đ What is BitOSDT?
BitOSDT (Bit Operating System Deployment Tool) is a PowerShell-based automation tool designed to streamline Windows deployment, configuration, and customization. It helps IT professionals and power users deploy clean Windows installations with pre-configured settings, software, and drivers.
1. PowerShell Modules Used
BitOSDT leverages several PowerShell modules and cmdlets depending on the tasks and options selected:
1.1 Core PowerShell Modules
| Module | Purpose | Source |
|---|---|---|
BitOSDT |
Enhanced module for imaging and deployment - interacts with OSDCloud and uses some of their functions | Custom (BitOSDT) |
OSD |
Operating System Deployment - Core module for Windows imaging and deployment | PowerShell Gallery (Microsoft) |
OSDSUS |
Software Update Services - Manages Windows Updates during deployment | PowerShell Gallery (David Segura) |
PSWindowsUpdate |
Windows Update automation and management | PowerShell Gallery (Michal Gajda) |
MDT |
Provides cmdlets for managing Microsoft Deployment Toolkit (MDT) deployment shares, task sequences, and operating system images | Microsoft Deployment Toolkit |
LiteTouch |
Exposes MDT LiteTouch scripts and functions for automating task sequences and deployment actions | Microsoft Deployment Toolkit |
DISM |
Deployment Image Servicing and Management for mounting, editing, and applying WIMs and ISOs | Built-in (Microsoft) |
ImageTools |
Community module to automate WIM capture, apply, and export operations | PowerShell Gallery |
WIMManager |
Simplifies image mounting, driver injection, and cleanup tasks | PowerShell Gallery |
Storage |
Disk, partition, and volume management | Built-in (Microsoft) |
NetAdapter |
Network adapter configuration and driver management | Built-in (Microsoft) |
PnPDevice / PnpUtil |
Manages device drivers, enumerates hardware, and handles driver installation | Built-in (Microsoft) |
ComputerManagementDsc |
Desired State Configuration (DSC) resources for machine setup (rename, join domain, local users) | PowerShell Gallery (Microsoft) |
NetworkingDsc |
DSC resources for network configuration (adapters, IPs, DNS, routes) | PowerShell Gallery (Microsoft) |
xActiveDirectory / ADDSDeployment |
Automates AD join or domain controller promotion during deployment | PowerShell Gallery |
NetTCPIP / NetSecurity |
Manages network settings, firewall, and routing configuration | Built-in (Microsoft) |
Appx / PackageManagement |
Manages AppX packages and installs software from repositories | Built-in (Microsoft) |
Defender / DefenderPerformance |
Enables configuration of Windows Defender settings pre- or post-deployment | Built-in (Microsoft) |
WindowsAutopilotIntune |
Manages Autopilot device registration and profiles | PowerShell Gallery (Microsoft) |
CMDeploymentTools |
Community module for scripting ConfigMgr deployments and content distribution | PowerShell Gallery |
WMI / CIMCmdlets |
Provides WMI access for SCCM site server automation (querying SMS_ classes) | Built-in (Microsoft) |
âī¸ Note on Module Usage
These modules are used dynamically based on your selected tasks and options. Not all modules are loaded simultaneously - BitOSDT intelligently loads only the modules required for your specific deployment scenario.
1.2 WinPE Optional Components
- WinPE-Setup: WinPE-specific modules for offline servicing
- WinPE-Storage: Storage and disk management components for WinPE
- WinPE-WMI: Windows Management Instrumentation support in WinPE
1.3 External Tools & Utilities
- DISM.exe: Deployment Image Servicing and Management tool (Microsoft)
- Oscdimg.exe: ISO creation utility (Windows ADK)
- Makecab.exe: Cabinet file compression (Built-in)
- BCDEdit.exe: Boot Configuration Data editor (Built-in)
- Diskpart.exe: Disk partitioning utility (Built-in)
2. Download Sources
BitOSDT fetches Windows images, drivers, and updates from the following sources:
2.1 Windows Installation Media
đ Official Microsoft Sources
- Microsoft Update Catalog:
https://www.catalog.update.microsoft.com - Windows Media Creation Tool:
https://www.microsoft.com/software-download - UUP Dump (Unified Update Platform):
https://uupdump.net- Community-maintained tool that downloads directly from Microsoft servers - Volume Licensing Service Center (VLSC): For enterprise customers with licensing agreements
2.2 Drivers & Updates
- Windows Update: Security updates, feature updates, and cumulative patches (
update.microsoft.com) - Driver Updates: Windows Update driver repository and manufacturer OEM sites
- Dell Command Update API: Dell-specific driver packages
- HP Support Assistant: HP-specific driver packages
- Lenovo System Update: Lenovo-specific driver packages
2.3 Software Packages (Optional)
- Chocolatey: Package manager for Windows (
chocolatey.org) - Ninite: Automated software installer (
ninite.com) - Winget (Windows Package Manager): Microsoft's official package manager (
github.com/microsoft/winget-cli)
3. Elevation & Permissions
â ī¸ Administrator Privileges Required
BitOSDT MUST run with elevated administrator privileges. The tool performs system-level operations that require full administrative access.
3.1 Why Administrator Rights Are Required
- Disk Operations: Formatting, partitioning, and modifying disk structures requires SYSTEM-level access
- Boot Configuration: Modifying BCD (Boot Configuration Data) requires elevated permissions
- System Registry: Writing to
HKLM(HKEY_LOCAL_MACHINE) and other protected registry hives - Driver Installation: Installing and loading kernel-mode drivers
- Windows Update: Accessing Windows Update services and applying system patches
- File System Operations: Accessing and modifying protected system files
3.2 UAC (User Account Control) Prompts
BitOSDT will trigger Windows UAC prompts when launched. You must click "Yes" to allow the application to make system changes.
4. File System Operations
4.1 Read Operations
BitOSDT reads from the following locations:
C:\Windows\System32- System binaries and utilitiesC:\Windows\WinSxS- Windows component storeC:\Windows\Boot- Boot files and BCDHKLM\SOFTWARE- Software configuration registryHKLM\SYSTEM- System configuration registry- User-specified source paths (ISOs, WIM files, driver folders)
4.2 Write Operations
BitOSDT writes to the following locations:
- Target Drive (Deployment): The drive selected for Windows installation (typically D:\ or E:\ during WinPE)
C:\BitOSDT- Primary staging directory for deployment files%TEMP%\BitOSDT- Temporary working directory%LOCALAPPDATA%\BitOSDT- User-specific application dataC:\WIN_Mount- Temporary WIM mount point (deleted after use)C:\OSDCloud- OSDCloud staging (if using OSDCloud features)C:\ProgramData\OSDCloud- OSDCloud system data (if using OSDCloud features)- Boot partition (EFI System Partition or System Reserved)
- Windows Registry (HKEY_USERS\Software\BitOSDT and other hives)
4.3 Delete Operations
BitOSDT may delete:
- Temporary files in
%TEMP%\BitOSDT C:\WIN_Mountdirectory after WinPE features are added and image is created- OSDCloud temporary files (if used)
- Old boot entries from BCD
- Cached Windows Update files after installation
- â ī¸ ENTIRE DISK CONTENTS if performing a clean installation (user must confirm)
â ī¸ Data Loss Warning
BitOSDT can PERMANENTLY DELETE all data on the target drive. Always ensure you have backups before proceeding with deployment operations.
5. Data Storage on Final OS
5.1 What Data Is Stored?
After deployment, BitOSDT leaves the following on the installed system:
| Location | Data Stored | Purpose |
|---|---|---|
C:\BitOSDT |
Deployment logs, driver cache, configuration files | Troubleshooting and audit trail |
%TEMP%\BitOSDT |
Temporary working files (cleaned after completion) | Installation staging and processing |
%LOCALAPPDATA%\BitOSDT |
User-specific configuration and cache | User preferences and local settings |
HKEY_USERS\Software\BitOSDT |
Deployment timestamp, BitOSDT version, configuration settings | System identification and audit |
C:\WIN_Mount |
Temporary mount point for WIM images (deleted after use) | Used to add WinPE features - removed after image creation |
C:\OSDCloud |
OSDCloud deployment files (if using OSDCloud features) | OSDCloud-specific deployment data (occasional) |
C:\ProgramData\OSDCloud |
OSDCloud shared data (if using OSDCloud features) | OSDCloud system-wide settings (occasional) |
%APPDATA%\OSDCloud |
OSDCloud user data (if using OSDCloud features) | OSDCloud user preferences (occasional) |
âšī¸ About OSDCloud Folders
OSDCloud folders only appear if you're using OSDCloud integration features. If you're using BitOSDT standalone without OSDCloud, these directories will not be created.
5.2 NO Personal Data Stored
â Privacy Assurance
BitOSDT does NOT store any personal information on the deployed OS:
- â No license keys embedded in the OS
- â No user account information
- â No MAC addresses or hardware IDs
- â No telemetry or tracking beyond standard Windows telemetry
- â No "phone home" functionality
5.3 Logs & Audit Trail
Deployment logs are stored for troubleshooting:
C:\BitOSDT\Logs\BitOSDT-Deployment.log- Main deployment logC:\BitOSDT\Logs\DISM.log- Windows imaging logsC:\BitOSDT\Logs\DriverInstall.log- Driver installation logs
These logs contain: Timestamps, operations performed, success/failure status, and error messages. They do NOT contain personal information or license data.
6. Network Activity
6.1 Outbound Connections
BitOSDT makes network connections to:
- bitosdt.com: License validation and activation (HTTPS)
- microsoft.com / update.microsoft.com: Windows Update downloads (HTTPS)
- uupdump.net: Windows ISO downloads (HTTPS, optional)
- chocolatey.org / winget.microsoft.com: Software package downloads (HTTPS, optional)
- OEM websites: Driver downloads from Dell, HP, Lenovo (HTTPS, optional)
6.2 Firewall & Proxy Support
BitOSDT respects system proxy settings and can work behind corporate firewalls. Ensure the following domains are whitelisted:
*.microsoft.com*.windowsupdate.combitosdt.com
7. Security Considerations
â ī¸ Important Security Notes
- Third-Party Dependencies: BitOSDT uses PowerShell modules from third parties. We cannot control vulnerabilities in these dependencies.
- Antivirus Detection: Some antivirus software may flag BitOSDT as suspicious due to its system-level operations. This is a false positive.
- Secure Boot: BitOSDT supports Secure Boot-enabled systems. Drivers must be signed by Microsoft.
- Code Signing: BitOSDT executables are digitally signed. Verify the signature before running.
7.1 Best Practices
- â
Always download BitOSDT from the official website (
bitosdt.com) - â Verify digital signatures before execution
- â Run in isolated test environments before production use
- â Keep BitOSDT updated to the latest version
- â Review deployment logs after each operation
- â Use offline/local media for sensitive environments
8. System Requirements
8.1 Host System (Running BitOSDT)
- OS: Windows 10 (1809+) or Windows 11, or Windows PE (WinPE)
- PowerShell: Version 5.1 or higher
- RAM: 4 GB minimum (8 GB recommended)
- Disk Space: 20 GB free space for temporary files and caching
- Network: Internet connection for downloads (offline mode available)
- .NET Framework: 4.7.2 or higher
8.2 Target System (Deployment Destination)
- CPU: 64-bit processor (1 GHz or faster)
- RAM: 4 GB minimum (8 GB recommended)
- Disk: 64 GB or larger
- Firmware: UEFI or Legacy BIOS
- Secure Boot: Supported (optional)
9. Support & Troubleshooting
If you encounter issues with BitOSDT:
đ§ Get Help
- Email Support: support@bitosdt.com
- Documentation: documentation.html
- Download: beta-download.html
- HWID Reset: reset-hwid.html
9.1 Common Issues
- "Access Denied" errors: Ensure you're running as Administrator
- Network timeouts: Check firewall and proxy settings
- Driver issues: Use offline driver packs or OEM-specific tools
- Boot failures: Verify Secure Boot and UEFI/BIOS settings
10. Open Source Components
BitOSDT uses the following open-source components:
- PSWindowsUpdate: MIT License - GitHub
- OSD Module: MIT License - GitHub
- PowerShell Core: MIT License - GitHub
We extend our gratitude to the open-source community and all contributors to these projects.