Operation Manual
Table Of Contents
- Table of Contents
- 1. Introducing Acronis® Snap Deploy®
- 1.1 Overview
- 1.2 What you can do with Acronis Snap Deploy 3
- 1.2.1 Take an image of the master system (Acronis Snap Deploy 2.0 functionality)
- 1.2.2 Manual deployment (Acronis Snap Deploy 2.0 functionality)
- 1.2.3 Scheduled deployment (new in v 3)
- 1.2.4 Event-driven deployment (new in v 3)
- 1.2.5 Command line and scripting under Win PE (new in v 3)
- 1.2.6 Standalone deployment (new in v 3)
- 1.2.7 Custom Deployment (User-initiated deployment) (new in v 3)
- 1.2.8 Deployment of a disk partition or MBR (new in v 3)
- 1.2.9 Selective deployment (MAC filtering) (new in v 3)
- 1.2.10 Password protection (new in v 3)
- 1.2.11 Manage a remote computer (Acronis Snap Deploy 2.0 functionality)
- 1.3 What else is new in v 3?
- 1.4 Supported operating systems
- 1.5 License policy
- 1.6 Upgrade to v 3
- 1.7 Technical support
- 2. Understanding Acronis Snap Deploy
- 3. Installation
- 3.1 System requirements
- 3.2 Used ports and IP addresses
- 3.3 General rules of installation
- 3.4 Installation of Acronis Snap Deploy Management Console
- 3.5 Installation of Acronis License Server
- 3.6 Installation of Acronis OS Deploy Server
- 3.7 Installation and setup of Acronis PXE Server
- 3.8 Installation of Acronis WOL Proxy
- 3.9 Installation of Acronis Snap Deploy Management Agent
- 3.10 Installation of Acronis Universal Deploy
- 3.11 Extracting the Acronis Snap Deploy components
- 3.12 Using Acronis License Server
- 4. Using Acronis Snap Deploy Management Console
- 5. Creating Acronis bootable media
- 6. Configuring PXE Server
- 7. Taking an image
- 8. Checking the master image
- 9. Deployment templates
- 9.1 Why save templates?
- 9.2 Creating templates
- 9.2.1 Master image selection
- 9.2.2 Disk/partition selection
- 9.2.3 Target disk and partition selection
- 9.2.4 User accounts
- 9.2.5 Computer names and domain/workgroup
- 9.2.6 Network settings
- 9.2.7 Security identifiers
- 9.2.8 Transferring files
- 9.2.9 Executing applications
- 9.2.10 Using Acronis Universal Deploy
- 9.2.11 Deployment options
- 9.2.12 Comments and summary
- 10. Standalone deployment
- 11. Manual deployment
- 12. Event-driven deployment
- 13. Scheduled deployment
- 14. Custom deployment mode
- 15. Command line and scripting under Win PE and Bart PE
- 16. Managing a remote computer

© Acronis, Inc 5
10. Standalone deployment ................................................................................................ 67
11. Manual deployment ...................................................................................................... 69
11.1 Booting up the targets ...................................................................................................... 69
11.2 Starting deployment .......................................................................................................... 71
12. Event-driven deployment ............................................................................................. 73
13. Scheduled deployment.................................................................................................. 76
13.1 Preparation steps .............................................................................................................. 76
13.1.1 Getting MAC addresses ............................................................................................... 76
13.1.2 Enabling WOL on targets............................................................................................. 76
13.2 Scheduled deployment within one subnet ........................................................................... 77
13.3 Scheduled deployment in other subnet ............................................................................... 79
13.4 Operations with scheduled tasks ........................................................................................ 81
14. Custom deployment mode ............................................................................................ 83
14. 1 Understanding custom deployment ................................................................................... 83
14. 2 Considerations and tips .................................................................................................... 84
14. 3 Setting up the custom deployment mode .......................................................................... 85
14. 4 Changing parameters of the custom deployment mode ...................................................... 87
14. 5 Closing the custom deployment mode ............................................................................... 87
15. Command line and scripting under Win PE and Bart PE ............................................... 88
15.1 Adding ASD command line utility to PE ............................................................................... 88
15.1.1 Acronis Snap Deploy PE Builder ................................................................................... 88
15.1.2 Adding ASD command line utility to PE 1.0 ................................................................... 89
15.1.3 Adding ASD command line utility to PE 2.0 ................................................................... 90
15.2 Uploading PE images to Acronis PXE Server ........................................................................ 90
15.3 ASD command line syntax ................................................................................................. 91
15.3.1 Supported commands ................................................................................................. 91
15.3.2 Common options (options common for most asdcmd commands) .................................. 92
15.3.4 asdcmd usage examples ............................................................................................. 96
15.4 Sample scenarios .............................................................................................................. 96
15.4.1 Deploying images assigned to targets .......................................................................... 96
15.4.2 Creating images assigned to targets ............................................................................ 97
16. Managing a remote computer ....................................................................................... 99
16.1 File management on a remote computer ............................................................................ 99
16.2 Executing applications on a remote computer ................................................................... 100