Things to do before a Capture

Doing a Capture and creating a new image to deploy to your clients is quite straight forward with Specops Deploy (and also a clean MDT, this is not Specops Deploy specific).

Just install a client, patch it and then do a capture. Though, there is a few extra things I always do before a capture.

Delete these folders if they exist;
C:MININT
C:_SMSTaskSequence
C:SYSPREP
C:WindowsTempDeploymentLogs

That’s to clean up up from the installation, and we don’t need or want those folders to be distributed to all our clients when we apply the image. And the DeploymentLogs folder should really not be there, if you want to use that in a WMI GPO Filtering as described here Post OS installation tasks.

And we have had some random reports where captures were failing which turned out was because of Windows Defender (Windows 7) so now I’m always stopping the Windows Defender (WinDefend) service before doing a capture.

@Echo off
if exist c:MININT rmdir /S /Q c:MININT 
if exist c:SYSPREP rmdir /S /Q c:SYSPREP 
if exist c:_SMSTaskSequence rmdir /s /q C:_SMSTaskSequence
if exist c:WindowsTempDeploymentLogs rmdir /s /q c:WindowsTempDeploymentLogs
net stop WinDefend 

#End of script

Save it as \serversharePre-Capture.bat and run before starting the capture process.

Updated 2012-01-12: Added SYSPREP Folder to cleanup.

(Last updated on December 3, 2024)

Back to Blog

Related Articles

  • Active Directory weak password checker

    One of the most important things that system administrators can do to keep their network resources secure is to require users to use strong passwords. After all, long and complex passwords are far less prone to being breached than simpler passwords are. Microsoft has long provided group policy settings that administrators can use to mandate…

    Read More
  • Death of the password? It’s only 60!

    We marked our calendars, counting down the months, days, and minutes. Now, the day we’ve all been waiting for is here: the 60th anniversary of the computer password!  Since its beginning in an MIT lab in the fall of 1961, we’ve developed a complex relationship with the password – even the inventor of the computer…

    Read More
  • Five strategy recommendations for planning a password policy

    An Active Directory full of strong, non-compromised passwords should be an essential cybersecurity goal for every organization. A clearly articulated and enforceable password policy strategy is the best way to put this into practice. However, it’s important to tailor your password to align with your organization’s broader mission, objectives, and the principles of managing information…

    Read More