Configuring Role Methods in the Configuration Database

Role methods are used to target a group of computers based on a variety of criteria.

As you will see there are four types of methods: Computers, Role, Locations, and Make and Model. The Role method is unique in that it can be assigned to other methods. This will all make sense as we go thru the next two parts of the series configuring and using roles to target our deployments. In this demonstration we’ll create two roles. The first role method will be called Refresh User and is used to refresh a target computer; the second will be called Managed Computer and is used to deploy an application.

Advanced Deployment Scenarios using the Microsoft Deployment Toolkit 2010: (Part 1 of 7)

Advanced Deployment Scenarios using the Microsoft Deployment Toolkit 2010: (Part 2 of 7)

Advanced Deployment Scenarios using the Microsoft Deployment Toolkit 2010: (Part 3 of 7)

Advanced Deployment Scenarios using the Microsoft Deployment Toolkit 2010: (Part 4 of 7)

Advanced Deployment Scenarios using the Microsoft Deployment Toolkit 2010: (Part 5 of 7)

Advanced Deployment Scenarios using the Microsoft Deployment Toolkit 2010: (Part 6 of 7)

Advanced Deployment Scenarios using the Microsoft Deployment Toolkit 2010: (Part 7 of 7)