referencing this file is the single most important step for troubleshooting a TS and should be the first thing you ask for when troubleshooting. Press the F8 key to open the command window to obtain the log. Table 22.1 shows the location of the log, depending the state of the TS.

TABLE 22.1 SMSTS.log File Locations

Deployment Complete

TS Status

ConfigMgr Client Installed

SMSTS.log Location

No

WinPE Running

N/A

Windows temp folder in WinPE X:WindowsTempSMSTS.log

No

Deployed OS Running with a TS running

Yes

SMSTSLog subfolder in the ConfigMgr client logs folder: C:WindowsCCMLogsSMSTSLogSMSTS.log

No

OS Setup running

No

SMSTSLog folder C drive: %_SMSTSMDataPath%LogsSMSTSLogsmsts.log

Yes

Deployed OS Running no TS is running

Yes

ConfigMgr client logs folder: C:WindowsCCMLogsSMSTS.log

You may need to check the SMSTS.log if the TS fails, but you may discover that the target system rebooted before you could access the file. An example of this might be when you are testing your TS; you initiate the sequence and then go home for the night, expecting to check it in the morning, only to find the system rebooted and is sitting at the network page. This probably means that the TS encountered an error, the machine waited the default 15-minute timeout and then rebooted, WinPE loaded, and you lost everything in the log about the error. The authors suggest that in such a situation, you reset the default time-out for when an error occurs. You can do this by adding a step to your TS that changes the value of the SMSTSErrorDialogTimeout variable. Figure 22.21 shows an example where the value is set to 86,400 seconds (24 hours). Changing the value for this setting should give any administrator adequate time to see the error and collect the logs for review.

A screenshot shows Sample TS for Setting Timeout Error Variable Task Sequence Editor dialog box.

FIGURE 22.21 Setting the SMSTSErrorDialogTimeout variable.

TSs can get very long (200 steps are more); if this occurs, the log file rolls over, and you lose valuable information that might be needed for troubleshooting. You are left trying to reproduce the issue and catch log files before they roll over. You can change the parameters of the SMSTS.log file, which are hard-coded by default when WinPE boots. They are set in the WinPE Registry; press the F8 key to open the command window and type regedit.exe. In the Registry editor, navigate to HKLMSoftwareMicrosoftCCMLoggingTaskSequence, which shows you the following values about the logging for SMSTS.log:

images LogDirectory=X:WindowsTemp

images LogEnabled=1

images LogLevel=0

images LogMaxHistory=2

images LogMaxSize=2097152

These values turn on logging and set the values; the ones you will want to change are LogMaxHistory and LogMaxSize, which modify the number of rollover logs and the size of a log. If you change these in the Registry, they will not take effect. The authors recommend changing the values using the SMSTS.ini file; this text file contains the settings you want for those Registry values. SMSTS.ini is read at WinPE boot time, before any TS runs and before the TS environment is built. The settings are usually the first line in your SMSTS.log file. Changing the values here allows your settings to be in place from the very beginning. The format of the file is very simple, just the settings you want to change:

[Logging]
LOGMAXSIZE=5120000
LOGMAXHISTORY=6
DEBUGLOGGING=1

Create a text file named SMSTS.ini, edit the file to include these options using the values you want to set, and save the file. Be sure the file is named SMSTS.ini, as sometimes when creating text files, the file may end up with an extra .txt extension (for example, SMSTS.ini.txt). Once the file is created, copy the file to the following two locations on your ConfigMgr site server:

images <ConfigMgr_install_directory>OSDini386

images <ConfigMgr_install_directory>OSDinx64

Now navigate to Software Library -> Overview -> Operating Systems -> Boot Images, select the boot image, and choose Update Distribution Points from the ribbon bar or after right-clicking Boot Images to start the process of creating an updated boot image. The process injects SMSTS.ini into the WinPE image and distributes the image to your DPs. If you have set up PXE booting with WDS, the image used when a machine PXE boots is also updated. If using more than one boot image, you must update the others as well. When the log values are working the way you want, you must still collect them. The blog entry at https://blogs.msdn.microsoft.com/steverac/2008/07/15/capturing-logs-during-failed-task-sequence-execution can help automate part of that process. Be aware that no matter how much automation you have, there will still be times when you must collect the files manually.

The SMSTS.log file is not the only log file created or updated during the OSD process. The Setup Windows and ConfigMgr task runs the Windows Setup program, which creates and keeps several logs updated throughout the process. The following logs are some of the ones that may be of importance when looking for solutions to problems:

images %SystemRoot%Panthersetuperr.log

images %SystemRoot%LogsDISMdism.log

images %SystemRoot%LogsCBSCBS.log

images %SystemRoot%DebugNetSetup.log

For more information about the Windows Setup logs, see https://support.microsoft.com/help/927521/windows-vista,-windows-7,-windows-server-2008-r2,-windows-8.1,-and-windows-10-setup-log-file-locations.

Once you have a log file, you need to view it. As it is a text file, you can use Notepad, but it will not be formatted for the best viewing. The preferred tool to view all ConfigMgr log files is CMTrace.exe, found in <ConfigMgr_install_directory>Tools. CMTrace was built by the ConfigMgr product team and is updated with each version of ConfigMgr. It is designed to present the ConfigMgr logs in a more readable format, showing the log text, component, date and time, and the thread that wrote the log entry, which is valuable because many ConfigMgr components are multithreaded. You can search up or down the log for information. Errors are highlighted in red and warnings in yellow. You can also choose your own words and colors to highlight those words. The error lookup tool, accessed from the Tools menu or by pressing Ctrl+L, allows you to enter the error code and returns the text message associated with that error.

A very useful but often overlooked feature of CMTrace is its ability to open multiple log files and merge them chronologically. This can be helpful if you need to trace the flow of an object across multiple components. Access the feature by opening CMTrace without any log files open and then select the open folder icon or choose File -> Open to see the list of log files; at the bottom of the page, select the Merge selected files check box to open the files as a single file and then arrange the lines by their date and time values.

Understanding the PXE Boot Process

Networks that use PXE booting make life much easier for an OSD administrator. No more dealing with boot media or USB sticks or having to update them when a change is made to the boot image, although the authors recommend having these items available as a backup in case PXE does not work. However, this easier process has its drawbacks. PXE booting is prone to issues from network, routing, and DHCP problems—components external to ConfigMgr. The first stop for PXE boot issues is the PXE log file, SMSPXE.log, located on the system running WDS and PXE and usually in the SMS_DP$SMSLogs folder. The log file provides information about the system that is PXE booting, its MAC address, whether the system is known or unknown, the lookup reply, the package ID of the boot image it is looking for, and any errors that occur. These all could be pieces of the puzzle to help fix the error that is occurring. The following are common issues with PXE booting:

images IP address helper services are not running.

images Ports on the routers or firewalls are not open to allow PXE packets across the network.

images DHCP servers are not configured to process PXE boot packets.

images Domain Name System (DNS) resolution is not working correctly.

images The DHCP address pool is exhausted.

The PXE boot screen on the target system may also contain some valuable information. Figure 22.22 shows the boot screen for a virtual machine.

A screenshot shows the PXE boot screen for a virtual machine. Client MAC address, GUID, IP, mask, DHCP IP, and Gateway IP are indicated at top. The message from administrator and contacting server are also indicated.

FIGURE 22.22 PXE boot screen for a virtual machine.

One often overlooked issue with clients having PXE boot failures is the IP address. A quick look at the PXE boot screen shows whether the client obtained a DHCP IP address. This screen also gives the IP address of the DHCP server it is talking to, its default gateway, the IP address of the WDS server, and the MAC address and GUID of the client system. Notice that it also says that ConfigMgr is looking for a policy. This is important because it determines whether the client is known or unknown to ConfigMgr. This is where the hardware identifier explained in the “Boot Image Command-Line Support” section, earlier in this chapter, comes in to play and allows you to PXE boot or not.

Many PXE issues are related to the network. One item that helps with some network issues is being able to change the default TFTP block and window size. If the default sizes are not working because of custom network changes, you may encounter time-out errors when trying to download the boot image. ConfigMgr now allows you to customize two settings:

images TFTP Block Size: This is the size of the data packets sent by the server to the client downloading the file. A larger block size allows the server to send fewer packets, meaning fewer round-trip delays between the server and the client. However, large block sizes lead to fragmented packets, which are unsupported by most PXE client implementations. Change this value by locating the following Registry key on the PXE-enabled DP: HKLMSoftwareMicrosoftSMSDPRamDiskTFTPBlockSize; the default value is 4096 (4K). (If the key does not exist and you need to change the block size, you must create the key.)

images TFTP Window Size: TFTP requires an acknowledgment (ACK) packet for each block of data sent. The server does not send the next block until it receives an ACK for the previous block. TFTP windowing is a feature in WDS that allows you to define how many data blocks fill a window. The server sends the data blocks back-to-back until the window fills, and then the client sends an ACK packet. Increasing this window size reduces the number of round-trip delays between the client and server, decreasing the overall time for downloading a boot image. To change this value, locate the following Registry key on the PXE-enabled DP: HKLMSoftwareMicrosoftSMSDPRamDiskTFTPWindowSize; the default value is 1. (If the key does not exist and you need to change the block size, you must create the key.)

Updating Your OS Images

As you deploy OSs to new machines and even old ones, it is important to keep your images current with new security updates. It does not matter which OS is deployed, new or old: They all need to be updated. The authors recommend that you update each image on a quarterly basis. Offline servicing is an easy way to accomplish this process as ConfigMgr has built offline servicing of OS images into the console. To get started, navigate to Software Library -> Overview -> Operating Systems -> Operating System Images, select the OS image, and choose Schedule Updates either from the ribbon bar or after right-clicking the OS image to launch the Schedule Updates Wizard, shown in Figure 22.23.

A screenshot shows Choose Updates page of the Schedule Updates Wizard dialog box.

FIGURE 22.23 The Schedule Updates Wizard.

The wizard may take several minutes to populate the page of updates, as it must scan the image to get the list of updates needed. This process relies on a working Software Updates installation in ConfigMgr. The wizard uses the synchronized software updates as a baseline to scan against so it knows what updates can be applied. It is key to synchronize the updates for the OS versions of the images being used. The offline servicing process works only for security updates for the OS; Microsoft Office updates are not applied. The wizard has the standard Summary, Progress, and Completion pages as well as two pages for user input:

images Choose Updates: The list box in the middle of this page is populated with the updates applicable to the image you selected. How many are listed depends on how long ago the image was last updated. The older the image, the more updates it will need. Beside each update is a check box for you to select or deselect that update. By default all updates are selected. Above the list box are two options: a check box to select or unselect all updates at one time and a dropdown that allows you to choose between x64 and x86 architectures.

images Set Schedule: Select the schedule to use to update the image. Choose As soon as possible or pick an exact date and time to use. Two check boxes are checked by default: Continue on error, and Update distribution points with the image. Sometimes an error will occur when trying to apply the update to the image; the Continue on error option allows the process to continue and not stop on that error. The Update distribution points with the image check box allows DPs to be updated with the newly updated image when the process is finished.

The process is fairly simple: The image is copied to a temporary location on the machine running the console, the image is mounted, updates are applied using the DISM tool, the image is saved as it is unmounted, the old image is renamed, and the new image is copied back to its permanent location. The DPs are then updated if the box was checked in the wizard. The entire process is logged in the OfflineServicingMgr.log file located in the <ConfigMgr_install_directory>Logs folder.

Summary

OSD is a large topic that cannot really be covered in a single chapter. If you search, you will find entire books dedicated to OSD and the deployment of OSs in general. Many organizations have dedicated deployment experts whose only job is deploying Windows and implementing OSD. Good or bad, you will be learning OSD and deployment techniques as long as you are in the business of Windows deployment.

OSD continues to be a primary reason for many organizations to implement ConfigMgr. Once set up and configured correctly, ConfigMgr becomes a workhorse that reduces the workload of IT administrators, engineers, and architects while also improving user satisfaction and overall effectiveness of the IT department. With Windows 10 Servicing inside ConfigMgr and the ability to create a streamlined upgrade TS, Microsoft has committed to enhancing OSD even more with ConfigMgr Current Branch, allowing the deployment and overall Windows experience to become as painless as possible.

The next chapter discusses security issues you should consider when implementing System Center Configuration Manager.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset