In this session we will cover the advantages and use cases for utilizing Scripted Installs when deploying Windows. We will look into how to create, modify, and deploy scripted installs also. Learn more: http://dell.to/1GDYpr8
In this session we will explore K2000 Imaging. Exercises will include what’s needed to be done prior to capturing an image and after it is applied. Learn more: http://dell.to/1GDYpr8
1) Daniel menerima penglihatan tentang pertempuran antara malaikat Gabriel melawan kuasa-kuasa kegelapan yang mempengaruhi raja Persia Koresh.
2) Mikhael datang untuk membantu Gabriel melawan kuasa-kuasa kegelapan tersebut.
3) Penglihatan ini memberikan gambaran tentang pertempuran rohani antara kuasa surgawi melawan kuasa kegelapan yang mempengaruhi kekuasaan duniawi.
The document discusses various advanced topics related to the K2000 imaging platform. It provides information on:
1) K2000 acronyms and task IDs used to identify different types of tasks.
2) How applications, batch tasks, and unzipped files are organized in the peinst folder structure.
3) Details on K2000 shares like passwords, visible vs invisible shares, and contents of the peinst share.
4) How scripts and the task engine work in K2000 deployments, including how post-install tasks are implemented.
5) Tips for troubleshooting post-install tasks like quick deployments to VMs and modifying the task XML file.
This intermediate course will go beyond the basics and look at some unconventional wisdom when it comes to deploying software. Large installers, complex installers, repackaging, and more- we'll take a look at best practices that fit. Learn more: http://dell.to/1GDYpr8
This document outlines a six step process for organizations to migrate to Windows 7: 1) inventory readiness to discover all software and hardware, 2) initial OS deployment using scripted installation or file-based imaging, 3) user state migration to transfer user-specific files and settings, 4) software distribution to easily schedule applications, 5) patch management for Windows 7 and applications, and 6) asset management for license and cost analysis. The Kace appliance helps streamline all stages by providing network scanning, smart imaging, user state migration workflows, software/patch deployment, and centralized asset reporting.
This discussion will delve into packaging, with real-world examples applying to some of today's more challenging deployments. We will go beyond how to handle the application alone and get into how to take it through to deployment using KACE products: http://dell.to/1GDYpr8
In this session we will explore K2000 Imaging. Exercises will include what’s needed to be done prior to capturing an image and after it is applied. Learn more: http://dell.to/1GDYpr8
1) Daniel menerima penglihatan tentang pertempuran antara malaikat Gabriel melawan kuasa-kuasa kegelapan yang mempengaruhi raja Persia Koresh.
2) Mikhael datang untuk membantu Gabriel melawan kuasa-kuasa kegelapan tersebut.
3) Penglihatan ini memberikan gambaran tentang pertempuran rohani antara kuasa surgawi melawan kuasa kegelapan yang mempengaruhi kekuasaan duniawi.
The document discusses various advanced topics related to the K2000 imaging platform. It provides information on:
1) K2000 acronyms and task IDs used to identify different types of tasks.
2) How applications, batch tasks, and unzipped files are organized in the peinst folder structure.
3) Details on K2000 shares like passwords, visible vs invisible shares, and contents of the peinst share.
4) How scripts and the task engine work in K2000 deployments, including how post-install tasks are implemented.
5) Tips for troubleshooting post-install tasks like quick deployments to VMs and modifying the task XML file.
This intermediate course will go beyond the basics and look at some unconventional wisdom when it comes to deploying software. Large installers, complex installers, repackaging, and more- we'll take a look at best practices that fit. Learn more: http://dell.to/1GDYpr8
This document outlines a six step process for organizations to migrate to Windows 7: 1) inventory readiness to discover all software and hardware, 2) initial OS deployment using scripted installation or file-based imaging, 3) user state migration to transfer user-specific files and settings, 4) software distribution to easily schedule applications, 5) patch management for Windows 7 and applications, and 6) asset management for license and cost analysis. The Kace appliance helps streamline all stages by providing network scanning, smart imaging, user state migration workflows, software/patch deployment, and centralized asset reporting.
This discussion will delve into packaging, with real-world examples applying to some of today's more challenging deployments. We will go beyond how to handle the application alone and get into how to take it through to deployment using KACE products: http://dell.to/1GDYpr8
Learn how to build your Mac image from the ground up. Create a default user template, clean up the file structure, and utilize shell scripting for optimal automated customization. Learn more:
Scripting offers the most flexibility and power of any tool in your toolbox. In this session we'll discover what makes scripts so powerful, some use cases, and learn how and when to apply scripts to accomplish nearly anything! Learn more: http://dell.to/1GDYpr8
Learn how to be more efficient with the K2000. Attend this session to see how to take advantage of all the features to optimize your workflow. Find out more: http://dell.to/1GDYpr8
The document provides information about three Microsoft resources for technical training and software evaluation: the TechNet Evaluation Center, IT Camps, and Microsoft Virtual Academy. The TechNet Evaluation Center allows downloading free trials of Microsoft software. IT Camps are free, hands-on technical training events led by Microsoft experts. Microsoft Virtual Academy provides free online technical courses on Microsoft technologies.
This document provides an introduction to PowerShell for database developers. It begins by stating the goals of the presentation which are to amaze with PowerShell capabilities, convince that PowerShell is needed, provide a basic understanding of PowerShell programming, and point to support resources. It then provides an overview of what PowerShell is, including its history and why Windows needed a shell. It discusses PowerShell concepts like cmdlets, variables, operators, loops, and functions. It also provides examples of PowerShell scripts and best practices. Throughout it emphasizes PowerShell's power and integration with Windows and databases.
This document provides an overview of the steps to build and install the Android Open Source Project (AOSP) from source. It discusses initializing a build environment, downloading the AOSP source tree and device drivers, building and installing the AOSP build on a Nexus 5 device. The build process involves initializing a repo client, syncing the source code, choosing a target, and running make. The installed AOSP build can then be used to power an unlocked Nexus 5 device.
K2000 Keeping Your Deployments Up-to-DateDell World
In this session we will demonstrate methods for keeping your OS deployments current with the latest greatest Windows updates. Learn more: http://dell.to/1GDYpr8
Application distribution with Macs requires a bit of know-how in some cases; In this course we'll take a look at some best practices, how to package some common applications, and the key components of any packaging environment. Learn more: http://dell.to/1GDYpr8
- The document discusses using DevOps practices for databases. It provides an overview of DevOps and how it relates to databases.
- It introduces the speaker, Osama Mustafa, who is a founder, CEO, author and presenter in the Oracle community.
- The agenda includes questions and answers, automation examples, and how DevOps can make a DBA's life easier. It will also explain what DevOps is, why it is used, and when it should be implemented.
There are so many hidden jewels in the inventory, we'll take a deeper look at what's in there, how it's useful, and what's not in there and how to get it in there. Learn more: http://dell.to/1GDYpr8
The document summarizes a Dell World User Forum presentation on troubleshooting the K2000 appliance. The presentation covered K2000 basics, networking configuration, boot environments, deployment methods, installation tasks, and resources for support. It included demos of exploring UEFI partitions, troubleshooting tasks, and generating a K2 Advisor report. The document concluded by announcing the migration of KACE support portal materials to the Dell Software Support Portal starting in November.
The document discusses various Linux system monitoring utilities including SAR, SADC/SADF, MPSTAT, VMSTAT, and TOP. SAR provides CPU, memory, I/O, network, and other system activity reports. SADC collects system data which SADF can then format and output. MPSTAT reports processor-level statistics. VMSTAT provides virtual memory statistics. TOP displays active tasks and system resources usage.
This document outlines a training session on using the Dell K2000 recovery console. It includes an agenda that covers scenarios, basics of the KBE (Kace Boot Environment), recovery overview, portable apps, and putting the skills to work on sample issues. The KBE runs in memory from a diskless environment and contains built-in command line tools and the ability to add portable apps. Sample scenarios covered are issues with no IP address, incorrect partition structure, and malware/virus removal. The training concludes by noting support materials will migrate to the Dell software support portal in November.
This document summarizes a training session on managing remote teams presented at the Dell World User Forum. The agenda covered inventory, deployment, targeting tools and troubleshooting for remote sites. Managing inventory, automating deployments and using tools like replication shares and remote site appliances were discussed as ways to reduce bandwidth usage and centrally manage remote locations. Demonstrations covered using these tools to streamline inventory, deployments and patching across multiple time zones. Roundtable discussions focused on completely remote workforces and teleworkers. Support resources are migrating to Dell's software support portal.
Lecture Lesson 1 Windows 7 ConfigurationKen Hutchins
Windows 7 introduces several interface refinements including changes to the desktop, window manipulation, and keyboard shortcuts. It also includes new features like Aero Snap, Aero Shake, and Explorer libraries. Windows 7 is available in six editions and uses an Upgrade Advisor to check for compatibility. It has a modular architecture with a common MinWin module, edition-specific modules, and language modules.
This document provides instructor materials for a chapter on installing Windows operating systems. The chapter covers modern operating systems, operating system installation, and includes a summary. It discusses operating system requirements, types of operating systems, hardware requirements, and the Windows installation process including partitioning drives, account creation, and configuration options.
Presentation provides an overview of Dell Data Center Networking portfolio overview and product offerings. Content includes
Discussion on Dell Open Networking strategy and Dell reference architectures for Data Center Networking.
This document provides an overview and agenda for a presentation on Dell Storage Management tools. It discusses Enterprise Manager (EM) and how it automates management of Dell Storage Center (SC) systems. EM 2015 includes new functionality like localization and thin import migration from EqualLogic PS series to SC series. It also discusses Dell Storage Manager (DSM), a future unified management platform that will provide a single pane of glass for managing SC, PS series, and other Dell storage products. DSM 2016 R1 will add capabilities like management of EqualLogic PS groups and cross-platform replication between SC and PS series storage systems.
Learn how to build your Mac image from the ground up. Create a default user template, clean up the file structure, and utilize shell scripting for optimal automated customization. Learn more:
Scripting offers the most flexibility and power of any tool in your toolbox. In this session we'll discover what makes scripts so powerful, some use cases, and learn how and when to apply scripts to accomplish nearly anything! Learn more: http://dell.to/1GDYpr8
Learn how to be more efficient with the K2000. Attend this session to see how to take advantage of all the features to optimize your workflow. Find out more: http://dell.to/1GDYpr8
The document provides information about three Microsoft resources for technical training and software evaluation: the TechNet Evaluation Center, IT Camps, and Microsoft Virtual Academy. The TechNet Evaluation Center allows downloading free trials of Microsoft software. IT Camps are free, hands-on technical training events led by Microsoft experts. Microsoft Virtual Academy provides free online technical courses on Microsoft technologies.
This document provides an introduction to PowerShell for database developers. It begins by stating the goals of the presentation which are to amaze with PowerShell capabilities, convince that PowerShell is needed, provide a basic understanding of PowerShell programming, and point to support resources. It then provides an overview of what PowerShell is, including its history and why Windows needed a shell. It discusses PowerShell concepts like cmdlets, variables, operators, loops, and functions. It also provides examples of PowerShell scripts and best practices. Throughout it emphasizes PowerShell's power and integration with Windows and databases.
This document provides an overview of the steps to build and install the Android Open Source Project (AOSP) from source. It discusses initializing a build environment, downloading the AOSP source tree and device drivers, building and installing the AOSP build on a Nexus 5 device. The build process involves initializing a repo client, syncing the source code, choosing a target, and running make. The installed AOSP build can then be used to power an unlocked Nexus 5 device.
K2000 Keeping Your Deployments Up-to-DateDell World
In this session we will demonstrate methods for keeping your OS deployments current with the latest greatest Windows updates. Learn more: http://dell.to/1GDYpr8
Application distribution with Macs requires a bit of know-how in some cases; In this course we'll take a look at some best practices, how to package some common applications, and the key components of any packaging environment. Learn more: http://dell.to/1GDYpr8
- The document discusses using DevOps practices for databases. It provides an overview of DevOps and how it relates to databases.
- It introduces the speaker, Osama Mustafa, who is a founder, CEO, author and presenter in the Oracle community.
- The agenda includes questions and answers, automation examples, and how DevOps can make a DBA's life easier. It will also explain what DevOps is, why it is used, and when it should be implemented.
There are so many hidden jewels in the inventory, we'll take a deeper look at what's in there, how it's useful, and what's not in there and how to get it in there. Learn more: http://dell.to/1GDYpr8
The document summarizes a Dell World User Forum presentation on troubleshooting the K2000 appliance. The presentation covered K2000 basics, networking configuration, boot environments, deployment methods, installation tasks, and resources for support. It included demos of exploring UEFI partitions, troubleshooting tasks, and generating a K2 Advisor report. The document concluded by announcing the migration of KACE support portal materials to the Dell Software Support Portal starting in November.
The document discusses various Linux system monitoring utilities including SAR, SADC/SADF, MPSTAT, VMSTAT, and TOP. SAR provides CPU, memory, I/O, network, and other system activity reports. SADC collects system data which SADF can then format and output. MPSTAT reports processor-level statistics. VMSTAT provides virtual memory statistics. TOP displays active tasks and system resources usage.
This document outlines a training session on using the Dell K2000 recovery console. It includes an agenda that covers scenarios, basics of the KBE (Kace Boot Environment), recovery overview, portable apps, and putting the skills to work on sample issues. The KBE runs in memory from a diskless environment and contains built-in command line tools and the ability to add portable apps. Sample scenarios covered are issues with no IP address, incorrect partition structure, and malware/virus removal. The training concludes by noting support materials will migrate to the Dell software support portal in November.
This document summarizes a training session on managing remote teams presented at the Dell World User Forum. The agenda covered inventory, deployment, targeting tools and troubleshooting for remote sites. Managing inventory, automating deployments and using tools like replication shares and remote site appliances were discussed as ways to reduce bandwidth usage and centrally manage remote locations. Demonstrations covered using these tools to streamline inventory, deployments and patching across multiple time zones. Roundtable discussions focused on completely remote workforces and teleworkers. Support resources are migrating to Dell's software support portal.
Lecture Lesson 1 Windows 7 ConfigurationKen Hutchins
Windows 7 introduces several interface refinements including changes to the desktop, window manipulation, and keyboard shortcuts. It also includes new features like Aero Snap, Aero Shake, and Explorer libraries. Windows 7 is available in six editions and uses an Upgrade Advisor to check for compatibility. It has a modular architecture with a common MinWin module, edition-specific modules, and language modules.
This document provides instructor materials for a chapter on installing Windows operating systems. The chapter covers modern operating systems, operating system installation, and includes a summary. It discusses operating system requirements, types of operating systems, hardware requirements, and the Windows installation process including partitioning drives, account creation, and configuration options.
Presentation provides an overview of Dell Data Center Networking portfolio overview and product offerings. Content includes
Discussion on Dell Open Networking strategy and Dell reference architectures for Data Center Networking.
This document provides an overview and agenda for a presentation on Dell Storage Management tools. It discusses Enterprise Manager (EM) and how it automates management of Dell Storage Center (SC) systems. EM 2015 includes new functionality like localization and thin import migration from EqualLogic PS series to SC series. It also discusses Dell Storage Manager (DSM), a future unified management platform that will provide a single pane of glass for managing SC, PS series, and other Dell storage products. DSM 2016 R1 will add capabilities like management of EqualLogic PS groups and cross-platform replication between SC and PS series storage systems.
Dell Networking Wired, Wireless and Security Solutions LabDell World
The Dell Networking wired, wireless and security solutions lab demonstrates employee and guest wireless access with policies and content filtering. Each lab station represents a remote site, incorporating a SonicWALL TZ300 for security, an X-Series X1008P or X1018P switch for Ethernet connectivity, and an Instant Access Point IAP-205 for wireless device access. Learn more: http://dell.com/networking
Dell Networking’s Unified Network Architecture enables customers to build campus networks in a new way. The C9010 and C1048P convert your entire Enterprise network into a single switching entity, simplifying initial configuration and on-going operational aspects. Learn more: http://dell.to/1WtTO33
Dell PowerEdge zero touch provisioning with Auto Config speeds and simplifies server deployment. Using Server Configuration Profiles and your existing data center infrastructure, deploy one or thousands of PowerEdge servers reliably and repeatably. Learn more: http://www.dell.techcenter.com/LC
Learn how to Deploy, Virtualize, Manage, Maintain, and Automate with the OpenManage Suite. Use products like iDRAC, Dell Repository Manager, OpenManage Essentials, Microsoft System Center Integrations, and VMware integrations to maximize productivity in your datacenter operations. Learn more: Dell.com/OpenManage
Channel Partners: Lead with Dell Software SolutionsDell World
This document provides an overview of Dell's software solutions for endpoint management, data protection, Windows management, and security. It highlights key challenges customers face in these areas and how Dell solutions address them. For each solution area, the document outlines Dell's portfolio of products, key benefits, and opportunities for partners to sell and profit from these solutions through various margin and promotion programs. The overall aim is to help partners build compelling practices around Dell's software offerings.
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
The way educators teach and students learn is fundamentally changing. Flexible, blended, and personalized learning environments are replacing the one-size-fits-all classroom approach. Dell builds educational technology solutions that enable innovation in this new environment while keeping IT affordable to implement and easy to manage
Executing on the promise of the Internet of Things (IoT)Dell World
The document discusses the Internet of Things (IoT) and how analytics can be used to extract insights from IoT data. It describes how IoT involves connecting sensors and devices to collect and transmit data for tracking, analysis, and actions. It also discusses how IoT analytics can reduce risks, optimize customer service, and couple device data with other data sources. Additionally, the document provides examples of how Dell Statistica advanced analytics software and Dell IoT solutions have helped customers in various industries like manufacturing, healthcare, utilities, and more.
The document discusses data protection challenges and solutions from Dell. It notes that 23% of respondents desire increased reliability of backups/recoveries and 22% wish for increased speed or frequency of backups. Dell's data protection approach claims to restore applications and data 6x faster than legacy solutions with near-zero downtime. It provides extensible protection across physical, virtual and cloud in one solution. Dell solutions aim to help customers spend less, operate with more agility, and unlock time in their day.
NVMe PCIe and TLC V-NAND It’s about TimeDell World
With an explosion in data and the relentless growth in demand for information, identifying a much more efficient means of storage has become extremely important. In this session, we will cover the key drivers behind the need for faster and more efficient storage. NVMe, a standardized protocol for PCIe-based storage, is giving users the huge leap in bandwidth required for demanding applications. Samsung, who makes the fastest NVMe SSDs on the market, will cover the benefits enabled by such technology, in areas such as fraud prevention and surgical procedures.
The technology behind flash drives – NAND memory – will be spotlighted in this presentation. Memory manufacturers have improved NAND’s value by migrating from single-level-cell to multi-level-cell designs, but the most significant evolution will be a marriage of triple-level-cell and V-NAND flash manufacturing technologies. Samsung will also provide an overview of the prospects for TLC V-NAND with mobile device manufacturers, while examining the strong potential for a much wider TLC V-NAND market in data centers.
Key Security Insights: Examining 2014 to predict emerging threats Dell World
Cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks. In this session, we’ll present the most common attacks Dell SonicWALL observed since 2014 and the ways we expect emergent threats to affect small and medium businesses, as well as large enterprises moving forward. This session is perfect for anybody who is interested in learning more about the state of the union in security.
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
The way you implement Identity and Access Management (IAM) can make or break your security and compliance strategies. Based on Dell’s experience helping customers deploy IAM properly, we have identified common themes that run through these successful projects. In this session, one of Dell’s IAM experts will present a maturity model that will help you gauge the correct place to start your deployment, highlight the course corrections that may be necessary, and help you determine the path to IAM that’s right for you.
Client Security Strategies To Defeat Advanced ThreatsDell World
With the workplace changing, job responsibilities are being met at home, at customer locations, even in public spaces like coffee shops. Does your security strategy protect you from the damaging costs of a data breach while providing end users seamless access to data and apps on any device, anywhere, at any time? From protecting data on any device, in the cloud, and over public WiFi, to managing access control and governance on networks, we will discuss Dell's approach to securing company data while enabling productivity and mobility.
What a data-centric strategy gives you that others do notDell World
People are now walking data centers, and the front lines of data security aren’t just blurred – they no longer exist. How do you put information in the hands of your workforce when and where they need it while mitigating risk? We’ll walk through a day in the life of a piece of data as it makes its way throughout your organization and the world. With a data-centric strategy that connects four foundational functions of IT security: network, identity and access management, data, endpoint, mobile, and security services, you can reap the rewards of mobility while keeping data safe and your organization compliant.
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
This document discusses building a business case for private cloud adoption. It begins with an overview of cloud adoption trends and the needs of different stakeholders. Common challenges to cloud adoption are also presented. The document then examines myths and realities about cloud computing. A case study is provided on the total economic impact of private cloud based on interviews and surveys. Key benefits included improved efficiency, cost savings, and business agility. The document concludes with next steps around driving private cloud transformation, including people and cultural changes.
Cloud security: Accelerating cloud adoption Dell World
Organizations now have an opportunity to more rapidly overcome their security concerns by using third-party cloud platforms. In this session, Dell SecureWorks security experts discuss the Shared Security Responsibility model, how organizations need to think about security architecture in the cloud, and new Dell SecureWorks services that are helping organizations plan, architect, manage and respond to threats in the cloud.
Detecting advanced and evasive threats on the networkDell World
Threat actors are increasingly employing evasive tactics that bypass traditional security controls, including more advanced technologies such as sandboxing. In this session, Dell SecureWorks will share examples of tactics used, their impact, what this means for organizations and new capabilities for addressing the risk posed by these threats.
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
Moving from infrastructure-centric IT to efficient, software-driven private or hybrid cloud requires more than gluing together knobs and gears. In addition to the infrastructure considerations, special attention needs to be paid to tying business workflows and organizational processes to IT processes to optimize application delivery and increase productivity for your users and customers. How you approach cloud-building to make it really usable by the business is the key to success.
SOCRadar's Aviation Industry Q1 Incident Report is out now!
The aviation industry has always been a prime target for cybercriminals due to its critical infrastructure and high stakes. In the first quarter of 2024, the sector faced an alarming surge in cybersecurity threats, revealing its vulnerabilities and the relentless sophistication of cyber attackers.
SOCRadar’s Aviation Industry, Quarterly Incident Report, provides an in-depth analysis of these threats, detected and examined through our extensive monitoring of hacker forums, Telegram channels, and dark web platforms.
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
SMS API Integration in Saudi Arabia| Best SMS API ServiceYara Milbes
Discover the benefits and implementation of SMS API integration in the UAE and Middle East. This comprehensive guide covers the importance of SMS messaging APIs, the advantages of bulk SMS APIs, and real-world case studies. Learn how CEQUENS, a leader in communication solutions, can help your business enhance customer engagement and streamline operations with innovative CPaaS, reliable SMS APIs, and omnichannel solutions, including WhatsApp Business. Perfect for businesses seeking to optimize their communication strategies in the digital age.
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...XfilesPro
Wondering how X-Sign gained popularity in a quick time span? This eSign functionality of XfilesPro DocuPrime has many advancements to offer for Salesforce users. Explore them now!
How Can Hiring A Mobile App Development Company Help Your Business Grow?ToXSL Technologies
ToXSL Technologies is an award-winning Mobile App Development Company in Dubai that helps businesses reshape their digital possibilities with custom app services. As a top app development company in Dubai, we offer highly engaging iOS & Android app solutions. https://rb.gy/necdnt
What to do when you have a perfect model for your software but you are constrained by an imperfect business model?
This talk explores the challenges of bringing modelling rigour to the business and strategy levels, and talking to your non-technical counterparts in the process.
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
Unveiling the Advantages of Agile Software Development.pdfbrainerhub1
Learn about Agile Software Development's advantages. Simplify your workflow to spur quicker innovation. Jump right in! We have also discussed the advantages.
4. Dell World User Forum
Introduction to Scripted Installs
• OS deployment via Windows source media
• Hardware Agnostic
• Utilizes Driver Share and Driver Feed
• Utilizes application library
• Unattended Installation
• No Sysprep using installation answer file
5. Dell World User Forum
Preparation
• Media Manager uploads Source Media
• Name Descriptively (be specific)
• Follow a naming convention (i.e. OS name, Architecture, Updates, Build)
• Mount ISOs before uploading
7. Dell World User Forum
Types of Media
• Full Packaged Product (FPP)
– Retail Purchase
– Limited License Rights
– Full or Upgrade
• Original Equipment Manufacturer (OEM)
– Pre-installed
– OEM Support
– Downgrade Rights
• Volume Licensing (VL)
– Multiple Agreement Types
– Multiple License Rights
8. 8 ServicesRoom for textDell - Internal Use - Confidential
Volume Activation Models
Key Management Service (KMS)
Activate within your network
Default Volume Activation
• Reimaging
• Downgrade
• Transfer
Multiple Activation Key (MAK)
Activate Online
Volume Activation Management Tool (VAMT)
Active Directory Based
Activate when joining domain
9. Dell World User Forum
WinPE
• Windows PE 3 (AIK)
– Recommended for Windows 7 and below deployments
– Included in WAIK
• Windows PE 4 (ADK 8.0)
– not useful since users are on Windows 7 or 8.1
• Windows PE 5 (ADK 8.1)
– Recommended for Windows 8 and above deployments
– Included in WADK
• Driver Packs
– KACE Driver Packs are PE build specific
10. Dell World User Forum
Drivers Share
• Located at KBOXIPdriversKBE_Windows_x86
– Holds KBE Drivers
– Network and Storage drivers ONLY
– RAW files only – no .zip or .exe packages
– Adding drivers requires re-cache
• Located at KBOXIPdriversWINDOWS_OS
– Network and Storage drivers ONLY
– RAW files only – no .zip or .exe packages
– Adding drivers requires re-cache
– Slipstreamed into installation
– Using drivers_postinstall preferred
11. Dell World User Forum
Driver Feed
• Best method to inject drivers into Scripted Installations
• Located at KBOXIPdrivers_postinstall
• Library-> Driver Feed tab to enable and check for available feeds
• Provides plug and play drivers for certain Dell models
• Automatically leveraged by Scripted Installations
• Custom feeds can be created for models not found in Driver Feed tab
12. Dell World User Forum
Setup.exe
All OS’s
Copy_drivers.vbs
All OS’s
PC uses on-board UNDI NIC driver
WinPe uses Nic drivers Windows
7/8 from the imported
KBE_Windows_86/64 folder
New Windows uses NIC
drivers added through
setup.exe, mid-level-task or
install driver PO task for XP
- Install XP Drivers **
Run_dpinst.vbs
- Install Agent
- Software installation
- Partitioning
- Formating
Drivers Timeline
14. Dell World User Forum
Scripted Install Creation
Scripted Installations Types
– Form Wizard (ease of use)
– Upload Answer File (automated)
– No Answer File (manual)
Form Wizard
› Most Commonly used with SI
› Unattended file makes the process automated
› Very Customizable
15. Dell World User Forum
Exercise: Create a
Scripted Installation
16. Dell World User Forum
Scripted Installation Detail
• Customize Unattend with Wizard
• Cannot change uploaded Source Media
• Can change Installation Tasks
• Can duplicate build
18. Dell World User Forum
Updating Scripted Installations
• Official Source Media does not include all OS patches
• 3rd Party Tools to install patches - WSUSOffline
• Tasks to download and install patches
Patch 1
Patch 2
Patch 3
20. Dell World User Forum
Deployment
• KACE Boot Environment (KBE) Architecture must match OS Architecture
• Deploy without an answer file for interactive or manual builds
• Use Wizard for zero touch deployments
• Always leverage Boot Actions
21. Dell World User Forum
Exercise: Deploy a
Scripted Installation
22. Dell World User Forum
Task Engine
• Provides real time communication during
deployments
• See exactly what is happening with each system
during any deployment
• Optional Cancel Task button
– Set on deployment detail page
• Handles complex deployment tasks, with multiple
reboots, more elegantly
23. Dell World User Forum
User State Profiles
• Systems can be deployed with captured User States
• Integrates with KBE for Offline Scan
• Scheduled using Boot Actions
24. Dell World User Forum
Task Error Handling
• User Interface (UI) to troubleshoot errors
– Command Prompt
– Notepad editor
– Edit Tasks.xml
– Registry editor
– Retry/Resume
• Default Task Error Prompt
• Ability to allow tasks to continue even if there is a
non-fatal error
– Set on deployment detail page
• Error Logging
– 0 = Success
– Any other code = Failure
27. Dell World User Forum
Enable Administrator Account
• Customize Unattend in Setup Configuration
• Click Show to access
• Find </RunSynchronousCommand> and add
28. Dell World User Forum
Encrypting Administrator Password
• Passwords in Scripted Installations are Plain Text
• Use Windows System Image Manager to encrypt
• Overwrite contents and paste in new information
Unattend
File
30. Dell World User Forum
Naming – WSName
• Built-in Naming Rules
• Changes computer name based on uploaded TXT file
• MAC=NAME
• Can be customized
• Runs as Postinstall task
• Requires Reboot
• Requires additional PO task to join domain
MAC Address
and Name
31. Dell World User Forum
Naming – Get/Set computer name
• Used to capture or create computer name
• Saves a file to petemp (MAC=NAME)
• Runs as Mid-Level Postinstall task
• Changes computer name prior to first boot
• Can be customized using variables
• Able to read a file or KACE DB to set name
• No restarts just first boot
• Requires additional PO task to join domain
32. Dell World User Forum
Get/Set Computer name w/ Variables
• Pre-installation Task "Get Computer Name x86“ – Run in KBE
• Post installation Task“ Set Computer Name x86 – Run in KBE prior to first boot (mid –level
PO Task)
• Command line examples: setcomputername.exe /log /name:<desired text/variables>
• setcomputername.exe /name:$OS$Arch-$Serial will set the computer name to W7X64-
1234567
Variables
$Serial - The serial number of the client machine $Asset - The asset tag of the client machine
$Make - The manufacturer of the client machine or
motherboard
$OS - The OS version of the client machine
(W7,WXP,W2K8,etc)
$Model - The model of the client machine or
motherboard
$Arch - The OS architecture of the client machine
$Chassis - The chassis type of the client machine $Mac - The MAC address of the active NIC
34. Dell World User Forum
Troubleshooting
• Windows Setup cannot install critical boot drivers
– If you receive this message during a scripted installation of Windows 7 it means that there is a driver in the
driver share that is conflicting with a driver from the Windows 7 media.
– Knowledge Article 113951
• If Scripted Installation fails after beginning deployment
– Check Source Media – Did you upload ISO file?
36. Dell World User Forum
KACE Support Portal Migrating to Dell Software Support Portal
• Starting in November, all KACE
Support Portal material will be
migrated to the Dell Software Support
Portal
• All service requests will be submitted
online or by phone
• Same great content
– Knowledge base articles
– Video tutorials
– Product documentation
– JumpStart training
• Check out the Support Portal Getting
Started videos
Editor's Notes
Differences in licensing types:
http://blogs.technet.com/b/uktechnet/archive/2013/05/14/what-s-the-difference-between-oem-retail-and-volume-licenses.aspx
Driver Feed
The “Driver Feed” tab however, is different from the “Drivers” tab in two main ways. First, upon downloading a feed for a specific Dell model and operating system the contents are stored in one of the other three visible samba shares, “Drivers_Postinstall”. The second main difference is how and when they are used by a deployment. The “Drivers” share can only used by boot environments and “Scripted Installations” whereas “Driver Feeds” can be used by any of the three Windows deployment options. The reason this is possible is because unlike the “Drivers” which are added to the uploaded source media as if it was part of the original source, “Driver Feeds” are added to the deployment on the fly using DISM.
IMAGE PLACEHOLDER. GET NEW IMAGE FROM 3.7.
IMAGE PLACEHOLDER. GET NEW IMAGE FROM 3.7.
If Kent’s tool is complete by DWUF, replace 2nd bullet with newer information about new tool.