Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.

Slides:



Advertisements
Similar presentations
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Advertisements

Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
The future of Desktops Transform Your Desktop with Virtualization.
Content Overview Update Process Additional Tools.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
-How To leverage Virtual Desktop for Manageability & Security -Desktop Computing “as a service” Andreas Tsangaris CTO, PERFORMANCE
Information Security in Real Business
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Windows Vista: Volume Activation 2.0
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
System Center 2012 Configuration Manager Overview User Group June
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
CredoGov VDI Introduction James Gunn
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
IT:Network:Microsoft Server 2 Chapter 27 WINDOWS SERVER UPDATE SERVICES.
Randy Diddel A+ Certified Technician Apple Certified Associate-Mac Integration OS X ITIL Foundations v3 Mac Team Technical Support Analyst II UNM IT Workstation.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Kaseya Fundamentals Workshop Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 DAY FOUR.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Tim Vander Kooi Systems
Successful Deployment and Solid Management … Close Relatives Tim Sinclair, General Manager, Windows Enterprise Management.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Dell Connected Security Solutions Simplify & unify.
70-411: Administering Windows Server 2012
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Harris Schneiderman Account Manager Kloud Solutions.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
BASIC FUNCTIONALITY. Page 2 Agenda Main topics Policy Manager Communication Understanding communication Information flow Communication modules F-Secure.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
1 Management Information Systems NYC Human Resources Administration Richard Siemer – Deputy Commissioner MIS.
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
Microsoft Management Seminar Series SMS 2003 Change Management.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
R. Krempaska, October, 2013 Wir schaffen Wissen – heute für morgen Controls Security at PSI Current Status R. Krempaska, A. Bertrand, C. Higgs, R. Kapeller,
C C Introduction to Tivoli Endpoint Manager 8.2 Joe Saylor Tivoli Endpoint Manager Solutions Architect.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
System Center 2012 Configuration Manager Service Pack 1 Overview.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Self-service enrollment for Windows desktops
2016 Citrix presentation.
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
IT Management, Simplified
Presentation transcript:

Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation

Georgia Technology Authority 2 Dell Desktop Manager (DDM) Implementation Goal ▪Implement a single Desktop Management Console for all in scope agencies that provides software distribution, patch management, antivirus, asset inventory, remote control and data encryption to agency computing devices. ▪Implement an agent that will report hardware and software inventories and aid in delivering services such as AV and Data Encryption for all Win/Tel network connected client systems ▪Utilize collected data to scope technology refresh efforts and reduce duplicated effort Benefits ▪Aid in distribution of packaged applications (Software Distribution) ▪Provide Anti-virus support and reporting ▪Enable Patch compliance ▪Report on Software License compliance ▪Unified Asset Management

Georgia Technology Authority 3 3 Secure Data Transfer No VPN Requirement Smart Bandwidth Management Secure Data Transfer No VPN Requirement Smart Bandwidth Management Dell Modular Services Architecture Dell Modular Services are delivered from a secure, global data center network Customer Environment Network Operations Centers Dell Global Center Network Relay Point Desktop Laptop Tablet NOC Data Center NOC Agent Confidential – For Internal Use Only

Georgia Technology Authority 4 Key Benefits: Discover, inventory, track and manage distributed desktop and notebook computers to help reduce total cost of ownership while improving security, risk management, and compliance. Dell Asset Management Continuous control and visibility for distributed assets Comprehensive asset discovery & tracking Agent-less discovery of hardware components Set policies, find exceptions Simplified architecture planning Automatically discover, collect, and track distributed desktops and notebooks. Remotely scan and inventory Windows devices, providing visibility without introduction to that agent. Use policies and reports to identify security problems, and help enforce enterprise standards. Evaluate assets for hardware refresh or major software upgrades to help reduce costs and improve success rate. Works over the internet – doesn’t require mobile or remote assets to be connected to internal network or VPN. Visibility into remote assets Value Proposition: 4

Georgia Technology Authority 5 Key Benefits: 5 Help ensure security by automating patch management process for Microsoft ® Windows ®, and a variety of third-party applications. Patch Management Centralize and automate patch management Help ensure patch compliance Automate analysis, specify policies for deployment & distributions. Manage patches based on your IT needs. Force deployment of patches to all managed computers whether or not they are on the corporate network. Set policies that govern bandwidth usage at client or network level; control bandwidth consumption for one or all devices. As an optional service, Dell can remotely administer and monitor patch distribution based on best practices. Works over the internet – doesn’t require mobile or remote assets to be connected to internal network or VPN. Value Proposition: Patch-as-a-Service Flexible, customer- defined policy- based patch management Policy driven Bandwidth Management Simplified management of distributed environments

Georgia Technology Authority 6 6 Anti-Malware & Virus Management Improve security by enforcing virus and malware definition updates Protect your PCs and help ensure end-point security by centrally deploying Symantec ® and McAfee ® anti-virus software and updates for distributed desktop and notebook computers – whether or not they are on the corporate network. Protect your network by enforcing compliance on devices before they return to the corporate network. Works over the internet – doesn’t require mobile or remote assets to be connected to an internal network or VPN. Centrally monitor virus and malware infections, track update compliance, and identify known vulnerabilities. Centrally activate and track administrative scans on devices when needed to enable virus identification and quarantine. Centrally install software and upgrades without user involvement. Value Proposition: Simplified management of distributed environments Force scans to control outbreaks Network Protection and enforce compliance Track infections, find vulnerabilities Unattended install Key Benefits:

Georgia Technology Authority 7 7 Dell Laptop Data Encryption Centrally manage data encryption and data access for distributed computers Value Proposition: Key Benefits: Laptop Data Encryption helps ensure that critical and sensitive data stored on laptop and desktop PCs will not fall into the wrong hands – even if the PC does. Centrally enforce security policies for distributed clients. Helps ensure data stored on laptops and desktops stays encrypted (256 bit AES) even if the PC leaves the network. Encryption key is eliminated and data is made inaccessible under specific pre-set conditions. Trace location of lost machines with user and network data. No end user action required to encrypt or access data. Since applications and system files remain unencrypted, computer performance is not affected. Intelligent encryption Help locate lost laptops Remote security management Policy-based protection Transparent to end users

Georgia Technology Authority 8 Comprehensive Laptop Data Security When a laptop is lost, the data becomes inaccessible 8

Georgia Technology Authority 9 DDM - Data Points Page 1 1.What is the DDM doing? - The DDM will process hardware and software inventory requests on each asset. Anti-virus software and other Agency approved packages will be delivered via the tool. Sensitivity around network bandwidth is always our consideration and can be tailored to deliver install by TOD, and network bandwidth throttling can be used to manage utilization. The agent scans registry locations, file system, WMI database, and Add/Remove programs for software and hardware inventory.

Georgia Technology Authority 10 DDM - Data Points Page 2 2. Network impacts - Each client heartbeats every 15 minutes. The network payload break down is the following: ▪3 Kb for the SSL handshake ▪1 Kb for the agent system information sent to the server ▪2 Kb if there is nothing to do from the server to the agent ▪1-20 Kb if the server sends a task for the agent ▪What will be done to ensure network utilization is managed? ▪DDM will be moving software over the wire, naturally, bandwidth utilization is always a concern. We mitigate the impact of consuming network bandwidth by using a “Relay Point” framework. Systems can be used to store applications and/or patches to then send to a local system on the network. Moving application data closer to the asset frees up the internet pipe.

Georgia Technology Authority 11 How Relay Points Work Corporate Office /24 Adobe Apple Microsoft RIM Winzip Sun Apache Real Mozilla VMWare Citrix Skype Confidential – For Internal Use Only

Georgia Technology Authority 12 DDM – Data Points 3.Security – No local data is changed to accommodate agent. A folder is created on the c: (or other designated file system) to store control files related to the agent. 1.No PID information is inventoried from any asset 2.The Asset data is stored in a Server cluster at Dell Corporate. In the future PODS will exist through out the world. 3.Data is sent over the network encrypted!

Georgia Technology Authority 13 DDM Technology Architecture Client Manager Core Agent (SMA) Additional Components Patch Management AntiVirus Data Encryption Hosted Data Centers Data Centers Hosted Update Servers HTTP / HTTPS Communications Server Cluster Databases HTTP / HTTPS Client Systems Control Center HTTP/HTTPS Relay Point (optional) Remote Access Data Centers Symantec LiveUpdate Servers McAffee FTP / HTTP / HTTPS HTTP Secure Communications All communication through secure connections over existing network infrastructure. Normally network configuration changes are not necessary. All communications secure/encrypted & originate from Agent to the Data Centers.

Georgia Technology Authority 14 DDM - DDM Data Points Page 3 Summary plan for implementation Agency Discoveries – Completed! Determine distribution mechanism (login script, URL or netscan or all ) Provide DDM Installer information to local Agency contacts (agent, Login script, etc) – Completed! Deploy Login script into Novell and/or Active Directory Deliver agent installer to agency contacts and Pilot test on a few agency chosen machines; prior to wider deployment Provision Relay machines as needed per network capacity maps with agency contacts assistance Configure Patch Policy per Agency requirements Communicate with end users on AV Installation Deploy AV Package technology Deploy Data Encryption Software to designated Laptop users

Georgia Technology Authority 15