Secure management of Infrastructure
IT Complexity And Cost
Enterprise IT Challenges Growth Customer service Regulatory compliance Mobility Varying skill sets PC maintenance Server consolidation Legacy platforms Identity management Software updates Malicious attacks, viruses, spam, etc. Evolving threats Patch management, VPN, etc. Secure access (employees, partners and customers)
Solving The Challenge: Infrastructure Optimization
How Do You Get There? Infrastructure Optimization Model Cost Center Uncoordinated, manual infrastructure More Efficient Cost Center Managed IT Infrastructure with limited automation automation Managed and consolidated IT Infrastructure Infrastructure with maximum automation Fully automated management, dynamic resource Usage, business linked SLA’s Business Enabler Strategic Asset * Based on the Gartner IT Maturity Model
Full Lifecycle Lifecycle
Improved system compliance with business and IT policies Lower Cost, Higher Productivity Reduced time and effort required to troubleshoot and maintain code Increased responsiveness to changing business demands
Knowledge Across The Lifecycle
What is the Destination? Dynamic Systems Initiative Dynamic Systems will result in reduced costs, improved reliability, and increased responsiveness across the entire IT life cycle
Microsoft’s Dynamic Systems Initiative Core Technical Principles SW platforms and tools that enable… Knowledge of an IT System: Designer’s intent Operational environment Governing IT policies Associated end user experience To be captured in… Software Models MOM Management Packs System Definition Model That can be created, Modified and operated on… Across the IT lifecycle Develop, Operate, Analyze/Act
Enhancing Processes Microsoft Operations Framework (MOF) and ITIL Microsoft through MOF defined many ITIL principles MOF applies ITIL to Microsoft products MOF and ITIL provide common IT Service Management taxonomy MOF makes Microsoft ITIL-Compliant MOF is a foundation to comply with SarbOx, HIPPA, ISO, and other best practice compliance MOF makes ITIL actionable on the Microsoft Platform ITIL ®
Managing Systems Reality Models Policy Optimizing Supporting Operating Changing ITIL/MOF workflows
Managing Systems Models Policy Operational systems share data & synch with reality: deployment, policy, discovery, service level, compliance Ought-ness Is-ness Models and policy synched with data stores in operational systems There is no single store. It is federated It is replicated It is partitioned It is pervasive
Managing Systems Ought-ness Is-ness Data Warehouse Operational systems feed data warehouse, and use its data Was-ness
Managing Heterogeneity Business and Support Systems Enterprise Management Systems Business Users Heterogeneous Ops MCF Direct Reporting Manager Windows-centric operators SQL OLAP non-Windows systemsWindows-based systems Partner Extension
Infrastructure Optimization IT staff taxed by operational challenges Users come up with their own IT solutions IT Staff trained in best practices such as MOF, ITIL, etc. Users expect basic services from IT IT Staff manages an efficient, controlled environment Users have tools they need, high availability, & access to information IT is a strategic asset Users look to IT as a valued partner to enable new business initiatives IT processes undefined High complexity due to localized processes, & minimal central control Central Admin & config of security Standard desktop images defined, not adopted company-wide SLA’s are linked to business objectives Clearly defined and enforced images, security, best practices (MOF, ITIL) Self assessing & continuous improvement Information easily & securely accessed from anywhere on Internet Patch status of desktops is unknown No unified directory for access management Multiple directories for authentication Limited automated s/w distribution Automate identity and access management Automated system management Self provisioning and quarantine capable systems ensure compliance & high availability
Technology View of Model
Technology View of Model One Example Limited Infrastructure Lack of standardized security measures Ad hock management of system configuration Limited to no monitoring of infrastructure Defense-in-depth security measures widely deployed Anti-malware protection (i.e. spyware, bots, rootkits, etc.) Firewall enabled on desktops, laptops & servers Secure wireless networking Service level monitoring on desktops IPSec used to isolate critical systems Automated patch management (WU, Update Services, SMS) Edge firewall with lock-down configuration Standardized antivirus solution Firewall enabled on laptops New systems limited to those supported by IT Defined set of standard basic images Security updates for both clients & servers Application compatibility testing Client & server firewall mitigations Application and image deployment Server operations Reference image system Security event correlation Automated, central management of:
Technology View of Model One Example Limited Infrastructure Lack of standardized security measures Ad hock management of system configuration Limited to no monitoring of infrastructure Zero touch deployment Defense-in-depth security measures widely deployed Anti-malware protection (i.e. spyware, bots, rootkits, etc.) Firewall enabled on desktops, laptops & servers Secure wireless networking Service level monitoring on desktops IPSec used to isolate critical systems Security updates for both clients & servers Light touch or Zero touch deployment. Application and image deployment Automated patch management (WU, Update Services, SMS) Secure and optimized messaging infrastructure Edge firewall with lock- down configuration Standardized antivirus solution Firewall enabled on laptops New systems limited to those supported by IT Defined set of standard basic images Application compatibility testing Client & server firewall mitigations Server operations Reference image system Security event correlation Automated, central management of: Standardized Desktop images, not more than 2 versions of Windows or Office. Version of the OS or Office is N or N-1 Multitude of Desktop images, more than 2 versions of Windows or Office and/or older than N minus-2 Standardized modern Desktop images. Version of Windows or Office is N or N-1 Standardized modern Desktop images. Version of the Windows or Office is N. Desktop is key portal for business integration.
Technology View of Model One Example No server- based identity or access management Users operate in admin mode Limited or inconsistent use of passwords at the desktop Minimal enterprise access standards Active Directory for Authentication and Authorization Users have access to admin mode Security templates applied to standard images Desktops not controlled by group policy Active Directory group policy and Security templates used to manage desktops for security and settings Desktops are tightly managed Centrally manage users provisioning across heterogeneou s systems
Technology View of Model One Example Local user data stored randomly and not backed up to network Any backup happens locally No user state migration available for deployment Untested recovery Each server backed up to tape Standards for local storage in “My Docs” but not redirected or backed up Any backup happens at workgroup level Backup/restore on critical servers Some automation of user state migration available for deployment Tested recovery for Mission critical Users store data to “My Docs” and synched to server Backup managed at company level Backup/restore of all servers with SLAs User state is preserved and restored for deployment Tested recovery Mission critical & application data LAN based back- ups Self managed backup and restore on all servers and desktop data with SLAs SAN based back- ups with snapshots D2D technology
Technology View of Model One Example Running N-1 or N-2 versions of Exchange Secure web mail with integrated junk mail filter, S/MIME support and HTML content blocker Use an application-layer firewall to pre- authenticate web mail users before they reach the mailbox server Unified directory infrastructure for access and messaging Block SPAM at gateway and mailbox store Server anti-virus that uses multiple scanning engines Robust health monitoring and more proactive resolution of issues Security of mobile devices including remote reset and remote wipe Detect potential service outages and receive alerts in advance
Where our customers are today Cost Center Uncoordinated, manual infrastructure More efficient Cost Center Managed IT Infrastructure with limited automation automation Managed and consolidated IT Infrastructure Infrastructure with maximum automation Fully automated management, dynamic resource Usage, business linked SLA’s Business Enabler Strategic Asset 64% 31% 3% 2%
Infrastructure Optimization Model in Action Sample Customer Assessment Desktop Infrastructure Server Infrastructure Change Management Operations Management Asset Administration Customer Service Technology Planning & Process Management Overall Rating
Solutions for the Journey Sample Microsoft solutions Business Desktop Deployment Solution Accelerator V 2.5 Microsoft Infrastructure deployment and migration Solution Accelerators Microsoft & partners infrastructure optimization services Application Compatibility and Active Directory Migration Toolkits Microsoft Operations Framework service delivery solutions
Infrastructure Costs Complexity 1994 Client Server N - Tier Dynamic Systems IT Complexity & Cost Support Management Costs $$ DSI – reducing TCO by building in experience
Desktop Cost Savings-The Most Obvious Benefit Hardware / Software Total Direct Costs Total Direct Costs End User Productivity & Downtime (Indirect Cost) Total TCO Administration Operations$1,246 $261 $424 $1,931 $1,217 $3,148 $1,354 $774 $428 $2,556 $2,952 $5,508 $1,333 $542 $426 $2,301 $2,265 $4,566 30% 52% 17% 31% 10% 16%
Deployment costs have Declined… Relative cost reductions shown reflect actual costs per seat, as reported by various Microsoft deployment partners. Individual customer experiences may vary depending on level of automation and testing. Costs experienced in prior upgrade of Microsoft Office Previous Upgrade Costs for current upgrade anticipated to be the same Significant drop in actual costs Office Costs per Desktop Actual current cost of automated upgrade Actual current cost of manual upgrade manual upgrade
© 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.