Fluffy’s Safe Right? If you want to limit a user’s functionality, don’t make them an administrator.

Slides:



Advertisements
Similar presentations
Hyper-V Networking Best practice
Advertisements

3/29/2017 1:10 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
Experiences with Service Manager and Orchestrator.
Ljubomir Ivaniš CPU d.o.o.
Contains: Monitoring configuration: MPs, rules, monitors, discoveries, etc. Configuration & inventory data Performance data State data Alerts.
UD-B302 Lighting, HVAC, … 75% IT 25% PCs, Laptops, Monitors $28b Network $18b Servers $14b Printers $13b $90b Telecom $10b Other $7b Commercial Energy.
Agenda Orchestrator - Components Orchestrator – For the ConfigMgr Admin.
DV-B306 One with Windows More Apps in More Places Modern Managemen t.
-ConfigMgr Scripting history -Introduction to the ConfigMgr SP1 & PowerShell -Scenarios & Demos.
4/15/ :16 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
PAGE 2 PAGE 3 INTRODUCING HYPER-V EXTENSIBLE SWITCH.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
DV-B307 Personal & flexible  App and OS personalization roam across Windows  Syncs are smart and logins are fast  Application or OS reconfiguration.
Lesson 9: Creating and Configuring Virtual Networks
Agenda Overcome flat budgets Coping with relentless growth Meeting increasing business demands Managing escalating complexity Maintaining service levels.
3 5 Cisco UCS™ Manager (Read / Write Configuration Interfaces) UCS Manager GUI and CLI Cisco UCS Fabric Interconnects (Read Only / Cut Through Interfaces)
Service Manager Operations Manager Configuration Manager Data Protection Manager Virtual Machine Manager App Controller Orchestrator Active Directory.
Didier Van Hoye Technical FGIA MVP – Virtual Machine Microsoft Extended Experts Team
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Windows 7 Windows Server 2008 R2 VirtualizationVirtualization Heterogeneous Server Environment Inventory Linux, Unix & VMware Windows 7 & Server 2008.
“Shared superuser accounts – typically system-defined in operating systems, databases, network devices and elsewhere – present significant risks.
AI-B301 Topics A quick note: There is a lot of information in this session, too much in fact! Slides are heavy and designed for you to review. We’ll.
Patch Deployment Patch Creation Vulnerability Scanning Vulnerability Intelligence.
What's New in Windows Server 2012 Hyper-V, Part 2 Jeff Woolsey Windows Server & Cloud Microsoft Corporation VIR309.
Agenda Advanced Query Techniques Agenda Taming SQL Performance issues.
Not what you are looking for? Head to another session now!
Devices & Experiences Users Want Applications and data across devices, anywhere Controlled access to data with seamless authentication.
Windows Store apps Provisioning Installation.
Leader in Cloud Services Enablement and Desktop Virtualization 900+ employees worldwide 100+ patents granted or pending 200+ partnerships include Microsoft,
Session Objectives and Takeaways Scenario End UserAdministrator Art needs to quickly install an application to edit a diagram that he needs to update.
IM-B201 Traditional Virtualized Private Cloud Public Cloud  Windows  Linux  UNIX  Windows  Linux  UNIX  Windows  Linux  Windows  Linux.
Boot processCapable of USB boot Firmware USB boot enabled. (PCs certified for use with Windows 7 or Windows 8 can be configured to boot directly.
Customizing the Browser Browser Management Deployment MethodsApp Compat.

LinuxUNIX Red HatSUSECentOSUbuntuDebianOracleAIXHP-UXSolaris Configuration Manager * * * * * * Endpoint Protection No Plans.
Not what you are looking for? Head to another session now!
Global Foundation Services (GFS) Malware Protection Center Microsoft Security Response Center (MSRC)
What’s new in Hyper-V in Windows Server 2012 (Part 2) Stu Fox Technical Specialist, Microsoft NZ VIR315.
Module 7: Hyper-V. Module Overview List the new features of Hyper-V Configure Hyper-V virtual machines.
Appendix B Planning a Virtualization Strategy for Exchange Server 2010.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
“With System Center 2012, we have much more granular insight into and control over the services we’re delivering to the business. This is critical.
IM-B401 Dashboard Samples shown today can be found at
Your Application:.NET Application Performance Monitoring First mile: internal synthetic transactions Mid-mile: Global Service Monitor Last mile: client-side.
Get Hands-on with the New Hyper-V Extensible Switch in Windows Server 2012 Bob Combs Hyper-V Networking Microsoft Corporation VIR307.
IM-B391 Agenda Getting Metrics Out From Database Servers.
Pre-Talk Q&A piecing it together fabric design and configuration.
REQUIREMENTS WORKING SOFTWARE Misunderstood requirements Conflicting priorities Unmet user expectations Can’t get actionable feedback Disparate management.
Co-facilitator Denver user group Blog at  Code examples from this presentation.
Online Snapshots Disk-Based Backup Active Directory Tape-Based Backup SC DPM Up to Every 15 minutes Disaster Recovery with offsite replication and.
SD-B309 Session Objectives And Takeaways Check us out on Visit our blog: Watch us:
DC-B312 BitLocker Improvements in Windows 8 MBAM 2.0 Investment Areas and Key New Features Deploying MBAM 2.0MBAM 2.0 End User Experience.
Microsoft Virtual Academy. First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V Infrastructure (06)
Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
Amit Virmani Software Design Engineer Madhu Jujare Software Design Engineer.
Integrated Platform Virtual applications work like installed applications Virtual applications use Windows standards No dedicated drive letter.
Not what you are looking for? Head to another session now!
Software Update Groups Update Deployments Assign updates to clients Define when, where, how, who Update Packages.
Agenda Data center challenges Main central themes facing every IT decision maker today Overcome flat budgets Cope with relentless growth Meet increased.
Session Objectives And Takeaways Our Service Why Use the Portal?
WS-B327 Dynamic, policy-driven network (re)configuration Consistent, profile- based deployment of SDN traffic policies through distributed.
Complete your session evaluations today and enter to win prizes daily. Provide your feedback at a CommNet kiosk or log on at.

On Premises Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service) Storage Servers.
DC-B301 Agenda Can you afford not to Migrate? What is USMT 5.0?
ConfigMgr Environment 2007 Hierarchy 2007 Hierarchy (Simplified View)
High Density Virtualization Low Density or No Virtualization All features Unlimited virtual instances Processor-based license All features Two virtual.
Session Objectives And Takeaways Agenda Monitor and manage servers 30+ Azure Hosted Services 10 global data center facilities & 6 domains 110+
Level 300 Windows Server 2012 Networking Marin Franković, Visoko učilište Algebra.
Agenda Is your company using Windows Azure? Dev vs Ops and the Modern Application.
Presentation transcript:

Fluffy’s Safe Right?

If you want to limit a user’s functionality, don’t make them an administrator.

BILLION DOLLAR/EURO LAPTOP PROBLEM Europe Organizations +72,000 laptops lost ~1.79 Billion Euros United States Organizations +86,000 laptops ~2.1 Billion Dollars

HIPAA Breach: Stolen Hard Drives March 2012: Large Medical Provider in Tennessee paying $1.5 million to the US Dept. Health & Human Services Theft of 57 hard drives that contained protected health information (ePHI) for over 1 million individuals Secured by: Security Patrols Biometric scanner Keycard scanner Magnetic locks Keyed locks “71% of health care organizations have suffered at least one data breach within the last year” -Study by Veriphyr

Parent Partition Virtualization Service Providers (VSPs) Windows Kernel Server Core Virtualization Stack Device Drivers Hypervisor VM Worker Processes VMMS Service WMI Provider Virtual Machines Kernel Mode User Mode Virtualization Service Clients (VSCs) OS Kernel EnlightenmentsVMBus Guest Applications Provided by: Windows ISV Hyper-V APICMMU CPU Storage NIC VID Kernel Mode User Mode

Physical NIC Root Partition Extensible Switch Extension Protocol Extension Miniport Host NIC VM NIC VM1 VM NIC VM2  Capture extensions can inspect traffic and generate new traffic for report purposes  Capture extensions do not modify existing Extensible Switch traffic  Example: sflow by inMon  Windows Filter Platform (WFP) Extensions can inspect, drop, modify, and insert packets using WFP APIs  Windows Antivirus and Firewall software uses WFP for traffic filtering  Example: Virtual Firewall by 5NINE Software  Forwarding extensions direct traffic, defining the destination(s) of each packet  Forwarding extensions can capture and filter traffic  Examples: – Cisco Nexus 1000V and UCS – NEC ProgrammableFlow's vPFS OpenFlow Capture Extensions (NDIS) Windows Filter Platform (WFP) Forwarding Extensions Forwarding Extensions (NDIS) Filtering Engine BFE Service Firewall Callout

IPsec Task Offload: Microsoft expects deployment of Internet Protocol security (IPsec) to increase significantly in the coming years. The large demands placed on the CPU by the IPsec integrity and encryption algorithms can reduce the performance of your network connections. IPsec Task Offload is a technology built into the Windows operating system that moves this workload from the main computer's CPU to a dedicated processor on the network adapter. SR-IOV is a specification that allows a PCIe device to appear to be multiple separate physical PCIe devices. The SR-IOV specification was created and is maintained by the PCI SIG, with the idea that a standard specification will help promote interoperability. SR-IOV works by introducing the idea of physical functions (PFs) and virtual functions (VFs). Physical functions (PFs) are full-featured PCIe functions; virtual functions (VFs) are “lightweight” functions that lack configuration resources. Dynamic Virtual Machine Queue (VMQ) is a feature available to computers running Windows Server 2008 R2 with the Hyper-V server role installed, that have VMQ-capable network hardware. VMQ uses hardware packet filtering to deliver packet data from an external virtual machine network directly to virtual machines, which reduces the overhead of routing packets and copying them from the management operating system to the virtual machine.

Complete your session evaluations today and enter to win prizes daily. Provide your feedback at a CommNet kiosk or log on at Upon submission you will receive instant notification if you have won a prize. Prize pickup is at the Information Desk located in Attendee Services in the Mandalay Bay Foyer. Entry details can be found on the MMS website.