320 likes | 522 Views
Desktop and Device Management Andy Taylor – Andy.Taylor@microsoft.com Susan Smith – Susan.Smith@microsoft.com. Agenda. Introduction System Center 2012 Configuration Manager Windows Intune Close. System Center 2012 Configuration Manager. SYSTEM CENTER 2012 CONFIGURATION MANAGER.
E N D
Desktop and Device Management Andy Taylor – Andy.Taylor@microsoft.com Susan Smith – Susan.Smith@microsoft.com
Agenda Introduction System Center 2012 Configuration Manager Windows Intune Close
SYSTEM CENTER 2012 CONFIGURATION MANAGER Empower Users Unify Infrastructure Simplify Administration Empower people to be more productive from almost anywhere on almost any device. Reduce costs by unifying IT management infrastructure. Improve IT effectiveness and efficiency.
NEED FOR NEW APPLICATION MODEL Your end-users are changing – and apps are what they use to do work • Ultra mobility • Lots of devices • New generation with new expectations Your apps are changing • AppV • SaaS • Datacenter hosted (VDI, remote/seamless apps) • Mobile apps/catalogs Traditional Model User Centric Model Management Server
Application Model • Manage applications; not scripts • Application Management: • Detection method – re-evaluated for presence: • Required application – reinstall if missing • Prohibited application – uninstall if detected • Requirement rules – evaluated at install time to ensure the app only installs in places it can, and should • Dependencies – relationships with other apps that are all evaluated prior to installing anything • Supersedence – relationships with other apps that should be uninstalled prior to installing anything • Update an app – Automatic revision management
7 Mobile Device Management Light Management • EAS-based policy delivery • Discovery and inventory • Settings policy • Remote Wipe NOKIA • Secure over-the-air enrollment • Monitor and remediate out-of-compliance devices • Deploy and remove applications • Inventory • Remote wipe Depth Management • (WinCE 5.0, 6.0; Windows Mobile 6.0, • 6.1, 6.5.x)
DEMO APPLICATION MANAGEMENT
WHAT IS USER DEVICE AFFINITY (UDA)? • Key feature to help move to User Centric Application Deployment • Provides the ability to define a relationship between a user and a device, then leverage this in app deployment • Ensure the application is not installed everywhere the user logs on • Change the “deployment type” based on UDA • Predeploy to systems when the user is not logged in for workgroup and after-hours deployments • Configuration Manager 2012 supports: • Single primary user to primary device • Multiple primary devices per user • Multiple primary users per device < Windows Embedded
APPLICATION CATALOG • Administrators publish software titles to catalog, complete with meta data to enable search • Deliver best user experience on each device IT • Users can browse, select and install directly from Catalog • Application model determines format and policies for delivery User
DEMO INSTALLING SOFTWARE FROM APPLICATION CATALOG
SIMULATE APPLICATION • Goal – build trust in moving to state based dynamic applications • Did I do detection method right? Did I get rules/relationships right? What will my deployment type mix be? • What it does - runs application as required in “rules only” mode • No content download, no execution of deployment type • Results – what would the system have done? • Processes detection method, requirement rules, dependencies and supersedence • Does NOT simulate the install! • Guidance • Run for an app, then delete – these rules are processed ongoing and will impact scale/perf • It’s a REAL piece of policy – so may collide with other inflight policies • Preflight deploy a superseding application – may have impact on user experience and compliance reporting
DEMO SIMULATE APPLICATION DEPLOYMENT
Role-Based Administration • Central management for security • Role-Based Administration lets you map the organizational roles of your administrators to defined security roles: • Removes clutter from the console • Supports “Show me what’s relevant to me” based on my Security Role and Scope
CLIENT STATUS Goal -> Enable Administrators to monitor the activity and status of ConfigMgr client computers in their hierarchy. Following two methods have been used to evaluate the overall status of client computers they are managing • Client Activity: Monitored from the Server:Configure thresholds to determine if a client is active • Client Check: Monitored from the Client:A client evaluation engine is installed with the ConfirMgr client, which periodically evaluates its health and state of dependencies. This engine can also remediate some problems with the client.
SOFTWARE UPDATES • Auto Deployment Rules • Use filter to identify class of updates to automatically deploy: category, products, language, date revised, article id, bulletin id, etc. • Schedule content download • State-based Update Groups • Deploy updates individually or in groups • Updates added to an update group automatically deploy to collections targeted with the group
SYSTEM CENTER 2012 ENDPOINT PROTECTION Easy to setup and operate the management infrastructure Unified Infrastructure Simplified deployment of antimalware policies Automated deployment of updates using ConfigMgr infrastructure Easy client install and migration Reduce the cost of maintaining secure endpoints with unified management and security infrastructure
SETTINGS AND COMPLIANCE MANAGEMENT ConfigMgrMP Baseline ConfigMgr Agent Auto Remediate OR Create Alert Deploy baselines to collections Baseline drift ! • Improved functionality • Copy settings • Trigger console alerts • Richer reporting • Enhanced versioning and audit tracking • Ability to specify versions to be used in baselines • Audit tracking includes who changed what • Pre-built industry standard baseline templates through IT GRC Solution Accelerator Baseline Configuration Items Active Directory Script WMI XML SQL File Software Updates Registry MSI IIS
REPORTING EXPERIENCES Report Manager (Web) Report Viewer (in-console)
REMOTE CONTROL • What's New in Remote Control • Ability to send Ctrl-Alt-Del keystroke to host device • Able to traverse the all Windows Secure Desktop modes • Winlogon, SAS, UAC, Locked screen, • Granular client settings per collection • Lock keyboard and Mouse • Ability to create Firewall exception rule • Ccmeval monitors and remediates Remote Control Service
Unified Management; On-Premise and from the Cloud Active Directory
Windows Intune WINDOWS INTUNE
MANAGE, SECURE PCS AND DEVICES ANYWHERESimple Web-Based Administration Console and a friendly IW experience • Help protect PCs from malware • Manage updates • Distribute and consume software • Proactive monitoring and alerts • Provide remote assistance • Inventory hardware and software • Monitor & track licenses • Increase insight with reporting • Set security policies
MOBILE CAPABLITIES • Unified experience across all devices • Automatic discovery of mobile devices that access Exchange • Single console to manage computers and mobile devices • User centric views for device inventory • Protect corporate data on mobile device • Deploy Active Sync policies to user groups (password, encryption…) • Define mobile device access rules by device family/model • Remove mobile devices that access Exchange (with option to wipe) • IW empowerment through mobile LOB apps • Hosts & target in-house mobile apps to user groups (e.g. corp app store) • Provide mobile self-service to download mobile apps or contact IT
LOGICAL ARCHITECTURE MICROSOFT CLOUD ON-PREMISE INFRASTRUCTURE IDENTITY CLOUD INFRASTRUCTURE (MSODS) Sync AD user data into the cloud ACTIVE DIRECTORY Sync managed users to Windows Intune Sync mobile devices for managed users Apply EAS policies or remediation tasks Policy/Config ActiveSync EXCHANGE WINDOWS INTUNE EXCHANGE CONNECTOR
POLICY TRACKING • Track compliance against policies • Unified Policy status across PCs and mobile devices • Consistent look and feel for device settings report • Policy status for User groups and individual users • Display # of users who have devices with policy issues • Drill down into users and their devices with issues • Noncompliance action for mobile device • Reports if email access has been allowed or denied to non-compliant devices
APP MANAGEMENT • Publish • The IT administrator uploads in-house apps to Windows Intune • The IT administrator deploys each app, specifying which targeted user groups have access to each app • Consume • Information workers sign in to the Windows Intune company portal using their corporate credentials • In the mobile portal, information workers can do the following: • View a detailed list of available apps • Download an app • Contact IT (in case of a problem) • Track • The IT administrator tracks app adoption, using the aggregated and detailed statistics provided by Windows Intune
DEMO WINDOWS INTUNE
Device Management Key Points User Centric Management Applications that user needs them on the multiple devices they use User empowerment Public and Private cloud Management Windows Intune System Center 2012 Configuration Manager Manage all your devices
Next Steps Download and Evaluate More Resources Microsoft System Center 2012:http://www.microsoft.com/en-us/server-cloud/system-center/default.aspx Windows Intune: Current version - http://www.microsoft.com/en-us/windows/windowsintune/try-and-buy.aspx Try the next version - https://account.manage-beta.microsoft.com/Signup/MainSignUp.aspx?OfferId=1A981431-C1CF-1C28-4936-3F8229EC1411&ali=1 System Center Marketplace: http://systemcenter.pinpoint.microsoft.com Blogs: http://blogs.technet.com/systemcenter http://social.technet.microsoft.com/wiki/contents/articles/7075.system-center-2012-configuration-manager-survival-guide-en-us.aspx
Some information relates to pre-released product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here