Using DISM with Images

Video Activity

Using DISM with Images This lesson covers using DISM with images. Many times when images are used, they are used via a deployment service. This lab-based lesson covers how to work with images with the Deployment Image Service Management tool. Using the power shell environment, participants receive step by step instructions in how to configure the D...

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

41 minutes
Video Description

Using DISM with Images This lesson covers using DISM with images. Many times when images are used, they are used via a deployment service. This lab-based lesson covers how to work with images with the Deployment Image Service Management tool. Using the power shell environment, participants receive step by step instructions in how to configure the DISM. Within this option, you can mount a WIM in order to work with an image and enable features.

Video Transcription
in our production environment. A lot of times we are going to be rolling out our images to our computers through a deployment service, depending how you go about this, you may be using 1/3 party tool where you be using Windows Deployment service is. But if you're using the Windows environment, you're going toe
often. What to make changes or modifications to your baseline image into working off something. Call your gold image and you can actually slipstream in new aspects to that, especially talking about like a server environment where you might want to turn a future role on or something of that nature. Uh, take bit locker, for example, which we talked about in the previous
lesson Now squared.
Look at the process of working with the tool for that. The tool that we're gonna use for that is
deployment image servicing management or D I s M. So we're gonna head and work with that. We work out at a power shell. So if you right click and you run his administrator, you'll open up your power shell.
It will have a power saw for running
it. Let's first look at r D. I s and tool as a whole to de ice him and they would take a look at the help menu to show what our options are.
Ed With school down, let's go back up to page here. Is it what quite quickly passed us?
And we
told it to give us the information. And here it is going to say
deployment, image servicing and management tool. Version 6.3 point 96 zeros there, that 16384 And it gives us the name of it and tells us the basic structure of how we have commands and some of the images commands we might be working in. The numerator installs on installs, configures updates, futures packages in the Windows Image file
I w I am
So we're talking about in a women win is a win file
so we could do We can get mounted image info. So if we mount a image that we could get mounted, it can info about the mounted image and a virtual hard drive. We could get image info. We can commit image we can un mountain image mountain emits rebounding image. Clean up mount points.
We have to exit this. Delete split export upend image. Apply image, get mounted. Womenfolk get
cleanup. Whim. There's a lot of things that we can't have we actually have on our environment here. A couple of wins. We have a boot install. We're gonna extra work with our install. William here I saw install whim is going to be what we want to work with. So on our
lab of our bit.
Who are you?
Notice what we're working on here. This is our d. C. So issue what to work on Our local environment under all files would want to be in our lab files and we work with d. C. There's our
Ah, but Wim missed all women. The lab. William. So obviously we have a fugitive was So we're gonna have lab, and thus we actually have a directory in that same location called mouth will be mounting into that currently is empty and just see how that makes a difference here in a moment. So the first Wendy is we're gonna actually mount one of our whims into our environment to be able to work with it. So
let's go ahead and scroll down to the bottom here
and we will go ahead.
We tap in a long string of commands And here is that long string of commands A says D I s m Mount whim. So that's our command lit. They tell to mount a whim file and then the location. So we have a colon than the location in standard format. So in this case, it's e lab files and then the name of that,
whatever it is So lab that women that could be several directors deeper one Director David, give me the route so I could be like e colon backslash lab, not win. And then we need to know either the name of the operating system environment that we're working on it or in this particular case, the index. So which version is it? So
Index one is obviously, is the default. So we could put in this
Are you the slash index argument and say one And then we have to tell it where to mount that image
information, too. So I actually have to give it a director to mount. It is, And then we get into our
Mount directory, and that's when we actually have our wind file. There's no spaces in there between the wind file. In the name of the whim and Armand directory, it's the same thing. So we've put them out. Directory, no spaces. We have our colon equal in. And we actually have the name of the directory and this particular escort to read only because working, not gonna
actually making modifications to it, they're gonna keep
So which students read only and you go ahead and hit. Enter. It actually will load up your dia some tool. So each time you hit, enter D isom loads interactively, gives you the version information and tells you it's mounting an image image amount and it goes through the process and it says 012 10 30 40 50. And when it gets done
and remember, it will slow down a little bit at the end. It doesn't stay at the same speed the whole time,
but you notice it actually has a bracket that gives you an idea of where you are also, So it's bracketed in there who are 53 56 789 65 and keep going until we're done.
And that's one of the reasons we actually looked in that folder that we looked at earlier the mounts. It was after years when this tool is done, you're going to see all the files related to this environment, basically this disk.
So it's a whim file that we would then manage for our users. So if we're just using some type of based on image, we can actually go in, too. If we just took him to fault whim, image from Microsoft
and the installment we go in, we could turn on things like games or turn off games. We could turn on features a bit, locker to not get locker, anything that you can do within a operating system environment in terms of managing the OS itself, you could do. Plus, we can also insert drivers. We conserve files, folders.
There's a lot of this piece of the puzzle we can do,
and that's kind of important to be able to do after the fact. In terms of what's we have, Ah, production of our running. We have a based on image rather than constantly recreating the image. Can we just modify whether we already have out there and is always beneficial? If we could just do an update to modify it. So take our wind file that we're using with the wds
and do a modification. Obviously, it's not gonna work with other environments. Obviously, system center would be work. Could work with two operation completed successfully here. So we're gonna go into that folder, the mounts folder that we looked at earlier. And now you notice we actually have what? Looks like an entire hard drive in there. We have program files for Grandfather's X 86 users Windows
in here. We could actually
then make changes to our environment so we could actually come in here and right click and do a new folder. Obvious. We could do this from D I s M. Also, we could do a new folder and creating new folder in here that we're gonna call it, um
d I s m lab,
you click out. Okay.
And now when we
amount this, we can either commit or discard any changes we made, and we can obviously do from either the DUI environment, which we're doing here, Or we could do it from the command line power shell environment of R d. I s m.
An example of what we might do in D I s m would be to enable a feature. So if we're gonna enable a feature
such as Bit locker who were not actually good to enable But if we're going to be able to feature such a bit locker, we would put in that same information we'd have R D I S M So you start with R D. I assume that we're gonna tell it the image, right?
We're so where the image is located. So you go to head, put your image information. So your image information, remember body mounted this So we need to tell it where our image is. So it's going to be in our location of
we put in colon
that are e drive in our backslash, we put in our images location, which would be where we haven't mounted. So our case we're lab files,
amounts And do we need to actually give it any more details? Do we actually need to tell it
that we're going to work with it? Or so if we have that in our image? So our image that we've told it what we're gonna do, let's take a look and see if it actually give us some information. So we do get features.
So get dash
at your head editor
and it tells you they're unable to access the image. Make sure that the image path when his directory for the image exists and you have read permission on the folder. So if you've
are working with ah, location that you don't have the right permissions on, then you go to have a problem.
So in that case, you need to make sure you have the right permissions on that folder.
We'll let you do that. You can actually read the directory information
and then obviously the safety everything would be
put a place if we wanted to say
taken, Make it offline so we could put it off line. Remember, it's online. We could just drag drop to it. And we're all said and done. We want to enable the feature the command that we command that we'd use to be enabled *** future. So remember, it would be,
uh slash enable feature
dash feature, and then we'd actually have to give it the future name. This isn't the whole command, but this is the part that we need to work with in addition to our location so enabled, feature, and then we actually do slash
feature dash name,
and then the future name would be after a colon. So, colon,
it will be whatever the name of the features that the name was, the future was bit locker. And you just take me a bit locker
initial enter their locker. Doesn't matter what you're gonna do. You just have to tell it where to put this in. Slipstream it in. So that would be turning a feature on in the operative disinvited rather than
adding a folder into our environment. What? I gotta keep this. We're actually not gonna enable it, because D I s m is a full featured version in year. There's lots of tools to work with it in terms of learning the process of every single step. Every single step includes creating the wom. So we have a baseline win that we work with, and then we actually do
updates to it. We could even do Windows updates to us. So if we have an offline whim and this is an advantage, we could download the cab vials from Microsoft Windows Update which we can do in our own A bar. But we take those cab files and slipstream into our women Vier mint for our image bearing in mind that into Italy
take that image and roll it out to a machine and booted up. And then those updates are gonna get applied
because we're being applied after this system starts up and it actually includes the files available, it ghosted process of doing the updates. So just putting him there
doesn't necessarily get you updated. But it makes it so that it's
fairly current and other people Will she take their gold, wants one sometimes and boot it up
and they were actually make sure that when, after the boot it up, it's ready to go with the latest update files.
Now we're gonna take the one that we just did, and we're gonna she turn it as a dismount. So we're actually we mounted it long enough to work with it, and they were now going to dismount this we actually were able to make a change to our environment in the DUI, and we could do the same thing in our diets of environment command. But
we told it to read only so we're not gonna keep it.
This case, we've got to unload it.
So there's a run Mountain. We're gonna tell what directory were on mounting from and to discard. So here we got a mount The whim of the Mount Director that's currently mounted. It will go to discard any changes that we've made. So go ahead and hit. Enter.
Actually, once again, little D I S m tool interactively. It actually find the image file itself and go back to it in the actual amount. That image just noticed they found the image file. Despite the fact we told it, the Mount Directory was in a different location. I did. It was the wind file
about director to different places.
It understands this
by reading the information of the store's relative to this
and the d I sent process will then complete it. We will have an unfounded image in when he's done. We'll go back and take a look at that same directory and you'll see that there is no longer any files in that directory, and it will that actually keep the
folder that we created in the process.
So in mounting images world was done
and we're waiting. It says 100% but it's not quite done yesterday.
Finish wrapping it up in
closing out the process
and what it does. Here we go.
If we go to our all files
flat files.
He got a mount
in those folders empty.
And there we go. That's how we run through our process and with the I S. M. And there's a lot of steps involved and we can basically melt in offline whim. We can actually then stream aspects of it that we want either add things to it, including drivers, files, folders or we're gonna turn features on and off. And then we can amount it
and then still rolling as an image. And the changes we made will be part of our updated
Up Next
Microsoft Deployment Services

The Microsoft Deployment Services course is an overview of both Windows Deployment Services and Windows Server Update Services (WSUS)

Instructed By