POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.

Slides:



Advertisements
Similar presentations
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 3 Configuring the Windows Server 2008 Environment.
Advertisements

Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Objectives  Understand the purpose of the superuser account  Outline the key features of the Linux desktops  Navigate through the menus  Getting help.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
What are computers? Computers are machines that perform tasks or calculations according to a set of instructions, or programs. The first fully electronic.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
GROUP POLICY An overview of Microsoft Windows Group Policy.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Hands-On Microsoft Windows Server 2008
Tutorial 11 Installing, Updating, and Configuring Software
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Good Afternoon and Thank You!.  Have some Fun!  Learn at least one thing new!  Make myself available to you So please …  Ask questions and enjoy!
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Chapter Fourteen Windows XP Professional Fault Tolerance.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
1 Chapter Overview Configuring and Troubleshooting the Display Configuring Power Management Configuring Operating System Settings Configuring and Troubleshooting.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
PC MANAGER MEETING January 23, Agenda  Next Meeting  Training  Windows Policy  Main Topic: Windows AV Service Review.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
Windows Defender. What is Windows Defender? Windows Defender is a free program that helps protect your computer against pop- ups, slow performance, and.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Microsoft Management Seminar Series SMS 2003 Change Management.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Managing Applications, Services, Folders, and Libraries Lesson 4.
NetTech Solutions Protecting the Computer Lesson 10.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
1 Windows 2008 Server Manager. 2 Server Manager Gives ability to perform effectively server administration without needing to launch a multitude of tools.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Module 2: IT Professionals in an Enterprise. IT Professional Roles IT Management and Processes Professional Development for IT Professionals.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Chapter Objectives In this chapter, you will learn:
Module 9: Preparing to Administer a Server
InGenius Connector Enterprise Microsoft Dynamics CRM
Installing Software Tutorial 11.
Dynamic Web Page A dynamic web page is a kind of web page that has been prepared with fresh information (content and/or layout), for each individual viewing.
Securing Windows 7 Lesson 10.
PLANNING A SECURE BASELINE INSTALLATION
Module 9: Preparing to Administer a Server
Agenda The current Windows XP and Windows XP Desktop situation
Bethesda Cybersecurity Club
Presentation transcript:

POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use set of software tools from Microsoft that lowers the cost of owning and operating shared computers by making them less susceptible to user tampering, more resistant to spyware and viruses, and more reliable as a result. Target Audience (s) -People who manage computers in school computer labs, public libraries, community technology centers, Internet cafes, and other public places where computers are shared by potentially untrusted users. The role of our target audience varies according to organization size. In a small environments this person is likely to be a someone with little tech background; in mid-sized environments a tech coordinator or network admin; in large environments an engineer or IT manager. -Schools, libraries, CTCs, and i-cafes with workgroup computers (not part of a Windows Server domain), “shared” user accounts (each user does not get a unique account), and limited IT resources; a component of the Toolkit will be positioned as an enterprise solution -The Toolkit will not be positioned as a parental controls solution and will not be marketed to the consumer market -The Toolkit will not be positioned as an enterprise solution for the structured task worker scenario -The Toolkit will be positioned as an entry level solution for customers struggling with desktop management in shared environments Current Perceptions -It is difficult and costly to configure Windows XP properly for shared computers -Windows XP is especially susceptible to spyware, viruses, and user tampering in shared environments -As a result, Windows XP shared computers are not as reliable as customers expect them to be -As a result, Shared computer maintenance and upkeep is costly and time consuming -Customers would like to have an integrated solution from one company rather than the several “point” solutions on the market today Metric -Low perceived Windows XP reliability in shared environments -Low customer satisfaction with Windows XP in shared environments Metric Definition To be measured for the first time as part of the product launch: -Reliability: perceived up-time in relation to the amount of time spent configuring and troubleshooting a shared computer -Customer satisfaction: overall customer satisfaction with Windows XP as an OS for shared computers Core Scenarios Restrict shared computer users so they have limited access to the system Defend shared computers against unauthorized changes to the hard disk Enhance user privacy and improve the user experience on shared computers Customer issues -End users who change system settings and delete critical files make shared computers difficult to manage -It is very difficult to restrict shared computer users with existing tools & techniques (policy & registry editors) -Windows XP has to be frequently re- installed because Spyware, viruses, and user tampering bog down shared computers over time -Customers are experimenting with expensive 3 rd party solutions for “protecting” Windows from these threats -It is difficult to protect the privacy of end users because Windows is optimized for personal use -It is difficult to create a streamlined user interface that is easy for inexperienced people to use Differentiated Benefit The easiest and most comprehensive way to configure restricted local user profiles for shared computers Hard disk protection technology that integrates with Microsoft critical update technologies and anti-virus signature updates The easiest and most comprehensive way to protect the privacy of, and improve the experience for end users Microsoft Shared Computer Toolkit for Windows XP Positioning & Messaging Framework

POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit for Windows XP is an integrated, effective, and easy-to-use set of software tools which lowers the cost of owning and operating shared computers by making them less susceptible to user tampering, more resistant to spyware and viruses, and more reliable as a result. 25 Word Description The Microsoft Shared Computer Toolkit for Windows XP is an effective, integrated, and easy-to-use set of software tools that will help operators set up, safeguard, and manage reliable shared computers. The tools will ultimately save operators time. (29 words not including the really long name) 50 Word Description The Microsoft Shared Computer Toolkit for Windows XP is an effective, integrated, and easy-to-use set of software tools that will help make it easy to set up, safeguard, and manage reliable shared computers. Specifically, it helps operators create restricted local user profiles, defend shared computer against unauthorized changes to the hard disk, and enhance the user experience. The tools will ultimately save operators time. (56 words not including our really long name) 100 Word Description The Microsoft Shared Computer Toolkit for Windows XP is an effective, integrated, and easy-to-use set of software tools that will help make it easy for anyone to set up, safeguard, and manage reliable shared computers. Specifically, the Toolkit helps operators create restricted local user profiles so users have limited access to system utilities and data, defend shared computer against unauthorized changes to the hard disk by clearing changes (including viruses and spyware) each time the computer restarts, enhancing the privacy of users by clearing session information each time a new user logs on, and improving the user experience by simplifying the user interface. (95 words not including our really long name) Positioning & Messaging Framework (Page 2/2) Key Messages/ Cases (with Competitive Differentiation) -Effective tools that restrict local users from system utilities and prevent them from changing system settings or running unauthorized software -Easy to use even for people without formal IT training (no more policy or registry editors) -New MS technology that defends shared computer hard disks from unauthorized changes (changes are cleared every time the computer restarts) -Integrates with Microsoft critical update services and anti-virus signature updates -Protect the privacy of users -Simplify the user interface and remove unneeded functionality -New tool that lets users easily enable and disable accessibility features Support -Built by the company that knows Windows and local group policy best -Restrict access to Control Panel, command prompt, registry editor, etc. -Control what software users run -Clear and concise user interface with supporting operator hand book -Spyware, viruses, other changes to hard disk are cleared when computer restarts -Operator can elect to save authorized changes (new software, updates, etc) -Critical updates can be scheduled to happen automatically -Session info (Internet history, my documents, desktop settings) are refreshed each time a new user logs on -Web UserIDs and Passwords are not cached Customer Evidence -Features proven to be effective in penetration testing -Ease of use thoroughly tested in usability tests and beta program with over 45 customers -Disk protection technology is proven to help protect against viruses, spyware, and user tampering in penetration and beta testing -Auto updates thoroughly tested -Privacy and user interface improvements have been proven to work in the beta program -Accessibility tool consolidates all feature in one place