LTI, ZTI, and UDI deployments use the same common set of scripts and configuration files (such as CustomSettings.ini) for deploying target computers. Table 6 compares LTI, ZTI, and UDI deployments.

Table 6. Comparison of LTI, ZTI, and UDI Deployments

LTI deployment

ZTI deployment

UDI deployment

Allows selection of the level of automation

Supports only fully automated deployments

Allows selection of the level of automation

Has minimal infrastructure requirements

Requires Configuration Manager 2012 or Configuration Manager 2007 R3

Requires Configuration Manager 2012 or Configuration Manager 2007 R3

Supports deployments over a network using a shared folder or locally using removable storage such as a CD, DVD, or UFD

Supports deployments over a network using Configuration Manager 2012 or Configuration Manager 2007 R3 distribution points or locally using removable storage such as a CD, DVD, or UFD

Supports deployments over a network using Configuration Manager 2012 or Configuration Manager 2007 R3 distribution points or locally using removable storage such as a CD, DVD, or UFD

The deployment process can be initiated manually or automatically using Windows Deployment Services

The installation process can be initiated by Configuration Manager 2012, Configuration Manager 2007 R3, or Windows Deployment Services

The installation process can be initiated by Configuration Manager 2012, Configuration Manager 2007 R3, or Windows Deployment Services

The deployment process is configured using the Deployment Workbench

The deployment process is configured using the Configuration Manager console in Configuration Manager 2012 or Configuration Manager 2007 R3

The deployment process is configured using the Configuration Manager console in Configuration Manager 2012 or Configuration Manager 2007 R3 and the UDI Wizard Designer.

Can require less initial IT administration configuration time

Requires more initial IT administration configuration time

Requires more initial IT administration configuration time

Can require interaction by the user or deployment technician

Requires no interaction by the user or deployment technician

Can require interaction by the user or deployment technician

Increases the risk of introducing configuration errors

Reduces the risk of introducing configuration errors

Increases the risk of introducing configuration errors

Requires users or deployment technicians to have credentials with elevated permissions

Users and deployment technicians are not required to have credentials with elevated permissions

Requires users or deployment technicians to have credentials with elevated permissions

Requires that users or deployment technicians know some configuration settings prior to initiating the MDT deployment process

Users and deployment technicians do not need to know configuration settings prior to initiating the MDT deployment process

Requires that users or deployment technicians know some configuration settings prior to initiating the MDT deployment process

Can be used with slow connections or in instances where no network connectivity exists

Requires a high-speed, persistent connection

Requires a high-speed, persistent connection

Requires little or no infrastructure to support deployment

Requires an infrastructure sufficient to deploy operating system images

Requires an infrastructure sufficient to deploy operating system images

Supports deployment over the network or local to the computer from media

Supports deployment over the network or local to the computer from media

Supports deployment over the network or local to the computer from media

Does not require management of target computers using Configuration Manager 2012 or Configuration Manager 2007 R3

Requires that target computers be managed using Configuration Manager 2012 or Configuration Manager 2007 R3

Requires that target computers be managed using Configuration Manager 2012 or Configuration Manager 2007 R3

Supports security policies in which automatic software installation is prohibited

Supports only security in which automatic software installation is allowed.

Supports only security in which automatic software installation is allowed.

Supports deployment to target computers isolated by firewalls

Requires remote procedure call (RPC) communication with target computers

Requires RPC communication with target computers

 

At some point in the MDT process, you must provide all the information necessary to install Windows and the applications on target computers. The question is, when do you provide this information? The more information you provide in advance, the less interaction is required during deployment.

Table 7lists the advantages and disadvantages of performing fully automated deployments (using LTI, ZTI, or UDI) and partially automated deployments (using LTI or UDI).

Table 7. Advantages and Disadvantages of Fully and Partially Automated Deployments

Method

Advantages

Disadvantages

Fully

·     No interaction with the user or deployment technician is required.

·     The risk of introducing configuration errors is decreased.

·     Users or deployment technicians do not need to know any configuration information prior to initiating the MDT deployment process.

·     More time is needed to provide configuration information required for fully automated deployment.

·     Credentials to access network resources and that have elevated permissions are stored in configuration files that must be protected.

Partially

·     Less time is required to prepare for deployment, because configuration information can be provided interactively.

·     Interaction with the user or deployment technician is required.

·     The risk of introducing configuration errors is increased.

·     Users or deployment technicians must have credentials that require elevated permissions.

·     Users or deployment technicians must know some configuration information prior to initiating the MDT deployment process.

 

Related Topics

Planning MDT Deployments