login vsi company logo login vsi company logo 250x40

 

Avoid VDI problems. Test with Login VSI.

Learn how our industry-standard software solutions can benefit your business

Learn more about our products

Video: Building and Maintaining Golden Images with Login AM

Video: Building and Maintaining Golden Images with Login AM

Hello, my name is Mike! Are you getting tired of keeping your images up to date? When we finished the design of our current infrastructure we were convinced we would only need one, maybe two, operating system images. But after a while I was maintaining several images. I had users with specific operating system requirements, others that needed a very specific version of internet explorer and there were even users that required additional hardening.

I was executing the same steps over and over to keep all my images up to date and I was installing the same software manually over and over again. So I decided to fully automate the process using Login AM. You want me to show you how I did it?

I now have about 8 separate images that I need to maintain. For Windows 7 I got a regular desktop for the finance and call center departments. For trading and human resources I created a more secure desktop. I got some heavy duty 64-bit Windows 7 desktops for engineering and R&D, but I’m also in the process of testing my software on Windows 8 and the creation of a finance desktop based on Citrix technology.

building and maintaining images with login am collections

Each collection you see on my screen represents a group of computers with an identical set of software and configuration. I can use these collections if I want to create an operation system image. Let’s review the finance desktop’s configuration to see how it’s done.

I have my software assigned using the Login AM layers, but let’s go directly to the imaging section. I need to enable the imaging section. By enabling this plugin, I'm instructing Login AM to prepare the image for sealing when Login AM has finished deploying all applications and configuring the system.

Next I need to tell Login AM what command to use to seal the image. This really depends on how I choose to distribute and deploy the image once it is finished. In this case I am using Microsoft's Sysprep tool with the following command line arguments.

building and maintaining images with login am microsoft sysprep command line

You might have already realized that since each collection can have its own configuration for the imaging section, it becomes ridiculously easy to create two or more identical images for different deployment systems. Quite a handy feature in hybrid environments or migration scenarios.

For instance, I duplicated the finance desktop and changed the seal command to support deployment using Citrix technology.

Finally, I need to provide the name of an imaging template machine. Let’s call it Financetemplate. All the computers in this collection will simply behave as a regular Login AM client. They receive updates and configuration changes like any other Login AM client.

building and maintaining images with login am installation progress

But when the imaging template system is booted, in this case a computer called Financetemplate, Login AM will update its configuration, install software where needed and perform all the other tasks that are defined within Login AM for that collection. When Login AM has finished deploying the software and configuration, the system will be sealed automatically.

Remember when I talked about preparing to seal the image? Let me select the Monitoring agent package and select the imaging section on a package level.

login am monitoring agent imaging

Using the same action items you already know from the other plugins like a custom script and a registry import, I can now tell Login AM what to do when the system is being prepared for imaging. This monitoring package for instance clears its configuration from the registry before the system is sealed. Built once, used in every image!

So, now all I need to do is start my template PC and enjoy the show!

See you next time with Lunch and learn. Want to experience the same as me? Download Login AM and start automating today.

More Login AM Lunch and Learn Videos:

Tags: Videos, Login AM, Image Management

Popular Blogs

Login VSI - Press Release - IGEL - Login VSI Partner to Optimize End User Computing Experience Image

[Press Release] IGEL Partners with Login VSI to Optimize the End User Computing Experience

Login PI enables organizations to better protect the performance and availability of their IGEL OS-powered virtual desktop environments Continue Reading
Login VSI - Blog - Login PI Blog Teaser Image - Windows Virtual Desktop: How To Monitor User Experience With Login PI

Windows Virtual Desktop – How to Monitor User Experience?

Microsoft has just announced the public preview of their new Windows Virtual Desktop (WVD) offering at Microsoft Ignite on Tour in Amsterdam today. For those of you who’ve not followed the rumors or the private beta, here’s the outline... Continue Reading
Login VSI Blog - Teaser Image - A Practical Guide to VDI Change Management - Part 1

A Practical Guide to VDI Change Management

Part 1: IT Change Management in general The first in an 8-part series, this practical guide to VDI Change Management will guide you through the transformation of the IT department from a back-end function into a core competency for every modern organization. Continue Reading
Investigating Online Application Performance with Login PI

Investigating Online Application Performance with Login PI

As many companies do, we use a CRM system. Recently, I have been getting complaints about our cloud CRM system, Microsoft Dynamics, being slow. I tried to investigate this by shadowing one of our users to see what was wrong. Continue Reading
Login VSI Blog - How-To Update, Protect Against RIDL, Fallout MDS Vulnerability

How-To: Update, Protect Against RIDL, Fallout MDS Vulnerability

RIDL & Fallout MDS vulnerabilities, impact on VDI performance & actions to take. FAQs we’re receiving & updates on performance tests executed to patch flaws Intel calls “Microarchitectural Data Sampling (M.D.S.)” aka: Rogue In-Flight Data Load (RIDL), Fallout, ZombieLoad & Store-to-Leak Forwarding. Continue Reading
Login VSI -Blog Post - IGEL Partner with Login VSI

Login PI & IGEL: Delivering Deep Application Test & Availability Monitoring

Together Login VSI and IGEL deliver deep application test and availability monitoring for the digital workspace This week we announced a partnership with IGEL that enables Login PI integration in a radical new way. Continue Reading
Cookie Settings