Documente Academic
Documente Profesional
Documente Cultură
Copyright 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Altiris and any Altiris or Symantec trademarks used in the product are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION, INCLUDING WITHOUT LIMITATION ITS AFFILIATES AND SUBSIDIARIES, SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation," as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display, or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
Contents
Chapter 1: Introducing Altiris PC Transplant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Features and Benefits . . . . . . . . . . . . . . . . . . Easy to Use PC Transplant Wizard . . . . . . Personality Package . . . . . . . . . . . . . . . . Real-time Migration . . . . . . . . . . . . . . . . PC Transplant Real-time Destination Agent Application Install Administrator. . . . . . . . Application to Information (.A2i) Files . . . . A2i Builder. . . . . . . . . . . . . . . . . . . . . . . Personality Template Builder . . . . . . . . . . PC Transplant Package Editor. . . . . . . . . . Sending Events to Notification Server . . . . Online Help . . . . . . . . . . . . . . . . . . . . . . Settings You Can Transplant . . . . . . . . . . . . . Desktop Settings . . . . . . . . . . . . . . . . . . Network Settings . . . . . . . . . . . . . . . . . . Application Settings . . . . . . . . . . . . . . . . New Features in this release . . . . . . . . . . . . . PC Transplant Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 . 7 . 8 . 8 . 8 . 8 . 8 . 9 . 9 . 9 . 9 . 9 . 9 . 9 11 11 13 14
<%REG:%> Nesting. . . . . . . . . . . . . . . . . <%MULTIREG:%> . . . . . . . . . . . . . . . . . . <%STRIPTAILSLASHESn:path%> . . . . . . . <%STRIPHEADSLASHESn:path%>. . . . . . . <%all%> . . . . . . . . . . . . . . . . . . . . . . . . <%allvalues%> . . . . . . . . . . . . . . . . . . . . <%INI:%> . . . . . . . . . . . . . . . . . . . . . . . Environment Variables . . . . . . . . . . . . . . . . . . Values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Comma , . . . . . . . . . . . . . . . . . . . . . . . Wildcards ? and * . . . . . . . . . . . . . . Pipe | . . . . . . . . . . . . . . . . . . . . . . . . . Question Mark ?. . . . . . . . . . . . . . . . . . . Settings and Item Setting Properties . . . . . . . . . . . LogError . . . . . . . . . . . . . . . . . . . . . . . . . . . . Exclude . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DestOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DestVersion . . . . . . . . . . . . . . . . . . . . . . . . . . Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . Replace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Admin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DeleteKeyBeforeMigrating . . . . . . . . . . . . . . . . DeleteKeyBeforeMigrating=Remove . . . . . . DeleteKeyBeforeMigrating=RetainSpecified . ExcludeFilePaths. . . . . . . . . . . . . . . . . . . . . . . Retain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NewDestination . . . . . . . . . . . . . . . . . . . . . . . Application to Information (.A2i) Format . . . . . . . . . Application Executable . . . . . . . . . . . . . . . . . . Application Versions . . . . . . . . . . . . . . . . . . . . Application Settings . . . . . . . . . . . . . . . . . . . . Flag . . . . . . . . . . . . . . . . . . . . . . . . . . . . Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . Values. . . . . . . . . . . . . . . . . . . . . . . . . . . INI Support . . . . . . . . . . . . . . . . . . . . . . . . . . Variable Support . . . . . . . . . . . . . . . . . . . . . . Template File Format . . . . . . . . . . . . . . . . . . . . . . General File Format . . . . . . . . . . . . . . . . . . . . Personality Build Template Sections . . . . . . . . . Desktop, Network, and Applications Settings Files Section . . . . . . . . . . . . . . . . . . . . . . Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . .
....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... ....... Sections. ....... .......
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. 91 . 91 . 92 . 93 . 93 . 95 . 96 . 97 . 99 . 99 100 100 101 101 101 102 102 103 103 104 104 107 107 108 108 109 109 110 110 111 113 114 115 115 117 118 119 123 123 123 124 125 130
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Chapter 1
Upgrade to a new computer Run the PC Transplant Wizard on the old computer to capture the user profiles and the required settings and data. You can perform a real-time migration or save the Personality Package, copy that file onto the new computer, double-click and the upgrade process is complete. Upgrade to a new OS PC Transplant includes a Migration Wizard that captures the existing personality, deploys, and restores the personality. PC Transplant even creates the user accounts automatically. Deploy a new OS organization-wide PC Transplant lets you create Personality Build Templates, ensuring that the settings and data you want to capture are included in the Personality Package. These templates can be run from the command-line to automate OS migrations organization-wide. Manage the migration of applications PC Transplant lets you install applications prior to migration. You can install applications of the same or higher version with a new PC Transplant tool called Application Install Administrator. Execute the departmental PC shuffle more easily Users have to run PC Transplant and back up their computer personalities to the network. To move all computers at once, have your users reapply their personalities and the process is complete. Perform Remote Migration Use a remote management agent, such as Altiris Deployment Server software or
Microsoft SMS, to capture a computers personality and push it to the same upgraded computer or to a new computer.
z
Back up and restore computer personalities Most disaster recovery solutions restore data. PC Transplant also restores desktop, network, printer, application settings (such as templates, favorites, and contacts), and entire directory structures, so users can use their computers. Share resources You can share computer resources (such as a departmental travel laptop or a teachers console in a multi-teacher computer training lab) by having each user create a Personality Package with the settings and data they need on the shared computer. Users can double-click on their Personality Package before their class or presentation and then double-click the undo icon to uninstall it after they have completed their session to return the computer to its original state. Synchronize multiple computers Create a Personality Build Template including only the folders, documents, and settings you use most, then build a new Personality Package any time you need to move between computers to capture your most recent changes. Share settings and establish department profiles Create a small Personality Package containing only the settings you want to share, or create a marketing or accounting personality with the templates, style sheets, forms, and contacts you want to share with all computers within the department.
Personality Package
A Personality Package is a self-extracting executable file created by the PC Transplant Wizard. Because a Personality Package is a self-contained executable file, you can distribute it any way you want: floppy disk, e-mail, network share, CD, Web download, or removable media such as Iomega JazTM, ZipTM, or PeerlessTM drives. Personality Packages can also be deployed using services, such as Windows Task Manager, Microsoft SMS, and Altiris Deployment Solution for servers, a total computer management and deployment solution. When the Personality Package runs on the target computer, the settings you captured are applied to the computer.
Real-time Migration
Through a network connection, you can transplant a computers settings and files directly and in real time to another computer, eliminating the need for creating Personality Packages. Real-time migration includes the following features: user mapping, user properties, user account creation, application installation, and destination computer application information.
A2i Builder
The A2i Builder is included in PC Transplant and helps you create customized .A2i files for an application. For more information, see Using the A2i Builder (page 72).
Online Help
Help is at your fingertips no matter where you are in the migration process. By clicking the question mark (?) in the upper right hand corner of any dialog, you can click any item displayed in PC Transplant to get additional information. PC Transplant also has updated and enhanced the online help to context-sensitive Microsoft HTML help. Click Help from any page in the wizard to view the HTML help.
Desktop Settings (page 9) Network Settings (page 11) Application Settings (page 11)
Desktop Settings
PC Transplant can migrate the following desktop settings:
z
Control Panel
Power Settings Printer Settings including TCP/IP printer ports Regional Settings Sound
Display Properties
Active Desktop Appearance Background Display Settings Effects (Plus! Settings) Screen Saver
Windows Shell
10
Network Settings
PC Transplant can migrate the following network settings:
z z z z z z z
Computer Name Domain Name Dial-Up/RAS connections Window drive Mappings Folder/Drive share assignments NetWare Windows Client (Client 32) settings TCP/IP
Application Settings
PC Transplant migrates settings for more than 100 application versions of the most commonly used business applications. With a few exceptions, PC Transplant does not migrate complete applications but migrates application settings. To see the specific
11
application settings, open any .A2i file (contained in the PC Transplant installation folder) in a text editor. Here are some of the applications that PC Transplant supports:
Company
Adobe Altiris AOL AT&T Cisco Corel FileMaker, Inc. GlobalScape ICQ, Inc. Jasc Software Lotus
Application
Acrobat, PageMaker, Photoshop Carbon Copy Solution AOL Client, Instant Messenger AT&T Global Network Vpn Client WordPerfect, Quattro Pro, Presentation, Paradox FileMaker Pro CuteFTP ICQ Paint Shop Pro Notes, Smart Center, WordPro, 1-2-3, Organizer, Approach, FastSite, Freelance, ScreenCam Microsoft Word, Excel, PowerPoint, Access, Outlook, Outlook Express, Exchange Client, Internet Explorer, NetMeeting, MSN Messenger, Publisher, FrontPage, Visual C++, Visual Basic, Visual InterDev, Visual FoxPro, Visual Source Safe, ActiveSync, Project, Visio Navigator McAffee Virus Scan GroupWise Winamp Palm Desktop Intellisync for Palm Computing Eudora Pro RealPlayer, RealJukebox ACT!, Norton AntiVirus, PC Anywhere, WinFax Pro WinZip Yahoo! Messenger
Microsoft
Netscape Network Associates Novell Nullsoft Palm Computing Pumatech Qualcomm RealAudio Symantec WinZip Yahoo
12
Altiris continues to add support for additional applications. The .A2i files, which support these applications, are available as a free download from Altiris Web site at ftp:// support.altiris.com/pct/ver6.x/EN. You can also update your list of .A2i files from within the PC Transplant Package Editor by clicking Help > Application Updates. Your computer connects to the Altiris Web site, searches for new or updated .A2i files, and presents them for automatic download. You can also update your setting files from within the PC Transplant Wizard and the Template Builder by running the application and clicking the system menu, then Update Application Support. The original files are placed in the Backup folder before updating the .A2i files. If you are using applications for which no A2i files exists, PC Transplant ships a utility with the A2i Builder that lets you build your own customized .A2i files. For more information, see Using the A2i Builder (page 72).
13
PC Transplant Documentation
The PC Transplant documentation is available in context-sensitive HTML help format and PC Transplant Reference Guide is available in .PDF format. You can access the PC Transplant documentation in the following ways:
z
On a computer where PC Transplant is installed, click Start > Programs > Altiris > PC Transplant > Documentation. By clicking Help when running PC Transplant programs, you can access the Online help. From the PC Transplant program folder on a computer where PC Transplant is installed, open pctransplantref.pdf or pctransplant.chm. From the Docs folder of the Altiris product CD, open pctransplantref.pdf or pctransplant.chm.
The most current versions of documentation are available from the Altiris documentation Web page at www.altiris.com/support/documentation. To access the Whats This? Help, click ? in the top right corner of the PC Transplant program screen and then click the item you want to learn more about.
14
Chapter 2
You can create a Personality Package or perform a real-time migration using PC Transplants easy-to-use wizard. The PC Transplant Wizard lets you pick and choose the settings you want to transplant to another computer. You can also automate a personality transplant by running the PC Transplant Wizard with command-line options. This feature lets you initiate migrations through batch files, login scripts, and so on. When you create a Personality Package, the computers settings and files are captured in a single self-extracting executable file. In addition, you can define options that affect the way the Personality Package behaves when it installs itself on the target computer. When you perform a real-time migration, a source computers settings and files are migrated real-time through a network connection to a destination computer, eliminating the need of any stored files. To run PC Transplant successfully on your source and destination computers, we recommend an account that has access to all users on the source computer and has the rights to create users on the destination computer. We recommend that you use a domain user account with local administrative rights as the minimum rights level. If the user account does not have administrative rights on a domain, then local administrative rights is sufficient. If you use an account that is not a local administrator or has lesser rights than a standard administrator account, you will not be able to create users and migrate certain settings. You will be forced into a limited migration. Example: if you are migrating a printer and the printers drivers need to be installed, a group policy that prevents users or power users from installing those drivers would prevent the migration of the printer. We also recommend that you always preface your user account name with a domain name applicable to the migration. When migrating domain user accounts on the same domain, you need different rights based on the situation
z
For migrating domain user accounts, you need a domain user with rights to the local computers that are being migrated. Local administrative rights are preferred because of possible limitations without them. For computer and domain name migration, you need administrative rights on the local computers and rights on the domain to manage computer accounts. For any multiple user migration you must be a local administrator on both machines.
When migrating domain user accounts from different domains (example: Domain A to Domain B), you need different account rights based on the situation.
15
For package migration, you need a Domain A account for the source package and a Domain B account for the destination. You can also use an account that traverses both domains using domain trusts. For real time migration, you must have an account with rights to both domains and both local computers. For any multiple user migration you must be a local administrator on both computers.
Note When pushing from the Deployment Server, you can only use the Pre Windows 2000 User Name. This chapter provides information on:
z z z z
Viewing, Printing, or Changing Personality Package Contents (page 42) Using and Editing a Personality Package (page 16) Using the PC Transplant Wizard with Command-line Options (page 25) PC Transplant Exit Values (page 42)
User Account Settings and Files Options (page 16) Personality Build Template Options (page 20) PC Settings Options (page 21) Application Install Options (page 24) Files, Folders, and File Types Options (page 24)
16
computer to allow the execution of PC Transplant Wizard and the PC Transplant real-time destination agent. For more information, see Using the PC Transplant Wizard with Command-line Options (page 25). With the loop back functionality, you can give the same computer name and the IP address for the target computer. You can also provide the loop back IP address, that is, 127.0.0.1 instead of the same IP address. The loop back functionality can be used for the following:
z z
Migrate settings from one user to another user on the same computer Import settings of an orphan account to some active user account on the same computer Migrate data from one directory to another on the same computer
User Mapping
When selecting the user accounts to migrate, you are shown the user accounts that exist on both the source and destination computers. You can map the settings of one user account on the source computer to any account name on the destination computer.
User has administrative rights on both the source and destination computers
All the accounts on both the computers are listed. You can map any of the accounts on the source computer to any of the accounts on the destination computer.
User Properties
The User Properties feature displays the users that exist on both the source and destination computers, and the groups to which those users belong. Only users with administrative rights have the ability to view and migrate multiple users. If the current user running the Wizard does not have administrative or system rights, only the current logged on user will be presented for migration.
User Creation
You can also create new accounts on the destination computer to match accounts on the source computer. Example: If an account named Bob exists on the source computer but not on the destination computer, and you want to migrate that account and maintain the name, you can create an account named Bob on the destination computer from the Wizard, and then select that account to be migrated.
17
PC Transplant attempts to set an empty password for the new account. If your computer is a member of a domain that restricts a password to a minimum length or complexity, PC Transplant creates the password using the following syntax:
PasswordMMYYYY
The syntax is case-sensitive, where MM represents the number of the month, and YYYY represents the year the account was created (that is, Password012002). The password is logged in the migrate.log file. You can override the password defined by PC Transplant by using the New User Password option provided in the PC Transplant Wizard or through the -newuserpassword command-line option. The new password must satisfy the password policy on the local computer. Only one password can be set for all the local users, that is, you cannot change this password for the other new users you want to create. For more information, see Using the PC Transplant Wizard with Command-line Options (page 25). When accounts have been validated, you are provided with a user map to link user accounts from the source computer with accounts on the destination computer. The user mapping can be done with the -user and -usermap command-line options also. While creating new user accounts and adding them to a particular group on the destination computer, you need to check whether the user account is already a member of the group. If the user account is not an existing member of the group, then the user account is added to the group. Example: If a domain user, Altirs\Joe, exists on the source computer and is a member of the administrator group on the source computer, then Altirs\Joe should be made a member of the administrator group on the destination computer too. Consider the scenario where Altirs\Joe is an administrator on the source computer and a member of Altiris\domain users group, and Altiris\domain users is a member of the administrator group on the destination computer. When Altiris\Joe is migrated to the destination computer, this user account becomes a member of the administrator group in two methods; one is through the Altiris\domain users group and the other is by being directly added to the administrator group. Additionally, if Altirs\Joe has been removed from the administrator group, this user account will still be a member because it is a member of the Altiris\domain users group. PC Transplant first checks if a user account is a member of a group before creating the user account and adding it to a particular group on the destination computer.
18
By including this additional functionality for disconnected users, PC Transplant no longer requires a network connection to migrate domain user accounts. This opens up the added flexibility of using a network cross-over cable to migrate users from one computer to another. While deploying this user, the user account is created as a network user if its domain is not available. The settings of the user account are migrated to the newly created disconnected user. While deploying the package, disconnected users can be mapped to a new account, same account, or another existing account.
user1=
Example
Description
Captures User1 in capture mode and maps User1 to User1 during real-time migration and deploying the package Captures User2 in capture mode and maps User2 to User2 during real-time migration and deploying the package Captures User3 in capture mode and maps User3 to User4 during real-time migration and deploying the package
Security Options
This section describes how PC Transplant migrates file permissions. This feature is only available on Microsoft Windows using an NTFS file store.
19
Users and administrators of these systems can manage the access of their files and folders at a group or user level. PC Transplant can migrate these permissions, allowing you to keep your files and folders secure.
Permissions
When migrating the permissions of a file, all security elements assigned to the file will be transferred to the destination computer. A security element may be a user group or individual user account. If an element does not exist on the destination computer, it will be added and will remain unresolved. The security element must already exist on the destination computer for the transfer to be successful. If a user uses Explorer to view the security of a migrated file (Properties, Security), any user or group that does not exist on the destination computer will be shown as an unresolved SID (user security identifier). In some cases, a domain users FSID will migrate, but remains unresolved until that user accesses that account either locally or across the network on the respective computer. There are potential problems with accessing files migrated along with their security permissions if the user accounts assigned to the file are local accounts or you are moving to a different domain. In these two cases, PC Transplant will turn off the migration of security permissions. You may choose to override the functionality when prompted during migration or if running in quiet mode using the -security option. If moving to a new domain, trust must be established between the old domain and the new one for the SID to be accepted or SID history must exist for the old SID.
Default Comprises of Desktop settings and a few Network settings such as the Folder/Driver share assignments, Dial-Up/RAS, and Windows drive mapping. No application, file, or data settings are captured by the Default.pbt. DNA - Comprises all Desktop, Network, and Application settings DNMail - Comprises all Desktop, Network, Microsoft Outlook, and Microsoft Outlook Express mail settings DNOffice - Comprises all Desktop and Network settings, and all Microsoft Office applications settings DNMSApplication - Comprises all Desktop and Network settings, and all Microsoft applications settings DNLotus Comprises all Desktop, Network, and Lotus application settings
z z
A template file can be selected from within the Wizard or can be passed as a command line switch to the program using the p switch. The -at: <template name> command line option allows you to specify the admin template file name when building a Personality Package. For a complete listing of what command line options can be used to automate the creation of a Personality Package, see Using the PC Transplant Wizard with Command-line Options (page 25).
20
By creating build templates, you can reuse settings when transplanting other personalities. PC Transplant provides three ways to create a Personality Build Template:
z z z
PC Transplant Wizard
A template created using the PC Transplant Wizard is system dependant. It requires that all desktop, network, and application settings, files, and folders be present on the executing computer to define the template. To create a system independent template, see Template Builder (page 21).
Template Builder
The Template Builder allows users to build and edit templates outside the PC Transplant Wizard. This tool allows a user to define a template without being on the source computer. The tool has a similar interface as the PC Transplant Wizard.
Text Editor
Template files can also be manually created using any text editor or program capable of creating text files. For more information, see Template File Format (page 123).
PC Settings Options
The settings listed in the Desktop and Network tabs come from the information in the Dsktp*.ini and Ntwrk*.ini files. All these files can be edited using a text editor. See Desktop and Network Settings File Format (page 79). The details and the warnings of the settings that you selected can be viewed.
z
If you select Create a new Package or Edit an existing package in the wizard, then the warnings for the application settings are displayed with respect to the source version to all the possible versions. If you select Real Time Migration, then the warnings for the application settings are displayed with respect to the source version and the destination version. For the Template Builder, the warnings for the application settings are displayed for all the supported versions to all the possible versions.
Desktop Settings
The settings listed in the Desktop tab come from the information in the Dsktp*.ini file. This file can be edited using a text editor. See Desktop and Network Settings File Format (page 79).
Network Settings
The settings listed in the Network tab come from the information in the Ntwrk*.ini file. This file can be edited using a text editor. See Desktop and Network Settings File Format (page 79).
21
22
Application Settings
The settings listed in the Applications tab come from .A2i files you have and the applications that are registered in the Windows registry as installed applications.
A2i Builder
If you are using applications for which no A2i files exist, PC Transplant ships with A2i Builder, a utility that lets you build your own custom .A2i files.
23
During real-time migration, some applications would require you to restart the computer after installation. In such cases, the Application Installer tool gets launched to install other applications that you selected from the list, if only you log on using the same user name. When doing a real-time migration, you are shown information about the applications that are installed on both the source and destination computers. Applications that are installed on the source computer but not on the destination computer are designated so that you do not transplant settings for an application that does not exist on the destination computer. You are also shown information about the applications that are installed on each computer but are of different versions. Example: If Microsoft ActiveSync is installed on the source computer, but not on the destination computer, ActiveSync will be displayed in the application list, but it will be denoted as not being installed, and you will not be able to select settings for that application. Note: For a real-time migration on the same computer, this feature is not available. For the Template Builder, this page is displayed if any applications are selected for migration. All the applications selected for migration are disabled initially. If the application installer definition file that you provided contains the install information and the install server information for the applications selected for migration, then the application list is enabled. The applications that are listed can be installed using the information defined in the Application Install Administrator.
24
Details
Function. Provides a customized IP address and subnet mask to configure the source and destination computer for crossover migration. This switch can be used in the PC Transplant Wizard and in the PCTCrossConfig utility. When you use this switch in the PC Transplant Wizard, you have to specify the IP address of the source computer. When you use this switch in the PCTCrossConfig utility, you have to specify the IP address of the destination computer.
-alp:<password>
This option is applicable only for real-time migration. Function. Specify the password required for auto-logon for application installation and CNDN migration. The password cannot be blank.
This option is applicable only for real-time migration. Function. Specify the domain name and the user name required for auto-logon for application installation and CNDN migration. This command-line option helps in continuing migration after a reboot has occurred.
25
Details
Function. Use the -at: option to pass an admin template on the command line when building a Personality Package. This command can be used in conjunction with the p:<template file name>. The -at: option lets an administrator define a template that works in conjunction with a users selection. This gives administrators the ability of defining default settings for each user, but the flexibility to allow users to add in additional settings, folders, and files they want migrated. This option also accepts environment variables. Example The administrator uses the wizard to create a template that will be used to migrate all users common settings, and saves the template to the network under the path x:\pct\admin.pbt. The administrator also understands that some users have personal folders and files on their systems that the administrator is not aware of. The users will need to provide this information. So a link to TEMPLATE.EXE is sent to the users. The users are instructed to execute the shortcut, select any personal settings, files, and folders, and to save the template at the end to network as \\server\pct\templates\%username%.pbt. Now the administrator has two templates that will not only pick up their corporate settings, but the users personal settings, too. The administrator then launches the wizard on the users computer using the following command and creates a complete package:
-clean:1
PCTWIZ -clean:1
26
Details
Function. Validates the command-line options passed to the application. Paths and file names are validated for the types of options and the syntax of the commands. A dialog is displayed for errors encountered for the nonquiet mode. The errors are logged for the quiet mode and the execution is aborted. Function. Password defines the password of the domain administrator and is used in conjunction with the -dau option to migrate computer and domain names in quiet mode. Note If you use multiple passwords, all the passwords must be either plain-text or encrypted.
-dap:<password>
-dau:<username>
Function. Username defines the name of the domain administrator. This option is required to migrate computer and domain names in quiet mode. You need to specify the credentials of a user who is an administrator on that domain. Example -dau:<domain\username> -dap: <password>
-DecryptPwd
Function. Decrypts all the passwords provided from the command line. The passwords used with this switch must be encrypted using the Altiris Password Encryption tool. You cannot include any unencrypted passwords on the command line if this command-line option is used.
-DriveMap: Function. By default, a file or folder is migrated to the <SourceDrive>$<Destinati same drive on the destination computer. You can specify a onDrive> new drive to migrate the files or folders by using the DriveMap option. -ep Function. Adds an edit password to the package. This is especially useful when used with -q. Syntax
PCTWIZ -ep:password
Example
PCTWIZ -ep:editrip
-errorlevel:<level> Function. Provides more information about the errors that occur during capture. The information depends on the error level. -errorlevel:1 logs generic information about the errors. -errorlevel:2 logs errors and warnings. -errorlevel:3 logs detailed information about the errors and warnings. By default, the error level is 1.
27
Details
Function. Lets users define the path and file name to the error.log file, which is created if any errors or warning occur during the creation of a package. This option accepts environment variables. Example
PCTWIZ errorlog:p:\pct\blderrors\%username%.log
-f:<filename> Function. Sets the name of the Personality Package executable. Example If you want to use the PC Transplant Wizard (PCTWiz.EXE) from the command line and you want to save the Personality Package to a file called mysettings.exe, type:
PCTWIZ -f:mysettings.exe
This option also accepts environment variables. Example
PCTWIZ -f:%username%.exe
If no default name is specified, the default package name will be the computer name. You can also save Personality Packages to a Web server. For Windows Vista, you can provide the option to create .EXE and .PKG files or only .EXE file. To create .EXE and .PKG files type:
-f:<filename>;1
To create a .EXE file, type:
-f:<filename>;0
See -pkg:<package name.pkg> (page 31) commandline option.
28
Details
Function. This option lets you set the profile path of the folders of the destination computer as the profile path of the source computer. You can specify this command line for a package. Example <filename>.exe -keepprofilepaths Example PCTWiz.exe -keepprofilepaths You can also use this command line to copy the existing data-My Document, My Music, My Pictures, and My Video folders in the profile folder of the destination computer to the new location. You can use the following command-line option to copy the existing folders. -keepprofilepaths:1 OR -keepprofilepaths You can use the following command-line if you do not want to copy the existing folders to the new location. -keepprofilepaths:0 You can use this command line to set the profile path of the folders of the source computer as the profile path of the destination computer also during a real-time migration. During a real-time migration, you have to use this command-line option only with the rt:network=<machinename> command-line option. See -rt:network= (page 35) command-line option. Example -rt:network=<machinename> -keepprofilepaths
-migratelog: <pathname>
This option is only applicable for real-time migration. Function. Lets users define the path and file name for the migrate.log file, which is created when migrating the personality. It contains any errors or warnings that occurred. This option accepts environment variables. Example
mypkge.exe migratelog:p:\pct\runerrors\%username%.log
29
Details
Function. Allows the execution of two or more instances of the PC Transplant Wizard, Personality Migration Wizard, and the PC Transplant real-time destination agent. If you do not use this command-line option, PC Transplant does not allow any two instances of the mentioned combined applications to run simultaneously on the same computer. This option is applicable only for real-time migration. Function. Allows the migration of files to network drives.
-netdrives
-newuserpassword: <password>
This option is applicable only for real-time migration. Function. Use this command-line option to define a password for all new local user accounts created by PC Transplant. If this command is not used, PC Transplant will attempt to set an empty password for all new accounts. If your computer is a member of a domain that restricts a password to a minimum length or complexity, PC Transplant will create the password using the following syntax: PasswordMMYYYY The syntax is case-sensitive, where MM represents the number of the month, and YYYY represents the year the account was created (that is, Password012002). Note If you use multiple passwords, all the passwords must be either plain-text or encrypted.
-nonetworkfiles -noundoshortcut
Function. Do not migrate any network files, even if explicitly defined as a file or folder or as part of a setting. This option is applicable only for real-time migration. Function. Do not create a shortcut link on the desktop for the undo file.
30
Details
Function. The PC Transplant Wizard and the Template Builder support the creation of personality build template (.pbt) files. These files contain all settings, files, and options that can be used to create a Personality Package. This option allows you to specify the template file name on the command line that can be used to automate the collection process. If there is any path with spaces, then type the entire path within double quotes. Example If the file name is mysettings.pbt and the path has spaces then type:
PCTWIZ -p:mysettings.pbt
This option also accepts environment variables. Example
PCTWIZ -p:%username%.pbt
For more information, see Environment Variables (page 97). -password:<password> Function. The password specified will be used with the usercontext option to connect to the destination computer to push and run the PC Transplant Destination agent, if not running. When you store Personality Package on a Web server, the password specified is used to authenticate to a IIS Server. Note If you use multiple passwords, all the passwords must be either plain-text or encrypted. -pkg:<package name.pkg> Function. Used to specify .PKG file that is run by a personality package. A .PKG file includes settings, files, folders, and registry information. The .PKG file is created in a Windows Vista computer when you specify the option to create a .PKG file in the -f command line. See f:<filename> (page 28) command-line option. -printer:<Name of Printer>$<Path of inf file> This option is applicable only for real-time migration. Function. Specifies the path of .inf file for each printer in case of cross platform printer migration. Syntax
31
Details
This option is applicable only for real-time migration, and can be used with network printers only. Function. Searches for the print server associated with the source computer and migrates all the specified printers. Syntax
-printer:+printerserver=wing??;hp*
This command migrates all printers whose names match with wild card wing?? and hp*, such as wing2a, wing2b, hp laser 2000, hp 2000 series, and so on to the destination computer. Example
-printer:+printerserver!=wing??;hp*
This command does not migrate all printers whose names match with wild card wing?? and hp*, such as wing2a, wing2b, hp laser 2000, hp 2000 series, and so on to the destination computer. -printer:<Names of printers This option is applicable only for real-time migration, and to be can be used with network printers only. migrated>+printerserver= Function. Migrates the specified printer only if it belongs <Names of printer server> to the specified print server. Syntax
-printer:Wing2A$c:\drivers\print\hp.ini+printerserver=vo y*;john;
This command migrates the printer Wing-2A only if it belongs to a print server whose name starts with voy or if the print server name is john. Example
-printer:Wing2A$c:\drivers\print\hp.ini+printerserver!=v oy*;john;
This command does not migrate the printer Wing-2A if it belongs to a print server whose name starts with voy or if print server name is john.
32
Details
Function. Builds a Personality Package that requires no user interaction (quiet mode). When the wizard is run in a quiet mode, the user will be provided with a progress dialog that can be used to monitor the overall progress of the migration. The user will not be able to stop the migration from this dialog. Example If you want to build a Personality Package without viewing the PC Transplant Wizard interface, and PCTWiz.exe is located on the drive G and in the pct folder, and you want to save the Personality Package as mysettings.exe, type:
g:\pct\pctwiz.exe -q f:u:\user\MySettings.exe
Note The -f option must accompany the -q option to store the package in specified path (see -f:<filename> on page 28). If -f is not specified, the package is stored in the default path where PCTWiz.exe is stored. When you use this command-line option on a Microsoft Windows Vista computer, the User Account Control (UAC) dialog appears. The UAC dialog cannot be handled programmatically. Therefore, you have to disable the UAC dialog from the control panel. However, this option is not recommended. So, you can run the package in the quiet mode from the administrative command mode by running the command prompt as the administrator. You can also add a -p: option to specify templates (see p:<template filename> on page 31).
33
Details
Function. Allows a user to run the PC Transplant Wizard in a quiet minimized mode. The package is shown running in the system tray in minimized mode. When running in quiet mode, the user must also provide a file name for the package (see -f:<filename> on page 28). To use the feature, run the wizard (PCTWiz.EXE) using the -qm option. Note When you use this command-line option on a Microsoft Windows Vista computer, the User Account Control (UAC) dialog is displayed. The UAC dialog cannot be handled programmatically. Therefore, you have to disable the UAC dialog from the control paned. However, this option is not recommended. So, you can run the Package in the quiet mode from the administrative command mode by running the command prompt as the administrator. Example
-rp
PCTWIZ -rp:password
Example
PCTWIZ -rp:runrip
34
Details
This option is only applicable for real-time migration. Function. Specify the destination computer name in place of <machinename>. If administrative rights are needed to authenticate to the destination computer, use usercontext and -password options. This option can also be used to search the computers on which the Destination agent is running. The first computer that is found to run the Destination agent is selected in the non-quiet mode. The search continues in the quiet mode. Syntax
PCTWIZ -rt:network=<machinename>
Example
PCTWIZ -rt:network=devlaptop
This example attempts to connect to the PC Transplant Destination Agent on devlaptop and start a real-time migration using the other command-line options provided. If the destination agent is not running, it will attempt to push the PC Transplant Destination Agent to the computer and launch it (only available when migrating from Windows NTx to NTx).
PCTWIZ -rt:network=*
This example searches across the network for the computers on which the Destination agent is running. -Security: <Security options: no, object, parent> This option is only applicable for real-time migration. Function. This defines the security permission migration option.
-security:object means security permission will be migrated for the file or folder only and will not propagate to its parent. -security:parent means security permission will be migrated to the file and read-only permission will get propagated to its ancestors.
Note This command-line option can be used only if the Migrate Security Permissions in the Security area of Run tab on Options page was selected in the template that you use for migration. Syntax PCTWIZ -Security: <Security options: no, object, parent>
35
Details
Function. Path defines the location of your desktop (dsktp*.ini), network (ntwrk*.ini), and application (*.a2I) setting files. The default location of these files is the program folder. Function. Defines if the splash screen should be displayed or not. The value can be 0 or 1. Use 0 to turn the splash screen off or 1 to turn it on. If you do not provide the option, the splash screen is displayed by default. Function. Lets the user define the path and filename of the summary.log file. This file is created during the creation of a Personality Package and includes information about the settings stored within the package. Example
-splash:<value>
-summary:<pathname>
PCTWIZ -summary:p:\pct\summary.log
-user: Function Defines a list of users to migrate. For more information on how to use this option, see user: Command-line Option Usage (page 37). Function. The user name specified will be used to connect to the destination computer to push and run the PC Transplant Destination Agent, if not running. When you store Personality Package on a Web server, the user name specified is used to authenticate to an IIS Server. -usermap:<filename> Function. Provides a method to redirect users to different domains or different user account names from a single file. Replace <filename> with the usermap.ini file path. The ini file contains the Users section where you can give the user accounts mappings switch. Example
-usercontext: <username>
[Users] ;This will capture user1 in capture mode, and migrate user1's settings to user2 when deploying the package on the destination computer. In the RTM mode, it maps user1 to user2. domain\user1= domain\user2
36
Details
Function. Update setting files with the most recent definitions stored on the Altiris Web site (ftp:// support.altiris.com/pct/ver6.x/EN). Altiris is continually adding support for migrating settings and files for new application versions and adding functionality to existing ones. It is recommended that you update your settings files to ensure that you are using the latest files. Syntax
PCTWIZ -uweb
You can specify whether you want to update from the Web, regardless of what mode you are running in and allow it to turn on or off. The switch can accept any one of the three parameters: 0, 1, or 2. Specify Zero to turn off updating from the Web, 1 to turn it on and display the dialog box, and 2 to update the files silently, whether in UI or quiet mode. -Unresolved:<options> Function. Allows the unresolved shortcut links from the indicated area to remain visible even though the shortcut is not presently valid. Path, such as c:\ has shortcuts located there. Start Menu option refers to the start menu items selected within the package. Desktop option refers to the Desktop items selected within the packages. Example -unresolved:c:\temp;Start Menu;Desktop Retrieves the shortcut from C:\temp, the Start Menu, and from the Desktop folder and migrates them to the destination computer irrespective of whether the links are pointing to the referenced programs.
Users
To specify multiple users, separate each name with a semicolon.
Example -user:mary;bob;greg
To distinguish between local domain or network domain accounts, add the domain name before the user account.
Syntax -user:domain\user
37
Example -user:jimspc\jim;altiris\joe
To captures settings for all the accounts present on the computer, wildcard characters, such as * and ? can be used. * is used to represent any number of characters, whereas ? is used to represent a single character. Additionally, you can exclude certain accounts using !=. Note This is the default behavior in quiet mode. Syntax -user:*
The following table provides some examples of the usage of wildcard characters and excluding accounts.
Example
Function
Includes all user names starting with a. Includes all user names that contain 4 characters. Excludes all user names starting with a. Excludes all user names that contain 4 characters. Includes all user names that contain two characters before ge and any number of characters after ge, as in Tiger. Excludes all user names that contain two characters before ge and any number of characters after ge, as in Tiger.
-user:*\*+users!=??ge*
To capture settings for all accounts on a specific domain, include the domain name followed by an asterisk.
Syntax -user:domain\*
To capture setting for all domain accounts for a given user, include an asterisk followed by the user name.
Syntax -user:*\username
On Windows 2000, and XP computers, the domain is only required if you want specific domain accounts.
38
you can distinguish between accounts that were created or last accessed based on a specific date or within a specific date range.
Syntax
-user:domain\username+Groups=Group Type,Group Type,+Date Type=date range or date;domain\username+Groups=Group Type,Group Type,+Date Type=date range or date;
Examples:
Example
Function
Captures all Altiris domain user accounts that were created in the last 6 days.
-user:altiris\*+Groups=Users+Created=6Days
Captures all local domain accounts -user:%MI_COMPUTERNAME%\*+Groups=Power Users,Users+Accessed=6Monts;Altiris\*+Group that are power users or user accounts that have been accessed over the last s=Users+Accessed=6Months 6 months. It will also grab all domain user accounts that have also been accessed over the last 6 months.
-user:*+Groups=Administrators+Created=0101-2001
Captures all users that are part of the administrator group that have been created since January 1, 2001. Note The asterisk was included to indicate all accounts but is not required.
-user:work\*+Created!=6months
Captures all the accounts that belong to work domain and those that were not created in the last six months. Captures all the accounts that belong to work domain which were not accessed since 6 December 2002. domain and excludes the users from the administrator group. Includes all the users that are not a part of work and work1 domain during capture. It captures the users that are a part of either user group or admin group. Captures the user1 and user2 users from the work domain and administrator group.
-user:work\*+Accessed!=12-6-2002
-user:*+domains!=work,work1+groups=Users, administrators
39
Note You can use the Groups and the Created or Accessed options alone and in combination with others types. The Created and Accessed options that are available are: accounts Created, accounts Not Created, accounts Last Accessed, and accounts Not Accessed. However, you cannot use both the Created and Accessed types together.
Example
-user:*\*+users=a* -user:*\*+users=???? -user:*\*+users!=a* -user:*\*+users!=???? -user:*\*+users=??ge*
Description
Includes all user names starting with a. Includes all user names that contain 4 characters. Excludes all user names starting with a. Excludes all user names that contain 4 characters. Includes all user names that contain two characters before ge and any number of characters after ge as in Tiger.
-user:*\*+users!=??ge* Excludes all user names that contain two characters before ge and any number of characters after ge as in Tiger.
Real-time
When migrating users during a real-time migration, support for mapping user accounts settings to a different user is needed. The -user switch that controls the mapping of user accounts is similar to the syntax provided for personality packages. Note
z
For domain users, if your mapping is -user:domain1\user1, then it is mapped as -user:domain1\user1$domain1\user1. The migration is successful as the domain and user names on both the source and destination computers match. For local users, if you choose to migrate -user:computer1\user1 without providing any mapping, then the migration does not take place. PC Transplant does not convert it to -user:computer1\user1$computer2\user1 automatically.
40
User Priority
Install first looks for the account in the domain to which the source computers current or last logged on user belongs. If failed, it goes for the account in the same domain to which the destination computers current or last logged on user belongs. After this, it looks for the account in the destination computers local domain.
-user:SourceUser$DestinationUser -user:Domain1\user1$Domain2\user2
Example -user:Altiris\Mary$Test\Jack Note If account Domain2\user2 is not present on the destination computer, the account will be created and the settings will be migrated to that account. Wildcard Support. The -user option allows wildcard characters to be used for user names. This allows an administrator to migrate a specific set of users, including remapping users to new domains. The following table provides examples:
Example
-user:domain1\*$domain2\* -user:*\user1$*\* -user:*\user1$*\user2 -user:domain1\*$*\* -user:*\*$domain2\* -user:*\*$*\* -user:*
Function
Maps all users settings in domain1 to domain2 Maps user1 account in all domains to the user1 account in same domain Maps user1 account in any domain to user2 account in same domain Maps all users of domain1 to same account Maps all the source accounts to the same user account of domain2 Maps all the source accounts to same account on destination Maps all the source accounts to same account on destination
Orphan User Accounts. Orphan accounts during real-time migration are identified using a question mark (?). Since PC Transplant is unable to resolve the part of SID that defines its computer or domain origin, it temporarily replaces it with a question mark. The name of the users profile folder is used to help provide a user name (example: an
41
unresolved profile folder named jimb would be identified as ?\jimb). To manage the migration of orphan accounts, PC Transplant adds the question mark to the list of available source tags. The following syntax shows how to migrate settings from all orphan user accounts to local computer accounts. Syntax -user:?\*$Computer\* Example -user:?\*$Computer2\* This example captures all orphan accounts and migrates their settings to their new Computer2 accounts
42
6 7 8 9 10 16 17 18 19 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41
Evaluation time for using the product has expired Invalid run password provided Run password prompt cancelled by user Run password required The target operating system is not supported by PC Transplant The specified users cannot be found Errors logged. Please refer to the error log file for more information. Waiting for user to log on to complete the migration Unable to create user account Missing settings files (dsktp*.ini and ntwrk*.ini) There appears to be problems with this package. Please rebuild. Unable to obtain a connection Could not write the package to the specified path Required file InstPCT.bin missing The specified template file does not exist Connection speed does not meet minimum requirements Unable to locate the PCT Web service Package expired on PCTWeb server Attempting to resume the migration. Cannot execute while an instance of PCTPackage or PCTRTDestAgent is running The request from client contains bad syntax or cannot be fulfilled PCT Real-time destination agent could not be found Failed to authenticate to Web server. User name or password typed is wrong PCTWeb server may not be installed properly User would not have sufficient rights on destination machine Username and/or password provided for destination machine was wrong Destination machine does not have sufficient disk space Error occurred while transferring PCTRTDestAgent to destination machine Failed to open file PCTResource.dll at Web server Language of personality build template did not match with language of current locale
43
Tried to Migrate to different locale destination machine that is not allowed Failed to connect to the destination machine Invalid computer name was provided for destination machine Invalid IP address was provided for destination machine Error occurred while loading user hive Expired or Invalid License Operating System not supported Setting files (dsktp*.ini and ntwrk*.ini) could not be found Package built appears to be corrupt or invalid
44
Chapter 3
Installing Personality Packages (page 45) Personality Settings Options (page 46) PC Transplant Package Exit Values (page 61) Installing Personality Packages Using Command-line Options (page 49)
45
the Free Space column to recalculate the amount of free space available. The user also has the opportunity to redirect drives and folders.
User Accounts Settings Options (page 46) PC Settings and Data Options (page 49)
User Mapping
When selecting the user accounts to migrate, you are shown the user accounts that exist on both the source and destination computers. You can map the settings of one user account on the source computer to any account name on the destination computer. You can use the -usermap command-line option to perform the same action. For more information, see User Map File (page 47) and Installing Personality Packages Using Command-line Options (page 49).
User Creation
You can also create new accounts on the destination computer to match accounts on the source computer. Example: if an account named Bob exists on the source computer but not on the destination computer, and you want to migrate that account and maintain the name, you can create an account named Bob on the destination computer from the wizard, and then select that account to be migrated. Only users with administrative rights have the ability to view and migrate multiple users. If the current user running the wizard does not have administrative or system rights, then the user can migrate the settings to the current users computer if only the user is listed in the source users list. The package determines if the user executing the package has administrative rights. If the user is not an administrator, then it checks if the users settings are included in the package. The user is not allowed to proceed unless the users settings are found and the user is only allowed to migrate the users settings. If the user has administrative rights, the package checks the accounts in the package with the accounts on the destination computer. The user can create accounts in the package that do not exist on the local domain. The user is also given the option of creating any additional user accounts. The accounts can also be created if the user has mapped them through the command line or with the help of the user map file. The user mapping can be done with the -user and -usermap command-line options also. For more information, see Installing Personality Packages Using Command-line Options (page 49).
46
user1=
47
Example
Description
Captures User1 in capture mode and maps User1 to User1 during real-time migration and deploying the package Captures User2 in capture mode and maps User2 to User2 during real-time migration and deploying the package Captures User3 in capture mode and maps User3 to User4 during real-time migration and deploying the package
48
authentication for a domain is not stored in the template. The user name and password provided may need to be preceded by the domain name depending on the authentication model of your domain server.
AOL Instant Messenger AT & T Global Network Palm Desktop Application WinZip
49
Details
Function. Specify the password required for auto-logon for application installation and CNDN migration. The password cannot be blank. Function. Specify the domain name and the user name required for auto-logon for application installation and CNDN migration. This command-line option helps in continuing migration after a reboot has occurred. Function. These options let you define the application, desktop, and network settings are selected for migration. Using these options, you can override any default selections the Personality Package makes. This could be useful if you are running the package in quiet mode (see -q on page 56). Settings Each option must be followed by a colon and can contain one or more of the following definitions: All=1 turns all settings on All=0 turns all settings off <setting name>=1 turns a general setting on <setting name>=0 turns a general setting off <setting path>=1 turns a specific setting on <setting path>=0 turns a specific setting off Note Multiple setting definitions can be used with each startup option, but they must be separated by a semicolon. Setting names and paths are not case-sensitive. If a setting name or path includes a space, include it after the colon in quotes. Partial setting names and paths are supported.
50
51
Details
Function. Logs detailed information to the migrate.log file. This file can be found in the temp folder or in the folder specified using the migratelog option. This file contains more information than the standard migrate log, such as name of source file in which error occurred, line number at which the error occurred, and a description of the error. Example c:\user\MySettings -d
-dap:<password>
Function. Password defines the password of the domain administrator, and is used in conjunction with the -dau option to migrate computer and domain names in quiet mode. Function. Domain administrator user name. Used to migrate computer and domain names. When migrating a domain name, the PC Transplant Wizard requires that the domain administrators name and password be provided. You are prompted for these at the time you begin building a Personality Package. If you are running in quiet mode (-q on page 56 or -qm on page 57), you can pass this information into PCTWiz.exe using the -dau and -dap options. This information gets encrypted and stored in the package. When the Personality Package is run on the destination computer, the administrative data will be used to connect the computer to the new domain. If you are using the undo feature of PC Transplant to create a rollback file, you will be prompted for the administrators name and password for the old domain at the time you run the Personality Package. If you are running in quiet mode, you must pass this information to the package using the -dau and -dap options. The information will be encrypted and stored in the undo package. This information is used by the undo package to set the destination computer back to its original domain. When migrating only the computer name, the PC Transplant Wizard does not request the domain administrators name and password at the time a Personality Package is built. When the Personality Package is run on the destination computer. PC Transplant will determine if domain administrative rights are required to connect the new computer name to the domain. If it is needed, you are prompted for the required administrator information. If you are running in quiet mode, you must pass this information to the Personality Package using the -dau and -dap options.
-dau:<username>
52
Details
Function. Decrypts all the passwords provided from the command line. The passwords used with this switch must be encrypted using the Altiris Password Encryption tool. See also Using the PC Transplant Wizard with Command-line Options (page 25).
Function. By default, a file or folder is migrated to the same drive on the destination computer. You can specify a new drive to migrate the files or folders by using the DriveMap option. Function. Provides more information about the errors that occur during capture. The information depends on the error level. -errorlevel:1 logs generic information about the errors. -errorlevel:2 logs errors and warnings. -errorlevel:3 logs detailed information about the errors and warnings. By default, the error level is 1.
Function. Captures data from the My Documents folder that points to a UNC path or a mapped network drive. Function. Gets the .INI file path for application installation information. Function. Provides the options to select the applications to be installed. It is similar to -apps switch. Note -apps switch has a high priority over -installapps. Example 1. Selects only Microsoft applications -installapps:all=0;ms=1 2. Selects all except Adobe acrobat -installapps:all=1;Adobe Acrobat=0
-migratelog: <pathname>
Function. Lets users define the path and file name for the migrate.log file, which is created when running a package. It contains any errors or warnings that occurred when the package was executed. This option accepts environment variables also. Example
c:\user\mypkge.exe migratelog:p:\pct\runerrors\%username%.log
53
Details
Function. Allows the execution of two or more instances of the PC Transplant Wizard, Personality Migration Wizard, and the PC Transplant real-time destination agent. If you do not use this command-line option, PC Transplant does not allow any two instances of the mentioned combined applications to run simultaneously on the same computer. Function. This option allows you to redirect files, file types, and folders to a network drive while running a package. Example w:\user\chngstuf.exe -netdrives
-netdrives
-newuserpassword: <password>
Function. Use this command to define a password for all new local user accounts created by PC Transplant. If this command is not used, PC Transplant attempts to set an empty password for all new accounts. If your computer is a member of a domain that restricts a password to a minimum length or complexity, PC Transplant will create the password using the following syntax: PasswordMMYYYY The syntax is case-sensitive, where MM represents the number of the month, and YYYY represents the year the account was created (Example: Password012002).
Function. Turns off the migration of the computer name. Function. Turns off the migration of the domain name. Function. Turns off the migration of TCP/IP settings. Function. Use this option if you do not want an undo shortcut to be placed on the users desktop after the package has completed. Function. Do not reboot when finished. Function. Use this option if you do not want an undo of the migration. Function. Includes a password that may be required to run a Personality Package. Example c:\user\MySettings -p:mypassword
54
Details
Function. PC Transplant has the ability of migrating printers across all operating systems. If you are migrating to the same Windows operating system version, PC Transplant uses the printer drivers from the source computer, to install the printer on the destination computer. If you are migrating the printer to a different operating system type, PC Transplant prompts you for the location of the printers .INF file. The .INF file is used by PC Transplant to install the drivers needed for that printer. If you are running in quiet mode (see -q on page 56 or -qm on page 57), prompting for the printers .INF file is not possible. To work around this problem, PC Transplant has included a -printer command-line option that will allow the path to the .INF file to be passed through a command. If either name of printer or path of .INF file contains spaces, the name or path must be enclosed in the double quotes ( ). For more than one printer, separate each printer with a semicolon. Note This command-line option will not install a printer unless the printer information was migrated from the source computer, the .INF file is found, and the .INF file descriptions match the printer description contained in the PC Transplant Package. Syntax -printer:Name of Printer$path of inf file Example mypackage -printer:BDC 1\HP Laser Jet PCL 6$H:\HP\ English\Drivers\PCL 6\HP2100.inf;HP Laser Jet PS$H:\HP\ English\Drivers\PCL 6\HPPS.inf
55
-q
u:\user\MySettings.exe -q
Note If running in Quiet Mode, any folders and files that cannot be written to because of a non-existing or a nonwritable drive are appended to the C:\Migrate folder on the target computer. If a package redirects files to a network drive and you want the network redirects to be observed, you must use the -netdrives option in conjunction with the -q or -qm option. When you use this command-line option on a Windows Vista computer, the User Account Control (UAC) dialog is displayed. The UAC dialog cannot be handled programmatically. Therefore, you have to disable the UAC dialog from the control paned. However, this option is not recommended. So, you can run the package in the quiet mode from the administrative command mode by running the command prompt as the administrator. Example If the Personality Package contains information about drives E and D, but the target computer does not have a drive E or a drive D, the files that would normally be copied to those drives are copied to new folders under C:\Migrate on the target computer. Caution If Quiet Mode is used, some settings transferred to the destination PC might not be completed successfully. Because PC Transplant is operating without user interaction, you will not know about the failures. Possible problems include mapped drives that may require user logon, file transfers that may require a new drive destination, and printer installations that require input regarding the location of the printers .INF file.
56
Details
Function. This option (Quiet Minimized Mode) allows the user to run a personality package without any user interaction. The package is shown running on the taskbar in a minimized mode. Note When you use this command-line option on a Windows Vista computer, the User Account Control (UAC) dialog is displayed. The UAC dialog cannot be handled programmatically. Therefore, you have to disable the UAC dialog from the control paned. However, this option is not recommended. So, you can run the package in the quiet mode from the administrative command mode by running the command prompt as the administrator. Example If you have a Personality Package called chngstuff.exe and you want to run it in Quiet Minimized Mode, type:
u:\user\chngstuff.exe -qm
-r:<filename> Function. Determines the file name given to an undo or rollback file. Example To save a rollback file to mysettings-rb.exe, type:
MySettings -r:MySettings-rb.exe
Note This option is only valid if the Personality Package was built with Enable Undo selected. You can substitute the <filename> option with environment variables. Example
MySettings -r:%username%-rb.exe
-redirect Function. Use this command to redirect a non-existent drives files to a different folder. If a drive captured in a package does not exist on the destination computer, the user is prompted for a folder in which to redirect these files. In quiet mode, they are placed in c:\migrate. Syntax -redirect:full path. Example mypackage -redirect:c:\
57
Details
Function. Redirects the location to which the specified files, folders, and drives will be migrated. You can specify multiple paths for redirection, seperated by semi-colons. Function. This defines the security permission migration option.
-simulatelog
-successlog:<filename>
mypcpers.exe -SuccessLog:c:\install.log
You can also substitute the <filename> option with environment variables. Example
mypcpers.exe SuccessLog:w:\logfiles\%username%.log
58
Details
Function. Migrates a specific user in a package to the same or different user. You can specify multiple users by separating them with a semicolon. Syntax
-user:SourceUser$DestinationUser; SourceUser$DestinationUser;
For more information on how to use this option, see Personality Package -user Command-line Option Usage (page 59). -usermap:<filename> Function. Provides a method to redirect users to different domains or different user account names from a single file. Replace <filename> with the usermap.ini file path. The .INF file contains the Users section where you can give the user accounts mappings switch. Example
[Users] ;This will capture user1 in capture mode, and migrate user1's settings to user2 when deploying the package on the destination computer. In the RTM mode, it maps user1 to user2. domain\user1= domain\user2
-noundoprintershortcut Function. Removes printer shortcuts from user desktop of the printers that were not migrated successfully.
-user:SourceUser$DestinationUser
59
-user:Domain1\user1$Domain2\user2
Example
-user:Altiris\Mary$Test\Jack
Note If account Domain2\User2 is not present at the destination computer, the account is created and the settings are migrated to that account.
Wildcard Support
The -user option lets you use wildcard characters to be used for user names. This lets an administrator migrate a specific set of users, including remapping the users to new domains.
Example
-user:domain1\*$domain2\* -user:*\user1$*\* -user:*\user1$*\user2 -user:domain1\*$*\* -user:*\*$domain2\* -user:*\*$*\* -user:*
Function
Maps all users settings in domain1 to domain2 Maps user1 account in all domains to the user1 account in same domain Maps user1 account in any domain to user2 account in same domain Maps all users of domain1 to same account Maps all the source accounts to the same user account of domain2 Maps all the source accounts to same account on destination computer Maps all the source accounts to same account on destination computer
If profiles for destination users do not exist on the local computer, they are created. Also if due to use of wildcard, a situation arises where more than one source accounts get mapped to one account, the first available source account will be mapped and for the rest of the accounts an error is output to the migratelog file.
60
Syntax -user: ?\*$Computer\* Example -user:?\*$Computer2\* This example captures all orphan accounts and migrates their settings to their new Computer2 accounts. Notes
z
For domain users, if your mapping is -user:domain1\user1, then it is mapped as -user:domain1\user1$domain1\user1. The migration is successful as the domain and user names on both the source and destination computers match. For local users, if you choose to migrate -user:computer1\user1 without providing any mapping, then the migration does not take place. PC Transplant does not convert it to -user:computer1\user1$computer2\user1 automatically. But if you explicitly give -user:computer1\user1$computer2\user1, then the mapping is done.
-1 0 1 2 3 4 5 6 7 8 9 10 16 17 18 19 20
Application cancelled by user Success Undefined Error Restart required to complete migration This package requires administrative rights to run Cannot obtain rights needed to run this package Not enough disk space to run this package Evaluation period is over Incorrect password supplied Package cancelled at password dialog Password required to run this package The target operating system is not supported by PC Transplant The specified user cannot be found in the package Multiple errors encountered. Refer to the migrate.log file on the destination computer for more information. Waiting for the user to log on to the computer User account does not exist in the computer Missing span file
61
22 31 42 46 52
There appears to be problems with this package. Please rebuild. Cannot execute a package while another instance is running Migration to different local machine is not allowed Error occurred while loading user hive Failed to open resource file: PCTResource.dll
62
Chapter 4
[EN > ACT! for Windows > 4.x] InstallPath=d InstallOptions=d UnInstallOptions=d Description=ACT! for Windows 4.0 InstallFiles= WaitForChildProcess=0
[EN > ActiveSync Application > 3.x] InstallPath=3 InstallOptions=3 UnInstallOptions=3 Description=ActiveSync Application 3 InstallFiles= WaitForChildProcess=0
There are two tools supported by the Application Install Administrator: Installation Server and Install File Location. For more information on how to use Application Install Administrator, refer to the online help. The following actions can be performed using the Application Install Administrator:
z z z
Defining the Application Installation (page 64) Authenticating Installation Servers (page 64) Providing a Path for the Install File Location (page 64)
63
[Installation Server] ServerName1 > User Name1 > Encrypted Password1 ServerName2 > User Name2 > Encrypted Password2 ServerName3 > User Name3 > Encrypted Password3
[EN > ACT! for Windows > 4.x] InstallPath=<Optional> InstallOptions= -S F1ICQ.iss TRANSFORMS= MyFile.mst UnInstallOptions=d
64
InstallFiles= -F1<ICQ.iss>
| TRANSFORMS=<MyFile.mst>
//<FileName1>|<File Name 2> It will be | separated list of mst/ iss files. WaitForChildProcess=0
When you click Define from the Application Install Administrator page, the PctAppInstall.ini file is read if there is no information available on the application. This information is used in the Install Properties page. There is another section called Install File Location in the install.ini file.
65
Chapter 5
PC Settings Options
The settings listed in the Desktop and Network tabs come from the information in the Dsktp*.ini and Ntwrk*.ini files. All these files can be edited using a text editor. See Desktop and Network Settings File Format (page 79). The details and the warnings of the settings that you selected can be viewed.
z
If you select Create a new Package or Edit an existing package in the wizard, then the warnings for the application settings are displayed with respect to the source version to all the possible versions. If you select Real Time Migration, then the warnings for the application settings are displayed with respect to the source version and the destination version. For the Template Builder, the warnings for the application settings are displayed for all the supported versions to all the possible versions.
66
Desktop Settings
The settings listed in the Desktop tab come from the information in the Dsktp*.ini file. This file can be edited using a text editor. See Desktop and Network Settings File Format (page 79). You can also use the command-line option -desktop with the Personality Package. See Installing Personality Packages Using Command-line Options (page 49).
Network Settings
The settings listed in the Network tab come from the information in the Ntwrk*.ini file. This file can be edited using a text editor. See Desktop and Network Settings File Format (page 79).
67
PC Transplant requires that you provide the user name and password of an account that has the rights to change and create a computer account in that domain. You are prompted for this at the end of the PC Transplant Wizard when you click the OK button or the Schedule button. You may also pass in a -dau and -dap switch to specify this from the command line. In quiet mode, the -dau and -dap switches are required for a domain migration to take place. See Using the PC Transplant Wizard with Command-line Options (page 25). User authentication for a domain is not stored in the template. The user name provided may need to be preceded by the domain name depending on the authentication model of your domain server. You can also pass an encrypted password in the command line.
Application Settings
Migration Support for Non-standard Applications
The list of applications in the Applications tab depends on the .A2i files you have and which applications are registered in the Windows registry as installed applications. If the application is not registered in the registry, the application is still displayed if you had specified the complete path of the .exe or the complete or partial path with Type=Scan in the .A2i file. The .A2i files are created for non-standard applications, that is, the applications that do not store their installation information with the registry. To see the specific application settings, open any .A2i file (contained in the PC Transplant installation folder) in a text editor or the A2i Builder. The applications section of these A2i files has a new attribute, Type=Scan. This attribute tells the PC Transplant Wizard that it has to scan the hard disk to locate this application. The search path is given in the A2i file using the ScanPath tag. For the applications which do not contain information in the registry, Flag=Scan is provided in the Applications section of the .A2i files. See Application to Information (.A2i) Format (page 110). For the PC Transplant Wizard, the applications that do not contain information in the registry are considered as if they are not installed. These applications are not selected in the list. A magnifying glass icon is displayed with such applications. You can select such an application and when you click Finish to create a personality package, the A2i files are scanned. The icon and the description are changed for the application. If there is no information found for the applications, then they are deleted during the scan. During real-time migration, all the applications are selected. A warning message is displayed for the applications that might not be migrated to the destination computer. The actual scanning of the applications takes place when you click the Finish button to start the migration. If the application is found on both the source computer and the destination computer, then the application is migrated. For the Template Builder, the applications are not searched.
68
A2i Builder
If you are using applications for which no A2i files exist, PC Transplant ships a utility with A2i Builder that lets you build your own custom .A2i files.
69
Chapter 6
Feature
Open
Description
Opens a window from which you can browse and open a Personality Package. Closes the Personality Package without saving it. Saves the Personality Package.
Button
Access
Ctrl+O Click File > Open. Click File > Close. Ctrl+S Click File > Save.
Close Save
Saves the Personality Package with a different name and path if required. Retrieves the last deleted item. Searches for items within the selected structure (registry or file folder). You can match the whole word only and case. You can also include folders and items.
Click File > Save As. Ctrl+Z Ctrl+F Click Edit > Find.
Adds an item to the selected structure. Deletes the selected item. Copies the selected item. Pastes the copied item to the selected structure. Opens the Properties window for the selected item. Opens the Options page where you can change the Run and Display options.
Right-click an item and select Add Item. Right-click an item and select Delete. Right-click an item and select Copy. Right-click an item and select Paste. Right-click an item and select Properties. Click Edit > Options.
Options
70
Feature
Migrate User Settings
Description
Opens the PC Transplant Wizard. See Transplanting Computer Settings and Data (page 15).
Button
Access
Click Tools > Migration Wizard. Click Tools > Package Report. Click Tools > Custom A2i Builder. Click Tools > Template Builder. Click Help > Application Updates. Click Help > Contents and Index.
Create Report Opens the Package Content utility. See Viewing, Printing, or Changing Personality Package Contents (page 42). A2i Builder Build PCT Templates Application Updates Online Help Opens the A2i Builder utility. See Using the A2i Builder (page 72). Opens the Template Builder utility. See Using the Template Builder (page 66). Updates existing A2i files or adds new A2i files to your list of supported applications. Opens the online help.
71
Chapter 7
Applications Supported
You can find the .A2i files in the <System Drive>:\Program Files\Altiris\PCT\<Language Folder>. The following are few of the applications for which the .A2i files have been created:
z z z z z z z z z z z z z z z z z z z z z z z z z
Adobe PageMaker Adobe Illustrator Altiris Carbon Copy client AT&T Global Network Cisco VPN Client Corel Paradox Microsoft ActiveSync 3.1/3.5 Microsoft Visual Basic Microsoft Visual C++ Microsoft FoxPro Microsoft Visual Interdev Microsoft Visual Source Safe Symantec WinFax Pro Adobe Acrobat 5.0 Adobe Photoshop 6.0 AOL 6.0/7.0 Corel Presentations 11 Corel Quattro Pro 11 Corel WordPerfect 11 Eudora 5.1 FileMaker Pro 5.5 ICQ 4.x/5.x McAfee Virus 6.0 Microsoft FrontPage2002 Microsoft Messenger 4.5
72
z z z z z z z z z z z z z z z z z
Microsoft Publisher 2002 Microsoft Visio 2002 Microsoft Word Microsoft Excel Microsoft Access Microsoft PowerPoint Microsoft Internet Explorer Microsoft Outlook Express Microsoft Outlook Microsoft Project Microsoft Exchange Microsoft NetMeeting Microsoft Office Shortcut Bar Paint Shop Pro 7.0 PC Anywhere 10.0 QuarkXpress RIM BlackBerry
A2i Builder
The A2i Builder Wizard helps you create customized .A2i files for a particular application by monitoring the changes made by a user to that application. When applications contain settings that go beyond the capabilities of the A2i Builder, you will be required to manually modify these files using a text editor. For more information on how to use A2i Builder, refer to online help. Caution Before using the A2i Builder, read Application to Information (.A2i) Format (page 110), which describes the contents of an .A2i file, and how to build or edit an .A2i file manually using a text editor. This knowledge will help you understand the functionality and limitations that you may find when using the A2i Builder. Any Windows user can use the A2i Builder, but to utilize some of the more advanced capabilities found in an .A2i file, you need advanced knowledge of Windows registries, folders, and files.
73
74
Chapter 8
Feature
Open
Description
Opens a window from which you can browse and open an A2i file. Saves the A2i file.
Toolbar Icon
Access
Ctrl+O Click File > Open. Ctrl+S Click File > Save.
Save
Saves the A2i file with a different name and path if required. Opens the A2i Builder utility. Opens the PC Transplant Wizard.
Click File > Save As. Click Tools > Launch A2i Builder. Click Tools > Launch Try Now. Click Edit > Edit Warnings.
Edit Warnings Opens the Edit Warnings dialog that allows you to add, delete, and modify warnings for each version in the A2i file. Edit Details Opens the Edit Details dialog that allows you to edit the Details section of the A2i file. Adds a version to the A2i file. Adds a section to the A2i file.
Click Insert > New Version. Click Insert > Section. Click Insert > Variables.
75
Feature
Add Registry Add File Add Folder Add File Types Online Help
Description
Adds a registry key to the A2i file. Adds a file to the A2i file. Adds a folder to the A2i file. Adds file types to the A2i file. Opens the online help.
Toolbar Icon
Access
Click Insert > Registry Item. Click Insert > Files. Click Insert > Folders. Click Insert > File Types. Click Help > Contents and Index.
76
Chapter 9
Technical Reference
This section includes the following topics:
z z z z z z z
PC Transplant File Types and Executables (page 77) Desktop and Network Settings File Format (page 79) Setting Tags (page 81) Settings and Item Setting Properties (page 101) Application to Information (.A2i) Format (page 110) Template File Format (page 123) Troubleshooting (page 130)
Description
Self-executing Personality Package. Personality Packages can be viewed and edited in the PC Transplant Editor (PCTEdit.exe). The package can also be updated using the PC Transplant Wizard. Current list of templates used when building a Personality Package. It maintains a list of 5 recently used templates either by the PC Transplant Wizard or Template Builder. Application to Information file that defines the settings and files required to migrate an application. Desktop settings file Network settings file Default personality build template. Technicians can create their own custom personality build templates that record what settings are included in the Personality Package during the scan and build process. These templates can be accessed using the command line to automate the build process and bypass the wizard. User-created personality build template. Template files can be created using the PC Transplant Wizard or using the Template Builder. PC Transplant HTML help files PC Transplant documentation provided in Adobe Acrobat format.
Application.ini
*.pbt
*.chm *.pdf
77
File Type
AltShellExt.dll
Description
Microsoft Explorer Shell Extension that allows you to edit or view the properties of a PC Transplant Personality Package from within Windows Explorer. Registry setup for the Microsoft Explorer Shell Extension. Personality Package binary logic file. All Personality Packages are built starting with this binary file. Default splash screen added to a new Personality Package Device driver for A2ibuild.exe Device driver for A2ibuild.exe Used by the aclient.exe during computer and domain name configuration. Configuration file used by aclient.exe during computer and domain configuration.
Executable
Aclient.exe
Description
Sets the computer name and domain name on the destination computer. If the domain name is changed, it establishes trust back with the domain. Continues the migration of a Personality Package after the computer and domain name has been configured. Microsofts HTML help file install. Tool used to license PC Transplant. License tool supporting file. PC Transplant Package Editor. Used to view, add, modify, and delete individual registry items, files, and folders in a Personality Package. PC Transplant Real-time Destination Agent. PC Transplant Wizard. Used to build or update Personality Packages to include desktop, network, and application settings and files requested by a user or template. Used to migrate the personality in real-time mode. Used by PCTWiz.exe to authenticate a user name and password. Used by PCTWiz.exe to push the installation of the PCTRTDestAgent.exe to a Windows NTx system. Program that lets you view and print the files and registry values contained in a Personality Package. Device driver for A2ibuild.exe Device driver for A2ibuild.exe
78
Executable
Template.exe A2ibuild.exe Sidgen.exe
Description
Template Builder. Tool to create personality build template that is used to select settings in the PC Transplant Wizard. A2i Builder. Program to build your own custom .A2i files. Program that regenerates a new, unique Security ID (SID).
DsktpXP.ini NtwrkXP.ini
A setting file follows .ini file syntax, with the exception that duplicate value names are allowed within a section. An .ini file definition is broken down into three parts: Section Name, Key Name, and Value. A typical .ini definition could look like the following:
Desktop Settings
Each setting you define in a desktop settings file starts with a short section name describing the setting. Example: [Display Properties], [Control Panel], or [This one is mine].
79
These settings define the primary setting groups that will be displayed in the Desktop settings area of the PC Transplant Wizard. Each main setting can include sub-settings. A sub-setting is defined by providing the main setting name followed by a space, followed by a > character, followed by a space, and then followed by the name for the subsetting:
[Control Panel] [Control Panel > Keyboard] [Control Panel > Keyboard > Screen Lock] Flag=File Base=c:\winnt\myfiles Values=screen.ini
Network Settings
Each setting you define in a network settings file starts with a short section name describing the setting. Example: [Window drive Mapping], [TCP/IP], or [This one is mine]. For network settings, you can also define sub-items for a setting using the syntax described in Desktop Settings (page 79):
[Main Setting]
80
Setting Tags
This section gives examples and definitions of all setting keys and tags supported by PC Transplant. Users can use these keys and tags to capture specific registry and file settings on their source computer and control how these settings transplant on the target computer.
Detail
You can provide more information about a setting by including a Detail tag. Example: Detail=<Detail Text>. To view the details in a property page, click Properties button on Transplant PCs Settings page in PCTWiz or on Transplant settings and data page when running a Personality Package.
[8.x Settings] Detail=Migrates Toolbars, Macros, Edit, Print, and Save settings.
[8.x Spelling and Grammar] Detail=Migrates Spelling and Grammar settings for Office2000.
81
The files listed above can be found in the PC Transplant program folder. They are a valuable reference when creating your own .A2i files or modifying existing settings files. For information about how to build a .A2i file, refer to Using the A2i Builder (page 72). For information on how to add your own desktop and network settings to the dsktp*.ini and ntwrk*.ini files, refer to the Desktop and Network Settings File Format (page 79).
z z z z z
Basic Structure (page 82) Definitions (page 82) Advanced Usage (page 90) Environment Variables (page 97) Values (page 99)
Basic Structure
The basic structure for capturing settings consists of a combination of the following keys: Flag Base Values Example:
Definitions
Flag
Flag supports seven values: File, Registry, FileType, INI, API, Variables, and Warning. Flag=File specifies that the setting captures files. Flag=Registry specifies that the setting captures registry entries. Flag=FileType specifies that the setting captures all files from the selected drives matching the specific file type.
82
Flag=INI specifies that the setting captures values from an INI file. Flag=API is used internally by PC Transplant, and is not discussed here. Flag=Variables defines a dynamic value that gets assigned, pending the version of the application. Flag=Warning specifies that the path item is a warning message. Note Flag variables are only valid when used in an .A2i file, and within the Variables section of that file. FLAG=INI. The Flag=INI is to be used in association with Flag=File. After capturing all the settings from an INI file you need to use Flag=File only once to add these settings to the package. You will also need to specify the correct path of the file using the NewDestination tag in Flag=File, otherwise the original path of the INI file will be incorrect. Below is an example, using the following file c:\test.ini that includes the following data:
[MySection] MyValue=value
83
Note Flag=INI works in conjunction with Flag=File. All Flag=INI path items must be followed by a single Flag=File path item as shown in the example above. The Base for this File path item will always be %MI_PCT_TEMP% and Values tag will contain the name of the INI file. If it is not followed by a Flag=File, then the path item has no significance. Each INI path item does not need a File path item. When all INI path items have been specified, they should be followed by a single File path item. For more examples, please refer to the Lotus Notes.a2i and Qualcomm Eudora.a2i setting files.
Base
Base contains the parent path for the setting. If Flag=File, then Base contains the name of the directory to find the required files. If Flag=Registry, then Base contains the name of the registry key to find the required registry values. If Flag=FileType, then Base is not used. If Flag=INI, then Base contains the full path to the INI file. If Flag=Variables, then Base contains the name of the variable. If Flag=Warning, then Base is a comma-separated list of the target versions for which this warning is applicable to.
Values
Values contains the name of the specific entities to capture. If Flag=File, then Values contains a comma-separated list of file names. The path specified in Base is searched to find these files. Wildcards such as ? and * are supported when specifying a file name. If Flag=Registry, then Values contains a comma-separated list of registry values. The key specified in Base is searched to find these registry values. If Flag=FileType, then Values contains the name of the file type. Wildcards such as ? and * are supported when specifying a file name. All drives will be searched to locate the file type indicated. If Flag=INI, then Values contains a comma-separated list of INI values. Values follow the syntax section name|key name<=default value> (item inside < > is optional). If Flag=Variables, then Values contains the assigned value of the variable. If Flag=Warning, Values is the actual text of the warning message. Note A warning message must not contain $ sign as this has an internal meaning.
Examples
In the following examples, Flag=File specifies that the entity being captured is a file.
84
85
How to Capture All Files on the Local Drives (Unfiltered) Matching a Given Extension
In the following example, Flag=FileType specifies that the entities being captured are files and belong to a particular file type (Example: *.doc, *.txt, . . .). The following item captures all file names having the extension .doc from all the drives on the source computer.
Flag=FileType Values=*.doc
Note Drives which are filtered will not be scanned. If Flag=FileType, the Base tag can be omitted. If it is present, it has no significance. For additional examples, see the [0 Associated Files > MDB Files] section in the access.A2i file located in the PC Transplant default installation directory.
How to Redirect Files, File Types, and Directories to a New Destination Path
Use the NewDestination=<path> tag to redirect files, file types, and directories to a new destination path. Example:
86
How to Capture All Keys under a Specified Section of an INI File Flag=INI Base=c:\one\application.ini Values=TestSection|*.*
How to capture specific keys under a specified section Flag=INI Base=c:\one\application.ini Values=TestSection|TestValue1,TestSection|TestValue2
87
How to capture specific keys from all sections Flag=INI Base=c:\one\application.ini Values=*.*|TestValue1
How to set default values for captured keys Flag=INI Base=c:\one\application.ini Values=TestSection|TestValue1=1,TestSection|TestValue2=2
Flag=Warning
Use this tag to define warning messages for a setting.
[8.x Settings] Flag=Warning Base=9.x,10.x Values=Unable to migrate Fast Save from Word 97 to Word 2000/ XP.
88
[8.x Spelling and Grammar] Flag=Warning Base= Values=Unable to migrate Spelling and Grammar.
Background
Wallpaper]
Values=Active Desktop wallpaper may not be visible after migrating to Windows XP.
How to specify a warning when migrating to any OS version Flag=Warning Base=0 Values=Sound settings are unique to the sound device installed on a machine and cannot be migrated.
89
The following example gets the path contained in a registry value and assigns it to VAR:002 if the version of the application is 4.x:
Advanced Usage
With the use of some additional tags, you can customize an item setting to create your own Base path definition. Example: rather than specifying a static path, you can use these advanced tags to retrieve a path from a registry value. The advanced tags you can use in a Base path include:
z z z z z z z
<%REG:%> <%MULTIREG:%> used along with <%REG%> <%STRIPTAILSLASHES:%> used along with <%REG:%> <%all%> used with or without <%REG:%> <%allvalues%> used with or without <%REG:%> <%INI:%> Environment variables (used mainly to specify standard Windows directories. Example: desktop directory, Windows directory, system directory, current user name, and so on)
<%REG:%>
<%REG:%> is used to define a directory or a file using a registry value.
How to Capture a File Using a Registry Value that Contains the Full Path of the File
If the registry value Path contains c:\one\two.txt, the following item setting would attempt to capture the file c:\one\two.txt.
90
How to Capture a File Using Your Own Directory Path, and a Registry Value That Contains Only the Filename
If the registry value Filename contains two.txt, the following item setting would attempt to capture the file c:\one\two.txt.
<%REG:%> Nesting
The <%REG:%> tag can be nested inside of other <%REG:%> tags. The order of nesting resolution is resolved from the inside out. By nesting these tags, you can build Base paths using a combination of these tags.
How to Capture a File by Building a Registry Path Whose Value Contains a Path to a File
If the registry value HKEY_CURRENT_USER\two\value2 contains value1, and HKEY_CURRENT_USER\one\key1\value1 contains c:\1.reg, the following item setting would attempt to capture the file c:\1.reg.
<%MULTIREG:%>
<%MULTIREG:%> is used to chain <%REG:%> definitions together to build a single path.
91
How to Capture a File Whose Directory is Specified in One Registry Value and Whose Name is Specified in Another Registry Value
If the registry value HKEY_CURRENT_USER\key1\value1 contains c:\dir, and HKEY_CURRENT_USER\key2\value2 contains file1.txt, the following item setting would attempt to capture the file c:\dir\file1.txt.
<%STRIPTAILSLASHESn:path%>
<%STRIPTAILSLASHESn:path%> is used to strip files or folders from the end of a path. The tag can be used to get the path of a file or a parent path for a directory. The value n specifies the number of directories or files to be removed from the path. If the n value is not specified, then, by default, all slashes from path will be removed to extract the drive name only.
How to Capture a File Using the Path to a Different File in the Same Directory
After stripping back to the first slash, the base path would return c:\one, and the following item setting would attempt to capture c:\one\one.txt.
How to Capture a File Using a Path Obtained from a Registry Value Flag=File Base=<%STRIPTAILSLASHES2:<%REG: HKEY_CURRENT_USER\Software\Express\Options\Directory%>%> Values=one.txt
If the registry value HKEY_CURRENT_USER\Software\Express\Options\Directory contains c:\one\two\three.txt, after stripping back to the second back slash the base path would contain c:\one. Using the resulting path, the item setting above would attempt to capture the file c:\one\one.txt. If you do not specify a value for n and specify the filename in the Value item, then the file C:\one.txt gets captured when the specified registry path points to a string "C:\one\two\three.txt".
Flag=File
92
<%STRIPHEADSLASHESn:path%>
<%STRIPHEADSLASHESn:path%> is used to strip files or folders from the beginning of a path. The tag can be used to get the path of a file or a parent path for a directory. The value n specifies the number of directories or files to be removed from the path. If the n value is not specified, then, by default, all slashes from path will be removed to extract the filename only. This tag can be used only with <%REG%>.
How to capture a file from a current directory or a parent directory of a filename whose path is specified in the registry
If the registry path HKEY_CURRENT_USER\Software\Netscape\Netscape Navigator\biff\users\one\servers\two\popstatepath points to a string that contains the complete file path - "C:\one\two\three.txt", then the path item will capture the file D:\two\three.txt. The tag STRIPHEADSLASHES2 removes the C: drive and the folder one.
Flag=File Base=D:\<%STRIPHEADSLASHES2:<%REG:HKEY_CURRENT_USER\Software\Ne tscape\Netscape Navigator\biff\users\one\servers\two\popstatepath%>%> Values= How to Capture a File Using a Path Obtained from a Registry Value
If you do not specify any values for n and the Value item, then the file D:\three.txt gets captured when the specified registry path points to a string "C:\one\two\three.txt".
<%all%>
<%all%> is used to enumerate all subkeys found under a particular key. It is generally used when you do not know the names of the subkeys or you do not know how the number of subkeys present.
HKEY_CURRENT_USER\key1\subkey1\value1 = 0
93
How to Capture Files Whose Paths are Defined Under Multiple Registry Values
Assume the following registry structure:
94
C:\dir1\file1.txt C:\dir2\file2.txt
For additional examples, see the [7.x Settings] section in the access.a2i file located in the PC Transplant default installation directory.
<%allvalues%>
<%allvalues%> is used to enumerate all values under a particular registry key.
Note If you want to include all values under a particular registry key AND all of its subkeys, you can use:
How to Capture Files that are Defined as Values Under a Registry Key
Assume the following registry structure:
95
<%INI:%>
<%INI:%> is used to capture a file whose name is specified as a Key Value in an INI file. To capture a file associated with a key value of an INI file follow the syntax below, where INI Path is the path to the INI file, Section is a valid Section within the INI file, and Key Name is a valid Key within that section.
Examples:
z
96
Flag=File
Base=<%INI:c:\Programfiles\Eudora\Eudora.ini|Files| SigFiles%>
Values=one.txt
The above path item captures the file one.txt whose directory path is specified at the key value SigFiles under the Section Files of ini file Eudora.ini saved in directory: c:\Programfiles\Eudora So, if SigFiles contains c:\one, then the above pathitem captures the file c:\one\one.txt.
z
How to capture a file whose path is specified in a key value, the name of which is specified in another key value (Nested usage of <%INI:%> in the Base Value)
Flag=File
Values=
Assume that the key SigFilespoints to the string value1 and the key value1 contains c:\1.reg, the file captured is c:\1.reg.
Environment Variables
Environment variables are mainly used for specifying standard Windows paths such as Windows folder, system folder, other Windows-defined folders or file names without having to define a static path such as c:\windows. Using environment variables gives you the flexibility of defining paths that might change depending on the logged on user, operating system, or directory structure of the computer. Note The environment variables follow the syntax %variable name%, which varies from tags that follow the syntax <%tag%>. The following is a list of environment variables supported:
97
Function
All users Local Application data directory All users desktop directories All users start menu directories Current users application data directory Defines the directory for an installed application. This environment variable is specific to a .A2i file, and will be valid only if the application executable is defined as an installed application under the registry key:
Pctwiz.exe -f:\%MI_COMPUTERNAME%.exe
For additional examples, see the [9.x Custom Dictionary] section in the access.a2i file located in the default installation directory. %MI_COOKIES% %MI_DESKTOP% PC Transplant %MI_FAVORITES% %MI_FONTS% %MI_HISTORY% %MI_INPUT_LOCALE_ID% %MI_LOCALAPPDATA% %MI_LOCALSETTINGS% %MI_NETHOOD% %MI_OFFICE_TEMPLATE% %MI_PCT_TEMP% Current users cookies directory Current users desktop directory Current users favorites directory Current users fonts directory Current users History folder Numerical ID of the users current locale Current users local application data directory Current users Local Settings folder Current users NetHood folder Current users Office Template folder The path uses to store temporary data extractions. In the case of INI files, the folder is used to extract out individual elements from the INI file that can be added to a package. Current users personal document directory Current users Pictures folder
98
Function
Current users printhood directory The name of the user that is currently being processed by the Wizard (PCTWiz.exe). Windows program files directory Current users Programs folder Current users Recent folder Current users sendto directory Current users startmenu directory Current users Startup folder Returns the system drive as C (without a backslash) This was implemented because %SYSTEMDRIVE% fails on 9x.
Current users Windows system directory Current users Templates folder Defines a setting in a dsktp*.ini, ntwrk*.ini, or *.A2i files that includes the users profile directory Current logged on user Example: you can use it to redirect to a folder that is dynamic to each user:
Values
The Values tag supports several additional separators. These separators include the comma, wildcards, pipe, question mark, and equals symbols.
Comma ,
A comma allows you to include more than one registry value or file name under the base path. Each value or file must be separated by a comma.
How to Use Commas for Registry Values Flag=Registry Base=HKEY_CURRENT_USER\Control Panel\Desktop Values=Wallpaper,TileWallPaper,WallpaperStyle
99
Wildcards ? and *
Wildcards allow you to conditionally define a part of a path or file name. Only those files or directories that fit the condition will be considered. A ? can be used in place of a character, where any valid file name character is allowed. An * is used to define multiple file name characters.
How to Grab All Help Files Located in the Windows Directory Flag=File Base=%MI_WINDIR% Values=*.hlp
Pipe |
The pipe symbol is used as a separator between a registry value and its type. A registry type can be a string (REG_SZ) or a number (REG_DWORD). The examples below show the use of the pipe symbol and these registry types to define values for registries that may exist on the source computer.
100
Question Mark ?
A question mark is used to replace one registry value with a value you define. A question mark follows a registry type and is immediately followed by a value.
Panel\Desktop\WallpaperStyle entity.
LogError Exclude Reboot DestOS DestVersion Compatibility Replace Admin DeleteKeyBeforeMigrating ExcludeFilePaths Retain NewDestination
For real life examples showing the use of all the settings and properties described here, refer to the .A2i files that come with PC Transplant. For a detailed listing and definitions of all .A2i and setting INI tags, refer to Setting Tags (page 81).
LogError
The LogError value will cause an error to appear in the log file if there is a problem. The value you assign to LogError can be one of two values: TRUE or FALSE. If you do not include this property, the default for LogError is FALSE.
101
Exclude
The Exclude value can be used as a shortcut if you want to include all items except the ones defined under the Value definition. The value you assign to Exclude can be one of two values: TRUE or FALSE. If you do not include this property, the default for Exclude is FALSE.
How to Include All Values Found Under a Registry Key Except One Flag=Registry Base=HKEY_CURRENT_USER\key1\subkey1 Values=Value1 Exclude=TRUE
For additional examples, see the [8.x Settings] section in the access.a2i file located in the PC Transplant default installation directory.
Reboot
The Reboot value is used to define the reboot options used after running a PC Transplant Package that contains a given setting. Some settings can be transplanted and the changes can be applied immediately, others may require the user to be logged off and logged back on, while others require a full reboot of the system. The value you assign to Reboot can be one of the following values: FALSE, TRUE, Logout, Logout_9x, Logout_NTx, Reboot_9x, or Reboot_NTx. If you assign a value of FALSE, no reboot will be executed after running the PC Transplant package. Using the other values will force a reboot or log off from all operating systems. If you do not include this property, the default for Reboot is FALSE.
How to Prompt for a Reboot After a Personality Package has Finished Executing Flag=Registry Base=HKEY_CURRENT_USER\key1\subkey1 Values=*.* Reboot=TRUE
102
For additional examples, see the [5.x Settings] section in the iexplore.a2i file located in the PC Transplant default installation directory.
DestOS
The DestOS value is used to assign a setting to a specific destination operating system (OS). When a setting is assigned to an operating system, the setting will only transplant if the Personality Package is run on that operating system. The value you assign to DestOS can be one of the following values: ALL, Match, WinNT5, WinXP, or WinNTx. A value of ALL, allows a setting to transplant to any Windows operating system. A value of Match requires the operating system the Package was built under and the destination operating system to match. All other values are used to define the destination operating system requirements. If you do not include this property, the default for DestOS is ALL.
How to Keep An Item Setting from Transplanting to a Different Operating System [Printers] Flag=Registry Base=HKEY_CURRENT_USER\key1\subkey1 Values=*.* DestOS=WinNTx
If the Package is run under Windows 2000 or XP, the item setting will migrate. If run on any other Windows operating system, the setting will not be transplanted to the destination PC. For additional examples, see the [Power Settings] section in the dsktpnt5.a2i file located in the PC Transplant default installation directory.
DestVersion
The DestVersion value is used to support the migration of a setting only if the application of the destination machine matches that of the source machine. The value you assign to DestVersion can be only one value: Match. If you do not include this property, the default for DestVersion is support for all application types. DestVersion=Match has been implemented for Flag=File as well as for Flag=Registry. In some cases, you do not want a particular setting or file to be migrated if the source and destination versions don't match. In the following example for Microsoft Word, the registry setting will be migrated only if the versions of Word match.
103
DestVersion=Match
Compatibility
The Compatibility value is used to assign an entire setting to a specific operating system. The value you assign to Compatibility can be one of the following values: ALL, Match, WinNT5, WinXP or WinNTx. If you do not include this property, the default for Compatibility is ALL.
How to Keep a Setting from Transplanting to a Different Operating System: [Printers] Compatibility=WinNTx Flag=Registry Base=HKEY_CURRENT_USER\key1\subkey1 Values=*.*
Replace
The Replace value lets the Personality Package know how to transplant the setting if it already exists. The value you assign to Replace can be one of four values:
z z z z
If Replace is set to No, the setting will not overwrite the destination computers setting if it already exists. If you do not include this property, the default for Replace is Yes. Replace=Newer specifies that while installing if the same file already exists at the destination computer, it will be replaced only if the source file is newer. Use Replace=Filepath to replace the filepath of the source application version with the path at the destination. The idea is that with Replace=Filepath, the file(s) to be picked up should be specified solely by the Base tag. The Values tag is to be used exclusively for specifying the destination folder, which essentially has to be a variable, as it would depend on the version of the application at the destination machine. This should not be a comma-separated list. Only one variable should be specified.
104
The Variables specified as Values are not used for any work at the wizard side. They are stored in the package to be resolved at install time. For the resolution, we use the options block for mapping the destination folder information to the correct file. This mapping is done by storing the filepath against the variable <#VAR:000#> in the options block, which is visible to the user as advanced settings. When specifying the variables, you can specify the full filename along with the path, or just the path. In the latter case, the original file name will be appended to the path. This tag is also used with Flag=Registry. In this case, it updates the registry to refer to the file migrated. The example below shows how to get a file using the path obtained from a registry value, then to substitute its path with the contents of VAR:003.
[8.x Settings]
Flag=File
Base=<%REG:HKEY_CURRENT_USER\Software\Microsoft\Office\8.0\ Common\AutoCorrect\Path%>
Values=<#VAR:003#>
Replace=Filepath
Use Replace=Format to change the format of the registry value in case the version differs at the destination. Example: in Project 98, values stored in the registry under HKCU\Software\Microsoft\Office\8.0\MS Project are of type REG_SZ, but in Project 2000 they are stored as DWORD. Replace=Format works in the same way as Replace=Filepath described above. Lets take the example of MS Project as an example. In MS Project, version 8 and 9 store the registry values using different formats, namely REG_SZ and REG_DWORD respectively. So, for proper migration across versions, it is essential that we change the registry format while migrating from version 8 to 9. Below is an example showing how this is done:
[8.x Settings]
Flag=Registry
Base=HKCU\Software\Microsoft\<#VAR:001#>\MS Project\Options\*.*
Values=<#VAR:002#>
Replace=Format
105
[9.x Settings]
Flag=Registry
Base=HKCU\Software\Microsoft\Office\9.0\MS Project\Options
Values=*.*
Flag=Variables
Base=<#VAR:001#>
Values=Office\8.0
Flag=Variables
Base=<#VAR:002#>
Values=REG_SZ
Flag=Variables
Base=<#VAR:001#>
Values=Office\9.0
Flag=Variables
Base=<#VAR:002#>
106
Values=REG_DWORD
As can be seen in 8.x settings section, Base should specify the path to the registry item including the key name. This can be a *.* or a specific key name. Values is used to specify the variable registry format of destination. In case the version differs at destination, this will be resolved, else no action will be taken. We havent used this flag in the 9.x settings section as we do not support backward migration from 9 to 8. So effectively, in this example even if we dont specify value of <#VAR:002#> under 8.x Variables, it wont make a difference.
How to Prevent a Personality Package from Replacing an Existing Item Setting on the Target Computer Flag=Registry Base=HKEY_CURRENT_USER\key1\subkey1 Values=*.* Replace=No
If any value with the same name under HKEY_CURRENT_USER\key1\subkey1, the values will not be replaced by the one in the Personality Package. For additional examples, see the [Keyboard Settings] section in the dsktpnn.ini file located in the PC Transplant default installation directory.
Admin
The Admin value lets the Personality Package know if administrative privileges are required to apply a given setting. The value you assign to Admin can be one of two values: FALSE or TRUE. If Admin is set to TRUE and the current logged in user does not have administrative rights, the Personality Package will display an error and not run. If you do not include this property, the default for Admin is FALSE.
DeleteKeyBeforeMigrating
The DeleteKeyBeforeMigrating value lets the Personality Package know if it should delete a registry key, with all its subfolders and values, on the target PC prior to migrating a setting to the target PC. This can be valuable if you want a destination application to only contain the settings from the source application. The value you assign to DeleteKeyBeforeMigrating can be one of four values: FALSE, TRUE, LeaveOutFilePaths, and RetainSpecified. If DeleteKeyBeforeMigrating is set to TRUE, the registry key and all its subkeys and values will be deleted prior to transplanting the setting. If DeleteKeyBeforeMigrating is set to LeaveOutFilePaths, the registry key with all its subkeys and values will be deleted prior to transplanting the setting, unless the registry value contains a path. If DeleteKeyBeforeMigrating is set to RetainSpecified, this should be followed by another set of tags that specify the values to be retained. Each set of tags that specify values, should be followed by Retain=True (See Symantec Winfax Pro.a2i for an example). If you do not include this property, the default for DeleteKeyBeforeMigrating is FALSE.
107
How to Force a Personality Package to Delete a Complete Registry Key Before Migrating Its Contents from the Personality Package Flag=Registry Base=HKEY_CURRENT_USER\key1\subkey1 Values=*.* DeleteKeyBeforeMigrating=TRUE
The above item setting instructs the Personality Package to delete the key HKEY_CURRENT_USER\key1\subkey1 (along with subkeys and all values) if it exists on the target PC prior to copying it from the Personality Package. For additional examples, see the [0 Bookmarks and Profiles (POP only)] section in the netscape.a2i file located in the PC Transplant default installation directory.
DeleteKeyBeforeMigrating=Remove
For cross version migration of the Office suite, it was identified that the migration wont take place if a specific key exists at the destination. We have to remove that key. This tag does just that. Example
Flag=Registry
Base=HKEY_LOCAL_MACHINE\Software\Microsoft\Office\ByPassMigrati on
Values=
DeleteKeyBeforeMigrating=Remove
DeleteKeyBeforeMigrating=RetainSpecified
There may be cases where you need to delete all but a certain set of items. Using this tag, followed by the items to retain provides this functionality. Example
Flag=Registry Base=HKEY_CURRENT_USER\Software\Altiris\RapidInstall
108
values=Directory,Execute Retain=TRUE
ExcludeFilePaths
The ExcludeFilePaths value lets the PC Transplant Wizard know if it should exclude registry values that have hard-coded file paths. The problem with transferring a registry value that has a hard-coded file path is the validity of the path on the destination computer. The value you assign to ExcludeFilePaths can be one of two values: FALSE or TRUE. If ExcludeFilePaths is set to TRUE, any registry value that includes a hard-coded path will not be included in the Personality Package. If you do not include this property, the default for ExcludeFilePaths is FALSE.
How to Capture All Registry Values Except Those Containing File Paths
Assume the following registry structure:
HKEY_CURRENT_USER\key1\subkey1\value1 = 0 HKEY_CURRENT_USER\key1\subkey1\value2 = c:\dir1\file1.txt HKEY_CURRENT_USER\key1\subkey1\value3 = temp .a2i item setting: Flag=Registry Base= HKEY_CURRENT_USER\key1\subkey1 Values=*.* ExcludeFilePaths=TRUE
The above item setting captures:
HKEY_CURRENT_USER\key1\subkey1\value1 HKEY_CURRENT_USER\key1\subkey1\value3
. . . but does not capture:
HKEY_CURRENT_USER\key1\subkey1\value2
For additional examples, see the [7.x Auto Correct File] section in the access.a2i file located in the PC Transplant default installation directory.
Retain
The Retain tag allows a PC Transplant Undo package to restore all of the registry settings changed by the original Personality Package except those listed in the Values tag of the setting where this tag is used. The only value that can be assigned to Retain is ForUndo. Example:
Flag=Registry
109
NewDestination
The NewDestination tag lets you map the path to a file to a new location. The value you assign to NewDestination is a string, and gets assigned to the collected file at the time the package is created. The following example shows how to transfer a file located in one folder to a new folder:
[My Section] MyFirstValueName=Value MySecondValueName=Value [Another Section] MyFirstValueName=Value MySecondValueName=Value MyThirdValueName=Value (etc.)
Application Executable (page 111) Application Versions (page 113) Application Settings (page 114) INI Support (page 118) Variable Support (page 119)
z z z z z
110
Application Executable
All .A2i files start with a section called Applications. Under that section a value name of EXE must exist. The value given for EXE can be defined in one of the following ways.
z z z z z
List the name of the applications .exe file Use the Program value List the full path of the executable List the registry path for the full path of the executable Full, partial, or no path of executables with Type= SCAN flag
[Applications] EXE=Express.exe
The EXE value listed must match the .exe filename listed under the following registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ap p Paths
You may also support multiple values for the EXE tag. Each executable listed must be separated by a comma. This is valuable if the name of the EXE may change across different versions of the application. For best results it is recommended that exe names be written in an increasing order of version. Old version exe names should come first and the highest exe name should come at the end. Microsoft recommends that all applications installed under Windows add the name of the applications executable to this key and include a default value of the full path to the executable. If the PC Transplant Wizard cannot find the executable listed in the .A2i with the path defined in the registry, the application will not be displayed under the Applications tab.
111
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Un install
[Applications] EXE=c:\windows\calc.exe
This option is not the preferred method of listing the application because it ties the path to the name of the executable. It is provided for custom applications that do not provide an installation and are always installed in the same directory. If the PC Transplant Wizard cannot find the executable using the full path listed in the .A2i, the application will not be displayed under the Applications tab. If none of these methods allow you to install your files or registry items, you may want to consider adding them to the Desktop setting files (see Desktop and Network Settings File Format on page 79).
EXE=vb6.exe Path=HKEY_CLASSES_ROOT\VisualBasic.Project\shell\open\command\\
112
Here no key name is provided, so default key name and its value is taken. Note If no key name is provided, a backslash must be provided as given in the example.
Example
ScanPath=C: ScanPath=C:,D: ScanPath= or no ScanPath tag found ScanPath=%MI_PROGRA MFILESDIR% ScanPath=%MI_USERPR OFILE% ScanPath= c:\dir* ScanPath= dir*,app
Function
Scans C drive only Scans C and D drives Scans all local drives
Scans the Program Files directory Scans each migrated user's profile folder Scans any folder that starts with c:\dir. Example: c:\dir1, c:\dir2 Scans only those folders that start with dir, or have the name 'app'
Application Versions
The section of the .A2i file following the Applications section contains information about each version of the application. You can support all versions of your application within the same .A2i. If the application uses a different executable filename for each of its versions, you will need to create a separate .A2i for each one. Each version section must provide a Description value name followed by a description of the application. Example:
113
Example:
[4.0 Settings]
[4.0 Files]
If you want a sub-item to exist for all versions of the application, you can use a version number of 0 before the name of the sub-item. Example:
[0 Data Files]
If you want to include sub-items for a defined setting include a > after the setting name. Example:
Application Settings
An application setting can be a registry value, a file, an .INI value, a file type, or a combination of these. To define a setting requires the use of three value names: Flag, Base, and Values. These items can be repeated for each registry and file item you want associated with that applications version.
114
Flag
The Flag value can be one of seven types:
z z z z z z z
The Registry Flag type is used to describe registry keys and values. The File Flag type is used to describe directories and files. FileType is for a specific document typeuse it if you want to include a specific file or type of file and dont know where it is located. Since FileType does not need a path, the Base value name is ignored. The INI flag is similar to the Registry flag, in that it is used to describe INI sections, keys, and values. The API flag is used internally so it is not discussed here. The Variables flag is used to define a dynamic value and is assigned values pending the version of the application.
Base
Use the Base value to describe the path to an item. The value you provide for Base must correspond to the Flag type you defined. Example: if a Flag value is of type Registry, you must specify a registry path. If a Flag value is of type File, you must use a directory path. A path may include system environment variables, a PC Transplant variable, or the contents of a registry value. File types dont need a Base. Supported PC Transplant variables include:
z z z z z z z z z z z z z z z z
%MI_DESKTOP% %MI_STARTMENU% %MI_SENDTO% %MI_FAVORITES% %MI_SYSTEM% %MI_ALLUSERS_STARTMENU% %MI_ALLUSERS_DESKTOP% %MI_APPDATA% %MI_LOCALAPPDATA% %MI_COOKIES% %MI_FONTS% %MI_WINDIR% %MI_APPDIR% %MI_CACHE% %MI_PERSONAL% %MI_BASEAPPDIR%
115
z z z z z z z z z z z z z z z z z z
%MI_PROGRAMFILESDIR% %MI_COMPUTERNAME% %MI_SYSDRIVE% %MI_USERPROFILE% %MI_ALLUSERS_APPDATA% %MI_STARTUP% %MI_TEMPLATES% %MI_PICTURES% %MI_RECENT% %MI_HISTORY% %MI_NETHOOD% %MI_WINSYSTEMDIR% %MI_PROGRAMS% %MI_INPUT_LOCALE_ID% %MI_APPDATA% %MI_OFFICE_TEMPLATE% %MI_OFFICE_DIR% %MI_LOCALSETTINGS%
To get the path from a registry value, use this syntax: <%Reg:registry path%>. If the registry value contains too much path information, you can nest the <%Reg:%> value inside of <%STRIPTAILSLASHESn:%> (where n is a value greater than 0 and specifies the number of slashes to backup). Example: Suppose the registry value:
HKEY_LOCAL_MACHINE\Software\Altiris\express\InstallDir
contained a value of:
C:\Program Files\eXpress\express.exe
You could use this registry value to get the path of Altiris eXpress Deployment Server using the following Base value:
c:\program files\express
116
Values
A Value is the specific item you want to capture using the Base path you provided. You can use wildcards when specifying a Value for Files. You can specify multiple Values by separating each Value with a comma. If you are defining registry Values, you can also provide default Values for the registry items in case they cant be found. The syntax for defining a default registry value is:
Values=RegVal=Value|RegType
RegVal is the name of the registry value. =Value is optional. If used, a default registry value will be added to the package if the registry value is not found on the source PC. |RegType is optional. RegType can be any one of the following values:
z z z
The Value tag supports environment variables (see your OS help file for a complete listing of OS specific environment variables), PC Transplant variables (see Environment Variables for a list of internal PC Transplant variables, or A2i variables (see A2i Variables on how to define and use A2i defined variables). It also supports obtaining a value from the registry (see Advanced Usage under Settings File Format for a complete definition of how to return the contents of a registry value). The following provides examples and descriptions of what each example does:
[4.5] Description=Altiris Express 4.5 To capture all registry keys and values under the Altiris eXpress registry key [4.5 Settings] Flag=Registry Base=HKEY_CURRENT_USER\Software\Altiris\Altiris Express Values=*.* To capture the eXpress.ini and aclient.ini files located in the Windows directory Flag=File Base=%windir% Values=express.ini,aclient.ini To capture AutoUpdateClients, DatabaseDSN, and DatabaseSettings registry values under the Options registry key Flag=Registry Base=HKEY_CURRENT_USER\Software\Altiris\Altiris Express\Options
117
Values=AutoUpdateClients,DatabaseDSN,DatabaseSettings To capture AutoUpdateClients, DatabaseDSN, and DatabaseSettings registry values under the Options registry key
If a registry value does not exist for AutoUpdateClients, add the registry value to the package as a DWORD with a value of 1. If a registry value does not exist for DatabaseDSN, add the registry value to the package as a string with a value of Altiris eXpress Database.
Flag=Registry Base=HKEY_CURRENT_USER\Software\Altiris\Altiris Express\Options Values=AutoUpdateClients=1|REG_DWORD,DatabaseDSN=Altiris Express Database|REG_SZ,DatabaseSettings To grab the path stored under the registry key:
HKEY_CURRENT_USER\Software\Altiris\Altiris Express\directory. Add data to the path, and collect all *.db files:
Flag=File Base=<%REG:HKEY_CURRENT_USER\Software\Altiris\Altiris Express\directory%>\data Values=*.db To scan all directories specified by the user for the file type *.img Flag=FileType Values=*.img
INI Support
A2i files support the migration of individual INI values. The syntax of the INI Flag and definition used in an A2i file is listed as follows:
118
The previous example would do the following: Open the Win.ini file located in the Windows directory. Capture the Wallpaper value under the Desktop section. Capture the TileWallpaper value under the Desktop section. If TileWallpaper is not found, add it to the package, and give it a value of 1. Capture the Mapi value under the Mail section. The Value tag also supports wildcards. In the following example, all values defined under the Desktop section would be captured:
Values=Desktop|*.*
INI settings are stored in a temporary INI file. When completed, the INI files are added into the package using the INI files real path. When the INI file is migrated onto the destination PC, it is merged with the existing INI file. Settings and how they are defined in an A2i file are the same as those defined for Network and Desktop settings files. For this reason, we have not gone into detail on their definitions and their use. For a complete description see the Desktop and Network Settings File Format on page 79.
Variable Support
Variables provide a way to dynamically define values that can be associated with a specific version of an application. By using variables, you can dynamically map registry keys, registry values, and files based on the version of the application found on the source or destination PC. Example: Microsoft Word 97 uses the applications install folder to store its template files, whereas Word 2000 uses the Application Data\Microsoft\Templates folder. By defining a variable, assigning the application's install directory for version 8.x (Word 97), and assigning Application Data\Microsoft\Templates for version 9.x (Word 2000), you can manage where the template files are placed based on the version of the application. Variables can be used when defining a registry value or file in an A2i file. To add support for variables in an A2i file, you must first provide the [0 Variables] section. It is standard procedure to start this section at the end of your existing A2i file. Next, define a variables section for each version of your application. Example: [0 Variables > 2.x], [0 Variables > 3.x]. Using the Flag, Base, and Values tags, define a variable and assign it a value. Note Variables can only be used in A2i files. It is invalid to use <#VAR:xxx#> without defining an appropriate Variables section in the A2i file. The syntax for defining a variable is as follows:
Flag=Variables
119
Base=<#VAR:nnn#>
Give the variable a number, where nnn can be any number from 001 - 999. Example: <#VAR:001#>, <#VAR:002#>, etc. While it is possible to assign any number to nnn, it is good practice to start the first variable with a value of 001, and increment this number by one for each succeeding variable.
Values=Assignment
Assign the variable a value. This value could be a path, a file, a registry value name or type. A value can also be assigned dynamically using environment variables or values obtained from the registry. The example below shows how to define a new variable, assign a value to it based on the application version, and then how to use that variable in another setting. The example starts by adding two settings that will require special values based on the application version. In the example below, version 8.x of my application stores a specific registry value under HKEY_CURRENT_USER\Software\Microsoft\MyApp\8.0. In version 9.0, it has been moved to
HKEY_CURRENT_USER\Software\Microsoft\MyApp\9.0
The two application version settings are shown below:
120
[0 Variables] [0 Variables > 8.x] Flag=Variables Base=<#VAR:001#> Values=8.0 Flag=Variables Base=<#VAR:002#> Values= MySetting
[0 Variables > 9.x] Flag=Variables Base=<#VAR:001#> Values=9.0 Flag=Variables Base=<#VAR:002#> Values= NewSettingName
When version 8.x of the application is found on the source machine, the variables will be resolved for that version. When the Personality Package is applied to the 9.x version of the application on the destination machine the items will be mapped to fit the registry paths and values for that version.
How to use variables to change registry data types across different versions of an application
The following example will convert a registry value stored as a string, and convert it to a number.
121
Replace=Format
[0 Variables]
[0 Variables Flag=Variables
8.x]
Base=<#VAR:001#> Values=REG_SZ
[0 Variables Flag=Variables
9.x]
Base=<#VAR:001#> Values=REG_DWORD
In the above example, version 8 of the application stores some of its settings under the specified key in string (REG_SZ) data format and version 9 of the application stores the same settings as a number (REG_DWORD) data format. Notes
z
Replace=Format flag should be specified at the bottom of the path items where the intention is to change the format. Base of these path items should completely point to the registry key as Values is used to specify the variable that will be resolved to the data type specified in the variables section. PC Transplant supports the following conversions of data format:
Replace=Format should be used with caution. Use it only after studying the data formats of different application versions. Replace=Flag flag is applicable only to Registry path items.
For additional examples, see the [8.x Settings] and [0 Variables] sections in the MS Project.A2i.
122
General File Format (page 123) Personality Build Template Sections (page 123)
Turned on or off by setting the value to 0 or 1. Example: Control Panel=1 A value that defines an option. Example: Replace Files=2 (Always replace files) Defined using a string. Example: Exclude Files=pagefile.sys,ntuser.dat
123
[Desktop] Windows Shell=1 ;selects the Windows Shell setting and everything underneath it Display Properties > Appearance > Colors=1 control panel=1 ;error - case sensitive (Control Panel)
[Network] Window drive Mapping=1;selects all mapped drives Window drive Mapping > W: (\\pulp\documents)=1 ;captures drive W:, if the user has it mapped to \\pulp\documents
[Applications] ICQ > Buddy List and Preferences=1 Microsoft FrontPage Editor > Settings=1 MS Access > Associated Files > MDB Files=1 number is missing (2000) MS Access 2000 > Auto Correct File=1 MS Access 2000 > Custom Dictionary=1 ;error version
Note To select all or none of the desktop, network, or application settings use the All tag, and set its value to 1 or 0. Example: [Applications] All=1
124
Files Section
The files section is used to define files, folders, file types, and exclusions (filters). Any file specified under Files and Folder override any file excluded under Exclude File, Exclude Folder, and Exclude keys. Each of these keys may include one or more values that describe a path or filename. To support long file names, paths and files should be contained inside of quotes. If a value must include more than one path or file, each item must be separated by a comma. The template file also supports the use of environment variables, which provides flexibility in the paths that can be defined under different operating systems.
Files
A key defining one or more files to be included for migration. Example:
Folder
A key defining one or more folders to be included for migration. Example:
File Types
A key defining one or more file types to be included for migration. A file type consists of a description, followed by the wildcard extension in parenthesis. If a file type is to be routed to a new destination, the value of the file type will also include a pipe (|) character followed by a path of the new destination. Example:
File Types=a2b music (*.mes)|c:\mymusic,A2I File (*.a2i),Address Book File (*.wab)|c:\myaddressbook, "a2b music(*.mes)"|Filter=0:|DestPath=1:C:\Music| Date=0:0:0:6:15:20\9\2001:20\9\2001|Size=0:0:50|RetainDir=0|
125
The last example uses the advanced options to define special handling options for the requested file type. In the example above, all *.mes files found will be collected and moved to a C:\Music folder. For more information, see Files, Folders, and File Types Advanced on page 126.
Filter=0 or 1(on or off);0 is the only valid value when used with Files
Example:
|Filter=0|
New Destination Option. Defines a new folder for the file collected. The syntax for using the New Destination Option is
|DestPath=0:| |DestPath=1:c:\NewDestination|
Retain Directory Structure option. The Retain directory structure option will be stored in the template file, as part of the File Types key name. For each element listed under File Types, an element called RetainDir will be added. The value after the equal sign will determine if the option is on or off. Example:
126
DestPath=1:C:\PDFFiles|Date=0:0:0:6:15:22\8\2001:22\8\2001| Size=0:0:50|RetainDir=1|
Date Option. A file must meet the date criteria specified by this option in order for it to be collected. The syntax for using the Date Option is as follows:
Date=0 or 1(Off or On):0, 1 or 2(created, last accessed, modified):0, 1, or 2(last month, day, or date range):months:days:startdate:enddate
0 or 1 turns this feature off or on. Months, days, and start and end dates are only valid when used with the previous identifier. Dates follow the syntax day\month\year (such as 20\1\2001). Example:
|Date=1:1:0:6:15:20\9\2001:20\9\2001| ;last accessed in the last 6 months |Date=1:2:0:6:15:20\9\2001:20\9\2001| months |Date=1:0:1:6:15:20\9\2001:20\9\2001| |Date=1:0:2:6:15:20\9\2001:21\9\2001| 21, 2001 ;modified in the last 6 ;created in the last 15 days ;created between Sept. 20-
Size Option. A file must meet the size criteria specified by this option in order for it to be collected. The syntax for using the Size Option is
Exclude Files
A key defining one or more files to be excluded for migration. Example:
Exclude Files=pagefile.sys,ntuser.dat
127
Exclude Folder
A key defining one or more folders to be excluded for migration. Example:
Exclude
A key defining one or more drives to be excluded for migration. Example:
Exclude=C:\,E:\
Options
The Options section defines any build, run, or install visual options supported by a package. The sections below describe these different options and their possible values.
Replace Files
Describes how to replace files during migration. Example:
PromptOnReplace=0 PromptOnReplace=1
(no) (yes)
(no) (yes)
Description
User defined description of the package. Example:
Title
User defined title of the package. Example:
Title=Personality package
128
Splash
A string defining the full path of the splash screen bitmap that is displayed when the user runs the package. Example:
Splash=F:\Builds\Wizard\Wz1070\default.bmp
Splash Layout
Identifies the layout of the splash screen. Example:
Enable Undo
Determines if Undo is supported by the Package. Example:
(no) (yes)
Abort Type
Determines when to abort the execution of a Package during insufficient disk space constraints.
Span Size
Determines the maximum size of a package before it creates another span file. This may be valuable if you are moving the Personality Package later to media type that has a maximum size limitation, such as CD. Example:
Span Size=650000000
Cleanup
If set, this option will instruct the PC Transplant Wizard to create a cleanup package, using the files added to a Personality Package. Once completed, a shortcut will be created and placed on the users desktop. Example:
Cleanup=0 Cleanup=1
(no) (yes)
129
(no) (yes)
Security
Determines if the security information for files or folders must be migrated or not. It can also be used to set read rights to all the parent folders of the migrated file or folder. This can be cleared during the package execution.
Security=0: No Security Security=1: Migrate security permissions Security=2: Migrate security permissions and Propagate read permissions to parent
No compression
Files listed with this option are not compressed while creating personality packages and also during real-time migration.
NoCompress=(*.zip),(*.mp3),(*.jpeg),(*.cab),(*.jpg), (*.wma),(*.mpeg),
Locale Locale=EN : Language ID for the language of system on which pbt was created.
Troubleshooting
z
Storing a Personality Package onto removable media with less than 10MB of free disk space is not recommended. If disk space is limited, you can span a Personality Package across multiple disks. If you take this approach, expect to do some disk swapping. To run PC Transplant on Windows, we recommend that your user be a member of the Administrator group. If you are a member of a Windows Domain and migrating a Windows computer name or recreating the Domain Computer account, then while logging on to the Domain after the migration, you might receive the following error: The trust relationship between this workstation and the primary domain failed.
130
Cause: The computer account has the incorrect role or its password has mismatched with that of the domain database. Solution: Log on to the workstation only (Administrative rights required). Change the network membership to be a member of a Workgroup. Restart the computer and log on to the workstation as a member of that Workgroup. Change the network membership back to Domain and restart.
z z
Turn off the migration of security permissions to improve the performance. When migrating the Outlook settings, it may appear as though settings and personal folders were not migrated for a given user account. Cause: This can occur if the profile account used on the source computer is not used when logging on to Outlook on the destination. Solution: Please ensure that you are using the same account. This problem can also occur if your system administrator has defined a Microsoft profile file to be used when Outlook is executed. A Microsoft Profile File or PRF is used by Microsoft to configure a user's profile and settings. An administrator can cause these to be run automatically when Outlook executes. This can be accomplished by passing a /importprf to the outlook.exe. It can also be done by setting the ImportPRF registry value under Microsoft's Outlook\Setup key.
131
Index
A
A2i Builder 72 INI file support 118 A2i builder 72 A2i Editor 75 menu functions 75 A2i File Updates 23, 69 A2i files creating, editing 72 editing 75 submitting 74 A2I format 8, 9, 110 Abort Type key 129 Access 12 Admin value 107 Adobe 12 Altiris test site 74 AOL 12 application Access 12 Approach 12 Eudora 12 Excel 12 Exchange 12 Fastsite 12 Freelance 12 FrontPage 12 Instant Messenger 12 Internet Explorer 12 MSN Messenger 12 Navigator 12 NetMeeting 12 Norton AntiVirus 12 Notes 12 Outlook 12 Outlook Express 12 Pager 12 PC Anywhere 12 Photoshop 12 PowerPoint 12 Presentation 12 Publisher 12 Quattro Pro 12 RealJukebox 12 RealPlayer 12 ScreenCam 12 settings 11 Smart Center 12 Virus Scan 12 WinZip 12 Word 12 WordPerfect 12 WordPro 12 application settings 23, 68 application to information format 8, 9, 110 Approach 12 PC Transplant Package Editor 70 Enable Undo key 129 environment variables 97 Eudora 12 Excel 12 Exchange 12 exclude files 24 Exclude Files key 127 Exclude Folder key 128 Exclude key 128 Exclude value 102 ExcludeFilePaths value 109 exit values 42, 61
B
bandwidth 26 build templates 20
C
command line switches 25 command-line options 25 command-line switches 49 company Adobe 12 AOL 12 Corel 12 Lotus 12 Microsoft 12 Netscape 12 Network Associates 12 Novell 12 Qualcomm 12 RealAudio 12 Symantec 12 WinZip 12 Yahoo 12 Compatibility value 104 computer synchronizing 7, 7 upgrades 6, 6 computer name 22, 48, 67 Corel 12 creating a Personality Package 15
F
Fastsite 12 features A2I Builder 9 Application Install Administrator 8 new in release 6.5 13 PC Transplant Package Editor 9 PC Transplant Wizard 7 Personality Package 8 Personality Template Builder 9 real-time destination agent 8 real-time migration 8 file format 79 file types 77 File Types key 125 files include, exclude 24 format A2I 8, 9, 110 Freelance 12 FrontPage 12
D
DeleteKeyBeforeMigrating value 107 Description key 128 desktop settings 9, 21, 67, 79 settings desktop 79 DestOS value 103 disconnected users 18, 47 documentation 14 PC Transplant 14 domain name 22, 48, 67
G
GroupWise application GroupWise 12
I
include files 24 INI file support 118 Instant Messenger 12 Internet Explorer 12 introduction PC Transplant 6 item setting properties 101
E
editor 70 A2i 75
132
K
keys 125
Outlook Express 12
P
Package Contents Tool 42 package viewing contents 42 packages command-line switches 49 editing 70 installing 45 Pager 12 PC Anywhere 12 PC settings 66 PC Transplant features and benefits 7 introduction 6 PC Transplant Package Editor 70 menu functions 70 PC Transplant Wizard 7 PCT Package Contents Tool 42 permissions 20 personality back up 7 build templates 20 restore 7 Personality Package 6 creating 15 running 45 Photoshop 12 PowerPoint 12 predefined templates 20 Presentation 12 PromptOnReplace key 128 Publisher 12
of transplanted files 19 permissions 20 setting tags 81 settings 101 application 11 desktop 9 network 11, 80 PC 66 transplantable 9 settings options 16, 46 sharing resources 7 Smart Center 12 Splash key 129 Splash Layout key 129 switches command line 25 Symantec 12 synchronizing multiple computers 7
L
LogError value 101 Lotus 12
M
MI_ALLUSERS_DESKTOP variable 98 MI_ALLUSERS_STARTMENU variable 98 MI_APPDATA variable 98, 99 MI_APPDIR variable 98 MI_BASEAPPDIR variable 98 MI_CACHE variable 98 MI_COMPUTERNAME variable 98 MI_COOKIES variable 98 MI_DESKTOP variable 98 MI_FAVORITES variable 98 MI_FONTS variable 98 MI_LOCALAPPDATA variable 98 MI_PERSONAL variable 98 MI_PROGRAMFILESDIR variable 99 MI_SENDTO variable 99 MI_STARTMENU variable 99 MI_SYSTEM variable 99 MI_USER variable 99 MI_WINDIR variable 99 Microsoft 12 MSN Messenger 12 Multiple NIC Support 22, 67
T
tags 81 template builder 66 template settings options 66 Title key 128 transplantable settings 9
U
UAC 33, 34, 56, 57 upgrading computers 6 upgrading operating systems 6 User Account Control 33, 34, 56, 57 user accounts orphan 40 user map file 19, 47 sample 19, 47 user priority 41
N
Navigator 12 NetMeeting 12 Netscape 12 Network Associates 12 network settings 11, 21, 67, 79, 80 new features 13 NICs, support of multiple 22, 67 Norton AntiVirus 12 Notes 12 Novell 12
Q
Qualcomm 12 Quattro Pro 12
R
RealAudio 12 RealJukebox 12 RealPlayer 12 real-time migration 8 Reboot after Transplant key 128 Reboot value 102 Replace Files key 128 Replace value 104 reset status 34 resource sharing 7 running a Personality Package 45
V
value exit 42, 61 values 99 variables environment 97 viewing package contents 42 Virus Scan 12 Vista 33, 34, 56, 57
O
operating system upgrades 6 Options key 128 Organizer application Organizer 12 orphan accounts 18 orphan user accounts 40, 60 Outlook 12
W
WinZip 12, 12 wizard command-line options 25 Word 12 WordPerfect 12 WordPro 12
S
ScreenCam 12 security
133
Y
Yahoo 12
134