System Center 2016 preview - novosti i novi featurei Matija Blagus, Acceleratio d.o.o. www.mblagus.net @matijablagus
Uvod u System Centar Služe za automatizaciju IT procesa u tvrtkama Virtual Machine Manager Operations Manager Configuration Manager Orchestrator Service Manager Data Protection Manager Technical Preview 3 (4 za Configuration Manager)
U povijest odlaze…. App Controller – zamjena Windows Azure Pack Citrix XenServer i VMware vCenter 4.1/5.1 podrška za Virtual Machine Manager – dodana podrška za VMware 5.5 i 5.8 Microsoft IT GRC (IT governance, risk management, and compliance) Process Management Pack SP1 for Service Manager – nema zamjene Server App-V support – koristiti templateove Service Manager Cloud Service Process Pack (CSPP) – zamjena Windows Azure Pack
U povijest odlaze…. Authoring Management Packs for Operations Manager with Visio – koristiti 3rd party MP-ove Service Reporting – zamjena Windows Azure Pack sa 3rd party alatima
Novosti u Virtual Machine Manageru Podrška za upravljanje guarded hostovima i shielded virtual mašinama Podrška za dodavanje Azure pretplate Konzistentni nazivi mrežnih adaptera End-to-end Quality of Service (QoS) za storage Podrška za storage tiering Podrška za Storage Spaces Direct SDN (software defined network)
4/25/2017 Any seized or infected host administrators can access guest virtual machines Fabric Hypervisor Customer Storage Host OS Guest VM Legitimate host? Impossible to identify legitimate hosts without a hardware based verification Tenants VMs are exposed to storage and network attacks while unencrypted © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
4/25/2017 Hardware-rooted technologies to separate the guest operating system from host administrators Any seized or infected host administrators can access guest virtual machines Virtual Secure Mode Process and Memory access protection from the host Host OS Customer Customer Virtual machine OS Data Workload Compute Storage Network Hypervisor Fabric Guest VM Guest VM Impossible to identify legitimate hosts without a hardware based verification Guarded fabric to identify legitimate hosts and certify them to run shielded tenant Generation 2 VMs Host Guardian Service Enabler to run Shielded Virtual Machines on a legitimate host in the fabric Trust the host Storage Tenants VMs are exposed to storage and network attacks while unencrypted Virtualized trusted platform module (vTPM) support to encrypt virtual machines Shielded VM Bitlocker enabled VM Hypervisor Hypervisor Fabric Fabric Host Guardian Service © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Shielded VMs Spotlight capabilities Storage 4/25/2017 Shielded VMs Spotlight capabilities Storage HOST without TPM (generic host) Virtual hard disk HOST with TPM Shielded Virtual Machines Shielded Virtual Machines can only run in fabrics that are designated as owners of that virtual machine Shielded Virtual Machines will need to be encrypted (by BitLocker or other means) in order to ensure that only the designated owners can run this virtual machine You can convert a running Generation 2 virtual machine into a Shielded Virtual Machine Host Guardian Service © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Novosti u Operations Manageru Maintenance Schedules Integracija sa Microsoft Operations Management Suite
Novosti u Data Protection Manageru Podrška za zaštitu mixed-clustera (Cluster Operating System Rolling Upgrade) Resilient change tracking (RCT) Poboljšanja u upravljanju CSV-ovima Poboljšani reporti (u slučaju da posjedujete i SCOM)
Cluster OS Rolling Upgrade Failover Cluster Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Cluster Functional Level = Windows Server 2012 R2
Cluster OS Rolling Upgrade Failover Cluster Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Cluster Functional Level = Windows Server 2012 R2
Cluster OS Rolling Upgrade Failover Cluster Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Cluster Functional Level = Windows Server 2012 R2
Cluster OS Rolling Upgrade Failover Cluster Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2016 Cluster Functional Level = Windows Server 2012 R2
Cluster OS Rolling Upgrade Failover Cluster Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2016 Cluster Functional Level = Windows Server 2012 R2
Cluster OS Rolling Upgrade Process Failover Cluster Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2012 R2 Windows Server 2016 Cluster Functional Level = Windows Server 2012 R2
Cluster OS Rolling Upgrade Failover Cluster Windows Server 2012 R2 Windows Server 2016 Windows Server 2016 Windows Server 2016 Windows Server 2016 Cluster Functional Level = Windows Server 2012 R2
Cluster OS Rolling Upgrade Failover Cluster Windows Server 2016 Windows Server 2016 Windows Server 2016 Windows Server 2016 Windows Server 2016 Cluster Functional Level = Windows Server 2012 R2
Cluster OS Rolling Upgrade Failover Cluster Windows Server 2016 Windows Server 2016 Windows Server 2016 Windows Server 2016 Windows Server 2016 Cluster Functional Level = Windows Server 2016
Cluster OS Rolling Upgrade Failover Cluster Windows Server 2016 Windows Server 2016 Windows Server 2016 Windows Server 2016 Windows Server 2016 Cluster Functional Level = Windows Server 2016
Novosti u Configuration Manageru Podrška za Windows 10 App management policies (Android 4+, iOS 7+) Podrška za Microsoft Azure virtualke Windows PE Peer Cache Servisiranje clustera Podrška za SQL Server AlwaysOn Nadogradnja MDM mogućnosti (conditional access)
Novosti u Service Manageru Poboljšani algoritmi za upravljanje zapisivanjem (kada workflowe koristi više korisnika) AD connector poboljšanja Poboljšanja performansi konektora
Zaključak Novi System Center ide u smjeru hibridnih scenarija Mogućnost upravljanja svim uređajima, bez obzira na lokaciju Naglasak na automatizaciji patchiranja sustava i smanjenje downtimea
Pitanja?
Hvala na pažnji!
© 2013 Microsoft Corporation. All rights reserved © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.