Users Guide

3
Downloading DTK
This section describes some of the procedures necessary to begin the deployment process, including:
Downloading and unzipping the Deployment Toolkit (DTK) components, including a comprehensive
matrix of DTK components.
Setting up a directory structure to facilitate a successful deployment, including a list of the supporting
components that are not included with DTK, but are needed to use DTK.
Setting up an optimally configured source system.
Configuring supported RAID controllers.
Extracting DTK components on systems running windows
DTK components are provided in a self-extracting zip file at www.dell.com/support. The self-extracting
file can be opened on any system running Microsoft Windows operating system. By default,
DTKX.XWINPE- XX.exe files are extracted to the root directory of your local hard drive, C:\. You can
change this location by giving a different path when extracting the files, but it is recommended that you
keep the DTK default directory structure if you plan to use the sample deployment scripts provided with
DTK.
1. Download the DTK file DTKX.X-WINPE-XX.exe from www.dell.com/support and save it on your
system.
2. After the file downloads, double-click the file. The Dell OpenManage Deployment Toolkit for
WindowsPE screen containing the product and download information appears.
3. Click OK.
4. Click Unzip.
By default, files are unzipped to C:\. You can unzip the DTK components to your local hard drive and
then copy them later to a network volume, or you can change the installation path to an available
network share. For example, you can unzip the files directly to the network share (for example, Z:\)
that you plan to use in the deployment process.
NOTE: Do not copy the DTK components to a Novell NetWare network volume. The DTK
network-based deployment is not supported from mapped Novell NetWare systems. The DTK
utilities do not run in Windows PE when Novell’s Client32 is loaded.
DTK components on systems running windows
Workstation is the system on which the DTK components are extracted.
Source system is an optimally configured system from which the system settings are captured.
Target system is the system on which the settings captured from the source system are replicated.
23