The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse
engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION,
INCLUDING WITHOUT LIMITATION ITS AFFILIATES AND SUBSIDIARIES, SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL
DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN
THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to
restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation," as applicable, and any successor regulations. Any use,
modification, reproduction release, performance, display, or disclosure of the Licensed Software and Documentation by the U.S. Government
shall be solely in accordance with the terms of this Agreement.
Altiris® Deployment Solution™ software provides a suite of tools to quickly install
operating systems and software. Deployment Solution leverages a number of Altiris
technologies to provide extensive management capabilities:
Altiris TechnologyDescription
RapiDeploy® ImagingCapture and deploy computer images using PXE,
DVDs, CDs, or USB drives.
Scripted OS Installation and
Sysprep Integration
PC Transplant® Personality
Migration
Software Virtualization and
Software Distribution
Wise Package Studio® and Wise
SetupCapture
Script deployment engineRemotely execute Visual basic and Linux shell
Perform automated scripted operating system
installations using sysprep.
Migrate user data and application settings to new
hardware and operating systems.
Deploy, activate, and manage SVS layers, and
install other software packages.
Build and capture custom installation packages
using the latest Windows Installer technology.
scripts.
In addition, the following technologies are integrated with the features of Altiris®
Deployment Server® software to provide comprehensive deployment and migration:
Deployment Server FeatureDescription
Task-sequencerManagement tasks provided by Deployment
Server can be grouped and executed in order,
enabling you to perform complex management
operations in a single job.
Computer groupsComputers can be organized into multiple groups
to simplify job deployment. Drag and drop a
computer group onto a job and the job runs on all
computers in the group.
Dynamic insertion of database
values (tokens)
Computer discoveryQuickly install the Deployment Agent on large
InventoryManaged computers are inventoried for software
Scripts, Sysprep configuration files, and other
values can use tokens to retrieve database values
at run time.
numbers of Windows computers using the
Remote Agent Installer.
and hardware, and conditions and filters can be
created based on this inventory. Example: a
distribute software task could check the operating
system and distribute the correct software
version.
Deployment Solution19
Deployment Server FeatureDescription
Extensive supported platformsSupport for 32- and 64-bit architecture, servers,
blades, thin clients, and Itanium, running
Windows and Linux operating systems.
Power control, Wake on LANManaged computers can be started or shutdown
remotely.
Deployment Solution Architecture
Before installation, you should become familiar with the different components of a
Deployment System and how these components interact. The following diagram
provides an overview of the Deployment System components:
About Altiris® Deployment Solution™
Depending on the needs of your environment, multiple Deployment System components
can be installed on the same computer. A single dedicated server could host your
Deployment Server, Deployment Share, Deployment Database, Management Consoles,
and PXE Server.
Deployment Solution20
About Altiris® Deployment Solution™
Deployment Server
The Deployment Server is the central component of a Deployment System and manages
the Deployment Database, the communication between the different components, and
schedules jobs to run on managed computers.
Deployment Database
The Deployment Database provides the back-end datastore and stores details about the
computers, groups, and jobs in your Deployment System. Most of the time, you do not
need to interact directly with the database.
Deployment Share
The Deployment Share stores all files, such as installation programs, disk images, and
SVS layers you want accessible to managed computers.
This share can reside on your Deployment Server or on another computer, and is often
replicated to different locations to provide better access, especially in distributed
networks or when sharing large files.
Management Consoles
Deployment Solution provides three management consoles:
zDeployment Console: A Windows application that provides complete access to the
Deployment System administration.
Deployment Solution21
About Altiris® Deployment Solution™
zDeployment Web Console: A Web application that provides browser-based
administration. This console can be executed remotely using any Web browser, and
has built-in tools to manage multiple Deployment Servers.
zDeployment Tab in the Altiris Console: This interface is integrated into the Altiris
Console to provide integrated management with other Altiris Solutions. Its features
are the same as the Deployment Web Console.
Automation Tools
Automation is the preboot environment loaded by Deployment Server to perform tasks
which need to happen outside of the normal operating system. If you have ever used a
disk imaging utility, or booted a computer using an installation CD, you are probably
familiar with running computers in a similar environment.
Deployment Solution provides several tools to boot computers to this environment and
supports several automation operating systems.
Deployment Agent
This agent runs on managed computers to report inventory, run software and scripts,
perform power control, and boot the computer into automation.
A Remote Agent Installer is provided to quickly install the agent on multiple Windows
computers. Linux computers can install the agent using startup scripts and other
automated processes.
Deployment Solution22
Part I
Planning and Installing Your
Deployment System
Deployment Solution is designed to meet deployment, management, and migration
needs for small, medium and large organizations with diverse topologies and varying
computer management requirements. This section provides steps for installing
Deployment Solution components, but also includes system architecture details and
discusses planning strategies to install and optimize your Deployment Solution system.
The installation process is divided into the following sections:
zPreparing To Install (page 24)
zInstalling (page 27)
zPost-Installation Configuration (page 29)
zDeployment Agent Installation (page 34)
Deployment Solution23
Chapter 2
Preparing To Install
This sections lists the tasks you need to complete before you install Deployment
Solution.
zStep 1: Log on to Your Deployment Server Computer as an Administrator (page 24)
zStep 2: Create a Services Account (page 25)
zStep 3: Gather Automation Operating System Install Files (page 26)
zStep 4: Obtain a License File (page 26)
zStep 5: Install .NET and MDAC (page 26)
zStep 6: Start Microsoft’s Internet Information Server (IIS) (page 26)
Step 1: Log on to Your Deployment Server Computer as an
Administrator
The account you use to install Deployment Solution must be a Windows Administrator
and must possess System Administrator rights on the SQL server that will host your
Deployment Database to install the Deployment Database. These database rights can be
granted temporarily and revoked after the installation completes.
If you want to use a different account to create the database, you must select a custom
install and provide SQL credentials instead of Windows NT authentication.
Important
In SQL Server 2005 TCP/IP is disabled by default. This must be enabled before you
install Deployment Solution.
To grant database rights
1. Open Enterprise Manager and connect to your SQL Server.
2. Browse to Security > Logins:
Deployment Solution24
Preparing To Install
3. Select the Administrator account you are using to install Deployment Solution. If it
does not exist, add it.
4. Click the Server Roles tab, and enable System Administrators:
5. Click OK and verify that the role was added.
MSDE Database Engine
Optionally, in smaller installations, you can use the MSDE database engine instead of
SQL Server. This is typically not recommended due to the lack of database management
tools. MSDE must be installed on the same computer as the Deployment Server
component.
If you decide to use MSDE, it can be installed by selecting the Simple Install Helper
option in the installation program. We recommend using the Simple Install Helper to
install MSDE as this version is usable by Deployment Solution immediately after
installation and requires no additional configuration on your part.
Step 2: Create a Services Account
Create an account to run the services and connect to the database. This account is used
only by Deployment Server, and is not tied to a user. For security reasons, we don’t
recommend using an existing administrator account which might possess rights beyond
those needed by Deployment Server. The account should not be part of a group and
should not posses interactive login privileges.
If your Deployment Database, Server, and Share are installed on the same computer,
create a local account on that computer.
If your Deployment Database or Share will be on a different computer than your
Deployment Server, create a domain-level account, or create local accounts with the
same credentials on each computer hosting a Deployment Solution component.
Example:
If your SQL Server is on another computer and you are not using a domain-level
account, create a local account with the same credentials on your SQL Server computer.
The same situation applies if your Deployment Share is hosted on another computer.
Deployment Solution25
Preparing To Install
To create a services account
1. On each computer where you host a Deployment System component, click Start >
Administrative Tools > Computer Management.
2. Browse to Local Users and Groups, and add a new user:
The process for creating domain-level accounts is similar. This is the only account that
needs to be created before you install.
Step 3: Gather Automation Operating System Install Files
If you are ready to install an automation operating system, this can be done during the
installation. If you are new to Deployment Solution and are not familiar with
automation, we recommend skipping this step and installing automation operating
systems later.
Place your automation install files (BDC*.frm) in the same folder as the Deployment
Solution installation program (by default, this is c:\DSSetup). During install, these files
are detected automatically.
Step 4: Obtain a License File
For evaluation, you can use the integrated 7-day license, or you can use the 30-day 10node trial license that is sent automatically when the software is downloaded. If you
have purchased a license, you need to have the .lic license file available during
installation.
Step 5: Install .NET and MDAC
Your Deployment Server computer requires .NET 1.1 and MDAC 2.7 SP1 or later. This
software is available on the Microsoft download site.
Step 6: Start Microsoft’s Internet Information Server (IIS)
If IIS is running during the Deployment Solution installation, the Deployment Web
Console is installed automatically.
Deployment Solution26
Chapter 3
Installing
Simple or Custom Install?
If you plan to install your Deployment Server, Database, and Share on the C drive of the
same computer, select the Simple install. Otherwise, select Custom.
Simple Install
zInstalls to the C drive.
zInstalls each of the Deployment System components (with the exception of the
Deployment Agent) on the computer where the install was launched.
zLets you install a single automation operating system (more can be added later).
zThe Simple Install Helper installs the MSDE database engine if no database is
detected.
Custom Install
zInstalls to a drive other than C.
zLets you select a computer other than the computer the install was launched from to
install each Deployment System component. If you select to do this, certain values
regarding the installation are stored in the local Windows registry. This simplifies
adding components or installing add-ons such as the Altiris packaged WinPE.
zLets you select a custom name and instance for the Deployment Database.
zLets you select a different computer to host the Deployment Share. If you plan on
doing this, you must create the share and grant the account you created in Step 2:
Create a Services Account (page 25) full control before installation.
zLets you install multiple automation operating systems (more can be added later).
Running the Setup Program
After you have completed the steps outlined in the previous section, launch setup.exe.
Use the administrator account you configured in the previous section to perform the
installation, and provide the services account you created when prompted. If you need
clarification during any of the installation steps, click Help.
After Deployment Solution is installed, you have the option of enabling Sysprep support
and remotely installing the Deployment Agent.
Enable Microsoft Sysprep Support
If you plan on using Sysprep to deploy standard images and scripted operating system
installs, provide the location of the deploy.cab file for the operating systems for which
you want to enable Sysprep. These are located on your Windows installation CDs.
Deployment Solution27
This can be installed later by running setup.exe and selecting Component Install.
Enable Microsoft Windows Vista Sysprep Support
Microsoft Windows Vista Sysprep lets Sysprep run on a Vista Client after an Imaging
event.
Vista Sysprep lets Administrators prepare generic images for deploying images to
different types of systems within an environment to eliminate the support for multiple
images. After building the basic image, the Administrator can run Microsoft Sysprep on a
computer to delete unnecessary information and prepare the system for imaging and
distribution to other systems.
Remotely Install Deployment Agent
After the installation completes, you have the option of remotely installing the
Deployment Agent.
Unless you are familiar with Deployment Solution and the Remote Agent Installer, we
recommend you do not install the agent at this time. A full discussion of Deployment
Agent rollout is contained in Deployment Agent Installation (page 34).
Installing
Deployment Solution28
Chapter 4
Post-Installation Configuration
This section contains the tasks you should perform after installation to complete the set
up of your Deployment System:
zStep 1: Grant Full Control of the Deployment Share to Your Service Account
zStep 3: Grant Services Account the db_owner Role to Your Deployment Database
(page 30)
zStep 4: Configure Your Deployment System (page 31)
zStep 5: Configure Security Settings (page 33)
zStep 6: Install the Deployment Agent (page 33)
zStep 7: Configure Automation (page 33)
zStep 8: (Optional) Configure PXE Server (page 33)
Step 1: Grant Full Control of the Deployment Share to Your
Service Account
If your Deployment Share was created during the installation, grant the services account
full control of this share. By default, this folder is C:\Program
Files\Altiris\eXpress\Deployment Server.
Step 2: Create Domain Join and Deployment Share Accounts
After installation, we recommend creating some additional accounts. These accounts are
different than the accounts used by the people who are going to manage computers.
These accounts are not tied to users, and should not possess interactive login or any
rights beyond what is recommended here.
The domain join account is used to join or re-join computers to a domain after imaging
or initial deployment. The Deployment Share read/write account is used to access this
share from the automation environment.
Domain Join Accounts
Create a separate domain-level account for each domain in which you
manage computers, granting the rights recommended in the following
table:
RightsDescription
DomainGrant privileges to add computer to domain.
Deployment Solution29
Post-Installation Configuration
Deployment Share Read/Write Account
Create this account on the computer hosting your Deployment Share,
granting the rights in the following table:
RightsDescription
File SystemGrant read/write privileges to your Deployment Share.
Step 3: Grant Services Account the db_owner Role to Your
Deployment Database
1. Open Enterprise Manager and connect to your SQL Server.
2. Browse to Security > Logins:
3. Double-click the account you are using to run the Deployment services. If the login
is not listed, add it.
4. Click the Database Access tab, select the eXpress database, and enable the
db_owner role:
Deployment Solution30
5. Click OK and verify that the change was successful.
Step 4: Configure Your Deployment System
The majority of tasks you perform in your Deployment System use the Deployment
Console.
If you are using accounts to join computers to a domain you need to provide the account
credentials.
To add domain join accounts
1. In the Deployment Console, click Tools > Options > Domain Accounts.
2. Provide the accounts you created in Step 2: Create Domain Join and Deployment
Share Accounts (page 29).
Post-Installation Configuration
Enable Security and Add Administrators
By default, the Deployment Console can be used on your Deployment Server by any
user who possesses rights to log in and run applications. This works well in situations
where you already have policies in place to control server access, and you have a group
of administrators who will have full access to deployment functionality.
If you want to provide more granular access to configuration options, jobs, and
computers, you can enable security.
To enable security
You must add at least one user or group to enable security.
Deployment Solution31
Post-Installation Configuration
1. In the Deployment Console, click Tools > Security.
2. Add a new user or group. We recommend clicking AD Import and importing Active
Directory groups, as this simplifies rights management. The first user or group
added is granted administrator rights. Each additional user or group after the first
are granted no rights and must be assigned rights explicitly.
Security is automatically enabled after a user or group is added. Additional users or
groups can be added using this same method.
Grant Console Rights to Administrators
1. In the Deployment Console, click Tools > Security.
2. Select a user or Group and click Rights.
3. Enable the rights you want granted. For a more complete discussion, see See
Securing Deployment Solution 6.8 on the Altiris Knowledgebase.
Grant Database Rights to Administrators
Each Administrator with console access must be granted public rights to your
Deployment Database. The best way to do this is by assigning public access to the
Active Directory groups containing your Deployment administrators.
This prevents you from manually granting this access to individual administrators as
they are added or removed from Deployment management responsibilities.
1. Open Enterprise Manager and connect to your SQL Server.
2. Browse to Security > Logins.
3. Add a login for each user or group that will manage computers using Deployment
Solution.
4. For each user or group, on the Database Access tab, grant the public role for the
eXpress database:
Deployment Solution32
Configure Deployment Server
The Deployment Server Configuration Utility lets you configure advanced settings for the
Deployment Server component.
You can stop, start, or restart the Deployment Server services, update the services
account, and configure additional options. You do not need to perform any configuration
at this time, though you should become aware of the configuration options provided.
To Open the Deployment Server Configuration Utility:
See Securing Deployment Solution 6.8 on the Altiris Knowledgebase for an in-depth
discussion of Deployment Solution security.
Step 6: Install the Deployment Agent
The Deployment Agent needs to be installed on all computers you want to manage using
Deployment Solution.
Post-Installation Configuration
See Deployment Agent Installation (page 34).
Step 7: Configure Automation
If you plan on imaging computers or deploying computers using scripted installs you
need to configure your automation environment.
See Deployment Solution 6.8 Preboot Automation Environment on the Altiris
Knowledgebase for an in-depth discussion of automation.
Step 8: (Optional) Configure PXE Server
Preboot Execution Environment (PXE) is an open industry standard that enables
computers to boot remotely using a network card.
Deployment Solution33
Chapter 5
Deployment Agent Installation
The Deployment Agent runs on managed computers to perform local management tasks
as directed by Deployment Server. Some of these tasks include:
zSoftware installations
zSVS layer management
zScript execution
zRemote control
zInventory and configuration
If you plan on doing more than computer imaging or scripted installations, you should
install the Deployment Agent on managed computers. Without installing the Deployment
Agent, you can still boot computers to automation using PXE, embedded partitions, or
boot media to perform some tasks.
The agent simplifies these tasks by automatically restarting the computer and
controlling when to boot the embedded partition, but it is not required.
About the Deployment Agent
The Deployment Agent can be installed in the production environment of all the
computers you want to manage. Additionally, the Deployment Agent is automatically
included in each of the automation boot configurations you create using PXE,
automation partitions, or boot media.
There are three versions of the Deployment Agent:
zDAgent - Windows Vista, Windows 2008
zAClient - Windows XP and previous
zADLAgent - Linux, UNIX, Solaris, Mac
DAgent provides experimental support for Windows XP, see the release notes for details.
References in this document to the Deployment Agent refer to all versions; references to
DAgent, AClient, or ADLAgent refer to the specific executable.
Installing the Agent
There are two standard methods to install the Deployment Agent on multiple
computers:
zUsing the Remote Agent Installer (Windows-only) (page 35)
zUsing a Script, E-Mail Link, or Manual Installation (All Platforms) (page 35)
For Additional details on the Vista, Linux and Mac agent see Operating System and
Platform Reference (page 252).
Deployment Solution34
Deployment Agent Installation
Using the Remote Agent Installer (Windows-only)
Advantage: Browse your network to quickly select computers, monitor installation
status in real time, and retry failed installations.
Disadvantage: Requires Local User rights on each computer. Does not work with
simple file sharing in Windows XP.
Windows XP
Step 1: Disable Simple File Sharing on Windows XP
1. In Windows Explorer, click Tools > Folder Options > View tab.
2. Clear the Use simple file sharing check box in the Advanced settings section.
Step 2: Allow File and Printer Sharing in Windows
XP SP2 Firewall
1. Open the Security Center from the Windows Control Panel.
2. Manage the security settings for the Windows firewall to add an exception for File
and Printer Sharing.
Step 3: Get Local User Rights (admin$ Share)
To initially install the agent on managed computers, you need an account with Local
User rights. You need access to this account only when performing the one-time agent
installation, so either use your domain administrator, a domain account with local user
rights, or any other account with local rights. After the agent is deployed, you no longer
need access to this account.
To determine whether you have sufficient rights, browse to:
\\hostname\admin$
Replacing hostname with the name of the computer where you want to install the
Deployment Agent. If you can access this share you have sufficient rights.
Step 4: Run the Remote Agent Installer
In the Deployment Console, click Tools > Remote Agent Installer. If you need
clarification during any of the installation steps, click Help.
Using a Script, E-Mail Link, or Manual Installation (All
Platforms)
Advantages: You do not need Local User rights to install if you have individual logged-
in users initiate the install, works for Linux and Unix computers.
Disadvantages: Not as automated as the Remote Agent Installer, troubleshooting will
likely require direct intervention.
The remaining installation methods are grouped together because they perform the
same functions: Execute the agent installation while providing a configuration file for a
silent install.
Deployment Solution35
Deployment Agent Installation
Step 1: Provide Users Access to the Agent
Installation Program
The agent installation programs are stored in the Agents folder on your Deployment
Share. Copy this file to a location that your users can have access.
For security purposes, we do not recommend granting any users direct rights to your
Deployment Share, especially if you are storing software or computer images on this
share.
Tip
If you are managing 32- and 64-bit computers, you can install the 32-bit agent on both
hardware types. After connecting, the 32-bit computers automatically update to the 64bit version.
Step 2: Create the Input File for a Silent Install
To configure new computers using a silent install, you can specify an input file
containing configuration settings.
Windows computers installing AClient use aclient.inp file. Linux and UNIX computers
installing ADLAgent use adlagent.conf. Details on the options are contained within each
file and are also described in the Deployment Solution Reference Guide.
When modifying adlagent.conf, ensure you use a text editor that properly handles UNIXformat line endings.
Configure each file and place a copy with the agent installation program.
Optionally, for Windows computers, you can use the Force Deployment Agent Settings
on New Computers feature to reduce the amount of configuration you need to perform
in the input file. When this is enabled, the agent receives global settings you have
specified when it connects for the first time.
To force agent settings on new computers:
1. In the Deployment Console, click Tools > Options.
2. Click the Agent Settings tab and select the Force new agents to take the default settings check box.
3. Click Change Default Settings to define default settings.
Step 3: Run the Installation Program
On each computer, you need to run a command similar to the following:
\\myshare\AClient.exe aclient.inp -install
or
./adlagent
To run this, you could:
zHave users copy and paste it into the Windows Run dialog, or send the link in an e-
mail message.
zPlace it in a startup script.
zExecute it remotely using Telnet or SSH.
Deployment Solution36
Agent Auto Update
The Deployment Agent has the ability to update itself to a newer version automatically,
and is set to update computers in batches to prevent network overload. This greatly
reduces the effort required when upgrading.
See the release notes on the Altiris Knowledgebase for specific information on Agent
upgrades.
Troubleshooting
See the following article on the Altiris KnowledgeBase:
18248Remote Agent Installer Fails for AClient
Additional articles can be found by searching the Altiris KnowledgeBase.
Deployment Agent Installation
Deployment Solution37
Part II
Booting Computers to Automation
Deployment Solution has the ability to perform work on computers before the normal
operating system loads. To do this, a managed computer is booted into an environment
where it can communicate with your Deployment Server to perform tasks.
This preboot environment is called automation. In order to perform image capture and
deployment, scripted installs, or execute certain scripts, you must implement a way to
boot computers into this environment.
This section provides the information you need to configure a boot method, including
PXE, and select an operating environment for automation tasks.
Deployment Solution38
Chapter 6
What is Automation?
Deployment Solution uses two modes to manage computers:
AutomationAutomation is to the pre-boot environment loaded by
ProductionThe normal operating system of the computer.
Several of the tasks you perform to manage your network can be completed in the
production environment. However, other tasks, primarily imaging, must be performed
before the operating system boots. In Deployment Solution, this pre-boot environment
is called the automation environment, or booting into “automation mode”.
Deployment Server to perform tasks which need to take
place outside the normal operating system.
If you have ever used a disk imaging utility, or booted a
computer using an installation CD, you are probably
familiar with running computers in a similar
environment.
Production tasks include software installation and
personality capture.
The following table contains a list of Deployment Solution tasks and the environment in
which they execute:
Production TasksAutomation Tasks
Distribute Software Create Disk Image
Capture PersonalityDistribute Disk Image
Distribute PersonalityScripted OS Install
Get InventoryRun script
SVS
Copy File to
Modify Configuration
Power Control
Run script
In order to manage computers in automation, you must select a method to boot
computers to automation and decide which operating to use in the automation
environment.
Deployment Solution provides support for a broad range of boot methods and
automation operating systems; this section helps you decide which works best for your
environment.
In order to set up automation, you must make the following decisions:
zWhich Automation Boot Method Should I Use? (page 41)
Deployment Solution39
zWhich Automation Operating System Should I Use? (page 44)
What is Automation?
Deployment Solution40
Chapter 7
Automation Boot Methods
Which Automation Boot Method Should I Use?
Deployment Solution supports a broad range of methods to boot computers into the
automation pre-boot environment: PXE, automation partitions, or boot media (CD/DVD,
USB device, or floppy).
This section provides an overview of the available boot methods to help you select the
method that works best for your environment, and contains the following:
zPXE (page 41)
zAutomation Partitions (page 42)
zBoot Media (DVD/CD, USB Device, Floppy) (page 42)
PXE
Pre-boot Execution Environment (PXE) is an industry standard developed to boot
computers using a network card. PXE can boot computers regardless of the disk
configuration or operating system installed, and doesn’t require any files or
configuration settings on a client. After PXE boot is turned on in the BIOS, a computer
can communicate with your DS PXE server to receive automation jobs.
PXE provides a number of advantages, especially when you are using the initial
deployment features of DS, which enables you to remotely deploy an image to a
computer which has no software installed.
Example: the receiving department of your company could have PXE enabled on their
subnet. When a new computer arrives, a technician could quickly unpack and plug the
computer into the network, and possibly enable PXE boot if it was not enabled by the
manufacturer.
When this unknown computer contacts the Deployment Server, it is assigned an initial
deployment job, which could image the computer with the corporate standard image,
install additional packages, and power off the computer. The computer is now ready for
delivery with minimal effort.
PXE also provides an advantage if you need to use multiple automation operating
systems in your environment. Since the image containing the automation operating
system is downloaded when a task is executed, different operating system
environments can easily be assigned to different tasks.
At the same time however, this can be a disadvantage if you are using an operating
system with a large footprint, such as WinPE, since the entire image must be
downloaded each time you run an automation task. If you often run automation jobs,
especially on several computers simultaneously, embedding the automation operating
system on the disk is faster and significantly reduces network traffic.
It is also possible to use PXE for initial deployment and install an automation partition as
part of the deployment. In this case, you could use the initial deployment features of
PXE for arriving computers and install an automation partition in case you need access
to automation at a later time.
Deployment Solution41
This configuration does not require PXE in your general network environment, but still
provides access to the automation environment without physical access.
When using the DOS automation environment, PXE provides an additional advantage:
multicast boot. This enables your PXE server to simultaneously boot up to 100
computers in a single session to perform automation work.
Although multicast imaging is supported in WinPE and Linux, multicast PXE booting is
not provided in WinPE and is not supported in Linux. That means that after each
computer has booted to automation, an imaging task can be multicast, but you cannot
use multicast to boot these computers.
Automation Partitions
An automation partition is a sector of your hard disk drive partitioned and managed by
DS. This partition contains the automation operating system and the files needed to
contact your Deployment Server, and must be present on each managed computer.
The biggest advantage to an embedded partition is that it does not require PXE, yet it
still enables you to boot into automation remotely. The biggest disadvantages to
embedded partitions are that they consume space on the drive, they require an existing
partition on the drive, and they must be manually installed from a disk on Linux and
Unix operating systems.
Automation Boot Methods
Another drawback, depending on your configuration, might be the fact that only one
automation operating system can be installed to a managed computer that is using an
automation partition. If you have tools that are supported only in DOS, this might limit
you to DOS for all automation tasks on a particular managed computer.
Automation partitions have an additional advantage in some configurations. Optionally,
you can create a different type of automation partition, called a hidden partition, to
store an image (or other files) locally.
This provides advantages in environments where computers need to be re-imaged often
or in environments where there is limited bandwidth or network connectivity. Since the
image is stored locally, the time needed to create and restore images is greatly reduced
and network traffic is significantly reduced as well.
Boot Media (DVD/CD, USB Device, Floppy)
Generally, the biggest drawback to boot media is that it forces you to physically access
the managed computer. However, if you are managing smaller numbers of computers or
do not plan to access the automation environment often, it might be a good choice.
Also, if you have employees with the ability and access to boot their own computers
using disks you provide, this could also be a good solution.
Boot media has some configuration limitations though. Deployment Solution is designed
to manage computers remotely, even in the automation mode, and several tasks and
jobs require access to both the production operating system and the automation
environment.
Example:
An imaging operation first captures configuration details from the production operating
system before booting to automation to capture the image. After imaging, this
configuration is restored.
Because of this, it is often difficult to schedule a job and coordinate booting the
managed computer to the right environment at the right time. If you assign a job which
Deployment Solution42
Automation Boot Methods
requires booting into automation mode, the boot disk must be present at the right time
to boot automation. If a complex job requires access to the production environment
during this time, the BIOS will most likely continue to boot to automation until the boot
media is removed. If this job, or a subsequent job, requires automation access again,
the boot media must be re-inserted.
To avoid these issues, some customers load the automation operating system, the
RapiDeploy imaging executable, and the image on bootable physical media. They boot a
computer, execute the necessary commands, and provide the required image files. In
this circumstance, the remote management capabilities of Deployment Server are not
being used, so the process is more manual, but it does not require network access.
This works especially well when managing thin clients or other computers where all
necessary files can fit on a single disk or USB device.
Deployment Solution43
Chapter 8
Automation Operating Systems
Which Automation Operating System Should I Use?
After you have selected a method to boot computers into automation, you need to
decide which operating system you want to use. In the past, MS DOS was the only
supported option. Deployment Solution now supports WinPE, Linux, MS DOS, and
FreeDOS.
This section provides an overview of the available automation operating systems so you
can find an environment (or environments) that suit your needs.
An important thing to note is that the automation environment you use is not
constrained by the production operating system on the computer. All of the DS
automation tools support these operating systems, so you can perform DS automation
tasks in any operating system (Linux computers can be imaged from DOS, Windows
computers can be imaged from Linux, and so on).
You might even use two automation operating systems for different tasks within the
same job. Example: you might use a vendor-supplied tool to perform a BIOS update in
DOS, boot to WinPE or Linux to perform an imaging task.
When you set up your test environment, you might want to run automation jobs in
multiple operating systems to see if one performs better in your environment.
The following sections contain an overview of the automation operating systems:
DOS
zDOS (page 44)
zWinPE (page 45)
zLinux (page 45)
Although you can use these environments to perform a wide-variety of management
using scripts and other tools, support for these environments is limited to the task
performed by Deployment Solution.
DOS is still used often today as a pre-boot environment, though new technologies have
emerged that might better suit your environment, such as WinPE.
The largest roadblocks most companies face when using DOS are access to drivers that
support modern hardware, and security concerns. DOS still performs well for several
tasks though, and can be a good choice if you have the proper driver support.
DOS typically requires only around 1 MB of space.
DOS provides an additional advantage in a PXE environment. When performing an
automation task on multiple computers, the PXE server can use multicast to boot
automation, which enables large numbers of managed computers to boot DOS
simultaneously.
Deployment Solution44
WinPE
Linux
Automation Operating Systems
WinPE (Windows Pre-boot Environment) is the next generation boot environment for
Windows computers. WinPE provides several advantages over DOS, including better
driver support (WinPE uses the same drivers used by the other modern versions of
Windows), increased speed, and generally more functionality.
The biggest drawbacks are its size, which causes increased boot time, especially when
booting over the network using PXE.
Linux provides an alternate pre-boot environment to DOS or WinPE. Many vendors
provide gigabit and wireless drivers for Linux that are not available in DOS.
Deployment Solution45
Chapter 9
Installing and Configuring Automation
This section explains:
zConfiguring Automation Operating Systems (page 46)
zConfiguring Automation Boot Methods (page 49)
zDeploying Automation to Managed Computers (page 50)
Configuring Automation Operating Systems
The following sections guide you through installing and configuring the automation
operating systems supported by Deployment Solution.
Obtaining and Installing WinPE, Linux, or DOS
Automation operating systems are installed using the Boot Disk Creator, which is
available in the Deployment Console by clicking Tools > Boot Disk Creator.
The following files are required to install the listed automation operating system:
WindowsPEWinPE is available on the Deployment Solution for Client
or Servers download page at http://www.altiris.com/
Download.aspx.
LinuxThe Linux 32 and 64-bit and FreeDOS preboot
environments are available on the Deployment Solution
for Clients or Servers download page at http://
www.altiris.com/Download.aspx.
Click the Linux and FreeDOS Automation Environment
link and save the file. Browse to the downloaded file
when prompted during the installation, or when adding
preboot operating systems using the Boot Disk Creator.
MS DOSA Windows 98 installation CD (Windows 98 SE is
preferred), and the proper licensing to use this on the
intended computers. Files are copied from the win98
folder from this installation CD.
FreeDOSThe FreeDOS preboot environment is contained in the
same file as the Linux preboot, see the Linux
instructions for details. For additional information on
FreeDOS visit www.freedos.org.
To install
1. In Deployment Console, click Tools > Boot Disk Creator.
2. In Boot Disk Creator, click Tools > Install Pre-Boot Operating Systems.
Deployment Solution46
Installing and Configuring Automation
3. Click Install and complete the wizard, providing the files listed in the previous table
when prompted.
For complete details on this process see the Boot Disk Creator help.
Adding Additional Files
Occasionally, you might need to make additional files available within an automation
environment, such as utilities or mass storage drivers. These files can be added to every
automation configuration of a specific type, or to select configurations only. This is
determined by the location you add the files in Boot Disk Creator:
Deployment Solution47
Installing and Configuring Automation
The following example provides an overview of this process.
Adding Mass Storage Drivers for WinPE
1. Select either the WinPE Additional Files folder, or a specific Boot Disk Creator
configuration.
2. Right-click and select add > Folder. Using this add folder command, create the
following path: i386\system32\diskdrivers
3. Within the diskdrivers folder, create the necessary folders to contain your drivers.
The folders you add should contain a txtsetup.oem file, and at least one *.sys file,
and possibly additional files. You must also ensure that any sub-folders specified by
txtsetup.oem are included, and that the [defaults] section references the proper
device driver (some textsetup.oem files might support multiple devices and drivers,
and the proper device must be specified in the [defaults] section).
The diskdrivers path is for adding mass storage drivers. If you are adding different
driver types, you might need to modify this path.
Adding Large Files to a Linux Boot Configuration
Linux automation is typically loaded into RAM. Due to limitations on the amout of RAM
available on most computers, there is a size constraint on the files that can be included.
If you need to access larger files locally (such as a disk image), Boot Disk Creator
provides a mechanism to mount a folder outside of the ramdisk, letting you access files
that are too large to fit on the ramdisk.
This is done by creating a folder named “.” in the root of your boot configuration.
1. Right-click your configuration and select New > Folder.
2. Name this folder “.” (do not include the quotes, just .).
Deployment Solution48
Installing and Configuring Automation
Files placed in this folder are mounted in Linux automation at /mnt/atrsboot.
Example
You can place a disk image and the rdeployt executable in this folder, create a boot
DVD, and restore the included image without network access, using a command similar
to the following:
When pre-boot tasks need to be performed, DS sends a message to the client computer
to restart in the automation environment. This includes a shutdown command issued
from DS, and a modification to the MBR if using an automation partition.
After the managed computer reboots, the automation environment is loaded from PXE,
an automation partition, or from boot media. The deployment agent now contacts the
Deployment Server.
After a connection is established, the Deployment Server sends the client computer its
assigned jobs and tasks. After the automation tasks run, a status message is sent to the
Deployment Server indicating that all work is complete. The Deployment Server sends a
message that the client computer should reboot back to the Production environment
(the MBR is restored when using automation partitions).
The following sections guide you through the process of setting up PXE, automation
partitions, or media to boot your computers into the automation mode:
zConfiguring PXE
zConfiguring Automation Partitions
zConfiguring Boot Media (DVD/CD, USB device, Floppy)
Configuring PXE
PXE is a server-based technology, and requires additional components on your DS
server, and possibly other computers. Setting up and configuring PXE is covered in
detail in a separate document, PXE in Deployment Solution.
Configuring Automation Partitions
DS provides two types of automation partitions:
Embedded
Partition
Hidden PartitionA larger partition installed on the hard drive of a
A small embedded section installed on the production
partition of a managed computer which contains the
automation operating system. Depending on the
operating system, the size varies from 5 to 200 MB (you
can specify the size when the partition is created based
on recommendations).
managed computer to contain not only the automation
operating system, but to provide room to store images
and other files. This partition is not normally viewable in
the production operating system.
Deployment Solution49
Installing and Configuring Automation
An embedded partition doesn’t create an actual disk partition, it reserves space on an
existing partition by marking the sectors on the disk as unusable. The target drive must
have an existing partition before an embedded partition can be installed.
A hidden partition creates an actual disk partition, but this partition is hidden from
normal view within the production system, though it is still viewable by FDISK or by an
administrator. The partition is listed as a non-DOS partition.
When a computer using an automation partition is assigned jobs, the Master Boot
Record (MBR) of the computer is modified to boot to this hidden partition. After the work
is completed, the MBR is restored to the previous configuration.
Hidden partitions are very useful for computers which are imaged often, such as those in
a test lab or provided for general use (such as a hotel or a library). After the visiting
person is done using this computer, you may want to quickly re-image to ensure that
the next visitor finds the computer in good working order. In these circumstances, a
hidden partition enables you to quickly restore an image without needing access to a
high bandwidth network.
Automation partitions can be installed using an installation package deployed from DS
(windows only), or installed from a CD, USB device, or floppy. This is different than
using boot media to access automation, because the automation partition media is used
once per computer to install, later the partition is used to perform tasks.
Using boot media to access automation doesn’t leave any files on the computer, but the
media must be used each time you want to access automation.
Configuring Boot Media (DVD/CD, USB device, Floppy)
Creating and using boot media is a straightforward process. Boot media boots a
managed computer to automation without leaving any files on the computer, and can be
installed to DVDs, CDs, USB devices, or floppy disks.
Boot media is created directly from the Boot Disk Creator utility.
Deploying Automation to Managed Computers
Automation partitions and boot media configurations are created using the Boot Disk
Creator utility. PXE configurations are created using the PXE configuration utility.
This difference is due to the way in which the automation operating system is deployed
to the managed computer. Automation partitions and boot media use install packages or
boot disks, while PXE uses a configurable menu to provide boot options, with each
option on the PXE menu linked to a specific automation configuration.
This section contains guidelines to create PXE, automation partitions, or boot media
configurations and deploy these configurations to managed computers.
Using Automation Partitions or Boot Media
1. Install the automation operating systems you want to use, as explained in Obtaining
and Installing WinPE, Linux, or DOS.
2. In Boot Disk Creator, Create a new configuration. The wizard is accessed by clicking
File > New configuration.
Deployment Solution50
Installing and Configuring Automation
This configuration contains the automation operating system files, network drivers,
IP address of your server, and other settings which control how the managed
computer communicates with your Deployment Server.
This configuration does not specify how this automation configuration is installed.
This is done using the Create Boot Disk wizard, which is launched automatically
after you create a configuration.
3. The Create Boot Disk wizard provides three options:
Create an automation
partition install
package
Create an automation
boot disk
Create a network boot
disk
Creates an executable, or configures a CD, USB
device, or floppy to install the automation
environment. This process is executed once per
device. After that, the computer uses the files from
the automation partition.
Select this if you are using automation partitions.
For managed linux computers, you need to use a
CD, USB device or floppy because no executable is
provided for this platform.
Configures a CD, USB device, or floppy with the
files necessary to boot a computer to automation
mode. After booting, the computer executes any
automation work previously scheduled, or waits for
work to be assigned.
Select this if you are using boot media to boot
computers to automation. None of these files are
installed, so the media must be used each time you
need to access automation.
Configures a CD, USB device, or floppy with the
files necessary to boot to a prompt.
This is useful if you have management task to
perform that doesn’t require interaction with DS, as
your Deployment Server is not contacted in this
scenario. None of these files are installed to the
managed computer.
4. After selecting how you want to install automation, complete the wizard.
See the Boot Disk Creator help for additional details.
You can also uninstall an automation partition using an install package, or configure a
CD, USB device, or floppy from Boot Disk Creator.
Using PXE
1. Install the automation operating systems you want to use, as explained in Obtaining
and Installing WinPE, Linux, or DOS.
2. In the PXE Configuration utility (Start > All Programs > Altiris > PXE Services
> PXE Configuration Utility), create a new menu item to correspond to the
automation configuration you want to install.
Deployment Solution51
Installing and Configuring Automation
3. Click Create Boot Image to launch the configuration wizard. This wizard is identical
to the wizard used when creating configurations for automation Partitions or boot
media.
When this option is selected from the PXE menu, the necessary files are loaded, the
job is performed, the computer boots to the production operating system. None of
these files are saved on the managed computer, they are downloaded each time the
computer boots to automation.
4. Provide any additional configuration options and click Save.
Deployment Solution52
Chapter 10
Setting Up the Altiris PXE Server
What is PXE?
Preboot Execution Environment (PXE) is an open industry standard which enables
computers to boot remotely using a network card.
PXE uses standard network protocols to establish a communication channel between a
computer and an Altiris PXE server during the boot process. Using this channel, an Altiris
PXE server sends an execution environment to the computer so that work can be
performed in a pre-boot state.
In Deployment Solution, this pre-boot state is called the automation environment, and
DOS, Linux, and WinPE are currently supported as pre-boot operating systems. An
overview of the automation boot methods and environments is contained in a separate
document, Deployment Solution: Automation Preboot Environments.
An advanced, tightly integrated PXE environment is provided with Deployment Solution.
Deployment Solution leverages PXE to provide the following advantages:
zWhen a managed device needs to boot into automation, Deployment Solution
restarts the computer and notifies the Altiris PXE Server. Altiris PXE Server now
boots the computer into the automation environment indicated in the Deployment
Solution job automatically.
zPXE can perform an initial deployment of a new system by checking to see if a
computer exists in Deployment Solution.
zAll PXE configuration is done using the PXE Configuration Utility from the
Why Use PXE?
PXE is used in Deployment Solution to perform two tasks:
zBoot managed computers into the automation environment
zPerform initial deployment of new managed computers
How you implement PXE is partially dependent on what you plan to do with it. Many
organizations use PXE only on a subnet in a receiving department to deploy corporate
images and initial configuration of new computers. After this computer is assigned to a
user, PXE is not used in the normal production environment.
This limits the extent of the PXE environment, but prevents you from accessing the
automation environment to capture images and perform other automation-only tasks.
Other companies which often use automation select PXE because it leaves no footprint
on the managed computer, and has several other advantages such as image
multicasting and tight Deployment Solution integration.
Deployment Solution console, enabling you to remotely configure all PXE servers in
your network.
Deployment Solution53
Regardless of how broadly you implement PXE, Deployment Solution provides tools and
services to simplify management of PXE in your environment. This section contains the
following topics providing an overview of PXE in Deployment Solution:
zPXE Services and Architecture
zHow PXE Works
PXE Services and Architecture
PXE services use a tiered-architecture which enables you to provide global settings and
boot options shared across all Altiris PXE Servers, override configuration and expand
boot options on a local level.
Boot options and PXE settings can be applied to a shared configuration. This shared
configuration is inherited by all Altiris PXE Servers in your environment. Each Altiris PXE
Server still has its own specific configuration, so you can override settings and add
additional boot options as needed.
New services have been provided to replicate settings and data automatically, making it
unnecessary for you to individually configure each PXE server.
The following table contains an overview of the PXE services:
Setting Up the Altiris PXE Server
ServiceDescription
PXE ManagerzProvides all boot options and configuration settings
for each Altiris PXE Server in your environment.
zInterfaces with the PXE Config Utility to replicate data
and apply PXE configuration.
zManages all communication between your
Deployment Server and your Altiris PXE Servers.
The PXE Manager Service is installed on your Deployment
Server regardless whether or not you have also installed
an Altiris PXE Server.
PXE Config Helper
Altiris PXE Server
MTFTP
The PXE Manager service interacts with Deployment Server, PXE Helper service, and the
PXE config utility to perform centralized PXE management:
zInterfaces with PXE Manager to receive data and
configuration.
zConfigures, starts, and stops the additional PXE
services on the Altiris PXE Server.
zProvides the PXE listener and proxy DHCP to respond
to PXE requests and send the location of bootstrap
files.
zSends bootstrap files to managed computers using
TFTP.
Deployment Solution54
Setting Up the Altiris PXE Server
On each individual Altiris PXE Server, the Altiris PXE Server service and the MTFTP
service are installed to perform the work of an Altiris PXE Server. These services are
configured, started and stopped by the PXE Config Helper service. Clients connect
directly to these services during the PXE boot process:
How PXE Works
Before a computer can boot over a network, it needs two things: an IP address to
communicate, and the location of an Altiris PXE Server to contact for boot instructions.
The following sections outline the PXE boot process:
zPart 1: DHCP Request and PXE Discovery
zPart 2: PXE Bootstrap
Deployment Solution55
Part 1: DHCP Request and PXE Discovery
Request and Receive an IP Address
Initially, the boot agent directs the execution of normal DHCP operations by
broadcasting a DHCPDISCOVER packet (255.255.255.255) to port 67 on its local
physical subnet to discover a DHCP server.
Any available DHCP servers respond with a broadcast DHCPOFFER packet indicating
their server IP.
When the client has chosen a target DHCP server, it broadcasts a DHCPREQUEST packet
that includes its MAC address and the IP address of the selected DHCP server. The
DHCPREQUEST also contains option 60 to identify the client as a PXE client.
PXE Option 60
DHCP lets clients to receive options from the DHCP server indicating various services
that are available on the network. A number of standard and custom options are
available that can convey a vast amount of information to DHCP clients. Option 60 deals
specifically with PXE related services. Both PXE clients and servers use option 60 to
convey specific information about the PXE services they need or are providing.
Contacting the Altiris PXE Server
All DHCP servers examine the DHCPREQUEST packet. If the request is intended for a
different server, the IP address they offered is reclaimed. The DHCP server providing the
accepted offer supplies a DHCPACK packet to the client to acknowledge the client’s
receipt of its IP.
During this process, the Altiris PXE Server monitors the wire for DHCPREQUEST packets
with an option 60 (PXE client). When a packet is recognized, the client’s MAC address is
used to find any pending automation work in Deployment Server. If no automation work
is required, the Altiris PXE Server does not respond to the client and it boots normally.
Setting Up the Altiris PXE Server
If there is work to do, the Altiris PXE Server responds with its address using a DHCPACK
with option 60.
At this point, the client has received a DHCPACK containing an IP address, and a
DHCPACK with option 60 containing an Altiris PXE Server. If the Altiris PXE Server is
located on the same server as DHCP, both are contained in the same DHCPACK packet.
Part 2: PXE Bootstrap
The client is ready to contact the Altiris PXE Server for boot files. After this request,
clients are provided with a boot menu containing all boot options that the Altiris PXE
Server can provide. Most of the time, the correct boot option has already been selected
by the Deployment Server, so this is transfered to the client.
After the selection is made, the client requests the necessary boot files using MTFTP.
This consists of a .0 and a .1 file.
The .0 file functions as a bootstrap loader. It creates a RAM disk and manipulates the
BIOS interrupt vectors, interrupt structures and hardware information tables to make
the RAM disk function exactly like a typical floppy disk. This file copies the .1 file byte by
byte into the newly created RAM disk.
Deployment Solution56
Setting Up the Altiris PXE Server
The .1 file is an image of a boot disk floppy with modifications to the autoexec.bat and
additional files which ultimately provide the automation environment on the managed
computer.
The following diagrams contain a basic outline of this process:
PXE Planning and Installation
This section contains an overview of the PXE deployment process, in the following
sections:
zEnabling PXE on Managed Computers
zInstalling and Configuring DHCP
zHow Many Altiris PXE Servers Do I Need?
zInstalling Altiris PXE Servers
Deployment Solution57
Enabling PXE on Managed Computers
Each computer you plan to manage using PXE must have PXE boot enabled (sometimes
called network or NIC) and set to the correct sequence in the BIOS. It is also a good idea
to apply the latest BIOS updates, especially if your network card is integrated on the
motherboard.
Deployment Solution also supports Wake on LAN to power on managed computers
remotely. If this is enabled, a Wake on LAN signal is sent to the managed computer if
the device is disconnected from Deployment Server when a job is scheduled to start.
Installing and Configuring DHCP
DHCP is an integral part of the PXE process, and must be installed and configured in
order to use PXE. A DHCP server is not provided with Deployment Solution, you must
obtain, install, and configure this component separately.
After DHCP is set up and your Altiris PXE Servers are installed, you need to configure
how your Altiris PXE Servers interact with the DHCP server. This is done using the PXE
Configuration Utility.
How Many Altiris PXE Servers Do I Need?
Setting Up the Altiris PXE Server
Number of Client Connections
Altiris PXE Servers do not typically require a lot of resources. By using multicast, a single
Altiris PXE Server can deploy a DOS boot image to up to 100 computers at a time, and
not consume any more resources than it would while deploying a single image. If you
are using WinPE or Linux however, multicast boot is not available.
Usually a single Altiris PXE Server in a specific location is enough if you either use
multicast to deploy images or spread out your image capturing jobs to be in line w ith th e
capabilities of your server. Additional Altiris PXE servers can easily be added if
necessary.
Network Speed
Since the majority of the resources on an Altiris PXE Server are used for transferring
files over the wire, the faster the network, the more work a single Altiris PXE Server can
do. A single Altiris PXE Server on a gigabit network can capture and deploy several times
as many images over a period of time than even multiple servers on a slower network.
Physical Layout of your Network
Your PXE configuration might be set up according to the physical layout of your network.
If you have three offices in different locations, it might make sense to install an Altiris
PXE Server at each location to reduce traffic and resolve routing issues (see PXE
Request Routing).
In these configurations, the deployment share can be mirrored to a local server, and
images are usually taken from and restored to local file servers. See PXE Redirection
(page 61) for an example of this type of configuration.
Deployment Solution58
Setting Up the Altiris PXE Server
PXE Request Routing
PXE clients use broadcast packets to find DHCP and PXE services on a network, and
multicast packets (MTFTP) to transfer files. These packet types can present challenges
when planning a PXE deployment because most default router configurations do not
forward broadcast and multicast traffic.
Because of this, either your routers need to be configured to forward these broadcast
and multicast packets to the correct server (or servers), or you need to install an Altiris
PXE Server on each subnet.
Routers generally forward broadcast traffic to specific computers. The source subnet
experiences the broadcast, but any forwarded broadcast traffic targets specific
computers.
Enabling a router to support DHCP is common. If both PXE and DHCP services are
located on the same computer, and DHCP packet forwarding is enabled, you shouldn’t
have any problem transferring broadcast packets.
If these services are located on different computers, additional configuration might be
required.
If you are going to forward packets, ensure your router configuration lets DHCP traffic to
access the proper ports and IP addresses for both DHCP and Altiris PXE servers.
Once the broadcast issues are resolved, the routing of multicast traffic must be
considered. Multicasting leverages significant efficiencies in transferring files but also
introduces challenges similar to broadcast packet forwarding. Like the broadcasting
solution, routers can be configured to support multicast traffic between PXE Clients and
Altiris PXE Servers.
Please consult the documentation provided by your router vendor for additional
information on packet forwarding.
Installing Altiris PXE Servers
After you have determined the PXE needs of your network, you must to determine
where to install these Altiris PXE Servers.
An Altiris PXE Server can be installed on your Deployment Server, on your DHCP server,
on another server in your network (such as a file server), or as a standalone server. You
can also use a combination of these (example: an Altiris PXE Server on your Deployment
Server and your DHCP server).
The actual installation process is straightforward. You can install an Altiris PXE Server at
the same time as you install Deployment Solution, or you can install one later by
running the installation program and selecting the add additional components option.
After these servers are installed an running, they are configured using the PXE
Configuration Utility. See the following section.
Configuring PXE Settings
All PXE configuration is done using the PXE Configuration Utility. The PXE config utility is
used to create and modify two things:
zGlobal and local configuration settings. These settings include timeout values,
replication and logging options, and so on.
Deployment Solution59
zBoot options. Each boot option corresponds to a specific configuration which
This section contains a brief overview of selected PXE configuration and boot options.
For complete details, see the help for the PXE Configuration Utility.
PXE Settings
Shared vs. Local
Deployment Solution provides a PXE settings hierarchy enabling you to provide shared
and local PXE configuration values. All Altiris PXE Servers inherit the shared values
unless they are overridden on the local server.
Session Timeout
The PXE configuration utility connects the PXE Manager service on Deployment Server.
To ensure your changes are not overwritten by another instance of the PXE
Configuration Utility, only one instance of PXE config can connect to PXE manager at any
given time.
Setting Up the Altiris PXE Server
includes an operating system, network and other drivers, utilities, mapped drives,
and so on.
If you attempt to launch PXE Configuration when another instance is running, you
receive an error. To prevent you from being completely locked out for extended periods
(example: an instance is inadvertently left open on another computer), a timeout has
been added which terminates a connection after 30 minutes of inactivity after someone
else attempts to connect.
This timeout only applies if someone else is attempting to launch PXE Configuration. If
no other connections are attempted, the timeout is never enabled and your session
remains active.
DHCP Server Options
For most circumstances, you want option 1. If you have DHCP installed on your
Deployment Server but it is not active, Deployment Server might still attempt to
communicate with that instance. This is changed by selecting option 3. If you are using
a 3rd party DHCP server which automatically sends the client 60 message, select option
2.
Boot Options
Boot options are the boot configurations provided to a client by an Altiris PXE Server.
Each boot option has a corresponding automation operating system, network drivers,
and other settings.
Shared vs. Local
Deployment Solution provides a PXE boot option hierarchy enabling you to provide
shared and local PXE boot options. Shared boot configurations are available on all Altiris
PXE Servers, while local boot options are available on a specific Altiris PXE server.
Deployment Solution60
PXE Redirection
Setting Up the Altiris PXE Server
Lets you redirect a global PXE menu option to a local PXE menu option. Redirection
settings are not available globally, they are always specific to an individual Altiris PXE
Server. This is due to the role redirection plays in your PXE environment.
Consider the following example:
You manage computers in three locations: Two offices in Ontario, and one office in
Alberta. To limit transfer between each site, each office has a local Altiris PXE Server,
and a file server with a mirror of the deployment share. This enables clients at each
location to contact the local Altiris PXE Server to boot and use the local deployment
mirror to access the network tools and to store images.
You need to create a job to capture an image of each managed computer on Friday
evening, once a month. To create this job, you add an imaging task, select a PXE boot
option, and set the schedule.
Hold on. If you select the same PXE boot option for each office, you are going to have
problems. The Alberta office uses a mirror of the deployment share on alb1\eXpress,
and stores captured images on alb1\images. The two Ontario offices use the ont1 and
ont2 servers respectively.
You could go ahead and create three global configurations and three different jobs, but
that is confusing and could potentially cause problems if the wrong selection is made. If
you took this route, on each Altiris PXE Server, two of the three global configurations
could potentially cause problems (they are mapped to drives in remote offices). To avoid
problems, select a single global configuration for a job and update it based on the
location of the Altiris PXE Server.
This is exactly what redirection does. You create a global configuration (example:
named “Imaging Environment”). On each Altiris PXE Server, you create a local
configuration for each office with the correct server mappings.
The “Imaging Environment” global option is redirected to the local option, and the
process is simplified. Now the imaging job can be applied to all computers at once,
simplifying the process and reducing the chance of errors.
Deployment Solution61
Part III
Using Deployment Solution
This section provides feature identification and basic procedures for deploying and
managing computers using Altiris® Deployment Solution™ software.
Deployment Solution62
Chapter 11
Deployment Basics
Deployme nt S olution pro vid es a g raphical, obj ect-ba sed interfa ce t o manage compute rs.
After you have installed the Deployment Agent and the computer has connected, the
computer can be managed using the Deployment Console.
Computers
Each computer and computer group in your environment is represented in the
computers pane:
Jobs
Computers can be dragged into a group, or automatically assigned to a group when the
agent is installed. Computers can belong to only one group.
When a new computer connects, it is placed in the New Computers group.
Jobs contain a sequence of tasks to perform work on managed computers. Example: a
job might be “install and activate Winzip 10.” This job might have a condition specifying
that it should only execute on Windows XP computers with 500 MHZ or greater
processors.
Deployment Solution63
Deployment Basics
Each job that can be assigned to a computer or computer group is represented in the
jobs pane:
Computers are assigned jobs by dragging and dropping computers onto a job. Jobs can
also be scheduled by right-clicking and selecting the Job Scheduling Wizard.
Creating Jobs and Tasks
Jobs are created by adding one or more tasks to a job. Tasks include create disk image,
distribute software, manage SVS layer, and run script.
These tasks run sequentially and can trigger other events, such as a stop job or execute
other job depending on the return code of the task.
Context Menus (Right-click)
In the Deployment Console, you can right-click almost any object for a context-specific
list of management options.
Example: if you right click a computer or group, you are given the option of viewing
computer details or job history, remote controlling or opening a chat session, renaming,
power control, and several other options.
Find a Computer in the Database
This search filter lets you type a string and query specified database fields for specific
computer properties. You can search for user or computer names, licensing or location
information, or primary lookup keys: MAC address, serial number, asset number, or
UUID. This search filter queries the property values appearing in the Computer
properties (page 119).
Deployment Solution64
Click <CTRL> F or click Find Computer on the console toolbar to search
the Deployment Database for computers by property settings.
The computers that match the search will be highlighted in the
Computers pane.
1. In the Search For field, type all or part of the computer’s property values you
would like to search for. This alpha-numeric string will be compared with specified
database fields.
2. In the In Field box, select the field you want to search in the Deployment
Database.
Example: to find a computer by searching for its IP address, type the address in the
Search For field and select IP Address from the In Field drop-down list.
Name BIOS name of the computer.
Computer Name Deployment Solution name of the computer.
MAC Address Example: 0080C6E983E8.
IP AddressExample: 192.168.1.1.
IDExample: The computer ID. 5000001.
Serial Number Serial number installed in BIOS. A primary lookup key.
Asset TagAsset number in BIOS. A primary lookup key.
UUIDA primary lookup key.
Registered User Name entered when the operating system was installed.
Product KeyProduct Key for the operating system.
Logged On User Name of the user currently using the computer.
Physical Bay
Name
The actual bay number. Example: 7x.
Deployment Basics
The computer you are looking for appears highlighted in the Computers window in the
console.
Note
This search is not case-sensitive and lets wildcard searches using the *.
Using Lab Builder
Use the Lab Builder to set up jobs under the Lab folder in the Jobs pane to set up a
classroom or lab environment.
Click Lab Builder on the console toolbar or click File > New > Lab Builder to set up jobs specifically created for managing multiple
computers in a lab environment.
Deployment Solution65
Deployment Basics
You can set up jobs to:
zCreate Disk Image
zDeploy Lab
zRestore Lab
zUpdate Configuration
zUpload Registries
Each job contains a default list of tasks. Lab Builder places these five new jobs under a
folder (which you name) located under the Lab folder. All tasks in the jobs are assigned
default paths and file names that let them use the same images and configuration
information, registry data, and so on. We recommend that you do not change the file
names and paths. If you change the default settings (Example: changing the image
name), you must change it in all jobs where the image is used.
To use Lab Builder
1. Click the Lab Builder icon on the toolbar, or choose File > New > LabBuilder.
2. Enter the name of the lab setup.
Note
The lab name must be unique because the program creates a default image file
name based on the name, and the image file name must be unique. The default
image name is synchronized in all lab jobs, so if you change the name later you
must change it in all jobs that use the image.
3. Enter a lab description to help you differentiate the lab from others. This field is
optional. Click OK.
4. Identify an image in the Create Disk Image job.
5. Set computer names and addresses in the Update Configuration job.
The following information describes the default jobs. To run one of these jobs, drag it to
the computer or computer group you want it applied to.
Create Disk Image. This job uploads an image of a computer to the server and an
image name is created automatically based on the lab name. However, there is no
actual image in the job until you drag the image source computer to this job.
Deploy Lab. This job has three default tasks: Deploy image, Apply configuration
settings, and Back up registry files. The image that is uploaded using the Create Disk
Image job is deployed when you use this job. The configuration settings you specify in
the Update Configuration job are applied to the computers, and the computer registry
files are uploaded to the Deployment Server.
Restore Lab. This job restores the image and registry files to a computer where a lab
was previously deployed. You can quickly get a computer running again by restoring the
lab on that computer.
Update Configuration. This job lets you to set unique configuration information (such
as computer names and network addresses) for client computers. When a lab is
deployed, each computer has an identical image, but not the same configuration
settings. This means you don't have to visit each computer to reset IP addresses and
other settings when you deploy an image.
Upload Registries. This job backs up computer registry files to the Deployment Server.
Deployment Solution66
Computer Import File
Use the following format to import new computers from a text file. You can easily create
a computer import file by entering data in the provided Microsoft Excel spreadsheet
ImportComputers55.xls) located in the Samples folder of the Deployment Share.
(
zA semicolon as the first character denotes comment lines.
zQuotes around fields are optional.
zLeaving the job name blank does not assign the computer to any job.
zLeaving the start time blank makes an entry in the job for the computer, but does
not schedule it for a specific time.
zOnly the Name field is required.
zQuotes around fields are optional.
You can populate your computer database using the format provided below. The Import
Computers text file can be imported into Deployment Solution using the File > New
Computer > Import or File > Import/Export > Import Computers.
Tips for creating a new computers import file
zWhen using Boolean references, do not use quote marks. These fields are marked
with a B: 1=On/True and 0=Off/False.
Deployment Basics
zFor some fields, this input format supports multiple IP Addresses, delimited by a “;”
(semicolon) within the field. These fields are marked with a “(;)”.
Example: the gateway field could read, 30.11.11.2, for a single IP address
or, 30.11.11.2;30.11.11.3;30.11.11.4, to support three IP addresses.
zAll fields (up to and including “site”) must be present in the file, but all data except
for “Name” is optional.
zTo use optional fields for multiple network adapters, the preceding fields are
required. Example: to use Nic3 fields, all fields for Nic2 are required.
zFor Deployment Server to read the import text correctly, ensure there is a final hard
return at the end of the file.
Format for the New Computers text file
Outlined below is the field order for the database input. Fields marked “(ignored)” are
not used by version 5.5 and later, but are included to support previous versions.
Suffix,NIC6 MAC Address,DHCP(B),IP
Address(;),Netmask(;),Gateway(;),DNS(;),WINS(;),Domain Suffix,NIC7 MAC
Address,DHCP(B),IP Address(;),Netmask(;),Gateway(;),DNS(;),WINS(;),Domain
Suffix,NIC8 MAC Address,DHCP(B),IP
Address(;),Netmask(;),Gateway(;),DNS(;),WINS(;),Domain Suffix
Deployment Solution provides both Windows and Web user interface consoles to deploy
and manage computer devices across local or wide area networks. It also provides a
Thin Client view of the Deployment Console. As an IT administrator, you can manage all
computer devices from one of these Deployment Consoles:
The Deployment Console is a Windows-based console with complete deployment and
management features, including remote control, security, PXE Server configuration,
image editing, and other deployment utilities and features. See Deployment Console
basics on page 70.
The Deployment Web Console provides basic deployment and management
functionality from a Web browser, including the ability to remotely access and manage
computer devices, build and schedule jobs, and view multiple Deployment connections.
The Thin Client View of the Deployment Console provides a simplified experience when
dealing exclusively with Thin Clients. The functionality of the Thin Client Console is
identical to that of the current Deployment Console. However, you can toggle from Full
View to Thin Client View.
Deployment from the Symantec Management Console combines management and
reporting features across multiple Deployment Server systems and lets you integrate
additional Web applications in the client and server management suites, including
Inventory, Software Delivery, Recovery, HelpDesk, Patch Management, and Application
Metering solutions.
To launch the Deployment Console, click the icon on the desktop, or click
Features of the Deployment Console. The Windows console for Deployment Solution
provides standard Computers, Jobs, and Details panes to drag and drop icons, view
properties, and identify the state and status of Deployment objects. In addition, the
Deployment Console also includes a Shortcuts and Resources view and provides the
tools, utilities, and features required for complete computer resource management. See
Deployment Console basics on page 70.
Set program options. From the Tools > Options dialog, you can set preferences for
each Deployment Server system. See General options on page 82.
Set security. From the Tools > Security dialog, you can set security rights and
permissions for all Deployment Consoles. See Security in Deployment Solution on
page 87.
Connecting to other Deployment Server systems. Connect to other Deployment
Server connections from your current Deployment Console and manage computers
outside of your current network segment or site. See Connecting to another Deployment
Server on page 93.
Deployment Solution 69
Customize the Tools menu. You can add commands to the Tools menu to open
commonly-used deployment programs and utilities. See Extending the tools menu on
page 79.
Deployment Console basics
The Deployment Console is your main portal to Deployment Solution. It is a feature-rich
Win 32 program with real-time access to computer resources, deployment jobs, and
package files, each represented by distinct icons to identify the status and settings.
From the Deployment Console, you can build simple or complex deployment jobs, assign
them to a computer group, and verify deployment execution.
Because the Deployment Console can reside on its own computer, you can have multiple
consoles running from different locations. The Deployment Console needs to be running
only while creating assignments or viewing information about the managed computers.
You can turn on the console, run management tasks, and turn off the console.
Scheduling information is saved in the Deployment Database and tasks are executed at
their scheduled time. If an assignment to a managed computer is made from two
different consoles at approximately the same time, the computer is assigned those tasks
in the order they are received. See Console options on page 82 to set refresh intervals
for the Deployment Console.
Features of the Deployment Console
The Deployment Console is divided into several panes to organize computers,
deployment jobs, and software packages and scripts. It gives you a graphical view of
your network and provides features to build jobs, drag and drop icons to schedule
operations, store and access jobs and packages, and report the status and state of your
computer resources. The Deployment Server includes three main panes, toolbars,
wizards, shortcuts, and utility programs.
Computers pane
Use this area to view and select managed computers for the Deployment Server system.
You can select and right-click a computer in the Computers pane to run remote
operations using Deployment Solution or to view the computer properties. You can also
create computer groups to organize collections of similar computers. See Remote
operations using Deployment Solution on page 122 and Computer properties on
page 119.
Create computer groups by clicking Computer Groups on the toolbar, or
right-clicking in the Computers pane and selecting Groups. Click View > Show Computers to display only computer group icons and not individual
computers.
When you select a computer or group, a list of the computers in the group appears in
the Details pane and provides the basic information about each computer. The Filter
detail bar appears in the Details pane that helps to view computers according to set
criteria. When a computer is selected, you can view the computer status in the Details
pane, including a list of jobs that are running or are scheduled to run on the computer
and the status of each job.
Altiris Deployment Solution™ from Symantec User’s Guide70
Jobs pane
To get more details about all tasks that are run on computers, click Status Detail.
Status Detail displays a more detailed breakdown of the tasks that the job has executed
and a status message indicating the status of the tasks.
You can also import new computers from a text file or add security rights and privileges
for a specified computer or group of computers. See on page 95 for complete
information about setting up, importing, and managing computers from the Computers
pane.
Use this area to create and build jobs using specific deployment tasks. You can select
and right-click a job in the Jobs pane when building new jobs or running the New Job
Wizard. You can also import new jobs from a text file or add security rights and
privileges for a specified job or collection of jobs. See Building new jobs on page 150
and New job wizard on page 146.
Set up folders to organize and access jobs according to your specifications. To create a
new folder, right-click in the Jobs section and select the New Folder option. You can
also create folders by selecting File > New > Folder.
Click View > JobsView to show or hide the Jobs pane.
When you select a job, the Details pane displays a list of computers in the folder and
gives a basic information about each job, such as its state and status. It also shows the
computers or computer groups to which the job is assigned.
zThe Conditions detail bar also appears, letting you assign jobs to computers. See
Setting conditions for task sets on page 151.
zIn System Jobs, folders are created to store jobs that are created when running
operations from the console.
Drag-n-Drop Jobs. Jobs are created and automatically placed in this folder when
you drag an .MSI, .RIP, or other package files from the Resources view to a
specific computer or group. See Shortcuts and resources view on page 72.
Image Jobs. Jobs are placed in this folder when you create a Quick Disk Image.
See Quick disk image on page 125.
Restoration Jobs. Jobs are placed in this folder when you restore a computer from
its Deployment history. See Restoring a computer from its deployment history on
page 124.
From the Jobs pane, you can drag job icons to computer icons to run jobs, such as
creating images, deploying computers, changing configurations, or installing software.
After you create a job, you can change it by adding, modifying, or deleting tasks. You
can run jobs immediately, schedule them to run at a particular time, or save them for a
later time. See on page 145 for complete information about setting up, importing, and
managing computers from the Jobs pane.
Altiris Deployment Solution™ from Symantec User’s Guide71
Details pane
The Details pane extends the user interface features when working in the Computers,
Jobs, or Shortcuts panes.
zWhen you select a computer in the Computers pane, the Details pane changes to
a Filters section (if you click a group icon) and displays the status of all jobs
assigned to the selected computer.
zWhen you select a job icon in the Jobs pane, the Details pane displays the
information about the job to set up conditions, order tasks, and to add, modify, or
remove tasks.
zWhen you select a computer or computer group in the Computers pane, the
Details pane displays the information about a computer, such as its IP address,
MAC address, and status.
zWhen you select a batch file, you can click Modify to update the file.
zWhen you select a hard disk image file (.IMG), the Details pane displays a
description of the image file and information about the included partitions.
zWhen you click on the package files, the Details pane displays the title, description,
version, creation date, and platform of an .RIP file or Personality Package.
Shortcuts and resources view
The Shortcut and Resources pane provides easy access to the computers and job
objects identified in the console and the software packages stored in the Deployment
Share. In the Shortcuts view, you can drag computers, computer groups, jobs, and job
folders to organize and access commonly-used console objects. In the Resources view,
you can identify and assign package files.
Click View > Shortcuts View to open the Shortcuts and Resources
pane. You can drag the jobs and computer icons to this pane. Click
Resources in the Shortcuts and Resources view, or click View >
Resources or CTRL+R to open a filtered list of packages on the
Deployment Share.
The Shortcuts view provides quick links to view and access computers, jobs and
packages. It can act as a palette of Deployment Solution icons that you can drag to
other working panes in the console, or as a storage to save commonly-used jobs and
computer icons.
The Resources view lets you see a filtered view of the package files — .MSI files, .RIPs,
image files, Personality Packages, and other resource packages — stored in folders in
the Deployment Share. From the Resources view, you can drag packages directly to
the computers in the Computers pane to deliver the software. This automatically
creates jobs in the System Jobs > Drag-n-Drop Jobs folder in the Jobs pane. The
Resources view lets you identify packages assigned to each job and assign those
packages to create new jobs.
Altiris Deployment Solution™ from Symantec User’s Guide72
Using resources directly
If you do not want to create a shortcut to a resource, but still want to use a resource to
assign a job to a computer, you can move the resource to a designated computer. To do
so:
1. Enable the Shortcuts view.
2. Click Resources at the bottom of the Shortcuts window.
3. Browse to the selected resource and drag it to the appropriate computer.
You can create a new script file from the Resources view and use it directly to schedule
it on a computer. See Creating new script files on page 192.
See Console options on page 82 for options to set refresh intervals for the Resources
view.
Thin client view of the Deployment Console
The Thin Client view of the Deployment Console provides a simplified experience when
dealing exclusively with Thin Clients. The functionality of the Thin Client view is identical
to that of the current Deployment Console. However, you can switch from Full view to
Thin Client view.
The Thin Client Console has the following panes:
zComputers
zResources
zSoftware Packages
zInventory
The Computers, Resources, and Software Packages pan es a re on the lef t si de of the
Thin Client view, while the Inventory pane is on the right side of the Thin Client view.
Installing the thin client view
During installation, you can install the Deployment Solution Thin Client view. By default,
the traditional Deployment Console is installed.
If you select Thin Client view, a Thin Client Jobs system folder is created. All the jobs
created from the Deployment Solution Thin Client view are stored in this folder. During
the installation process, the following folders are created in this hierarchy for the Thin
Client resources:
zConfiguration Packages
zImages
zSoftware Packages
Deployment Solution for Thin Clients uses the same installation program as Deployment
Solution. No licensing is required even if you select Thin Client Install.
To install thin client
To install Thin Client, choose one of the following options:
zOn the Deployment Server Install Configurationdialog, select the Thin Client
Install option. The Deployment Console Thin Client View appears.
Altiris Deployment Solution™ from Symantec User’s Guide73
zOn the Deployment Server Installation dialog, select the Simple Install option.
The Deployment Console appears. Click View > Show Thin Client View. The
Deployment Console Thin Client View appears.
Switching between two views
When you switch between the traditional view and the Thin Client view, you can
maintain the last state in which you viewed the console. This ensures that you open the
console in the same view that you last closed it in.
To switch between the traditional and the thin client view
1. Click View.
2. Select Show Thin Client View.
Note
By default, the Thin Client view is visible if you select Thin Client Install.
When you switch to the Thin Client view, all the menus and items that are not necessary
for the Thin Client view are unavailable. These are visible when you switch to the
traditional view.
Computers pane
This pane is the same as that in the traditional view. However, only thin clients are
displayed. You can right-click this pane to view a new menu. When you right-click a thin
client, you can view the following options:
zCapture Configuration
zCapture Images
zDeploy Configuration
zDeploy Image
zInstall Automation Partition
zGet Inventory
zPower Control
zProperties
zRemote Control
zDelete
zManage Inventory View
If you select a Capture option, a text field appears, prompting you for the name of the
captured resource. By default, the name is the same as the serial number on the Thin
Client, which you can change.
If you select a deploy option, a list of the available resources appears for the selected
type, such as Configurations, Images, or Software Packages. You can select a resource
from this list.
To create a job
You can create a job in one of the following ways:
Altiris Deployment Solution™ from Symantec User’s Guide74
Resources pane
zSelect any of the first six options from the Computers pane. All these jobs are
scheduled at the current time.
Note
The Schedule Computers for Job dialog does not have the Job Schedule tab.
Also, all the automation jobs have the default option selected for boot image.
zDrag resources to the Computers pane or computers to the Resources pane to
schedule jobs at the current time.
Note
Ensure that you have the required permissions to drag and drop resources.
All thin client job details are saved in the Thin Client Jobs system folder. You cannot
delete or rename this new system folder from the console.
All the above options, except Properties, are disabled when the client is not active.
Note
All the jobs on the thin clients are automatically created and scheduled by the console,
and this happens only when the clients are active. When creating the jobs, the console
refers to the operating system type (platform) of the client.
This pane is a treeview listing all the resources that you can drag and drop to the thin
clients and vice versa. The following types of resources appear in this pane:
All these resources reside in the eXpress share in the ThinClient directory.
When you click any of the submenus corresponding to the subdirectories within the
ThinClient directory, the tree expands and displays all the resources included in the
directory. If the folder is empty, an appropriate message appears. You can rename or
delete the resources.
Software packages
The Software Packages pane displays the software packages that can be created for
the available computers. You can drag and drop this resource to the thin clients and vice
versa.
When you right-click the Software Packages pane, you can view the following options:
zNew folder. Select this option to create a new folder.
zImport. Select this option to import a job. See To import a job on page 76.
zRename. Select this option to rename a folder.
Note
You cannot rename the Software Packages pane. You can only rename a folder.
Altiris Deployment Solution™ from Symantec User’s Guide75
zDelete. Select this option to delete folders.
zFind Software Packages. Select this option to find software packages.
To import a job
1. Open the Thin Client view.
2. Right-click the Software Packages pane and select Import.
The Import Job dialog appears.
3. In the Job file to import field, browse and specify the file that you want to import.
Note
By default, the Import to Job Folder, Overwrite existing Jobs and Folders
with the same names, and Delete existing Jobs in folder options are disabled.
To preserve the source operating system file paths of Scripted Install, select the
Preserve Scripted Install OS source paths option.
Click OK.
To delete the Software Packages option from the Deployment Console
1. Open the Deployment Console.
2. In the Jobs pane, select System Jobs > Thin Client Jobs > Software Packages.
3. Right-click Software Packages and select Delete.
Inventory pane
A confirmation dialog opens.
4. Click Yes to confirm the deletion.
The Software Packages option is deleted from the Deployment Console view.
Note
The Software Packages option is automatically added in the Jobs pane in System
Jobs > Thin Client Jobs when you switch from the Deployment Console view to
the Thin Client view.
This pane displays a table that lists all the thin clients identified by the console. The
following columns appear in the Inventory pane:
zName
zComputer Status
zAction Status
zProduct Name
zOperating System
zImage Version
zFlash Size
zMemory Size
zBIOS version
Altiris Deployment Solution™ from Symantec User’s Guide76
You can select which columns to view. The following columns are available, but do not
appear:
zAutomation Partition
zCPU
zDomain name
zIP address
zMAC address
To view Inventory columns
1. Right-click the Inventory pane. The Manage Inventory Columns dialog appears.
2. You can add columns to either the Selected columns list or the Available columns
list by clicking the required arrows.
3. Click OK.
Toolbars and utilities
The toolbars and menus on the Deployment Console provide major features and utility
tools to deploy and manage computers from the console. From the Main toolbar, you
can create new jobs and computer accounts and run basic deployment tasks. On the
Tools toolbar, you can launch Deployment Solution administration tools and package
editing tools. It also includes icons to quickly run commonly used remote operations.
See Remote operations using Deployment Solution on page 122.
Deployment Solution utility tools
The Deployment Console lets you open utility programs from the Tools menu or from
the Tools toolbar. You can launch Deployment Solution administration tools (Boot Disk
Creator, PXE Configuration, Wise SetupCapture and Remote Agent Installer) and
package editing tools (Wise MSI Editor, PC Transplant Editor, and Image Explorer) from
the toolbar.
Administration tools
Boot Disk Creator. Use this tool to create boot disk configurations, and
automation and network boot media to image client computers. The Boot Disk Creator
can maintain several different boot disk configurations for different types of network
adapter cards. See Altiris Boot Disk Creator help.
PXE Configuration. After installing the PXE Server, you can create and modify
configurations, which make up the boot menu options that appear on client computers.
This is another another option to boot computers to automation. See the Altiris PXE Configuration help.
Altiris Deployment Solution™ from Symantec User’s Guide77
Remote Agent Installer. Remotely install the Deployment Agent on client
computers from the console. This utility lets you push the agent installation to client
computers from the Deployment Console. DAgent is the default agent for all Windows
platforms.
PC Transplant Editor. Use this tool to edit a Personality Package to add or
remove data. See the Altiris PC Transplant Help located in the Deployment Share.
Image Explorer. After a disk image is saved to the Deployment Share, this
tool lets you view and manage data in the image file. You can edit and split an image,
create an index, and more. See the Altiris Image Explorer help file located in the
Deployment Share.
Wise MSI Editor. Edit .MSI packages generated from the Wise Setup Capture
tool or other .MSI files used to distribute software and other files.
SVS Admin Utility. Create, import, and manage virtual software layers. See
Software Virtualization Solution on page 78.
DeployAnywhere Driver Database Management. Lets you run DeployAnywhere to
create hardware independent images. This functionality is provided by Symantec Ghost
Imaging Foundation (GIF). To add and manage drivers, on the Tools menu, click the
new DeployAnywhere option. To enable this functionality, select the DeployAnywhere
option from the deploy image task. For more information about DeployAnywhere or
Ghost, see the Symantec Ghost Imaging Foundation documentation.
Software Virtualization Solution
Altiris® Software Virtualization™ Solution (SVS™) is a revolutionary approach to
software management. SVS places applications and data into managed units called
virtual software packages. You can use SVS to activate, deactivate, or reset applications
to avoid conflicts between applications without altering the base Windows installation.
The SVS Admin Utility is a part of SVS. It creates, imports, and manages virtual
software layers, which are part of the packages. For information on installing and using
the SVS Admin Utility, see the Software Virtualization Solution Reference Guide.
For information on the integration of the SVS Admin Utility with Deployment Solution,
see Using SVS admin utility with Deployment Solution on page 79.
Altiris Deployment Solution™ from Symantec User’s Guide78
Using SVS admin utility with Deployment Solution
On a Deployment Solution computer, you can capture application and data files. The
installed application, data files, and settings are captured into the virtual software
layers.
The Deployment Solution computer should have a clean installation of the Windows
operating system. The computer should not have any background processes or
programs running that can be captured into the layers. Your base computer should not
be running an antivirus program or any other computer management program. If
possible, the computer should not have an active Internet connection.
You can create layers on a virtual computer. (See Managing the SVS layer on page 177.)
This lets you disconnect a computer from the network and reset the computer after each
capture. This ensures that you have a clean operating system.
You can also distribute .RIPs, .MSI files, scripts, personality settings, and other package
files to computers or groups. See Distributing software on page 175.
Extending the tools menu
You can add commands to the Tools menu on the Deployment Console to quickly access
additional management applications. This lets you easily access applications commonly
used with Deployment Solution.
Commands are added by modifying or adding new .INI files. You can insert commands
to the root ATools.ini file for the main menu or add new .INI files to create submenus.
Place both types of .INI files in the directory where the Deployment Console executable
(eXpress.exe) is located. The default location is Program Files\Altiris\
eXpress\Deployment Server.
You can add up to eight menu items to the main menu, and eight menu items for each
submenu.
These .INI fields are included for each application added to the “Tools > Altiris Tools”
menu:
[Application name or submenu declaration]
MenuText=<the application name displayed in the menu>
Description=<the name displayed when you mouse over the menu item>
WorkDir=<directory set as default when executable is run>
Executable=<path to the executable files>
The ATools.ini file extends the main Tools menu on the console. This sample file
contains one submenu, Web Tools, and two additional menu items, Notepad and
Netmeeting. The .INI files are located in the Deployment Share.
[Submenus]
Web Tools=wtools.ini
[Notepad]
MenuText=Notepad Editor
Description=Simple Editor
Altiris Deployment Solution™ from Symantec User’s Guide79
WorkDir=.
Executable=C:\WINNT\notepad.exe
[NetMeeting]
MenuText=NetMeeting
Description=NetMeeting
WorkDir=.
Executable=C:\Program Files\NetMeeting\conf.exe
Another Tools .INI file is wtools.ini. It is a submenu file referenced by the main
ATools.ini file. On the main menu, this is titled “Web Tools” (see Tools.ini) and contains
two applications, Internet Explorer and Adobe Acrobat.
Use this dialog while creating a computer group filter to filter only the specified
computers in a computer group, or while setting conditions for task sets when running a
job only on the specified computers in a group. See Creating a computer group filter on
page 81 and Setting conditions for task sets on page 151.
Creating conditions to assign jobs
You can set conditions on a scheduled job to run only on the computer devices that
match a defined criteria. As a result, you can create a single job with tasks defined for
computers with varying properties, including the type of the operating system, network
adapters, processors, free disk space, and other computer properties. For each job, you
can now create task sets that are applicable only to the computers matching those
conditions.
Altiris Deployment Solution™ from Symantec User’s Guide80
Click a job in the Jobs pane. The Condition feature appears in the Details
pane. Click Setup to add new conditions or edit existing conditions. When
you are setting conditions to schedule a job, select from a list of predefined
database fields or create custom tokens that key on other fields in the
database.
Creating custom tokens
You can create custom tokens to set conditions based on the database fields that are not
provided in the available preset conditions in the Conditions dialog. Example: Select
User Defined Token from the drop-down list in the Fields box. Select contains in the
Operation field, and enter Milo in the Value field. In the Token field, enter the
following custom token:
with the registered license user named Milo. The job runs only on the computers that
meet the specified criteria.
Filter NameDescription
Active
Computers
Inactive
Computers
Computers With
Faile d Jo bs
Windows 2003
or 2008
Windows XP/
Vista
Windows CE
(PDAs)
LinuxDisplays only the computers with Linux operating systems.
Windows XP
Embedded
Windows CE
.NET
Pocket PC
(PDAs)
%#!computer@lic_os_user%. This filters out only the jobs
Displays all the active computers.
Displays all the inactive computers.
Displays all the computers where jobs have failed to execute.
Displays only the computers with Windows 2003 or 2008
operating systems.
Displays only the computers with Windows XP or Vista operating
systems.
Displays only the computers with Windows CE operating systems.
Displays only the computers with Windows XP Embedded
operating systems.
Displays only the computers with Windows CE .NET operating
systems.
Displays only the Pocket PC computers.
Creating a computer group filter
The Computer Filters dialog displays a list of all computers in a group according to the
specified criteria. Example: You can create a filter to view all the computers in a
particular group that have Windows 2008, 256 MB of RAM, and 20 GB hard disks only.
By applying the filter, you can view all the computers that meet the specified criteria in
the Details pane of the Deployment Console.
Altiris Deployment Solution™ from Symantec User’s Guide81
To create or modify a computer filter
1. Click the All Computers group or any other computer group.
2. On the Filter bar in the Details pane, click Setup > New to create a new filter.
Or
Click Setup > Modify.
3. Type a name for the filter and click Add. The Filter Definition page appears.
4. Define the conditions you want to filter.
Click the Field box to see a list of computer values stored in the Deployment
Database. Select a computer value and set the appropriate operation from the
Operations list. In the Value box, enter an appropriate value for the selected
database field. Example: You can choose Computer Name as the Field, Contains
as the Operation, and Sales as the Value.
5. Repeat to include other conditions. Click OK.
General options
Use the Program Options feature to set the general options for Deployment Solution.
Click Tools > Options to view the Program Options dialog.
Click a computer group in the Computers pane. The Filter feature appears
in the Details pane for the selected computer group. Click Setup to add
new filters, or to modify and delete existing computer filters.
zConsole options
zGlobal options
zTask password options
zDomain accounts options
zRapiDeploy options
zAgent settings options
zCustom data sources options
Console options
Set basic console features for miscellaneous refresh actions and warning messages.
Scan resource files for changes every ____ seconds. Specify how frequently (in
seconds) the Deployment Console updates its view of package files in the Resources
view. See Shortcuts and resources view on page 72.
Warn user when no tasks are assigned to the 'default' condition. When a job is
assigned to computers and the default condition has no tasks assigned, a message
appears. The job has no secondary default tasks assigned if a computer in the group
does not meet the primary conditions. See Setting conditions for task sets on page 151.
Refresh displayed data every ____ seconds. Refresh the display of data accessed
from the Deployment Database. This lets you refresh console data at defined intervals
Altiris Deployment Solution™ from Symantec User’s Guide82
Global options
instead of updating every time the Deployment Console receives a command from the
server, which can be excessive traffic in large enterprises.
Set global options for the Deployment Server system.
Delete history entries older than _____ days. Specify the number of days entries
are kept in the history before they are deleted. Enter any number between 1 and
10,000. If you don’t select this option, log entries remain in the history.
Remove inactive computers after ____ days. Specify the number of days you want
to keep inactive computers in the Deployment Database before they are deleted. The
default value is 30 days, but any number between 1 and 10,000 is valid.
Synchronize display names with computer names. Automatically update the
displayed name of the managed computer names in the console when the client
computer name changes. If this option is not selected, changes to the computer names
are not reflected in the console. Synchronization is off by default. The names do not
have to be synchronized for the Deployment Server to manage the computer.
Reschedule failed image deployment jobs to immediately retry. Immediately
retry a failed image deployment job. The program continues to retry until the job
succeeds or until the job is cancelled.
Client/server file transfer port: _____. Specifies a static TCP port for file transfers
to the clients. The default value is 0 and causes the server to use a dynamic port. This
setting is useful if you have a firewall and need to use a specific port rather than a
dynamically assigned port.
Automatically replace expired trial licenses with available regular licenses. Lets
Deployment Solution automatically assign a permanent license to the computer after the
trial license expires.
Note
Be careful when using this option. Ensure that you do not give a permanent license to
computers you do not want to manage after their trial license expires.
Display Imaging status on console. Displays the status of the imaging job on the
Deployment Console.
Remote control ports. Specifies ports for using the Remote Control feature. You have
the option to enter a primary port address and a secondary port address (Optional).
Remove task passwords when exporting or copying jobs. Specifies that you must
remove the task password when exporting or copying jobs.
Display only computers and jobs the user has rights to manage. Displays only the
computers and jobs that the user has rights to manage. If this option is not selected, all
of the computers and jobs are displayed. If this option is selected when security is
enabled and the logged-on user has administrator rights, all computers and jobs are
displayed. However, if this option is selected when security is enabled and the logged-on
user does not have administrator rights, that user’s view is restricted to see the jobs and
computers that the user only has rights to. A computer is displayed if the logged-on user
has any permission on the computer’s group or if the computer’s group inherits any
permissions from a parent folder.
Altiris Deployment Solution™ from Symantec User’s Guide83
Do not update configuration data on a failed configuration task. If checked, does
not overwrite the data in the Deployment Solution database if a configuration task fails.
The database is not updated until a successful configuration task finishes running.
Primary lookup key(s). Specifies the lookup key type(s) used to associate a new
computer with a managed computer. The options are Serial Number, Asset Tag,
UUID, or MAC Address.
Sysprep Settings. This lets you enter global values for Sysprep. See Sysprep settings
on page 84.
Sysprep settings
View and configure the Sysprep settings for the Deployment Server.
OS product key dialog
In the OS Product Key dialog, select the suitable operating system from the
Operating System drop-down list. After you select the operating system, a list of all
product keys for the selected operating system appears. Select an operating system
from the Operating System drop-down list, and click Add to type the Product Key. You
can type up to 29 characters for the Product Key. The new product key is added to the
list of available keys of the selected operating system.
To modify a product key, select the product key to be modified, and click Edit. To
remove a product key, select the product key to be deleted, and click Remove.
Note
If the product key is being used by another task, you cannot delete the product key. You
are prompted with a message stating that the product key is being used by another
task.
Task password options
According to the network and security properties, the passwords for administrators and
users change after a certain number of days. In such a scenario, the password becomes
invalid and all jobs and tasks using the user name whose password changes must be
modified to use the new password. The Task Password option provides administrators
with a simple option to manage all password changes from a centralized location.
This feature lets you set or change user passwords from a central location, so you can
modify the password for the Copy File to, Distribute Software, Run Script,
Distribute Personality, and Capture Personality tasks when creating or modifying
jobs. However, this tab is enabled only to administrators and select users who have
been granted the appropriate privileges.
The Status field displays the results of password updates. Example: User A’s user name
and password is used in ten tasks. If you want to update the password for these ten
tasks, you can do so through the Task Password option. After the password is
updated, the Status field displays the message: Password for 10 tasks updated.
Domain accounts options
This sign-on feature retrieves the name of the administrator (or the user with
administration rights) and the password for each domain. This feature lets you avoid
Altiris Deployment Solution™ from Symantec User’s Guide84
needing to log on for each managed computer when you run imaging and configuration
jobs.
You can provide the user credentials for the parent domain or a trusted domain in this
window. Deployment Solution supports the UPN and SAM formats, and it accepts either
the parent domain user’s credentials or the domain user’s credentials for any
configuration jobs.
Click Add to enter the Domain name. The Add Domain Account page appears. Enter
the name of the selected domain and provide the administrator credentials. Click OK.
The administrator name and domain are listed in the Domain Accounts list box.
Note
To enter the administrator user name for a Windows XP domain, you must add both the
domain name and the user name. Example: Instead of entering only the user name
jdoe, you must enter domainName\jdoe.
RapiDeploy options
This feature optimizes the multicasting ability of the RapiDeploy application in the
Deployment Server, letting you deploy images to a group of computers simultaneously,
download an image from a file server, or access a local hard drive, and manage the
imaging of several client computers concurrently.
Because RapiDeploy is more efficient when writing directly to the IP address of the
network adapter driver, you can enter a range of IP addresses when using the
multicasting feature for faster computer deployment and management. The Deployment
Server accesses the range of computers using the defined IP pairs and avoids retrieving
the computers through the port and operating system layers.
However, because some network adapter cards do not handle multiple multicast
addresses, you can also identify a range of ports to identify these computers. On the
first pass, the Deployment Server accesses the selected computers using the list of IP
numbers. On the second pass, the Deployment Server accesses the selected computers
using the port numbers or higher level operating system IDs.
Note
Multicasting images are not supported when using the UNDI driver on PXE, and are
disabled on the client.
Click Reset to set the default values.
Agent settings options
These are the default agent settings for new computers. Click Change Default
Settings to change Windows Agents Settings for Windows and DOS. The Change
Default Settings option is enabled only if you select the Force new agents to take
these default settings or the Force new Automation agents to take these
default settings option. Set Deployment Agent settings for new computer accounts or
set Deployment Agent settings for DOS for new computers. See Deployment agent
settings on page 110 and Deployment Agent settings for DOS on page 116.
These default settings are applied only for new client computers that have never
connected to the Deployment Server, and have no information stored in the Deployment
Database. These settings are not for the existing managed computers, nor are these
settings applied when setting properties using the Remote Agent Installer.
Altiris Deployment Solution™ from Symantec User’s Guide85
When the Deployment Agent connects, the Deployment Server verifies if the computer
is a new or an existing computer. If the client computer is new and if the Force new agents to take these default settings option is selected, the Deployment Agent on
the client computer receives the default settings established in the Options > Agent Settings dialog. If the computer is recognized as an existing managed computer, it
uses the existing agent settings. The same process occurs for automation agents if the
Force new Automation agents to take these default settings option is selected.
Force new agents to take these default settings. Select this option to force the
default settings when adding a new computer.
Force new Automation agents to take these default settings. Select this option to
force the default settings when adding a new automation agent connects.
Custom data sources options
This option lets you set up credentials to authenticate to external Deployment
Databases and other Microsoft SQL Server databases to extract data using custom
tokens. Click Add to enter an administrator alias and other login information for the
Microsoft SQL Server (or MSDE) hosting the desired Deployment Database.
The information required to create a custom data source entry is listed below:
Alias. The alias name you want to use when referencing the external SQL database.
Server. The name of the external SQL database server or IP address.
Database. The name of the external database from which you want to extract data.
Use Integrated Authentication. This option authenticates to the external
database using the domain account you are currently logged on as.
User name and Password. When the integrated authentication is not being used,
you must provide a user name and password to authenticate to the external
database.
Allowed Stored Procedures. Click this tab to modify the existing list. See Allowed
stored procedure list on page 86.
Allowed stored procedure list
Click Allowed Stored Procedures to identify the stored procedures from the selected
custom data source. You can now select from the list of available stored procedures in
the data source. This lets you call stored procedures outside of the Deployment
Database (eXpress database) using custom tokens within scripts or answer files.
Virtual centers options
You can keep a list of all VMware Virtual Center Web services. The hosts and virtual
computers from each Virtual Center that have corresponding computers in the
Deployment Database appear in the computer tree. These virtual computers appear
under the Virtual computers node in the Computers pane.
Click Add. On the Virtual Center page, enter the Display name, Server hostname,
and Username. By default, the port number is displayed. You can also set up a
password for the selected user.
Altiris Deployment Solution™ from Symantec User’s Guide86
Security in Deployment Solution
Deployment Solution provides a security system based on associating job and computer
objects with user and group permissions, letting IT personnel be assigned to different
security groups to manage operations on specific computer groups or job folders. Each
security group can perform only a defined scope of deployment operations on each
computer group or job folder. Additionally, each user can be assigned rights to access
general console features. You can also choose whether to specify that scripts on run only
on the Deployment Server.
Note
Security rights and permissions set in one console are enforced in all Deployment
Consoles.
To set general security rights, click Tools > Security and add a user name
and password. You can create users and groups and set scope-based rights.
See Best practices for Deployment Solution security on page 87, Enabling security on
page 88, Setting permissions on page 92, Groups on page 89, and Rights on page 90.
To set feature-based permissions for specific computers or jobs, select the
object in the console, right-click and select Permissions.
Best practices for Deployment Solution security
Deployment Solution is based on defining groups of users and groups of computers and
jobs, and associating one with another. We recommend that you first create user groups
based on administration duties or access to levels of deployment operations. For
example, You probably set up a group with full Administrator rights. This group has
access to run all operations on all computers using all types of jobs. No permissions
need to be set on each computer group or job folders for the Administrator group
because this has full rights to all features and resources.
However, you can also set up a Technician group that has only basic access and
permissions limiting deployment operations. This prohibits members of the group from
re-imaging the Server computer group or scheduling Distribute Disk Image jobs. You
can explicitly Allow or Deny the group from running these operations for each
computer group in the Computers pane or each job folder in the Jobs pane.
After creating the Technician group, you can limit their rights to set General Options and
set permissions on each computer groups and job folder for the group. See General
options on page 82. You can select the computer group, right-click it and select
Permissions. Select the group name in the left pane, and click Allow or Deny for a list
of deployment operations. Example: You can select the Deny check boxes for Restore, Schedule Create Disk Image, and Schedule Distribute Disk Image.
Additional groups can be created with different rights and permissions depending on the
needs and responsibilities in the IT team. If users are assigned to multiple groups, the
Evaluate Permissions and Evaluate Rights features are sorted and display effective
permissions and rights.
Altiris Deployment Solution™ from Symantec User’s Guide87
Enabling security
You can enable security by first creating a group with Administrator rights, adding a user
to the Administrator group, and selecting Enable Security.
Note
When the Administrator Right is selected, you do not need to select any other rights
because the Administrator Right implies that all other rights are selected.
1. Click Tools > Security.
2. Click the Manage User Groups tab and click Add. The Add User Group dialog
3. Select the authentication type. You can add a DS group or a group from the Active
4. Click DS Group.
5. Type a name and description in the Add User Group dialog. Click OK.
The Security dialog appears.
appears.
Directory. To add groups from Active Directory, see Adding groups from the Active
Directory on page 90.
Note
The Browse option is disabled for Local Group.
The group name appears in the window.
6. Select the new group name and click Rights.
7. Select Administrator in the Rights dialog. This assigns complete rights and
permissions to the group. Click OK, and click Close.
8. On the main Security dialog, click the Manage Users tab, and click Add.
The Add User Account dialog appears.
9. Select the authentication type. You can add a DS user or a user from the Active
Directory. To add users from the Active Directory, see Adding users from the Active
Directory on page 89.
10. Select the DS User option in the Add User Account dialog.
Note
The Browse option is disabled for DS User.
11. Type the user name, full name, and password. Retype the password, and enter a
description for the user. Click OK.
12. Select the user name in the main Security dialog. Click Rights.
13. Click the name of the new Administrator group in the Groups window. This assigns
the new user to the new group with Administrator rights. Click OK.
Note
You can assign the user Administrator rights directly, but we recommend you to
assign users to groups. See Best practices for Deployment Solution security on
page 87.
Altiris Deployment Solution™ from Symantec User’s Guide88
14. Now that you have a user with administrator rights, select the Enable Security
box.
Security is now enabled. You can now create users and groups and assign permissions
to computer groups and job folders.
Adding users from the Active Directory
You can add users from the Active Directory.
1. In the main Security dialog, click the Manage Users tab, and click Add.
2. Select the AD User option in the Add User Account dialog.
3. If you know the user name, type it in the User name field, or click Browse to
select the user from the Active Directory.
The password field is deactivated because the user is being added from the Active
Directory.
Note
You can add only one user at a time. To import users, see Importing users from the
Active Directory on page 89.
4. Enter a description for the user in the Description box.
5. Click OK.
Importing users from the Active Directory
You can also import users from the Active Directory. To open a standard Windows Active
Directory dialog, from the main Security dialog, click the Manage Users tab, and click AD Import. Add users from Active Directory, not groups. The users are added to the
Deployment Database. However, you still need to assign the users to security groups
with appropriate rights and permissions.
Groups
Note
When logging on with the imported AD account, Deployment Solution accessed the
Windows Active Directory server to validate the user password.
Evaluate rights
Click Evaluate Rights to identify the combined rights of the selected user and its user
group(s). This feature identifies effective rights for each user by resolving any possible
conflicts between multiple group settings.
Assign the user to previously created groups. If you are enabling security, you can
assign the user to a group with Administration rights.
To add groups, from the Security dialog, click the Manage User Groups tab, and click
Add. Select the authentication type, and type the required details. You can view the
members of any group by clicking the group in the Manage User Groups dialog and
clicking View Members.
See also Best practices for Deployment Solution security on page 87 and Enabling
security on page 88.
Altiris Deployment Solution™ from Symantec User’s Guide89
Adding groups from the Active Directory
You can add users from the Active Directory.
1. In the main Security dialog, click Manage User Groups tab, and click Add.
2. Select AD Group in the Add User Group dialog.
3. If you know the group name, enter it in the Name field, or click Browse to select
the group from the Active Directory. A list of groups, along with their descriptions,
appears in a new dialog. Select a group from the list and click OK.
4. The Name, Domain, and Description are displayed. However, you can modify the
description. Click OK.
The newly added group appears in the main Security dialog.
Importing groups from the Active Directory
You can also import users from the Active Directory. In the main Security dialog, click
the Manage User Groups tab, and click AD Import to open a standard Windows
Active Directory dialog. Add groups from Active Directory. You can choose a domain
from the Domain List, and select a group from the displayed list. The group is added to
the Deployment Database. However, you still need to assign the users to security
groups with appropriate rights and permissions.
DS authentication
Rights
If the user is already in the Deployment Database and tries to access the Deployment
Console, the Deployment Server checks the authentication with the logged on user, and
upon matching does not prompt for user credentials. Similarly, if a group is already
added in the Deployment Database and if a logged-on user, who is a part of the AD
group, tries to access the Deployment Console, the Deployment Server does not prompt
for credentials.
This dialog lets you set general rights for a user or group. To verify, add, or change the
rights assigned to each console user, use the following steps:
1. On the Security page, select a user and click Rights.
2. Click the Rights tab.
3. Select the check box for each right you want to grant.
4. After selecting all applicable rights, click OK to save your changes.
A brief explanation of each Deployment Server right that can be assigned is given
below:
Administrator. Lets the user access all features available on the Deployment
Console. You must have Administrator rights to enable security. See Enabling
security on page 88.
Options Console. Lets you set the view and the Console options. See Console
options on page 82.
Options Global. Lets you set the view and the Global options. See Global options
on page 83.
Altiris Deployment Solution™ from Symantec User’s Guide90
Options Domain Accounts. Lets you set the view and the Domains Accounts
options. See Domain accounts options on page 84.
Options RapiDeploy. Lets you set the view and the RapiDeploy options. See
RapiDeploy options on page 85.
Options Agent Settings. Lets you set the view and the Agent Settings options.
See Agent settings options on page 85.
Options Custom Data Sources. Lets you create Custom Data Sources options.
See Custom data sources options on page 86. You can view, create, and set
database aliases.
Manage Rejected Computers. Lets you view rejected computers in Deployment
Solution and change their status. See Rejected computers in Deployment Solution
on page 94.
Refresh Clients. Lets you refresh Deployment Solution clients. See Refresh
Deployment Solution on page 94. You can use the View > Refresh clients <CTRL
+F5> feature to disconnect and reconnect client computers.
Allow Scheduling on All Computers Group. Lets you schedule jobs on All
Computers. If you have administrator rights, by default, you have the rights to
schedule job on all computers, irrespective of the check box state. You can grant
this right to a specific user or a group.
Import/Export. Lets you import and export jobs and import computers as well.
See Importing and exporting jobs on page 193 and Importing new computers from
a text file on page 100.
Options Task Password. Lets you centrally update passwords for users and
groups so they can access the Copy File to, Distribute Software, Run Script,
Distribute Personality, and Capture Personality tasks. You must have administrative
rights to access this option. See Task password options on page 84.
Use PXE Configuration Utility. Lets you use the PXE Configuration Utility.
Options Virtual Centers. Lets you view and add options for Virtual Centers. See
Virtual centers options on page 86.
Run Script on DS. Lets you choose to run scripts either on the server or on the
client.
Access to Master Return Code. If unchecked, restricts access to the master
return code list. If checked, lets you modify the master return code list.
Allow DeployAnywhere. Lets you run DeployAnywhere to create hardware
independent images. This functionality is provided by Symantec Ghost Imaging
Foundation (GIF). To add and manage drivers, on the Tools menu, click the new
DeployAnywhere option. To enable this functionality, select the DeployAnywhere
option from the deploy image task. For more information about DeployAnywhere or
Ghost, see the Symantec Ghost Imaging Foundation documentation.
Restricting the number of computers
This dialog lets you restrict the maximum number of computers that can be selected.
Restricing the number of computers
1. On the Security page, select a user and click Rights.
2. Click the Restrictions tab.
Altiris Deployment Solution™ from Symantec User’s Guide91
3. Type the maximum number of computers that each job can be scheduled on.
4. Check the box if you want this user to be able to schedule jobs to run immediately.
5. Click OK to save your changes.
Setting permissions
Set permissions for jobs, job folders, computers, and computer groups. See Best
practices for Deployment Solution security on page 87 for additional design tips.
Setting permissions
1. Right-click on a computer group or job folder (or individual computers and jobs) and
select Permissions. The Object Security dialog appears.
2. Click the Groups tab and select a group name. Or click the User tab and select a
user name.
3. From the list in the right pane, select if you want to Accept or Deny permission to
run the operations on the selected computer or job objects. These permissions
include access to remote operations using Deployment Solution and features for
scheduling Deployment tasks. See Remote operations using Deployment Solution on
page 122 and Deployment tasks on page 155.
4. Select the Allow or Deny check box to explicitly set security permissions for these
Deployment Solution features for the selected objects.
Note
Administrators have access to all objects with unrestricted rights and permissions.
You cannot explicitly deny permissions to computer or job objects for users with
administrator rights.
5. To assign permissions to multiple groups, click Set permissions on all child
objects to assign the values without closing the dialog.
Note
You can set permissions for all jobs and computers by clicking in the Jobs pane or
Computers pane without selecting a job or computer object.
Permission rules
Permissions received through different sources may conflict with each other. The
following permission rules determine which permissions are enforced:
Permissions cannot be used to deny the user with Administrator console rights
access to use any console objects or features.
User permissions take precedence over Group permissions.
Deny overrides Allow. When a user is associated with multiple groups, one
group could be allowed a permission at a particular level while the other group
is denied the same permission. In this scenario, the permission to deny the
privilege is enforced.
Permissions do not flow down an object tree. Instead, the object in question
looks in the current location and up the tree, and uses the first permission it
finds.
Altiris Deployment Solution™ from Symantec User’s Guide92
If a console user does not have permissions to run all tasks the job contains,
the user cannot run the job.
Evaluate permissions
Click Evaluate Permissions to identify the combined permissions of groups and
containers with conflicting permissions. This feature identifies effective permissions for
each object by resolving any possible conflicts.
If a job includes multiple tasks and one of the tasks does not have sufficiently assigned
permissions, the whole job fails due to lack of access permissions.
Note
Permissions to schedule jobs also lets a user delete jobs in the Details pane after a job
runs. Example: If a job contains errors and does not run, no other jobs can be
scheduled. The user must delete the job before scheduling a new job.
Connecting to another Deployment Server
From the Deployment Console, you can connect to other Deployment Servers on your
LAN and manage computers outside of the network segment you are currently logged on
to. To open a connection, you must connect to the Deployment Database of the
preferred Deployment Server connection using the ODBC Data Source Administrator.
Click File > Connect to or press CTRL+O to open the Connect to Deployment Server dialog. Enter the required information to connect to the
external Deployment Server connections using an ODBC driver.
Note
Although you are accessing another connection (another Deployment Database),
Windows remembers the last place you browsed to, which would be the Deployment
Share of the previous Deployment Server connection. You need to browse to the new
connection’s Deployment Share to access its shared folder that contains its RIPs,
images, executables, and other resources.
Connecting to a new deployment database
1. Click New. The Define Connection Information dialog appears.
2. Enter a name for the connection to be opened.
3. Establish an ODBC data source.
a. Click ODBC Administrator.
b. Click the System DSN tab, and click Add.
c.Select the SQL Server driver source and click Finish.
d. In the Create a New Data Source to SQL Server dialog, enter a name and
description for the data source.
e. If an entry for your server already exists, select it from the menu. Otherwise,
Altiris Deployment Solution™ from Symantec User’s Guide93
enter the name of the server hosting your remote SQL server in this field. Click
Next.
f.Click Next in the Create a New Data Source to SQL Server dialog to accept
the default settings for authentication.
g. Select the Change the default database to option and select eXpress from
the drop-down list. Click Next.
h. Click Finish. The specifications for the new ODBC data source appear.
i.Click Test Data Source to verify that the source is reachable.
j.Click OK. You return to the main ODBC Data Source Administrator dialog
with your new data source listed in the System DSN tab. Click OK.
4. From the ODBC Data source name drop-down list in the Define Connection
Information dialog, select the new Data Source name you just created.
5. In the Installation Directory path field, enter or browse the full UNC path (or
path using any locally mapped drive) to the directory of the required Deployment
Server, such as:
\\server\express or H:
6. Click OK.
Rejected computers in Deployment Solution
When an unwanted managed client computers attaches to your Deployment Solution
system, you can right-click the computer in the Computers pane and select Advanced
> Reject Connection. You can view these rejected computers by clicking View >
Rejected Computers.
The rejected computers are prohibited from being active in the Deployment Database.
They are identified and rejected by their MAC address.
You can remove computers from the Rejected Computers list by selecting it and clicking
Accept Computer(s). This lets the computer to attach again and be managed by the
Deployment Solution system.
Refresh Deployment Solution
You can refresh the Deployment Console by clicking View > Refresh Console (or
pressing <F5>) to update data from the Deployment Database. You can also click View > Reset Client Connections (or press Ctrl+<F5>) to disconnect and reconnect all
managed computers in a Deployment Server system.
When you refresh the managed client computers, you are asked if you want to
disconnect all computers. Click Yes. This tells the Deployment Agent to shut down and
restart. It also creates additional network traffic when all computers connect and
disconnect. By refreshing the managed client computers, you ensure that you are
viewing the current status and state of all computers resources in your system.
Altiris Deployment Solution™ from Symantec User’s Guide94
Chapter 13
Managing computers
From the Computers pane of a Deployment Solution console, you can identify, deploy,
and manage all computer resources across your organization, including desktop
computers, notebook computers, network and Web servers, and network switches. You
can quickly modify any computer’s configuration settings or view its complete
management history. Or you can take on big projects, such as completely re-image the
hard drive, restore software, and migrate personality settings for a whole department.
You now have management of all your computer resources available from a Windows or
Web console from any location.
All computer resources can be accessed and managed as single computers or organized
into computer groups with similar hardware configurations or deployment requirements,
letting you run deployment jobs or execute operations on multiple computers
simultaneously. You can use search features to locate a specific computer in the
Deployment Database, or set filters to sort computers by type, configuration, operating
system, or other criteria.
Manage with computer icons. Major computer types are identified by a computer icon
in the console, with a list of scheduled jobs and operations associated with each
computer. In the Deployment Console, you can assign and schedule deployment jobs to
computers or groups by dragging the computer icon to a job in the Jobs pane, or vice
versa.
See Viewing computer details on page 96.
Computer icons appear in the Computers pane of the Deployment
Console, where they can be organized into groups. To assign and schedule
a job on a computer in the Deployment Server Console, drag a computer
Add new computers. Deployment Solution lets you add new computer accounts and
set configuration properties for new computers before they are recognized by the
Deployment Server system. Preset computer accounts automatically associate with new
computers when they start up, or can be associated with pre-configured computers.
See Adding new computers on page 98.
icon or group icon to a job icon.
Click New Computer on the console to create a new computer account.
You can also click File > New > Computer or right-click in the
Computers pane and select New Computer.
When the new computer starts up, you can assign it a preset account.
Click New Group on the console to add a new group in the Computers
pane of the Deployment Console. You can also click File > New >
Computer Group or right-click in the Computers pane and select New
Group.
Altiris Deployment Solution™ from Symantec User’s Guide95
Deploy to groups of computers. Organize computers by department, network
container, hardware configuration, software requirements, or any other structure to
meet your needs. You can deploy and provision computers on a mass scale.
To filter computers in a computer group to schedule jobs only to the appropriate
computer types, see Computer filters and job conditions on page 80.
Configure Computer Agents. See the property pages for modifying Deployment Agent
settings.
See Deployment agents on page 109.
View and configure computer properties. You can modify computer settings for
each computer from the console. Or you can view the Computer Properties page for
detailed access to a computer’s hardware, software, and network property settings.
See Computer configuration properties on page 101 and Computer properties on
page 119.
Run remote operations from the console. Perform operations quickly in real time
from a Deployment Console. Restore a computer to a previous state, configure property
settings, send a file, remote control, chat, set security, run deployment jobs, or select
from additional management commands.
See Remote operations using Deployment Solution on page 122.
Build and schedule jobs. Build deployment jobs with one or more management tasks
to run on selected computers. Create jobs, add tasks, and assign the job to computer
groups. Jobs can be organized and assigned for daily tasks or to handle major IT
upgrades.
See on page 145.
Manage Servers. Deployment Solution also manages network or Web servers to
administrate high-density server farms or server network resources across your
organization.
See the Deployment Solution Reference Guide.
Viewing computer details
In Deployment Solution, a computer resource is identified in the console with a
distinctive icon to display the computer type — Windows desktop or notebook, server, or
Linux operating system — and its current status. These computer icons change to
convey the state of the computer, such as the log on status, server waiting status, or
user with a timed license status. You can also view the status of the jobs assigned to the
selected computer in the Details pane of a Deployment Console.
See Viewing job details on page 145.
The following is a sample list of computer icons displayed in each Deployment Console,
identifying the computer type and state.
A computer connected to the Deployment Server with a user logged on.
Altiris Deployment Solution™ from Symantec User’s Guide96
A computer connected to the Deployment Server, but the user is not logged
on.
A computer with a time-limited user license and a user logged on.
A computer not currently connected to the Deployment Server, but known to
the Deployment Database.
A pre-configured computer with values defined in advance using the New
Computer feature. As soon as the computer connects, the Deployment
Server recognizes the new computer and this icon appears. See Adding new
computers on page 98.
A managed computer waiting for user interaction before running deployment
tasks. This icon appears if the Workstations check box is selected in Initial
Deployment. See Sample jobs on page 196.
A computer identified as a master computer used to broadcast images to
other client computers.
A managed server connected to the Deployment Server with a user logged
on. Additional icons identify different states of server deployment.
A managed Linux computer connected to the Deployment Server with a user
logged on. Additional icons identify different states of Linux computer
deployment.
Physical view of Rack/Enclosure/Bay components for high-density
server systems. These icons appear as physical representations to
allow management of different levels of the server structure. In
addition, server icons identify logical server partitions. See Bay on
Select the New Computers or All Computers group to run jobs or
operations for these default groups identified by an icon in the Computers
pane.
page 121 for properties and rules to deploy Rack/Enclosure/Bay
servers.
Additional computer groups can be added to the Computers pane to
organize similar computer types or to list computers of similar departments
or locations. Click the New Group icon on the toolbar or select File > New >
Altiris Deployment Solution™ from Symantec User’s Guide97
Computer Group to create a new group.
See also Deployment agents on page 109.
Adding new computers
Computers can be added to the Deployment Database using the following methods:
zInstall the Deployment Agent. If you install the Deployment Agent to a computer
with the operating system already installed, the computer is added automatically to
the Deployment Database at startup. New computers with the Deployment Agent
installed are added to the All Computers groups (unless otherwise specified in the
Deployment Agent configuration). You can move the computer to another group if
required.
zUse Initial Deployment to configure and deploy new computers booting to
automation. Starting up a new computer with the Automation Agent lets you
image the hard drive, assign IP and network settings, distribute personal settings
and software, and install the Deployment Agent for new computers. Using Initial
Deployment, you can associate new computers with pre-configured computer
accounts. These newly configured computers appear in the New Computers group.
See Sample jobs on page 196.
zCreate or import computer accounts from the Deployment Console. You can
add new computers using the New Computer feature or import computers using a
delimited text file. You can pre-configure computer accounts by adding names and
network settings from the console. See Creating a new computer account on
page 99.
About new computers
When a new computer starts up, if Deployment Server recognizes the MAC address
provided in a New Computer account or import file, it automatically associates the user
account at startup with the New Computer icon. If this value is not provided, the
computer appears as a pre-configured computer account, letting you associate it with a
new computer.
The New Computer icon appears for a new computer if the MAC Address is
provided when creating a new computer account using any import or new
computer account feature.
A pre-configured computer account icon appears if specific hardware data
(MAC Address) is not known. As soon as the computer starts up and is
associated with a pre-configured computer account, Deployment Server
recognizes the new computer and this icon appears.
Pre-configured computer account
A pre-configured computer account can be associated with a new computer using the
Initial Deployment feature. You can create multiple pre-configured computer accounts
and associate the account with a new computer when it boots to automation. At startup,
the configuration settings and jobs assigned to the pre-configured computer account can
be associated with the new computer.
Deployment Solution provides features to create a pre-configured computer account to
pre-define a computer’s configuration settings and assign customized jobs to that
Altiris Deployment Solution™ from Symantec User’s Guide98
computer even if you do not know that computer's MAC address. This type of computer
is known as a pre-configured computer account.
Pre-configured computer accounts offer a lot of power and flexibility, especially when
you need to deploy several computers to individual users with specific needs. Preconfiguring a computer account saves your time because you can configure the
computer before it arrives on site. You can set up as much configuration information
(such as computer name, workgroup name, and IP address) as you have about the
computer and apply it to the new computer when it comes online. You can also prepare
jobs prior to the arrival of the new computer to deploy the computer using customized
images, .MSIs, and .RIPs, based on a user's specific needs.
Example: A user might request Windows 2003 with Office and virus scanning software
installed on the new computer. The user also might request that the computer
personality (customized user settings, address books, bookmarks, familiar desktop
settings) be migrated from the old system. You can build any job, including any of the
available tasks, and assign it to a pre-configured computer account.
When the new computer finally arrives, you are ready to deploy it because you have
done all the work in advance. Boot the client computer to automation, and the new
computer can connect to the server and become a managed computer. Now you can
perform an Initial Deployment or run a deployment imaging job on the new computer.
Creating a new computer account
You can create computer accounts for individual computers or for computer groups.
When creating new accounts for computer groups, you can automatically assign new
names and associate them with existing computer groups or the New Computer group.
Click the New Computer icon on the console to create a new computer
account. You can also click File > New > Computer or right-click in the
Computers pane and select New Computer.
To create a new computer account
1. In the New Computers dialog, click Add. The New Computer Properties page
appears.
2. Enter names and configuration settings for each new computer account using the
Computer Configuration screens. See Computer configuration properties on
page 101 for a description of the configuration settings.
Note
If you do not enter a MAC address, the computer you create or import becomes a
virtual computer.
3. (Optional) Click Import to add new computers from a delimited text file. See
Importing new computers from a text file on page 100.
4. Click OK.
A pre-configured computer account icon appears in the Computers pane.
When a new computer starts up, you can assign it to this preset account.
Altiris Deployment Solution™ from Symantec User’s Guide99
To create and associate multiple computer accounts
You can create computer accounts and automatically assign predefined names. These
computer accounts can be associated with computers in a selected computer group.
1. Select a computer group, including the New Computers group (empty groups
cannot access features). Right-click and select the Configure command. The
Computer Configuration Properties dialog appears.
2. Enter names and configuration settings for each new computer account using the
Computer Configuration screens. See Computer configuration properties on
page 101.
3. (Optional) Click the Microsoft Networking category and click Define Range.
a. In the Fixed text field, enter a base computer name. Example: Sales.
b. In the Range start field, enter a numeral or letter to add to the Fixed Text
name. This creates a unique name for a group of computers starting with the
specified character. The range of numerals and letters is assigned to the
computer name. Example: Enter 3.
c.Select Append to add the range of numerals after the computer name. Clear
the check box to add names before the computer name.
In the above example, the Result field displays computer names beginning
with Sales3 and ending with Sales12.
4. Click Associate. You can now associate computers in a group (including the New
Computers group) with the multiple computer accounts.
5. Click OK.
Importing new computers from a text file
You can import computer configuration data using delimited text files (.TXT, .CSV, or
.IMP files) to establish multiple computer accounts in the Deployment Server database.
This file contains all configuration data for a new computer, including all settings in the
Computer Properties of a selected computer. See Computer properties on page 119.
1. Click File > Import/Export > Import Computers.
A dialog appears, letting you select import files. These files can have .XML, .TXT,
.CSV, or .IMP extensions.
2. Select the import file. Click Open.
If a correctly formatted computer import file is selected, a message appears,
informing you that the computer import is complete and identifying the number of
computers added. Click OK.
New computers appear as pre-configured computer accounts in the Computers
pane of the console (as single computers or in groups), and any jobs imported from
the import file are listed in the Jobs pane.
Note
Jobs can be added to the import file. They can be created and associated with the
new computers.
If the computer import file is incorrectly formatted, a warning appears, stating that
the computer import file is incorrect.
Altiris Deployment Solution™ from Symantec User’s Guide100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.