R escue and Recovery Deployment Guid eVersion 4.1 Updated: Ap ril 27, 200 7
4 Rescue and Recovery Deployment Guide Version 4.1
:: Reboot the system C:\Program Files\Common Files\Lenovo\BMGR"/bmgr32.exe /R Updating You may need to make a major change to your
Table 31. UPDATE_RR.CMD script @ECHO OFF ::Obtain the PDAGUIen.ini file from the RR c:\RRDeployGuide\RRUTIL\RRUTIL -g getlist.txt c:\RRDep
Installer package. A program run as part of the setup did not finish as expected. Contact your personnel or package vendor. If you
:: Make an ISO file here - ISO will reside in c:\SWTOOLS\rrcd Note: The following seven lines of code (in bold font) are needed
– Encrypt Client Security Solution XML Script with password = “XMLscriptPW”. - Password protect the Client Security Solution conf
5. Use the tool found in C:\Program Files\Lenovo\Client Security Solution\xml_crypt_tool.exe to encrypt the XML script with a passwo
v Administration – Install on machines where previous versions of Rescue and Recovery and Client Security Solution are installed.
v Check Disable Password Recovery -> click Next . v Review the Summary and click Apply to write the XML file to the follo
Deployment of Client Security Solution and ThinkVantage Fingerprint Software is now complete. Deployment scenario 6 This section describ
c. Through Active Directory, enable Antidote Delivery Manager. Place packages to be run and make sure reporting is captured.Microso
Chapter 2. Installation This chapter contains instructions for installing Rescue and Recovery. You can find installation instructions o
104 Rescue and Recovery Deployment Guide Version 4.1
Appendix A. Command-line tools ThinkVantage Technologies features can also be implemented locally or remotely by corporate IT administr
Settings defined by an administrator on the server are defined as policies. Settings defined by a user on the client computer for
Default user preferences: HKLM\Software\Lenovo\Rescue and Recovery\User defaults HKLM\Software\Lenovo\Client Security Solution\User defaults G
Table 33. User Configuration>Rescue and Recovery>User interface (continued) Policy Setting Description Menu Items Delete Backups Sho
Table 33. User Configuration>Rescue and Recovery>User interface (continued) Policy Setting Description Schedule and Preferences Sched
Table 34. Computer Configuration>Rescue and Recovery>Settings Policy Setting Sub-Setting Description Backup PreBackup Pre Command to
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Backup PreBackup Pre3
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Backup PostBackup Pos
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Backup PostBackup Pos
Notes: 1. If installing Rescue and Recovery Version 4.1 over versions, 1.0, 2.0, or 3.0 you will have to take a backup first.
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Backup Backup Second
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Backup Backup Network
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Backup Max Backup Siz
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Backup Backup SP USB
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Backup Protect With U
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PreRestore Pr
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PreRestore Pr
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PreRestore Pr
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PreRestore Pr
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PreRestore Pr
v 2.4 GB of free space on your hard drive. v VGA-compatible video that supports a resolution of 800 x 600 and 24-bit color.
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PostRestore P
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PostRestore P
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PostRestore P
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PostRestore P
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Restore PostRestore P
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description Mapped Network Drive
Table 34. Computer Configuration>Rescue and Recovery>Settings (continued) Policy Setting Sub-Setting Description SIS Enable or disab
MapDrv MapDrv provides network share functions for ThinkVantage Technology products. MapDrv is used to connect and disconnect ThinkVant
Table 35. MapDrv parameters (continued) Parameter Result /user Sets the stored encrypted user name for this share. /NetPath Sets the
Table 36. BMGR32 parameters (continued) Parameter Result /CFGfile Apply the configuration file parameters. See “RRCMD command-line interf
Network adapters for Rescue and Recovery: The Rescue and Recovery environment supports only wired PCI-based, Ethernet network adapte
Table 36. BMGR32 parameters (continued) Parameter Result /U2 Show partition 2. /U3 Show partition 3. /US Show service partition. /Fmbr
v Prev Active Part Displays the partition table index of the previously active partition when booted to the service area. v Boot
RRCMD command-line interface The primary Rescue and Recovery command-line interface is RRCMD. The command is located in the C:\Program
Table 38. RRcmd parameters (continued) Command Result Location=c One or more of the following can be selected with the associated res
System Migration Assistant The module is command-line program compatible with old SMA4.2 smabat.exe. Command parameters and the control
<root> <TargetApp>1EA5A8D5-7E33-11D2-B802-00104B21678D</TargetApp> </root> Appendix A. Command-line tools 139
140 Rescue and Recovery Deployment Guide Version 4.1
Appendix B. Administrator tools ThinkVantage technologies offers tools that can be implemented by corporate IT administrators. These to
[Backup0] StartTimeLow=0xD5D53A20 StartTimeHigh=0x01C51F46 To run the CONVDATE utility, complete the following steps: 1. Extract Rescue
The parameters for CREATSP are: Table 40. Parameters Description size=x Size of service partition to create, in megabytes. drive=x The
Once and administrative installation has been completed, the administrative user can make customizations to the source files, such as
144 Rescue and Recovery Deployment Guide Version 4.1
Appendix C. User tasks Users may not be able to perform certain tasks, based upon user rights. The following tables outline basic
Windows XP The following table presents the tasks that limited, power, and administrative users can perform in Rescue and Recovery i
Table 43. Windows 2000 user tasks (continued) Windows 2000 users can perform the following: Limited user Power user Administrator Perf
148 Rescue and Recovery Deployment Guide Version 4.1
Appendix D. Notices Lenovo may not offer the products, services, or features discussed in this document in all countries. Consult yo
significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements wi
The table below shows installation examples using Rescue and Recovery.msi: Table 2. Description Example Installation msiexec /i “C:\TVT
or OEM install). The exceptions to this are if the Predesktop Area is already installed and does not need to be upgraded or if
the installation executable. The installation also looks for a language pack .tvt file that is greater than any current language pa
Table 3. (continued) Property Description HALTIFTPMDISABLED If the TPM is in a disabled state and the installation is running in sile
First Edition (May 2007) © Copyright Lenovo 2007. Portions © Copyright International Business Machines Corporation 2005. All rights res
Table 4. X:\PQ\RRUSAVE.TXT (continued) Script language Result SELECT PARTITION ALL (Needed if you have a type 12 partition or if you
example, to change to the Rescue and Recovery folder from a command prompt, type “CD %rr%” and press enter. Table 8. Environmental
16 Rescue and Recovery Deployment Guide Version 4.1
Chapter 3. Rescue and Recovery customization Before you install Rescue and Recovery, you should understand the customization available
v For Schedule Task 1, this key is HKLM\Software\Lenovo\Scheduler\tasks\task1 v For Schedule Task 2, this key is HKLM\Software\Len
http://www.lenovo.com/support/site.wss/document.do?sitestyle=lenovo &lndocid=MIGR-66964 To capture a Sysprep utility image in the base ba
Capturing a multiple partition machine and excluding files in a Sysprep backup To capture multiple partitions in a Sysprep utility b
5. Enter the following commands: :Start the Rescue and Recovery Service net start "TVT Backup Service" :Create Sysprep B
HKLM\Software\Lenovo\Rescue and Recovery\runbasebackuplocation DWord = location value BackupList The registry entry format is: HKLM\SOFTWARE\
I=?:\Application Data\* I=?:\Documents and Settings\* I=?:\Program Files\* I=?:\msapps\* X=?:\Recycled X=?:\RECYCLER x=?:\Documents a
Contents Preface . . . . . . . . . . . . . . .v Chapter 1. Overview . . . . . . . . .1 Major components . . . . .
eGatherer, and PCDR diagnostic log information), and will be placed in a location which can be easily found and accessible from bo
Table 9. RRUTIL.exe files and customization options (continued) File or Directory Customization options PDAGUIxx.INI (where xx is the l
1. The data is written as a text stream of all the files in each sub directory to a file named dirlist.txt in a directory na
1. Place all the files in a temp folder on drive c:\. Based on location in the temp directory, the files will be copied into
Directory of \RRbackups\C\0\ 03/11/04 08:02:44 AM 50003968 Data0 03/11/04 08:04:05 AM 50003968 Data1 03/11/04 08:07:10 AM 5
C:\RRTemp\C\0 Data0 Data1 EFSFile HashFile Info TOCFile to C:\RRbackups\C\0 Data0 Data1 EFSFile HashFile Info TOCFile Determine \R
Table 10. Command and switch options (continued) Command and switch options Result RRUTIL -bg c:\temp\bgetlist.txt C:\temp Copy individ
Example 1: Adding device drivers (such as ethernet) to the Predesktop Area The following example provides instruction on adding devic
[Fonts] section contains the default settings for the character style that is displayed. The following are default settings for most
Table 12. Left-panel entries and customization options (continued) Entry Customization options 16 Must remain a button type 1. Text c
Deployment examples for installing Rescue and Recovery and Client Security Solution . . . . .91 Deployment scenario 1 . . . . .
Button00=[0-10], "title", file.bmp, [0 or 1] This setting directs the environment to display or hide the entry. The value 0
Customizing the function links in the right panel: To change the functions of the links that span the top of the right panel,
v CANCEL Cancel v Command0 %sysdrive%Preboot\Helps\en\f_welcom.htm v Command1 %sysdrive%Preboot\Helps\en\C_ILA.htmTo hide the Welcome win
Opera will not save settings after it is closed If you are using Rescue and Recovery under Microsoft Vista and want to have the
4. At the end of this line of code, type in quotations the names of the Windows users whose favorites you want to exclude. Fo
To add an HTTP, HTTPS, FTP, Gopher, or WAIS proxy server, type =<address of proxy> after the appropriate line. For example,
Adding a specific file extension to the downloadable files list You can add to the list of files that can be downloaded through
4. Locate the [File Types] section of the file. Search for the extension you want to work with. For example, you want all .txt
7. Put the \SWWORK\ NETSTART.TBI and \MININT\SYSTEM32 winbom.ini files back by using the RRUTIL process described in “Using RRUTIL.
1. Get the RRUTIL from the Lenovo Rescue and Recovery Administration Tools site at: http://www.lenovo.com/support/site.wss/document.do?s
Preface Information presented in this guide supports ThinkVantage™ programs and does not support Lenovo™ 3000 technology. For information
No password This option uses no authentication and allows the user to enter the Predesktop Area without using a password. Password a
authorized to access. The user then selects the files, folders, or both to be restored and the system will restore them to their
a rejuvenation from that backup. Also, if you have a shared folder at the time of the rejuvenation process but it was not in th
Custom recovery and preinstallation setup As an extension of the Rescue and Recovery program, custom recovery technology has been add
service partition where it resides. Manifest files also control the selections available to the user during a custom recovery. The
Table 19. Network settings (continued) Setting Windows control file keyword Description Domain JoinDomain= Sets the domain for the comput
Table 21. Return codes (continued) Return code Return message 5 Error writing AUTO.TAG file in service partition 6 Error setting servi
Chapter 4. System Migration Assistant customization Before you install System Migration Assistant, you should understand the customizati
Table 22. Command Parameters Parameter Values and Examples <Desktop> v <accessibility> v <active_desktop> v <color
Table 22. (continued) Command Parameters Parameter Values and Examples <IncUsers> <UserName> To capture all user profiles, s
vi Rescue and Recovery Deployment Guide Version 4.1
Table 22. (continued) Command Parameters Parameter Values and Examples <MISC> <bypass_registry> To unselect all registry sett
Table 23. Command Parameter Description Example <FilesAndFolders> <run> Starts the process of a command. The </run> par
Table 23. (continued) Command Parameter Description Example <Inclusions> <SizeCompare> <Operand> <Size> <Dest> <
Table 23. (continued) Command Parameter Description Example <Exclusions> <ExcDescription> <Description> <DateCompare> &l
</Inclusions> <Exclusions> <ExcDescription> <Description>d:\No_Longer_Used\</Description> </ExcDescription> </E
This file must be named application.xml or application.smaapp and located in the d:\%RR%\Migration\bin\Apps, where Apps specifies the
Table 24. (continued) Section Command Value What it does <Name> A text string Specifies the name of the application. <Version
SMAVariable\Location[|File][/s] where v SMAvariable is one of the following variables that specify the location of the customization fi
<Registries> Optional hive is either HKLM or HKCU. keyname is the keyname. Value is an optional command that specifies the regist
<PreTargetBatchProcessing> <!CDAT[batch commands]] <PreTargetBatchProcessing> <PreTargetBatchProcessing> performs Batch proce
Chapter 1. Overview This chapter provides an overview of the programs represented in this deployment guide. The technologies presented
b. Add the appropriate command to the Install_Directories section of the application file. For example: <Install_Directory> <O
</Detects> </AppInfo> <Install_Directories> <Install_Directory> <OS>WinXP</OS> <Registry> <hive>HKLM
<Registry> <hive>HKCU</hive> <keyname>Software\Adobe\Acrobat Reader\5.0\AdobeViewer</keyname> <value>xRes</val
<value>(Default)</value> </Registry> </Install_Directory> </Install_Directories> <Files_From_Folders> <Files_
<keyname>Software\Adobe\Acrobat Reader\7.0</keyname> </Detect> </Detects> <\AppInfo> <Install_Directories> <
<keyname>Software\Adobe\Acrobat Reader\7.0\AdobeViewer</keyname> <value>xRes</value> </Registry> <Registry> <
70 Rescue and Recovery Deployment Guide Version 4.1
Chapter 5. Antidote Delivery Manager infrastructure Antidote Delivery Manager works by delivering instructions from an administrator to
Repository The repository function runs on each system and periodically checks for new messages from the administrator. It checks at
Certain Microsoft commands are also available to Antidote Delivery Manager. The permitted commands include all commands built into co
v Rescue and Restore – Recovery overview: Links users to help topics about the various recovery options that are provided. – R
When the machine reboots in Windows XP, Antidote Delivery Manager begins processing again even before the user can log in. Patches
With Virtualization Module for Antidote Delivery Manager, administrators will be able to remotely disconnect a terminal from the netw
Note: If the installation CD does not start automatically, complete the following steps: a. From the Windows desktop, click Start,
Table 27. System Health and Help (continued) Module Description Logs Allows you to view log files. Installing certificates The user i
v NETWK /E enables all network traffic. Networking will be disabled until a NETWK /E (enable) command is executed. v NETWK /A
Table 28. Antidote Delivery Manager commands (continued) Commands Description RETRYONERROR [ON|OFF] retries By default, a script will o
Table 28. Antidote Delivery Manager commands (continued) Commands Description XMLtool for Conditionals Conditionals (eGatherer, current h
Table 28. Antidote Delivery Manager commands (continued) Commands Description STATUS [/QUERY location message_name | /CLEAR location] Th
Table 29. Supported Microsoft commands (continued) Commands Description COMP.EXE Compares the contents of two files or sets of files.
Schedule information Schedule information is set in the registry at HKLM\SOFTWARE\Lenovo\Rescue and Recovery\ADM with the following sett
The Rescue and Recovery Windows environment The Rescue and Recovery Windows environment enables users to rescue lost data, application
Installation on client machines Rescue and Recovery4.1 must be installed on all clients. Configuration prepared above may be included
To work around this, use the environment variable CUSTOS which always points to the drive containing the typical customer operating
apkgmes.exe /newkey mykey This command creates two files, mykey.pub and mykey.prv; the public and private keys respectively. d. Copy
9. Implement Antidote Delivery Manager. a. When the timer has expired on the donor system, the package will run and a Hello Wo
exit 0 :InPE exit 1 4. Place go.rrs in C:\ADM\PATCHBUILD directory and run: apkgmes.exe /key mykey.prv C:\ADM\PATCHBUILD PATCHBUILD 5
Example scripts For example scripts download the Administrator Tools package located at http://www.lenovo.com/support/site.wss/document.do?s
90 Rescue and Recovery Deployment Guide Version 4.1
Chapter 6. Best Practices This chapter presents scenarios to illustrate the best practices of Rescue and Recovery, Client Security So
16. Navigate to your intended path in the Save As field on the Export Registry File dialog box. 17. Press the Save button.Now,
copy Z333ZAA10ZZUS00.tvt C: to C:\RRTemp If you want installation for supported languages besides US, copy Z501ZAB10YYUS00.tvt to C:\RR
Kommentare zu diesen Handbüchern