Step by Step guide to deploy OS on a virus ingested computer
In a bound up world, your network computers can contract a computer virus in numerous unpredictable ways. Whenever a computer virus attaches itself to a program, it initially remains dormant and slowly executes its code. This way, it can affect all the computers in the entire network, steal passwords, business critical information, log keystrokes, corrupt files and even take complete control over computers.
What happens if a computer is virus infected?
A malicious virus is designed with the intention to replicate relentlessly to affect your programs, delete files and folder, reformatting hard drives, basically hamper the way your network computer should operate.
How to get rid of computer viruses?
Though there are a number of tactical ways to arm yourself against the malicious threats such as investing on a powerful antivirus program, the question is what if one or many of your computers are virus ingested? OS Deployer lets you completely wipe the virus infected OS and redeploy OS on all the virus computers in just clicks.
The steps to be followed depends on how far your network is affected. Click on the scenario that best suits your environment, to know the steps in detail.
Ensure you have identified all the virus affected computers in your network and shut them down. Also, if are new to OS deployer, download
and execute the .exe in a computer that is not virus ingested.
All the machines in your network are affected.
- As all the computers in your network are affected, download and install OS Deployer on a computer that is not affected by virus. Contact support at email@example.com for licensing and other queries.
- From the OS deployer server, image a computer that is not affected by the virus. Know more on creating images.
- The next step is to create a deployment template and customize your deployment based on the network preferences. You can also install a set of applications. This way, the essential applications will be installed on the target computer right after the OS is deployed.
- The steps to be followed next depends on the following circumstances.
- An isolated network that is not virus ingested is available.
- An isolated network that is devoid of virus is unavailable.
An isolated network is available.
- In this case, create a bootable media and boot the target computers after having them connected to the network that is virus free.
- Once the machine is booted, you can kick-start the deployment process by providing the unique 4 digit pass-code, the MAC addresses of the computers or by providing the administrator credentials.
- This will initiate the deployment and the status of the same will be available on the OS Deployer server.
The entire network is virus ingested
- In this case, where there is no isolated network available, the right option is to use the Standalone deployment method. This will let you image and deploy operating system to computers that are away from corporate network.
- Create a standalone media (an USB bootable media specific to stand alone deployment) by downloading the standalone tool along with the OS image.
- Now use this media to boot the computers ingested with viruses one-by-one. This wizard will let you deploy OS to the corrupted computer.
If you face hiccups in trying out the above steps, feel free to reach our support experts firstname.lastname@example.org