Chat now with support
Chat with Support

ChangeBASE 6.2.2 - Prerequisites and Getting Started Guide

Configuration of Guest Machine to be used for Virtualization only

Proceed as follows for each guest Virtual Machine that is to be used solely for ChangeBASE Virtualization, in order to enable uninterrupted sequencing.

  1. Ensure that the Virtual Machine meets the requirements specified in Virtual Machines, in particular that both .NET Framework 3.5 SP1 and .NET Framework 4 or later (Full Version) are installed (for Windows 7 and 8, .NET Framework 3.5 SP1 must have been installed using turn Windows features on or off in the Control Panel).

  2. Assign administration rights to the user account inside the Virtual Machine.
  3. Install any core packages (for example, WinZip, Microsoft Office).
  4. Where applications require middleware, ensure that this has been installed (for example, Microsoft.NET, Java runtime, Oracle client).
  1. Install VMware Tools for VMware-based Virtual Machines, or Hyper-V Integration Services for Microsoft Hyper-V-based Virtual Machines.
  2. Go to Hypervisor Setup in ChangeBASE, to set up the Hypervisor.

  1. Install the required Virtual Machine technology, starting from Virtualization Technology Setup.

Note: The taking of Snapshots at this stage is optional, as you will be taking the Snapshot to be specified in ChangeBASE at the end of this procedure, following the removal of security from the Virtual Machine in the following steps.

  1. Disable all third party antivirus software and updates on the Virtual Machine. Ensure that Microsoft Security Essentials has been removed, if present.
  2. If running Windows 8 or above for Virtualization, ensure that Windows Defender is turned off.
  3. Ensure that the default Web browser is launched at least once on the machine, and that any initial pop-up queries are answered so that they do not reappear.
  4. Ensure that any synchronization elements are turned off (for example, Offline folders).
  5. Stop any deployment services such as SCCM.
  6. CBVMTools deactivates for you most of the remaining features that are likely to interrupt the conversion process. If you wish to proceed, copy the CBVMTools Setup.msi installer (which is located under .\Resources\CB VM Tools\ on the ChangeBASE server, for example in C:\Program Files (x86)\Dell\ChangeBASE\Resources\CB VM Tools\), to the guest Virtual Machine.
  7. Run CBVMTools Setup.msi to start the installation process. The installer lists each feature in turn that it will deactivate, and allows you to accept or reject each deactivation, before actually carrying out the installation. Click Entire feature will be installed on local hard drive next to VM Settings, for CBVMTools to deactivate all the features listed, indicated by a against each feature. To stop it deactivating a particular feature, select Entire feature will be unavailable next to it, in order to display a .

Important: If you feel unable to proceed with any of the deactivations owing to your corporate policy, then you can turn things off manually by starting from the step below entitled Ensure that the Windows firewall is disabled.

  1. CBVMTools prompts you to reboot once installation is complete, and you need to do this.
  2. You will now find CBVMTools running in the system tray. Double-click it, or right-click and select View Log, to open the log. You can also exit CBVMTools if required.
  3. Ensure that the CBVMTools log window is closed (if you opened it).
  4. Remove CBVMTools Setup.msi from the Virtual Machine.
  5. If you have run CBVMTools with all the options selected by a , then go straight to Ensure that you can ping the host from the guest Virtual Machine. Otherwise, proceed from the next step and carry out any steps that you opted not to allow CBVMTools to carry out for you, as and when your corporate policy allows.
  6. Ensure that the Windows firewall is disabled.
  7. If running Windows 7, ensure that Windows Defender is turned off.
  8. Disable and switch off any Action Center messages.
  9. Ensure that Windows updates are switched off.
  10. Ensure that Windows Search is disabled.
  11. Disable all third party firewall software and updates.
  12. If Windows 7 or Windows 8 is running on the Virtual Machine to be used, ensure that the User Account Control (UAC) Settings are switched off. For Windows 7, proceed as follows:
    1. Click on the Windows Start button, and type ‘UAC’ into the ‘Search programs and files’ box, and press [Return].
    1. Drag the slider control down to Never notify and click OK.
  13. Disable the Program Compatibility Assistant (PCA), as follows:
    1. Click the Windows Start button, and select Control Panel.
    2. Double-click Administrative Tools.
    3. Double-click Services, to display the available Services.
    4. Scroll down and select Program Compatibility Assistant Service.
    5. Right-click and select Stop.
    1. Right-click and select Properties.
    2. Change the Startup type to Disabled.
  14. For a Windows XP Virtual Machine running Hyper-V, make the following changes:
    1. Navigate to Start > Control Panel > Administrative Tools > Local Security Policy.
    2. Navigate to Security Settings\Local Policies\Security Options.
    3. Open the policy Network Access : Let Everyone permissions apply to anonymous users. Set it to Enabled.
    4. Open the policy DCOM: Machine Access Restrictions… Then clickEdit Security. Add ANONYMOUS LOGON; Everyone; INTERACTIVE; NETWORK; SYSTEM. Set Allow for both Local Access and Remote Access for all the above groups.
    5. Open the policy DCOM: Machine Access Restrictions… Then clickEdit Security. Add ANONYMOUS LOGON; Everyone; INTERACTIVE; NETWORK; SYSTEM. Set Allow for both Local Access and Remote Access for all the above groups.
  15. For a Windows XP Virtual Machine, do the following, regardless of the Virtualization Technology:
    1.  Open the policy User Account Control: Run all administrators in Admin Approval Mode. Set it to Disabled.
  1. For a Windows 8 Virtual Machine running Hyper-V, make the following changes:
    1. Type secpol.msc on the start screen and press Enter.
    2. Navigate to Security Settings\Local Policies\Security Options.
    3.  Open the policy User Account Control: Run all administrators in Admin Approval Mode. Set it to Disabled.
  1. Ensure that you can ping the host from the guest Virtual Machine.
  1. Ensure that you can ping the guest Virtual Machine from the machine running the ChangeBASE client.

  2. Log on with a user account which has a password set (blank passwords are not supported). It is recommended that a local account is used.
  3. If you are using VMware Workstation (with shared VMs) and the networking is set to either NAT or Host-only, then, in the Virtual Network Editor, ensure that the Default DHCP Lease Time is set to 8 hours and 30 minutes, and that the Maximum Lease Time is set to 9 hours.
  1. Take a Snapshot of the Virtual Machine while it is logged on, indicating the purpose of this Snapshot, for example , Microsoft App-V 5.0. Make a note of the Snapshot name, and ensure that no other Snapshot exists with the same name.
  2. Go to Virtual Machine Setup to set up the guest Virtual Machine in ChangeBASE, and associate it with the above Snapshot Name and the Conversion Technology (for example, Microsoft App-V 5.0).
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating