As some have discovered with the advancement of the imaging engine for K2000 version 3.6 some extra reboots occur that interfere with certain post install tasks failing due to the reboot.
Sysprep image changes
I had the imaged box login as a local user in my sysprep answer file and then join the domain and install software during the post phase and last turn on the computer use policy.
For version 3.6 I had to add an extra local login prior to the post tasks running for that reboot.
3.5 answer file auto logon part was:
With 3.5 the box would finish it's wim cast and set the mbr and go on to it's post tasks. With the introduction of 3.6 the box rebooted between the mid and post tasks using up my 1 autologin.
3.6 answer file auto logon part is:
That was the only change I had to make to my answer file. This way it reboots goes on to the posts task as the local user, joins the domain and sets the autologon to a domain user during the post tasks prior to the post task reboot.
My post script tasks ran without any changes, but I need the box to autologin as the domain user a couple of times to install deepfreeze prior to installing the policy screen that halts the autologin process waiting for you to say ok to the policy. I also read about other ITNinja's who have also complained that the post reboot interfering with installs running. You can use this to run an install/msi after kace is all done with the posts tasks or use this to runkbot and force a checkin after a couple of reboots.
my batch file is in the image:
reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /d "TMCC Academic Use Statement" /f
reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /d "TMCC Computer Use Policy - TMCC General Access Computer Labs are educational computer facilities open to all students, faculty and staff at TMCC. If not enrolled or employed at TMCC, then access is not allowed. Identification may be requested. Lab Assistants may monitor computer use. Students needing a computer to do their homework will have preference over students that are game playing or participating in Internet chat. Students who are on the chat lines or playing games are welcome, but will be advised to come back when the labs are not busy. Viewing or printing pornographic material that can be viewed by others is not allowed in any of the Labs or Kiosks. Cell-phone use in the labs is prohibited. Emergency calls can be received, but the user must step outside of the Lab to continue the conversation. Absolutely no food or beverages are allowed in the labs! Maintain a friendly and quiet lab for other students to do their work. Maintain a quiet work area: Loud boisterous behaviour is not acceptable; the Lab is not a place to socialize, as it's distracting to others. Children are not to be left unattended in the labs. Head count and surveys: In order to effectively use technology resources, head counts or surveys will be taken by the lab monitor. Please provide them with your cooperation. Closing time: The labs must close promptly at the scheduled time. Your cooperation in abiding with the closing time would be greatly appreciated. ACTIVITIES IN VIOLATION OF TMCC'S COMPUTER USE POLICY - Unauthorized use of a computer account. Using the campus network to gain unauthorized access to any computer systems. Connecting unauthorized equipment to the campus network. Using electronic mail to harass or threaten others. This includes, but is not limited to, sending repeated, unwanted Email to another user. Transmitting or reproducing materials that are slanderous or defamatory in nature or that otherwise violate existing laws, NSHE, or College regulations. Displaying obscene, lewd, or sexually harassing images or text in a public computer, facility, or location that can be in view of others. Initiating or propagating electronic chain letters inappropriate mass mailing. This includes, but is not limited to, multiple mailings to the TMCC Campus, newsgroups, mailing lists, or individuals forging the identity of a user or machine in an electronic communication. Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner. Unauthorized attempts to circumvent data protection schemes or uncover security loopholes. This includes creating and/or running programs that are designed to identify security loopholes and/or decrypt intentionally secure data. Knowingly or carelessly performing an act that will interfere with the normal operation of computers, terminals, peripherals, or networks. This includes tampering with or removing computer hardware or software. Knowingly or carelessly running or installing on any computer system or network, or giving to another user a program intended to damage or to place excessive load on a computer system or network. This includes, but is not limited to, programs known as computer viruses, Trojan horses, and worms. Deliberately wasting/overloading computing resources, such as printing excessive copies of a document. Violating terms of applicable software licensing agreements or copyright laws. Violating the TMCC Copyright Infringement policy, copyright laws and their fair use provisions through inappropriate reproduction or dissemination of copyrighted text, images, etc. Using college resources for commercial activity such as creating products or services for sale." /f
So to make it delay 2 reboots I add this line to the end of my last post task.
reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v setrunonce2 /d "reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v setrunonce1 /d \"reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v policyon /d c:\windows\w2d\policy.bat\""