This repository contains a Standard Operating Environment (SOE) automation suite for Windows 11 Pro. It is designed to reduce the deployment time of a fully configured engineering workstation from hours to under 45 minutes through unattended installation and automated post-deployment scripts.
This project demonstrates proficiency in Windows automation, configuration management, and systems security—key skills for Desktop Support and Systems Administration roles.
- Unattended OS Installation: Custom
Autounattend.xmlconfiguration for zero-touch Windows 11 Pro deployment. - Automated Package Management: Silent installation of core developer and productivity tools using Microsoft Winget.
- Security & Compliance: Forced XTS-AES 256 BitLocker encryption with automated recovery key documentation.
- Virtualization Infrastructure: Automated WSL2 and Ubuntu distribution deployment.
- System Optimization: Performance tuning via
.wslconfigand automated environment variable configuration.
- Windows 11 Pro ISO
- 8GB+ USB Flash Drive
- Target hardware with TPM 2.0 and UEFI support
- Media: USB 3.0 flash drive (8GB minimum).
- Operating System: Windows 11 Pro ISO.
- Target Device: UEFI-compatible hardware with TPM 2.0 enabled.
- Tooling: Rufus (recommended for creating bootable media).
- Insert the USB drive and launch Rufus.
- Select the Windows 11 Pro ISO.
- Set Partition Scheme to GPT and Target System to UEFI (non-CSM).
- Click Start to format the drive and copy the OS files.
Copy the files from this repository to the root of your newly created USB drive according to the following structure:
- Place
Autounattend.xmlin the root directory of the USB drive (e.g.,D:\Autounattend.xml). - Copy the entire
Scripts/folder and.wslconfigto the root directory of the USB drive.
- Insert the USB drive into the target computer.
- Boot from the USB drive (refer to your hardware manufacturer's key for the "Boot Menu," e.g., F12, F11, or Esc).
- The installation will proceed automatically. It will wipe the primary disk (Disk 0) and install the OS.
- Once the installation finishes, the system will auto-logon to the
DevAdminaccount.
- Open PowerShell as Administrator.
- Navigate to the
Scriptsfolder on your USB drive. - Execute the master automation script:
Set-ExecutionPolicy Bypass -Scope Process .\Setup-SOE.ps1
- The script will install all software, configure BitLocker, and optimize WSL2.
- Reboot the machine when the script completes to finalize the installation of system components and WSL2.
After the final reboot, you can verify the integrity of the installation by running the system audit tool:
- Open PowerShell.
- Import the utility:
Import-Module C:\Scripts\Env-Utils.ps1 - Run the audit:
Get-SystemAudit
- Administrative Account: The default account created is
DevAdmin. The password is set inAutounattend.xml(Default:DevAdminPassword123!). It is highly recommended to change this after the first deployment. - BitLocker: The recovery key is stored at
C:\BitLocker-Recovery-Key.txt. This key must be moved to an offline, secure medium immediately.
Technical Context
- Primary OS: Windows 11 Pro
- Scripting: PowerShell 5.1 / 7.x
- Encryption: XTS-AES 256
- Virtualization: WSL2 (Ubuntu)