Imaging with Ghost

The University of Findlay's College of Education

Post Configuration

When a model computer is used to create an image, all settings on the computer are saved as part of the image. This includes the computer name, SID (Security Identifier used in NT and 2000), and IP number. On a network, this is a problem because no two machines can have the same name or IP number.

The IP number problem can be eliminated if a DHCP server is used to distribute IP numbers. If this is the case, each computer has the same settings

Obtain an IP address automatically

and the server makes sure each IP number is only passed out once. There is not a similar solution to solve the problem of duplicate computer names or SIDs.

Fortunately there is a way within the imaging software to handle this problem. The imaging software can do a "post configuration" on the machine once the imaging process is complete.

Post Configuration - ImageCast

Each imaging software handles the post configuration process differently. With ImageCast, a post configuration must be planned before the image is created. When the model machine is ready to be imaged, the last step before creating the image is to setup the post configuration client.

After running the post configuration client, shut the machine down and proceed with the standard image creation routine. The newly created image will have a setting inbedded that will be triggered the first time the operating system is initiated.

Use the control center software to create a post configuration file. Set the imaging software to use this post configuration file when deploying the newly created image.

Post Configuration - Ghost

With Ghost a program called Ghost Walker (GHSTWALK.EXE) is used after the imaging restoration process. No special pre-processing has to be done before Ghost Walker can be used. Simply run the program after imaging, and use the menu to complete the post configuration process. The limitation to Ghost Walker is that it can only change the SID and the Computer Name. Fortunately those are two very important pieces in the post configuration puzzle, and you should need to change much more to get up and running with a unique computer on your network.