WCL317 Disclaimer The information in this presentation relates to a pre-released product which may be substantially modified before it’s commercially.

Slides:



Advertisements
Similar presentations
The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
Advertisements

The System Center Family Microsoft. Mobile Device Manager 2008.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Microsoft ® Exchange Online Migration and Coexistence Name Title Microsoft Corporation.
User State Virtualization Mobile Broadband Federated Search App-V MED-V PowerShell Deployment Tools IE8 Management Tools Deployment Tools App-V.
Connect with life Gopikrishna Kannan Program Manager | Microsoft Corporation
SEC316: BitLocker™ Drive Encryption
Visit our Focus Rooms Evaluation of Implementation Proposals by Dynamics AX R&D Solution Architecture & Industry Experts Gain further insights on Dynamics.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Windows 7 Training Microsoft Confidential. Windows ® 7 Compatibility Version Checking.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
WCL309. Demo.
Ran Oelgiesser, Sr. Product Manager Praveen Vijayaraghavan, Program Manager (Virtual PC) Yigal Edery, Group Program Manager (MED-V)
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.
Unified. Simplified. Unified Communications Launch 2007.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
System Center 2012 Configuration Manager Overview User Group June
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Delivering the Optimized Desktop Presented by Danny Beck, Leon Booth and Jeff Johnson.
Microsoft Desktop Virtualization 1 Martin Vittrup Senior Technology Specialist Windows Client Microsoft Denmark.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
Product Manager, Windows Client Robert Geller. Need to differentiate from competitors Customer complexity driving cost Need new growth strategies Difficult.
John “JG” Chirapurath Director, Identity & Security BG Microsoft SIA-205 Business Ready Security.
1 Windows 8 Briefing Developer Preview Build. 2 About this Presentation Statements about capabilities or benefits are subject to change Packaging and.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
DC-B312 BitLocker Improvements in Windows 8 MBAM 2.0 Investment Areas and Key New Features Deploying MBAM 2.0MBAM 2.0 End User Experience.
1 Windows Server 8 Developer Preview Build. 2 About this Presentation Statements about capabilities or benefits are subject to change Packaging and licensing.
MDOP MDOP 2011 Overview Daniel Sierra Account Technology Strategist |
13% of information workers say they use tablets at work… … but IT is aware of only 6% 916 M smart connected devices shipped in 2011; Forecasted to double.
V-Alliance Solution Overview Years of Business Success.
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
Flexible Workstyles Daniel von Büren, redtoo ag V-TSP; Senior Consultant / CTO.
OneDrive for Business Product recap and roadmap primer
David Kim Product Manager CLI306 Industry Trends Windows Vista Enterprise Flexible Desktop Computing Options Windows Vista Enterprise Centralized Desktop.
Microsoft Virtual Academy Windows Intune for IT Pros Jump Start M05: Windows Intune Policies David Tesar Richard Harrison.
WCL305. App and desktop virtualization Improved control and automation Reduced helpdesk costs Simplified PC management with cloud services and enhanced.
Windows 8 - Design & Management Daniel von Büren, redtoo ag V-TSP; Senior Consultant / CTO
Introducing Windows Intune
Jurgen Van Duvel Business Manager Windows Client Microsoft
MDOP Compatibility & Management Microsoft Application Virtualization (App-V) Microsoft Enterprise Desktop Virtualization (MED-V) Reduce Support Costs.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
The power of common identity across any cloud
Threat Management Gateway
Tech·Ed North America /13/2018 5:39 AM
MDOP: Advanced Group Policy Management 4.0
Rights Management Services (RMS)
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
Next-Generation Desktop Strategy Windows Optimised Desktop
Managing Specialized Devices With Windows Embedded Device Manager 2011
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
11/21/2018 4:57 AM SIA303 Advanced Persistent Threats (APT): Understanding the New Era of Attacks! Marcus Murray Security Team Manager, Microsoft MVP –
Microsoft Virtual Academy
Twenty Windows Tools You Never Knew Existed
TechEd /2/2018 5:42 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Virtual Academy
Enabling the hybrid cloud with remote access appliances
Top OS Deployment Issues With Answers from Experts
What's New in Microsoft Deployment Toolkit 2012 (MDT)
Building Business Applications in LightSwitch
TechEd /28/2019 3:22 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
System Center Marketing
Service Template Creation from the Ground Up
Microsoft Virtual Academy
6/5/2019 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Microsoft Data Insights Summit
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Virtual Academy
Presentation transcript:

WCL317

Disclaimer The information in this presentation relates to a pre-released product which may be substantially modified before it’s commercially released. The information contained represents the current view of Microsoft Corporation on the issues discussed as of the date of the presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of the presentation. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this presentation. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this information does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2010 Microsoft Corporation. All rights reserved.

Manage Risks with Enhanced Security Make People Productive Anywhere Reduce Costs by Streamlining PC Management Unified Lifecycle Management Streamlined Application DeliveryEnhanced Security and Protection Centralized Data Control and Compliance Anywhere Productivity Flexible Modern PC ( Virtualization for PC with local apps and data)

Protect and manage threats “Complete protection requires investments in both prevention and detection” Gartner Network Blog, 7/15/2010 Gartner Network Blog Secure access to resources “The majority of organizations consider roaming workers to be the weakest link... 65% reported … employees circumventing security features on their laptops. 45% reported... a security threat as a direct consequence of a roaming worker.“ ScanSafe Roaming Security Survey, 4/10ScanSafe Roaming Security Survey “…misconfigurations continue to be a larger source of attack openings than actual software vulnerabilities” John Pescatore, Gartner Network Blog 9/1/10 “We will have more granular control over identity and access, so we can start providing users with self-service capabilities and extend secure collaboration to our partners.“ Armand Martin, Enterprise Architect, Security, Dow Corning Identity and configuration management

Operating System Volume Removable Data Volumes Fixed Data Volumes

When a device gets lost, we need to report whether the data was encrypted. I need a simple way to check. The process of encrypting assets with BitLocker can be difficult. I need a simpler way to make it happen. Determining compliance can be difficult. I need an easy way to determine organizational compliance. When users lose keys to secured volumes, their productivity is blocked. We need a key recovery process. There is a large set of policy options for BitLocker. I’d like a simplified means to make the right choices.

Goals are: 1 Simplify provisioning and deployment 2 Improve compliance and reporting 3 Reduce support costs

How it works: 1 Before MBAM starts encryption, it verifies the computer is capable (make/model) 2 As new computers are identified in the org, they are added to the list on MBAM servers 3 Website allows IT pros to move computers from unknown to capable or not-capable state 4 When this feature is ON, only computers that are ‘capable’ will be encrypted

Recovery Password Data Compliance Data HTTPS MBAM Client Group Policy: AD, AGPM Key Recovery Service Helpdesk UX for Key Recovery Compliance Reports Central Administration Compliance Service

demo MBAM Client Group Policy: AD, AGPM

Need to know the last known state of a lost computer? Need to know how effective your rollout is? Or how compliant your company is? Who and when keys have been accessed and when new hardware has been added?

Search by: User or Computer Lets you know if a computer is compliant or not

Shows you the changes made through the Hardware Compatibility page Used when you enable Hardware Compatibility Management policy

Who has been requesting recovery information

MBAM Client Group Policy: AD, AGPM Compliance Data HTTPS Compliance Service Compliance Reports Central Administration demo

Recovery Password Data Compliance Data HTTPS MBAM Client Group Policy: AD, AGPM Compliance Service Key Recovery Service Helpdesk UX for Key Recovery Compliance Reports Central Administration demo

Server Requirements Administration Website & Web Services Windows 2008 Server w/ SP2; Windows 2008 Server R2; (x64|x86) Windows SKU’s: Standard, Enterprise, Data Center, or Web Server Web Server Role (Internet Information Services (IIS)) Application Server Role (ASP.NET, etc.) Microsoft.NET Framework version 3.5 SP1 Database Server SQL Server 2008; SQL Server 2008 R2 (Standard, Enterprise, Datacenter) Encrypted Database (TDE) requires Enterprise or Datacenter Hardware Requirements Min requirements for Windows and SQL Server will be satisfactory for all components Disk Foot Print: < 10MB on Server and Client Roles Performance: Minimal over time on Server and Client Roles; + BitLocker Final hardware requirements to be determined Client Requirements Windows 7 Enterprise or Ultimate Hardware Requirements TPM v1.2 for O/S encryption

MDOP Compatibility & Management Microsoft Application Virtualization (App-V) Microsoft Enterprise Desktop Virtualization (MED-V) Reduce Support Costs Microsoft System Center Desktop Error Monitoring (DEM) Microsoft Diagnostics and Recovery Toolset (DaRT) Improve Asset Management Microsoft Asset Inventory Service (AIS) Improve Policy Control Microsoft Advanced Group Policy Management (AGPM)

Sessions On-Demand & CommunityMicrosoft Certification & Training Resources Resources for IT ProfessionalsResources for Developers Connect. Share. Discuss.

Scan the Tag to evaluate this session now on myTechEd Mobile