Jump to content


ChrisF

Established Members
  • Posts

    2
  • Joined

  • Last visited

ChrisF's Achievements

Newbie

Newbie (1/14)

0

Reputation

  1. Here are a couple of examples of registry hacks I've added during OSD Deploy task Sequences on a 64-bit Windows 7 systems: cmd /c "reg add HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon /v DefaultDomainName /t REG_SZ /d MyDomain /f" The below requires the Disable 64-bit file redirection option select as the commands execute in 32-bit mode by default. cmd /c "reg add HKCR\CLSID\{<some GUID>}\Instance\InitPropertyBag /v Param1 /t REG_SZ /d http://intranet /f"
  2. Note that the help file for the OSD task sequence is inaccurate for running command lines from within a package. It states that you can put in a path relative to the package source. However the interface doesn't allow you to enter anything that does not begin with "\\" without seeing the red (!) to the right. And in true Microsoft fashion they don't show any examples either!
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.