Microsoft Desktop Optimization Pack (MDOP) Technet Event November 25Th, 2013

Total Page:16

File Type:pdf, Size:1020Kb

Microsoft Desktop Optimization Pack (MDOP) Technet Event November 25Th, 2013 | Basel Microsoft Desktop Optimization Pack (MDOP) TechNet Event November 25th, 2013 Martin Weber Technology Solution Professional Microsoft Switzerland Ltd. Enabling People-Centric IT Microsoft Software Assurance Expectations Enhancing the Flexible Work Style Microsoft Desktop Optimization Pack (MDOP) Microsoft Application Virtualization (App-V) Virtually any application, anywhere Microsoft User Experience Virtualization (UE-V) Change your device, keep your experience Microsoft Enterprise Desktop Virtualization (MED-V) Enable your Windows XP-based apps on Windows 7 Diagnostics and Recovery Tool (DaRT) Diagnostics and Recovery Toolset (DaRT) is the next level in recovery. DaRT has been updated for Windows 8.1 • Globally unique ID partition tables • Transparent Unified Extensible Firmware Interface (UEFI) support DaRT is part of the Microsoft Desktop Optimization Pack (MDOP) A reimagined Recovery Image Wizard Windows PowerShell script generation Create x86 and x64 from the same workstation Generates .wim and .iso images Native tools for media creation: • CD or DVD • USB drives Improved DaRT Scripting Functionality Windows PowerShell cmdlets Provide End-to-End coverage of the Deployment Image image-generation Servicing and process Management cmdlets MDOP DaRT Deployment Options Removable media: • DaRT CD • DaRT USB Flash Drive Local installation: • Manually • Microsoft Deployment Toolkit 2013 • Microsoft System Center 2012 R2 Configuration Manager Network service: • Windows Deployment Services (WDS) Microsoft BitLocker Administration and Monitoring: Compliance and security MBAM is Compliance enterprise-level reports tool for BitLocker Role-based Complex access PINs and control FIPs MDOP MBAM: Integration Integration with Automated Report Configuration Manager encryption customization with provisioning Microsoft SQL Server Reporting Services MDOP MBAM: Reducing TCO Users help themselves Self-service Recovery Console Work Anywhere on any Windows Device: Your Data & Apps across Windows Devices ConfigManager App-V 5.0 (MDOP) Folder Redirection, UE-V RemoteApp (RDS) User Settings + Apps + Data User Settings+ Apps + Data Microsoft User Experience Virtualization (UE-V) Personal and flexible Simple and versatile Integrated and scalable A consistent, personal Windows Easy for IT to deliver personal, Integrates and scales through experience for all work styles: user-defined experiences, existing management tools: • App and Windows across many devices: • Configuration Manager personalization • Setting location templates • Microsoft desktop • App reconfiguration not • Can create custom templates virtualization required • IT can roll back settings • Manage and deploy with • Sync is smart—logins are faster Windows PowerShell, Configuration Manager, or third-party management tools App settings App monitoring Settings storage Triggers: Collect and apply TechNet - UE-V Architecture settings Microsoft Application Virtualization (App-V) Work in familiar ways: Virtualizing a broader range of Manage across physical and • Virtual Application Extension apps: virtual environments: • Use the native file system and • Virtual Application • New web-based registry Connection management interface • No dedicated drive letter • Support for Microsoft Office • Virtual Application required 2013 Connection groups • Automation with Windows PowerShell Powerful Application Management Deploy, track, and service apps across physical and virtual environments Configuration Shared content store Manager Save disk space in Virtual Desktop Pooled Persona Desktop Infrastructure (VDI)/ Session Desktop l s s Desktop Remote Desktop Services (RDS): s Store apps centrally and maintain App-V full control of updates in App-V Shared Content and Configuration Manager. Store Virtual desktops Benefits RDS Web-based administration makes it easy to discover and use features. Optimize disk space in VDI without changing management workflow. Automate repetitive or Tablet Desktop/laptop Non-Windows complex tasks with Windows device PowerShell. Enabling App access from many Devices Configuration Manager Web Application Proxy, Group Policy MSI App-V App-V RDS (MDOP) (MDOP) native apps Windows 8.1 BENEFITS sideload • • • • Accessing apps the right way on the right device with Configuration Manager App (Example: PDF Reader) • • • • • • • App-V App MSI AppX iOS Android • (MDOP) Store Link Start Start Start Cloud Management for Devices IT Inventory and manage Configuration Manager Security, updates, and software, Company Portal, manage personal devices BENEFITS • • • • Advanced Manageability: Windows 8.1 and MDOP Improve routine task Keep users productive: automation: • Restore the corporate image • Windows PowerShell 4.0 while preserving user data. provides workflows, robust • Restore the corporate image connections, and additional while removing all user data. capabilities, improving routine task automation. Simplify desktop Advanced management with configuration: Microsoft Desktop Optimization Pack (MDOP): • Refresh Group Policy settings remotely. • Powerful change management for Group Policy with Microsoft • Determine the status of Advanced Group Policy replication across a domain. Management. • Reduce the number of • Accelerate desktop repair with reporting tools required. Microsoft Diagnostics and Recovery Toolset. Windows 8.1 Modern App Support . Sync and Tool Enhancements User Experience Virtualization . Enhanced Configuration Manager Integration • Shell Extension Support, Enriching the User Experience Application • Sequencing Enhancements, simplifying the virtual virtualization app-creation process . Support for Windows 8.1 Integrated | Basel We are proud to announce: - MDOP 2013 R2 Release Date expected by the End of the Year - App-V V5 SP3 Release Date expected by the End of the Year MDOP Tools Summary Diagnostic and Microsoft BitLocker Administration and Recovery ToolSet Monitoring (MBAM) Advanced Group Policy Management (AGPM) User Experience Virtualization (UE-V) Application Virtualization (App-V) MED-V .
Recommended publications
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Diagnostics and Recovery Toolset Recovery Toolset
    Para clientes de Software Assurance .. Microsoft Application Virtualization ® Microsoft .. Microsoft Asset Inventory Service Diagnostics and .. Microsoft Advanced Group Policy Management .. Microsoft Diagnostics and Recovery Toolset Recovery Toolset .. Microsoft System Center Desktop Error Monitoring .. Microsoft® Microsoft Enterprise Desktop Virtualization Paquete de Optimización de PC Para Software Assurance Microsoft® Diagnostics and Recovery Toolset ofrece herramientas intuitivas y poderosas que permiten a los administradores recuperar PCs que no se pueden utilizar y fácilmente, identifi car los problemas que causan los problemas del sistema y la red. Si ocurre una catástrofe en la PC, estas herramientas le permiten reparar los sistemas bloqueados o que no se pueden iniciar, recuperar los archivos eliminados en mucho menos tiempo que el que se requiere para realizar esto a partir de la copia de seguridad o la reinstalación de sistemas operativos, detectar o eliminar hardware que utiliza rootkits para evitar la detección, y mucho más. Microsoft Diagnostics and Recovery Toolset es un componente integral del Paquete de Optimización de PC de Microsoft para Software Assurance, una solución dinámica de PC disponible para clientes de Software Assurance que reduce los costos de implementación de aplicaciones, posibilita la entrega de aplicaciones como servicios ayuda a controlar y administrar mejor los entornos de PC de la empresa. Desafíos para la recuperación de las PCs de la empresa Proteger los datos corporativos y de los empleados es una de las funciones de TI más importantes. Si bien muchos departamentos de TI pueden realizar copias de seguridad de los datos de la red de manera proactiva, por lo general son reactivos en la planifi cación de fallas de los sistemas de las PCs.
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • Copyrighted Material
    2986IDX.qxd 9/6/01 12:12 AM Page 425 Index Note to the reader: Throughout this index boldfaced page numbers indicate pri- mary discussions of a topic. Italicized page numbers indicate illustrations. A for Local Users and Groups, 171 in Shared Folders, 333 abstracts, from Indexing Service, 140 Active Directory, 7–8 Accessibility, 2–6 for adding programs, 12 Internet Explorer options, 157 ActiveX controls, security settings for, 158 Magnifier, 176–177 Add Counters dialog, 257, 257–258 Narrator, 195–196 Add Excluded Files dialog On-Screen Keyboard, 234, 234–235 (Backup), 35 Options window, 2, 2–3 Add Hardware Wizard, 8–10, 350–351 Utility Manager, 385–386, 386 Add or Remove Programs, 10–13 Accessibility Options dialog, Keyboard address bar tab, 3, 3–4 in Explorer, 101–102, 102 Accessories, 6 in Internet Explorer, 149 Calculator, 37–38 Address Book, 13–25 Command Prompt, 46, 46–47 contact template, 20 Communications, 47 creating contacts, 16–17 Entertainment program group, 92 folders, 22–23 Program Compatibility Wizard, 288, 288–289 groups, 20–22 System Tools, 366. See also Backup identities for, 24–25 Character Map, 40 menus, 15–16 Disk Cleanup, 69–71, 71 retrieving e-mail addresses from, 241 Disk Defragmenter, 71–75 searching for people in, 325–326 File and Settings Transfer toolbar, 14, 15 Wizard, 112 window, 14 Scheduled Tasks, 316, 316–322 Address toolbar, 367 System Information, 361–363COPYRIGHTEDAdministrative Tools, MATERIAL 25–26. See also System Restore, 364, 364–365 Microsoft Management Console (MMC) snap-ins Windows Explorer, 97, 97–106 Active Directory, 7–8 Windows Movie Maker, 406–414, 407 for adding programs, 12 Action menu COM+ (Component Services), 45 for Device Manager, 59–63 Data Sources (ODBC), 51–55 425 2986IDX.qxd 9/6/01 12:12 AM Page 426 ADMINISTRATOR ACCOUNT Event Viewer, 93, 93–96, 94 attrib command, 291 Local Security Policy, 168, 168–170, AU files, 396 168–170 audio.
    [Show full text]
  • Microsoft Diagnostics and Recovery Toolset
    For Software Assurance Customers Microsoft® .. Microsoft SoftGrid® Application Virtualization .. Microsoft Asset Inventory Service Diagnostics and .. Microsoft Advanced Group Policy Management Recovery Toolset .. Microsoft Diagnostics and Recovery Toolset .. Microsoft System Center Desktop Error Monitoring Microsoft® Desktop Optimization Pack for Software Assurance Microsoft® Diagnostics and Recovery Toolset provides powerful, intuitive tools that help administrators recover PCs that have become unusable and easily identify root causes of system and network issues. If a desktop catastrophe does occur, it helps you quickly repair unbootable or locked-out systems, restore lost files without the timely process of using backup or reinstalling the operating system, and much more. Microsoft Diagnostics and Recovery Toolset is an integral component in the Microsoft Desktop Optimization Pack for Software Assurance solution, a dynamic desktop solution available to Software Assurance customers that reduces application deployment costs, enables delivery of applications as services, and allows for better management and control of enterprise desktop environments. Challenges of Corporate Desktop Recovery A fundamental responsibility of enterprise IT departments is to protect corporate and employee data. Although many take a proactive approach to backing up network data, they tend to be Microsoft® reactive in planning for desktop system failures. Unfortunately, the cost of not having an effective Diagnostics and diagnostics and recovery plan in place can be devastating. Recovery Toolset Microsoft Diagnostics and Recovery Toolset can save significant time and reduce the headaches associated with repairing and troubleshooting common system failures. System administrators may Powerful tools to now run powerful recovery tools on unbootable systems and can quickly restore failed systems accelerate desktop repair with minimal manual effort—in much less time than is required when restoring PCs from backup or reinstalling operating systems.
    [Show full text]
  • List of MS-DOS Commands - Wikipedia, the Free Encyclopedia Page 1 of 25
    List of MS-DOS commands - Wikipedia, the free encyclopedia Page 1 of 25 List of MS-DOS commands From Wikipedia, the free encyclopedia In the personal computer operating systems MS -DOS and PC DOS, a number of standard system commands were provided for common Contents tasks such as listing files on a disk or moving files. Some commands were built-in to the command interpreter, others existed as transient ■ 1 Resident and transient commands commands loaded into memory when required. ■ 2 Command line arguments Over the several generations of MS-DOS, ■ 3 Windows command prompt commands were added for the additional ■ 4 Commands functions of the operating system. In the current ■ 4.1 @ Microsoft Windows operating system a text- ■ 4.2 : mode command prompt window can still be ■ 4.3 ; used. Some DOS commands carry out functions ■ 4.4 /* equivalent to those in a UNIX system but ■ 4.5 ( ) always with differences in details of the ■ 4.6 append function. ■ 4.7 assign ■ 4.8 attrib ■ 4.9 backup and restore Resident and transient ■ 4.10 BASIC and BASICA commands ■ 4.11 call ■ 4.12 cd or chdir ■ 4.13 chcp The command interpreter for MS-DOS runs ■ 4.14 chkdsk when no application programs are running. ■ 4.15 choice When an application exits, if the command ■ 4.16 cls interpreter in memory was overwritten, MS- ■ 4.17 copy DOS will re-load it from disk. The command ■ 4.18 ctty interpreter is usually stored in a file called ■ 4.19 defrag "COMMAND.COM". Some commands are ■ 4.20 del or erase internal and built-into COMMAND.COM, ■ 4.21 deltree others are stored on disk in the same way as ■ 4.22 dir application programs.
    [Show full text]
  • The Recovery Console Content
    The Recovery Console Content 1. Common .....................................................................................................................3 2. Invoke the Recovery Console......................................................................................3 2.1. Start from Media...................................................................................................3 2.2. Start using RIS .....................................................................................................4 2.3. Installation ............................................................................................................5 2.3.1. Attended ........................................................................................................5 2.3.2. Un-attended...................................................................................................6 2.4. Un-installation.......................................................................................................6 2.5. Windows NT 4.0 ...................................................................................................6 2.6. 64-bits ..................................................................................................................7 3. Commands..................................................................................................................7 3.1. Commands In-depth ...........................................................................................10 3.1.1. BOOTCFG...................................................................................................10
    [Show full text]
  • Technology in India Useful Commands on Your Computer
    Technology in India Useful Commands on your Computer Run Commands ------------------------------------------------------------------- compmgmt.msc - Computer management devmgmt.msc - Device manager diskmgmt.msc - Disk management dfrg.msc - Disk defrag eventvwr.msc - Event viewer fsmgmt.msc - Shared folders gpedit.msc - Group policies lusrmgr.msc - Local users and groups perfmon.msc - Performance monitor rsop.msc - Resultant set of policies secpol.msc - Local security settings services.msc - Various Services msconfig - System Configuration Utility regedit - Registry Editor msinfo32 - System Information sysedit - System Edit win.ini - windows loading information(also system.ini) winver - Shows current version of windows mailto: - Opens default email client command - Opens command prompt Run Commands to access the control panel ------------------------------------------------------------------- appwiz.cpl - Add/Remove Programs control admintools - Adminastrative Tools control color - The Display with the appearance tab open control date/time - Date and Time properties control folders - Folder Options control fonts - Fonts Folder control infrared - Infrared folder if available control netconnections - Network and Dial-up Connections window control netware - Netware window if installed and available control panel - Control Panle control printers - Printers Folder control printers control schedtasks - Schedule tasks window ccontrol telephony - Location information window control userpasswords - User Accounts desk.cpl - Display Properties findfast.cpl
    [Show full text]
  • Bitlocker Group Policy Settings
    BitLocker Group Policy Settings Updated: September 13, 2013 Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2 This reference topic for the IT professional describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption. Overview To control what drive encryption tasks the user can perform from the Windows Control Panel or to modify other configuration options, you can use Group Policy administrative templates or local computer policy settings. How you configure these policy settings depends on how you implement BitLocker and what level of user interaction will be allowed. Note A separate set of Group Policy settings supports the use of the Trusted Platform Module (TPM). For details about those settings, see Trusted Platform Module Services Group Policy Settings. BitLocker Group Policy settings can be accessed using the Local Group Policy Editor and the Group Policy Management Console (GPMC) under Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption. Most of the BitLocker Group Policy settings are applied when BitLocker is initially turned on for a drive. If a computer is not compliant with existing Group Policy settings, BitLocker may not be turned on or modified until the computer is in a compliant state. When a drive is out of compliance with Group Policy settings (for example, if a Group Policy setting was changed after the initial BitLocker deployment in your organization, and then the setting was applied to previously encrypted drives), no change can be made to the BitLocker configuration of that drive except a change that will bring it into compliance.
    [Show full text]
  • Rapid Recovery 6.2 Commands and Scripting Reference Guide 2 Forcescheduledarchive
    Rapid Recovery 6.2 Commands and Scripting Reference Guide Table of Contents Introduction to Rapid Recovery.........................................................................................................10 Command Line Management utility...................................................................................................11 Commands..................................................................................................................................... 12 ApplyLicense.......................................................................................................................... 12 Archive....................................................................................................................................13 CancelActiveJobs...................................................................................................................16 CheckRepository.................................................................................................................... 17 CheckTieredRepository..........................................................................................................18 ConfigureAgentMigration........................................................................................................19 CreateArchiveRepository........................................................................................................20 CreateBootCD.......................................................................................................................
    [Show full text]
  • Zz-Cryptoprevent-Do
    REPLAY 4 ADMINISTRATOR’S GUIDE Copyright 2009/2010 by AppAssure Software , Inc. ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means — graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage and retrieval systems — without the written permission of the publisher. For permission to use material from this publication, contact AppAssure Software, Inc. 1925 Isaac Newton Square, Suite 440 Reston, VA 20190 +1 703-547-8686 [email protected] Replay 4 Administrator’s Guide ii Contents Chapter One: Introduction ............................................................. 1 REPLAY 4 .......................................................................................................................................................... 1 Chapter One: Introduction ........................................................................................................................ 1 What Is In This Guide ......................................................... 1 About Replay 4 ................................................................... 1 What you get with Replay 4 .............................................. 2 What's New in Replay 4? ................................................... 2 Replication for Off-site Backup and Disaster Recovery .............................................. 2 New Enterprise Console ...........................................................................................................
    [Show full text]
  • Computing at BSU User Guide Date: September 28, 1995
    MEMO To: Faculty and Staff From: Shaun Loughney Subject: Computing at BSU User Guide Date: September 28, 1995 The following is the 1995-1996 updated inserts for your Computing at BSU User Guide. NOTE: CHAPTER 6 AND APPENDIXES B THRU E, G AND I, HAVE NO CBANGES. PLEASE RETAIN YOUR CURRENT REFERENCES. Take a look at what is new: The Center for Data Processing has added several new faces in the past year. See Chapter 1 for listing of current and new members of the Data Center. The not so new Student E-mail Server VARNEY is growing like wild fire. We have over 5000 users and are adding daily. See the Help Desk Documents BSU-01 and 02 for information on how to use the system. Several individuals on campus have pulled together and are designing a BSU Home Page for Internet access. The home page will eventually replace the Campus Wide Information System. See Chapters 2 and 5 for insight on what you will find at http://www.idbsu.edu. The Center for Data Processing has also started our own listserv, COMP-BSU. This is used to discuss campus computing issues, troubleshooting questions, and general topics of interest. See Help Desk Document Internet-05 to subscribe to listserv COMP-BSU. A couple of the Data Center's services have been improved to meet the campus needs: The dial-in access has received 16 new modems and authentication. To set up remote terminal access, see Help Desk Document COMM-05. The Faculty Computer Lab has upgraded their equipment. Several workstations are multi-media machines and have scanning ability.
    [Show full text]