Skip to main content

Enable Windows 7/2008 features using DISM offline servicing

One of the strong management points of Windows 7 deployment is the ability to manage you images without having to apply the image, make the changes, and then recapture the image.  DISM (Deployment Image Servicing and Management) allows you to mount a Windows image and make configuration changes to it.  All this while not having to take the time to first deploy the image.

To begin working with an image, we need to mount it.  First, make a new folder to hold the mounted image.  For this demo, I made one called ImageMount.  Both the folder and the image file are on my D: drive.

Next, open a command prompt with elevated permissions.
The .wim file I’m using for this demo is the install.wim file from the Windows Server 2008 R2 installation media.

Browse to the location where you stored the image file and the folder to mount it in.

Type DISM /mount-wim /wimfile:d:\install.wim /index:1 /Mountdir:d:\ImageMount

Depending on the size of the WIM file, this may take a few minutes,

image

Once completed, you can get information on the mounted WIM file by typing: DISM /get-mountedwiminfo and pressing Enter.

image

Here we are going to take a look at enabling and disabling features in a Windows 7 image.  To get a list of the features, type DISM /image:d:\ImageMount /get-features and press Enter.  Below is just a small sampling of what was returned.

image

We are going to enable the Printing-Server-Role

Type DISM /image:D:\ImageMount /enable-feature /FeatureName:Printing-Server-Role and press Enter.

image

You should see the message above if all went well.  By once again typing DISM /image:d:\ImageMount /get-features and pressing Enter, you should see the feature has been “Enable Pending.” This indicates the Optional Component is installed and enabled.

image

You can disable a feature by typing DISM /image:D:\ImageMount /Remove-feature /FeatureName:Printing-Server-Role and pressing Enter.

To commit the changes and close the image for use, type DISM /Unmount-Wim /MountDir:D:\ImageMount /Commit. If you do not want to save your changes, replace /Commit to /Discard.

Comments

Popular posts from this blog

How to list all the AD LDS instances on a server

AD LDS allows you to provide directory services to applications that are free of the confines of Active Directory.  To list all the AD LDS instances on a server, follow this procedure: Log into the server in question Open a command prompt. Type dsdbutil and press Enter Type List Instances and press Enter . You will receive a list of the instance name, both the LDAP and SSL port numbers, the location of the database, and its status.

How to run GPResult on a remote client with PowerShell

In the past, to run the GPResult command, you would need to either physically visit this client, have the user do it, or use and RDP connection.  In all cases, this will disrupt the user.  First, you need PowerShell remoting enabled on the target machine.  You can do this via Group Policy . Open PowerShell and type this command. Invoke-Command –ScriptBlock {GPResult /r} –ComputerName <ComputerName> Replace <ComputerName> with the name of the target.  Remember, the target needs to be online and accessible to you.

Where did a User’s Account Get Locked Out?

Updated: May 15, 2015 When this article was originally published, two extra carriage returns were add causing the code to malfunction.  The code below is correct.   My client for this week’s PowerShell class had a really interesting question. They needed to know where an account is being locked out at. OK, interesting. Apparently users hop around clients and forget to log off, leading to eventual lock out of their accounts. The accounts can be unlocked, but are then relocked after Active Directory replication. This problem is solved in two parts. The first one is to modify the event auditing on the network. The second part is resolved with PowerShell. The first part involves creating a group policy that will encompass your Domain Controllers. In this GPO, make these changes. Expand Computer Configuration \ Policies \ Windows Settings \ Security Settings \ Advanced Audit Policy Configuration \ Audit Policies \ Account Management Double click User Account Management C...