When a password is set on the PXE server it will also apply for the required TS !
We cannot remove a password from the PXE because is used by all organization, faculties, departments etc also at the daytime. This is not an option. I am doing multicast of let us say 300 pc at once, this works. To solve the problem we have has no use because the problem is too complex and I have no time. (there is something that has caused it but it is another topic) I cannot make a package which will set the BIOS PXE boot because the packages will not run on many systems. They will stuck "in progress" or "error" What I can do is doing in manually in the evening and setting on in the morning but we want to use this kind of imaging on regular basis. From: [email protected] [mailto:[email protected]] On Behalf Of Mawdsley R. Sent: donderdag 13 augustus 2015 3:22 To: [email protected] Subject: RE: [mssms] RE: bypass pxe password for unattended deployments Correct Mike - A required TS will bypass the PXE password. From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Marable, Mike Sent: 13 August 2015 14:06 To: [email protected]<mailto:[email protected]> Subject: Re: [mssms] RE: bypass pxe password for unattended deployments If you have a mandatory deployment, the password is supposed to be bypassed. At least that has been my understanding all this time. We don't have a password on the boot image so I can't say for sure. We have a setup similar to what it sounds like your setup is. Our build is 100% PXE and never originates from within the full OS. When we do mass rebuilds we have the mandatory build deployment and a few moments prior we have a package that sets the system to PXE boot at the next boot cycle (a BIOs setting) and then triggers a reboot. The machine reboots, PXE boots, finds the mandatory build deployment and it's off to the races. Have you given it a try? Mike Marable Application Programmer/Analyst Lead Enterprise Device Engineering and Management MCSE, MCTS, MCITP, MCSA, MS [ Profile<http://www.mycertprofile.com/Profile/5319166625> ] [Blog<http://thesystemsmonkey.wordpress.com/>] -------------------------------------------- "The difficult we do at once. The impossible takes a little longer." -US Army Corps of Engineers "It is better to have less thunder in the mouth and more lightning in the hand." -Apache Proverb I will rise when I have fallen. "Unless you try to do something beyond what you have already mastered, you will never grow." -Ralph Waldo Emerson From: <[email protected]<mailto:[email protected]>> on behalf of "H.T. Vermeer" <[email protected]<mailto:[email protected]>> Reply-To: "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>> Date: Thursday, August 13, 2015 at 8:47 AM To: "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>> Subject: [mssms] RE: bypass pxe password for unattended deployments Hi John, It will not work. We have a problem with running applications and TS on 1000 PC's. The log files are showing totally different pattern. Reimaging manually costs too much time. I want to reimage all of them at night. They will not run the Task Sequence from within Full OS. :( Hanna From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of John Aubrey Sent: donderdag 13 augustus 2015 2:29 To: [email protected]<mailto:[email protected]> Subject: [mssms] RE: bypass pxe password for unattended deployments If it's got a client already installed, you can push the task sequence to it as required. Be careful with this. I'm sure many have lost their jobs messing this up. From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of H.T. Vermeer Sent: Thursday, August 13, 2015 8:23 AM To: [email protected]<mailto:[email protected]> Subject: [mssms] bypass pxe password for unattended deployments Hello ! We want to do some unattended deployments at night but we do have a password set in PXE. Is there a way to avoid the password prompt ? We do not use MDT so I suppose an own password popup as a 1 st step will not be visible for the user. Thank you in advance! Hanna ********************************************************** Electronic Mail is not secure, may not be read every day, and should not be used for urgent or sensitive issues
