F5F Stay Refreshed Power Users Networks Deploying network software involves installing and configuring systems across a network.

Deploying network software involves installing and configuring systems across a network.

Deploying network software involves installing and configuring systems across a network.

D
das_janchen
Junior Member
2
01-27-2023, 09:50 AM
#1
Looking for reliable network deployment tools? You'll need software that can scan your entire network and identify devices without relying on a domain setup.
D
das_janchen
01-27-2023, 09:50 AM #1

Looking for reliable network deployment tools? You'll need software that can scan your entire network and identify devices without relying on a domain setup.

T
Turtle_PvP
Junior Member
49
02-16-2023, 01:18 AM
#2
Check out the page at pdq.com/pdq-deploy.
T
Turtle_PvP
02-16-2023, 01:18 AM #2

Check out the page at pdq.com/pdq-deploy.

C
211
02-16-2023, 06:48 AM
#3
Thank you, it seems there are some points about switches and parameters that are unclear.
C
coolbencool890
02-16-2023, 06:48 AM #3

Thank you, it seems there are some points about switches and parameters that are unclear.

B
ByxLive
Member
102
02-17-2023, 01:44 PM
#4
Warning: dragons may lurk ahead. Do you have funds? Microsoft ECM or Azure Insight—both protect workgroup environments safely. For Macs, use JAMF. Need a configuration file written in code? Chef it up. No funds? Prepare a startup .bat script on each PC that triggers a secure network install or a controlled set of scripts, all protected and version managed. Most alternatives, such as PDQ, become unstable without strong central authentication. The issue is centralized credentials must control everything, creating a major security vulnerability because they’re exposed across every system. Generally, centralized management systems remain risky and should be tightly restricted, even if they're well-designed. ECM and Azure Insight achieve this via certificate trusts and secured AD accounts that issue Kerberos tickets, eliminating the need to transmit credentials over networks. PDQ can support similar practices, but in practice it offers little advantage over a centralized script repository in terms of administrative effort.
B
ByxLive
02-17-2023, 01:44 PM #4

Warning: dragons may lurk ahead. Do you have funds? Microsoft ECM or Azure Insight—both protect workgroup environments safely. For Macs, use JAMF. Need a configuration file written in code? Chef it up. No funds? Prepare a startup .bat script on each PC that triggers a secure network install or a controlled set of scripts, all protected and version managed. Most alternatives, such as PDQ, become unstable without strong central authentication. The issue is centralized credentials must control everything, creating a major security vulnerability because they’re exposed across every system. Generally, centralized management systems remain risky and should be tightly restricted, even if they're well-designed. ECM and Azure Insight achieve this via certificate trusts and secured AD accounts that issue Kerberos tickets, eliminating the need to transmit credentials over networks. PDQ can support similar practices, but in practice it offers little advantage over a centralized script repository in terms of administrative effort.

N
NALLE_PUH
Member
170
02-19-2023, 11:32 AM
#5
Hm thanks, I better start learning some scripting haha. So every restart it will read a 'server' and if the folder has an update it will pull the new stuff down? Most of these software are exe's but a few msi's.
N
NALLE_PUH
02-19-2023, 11:32 AM #5

Hm thanks, I better start learning some scripting haha. So every restart it will read a 'server' and if the folder has an update it will pull the new stuff down? Most of these software are exe's but a few msi's.

A
AustinMC_
Member
71
03-09-2023, 11:31 PM
#6
Create a basic batch or cmd file that points to a fixed start point. Use it to execute each install script silently. Set it to run at system startup instead of user login, making it a local policy rule. Before launching, confirm the installation exists—either by adding a custom registry entry or checking files—to ensure everything is in place.
A
AustinMC_
03-09-2023, 11:31 PM #6

Create a basic batch or cmd file that points to a fixed start point. Use it to execute each install script silently. Set it to run at system startup instead of user login, making it a local policy rule. Before launching, confirm the installation exists—either by adding a custom registry entry or checking files—to ensure everything is in place.