• Active Directory
  • Application
  • Desktop & Mobile
  • Help Desk
  • Network
  • Server
  • IT Security
  • MSP
  • On-Demand
Device Management, made easy
Manage control and secure your workstations, mobile
devices and tablets
Help Desk for Everyone
IT Help Desk Software and Customer Support Software
Protect Your IT. Save Your Business
Build a secure fortress with our security management solutions
Manage services faster, with multi-tenanted, ITIL-ready, and unified RMM solutions
On-Demand Solutions
IT Help Desk, Active Directory, and Operations Management from the Cloud

Post-Deployment Customization

Customize Post Deployment configurations

OS Deployer does not stop with deploying the image to the target computers. It provides the ability to perform post-deployment configuration on the target computers that includes configuring the computer name, domain participation, network settings etc. Some of the important post-deployment actions that can be performed using OS Deployer include:

  • User Accounts: Specify the local user accounts that needs to be created in the target computers
  • Computer Name: Specify the DNS name for the target computer. You can use wild card characters to generate unique names
  • Domain/ Workgroup Membership: The details of the domain or workgroup to which the target computer belong
  • Network Settings: Specify the IP Address and the DNS Server IP for the target computers.
  • Security Identifiers: To generate and assign unique security identifiers (SIDs) for the target computers.
  • Transferring Files: To transfer specific files to the target computers
  • Executing Applications: To start the service applications on the target computers.

Imaging and Deployment Software trusted by