Your SlideShare is downloading. ×
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Canada Windows 7 Tour
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Canada Windows 7 Tour

1,750

Published on

Presentation to the Calgary, Winnipeg and Vancouver user groups

Presentation to the Calgary, Winnipeg and Vancouver user groups

1 Comment
0 Likes
Statistics
Notes
  • You should know that Information is for everybody. You should not disable download link. When someone shares with you something of value, you have an obligation to share it with others!
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total Views
1,750
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
1
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • The Springboard Series program was developed in response to primary research conducted with IT Pros worldwide (direct interviews, focus groups) and key MS field roles (TSPs, ATSs, ITEs, PAMs, TAMs, Architects). The findings fell into two areas—the need to make learning about how a new OS environment directly impacts the IT Pro more consumable (and the messages more relevant), and how the mis-handling of Vista to this audience has cost us in poor NSAT and perceptionsTo remedy this situation, the Win Client IT pro audience developed a program to provide the right information, at the right technical level, at the right point in the adoption lifecycle, and to do so in a frank, open and honest tone. This program has two major components—a breadth effort that touches IT pros directly (through Technet and related properties), and a depth component that supports field and partner engagements
  • UAC was introduced in Windows Vista to help provide customers more control of their system by enabling IT administrators to lock down the system for certain users by running them within standard, non privileged user accounts and to influence the ecosystem to write software that does not need administrative rights. Transitioning the ecosystem to create software that does not require administrative changes to the machine is a very good thing for overall reliability of the machine as well as for the overall security of the machine since it limits the potential damage. UAC has delivered successfully on this in the Windows Vista timeframe and customers continue to value the ability to create a standard user and be confident an administrator can make the decisions on what software is added to the system and what changes should be allowed. However, we have received substantial feedback about the number of notifications for change. In Windows 7, we have invested in addressing the key customer feedback around UAC, while still maintaining the ability for IT administrators to be confident about a standard user environmentand still maintaining the influence on the ecosystem to create software that does not require administrative rights.We have enabled the Windows operations that users do often to be done in a standard user environment with the goal of providing prompt free daily activities. For example, a standard user can now adjust the readability of the screen (dpi) without having to change it for the entire system. Additionally, we have reduced key duplicate notifications for common activities such as installing applications from IE. We have also made it easier for IT to look at key setting on the system without needing administrative privileges by refactoring many of our control panel applications into read only and write sections.In line with our overall Windows 7focus on user-in-control, we have enabled a person running as a protected administrator to determine the range of notifications s/he receives. Based on customer feedback and actual instrumented data from our customers’ response to UAC prompts, we default the initial setting for UAC such that administrators are notified when software other than Windows is requesting to change the overall system and such that standard users will receive a request for administrator authorization for any change to the overall system. We believe this default setting has the right balance of establishing an ecosystem where a broad range of ISV software can be run in a standard user environment while providing administrators with control over the experience of configuring Windows.
  • Transcript

    • 1. Welcome to Windows 7, eh?
      Stephen L Rose
      Worldwide Community Manager – Windows Client
      stros@microsoft.com
      http://microsoft.com/springboard
      Blog- http://windowsteamblog.com
      Twitter- @stephenlrose / @MSspringboard
    • 2. Agenda
      Who Am I?
      Resources, Resources, Resources
      Windows 7 Overview
      Windows 7 Anywhere
      Security and Control in Windows 7
      Windows 7 Deployment
      Wrap-up
    • 3. What is the Springboard Series?
      To the IT pro, our goal is:
      • Be the definitive resource for Desktop IT pros
      • 4. Open, honest; show don’t tell
      • 5. Information at right time, right level across Adoption Lifecycle
      Inside of Microsoft we are:
      • A turnkey IT pro engagement platform for depth & breadth
      • 6. The program to mobilize MS marketing & field to focus on desktop OS IT pros
      The Springboard Series IT pro experience offers dynamic content and structured guidance across the adoption lifecycle
      Weekly, Monthly and Quarterly Rhythm of Topical Content
      one-Windows TechCenter in 10 languages
      Straight-talk Monthly Feature Articles & Overview Guides
      IT Pro adoption days Event Kits (Win 7 updates) and messaging
      Weekly Targeted IT Pro Drive-time Podcasts
      Virtual Roundtable Events
    • 7. Springboard Series on TechNet: The Key Resource for IT Pros
      microsoft.com/springboard (in 10 languages)
    • 8. Want the latest IT Pro info?
      Twitter
      @MSspringboard
      Blog
      www.windowsteamblog.com
      Newsletter
    • 9. www.TalkingAboutWindows.com – The people behind Win 7
    • 10. Get Ready for The New EfficiencySeptember 29th, 2009
      Attend the New Efficiency virtual event and see how innovations in Windows 7, Windows Server 2008 R2, and Microsoft Exchange Server 2010 and Microsoft Forefront offer familiar, integrated solutions that help you simplify management and compliance and securely connect people to information.
      You can be among the first to evaluate these exciting new products. Attend expert-led sessions and keynotes. Find out about special offers, and check out some great demos. Join in when you want, and dive deeper into technical content for desktops, server, communications, and security. 
      As a special offer, on September 29th  9-10.30am please join us for a televised panel discussion  on “The New Efficiency” live from San Francisco.  Join in the conversation during this must-see event and see top technology leaders across industry and Microsoft’s Steve Ballmer, debate the role of IT during this economic reset.
      Visit www.TheNewEfficiency.comto learn more
    • 11. Want Windows 7 now?
      Fill out a survey
      We will draw for a copy of TechNet+ for every 50 surveys we receive
      Vancouver - http://tinyurl.com/STEP100
      Winnipeg - http://tinyurl.com/STEP101
      Calgary - http://tinyurl.com/STEP102
    • 12. Let’s Begin
    • 13.
    • 14. Windows 7 Versions- Available 10/22 unless otherwise noted.
      Windows 7 Starter
      NoAero
      No 64 Bit
      Windows 7 Home Basic
      Emerging Markets only
      Windows 7 Home Premium
      Includes Aero, Media Center and Touch
      Windows 7 Professional
      Does not support Direct Access, BitLocker, BitLocker To Go, BranchCache.
      Windows 7 Enterprise (available now)
      Supports all features. Only available via Volume License to Software Assurance customers.
      Windows 7 Ultimate
      Supports all features.
    • 15.
    • 16. Understanding VL and SA
      What is Volume Licensing?
      Volume Licensing is the most affordable way to upgrade your existing PCs to Windows 7Enterprise.
      Windows licenses available through Volume Licensing are upgrade-only licenses. They do not replace purchasing the initial Windows licenses for software that comes pre-installed on new PCs.
      Each desktop that runs the Windows 7 upgrade must first be licensed to run one of the qualifying operating systems (Windows Vista (Enterprise/Business/Ultimate) or Windows XP (Professional)—otherwise the PC will not have a valid, legal Windows license.
      What is Software Assurance?
      When you acquire Windows 7 Professional licenses, either through Volume Licensing upgrades or through an OEM, you can cover those licenses with Software Assurance to get rights to Windows 7 Enterprise.
      SA also applies to Office and other Microsoft products.
    • 17. What Else Do I Get With SA?
      Microsoft Desktop Optimization Pack (MDOP) - MDOP is an add-on subscription license that provides innovative technologies to help better control the desktop PC, accelerate and simplify desktop PC deployments and management, and create a dynamic infrastructure by turning software into centrally-managed services.
      Windows Virtual Enterprise Centralized Desktop (VECD) for Software Assurance - Windows VECD is an annual device-based subscription that enables organizations to license virtual copies of Windows 7 (or prior OS versions) in a variety of user scenarios.
      Windows Fundamentals for Legacy PCs - Available exclusively to Microsoft Software Assurance customers, this small-footprint, Windows-based operating system solution is for customers with legacy computers running early operating systems who are not in a position to purchase new hardware.
      Virtual OS Rights - Use up to four instances of Windows in virtual OS environments for each license that has active Software Assurance coverage.
      New Version Rights - Receive new versions of licensed software released during the term of your coverage. If you have Software Assurance coverage for your PCs when Windows 7 is released, you will automatically receive rights to use Windows 7 Enterprise on those PCs.
    • 18. What’s The Killer Feature In Windows 7?
    • 19. What’s The Killer Feature In Windows 7?
      “I Don’t Care How It Works. I Just Want It To Work.”
      Mobility
      Direct Access / VPN Reconnect/Mobile Broadband / BranchCache
      Security and Control
      BitLocker/BitLocker To Go / Improved UAC
      Desktop Auditing / NAP / AppLocker / IE8
      GUI
      New Aero Features / Search / Wireless support / Device Stage / Location Aware Printing / Home Groups / Libraries
      General
      Speed / Efficiency / Capabilities / Flexibility / Reliability
    • 20. Windows 7 and Access Anywhere
    • 21. Information Worker’s World Has Been Changing
      CENTRAL OFFICE
      BRANCH OFFICES
      REMOTE WORK
      MOBILE & DISTRIBUTED WORKFORCE
    • 22. The Evolving Needs
      IT Professional needs:
      • Secure and flexible infrastructure for“work anywhere”
      • 23. Reduce costs
      Mobile & Remote Work-Force needs:
      • Work anywhere
      • 24. Fast access
    • Remote Access for Mobile Workers
      Windows 7 Solution
      Situation Today
      DirectAccess
      Home
      Office
      Home
      Office
      • Corporate network boundary includes managed assets no matter where they are on the Internet
      • 25. Easy to service mobile PCs and distribute updates and polices
      • 26. New network paradigm increases mobile user productivity by providing same experience inside & outsidethe office
      • 27. Challenging for IT to manage, update, patch mobile PCs while disconnected from company network
      • 28. Difficult for users to access corporate resources from outside the office
    • DirectAccess Components
      Server
      Client
      • Runs on Windows 7
      • 29. Domain-joined
      • 30. Initial configuration done on Corpnet or over VPN
      • 31. Runs on Windows Server 2008 R2
      • 32. Sits on network edge
      • 33. Single box by default
      • 34. Services can be split up for scalability
    • DirectAccess
      Technical Details
      IPsec/IPv6
      Internet
      Compliant Client
      Compliant Client
      NAP / NPS Servers
      IPsec/IPv6
      IPsec/IPv6
      Tunnel over IPv4 UDP, HTTPS, etc.
      DirectAccess Server
      Intranet User
      Assume the underlying network is always insecure
      Data Center and Business Critical Resources
      Intranet User
      Redefine enterprise network edge to insulate the datacenter and business critical resources
      Enterprise Network
      Security policies based on identity, not location
    • 35. DirectAccess & IPv6
      Internet
      DirectAccessServer
      DirectAccessClient
      Tunnel over IPv4 UDP, HTTPS, etc.
      Encrypted IPsec+ESP
      Native IPv6
      6to4
      Teredo
      IP-HTTPS
    • 36. DirectAccess & IPsec
      EnterpriseNetwork
      Line of Business Applications
      DirectAccess Server
      No IPsec
      IPsec Integrity Only (Auth)
      IPsec Integrity + Encryption
    • 37. DirectAccess Deployment
      Get ready step by step
      Determine your strategy
      Be ready to monitor IPv6 traffic
      Choose an Access Model: Full Intranet Access vs. Selected Server Access?
      Assess deployment scale
      Get your infrastructure ready
      Windows 7 clients
      Windows Server 2008 R2 DirectAccess Server
      DC, DNS Server, Active Directory, PKI, Application Servers, etc.
      During deployment
      Use DirectAccess configuration wizard to setup DirectAccess Server and generate policies for clients, application servers, and DC/DNS
      Customize policies as needed
    • 38. IT Pro Benefits
      Improved manageability of remote users
      IT simplification and cost reduction
      Consistent security for all access scenarios
      Seamless & secure access to corporate resources
      Consistent connectivity experience in / out office
      Combined with other Windows 7 features enhances the end to end IW experience
      DirectAccess Benefits
      End User Benefits
    • 39. DirectAccess? Show Me!
      Client Side: How Easy Is
    • 40. VPN Reconnect
      Windows 7 Solution
      Situation Today
      VPN Server
      • The client maintains persistent VPN connection across network outages
      • 41. VPN Client can connect to any VPN Server of choice
      VPN Server
      • VPN used frequently for remote access to corporate resources
      • 42. Mobile workers reconnect to VPN on every network outage
      Benefits
      • Better end user experience: seamless and consistent VPN connectivity
      • 43. Reduced support costs
    • Mobile Broadband
      Windows 7 Solution
      Situation Today
      Integrated solution that is consistent and easy to discover
      • Plug & play experience for 3G cards (built-in or external)
      Benefits
      Internet connectivity via mobile broadband cards is expanding:
      • Inconsistent user experience
      • 44. Additional software required
      • 45. IHVs can integrate devices using Windows 7 platform
      • 46. No need for users to install3rd party software
      • 47. End users have same connectivity experience across WiFi and WWAN
    • Branch Office Enhancements
      Windows 7 Solution
      Situation Today
      BranchCache™
      Caches content downloaded from file and Web servers
      Users in the branch can quickly open files stored in the cache
      Frees up network bandwidth for other uses
      Application and data access over WAN is slow in branch offices
      Slow connections hurt user productivity
      Improving network performance is expensive and difficult to implement
    • 48. BranchCache
      Technical Details
      • Authenticates current state of data and access rights of the user against the server
      • 49. Supports commonly used protocols: HTTP(S), SMB
      • 50. Support network security protocols (SSL, IPsec)
      • 51. Requires Windows Server 2008 R2 in the data center and Hosted Cache
    • BranchCache Distributed Cache
      Main Office
      Data
      Get
      Get
      ID
      ID
      Data
      Data
      Get
      Get
      Branch Office
    • 52. BranchCache Hosted Cache
      Main Office
      Get
      Get
      ID
      ID
      ID
      ID
      ID
      Data
      ID
      Data
      Data
      Data
      Search
      Search
      Get
      Put
      Advertize
      Get
      Request
      Branch Office
    • 53. BranchCache
      Hosted CacheData cached at the host server
      Distributed Cache
      Data cached in cache pool
      • Cache stored centrally: existing Windows Server 2008 R2 in the branch
      • 54. Cache availability is high
      • 55. Enables branch-wide caching
      • 56. Increased reliability
      • 57. Recommended for branches without a branch server
      • 58. Easy to deploy: Enabled on clients through Group Policy
      • 59. Cache availability decreases with laptops that go offline
      Enterprise
    • 60. BranchCache Framework
      3rd Party Applications
      IE
      WMP
      Explorer
      BITS
      SharePoint
      CopyFile
      Office
      Office
      HTTP (WebIO/http.sys)
      SMB(CSC/SRV)
      BranchCache
    • 61. BranchCache Benefits
      IT Pro Benefits
      • Optimize network utilization:
      • 62. HTTP and HTTPS-based intranet traffic
      • 63. SMB (and signed SMB) shares on the read path
      • 64. Support network security protocols (SSL, IPsec)
      • 65. Reduce the cost of managing WAN
      • 66. Improve application responsiveness and reduce file transferwait time
      • 67. Combined with other SMB offerings enhance the userexperience on remote shares
      End User Benefits
    • 68. Enhance Security & Control in Windows 7
    • 69. Windows 7 Enterprise Security
      Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable.
      Fundamentally Secure Platform
      Helping Protect Users & Infrastructure
      Helping Secure Anywhere Access
      Helping
      Protect
      Data
      Windows Vista Foundation
      Streamlined User Account Control
      Enhanced Auditing
      Network Security
      Network Access Protection
      DirectAccessTM
      AppLockerTM
      Internet Explorer 8
      Data Recovery
      RMS
      EFS
      BitLocker & BitLocker To GoTM
    • 70. Fundamentally Secure Platform
      Windows Vista Foundation
      Enhanced Auditing
      Streamlined User Account Control
      Make the system work well for standard users
      Administrators use full privilege only for administrative tasks
      File and registry virtualization helps applications that are not UAC compliant
      Group Policy Configurable
      XML based
      Granular audit categories
      Detailed collection of audit results
      Simplified compliance management
      Security Development Lifecycle process
      Kernel Patch Protection
      Windows Service Hardening
      DEP & ASLR
      IE 8 inclusive
      Mandatory Integrity Controls
    • 71. User Account Control
      Windows Vista
      System Works for Standard User
      All users, including administrators, run as Standard User by default
      Administrators use full privilege only for administrative tasks or applications
      Influence the ecosystem to write software that does not need administrative rights
      Streamlined UAC
      Reduce the number of OS applications and tasks that require elevation
      Refactor applications into elevated/non-elevated pieces
      Flexible prompt behavior for administrators
      Continued ecosystem influence for standard user applications
      Challenges
      Customer Value
      User provides explicit consent before using elevated privilege
      Disabling UAC removes protections, not just consent prompt
      Users can do even more as a standard user
      Administrators will see fewer UAC Elevation Prompts
      Windows 7
    • 72. Desktop Auditing
      Windows Vista
      Enhanced Auditing
      New XML based events
      Fine grained support for audit of administrative privilege
      Simplified filtering of “noise” to find the event you’re looking for
      Tasks tied to events
      Simplified configuration results in lower TCO
      Demonstrate why a person has access to specific information
      Understand why a person has been denied access to specific information
      Track all changes made by specific people or groups
      Challenges
      Granular auditing complex to configure
      Auditing access and privilege use for a group of users
      Windows 7
    • 73. UAC & Auditing
      demo
    • 74. Securing Anywhere Access
      Network Security
      DirectAccess
      Network Access Protection
      Ensure that only “healthy” machines can access corporate data
      Enable “unhealthy” machines to get clean before they gain access
      Security protected, seamless, always on connection to corporate network
      Improved management of remote users
      Consistent security for all access scenarios
      Policy based network segmentation for more secure and isolated logical networks
      Multi-Home Firewall Profiles
      DNSSec Support
    • 75. Network Access Protection
      Remediation
      Servers
      Example: Patch
      Restricted
      Network
      Corporate Network
      Policy Servers
      such as: Patch, AV
      Health policy validation and remediation
      Helps keep mobile, desktop and server devices in compliance
      Reduces risk from unauthorized systems on the network
      Not policy compliant
      Policy compliant
      DHCP, VPN
      Switch/Router
      Windows
      Client
      NPS
      Windows 7
    • 76. Protect Users & Infrastructure
      AppLockerTM
      Data Recovery
      Internet Explorer 8
      Protect users against social engineering and privacy exploits
      Protect users against browser based exploits
      Protect users against web server exploits
      File back up and restore
      CompletePC™ image-based backup
      System Restore
      Volume Shadow Copies
      Volume Revert
      Enables application standardization without increasing TCO
      Increase security to safeguard against data and privacy loss
      Support compliance enforcement
    • 77. Help Desk Made Easier
      Problem Steps Recorder
      Windows Troubleshooting Platform
    • 78. Application Control
      Situation Today
      AppLocker
      Eliminate unwanted/unknown applications in your network
      Enforce application standardization within your organization
      Easily create and manage flexible rules using Group Policy
      Users can install and run non-standard applications
      Even standard users can install some types of software
      Unauthorized applications may:
      Introduce malware
      Increase helpdesk calls
      Reduce user productivity
      Undermine compliance efforts
      Windows 7 Solution
    • 79. AppLocker
      demo
    • 80. AppLocker
      Technical Details
      Simple Rule Structure: Allow, Exception & Deny
      Publisher Rules
      Product Publisher, Name, Filename & Version
      Multiple Policies
      Executables, installers, scripts & DLLs
      Rule creation tools & wizard
      Audit only mode
      SKU Availability
      AppLocker – Enterprise, Ultimate
      Legacy SRP – Business & Enterprise
    • 81. BitLocker / BitLocker To Go
      Situation Today
      BitLocker To Go
      +
      Worldwide Shipments (000s)
      Extend BitLocker drive encryption to removable devices
      Create group policies to mandate the use of encryption and block unencrypted drives
      Simplify BitLocker setup and configuration of primary hard drive
      • Gartner “Forecast: USB Flash Drives, Worldwide, 2001-2011” 24 September 2007, Joseph Unsworth  
      • 82. Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa, George Shiffler III 
      Windows 7 Solution
    • 83. BitLocker /BitLocker To Go
      Technical Details
      BitLocker Enhancements
      Automatic 200 Mb hidden boot partition
      New Key Protectors
      Domain Recovery Agent (DRA)
      Smart card – data volumes only
      BitLocker To Go
      Support for FAT*
      Protectors: DRA, passphrase, smart card and/or auto-unlock
      Management: protector configuration, encryption enforcement
      Read-only access on Vista & XP
      SKU Availability
      Encrypting – Enterprise, Ultimate
      Unlocking – All
    • 84. BitLocker To Go Demo
      demo
    • 85. Windows 7 Enterprise Security
      Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable.
      Fundamentally Secure Platform
      Protect Users & Infrastructure
      Securing Anywhere Access
      Protect Data from Unauthorized Viewing
      Windows Vista Foundation
      Streamlined User Account Control
      Enhanced Auditing
      Network Security
      Network Access Protection
      DirectAccess
      AppLocker
      Internet Explorer 8
      Data Recovery
      RMS
      EFS
      BitLocker
    • 86. Windows 7Deployment and Application Compatibility Tools
    • 87. APPLICATION COMPATIBILITY PROCESS
      > COLLECT >
      > MITIGATE
      > ANALYZE >
      Collect an Application Inventory
      Rationalize and Consolidate Applications
      Analyze for Compatibility and ISV Support
      Test for and Mitigate Compatibility Issues
    • 88. Deployment Investments For Windows Vista Carry Forward
      Application and device compatibility core tenets are unchanged between Windows Vista and Windows 7
      System image management tools and processes are consistent for both operating systems
      Deployment tools developed for Windows Vista will carry forward to Windows 7 with incremental updates
      Post-deployment desktop management leverages the same tools and processes for both operating systems
    • 89. Application Compatibility Tools
      > COLLECT >
      > ANALYZE >
      > MITIGATE
      Application Compatibility Toolkit
      Application Virtualization
      Application Quality Cookbook
      Virtual Legacy Windows OS
      (MED-V, XP Mode)
      Application Compatibility Toolkit
      Windows Compatibility Center
      Compatible Applications List
      Application Quality Cookbook
      Application Verifier
      Application Compatibility Toolkit
      Asset Inventory Service
      Microsoft Assessment and Planning
      System Center Family
    • 90. Windows 7 Deployment
      IMAGING
      MIGRATION
      DELIVERY
      Deployment Image Servicing and Management
      Add/Remove Drivers and Packages
      WIM and VHD Image Management
      User State Migration Tool
      Hard-link Migration
      Offline File Gather
      Improved user file detection
      Windows Deployment Services
      Multiple Stream Transfer
      Dynamic Driver Provisioning
      VHD and WIM Support
      INTEGRATED SOLUTIONS CONTINUE
      Microsoft Assessment and Planning
      Application Compatibility Toolkit
      Microsoft Deployment Toolkit
    • 91. Deployment Image Servicing And Management
      Enable and disable, enumerate, add, remove packages and updates
      Add, remove, enumerate drivers
      WIM and VHD support
      OEMs can select OS editions offline
    • 92. Windows Deployment Services Multicast Enhancements
      Multiple Stream Transfer
      Multiple bands to broadcast images to clients
      Optimized rates per client connection
      Client Auto Removal
      Slower clients can be dropped to unicast or entirely (only in standard multicast)
      Boot Image Multicast
      Windows PE boot images can use multicast (clients with EFI)
      Fast
      Medium
      Slow
    • 93. Multicast
      WDS Server
      Multicast
      Transmission
      First client joins “transmission”
      Clients
    • 94. Multicast
      WDS Server
      Multicast
      Transmission
      Waiting for other clients to join…
      Clients
    • 95. Multicast
      WDS Server
      Multicast
      Transmission
      Transmission begins…
      Clients with multiple transfer speeds
      Medium
      Fastest
    • 96. Multicast
      WDS Server
      Multicast
      Transmission
      Additional clients join stream
      Clients with multiple transfer speeds
      Medium
      Slowest
      Medium
      Fastest
    • 97. Multicast
      WDS Server
      Multicast
      Transmission
      More clients to join
      Clients with multiple transfer speeds
      Fastest
      Medium
      Fastest
      Medium
      Medium
      Slowest
      Medium
    • 98. Multicast
      WDS Server
      Multicast
      First clients complete. Second broad-cast begins. One client removed.
      Clients with multiple transfer speeds
      Medium
      Medium
      Medium
      Medium
      Slowest
    • 99. Multicast
      WDS Server
      Multicast
      Last clients complete…
      Clients with multiple transfer speeds
      Medium
      Medium
      Slowest
    • 100. Multicast
      WDS Server
      Multicast
      All clients complete.
      Transmission ends.
      Clients
    • 101. WDS Server
      ImagesDrivers
      Client
      Windows Deployment Services Dynamic Driver Provisioning
      Driver targeting to match drivers to hardware
      Reduces image size and centralizes deployment driver management
    • 102. User State Migration Tool
      Hard-link Migration
      Enables local file migration without copying or moving files
      Processes migration jobs in third of the time or less
      Offline User State Capture
      Capture during Windows PE phase to improve speed
      Volume Shadow Copy
      Capture files even while they are in use
      Improved File Discovery
      Reduces XML customization need
    • 103. Volume Activation in Windows 7
      Based on Volume Activation 2.0 for Windows Vista and Windows Server 2008
      Activation is required for all editions of Windows 7 client
      Employs the same key hierarchy (KMS, MAK)
      Online validation experience unchanged
    • 104. Volume Activation 2.0 for Windows 7
    • 105. Microsoft Assessment and Planning
      Application Compatibility Toolkit
      Microsoft Deployment Toolkit
      Inventory, Compatibility And Deployment Tools
    • 106. Conclusion
      IMAGING
      MIGRATION
      DELIVERY
      Deployment Image Servicing and Management
      Add/Remove Drivers and Packages
      WIM and VHD Image Management
      User State Migration Tool
      Hardlink Migration
      Offline File Gather
      Improved user file detection
      Windows Deployment Services
      Multiple Stream Transfer
      Dynamic Driver Provisioning
      VHD and WIM Support
      INTEGRATED SOLUTIONS CONTINUE
      Microsoft Assessment and Planning
      Application Compatibility Toolkit
      Microsoft Deployment Toolkit
    • 107. Want Windows 7 now?
      Fill out a survey
      We will draw for a copy of TechNet+ for every 50 surveys we receive
      Vancouver - http://tinyurl.com/STEP100
      Winnipeg - http://tinyurl.com/STEP101
      Calgary - http://tinyurl.com/STEP102
      What is TechNet+?
    • 108. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
      The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

    ×