Jump to content

cluberti

Patron
  • Posts

    11,045
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    country-ZZ

Posts posted by cluberti

  1. By adding a network driver to the PE that allows the Dell to work. It's rebooting because it didn't get an IP address, thus can't connect to the deployment server/share, and reboots (silently). You would only see this in the logs, but that is what is happening.

    In fact, simply blindly injecting all drivers into one folder is actually a bad idea, and could actually be part of the problem. You should be JIT injecting drivers based on Make\Model, and using a selection profile for WinPE-specific drivers (and injecting that selection profile *only* into your PE images when they are built, updating as necessary). Thankfully Dell has broken out it's driver packages to be used in this manner quite easily:

    http://www.delltechcenter.com/page/Dell+Business+Client+Operating+System+Deployment+-+The+.CAB+Files#fbid=nVpvfeVg5xD

  2. Is that a complete dump? If so, can it be zipped and uploaded somewhere? That particular function (NdisMCreateLog) takes a handle as it's OUT, so if the handle being NULL is the reason for the crash (and it may very well be, given it's a GPF) then there could indeed be a problem with the miniport that called the API (which in this case would be nm3). It's also possible the buffer size allocated isn't large enough, but I haven't seen crashes due to that in quite literally many, many years.

  3. Note that the CPU is not as important as DISK speed when talking about virtualization on a workstation scale. This changes, of course, in high-density server environments, but for workstation-class virtualization environments you should be focusing more on disk capacity and speed rather than which CPU is faster. At this point, any CPU from Intel or AMD that supports all the bells and whistles will work just fine (and given AMD chips tend to be cheaper, they are a good choice for test environments).

  4. The media point ISO is your entire build point, which is meant to be used offline. If your USB key is bootable (FAT32 is fine, although NTFS is preferred due to FAT32's file size limitations), you can simply place the contents of the ISO onto your USB key and install from there.

    Trial and error, my friend. That's how you learn.

  5. Ah- that's bad. I would suggest removing the PXE service point and WDS again from the machine, enable MSI logging, and reboot. Next, install WDS and the PXE service point, and if that fails we should hopefully have some MSI logs in %tmp% that will be verbose to go along with the installation of the PXE service point to reference to see why it's not instaling it's provider into WDS properly.

  6. Those errors all map to FILE_NOT_FOUND and ERROR_INVALID_HANDLE, meaning it's likely the previous removal did not go as planned and left some things behind. I would strongly suggest removal of the WDS role, reboot, re-add the WDS role, and then try again.

  7. What you need to do is start reading the help - all of the possible options are there. Here's my own customsettings.ini that I use, that automates most everything and has most options specified (even if they're not automated). You can get FAR more creative than this, but this is a start:


    [Settings]
    Priority=ByLaptopType,ByDesktopType,ByServerType,TaskSequenceID,Default
    Properties=MyCustomProperty


    [Default]
    OSInstall=Y

    UserID=Administrator
    UserDomain=DEMO
    UserPassword=Password1

    OrgName=Organization
    FullName=User
    AdminPassword=Password1

    ;JoinWorkgroup=WORKGROUP
    JoinDomain=DEMO
    DomainAdmin=Administrator
    DomainAdminDomain=DEMO
    DomainAdminPassword=Password1

    _SMSTSORGNAME=Demo Build

    WSUSServer=http://MDT
    SLShare=\\MDT\Build$\Logs

    ;BDEInstallSupporess=YES
    BDEInstallSuppress=NO
    BDEInstall=TPMPin
    BDEKeyLocation=C:
    BDEPin=12345678
    BDERecoveryKey=AD
    BDEWaitForEncryption=TRUE

    UILanguage=en-us
    UserLocale=en-us
    KeyboardLocale=en-us;0409:00000409
    TimeZone=035
    TimeZoneName=Eastern Standard Time

    SkipAdminPassword=YES
    SkipApplications=NO
    SkipAppsOnUpgrade=NO
    SkipBDDWelcome=YES
    SkipBitLocker=NO
    SkipBitLockerDetails=NO
    SkipCapture=NO
    SkipComputerName=NO
    SkipDomainMembership=YES
    SkipFinalSummary=YES
    SkipLocaleSelection=YES
    SkipPackageDisplay=YES
    SkipProductKey=YES
    SkipSummary=YES
    SkipTaskSequence=NO
    SkipTimeZone=YES
    SkipUserData=YES

    UserDataLocation=NONE
    FinishAction=RESTART


    [ByLaptopType]
    Subsection=Laptop-%IsLaptop%

    [Laptop-True]
    OSDComputerName=LAPTOPCHANGEME

    [ByDesktopType]
    Subsection=Desktop-%IsDesktop%

    [Desktop-True]
    OSDComputerName=DESKTOPCHANGEME

    [ByServerType]
    Subsection=Server-%IsServer%

    [Server-True]
    OSDComputerName=SERVERCHANGEME

  8. Then your best choice is the netlogon share method of the above KB link - it's easy to set up, it works properly, it's supported by Microsoft, and it's easy to modify in the future if you want to make changes to the profile without having to do anything different.

  9. To answer your second question first, configure bitlocker via the MDT wizard - it will encrypt the drive while the install progresses. This is the quickest way, and if you don't need the entire drive totally encrypted before doing anything else that is the "proper" way.

    As to your first question, I decided to simply provide you a link that should help you find everything you need to make an MDT distribution and put it on a USB key:

    http://tinyurl.com/3zl938r

    The first link should be the most useful.

  10. You need to create a password that meets the default complexity requirements. By default, these require a password of at least 8 characters, and that the password have at lease one lower case letter, one upper case letter, one number, and one special character (the characters above the number keys on your keyboard, like !,%,&, etc).

  11. Actually, that could do it. Just like any install that adds files to the system and triggers CBS, it'll also trigger a scan. In audit mode, this will epic fail if the CRL can't be grabbed or checked (that's likely what's being logged in the catroot logs), and defender is going to try and update/scan new files. It's a bit of a kludge, but just like not running A/V in audit mode, running defender isn't really a good idea either. I'd suggest stopping/disabling the service as your first task when entering audit mode, and setting things back when exiting.

×
×
  • Create New...