Operation Manual
Table Of Contents
- Table of Contents
- 1. Introducing Acronis® Snap Deploy®
- 1.1 Overview
- 1.2 What you can do with Acronis Snap Deploy 3
- 1.2.1 Take an image of the master system (Acronis Snap Deploy 2.0 functionality)
- 1.2.2 Manual deployment (Acronis Snap Deploy 2.0 functionality)
- 1.2.3 Scheduled deployment (new in v 3)
- 1.2.4 Event-driven deployment (new in v 3)
- 1.2.5 Command line and scripting under Win PE (new in v 3)
- 1.2.6 Standalone deployment (new in v 3)
- 1.2.7 Custom Deployment (User-initiated deployment) (new in v 3)
- 1.2.8 Deployment of a disk partition or MBR (new in v 3)
- 1.2.9 Selective deployment (MAC filtering) (new in v 3)
- 1.2.10 Password protection (new in v 3)
- 1.2.11 Manage a remote computer (Acronis Snap Deploy 2.0 functionality)
- 1.3 What else is new in v 3?
- 1.4 Supported operating systems
- 1.5 License policy
- 1.6 Upgrade to v 3
- 1.7 Technical support
- 2. Understanding Acronis Snap Deploy
- 3. Installation
- 3.1 System requirements
- 3.2 Used ports and IP addresses
- 3.3 General rules of installation
- 3.4 Installation of Acronis Snap Deploy Management Console
- 3.5 Installation of Acronis License Server
- 3.6 Installation of Acronis OS Deploy Server
- 3.7 Installation and setup of Acronis PXE Server
- 3.8 Installation of Acronis WOL Proxy
- 3.9 Installation of Acronis Snap Deploy Management Agent
- 3.10 Installation of Acronis Universal Deploy
- 3.11 Extracting the Acronis Snap Deploy components
- 3.12 Using Acronis License Server
- 4. Using Acronis Snap Deploy Management Console
- 5. Creating Acronis bootable media
- 6. Configuring PXE Server
- 7. Taking an image
- 8. Checking the master image
- 9. Deployment templates
- 9.1 Why save templates?
- 9.2 Creating templates
- 9.2.1 Master image selection
- 9.2.2 Disk/partition selection
- 9.2.3 Target disk and partition selection
- 9.2.4 User accounts
- 9.2.5 Computer names and domain/workgroup
- 9.2.6 Network settings
- 9.2.7 Security identifiers
- 9.2.8 Transferring files
- 9.2.9 Executing applications
- 9.2.10 Using Acronis Universal Deploy
- 9.2.11 Deployment options
- 9.2.12 Comments and summary
- 10. Standalone deployment
- 11. Manual deployment
- 12. Event-driven deployment
- 13. Scheduled deployment
- 14. Custom deployment mode
- 15. Command line and scripting under Win PE and Bart PE
- 16. Managing a remote computer

76 © Acronis, Inc
13. Scheduled deployment
Deployment can be run on a schedule. Scheduling presumes that when the scheduled time comes, the
program will power on the computers with predefined MAC addresses using the BIOS Wake On LAN
(WOL) functionality.
Computers in other subnets can be woken through a WOL proxy agent delivered with Acronis Snap
Deploy.
Computers that do not support WOL can be booted into Acronis environment manually before the
scheduled time comes. Such computers will also be deployed provided that their MAC addresses are
included in the total list.
Scenarios:
1. An organization receives a shipment of computers from a manufacturer along with the list of
their MAC addresses. The IT department has to deploy the operating system to the new
hardware.
2. An Internet café, a school or university lab has 100 computers with known MAC addresses.
The nightly deployment of the initial standard image on these computers is needed.
13.1 Preparation steps
13.1.1 Getting MAC addresses
Media Access Control address (MAC address) is a 48-bit physical (hardware) address of a network
device. In Windows, the physical address can be obtained with ipconfig /all or by selecting Local
Area Connection -> Status -> Support -> Details.
MAC addresses for bare metal are usually supplied by the hardware manufacturer. You can get a MAC
address of any PC-compatible hardware by entering the network configuration menu of any Acronis
bootable component (Acronis Master Image Creator, for example):
An administrator can execute a script that collects MAC addresses of networked computers and saves
them in a text file. The text file can then be imported by Acronis Snap Deploy. This can be a plain text
file:
; comment
00-01-23-45-67-1A ; comment
02-01-23-45-67-1B
An option to type in the hex MAC addresses is also provided.
13.1.2 Enabling WOL on targets
Before using scheduled deployment, make sure that Wake on LAN is enabled on the target computers.
Enter the computer BIOS and set Power -> Wake On PCI PME -> Power On (the exact names
might vary depending on the BIOS version.)
To enable the Wake on LAN feature on a Windows computer set the NIC properties on the computer
as follows: