MessageYup, done it with Proliant 6500's with Smart Array 3200 controllers using Drive Image. The only issue was drive remapping. All I had to do was bring up the Windows disk manager and reassign drive letters once the systems booted. Reboot and all was fine. Jan Broucinek, System Manager Arthur Rutenberg Homes, Inc. (727) 536-5900 voice (727) 536-7168 x245 direct (727) 538-9089 fax www.arhomes.com ----- Original Message ----- From: Christine Easton To: 'thin@xxxxxxxxxxxxx' Sent: Thursday, August 26, 2004 2:52 PM Subject: [THIN] Re: Ghost Images One more question, has anyone successfully imaged servers configured with Raids? -Christine Christine Easton Citrix/Windows 2000 Engineer BMC Healthnet Plan One Design Center Place Boston, MA 02210 Work: 617-748-6034 Cell: 617-290-4407 -----Original Message----- From: Michael Day [mailto:MDay@xxxxxxxxxxx] Sent: Thursday, August 26, 2004 9:07 AM To: thin@xxxxxxxxxxxxx Subject: [THIN] Re: Ghost Images We use ghost to create a generic image for our Terminal Servers. We have a group of generic images( for each hardware type) and then use IM to install any new apps or hotfixes since the image creation. Michael Day Senior Technical Analyst Kinecor mday@xxxxxxxxxxx -----Original Message----- From: Christine Easton [mailto:christine.easton@xxxxxxxxx] Sent: 25 August 2004 17:32 To: 'thin@xxxxxxxxxxxxx' Subject: [THIN] Ghost Images Hello, Just a poll. How many folks use ghost to image their Citrix boxes? If you have farms, do you use one image for all your boxes or image individual servers? Thanks! -Christine Christine Easton Citrix/Windows 2000 Engineer BMC Healthnet Plan One Design Center Place Boston, MA 02210 Work: 617-748-6034 Cell: 617-290-4407 www.broomfield.co.uk Broomfield & Alexander Professional Advisors Creating value and prosperity Offices at: Cardiff Tel: 029 20549939 Newport Tel: 01633 265828 Newbridge Tel: 01495 245736 Head Office: Pendragon House, Caxton Place, Pentwyn, Cardiff CF23 8XE Need free business advice, then visit our website at www.broomfield.co.uk Confidentiality: This e-mail and its attachments are intended for the above named recipient(s) only and may be confidential and/or privileged. If they have come to you in error you must take no action based on them, nor must you copy or disclose them or any part of their contents to any person or organisation; please reply to this e-mail and highlight the error immediately and delete this e-mail and its attachments from your computer system. This footnote also confirms that before leaving our system this e-mail message has been swept for the presence of computer viruses.