LENOVO products, data, computer software, and services have been developed exclusively at private expense and
are sold to governmental entities as commercial items as defined by 48 C.F.R. 2.101 with limited and restricted
rights to use, reproduction and disclosure.
LIMITED AND RESTRICTED RIGHTS NOTICE: If products, data, computer software, or services are delivered
pursuant a General Services Administration ″GSA″ contract, use, reproduction, or disclosure is subject to restrictions
set forth in Contract No. GS-35F-05925.
Contents
Preface . . . . . . . . . . . . . . .v
Chapter 1. Overview . . . . . . . . .1
Predesktop Area . . . . . . . . . . . . .1
Windows environment . . . . . . . . . . .2
Rejuvenating and migrating . . . . . . . . .2
Hints and Tips . . . . . . . . . . . . . .3
Antidote Delivery Manager . . . . . . . . .3
Chapter 2. Installation . . . . . . . . .5
Installation considerations . . . . . . . . . .5
Overinstall considerations . . . . . . . . .5
Installing Rescue and Recovery . . . . . . . .6
Installation requirements . . . . . . . . .6
Installation components . . . . . . . . . .8
Installation log files . . . . . . . . . . .9
Installing Rescue and Recovery 4.2 with existing
versions . . . . . . . . . . . . . . .9
Rescue and Recovery installation . . . . . .10
Compatibility with Vista Bitlocker . . . . . .14
Chapter 3. Configurations . . . . . .17
XML and ADM file configurations . . . . . . .17
Recovery methods . . . . . . . . . . . .17
Single file restore . . . . . . . . . . .17
File rescue . . . . . . . . . . . . . .17
Operating system and applications . . . . .18
Rejuvenation . . . . . . . . . . . . .18
Full restore . . . . . . . . . . . . .19
Custom recovery . . . . . . . . . . .19
Express Repair . . . . . . . . . . . .22
Factory content/Image Ultra Builder . . . . .23
Backups . . . . . . . . . . . . . . .23
Scheduling backups and associated tasks . . .23
Mapping a network drive for backups . . . .23
Sysprep Backup/Restore . . . . . . . . .27
Password persistence . . . . . . . . . .27
Battery power settings for backups . . . . .27
Completing a backup . . . . . . . . . .28
Microsoft Message Queuing (MSMQ) . . . . .28
Rescue and Recovery in the Windows environment 28
Using Rescue and Recovery in the Windows
environment . . . . . . . . . . . . .28
Working with the Predesktop Area . . . . . .31
Vista considerations . . . . . . . . . .32
Using RRUTIL.EXE . . . . . . . . . . .32
Customizing the preboot environment . . . .38
Configuring the Opera browser . . . . . . .43
Changing the video resolution . . . . . . .49
Startup applications . . . . . . . . . .49
Passwords . . . . . . . . . . . . . .50
Password access . . . . . . . . . . . .51
Log files . . . . . . . . . . . . . . .51
Chapter 4. Rejuvenation and migration 53
Creating a command file . . . . . . . . . .53
File commands . . . . . . . . . . . . .54
File-migration commands . . . . . . . . . .57
Examples of file-migration commands . . . . .61
Selecting files during the capture phase . . . .61
Simple system test – display notification . . . . 132
Deployment . . . . . . . . . . . . . . 132
Examples . . . . . . . . . . . . . . 135
Example scripts . . . . . . . . . . . . 137
Virtualization Module for Antidote Delivery
Manager . . . . . . . . . . . . . . . 137
Requirements . . . . . . . . . . . . 137
Installation . . . . . . . . . . . . . 138
Overview . . . . . . . . . . . . . . 138
Appendix C. User tasks . . . . . . . 141
Windows Vista . . . . . . . . . . . . . 141
Windows XP . . . . . . . . . . . . . 142
Windows 2000 . . . . . . . . . . . . . 142
Create rescue media . . . . . . . . . . . 143
Rescue and Recovery user interface switching . . 143
Appendix D. Notices . . . . . . . . 145
Trademarks . . . . . . . . . . . . . . 146
iv RescueandRecovery4.2DeploymentGuide
Preface
This guide is intended for IT administrators, or those responsible for deploying the
Rescue and Recovery™ program to computers throughout their organizations. The
goal of Rescue and Recovery is to reduce costs by avoiding helpdesk calls,
desk-side visits, and improve user productivity. Rescue and Recovery is an
essential tool that enables users and administrators to restore backups, access files,
diagnose problems, and make Ethernet connections if the Microsoft® Windows
®
operating system will not open or run correctly. It also enables deployment of
critical updates to systems that are corrupted or off the network, as well as
automatically apply patches to a system when a restore is performed. This guide
provides the information required for installing the Rescue and Recovery
application on one or more computers, provided that licenses for the software are
available for each target computer. It also provides information on the many
aspects of the tool that can be customized to support IT or corporate policies.
This deployment guide is developed for IT professionals and the unique challenges
that they encounter. If you have suggestions or comments, communicate with your
Lenovo authorized representative. Periodically, these guides are updated, so check
the Lenovo We b site for future publications.
Information presented in this guide supports ThinkVantage™ programs and does
not support Lenovo™ 3000 technology. For information regarding Lenovo 3000
technology, refer to the Lenovo Web site located at:
www.lenovo.com
Rescue and Recovery provides function and application help. For questions and
information about using the various components included in the Rescue and
Recovery workspace, refer to the online help system for the components located at:
Rescue and Recovery represents a unique combination of ThinkVantage
Technologies. This integrated application provides a suite of powerful tools that
can be used even if the Microsoft Windows operating system will not start.
Rescue and Recovery has the following features:
v The RescueandRecoveryPredesktopAreathatstartseveniftheWindows
operating system will not boot.
v The RescueandRecoveryWindowsenvironmentthatallowsforbackingup
files, file rescue, and recovery of the operating system and files.
v Antidote DeliveryManager
Rescue
with a few basic operations, or stay with the advanced user interface with
extended options. For more information on interface switching, see “Rescue and
Recovery interface switching” on page 30.
Note: Some featuresofRescueandRecoveryrunundertheWindowsoperating
system. In some instances, system information used in the Rescue and Recovery
environment are gathered while Windows is running. If the Windows operating
system malfunctions, that malfunction alone will not prevent the Rescue and
Recovery environment from operating normally. Windows functions are not
configured in the Rescue and Recovery environment.
Predesktop Area
The Rescue and Recovery Predesktop Area provides an emergency workspace for
users who are unable to start Windows on their computers. Running under
Windows PE (Preinstallation Environment), the environment offers the Windows
look, feel, and function and helps users solve problems without consuming IT staff
time.
The Rescue and Recovery Predesktop Area has four major categories of functions:
– Diagnostic overview: Links to Rescue and Recovery diagnostics help topics.
– Diagnose hardware: Opens the PC Doctor application that can perform
hardware tests and report results.
– Create diagnostic disks:Enables you to create a set of diagnostic diskettes.
– Boot from another device: Enables you to boot from the Rescue and Recovery
CD, a set of back up CD’s, an internal drive or a detachable storage device
such as a USB hard disk drive.
– System information: Provides details about the computer and its hardware
components.
– Event log: Provides details of recent user activities and listings of computer
hardware to aid in problem determination and resolution. The log viewer
provides a readable way to view activity and asset log entries.
– Warranty status
come with preinstalled software. It is also available for purchase as a CD file so
that organizations can benefit from Rescue and Recovery on non-Lenovo branded
computers. Yo u can then purchase separate licenses for individual computers
Note: The lastWindowsadministratorIDistheonlyIDthatcanautomatically
carry over from Windows to the Predesktop Area. Windows limited and power
users will need to retype their user ID and passwords to logon to the Predesktop
Area.
Windows environment
The Rescue and Recovery Windows environment enables users to rescue lost data,
applications, and operating systems with the touch of a button. This capability
reduces time-consuming help desk calls, which result in support cost savings.
You can schedule backups of all users’ computers, thereby limiting risk and
downtime. Rescue and Recovery offers your clients an extra layer of support by
pre-configuring automatic external backup to a server or external storage. Backups
are encrypted by default with the 256 AES key.
Rejuvenating and migrating
With Rescue and Recovery, you can migrate a user’s work environment from one
system to another upon rejuvenating from a backup. A user’s work environment
includes the following items:
v Operating-system preferences,suchasdesktopandnetworkconnectivity
settings.
v Files and folders
v Customized application settings, such as bookmarks in a We b browser or editing
ForhintsandtipsonusingRescueandRecovery4.2,pleaseseethe Rescue and
Recovery v4.2 Considerations document located at:
www.lenovo.com/support
Antidote Delivery Manager
Antidote Delivery Manager is an antivirus, anti-worm infrastructure included in
Rescue and Recovery. The objects are easy to implement, and allow an
administrator to initiate network blocking and recovery within minutes of a
reported problem. Antidote Delivery Manager can be launched by one
administrator and it functions on systems that are both network and non-network
attached. Antidote Delivery Manager compliments existing antivirus tools rather
than replacing them, so maintaining virus scanning tools and obtaining patches are
still required. Antidote Delivery Manager provides the infrastructure to halt
destruction and apply the patches.
Chapter 1. Overview 3
4 RescueandRecovery4.2DeploymentGuide
Chapter 2. Installation
Prior to installing Rescue and Recovery, you can customize the Rescue and
Recovery XML file for your enterprise and then deploy it to client systems. The
XML file packaged with Rescue and Recovery is named rnrdeploy.xml. Once the
XML file is customized and installed, settings for Rescue and Recovery are
managed with the registry or Active Directory. For more information, see the
accompanying XML/ADM Supplement for the deployment guide located on the
ThinkVantage Technologies Administrator Tools page:
Rescue and Recovery has two main interfaces. The primary interface operates in
the Windows XP, Windows 2000 or Windows Vista™ environment. The secondary
interface (the Rescue and Recovery Predesktop Area) operates independently of
either Windows XP or Windows 2000 operating system, in the Windows PE
environment.
Rescue and Recovery installed with the Windows PE area already installed as a
virtual partition, then Storage Management Subsystem will not install. Both
Windows PE and Storage Management Subsystem use the C:\minint directory
for its file system. The way to have both installed at the same time is to install
Rescue and Recovery 4.2 as a type 12 partition. See “Scenario 6 - Installing with
WIM files and Windows Vista” on page 85 for instructions.
installed on a system with Rescue and Recovery. Microsoft Recovery Console
looks for all folders with the path C:\*\system32\config\ and if it finds that
path it assumes it is an operating system. If the registry entries that require a
Windows password are not present, then recovery console will allow a user to
choose the operating system and then gain access to the entire hard drive
without needing to enter a password.
free space on your local drive. This space is needed for Rescue and Recovery to
create a shadow copy of the partition so it can back up locked files.
Overinstall considerations
A new backup must be taken after installation of Rescue and Recovery 4.2 because
old backups from previous versions will be deleted during installation. This
backup can be done by using either a script or the user interface.
The Rescue and Recovery installation package was developed with InstallShield
10.5 Premier as a Basic MSI project. InstallShield Premier 10.5 uses the Windows
Installer to install applications, which gives administrators many capabilities to
customize installations, such as setting property values from the command line.
This chapter describes ways to use and execute the Rescue and Recovery setup
package. For a better understanding, read the entire chapter before you begin to
install this package.
The Readme file contains up-to-the-minute information on software versions,
supported systems, system requirements, and other considerations to help you
with the installation process.
Installation requirements
This section addresses system requirements for installing the Rescue and Recovery
package on Think branded systems. A number of legacy computers from IBM® can
support Rescue and Recovery provided that they meet the requirements specified.
For best results, make sure that you have the latest version of the software
installed. To obtain the latest version of Rescue and Recoveryand information
about IBM-branded computers that support Rescue and Recovery, see the
following Lenovo We b site:
http://www.lenovo.com/thinkvantage
Requirements for IBM and Lenovo computers
IBM-branded and Lenovo-branded computers must meet or exceed the following
requirements to install Rescue and Recovery:
vOperating system:WindowsVista,MicrosoftWindowsXPwithServicePack1
Vista
– In shared memory configurations, the BIOS setting for maximum shared
memory must be set to no less than 8 MB.
– In non-shared memory configurations, 120 MB of non-shared memory.
Note: If acomputerhaslessthan200MBofnon-sharedmemory,Rescueand
Recovery will run; however, the user will be unable to start more than one
application in the Rescue and Recovery environment.
v Internet Explorer 5.5 or greater must be installed.
v 2.4 GB of free space on your hard drive.
v VGA-compatible video that supports a resolution of 800 x 600 and 24-bit color.
v Supported Ethernet card.
v User must have administrative privileges.
Requirements for installing non-IBM or non-Lenovo computers
Installation on non-IBM or non-Lenovo computers have the following
requirements:
Minimum system memory requirements: 256 MB system RAM to install Rescue
and Recovery.
Harddiskdriveconfiguration: The RescueandRecoveryprogramisnot
supported on the factory pre-loads for original equipment manufacturer (OEM)
computers (non-IBM or non-Lenovo).
Note: For theRescueandRecoveryprogram,theOEMcomputersharddiskdrive
must be configured according to recommendations in “Scenario 3 - Installing on a
laptop” on page 80.
Supportforbootingfromexternalmedia(CD/DVDandUSB): Non-IBM or
non-Lenovo computer and devices (USB hard disk drive, CD-R/RW,
DVD-R/RW/RAM, or DVD+R/RW) must fully support one or more of the
following specifications:
v ATAPI Removable Media Device BIOS Specification
v BIOS Enhanced Disk Drive Services - 2
v Compaq Phoenix Intel® BIOS Boot Specification
v El Torito Bootable CD-ROM Format Specification
v USB Mass Storage Class Specification Overview (Each device must comply with
the command block specification in the section 2.0 Subclass code in the ″USB
environments (such as antivirus software) might not be compatible with the Rescue
and Recovery software. For information regarding compatibility issues, refer to the
Readme file and various utilities that accompany the Rescue and Recovery
software. For additional information see the Lenovo We b site at:
http://www.lenovo.com/thinkvantage
NetworkadaptersforRescueandRecovery: The RescueandRecovery
environment supports only wired PCI-based, Ethernet network adapters. Network
device drivers included in the Rescue and Recovery environment are the same
drivers that are pre-populated in Microsoft Windows XP Professional operating
system and are independent of the Windows operating system. For supported
IBM-branded and Lenovo computers, required drivers are included with Rescue
and Recovery software.
If an OEM network device in your computer is not supported, refer to the device
manufacturer documentation for instructions to add support for system-specific
network drivers. Request drivers from your OEM.
Chapter 2. Installation 7
Installation components
This section contains installation components of Rescue and Recovery.
Administrative installation procedure
The Windows Installer can perform an administrative installation of an application
or product to a network for use by a workgroup or for customization. For the
Rescue and Recovery installation package, an administrative installation unpacks
the installation source files to a specified location.
You can obtain the setup package from:
www.lenovo.com/support
To run an administrative installation execute the setup package from the command
line using the /a parameter:
setup.exe /a
An administrative installation presents a wizard that prompts the administrative
user to specify the locations for unpacking the setup files. The default extract
location is C:\. You can choose a new location which may include drives other
than C:\. For example, other local drives or mapped network drives. Yo u can also
create new directories during this step.
To run an administrative installation silently, you can set the public property
TARGETDIR on the command line to specify the extract location:
setup.exe /s /v"/qn TARGETDIR=F:\TVTRR"
Note: If yourversionofWindowsInstallerisnotcurrent,setup.exeisconfigured
to update the Windows Installer engine to version 3.0. This update will cause the
installation action to prompt for a reboot even with an administrative extract
installation. Use the reboot properly to prevent a reboot in this situation. If the
Windows Installer is at least version 3.0, setup.exe will not attempt to install.
or
msiexec.exe /i "Lenovo Rescue and Recovery.msi" /qn TARGERDIR=F:\TVTRR
Once and administrative installation has been completed, the administrative user
can make customizations to the source files, such as adding settings to the registry.
To install from the unpacked source after customizations are made, the user calls
msiexec.exe from the command line, passing the name of the unpacked MSI file.
Usingmsiexec.exe: To install fromtheunpackedsourceaftermaking
customizations, the user calls msiexec.exe from the command line, passing the
name of the unpacked *.MSI file. msiexec.exe is the executable program of the
Installer used to interpret installation packages and install products on target
systems.
Note: Enter theprecedingcommandasasinglelinewithnospacesfollowingthe
slashes.
For information on command line parameters and public properties, go to the
Microsoft We b site at:
www.microsoft.com
8 RescueandRecovery4.2DeploymentGuide
Installation log files
The log file rrinstall40.txt is created in the %temp% directory if the setup is
launched by setup.exe (double click the main install.exe, run the main executable
without parameters, or extract msi and execute setup.exe). This file contains log
messages that can be used to debug installation problems. This log file is not
created when running the setup directly from the MSI package; this includes any
actions performed from Add/Remove Programs. To create a log file for all MSI
actions, you can enable the logging policy in the registry. To do this, create the
value:
The table below shows installation examples using Rescue and Recovery.msi:
Table 2.
Description Example
Installation msiexec /i “C:\TVTRR\Rescue and
Recovery.msi”
Silent installation with no reboot msiexec /i “C:\TVTRR\Rescue and
Recovery.msi” /qn REBOOT=”R”
Silent uninstallation msiexec /x “C:\TVTRR\Rescue and
Recovery.msi” /qn
Installation without installing the Predesktop
Area
msiexec /i “C:\TVTRR\Rescue and
Recovery.msi” PDA=0
Installing Rescue and Recovery 4.2 with existing versions
If you are installing Rescue and Recovery 4.2 on a machine with Rescue and
Recovery 3.1 installed, you can use the over-install feature. If you are installing
Rescue and Recovery 4.2 over versions 1, 2 or 3.0, uninstall the previous version
through Windows Add/Remove programs and then install Rescue and Recovery
4.2. See “Overinstall considerations” on page 5 for more information.
Chapter 2. Installation 9
Rescue and Recovery installation
The following instructions are for the files that can be downloaded separately from
the Large Enterprise individual language files download page.
where
extracts the installation source files and launches the installation using the
Windows Installer. It contains the installation logic and the Windows
application files. The package does not contain any of the Predesktop Area files.
Note: Windows VistausesadifferentpackagethanWindowsXPand2000.
where
the build id. This file is required to install the Predesktop Area on all language
systems. This file must be in the same directory as the main installation
package (either installation executable or Rescue and Recovery.msi if extracted
or OEM install). The exceptions to this are if the Predesktop Area is already
installed and does not need to be upgraded or if the property PDA=0 is set on
the command line when executing the installation and the Predesktop Area
(any version) does not already exist. The installation executable contains a file
pdaversion.txt that contains the minimum version of the Predesktop Area that
can work with that version of Windows. The installation executable installer
will look for a Predesktop Area file using the following logic:
v Old PredesktopArea(RescueandRecovery1.0or2.X)existsorno
Predesktop Area exists:
The installer will look for a .tvt file with a compatibility code (for example:
AA, AB) that is equal to the minimum version compatibility code and a level
that is greater than or equal to the minimum version (all other version fields
in the .tvt filename must match the minimum version exactly). If a file is not
found meeting these criteria, the installation is halted.
v New (Rescue and Recovery 3.0 or greater) Predesktop Area exists:
The installer will compare the current Predesktop Area’s compatibility code
against the minimum version compatibility code and take the following
actions based on the results:
– Current code > Minimum code:
The installer presents a message that the current environment is not
compatible with this version of Rescue and Recovery.
– Current code = Minimum code:
The installer compares the current version level against the minimum
version level. If the current level is greater than or equal to the minimum
level, the installer looks for a .tvt file with a compatibility code (for
example: AA, AB) that is equal to the minimum version compatibility
code and a level that is greater than the current version level (all other
version fields in the .tvt filename must match the minimum version
exactly). If it does not find a file, the install process continues without
updating the Predesktop Area. If the current level is less than the
10 RescueandRecovery4.2DeploymentGuide
minimum level, the installer will look for a .tvt file with a compatibility
code (AA or AB). that is equal to the minimum version compatibility code
and a level that is greater than or equal to the minimum version level (all
other version fields in the .tvt filename must match the minimum version
exactly). If a file is not found meeting these criteria, the installation is
halted.
– Current code < Minimum code:
The installer will look for a .tvt file with a compatibility code (for
example: AA, AB) that is equal to the minimum version compatibility
code and a level that is greater than or equal to the minimum version (all
other version fields in the .tvt filename must match the minimum version
exactly). If a file is not found meeting these criteria, the installation is
halted.
16 language packs for Windows PE that are supported in Rescue and
Recovery 4.2. Each language pack is named in the format
Z501ZABXXXXCC00.tvt where XXXX is the build ID and CC represents the
language. One of these files is required if the Predesktop Area is being
installed on a non-English system or a system with a non-supported
language and must be in the same directory as the main installation and the
US Predesktop Area .tvt file. If the Predesktop Area is being installed or
updated and a language pack is required, the installation looks for the
minimum level of language pack required in a version file contained within
the installation executable. The installation also looks for a language pack .tvt
file that is greater than any current language pack that is already installed
and greater or equal than the minimum version required.
Following is a list of languages supported in Rescue and Recovery 4.2:
– Brazilian Portuguese
– Danish
– Dutch
– English
– Finnish
– French
– German
– Italian
– Japanese
– Korean
– Norwegian
– Portuguese
– Russian
– Spanish
– Swedish
– Simplified Chinese
– Traditional Chinese
Chapter 2. Installation 11
Rescue and Recovery custom public properties
The installation package for the Rescue and Recovery program contains a set of
custom public properties that can be set on the command line when running the
installation. The available custom public properties are:
Table 3.
Property Description
PDA Specifies whether to install the Predesktop
Area. Default value is 1. 1 = install
Predesktop Area. 0 = do not install
Predesktop Area. NOTE: This setting is not
used if any version of the Predesktop Area
already exists.
CIMPROVIDER Specifies whether to install the Common
Information Model (CIM) Provider
component. Default is to not install the
component. Specify CIMPROIVIDER=1 on
the command line to install the component.
EMULATIONMODE Specifies to force the installation in
Emulation mode even if a Trusted Platform
Module (TPM) exists. Set
EMULATIONMODE=1 on the command line
to install in Emulation mode.
HALTIFTPMDISABLED If the TPM is in a disabled state and the
installation is running in silent mode, the
default is for the installation to proceed in
emulation mode. Use the
HALTIFTPMDISABLED=1 property when
running the installation in silent mode to
halt the installation if the TPM is disabled.
ENABLETPM Set ENABLETPM=0 on the command line to
prevent the installation from enabling the
TPM
NOCSSWIZARD Set NOCSSWIZARD=1 on the command line
to prevent the Client Security Solution
Wizard from being displayed when an
administrator logs on and has not been
enrolled. This property is for someone who
wants to install Client Security Solution, but
use scripting later when configuring the
system.
CSS_CONFIG_SCRIPT Set CSS_CONFIG_SCRIPT=”filename” or
“filename password” to have a configuration
file run after the user completes the
installaiton and reboots.
SUPERVISORPW Set SUPERVISORPW=”password” on the
command line to supply the supervisor
password to enable the chip in silent or
non-silent installation mode. If the chip is
disabled and the installation is running in
silent mode, the correct supervisor password
must be supplied to enable the chip,
otherwise the chip is not enabled.
12 RescueandRecovery4.2DeploymentGuide
Including Rescue and Recovery in a disk image
You can use your tool of choice to create a disk image that includes Rescue and
Recovery. This deployment guide provides basic information regarding
PowerQuest and Ghost as it applies to this application and installation.
Note: If youplantocreateanimage,youmustcapturetheMasterBootRecord.
The Master Boot Record is critical for the Rescue and Recovery environment to
function correctly.
Using PowerQuest Drive Image based tools with Rescue and
Recovery
If the PowerQuest DeployCenter tool PQIMGCTR is installed in the following
location (X:\PQ), you can create and deploy an image with Rescue and Recovery
with the following scripts:
Minimum script files:
Table 4. X:\PQ\RRUSAVE.TXT
Script language Result
SELECT DRIVE 1 Selects the first hard disk drive.
SELECT PARTITION ALL
Selects all partitions.
(Needed if you have a type 12 partition or if
you have multiple partitions in your image.)
/CMD=X:\PQ\RRDEPLY.TXT Creates the PowerQuest script file.
/MBR=1 Restores the Rescue and Recovery Boot
Manager.
/IMG=X:\IMAGE.PQICreates theimagefile.
Using WIM files, ImageX and Windows Vista
Windows Vista deployment is based on disk imaging with ImageX. ImageX utilizes
file based imaging with WIM files instead of sector-based image formats.
Considering this formatting development, use the scenario in “Scenario 6 Installing with WIM files and Windows Vista” on page 85 when installing and
deploying Rescue and Recovery on Windows Vista.
Using Symantec Ghost-based tools with Rescue and Recovery
When you create the Ghost image, you must use the command line switch -ib to
capture the Rescue and Recovery Boot Manager. Also, the image must capture the
whole disk and all partitions. Refer to the documentation provided by Symantec
for specific details on Ghost.
Rescue and Recovery environmental variables
The following table contains environmental variables which are created when
Rescue and Recovery is installed. These variables can be used when creating
scripts or when changing to a desired directory from a command prompt. For
example, to change to the Rescue and Recovery folder from a command prompt,
type “CD %rr%” and press enter.
Table 8.
Environmental variable Directory
%rr% c:\Program Files\Lenovo\Rescue and Recovery
%SWSHARE% c:\Program Files\Lenovo
%TVTCOMMON% c:\Program Files\Common Files\Lenovo
Note: For acompletelistofvariables,runthe’set’commandonacomputerthat
has Rescue and Recovery installed.
Compatibility with Vista Bitlocker
To achieve compatibility with Bitlocker, Rescue and Recovery needs to be installed
after the partitions are properly set up. When setting up the Bitlocker partition the
recommended way to do so is to use the tool from Microsoft called the Bitlocker DriverPreparationTool. Thebootpartitionthatiscreatedshouldbeatleast2GBin
size.
To install Vista Bitlocker without using this tool, you must have two partitions on
your system when installing Vista. One should be 2GB and marked active; this is
where the boot files reside. The other will be where your OS is installed and where
your data will reside. When Vista is installed, it will detect this and should install
only the boot files to the smaller partition. Both partitions should be type 0x07.
14 RescueandRecovery4.2DeploymentGuide
When installing Rescue and Recovery on a system with Bitlocker and a service
partition is not available, the following two commands should be run to prevent
the Vista OS from asking for the Bitlocker key every time it boots. These
commands are:
OS partition for best results. If it is placed before the OS partition,, the partition
number will need to be updated in the Rescue and Recovery ADM settings.
will show up that there was an error at shutdown. this can be ignored and
everything should operate normally.
Chapter 2. Installation 15
16 RescueandRecovery4.2DeploymentGuide
Chapter 3. Configurations
This chapter provides information that you will need to configure Rescue and
Recovery for your enterprise. Within this chapter, you will find the following
topics:
v “XML and ADM file configurations”
v “Recovery methods”
v “Backups” on page 23
v “Rescue and Recovery in the Windows environment” on page 28
v “Working with the Predesktop Area” on page 31
v “Log files” on page 51
XML and ADM file configurations
Configurations for Rescue and Recovery are done with the XML file, through the
registry, and with Active Directory. Once the XML file is customized and installed,
settings for Rescue and Recovery are managed with the registry or Active
Directory. For more information, see the accompanying ThinkVantage Technologies XML/ADMSupplement for thedeploymentguidelocatedontheThinkVantage
Technologies Administrator Tools page:
Within this section, you will find information for restore types and recovery
methods such as rejuvenation, custom recovery, and express repair. The following
methods are used for restoring files:
v “Single file restore”
v “File rescue”
v “Operating system and applications” on page 18
v “Rejuvenation” on page 18
v “Full restore” on page 19
v “Custom recovery” on page 19
v “Express Repair” on page 22
v “Factory content/Image Ultra Builder” on page 23
Note:
after a restore.
Single file restore
Single file restore prompts the user for the Backup Storage location, and then the
user selects a backup. Rescue and Recovery will display files that the user is
authorized to access. The user then selects the files, folders, or both to be restored
and the system will restore them to their original locations.
File rescue used before restore, prompts the user for the backup storage location
and then the user selects a backup. Rescue and Recovery will display the files that
the current user is authorized to access. The user then selects the files, folders, or
both to be rescued. Excluding the local hard disk, the system will display available
file locations where the files can be rescued. The user will need to choose a
destination with sufficient space for the rescued files and the system restore files.
Operating system and applications
Operating system and Applications gives the user the option to select a backup
before the system deletes files. Files designated to be deleted are defined by the
rules in the registry. When a backup has been selected, the system will restore the
files defined by the registry from the selected backup. There are options in the
registry file that can specify a program to run before a restore or after a restore. See
the ThinkVantage Technologies XML/ADM Supplement for more information about
registry settings and values.
You
ThinkVantageTechnologiesXML/ADMSupplement for thebackupandrestore
settings.
Rejuvenation
When you need to rejuvenate your system, the Rescue and Recovery program will
optimize system performance by taking a new incremental backup and then
defragment your hard drive. The rejuvenation process helps eliminate viruses,
adware and spyware, while maintaining your current settings and data.
To rejuvenate your system, complete the following steps:
You
ThinkVantageTechnologiesXML/ADMSupplement for therejuvenationsettings.
Note: Some operatingsystemsettingsarestoredintheregistry.Considering
rejuvenation restores your registry from a backup and restores certain registry keys
captured from the current system settings, you may find some inconsistencies after
the rejuvenation process. For example, if you have a shared folder in a backup and
18 RescueandRecovery4.2DeploymentGuide
not at the time of the rejuvenation process, it will be shared again after completing
a rejuvenation from that backup. Also, if you have a shared folder at the time of
the rejuvenation process but it was not in the backup, the folder will still be shared
after rejuvenation finishes.
Full restore
Full restore deletes all files on the local drive, and then restores the files from the
selected backup. If password persistence is selected, the most recent password
available will be restored.
Custom recovery
As an extension of the Rescue and Recovery program, custom recovery technology
has been added to the recovery process. Users will interact with this custom
recovery method through the Rescue and Recovery and the Lenovo Base Software
Selector programs. By performing a custom recovery, users have the option of
including and excluding individual components such as applications, device
drivers or operating systems as part of the recovery process. Administrators will
define what options a user will have during a custom recovery process with the
ThinkVantage Base Software Administrator program.
The Base Software Administrator program is a versatile software utility that you
can use to accomplish custom recovery and preinstallation related tasks. With the
Base Software Administrator program, you can customize the recovery process for
users and you can create personalization files used to automate the preinstallation
setup for Windows.
Customizing the recovery process
In today’s electronic environment, computer systems are threatened by malicious
activity with the distribution of viruses, worms, and Trojan horses. Technology and
anti-virus software has improved in the fight against malicious activity; however,
there are times when the software on a computer will need to be renewed by
removing malicious files and starting over. Rescue and Recovery is a valuable tool
in the renewal process by providing methods to restore a computer in the event
the computer is sold, recycled, transferred to another area or needs to be put in an
operational state after all other methods of recovery has failed.
Various types of recovery methods can be used to renew computer systems. The
Base Software Administrator program utilizes the full factory recovery method and
the custom factory recovery method. The full factory recovery method restores the
factory contents of the hard drive that consists of components such as applications,
device drivers, and the operating system. Factory components are installed at the
factory prior to the purchase of a computer. Using the Base Software Administrator
program, you can control the recovery options that are available to the user during
the recovery process. The following list provides the recovery methods you can
designate a user to perform:
v Full factory recovery only
v Custom factory recovery only
v Either a full factory recovery or a custom factory recovery
Components
components are in a custom packaged format and are contained in the service
partition of the computer. From a recovery standpoint, components are categorized
as follows:
v Required componentsarealwaysinstalleduponrecovery.
The Base Software Administrator program can create custom manifest files.
Manifest files have the extension .cfi, and contain information about the
components within the service partition where it resides. Manifest files also control
the selections available to the user during a custom recovery. The information
contained in a manifest file includes component categorization such as required,
optional, and restricted. In addition, manifest files contain meta-data, such as
descriptions and comments.
Preinstallation setup
To accomplish preinstallation setup, you can use the Base Software Administrator
program to create personalization files. A personalization file has the file extension
of .per and contains information needed to automate the preinstallation setup for
Windows. The recovery process reads the personalization file, extracts the data
from the personalization file and places the data in the correct Windows control
files. Yo u can save time and effort by using the Base Software Administrator
program to customize personalization files and then deploying those
personalization files onto user computers. For example, you can create a
personalization file to set the Time Zone for Windows and then deploy that
personalization file to a users computer; therefore, a user will not have to manually
validate the Time Zone settings.
Personalizationfiles: Personalization filesarecustomizedbydefiningthesettings
with the Base Software Administrator program. The following tables provide a
description of each type of setting that can be defined.
The General settings table provides the settings used to define the user name,
organization and time zone for a computer:
Table 9. General settings
Windows control file
Setting
keyword Description
Name FullName= Sets the user name for the
computer.
Organization OrgName= Sets the organization the
computer belongs to, such as
a specific department or
location.
Time zone TimeZone= Sets the time zone for the
computer.
The Network settings table provides the settings used to assign the computer
name, administrator password and the workgroup or domain of the destination
computer:
Table 10. Network settings
Windows control file
Setting
keyword Description
Computer name ComputerName= Sets the name for the
computer.
20 RescueandRecovery4.2DeploymentGuide
Table 10. Network settings (continued)
Windows control file
Setting
keyword Description
Administrator password AdminPassword= Sets the administrator
password.
Encrypted administrator
password
EncryptedAdminPassword= Sets the encrypted
administrator password.
Workgroup JoinWorkgroup= Sets the workgroup for the
computer.
Domain JoinDomain= Sets the domain for the
computer.
Domain administrator DomainAdmin= Sets the domain
administrator for the
computer.
Domain administrator
password
DomainAdminPassword= Sets the domain
administrator password for
the computer.
Advanced settings are used to define one or more commands that can be run the
first time a user logs on to his or her system.
Commandlineinterface: The followingexecutablesupportsacommandline
interface for the Base Software Administrator program and is supported under
WinPE and the Windows environment:
TBSADMIN.EXE [/DEPLOY [/SILENT] [/BOOTSP=YES|NO]
[/MANIFEST="<path>"] [/PERSONALIZATION="<path>"]]
The following table provides the switches for the Base Software Administrator
program.
Table 11. Switches
Switch Description
/DEPLOY Required to trigger a deploy. If /BOOTSP,
/MAN or /PER is also specified, the deploy
wizard is not displayed.
/SILENT Suppresses any message boxes for error or
successful completion. (For return codes, the
following table.)
/BOOTSP Takes an explicit Y or N value to indicate
whether the service partition should be set
active. For example, /BOOTSP=Y. A value of
N allows the adminitrator to reset the C:
partition active again, so recovery doesn’t
automatically occur on next reboot.
The executable returns the following codes:
Table 12. Return codes
Return code Return message
0 Success
1 Unable to access service partition.
Chapter 3. Configurations 21
Table 12. Return codes (continued)
Return code Return message
2 Error copying manifest file into service
partition
3 Error copying personalization file into
service partition
4 Error deleting file from service partition
5 Error writing AUTO.TAG file in service
partition
6 Error setting service partition active
Express Repair
Also known as Fast Restore, Express Repair monitors and fixes operating system
files from an alternate boot environment if they have changed or been corrupted
outside of normal operating system by file corruption, or a virus. After Rescue and
Recovery is installed and after a Windows operating system update, Express
Repair stores the latest copy of each critical file including the checksum behind the
Rescue and Recovery filter driver in its own database. Monitored files are listed in
KernelFile.xml. The Express Repair database is located in the following path:
C:\RRBackups\FR
Express Repair supports the following operating systems:
such as Quick Restore, Rejuvenation, or Full Restore, Express Repair files and
checksums are deleted to avoid mismatching of operating system files. As a result,
Express Repair stores all critical files and associated checksums after the next boot
into the operating system. When a user boots to Windows PE, checksum compares
critical operating system files. If a difference is detected, the user is prompted
update files based on the latest version in the database, or boot to Windows. If a
difference is not found, or if database not found, Express Repair exits and continue
boot into Windows PE.
You can turn off Express Repair by setting the following policy in Group Policy:
ThinkVantage\Rescue and Recovery\Settings\Fast Restore
The default value is Enabled. If this value is Enabled or not set, then Express
Repair will run normally in the operating system and the Predesktop Area. If this
value is Disabled, then Express Repair will not run in the operating system or in
the Predesktop Area. For more information on Group Policy and ADM files, see
the accompanying XML/ADM Supplement for the deployment guide located on
the ThinkVantage Technologies Administrator Tools page: