vista launch_nixon.ppt
DESCRIPTION
TRANSCRIPT
David Nixon, MCSEDavid Nixon, MCSENetwork EngineerNetwork EngineerCounty of RoanokeCounty of Roanoke
What is it? What is it? What does it mean to you?What does it mean to you?
AgendaAgenda
Why are we here?Why are we here?
Windows Vista™ operating system Windows Vista™ operating system overviewoverview
Top benefits for IT professionals!Top benefits for IT professionals!
Take a Vista tourTake a Vista tour
Next stepsNext steps
Secure Secure
Corporate
Corporate
Environment
Environment
Manage
Manage
Information
Information
BuildBuildConnections
Connections
Impr
ove
Impr
ove
Ope
ratio
ns
Ope
ratio
ns
Collaborat
e
Act
Decide
Discover People
ProliferationProliferationof form factorsof form factorsand networksand networks
CorporateCorporateknowledgeknowledge
assetsassets
Pressure toPressure toreduce costsreduce costs
Keep systemsKeep systemsup and runningup and running
Team Team collaborationcollaboration Protect againstProtect against
threatsthreats
Enabling People-Ready BusinessEnabling People-Ready Business
End UsersEnd Users
Help improve Help improve security and security and compliancecompliance
Find and useFind and useinformationinformation
Optimize desktopOptimize desktopinfrastructureinfrastructure
Enable mobileEnable mobileworkforceworkforce
IT ProsIT Pros
Windows Vista Key Business Windows Vista Key Business ScenariosScenarios
What Edition is right for you?
Home
Basic
Home
Premium
Business Ultimate
Retail / Upgrade Price $199/99
$239/159
$299/199
$399/259
Windows Defender & IE7
X X X X
Aero Desktop X X X
Tablet Support X X X
Domain Support X X
Enhanced Media Support
-Media Center, DVD Maker
X X
Drive Encryption X
Hardware RequirementsVista Capable vs. Premium
ReadyCapable800 MHz CPU
512 MB RAM
DirectX 9
Ready1 GHz CPU
1024 MB RAM
DirectX 9 w/WDDM DriverPixel Shader 2.0 in Hardware32 bits per pixel128 MB Video RAM
Top Benefits for IT ProfessionalsTop Benefits for IT Professionals
Reduce deployment complexity and Reduce deployment complexity and risk with deployment tools and risk with deployment tools and
resources resources
11
PlanningPlanning EngineeringEngineering ImplementationImplementation
Application inventoryApplication inventory
Application analysisApplication analysis
Application Application compatibility compatibility mitigationmitigation
Migration testingMigration testing
Migration scriptsMigration scripts
ACT, USMT, BDD, ORKACT, USMT, BDD, ORK
Build desktop imageBuild desktop image
Customize imageCustomize image
Add drivers, languages, Add drivers, languages, and applicationsand applications
Capture imageCapture image
Prepare for rolloutPrepare for rollout
ImageX, BDD, Sysprep, ImageX, BDD, Sysprep, ORKORK
Install image on Install image on desktopsdesktops
Migrate/upgradeMigrate/upgrade
Deploy remotelyDeploy remotely
WDS, SMS, BDD, USMTWDS, SMS, BDD, USMT
BDDBDD
Reduce image complexity and required Reduce image complexity and required image management activitiesimage management activities
22
Create and edit Create and edit unattend files in unattend files in XMLXMLAdd and modify Add and modify optional optional components – components – languages, service languages, service packs, driverspacks, driversApply unattend Apply unattend offline or onlineoffline or onlineFully scriptable via Fully scriptable via command linecommand line
System ImageSystem ImageManagerManager
Utility to create Utility to create and manage WIM and manage WIM imagesimagesMount and edit Mount and edit WIM files offlineWIM files offlineCapture desktop Capture desktop volume into a WIM volume into a WIM filefileOperating system Operating system version agnosticversion agnosticCommand line onlyCommand line only
ImageXImageX
Easily identify and manage Easily identify and manage compatibility issues with deploying compatibility issues with deploying
legacy applicationslegacy applications
33
Agent Framework/Compatibility EvaluatorsAgent Framework/Compatibility Evaluators
DCOMDCOM WFWFInventoryInventory IEIE UACUAC UIAUIA Etc…Etc…
Internet
Deskto
p T
op
olo
gy
Deskto
p T
op
olo
gy
Log Processing ServiceLog Processing Service
Compatibility ExchangeCompatibility Exchange
Local Local ACT DBACT DB
ACT ManagerACT Manager
Application Compatibility Toolkit Application Compatibility Toolkit 5.05.0
Provide a more consistent and Provide a more consistent and predictable way to do provisioning predictable way to do provisioning
tasks with ZTP tasks with ZTP
44
Reset passwordReset password
Provision a userProvision a user
Edit user detailsEdit user details
Add user to/remove Add user to/remove from security groupfrom security group
Add user Add user to/remove from to/remove from distribution listdistribution list
Add an application Add an application to/remove from a to/remove from a useruser
Invoke a Zero Invoke a Zero Touch migrationTouch migration
SubscriberSubscriberService Service RequestRequest
ProvisioningProvisioningProcessingProcessing
AutomatedAutomatedDeliveryDelivery
Zero-Touch Provisioning (ZTP) Zero-Touch Provisioning (ZTP) Basic ServicesBasic Services
Scenario 1Scenario 1Twenty new desktop Twenty new desktop computers are being computers are being deployed to users in deployed to users in the accounting the accounting departmentdepartment
Migrate desktops simultaneously with Migrate desktops simultaneously with minimized support incidents using minimized support incidents using
USMTUSMT
55
Scenario 2Scenario 2Pam gets a new Pam gets a new laptop, and her old laptop, and her old laptop gets laptop gets reallocated to reallocated to GeorgeGeorge
Increases Increases automationautomationUpgrades user state Upgrades user state datadataMigrates Migrates documents and documents and settingssettingsIdentifies user state Identifies user state datadata
User State User State Migration Tool Migration Tool
(USMT) 3.0(USMT) 3.0
Increase management control and Increase management control and quality of service over network traffic quality of service over network traffic
66
Firewall RulesFirewall Rules
Directory service accounts Directory service accounts and groupsand groupsSource/destination Source/destination Internet Protocol (IP) Internet Protocol (IP) addressesaddressesSource/destination Source/destination Transmission Control Transmission Control Protocol (TCP) and User Protocol (TCP) and User Datagram Protocol (UDP) Datagram Protocol (UDP) portsports
Quality of Service Quality of Service PoliciesPolicies
Manage the use of Manage the use of network bandwidthnetwork bandwidthDefine priority of trafficDefine priority of traffic
Windows Firewall Management: Windows Firewall Management: Inbound/OutboundInbound/Outbound
Isolate and fix problems quickly and Isolate and fix problems quickly and easily easily
77
Reliability and Performance MonitorReliability and Performance Monitor
Performance MonitoringPerformance MonitoringPerformance countersPerformance countersComprehensive monitoringComprehensive monitoring
Reliability MonitoringReliability MonitoringReliability indexReliability indexEvent trackingEvent tracking
Query across multiple event Query across multiple event logslogsReusable viewsReusable viewsCross-log queriesCross-log queriesForward eventsForward eventsSchedule tasks in response to Schedule tasks in response to eventsevents
Windows Vista Event ViewerWindows Vista Event Viewer
Using the Windows Reliability Using the Windows Reliability and Performance Monitorand Performance Monitor
Gain configurable control over end-Gain configurable control over end-user tasks user tasks
88
User Account ControlUser Account Control
Allows system to run as Allows system to run as standard userstandard userAllows selected Allows selected applications to run in applications to run in elevated contextelevated contextEnables inappropriate Enables inappropriate administrative checks to be administrative checks to be fixed or removedfixed or removedProvides capability through Provides capability through registry and file registry and file virtualizationvirtualization
Advanced Security ControlAdvanced Security Control
Control over Control over removable device removable device installationinstallation
Restart ManagerRestart Manager
Security Center Security Center enhancementsenhancements
Microsoft BitLocker™ Drive EncryptionMicrosoft BitLocker™ Drive Encryption
Minimize risk of data theft or exposure Minimize risk of data theft or exposure from lost, stolen, or discarded from lost, stolen, or discarded
hardware hardware
99
Improved at-rest data Improved at-rest data protection with full-drive protection with full-drive encryptionencryption
Scalable security protectionScalable security protection
Enterprise-ready deployment Enterprise-ready deployment capabilitiescapabilities
Offline system tampering Offline system tampering resistanceresistance
Worry-free hardware re-Worry-free hardware re-purposing and decommissioningpurposing and decommissioning
Integrated disaster recovery Integrated disaster recovery featuresfeatures
Implementing BitLocker Drive Implementing BitLocker Drive EncryptionEncryption
SummarySummary
BDD WorkbenchBDD Workbench
ImageX and System Image ManagerImageX and System Image Manager
Application Compatibility Toolkit 5.0Application Compatibility Toolkit 5.0
ZTPZTP
USMTUSMT
Microsoft Windows FirewallMicrosoft Windows Firewall
Reliability & Performance Monitor and Event LogsReliability & Performance Monitor and Event Logs
UACUAC
BitLockerBitLocker
Next StepsNext Steps
EvaluationEvaluationPilot Windows Vista in workgroup or department to evaluate Pilot Windows Vista in workgroup or department to evaluate potential benefits to end-userspotential benefits to end-users
PlanningPlanningPlan your deployment and conduct application compatibility Plan your deployment and conduct application compatibility testing using ACT and Application Compatibility Factory testing using ACT and Application Compatibility Factory (highlight services from 6 partners participating in this (highlight services from 6 partners participating in this program)program)
DeploymentDeploymentBuild system images and evaluate Zero Touch or Light Touch Build system images and evaluate Zero Touch or Light Touch deployment optionsdeployment options
SecuritySecurityDiscover how to protect your systems and data from malicious Discover how to protect your systems and data from malicious attacksattacks
OperationsOperationsManage your desktops and quantify the Total Cost of Manage your desktops and quantify the Total Cost of OwnershipOwnership
Contact a Partner to help you evaluate, pilot and deploy Contact a Partner to help you evaluate, pilot and deploy Windows Vista Windows Vista
Additional ResourcesAdditional ResourcesVisit TechNetVisit TechNet
www.microsoft.com/technet
Visit Microsoft.comVisit Microsoft.comMicrosoft Windows Server System™ integrated server softwareMicrosoft Windows Server System™ integrated server software
http://www.microsoft.com/windowsserversystem
Microsoft Solution Accelerator for Business Desktop Deployment (BDD)Microsoft Solution Accelerator for Business Desktop Deployment (BDD)http://www.microsoft.com/technet/desktopdeployment/default.mspx http://www.microsoft.com/technet/desktopdeployment/default.mspx
Attend a free chat or webcastAttend a free chat or webcasthttp://www.microsoft.com/communities/chats/default.mspx http://www.microsoft.com/communities/chats/default.mspx http://www.microsoft.com/usa/webcasts/default.asp http://www.microsoft.com/usa/webcasts/default.asp
Participate in related newsgroupsParticipate in related newsgroupshttp://www.microsoft.com/technet/community/newsgroups/default.mspxhttp://www.microsoft.com/technet/community/newsgroups/default.mspx
Locate local user groupsLocate local user groupshttp://www.microsoft.com/communities/usergroups/default.mspx http://www.microsoft.com/communities/usergroups/default.mspx
Find a partner to work withFind a partner to work withhttp://directory.microsoft.com/mprd/http://directory.microsoft.com/mprd/
QuestionsQuestions
© 2006 Microsoft Corporation. All rights reserved.© 2006 Microsoft Corporation. All rights reserved.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
Microsoft, Active Directory, BitLocker, the Security Shield logo, Visual Basic, Windows, the Windows logo, Windows NT, Windows Microsoft, Active Directory, BitLocker, the Security Shield logo, Visual Basic, Windows, the Windows logo, Windows NT, Windows Server, Windows Server System, and Windows Vista are registered trademarks of Microsoft Corporation in the United States and/or Server, Windows Server System, and Windows Vista are registered trademarks of Microsoft Corporation in the United States and/or
other countries.other countries.The names of actual companies and products mentioned herein may be the trademarks of their respective owners.The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Microsoft Corporation • One Microsoft Way • Redmond, WA 98052-6399 • USAMicrosoft Corporation • One Microsoft Way • Redmond, WA 98052-6399 • USA