January 19, 2014

How can I help protect my PC from viruses on Windows8.1

How can I help protect my PC from viruses?

There are many preventive steps you can take to help protect your PC from viruses and other threats.
  • Use an antimalware app. Installing an antimalware app and keeping it up to date can help defend your PC against viruses and other malware (malicious software). Antimalware apps scan for viruses, spyware, and other malware trying to get into your email, operating system, or files. New threats can appear daily, so check the antimalware manufacturer's website frequently for updates.
    Windows Defender is free antimalware software included with Windows, and you can update it automatically through Windows Update. You can also visit the Windows Store and look for an antivirus app, or visit the Windows Compatibility Center to look for antivirus apps that work with Windows 8.1.
  • Don't open email messages from unfamiliar senders, or email attachments that you don't recognize. Many viruses are attached to email messages and will spread as soon as you open the attachment. It's best not to open any attachment unless it's something you're expecting.
  • Use a pop-up blocker with your Internet browser. Pop-up windows are small browser windows that appear on top of the website you're viewing. Although most are created by advertisers, they can also contain malicious or unsafe code. A pop-up blocker can prevent some or all of these windows from appearing.
    Pop-up Blocker in Windows Internet Explorer is turned on by default. SmartScreen Filter also helps identify potentially malicious websites and known malware.
  • Make sure SmartScreen Filter in Internet Explorer is turned on. SmartScreen Filter in Internet Explorer helps protect you from phishing and malware attacks by warning you if a website or download location has been reported as unsafe.
  • Pay attention to Windows SmartScreen notifications. Be cautious about running unrecognized apps downloaded from the Internet. Unrecognized apps are more likely to be unsafe. When you download and run an app from the Internet, SmartScreen uses information about the app's reputation to warn you if the app isn't well-known and might be malicious.
  • Keep Windows updated. Periodically, Microsoft releases special security updates that can help protect your PC. These updates can help prevent viruses and other malware attacks by closing possible security holes.
    You can turn on Windows Update to make sure that Windows receives these updates automatically.
  • Use a firewall. Windows Firewall or any other firewall app can help notify you about suspicious activity if a virus or worm tries to connect to your PC. It can also block viruses, worms, and hackers from trying to download potentially harmful apps to your PC.
  • Use your Internet browser's privacy settings. Being aware of how websites might use your private info is important to help prevent targeted advertising, fraud, and identity theft.
    If you're using Internet Explorer, you can adjust your privacy settings or restore the default settings whenever you want.
  • Turn on User Account Control (UAC). When changes are going to be made to your PC that require administrator-level permission, UAC notifies you and gives you the chance to approve the change. UAC can help keep viruses from making unwanted changes.
  • Clear your Internet cache and your browsing history. Most browsers store info about the websites you visit, and they might also store info that websites might ask you to provide (such as your name and address). While it can be helpful to have these details stored on your PC, there are times when you might want to delete some or all of them—for example, when you're using a public PC and don't want to leave personal info behind.
Ref: www.microsoft.com/help

How to Create and Host a Web Page of IIS server

IIS Web Server

Web Server is a computer that delivers “Web Pages”. Every web server has an IP address & possibly Domain
name. For example, if you enter the
URL: http://www.techoinfotech.com/index.html
In your browser, this sends a request to the server whose domain name is vikas.com. The server then fetches
the page named index.html and sends it to your browser.

(Note In above URL we can use IP address & Domain name as well)
You can run many web sites with different IP address or Different Port No.
By Default “Web Server uses http protocol on port no. 80/tcp”

To configure Web Server:

1. Create a Web Page.

2. Install Internet Information Service (IIS)

Go to Control Panel – Add Remove Programs – Add Remove Windows Component – Select
Application Server – Details – Check IIS – Ok – Next – up to Finish.

3. Configure one more IP in Same Net Adapter
Right click “My Network Places – Properties – Go to TCP/IP Settings – Properties – Advanced – Add –
Type IP & Subnet – Ok – Close.

4. Create a new Web Site in Server
Start – Programs – Admin tools – IIS Manager – Right Click Web Site – New Web Site – Type Any
Description – Select IP – Brows for You Web Folder – Select Web Folder – Finish.
Right click your new web site – Properties – Documents – Add – Type your html file name – Ok –
Move up – Apply – Ok.
Now your Web site is ready……
From your client computer “Open Internet Explorer & Browse: http://IP or http://Domain name


[Note: to see port number with protocol “c\windows\system32\driver\etc” open this file with notepad]

What is Disk Quota and How to Use Quota Entries

Disk Quota

Disk Quota is often used by the administrator to ensure that available disk Space is reasonably distributed
among the users. Normally administrator has the ability to assign Disk Quotas.

To enable it
Go to Any Drive (in which you want to set Quota) – Properties – Check “Enable quota management” – Check
“Deny disk space to users exceeding quota limit” – Check “Limit disk space to” & Set limits – Apply – Ok

Quota Entries

Go to Any Drive(in which you want to set Quota) – Properties – Quota – Quota Entry – Click on Quota – New
Quota Entry – Advance – Find Now – Select Users – Ok – Set Limit – Ok – Apply – Ok

Note: Disk Quota is enabled only in “NTFS” file system.
To convert fat file system to NTFS [RUN – CMD – Type “Convert Drive Letter /fs:ntfs]

For Exp: [c:\convert E: /fs:ntfs]

Password Policy How to use it on Domain Controller

Password Policy
Go to Start – Program – Administrative Tools – Domain Controller Security Policy – Open A/c Policy – Open
password policy: You will find Six Password Policies

1. Minimum Password length: This security setting determines the least number of characters that a
password for a user account may contain. You can set a value of between 1 and 14 characters, or you
can establish that no password is required by setting the number of characters to 0.
Default: 7 on Domain Controller
0 on stand-alone Server

2. Password must meet complexity requirement: If this policy is enabled, passwords must meet the
following minimum requirements when they are changed or created:
1 Password should not contain significant portions of the user's account name or full name
2 Password should be at least six characters in length
3 Password should Contain characters from three of the following four categories:
a) English uppercase characters (A through Z)
b) English lowercase characters (a through z)
c) Base 10 digits (0 through 9)
d) Non-alphabetic characters (for example, !, $, #, %)
Default: Enabled on domain controllers.
Disabled on stand-alone servers.

3. Minimum Password Age: This security setting determines the period of time (in days) that a
password must be used before the user can change it. You can set a value between 1 and 998 days,
or you can allow changes immediately by setting the number of days to 0.
Default: 1 on Domain Controller
0 on stand-alone Server
[Note: Configure the minimum password age to be more than 0 if you want “Enforce password history” to be effective]

4. Maximum Password Age: This security setting determines the period of time (in days) that a
password can be used before the system requires the user to change it. You can set passwords to
expire after a number of days between 1 and 999, or you can specify that passwords never expire by
setting the number of days to 0. If the maximum password age is between 1 and 999 days, the
Minimum password age must be less than the maximum password age. If the maximum password
age is set to 0, the minimum password age can be any value between 0 and 998 days.

Default: 42 days

Offline Files on Server 2003/XP/Windows7

Offline Files

If your network connection is not stable or network connection is not available at the time then you can make
network files available offline by storing shared files or folder on your computer so that they are accessible
when you are not connected to the network. If you do this, you can work with the files in the same way as you
work with them when you are connected to the network. When you reconnect to the network, changes that
you made to the files are updated to the network.

To Making Files & Folder Available Offline.

On Server
Go to Share Folder – Properties – Sharing – Offline Setting – Enable – Apply – Ok

Configure Client Computer to Use Offline File.

On Client Computer or Win XP /Win7

Go to – My Computer – Tools – Folder Option – Offline Files – Enable – Apply – Ok
Or
Go to – Control Panel – Folder Option – Offline Files – Enable – Apply – Ok

Creating Home Folder and Assign Home Folder to a User

Home Folder

Home folder makes it easier for an administrator to backup users file & manages user’s a/c by collecting the
users file in one location. If you assign a home folder to a user you can store user’s data in a central location
on a server, make backup & recovery of data easier & more reliable.
One more advantage of home folder is that wherever user would login, user would be able to access his Home
folder (his saved files…etc) which is assigned by Sever Administrator.

To Assign Home folder

First of all make a share folder then

Go to Start – Run – dams – Users – Click on User – Properties – Profile – Connect – Select Drive letter – In To

box type [\\IP or name of Server\folder share name] – Apply – Ok

Creating User Profiles Step By Step

User Profiles

User profile is used to save user’s settings & preferences & to provide a user with a default location or folder
to save documents & personal files. Profile can be at local computer or network location both. User profile can
also be changed by the user or locked by the administrator. Profiles can be redirected to a network share and
accessed by the user from any computer in the network.

There are three type of User Profile:

1. Local User Profile 
2. Roaming User profile 
3. Mandatory User Profile

Local user Profile is located in the in the “Documents & Settings” folder on the Local Computer. When a user
logs on to the local computer for the 1st time, a subfolder matching to their username is created under the
“Documents & Settings” folder which is located in Window’s drive (C drive). In this subfolder the users profile
& a hidden system file (netuser.dat) is also created.

When a user logs on to the computer, the ntuser.dat file is loaded, this contains the user’s preferences &
settings. Any changes to the user setting or preferences are saved back to the ntuser.dat file when the user
logs off the computer.

Roaming User Profile can be created when a users access more than one PC or move around the network to
ensure that the user will receive his or her user settings & preferences, no matter where they log on. This user
profile is created by the administrator in Active Directory by using profile tab in the user’s properties.

When a user logs on using Roaming Profile a local profile will remain on the local machine also if there is
unavailability of network then next time the user logs on from that PC, the locally cached profile will be
loaded. Changes to the local profile will not saved back to the Roaming profile

Note: when a user logs on user’s profile are taken form the network which creates a network traffic & long
logon time if user saves large files to their desktop or to their My Documents folder.

Steps to Create Roaming User Profile:

1. Create a share folder in any drive in any PC.
2. Open Active directory users & computers
3. Select user to create roaming profile & Go to its Properties
4. In User Properties click on profile tab.
5. Type Profile Path [\\IP of the share folder PC\Folder share name\%Username%]

Mandatory User Profile is used when administrator wants no changes to Users’ Settings & Preferences by any
user. This is a fixed profile of a user which can not be modified or changed, if still user makes changes to
his/her profile the all changes will be lost when the user logs off, the next time when user logs in again all
settings will be reset to mandatory user profile.

To make Mandatory user profile

Go to user profile – Right click on “ntuser.dat” file – Rename the file to ntuser.man

Note: The ntuser.dat file is a hidden system file by default. To see this go to folder option – view - uncheck “hide protected

operating system files”

January 08, 2014

How to Earn MCITP and MCSE or MCSA

How to Earn Your MCITP: Server Administrator (windows server 2008)

Candidates earn their MCITP: Server Administrator by passing three required exams.

MCITP Exam 70–640: Configuring Windows Server 2008 Active Directory
MCITP Exam 70–642: Configuring Windows Server 2008 Network Infrastructure
MCITP Exam 70–646: Managing and Maintaining Windows Server 2008 Servers



How to Earn Your MCITP: Enterprise Administrator (windows server 2008)

Candidates earn their MCITP: Enterprise Administrator by passing these five required exams.

MCITP Exam 70–640: Configuring Windows Server 2008 Active Directory
MCITP Exam 70–642: Configuring Windows Server 2008 Network Infrastructure
MCITP Exam 70–643: Windows Server 2008 Applications Infrastructure, Configuring
MCITP Exam 70–647: Windows Server Enterprise Administration
MCITP Exam 70–680: Microsoft Windows 7, Configuring



MCSA: Server Infrastructure Solutions Associate  (windows server 2012)

70–410 Installing and Configuring Windows Server 2012
70–411 Administering Windows Server 2012
70–412 Configuring Advanced Windows Server 2012 Services

MCSE:   Server Infrastructure Solutions Expert

70–410  Installing and Configuring Windows Server 2012
70–411  Administering Windows Server 2012
70–412  Configuring Advanced Windows Server 2012 Services
70–413  Designing and Implementing a Server Infrastructure
70–414  Implementing an Advanced Server Infrastructure



January 04, 2014

What is Disk Quota ,Quota entries,Convert FAT to NTFS

Disk Quota

Disk Quota is often used by the administrator to ensure that available disk Space is reasonably distributed
among the users. Normally administrator has the ability to assign Disk Quotas.

To enable it

Go to Any Drive (in which you want to set Quota) –> Properties –> Check “Enable quota management” –> Check “Deny disk space to users exceeding quota limit” –> Check “Limit disk space to” & Set limits –> Apply –> Ok 

Quota Entries

Go to Any Drive(in which you want to set Quota) –>Properties –> Quota –> Quota Entry –> 
Click on Quota –> New Quota Entry –> Advance –> Find Now –> Select Users –> Ok –> Set Limit –> Ok –> Apply –> Ok

Note: Disk Quota is enabled only in “NTFS” file system.

To convert fat file system to NTFS 

[RUN –> CMD –> Type “Convert Drive Letter /fs:ntfs]

For Exp: [c:\convert E: /fs:ntfs]



How to Install and Uninstall Active Directory on windows 2003/2008 server

To Install Active Directory Service

Go to -> Start –> Run –>type “dcpromo” & Press Ok & follow the wizard

Requirements:

A) Windows Server 2003/2008 must be installed.
B) LAN Card device & driver must be installed.
C) IP Address must be configured
D) LAN card must be connected to a switch & must be activated.

To Uninstalled Active Directory Service

Same Command as Installing it.

Go to -> Start –> Run –> type “dcpromo” or “dcpromp /forceremoval” & Press Ok & follow the wizard


What is Domain Controller

Domain Controller

It is a Windows Server 2003/2008 installed computer in which “Active Directory” Service is installed. Domain Controller is used to manage domain object such as “Users & Computers” Centrally.

Workgroup vs Domain

Workgroup

Workgroup is a group of computers in LAN. In workgroup each computer is a standalone computer which has their separate local user a/c & groups.They can share resources & peripherals to each other.
In a network a computer will be either in workgroup or joined in domain.

Domain
Domain is a group of users & computers defined by the administrator with the common rule & procedure.
Domain has a DNS (Domain Name System) Name such as:

Microsoft.com
Google.com
Redhat.com
Yahoo.com

When a computer joins to a domain it has its own local users & groups as well as it also logon in domain

Creating users and Groups using CMD ,manage,control panel

We create Group to give similar authorities to a set of users.

We can create user through 3 methods:

1. My computer -> Manage
2.CMD Prompt
3. Control Panel

To Create a User a/c

1. Go to, My computer –> Right click on it –> Manage –> Local users & Groups –> Users –> Right click –>New  user –> Type user name & Password –> Confirm Password –> Create

2. Go to, Run –> net user username password /add (For limited A/c)

3. Go to, Control panel –> Users account–> Create a new a/c

To create a group of user at one shot: create a notepad file & type commands
(Type “Net user name password /add” for each user) to create as many user as you want & save the file name with (.bat file) & run it.

Creating a group

Go to My computer –> Manage –> Local User & Group –> Right click –> New Group –> Give name & password –>Apply

Adding user in a Group

Go to My computer –> Manage –> Local User & Group Groups –> Right click on Group –> Properties –> Add –>Advance –> Find Now –> Select users –> Ok -> Apply

[Press Ctrl to select more then one user]

To Reset a Password

Go to, My computer -> Manage –> Users –> Right Click on User –> Set Password
Or
Run CMD –> “net user username *” and press Enter

Type password” (should be complex & at least of seven character)

To Enable or Disable a/c

Go to –> Manage –> Local users & Group –> Right click on User a/c –> Properties –> Check or Uncheck to Enable or Disable a/c respectively

Local Users & Groups and Bult-in Groups

Local Users & Groups

When we install operating systems it creates two local users accounts.
a. Admin
b. Guest

By default guest account remains disable.

There are two more users
a. IUSR
b. IWAM

That is called internet guest a/c.

We create user a/c so that a user can login to a computer & can work on it.

Administrator a/c is called built-in a/c which has full access on computer & can perform any task.

There are some built-in groups which has special authority on computer such as

1. Administrator group
2. Backup operators
3. Guest
4. Network configuration operator
5. Performance log users.
6. Performance monitor users
7. Power users
8. Print operators
9. Remote desktop users
10. Replicaters
11. Users
12. IIS_WPG
13. Terminal Server Computer

Dynamic Disk and RAID Levels 0,1,5

Dynamic storage is supported in Windows XP Professional, Windows 2000 and Windows Server 2003. A disk initialized for dynamic storage is called a dynamic disk. A dynamic disk contains dynamic volumes, such as:

1. Simple volumes,
2. Spanned volumes,
3. Striped volumes, (RAID 0)
4. Mirrored volumes, (RAID 1)
5. RAID-5 volumes. (Striped with Parity)

R – Redundant
A – Array of
I - Inexpensive/Independent
D – Disk

A basic disk doesn’t support above features. We can convert a basic disk into dynamic disk any time without data loss. But to convert a dynamic disk into Basic disk we need to format whole hard-disk so backup your data before converting.

When we convert a basic disk into dynamic disk, all primary partition & Logical partition changes to Simple
Volume & free space of extended partition become unallocated partition. With dynamic storage, you can
perform disk and volume management without the need to restart Windows.

1) Simple Volume: It’s Similar to primary partition but you can extend size of simple Vol. without data loss. But you can’t reduce size of Vol. If you extend size from same hard-disk it will be simple volume, but if you extend size from different HDD it will become spanned Vol.

2) Spanned Volume: you can create a single volume containing size of multiple HDD. It means you can create 160 GB Vol. by using two HDD of 80 GB.

You can use Min- 2 HDD
MAX – 32 HDD

3) Striped Volume: You can create a single volume using multiple HDD. It takes equal size from all disk, it saves data of 64kb in all HDD in a scattered way. It enhances volume’s read & write performance. It provides no fault tolerance. If any disk crashes your all data will become inaccessible.

You can use Min- 2 HDD
MAX – 32 HDD

4) Mirrored Volume: It takes two hard disks. It saves same data in both disks. It means it automatically copy data in to second HDD. In this 80GB Vol. will take two HDD of 80GB.
It is Fault tolerance & its overhead is 50%

5) RAID 5: It combines the feature of striped volume & mirrored Vol. It also saves data of 64 kb like striped volume. It also saves parity (Compressed form of data) in another disk. For 160GB Vol. you will require Three HDD of 80GB each.
It is Fault tolerance & its overhead is 33%

You can use Min- 3 HDD
MAX – 32 HDD

How to enable Printer pooling,print Priority,spooling

Printer Pooling: 

If you have more than one printer of same manufacturer & same model then you can enable
printer pooling. If you are pooling in printers than make sure that your all printer should be kept in the same
location or else you will not able to find that which printer has printed out you document.

Enable Printer Pooling

Go to Printer Properties –> Ports –> Check on Enable Printer Pooling –> Check both Printer Port –> Ok

Priority: 

If there is long waiting queue for print job & want to set priority to any user then you can configure
Printer priory. As soon as printer will finish the current job it will take high priority printing job at 2nd instance.

Enable Printer Priority

Install a printer twice –> Go to printer properties –> Advanced –> Set priority

Spooling: (Simultaneous Peripheral Operations On-Line)

the overlapping of low-speed operations with normal processing. Spooling originated with mainframes in order to optimize slow operations such as reading cards and printing. Card input was read onto disk and printer output was stored on disk. In that way, the business data processing was performed at high speed, receiving input from disk and sending output to disk. Subsequently, spooling is used to buffer data for the printer as well as remote batch terminals

How to Installing internet printer on client computer

Installing internet printer on client computer

Go to Printer & fax –> Add Printer –> Network Printer –> Select connect to a printer URL [http://IP of
print server/Printers/Printer share name/printer]

How to Enable Internet printing on server

To Enable Interne printing on server

Go to Control Panel –> Add Remove Program –> Add remove windows component –> Select Application Server –>Details –> Select IIS –> Details –> Check on Internet Printing –> Ok -> Finish



How to Create a Hardware Profile

Hardware Profile

You can create hardware profiles with different Hardware settings. It’s mostly useful for laptop. It provides
you options to choose Hardware profile during system start up.

You can create Many Hardware profile.

[i.e. if you have more than one LAN-card you can enable one LAN-Card in each Profile.]

To create hardware profile:

Go to –> My Computer property –> Hardware –> Hardware profile –> Copy –> Name (any) –> Ok

How to Install devices using Add hardware Wizard

Installing devices using “Add Hardware Wizard”

Installing loopback adapter

The Microsoft Loopback adapter is a testing tool for a virtual network environment where network access is
not available. Also, you must use the Loopback adapter if there are conflicts with a network adapter or with a network adapter driver. You can bind network clients, protocols, and other network configuration items to the Loopback adapter, and you can install the network adapter driver or network adapter later while retaining the network configuration information.

Step to Install

Start –> Setting –> Control panel –> Add Hardware –> Add new Hardware Device –> Select Advanced –> Select Network Adapters –> Select Microsoft Loopback Adapters –> Finish

Go to My Network Places –> Properties –> Here you can see it.

Step to uninstall

Go to Device manager –> Expend Net Adapter –> Right click on Loopback Adapter -> Uninstall.

how to create System Restore Point

System Restore Point
You can create a system restore point when your system is working properly. With this restore point you can
undo harmful changes to you operating system. Basically it restores window settings & performance without
destroying saved documents, emails, history & favorite list.Your computer also creates automatically restore point called check point.

To create a Restore Point

Start –> Program –> Accessories –> System tools –> System restore-> Select create a restore point.

“You can also undo your restore”


Safe mode options /windows start-up options

If your computer is not booting properly or normally then there is some advance boot option that you can
choose to boot your computer such as:

1. Safe mode
Safe mode option Boots your computer with minimum driver required. In this mode you can disable any
device driver & you can backup you data... etc.

2. Safe mode with networking
Safe mode with networking also loads driver of LAN card so your computer will be in network.

3. Safe mode with Command Prompt
Safe mode with command prompt boots your window & provides on command prompt. You can work
with command prompt as far as you can

4. Enable Boot logging
Enable boot logging creates file which contains boot information & problem.

5. Enable VGA Mode
It boots your window with minimum graphic resolution.

6. Directory Services Restore Mode
This mode is used when we restore Active Directory in Win Server

7. Debugging Mode
If two computers are connected with serial cable by com port, it will display boot info in another
computer

To Grant full control permission to any user for a share folder

To Grant full control permission to any user for a share folder

Go to folder properties –> sharing –> permission –> click add –> advance – >find now –> select any user –> ok –> select user –> check “allow full control” –> apply

Note: If there is no security page is shown then open my computer –> tools –> folder option –> view –> un-check last option (use simple file sharing)

To Access a share folder from another computer

Start –> run -> \\IP –> OK

Or Click My network places -> entire network –>windows network –>open domain name or workgroup name –> open computer name –> open share folder

Note: By default all drives of a computer is shared. You can access it by the command (\\IP\ drive letter with $ sign)

Using Recovery Console to Repair Windows XP/2003 server.

Using Recovery Console

(While Booting From CD)

If for any region your computer is not booting up & showing “NTLDR file missing or corrupted or compressed”

you can copy NTLDR file from recovery console

To Choose Recovery Console

1. Insert OS CD in CD-ROM & Restart your computer.

2. Press any key to boot from CD

3. Next you’ll get the option to “Repair or Enter Setup” Press R for repair using Recovery console.

4. Here you will be in DOS mode.

5. After the first question, type 1 and press enter.

Type the administrator password (if available) and hit enter.

6. Type CD .. (Note there must be a space between CD and ..)

This will bring you to the main "C" directory.

7. Then type “d:” to locate the CD-Rom Drive

8. D:\>dir

9. cd i386

To Copy file

10. Copy ntldr c:\

11. Copy ntdetect.com c:\

To decompress

12. c:\attrib -C ntldr

13. Exit

Boot Files of Windows XP/2003 server

Boot Files of Windows XP/2003 server

There are some boot files which are hidden in “C Drive”

To view hidden boot files

Open My computer –> C drive -> Tools –> Folder Option –> View –> Click on Show hidden file – > Uncheck hide protected system files –> Apply - Ok

It will display some more files which are needed in boot process such as:

1. NTLDR (New Technology Loader)
2. NTDETECT.COM
3. BOOT.INI (It has multiple OS chosen Option)
4. CONFIG.SYS
5. IO.SYS (INPUT & OUTPUT)
6. MSDOS.SYS
7. PAGEFILE.SYS
BOOT.INI

It’s a notepad file which has two information.

1. Time out
2. Default Operating System to Load

You can change time out & default OS through Boot.ini

[My computer –> Property –> Advance –> Setting under Startup & Recovery

Unattended Installation Process of Windows XP Professional

Unattended Installation Process of Windows XP Professional

In this installation we create an answer file which is used while installing Operating System. So there is no
need to attend the installation process after running setup.

Steps for unattended installation

1. Insert XP CD in the Drive

2. Browse XP CD

3. Go to SUPPORT – TOOLS - DEPLOY.CAB – Setupmgr.exe (right click & Extract )

4. Select location & click extract again.

5. Go to the location & open setupmgr.exe & click next

6. Create New answer file – Windows Unattended Installation – select window & version – select fully
automated – Click No – I accept - Next

7. Now fill the Prompt & required Information.

8. You will find two files (unattended. bat & Unattended.txt)

9. Click on unattended. bat (Your installation would start)

10. If you installation doesn’t start then right click on unattended. bat & click edit…

Check the file path… & run again

Note: 1. This installation doesn’t format the drive.

2. A running Operating system is required

3. This installation is for Dual boot, Multi Boot, Upgrade & Repair the window

Blog Archive