The Definitive Guide to Windows Desktop Administration
The Definitive GuidetmTo
Windows Desktop Administration
Bob Kelly
Introduction
Introduction to Realtimepublishers
by Don Jones, Series Editor
For several years, now, Realtime has produced dozens and dozens of high-quality books that just happen to be delivered in electronic format--at no cost to you, the reader. We've made this unique publishing model work through the generous support and cooperation of our sponsors, who agree to bear each book's production expenses for the benefit of our readers. Although we've always offered our publications to you for free, don't think for a moment that quality is anything less than our top priority. My job is to make sure that our books are as good as--and in most cases better than--any printed book that would cost you $40 or more. Our electronic publishing model offers several advantages over printed books: You receive chapters literally as fast as our authors produce them (hence the "realtime" aspect of our model), and we can update chapters to reflect the latest changes in technology. I want to point out that our books are by no means paid advertisements or white papers. We're an independent publishing company, and an important aspect of my job is to make sure that our authors are free to voice their expertise and opinions without reservation or restriction. We maintain complete editorial control of our publications, and I'm proud that we've produced so many quality books over the past years. I want to extend an invitation to visit us at , especially if you've received this publication from a friend or colleague. We have a wide variety of additional books on a range of topics, and you're sure to find something that's of interest to you--and it won't cost you a thing. We hope you'll continue to come to Realtime for your educational needs far into the future. Until then, enjoy. Don Jones
i
Table of Contents
Introduction to Realtimepublishers.................................................................................................. i Chapter 1: Desktop Administration Overview ................................................................................1 The Benefits of Desktop Administration .........................................................................................1
Lower Cost of Ownership....................................................................................................1 Increased User Productivity.................................................................................................3 Rapid and Accurate System Recovery.................................................................................4 When to Automate ...........................................................................................................................5 Deployment Automation......................................................................................................5 Backup Automation .............................................................................................................6 Inventory Automation..........................................................................................................6
Windows Management Instrumentation ..................................................................6 The Scope of Desktop Administration.............................................................................................7
System Deployment .............................................................................................................7 User Profile and Data Management.....................................................................................8 Application Management.....................................................................................................9 Desktop Security................................................................................................................10 Desktop Support.................................................................................................................11 Scripting Custom Solutions ...............................................................................................11 Asset Management.............................................................................................................12 The Politics of Desktop Administration ........................................................................................13 Making Decisions that Affect Users ..................................................................................13 Delegation of Control ........................................................................................................14
NT Domains...........................................................................................................14 AD..........................................................................................................................15 Third-Party Solutions.............................................................................................15 Working with Users ...........................................................................................................16 Factors in Effective Desktop Administration ................................................................................17 Standardization ..................................................................................................................17 Geographic Dispersion.......................................................................................................18 Dedicated Staffing .............................................................................................................19 Budget ................................................................................................................................19 Connectivity .......................................................................................................................20 Process ...............................................................................................................................20
ii
Table of Contents
Security ..............................................................................................................................20 Desktop Administration in Action .....................................................................................21
Help Desk Calls .....................................................................................................21 Handling New Systems..........................................................................................21 Outsourcing Desktop Administration ............................................................................................22 The Benefits of Outsourcing..............................................................................................22 The Drawbacks of Outsourcing .........................................................................................23 Summary ........................................................................................................................................23 Chapter 2: OS Deployment............................................................................................................24 The Workstation Baseline..............................................................................................................24 Benefits ..............................................................................................................................24 Increased Reliability ..............................................................................................24 Increased Deployment Speed.................................................................................24 Ease of Troubleshooting ........................................................................................25 Drawbacks..........................................................................................................................25 Baseline Components.........................................................................................................25 What to Leave In....................................................................................................26 What to Leave Out .................................................................................................26 Common Pitfalls to Avoid .................................................................................................26 MSI Source Resiliency ..........................................................................................26 Non-Essential Data ................................................................................................27 Classified or Company Proprietary Information....................................................27 Globally Unique Identifiers ...................................................................................28 Profiles ...................................................................................................................28 Security Identification Numbers ............................................................................29 Initial Build Size ................................................................................................................31 Staging a Deployment....................................................................................................................33 Benefits ..............................................................................................................................33 Less Time Spent at the Users' Desks.....................................................................33 Controlled Network Environment..........................................................................34 Early Identification of Failed Systems...................................................................34 Drawbacks..........................................................................................................................35 Location-Specific Actions .....................................................................................35
iii
Table of Contents
Slow Delivery in a Changing Environment ...........................................................35 Deployment Methods.....................................................................................................................35
Manual Installation ............................................................................................................35 Unattended Installations.....................................................................................................37 Microsoft Solutions............................................................................................................38
Sysprep...................................................................................................................38 Unattend.txt............................................................................................................40 $OEM$...................................................................................................................41 Cmdlines.txt ...........................................................................................................41 Third-Party Solutions.........................................................................................................41 Drive Imaging ....................................................................................................................42 Available Solutions................................................................................................44 Which Is Right For You?.......................................................................................47 Drive Duplication...............................................................................................................47 Available Solutions................................................................................................48 OS Deployment Best Practices ......................................................................................................48 Workstation Naming Conventions.....................................................................................48 System Build Information..................................................................................................50 Image Identification ...........................................................................................................50 Summary ........................................................................................................................................50 Chapter 3: User Profile and Data Management .............................................................................51 User Profiles...................................................................................................................................52 Local Profiles .....................................................................................................................53 Roaming Profiles ...............................................................................................................54 Mandatory User Profiles ....................................................................................................60 Temporary User Profiles....................................................................................................60 Profile Security ..................................................................................................................60 Contents of a User Profile..................................................................................................60 User Profile Storage...........................................................................................................62 Profiles Templates .............................................................................................................62 Default Profiles ..................................................................................................................63 Manual Profile Modifications ............................................................................................64 Dictating Data Storage...................................................................................................................65
iv
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- system administrator guide windows national instruments
- privilege management for windows pmc administration guide 2 beyondtrust
- the definitive guide to windows desktop administration
- privilegemanagementforwindows 22 7 administrationguide beyondtrust
- dell emc openmanage integration version 2 0 with microsoft windows
- literature library rockwell automation
- privilegemanagementforwindows 22 5 administrationguide
- roamserver 6 0 0 windows admin guide ipass
- tableofcontents
- how to become a certified administrator california
Related searches
- windows desktop gadgets windows 7
- beginners guide to the stock market
- windows desktop gadgets windows 10
- the complete guide to act grammar rules
- windows desktop gadgets clock windows 10
- what happened to my desktop windows 10
- windows desktop organizer windows 10
- how to restore desktop in windows 10
- windows desktop gone windows 10
- how to bring desktop back windows 10
- how to get desktop on windows 10
- how to get to windows desktop screen