WCL312: Standard User Desktops with Windows Vista User Account Control (UAC) (WCL312) Alex Heaton Sr. Product Manager Chris Corio Program Manager.

Slides:



Advertisements
Similar presentations
IEs Protected Mode in Windows Vista TM January 20, 2006 Marc Silbey Program Manager.
Advertisements

This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Auditing Microsoft Active Directory
Managing User Settings with Group Policy
©2006 Microsoft Corporation. All rights reserved. Application Compatibility in Windows Vista and the Application Compatibility Toolkit Micheal Sciacqua.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
11.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 18: Configuring Application Restriction Policies
Application Repackaging - Naushad Ali T Doddamani.
Installation Requirements. Agenda Installation requirements Installation options Installing to correct folder locations Installing Windows resources Creating.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Ran Oelgiesser, Sr. Product Manager Praveen Vijayaraghavan, Program Manager (Virtual PC) Yigal Edery, Group Program Manager (MED-V)
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Virtual techdays INDIA │ august 2010 Testing & Fixing Applications on Windows 7 Sudhir Rao │ Solution Specialist, Microsoft Corporation.
Microsoft ® Official Course Module 9 Configuring Applications.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Hands-On Microsoft Windows Server 2008
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Week #7 Objectives: Secure Windows 7 Desktop
Raiders of the Elevated Token: Understanding User Account Control and Session Isolation Raymond P.L. Comvalius Independent IT Infrastructure Architect.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Testing Applications on Windows Vista TM Edited By Michael Shaw.
Managing User Desktops with Group Policy
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Support for Vista Unity 5.0(1)
Mark Aslett Microsoft Introduction to Application Compatibility.
Module 7 Configure User and Computer Environments By Using Group Policy.
Compatibility and Interoperability Requirements
Live Migration Failover Clustering with Cluster Shared Volumes (CSV) Support for new Processor features Improved Performance Lower Power Costs Enhanced.
Module 5: Configuring Internet Explorer and Supporting Applications.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Microsoft Management Seminar Series SMS 2003 Change Management.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
5 Lesson 5: Installing and Configuring Desktop Applications and Windows Store Apps MOAC : Configuring Windows 8.1.
Paul Cooke - CISSP Director Microsoft Session Code: CLI322.
WCL303 Business Desktop Deployment (BDD) 2007: Part 2, Deploying the 2007 Office system Michael Niehaus Systems Design Engineer Microsoft
Windows Vista: User Account Protection Securing Your Application with Least Privilege User Account Steve Hiskey FUN 406 Lead Program Manager, SBTU - Security.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Application Migration Fritz Ohman Alphageek
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Windows Vista Configuration MCTS : User Account Security.
Deployment Planning Services
Fix web app compatibility with Enterprise Mode
System Center 2012 Configuration Manager
A Fast Track into Device Guard
Device Guard: AppLocker on steroids
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Session Objectives And Key Takeaways
Best practices for packaging and distributing device drivers
Delivering great hardware solutions for Windows
Desktop App Assure Service Microsoft Representative Name June 7, 2019
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Windows Vista Client Manageability
User Account Control in Windows Vista
Presentation transcript:

WCL312: Standard User Desktops with Windows Vista User Account Control (UAC) (WCL312) Alex Heaton Sr. Product Manager Chris Corio Program Manager

Agenda Why be a Standard User How Windows Vista Makes it Easy Standard users can do more Application Compatibility Application and Driver Deployment Q&A

Microsoft Confidential User Account Control Challenges Windows Vista Solution Easier to Run as Standard User Users can do more on their own Change time zone, power settings, VPN, and more Install approved devices Admin commands clearly marked Higher application compatibility File and registry virtualization Greater Protection for Admins Software runs with lower privileges by default Administrator provides consent before elevation Most users run with full administrator privileges all the time At risk from malware Can’t manage desktops or enforce policy Expensive to support Difficult to run a standard user User can’t perform many tasks Many applications don’t run

Elevation Model Administrator Privileges Standard User Privileges (Default) Administrator Account Standard User Account Ways to Request Elevation Application marking Setup detection Compatibility fix (shim) Compatibility assistant Run as administrator

Total Cost Of Ownership Gartner found: Use Best Practices to Reduce Desktop PC TCO, Update 8 December 2005, Gartner, Inc. “…a locked and well-managed PC can save 40%.” “Fewer PCs will need a dispatched technician to try to remove a worm or recover or re-image a damaged system.” “All of that also means less end-user downtime and higher user productivity.” “The ‘locked and well managed’ profile assumes liberal use of tools, technology and processes for managing PCs...”

User Account Control

Agenda Why be a Standard User How Windows Vista Makes it Easy Standard users can do more Application Compatibility Application and Driver Deployment Q&A

Standard Users Can Do More View system clock and calendar Change time zone Configure secure wireless (WEP/WPA) connection Change power management settings Create and configure a Virtual Private Network connection Add printers and other devices that have the required drivers installed or allowed by IT policy Install approved ActiveX controls Disk defragmentation is a scheduled background process Shield icon consistently marks what actions a standard user can and cannot do

Agenda Why be a Standard User How Windows Vista Makes it Easy Standard users can do more Application Compatibility Application and Driver Deployment Q&A

Application Compatibility Initiatives Technologies added to Windows Vista to help applications run as a Standard User Application Compatibility Toolkit provided to help inventory and fix applications within environments. ACT 5.0 Release Candidate currently available Application Compatibility Factory available for outsourcing application compatibility and mitigation.

Helping Legacy Applications Run as Standard User Many applications would run fine as standard user, but they needlessly store data in HKLM\Software or %ProgramFiles% They use these locations for per-user data, not global data These locations are system-global and so only writeable by administrators It’s always worked because Windows users have always been administrators The solution: help them through virtualization Modifications of most system-global locations go to per-user areas Reads generally go to the per-user location and fall back to the global location

Virtualized Files Redirected file system locations: %ProgramFiles% (\Program Files) %AllUsersProfile% (\ProgramData – what was \Documents and Settings\All Users) %SystemRoot% (\Windows) %SystemRoot%\System32 (\Windows\System32) Exceptions: Files that have executable extensions (.exe,.bat,.vbs,.scr, etc) Prevents masking of system executables for servicing and security Exceptions can be added in HKLM\System\CurrentControlSet\Services\Luafv\Parameters \ExcludedExtensionsAdd Per-user virtual root: %UserProfile%\AppData\Local\VirtualStore Note: Virtual files do not roam with Roaming Profiles

File Virtualization Implementation File system virtualization is implemented in a file system filter driver, luafv.sys Luafv.sys Ntfs.sys Legacy Application User Mode Kernel Mode \Windows\App.ini \Users\ \AppData\Local\ VirtualStore\Windows\App.ini Vista Application \Windows\App.ini Access Denied

Registry Virtualization Redirected locations: HKLM\Software Exceptions: HKLM\Software\Microsoft\Windows HMLM\Software\Microsoft\Windows NT Other subkeys under Microsoft Per-user virtual root: HKEY_CURRENT_USER\Software\Classes\VirtualStore

Solving Application-Specific Issues Some applications have to be helped in other ways to run as Standard User If an application is broken ask the vendor for a fix!! Isolate to standard user compatibility issue Common application issues include: Unnecessary Administrator checks Registering a COM object to HKLM Writing to file or registry locations that are not virtualized Aaron Margosis highlights how to fix these problems in his blog:

Application Compatibility Toolkit Customer Target Medium/Large Businesses and Large Enterprises Mission A lifecycle management tool that assists in identifying and managing your overall application/device/computer portfolio, reducing the cost and time involved in resolving application compatibility issues, and helping you quickly deploy Windows Vista and Windows Updates. Strategy Help detect, diagnose, and mitigate compatibility issues found in Windows Vista Microsoft Compatibility Exchange to facilitate exchange of compatibility data between ISV/IHV, Microsoft, and customers Deliver tools that are timely and relevant to Windows releases

Developer and Tester Tools Standard User Analyzer Provides a way for testers to further test the LOB applications to determine what will fail as Standard User on Vista Internet Explorer Test Tool Provides a way for testers to further test the intranet web applications to understand the exact issue and determine which of their web applications will not work with IE 7 Setup Analysis Tool Detects issues such as WRP, installing of 32 bit kernel mode drivers, 16 bit components to flag any of your packages which could run into this issue Compatibility Administrator Helps IT Admins, Developers, Testers create and test compatibility shim/fixes (no code changes required)

Standard User Analyzer

Application Compatibility Factory Enterprises can have 1,000’s of custom apps, compatibility testing can take months, years Application Compatibility Toolkit helps ID scope of project Application Compatibility Factory partners will test and remediate your applications 5 global SIs are on board and ready to work with you now All already have deep expertise in application remediation ACF partner services focus on custom apps, scales to some ISV apps All receive customized, ongoing training from MCS application remediation experts

Agenda Why be a Standard User How Windows Vista Makes it Easy Standard users can do more Application Compatibility Application and Driver Deployment Q&A

Application and Driver Deployment Problem: Deploying protected machine-wide binaries requires Administrator privileges. Windows Vista Technologies for facilitating deployment: Group Policy Software Installation Device Management Infrastructure ActiveX Installer Service

Group Policy Software Installation Method for deploying MSIs within an enterprise MSIs can be assigned to users or groups using Group Policy On Demand installation through advertisement. Policy consists of product information being published in both AD and GP. Enterprises must create an inventory of their applications packaged as MSIs.

Managing Device Driver Installation Problem: In enterprises, Standard Users cannot install device drivers but need network printers. Device Management Infrastructure introduced in Windows Vista Configurable by Group Policy Allows Standard Users to install drivers Hardware-first install initiates automatic search for drivers

Device Driver Installation Policy Device Management Infrastructure policy is based on the driver location, signature, and device class guid. The Driver Store is a trusted cache of drivers on client machines Dynamic and updatable Windows Vista installs these trusted drivers as needed Device Drivers must be signed by a certificate in the Enterprise Trusted Publishers store. Device class must be enabled for Standard User installation using Group Policy in Driver Installation ADM.

ActiveX Installer Service Service built into Windows Vista because of extensive customer feedback. ActiveX controls are designed to install per-machine This requires administrator privileges. Packaging ActiveX controls into MSIs is expensive. Many enterprises do not have a full inventory of the controls that are used in their environment. No good pull-based solution for MSI deployment

ActiveX Installer Service is an optional Windows Component included in Ultimate, Enterprise(N), and Business SKUs. Manually enabling the service Control Panel ->Programs->Turn Windows Features on or off. Check the ActiveX Installer Service Service can be enabled within image Policy is configured using an Administrative Template in Group Policy. Enabling the ActiveX Installer Service

ActiveX Installer Service: Policy Installation Policy based on Host URL and signature of content Host defined by URL http or https (recommended) Cab file signature can be checked against enterprise Trusted Publishers store. ActiveX Controls can be deployed from a central server using CodeBaseSearch path. Attempt to install ActiveX control is audited.

ActiveX Installer Service

Agenda Why be a Standard User How Windows Vista Makes it Easy Standard users can do more Application Compatibility Application and Driver Deployment Q&A

Related Presentations Application Compatibility WCL201 \ WCLCT07 Windows Vista Application Compatibility and the Microsoft Application Compatibility Toolkit (ACT) 5.0 Device Driver Installation WCL314 Windows Vista Hardware and Device Management Windows Vista Security WCLCT03 Windows Vista Security and User Account Control (UAC)

Microsoft Confidential For More Information Windows Vista: User Account Control Blogs Download ACT 5.0 RC Now!! Device Management Documentation Step-by-Step Guide to Device Driver Signing and Staging: Step-by-Step Guide to Controlling Device Installation and Usage with Group Policy:

Ask The Experts Get Your Questions Answered You can find us at the Microsoft Ask the Experts area, located in the Exhibition Hall: Wednesday15 November10.15 – Wednesday15 NovemberLunch Thursday16 November14.45 – Thursday16 NovemberLunch

©2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.