SlideShare a Scribd company logo
1 of 24
Dell World User Forum
UFIL508: K2000 Recovery Console
Tips and Tricks
Andrew Lubchansky, Senior Trainer
Michelle Sanchez, Senior Trainer
Dell World
User Forum
Dell World User Forum
Agenda
• Scenarios
• KBE Basics
• Recovery Overview
• Portable Apps
• Putting it all to work!
Dell World User Forum
Scenarios
Dell World User Forum
Scenarios
• K2000 Specific Scenarios
– No IP Address in KBE
– No Drives in KBE
– Incorrect MBR Boot code
– Incorrect or unknown Partition structure
– Manual Image capture
• Non-K2000 Scenarios
– Malware/Virus
– Data Recovery
Dell World User Forum
KBE Basics
Dell World User Forum
KBE Basics
• KBE based on WinPE
• Runs diskless and in memory (X:)
• Automatic mounted shares
– T: or PETemp
– Y: or PEInst
• Authenticates to K2000 using Samba Share Password
• Uses DHCP for IP Address and location of K2/RSA
• Architecture specific scripts and tools
– x64 KBE will NOT run x86 tools
• Contains Java-based VNC server
Dell World User Forum
Exercise: Boot to KBE
Dell World User Forum
Built-in Tools
Dell World User Forum
Command Prompt
• ipconfig
• Kgetdhcp
• xcopy
• diskpart
• BCDedit
• Net use
• DISM
• ImageX
• drvload
• Startnet.cmd
Dell World User Forum
Exercise: Explore
Command Line Tools
Dell World User Forum
Edit File with Notepad
• Notepad Editor
• Can be used as
directory browser
• Useful to edit files
like hosts,
unattend.xml
Dell World User Forum
Edit the Registry
• Installed Windows registry not active/loaded
Dell World User Forum
Loading 3rd Party
Tools
Dell World User Forum
Beefing up the Recovery Console
• Some Applications do run under WinPE, too
• Portable Apps
– Not all will work
– Not all make sense for KBE
• Useful examples
– FreeCommander
– Explorer ++
– Firefox
– Opera
– Clamwin
– WiseDataRecovery
Dell World User Forum
Exercise:
Copying/Launching
Portable Apps
Dell World User Forum
Solving Scenarios
Dell World User Forum
Scenario 1
• Your KBE is getting stuck while booting up. The Boot Environment begins booting, but you get
ERROR: Unable to mount K2000 share…
• Any thoughts?
Dell World User Forum
Exercise: Scenario 1
Dell World User Forum
Scenario 2
• The CEO of your company is having computer issues. You want backup data from the
computer prior to deploying a new system image, but you do not have any way to remove the
drive.
• Any thoughts?
Dell World User Forum
Exercise: Scenario 2
Dell World User Forum
Scenario 3
• A user in your company is having computer issues. This time deploying an image is not an
option. You determine that the computer might be infected with a virus, but you are not able
to get into Windows to remove it.
• Any thoughts?
Dell World User Forum
Exercise: Scenario 3
Dell World User Forum
Thank you.
Dell World User Forum
KACE Support Portal Migrating to Dell Software Support Portal
• Starting in November, all KACE
Support Portal material will be
migrated to the Dell Software Support
Portal
• All service requests will be submitted
online or by phone
• Same great content
– Knowledge base articles
– Video tutorials
– Product documentation
– JumpStart training
• Check out the Support Portal Getting
Started videos

More Related Content

What's hot

Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)Dell World
 
KACE Agent Architecture and Troubleshooting Overview
KACE Agent Architecture and Troubleshooting OverviewKACE Agent Architecture and Troubleshooting Overview
KACE Agent Architecture and Troubleshooting OverviewDell World
 
Software Packaging/Scripting
Software Packaging/ScriptingSoftware Packaging/Scripting
Software Packaging/ScriptingDell World
 
ZENworks Configuration Management 11.4.1 and Windows 10
ZENworks Configuration Management 11.4.1 and Windows 10ZENworks Configuration Management 11.4.1 and Windows 10
ZENworks Configuration Management 11.4.1 and Windows 10Roel van Bueren
 
ZENworks Configuration Management and Windows 10
ZENworks Configuration Management and Windows 10ZENworks Configuration Management and Windows 10
ZENworks Configuration Management and Windows 10Roel van Bueren
 
Novell ZENworks Configuration Management Design and Implementation Best Pract...
Novell ZENworks Configuration Management Design and Implementation Best Pract...Novell ZENworks Configuration Management Design and Implementation Best Pract...
Novell ZENworks Configuration Management Design and Implementation Best Pract...Novell
 
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration ManagementTips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration ManagementNovell
 
Deploying windows 7 using WDS and MDT 2010
Deploying windows 7 using WDS and MDT 2010Deploying windows 7 using WDS and MDT 2010
Deploying windows 7 using WDS and MDT 2010Alan Richards
 
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...Andik Susilo
 
Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...
Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...
Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...Novell
 
Windows Deployment Tools And Methodologies
Windows Deployment Tools And MethodologiesWindows Deployment Tools And Methodologies
Windows Deployment Tools And MethodologiesAidan Finn
 
Novell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best PracticesNovell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best PracticesNovell
 
Troubleshooting K1000
Troubleshooting K1000Troubleshooting K1000
Troubleshooting K1000Dell World
 
1084: Planning and Completing an IBM Connections Upgrade
 1084: Planning and Completing an IBM Connections Upgrade 1084: Planning and Completing an IBM Connections Upgrade
1084: Planning and Completing an IBM Connections UpgradeGabriella Davis
 
IBM Connect 2016 - 60+ in 60 - Admin Tips Power Hour
IBM Connect 2016 - 60+ in 60 - Admin Tips Power HourIBM Connect 2016 - 60+ in 60 - Admin Tips Power Hour
IBM Connect 2016 - 60+ in 60 - Admin Tips Power HourChris Miller
 

What's hot (20)

Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)
 
KACE Agent Architecture and Troubleshooting Overview
KACE Agent Architecture and Troubleshooting OverviewKACE Agent Architecture and Troubleshooting Overview
KACE Agent Architecture and Troubleshooting Overview
 
Software Packaging/Scripting
Software Packaging/ScriptingSoftware Packaging/Scripting
Software Packaging/Scripting
 
ZENworks Configuration Management 11.4.1 and Windows 10
ZENworks Configuration Management 11.4.1 and Windows 10ZENworks Configuration Management 11.4.1 and Windows 10
ZENworks Configuration Management 11.4.1 and Windows 10
 
ZENworks Configuration Management and Windows 10
ZENworks Configuration Management and Windows 10ZENworks Configuration Management and Windows 10
ZENworks Configuration Management and Windows 10
 
Xen.org Overview 2009
Xen.org Overview 2009Xen.org Overview 2009
Xen.org Overview 2009
 
Novell ZENworks Configuration Management Design and Implementation Best Pract...
Novell ZENworks Configuration Management Design and Implementation Best Pract...Novell ZENworks Configuration Management Design and Implementation Best Pract...
Novell ZENworks Configuration Management Design and Implementation Best Pract...
 
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration ManagementTips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
 
Deploying windows 7 using WDS and MDT 2010
Deploying windows 7 using WDS and MDT 2010Deploying windows 7 using WDS and MDT 2010
Deploying windows 7 using WDS and MDT 2010
 
Deployment Day Session 2 MDT 2012 Advanced
Deployment Day Session 2 MDT 2012 AdvancedDeployment Day Session 2 MDT 2012 Advanced
Deployment Day Session 2 MDT 2012 Advanced
 
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
 
Ian Pratt Nsdi Keynote Apr2008
Ian Pratt Nsdi Keynote Apr2008Ian Pratt Nsdi Keynote Apr2008
Ian Pratt Nsdi Keynote Apr2008
 
Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...
Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...
Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...
 
Windows Deployment Tools And Methodologies
Windows Deployment Tools And MethodologiesWindows Deployment Tools And Methodologies
Windows Deployment Tools And Methodologies
 
Novell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best PracticesNovell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best Practices
 
Deployment Day Session 1: Introduction to MDT 2012
Deployment Day Session 1: Introduction to MDT 2012Deployment Day Session 1: Introduction to MDT 2012
Deployment Day Session 1: Introduction to MDT 2012
 
Troubleshooting K1000
Troubleshooting K1000Troubleshooting K1000
Troubleshooting K1000
 
1084: Planning and Completing an IBM Connections Upgrade
 1084: Planning and Completing an IBM Connections Upgrade 1084: Planning and Completing an IBM Connections Upgrade
1084: Planning and Completing an IBM Connections Upgrade
 
IBM Connect 2016 - 60+ in 60 - Admin Tips Power Hour
IBM Connect 2016 - 60+ in 60 - Admin Tips Power HourIBM Connect 2016 - 60+ in 60 - Admin Tips Power Hour
IBM Connect 2016 - 60+ in 60 - Admin Tips Power Hour
 
Server Core2
Server Core2Server Core2
Server Core2
 

Similar to Dell World User Forum K2000 Recovery Console Tips and Tricks

Managing Remote Teams
Managing Remote TeamsManaging Remote Teams
Managing Remote TeamsDell World
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andAlisa Esage Шевченко
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interactionDefconRussia
 
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"Fwdays
 
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...eFolder
 
RHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdfRHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdfPaul Yang
 
VMworld 2013: PowerCLI Best Practices - A Deep Dive
VMworld 2013: PowerCLI Best Practices - A Deep DiveVMworld 2013: PowerCLI Best Practices - A Deep Dive
VMworld 2013: PowerCLI Best Practices - A Deep DiveVMworld
 
Automating Yourself Out of Trouble
Automating Yourself Out of TroubleAutomating Yourself Out of Trouble
Automating Yourself Out of TroubleJose De La Rosa
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Spiceworks
 
Deskpool making vdi cost effective for smb
Deskpool making vdi cost effective for smbDeskpool making vdi cost effective for smb
Deskpool making vdi cost effective for smbDongLiwu
 
Inventory Tips & Tricks
Inventory Tips & TricksInventory Tips & Tricks
Inventory Tips & TricksDell World
 
Cooking with Chef on Windows: 2015 Edition
Cooking with Chef on Windows: 2015 EditionCooking with Chef on Windows: 2015 Edition
Cooking with Chef on Windows: 2015 EditionJulian Dunn
 
Docker in pratice -chenyifei
Docker in pratice -chenyifeiDocker in pratice -chenyifei
Docker in pratice -chenyifeidotCloud
 
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Odinot Stanislas
 
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...eFolder
 
yocto_scale_handout-with-notes
yocto_scale_handout-with-notesyocto_scale_handout-with-notes
yocto_scale_handout-with-notesSteve Arnold
 
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationLecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationKen Hutchins
 

Similar to Dell World User Forum K2000 Recovery Console Tips and Tricks (20)

Managing Remote Teams
Managing Remote TeamsManaging Remote Teams
Managing Remote Teams
 
Scripting
ScriptingScripting
Scripting
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits and
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interaction
 
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
Sergey Dzyuban "To Build My Own Cloud with Blackjack…"
 
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
 
RHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdfRHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdf
 
VMworld 2013: PowerCLI Best Practices - A Deep Dive
VMworld 2013: PowerCLI Best Practices - A Deep DiveVMworld 2013: PowerCLI Best Practices - A Deep Dive
VMworld 2013: PowerCLI Best Practices - A Deep Dive
 
Automating Yourself Out of Trouble
Automating Yourself Out of TroubleAutomating Yourself Out of Trouble
Automating Yourself Out of Trouble
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
 
Deskpool making vdi cost effective for smb
Deskpool making vdi cost effective for smbDeskpool making vdi cost effective for smb
Deskpool making vdi cost effective for smb
 
Inventory Tips & Tricks
Inventory Tips & TricksInventory Tips & Tricks
Inventory Tips & Tricks
 
OS Migration
OS MigrationOS Migration
OS Migration
 
Cooking with Chef on Windows: 2015 Edition
Cooking with Chef on Windows: 2015 EditionCooking with Chef on Windows: 2015 Edition
Cooking with Chef on Windows: 2015 Edition
 
Docker in pratice -chenyifei
Docker in pratice -chenyifeiDocker in pratice -chenyifei
Docker in pratice -chenyifei
 
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
 
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
eFolder Expert Series Webinar — 3 Easy Steps to Configuring Your Own BDR Appl...
 
yocto_scale_handout-with-notes
yocto_scale_handout-with-notesyocto_scale_handout-with-notes
yocto_scale_handout-with-notes
 
Virtualization
Virtualization Virtualization
Virtualization
 
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationLecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 Configuration
 

More from Dell World

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 

More from Dell World (20)

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 

Dell World User Forum K2000 Recovery Console Tips and Tricks

  • 1. Dell World User Forum UFIL508: K2000 Recovery Console Tips and Tricks Andrew Lubchansky, Senior Trainer Michelle Sanchez, Senior Trainer Dell World User Forum
  • 2. Dell World User Forum Agenda • Scenarios • KBE Basics • Recovery Overview • Portable Apps • Putting it all to work!
  • 3. Dell World User Forum Scenarios
  • 4. Dell World User Forum Scenarios • K2000 Specific Scenarios – No IP Address in KBE – No Drives in KBE – Incorrect MBR Boot code – Incorrect or unknown Partition structure – Manual Image capture • Non-K2000 Scenarios – Malware/Virus – Data Recovery
  • 5. Dell World User Forum KBE Basics
  • 6. Dell World User Forum KBE Basics • KBE based on WinPE • Runs diskless and in memory (X:) • Automatic mounted shares – T: or PETemp – Y: or PEInst • Authenticates to K2000 using Samba Share Password • Uses DHCP for IP Address and location of K2/RSA • Architecture specific scripts and tools – x64 KBE will NOT run x86 tools • Contains Java-based VNC server
  • 7. Dell World User Forum Exercise: Boot to KBE
  • 8. Dell World User Forum Built-in Tools
  • 9. Dell World User Forum Command Prompt • ipconfig • Kgetdhcp • xcopy • diskpart • BCDedit • Net use • DISM • ImageX • drvload • Startnet.cmd
  • 10. Dell World User Forum Exercise: Explore Command Line Tools
  • 11. Dell World User Forum Edit File with Notepad • Notepad Editor • Can be used as directory browser • Useful to edit files like hosts, unattend.xml
  • 12. Dell World User Forum Edit the Registry • Installed Windows registry not active/loaded
  • 13. Dell World User Forum Loading 3rd Party Tools
  • 14. Dell World User Forum Beefing up the Recovery Console • Some Applications do run under WinPE, too • Portable Apps – Not all will work – Not all make sense for KBE • Useful examples – FreeCommander – Explorer ++ – Firefox – Opera – Clamwin – WiseDataRecovery
  • 15. Dell World User Forum Exercise: Copying/Launching Portable Apps
  • 16. Dell World User Forum Solving Scenarios
  • 17. Dell World User Forum Scenario 1 • Your KBE is getting stuck while booting up. The Boot Environment begins booting, but you get ERROR: Unable to mount K2000 share… • Any thoughts?
  • 18. Dell World User Forum Exercise: Scenario 1
  • 19. Dell World User Forum Scenario 2 • The CEO of your company is having computer issues. You want backup data from the computer prior to deploying a new system image, but you do not have any way to remove the drive. • Any thoughts?
  • 20. Dell World User Forum Exercise: Scenario 2
  • 21. Dell World User Forum Scenario 3 • A user in your company is having computer issues. This time deploying an image is not an option. You determine that the computer might be infected with a virus, but you are not able to get into Windows to remove it. • Any thoughts?
  • 22. Dell World User Forum Exercise: Scenario 3
  • 23. Dell World User Forum Thank you.
  • 24. Dell World User Forum KACE Support Portal Migrating to Dell Software Support Portal • Starting in November, all KACE Support Portal material will be migrated to the Dell Software Support Portal • All service requests will be submitted online or by phone • Same great content – Knowledge base articles – Video tutorials – Product documentation – JumpStart training • Check out the Support Portal Getting Started videos

Editor's Notes

  1. 1. Restart your Target Computer 2. During Restart hold F12 and choose Onboard NIC to PXE boot 3. Choose Windows Deployment and Recovery (KBEPE3_x86_20131108)
  2. Once the main menu has loaded choose Recovery Choose Command Prompt Run the ipconfig command. If no network interface was shown, it would indicate that a network driver was missing. Run the net use command to display mounted network shares. Run the diskpart command. In the diskpart shell, run the list disk command. If no disk was shown, it would indicate a storage driver issue. Exit the diskpart shell with the exit command. Run the kgetdhcp 66 command. This will return what is defined in DHCP for Scope Option 66.
  3. IMAGE PLACEHOLDER.
  4. IMAGE PLACEHOLDER.
  5. On the HOST computer, open the K2000 folder on the Desktop. Locate the K2000 Recovery Console Tips and Tricks folder. You should find the following applications installed in subfolders: Explorer++ FreeCommander Open a 2nd windows explorer window and enter the following into the address bar: \\192.168.132.5\petemp Use the following credentials to log in: user: admin password: admin Create a folder called “PortableApps” Copy the application folders (Explorer++ and FreeCommander) to \\192.168.132.5\petemp\PortableApps Power on the virtual client and select the x86 boot environment. When the K2000 Deployment Console is loaded, go to Recovery > Command Prompt. Change to the T: drive. Change directory to PortableApps. Run a dir command. You should see the 2 application folders you copied. Enter each application folder and launch each application. Check that the applications are working.
  6. Restart your Target Computer During Restart hold F12 and choose Onboard NIC to PXE boot Choose KBE_Recovery_Tips_and_Tricks Plug USB Flash drive into Target Computer Wait for mount error to show up At the DOS prompt type diskpart and hit Enter Type list vol and hit Enter to determine the drive letter of the USB drive Type drvload e:\driver.inf and hit Enter(use correct drive letter and driver name) Type ipconfig and hit Enter to obtain and IP from DHCP Type startnet.cmd and hit Enter to restart the KBE Main Menu
  7. Restart your Target Computer During Restart hold F12 and choose Onboard NIC to PXE boot Choose Windows Deployment and Recovery (KBEPE3_x86_20131108) On the Target Computer open the Command Prompt option from Recovery menu Type T: and hit Enter to the T drive Type cd PortableApps and hit Enter to change to the PortableApps directory Run a dir command and hit Enter. You should see the application folders you copied Type cd Explorer++Portable and hit Enter to enter the application folder Run a dir command and hit Enter. You should see the application executable Type Explorer++Portable.exe and hit Enter to launch the portable app Using Explorer++Portable navigate to the C: drive Copy the DATA folder Navigate to the T: drive and paste the contents On the HOST computer open a Windows Explorer window and enter the following into the address bar: \\192.168.132.5\petemp Use the following credentials to log in - user: \admin password: admin Notice that your copied data is now available to be moved anywhere else
  8. On the Target Computer open the Command Prompt option from Recovery menu Type T: and hit Enter to the T drive Type cd PortableApps and hit Enter to change to the PortableApps directory Run a dir command and hit Enter. You should see the application folders you copied Type cd ClamWinPortable and hit Enter to enter the application folder Run a dir command and hit Enter. You should see the application executable Type ClamWinPortable.exe and hit Enter to launch the portable app Select No when prompted to download updates You now have the ability to perform an offline virus scan to remove any malicious software while it is not loaded into memory. Do a scan of C:\EICAR to find the EICAR Test Signature
  9. Portal: http://www.software.dell.com/support Ticket Entry: https://support.software.dell.com/create-service-request Videos: https://support.software.dell.com/essentials/getting-started