Infosys Microsoft Alliance and Solutions blog

« Configuring Custom Http Handler in IIS 7 | Main | Addressing User Security Elevation on a locked down PC using SoftGrid Virtualized Applications »

Microsoft Vista: Best Practices recommendation for Zero Touch Deployment using SMS and BDD-II

USMT Customization:


User State Migration Tool (USMT) is a small command line utility provided to capture and restore the user’s data and settings from a machine


Security Best Practices
·         Virus Scan à Run a complete virus scan before capturing the data.
·         USMT does not migrate passwords. It is advisable to instruct the users manually about this change.
·         Access Control Lists (ACLs) are not supported. The ACLs have to be restored manually after migration.
·         While migrating local accounts it is advisable to migrate with the “/lac” option to create the IDs locally. However, the IDs will remain disabled after migration.
·         Migrate only domain users and try to avoid backing up usual system service accounts in your backup script..
Scanstate options
·         Use the “/o” option to over-write files that have already been backed up.
·         Use the “/localonly” option to search only the local folders for data to be backed up. Ideally files stored on the network will be accessible post deployment also and hence there is no need to back these up.
·         Use compression to ensure that there is adequate space for all the machines.
·         Use verbosity level 5 for monitoring all logs.
General Guidelines
·         For Refresh scenario, try to store the USMT backup files on the local machine itself to reduce loads on the network and the time required for the migration.
·         For the replace computer scenario, identify storage areas which can be used to store the data from the users.
·         While dealing with critical data, it is a good practice to store data on a network share during the state capture phase.
·         While using an extremely critical machine, it is a good practice to capture a complete image before attempting to rollout to the machines.


Post a comment

(If you haven't left a comment here before, you may need to be approved by the site owner before your comment will appear. Until then, it won't appear on the entry. Thanks for waiting.)

Please key in the two words you see in the box to validate your identity as an authentic user and reduce spam.

Subscribe to this blog's feed

Follow us on

Blogger Profiles

Infosys on Twitter