This website uses cookies to ensure you get the best experience on our website. Learn more
Things to do before a Capture
Doing a Capture and creating a new image to deploy to your clients is quite straight forward with Specops Deploy (and also a clean MDT, this is not Specops Deploy specific).
Just install a client, patch it and then do a capture. Though, there is a few extra things I always do before a capture.
Delete these folders if they exist;
C:MININT
C:_SMSTaskSequence
C:SYSPREP
C:WindowsTempDeploymentLogs
That’s to clean up up from the installation, and we don’t need or want those folders to be distributed to all our clients when we apply the image. And the DeploymentLogs folder should really not be there, if you want to use that in a WMI GPO Filtering as described here Post OS installation tasks.
And we have had some random reports where captures were failing which turned out was because of Windows Defender (Windows 7) so now I’m always stopping the Windows Defender (WinDefend) service before doing a capture.
@Echo off if exist c:MININT rmdir /S /Q c:MININT if exist c:SYSPREP rmdir /S /Q c:SYSPREP if exist c:_SMSTaskSequence rmdir /s /q C:_SMSTaskSequence if exist c:WindowsTempDeploymentLogs rmdir /s /q c:WindowsTempDeploymentLogs net stop WinDefend #End of script
Save it as \serversharePre-Capture.bat and run before starting the capture process.
Updated 2012-01-12: Added SYSPREP Folder to cleanup.
(Last updated on December 3, 2024)
Related Articles
-
Active Directory weak password checker
One of the most important things that system administrators can do to keep their network resources secure is to require users to use strong passwords. After all, long and complex passwords are far less prone to being breached than simpler passwords are. Microsoft has long provided group policy settings that administrators can use to mandate…
Read More -
Death of the password? It’s only 60!
We marked our calendars, counting down the months, days, and minutes. Now, the day we’ve all been waiting for is here: the 60th anniversary of the computer password! Since its beginning in an MIT lab in the fall of 1961, we’ve developed a complex relationship with the password – even the inventor of the computer…
Read More -
Five strategy recommendations for planning a password policy
An Active Directory full of strong, non-compromised passwords should be an essential cybersecurity goal for every organization. A clearly articulated and enforceable password policy strategy is the best way to put this into practice. However, it’s important to tailor your password to align with your organization’s broader mission, objectives, and the principles of managing information…
Read More