Christophe Van Mollekot Product Marketing Manager Microsoft Belux.
-
date post
20-Dec-2015 -
Category
Documents
-
view
215 -
download
2
Transcript of Christophe Van Mollekot Product Marketing Manager Microsoft Belux.
Enabling Dynamic IT: From Optimized Desktop to aHigh-Performance WorkplaceA conversation about the Infrastructure Optimization model
Enabling Dynamic IT: From Optimized Desktop to aHigh-Performance WorkplaceA conversation about the Infrastructure Optimization model
Christophe Van MollekotProduct Marketing ManagerMicrosoft Belux
What % of the features and functions of your IT infrastructure do you utilize?
What % of the features and functions of your IT infrastructure do you utilize?
Purchasing does not mean implementing
RFP or
RFQfeature set
Time
RFP or
RFQfeature set
RFP or
RFQfeature set
RFP or
RFQfeature set
Requestedfeature set
Implementedfeature set
Trainedfeature set
More peopleincrease
complexity
More tools also
increase complexity
Co
mp
lexi
ty$$
$
Deployment speed is usually below technology acquisition speed
Technology Installed
Time
Technology Installed
Technology Installed
Deployed AdoptedAdopted
DeployedDeployed
Best Practices generated and
commonly followed
What if somebody already has catalogued the market’s best practices…into a maturity model
And benchmarked over 15,000 IT environments…
What was the key to success?
What if somebody already has catalogued the market’s best practices…into a maturity model
And benchmarked over 15,000 IT environments…
What was the key to success?
Optimization Model’sThe Optimization models are a structured, systematic process
of assessing maturity across IT capabilities, and then prioritizing projects to progress toward a Dynamic state
Basic Standardized Rationalized Dynamic
Uncoordinated, manual
infrastructure
Managed IT infrastructure
with limited automation
Managed and consolidated IT infrastructure
with maximum automation
Fully automated management,
dynamic resource usage, business-
linked SLAs
People Process Technology
World Wide IO Analysis
15156 IT Environments Analyzed (>500 Employees)
Core Infrastructure maturity Basic Standardized Rationalized Dynamic
• Policies for security and compliance are inconsistent or nonexistent• Health of services is unknown due to the lack of tools and resources
• There is no vehicle for sharing accumulated knowledge across IT• Environments are extremely hard to control
• Organization is very reactive to security threats• Software deployments, security updates, and services are provided through high
touch
Unstructured and lacking central control, infrastructure based on manual processes, ad hoc security, and disparate resources
BASIC
Infrastructure Capabilites at the Basic Stage
Identity & Access Management•No Centralized
Directory for authentication
Ad Hoc Monitoring
Multiple Directories
Ad Hoc Backup
Ad HocTerminal Services
Ad Hoc VirtualServices
Ad Hoc Network Services
FirewallAd Hoc Antiviru
s
Security•No Anti-Virus
•No Centralized firewall
•No DNS and DHCP
Desktop Mgmt•No Patch Mgmt
•No Standard Images
•No Image strategy•Multiple OS, more
than 2 OS
Server Mgmt•Monitoring bellow OS for 80% critical
server
Mobile Device Mgmt
•No Mobile device provisioning
VirtualizationData Protection and Recovery•No Backup /
Restore on 80% of critical server
ITIL / COBIT•No formal Change,
Incident or Problem process
Security Process•Limited Security
Accountability•No Formalized
Incident Response•Limited Access
Control
Ad Hoc Image
Strategy
Ad Hoc Mobile Device Mgmt
Ad Hoc Patch Mgmt
No FormalProcesses
Limited SecurityPolicies
Identity & Access Management•No Centralized
Directory for authentication
Security•No Anti-Virus
•No Centralized firewall
•No DNS and DHCP
Desktop Mgmt•No Patch Mgmt
•No Standard Images
•No Image strategy•Multiple OS, more
than 2 OS
Server Mgmt•Monitoring bellow OS for 80% critical
server
Virtualization
Mobile Device Mgmt
•No Mobile device provisioning
Data Protection and Recovery•No Backup /
Restore on 80% of critical server
ITIL / COBIT•No formal Change,
Incident or Problem process
Security Process•Limited Security
Accountability•No Formalized
Incident Response•Limited Access
Control1 FTE
Basic$1320 / PC
~60 PCs
http://download.microsoft.com/download/a/4/4/a4474b0c-57d8-41a2-afe6-32037fa93ea6/IDC_windesktop_IO_whitepaper.pdf
Core Infrastructure maturity levelBasic Standardized Rationalized Dynamic
Standards and policies to manage desktops, mobile devices, and servers introduce controls and operational consistency
• Microsoft® Active Directory® is used to manage resources, security policies, and network access
• The value of basic standards and policies is recognized but not yet implemented broadly
• Deployments, security updates, and desktop services are provided at medium touch
• Inventory of hardware and software assets is maintained, and license use is managed
• Security is improved with a locked-down perimeter, though internal security may still be at risk
BASIC
Capabilites at the Standardized Stage
STANDARDIZED
Security•Standard Antivirus •Centralized Firewall• Internal DNS, DHCP
Identity & Access Management
•Unified Directory Service for
authentication using Active Directory
Desktop Mgmt•Automated Patch Mgmt
•Standard Images• Image strategy (OS, AV,
Apps)•Standardized on2 OS
•No application compatibility testing
Server Mgmt•Monitoring OS for 80%
critical server•Defined set of standard
images
Mobile Device Mgmt•Mobile device
provisioning•Security Policy•Remote wipe
•Policy enforcement
Virtualization•Virtualization for test
environments
Data Protection and Recovery
•Backup / Restore on 80% of critical server
ITIL / COBIT•Defined Support
Services for Problem, Change and
Configuration Management
Security Process•Accountability to Data
Security•Limited Risk Assessment
•Password Protection of Data
•Limited Tools and Policy Compliance Automation
FormalFirewall
Standard
Antivirus
MonitoringCritical Servers
CentralizedDirectory
Backup / RestoreCritical Servers
DNS, DHCP, plusNetworking
Services
Desktop PatchManagement
Ad HocTerminal Services
VirtualizationDev and Test
Standard Image
Strategy
Simple Mobile Device Mgmt
FormalProcesses
DeployedSecurity Policies
Security•Standard Antivirus •Centralized Firewall• Internal DNS, DHCP
Identity & Access Management
•Unified Directory Service for
authentication using Active Directory
Desktop Mgmt•Automated Patch Mgmt
•Standard Images• Image strategy (OS, AV,
Apps)•Standardized on2 OS
•No application compatibility testing
Server Mgmt•Monitoring OS for 80%
critical server•Defined set of standard
images
Mobile Device Mgmt•Mobile device
provisioning•Security Policy•Remote wipe
•Policy enforcement
Virtualization•Virtualization for test
environments
Data Protection and Recovery
•Backup / Restore on 80% of critical server
ITIL / COBIT•Defined Support
Services for Problem, Change and
Configuration Management
Security Process•Accountability to Data
Security•Limited Risk Assessment
•Password Protection of Data
•Limited Tools and Policy Compliance Automation
1 FTE
Standardized$580 / PC
56% of the cost in Basic
http://download.microsoft.com/download/a/4/4/a4474b0c-57d8-41a2-afe6-32037fa93ea6/IDC_windesktop_IO_whitepaper.pdf
~200 PCs 3.3 times more than in Basic
Core Infrastructure maturity levelBasic Standardized Rationalized Dynamic
• Security is proactive and response to threats is rapid and controlled• The use of zero-touch deployment helps minimize cost and time• Minimal number of desktop images and low-touch management
• Hardware and software inventory is managed, with optimal license use• Security measures involve strict policies and control
Costs involved in managing desktops and servers are at their lowest, with integrated IT management policies, tools, and
processes
Capabilites at the Rationalized Stage
STANDARDIZED
RATIONALIZED
Service Desk
SLA BasedAdministration& Monitoring
Centralized Identity
Management
Configuration& AssetMgmt
Information Protection
Capacity& Server Workload
Mgmt
Data Protection
Mgmt
Terminal Services
Virtual Machine
Mgmt
Network Services
Management
Cache VPNApplication
Gateway
FirewallSecure Server
Isolation
AntivirusCentralize
dAnti Spam
Automated Image
Strategy
Mobile Device
Provisioning & Mgmt
Formal & FollowedProcesses with SLA’s
Defined & FollowedSecurity & Compliance Policy
Security•Secure Remote Access
•Server to server isolation
•Consolidation of branch security
•Policy managed firewalls on server and
client•Secure Wireless
•Client Side Certificates
Identity & Access Management
•Policy enforced Standard
Configuration•Group policy management• Information
Protection Infrastructure (RMS)
Desktop Mgmt•N-2 OS and patchable office suite
•Automated asset mgmt & tracking •Automated OS image deployment
•Layered image strategy•Configuration monitoring•Desktop Error Monitoring
•Application compatibility testing•Automated Application distribution
for 80% of their desktop (physical or virtual)
Server Mgmt•SLA Monitoring of mission
critical servers • IT Service Level Reporting
•Automated OS Deployment •Automated Patch
management •Centralized management of
Branches •Monitor and report
configuration compliance
Mobile Device Mgmt
•Certificate Provisioning &
Authorization for Mobile Devices
•Web Apps (WAP)•802.1X certificates for Mobile Devices
Virtualization• Virtualization in
branch offices •server consolidation
•Terminal Services
Data Protection and Recovery
•Backup/restore on all servers + SLA
•Clustering or similar for defined availability
•Server Backup & Restore via Virtualization
• If Branches: centralized backup of servers
ITIL / COBIT•Defined Problem, Change and Release Management
•Fully documented Operations•Defined Service Levels
•Enhanced Configuration Management•Formalized Process for system administration, service
monitoring •Network administration conduct operations
management reviews across all phases of an IT service lifecycle
Security Process•Defined Security Compliance and Automated Audit
Tools•Documented
Threats and Vulnerabilities
•Security Standards for SW Acquisitions
Security•Secure Remote Access
•Server to server isolation
•Consolidation of branch security
•Policy managed firewalls on server and
client•Secure Wireless
•Client Side Certificates
Identity & Access Management
•Policy enforced Standard
Configuration•Group policy management• Information
Protection Infrastructure (RMS)
Desktop Mgmt•N-2 OS and patchable office suite
•Automated asset mgmt & tracking •Automated OS image deployment
•Layered image strategy•Configuration monitoring•Desktop Error Monitoring
•Application compatibility testing•Automated Application distribution
for 80% of their desktop (physical or virtual)
Server Mgmt•SLA Monitoring of mission
critical servers • IT Service Level Reporting
•Automated OS Deployment •Automated Patch
management •Centralized management of
Branches •Monitor and report
configuration compliance
Mobile Device Mgmt
•Certificate Provisioning &
Authorization for Mobile Devices
•Web Apps (WAP)•802.1X certificates for Mobile Devices
Virtualization• Virtualization in
branch offices •server consolidation
•Terminal Services
Data Protection and Recovery
•Backup/restore on all servers + SLA
•Clustering or similar for defined availability
•Server Backup & Restore via Virtualization
• If Branches: centralized backup of servers
ITIL / COBIT•Defined Problem, Change and Release Management
•Fully documented Operations•Defined Service Levels
•Enhanced Configuration Management•Formalized Process for system administration, service
monitoring •Network administration conduct operations
management reviews across all phases of an IT service lifecycle
Security Process•Defined Security Compliance and Automated Audit
Tools•Documented
Threats and Vulnerabilities
•Security Standards for SW Acquisitions
1 FTE
Rationalized$230 / PC
17% of the cost in Basic
http://download.microsoft.com/download/a/4/4/a4474b0c-57d8-41a2-afe6-32037fa93ea6/IDC_windesktop_IO_whitepaper.pdf
~400 PCs 6.6 times more than in Basic
Core Infrastructure maturityBasic Standardized Rationalized Dynamic
• Costs are fully controlled• Collaboration is pervasive; integration exists between users and data, desktops
and servers • Mobile users have nearly on-site levels of service and capabilities
• Processes are fully automated, often incorporated into the technology itself• Additional investments in technology yield specific, rapid, and measurable
benefits• Self-provisioning software and quarantine-like systems allow automated
processes
Highly responsive and efficient IT infrastructure; automated processes and flexible resources drive business agility and
competitive advantage
RATIONALIZEDDYNAMIC
Capabilites at the Dynamic Stage
IntegratedService
Desk
Model EnabledAdministration& Monitoring
IntegratedIdentity
Management
QuarantineConfiguration
Mgmt
Information Protection
AutomatedCapacity
Mgmt
SLA Based Data Mgmt
Terminal Services
Virtual Workload
Mgmt
Network Services
Management
Cache VPNApplication
Gateway
Integrated Threat
Management
AntivirusCentralize
dAnti Spam
Automated Image
Strategy
Mobile Device
Provisioning & Mgmt
Business Defined Proactive & Agile SLA’s
Automated Audit,Security & Compliance Policy
Security• Integrated threat
mgmt and mitigation across client, server
edge •Quarantine
•SIP for secure communication
through Presence
Identity & Access Management
•Centrally Managed Identity Services
•Automated Account Provisioning
•Secure Network Access for Customers
and Partners•Federated Services
Desktop Mgmt•Model Enabled Service
level monitoring of desktops, applications &
servers•Event & performance management on client systems to maintain
service levels.•Proactively monitor OS as
well as the productivity user experience
Server Mgmt•Model Enabled Service
level monitoring of desktops, applications
& servers•Model Enabled Desired
Configuration Management
•Capacity Analysis Solution
Mobile Device Mgmt•Standard Mobile OS
•Application Push to Mobile Devices•Access to LOB on Mobile Devices
•Automated Patch Mgmt for Devices
•Bootstrapping for Mobile Devices •Bootstrapping for Non-PC Devices •Automated Patch Mgmt for Non-PC
Devices •Asset Device Mgmt
Virtualization• Desktop Virtualization
•VHD based recovery•Virtual Workload Mgmt/Provisioning•Hosted instances, through hosted
virtualization servers•Centralized Enterprise Virtual Machine
Mgmt • Integrating virtualization and physical
management software
Data Protection and Recovery
•Backup restore on all servers & desktop data
+ SLA
ITIL / COBIT•Business / IT Defined SLA’s
•Proactive and Agile •Optimizing Service Delivery• Improving Service Levels,
Business Continuity and Availability
Security Process•Automated Risk
Assessment•Managed Network and Data Security
Process•Automated Security
Policy Verification
Core Innovation Areas
Manage Complexity,Achieve Agility
Protect Information, Control Access
Advance the Business
with IT Solutions
Amplify the Impact of Your People
Secure, well managed & Interoperable Platform
Process-Led,
Model-Driven
User-Focused
Service-Enabled
Unified &Virtualized
Dynamic IT
What is Dynamic IT?
Unified & Virtualized
User-Focused
Service-Enabled
Process-Led,Model-Driven
Making abstractions : Decoupling tight coupling• Increases flexibility/Agility and streamlines
change• Strengthens business continuity• Scales rapidly to meet business demands
Captures process, structure, and expertise in models• Fast Time to market.• Triggers self-correction when tolerances are breached• Provides visibility between people and systems
Provides link between internal and external services• Balance Access vs. Security• Integrates emerging services without internal
dev• Strengthens connections with customers,
partnersConnects natural workflow with applications• Weaves real workflow into application design• Enables rich user experiences• Integrates familiar interface with powerful apps
Dynamic IT is the Microsoft vision for a new generation of integrated products and technologies that help customers gain strategic advantage through their IT
Dynamic IT and Infrastructure Optimization
Dynamic IT is the destination,
Unified & Virtualized
User-Focused
Service-Enabled
Process-Led,Model-Driven
Basic Standardized Rationalized Dynamic
Uncoordinated, manual
infrastructure
Managed IT infrastructure
with limited automation
Managed and consolidated IT infrastructure
with maximum automation
Fully automated management,
dynamic resource usage, business-
linked SLAs
Infrastructure Optimization guides
the journey
19
Standardized Rationalized DynamicBasic
Infrastructure Optimization Assessment
Build your optimization road map. Where does my organization rank on the optimization model?
• How do we compare to the competition?
• What road map should we follow?
• What is the quantifiable value of improving?
• ITIL Maturity
http://www.microsoft.com/optimization/tools/overview.mspx
Where to go to ?• Pain points.• ROI based.• Map to your Business.
Identity and Access ManagementDesktop, Device, and Server ManagementSecurity and NetworkingData Protection and RecoveryIT and Security Process
1 2 3 40
Identity and Access ManagementDesktop, Device, and Server Management
Security and Networking
Data Protection and Recovery
IT and Security Process
H
ow
Co
mp
an
y X
YZ
Sco
red
Co
re I
O C
om
pa
riso
n
XYZ Company
Peer Average
IO Assessment Tool - Results
Agenda
Infrastructure OptimizationHow to Optimize your InfrastructureRoadmap
21
Hardware
OS
Data, User Settings
Applications
Dependencies Create ComplexitySeparation Creates Flexibility
Document redirectionOffline files
PresentationVirtualization
ProfileVirtualization
ServerVirtualization
ApplicationVirtualization
DesktopVirtualization
Microsoft Virtualization From Datacenter to the Desktop
Business ContinuityReduces maintenance and disaster
impact by providing more options, the ability to shift workloads between servers
and data protection regardless of OS
Business Continuity/Disaster RecoveryHigh Availability
Server ConsolidationConvert physical machines to virtual machines so you can consolidate the
number of physical servers and reduce power consumption
Server Virtualization and Provisioning
Virtualization Scenarios
Centralized, policy-based management
VirtualizationServer consolidation
Oracle
File & Print
.NET IIS
SQL
Hyper-V
.NET
Virtual Machine Manager
Hyper-V
Virtual Machine Manager
Hyper-VVMM
.NET
ChallengeReal Estate Costs
Management overheadLower server Utilization
Power and Cooling CostsImpact on Environment
SolutionConsolidated and Green
Datacenter with Management
ChallengeInteroperability
Virtualization Cost
Management Complexity
SolutionConsolidated and Green
Datacenter with Management
Coexistence with VMware
VM Ware
VirtualizationInteroperability & Management
Oracle
File & Print
.NET IIS
SQL
Hyper-V
.NET
Virtual Machine Manager
Hyper-V
Virtual Machine Manager
Hyper-VVMM
.NET
Server C
ChallengeImpact of application/server outage
Meeting Business SLAsMission Critical Systems
Solution High Availability
Cost effective and robust Business continuity
Instant-On Failover Plan
Server B
X Hyper-V
Virtual Machine Manager
VirtualizationBusiness continuity
Server A
ChallengeScale to peak demandUnderutilized systems
SolutionAdaptive and
Resilient Datacenter
Web Farm
Hyper-V Virtual Machine Manager
Microsoft VirtualizationDynamic infrastrucutre
Virtualization Benefits
Basic DynamicStandardized Rationalized
http://www.microsoft.com/io
IncreaseAvailabilityReduce Total
Cost ofOwnership
Pow
erAs
set u
tiliz
atio
n
Appl
icat
ion
test
ing
Back
upR
ecov
ery
Busi
ness
cont
inui
ty
EnableAgility
Dyn
amic
prov
isio
ning
Mig
ratio
nSe
lf-m
anag
ing
dyna
mic
sys
tem
s
Virtualization still not Mainstream
1. Price
2. Management
3. Maturity
Servers Shipped in Belgium
Hyper-V : a feature of Windows Server 2008
PRICE
Enabling Key Scenarios
Server consolidationBusiness continuity
Dynamic provisioning
At 1/3rd the costof the competition
Microsoft Server Virtualization Solution
Integrate virtualization into existing environments and
processes
Manage virtual and physical and into applications from
one toolset
Competition
Side-By-Side Feature & Cost Comparison Of Virtualizing 5 Hosts
x
x
x
$61.4K
Multi-Hypervisor
Management
App Management
Physical Manageme
nt
Virtual Managemen
t
HypervisorWindows Server 2008
$12KWindows Server 2008
$12KWindows Server 2008
$12K
Virtual Infrastructure Enterprise$42.1K
Virtual Center$7.3K
System Center$9.4K
$21.4KIncluded
MANAGEMENT
Virtual Workload
Provisioning
OS / Software Deploy,
Patching and State Mgmt
Performance and Health Monitoring
Disaster Recovery
Hardware ProvisioningBackup
Managing The Server Lifecycle
Patch management and deployment
OS and application configuration management
Software upgrades
Virtual machine managementServer consolidation and resource
utilization optimizationConversions: P2V and V2V
Live host level virtual machine backup
In guest consistencyRapid recovery
End to end service managementServer and application health monitoring & management
Performance reporting and analysis
Server ManagementSuite Enterprise
Maximize ResourcesCentralized VM management for Hyper-V and VMware
ESXIntelligent placement of Virtual Machines
Comprehensive application and service-level monitoringIntegrated Performance & Resource Optimization (PRO)
of VMs
Increase AgilityRapid provisioning of new and virtual machines with
templatesLeverage and extend existing storage infra and clusters
Allow for delegated management and access of VMs
Leverage SkillsFamiliar interface, common foundation
Monitor physical and virtual machines from one console Fully scriptable using PowerShell
A Centralized, Heterogeneous Management Solution For The Virtual Datacenter
Intelligent PlacementCapacity planning technology ensures best resource utilization
Star rated results for easy decision making
Configurable algorithm to achieve your goals
Performance And Resource Optimization (PRO)
MATURITY
Virtualization And High Availability
Traditional Non-Virtualized
EnvironmentDowntime is bad, but
affects only one workload
Virtualized Environment
Value of the physical server goes up
Downtime is far worse because multiple workloads
are affected
Virtualization and High-Availability Go Hand in Hand
Microsoft Hyper-V Quick Migration
Provides solutions for both planned and unplanned downtime
Planned downtimeQuickly move virtualized workloads to service underlying
hardware
More common than unplanned
Unplanned downtimeAutomatic failover to other nodes (hardware or power failure)
Not as common and more difficult
TechNet & MSDN : 100% Hyper-Vhttp://technet.microsoft.com : ~1 million hits a DAY
http://msdn.microsoft.com : ~3 million hits a DAY
Banque de Luxembourg“With System Center Virtual Machine Manager, we have a single
management terminal for all technical teams, a big step forward in our optimization and standardization effort.” says Xavier Granveaux,
Virtualization Project Manager, Banque de Luxembourg
HostbasketUsing Hyper-V, we can respond more quickly and flexibly to our customers’ changing needs.” says Bert Van Pottelberghe, Sales
Director, Hostbasket
Hyper-V In Production
Virtualization Blockers Addressed with R2Blocker New Capability
Moving running Virtual Machines
Live Migration
Support for Red Hat as a guest OS
Just announced. Support coming in CY2009
Network performance Improved network stack
Support for latest processor technologies
Utilize virtualization capabilities in latest AMD and Intel processors
Support for more processors, memory, and guests
32 processors1 TB RAM256 Virtual Machine guests
Storage management Hot add/remove storage
Connection broker for Virtual Desktop
Included
Power Management(New differentiator!)
“Core Parking” to reduce power consumption
The Tipping Point
Servers Shipped in Belgium
One Last Thing…
Research by IDC, and first reported by ComputerWorld, shows that VMWare’s market
share fell from a reported 51% during 2007 to 44% during the third quarter of 2008. At the same time Microsoft’s Hyper-V has already had a material
impact on market share, even though the product was only released three months ago, as
Microsoft’s market share jumped to 23% during the third quarter.…
Source : www.techcrunchit.com
Managing the Desktop/Server Lifecycle
Virtual Workload
Provisioning
OS / Software Deploy,
Patching and State Mgmt
Performance and Health Monitoring
Disaster Recovery
Hardware ProvisioningBackup
Server Management Suite Enterprise
System CenterVirtual App
Server
System Center DEM Operations
Manager 2007
Translating software inventoryinto business intelligence
Enhancing group policy throughchange management
Dynamically streaming software as a centrally
managed service
Proactively managing application and operating system failures
Powerful tools to accelerate desktop repair
ALERT: Application X
has failed
AppApp
AppApp
AppAppApp App
AppAppApp
InventoryAssets
ManageGroup
Policies
Virtualize and Stream
Apps
Monitor Crashes
RepairDesktops
Simplifying deployment and management of Virtual PCs
NEW!
Agenda
Infrastructure OptimizationHow to Optimize your InfrastructureRoadmap
49
Introducing Windows Server 2008 R2Introducing Windows Server 2008 R2
Virtualization
Increasing AvailabilityLive Migration
ClusterNode 1
Network Storage
ClusterNode 2
Configuration Data
Virtual Machine
Memory Content
VHD
Memory Sync
Virtual Machine
User
Aero Glass for Remote Desktop ServerUses have the same new Windows 7 look and feel when using
Remote Desktop Server
RemoteApp & Desktop ConnectionsRemoteApp & Desktops icons integrated into start menu etc
Icons refreshed & updated automatically
Multimedia Support & Audio InputExperience rich multimedia redirection
Use VoIP applications and speech recognition.
True multiple monitor supportUse up to 10 monitors of any size or layout with RemoteApp and
DesktopsApplications behave like users expect – e.g. PowerPoint installing
them locally
RemoteApp™ Language Bar SupportConfigure applications that use alternate language settings (e.g.
right to left languages) from the local language
Full Fidelity RemoteApp & Desktops
Solid Foundation for
Enterprise Workloads
Better Together
DirectAccess™
Overview
BranchCache™
Read-Only DFS for branch security
Serving Up the Virtual Desktop
Protection for Mobile Data
DirectAccess™
Remote access is now ubiquitousComprehensive anywhere access for Windows 7 and Windows Server 2008 R2
Seamless, always-on, secure connectivity; no separate client software requiredUtilizes networking technologies already in Windows Server 2008 No separate action required to connect to corpnet while remote. Corpnet is simply there.Leverages policy-based network accessEnables desktop management regardless of client location.
IPv6 Devices IPv4 Devices
DirectAccessServer
Windows 7 Client
Native IPv6 with IPSec
IPv6 Transition Services
Supports variety of remote network protocols
DirectAccess™
DirectAccess provides transparent, secured
access to intranet resources without a
VPN
Allows desktop management of
DirectAccess clients
Allows IPSec encryption and authentication
Supports direct connectivity to IPv6-
based intranet resources
Support IPv4 via 6to4 transition
services or NAT-PTIT desktop manageme
nt
AD Group Policy, NAP,
software updates
Internet
BranchCache™
Reduces Wide Area Network (WAN) link utilizationCompletely transparent to the userSupports end-to-end encryption between clients and serversHTTP, SMB and BITS protocols are optimizedTwo deployment models:
Distributed modeHosted caching
1.First client downloads data from main office
server
Improving Branch PerformanceDistributed Mode
Main Office
Client 1
Client 2
2.Second client downloads identifiers
from main office server
3.Second client searches local network for data and downloads from
first client
Branch Office
1.First client downloads data from main office
server
Client 1
Client 2Branch
Office
Improving Branch PerformanceHosted Caching
2.Content pushed to hosted cache from
first client
3.Second client downloads identifiers
from main office server
4.Second client downloads from
hosted cache
Main Office
Serving Up the Virtual Desktop
RDS extended to include VDISimplified publishing and accessSupport for managed & unmanaged clientsTight integration with Windows 7
‘Feeds’Start menu, system tray and control panelRemoteApp & Desktop Web Access
Improved end-user experienceHigh-end multimedia, multi-monitor, Aero, more
Protection for Mobile Data
Encrypt data on removable drivesProvided by BitLocker Drive EncryptionStore encryption keys in Windows Server 2008 R2 Active Directory
Windows Server 2008 R2 Active Directory
Resources
IO Main Page: www.microsoft.com/io IO Self Assessment
Page: http://technet.microsoft.com/en-us/infrastructure/bb736011.aspx
Basic to Standardized Guide
IO provides a logical roadmap to progress the maturity of an IT organization. These guides describe the core concepts for implementing and managing IO-
defined capabilities, linking to more detailed and actionable content for implementation.
SOLUTIONACCELERATORS Act faster. Go further.
Core IO Capability Model
Standardized to Rationalized Guide
Rationalized to Dynamic Guide
Core Infrastructure Optimization (IO) Implementer Resource Guides
Papers Located //www.microsoft.com/io
Let us provide methods to develop an integrated implementation roadmap
Next Steps
Assess your Core Infrastructure maturity with the Microsoft Infrastructure Optimization Model (new
online tool!)
Prioritize core infrastructure capabilities for further analysis
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any
information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.