Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Using ThinkVantage
Technologies: Volume 1
Creating and Deploying Client
Systems
Simplification of the PC life cycle process
with ThinkVantage Technologies
Use of ThinkVantage
Technologies to lower costs
Haakon Fosshaug
Eleanor Howard
David Kohler
Ive Mattheessens
Guy Varendonck
John Zywicki
Byron Braswell
ibm.com/redbooks
International Technical Support Organization
September 2004
SG24-7045-01
Note: Before using this information and the product it supports, read the information in
“Notices” on page ix.
This edition applies to Version 2.01 of IBM ImageUltra Builder, V 4.1.3 of System Migration
Assistant, Secure Data Disposal (SCRUB3), V 3.30 of IBM Access Connections, and V 1.22 of
IBM Active Protection System
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
The team that wrote this redbook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Chapter 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 ThinkVantage Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 ThinkVantage Technologies process improvements. . . . . . . . . . . . . . . . . . 6
1.3 Implementing a ThinkVantage Technologies solution. . . . . . . . . . . . . . . . . 7
Contents v
4.1.1 Using SCRUB3.EXE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
4.1.2 Performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
4.1.3 Practical application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
4.1.4 Running Secure Data Disposal through RDM. . . . . . . . . . . . . . . . . 264
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Contents vii
viii Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area.
Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product, program, or service that
does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document.
The furnishing of this document does not give you any license to these patents. You can send license
inquiries, in writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such provisions
are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES
THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may
make improvements and/or changes in the product(s) and/or the program(s) described in this publication at
any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on
the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrates programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the
sample programs are written. These examples have not been thoroughly tested under all conditions. IBM,
therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy,
modify, and distribute these sample programs in any form without payment to IBM for the purposes of
developing, using, marketing, or distributing application programs conforming to IBM's application
programming interfaces.
Intel, and Intel Inside (logos) are trademarks of Intel Corporation in the United States, other countries, or
both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun
Microsystems, Inc. in the United States, other countries, or both.
Other company, product, and service names may be trademarks or service marks of others.
ThinkVantage™ Technologies bring your IBM® PCs one step closer to being
self-configured, self-optimizing, self-protecting, or self-healing, to help save you
time and money throughout the life of your systems. In short, ThinkVantage
Technologies let you focus your attention on your business, rather than on your
computer.
This IBM Redbook will help you install, tailor and configure the IBM
ThinkVantage Technologies on IBM and OEM desktops.
xii Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
David Kohler is a Systems Management Integration Professional Advanced in
Pennsylvania. He has 16 years of experience in the IT industry and has worked
for IBM for two and half years. He develops global technology solutions and
manages projects for IBM Global Services customers. He is involved with project
management support, technology research and evaluation to ensure that IBM
customers are utilizing products that best fit their unique needs. He has the
following certifications: Microsoft® Certified Professional, COMPTIA A+,
COMPTIA Network+ and Learning Tree International Certified Windows® 2000
Professional. He is currently a senior at Thomas Edison State College of New
Jersey, pursuing a bachelor’s degree in Computer Information Services.
Preface xiii
Thanks to the following people for their contributions to this project:
Margaret Ticknor
Tamikia Barrow
International Technical Support Organization, Raleigh Center
Steven Balog
Frank Benzaquen
Jeff Estroff
Egbert Gracias
Joshua J. Jankowsky
Josh Novak
Caroline Patzer
Ratan Ray
Pritam Pabla
Michaelle Walcutt
David Wall
Goran Wibran
Jeffrey Witt
Adam Wong
IBM RTP, North Carolina
Your efforts will help increase product acceptance and customer satisfaction. As
a bonus, you'll develop a network of contacts in IBM development labs, and
increase your productivity and marketability.
Find out more about the residency program, browse the residency index, and
apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
xiv Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Use the online Contact us review redbook form found at:
ibm.com/redbooks
Send your comments in an Internet note to:
redbook@us.ibm.com
Mail your comments to:
IBM Corporation, International Technical Support Organization
Dept. HZ8 Building 662
P.O. Box 12195
Research Triangle Park, NC 27709-2195
Preface xv
xvi Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Summary of changes
This section describes the technical changes made in this edition of the book and
in previous editions. This edition may also include minor corrections and editorial
changes that are not identified.
Summary of Changes
for SG24-7045-01
for Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client
Systems
as created or updated on February 18, 2005.
New information
Chapter 6. Active Protection System is new.
Changed information
Chapter 2. ImageUltra Builder is completely re-written.
Chapter 3. System Migration Assistant is updated.
Chapter 5. IBM Access Connections is completely re-written.
Chapter 1. Introduction
Over the last decade, controlling complexity has been the goal of every IT
manager. With the introduction of the Internet, new devices and processes have
made delivery of service more complex and it has become critical for IT
managers to contain costs. Understanding the total cost of ownership has made
it necessary to seek methods to reduce costs while improving service.
Despite reductions in PC hardware costs, many have seen costs rise due to
increased product complexity, proliferation-related management and support
issues. Today, the initial cost of buying a PC is the “tip of the iceberg”. This
emphasis on cost reductions requires ways to improve the overall PC
management process.
What has IBM done to alleviate the stress of these costs? The company has
focused research and development efforts around the challenges of reducing
total cost of ownership. Through the evaluation of each phase of the PC life
cycle, IBM has developed a number of technologies in hardware and software to
reduce IT management costs. Known as ThinkVantage Technologies, they
manage the PC life cycle from pre-deploy planning through end-of-life
disposition.
Image deployment
Migration
Retire
Backup/Recovery
ImageUltra Builder
ImageUltra Builder was designed to help simplify your image creation,
deployment and management. This technology is designed to help enterprises
save time and money and to stay productive with a do-it-yourself tool that can
allow you to deploy as few as one image across your enterprise. By combining
multiple languages, applications and operating systems into a single hard drive
image, you help eliminate or reduce the need for manual application installation,
hardware testing and support. This patent-pending technology lets you better
control your IT environment, making deployments less painful, and lower IT
costs.
ImageUltra builder allows for the separation of drivers and applications from a
traditional image, unlike Symantec Ghost and PowerQuest Drive Image. By
separating these components, as well as the OS, we greatly reduce the number
of images that need to be kept. Since drivers and applications are updated, there
is no need to open each traditional image to apply the updates. Customers
already using Symantec Ghost or PowerQuest Drive Image can incorporate their
images into ImageUltra Builder as either semi-portable or system-specific
images.
Chapter 1. Introduction 3
For more information regarding ImageUltra Builder, see Chapter 2, “ImageUltra
Builder” on page 11.
Access Connections
IBM Access Connections is a connectivity assistant program for your IBM
ThinkPad® computer that allows you to create and manage location profiles.
Each location profile stores all of the network and Internet configuration settings
that are needed to connect to a network infrastructure from a specific location
such as home or work. By switching between location profiles as you move your
computer from place to place, you can quickly and easily connect to a network
without having to manually reconfigure your settings and restart your computer
each time.
Chapter 1. Introduction 5
For more information regarding the Embedded Security Subsystem, refer to
ThinkVantage Technologies: Volume 2 Maintaining and Recovering Client
Systems, SG24-6060.
IBM Director
IBM Director V4.1 is the newest release of the industry-leading client/server
workgroup manager. IBM Director’s tools provide customers with flexible
capabilities to realize maximum system availability and lower IT costs. With IBM
Director, IT administrators can view and track the hardware configuration of
remote systems in detail and monitor the usage and performance of critical
components, such as processors, disks, and memory.
Many organizations will relate to Figure 1-3 for each part of the processes
defined. Implementation of the ThinkVantage Technologies will reduce cost and
offer opportunities for companies as illustrated below.
End-User
Image Creation Team Loading Team Install Team Responsibility Help Desk/Desk-Side Install Team
1-3 day [update] 20-40 min 2.5-3h per 1-12h Resources needs to have 20-60 min
3-4 weeks [complex per client system Generate help allocated funds per client
image] 3-4 system/day desk calls COST of DOING business
2-3 IT resources per IT resource
1 day - 1 week 3-5 min 25-30 min per 5-15 min 50% cost reduction 10-15 min
1-2 IT resources per client system SLA driven and not uncommon per client
15-30 system/day automated Better resource
per IT resource usage
Backup/Recovery
Inventory
Figure 1-3 ThinkVantage Technologies tools and simplification of PC life cycle processes
Chapter 1. Introduction 7
Table 1-1 Implementing ThinkVantage Technologies
IBM PCD Tool People needed to Process change Training needed
implement required
IBM Director 1-3 skilled Administrator for No, existing Included in IBM
Agent LE process with Director training
system
1 skilled Administrator for management
SMB best practice
Note: The scale is relative to the other ThinkVantage Technologies uptime and
migration tools and not a measure of good, average and poor.
Chapter 1. Introduction 9
10 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
2
One of the most popular ways of distributing this information is through the use of
images which contain the contents for a workstation. Through the use of images,
corporations can ensure their PCs are consistently functional without having to
load every machine individually. IT departments use images to control the
versions of software and drivers used throughout a company.
The following sections will take you through how the modular approach of
ImageUltra Technology will help you manage all your corporate images within
one unique interface. We will also discuss how ImageUltra Builder interacts with
other image management tools such as Microsoft Sysprep and Symantec
DeployCenter.
2.1.1 Current tools and procedures used to build and deploy images
Unattended Installation - Scripted
Unattended installations can be either a CD based installation or an
over-the-network installation on to the hard disk drive in a PC.
Can be fully unattended or partially unattended using Answer files created
using the UNATTEND.TXT file
Answer files determine what defaults to provide or what information to allow
users to provide (user name, domain etc.)
Downside, can take hours to install
High technical knowledge needed to create and maintain scripts.
Distribution hardware requirement in an “over-the-network installation”
environment
Upside, can support multiple hardware
Through new tools and techniques, the ImageUltra Builder program enables you
to break down images into reusable subcomponents (called modules) and use
tree structures called maps to construct your images. These images (referred to
as Smart Images, see 2.5.1, “ImageUltra Builder terminology” on page 21 and
2.6, “ImageUltra Builder process to create a Smart Image” on page 32) can then
be deployed across a broad range of hardware platforms. Each Smart Image
component is stored in a central location called a Repository. ImageUltra Builder
creates and uses the IBM service partition for deployment.The service partition
Import Image
modules
Deply
Import
Image
Operating system,
modules to
application, and device Service
Create Image layout
driver (opt.) modules Partition
Maps
Repository
Deploy,
Repository Install
Additional drivers,
application modules Drag-n-drop modules
Build
Build custom
modules
There are several steps that need to be taken before the technical teams can
become fully engaged. Completing these up front will save time and effort once
the project begins. All engaged team members should be setup with the following
if applicable:
Security IDs
Network IDs
Remote access IDs and software
Badges
Server location information supplied to all the team members. This would
include project required server share names, application and storage shares.
If this has not been previously outlined, create a static location for all software
and image storage. This will keep consistent all images, testing software and
documentation.
2.3.2 Image
The image section helps determine the expectations and requirements for
creating an image. It would be a best practice to determine which PC models and
operating systems shall be maintained in the current and future environments.
2.3.3 Applications
The application section covers the standard or unique applications on the
production images.
Create a matrix of all standard applications required on each image.
– Determine an application owner contact for supporting each application.
– Required languages
– Required versions
– Specific location/region applications
– Business Unit specific applications
– Acquire all application source and licenses.
– Verify that the application is certified to run on the standard image
operating system.
Determine if or which applications will need packaged installations for the
image. All the applications will need to install silently using the ImageUltra
Builder, or IBM Software Delivery Center products.
Create installation and configuration instructions for each application.
2.3.4 Distribution
The distribution section covers the integration of the image once approved for
production.
Determine the ImageUltra Builder distribution method for the image.
– CD or DVD media
– LAN
– WAN
– All
If required, provide a storage location for archiving legacy images.
Determine the location of image integration. Several scenarios can be used
depending on new product rollouts or rebuilds.
– Locally
– A supplier
– IBM Image and Technology Center
Determine a software distribution method for ad-hoc updates
– Security updates
– Hardware BIOS or driver updates
• IBM Update Connector
• IBM RDM
– Manufacturer patches or updates
• Access IBM
– Application updates
Removable-media drives:
CD or DVD drive for installation
Diskette drive for the creation of Network Deployment Diskettes and Import
Diskettes
CD-RW drive for CD deployment
Minimum networking speed: 10 Mbps; Ethernet or token ring
The repository stores all the modules and deployment maps into a central
location.
All three image types can be used by a corporation, as can any combination of
the image types.
Figure 2-2 outlines the basic differences between the three image types.
Supported operating systems Win2000, WinXP Win2000, WinXP Any operating system
Supported hardware IBM Only IBM and non-IBM IBM and non-IBM
During the deployment process, you choose which base map and which driver
map to deploy. This enables you to maintain device-driver modules and driver
maps independently of the operating-system and application content defined by
base maps. In addition to modules, the ImageUltra Builder program enables you
to create containers in the repository.
Container
A container is a special type of module that enables you to group other
modules together under a single identifier. All modules in a container must be
of the same type. For example, you might want to group all of the device
drivers used for a specific machine type into a device-driver container. Or, you
might want to group a Windows 2000 base operating-system module with all
of its associated add-on modules into an operating-system container. The use
of containers is optional, but you might find containers helpful when creating
maps because you can simply inserting the container module into your map
instead of inserting each individual module.
Filters
Filters automate a decision during the installation process. You typically use
filters to obtain hardware-related information from a target computer to
determine if a specific module or set of modules should be installed. The
ImageUltra Builder program provides filters that check the machine type,
machine type and model number, hardware platform (mobile or desktop), and
whether or not a computer is an IBM computer. You can also develop your
own filters if needed.
General Tab
The general tab allows you to enter general information about the module.
Module name, version number, description of module, and there is even a field to
encrypt your module.
Languages Tab
By checking a language and operating system box, ImageUltra Builder will check
the operating systems and language during the deployment stage; if there is no
match, the module will not be deployed.
Source Tab
In the source tab you detail all commands and files necessary to the execution of
a module.
In the Source directory field, browse to the directory where the source file for
this application is located. Example: C:\apps
Filters Tab
Filters are usually DOS-based programs. Typically, they will be a .EXE or .BAT
file. Once you have created your filter modules you can then apply them to other
modules.
Example: Filter ISIBM will run a check to make sure the hardware this module is
being deployed to is an IBM Machine.
Options Tab
There are a number of fields on this tab that will allow you to control the
installation behavior of the module:
Target location
These fields define whether the application files should be copied to the target
partition.
If you type a path in this field and you also provide a Silent install command on
the source tab, the files will be copied to the target partition in addition to the
application being installed.
If you type a path in this field and you do not provide a Silent install command on
the Source tab, the files will be copied to the target partition, but the application
will not be installed automatically.
Behavior
These fields are used to control the module installation order.
Install hook
– Install during auditboot (Default): This selection enables the module
you are creating to be installed during the first boot after the Windows
setup is complete.
– Install during customer first boot: This selection enables the module
you are creating to be installed after the auditboot, upon successful
completion of Windows setup.
– Install when customer chooses via desktop shortcut: This selection
enables users to install the module after the image is installed by clicking a
shortcut on the desktop. The ImageUltra Builder program copies the
Once you have completed the above steps you can then deploy your Smart
Image to the target systems. The following sections will take you through each of
the steps in the above process.
ThinkVantage
Provide a name for the folder that the repository will be stored in.
Tip: It is recommended that you keep the length (and simplicity) of your
directory and share locations as short as possible. This reduces the
chance for error in your scripts and also avoids any “directory length”
limitations that might be imposed by the operating system.
ThinkVantage
Since this is the first repository that is created, accept the default repository
ID that is provided. Click Next.
Note: This window provides details of what the repository ID is and what it
is used for.
2. Right-click Repository (see Figure 2-7). You will see a window similar to
Figure 2-8.
3. Click Insert.
4. Click Folder. You will see a window similar to Figure 2-9 on page 39.
5. Rename the new folder to a name that is readily associated with the hardware
platform that include the recovery CD modules (see Figure 2-9). In this case,
T40_Windows_2000 is the name of the folder where the T40 ThinkPad
Windows 2000 Professional recovery CDs will be imported.
In the next section, we begin preparing the source files for a module.
5. Click Next.
Note: If there are existing modules and/or maps in the repository folder
that you are importing to, you will be prompted by the following window
19.Click Finish.
Common tools used to generate silent install packages for your applications or
device drivers are Windows Installer and InstallShield. We will have a look at both
in the following sections.
The Windows Installer reads the installation database, performs the installation
and then monitors the installed software to ensure functionality. When an .MSI is
opened, msiexec.exe reads the data stored in the database and builds an
internal script. It then performs the actions in the script to complete the
installation. Sometimes Install Packages pre-install Windows Installer as part of
their installation package.
A transform is a special kind of Windows Installer file (.MST file) that customizes
a Windows Installer installation package. You use it to change the installation in
some way for a specific set of customers or users.
There are four User Interface Levels that can be used while installing a package:
1. NONE (Completely silent installation)
2. BASIC (Simple progress bar and error handling)
3. REDUCED (Authorized UI, wizard dialogs suppressed)
4. FULL (Authorized UI with wizards, progress bar, errors)
To run an installation package with silently, you need to use the following
command:
If your release settings include SETUP.EXE, you can run the following command:
SETUP.EXE /s /v"/qn"
Basic MSI projects do not create or read response files. To set installation
properties for a Basic MSI project, use a command similar to the following:
MSIEXEC /i Product.msi /qn INSTALLDIR=D:\ProductFolder USERNAME=’Valued
Customer"
See the documentation associated with the specific installation product if you
encounter any problems.
2.9.2 InstallShield
InstallShield is a very commonly used application packaging system. Installation
packages created using InstallShield recognize commands such as /s, /SMS /r
etc. The installer itself is the setup.exe file. To ensure the application installs
silently, you will need to generate a response file (.iss file) if one is not already
present. Both of these files, plus any other files needed to install your package
need to be stored in the same folder.
Figure 2-17 Setup.exe and setup.iss files must be in the same folder
5. Follow the steps to install the program. As you install the program, the
keystrokes and mouse clicks are recorded in the new SETUP.ISS file.
Because the values you type will be used on all target computers, you should
use company-related information in place of any personal information for
which you might be prompted.
6. When the installation is complete, the new SETUP.ISS file will be in the
Windows folder for Windows XP and the WINNT folder for Windows 2000.
7. Copy the new SETUP.ISS file from the Windows folder into the folder that
contains the application SETUP.EXE file.
Now that you have generated all necessary files to silently install your package,
you can create a module in ImageUltra Builder from these source files.
6. Click Next.
7. On the next window, you will be asked if you would like to create this module
with the same settings as an existing module. Click Next without selecting any
modules.
Under the languages selection, click the relevant Languages and Operating
Systems boxes that this module will be supported on. In our example we have
selected Check All.
– In the Source directory field, browse to the directory where all the relevant
files needed to silently install this application are located.
– Select your setup executable or your batch file for your application. In our
example we browse to the wrar280.exe file.
– In the Parameters field, enter your silent install commands. In our example
we have used /s which is an install shield command. The /s command will
ensure that the response file gets called to automate the installation.
11.Close the Properties window, and when prompted, click Yes to save.
You will now see the new module under the Applications tab on the main
console.
12.Right-click the module, select Build.
You will now see a status bar indicating the module building progress.
The following sections show how to install an audio driver using both of these
methods.
6. In the Name field, type SoundMAX Audio Driver. Do not choose to make this
module a container.
7. Click Next.
8. You will now be asked if you would like to create a module, with the same
settings as an existing module. Do not select an existing module here. Click
Next.
10.In the Version field, enter 5.12.01.3535. To find the version of the device
driver, open the INF file associated with your driver. See Figure 2-28.
Tip: When creating device driver modules it is highly recommend to enter the
version of the driver being installed to help you keep track of different driver
versions.
13.Under the Languages selection, click Check All. Under the Operating
Systems selection, select Windows 2000, Windows 98, Windows
Millennium, Windows XP Home and Windows XP Professional.
Figure 2-33 Check the INF installable box in the Options Tab
4. Close the Properties window. When prompted, select Yes to save the module.
You will see the module under the Device Driver tab on the main console.
5. Right-click the module, select Build.
6. When the build process is finished, you will see a window that lists the script
files that have been created.
You will see the module under the Device Driver tab on the main console.
7. Right-click the module, select Build.
8. Click Finish. The module has now been built.
When would you need to use this filter? For example, an application such as
IBM’s Active Protection System, which is dependant on mobile hardware, and will
not function on a desktop system, you can use this filter.
3. Right-click the space in the window and select Insert OS. You will see a
window similar to Figure 2-36 on page 67.
6. In the Name field (Figure 2-38), type Windows 2000 Service Pack 4. Do not
choose to make this module a container.
Figure 2-40 Create module wizard, operating system module type selection
Note: You can assign a password to the module; this will prevent the
module from being unpacked by any process other than an ImageUltra
Builder process.
14.Under the Languages selection, click Check All. Under the Operating
systems selection, select Windows 2000.
Note: The ImageUltra Builder will check the operating systems and
language during the deployment stage; if there is no match, the module will
not be deployed.
16.Click Browse next to the Source directory field, locate and select the
c:\win2ksp4\i386 directory.
17.Click Browse next to the Silent install command, locate and select update.exe
in the c:\win2ksp4\i386\update\ directory.
18.In the Parameters field, type -q -n -z.
The preinstall command runs before the Silent install command. An example
of this would be a utility that creates a directory.
The postinstall command runs after the Silent install command. An example
of this would be a utility that deletes a shortcut.
20.Change the Install slot to 1. We want the Service Pack to install before any of
the other modules.
21.Close the Properties window. When prompted, select Yes to save the module.
You will now see the new module under the Operating Systems tab on the
main console (Figure 2-46).
Important: Understand that the order in which these partitioning modules are
installed is extremely important. You set the order in the Install Sequence tab
of the base-map Map Settings window (see “Install Sequence tab” on
page 118).
Tip: Refer to the section titled Creating Hardware Specific Images in the
ImageUltra help file. This section provides useful information on using
Symantec Ghost and Symantec DeployCenter.
2. From the General tab, provide a version number for the newly created
module. If this is the first version of this particular module, use 1.0.0.
3. In the Comments box, add text that details what this module is for. The
operating system, hardware platform, business unit, language, date, who
created the original image and who created the module for the image would
all be useful information to include here.
5. Select the languages and operating systems that this OS module supports.
For our example, we selected English and Window 98.
7. Click Browse of the Source directory field and then select the legacy image
file that will be deployed using this module.
8. Click Browse of the Silent install command field.
9. Select a batch file that has the execute command and switched required to
install the legacy image.
Tip: The asterisk after the module name in the title bar of the operating
system module edit window indicates that the module has been modified
and not saved yet.
2. Click the Build button on the menu bar (see Figure 2-54).
3. A window into the source directory will open.
4. Select the image file for this module and click Open. Make sure you do not
have any additional image files in this folder.
5. Click OK.
Now that the module is built, it can be deployed using one of the methods
described in 2.20.4, “Deployment methods” on page 132.
This same process will be repeated for each of the legacy images that your
company will be deploying using ImageUltra Builder.
Note: Ensure that the server on which the ImageUltra Builder repository
resides has sufficient space to contain all of the modules. The hardware
specific OS modules will be slightly larger than the original legacy images that
they were created from since they contain the legacy image.
The benefits of the ImageUltra Builder and Symantec DeployCenter method are:
Initial setup at the target computer is typically 10 minutes or less for a base
OS image, plus the time it takes to install all application modules
Portability of applications and device drivers (such as video, audio, network,
etc.)
Supports IBM and non-IBM computers
Base operating system module can include service packs and large core
applications (such as office suites), which speeds installation time
There are five main steps to creating a base operating system module based on
a portable-sysprep image:
1. Make the IBM Customization Program accessible to the source computer
2. Create the portable-sysprep image on a source computer and create the
image files
3. Add the portable-sysprep image to the ImageUltra Builder Repository
4. Setting the module attributes
5. Building the module from the image files
Tip: If you cannot remember the path to your repository, in the ImageUltra
Builder Main window, click File and then click Open repository. The
repository paths will be listed. You can use any repository.
Note: You must use an MS-DOS diskette for this step. Do not use Windows
or PC-DOS to partition or format the hard disk. You can create an MS-DOS
diskette from Windows 98, but be sure to also copy the FORMAT.COM and
FDISK.EXE programs on the diskette.
Insert the MS-DOS diskette into the source computer diskette drive and
restart the computer.
2. Run FDISK.EXE and create a FAT32 primary partition. In most cases, you will
want to use the entire hard disk except for the service partition.
3. Leave the MS-DOS diskette in the drive and restart the computer.
4. Format the primary partition using FORMAT C: /S
Note: This step is optional. You can include common applications as part
of your operating-system module or you can build separate application
modules and control them through your base map.
10.Make any other modifications to the image that you feel are necessary for
your custom installation.
11.To automate Sysprep do the following:
– Edit the C:\IBMWORK\PRODKEYP.FM file to include your Windows
Product ID key. You will need to edit all three lines;
– You will also need to enter information into the USER SETTINGS of your
Base Map. Please refer to “Create your base map” on page 103
12.Use the following procedure to modify the BOOT.INI file so by default, the
source computer will boot to DOS instead of Windows:
a. From the Windows desktop, right-click My Computer and then click
Properties.
b. Click the Advanced tab.
c. Click the Startup and Recovery button.
d. In the Default Operating System field, use the drop-down menu to select
either DOS or Microsoft Windows, whichever is present.
Do not select Microsoft Windows 2000 Professional/fastdetect,
Microsoft Windows XP Professional/fastdetect, or Microsoft Windows
XP Home/fastdetect.
e. Click OK.
2. From the General tab, provide a version number for the newly created
module. If this is the first version of this particular module, use 1.0.0.
3. In the Comments box, add text that details what this module is for. The
operating system, hardware platform, business unit, language, date, who
created the original image and who created the module for the image would
all be useful information to include here.
5. Select the languages and operating systems that this OS module supports.
For our example, we selected English and Window XP Professional
7. Click Browse of the Source directory field and then select DeployCenter
image file that will be deployed using this module.
8. Click Browse add select the executable for your imaging tool. In this example
we selected the Symantec DeployCenter executable.
9. Enter the command and switches required to install this image.
10.Click Save to save the changes that have been made.
Figure 2-64 Select the operating system module you wish to build
5. Click OK.
Ultra-portable images are the most flexible for adapting to various hardware and
software environments. Since ultra-portable images are only available through
the use of existing operating system modules, customizations using additional
ImageUltra Builder modules may be required. This section will illustrate the
requirements for changing these files using additional modules to customize an
image.
100 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
– In Figure 2-67 under the Source tab in the Source directory field, type
c:\unattend.
4. Select the appropriate languages and operating system. In this example, this
means all languages and Windows 2000.
5. Build the module.
102 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
6. Add it to your base map. It should look like Figure 2-69 when complete.
Driver maps control which device drivers and hardware-specific applications are
deployed as part of a Smart Image. Driver maps can be simple (specific to one
machine type) or complex (designed for many machine types), depending on the
needs of your organization.
In this section, we will create a base map. Complete the following instructions:
1. Go to the Base Maps tab (Figure 2-70).
2. Right-click in the window on the right and select Insert →Base Map. You will
see a window similar to Figure 2-71.
104 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
3. Click Next to proceed to the Create Map window (Figure 2-72).
106 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
6. Click Next. You will see a window similar to Figure 2-74.
7. It is not necessary to copy an existing map for our example, therefore, click
Next.
108 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
9. Click Next. You will see a window similar to Figure 2-76.
To control the module behavior after deployment, you can select one of the
following:
– Delete none: If after installation you want the service partition of the target
computer to contain the complete Smart Image, click the Delete none
radio button.
– Delete unused: If after installation you want service partition of the target
computer to contain only the maps and modules required to recreate the
installed image, click the Delete unused radio button.
– Delete all: If after installation you do not want any maps or modules in the
service partition of the target computer, click the Delete all radio button.
For our example, we select Delete none.
11.Click Finish. You will now see the map under the Base Maps tab
(Figure 2-78).
110 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
12.Next, we will insert a menu item into the created map. Right-click in the
window pane on the right. See Figure 2-79.
13.Select Insert →Menu item. You will see a window similar to Figure 2-80.
18.Select Windows 2000 on the left and right-click in the window on the right,
then select Insert →Operating System.
The Add Operating System window will appear (Figure 2-82).
19.Select Operating System container (Ultra Portable WIN2000) from the list
and click OK.
Note: Our example repository contains both modules that have been
imported from an IBM Recovery CD and the ones we created in 2.13,
“Creating an operating system add-on module” on page 66.
112 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
20.Repeat Step 18 to insert another operating system module.
21.Select Windows 2000 Service Pack 4 from the list and click OK.
22.Select Windows 2000 on the left and right-click in the window on the right,
then select Insert →Application.
The Add Applications window will appear.
25.Select SoundMAX Audio Driver from the list and click OK. You will see a
window similar to Figure 2-86.
114 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-87 Map settings window
General tab
The General tab lets you view the name and add comments about the map. You
can also assign keywords, which are used in conjunction with deployment media
(ImageUltra Builder deployment CDs or diskettes) to minimize the number of
maps that can be selected during the deployment phase.
When the diskette or CD is started in a target computer, only those maps with
matching keywords can be selected.
You can use the User Information tab to predefine default values, create custom
prompts for the installer, or both. All defined user information is then presented to
the installer near the beginning of the installation process, thereby minimizing the
amount of time that an installer needs to be present during the installation
process.
You can use this tab for base maps for ultra-portable and portable-sysprep
images. Hardware-specific images do not have the capability of using the
information on this tab and will ignore any user information defined on this tab.
116 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-88 User Information
Using the Before/After Menu Options tab is optional. However, it may be helpful
for certain tasks. For example, you may want to run FDISK to format and
re-partition the target computer before making selections from the installation
menus.
118 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Image Cleanup tab
The Image Cleanup tab determines which files will be stored in the service
partition of the target computer after the image has been installed. The choices
are as follows:
Delete none: If after installation you want the service partition of the target
computer to contain the complete Smart Image.
Delete unused: If after installation you want service partition of the target
computer to contain only the maps and modules required to recreate the
installed image.
Delete all: If after installation you do not want any maps or modules in the
service partition of the target computer.
Important: You will need DHCP services running on your repository server to
use this method.
120 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-91 Network Options
Partition tab
The Partition tab enables you to define a custom size for the service partition. A
custom service-partition size enables you to leave room for other products that
share the service partition, such as the Rescue and Recovery program. By
making allowances for extra space, you can substantially reduce the installation
time normally required by these programs to resize existing partitions.
122 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-92 Base map partition settings
Tip: It may be a good idea to work with two driver maps in your Repository.
One driver map for production and one for testing.
In the Map settings window for a driver map, you will see only two tabs:
124 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-93 Driver Map settings window
It may be a good idea when constructing Driver Maps to have one map for testing
and one for production.
For conceptual information about constructing the driver-map tree structure, see
ImageUltra Builder Version 2.0 User Guide.
The Deploy selection within ImageUltra Builder opens the Deploy Wizard. The
Deploy Wizard prompts you through the steps required to create a Network
Deployment Diskette, or stand-alone Distribution CDs. The deployment diskette
establishes a connection to the repository, provide an interface for selecting the
desired maps, and deploy the appropriate maps and modules to the appropriate
staging area (service partition, HPA, or network-staging folder). The stand-alone
Distribution CDs contain all of the required maps and modules to deploy them to
the target computer without using a network. A repository window must be open
before this selection can be made.
126 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
2. Click the Deploy button or click Tools →Deploy. You will see a window
similar to Figure 2-94.
Depending on whether you chose to deploy via the network or CD, follow these
steps:
128 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
– Keywords (allows only those maps with matching keywords to be selected
from the repository)
2. Click the Read button to review the current settings on the floppy disk, Click
the Write button if you edited the settings.
3. Click Next and Finish.
Via CD distribution:
1. Select the base map and driver map you wish to deploy and click Next.
2. Specify a directory to copy the CD layout files to and click Next. The
subdirectories will be named in sequence CD1, CD2, CD3, etc. You will then
copy the corresponding contents of the subdirectories to your CDs using your
CD creation software.
3. Select a CD size and click Create Image.
4. Click OK at the CDs were created successfully window and click Next.
130 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Note: You probably will need to use the DYNALOAD command in the
LOADNIC.BAT file. Most DOS drivers are loaded through the
CONFIG.SYS file. DYNALOAD allows the driver to load later in the boot
process as required by the ImageUltra Builder program. If the DYNALOAD
command fails to load the .DOS driver, you will have to create your own
deployment diskette.
However, there are a few requirements that your diskette must meet before you
can use it:
Your diskette must create a RAM Drive with at least 10 MB of free space
The Repository Tools folder must be included in the path
The initial environment must be set to a minimum of 1024 bytes and the
following environment variables must be set:
– RAMD=R: {the drive letter of the RAM drive}
– IUDRIVE=X: {the drive letter of the Repository drive}
– IUREPOS=Data\Files\Repos: {the directory of the Repository path}
Once your DOS diskette meets these requirements, boot your DOS diskette and
connect to the Repository. Then, run DEPLOY.BAT to begin the ImageUltra
deployment process.
Tip: IBM Imaging Technology Center (IITC) can preload your workstations
with your custom ImageUltra Builder configuration. This can enable immediate
installation of a workstation without requirements for media or network
connections. For more information on the IITC please refer to their web site.
http://www.pc.ibm.com/cbcc/cbccweb.nsf/Home
CD distribution
Direct deployment from Distribution CDs involves copying all modules defined in
the selected base map and driver map to a set of CD-R or CD-RW discs. The first
disc of the set is bootable. When started in the target computer, the CD copies
the modules from the CDs to the service partition of the target computer and
prepares the target computer for the installation process. If a service partition
does not exist at the start of the deployment process, one is created.
After all required questions have been answered, the Deploy Wizard creates
individual folders for each CD in the location specified. You can then use the
CD-RW software of choice to create the CDs. Because CD 1 must be bootable,
and uses specific files from the Network Deployment Diskette, make sure you
follow the instructions provided by the Deploy Wizard and the ImageUltra Builder
help system for creating CDs for CD deployment.
132 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Deployment Installation
Smart image
on staging area
(service partition)
2 4
1 Base Map Base Map
3
Modules Copy Driver Map Driver Map Unpack 5
Create
distribution Start target Modules Make menu Modules
Maps
CD computer with selections to
distribution CD define the Unpacked
Repository Unused
image to be Modules
installed
C Partition
Setup 6
Base Map
Smart image
on dervice
Driver Map
partition
Modules
OS Final image
Apps on C partition
Drivers
3. The person controlling the installation process starts the installation phase by
making selections from the installation menus to define the image to be
installed.
Note: An optional cleanup step can be defined in the base map Map Settings
window to minimize the size of the service partition and keep only those files
required for the installed image, or eliminate the service partition.
Network deployment
This method uses a bootable, DOS-based diskette or CD to establish a network
connection between the target computer and the ImageUltra Builder module
repository. Once the connection is established, you select which base map and
driver map to use. Depending on your base-map settings, one of the following
occurs:
If you specified a direct network installation, a temporary network-staging
folder is created on the network specifically for the target computer. The maps
are copied to this folder and all modules that control the installation procedure
are unpacked to this folder. When the installation process begins, the hard
disk is prepared and all modules required for the image content are obtained
from the repository and unpacked dynamically as they are needed. A
direct-network installation requires a network connection throughout the
deployment and installation process.
If you specified a network deployment with local installation, all of the
modules defined in the map are downloaded to the service partition of the
target computer, and the target computer is prepared for the installation
process. If a service partition does not exist at the start of the deployment
process, one is created (for more information about service partitions, see the
ImageUltra Builder Version 2.0 User Guide).
For direct network deployment (network deployment with local installation),
you use the ImageUltra Builder Deploy Wizard to create either an ImageUltra
Builder Network Deployment Diskette or an ImageUltra Builder Network
Deployment CD. Based on your responses, the Deploy Wizard prompts you
through the steps required to create the diskette or CD.
134 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Note: Providing user name and password information on the deployment
media (diskette or CD) is optional. If you do not provide a user name and
password when you create the deployment media, the person controlling the
deployment process will be prompted for this information (if it is required to
access the network) when the deployment media is started on the target
computer. If you do provide a user name and password when you create the
deployment media, it is stored in a flat text format on the deployment media,
not in a secure format.
If you choose to make a CD, create the diskette first, and then use the CD-RW
software of your choice to create the CD from the diskette. Because this CD is
bootable, make sure you follow the instructions in the Deploy Wizard or
ImageUltra Builder help system for creating a Network Deployment CD.
Depending on the type of removable-media drive available at the target
computer, use either the diskette or CD to establish a network connection
between the target computer and the ImageUltra module repository. After the
connection is established, select which base map and driver map to use. All of
the modules defined in the map are downloaded to the service partition or HPA of
the target computer, and the target computer is prepared for the installation
process. If a service partition or HPA does not exist at the start of the deployment
process, one is created.
Copy (optional)
Unpack
Base Map (Optional)
1 3 Smart image
Modules Base Map
2 or copy of
Driver Map
Unpack Driver Map installed
image
Unpack Modules
required Modules
Maps Select Make menu
modules OS Final image
base map selections to Setup Apps on C partition
and driver map Unused define the
Repository 4 Drivers
image to be
installed
Staging area
(Network-staging
folder)
136 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Deployment Installation
Smart image
on staging area
(service partition)
1 3
Base Map Base Map
2
Modules Copy Driver Map Driver Map Unpack 4
Setup 5
Base Map
Smart image
on dervice
Driver Map
partition
Modules
OS Final image
Apps on C partition
Drivers
1. The person controlling the deployment starts the process by booting the
target computer with an ImageUltra Builder Deployment CD or ImageUltra
Builder Deployment Diskette, and then selecting the required maps from the
repository.
2. The selected maps and all modules defined within the maps are obtained
from the repository and copied over the network to the service partition, which
acts as the staging area for the complete Smart Image.
3. The person controlling the installation process starts the installation phase by
making selections from the installation menus to define the image to be
installed.
Note: An optional cleanup step can be defined in the base map Map Settings
window to minimize the size of the service partition and keep only those files
required for the installed image, or eliminate the service partition.
The advantages of CD deployment are speed and the flexibility of not having to
be dependent on a network connection.
The advantage of network deployment is the assurance that the latest maps and
modules will be installed if the network-sync function is enabled.
In our fictitious Acme Holdings Inc. company (see 2.25, “Business case” on
page 181), multiple deployments will be used.
For new PC rollouts, a direct network deployment with local installation
method will be used by an Integration Center.
CD deployment will be used to send images to locations or users without a
WAN or broadband connection.
Note: Some large enterprises that use drive-duplication technology for mass
production might want to replicate the drive at the end of the deployment
process, prior to installation. In order for this drive-duplication process to work
successfully, you must install the IBM Boot Manager on each drive after the
drive has been duplicated. You can get the IBM Boot Manager installation tool
(BMGRINST.BAT) from the TOOLS\BMGR folder of your repository. You must
run BMGRINST.BAT during a DOS session.
138 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
2.21 Using ImageUltra Builder and Symantec
DeployCenter together
The following sections include an overview of Symantec DeployCenter, as well
as a step-by-step guide on how to use this tool with ImageUltra Builder.
ImageCenter
The ImageCenter application uses SmartSector imaging to create an exact
image of a hard disk or partition. That exact image can then be used to deploy
Windows workstations, upgrade existing workstations, manage changing
desktop environments, and quickly and easily back up and restore hard drives.
With ImageCenter, you can create and restore a compressed image file of an
entire hard disk or individual partitions of a hard disk on a local drive, across a
network, or on a removable media device.
Image Explorer
Simplify management of your image files with Image Explorer. Working within a
single screen gives you total control of the image files you can access. You can
view image file contents, copy image files, copy partitions within files, restore
individual program and data files from the image, or add password protection to
image files. Image Explorer also provides description capabilities, so you can
easily identify individual image files and partitions.
The Virtual Boot Environment operates by temporarily replacing the Master Boot
Record (MBR) boot code on the primary hard drive. Upon rebooting the
computer, the new boot code loads and runs the programs stored in the VBE
image file. This VBE consists of a loader program, disk I/O redirector TSR
program, and a non-compressed floppy boot image file. The boot image file is
created from a 1.44 MB or 2.88 MB format bootable floppy. It contains both the
bootable OS files, network drivers and the user application programs just as
would exist on a bootable floppy disk.
Upon booting, the VBE loader builds a RAM DRIVE in memory the size of the
boot image file, copies the boot image file from the hard drive to memory and
then loads and executes the boot sector within the boot image file. Under DOS,
the A: drive is then used to reference the boot image file system just like when
booting from a CD. The first physical floppy drive is accessed as drive letter B:.
140 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Unicasting
The Unicast feature lets you create and restore images using a network drive
without mapping the drive. It consists of a Unicast server and a Unicast client,
which reside on separate machines. You can specify all Unicast parameters on
the command line of either the server or the client. The Unicast operation is a
point-to-point and uses the TCP/IP protocol.
The Unicast server must be started prior to running the Unicast client or before
trying to PXE-boot a client machine. Once the server has been started, you do
not need to tend to it. You start all Unicast operations from the client by using a
standard script file or the ImageCenter interface.
For detailed instructions on using Unicasting please refer to the whitepaper titled
The Benefits of using ImageUltra Builder and Symantec DeployCenter Library.
Note: You will need to have a DHCP Server installed to use this cloning
method. For our examples we used Windows 2000 Server.
2.22.3 Confirm that you have installed the PXE service correctly
1. Log onto the Windows server
2. Go to Start → Programs →Administrative Tools
3. Select DHCP
4. Locate the Scope Options
5. Ensure that the option 003 Router is installed
6. Ensure that the option name 060 ClassID is installed
142 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-100 DHCP scope options
2.22.4 Confirm you have the correct Network drivers installed in boot
disk builder
The Boot Disk Builder includes many predefined network drivers. In an event that
the network driver you need for the client is not available you have to add it to the
Boot Disk Builder.
The step-by-step description below will describe how you add your own driver to
the Boot Disk Builder:
1. Record client’s network cards VIN identifier
a. Create a virtual floppy to help detect the VIN identifier
b. Import the virtual floppy into the PXE utility
c. Boot the client and record the VIN
2. Add the client network driver to the Boot Desk Builder
3. Select Next.
144 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
4. In the Run ImageCenter from section, select Do not Run ImageCenter.
5. Select Next.
6. Select Virtual Boot Disk File.
7. Add the file name Detect Network Adapter.
8. Select Finish Click YES when you are asked to save these settings for future
use.
9. Name the settings file Detect Network Adapter.
10.Click Save.
11.Click OK to confirm. You will be asked to save these settings for later use. Say
yes and save these settings to the following directory: C:\program
Files\PowerQuest\DeployCenter 5.5\BDBuilder\
12.Exit the BOOTDISK BUILDER.
13.Locate Start →Programs →PowerQuest DeployCenter 5.5 Tools.
14.Select PowerQuest VF editor.
15.Select File →Open.
16.Locate the Detect Network Adapter Boot Disk file (.vfd) you just saved.
146 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
17.Select Open
18.Delete the following files:
PQDOTASK.BAT
MOUSE.COM
Figure 2-104 Delete mouse.com and pqdotask.bat from your boot disk file
19.Highlight AUTOEXEC.BAT.
20.Select Extract. Accept the default. Ignore subdirectories.
21.Select a temporary directory from where the AUTOEXEC.BAT can be edited
e.g C:\TEMP.
22.Click OK to save the file. Do NOT Close the PowerQuest VF Editor Window.
23.Locate C:\TEMP folder using the Explorer.
24.Select AUTOEXEC.BAT.
25.Right-click AUTOEXEC.BAT.
26.Select Edit.
27.Delete the line CALL PQDOTASK if it exists.
28.Add the word kicknic.
29.Save AUTOEXEC.BAT.
30.Close the Notepad.
31.Open Windows Explorer.
32.Locate C:\Program Files\PowerQuest\DeployCenter 5.5\BD Build folder.
33.Copy KICKNIC.COM into the C:\TEMP directory.
34.Close the explorer window.
35.Open up the PowerQuest VF Editor window.
36.Select Image.
37.Select Inject.
38.Locate the C:\TEMP.
39.And select AUTOEXEC.BAT and KICKNIC.COM.
40.Select Open.
41.Confirm that you want to inject the two files into the Virtual Floppy.
42.Answer Yes to replace AUTOEXEC.BAT.
43.Save and close the PowerQuest VF Editor.
148 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-106 Configuration Utility - Detect Network Adapter
10.Click OK.
Add the correct client network driver to the Boot Disk Builder
1. Create a share called IMAGES on your server.
2. Download and extract the latest Network driver for your client and save on to a
folder on your deployment server.
150 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
3. Open BOOT DISK BUILDER.
4. Select Microsoft TCP/IP Boot Disk.
5. Click Next.
6. Fill in the User Name and Password to logon to your Server Image share. In
our example the user is: Admin, and the UNC path to the share is
\\server\images with the drive letter i:
7. Click Next.
152 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
8. Leave the screen shown in Figure 2-111 as is.
Figure 2-111 Boot disk builder - run ImageCenter from BOOT DISK
9. Click Next.
10.Select Add.
11.Select Enter Drive Information manually.
12.Select Next.
13.Add the VIN Number you recorded earlier. In our example it is:
PCI\VEN_8086&DEV_1031&REV_42&SUBSYS_02091014
14.Add the network adapter description.
154 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-113 Add network drivers - Network Adapter ID and description
15.Click Next.
16.Locate the network Adapter Driver Files you downloaded and extracted.
17.Locate the DOS directory.
18.Select the correct com-file. In our example it is IPXODI.COM.
19.Click Open.
20.The driver is now added to the Add network driver screen.
21.Click Next.
22.Locate the Microsoft TCP/IP NDIS2DOS driver file. In our example it's a file
called E100B.DOS.
23.Click Finish and the network adapter is now added to list of available drivers.
156 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-115 Boot Disk Builder - Select network adapter from list
24.Click Next
25.Leave default settings. We will now name the boot disk Capture Image
6. Click Next
7. Select the network adapters you need from the list
158 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
8. Select Obtain an IP address from a DHCP server
Figure 2-118 Boot Disk Builder - Select virtual boot disk file
10.Click Finish
11.Select Yes when asked to save this for future settings
12.Save these settings as Capture Image.vfd
13.Select OK to confirm saving
14.Select Exit to close the Boot Disk Builder
160 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
2.22.6 Add CAPTURE IMAGE selection to the PXE Client menu
1. Click the PXE client menu tab
2. Click Add →Type in CAPTURE IMAGE as the menu name
3. Select Capture Image 1 from list.
4. Click Save →OK →Exit.
5. We have now configured the DeployCenter PXE support to be able to
manually capture an image of the ImageUltra Builder Donor system and save
it onto the server shared image drive (I:).
Preparation
In this example we will deploy the ImageUltra Builder Smart Image to a client
service partition. The client hard disk content is then cloned to an imaging server.
The cloned image can then be uni- or multi-casted to multiple clients of the same
configuration. This cloning method is very useful for large rollouts of the same
system configuration.
162 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Use the ImageUltra Network deploy diskette to connect to the repository
3. Click Next
164 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
4. Fill in all your required login fields as shown in Figure 2-120.
5. Click Next
The script file SCRIPT.TXT will be created using notepad as the last step in
this example and will be saved into the \\server\images share.
7. Click Next
166 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
8. Select the network adapter driver for the client you will deploy to.
9. Click Next
11.Click Next
12.Select the option to create a Virtual Boot Disk File
13.Save Virtual Boot Disk File as Unicast Deploy IUB Smart Image
14.Click Finish
15.Your virtual boot disk file, Unicast Deploy IUB Smart Image.vfd, will be saved
by default into:
C:\Program Files\PowerQuest\DeployCenter 5.5\BDBUILD
16.Save your configuration for future use if requested.
17.Open the PowerQuest PXE Configuration Utility.
In the PXE Virtual floppies tab and click the Add button and browse to the
folder where your .vfd file is stored.
C:\Program Files\PowerQuest\DeployCenter 5.5\BDBUILD\
18.Click OK.
168 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
.
Figure 2-124 Add Unicast Deploy IUB Script Image to PXE Configuration
19.The server is now setup to accept PXE requests to deploy the ImageUltra
Builder Smart Image.
20.Before you start deploying the client, you will need to create a SCRIPT.TXT
file.
For our example we used the following script file:
SELECT DRIVE 1
DELETE ALL
SELECT FREESPACE FIRST
CREATE /FS=UNFORMATTED /SIZE=15000 POSITION=BEGINNING
SELECT FREESPACE FIRST
SELECT IMAGE 1
RESTORE
SELECT PARTITION LAST
SET ACTIVE
REBOOT
21.Now you can use the UniCast IUB Smart Image menu option to deploy the
cloned IUB Smart image.
Power on your system and Press the F12 function key to select your network
boot device and then press enter.
Example: IBA GE SLOT 0208 v12O2
3. Click Next
170 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
4. Fill in all of the required fields for Client start-up mode. In our example we
used the following:
Connect to session: powercast1
PowerCast image to hard disk number: 1
Additional command line parameters: /PPR=FIRST /DSK=1 /NMD
See the Symantec DeployCenter Guide for details on these command line
parameters.
5. Click Next
1. Click Next.
172 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
2. Leave the default select of DHCP and set the maximum number of PowerCast
clients you will allow to be deployed simultaneously. In our example we used
10 clients. See Figure 2-128.
3. Click Next.
5. Click Finish
6. Save your configuration file for future use
7. Before adding the PowerCast IUB Super Image.vfd to the PXE Configuration
utility you need to customize the autoexec.bat in the virtual floppy.
8. Open the PowerQuest VF Editor.
174 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
9. Open the PowerCast IUB Super Image.vfd file you have just created.
Note: If while trying to add the above files you get a drive full error, go to the
main menu and select Image →Change Format →select 2.88 mb
176 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-132 Change drive format
22.Press Enter
23.This will open up the PowerCast window.
24.Enter the Session Name and browse to the image file.
In our example we used: Session Name: session1, Image File: BASEXP.PQI
25.Click Start to start the PowerCast services on the server.
26.Power-on the clients, press the F12 function key to boot the client to the
network.
Example: IBA GE Slot 0208 v1202
27.Select the PowerCast IUB Super Image menu option to deploy the cloned
IUB Smart image.
28.When the clients connect to the PowerCast server they will queue up and wait
for the PowerCast to start.
29.When all of the clients have connected to the PowerCast session, click GO on
the PowerCast Server Progress screen to deploy the cloned ImageUltra
Builder Smart Image to the clients.
178 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
2.24.2 Integration with System Migration Assistant (SMA)
SMA can easily be deployed as a module during an image load. This will allow for
immediate restoration of user settings that may have been captured before a PC
cascade or new system rollout. Create a silent install for the SMA tool as outlined
below and create a module. Use the ImageUltra Builder tool to deploy the SMA
module during your image installations. Once the image load is complete, run the
SMA application and apply all of the saved user settings. The end user will have
the same look, feel and data as with their previous system, saving valuable
reconfiguration and down time.
Because the ImageUltra Builder program uses a service partition to store the
Smart Image for certain types of installations, Symantec Ghost might encounter
problems when attempting to set the size for multiple partitions or when installing
a cloned drive. When defining partition sizes as a percentage, Ghost always uses
180 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
the full hard-disk capacity and does not take the presence of a service partition
into account. As a result, Ghost might delete the service partition on the target
computer. Defining absolute sizes can be equally problematic because drive
sizes vary on target computers.
Before you build the module, you must put the image files, the script file, and the
batch file in the same folder.
T3 T1
T3
As Acme Holdings Inc. migrates to full use of ImageUltra Builder (and supporting
technologies), they will first add their hardware-specific images. Going forward,
they will use Portable-Sysprep and UltraPortable imaging technology to deploy
their new workstations in order to ensure that they have maximum flexibility.
As part of the maintenance process, the Master repository located in New York is
replicated to support replicas (one in each location). This allows the support staff
to access the images at each location without putting excessive loads over the
WAN links.
182 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Service Partition: The purpose of the service partition
Using the IBM ImageUltra method, you can select to deploy directly over the
network or use a service partition. The service partition is a hidden partition on a
hard disk from which the ImageUltra builder deploys the operating-system
modules, application modules, device-driver modules, and a set of recovery
tools. It also provides its own boot environment for image deployment, which has
no dependency on the Windows operating system being present on any active
partition. Because the service partition is protected from common read and
writes operations as well as most viruses, it is a practical place to store recovery,
backup, and installation files and tools.
184 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Existing State Phase I legacy Phase II current Phase III future
systems systems systems
Unique 216: One for each 144: One for each 72: One for each 36: One for each
system combination of combination of combination of combination of
combinations hardware platform, hardware platform, hardware platform, hardware platform,
supported business unit, and business unit, and business unit, and business unit, and
language. language. language. language.
Note: The following process assumes that the reader has installed and
configured ImageUltra Builder as detailed earlier in this document. It is also
assumed that the reader has read and understands all of the details presented
so far in this document concerning ImageUltra Builder.
Acme Holdings Inc. is typical of many large corporations. Acme Holdings Inc. has
eight different hardware platforms, four laptops and four desktop models. The
older four models have two different operating systems (OS) on them; this is a
mixture of Windows 95, 98 and NT 4, while the newer systems only have
Windows 2000 installed on them. This results in twelve unique hardware/OS
combinations: ((4X2) +(4X1))=12. It would not be unreasonable for a large
company to support up to ten different languages, but for our example we will use
three; this results in 36 unique hardware/OS/language combinations. The final
variable that must be addressed is the different business units. For image
development and maintenance, a business unit is defined as any group of end
The typical means to support these 216 unique combination is to create one
monolithic image to use a tool such as PowerQuest Drive Image or Symantec
Ghost for each unique combination. In this type of solution, each combination is
built one at a time. Then a copy of the system is made using one of the tools
listed above. This single file copy of the system is called an image.
The time is takes to build each one of these images varies greatly depending on
the OS and the number, size and complexity of the applications required. An
experienced image creator could reasonably create and test one image per day.
At Acme Holdings Inc., it would take one person most of a year to create all of the
216 unique images or a large staff of image creators to create and maintain this
number of images.
Acme Holdings Inc. has decided to use IBM ImageUltra to reduce the time and
complexity of system building. IBM ImageUltra Builder V2.0 provides a means to
significantly reduce the number and complexity of the system build process. This
is done using a modular approach which can greatly reduce the number of
unique modules that must be created.
In the event that it must be rebuilt, the existing image process that Acme
Holdings Inc. is currently using would be able to return the system to its
pre-failure state. After considering age, operating systems and performance,
Acme Holdings Inc. has decided to move half of their systems to the new
ImageUltra process and leave the older half with the current image process. The
results are shown in Table 2-2 on page 187.
186 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Table 2-2 Phase 1 and 2
Phase 1 Phase 2
This division from older systems to newer ones provides a logical migration point
from the legacy imaging process to the new modular ImageUltra process.
ImageUltra provides hardware-specific OS module support. This support
provides a means to ease the transition and to introduce the Acme Holdings Inc.
support staff to ImageUltra Builder.
Unique system 144: One for each 144: One for each
combinations combination of hardware combination of hardware
supported platform, business unit, and platform, business unit, and
language. language.
The first step in this process is to create one hardware specific OS module in
ImageUltra Builder for each of the existing legacy images. The following process
will show the steps required to bring these legacy images into the new
ImageUltra process without modifying the existing images.
The next section will discuss the creation of portable-syspreped images which
Acme Holdings Inc. will be using for the newer four models listed above running
Windows 2000
Now that Acme Holdings Inc. has become familiar with building OS modules for
their legacy images, they could repeat this same process to build 72 additional
188 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
new Window 2000 hardware specific modules. This would defeat the purpose of
using ImageUltra Builder. By using ImageUltra Builder, we can reduce the
number of unique images from 72 down to six OS modules.
This great reduction is made possible by breaking the system build down into a
modular process. A legacy image has one image file containing the OS, drivers,
and applications. The result is when a small change needs to me made the entire
image must be recreated. Additionally, by using the ImageUltra modular process,
the OS module can take advantage of the OS’s built-in features that enable a
single OS module to be used on more than one hardware platform.
To use this portable OS module, we will need a sysprep Windows 2000 image
that has had the hardware specific drivers removed. To create a sysprepped
image, refer to 2.16, “Create a base operating system Portable Sysprep Image”
on page 87.
With the sysprep image, we only need to consider the HAL compatibility of the
hardware platforms. For more information concerning HAL compatibility, refer to
Microsoft’s Web site for details on HAL cross-platform compatibility. We have
determined that at Acme Holdings Inc. they will require two images to support
two unique HALs. The HAL of the HP VL 420 desktop and the IBM M40 NetVista
desktops were determined to be compatible and the HAL of the Toshiba Tecra
9000 and the IBM T23 ThinkPad were determined to be compatible.
Table 2-4 on page 190 shows some of the advantages, disadvantages and
features of both options. This information will be needed to make an informed
decision as to whether or not (and where) to use a multi-language sysprepped
OS image.
changes needed that affect Must rebuild entire image Only need to change
only one language impacted language image
Total number of OS 2 6
modules
Acme Holdings Inc. has decided that they will keep their images
language-specific. This means that they need to create and maintain six images,
instead of two if they had opted for the multi-language images. Two of the major
reasons that supported this decision for Acme Holdings Inc. were:
Acme Holdings Inc. is just learning how to create sysprep images and
They have developers with different language skills located in different
countries.
This allows Acme Holdings Inc. to utilize the greatest number or developers at
one time. As the development staff gets more proficient with sysprepped images
they may decide to move to the multi-language images. The advantage of using
the ImageUltra Builder process is that when the company does change to the
multi-language images, the developer will only need to replace the existing OS
modules with the new ones. No other modules will need to be recreated or
modified.
190 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Table 2-5 Phase 2
Existing State Phase 2 current systems
Unique system 72: One for each combination 72: One for each combination
combinations of hardware platform, of hardware platform,
supported business unit, and language. business unit, and language.
Images to create 72 6
Table 2-6 shows the different applications and the business units that use them.
Adobe PhotoShop 2
Adobe FrameMaker 2
192 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Applications Business Unit
Nero CD creations 2
AutoCAD 2002 5
Pro-E CAD 5
Figure 2-136 is the first menu window generated by the map shown in
Figure 2-135.
The following is the second window generated by the OS map module shown
above.
194 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-137 Preview of OS map module - second window
This is a folder containing application modules for use on the UK English version
of Windows 2000.
The above figure shows the logic tree details for the base map showing desktop
applications on UK English.
Migration to this new ultra-portable system will require much less effort than the
migration from legacy images to the portable-sysprep system. This is because all
of the time and effort that went into creating the application modules does not
have to be duplicated. All of the modules in the ImageUltra Builder’s repository
are can be used to build as many unique system configurations that are needed.
The only modules that are different between the portable-sysprep and the
ultra-portable are the OS modules. All other modules can be reused as needed.
In the future, Acme Holdings Inc. could start using the ultra-portable system for
their older IBM models. To do this, they would replace the sysprep-portable OS
module with the ultra-portable OS module and add any required driver modules
for each IBM system that they need to support.
196 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 2-139 Repository - XP Ultra portable OS module
198 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Existing State Phase III future systems
Unique system 216: One for each 36: One for each combination of hardware
combinations combination of hardware platform, business unit, and language.
supported platform, business unit, and
language.
This transformation at Acme Holdings Inc. did not happen overnight. This
process took place over a three year time frame. The implementation of a new
system build process was done through attrition. Older systems were rebuilt
using the processes described above as system rebuilds were required or as
systems were transferred to new users. The new systems would adopt the
ImageUltra process the first time they were deployed.
Acme Holdings Inc. combined the use of ImageUltra Builder and the reduction of
hardware and operating systems. This resulted in:
Less time spent building and updating system builds
Lesser cost of maintaining systems
Greater standardization of platforms
Single operating systems environment
The following table summarizes the changes that have taken place by moving
from the legacy image system to the modular IBM ImageUltra Builder system of
system build creation.
Hardware platforms 8 2
Operating systems 4 1
Images 216 1
200 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
3
System Migration Assistant (SMA) is a software tool that copies (or migrates) the
look, feel and personalization settings of one computer to another. The look and
feel, also known as the user’s work environment, is the way the user or company
has set up various computer preferences such as desktop and network
connectivity settings. System Migration Assistant can also migrate files, folders,
and application settings.
202 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
3.1 System migration and its effects on the organization
The first thing most people typically do when they receive a new PC is to transfer
data and customize the look and feel of the PC to their preferences. A good
business plan for migration needs to be created before any migration can take
place. This is true regardless of who does the migration. If a standardized plan is
not used to execute system migrations, end user productivity will be reduced,
data loss can occur and the total cost of ownership of end user’s will increase.
The organization benefits most if the system migration is done completely,
quickly and accurately. A best practice approach to system migration will start
with a corporate-wide standard location for user data. This will eliminate much of
the inconsistencies of user defined data storage directories. This small step will
greatly increase the success rate of any migration solution.
The length of time it takes to properly migrate an old system to a new system will
be affected by two important factors. The first factor is, the number of machines
that can be migrated in any given time period. The quicker and more automated
the process is the more machines per man hour can be migrated. The second
point is cost. Hard costs are involved when internal IT staff or third parties are
tasked to assist in the upgrade/rollout/migration. To maximize Return On
Investment, a migration solution needs to minimize your migration costs. There
are less tangible soft costs such as loss of productivity of end users while they
customized new systems and the cost of recreating data if data loss occurs
during migration.
204 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
3.2 Installation considerations
This section of the chapter provided insight into the deployment and use of the
System Migration Assistant product. This includes:
“Supported operating systems and system requirements” on page 205
“System Migration Assistant components” on page 206
“Basic operations” on page 207
TO
Windows 2000 Windows 2000 Windows XP
FROM Professional Server Professional
Windows NT 4.0
Yes No Yes
Workstation
Windows NT 4.0
No Yes No
Server
Windows 2000
Yes No Yes
Professional
Windows 2000
Yes Yes No
Server
Windows XP
No No Yes
Professional
Migration support for a given operating system includes all levels of service pack.
This includes Windows 2000 Advanced Server.
It is limited to the 32-bit version.
The following requirements apply to both source and target computers unless
otherwise noted. A supported Windows operating system must be installed.
There must be about 10 MB of hard drive space to install SMA. In addition,
there must be adequate drive space for temporary variables. In most cases,
30 MB of temporary drive space will suffice.
In general, connectivity between target and source computer is assumed for
these examples. In particular, the target computer must have access to the
profile file on the source computer. It is also possible to copy an SMA profile
onto a removable medium, such as a CD-R, and to apply the profile to a
target computer that is either stand-alone or a client of a network that cannot
be connected to from the source computer.
(For source computers only) There must be adequate space to store profiles.
The size of a profile depends on the amount of settings and data you are
migrating.
206 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
COMMANDFILE.TXT A command file used to drive the capture and migrate
process in a batch.
SMA migrates the work environment of one computer to another in two steps:
1. In the first step, System Migration Assistant is customized to capture the
desired settings and data. Then SMA copies these settings and files to a
profile file. This is referred to as the capture phase.
2. In the second step, SMA uses the profile to copy the settings and files to the
target computer. This is referred to as the apply phase.
Before deploying SMA, the company must decide which settings they wish to
migrate. Multiple captures can be used on a single system. This would be useful
in a corporate environment with multiple departments.
During the capture phase, you need to tell System Migration Assistant what to
migrate on the source computer. This is the first step during any standard
migration, including when it is run in batch mode. The following settings can be
captured:
Desktop settings - examples are the active desktop, colors, desktop icons,
display, icon font, pattern, screen saver and wallpaper.
Printer settings - this includes local and network printer settings.
Network settings - examples are the computer description, computer name,
TCP/IP configuration, mapped drives, dial-up networking settings, and shared
folders and drives.
Application settings - customization and configuration settings of various
supported applications.
Files - there is no limit to the number of files that can be captured as long as
there is sufficient disk space to store the captured data. These can be copied
to the same location on the target computer or relocated to a different
directory.
User profiles - both local and network user profiles.
During the apply phase, SMA copies the profile to the target computer. The entire
profile can be applied or just selected components of the profile before copying it.
This is the second step during any standard migration, including when it is run in
batch mode.
208 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 3-2 SMA Select Program Folder window
Uninstalling System Migration Assistant will not delete all files, these files will
need to be manually removed if desired:
SMA log files generated whenever SMA is run. These files are located at the
root of the C: drive unless this was changed the default copy location. For a
standard migration, the default location can be changed in the config.ini file.
When a migration is run in batch mode, the location can be changed in the
command file.
Temporary files specific to SMA. These are located in the C:\sma\tmp
directory unless this was changed the default location of these files in the
config.ini and/or command file.
SMA profiles files (for example, files with an .sma extension).
210 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
6. Locate the pft*~tmp folder, where * stands for one or more random
characters. If you are running Windows 95 or 98, the folder will be in the
C:\Windows\TEMP directory. On Windows NT 4.0 workstation/server, the
folder will be in the C:\Temp directory. On Windows 2000 professional/server,
or Windows XP Professional, the folder will be in the C:\Document and
Settings\<user name>\Local Settings\Temp\ directory.
7. Copy the folder to a location that is can be easily located and rename it if
desired (this folder location will be used in the next steps) then cancel the
SMA InstallShield setup.
8. From the command line, run setup -r on a system that has the similar
configuration as the system for which the silent install is being created for. The
executable setup.exe is located in the setup directory that was just used in
step. This will create an InstallShield response file named setup.iss in the
C:\windows or C:\winnt directory (depending on the operating system). For
more information on the setup command, see various articles on a silent
installation at:
http://support.installshield.com/
9. SMA is now ready for a silent mode install. To do so, copy the setup.iss file to
the setup directory created previously and from the command line run setup
–s –SMS. Alternatively, you can run setup.exe -s –SMS –f1<path>\setup.iss,
where the f1 parameter denotes the location of the setup.iss file.
10.When the install has completed, open the setup.log file located in the setup
directory and locate the ResultCode variable in the [ResponseResult] field. If
Resultcode = 0, the installation completed successfully. Common error
values are:
–3 Required data not found in SETUP.ISS file
–5 File does not exist
–8 Invalid path to the InstallShield response file
–12 Dialogs are out of order
Note: Make sure to exit all other applications first. Other applications might
interfere with the operations that SMA is trying to perform.
System Migration Assistant is run by two different types of users with different
goals in mind. Administrators typically use the program either to replicate (nearly)
all the settings of a system or to set up a standard working environment. Regular
users (without administrative rights) typically run the program to migrate their
desktop and application settings as well as files to another machine. The full
functionality of SMA is supported with the user logged into the system with local
administrator rights. The following operating systems are fully supported as
target systems.
Windows 2000 Professional
Windows 2000 Server
Windows XP Professional
For more details on source and target system support, see Figure 3-1 on
page 205. The other operating systems listed in Figure 3-1 on page 205 are
supported as source systems only. When migrating from different operating
systems, some settings cannot be migrated. Details on these operating system
migration limitations are detailed in section 3.4.1, “Capturing settings and files”
on page 213. SMA can migrate your desktop settings, application settings, and
files, without administrative rights. To capture the following settings, the user
must be logged into the system with local administrator rights.
Computer name
Computer description
Shared folders and drives
TCP/IP configuration
Workgroup/Domain
212 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
3.4.1 Capturing settings and files
The profile file is the basis of a migration and is the main output of the capture
phase. The profile contains all the settings and files to be applied to one or more
target computers. During the capture phase settings and files are specified to be
migrate. Before selecting the settings on the source computer, make sure that all
to-be-captured settings are correct. Before using SMA for the first time read the
rest of this section to see which settings can be captured. Be aware that general
migration scenarios and restrictions apply as described in 3.2.1, “Supported
operating systems and system requirements” on page 205. All migration
scenarios across operating systems are not fully supported. Across language
migrations are never supported.
The screen shots on the following pages reflect the options that are available in
the default configuration of SMA. It is possible that your administrator made
changes to the user interface. The interface can be configured for future use.
3. In Figure 3-4, click Next to start capturing settings and files from the source
computer. The window shown in Figure 3-5 on page 214 will be displayed. At
214 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 3-6 SMA Desktop Settings
Note: This window will only appear if the Desktop option was selected in
the Migration Options window shown inFigure 3-5 on page 214.
5. Select individual settings or use the Check All and Check None options on the
Edit menu to (de)select all settings. The following desktop settings can be
migrated:
– Accessibility: Captures the accessibility settings for keyboard, sound,
and mouse, as well as general accessibility settings.
– Active Desktop: Captures the active state.
– Colors: Desktop color and window colors.
– Desktop Icons: All desktop contents including folders and files shortcuts,
icons, and icon positions.
– Display: Desktop width, height, and color depth.
– Icon Font: Captures the icon font.
216 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
are using a sound scheme not known on the other operating system, then
these sound files will need to migrated as well.
– Taskbar: to migrate a target computer running Windows ME or Windows
XP Professional, the taskbar location will not be applied.
– Wallpaper: to migrate the wallpaper file that is of .jpg type, the Active
Desktop setting must be captured in source in order to activate it on the
desktop. Note that it is not necessary to capture the Active desktop setting
when migrating wallpaper that is of .bmp file type.
– Desktop Icons: When migrating desktop icons from Windows 95 to
Windows 98/SE, set the desktop to auto arrange icons for the icons to
display properly on the target machine.
6. In the window shown in Figure 3-7, select the application settings you wish to
migrate.
Note: This window will only appear if it was selected in the Application
Settings option in the Migration Options window shown in Figure 3-5 on
page 214.
218 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
– For Internet Explorer, the status bar settings fail to migrate.
– Some applications do not support cross-version migrate. Most settings will
not transfer in the following scenarios:
• Office 97 to Office 2000/XP (no settings migrate)
• Office 2000 to Office XP (partial settings migrate)
• Visio 2000 to Visio 2002 (partial settings migrate)
• AT&T Net Client 4 to AT&T Net Client 5 (no settings migrate)
• Lotus Notes 4 to Lotus Notes 5 (partial settings migrate)
• Outlook 98 to Outlook 2000/XP (partial settings migrate)
• Outlook 2000 to Outlook XP (partial settings migrate); for Outlook,
most key settings (mail file, address book, etc.) do migrate
successfully.
Note: This window will only appear if the Printers option was selected in
the Migration Options window shown in “SMA Migration Options” on
page 214.
7. In the window shown in Figure 3-8, select the printers that are to be migrated.
SMA will migrate the printer links and their drivers. SMA does not support the
migration of local printers from a source computer running a different
operating system than the target because of possible driver incompatibilities.
Network printers are supported when migrating to a different operating
system as long as the print queues are located on a Windows server.
Note: This window will only appear if the Network option was selected in
the Migration Options window shown in Figure 3-5 on page 214.
9. As shown in Figure 3-9, select the individual Network settings or use the
Check All and Check None options on the Edit menu to (de)select all settings.
The network settings you can capture are:
– TCP/IP Configuration:
• IP/Subnet/Gateway: IP address, subnet mask, and default gateway.
• DNS Configuration: the Domain Name Server search order, domain
suffix search order, and Host Domain.
• WINS Configuration: Windows Internet Name Service configuration.
– Network Identification:
• Computer Name: network computer name.
• Computer Description
• Domain/Workgroup name
220 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
– Other:
• Mapped Drives
– Dial-up networking: Remote Access Services configuration phone book
entries for Dial-up networking.
– Shared Folders/Drives
– ODBC Data Sources: ODBC data sources. Migrates any user-defined
ODBC data source definitions, but not the database files themselves.
The following migration restrictions apply to the network settings:
– If the source machine’s TCP/IP configuration is set to obtain an IP address
automatically, theses settings can be captured by selecting the
IP/Subnet/Gateway option. Applying these settings on a target computer
will activate DHCP. This option can be deselected during the apply phase,
but it cannot be edited in the network settings in the Editable Network
Settings window. The corresponding fields will be grayed out.
– If the source machine’s TCP/IP configuration is set to static IP addresses,
you can edit the TCP/IP address, subnet mask, and default gateway
during the apply phase. The TCP/IP address as well as the network
computer name must be unique on the network and are thus likely
candidates for editing. In order to edit these settings during apply, these
settings must capture here.
– If the source machine is a member of a domain and the target machine will
be a member of the same domain, first create a new computer account for
the target machine on the domain. If there’s already an account for that
machine on the domain, the computer account must be recreated. For
Windows 2000 Server and Windows 2000 Advanced Server systems,
make sure to select the Allow pre-Windows 2000 computers to use this
account check box if this situation applies.
– If migrating a PerSys profile on a dual-home target system, SMA will only
migrate the network settings of the first network card.
– SMA will not migrate network adapter settings or any other hardware
settings.
Note: This window will only appear if the Files and Folders option was
selected in the Migration Options window shown in Figure 3-5 on
page 214.
The hard drive(s) on the source machine need(s) to be scanned before this
window can become fully available. While SMA is scanning, a message
window pops up indicating the scanning status. Please wait until this process
has finished.
In the File Selection window, any selection of files and folders can be
transferred. If you check a folder for migration, its entire contents are selected
including files and the content of subfolders. If applicable, the Capture NTFS
Settings check box will be present. The NTFS settings will be captured unless
it was deselected.
As files or folders are selected, a message similar to the one shown in
Figure 3-11 on page 223 may be displayed.
222 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 3-11 SMA Application Information Window
This message appears when a file that might cause migration problems is
selected. In the default setup, SMA will display this warning when an
application-related file with a .dll, .exe, or .com extension are selected.
SMA is designed to migrate application settings and not entire applications.
Most applications created for use on Windows use many registry and shared
dll files to run properly. Only applications that are sell contain in the
applications installation directory can be migrated form the source to the
target system. The best practice solution for moving an application is to first to
capture the settings on the sources system. Then install the application on the
target system Finally use SMA to apply these captured settings and
customizations to the target system.
11.To redirect an individual file, check the file, right-click the name (or press
shift-F10), and choose one of the options in the pop-up window (see below).
To redirect all files in a folder, select the folder, right-click the name, and
choose one of the options in the pop-up window. All files in this folder and
included subfolders will be relocated according to the option you choose, and
the new location will appear in bold italics in the destination field of the
to-be-relocated files (but not folders).
If a selected file or folder is right-clicked on, a window will pop up with three
options: My Documents, New Path and Original Path.
If My Documents is selected, a window similar to Figure 3-13 on page 225
will appear providing three options.
224 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 3-13 SMA My Documents Destination window
226 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Note: Files that make references to file or folder locations using
hard-coded pathnames will likely not work when the referred-to files or
folders is redirected. Hard-coded pathnames might occur in batch files
(.bat, .cmd) and configuration files (.ini, .cfg). Exercise caution when using
the redirect functionality.
12.Click the Search button in the File Selection window to find files or folders.
You will see a window similar to Figure 3-15.
Note: Click the Search button in the File Selection window to find files
or folders.
• Check All. Click this button to select all files shown in the search panel.
• Clear All. Click this button to deselect all files shown in the search
panel.
13.Click Close. Click the Association tab the window shown in Figure 3-16 will
be displayed.
The Association tab organizes files by file type instead of by drive location. All
files of the same type can be selected or select any combination of individual
files and/or file types. Just as with the Hierarchy tab, these can be redirected
and use the search for files and folders.
228 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
14.Click Next. The window shown in Figure 3-17 will be displayed.
Note: This window will only appear if the User Profiles option was
selected in the Migration Options window shown in Figure 3-5 on
page 214. The profiles of the currently logged on user and the guest
account are never shown.
15.Select the user profiles that is to be migrated. SMA will migrate the
user-specific settings stored in the profile plus the contents of the “My
Documents” folder of that user. For a local profile, the user password is not
migrated. Instead the password is reset to the user name.
SMA does not support the migration of user profiles from a source computer
running Windows 95 or Windows 98 to a target computer running Windows
2000 Professional, or Windows XP Professional.
For Windows 2000 and Windows XP, you not only need to have administrative
privileges when migrating user profiles, but your user account must also have
the “Act as part of the operating system” privilege. When attempting to
migrate a user profile to a target system, SMA will create the required
privilege, but the migration will not succeed because a reboot is required after
this privilege is set. To resolve, reboot the system and run SMA again, or set
up the privilege manually, and then reboot the system to and SMA. This
setting is found in the Local Security Policy of the system.
Note: On rare occasions, invalid characters might appear at the end of the
file name. This issue can be easily resolved by manually deleting these
characters.
230 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 3-19 SMA Password Protect window
19.SMA now copies the settings and files to the profile file. This may take a few
minutes, depending on how many settings and files are being copied. When
finished the window shown in Figure 3-21 on page 232 will be displayed.
20.When the profile file has been created, a summary is provided. The summary
reports whether any errors occurred and mentions the location of the log file.
The contents of this log file can be displayed by selecting the log radio button.
There is an option of saving the summary information. Click Finish to exit.
232 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 3-22 System Migration Assistant window
3. Select Apply captured settings and files to this computer and click Next.
The window shown in Figure 3-23 will be displayed.
Note: This window/option will only appear if you captured printer settings
and clicked the Edit Selection check box in the Profile Location window.
6. The desktop settings selected during the capture phase are shown. The
option of deselecting one or more of these options is provided. These options
are shown in Figure 3-24.
Note: The following windows will only appear if the information was
captured during the initial migration.
7. The application settings selected during the capture phase will be shown.
There is the option of deselecting one or more of these settings.
8. The network settings selected during the capture phase will be shown. There
is the option of deselecting one or more of these settings.
234 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
9. The Editable Network Settings window will be shown. This window will only
appear if any editable network settings were captured and the Edit Selection
check box in the Profile Location window was selected.
10.In the window shown below, the values of various network settings can be
edited. The fields of network settings that were not captured in this profile or
that are not editable in this network configuration will be grayed out.
11.Select the printers that are to be migrated. SMA will migrate the printer links
and their drivers. SMA does not support the migration of local printers from a
source computer running a different operating system than the target.
Network printers are supported when migrating to a different operating
system. If migrating a target computer to the same domain as the source
computer and are keeping the source computer operational, the IP address
must be changed, but the domain name can remain the same.
Either the computer name or the domain name can be applied but, not both at
the same time. To migrate both settings, first copy one setting, and then run
apply again with the other setting.
13.The destination can be changed for the to-be-copied files for the target
computer. For more information on how to use these functions and possible
problems that can occur as a result of redirection, see the IBM System
Migration Assistant 4.1 User’s Guide.
236 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 3-27 SMA File Selection - Path Location
14.Click the Search button to find a specific subset of files and folders. For more
information on how to use these functions, see the IBM System Migration
Assistant 4.1 User’s Guide. Note that the Search in the drop-down box only
allows a search within the given profile.
16.The user profiles selected during the capture phase will be shown if it was
selected this in the initial capture. There is the option of deselecting one or
more of these user profiles.
17.SMA is ready to start copying the to-be-migrated settings. Click Yes to start
the copy process or click No to re-edit the profile or cancel the migration
process.
18.If the Domain setting were selected to migrate shown in Figure 3-5 on
page 214, a window will be shown and will prompt you for a User ID and
password. The user must have at least account operator privileges in the
domain. Remember that a new computer account must be created prior to
applying the profile.
19.The Printers Migration window will be shown if you selected the Printers
option in the Migration Options window shown in Figure 3-5 on page 214 was
selected. Select the printers that are to be migrated. SMA will migrate the
printer links and their drivers. SMA does not support the migration of local
printers from a source computer running a different operating system than the
target. Network printers are supported when migrating to a different operating
system.
238 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
20.SMA will now copy the settings and files to the target computer. This may take
a few minutes, depending on the size of the profile file.
Important: Clicking the Cancel button will halt the copy process, but does
not undo the changes that have already been made. This will leave the
computer with some of the changes and file migrations complete, but
others not. In the worst case, it could leave the computer in an inconsistent
state requiring reinstallation of the operating system. Do not cancel the
copy process unless absolutely necessary.
If applying a SMA 2.2 profile, the percent completed progress bar does not
faithfully represent the actual percentage done. This issue is most noticeable
on target machines running Windows XP Professional. However, the profile is
being applied correctly. Wait until the copy process has finished and the
Migration Summary window appears.
21.When the settings and files have been applied to the target computer, the
summary screen will appear. Any errors are given in the summary. Click the
Log button to get a detailed overview of the migration process. Click Finish to
exit SMA.
22.Depending on the settings that were applied, SMA will be prompt to reboot
the computer in order for the changed settings to take effect.
Note: Before running SMA during the capture or apply phase, please make
sure to exit all other applications first. Other applications might interfere with
the operations that SMA is trying to perform.
/c cmdfile Capture the settings and files. You must specify the full path and the
name of the command file. Optionally, you can specify the /n parameter with the
full path and the name of the profile file. You must specify either the /c, /a, or /e
parameter when running SMABAT.
/a [cmdfile] Apply the settings and files. You must also specify the /n parameter
with the full path and the name of the profile file. You can optionally specify the
full path and the name of the command file to deselect settings prior to copying
the profile to the target computer. You must specify either the /c, /a, or /e
parameter when running SMABAT.
/e smafile Extract the command file used to create the profile. You must specify
the full path and the name of the profile. You must specify either the /c, /a, or /e
parameter when running SMABAT.
/n smafile Provide the full path and the name of the profile file.
240 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
/o logdir Provide the full path and the name of the log file directory. This
parameter is optional.
/t tmpdir Provide the full path and the name of the temporary SMA directory.
This parameter is optional.
/p smapwd Provide the password that will be used to password protect the profile
during capture or that is required to access the profile during migration. This
parameter is optional.
/jdu userid and /jdp pwd Provide a user name and password to enable access
to the domain. The user must have at least account operator privileges in the
domain. These parameters are required only during the apply phase when you
migrate the domain setting. When used, both parameters must be provided. You
must also create a new computer account prior to applying the profile.
/v Enables verbose logging in the SMA log files. This can be helpful to resolve
migration problems.
The command file guides the execution of the command, especially during
capture. The next sections describe the role of the command file in detail.
Note: Edit the command file with care. A semicolon should precede all
comments in the file. SMA does not treat the text in this file in a case sensitive
fashion. If the command file has syntax errors, error messages will be written
to standard output but processing continues. However, depending on the
nature of the error, the actual results might differ significantly from the
intended behavior.
As the example shows, the command file completely drives the capture process.
SMA provides a default command file, <drive>:\Program
Files\IBM\SMA\commandfile.txt, which you can use as a template to create your
own version.
The remainder of the section explains the various commands in the command
file. SMA will process these commands in the exact order in which they appear in
Example:
[transfer_mode_start]
transfer_mode = selective
[transfer_mode_end]
The same settings can be migrated in batch mode as through the user interface.
File migration is functionally equivalent in both modes, but the batch mode has a
unique method of selecting files and folders, involving inclusion and exclusion on
the basis of various characteristics. These procedures are described last.
The commands, with the exception of those driving file migration, are:
Password To specify a password, provide a value for plain_password. The
maximum password length is 16 characters and the minimum is 4 characters.
If a password is provided on the command line, the value in the file will be
ignored.
The functionality of the parameter encoded_password is beyond the scope of
the documentation.
Transfer_Mode This has two possible values, for example, selective or
mass. You must specify one of these values. Remember that selective refers
to the standard migration.
Profile_Path_and_Name The full path and the name of the profile file. For
example:
[profile_path_and_name_start]
output_profile = C:\sma_profiles\newprofile.SMA
[profile_path_and_name_end]
The value entered here will be ignored when you specify a profile name on
the command line.
TSM This is an advanced feature for use with Tivoli Storage Manager
Desktop To select a desktop setting, type 1, otherwise type 0 or leave
unspecified. The following desktop settings can be set:
– accessibility
– active_desktop
– colors
– desktop_icons
– display
– icon_font
242 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
– keyboard
– mouse
– pattern
– screen_saver
– sendto_menu
– shell
– sound
– start_menu
– taskbar
– wallpaper
– window_metrics
Network To select a network setting, type 1, otherwise type 0 or leave
unspecified. The following network settings can be set:
– ip_subnet_gateway_configuation
– dns_configuration
– wins_configuration
– computer_name
– computer_description
– domain_workgroup
– mapped_drives
– shared_folders_drives
– dialup_networking
– microsoft_networking
Registry You can migrate registry values and keys. This is an advanced
feature described in “Migrating Registry Settings” of the IBM System
Migration Assistant 4.1 User’s Guide.
Applications Enter one or more supported applications. In the specified
section, put in the application family name, as specified in the example in the
commandfile.txt found in the SMA installation directory.
Example:
[applications_start]
Lotus Notes
Lotus SmartSuite
Microsoft Office
Microsoft Outlook
[applications_end]
UserProfiles. For local profiles, type computer_name\username. For network
profiles, type domain_name\username. To tell SMA to capture all of the user
profiles, set GetAllUserProfiles = 1.
Example:
[userprofiles_start]
GetAllUserProfiles = 1
244 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Note: The Automatic reboot feature is not supported in batch mode on
a Windows 98 or ME target system. The user must manually close the
SMABAT command window and manually reboot the system.
File migration in batch mode is driven by three file selection and three file
deselection commands, as well as a special command that acts on drives. You
can use any number of file selection and deselection commands and create any
sequence. SMA processes these commands in strict serial order. For instance, if
a file inclusion command is followed by a file exclusion command which is in turn
followed by a file inclusion command, SMA will include files on the basis of the
first command, then it will exclude files from the resulting set on the basis of the
exclude command, and then it will include files from the original set of scanned
files on the basis of the third command. Changing the order of commands can
dramatically affect the final outcome.
SMA will select and deselect files on the basis of the original location of files and
folders on the source computer. File redirection statements are stored in the
profile and are interpreted during the apply phase after file deselection
commands have been processed. The processing of file and folder names is not
case sensitive. For file names but not path names, you can use the asterisk (*)
wildcard that matches zero to many characters, and the question mark (?)
wildcard that matches exactly one character. All file migration commands are
optional.
IncludePath With this command, you can select a folder and copy its
contents including subfolders and their contents. Optionally, you can relocate
your selection on the target machine. Wild card characters are not allowed in
this command.
Example:
[includepath_start]
;Copy the entire contents of My documents
My Documents
;Copy everything starting the folder C:\Project_1\Lab23\1998\WhiteMice, and
;copy this
;to the target machine in My Documents\WhiteMice
C:\Project_1\Lab23\1998\WhiteMice, My Documents\WhiteMice
[includepath_end]
IncludeFileDescription With this command, you can search for all files that
match a particular pattern on part of or the entire machine. If desired, you can
relocate these files and preserve or remove the directory structure.
The syntax is
<File Name>,[<Start Location>],<New Location>,[{P | R }]
where
<File Name> This is the name of a file without the path. Wildcards are allowed.
This parameter is required.
<Start Location> The search starts here. The location and all its subfolders
will be searched. The start location can be a drive letter, a folder, or the logical
locations “My Computer” or “My Documents” (on applicable operating
systems only). It cannot have wildcard characters. This parameter is optional.
If left unspecified, SMA will search “My Computer”, excluding the CD-ROM
and network drives.
246 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
<New Location> This is the folder to which the files will be copied. The folder
will be created on the target machine if necessary. It can be the root of a drive
such as the C:\ drive, or a logical location such as “My Documents”. It cannot
have wildcard characters. This parameter is required.
P | R Preserve/Remove path. You can specify one of these parameters. If the
option is Preserve, the path of the file (from the root of the drive) is preserved
and recreated on the target machine starting in the folder specified in <New
Location>. If the option is Remove, the file will be stripped from its original
path and will be placed directly in the folder specified in <New Location>. This
parameter is optional. If left unspecified, the path will be preserved
Example:
[includefiledescription_start]
;Get all files ending in .doc, and put them directly in the My Documents
;folder, i.e. remove the ; original paths.
*.doc,, My Documents,R
; Get all files ending in .xls located in the folder C:\acctng or its
;subfolders, and put them in
; C:\Accounting\LastQuarter\Spreadsheets, preserving the original directory
structure.
;The new location for files and folders directly located in the C:\acctng
;folder will be C:\Accounting\LastQuarter\Spreadsheets\acctng
*.xls, C:\acctng, C:\Accounting\LastQuarter\Spreadsheets, P
[includefiledescription_end]
ExcludeFile With this command, you can deselect one or more files in a
specific folder but not its subfolders. This command has just one parameter,
file name, which must be specified with the full path. Logical paths are not
supported and wildcards are only allowed in the file name. For instance,
C:\Docs\*.tmp will remove all files with a .tmp extension from the C:\Docs
folder.
ExcludePath With this command, you can deselect all files and folders
located in a certain folder. This command has just one parameter, folder
location, which must be specified without wildcards. For instance, C:\Windows
will remove everything in that location, including subfolders and their contents.
ExcludeFileDescription With this command, you can exclude all files with a
certain name. Wildcards are allowed but a path name is not allowed.
Optionally you can start the search from a certain location of the directory
structure onward, that is, that folder and all its subfolders. Logical names are
allowed. If the location is not specified, all selected files will be searched.
Example:
[excludefiledescription_start]
; Select all files matching the specified pattern, located in the My
;Documents ;folder or its subfolders.
*_old.doc, My Documents
In this example, the selected profile is applied as is to the target computer without
any changes. It is also possible to edit a profile prior to applying it, as is shown in
the following example:
SMABAT /a C:\MyCommandFile\EntryLevelReceptionistCommandFile.txt
/n C:\sma_profiles\receptionists.sma
In this example, SMA applies the profile receptionists.sma after some changes
have been made as described in the command file
EntryLevelReceptionistCommandFile.txt.
The command file that is used during the apply phase has the same syntax as
the file used during the capture phase, although some of the commands behave
differently. During the apply phase, you can only make changes to a given profile.
For instance, if your profile includes all desktop settings but you don’t want to
apply the active desktop to a given target computer, you can deselect that option
by typing active_desktop = 0 in the desktop settings section of the command
file. However, if your profile does not include printer settings, you cannot include
printer settings by entering printers = 1 in the miscellaneous settings section of
the command file. In order for deselection to be successful, you must know which
settings were stored in the profile.
Similarly, when the profile includes a selection of files, you can exclude some or
all, but you cannot select a file that is not included in the profile. In order for
deselection to be successful, you must know which files are in the profile, as this
information is not readily available in the original command file. Remember that
SMA processes file exclusion commands assuming the original location of files
and folders on the source computer prior to interpreting redirection statements.
During copying, when a file is relocated to a folder that already has a file with that
name, the base name of the to-be-relocated file will be appended with _01 if the
overwite_existing_files parameter in the command file is set to not
overwriting. For example, the file sample.txt will be renamed sample_01.txt.
Additional duplicate files will be given the addition _02, _03, and so forth.
248 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Misc_Settings
bypass_registry Enter 1 to deselect all registry settings, or enter 0 or leave
unspecified.
Editable_Connectivity You can edit the values of various connectivity
settings. Remember that you must have these settings included in the profile
in order to edit them. The parameters, whose equivalents during a standard
migration are described in detail in “Editable Network Settings” in the IBM
System Migration Assistant 4.1 User’s Guide, are:
– computer_name
– computer_description
– ip_address
– subnet
– gateway
– domain_workgroup
One advantage of this design is that the profiles produced in either mode are the
same. For instance, if you at one point created a profile in batch mode but at a
later time are uncertain about the settings and files captured, you can open the
profile and examine its contents through the user interface.
Another advantage of this design is that you can use the user interface to create
a command file template for use in batch mode. Rather than creating an actual
profile, SMA is run through the user interface to capture the types of settings that
you want to capture. This information is written to a command file, which you can
then use to capture a profile in batch mode. In other words, you can create this
template file once and then use it repeatedly to capture the actual settings of
different source computers. Although the specific settings that you migrate will
depend on the source computers’ environment, the kind of settings that you
migrate will be the same across your entire organization. File migration
information is not written to this template, because file handling is driven
differently in the two modes. To create a command file template, follow these
steps:
Note: For more detailed examples of file migrations, reference the IBM
System Migration Assistant 4.1 User’s Guide. In the User Guide there are
excellent examples of how to customize the standard migration, migrate
registry settings, migrate additional application settings and use SMA with
Tivoli Storage Manager.
250 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
3.7 Peer to Peer mode
Peer to Peer migration is a new function that has been implemented in the latest
versions of IBM System Migration Assistant. This function allows you to
automatically transfer all the items you have selected through a network without
having to store the .sma file anywhere. IBM System Migration Assistant will
automatically find the other machine based on a profile name. When the
machines are connected together, IBM System Migration Assistant will take care
of the file transfer between them. This is extremely useful when a network
infrastructure or external media is not available for storage.
The Peer to Peer mode of migration is typically up to 3 times faster than the
client/server mode described in previous sections. For example, in a test
environment, a 5 gigabyte migration took 70 minutes in client/server mode (over
a 100 Mbyte Ethernet switched LAN), while taking 24 minutes in Peer to Peer
mode (using a 100 Mbyte Ethernet cross-over cable).
The implementation process illustrated in Figure 3-30 on page 252 also includes
some optional components as part of the migration process:
Remote Deployment Manager (RDM) (previously known as LCCM). Refer to
the redbook Using the System Installation Tool Kit to Streamline Client
Rollout, SG24-6178.
Rescue & Recovery - Refer to the redbook Using ThinkVantage Technologies
Volume 2: Maintaining and Recovering Client Systems, SG24-6060.
ü Unpack üUserID
Load target machine ü Connect to power üDomain
with image ü Connect to Corp. üetc. Select apps to
(IUB) network install (SDA)
Migration completed
The following scenario illustrates the GUI method of using the Peer to Peer
feature.
Note: Since there are two machines that are connecting to each other, one
machine will work as a source and the other machine will work as a target. In
the rest of this text the name “source machine” is used for the machine that
you want to migrate from, and the name “target machine” is used for the
machine that you would like to migrate to.
Start SMA on the source machine. Proceed with the steps as described in 3.4.1,
“Capturing settings and files” on page 213.
After you have completed the selection of the elements that you would like to
migrate on the source machine, you will arrive at the window shown in
Figure 3-18 on page 230. This is the same window shown in Figure 3-31.
252 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 3-31 Peer to Peer file transfer
1. On the menu shown in Figure 3-31, check the check box named Peer to Peer
file transfer. The Save as button will be grayed out as soon as you check this
box. If you check the box next to Password protect, you will also be able to
set a password for the transfer for enhanced security. When you have
checked one or two of those boxes, click Next.
2. If, and only if, you selected the check box next to Password protect, the
window shown in Figure 3-32 will be displayed. The password must be at
3. If you did not select the check box next to Password protect previously, the
window shown in Figure 3-33 will be the next window displayed. If you
selected Password protect in step 1, this will be the window that you come to
after filling in the password as described in the previous step.
On this window, you must fill in a unique name for the profile you are going to
transfer from the source machine to target machine. It is very important that it
is unique since this is the name the machines will use to find each other on
the network. If several concurrent transfers use the same profile name, IBM
System Migration assistant will not be able to separate them from each other.
In our example, we have used “yourprofilename” as an example. This can be
changed to any name as long as you remember it to fill it in on the target
computer.
Important: The profile name must be unique and should only be used on
the source and target machine. Concurrent transfers with the same profile
name is not possible.
4. Fill in the desired profile name and click OK. A new window that looks like
Figure 3-34 on page 255 will be displayed.
254 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 3-34 Connection message
You are now almost finished with everything that you should do on the source
machine. It is now time to configure the target machine for the transfer. On the
target machine start up IBM System Migration Assistant as described in 3.4.2,
“Applying settings and files” on page 232.
1. From the start menu select Apply captured settings and files to this computer
as shown in Figure 3-22 on page 233. This will bring you to a window shown
in Figure 3-35.
3. If, and only if, you entered a transfer password on the source machine, the
window in Figure 3-36 will be the next window to appear after you click Next
in the previous step. If you did not select to use a password on the source
computer, this window will not appear. You will not be able to migrate any data
without the correct password. Type in the exact same password as used when
you selected the password on the source computer (see step 2 on page 253).
Click OK.
4. If, and only if, you selected the check box next to Edit Selections in step 2 on
page 256, the Edit Selections window will appear. For more information about
how to use this window, refer to Figure 3-23 on page 233.
5. The next window to appear is the window shown in Figure 3-37. Since it is
connecting through a network, it might take some seconds for this window to
appear after you have finished your last command. Usually, this connection
takes 10-5 seconds to be established. Click OK on this message. If you do not
get this confirmation message, go through the following checklist to determine
what may be wrong.
256 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
– A firewall is blocking the communication. Review your firewall settings on
both the source and the target machine. Remember to check the built in
firewall in Windows XP if you are using it.
– You have not clicked OK on the message on the source computer shown
in Figure 3-34 on page 255 as described in 5 on page 255. Click OK as
described in that step.
– Your network is not connected properly between the computers. Check the
connectivity between the computers.
– You have taken too much time on the target computer, and a timeout has
occurred. You can avoid this by waiting to click the OK button in
Figure 3-34 on page 255 (as described in step 5 on page 255) until you
are ready to work with the target computer.
6. After you have confirmed the connection between the machines, the source
machine will start the upload of the selected information from the source
machine to the target machine. The time it takes will vary depending on how
much data that is to be transferred. Remember that you can easily select
several gigabytes of data on the source machine and it will take a while to
transfer all that information.
7. After the transfer is finished, the message box shown in Figure 3-38 will
appear. If you would like to start processing the information (in other words,
start changing appearance or data) on the target machine, click Yes. All the
selected information would then be placed in the correct location. If you click
on No, the information will be stored locally ready for manual processing later
on. The .sma file will usually be stored in C:\SMA\TEMP\yourprofilename.sma
where yourprofilename is the same as what unique id you gave to the
transfer.
The most common way of using Peer to Peer transfer is to start processing
immediately by clicking Yes in Figure 3-38. If you click Yes, a new window will
appear on both the target and the source machine that looks like Figure 3-39.
8. On the window shown in Figure 3-39, you will get a log and a summary of
what has happened during the transfer and processing of the information.
This information can also be stored as a file for later reference by clicking the
Save as button. Click Finish to exit IBM System Migration Assistant. On the
target machine, a new message box that looks like Figure 3-40 will appear.
258 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
4
In most operating systems (Windows XP, Windows 2000, Windows 95, Windows
NT, Windows 98, Linux, etc.), files that are deleted are not necessarily erased. In
many cases, the only thing erased is the logical link to the file. IBM’s tool for
Secure Data Disposal is known as SCRUB3. SCRUB3 is indifferent with respect
to the operating system on a hard disk. It will ensure that any critical data is
permanently removed from a PC before it is disposed.
This chapter provides information regarding the use of the tool and how some
practical applications of it can be implemented.
Various organizations will use this tool in either the retirement phase or when
they need to cascade machines within an organization to ensure confidential
information is kept secure.
This is a DOS-based utility that can be executed through the RDM 4.11 console
or from a DOS command prompt.
Command syntax
SCRUB3 [/?] | [[/Q=NO] [/S=NO] { /D=<drive> | /D=ALL } { /L=<level> | /W=<writes> } ]
The following is a list of the various levels of data disposal that can be achieved
through the use of the SCRUB3 executable.
/S=NO Upon completion of this procedure, scrub3 will leave a signature on the drive
as an indicator of what level of data disposal has completed on the system.
This parameter, /S=NO, causes the program not to write the scrub signature to
the disk(s) that will be erased.
/D=<drive> Use this form of the /D parameter if you want to erase only one hard drive that
is installed on the system computer. The value <drive> is the hard disk drive
number of the drive that you want to erase. 1 is the first hard disk drive, 2 is the
second hard disk drive, etc. There is no default value for this parameter. The
/D parameter is required.
260 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
/D=ALL Use this form of the /D parameter if you want to erase all hard disk drives that
are installed on the system computer. There is no default value for this
parameter. The /D parameter is required.
/L=<level> The value <level> is the security level of the disposal operation. There is no
default value for this parameter. Exactly one of the /L parameter or the /W
parameter is required. It must have one of the following values (see below).
/L=1 Limited security. The first 63 sectors on the drive (includes Master Boot
Record), the last two sectors on the drive, and the first 100 sectors on each
partition are overwritten with a 0x0000 pattern (for example, each pair of bytes
on the sector is overwritten with this pattern). This operation is very fast. The
hard disk drive will not be usable via standard I/O methods. However, this is
not a secure operation in an absolute sense, since it leaves most of the
partitions on the hard drive unchanged.
/L=2 Medium security. All sectors on the drive are overwritten one time with a
0x0000 pattern (for example, each pair of bytes on the sector is overwritten
with this pattern). This operation is relatively slow, since it involves many write
operations. Actual speed depends on the size and speed of the target hard
disk drives.
/L=3 High security. All sectors on the drive are overwritten four times with the
following patterns (in this order): a random pattern, the bit-wise complement of
that random pattern, a different random pattern, and a 0x0000 pattern (that is,
each pair of bytes on the sector is overwritten with these patterns). This
operation is quite slow, and it takes four times as long as a /L=2 operation.
/L=4 DOD-compliant (Department of Defense) security. All sectors on the drive are
overwritten 7 times with the following patterns (in this order): a random pattern,
the bit-wise complement of that random pattern (three times, each with a
different random pattern), and a 0x0000 pattern (for example, each pair of
bytes on the sector is overwritten with these patterns). This operation is quite
slow, and it takes seven times as long as a /L=2 operation.
/W=<writes> The value <writes> is the number of times each sector is overwritten (done
<writes> - 1 times with a random pattern, before a final write with a 0x0000
pattern). <writes> is an integer greater than 1 and less than 100. There is no
default value for this parameter. Exactly one of the /L parameter or the /W
parameter is required.
/? This parameter causes the program to display a concise description of its
execution syntax on STDOUT and then to terminate execution. If you run
SCRUB.EXE with no parameters, it will display this same output. /? causes all
other parameters to be ignored.
Return codes
Table 4-2 Return codes
Upon completion, scrub3.exe will return the following:
Examples
Here are several examples of executable syntaxes.
SCRUB3 /L=1 /D=ALL
Overwrites the Master Boot Record, the first 100 sectors of each partition, and
the drive’s last two sectors on every hard disk drive installed on the system
computer. The pattern used for the write operation is 0x0000. None of the data
on any of the drives can be accessed with standard methods. However, a
program that uses low-level BIOS read functions can read most of the data on
these drives successfully.
SCRUB3 /Q=NO /D=2 /L=2
Overwrites every sector on hard disk drive number 2 with a pattern of 0x0000.
None of the other hard disk drives installed on the system computer is changed.
Debug messages are displayed in the command window (for example, on
STDOUT), along with all the standard messages that this program produces.
SCRUB3 /D=ALL /L=2
Overwrites every sector of every hard disk drive installed on the system
computer with a pattern of 0x0000. None of the data on any of the drives is
recoverable. This is the normal way to run SCRUB3.EXE.
SCRUB3 /D=ALL /L=3
Overwrites every byte on every sector of every hard disk drive installed on the
system computer four times. None of the data on any of the drives is recoverable.
This is not the normal way to run SCRUB3.EXE. It takes an extremely long time
to run. However, overwriting four times provides good protection from attempts to
recover data with specialized sensitive electronic equipment.
SCRUB3
262 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Writes a syntax description in your command window (for example, on
STDOUT).
This section will quantify the times required to complete each task. In a
production environment, use the commands below to test a handful of machines
to identify the times required to run the secure data disposal process.
Machines used:
NetVista M41 (6792-24U) - 1.8 GHz, 40 GB HDD, 256 MB RAM
ThinkPad T40 (2372-75U) - 1.5 GHz, 40 GB HDD, 256 MB RAM
The table below illustrates the time required to complete some of the levels of
SCRUB3. Tests were performed on a T40 ThinkPad and M41 NetVista.
Performance will vary based on the size/speed of the hard disk and PC.
Running this batch file from a DOS boot disk will provide you with four files that
can be used to gather the execution times of SCRUB3.EXE.
The time required to complete the task will be captured under “Total program
execution time (minutes)”.
Call Center LOW This user only checks the status on inventory for customers. The information
Employee is non-confidential and is only accessed through a Web interface. Since there
is no risk of data exposure, this machine can be erased using the following
command:
SCRUB3 /L=1 /D=ALL
HR Employee HIGH This user handles sensitive employee data on a regular basis. This
information has been deemed confidential and needs to be erased when the
PC is retired. The following command would be used for this example:
SCRUB3 /D=ALL /L=2
Level 2 is the “normal” way to use SCRUB3.EXE
Level 3 or Level 4 execution can be used if DoD-compliancy is required.
264 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
2. Start the client and select F12 to boot to network.
3. Upon completion, the system will appear in the director console.
4. Drag and drop the client to the selected secure data disposal level. Refer to
Figure 4-1.
5. Select Run Systems... .
6. The client will start; complete the task you have selected, and power off.
The network connection can be made using a modem, a wired network adapter
(Ethernet or Token Ring), a broadband device (Digital Subscriber Line (DSL),
cable modem, or Integrated Services Digital Network (ISDN), satellite connection
devices, and wireless network adapter. Virtual Private Networking (VPN)
connections are also supported.
268 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
– PEAP profile
Support for Boot time connect feature in the following profiles.
– No WEP profile
– Static WEP profile
– WPA-PSK profile
Support for EAP-TTLS and PEAP-GTC wireless authentication for the
following wireless adapters.
– IBM Dual-Band Wi-Fi Wireless Mini-PCI Adapter or IBM 11a/b/g Wireless
LAN Mini PCI Adapter
– IBM 11b/g Wireless LAN Mini PCI Adapter
– Intel(R) PRO/Wireless LAN 2100 3B Mini PCI Adapter
– Intel(R) PRO/Wireless 2200BG Network Connection
Support for Automatic Ethernet Profile switching in limited user privileges
mode.
5.2 Prerequisites
Before installing IBM Access Connections, you must consider where it will be
installed and what network profiles you will want to create. The following is a list
of system considerations and limitations that must be considered before installing
IBM Access Connections.
Operating systems supported:
– Microsoft’s Windows 2000
– Microsoft’s Windows XP
Language-independent: can be used with any language system
Requires 12.48 MB of hard disk drive space
Supported on the following ThinkPad systems:
– A20m, A20p, A21e, A21m, A21p, A22e, A22m, A22p, A30, A30p, A31,
A31p
– G40
– R30, R31, R32, R40, R40e, R50, R50p, R51
– S31
– T20, T21, T22, T23, T30, T40, T40p, T41, T41p, T42, T42P
– X20, X21, X22, X23, X24, X30, X31, X40
NOTE: This program is language independent and can be used with any
language system. IBM Access Connections Version 3 is supported only IBM
systems. Future releases will provide limited compatibility with non-IBM
hardware via a generic NDIS interface.
270 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Supported Wireless Configurations
Systems with Wireless Required Driver
Adapters Version or higher 802.1x EAP and
Static WEP Cisco LEAP WPA WPA-PSK
PEAP (MS)
PC Cards:
11A/B/G Wireless LAN Driver: 3.1.1.54 Yes Yes Yes Yes Yes
CardBus Adapter Note 6 Note 3 Note 1 Note 1
For systems running Microsoft Windows 2000, if you would like to use 802.1x
authentication with EAP-TLS, stop the Microsoft Wireless Configuration service if
already installed. To check if the service is installed and to stop it:
1. Start Windows 2000 and logon with administrative privileges.
2. Click Start, point to Settings, then click Control Panel.
3. Double-click Administrative Tools then Services.
4. Double-click Wireless Configuration if it is listed.
5. Change Startup type to Disabled if it is not.
6. Click OK.
NOTE 3: Cisco compatible cards does not currently support LEAP with
windows user name and password or temporary user name and password
options for LEAP configuration.
NOTE 4: To use LEAP, reinstall the Cisco Aironet Client Utility v5.02 or later
with the LEAP authentication feature selected. Run SETUP.EXE to install the
Utility and choose the “LEAP” option at the Select Options menu of the
installer. The Cisco Aironet Client Utility is contained in an additional package,
“Wireless LAN Software for Cisco Wireless LAN Mini PCI Card for Windows
98/Me/NT 4.0/2000/XP for ThinkPad”.
If IBM Client Security Software (CSS) is installed and “to manage pass
phrase using User Verification Manager for logon authentication” is enabled,
reinstall the Utility (Cisco Aironet Client Utility) again after the IBM Client
Security Software is installed.
NOTE 5: IBM recommends to contact Cisco Systems, Inc. to get the latest
device driver.
NOTE 6: Driver version 3.1.1.54 is required with Access Connections 3.21.
Before installing the IBM 11a/b/g Wireless CardBus Adapter driver, IBM
Access Connections needs to be uninstalled. Install Access Connections
after drivers are installed.
If you are using the device driver version 2.4.1.21 on Windows XP, there is the
following limitation: When a LEAP profile is connected, you cannot create an
802.11x EAP-TLS profile. If you would like to use both EAP-TLS and LEAP
profiles, please create an EAP-TLS profile first, and then create a LEAP profile.
Then, you can use both profiles.
272 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
NOTE: The IBM 11a/b/g Wireless CardBus Adapter cannot be used on IBM
ThinkPad systems equipped with an internal Intel(R) PRO/Wireless LAN 2100
3B Mini PCI Adapter at the same time.
5.3 Installation
The following section details the extraction and installation of IBM Access
Connections. There are two types of installation. The first type is “Automated
Installation” on page 274 and the second is the “Manual installation” on
page 274. The automated process is used by companies that need to install IBM
Access Connections on a large number of systems or that wish to insure that
Access Connections is installed in a customized directory. Both types of
deployment allow for the use of predefined profiles made with IBM Access
Connections’ administration tool.
Click Finish to complete the extraction of the installation files. Note where the
files were extracted.
Tip: There will be no indication that the installation has finished. The system
will not restart automatically. The system needs to be restarted before IBM
Access Connections is first used.
274 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
6. If prompted to restart, select Yes, I want to restart my computer now. Click
Finish. The computer must be restarted before the application can be used.
2. Click Next on the Figure 5-1 on page 276 window. Figure 5-2 on page 277
will be displayed.
276 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
.
3. Name the location profile and choose the connection type; for our example we
will use the following:
– Name of location: Home - Wireless network
– Type of Network Connection: Wireless LAN (802.11)
– Optional Settings: Select check box “Virtual Private Network (VPN)
connection.
– Insure that “Quick Setup” is not selected
4. Click Next. The Figure 5-3 on page 278 will be displayed.
5. If you wish to choose a network adapter that is not listed, click the Show All
Network Adapters button. After the correct adapter is selected, click Next.
You will see a window similar Figure 5-5 on page 280.
278 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-4 Edit Your TCP/IP Settings.
6. At this point you can manually set the IP address information or select Obtain
an IP address automatically and Obtain DNS server address
automatically. Click Next. The window as show in Figure 5-5 on page 280
will be displayed.
7. Select Use the current Advanced DNS settings. If no DNS suffix settings
are available, look up the local DNS suffix settings in the TCP/IP properties or
contact an appropriate support group for assistance. Click Next.
280 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-6 Edit Your Wireless Network Settings
Note: For more information concerning the wireless network settings, refer
to the section in the help file labeled Edit your wireless settings. The help
file can be accessed by clicking the Help button.
Click Next to continue to the window shown in Figure 5-7 on page 282.
10.To configure a proxy server, select the I want to use the following Internet
Explorer proxy settings with this location profile button. Then select This
location requires a proxy server, and click Proxy settings... The following
window will be displayed.
282 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-8 Proxy settings
13.In this window you can select whether or not the this location profile will
support internet connection sharing, Windows firewall settings and file
sharing. Click Next in Figure 5-9 to continue.
284 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
14.If printers are installed, the following window as shown in Figure 5-10 will be
displayed.
Attention: The window shown in Figure 5-10 will only be displayed if there
is at least one printer installed. Otherwise Figure 5-11 on page 286 will be
displayed.
17.If you want to have a program to start automatically, click Add Program. In
the example that follows in Figure 5-12 on page 287, a Web browser will start
when the wireless connection is selected.
286 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-12 Choose Program
18.Select the executable file that you wish to run, then click Open. The newly
selected program will be displayed in the window similar to Figure 5-13 on
page 288.
20.Clicking the Special Settings button will start programs before a connection
is enabled. This would be useful for starting a firewall program before an
Internet connected profile is enabled. Figure 5-14 shows where you would
add such a program.
288 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
.
Note: the window shown in Figure 5-14 is used to start programs before
the connection changes or to change settings before the connection profile
changes.
23.In this window, configure the VPN software the is required for this connection.
Select Next when finished. The window shown in Figure 5-16 on page 291
will be displayed.
290 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-16 Save Your Location Profile
24.Click save in Figure 5-16 to save the information. The pop-up window shown
in Figure 5-17 will be displayed.
25.Click Yes to switch to the new profile immediately or click No to save it only
without changing your current connection to the newly created one.
26.Applying new settings status. Click Close to remove the status box when
finished.
292 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-19 Main interface window Connection Status
4. Select New... in Figure 5-20 to continue. The Figure 5-21 will be displayed.
294 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-21 Choose Your Connection Type - Quick Setup
5. Name the location profile and choose the connection type; for our example we
will use the following:
– Name of location: Work - Wired
– Type of Network Connection: Wired LAN (Ethernet)
– Optional Settings: Do not select check box “Virtual Private Network (VPN)
connection.
– Select “Quick Setup”
6. Click Next. The Figure 5-3 on page 278 will be displayed.
296 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-23 Save Your Location Profile - Work Wired LAN
8. After reviewing the profile details in Figure 5-23. Click Save to save this
information into a location profile.
9. Click Yes to switch to the new profile immediately or click No to save it only
without changing your current connection to the newly created one.
10.If you clicked Yes to apply the newly created location profile, a status pop-up
windows similar to Figure 5-17 on page 291. When finished, the Location
Profile list will look similar to Figure 5-24 on page 298.
11.From the options shown in Figure 5-24 you can edit, delete, copy and make
new location profiles using either the standard setup or the quick setup
routine.
298 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
“Fn+F5 key display” on page 317
The window shown in Figure 5-25 is the main interface for IBM Access
Connections.
300 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Close Closes the Connection Status window but, leave IBM Access
Connections running.
Help Launches the IBM Access Connections help system.
3. The window shown in Figure 5-27 allows you to configure wireless switching.
The priority list allows you to define which wireless location profile will be
made active when your computer is in range of multiple wireless networks or
when more than one location profile uses the same wireless network name.
4. From this window you can select the Ethernet tab to configure switching of
the wired profiles. This window is shown in Figure 5-28 on page 303.
302 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-28 Ethernet location switching
5. From Figure 5-28 you can set how IBM Access Connections switches
between wired Ethernet locations.
Select between two different options:
– Automatically use the adapter with the fastest available network
connection
– Automatically use the adapter with the highest defined priority level
6. By clicking the Ethernet Location Switching Details... button, a window
similar to the on shown in Figure 5-29 on page 304 will be displayed.
This list is populated by the comment pop-up dialog window similar to the one
shown in Figure 5-30
The comment window in Figure 5-30 allows you to add comments to each
connection profile. These comments will be added to the list in shown in
Figure 5-29 on page 304.
304 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
in the IBM Access Connections Connection Status window shown in Figure 5-26
on page 301. Then click Global Settings...
Allow all users of this system to switch to any existing location <default>
unchecked: If this option is checked, all users on the system will be able to
switch location profiles
Show wireless status icon in task tray <default> checked: Removing the
check from the box will remove the wireless status icon from the Windows
task tray.
Display the progress indicator window when a profile is being applied
<default> checked: The status progress windows will not be shown if this box
is unchecked.
306 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-33 Manage Location Profiles
2. You may click Delete to remove a profile, Copy to duplicate a profile, Edit to
modify a profile and New to make a new profile. Click Close to exit.
3. The edit feature can also be accessed by clicking on the images shown as
part of the network picture in the Connection Status window as shown in
Figure 5-34 on page 308.
The window shown in Figure 5-35 on page 309 will be displayed when you
click on the network interface card in the picture shown in Figure 5-34.
308 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-35 Modify profile - adapter tab
From this window, you can modify the network card or select a different tab to
work with another part of the current location profile.
2. In Figure 5-36, click the Advanced... button. A window similar to Figure 5-37
on page 311 will be displayed.
310 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-37 Wireless Network Connection Properties
If your network list is empty, or you are missing some networks that should be
within reach, try to click the Re-Scan button. After some seconds your list should
be refreshed.
This menu will contain all WLANs, including the ones that you already have a
profile for. If you select a wireless network that already has a profile, it will try to
use the existing profile and not make a new one.
This menu contains some different facts about the different reachable networks:
Network Name
This is the SSID (Service Set Identification) of the WLAN your are connecting
to. If you try to connect to an access point that has its SSID broadcast
disabled, you will need to set up the profile manually. If you have a profile for
the WLAN from before (even though the SSID broadcast is disabled) it will
use the existing profile.
An SSID is a 32-character unique identifier attached to the header of packets
sent over a WLAN that acts as a password when a mobile device tries to
connect to the wireless access point. The SSID differentiates one WLAN from
another, so all access points and all devices attempting to connect to a
specific WLAN must use the same SSID. A device will not be permitted to join
the WLAN unless it can provide the unique SSID.
312 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
An SSID is also referred to as a network name because essentially it is a
name that identifies a wireless network.
Wireless Mode
This field describes what wireless mode that access point is running at.
Available speeds are 802.11b, 802.11a and 802.11g.
MAC Address
This field tells you the MAC address of the wireless access point. If you are in
doubt of what access point it really is you can compare this MAC address with
the actual address of the access point.
Encryption
This field tells you if some type of encryption is enabled on the access point. If
it is enabled you will have to make the profile manually and add the required
authentication to that profile. If you try to connect to a WLAN with encryption
enabled and there is no existing profile for it you will get a message that looks
like Figure 5-39 on page 313
If you would like to connect to a network without any encryption, these are the
steps on how to do it:
1. Find your desired network in the list (see Figure 5-38 on page 312)
2. Check the round check box next to the network name. The Connect button
should now be available, and not grayed out.
3. Click the Connect button. If there is a profile for that WLAN from before in
IBM Access Connections it will use your existing profile. If you do not have
any profile for it, you will get the message shown in Figure 5-40.
If you require more help than stated in this text, you can always click the Help
button to get more information.
The tray icon is located next to the clock in the taskbar on the Windows desktop.
314 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-42 Tray icon
Figure 5-43 shows the mouse-over status popup window for wireless LAN
connections. This popup is displayed when the cursor is held over the Access
Connection tray icon.
The wireless LAN icon menu is shown in Figure 5-44. This menu can be
accessed by clicking on the wireless status tray icon shown in Figure 5-45.
The wireless status tray icon indicates the status of the wireless LAN connection.
To access the icon menu, click the tray icon shown in Figure 5-42. This will
display the tray icon menu shown below. The tray icon menu can be used to
connect to a different network connection. Right-clicking on the Access
Connections tray icon provides the exit option.
The tray icon menu can be used to connect and disconnect a network
connection.
The application interface can be accessed using the icon or the start menu by
selecting Launch IBM Access Connections.
316 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
The application interface can be used to connect, disconnect or switch profiles.
From the window shown in Figure 5-47 on page 316 and Figure 5-48 you can
work with currently active profiles and ones that are not connected.
The prerequisites for this function is the same as for IBM Access Connections.
If all the required software is installed on your ThinkPad, you can start this
program by holding down the Fn key and the F5 key at the same time. Some
seconds after pushing these keys you will get a window that looks similar to
Figure 5-49.
There are two main tabs. Which tab you start up on depends on what tab you
where on the last time you closed the application. You might therefore start at the
tab similar to Figure 5-50.
318 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-50 Location Profile
You can easily switch between these to tabs by just clicking on the Location
Profiles or the Wireless Radio, or by pushing the key highlighted on the menu
item (L for Location Profile and W for Wireless Radio).
The menu that is most important to Access Connections is the tab named
Location Profile (Figure 5-50). On this tab you can see the different location
profiles that you have created in Access Connections. Select your desired profile
by clicking on it. A green square will appear on the profile that is currently in use.
It will also be mentioned on the top of the different profiles.
Close
This will close the Fn+F5 program
These are the menu options that are available on the Wireless Radio menu
(Figure 5-49 on page 318):
802.11 Wireless Radio
If you have a 802.11 Wireless Radio built into your machine this option will
show up. Press the button to the right of the text to turn it on or off.
Bluetooth Radio
If you have a Bluetooth Radio built into your computer this option will show up.
Press the button to the right of the text to turn it on or off.
All Off
This option turns off all the built in radios in your machine.
320 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
feature, you must download additional software from IBM. Once this feature is
installed, you will get a new menu item in your IBM Access Connections main
window. From this menu you are able to generate installation packages for the
desired profiles. These packages can easily be integrated into a new installation
or they can be rolled out to update the existing profiles on the desired clients.
This feature must be installed after IBM Access Connections is installed and IBM
Access Connections must be in a working state.
Click the link on the bottom that says Click here for the Administrator Profile
Deployment Feature registration and download site.You will be asked for a
username and a password. If you do not have username or password, you are
able to register for one at the site. This registration is free. The same link also
contains some additional information on how to perform the profile distribution.
When you have downloaded the IBM Access Connections: Enabler for
Administrator Profile Deployment Feature you must execute the file to install the
software. This is the procedure to install the IBM Access Connections: Enabler
for Administrator Profile Deployment Feature:
1. In the first menu you will get a quick description of what the program is for.
Read the text and click Next.
2. Read through the license agreement carefully. If you accept the terms in it,
click I accept the terms in the license agreement and click Next.
3. On the next page you will have the possibility to change the location of where
you would like to install the file. This location has to reflect the actual location
of where you have installed IBM Access Connections. The default location is
C:\Program Files\ThinkPad\ConnectUtilities. As soon as you have the correct
location click Next.
4. The next page will tell you that the installation is finished. Close that window
by clicking Finish.
Perform the following steps to start the IBM Access Connections: Enabler for
Administrator Profile Deployment Feature.
Change the path so that it reflects your correct path for where the application is
installed.
Figure 5-52 IBM Access Connections: Enabler for Administrator Profile Deployment
Feature
To enable the profile distribution menu in IBM Access Connections you must click
Enable Administrator Feature button in the IBM Access Connections: Enabler
for Administrator Profile Deployment Feature. When you have clicked that button,
the text on it will change to Disable Administrator Feature. If you want to
disable it click that button.
After you have enabled the administrator features you must close and open IBM
Access Connections. If the window is open while you run the IBM Access
Connections: Enabler for Administrator Profile Deployment Feature, the new
menu items will not be reflected until you do so.
When you open IBM Access Connections again, you will see a window that looks
similar to Figure 5-53 on page 323. You should now see a new menu item named
Profile Distribution.
322 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-53 IBM Access Connections with Profile Distribution
These new menu items are the items you will use to make or change a
deployment profile. To create a new deployment profile, click the menu item
Profile Distribution (as seen on Figure 5-53), and then Create Distribution
Package. You will then enter into a window that looks like Figure 5-54 on
page 324.
This menu contains all the different profiles that you have in Access Connections.
Click on the box next to the desired profile to select it. The second option you
have is the possibility to change the way the user can control the selected
profiles after they have been deployed. This can be selected under the User
Access Policy drop down lists. On the selected profiles you can select between
the following alternatives:
Deny all changes/Deny deletion
Deny network setting changes/Deny deletion
Deny all changes/Allow deletion
Allow all changes/Allow deletion
You can have different policies on all the selected profiles. By selecting these
policy settings you can make installations of IBM Access Connections that
324 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
contain some business critical policies that you do not want to be deleted or
changed.
The next item in the Create Distribution Package window is the Include
Distribution Control List with this package menu. If you check the box next to
it, the Define Distribution Control List button will be enabled. If you click on that
button a new window will appear that looks like Figure 5-55.
In this window you can define which machines are allowed to install these
profiles. Only systems with the authorized serial numbers can import the
package file you make.
By default the Authorized Serial Numbers window is empty. You can add serial
numbers by typing them in manually in the Individual Serial Number field followed
by the Add button. If you manually enter the serial numbers you can only add
one serial number at the time. If you have a list of machines in a database or
something that you are able to export into a text file, you can use the Group of
Tip: If you are importing serial numbers from a file, the file you are importing
from can only have one serial number on each line. Only the serial number
should be on that line, nothing else.
If you would like to import a list of serial numbers (or make a group) you can do
that by selecting the Group of Serial Numbers check box followed by clicking
the Create Group button. You will then see the following window.
You will need to enter a group name. Make sure that the name reflects the
selected machines. In that way it will be easier to make changes to it, or to alter it
afterwards. After giving your group a name, you can either manually insert serial
numbers using the same procedure as described for single serial numbers, or
you can import from a file. If your would like to import from a file, just press the
Import from files… button and you will get a window similar to Figure 5-57 on
page 327.
326 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-57 Import Serial Numbers
Navigate to the location where you have the file, select it, and then select Open.
The list should appear in the field marked Serial numbers in group. Verify that the
list is correct, and select OK to save it to your group (see Figure 5-56 on
page 326).
The next menu item on the main menu (see Figure 5-54 on page 324) is the
Include Client Configuration Policy settings with this package alternative.
This alternative allows you to select different options on how IBM Access
Connections should behave after the profile is deployed to it. These options
include things like import and export of profiles and alternatives on selection of
network detections. If you would like to use it, check the box next to the text and
then click Define Client Configuration Policy. This will bring you to a new
window shown in Figure 5-58 on page 328.
There are 7 main options that you can select in this window.
Do not allow clients to become an Access Connections administrator
By checking this box you will disable the possibility for the user to become an
IBM Access Connections administrator. They will not able to change any of
the settings that the administrator has included.
Include currently configured global settings
By checking this box, the Global Settings button will be available. You will also
get the possibility to select Do not allow clients to change global settings. If
you select that box, ordinary users will not be able to change their global
settings. If you click the Global Settings button, a new window will pop up.
This window is almost identical to the Global Settings window you can open
from the main menu in IBM Access Connections. For more information about
the different selections, refer to t 5.5.3, “Global Settings...” on page 304. The
only option that is different from that Global Settings window is the possibility
328 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
to change the way your Bluetooth antenna reacts when you resume from
sleep state on your machine. If you look at Figure 5-59 you will see that you
have the possibility to set the Bluetooth antenna to on or off state when it
resumes from a sleep state. Changing this option will only affect machines
that are equipped with a built in Bluetooth radio
After you have set all the different options in all the described windows, you are
ready to make a profile package out of it. When you return to the Create
Distribution Package window (Figure 5-54 on page 324), click OK. A passhprase
window will appear that looks like Figure 5-60.
Fill in the password that you would like to use and then click OK. Take note of
what password you used so that you have it for later deployments. A new window
will appear that looks like Figure 5-61 on page 331.
330 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Figure 5-61 Export Location Profiles
Select the desired location and type in the desired name. Remember where you
put the file. You will need it later.
After making the profile packages, you are ready to install or update the
machines you want. You now have two alternatives on how to put these profiles
out on different machines. One is to deploy an installation with the profiles
included and the other alternative is to update an existing installation.
If you would like to deploy an IBM Access Connections installation with the
profiles included, perform the following procedure:
1. When you start the program file for IBM Access Connections, you will be
prompted to state where you would like to put the installation files. The default
location is C:\DRIVERS\W2K\ACCON but you can change it. Remember
where you put the installation files.
2. You will now need to copy two files from you Access Connections folder. The
files you need are the .loa file (that you made in the Create Distribution
Package utility) and a .sig file that is located usually in the same folder. The
.sig file is very important. This file contains the passphrase that you typed in
when you made the profile package. The .sig file is usually named ___.sig.
The .loa file is named what you called when you saved it (see Figure 5-61).
If you would like to deploy new or changed profiles after you have installed IBM
Access Connections on a machine, you should use the following procedure:
1. Make a new profile package. It is very important that you use the same
password as you used the first time. That will ensure that the profile is loaded.
2. Create some type of a script that copies the new .loa file and the .sig file to
the location where IBM Access Connections is installed (or you can do it
manually). The default location is C:\Program Files\ThinkPad\ConnectUtilities
but you might have changed it.
3. When you have copied the files to that location close IBM Access
Connections completely (or reboot).
4. Start IBM Access Connections again and your new profile(s) or setting(s)
should be included
Making profiles in IBM Access Connections is quite easy. The thing you have to
remember is the location of the different files. The .loa file and the .sig file are the
two most important files in this process.
5.7 Troubleshooting
This topic is covered in the help file for this tool. The help file can be accessed
using the Help menu item located at the bottom of the IBM Access Connections
application window, or the file may be manually opened. The help file is named
QCONNECT.CHM and is located in the installation directory.
332 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
IBM Access Connections: Enabler for Administrator Profile Deployment
Feature:
http://www.ibm.com/pc/support/site.wss/document.do?lndocid=MIGR-52881
One type of physical shock, called operating shock, occurs when the disk is in
operation. During operation, the drive head is typically over the drive platters
reading and writing data. When a physical shock to the drive occurs during
operation, the head and the platters can come into contact causing both
components to be damaged.
The second type of shock, called non-operating shock, occurs when the head is
in the unloaded position, or not positioned over the platters. When a physical
shock occurs in the non-operating state, the head can contact the ramp when it is
positioned over it and damage the ability of the head to read and write data to the
hard disk drive. That is where IBM’s Active Protection System comes into play.
The following information describes the design and implementation of this
technology.
Important: The IBM Hard Drive Active Protection System protects only the
primary hard disk drive on computers using Windows® XP® or Windows®
2000®. The protection system does not support protection of any secondary
hard disk drives, including those installed in an UltraBay. The active protection
system functions with the 2.5" hard disk drive provided by IBM due to special
customization.
336 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
6.3 Active Protection System sensor status
The APS software monitors the accelerometer sensor information and displays
the sensor status in the system task tray. See Figure 6-1.
The following states of system status are illustrated using the system tray icon:
The shock sensor is enabled and the head of the primary hard disk
drive is unloaded due to shock condition. In this state, the computer
has detected the shock condition and the head of the primary hard
disk drive is unloaded to protect the hard disk drive from physical
damage.
When the system senses a potential damaging event, the popup window shown
in Figure 6-2 will be displayed and the hard drive will be stopped temporarily to
protect the system from shock.
The user can remove the system tray icon by right-clicking in the system tray and
selecting Remove Active Protection Icon from the System Tray. See
Figure 6-3.
The system tray icon can also be removed by clearing the Show active
protection icon in the system tray check box. See Figure 6-4 on page 340.
338 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
ShockPrf.sys: kernel mode device driver for prediction algorithm and hard
disk drive control
Shockmgr.sys: kernel mode driver for miscellaneous operation
Sensor.dll: application interface dll
TpShCPL.cpl: control applet
TpShocks.exe: task tray application
TpShCPL.dll: bitmap resource file for this application program
TpShPrm.hta: promotion pop-up window
TpShPrm.gif: animation for promotion pop-up window
TpShPrm.jpg: banner picture for promotion pop-up window
Use the task tray menu to enable and disable the active protection system.
Select Enable Hard Drive Active Protection on the system task tray to enable the
shock detection and protect the primary hard disk drive from damage.
To view and modify the APS configuration windows and system properties, do
any of the following:
Double-click the APS icon in the system tray
Click Start → All Programs → Access IBM → IBM Active Protection
Open the Control Panel and double-click IBM Active Protection
The APS properties window is displayed. There are three tabs available on the
APS properties window. Overall APS configuration is performed using the
Configuration tab. See Figure 6-4.
340 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
extended amount of time, this option will be reset so that the stop threshold
must again be exceeded in order for the protection system to begin ignoring
low-level shocks. When it is enabled, the protection system will always stop
the hard disk drive when heavy shocks are detected.
Allow me to manually suspend Active Protection System check box:
If this check box is selected, you can make the protection system stop its
operation temporarily for a specified length of time. During that length of time,
the protection system ignores low-level shocks. If severe shocks are detected
while the system is in this state, the hard disk drive is stopped. Select your
preferred suspend time from the drop down box.
When hard drive is stopped check box, prompt me to manually suspend the
Active Protection System:
Select this check box if you want to see a pop-up message for manually
suspending the protection system when low-level shocks or repetitive
vibrations are detected. The pop-up message will be displayed above the
Active Protection System icon on the system tray.
Show active protection icon on the system tray check box:
If the check box is selected, the icon showing the status of the shock sensor is
displayed in the system tray.
Allow only users with Administrator privileges to modify settings for the Active
Protection System check box:
If this check box is selected, you must have Administrator privileges to
configure the following settings:
– Checkbox for enabling the IBM Active Protection System
– Checkbox for temporarily ignoring repetitive, low-level shocks
– Checkbox for suspending the Active Protection System for a specified
length of time
– Checkbox for configuring the privileged settings of the Active Protection
System
Additional explanation and views of the Real-time Status tab are covered in 6.6,
“APS Real-time Status in action” on page 343.
342 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
6.5.3 APS properties About tab
The About tab on the APS Properties window lists the version information of the
APS software installed on the system.
344 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
6.6.2 Repetitive shock detected
Figure 6-8 shows the Real-time Status window during normal activity with the
repetitive shock detection feature enabled (see Figure 6-4 on page 340 for
information on how enable or disable the repetitive shock detection feature). Note
that hard drive activity continues during these repetitive shocks.
346 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
6.6.4 Free fall
Figure 6-10 shows the Real-time Status window during a period when the
ThinkPad is in a free fall. The APS has stopped hard drive activity during the fall.
Note that the actual orientation of the ThinkPad during the fall is indicated on the
Real-time Status display. The APS motion sensors are used to properly display
the real-time orientation of the ThinkPad on the Real-time Status window. Even
minor shakes and ThinkPad movements will briefly modify the orientation of the
ThinkPad in the figure.
6.7.1 Head unloading for increased hard disk drive shock tolerance
As a result of extensive testing with the computer lid both open and closed, IBM
has found that in typical drop accidents either from the knee or a desk to a
concrete floor, the internal hard disk drive is protected by the durable ThinkPad
shell so that the received shock level to the hard disk drive does not exceed
800G or 800 times the force of gravity. Since 800G is the maximum rating of
shock tolerance of the hard disk drive with the head unloaded, the hard disk drive
can be rescued from most accidents in typical usage if the disk head is unloaded
prior to receiving the shock impact. Head unloading can take 300 to 500ms, and
the average duration after detecting a free-fall situation is 300ms. Therefore, it is
too late to start head unloading after detecting the free-fall situation. This makes
it necessary to concentrate on the behavior of the machine prior to a drop. The
initial behavior acts as a prediction of the impending accident. In general, the
duration of the predicting event is much longer than the actual free-fall. This
enables the active protection system to respond to the impending accident prior
to receiving the shock. The machine posture or system orientation is constantly
checked by monitoring acceleration and using a prediction algorithm to
statistically analyze recent behavior in typical usage. Head unloading is initiated
by degrees of tilt, acceleration, or shock. The degrees at which head unloading
occurs are adjusted and fine-tuned every time a proper prediction is applied for
the current motion. The disk drive head remains unloaded until detecting a stable
environment for approximately one to four seconds depending upon the amount
of excessive acceleration at the beginning of the current shock or posture
change. The Real Time Status window in the Active Protection System
Properties (see Figure 6-7 on page 344 through Figure 6-10 on page 347) will
give you a live view of the computer’s physical movements.
348 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
6.7.2 Use of prediction algorithm
The active protection system employs a heuristic learning algorithm to track
system orientation. The Shock Manager, a system thread created by the
Shockprf.sys of a kernel mode device driver, analyzes the variations in
acceleration and collects system orientation data into the Shock History
Database. The collected data is then used to tune sensitivity and predict
excessive shocks. This tuning is important in minimizing the disk performance
penalty caused by prediction failures. Once the Shock Manager detects a certain
variation which may be equivalent to one usually seen just before receiving an
excessive shock, the Shock Manager stops the hard disk drive immediately.
The design of the active protection system allows for certain shocks or vibrations
that fall within a span of accepted or normal motion and does not repeatedly stop
the hard drive when this level of motion is detected. You can select a check box in
the properties window to temporarily disable hard drive protection while repetitive
motion or vibration is detected. This feature is particularly useful when the
ThinkPad computer is used on a plane or train and repetitive vibration is
expected.
6.8 Summary
The IBM Hard Drive Active Protection System can greatly improve overall system
reliability by providing hard drive protection from shock. Using the latest
technology to constantly monitor the movement of your ThinkPad computer,
users can feel confident that their data will be protected in the event of a drop or
similar potentially damaging event.
350 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
7
There are numerous things to keep in mind when developing a long term solution
for your organization. Using ThinkVantage Technologies will offer maximum value
when implemented with a strong long term plan and objective.
The following sections will help you consider some elements before you
complete your plan.
352 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Large Bank Example
Model Bank
Image
4 mobile Token WindowsNT Whsl Bank
systems X Ring X Windows2000 X Image = 144
5 desktop Ethernet Corporate Image images
systems Trader
Application complexity
How many applications are in your organization? Who uses them?
This can be one of the most challenging questions. Clearly defining which
applications are common within business units is half the battle. By having this
information, you'll be able to plan the best solution for using IBM Software
Delivery Center (SDC) and ImageUltra to manage deployment of those
applications. For more information of IBM Software Delivery Center, see Using
ThinkVantage Technologies: Volume 2 Maintaining and Recovering Client
Systems, SG24-6060-03.
System recovery
Would a system recovery solution help in your environment? Do you have many
remote (or home office) users?
In this book, we discuss how to set up Rescue and Recovery so a user (or
technician) can initiate the silent installation process (through ImageUltra
Builder). This is particularly useful when you would like to ensure the user's
workstation is fully configured before running the installation process. This will
ensure the base backup on the machine is fully customized for that particular
user.
If you plan to use UltraPortable images only, you can get rid of external imaging
tools. However, in mixed hardware environments, you'll need to keep an imaging
tool to deploy machines.
UltraPortable solution
Why do I need an UltraPortable solution?
354 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
The UltraPortable solution provides the greatest flexibility for different hardware
types. Portable Sysprep images can sometimes have problems with installing on
machines that have differences in core chipsets.
Handling migration
How does SMA work in this process?
There are many ways SMA can be integrated into the process. In ImageUltra
Builder, SMA can be run in batch mode to import a users profile. In addition, IBM
Director can also be used to run the migration process as a task.
ImageUltra Builder
ImageUltra Builder allows for the creation of one single SMART image that can
be easily updated and deployed across an organization. This modularity allows
for easy updates and simplified testing as the build processes for unchanged
modules will always be consistent.
Using SMA will allow end-user data, Windows settings and “application
personalities” to be transferred to a new machine. During the process, the
end-user can also validate the data to be captured before it is downloaded to the
new environment.
The following example allows migration to occur without the requirement for
network/external storage. It also illustrates where SMA is implemented in the
deployment process.
356 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Validate Client Restore
Install new Connect to
on Network captured data
IBM Client Corp. network
(SMA)
ü Unpack üUserID
Load new IBM Client ü Connect to power üDomain
system with image ü Connect to Corp. üetc. Select apps to
(IUB) network install (SDA)
Connect
ü Read migration guide systems with üCaptured data
ü Access internal web site crossover is stored on
for additional migration info cable the new client
Migration completed
As discussed in this book, secure data disposal provides peace of mind when
protecting confidential information is paramount. The tool can be run
stand-alone, which is excellent in situations where the workstations have already
been removed from a corporate infrastructure. Furthermore, RDM can also be
used to apply the secure data disposal on workstations attached to the network
environment.
Ensuring the removal of confidential data can easily result in large data savings
by protecting your intellectual capital. Furthermore, when an IT technician
removes all the data from a machine, all applications are cleared too. In
instances where a machine is being redeployed, this can also protect an
For example, a user has a ThinkPad 600 with Windows 98. He will be receiving a
ThinkPad T40 with Windows XP. Or another example: a company wants to use
the ThinkVantage Tools to upgrade from Windows NT to Windows XP.
The process steps shown here briefly describe the steps to follow for a migration.
See the corresponding chapters in this book and Using ThinkVantage
Technologies: Volume 2 Maintaining and Recovering Client Systems,
SG24-6060 for detailed use and configuration of the ThinkVantage Tools.
358 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Table 7-1 ThinkVantage Technologies migration process steps
Process steps ThinkVantage Tool To Do
used
1.) Image creation ImageUltra Builder 1. Choose the image type you want to use with ImageUltra
Builder.
2. Integrate the System Migration Assistant as a software
module into your ImageUltra Builder image.
3. Integrate the Software Delivery Center client as a
software module into your ImageUltra Builder image.
4. Integrate the Software Delivery Center as a software
module into your ImageUltra Builder image.
5. Integrate the System Information Center client as a
software module into your ImageUltra Builder image.
6. Integrate Access IBM as a software module into your
ImageUltra Builder image.
7. Integrate Access connections as a software module into
your ImageUltra Builder image. Keep in mind that
Access connections is only supported on specific
ThinkPads.
8. Integrate Embedded Security Subsystem as follows, to
your ImageUltra Builder image:
a. Create driver modules for the SM bus driver and the
LPC bus driver.
b. Create a software module for the IBM Client security
software.
Refer to “Supported IBM models” in the Embedded Security
Subsystem chapter of Using ThinkVantage Technologies:
Volume 2 Maintaining and Recovering Client Systems,
SG24-6060 for which IBM systems ESS can be installed.
2.) User data and System Migration 1. Install on the old pc system, System Migration Assistant.
user settings Assistant 2. Run System Migration Assistant.
migration 3. Place the SMA profile file to a network share.
3.) Image ImageUltra We have several possibilities to deploy the image to a client
deployment Builder system.
Remote Deploy 1. Creating a ImageUltra Builder boot floppy.
Manager 2. Creating a ImageUltra Builder distribution CD set.
3. Creating a custom network boot floppy.
4. Creating your own network deployment boot floppy.
5. With Remote Deploy Manager, we have the possibility to
replace the boot floppy. We can remotely wake up a PC
system, send a virtual boot floppy to it and deploy the
image.
4.) Install client ImageUltra Builder When the image is deployed to the service partition on a PC
system, the installation process will automatically start from
the service partition on the local PC system.
5.) Software Software Delivery Distribute and install Rescue and Recovery with Software
distribution Center Delivery Center. Rescue and Recovery will do a base backup
after the installation.
6.) Restore user System Migration 1. Run System Migration Assistant on the client system.
data and user Assistant 2. Restore the SMA profile file from the network share.
settings
7.) Backup Rescue and When the user data and settings are correctly on the client
Recovery system, run Rescue and Recovery for creating the first
incremental backup.
8.) Inventory System Information Run or schedule the System Information Center agent on the
Center client system.
The process steps here show briefly the things to do for a rollout. See the
corresponding chapters in this book and ThinkVantage Technologies: Volume 2
Maintaining and Recovering Client Systems, SG24-6060 for detailed use and
configuration of the ThinkVantage Tools.
360 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Table 7-2 ThinkVantage Technologies rollout process steps
Process steps ThinkVantage Tool To Do’s
used
1.) Image creation ImageUltra Builder When a customer purchases new IBM hardware, we have
the advantage that we can import the service partition
from the systems. In this case we will use ultra portable
images.
1. Import service partitions from the systems and create
the corresponding operating system, driver and
application modules.
2. Integrate the Software Delivery Center client as a
software module into your ImageUltra Builder image.
3. Integrate the Software Delivery Center as a software
module into your ImageUltra Builder image.
4. Integrate the System Information Center client as a
software module into your ImageUltra Builder image.
5. Integrate Access connections as a software module
into your ImageUltra Builder image. Keep in mind that
Access connections is only supported on specific
ThinkPads.
6. Integrate Embedded Security Subsystem as follows,
to your ImageUltra Builder image:
a. Create driver modules for the SM bus driver and
the LPC bus driver.
b. Create a software module for the IBM Client
security software.
Refer to “Supported IBM models” in the Embedded
Security Subsystem chapter of Using ThinkVantage
Technologies: Volume 2 Maintaining and Recovering
Client Systems, SG24-6060 for which IBM systems ESS
can be installed.
3.) Install client ImageUltra Builder When the image is deployed to the service partition on a
PC system, the installation process will automatically start
from the service partition on the local PC system.
4.) Software Software Delivery Distribute and install Rescue and Recovery with Software
distribution Center Delivery Center. Rescue and Recovery will do a Base
Backup after the installation.
5.)Prepare the Bring the PC system to the end user and finalize the
system for the configuration.
user
6.) Backup Rescue and Recovery When the user data and settings are correctly on the client
system, run Rescue and Recovery to create the first
incremental backup.
7.) Inventory System Information Run or schedule the System Information Center agent on
Center the client system.
Large enterprises have a help desk to support end users. The help desk has a
trouble ticket tool to open trouble tickets for users who have a problem with their
PC system.
It is possible to use some of the ThinkVantage Tools for integration into a help
desk tool system. We assume for this example that SMA, Software Delivery
Center, Rescue and Recovery, System Information Center and IBM Director
Agent are used on the client systems. See Table 7-3 on page 363 for an example
scenario:
362 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Table 7-3 Help desk scenario example
Action Tool used
2. The help desk opens a trouble ticket for the problem in the Help desk Tool
help desk tool. Based on the inventory information from System
System Information Center, the supporter can see what Information
PC system the user has and what software and versions Center
are installed on the users computer.
3. The help desk accesses the user’s computer remotely to IBM Director Agent
see the problem.
5. The help desk starts SMA to back up the users desktop System Migration
settings and data. Assistant
6. The help desk uses Software Delivery Center to reinstall Software Delivery
Outlook on the users computer. Center
7. The help desk restores users settings and data with SMA. System Migration
Assistant
8. The help desk starts outlook and checks the settings and
whether everything is working correctly.
10. The help desk closes the trouble ticket. Help desk tool
For example, let’s say a customer wants to use IBM Director for server systems,
because he needs server systems management capabilities only on server
systems. Client systems management is not needed. So the customer installs
the System Information Center agent on desktop, laptop and server computers to
gather the asset information. The IBM Director agent will be installed only on
364 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Abbreviations and acronyms
AD Asset Depot FFE File and Folder Encryption
AES Advanced Encryption GIF CompuServe Graphics
Standard Interchange Format
ANSI American National Standards GINA Graphical Identification and
Institute Authentication
API application programming GSK Global Security Toolkit
interface GUI Graphical User Interface
APS Active Protection System HDD Hard Disk Drive
ATAPI Advanced Technology HPA Hidden Protected Area
Attachment Packet Interface
HTML Hypertext Markup Language
BEER Boot Engineering Extension
Record IBM International Business
Machines Corporation
BIOS Basic Input/Output System
IDE Integrated Drive Electronics
BSOD blue screen of death
IE Internet Explorer
CA Certificate Authority
IP Internet Protocol
CAPI cryptographic application
programming interface ISDC IBM Software Delivery Center
CHS cylinders, heads, sectors ISIC IBM System Information
Center
CISC Complex Instruction Set
Computer ISO international Standards
Organization
CSS Client Security Software
ITSO International Technical
DLL dynamic link library Support Organization
DLT digital linear tape IUB ImageUltra Builder
DSL Digital Subscriber Line JDBC Java database connection
EAP Extensible Authentication JDK Java Development Kit
Protocol
JRE Java Runtime Environment
ECC error checking and correcting
LBA Logical Block Addressing
EEPROM Electrically Erasable
Programmable Read Only LDAP Lightweight Directory Access
Memory Protocol
EFS Encrypted File System LEAP Lightweight Extensible
Application Protocol
ESD electronic software
distribution LPC low pin count
ESS Embedded Security LTO linear tape open
Subsystem MBR Master Boot Record
366 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Related publications
The publications listed in this section are considered particularly suitable for a
more detailed discussion of the topics covered in this redbook.
IBM Redbooks
For information on ordering these publications, see “How to get IBM Redbooks”
on page 369. Note that some of the documents referenced here may be available
in softcopy only.
Using ThinkVantage Technologies: Volume 2 Maintaining and Recovering
Client Systems, SG24-6060-03
ThinkVantage Technologies: Using Software Delivery Center, REDP-3976
Implementing Systems Management Solutions using IBM Director,
SG24-6188
Using the System Installation Tool Kit to Streamline Client Rollout,
SG24-6178
Other publications
These publications are also relevant as further information sources and are
provided with the product CD-ROM:
ImageUltra Builder Version 2.0 User Guide
http://www.ibm.com/pc/support/site.wss/document.do?lndocid=MIGR-44628
IBM System Migration Assistant 4.2 User’s Guide
http://www.ibm.com/pc/support/site.wss/document.do?lndocid=MIGR-53526
IBM Access Connections Deployment Guide
http://www.ibm.com/pc/support/site.wss/document.do?lndocid=MIGR-52881
368 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Introduction to IBM ThinkVantage Technologies: Security
http://www.pc.ibm.com/training/txw14.html
Introduction to IBM ThinkVantage Technologies: Wireless
http://www.pc.ibm.com/training/txw15.html
Introduction to IBM ThinkVantage Technologies: Migration and Recovery
http://www.pc.ibm.com/training/txw16.html
Using the IBM ThinkVantage Technologies
http://www.pc.ibm.com/training/ezi10.html
IBM ImageUltra Builder Workshop
http://www.pc.ibm.com/training/txi06.html
IBM Rescue and Recovery with SMA Workshop
http://www.pc.ibm.com/training/txi08.html
Implementing IBM Client Security Workshop
http://www.pc.ibm.com/training/txi20.html
Implementing and Securing a Wireless LAN
http://www.pc.ibm.com/training/txi21.html
372 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
See Hidden Protected Area filter/utility modules 64–65
HR Employee 264 filters 29
defined 28
Hardware Independent Imaging Technology
I defined 22
IBM Customization Program 87, 89
integration 26
IBM Director 6, 363–364
hardware-specific image 26
with Asset Depot 363–364
IBM Preload modules 39–45
IBM PCD Tool 8
image maintenance 26
IBM PCs 24
image portability 25–26
IBM Preload modules 39–45
image types 22–23
IBM ThinkPad 28
hardware-specific image 23
ignore HIIT processing 32
portable-sysprep image 23
image cleanup tab
selecting the best for you 24–27
base map settings 119
ultra-portable 22
image creation 3
installation time 26
image deployment 3
InstallShield 47
image maintenance
map settings
ImageUltra Builder 26
Base map 114
image management 3
Driver map 124
image types 22–24
module
hardware-specific image 23
catagories 27
portable-sysprep image 23
defined 21
selecting the best for you 24–27
modules
ultra-portable 22
application 27, 29
ImageCenter 139
base operating system 27
image-cloning software 24
container 29
image-cloning tool 23
defined 28
ImageUltra Builder 3, 8, 11–200, 361
device driver 28
application modules 48–54
operating system 27
base map settings 114–123
operating system add-on 27
base maps
partitioning 27, 29
creating 103–123
network-staging folder 136
defined 21, 29, 103
operating system add-on modules 66–76
base operating system hardware specific mod-
partitioning modules 77
ules 78–86
portable-sysprep image 25–26
container 28
creating 88
core chip set 26
repository 29
custom modules 45–48
creating 33–39
deploying images 126–138
defined 21, 30
deployment methods 132–138
file extensions 30
CD distribution 132
Smart Image 13, 21, 24, 45
network deployment 134
creating 32–125
deployment repository 29
definition 21
device driver modules 54–63
Sysprep 22
driver map
suported operating systems 26
create 123
supported hardware 26
defined 29, 103
system board 26
driver map settings 124–125
ultra-portable image 26–27
Index 373
utilities ImageUltra Builder 27
defined 29 modules
Windows 2000 images 26 application 48–54
Windows Installer 46 base operating system hardware specific
Windows XP images 26 78–86
imaging 8 custom 45–48
INF installable 32 defined 21
INF installs 32 device driver 54–63
install sequence tab filter/utility 64–65
base map settings 118 IBM Preload 39–45
install slot 32 operating system add-on 66–76
installation time partitioning 77
ImageUltra Builder 26 motion sensor 335, 348
InstallShield 47 msiexec.exe 46
integrated security chip 5 My Computer 30
Integrated Services Digital Network 268
Internet 1, 4
IP address 116
N
Network Boot 141
ISDN
network deployment 8
See Integrated Services Digital Network
network infrastructure 4
network options tab
K base map settings 120
keyboard settings 121 driver map settings 125
network synchronization 108
network options tab 120
L network-staging folder 136
layout settings 121
normal device detection 32
LEAP 268–269, 272
M O
operating system add-on modules 66–76
map settings
ImageUltra Builder 27
Base map 114
operating system modules 27, 70
Driver map 124
ImageUltra Builder 27
memory 6
organization name 116
menu appearance tab
OS modules 196
base map settings 121
color settings 121
keyboard settings 121 P
layout settings 121 partition tab
menu driven area 29 base map settings 122
menu items 123 partitioning modules 77
metadata 30 ImageUltra Builder 27, 29
Microsoft Sysprep 23, 89 PC life cycle 1, 6, 259
migration PEAP 269
when is it required? 203 Peer to Peer 251–258
who performs the transfer? 203 defined 251
module behavior 109 portable-sysprep image 23, 25–26, 87, 124
module categories creating 88
374 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
PowerCast 140, 170, 173, 177–178 security level 260
PowerCasting 140 signature 260
overview 140 SDC
PowerQuest See Software Delivery Center
Drive Image 3, 186 Secure Data Disposal 4, 259–265
Pre-boot Execution Environment 141–142, 148, See also SCRUB3
161 command syntax 260
capture donor image 142 Department of Defense-compliant 261, 263
pre-deploy planning 1 examples 262
processors 6 high security 261
PXE in-the-field debugging 260
See Pre-boot Execution Environment limited security 261
Master Boot Record 261
medium security 261
R performance considerations 263
RDM
Remote Deployment Manager 260, 264
See Remote Deployment Manager
scrub signature 260
read only memory (ROM) 29
security level 260
Redbooks Web site 369
signature 260
Contact us xv
viruses 259
reference manual 5
security-aware applications 5
relative location 32
service partition 124, 181, 359, 361
Remote Deployment Manager 6, 260, 264
Service Set Identification 281, 312–313
console 260
defined 312
repository
SETUP.ISS 48, 180, 211
creating 33–39
generate 48
defined 30
silent install command 31, 74
defined in ImageUltra Builder 21
silent installation 46
file extensions 30
defined 46
ImageUltra Builder 29
SMA
Rescue and Recovery 122
See System Migration Assistant
overview 4
SMABAT.EXE 239, 241, 248
return on investment (ROI) 2
Smart Image 13, 21, 24, 45, 120, 124–125, 136
creating 32–125
S definition 21
script files 76 Sysprep 22
SCRUB3 259, 262–265 Software Delivery Assistant xvii
See also Secure Data Disposal Software Delivery Center xvii, 178, 353, 362
command syntax 260 overview 5
defined 259 SoundMAX audio driver 54, 61
Department of Defense-compliant 261, 263 source directory 74
examples 262 SSID
high security 261 See Service Set Identification
in-the-field debugging 260 subnet mask 116
limited security 261 supported hardware
Master Boot Record 261 ImageUltra Builder 26
medium security 261 supported operating systems
performance considerations 263 ImageUltra Builder 26
scrub signature 260 Symantec
Index 375
DeployCenter 11–12, 23, 27, 77–78, 87, 90–91, file migration 245
97, 139–142, 166, 171, 182–183 IncludeFile 245
ImageCenter 139 IncludeFileDescription 246
overview 139 IncludePath 246
Ghost 3, 12, 23, 27, 78, 90, 180, 182, 186 installation 208–211
considerations 180 log_file_location 244
Sysprep 116 logdir 241
Sysprep tool 23 migration
system board 26 when is it required? 203
System Information Center 362 who performs the transfer? 203
overview 5 MigrationNote 244
System Migration Assiatant Misc_Settings 244
installation network setting 243
silent 210 overwrite_existing_files 244
silent install 210 Peer to Peer 251–258
System Migration Assistant 4, 201–258 defined 251
alternate_print_driver_location 244 profile file 254
apply phase 207, 212 plain_password 242
applying settings and files 232–239 printers 244
batch mode 248–249 profile file 206–207, 213, 231–232
basic operations 207 apply phase 207
batch mode 239–249 batch mode 242
bypass_registry 244 capture phase 207
capture phase 207, 211, 213 command file template 249
batch mode 241–248 location 234
capturing settings and files 213–232 Peer to Peer 254
capture_ntfs_attribute 244 quota 244
cmdfile 240 registry values 243
command file template 249 removable_media 244
profile file 249 smafile 240
components 206 smapwd 241
COMMANDFILE TXT 207 supported application migration 217
CONFIG INI 206 supported operating systems 205
SMA EXE 206 system requirements 205
SMABAT EXE 206 tmpdir 241
desktop settings 242 transfer_mode 242
editable_connectivity 245 tsmpwd 241
Exclude_Drives 245 UserProfiles 243
ExcludeFile 247 verbose logging 241
ExcludeFileDescription 247 with ImageUltra Builder 179
ExcludePath 247
file handling commands
Exclude_Drives 245
T
target location 31
ExcludeFile 247
ThinkCentre 28
ExcludeFileDescription 247
ThinkPad 24
ExcludePath 247
ThinkVantage Technologies 1–2
IncludeFile 245
ThinkVantage Tools 2
IncludeFileDescription 246
Tivoli Storage Manager 242
IncludePath 246
376 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Token Ring 268 System Migration Assistant 205, 217
tree structure 103 limitation 229
Windows Installer 46
Windows NT 4.0
U Secure Data Disposal 259
ultra-portable image 22–23, 26–27, 124
System Migration Assistant 205
ultra-portable module 196
Windows NT 4.0 Resource Kit Support Tools 89
ultra-portable system 196
Windows XP
unattended installation
Access Connections 270
defined 46
Active Protection System 336
uninstalling SMA 209
ImageUltra Builder 20, 89
user guides 5
Secure Data Disposal 259
user information tab
System Migration Assistant 205, 212
base map settings 115
Windows XP images 26
utilities 99
WinRAR 48, 193
defined in ImageUltra Builder 29
wireless network considerations 309–314
workgroup 116
V WPA Supplicant 271
VBE WPA-PSK 269
See Virtual Boot Environment WPA-TKIP 271
video driver
ImageUltra Builder 28
Virtual Boot Diskette 142
create 157
Virtual Boot Environment 139–142
Virtual Private Networking 268
viruses 259
VPN
See Virtual Private Networking
W
WEP 269
When is system migration required? 203
Windows 2000
Access Connections 270
Active Protection System 336
ImageUltra Builder 20, 28, 89
Secure Data Disposal 259
Service Pack 4
ImageUltra Builder 66
System Migration Assistant 205, 212
Windows 2000 images 26
Windows 95
Secure Data Disposal 259
System Migration Assistant 205
limitation 229
Windows 98
Secure Data Disposal 259
Index 377
378 Using ThinkVantage Technologies: Volume 1 Creating and Deploying Client Systems
Using ThinkVantage Technologies: Volume 1
Creating and Deploying Client Systems
(1.0” spine)
0.875”<->1.498”
460 <-> 788 pages
Back cover ®
Using ThinkVantage
Technologies: Volume
1
Simplification of the ThinkVantage Technologies bring your IBM PCs one step
PC life cycle process closer to being self-configured, self-optimizing, INTERNATIONAL
with ThinkVantage self-protecting, or self-healing, to help save you time and TECHNICAL
Technologies money throughout the life of your systems. In short, SUPPORT
ThinkVantage Technologies let you focus your attention on ORGANIZATION
your business, rather than on your computer. ThinkVantage
Simple deployment
Technologies are software tools designed to help customers
in complex corporate
drive down IT support costs (in particular, the cost of a PC in
environments managing and supporting systems after its initial purchase), BUILDING TECHNICAL
increase security and decrease the complexity of today’s IT INFORMATION BASED ON
Use of ThinkVantage PRACTICAL EXPERIENCE
infrastructure.
Technologies to
lower costs This series of Redbooks will help you install, tailor and IBM Redbooks are developed by
configure the IBM ThinkVantage Technologies on IBM and the IBM International Technical
OEM desktops. Support Organization. Experts
from IBM, Customers and
Partners from around the world
Using ThinkVantage Technologies, Volume 1: Creating and create timely technical
Deploying Client Systems describes how to create and deploy information based on realistic
client systems. The tools covered include: scenarios. Specific
- ImageUltra Builder recommendations are provided
- System Migration Assistant to help you implement IT
solutions more effectively in
- Software Delivery Assistant your environment.
- Secure Data Disposal
- Access Connections
- Active Protection System
For more information:
ibm.com/redbooks