Windows NT Automated Deployment and Customization

Windows NT Automated Deployment and Customization

by Richard Puckett

Paperback

$32.00

Product Details

ISBN-13: 9781578700455
Publisher: Sams
Publication date: 04/16/1998
Series: Circle Series
Pages: 320
Product dimensions: 6.03(w) x 9.07(h) x 0.82(d)

Table of Contents

Introduction.

I. BASIC CONFIGURATION OF AN UNATTENDED INSTALLATION.

1. Why NT Workstation?
An Overview of NT Workstation 4.0. What's Wrong with NT "Out of the Box?" NT File System Permissions--The ACLs. Securing the System Registry. Service Packs and Hot Fixes. Network Protocols and Services. Deployment Planning and Methodology. Case Study: Communication Difficulties and Planning. Issues. Common Deployment Mistakes. Automating the Deployment Process. Checklist: Planning a Deployment.

2. Creating a Distribution Share Point.
What Is a Distribution Share Point? Creating a DSP. Subdirectories Necessary for the Automated Install. Case Study: ADA -Das SystemHaus GmbH. Troubleshooting Directory Structures in the DSP. Accessing the DSP Remotely. Accessing DSPs in Windows NT Domains. Accessing NetWare Networks. Accessing UNIX Systems. Push Installations of Windows NT. Files Unique to an Automated Installation of Windows NT. WINNT.EXE or WINNT32.EXE. UNATTEND.TXT. NAME.UDB, the Uniqueness Database File (UDF). CMDLINES.TXT. $$RENAME.TXT. SYSDIFF.EXE.

3. Creating Answer Files.
The UNATTEND.TXT Explained. Case Study: Sikorsky Aircraft Financia Systems. Answer File Keys and Values. Unattended. MassStorageDrivers. DisplayDrivers. KeyboardDrivers. PointingDeviceDrivers. OEMBootFiles. OEM_Ads. UserData. GuiUnattended. Display. Modern. (modern config section). Network (Detect Adapters Section) netcard parameter section) (Protocols Section) (NetBeui Parameters) (IPX Parameters) (Tcpip Parameters) (DLC Parameters) (RASPPTP) (STREAMS) (Services Section) (NetWare Client Parameters) (Snmp Parameters) (RasParameters) (RAS Ports Section) Some Examples of Answer Files for Different Environments Options for Automating Deployments of NT Server AdvServerType= LicenseFilePrintData AutoMode= AutoUsers=(decimal number) InstallDc=(domain number) InstallInternetServer=(IIS Parameters) (IIS Parameters) InstallNETSTP= InstallADMIN= InstallFTP= FTPRoot=(ftp root directory) InstallGOPHER= GopherRoot=(gopher root directory InstallDir=(internet services install directory) InstallW3SAMP= InstallHTMLA= GuestAccountName=(name) GuestAccountPassword=(password string) Troubleshooting Answer Files.

4. Customizing the Installation of NT.
Uniqueness Database Files. Creating a .UDB File. Contents of a Sample .UDB File. Case Study: Fulbright & Jaworski, L.L.P. Installation Startup Parameters for Windows NT. Adding OEM Supplied Network Adapter Drivers. Replacing Device Drivers from the NT CD-ROMwith Those from the Manufacturer. Scripting a Network Adapter .INF to be "Unattended-Aware." Summary of the Process. Installing Specialized Video Adapters. More on Use of the TXTSETUP.OEM File and Writing Custom Installation Files. The Disks Section. The Defaults Section. The Component Section. The Files.component.IDSection. The KeyName Section. The Config.KeyName Section. More on Value Types and Corresponding Value Entries. Adding and Removing NT's Accessories. Removing Unnecessary Applications. The Briefcase. The Welcome Screen. Disabling the Installation of MS Exchange and Explorer. Troubleshooting UDBs, Startup Parameters, Specialized Adapter. Errors, and Custom Scripts.

II. ADVANCED CONFIGURATION OF AN UNATTENDED INSTALLATION.


5. Installing Additional Applications.
The CMDLINES.TXT File and How It Works. Case Study: University of Canterbury Library, New Zealand. Adding Applications to the Installation. .REG Files. MSOFFICE.BAT. IntranetWare Client 32. Using SYSDIFF. Direct Application of .IMG Files. Expanding .IMG Files with /INF. SYSDIFF Error Codes. Using REGEDIT.EXE. BROWSER.REG. NOSERVER.REG. Testing.REG Files. Service Pack Updates. Applying Hotfixes. Installing and Configuring Printers.

6. Securing Desktop Environments.
Windows NT Security Options. Case Study: Pinkerton Security Agency. NT's Default Security Settings. Problems with the Everyone Group. NT's Vulnerability to Intrusion. NTFS Permissions and the Group Everyone. NT's Default NTFS Permissions. Modifying File System Security During an Unattended Installation. Setting File System Security During Deployment Using a .BAT File. CACLS.EXE. Creating a CALCS.BAT File Using ZAK. User and Group Rights. Modifying Default User and Group Permissions. NTRIGHTS.EXE. Securing the System Registry. Protecting the Registry from External Tampering. Modifying Registry Permissions During an Unattended Installation. Service Pack 3 Installations.

7. System Policies ad User Profiles.
The Role of System Policies. The System Policy Editor, POLEDIT.EXE. System Policy Templates. Distributing System Policies. Creating a Custom Policy File. Using System Policies for Security. Case Study: University of Victoria's Department of Computer Science. Modifying NT's Default User Profile. Creating Custom User Profiles for Use during Unattended Installation.

8. Maintaining the Environment.
Maintenance Options for Windows NT. Case Study: Instructional Design Lab, University of Virginia School of Law. Maintenance and Update Logistics. The AT Command. The SHUTDOWN Command. Using the Network Install Tab. Controlling User Environments. Securing a Workstation with System Policies. Securing a Workstation via the Control Panel. More on Defining User Settings. Restoring NT Workstation. Diagnosing a Stop Event. Modifying the BOOT.INI File. Alternative Diagnosis Options.

III. APPENDICES.


A. Native NT Tools.
CACLS.EXE. Recognizing CACLS Output. SYSDIFF.EXE. REGEDIT.EXE and REGEDT32.EXE. AT.EXE. NET.EXE. NET COMPUTER (Option). NET CONFIG SERVER (Option). NET CONFIG WORKSTATION (Option). NET CONTINUE (Servicename). NET FILE (Option). NET GROUP (Option). NET HELP (Option). NET HELPMSG (Error Number). NET LOCALGROUP (Option). NET NAME (Option). NET PAUSE (Service). NET PRINT (Option). NET SEND (Option) Message. NET SESSION (Option). NET SHARE (Option). NET START (Service). NET STATISTICS (Workstation or Server). NET STOP (Service). NET TIME (Option). NET USE (Option). NET USER (Options). NET VIEW (Option). POLEDIT.EXE.

B. Useful Registry Edits.
Chapter 5, "Installing Additional Applications." Chapter 6, "Securing Desktop Environments." Chapter 7, " System Policies and User Profiles". Chapter 8," Maintaining the Environment".

C. Windows NT Services and Protocols.
Windows NT Workstation's Default Services. Windows NT Protocols. AppleTalk. Data Link Control (DLC). NetBIOS Extended User Interface (NetBEUI). NWLink IPX/SPX Compatible Transport. NWLink NetBIOS. Point to Point Tunneling Protocol (PPTP). STREAMS Protocol. Transmission Control Protocol/Internet Protocol (TCP/IP). D Cloning NT. The Security ID (SID). Cloning NT After Test Mode. GHOST. Tips for Using Cloned Disk Images.

Glossary of Terms.
Index.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews