Chapter 10. Validating the Image
In the previous chapter, we discussed how to troubleshoot deployment logs and deployment share operations:
We looked at tools to decipher the MDT log files and error codes
We discussed the locations of the log files and importance of the logs in general
We also looked at a few common mistakes or errors that one might encounter in a standard MDT process
In this chapter, we will cover image validation scenarios:
We will talk to different tools that can be used to validate the image
We will check for bad drivers and poor performance and articulate the cost of purchasing lower-end hardware to the management
We will determine the operational and performance costs of anti-malware, antivirus, and other security auditing software
While it is all well and good to have a universal hardware-agnostic image deployed by the task sequence that lays down applications based on input criteria, how do we know that once the image reaches the end user, it will perform well? Do we know...