Windows Image Writer Tool

Image Writer for Microsoft Windows Release 1.0.0 - The 'Holy cow, we made a 1.0 Release' release. About: This utility is used to read and write raw image files to SD and USB memory devices. Simply run the utility, point it at your raw image, and then select the removable device to write to. This utility can not write CD-ROMs. Click the Windows START button, and click WINDOWS USB/DVD DOWNLOAD TOOL in the ALL PROGRAMS list to open the Windows USB/DVD Download Tool. In the SOURCE FILE box, type the name and path of your Windows ISO file, or click BROWSE and select the file from the OPEN dialog box. Image Writer in Launchpad Registered 2009-04-19 by Michael Casadevall This tool is used for writing images to USB sticks or SD/CF cards on Windows. This program was initially written to fill a need for Ubuntu Jaunty (9.04) Netbook Remix. Win32 Disk Imager is a simple open source application that writes CD or DVD image files to a USB or SD card, creating a virtual disk drive. Just unzip the program (no installation required), select the image you want to create from your hard drive and finally the device where you want it written to, and that's it, in a few seconds your pen drive or your memory card will become a virtual CD.

  1. Usb Image Writer Windows 10
  2. Windows Image Writer Tool Download
  3. Disk Image Writer Windows

ISO file is needed to be burnt properly in order to extract the files and data compressed in it. Basically, an ISO file is the archive of information zipped in a single place. Usually, people need to burn ISO image files to USB or CD/DVD to make bootable disk to fix system bugs or run the installer of third-party software from external sources.

The basic myth about burning ISO to USB is that you can achieve it by simply copying the ISO file into the USB drive. Well, that's not true at all. This is not called ISO burning and there's no way on earth that could extract the details from image file. It must be burnt properly into a USB drive or CD/DVD in order to read or modify the files. After that, you should be able to run the installer from that ISO image. In this guide, we will show you the most favorite ways to burn ISO to USB by using free and premium tools.

ISO to USB Burning Tool 1: Active ISO Burner

Active ISO burner is a free ISO burning tool that can easily assist to burn ISO image files into CD or USB flash drives easily. It is developed by the Soft Technologies team which is pretty popular for making open source tools. Moreover, you don't even need to install this program to run it. Just download and it is ready to use.

Step 1: Go to the official Active ISO burner website and download the file for free.
Step 2 : Double click on the downloaded file to launch it on your computer.
Step 3 : Insert the USB flash drive and wait for the program to show it automatically.
Step 4 : Now, choose the ISO image from your computer and open it. When all the settings are up to the mark, you can click on 'Burn' to finish the task.

It will take several minutes but the job will be done eventually. Unfortunately, Active ISO burner doesn't work with Windows 64-bit and is extremely slow program. If you are not interested in this tool then hop to the next one.

ISO to USB Burning Tool 2: PassMoz LabISO (Bootable)

Everyone likes elegant tool that can be used without following complex instruction at all. Well, PassMoz LabISO is one of those programs that can comfortably make a bootable USB drive from ISO file even if you had zero technical skills. PassMoz team has devoted their entire life building on technical software that helps people on critical times.

So, if you want to make a bootable disk from an ISO image file, then simply install LabISO. It is 24X times faster than any ISO burner available online. It offers to burn the ISO image file in several partition formats like NTFS, FAT16, FAT32, etc. and the best part is that it is compatible with every Windows operating system version.

Step 1: Download and run the installer file of PassMoz LabISO. The program should be installed quickly within few moments. Next, launch the program as administrator.

Step 2: Plug in the USB thumb drive to PC and the program will automatically recognize the device. You can repeat the same process with CD/DVD as well.

Step 3: Then, choose the ISO image file from the computer by clicking 'Browse' and open it. Customize the preferred settings and hit 'Start Burn' button to burn the ISO image file into the flash drive. Soon enough, the ISO file will be mounted easily into the flash drive and it should be ready to use.

Like we mentioned, PassMoz LabISO is the most favorite and preferable Windows bootable USB creation tool available on the internet. Why not just giving it a try if other tools failed to work.

ISO to USB Burning Tool 3: Free ISO Burner

Free ISO burner is yet another great ISO burning tool. It is liter in size and free to use. It offers to burn both CD/DVD as well as flash drives. It is very outdated so many users already reported the inability of this program. Yet, you can give it a fair try as per your wish.

Step 1: Download the software from free ISO burner website and run the tool. No installation is required.
Step 2 : Insert the flash drive and it should be detected automatically by the tool. It's a bit slower tool, so this process may take some time.
Step 3 : Next, open the ISO image file from the computer and click on 'Burn' to complete this task. All the data should be written to the USB flash driver now.

Conclusion:

Although, we have mentioned 3 amazing tools to burn ISO to USB flash drive. But, feature wise we do recommend PassMoz LabISO for its effectiveness. There's no ISO image file in the internet that LabISO can't write or read. It is a very powerful and handy program that every computer user must own.

-->

Applies to

  • Windows 10

Creating a reference image is important because that image serves as the foundation for the devices in your organization. In this topic, you will learn how to create a Windows 10 reference image using the Microsoft Deployment Toolkit (MDT). You will create a deployment share, configure rules and settings, and import all the applications and operating system files required to build a Windows 10 reference image. After completing the steps outlined in this topic, you will have a Windows 10 reference image that can be used in your deployment solution.

Note

See Prepare for deployment with MDT for more information about the server, client, and network infrastructure used in this guide.

For the purposes of this topic, we will use three computers: DC01, MDT01, and HV01.

  • DC01 is a domain controller for the contoso.com domain.
  • MDT01 is a contoso.com domain member server.
  • HV01 is a Hyper-V server that will be used to build the reference image.

Computers used in this topic.

The reference image

The reference image described in this guide is designed primarily for deployment to physical devices. However, the reference image is typically created on a virtual platform, before being automatically run through the System Preparation (Sysprep) tool process and captured to a Windows Imaging (WIM) file. The reasons for creating the reference image on a virtual platform are the following:

  • To reduce development time and can use snapshots to test different configurations quickly.
  • To rule out hardware issues. You simply get the best possible image, and if you have a problem, it's not likely to be hardware related.
  • To ensures that you won't have unwanted applications that could be installed as part of a driver install but not removed by the Sysprep process.
  • The image is easy to move between lab, test, and production.

Set up the MDT build lab deployment share

With Windows 10, there is no hard requirement to create reference images. However, to reduce the time needed for deployment, you might want to create a reference image that contains a few base applications as well as all of the latest updates. This section will show you how to create and configure the MDT Build Lab deployment share to create a Windows 10 reference image. Because reference images will be deployed only to virtual machines during the creation process and have specific settings (rules), you should always create a separate deployment share specifically for this process.

Create the MDT build lab deployment share

On MDT01:

  • Sign in as contosoadministrator using a password of pass@word1 (credentials from the prepare for deployment topic).

  • Start the MDT deployment workbench, and pin this to the taskbar for easy access.

  • Using the Deployment Workbench, right-click Deployment Shares and select New Deployment Share.

  • Use the following settings for the New Deployment Share Wizard:

    • Deployment share path: D:MDTBuildLab
    • Share name: MDTBuildLab$
    • Deployment share description: MDT Build Lab
  • Accept the default selections on the Options page and click Next.

  • Review the Summary page, click Next, wait for the deployment share to be created, then click Finish.

  • Verify that you can access the MDT01MDTBuildLab$ share.

    The Deployment Workbench with the MDT Build Lab deployment share.

Enable monitoring

To monitor the task sequence as it happens, right-click the MDT Build Lab deployment share, click Properties, click the Monitoring tab, and select Enable monitoring for this deployment share. This step is optional.

Configure permissions for the deployment share

In order to read files in the deployment share and write the reference image back to it, you need to assign NTSF and SMB permissions to the MDT Build Account (MDT_BA) for the D:MDTBuildLab folder

On MDT01:

  1. Ensure you are signed in as contosoadministrator.

  2. Modify the NTFS permissions for the D:MDTBuildLab folder by running the following command in an elevated Windows PowerShell prompt:

Add setup files

Usb Image Writer Windows 10

This section will show you how to populate the MDT deployment share with the Windows 10 operating system source files, commonly referred to as setup files, which will be used to create a reference image. Setup files are used during the reference image creation process and are the foundation for the reference image.

Add the Windows 10 installation files

MDT supports adding both full source Windows 10 DVDs (ISOs) and custom images that you have created. In this case, you create a reference image, so you add the full source setup files from Microsoft.

Note

Due to the Windows limits on path length, we are purposely keeping the operating system destination directory short, using the folder name W10EX64RTM rather than a more descriptive name like Windows 10 Enterprise x64 RTM.

Add Windows 10 Enterprise x64 (full source)

On MDT01:

  1. Sign in as contosoadministrator and copy the content of a Windows 10 Enterprise x64 DVD/ISO to the D:DownloadsWindows 10 Enterprise x64 folder on MDT01, or just insert the DVD or mount an ISO on MDT01. The following example shows the files copied to the D:Downloads folder, but you can also choose to import the OS directly from an ISO or DVD.

  2. Using the Deployment Workbench, expand the Deployment Shares node, and then expand MDT Build Lab.

  3. Right-click the Operating Systems node, and create a new folder named Windows 10.

  4. Expand the Operating Systems node, right-click the Windows 10 folder, and select Import Operating System. Use the following settings for the Import Operating System Wizard:

    • Full set of source files
    • Source directory: (location of your source files)
    • Destination directory name: W10EX64RTM
  5. After adding the operating system, in the Operating Systems / Windows 10 folder, double-click it and change the name to: Windows 10 Enterprise x64 RTM Default Image. See the following example.

Depending on the DVD you used, there might be multiple editions available. For the purposes of this guide, we are using the Windows 10 Enterprise image, but other images will also work.

Add applications

Before you create an MDT task sequence, you need to add any applications and scripts you wish to install to the MDT Build Lab share.

On MDT01:

First, create an MDT folder to store the Microsoft applications that will be installed:

  1. In the MDT Deployment Workbench, expand Deployment Shares MDT Build Lab Applications
  2. Right-click Applications and then click New Folder.
  3. Under Folder name, type Microsoft.
  4. Click Next twice, and then click Finish.

The steps in this section use a strict naming standard for your MDT applications.

  • Use the 'Install - ' prefix for typical application installations that run a setup installer of some kind,
  • Use the 'Configure - ' prefix when an application configures a setting in the operating system.
  • You also add an ' - x86', ' - x64', or '- x86-x64' suffix to indicate the application's architecture (some applications have installers for both architectures).

Using a script naming standard is always recommended when using MDT as it helps maintain order and consistency.

By storing configuration items as MDT applications, it is easy to move these objects between various solutions, or between test and production environments.

In example sections, you will add the following applications:

  • Install - Microsoft Office 365 Pro Plus - x64
  • Install - Microsoft Visual C++ Redistributable 2019 - x86
  • Install - Microsoft Visual C++ Redistributable 2019 - x64

The 64-bit version of Microsoft Office 365 Pro Plus is recommended unless you need legacy app support. For more information, see Choose between the 64-bit or 32-bit version of Office

Download links:

Download all three items in this list to the D:Downloads folder on MDT01.

Note: For the purposes of this lab, we will leave the MSVC files in the D:Downloads folder and the Office365 files will be extracted to a child folder. If you prefer, you can place each application in its own separate child folder and then modify the $ApplicationSourcePath below as needed (instead of just D:Downloads).

Note

All the Microsoft Visual C++ downloads can be found on The latest supported Visual C++ downloads. Visual C++ 2015, 2017 and 2019 all share the same redistributable files.

Windows Image Writer Tool Download

Create configuration file: Microsoft Office 365 Professional Plus x64

  1. After downloading the most current version of the Office Deployment tool from the Microsoft Download Center using the link provided above, run the self-extracting executable file and extract the files to D:DownloadsOffice365. The Office Deployment Tool (setup.exe) and several sample configuration.xml files will be extracted.

  2. Using a text editor (such as Notepad), create an XML file in the D:DownloadsOffice365 directory with the installation settings for Microsoft 365 Apps for enterprise that are appropriate for your organization. The file uses an XML format, so the file you create must have an extension of .xml but the file can have any filename.

    For example, you can use the following configuration.xml file, which provides these configuration settings:

    • Install the 64-bit version of Microsoft 365 Apps for enterprise in English directly from the Office Content Delivery Network (CDN) on the internet. Note: 64-bit is now the default and recommended edition.
    • Use the Semi-Annual Channel and get updates directly from the Office CDN on the internet.
    • Perform a silent installation. You won’t see anything that shows the progress of the installation and you won’t see any error messages.

    By using these settings, any time you build the reference image you’ll be installing the most up-to-date Semi-Annual Channel version of Microsoft 365 Apps for enterprise.

Tip

You can also use the web-based interface of the Office Customization Tool to help you create your configuration.xml file.

Also see Configuration options for the Office Deployment Tool and Overview of the Office Deployment Tool for more information.

  1. Ensure the configuration.xml file is in the D:DownloadsOffice365 folder. See the following example of the extracted files plus the configuration.xml file in the DownloadsOffice365 folder:

Assuming you have named the file 'configuration.xml' as shown above, we will use the command 'setup.exe /configure configuration.xml' when we create the application in MDT. This will perform the installation of Microsoft 365 Apps for enterprise using the configuration settings in the configuration.xml file. Do not perform this step yet.

Important

After Microsoft 365 Apps for enterprise is installed on the reference image, do NOT open any Office programs. if you open an Office program, you are prompted to sign-in, which activates the installation of Microsoft 365 Apps for enterprise. Even if you don't sign in and you close the Sign in to set up Office dialog box, a temporary product key is installed. You don't want any kind of product key for Microsoft 365 Apps for enterprise installed as part of your reference image.

Additional information

  • Microsoft 365 Apps for enterprise is usually updated on a monthly basis with security updates and other quality updates (bug fixes), and possibly new features (depending on which update channel you’re using). That means that once you’ve deployed your reference image, Microsoft 365 Apps for enterprise will most likely need to download and install the latest updates that have been released since you created your reference image.

  • Note: By using installing Office Deployment Tool as part of the reference image, Microsoft 365 Apps for enterprise is installed immediately after the reference image is deployed to the user’s device, rather than including Office apps part of the reference image. This way the user will have the most up-to-date version of Microsoft 365 Apps for enterprise right away and won’t have to download any new updates (which is most likely what would happen if Microsoft 365 Apps for enterprise was installed as part of the reference image.)

  • When you are creating your reference image, instead of installing Microsoft 365 Apps for enterprise directly from the Office CDN on the internet, you can install Microsoft 365 Apps for enterprise from a location on your local network, such as a file share. To do that, you would use the Office Deployment Tool in /download mode to download the installation files to that file share. Then you could use the Office Deployment Tool in /configure mode to install Microsoft 365 Apps for enterprise from that location on to your reference image. As part of that, you’ll need to point to that location in your configuration.xml file so that the Office Deployment Tool knows where to get the Microsoft 365 Apps for enterprise files. If you decide to do this, the next time you create a new reference image, you’ll want to be sure to use the Office Deployment Tool to download the most up-to-date installation files for Microsoft 365 Apps for enterprise to that location on your internal network. That way your new reference image will have a more up-to-date installation of Microsoft 365 Apps for enterprise.

Connect to the deployment share using Windows PowerShell

If you need to add many applications, you can take advantage of the PowerShell support that MDT has. To start using PowerShell against the deployment share, you must first load the MDT PowerShell snap-in and then make the deployment share a PowerShell drive (PSDrive).

On MDT01:

  1. Ensure you are signed in as contosoAdministrator.

  2. Import the snap-in and create the PSDrive by running the following commands in an elevated PowerShell prompt:

Tip

Use 'Get-Command -module MicrosoftDeploymentToolkit' to see a list of available cmdlets

Create the install: Microsoft Office 365 Pro Plus - x64

In these steps we assume that you have downloaded the Office Deployment Tool. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to D:DownloadsOffice365.

On MDT01:

  1. Ensure you are signed on as contosoAdministrator.

  2. Create the application by running the following commands in an elevated PowerShell prompt:

    Upon successful installation the following text is displayed:

Windows Image Writer Tool

Create the install: Microsoft Visual C++ Redistributable 2019 - x86

Note

We have abbreviated 'Microsoft Visual C++ Redistributable' in the $ApplicationName below as 'MSVC' to avoid the path name exceeding the maxiumum allowed length of 248 characters.

In these steps we assume that you have downloaded Microsoft Visual C++ Redistributable 2019 - x86. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to D:Downloads.

On MDT01:

  1. Ensure you are signed on as contosoAdministrator.

  2. Create the application by running the following commands in an elevated PowerShell prompt:

    Upon successful installation the following text is displayed:

Create the install: Microsoft Visual C++ Redistributable 2019 - x64

In these steps we assume that you have downloaded Microsoft Visual C++ Redistributable 2019 - x64. You might need to modify the path to the source folder to reflect your current environment. In this example, the source path is set to D:Downloads.

On MDT01:

  1. Ensure you are signed on as contosoAdministrator.

  2. Create the application by running the following commands in an elevated PowerShell prompt:

Create the reference image task sequence

In order to build and capture your Windows 10 reference image for deployment using MDT, you will create a task sequence. The task sequence will reference the operating system and applications that you previously imported into the MDT Build Lab deployment share to build a Windows 10 reference image.After creating the task sequence, you configure it to enable patching against the Windows Server Update Services (WSUS) server. The Task Sequence Windows Update action supports getting updates directly from Microsoft Update, but you get more stable patching if you use a local WSUS server. WSUS also allows for an easy process of approving the patches that you are deploying.

Drivers and the reference image

Because we use modern virtual platforms for creating our reference images, we don’t need to worry about drivers when creating reference images for Windows 10. We use Hyper-V in our environment, and Windows Preinstallation Environment (Windows PE) already has all the needed drivers built-in for Hyper-V.

Create a task sequence for Windows 10 Enterprise

To create a Windows 10 reference image task sequence, the process is as follows:

On MDT01:

  1. Using the Deployment Workbench, under Deployment Shares > MDT Build Lab right-click Task Sequences, and create a New Folder named Windows 10.
  2. Right-click the new Windows 10 folder and select New Task Sequence. Use the following settings for the New Task Sequence Wizard:
    1. Task sequence ID: REFW10X64-001
    2. Task sequence name: Windows 10 Enterprise x64 RTM Default Image
    3. Task sequence comments: Reference Build
    4. Template: Standard Client Task Sequence
    5. Select OS: Windows 10 Enterprise x64 RTM Default Image
    6. Specify Product Key: Do not specify a product key at this time
    7. Full Name: Contoso
    8. Organization: Contoso
    9. Internet Explorer home page: http://www.contoso.com
    10. Admin Password: Do not specify an Administrator Password at this time

Edit the Windows 10 task sequence

The steps below walk you through the process of editing the Windows 10 reference image task sequence to include the actions required to update the reference image with the latest updates from WSUS, install roles and features, and utilities, and install Microsoft Office365 ProPlus x64.

On MDT01:

  1. In the Task Sequences / Windows 10 folder, right-click the Windows 10 Enterprise x64 RTM Default Image task sequence, and select Properties.
  2. On the Task Sequence tab, configure the Windows 10 Enterprise x64 RTM Default Image task sequence with the following settings:
    1. State Restore > Windows Update (Pre-Application Installation) action: Enable this action by clicking the Options tab and clearing the Disable this step check box.

    2. State Restore > Windows Update (Post-Application Installation) action: Also enable this action.

    3. State Restore: After the Tattoo action, add a new Group action (click Add then click New Group) with the following setting:

      • Name: Custom Tasks (Pre-Windows Update)
    4. State Restore: After Windows Update (Post-Application Installation) action, rename Custom Tasks to Custom Tasks (Post-Windows Update).

      • Note: The reason for adding the applications after the Tattoo action but before running Windows Update is simply to save time during the deployment. This way we can add all applications that will upgrade some of the built-in components and avoid unnecessary updating.
    5. State Restore > Custom Tasks (Pre-Windows Update): Add a new Install Roles and Features action with the following settings:

      1. Name: Install - Microsoft NET Framework 3.5.1
      2. Select the operating system for which roles are to be installed: Windows 10
      3. Select the roles and features that should be installed: .NET Framework 3.5 (includes .NET 2.0 and 3.0)

      Important

      This is probably the most important step when creating a reference image. Many applications need the .NET Framework, and we strongly recommend having it available in the image. The one thing that makes this different from other components is that .NET Framework 3.5.1 is not included in the WIM file. It is installed from the SourcesSxS folder on the media, and that makes it more difficult to add after the image has been deployed.

      The task sequence after creating the Custom Tasks (Pre-Windows Update) group and adding the Install - Microsoft NET Framework 3.5.1 action.

    6. State Restore > Custom Tasks (Pre-Windows Update): After the Install - Microsoft NET Framework 3.5.1 action, add a new Install Application action (selected from the General group) with the following settings:

      1. Name: Microsoft Visual C++ Redistributable 2019 - x86
      2. Install a Single Application: browse to Install - MSVC 2019 - x86
    7. Repeat these steps (add a new Install Application) to add Microsoft Visual C++ Redistributable 2019 - x64 and Microsoft 365 Apps for enterprise as well.

  3. Click OK.

Optional configuration: Add a suspend action

The goal when creating a reference image is of course to automate everything. But sometimes you have a special configuration or application setup that is too time-consuming to automate. If you need to do some manual configuration, you can add a little-known feature called Lite Touch Installation (LTI) Suspend. If you add the LTISuspend.wsf script as a custom action in the task sequence, it will suspend the task sequence until you click the Resume Task Sequence shortcut icon on the desktop. In addition to using the LTI Suspend feature for manual configuration or installation, you can also use it simply for verifying a reference image before you allow the task sequence to continue and use Sysprep and capture the virtual machine.

A task sequence with optional Suspend action (LTISuspend.wsf) added.

The Windows 10 desktop with the Resume Task Sequence shortcut.

Edit the Unattend.xml file for Windows 10 Enterprise

When using MDT, you don't need to edit the Unattend.xml file very often because most configurations are taken care of by MDT. However if, for example, you want to configure Internet Explorer behavior, then you can edit the Unattend.xml for this. Editing the Unattend.xml for basic Internet Explorer settings is easy, but for more advanced settings, you will want to use the Internet Explorer Administration Kit (IEAK).

Warning

Do not use SkipMachineOOBE or SkipUserOOBE in your Unattend.xml file. These settings are deprecated and can have unintended effects if used.

Note

You also can use the Unattend.xml to enable components in Windows 10, like the Telnet Client or Hyper-V client. Normally we prefer to do this via the Install Roles and Features action, or using Deployment Image Servicing and Management (DISM) command-line tools, because then we can add that as an application, being dynamic, having conditions, and so forth. Also, if you are adding packages via Unattend.xml, it is version specific, so Unattend.xml must match the exact version of the operating system you are servicing.

Follow these steps to configure Internet Explorer settings in Unattend.xml for the Windows 10 Enterprise x64 RTM Default Image task sequence:

On MDT01:

  1. Using the Deployment Workbench, under Deployment Shares > MDT Build Lab > Task Sequences right-click the Windows 10 Enterprise x64 RTM Default Image task sequence and select Properties.
  2. In the OS Info tab, click Edit Unattend.xml. MDT now generates a catalog file. This will take a few minutes, and then Windows System Image Manager (Windows SIM) will start.

Important

The ADK version 1903 has a known issue generating a catalog file for Windows 10, version 1903 or 1909 X64 install.wim. You might see the error 'Could not load file or assembly' in in the console output. To avoid this issue, install the ADK, version 2004 or a later version. A workaround is also available for the ADK version 1903:

  • Close the Deployment Workbench and install the WSIM 1903 update. This will update imagecat.exe and imgmgr.exe to version 10.0.18362.144.
  • Manually run imgmgr.exe (C:Program Files (x86)Windows Kits10Assessment and Deployment KitDeployment ToolsWSIMimgmgr.exe).
  • Generate a catalog (Tools/Create Catalog) for the selected install.wim (ex: D:MDTBuildLabOperating SystemsW10EX64RTMsourcesinstall.wim).
  • After manually creating the catalog file (ex: D:MDTBuildLabOperating SystemsW10EX64RTMsourcesinstall_Windows 10 Enterprise.clg), open the Deployment Workbench and proceed to edit unattend.xml.
  1. In Windows SIM, expand the 4 specialize node in the Answer File pane and select the amd64_Microsoft-Windows-IE-InternetExplorer_neutral entry.
  2. In the amd64_Microsoft-Windows-IE-InternetExplorer_neutral properties window (right-hand window), set the following values:
  • DisableDevTools: true
  1. Save the Unattend.xml file, and close Windows SIM.

    • Note: If errors are reported that certain display values are incorrect, you can ignore this or browse to 7oobeSystemamd64_Microsoft-Windows-Shell-Setup__neutralDisplay and enter the following: ColorDepth 32, HorizontalResolution 1, RefreshRate 60, VerticalResolution 1.
  2. On the Windows 10 Enterprise x64 RTM Default Image Properties, click OK.

    Windows System Image Manager with the Windows 10 Unattend.xml.

Configure the MDT deployment share rules

Understanding rules is critical to successfully using MDT. Rules are configured using the Rules tab of the deployment share's properties. The Rules tab is essentially a shortcut to edit the CustomSettings.ini file that exists in the D:MDTBuildLabControl folder. This section discusses how to configure the MDT deployment share rules as part of your Windows 10 Enterprise deployment.

MDT deployment share rules overview

In MDT, there are always two rule files: the CustomSettings.ini file and the Bootstrap.ini file. You can add almost any rule to either. However, the Bootstrap.ini file is copied from the Control folder to the boot image, so the boot image needs to be updated every time you change that file. For this reason, add only a minimal set of rules to Bootstrap.ini, such as which deployment server and share to connect to - the DEPLOYROOT value. Put the other rules in CustomSettings.ini because that file is updated immediately when you click OK.

To configure the rules for the MDT Build Lab deployment share:

On MDT01:

  1. Using the Deployment Workbench, right-click the MDT Build Lab deployment share and select Properties.

  2. Select the Rules tab and replace the existing content with the following information (edit the settings as needed to match your deployment). For example, If you do not have a WSUS server in your environment, delete the WSUSServer line from the configuration:

    The server-side rules for the MDT Build Lab deployment share.

  3. Click Edit Bootstrap.ini and modify using the following information:

    Note

    For security reasons, you normally don't add the password to the Bootstrap.ini file; however, because this deployment share is for creating reference image builds only, and should not be published to the production network, it is acceptable to do so in this situation. Obviously if you are not using the same password (pass@word3) that is provided in this lab, you must enter your own custom password on the Rules tab and in Bootstrap.ini.

  4. On the Windows PE tab, in the Platform drop-down list, select x86.

  5. In the Lite Touch Boot Image Settings area, configure the following settings:

    1. Image description: MDT Build Lab x86
    2. ISO file name: MDT Build Lab x86.iso
  6. On the Windows PE tab, in the Platform drop-down list, select x64.

  7. In the Lite Touch Boot Image Settings area, configure the following settings:

    1. Image description: MDT Build Lab x64
    2. ISO file name: MDT Build Lab x64.iso
  8. Click OK.

Note

In MDT, the x86 boot image can deploy both x86 and x64 operating systems (except on computers based on Unified Extensible Firmware Interface).

Update the deployment share

After the deployment share has been configured, it needs to be updated. This is the process when the Windows PE boot images are created.

  1. In the Deployment Workbench, right-click the MDT Build Lab deployment share and select Update Deployment Share.
  2. Use the default options for the Update Deployment Share Wizard.

The rules explained

Now that the MDT Build Lab deployment share (the share used to create the reference images) has been configured, it is time to explain the various settings used in the Bootstrap.ini and CustomSettings.ini files.

Disk Image Writer Windows

The Bootstrap.ini and CustomSettings.ini files work together. The Bootstrap.ini file is always present on the boot image and is read first. The basic purpose for Bootstrap.ini is to provide just enough information for MDT to find the CustomSettings.ini.

The CustomSettings.ini file is normally stored on the server, in the Deployment shareControl folder, but also can be stored on the media (when using offline media).

Note

The settings, or properties, that are used in the rules (CustomSettings.ini and Bootstrap.ini) are listed in the MDT documentation, in the Microsoft Deployment Toolkit Reference / Properties / Property Definition section.

The Bootstrap.ini file

The Bootstrap.ini file is available via the deployment share's Properties dialog box, or via the D:MDTBuildLabControl folder on MDT01.

So, what are these settings?

  • Priority. This determines the order in which different sections are read. This Bootstrap.ini has only one section, named [Default].

  • DeployRoot. This is the location of the deployment share. Normally, this value is set by MDT, but you need to update the DeployRoot value if you move to another server or other share. If you don't specify a value, the Windows Deployment Wizard prompts you for a location.

  • UserDomain, UserID, and UserPassword. These values are used for automatic log on to the deployment share. Again, if they are not specified, the wizard prompts you.

    Warning

    Caution is advised. These values are stored in clear text on the boot image. Use them only for the MDT Build Lab deployment share and not for the MDT Production deployment share that you learn to create in the next topic.

  • SkipBDDWelcome. Even if it is nice to be welcomed every time we start a deployment, we prefer to skip the initial welcome page of the Windows Deployment Wizard.

Note

All properties beginning with 'Skip' control only whether to display that pane in the Windows Deployment Wizard. Most of the panes also require you to actually set one or more values.

The CustomSettings.ini file

The CustomSettings.ini file, whose content you see on the Rules tab of the deployment share Properties dialog box, contains most of the properties used in the configuration.

  • Priority. Has the same function as in Bootstrap.ini. Priority determines the order in which different sections are read. This CustomSettings.ini has only one section, named [Default]. In general, if you have multiple sections that set the same value, the value from the first section (higher priority) wins. The rare exceptions are listed in the ZTIGather.xml file.

  • _SMSTSORGNAME. The organization name displayed in the task sequence progress bar window during deployment.

  • UserDataLocation. Controls the settings for user state backup. You do not need to use when building and capturing a reference image.

  • DoCapture. Configures the task sequence to run the System Preparation (Sysprep) tool and capture the image to a file when the operating system is installed.

  • OSInstall. Must be set to Y or YES (the code actually just looks for the Y character) for the setup to proceed.

  • AdminPassword. Sets the local Administrator account password.

  • TimeZoneName. Establishes the time zone to use. Don't confuse this value with TimeZone, which is only for legacy operating systems (Windows 7 and Windows Server 2003).

    Note: The easiest way to find the current time zone name on a Windows 10 machine is to run tzutil /g in a command prompt. You can also run tzutil /l to get a listing of all available time zone names.

  • JoinWorkgroup. Configures Windows to join a workgroup.

  • HideShell. Hides the Windows Shell during deployment. This is especially useful for Windows 10 deployments in which the deployment wizard will otherwise appear behind the tiles.

  • FinishAction. Instructs MDT what to do when the task sequence is complete.

  • DoNotCreateExtraPartition. Configures the task sequence not to create the extra partition for BitLocker. There is no need to do this for your reference image.

  • WSUSServer. Specifies which Windows Server Update Services (WSUS) server (and port, if needed) to use during the deployment. Without this option MDT will use Microsoft Update directly, which will increase deployment time and limit your options of controlling which updates are applied.

  • SLSHARE. Instructs MDT to copy the log files to a server share if something goes wrong during deployment, or when a deployment is successfully completed.

  • ApplyGPOPack. Allows you to deploy local group policies created by Microsoft Security Compliance Manager (SCM).

  • SkipAdminPassword. Skips the pane that asks for the Administrator password.

  • SkipProductKey. Skips the pane that asks for the product key.

  • SkipComputerName. Skips the Computer Name pane.

  • SkipDomainMemberShip. Skips the Domain Membership pane. If set to Yes, you need to configure either the JoinWorkgroup value or the JoinDomain, DomainAdmin, DomainAdminDomain, and DomainAdminPassword properties.

  • SkipUserData. Skips the pane for user state migration.

  • SkipLocaleSelection. Skips the pane for selecting language and keyboard settings.

  • SkipTimeZone. Skips the pane for setting the time zone.

  • SkipApplications. Skips the Applications pane.

  • SkipBitLocker. Skips the BitLocker pane.

  • SkipSummary. Skips the initial Windows Deployment Wizard summary pane.

  • SkipRoles. Skips the Install Roles and Features pane.

  • SkipCapture. Skips the Capture pane.

  • SkipFinalSummary. Skips the final Windows Deployment Wizard summary. Because you use FinishAction=Shutdown, you don't want the wizard to stop in the end so that you need to click OK before the machine shuts down.

Build the Windows 10 reference image

As previously described, this section requires a Hyper-V host. See Hyper-V requirements for more information.

Once you have created your task sequence, you are ready to create the Windows 10 reference image. This will be performed by launching the task sequence from a virtual machine which will then automatically perform the reference image creation and capture process.

The steps below outline the process used to boot a virtual machine using an ISO boot image created by MDT, and then run the reference image task sequence image to create and capture the Windows 10 reference image.

  1. Copy D:MDTBuildLabBootMDT Build Lab x86.iso on MDT01 to C:ISO on your Hyper-V host (HV01).

    Note: Remember, in MDT you can use the x86 boot image to deploy both x86 and x64 operating system images. That's why you can use the x86 boot image instead of the x64 boot image.

On HV01:

  1. Create a new virtual machine with the following settings:

    1. Name: REFW10X64-001
    2. Store the virtual machine in a different location: C:VM
    3. Generation 1
    4. Memory: 1024 MB
    5. Network: Must be able to connect to MDT01MDTBuildLab$
    6. Hard disk: 60 GB (dynamic disk)
    7. Install OS with image file: C:ISOMDT Build Lab x86.iso
  2. Before you start the VM, add a checkpoint for REFW10X64-001, and name it Clean with MDT Build Lab x86 ISO.

    Note: Checkpoints are useful if you need to restart the process and want to make sure you can start clean.

  3. Start the REFW10X64-001 virtual machine and connect to it.

    Note: Up to this point we have not discussed IP addressing or DHCP. In the initial setup for this guide, DC01 was provisioned as a DHCP server to provide IP address leases to client computers. You might have a different DHCP server on your network that you wish to use. The REFW10X64-001 virtual machine requires an IP address lease that provides it with connectivity to MDT01 so that it can connect to the MDT01MDTBuildLab$ share. In the current scenario this is accomplished with a DHCP scope that provides IP addresses in the 10.10.10.100 - 10.10.10.200 range, as part of a /24 subnet so that the client can connect to MDT01 at 10.10.10.11.

    After booting into Windows PE, complete the Windows Deployment Wizard with the following settings:

    1. Select a task sequence to execute on this computer: Windows 10 Enterprise x64 RTM Default Image

    2. Specify whether to capture an image: Capture an image of this reference computer

      • Location: MDT01MDTBuildLab$Captures
    3. File name: REFW10X64-001.wim

      The Windows Deployment Wizard for the Windows 10 reference image.

  4. The setup now starts and does the following:

    1. Installs the Windows 10 Enterprise operating system.
    2. Installs the added applications, roles, and features.
    3. Updates the operating system via your local Windows Server Update Services (WSUS) server.
    4. Stages Windows PE on the local disk.
    5. Runs System Preparation (Sysprep) and reboots into Windows PE.
    6. Captures the installation to a Windows Imaging (WIM) file.
    7. Turns off the virtual machine.

After some time, you will have a Windows 10 Enterprise x64 image that is fully patched and has run through Sysprep, located in the D:MDTBuildLabCaptures folder on your deployment server. The file name is REFW10X64-001.wim.

Troubleshooting

If you enabled monitoring, you can check the progress of the task sequence.

If there are problems with your task sequence, you can troubleshoot in Windows PE by pressing F8 to open a command prompt. There are several MDT log files created that can be helpful determining the origin of an error, such as BDD.log. From the command line in Windows PE you can copy these logs from the client to your MDT server for viewing with CMTrace. For example: copy BDD.log mdt01logs$.

After some time, you will have a Windows 10 Enterprise x64 image that is fully patched and has run through Sysprep, located in the D:MDTBuildLabCaptures folder on your deployment server. The file name is REFW10X64-001.wim.

Related topics

Get started with the Microsoft Deployment Toolkit (MDT)
Deploy a Windows 10 image using MDT
Build a distributed environment for Windows 10 deployment
Refresh a Windows 7 computer with Windows 10
Replace a Windows 7 computer with a Windows 10 computer
Configure MDT settings