• Save
Canada Windows 7 Tour
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Canada Windows 7 Tour

on

  • 2,305 views

Presentation to the Calgary, Winnipeg and Vancouver user groups

Presentation to the Calgary, Winnipeg and Vancouver user groups

Statistics

Views

Total Views
2,305
Views on SlideShare
2,189
Embed Views
116

Actions

Likes
0
Downloads
0
Comments
1

1 Embed 116

http://blogs.technet.com 116

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • You should know that Information is for everybody. You should not disable download link. When someone shares with you something of value, you have an obligation to share it with others!
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • The Springboard Series program was developed in response to primary research conducted with IT Pros worldwide (direct interviews, focus groups) and key MS field roles (TSPs, ATSs, ITEs, PAMs, TAMs, Architects). The findings fell into two areas—the need to make learning about how a new OS environment directly impacts the IT Pro more consumable (and the messages more relevant), and how the mis-handling of Vista to this audience has cost us in poor NSAT and perceptionsTo remedy this situation, the Win Client IT pro audience developed a program to provide the right information, at the right technical level, at the right point in the adoption lifecycle, and to do so in a frank, open and honest tone. This program has two major components—a breadth effort that touches IT pros directly (through Technet and related properties), and a depth component that supports field and partner engagements
  • UAC was introduced in Windows Vista to help provide customers more control of their system by enabling IT administrators to lock down the system for certain users by running them within standard, non privileged user accounts and to influence the ecosystem to write software that does not need administrative rights. Transitioning the ecosystem to create software that does not require administrative changes to the machine is a very good thing for overall reliability of the machine as well as for the overall security of the machine since it limits the potential damage. UAC has delivered successfully on this in the Windows Vista timeframe and customers continue to value the ability to create a standard user and be confident an administrator can make the decisions on what software is added to the system and what changes should be allowed. However, we have received substantial feedback about the number of notifications for change. In Windows 7, we have invested in addressing the key customer feedback around UAC, while still maintaining the ability for IT administrators to be confident about a standard user environmentand still maintaining the influence on the ecosystem to create software that does not require administrative rights.We have enabled the Windows operations that users do often to be done in a standard user environment with the goal of providing prompt free daily activities. For example, a standard user can now adjust the readability of the screen (dpi) without having to change it for the entire system. Additionally, we have reduced key duplicate notifications for common activities such as installing applications from IE. We have also made it easier for IT to look at key setting on the system without needing administrative privileges by refactoring many of our control panel applications into read only and write sections.In line with our overall Windows 7focus on user-in-control, we have enabled a person running as a protected administrator to determine the range of notifications s/he receives. Based on customer feedback and actual instrumented data from our customers’ response to UAC prompts, we default the initial setting for UAC such that administrators are notified when software other than Windows is requesting to change the overall system and such that standard users will receive a request for administrator authorization for any change to the overall system. We believe this default setting has the right balance of establishing an ecosystem where a broad range of ISV software can be run in a standard user environment while providing administrators with control over the experience of configuring Windows.

Canada Windows 7 Tour Presentation Transcript

  • 1. Welcome to Windows 7, eh?
    Stephen L Rose
    Worldwide Community Manager – Windows Client
    stros@microsoft.com
    http://microsoft.com/springboard
    Blog- http://windowsteamblog.com
    Twitter- @stephenlrose / @MSspringboard
  • 2. Agenda
    Who Am I?
    Resources, Resources, Resources
    Windows 7 Overview
    Windows 7 Anywhere
    Security and Control in Windows 7
    Windows 7 Deployment
    Wrap-up
  • 3. What is the Springboard Series?
    To the IT pro, our goal is:
    • Be the definitive resource for Desktop IT pros
    • 4. Open, honest; show don’t tell
    • 5. Information at right time, right level across Adoption Lifecycle
    Inside of Microsoft we are:
    • A turnkey IT pro engagement platform for depth & breadth
    • 6. The program to mobilize MS marketing & field to focus on desktop OS IT pros
    The Springboard Series IT pro experience offers dynamic content and structured guidance across the adoption lifecycle
    Weekly, Monthly and Quarterly Rhythm of Topical Content
    one-Windows TechCenter in 10 languages
    Straight-talk Monthly Feature Articles & Overview Guides
    IT Pro adoption days Event Kits (Win 7 updates) and messaging
    Weekly Targeted IT Pro Drive-time Podcasts
    Virtual Roundtable Events
  • 7. Springboard Series on TechNet: The Key Resource for IT Pros
    microsoft.com/springboard (in 10 languages)
  • 8. Want the latest IT Pro info?
    Twitter
    @MSspringboard
    Blog
    www.windowsteamblog.com
    Newsletter
  • 9. www.TalkingAboutWindows.com – The people behind Win 7
  • 10. Get Ready for The New EfficiencySeptember 29th, 2009
    Attend the New Efficiency virtual event and see how innovations in Windows 7, Windows Server 2008 R2, and Microsoft Exchange Server 2010 and Microsoft Forefront offer familiar, integrated solutions that help you simplify management and compliance and securely connect people to information.
    You can be among the first to evaluate these exciting new products. Attend expert-led sessions and keynotes. Find out about special offers, and check out some great demos. Join in when you want, and dive deeper into technical content for desktops, server, communications, and security. 
    As a special offer, on September 29th  9-10.30am please join us for a televised panel discussion  on “The New Efficiency” live from San Francisco.  Join in the conversation during this must-see event and see top technology leaders across industry and Microsoft’s Steve Ballmer, debate the role of IT during this economic reset.
    Visit www.TheNewEfficiency.comto learn more
  • 11. Want Windows 7 now?
    Fill out a survey
    We will draw for a copy of TechNet+ for every 50 surveys we receive
    Vancouver - http://tinyurl.com/STEP100
    Winnipeg - http://tinyurl.com/STEP101
    Calgary - http://tinyurl.com/STEP102
  • 12. Let’s Begin
  • 13.
  • 14. Windows 7 Versions- Available 10/22 unless otherwise noted.
    Windows 7 Starter
    NoAero
    No 64 Bit
    Windows 7 Home Basic
    Emerging Markets only
    Windows 7 Home Premium
    Includes Aero, Media Center and Touch
    Windows 7 Professional
    Does not support Direct Access, BitLocker, BitLocker To Go, BranchCache.
    Windows 7 Enterprise (available now)
    Supports all features. Only available via Volume License to Software Assurance customers.
    Windows 7 Ultimate
    Supports all features.
  • 15.
  • 16. Understanding VL and SA
    What is Volume Licensing?
    Volume Licensing is the most affordable way to upgrade your existing PCs to Windows 7Enterprise.
    Windows licenses available through Volume Licensing are upgrade-only licenses. They do not replace purchasing the initial Windows licenses for software that comes pre-installed on new PCs.
    Each desktop that runs the Windows 7 upgrade must first be licensed to run one of the qualifying operating systems (Windows Vista (Enterprise/Business/Ultimate) or Windows XP (Professional)—otherwise the PC will not have a valid, legal Windows license.
    What is Software Assurance?
    When you acquire Windows 7 Professional licenses, either through Volume Licensing upgrades or through an OEM, you can cover those licenses with Software Assurance to get rights to Windows 7 Enterprise.
    SA also applies to Office and other Microsoft products.
  • 17. What Else Do I Get With SA?
    Microsoft Desktop Optimization Pack (MDOP) - MDOP is an add-on subscription license that provides innovative technologies to help better control the desktop PC, accelerate and simplify desktop PC deployments and management, and create a dynamic infrastructure by turning software into centrally-managed services.
    Windows Virtual Enterprise Centralized Desktop (VECD) for Software Assurance - Windows VECD is an annual device-based subscription that enables organizations to license virtual copies of Windows 7 (or prior OS versions) in a variety of user scenarios.
    Windows Fundamentals for Legacy PCs - Available exclusively to Microsoft Software Assurance customers, this small-footprint, Windows-based operating system solution is for customers with legacy computers running early operating systems who are not in a position to purchase new hardware.
    Virtual OS Rights - Use up to four instances of Windows in virtual OS environments for each license that has active Software Assurance coverage.
    New Version Rights - Receive new versions of licensed software released during the term of your coverage. If you have Software Assurance coverage for your PCs when Windows 7 is released, you will automatically receive rights to use Windows 7 Enterprise on those PCs.
  • 18. What’s The Killer Feature In Windows 7?
  • 19. What’s The Killer Feature In Windows 7?
    “I Don’t Care How It Works. I Just Want It To Work.”
    Mobility
    Direct Access / VPN Reconnect/Mobile Broadband / BranchCache
    Security and Control
    BitLocker/BitLocker To Go / Improved UAC
    Desktop Auditing / NAP / AppLocker / IE8
    GUI
    New Aero Features / Search / Wireless support / Device Stage / Location Aware Printing / Home Groups / Libraries
    General
    Speed / Efficiency / Capabilities / Flexibility / Reliability
  • 20. Windows 7 and Access Anywhere
  • 21. Information Worker’s World Has Been Changing
    CENTRAL OFFICE
    BRANCH OFFICES
    REMOTE WORK
    MOBILE & DISTRIBUTED WORKFORCE
  • 22. The Evolving Needs
    IT Professional needs:
    • Secure and flexible infrastructure for“work anywhere”
    • 23. Reduce costs
    Mobile & Remote Work-Force needs:
    • Work anywhere
    • 24. Fast access
  • Remote Access for Mobile Workers
    Windows 7 Solution
    Situation Today
    DirectAccess
    Home
    Office
    Home
    Office
    • Corporate network boundary includes managed assets no matter where they are on the Internet
    • 25. Easy to service mobile PCs and distribute updates and polices
    • 26. New network paradigm increases mobile user productivity by providing same experience inside & outsidethe office
    • 27. Challenging for IT to manage, update, patch mobile PCs while disconnected from company network
    • 28. Difficult for users to access corporate resources from outside the office
  • DirectAccess Components
    Server
    Client
    • Runs on Windows 7
    • 29. Domain-joined
    • 30. Initial configuration done on Corpnet or over VPN
    • 31. Runs on Windows Server 2008 R2
    • 32. Sits on network edge
    • 33. Single box by default
    • 34. Services can be split up for scalability
  • DirectAccess
    Technical Details
    IPsec/IPv6
    Internet
    Compliant Client
    Compliant Client
    NAP / NPS Servers
    IPsec/IPv6
    IPsec/IPv6
    Tunnel over IPv4 UDP, HTTPS, etc.
    DirectAccess Server
    Intranet User
    Assume the underlying network is always insecure
    Data Center and Business Critical Resources
    Intranet User
    Redefine enterprise network edge to insulate the datacenter and business critical resources
    Enterprise Network
    Security policies based on identity, not location
  • 35. DirectAccess & IPv6
    Internet
    DirectAccessServer
    DirectAccessClient
    Tunnel over IPv4 UDP, HTTPS, etc.
    Encrypted IPsec+ESP
    Native IPv6
    6to4
    Teredo
    IP-HTTPS
  • 36. DirectAccess & IPsec
    EnterpriseNetwork
    Line of Business Applications
    DirectAccess Server
    No IPsec
    IPsec Integrity Only (Auth)
    IPsec Integrity + Encryption
  • 37. DirectAccess Deployment
    Get ready step by step
    Determine your strategy
    Be ready to monitor IPv6 traffic
    Choose an Access Model: Full Intranet Access vs. Selected Server Access?
    Assess deployment scale
    Get your infrastructure ready
    Windows 7 clients
    Windows Server 2008 R2 DirectAccess Server
    DC, DNS Server, Active Directory, PKI, Application Servers, etc.
    During deployment
    Use DirectAccess configuration wizard to setup DirectAccess Server and generate policies for clients, application servers, and DC/DNS
    Customize policies as needed
  • 38. IT Pro Benefits
    Improved manageability of remote users
    IT simplification and cost reduction
    Consistent security for all access scenarios
    Seamless & secure access to corporate resources
    Consistent connectivity experience in / out office
    Combined with other Windows 7 features enhances the end to end IW experience
    DirectAccess Benefits
    End User Benefits
  • 39. DirectAccess? Show Me!
    Client Side: How Easy Is
  • 40. VPN Reconnect
    Windows 7 Solution
    Situation Today
    VPN Server
    • The client maintains persistent VPN connection across network outages
    • 41. VPN Client can connect to any VPN Server of choice
    VPN Server
    • VPN used frequently for remote access to corporate resources
    • 42. Mobile workers reconnect to VPN on every network outage
    Benefits
    • Better end user experience: seamless and consistent VPN connectivity
    • 43. Reduced support costs
  • Mobile Broadband
    Windows 7 Solution
    Situation Today
    Integrated solution that is consistent and easy to discover
    • Plug & play experience for 3G cards (built-in or external)
    Benefits
    Internet connectivity via mobile broadband cards is expanding:
    • Inconsistent user experience
    • 44. Additional software required
    • 45. IHVs can integrate devices using Windows 7 platform
    • 46. No need for users to install3rd party software
    • 47. End users have same connectivity experience across WiFi and WWAN
  • Branch Office Enhancements
    Windows 7 Solution
    Situation Today
    BranchCache™
    Caches content downloaded from file and Web servers
    Users in the branch can quickly open files stored in the cache
    Frees up network bandwidth for other uses
    Application and data access over WAN is slow in branch offices
    Slow connections hurt user productivity
    Improving network performance is expensive and difficult to implement
  • 48. BranchCache
    Technical Details
    • Authenticates current state of data and access rights of the user against the server
    • 49. Supports commonly used protocols: HTTP(S), SMB
    • 50. Support network security protocols (SSL, IPsec)
    • 51. Requires Windows Server 2008 R2 in the data center and Hosted Cache
  • BranchCache Distributed Cache
    Main Office
    Data
    Get
    Get
    ID
    ID
    Data
    Data
    Get
    Get
    Branch Office
  • 52. BranchCache Hosted Cache
    Main Office
    Get
    Get
    ID
    ID
    ID
    ID
    ID
    Data
    ID
    Data
    Data
    Data
    Search
    Search
    Get
    Put
    Advertize
    Get
    Request
    Branch Office
  • 53. BranchCache
    Hosted CacheData cached at the host server
    Distributed Cache
    Data cached in cache pool
    • Cache stored centrally: existing Windows Server 2008 R2 in the branch
    • 54. Cache availability is high
    • 55. Enables branch-wide caching
    • 56. Increased reliability
    • 57. Recommended for branches without a branch server
    • 58. Easy to deploy: Enabled on clients through Group Policy
    • 59. Cache availability decreases with laptops that go offline
    Enterprise
  • 60. BranchCache Framework
    3rd Party Applications
    IE
    WMP
    Explorer
    BITS
    SharePoint
    CopyFile
    Office
    Office
    HTTP (WebIO/http.sys)
    SMB(CSC/SRV)
    BranchCache
  • 61. BranchCache Benefits
    IT Pro Benefits
    • Optimize network utilization:
    • 62. HTTP and HTTPS-based intranet traffic
    • 63. SMB (and signed SMB) shares on the read path
    • 64. Support network security protocols (SSL, IPsec)
    • 65. Reduce the cost of managing WAN
    • 66. Improve application responsiveness and reduce file transferwait time
    • 67. Combined with other SMB offerings enhance the userexperience on remote shares
    End User Benefits
  • 68. Enhance Security & Control in Windows 7
  • 69. Windows 7 Enterprise Security
    Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable.
    Fundamentally Secure Platform
    Helping Protect Users & Infrastructure
    Helping Secure Anywhere Access
    Helping
    Protect
    Data
    Windows Vista Foundation
    Streamlined User Account Control
    Enhanced Auditing
    Network Security
    Network Access Protection
    DirectAccessTM
    AppLockerTM
    Internet Explorer 8
    Data Recovery
    RMS
    EFS
    BitLocker & BitLocker To GoTM
  • 70. Fundamentally Secure Platform
    Windows Vista Foundation
    Enhanced Auditing
    Streamlined User Account Control
    Make the system work well for standard users
    Administrators use full privilege only for administrative tasks
    File and registry virtualization helps applications that are not UAC compliant
    Group Policy Configurable
    XML based
    Granular audit categories
    Detailed collection of audit results
    Simplified compliance management
    Security Development Lifecycle process
    Kernel Patch Protection
    Windows Service Hardening
    DEP & ASLR
    IE 8 inclusive
    Mandatory Integrity Controls
  • 71. User Account Control
    Windows Vista
    System Works for Standard User
    All users, including administrators, run as Standard User by default
    Administrators use full privilege only for administrative tasks or applications
    Influence the ecosystem to write software that does not need administrative rights
    Streamlined UAC
    Reduce the number of OS applications and tasks that require elevation
    Refactor applications into elevated/non-elevated pieces
    Flexible prompt behavior for administrators
    Continued ecosystem influence for standard user applications
    Challenges
    Customer Value
    User provides explicit consent before using elevated privilege
    Disabling UAC removes protections, not just consent prompt
    Users can do even more as a standard user
    Administrators will see fewer UAC Elevation Prompts
    Windows 7
  • 72. Desktop Auditing
    Windows Vista
    Enhanced Auditing
    New XML based events
    Fine grained support for audit of administrative privilege
    Simplified filtering of “noise” to find the event you’re looking for
    Tasks tied to events
    Simplified configuration results in lower TCO
    Demonstrate why a person has access to specific information
    Understand why a person has been denied access to specific information
    Track all changes made by specific people or groups
    Challenges
    Granular auditing complex to configure
    Auditing access and privilege use for a group of users
    Windows 7
  • 73. UAC & Auditing
    demo
  • 74. Securing Anywhere Access
    Network Security
    DirectAccess
    Network Access Protection
    Ensure that only “healthy” machines can access corporate data
    Enable “unhealthy” machines to get clean before they gain access
    Security protected, seamless, always on connection to corporate network
    Improved management of remote users
    Consistent security for all access scenarios
    Policy based network segmentation for more secure and isolated logical networks
    Multi-Home Firewall Profiles
    DNSSec Support
  • 75. Network Access Protection
    Remediation
    Servers
    Example: Patch
    Restricted
    Network
    Corporate Network
    Policy Servers
    such as: Patch, AV
    Health policy validation and remediation
    Helps keep mobile, desktop and server devices in compliance
    Reduces risk from unauthorized systems on the network
    Not policy compliant
    Policy compliant
    DHCP, VPN
    Switch/Router
    Windows
    Client
    NPS
    Windows 7
  • 76. Protect Users & Infrastructure
    AppLockerTM
    Data Recovery
    Internet Explorer 8
    Protect users against social engineering and privacy exploits
    Protect users against browser based exploits
    Protect users against web server exploits
    File back up and restore
    CompletePC™ image-based backup
    System Restore
    Volume Shadow Copies
    Volume Revert
    Enables application standardization without increasing TCO
    Increase security to safeguard against data and privacy loss
    Support compliance enforcement
  • 77. Help Desk Made Easier
    Problem Steps Recorder
    Windows Troubleshooting Platform
  • 78. Application Control
    Situation Today
    AppLocker
    Eliminate unwanted/unknown applications in your network
    Enforce application standardization within your organization
    Easily create and manage flexible rules using Group Policy
    Users can install and run non-standard applications
    Even standard users can install some types of software
    Unauthorized applications may:
    Introduce malware
    Increase helpdesk calls
    Reduce user productivity
    Undermine compliance efforts
    Windows 7 Solution
  • 79. AppLocker
    demo
  • 80. AppLocker
    Technical Details
    Simple Rule Structure: Allow, Exception & Deny
    Publisher Rules
    Product Publisher, Name, Filename & Version
    Multiple Policies
    Executables, installers, scripts & DLLs
    Rule creation tools & wizard
    Audit only mode
    SKU Availability
    AppLocker – Enterprise, Ultimate
    Legacy SRP – Business & Enterprise
  • 81. BitLocker / BitLocker To Go
    Situation Today
    BitLocker To Go
    +
    Worldwide Shipments (000s)
    Extend BitLocker drive encryption to removable devices
    Create group policies to mandate the use of encryption and block unencrypted drives
    Simplify BitLocker setup and configuration of primary hard drive
    • Gartner “Forecast: USB Flash Drives, Worldwide, 2001-2011” 24 September 2007, Joseph Unsworth  
    • 82. Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa, George Shiffler III 
    Windows 7 Solution
  • 83. BitLocker /BitLocker To Go
    Technical Details
    BitLocker Enhancements
    Automatic 200 Mb hidden boot partition
    New Key Protectors
    Domain Recovery Agent (DRA)
    Smart card – data volumes only
    BitLocker To Go
    Support for FAT*
    Protectors: DRA, passphrase, smart card and/or auto-unlock
    Management: protector configuration, encryption enforcement
    Read-only access on Vista & XP
    SKU Availability
    Encrypting – Enterprise, Ultimate
    Unlocking – All
  • 84. BitLocker To Go Demo
    demo
  • 85. Windows 7 Enterprise Security
    Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable.
    Fundamentally Secure Platform
    Protect Users & Infrastructure
    Securing Anywhere Access
    Protect Data from Unauthorized Viewing
    Windows Vista Foundation
    Streamlined User Account Control
    Enhanced Auditing
    Network Security
    Network Access Protection
    DirectAccess
    AppLocker
    Internet Explorer 8
    Data Recovery
    RMS
    EFS
    BitLocker
  • 86. Windows 7Deployment and Application Compatibility Tools
  • 87. APPLICATION COMPATIBILITY PROCESS
    > COLLECT >
    > MITIGATE
    > ANALYZE >
    Collect an Application Inventory
    Rationalize and Consolidate Applications
    Analyze for Compatibility and ISV Support
    Test for and Mitigate Compatibility Issues
  • 88. Deployment Investments For Windows Vista Carry Forward
    Application and device compatibility core tenets are unchanged between Windows Vista and Windows 7
    System image management tools and processes are consistent for both operating systems
    Deployment tools developed for Windows Vista will carry forward to Windows 7 with incremental updates
    Post-deployment desktop management leverages the same tools and processes for both operating systems
  • 89. Application Compatibility Tools
    > COLLECT >
    > ANALYZE >
    > MITIGATE
    Application Compatibility Toolkit
    Application Virtualization
    Application Quality Cookbook
    Virtual Legacy Windows OS
    (MED-V, XP Mode)
    Application Compatibility Toolkit
    Windows Compatibility Center
    Compatible Applications List
    Application Quality Cookbook
    Application Verifier
    Application Compatibility Toolkit
    Asset Inventory Service
    Microsoft Assessment and Planning
    System Center Family
  • 90. Windows 7 Deployment
    IMAGING
    MIGRATION
    DELIVERY
    Deployment Image Servicing and Management
    Add/Remove Drivers and Packages
    WIM and VHD Image Management
    User State Migration Tool
    Hard-link Migration
    Offline File Gather
    Improved user file detection
    Windows Deployment Services
    Multiple Stream Transfer
    Dynamic Driver Provisioning
    VHD and WIM Support
    INTEGRATED SOLUTIONS CONTINUE
    Microsoft Assessment and Planning
    Application Compatibility Toolkit
    Microsoft Deployment Toolkit
  • 91. Deployment Image Servicing And Management
    Enable and disable, enumerate, add, remove packages and updates
    Add, remove, enumerate drivers
    WIM and VHD support
    OEMs can select OS editions offline
  • 92. Windows Deployment Services Multicast Enhancements
    Multiple Stream Transfer
    Multiple bands to broadcast images to clients
    Optimized rates per client connection
    Client Auto Removal
    Slower clients can be dropped to unicast or entirely (only in standard multicast)
    Boot Image Multicast
    Windows PE boot images can use multicast (clients with EFI)
    Fast
    Medium
    Slow
  • 93. Multicast
    WDS Server
    Multicast
    Transmission
    First client joins “transmission”
    Clients
  • 94. Multicast
    WDS Server
    Multicast
    Transmission
    Waiting for other clients to join…
    Clients
  • 95. Multicast
    WDS Server
    Multicast
    Transmission
    Transmission begins…
    Clients with multiple transfer speeds
    Medium
    Fastest
  • 96. Multicast
    WDS Server
    Multicast
    Transmission
    Additional clients join stream
    Clients with multiple transfer speeds
    Medium
    Slowest
    Medium
    Fastest
  • 97. Multicast
    WDS Server
    Multicast
    Transmission
    More clients to join
    Clients with multiple transfer speeds
    Fastest
    Medium
    Fastest
    Medium
    Medium
    Slowest
    Medium
  • 98. Multicast
    WDS Server
    Multicast
    First clients complete. Second broad-cast begins. One client removed.
    Clients with multiple transfer speeds
    Medium
    Medium
    Medium
    Medium
    Slowest
  • 99. Multicast
    WDS Server
    Multicast
    Last clients complete…
    Clients with multiple transfer speeds
    Medium
    Medium
    Slowest
  • 100. Multicast
    WDS Server
    Multicast
    All clients complete.
    Transmission ends.
    Clients
  • 101. WDS Server
    ImagesDrivers
    Client
    Windows Deployment Services Dynamic Driver Provisioning
    Driver targeting to match drivers to hardware
    Reduces image size and centralizes deployment driver management
  • 102. User State Migration Tool
    Hard-link Migration
    Enables local file migration without copying or moving files
    Processes migration jobs in third of the time or less
    Offline User State Capture
    Capture during Windows PE phase to improve speed
    Volume Shadow Copy
    Capture files even while they are in use
    Improved File Discovery
    Reduces XML customization need
  • 103. Volume Activation in Windows 7
    Based on Volume Activation 2.0 for Windows Vista and Windows Server 2008
    Activation is required for all editions of Windows 7 client
    Employs the same key hierarchy (KMS, MAK)
    Online validation experience unchanged
  • 104. Volume Activation 2.0 for Windows 7
  • 105. Microsoft Assessment and Planning
    Application Compatibility Toolkit
    Microsoft Deployment Toolkit
    Inventory, Compatibility And Deployment Tools
  • 106. Conclusion
    IMAGING
    MIGRATION
    DELIVERY
    Deployment Image Servicing and Management
    Add/Remove Drivers and Packages
    WIM and VHD Image Management
    User State Migration Tool
    Hardlink Migration
    Offline File Gather
    Improved user file detection
    Windows Deployment Services
    Multiple Stream Transfer
    Dynamic Driver Provisioning
    VHD and WIM Support
    INTEGRATED SOLUTIONS CONTINUE
    Microsoft Assessment and Planning
    Application Compatibility Toolkit
    Microsoft Deployment Toolkit
  • 107. Want Windows 7 now?
    Fill out a survey
    We will draw for a copy of TechNet+ for every 50 surveys we receive
    Vancouver - http://tinyurl.com/STEP100
    Winnipeg - http://tinyurl.com/STEP101
    Calgary - http://tinyurl.com/STEP102
    What is TechNet+?
  • 108. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
    The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.