Canada Windows 7 Tour


Published on

Presentation to the Calgary, Winnipeg and Vancouver user groups

1 Comment
  • You should know that Information is for everybody. You should not disable download link. When someone shares with you something of value, you have an obligation to share it with others!
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The Springboard Series program was developed in response to primary research conducted with IT Pros worldwide (direct interviews, focus groups) and key MS field roles (TSPs, ATSs, ITEs, PAMs, TAMs, Architects). The findings fell into two areas—the need to make learning about how a new OS environment directly impacts the IT Pro more consumable (and the messages more relevant), and how the mis-handling of Vista to this audience has cost us in poor NSAT and perceptionsTo remedy this situation, the Win Client IT pro audience developed a program to provide the right information, at the right technical level, at the right point in the adoption lifecycle, and to do so in a frank, open and honest tone. This program has two major components—a breadth effort that touches IT pros directly (through Technet and related properties), and a depth component that supports field and partner engagements
  • UAC was introduced in Windows Vista to help provide customers more control of their system by enabling IT administrators to lock down the system for certain users by running them within standard, non privileged user accounts and to influence the ecosystem to write software that does not need administrative rights. Transitioning the ecosystem to create software that does not require administrative changes to the machine is a very good thing for overall reliability of the machine as well as for the overall security of the machine since it limits the potential damage. UAC has delivered successfully on this in the Windows Vista timeframe and customers continue to value the ability to create a standard user and be confident an administrator can make the decisions on what software is added to the system and what changes should be allowed. However, we have received substantial feedback about the number of notifications for change. In Windows 7, we have invested in addressing the key customer feedback around UAC, while still maintaining the ability for IT administrators to be confident about a standard user environmentand still maintaining the influence on the ecosystem to create software that does not require administrative rights.We have enabled the Windows operations that users do often to be done in a standard user environment with the goal of providing prompt free daily activities. For example, a standard user can now adjust the readability of the screen (dpi) without having to change it for the entire system. Additionally, we have reduced key duplicate notifications for common activities such as installing applications from IE. We have also made it easier for IT to look at key setting on the system without needing administrative privileges by refactoring many of our control panel applications into read only and write sections.In line with our overall Windows 7focus on user-in-control, we have enabled a person running as a protected administrator to determine the range of notifications s/he receives. Based on customer feedback and actual instrumented data from our customers’ response to UAC prompts, we default the initial setting for UAC such that administrators are notified when software other than Windows is requesting to change the overall system and such that standard users will receive a request for administrator authorization for any change to the overall system. We believe this default setting has the right balance of establishing an ecosystem where a broad range of ISV software can be run in a standard user environment while providing administrators with control over the experience of configuring Windows.
  • Canada Windows 7 Tour

    1. 1. Welcome to Windows 7, eh?<br />Stephen L Rose<br />Worldwide Community Manager – Windows Client<br /><br /><br />Blog-<br />Twitter- @stephenlrose / @MSspringboard<br />
    2. 2. Agenda<br />Who Am I?<br />Resources, Resources, Resources<br />Windows 7 Overview<br />Windows 7 Anywhere<br />Security and Control in Windows 7<br />Windows 7 Deployment<br />Wrap-up<br />
    3. 3. What is the Springboard Series?<br />To the IT pro, our goal is:<br /><ul><li>Be the definitive resource for Desktop IT pros
    4. 4. Open, honest; show don’t tell
    5. 5. Information at right time, right level across Adoption Lifecycle</li></ul>Inside of Microsoft we are:<br /><ul><li>A turnkey IT pro engagement platform for depth & breadth
    6. 6. The program to mobilize MS marketing & field to focus on desktop OS IT pros</li></ul>The Springboard Series IT pro experience offers dynamic content and structured guidance across the adoption lifecycle<br />Weekly, Monthly and Quarterly Rhythm of Topical Content <br />one-Windows TechCenter in 10 languages<br />Straight-talk Monthly Feature Articles & Overview Guides<br />IT Pro adoption days Event Kits (Win 7 updates) and messaging<br />Weekly Targeted IT Pro Drive-time Podcasts<br />Virtual Roundtable Events<br />
    7. 7. Springboard Series on TechNet: The Key Resource for IT Pros<br /> (in 10 languages)<br />
    8. 8. Want the latest IT Pro info?<br />Twitter<br />@MSspringboard<br />Blog<br /><br />Newsletter<br />
    9. 9. – The people behind Win 7<br />
    10. 10. Get Ready for The New EfficiencySeptember 29th, 2009<br />Attend the New Efficiency virtual event and see how innovations in Windows 7, Windows Server 2008 R2, and Microsoft Exchange Server 2010 and Microsoft Forefront offer familiar, integrated solutions that help you simplify management and compliance and securely connect people to information.<br />You can be among the first to evaluate these exciting new products. Attend expert-led sessions and keynotes. Find out about special offers, and check out some great demos. Join in when you want, and dive deeper into technical content for desktops, server, communications, and security.  <br />As a special offer, on September 29th  9-10.30am please join us for a televised panel discussion  on “The New Efficiency” live from San Francisco.  Join in the conversation during this must-see event and see top technology leaders across industry and Microsoft’s Steve Ballmer, debate the role of IT during this economic reset. <br />Visit www.TheNewEfficiency.comto learn more<br />
    11. 11. Want Windows 7 now?<br />Fill out a survey<br />We will draw for a copy of TechNet+ for every 50 surveys we receive<br />Vancouver -<br />Winnipeg -<br />Calgary -<br />
    12. 12. Let’s Begin<br />
    13. 13.
    14. 14. Windows 7 Versions- Available 10/22 unless otherwise noted.<br />Windows 7 Starter <br />NoAero<br />No 64 Bit<br />Windows 7 Home Basic<br />Emerging Markets only<br />Windows 7 Home Premium<br />Includes Aero, Media Center and Touch<br />Windows 7 Professional<br />Does not support Direct Access, BitLocker, BitLocker To Go, BranchCache. <br />Windows 7 Enterprise (available now)<br />Supports all features. Only available via Volume License to Software Assurance customers.<br />Windows 7 Ultimate<br />Supports all features.<br />
    15. 15.
    16. 16. Understanding VL and SA<br />What is Volume Licensing?<br />Volume Licensing is the most affordable way to upgrade your existing PCs to Windows 7Enterprise.<br />Windows licenses available through Volume Licensing are upgrade-only licenses. They do not replace purchasing the initial Windows licenses for software that comes pre-installed on new PCs. <br />Each desktop that runs the Windows 7 upgrade must first be licensed to run one of the qualifying operating systems (Windows Vista (Enterprise/Business/Ultimate) or Windows XP (Professional)—otherwise the PC will not have a valid, legal Windows license. <br />What is Software Assurance?<br />When you acquire Windows 7 Professional licenses, either through Volume Licensing upgrades or through an OEM, you can cover those licenses with Software Assurance to get rights to Windows 7 Enterprise.<br />SA also applies to Office and other Microsoft products.<br />
    17. 17. What Else Do I Get With SA?<br />Microsoft Desktop Optimization Pack (MDOP) - MDOP is an add-on subscription license that provides innovative technologies to help better control the desktop PC, accelerate and simplify desktop PC deployments and management, and create a dynamic infrastructure by turning software into centrally-managed services. <br />Windows Virtual Enterprise Centralized Desktop (VECD) for Software Assurance - Windows VECD is an annual device-based subscription that enables organizations to license virtual copies of Windows 7 (or prior OS versions) in a variety of user scenarios.<br />Windows Fundamentals for Legacy PCs - Available exclusively to Microsoft Software Assurance customers, this small-footprint, Windows-based operating system solution is for customers with legacy computers running early operating systems who are not in a position to purchase new hardware.<br />Virtual OS Rights - Use up to four instances of Windows in virtual OS environments for each license that has active Software Assurance coverage.<br />New Version Rights - Receive new versions of licensed software released during the term of your coverage. If you have Software Assurance coverage for your PCs when Windows 7 is released, you will automatically receive rights to use Windows 7 Enterprise on those PCs. <br />
    18. 18. What’s The Killer Feature In Windows 7?<br />
    19. 19. What’s The Killer Feature In Windows 7?<br />“I Don’t Care How It Works. I Just Want It To Work.”<br />Mobility<br />Direct Access / VPN Reconnect/Mobile Broadband / BranchCache<br />Security and Control<br />BitLocker/BitLocker To Go / Improved UAC<br />Desktop Auditing / NAP / AppLocker / IE8<br />GUI<br />New Aero Features / Search / Wireless support / Device Stage / Location Aware Printing / Home Groups / Libraries <br />General<br />Speed / Efficiency / Capabilities / Flexibility / Reliability<br />
    20. 20. Windows 7 and Access Anywhere<br />
    21. 21. Information Worker’s World Has Been Changing<br />CENTRAL OFFICE<br />BRANCH OFFICES<br />REMOTE WORK<br />MOBILE & DISTRIBUTED WORKFORCE<br />
    22. 22. The Evolving Needs<br />IT Professional needs:<br /><ul><li>Secure and flexible infrastructure for“work anywhere”
    23. 23. Reduce costs</li></ul>Mobile & Remote Work-Force needs:<br /><ul><li>Work anywhere
    24. 24. Fast access</li></li></ul><li>Remote Access for Mobile Workers<br />Windows 7 Solution<br />Situation Today<br />DirectAccess<br />Home<br />Office<br />Home<br />Office<br /><ul><li>Corporate network boundary includes managed assets no matter where they are on the Internet
    25. 25. Easy to service mobile PCs and distribute updates and polices
    26. 26. New network paradigm increases mobile user productivity by providing same experience inside & outsidethe office
    27. 27. Challenging for IT to manage, update, patch mobile PCs while disconnected from company network
    28. 28. Difficult for users to access corporate resources from outside the office</li></li></ul><li>DirectAccess Components<br />Server<br />Client<br /><ul><li>Runs on Windows 7
    29. 29. Domain-joined
    30. 30. Initial configuration done on Corpnet or over VPN
    31. 31. Runs on Windows Server 2008 R2
    32. 32. Sits on network edge
    33. 33. Single box by default
    34. 34. Services can be split up for scalability</li></li></ul><li>DirectAccess<br />Technical Details<br />IPsec/IPv6<br />Internet<br />Compliant Client<br />Compliant Client<br />NAP / NPS Servers<br />IPsec/IPv6<br />IPsec/IPv6<br />Tunnel over IPv4 UDP, HTTPS, etc.<br />DirectAccess Server<br />Intranet User<br />Assume the underlying network is always insecure<br />Data Center and Business Critical Resources<br />Intranet User<br />Redefine enterprise network edge to insulate the datacenter and business critical resources<br />Enterprise Network<br />Security policies based on identity, not location<br />
    35. 35. DirectAccess & IPv6<br />Internet<br />DirectAccessServer<br />DirectAccessClient<br />Tunnel over IPv4 UDP, HTTPS, etc.<br />Encrypted IPsec+ESP<br />Native IPv6<br />6to4<br />Teredo<br />IP-HTTPS<br />
    36. 36. DirectAccess & IPsec<br />EnterpriseNetwork<br />Line of Business Applications<br />DirectAccess Server<br />No IPsec<br />IPsec Integrity Only (Auth)<br />IPsec Integrity + Encryption<br />
    37. 37. DirectAccess Deployment<br />Get ready step by step<br />Determine your strategy<br />Be ready to monitor IPv6 traffic<br />Choose an Access Model: Full Intranet Access vs. Selected Server Access?<br />Assess deployment scale<br />Get your infrastructure ready<br />Windows 7 clients<br />Windows Server 2008 R2 DirectAccess Server<br />DC, DNS Server, Active Directory, PKI, Application Servers, etc.<br />During deployment<br />Use DirectAccess configuration wizard to setup DirectAccess Server and generate policies for clients, application servers, and DC/DNS<br />Customize policies as needed<br />
    38. 38. IT Pro Benefits<br />Improved manageability of remote users <br />IT simplification and cost reduction<br />Consistent security for all access scenarios<br />Seamless & secure access to corporate resources<br />Consistent connectivity experience in / out office<br />Combined with other Windows 7 features enhances the end to end IW experience<br />DirectAccess Benefits<br />End User Benefits<br />
    39. 39. DirectAccess? Show Me!<br />Client Side: How Easy Is <br />
    40. 40. VPN Reconnect<br />Windows 7 Solution<br />Situation Today<br />VPN Server<br /><ul><li>The client maintains persistent VPN connection across network outages
    41. 41. VPN Client can connect to any VPN Server of choice</li></ul>VPN Server<br /><ul><li>VPN used frequently for remote access to corporate resources
    42. 42. Mobile workers reconnect to VPN on every network outage</li></ul>Benefits<br /><ul><li>Better end user experience: seamless and consistent VPN connectivity
    43. 43. Reduced support costs </li></li></ul><li>Mobile Broadband<br />Windows 7 Solution<br />Situation Today<br />Integrated solution that is consistent and easy to discover<br /><ul><li>Plug & play experience for 3G cards (built-in or external)</li></ul>Benefits<br /> Internet connectivity via mobile broadband cards is expanding:<br /><ul><li>Inconsistent user experience
    44. 44. Additional software required
    45. 45. IHVs can integrate devices using Windows 7 platform
    46. 46. No need for users to install3rd party software
    47. 47. End users have same connectivity experience across WiFi and WWAN</li></li></ul><li>Branch Office Enhancements<br />Windows 7 Solution<br />Situation Today<br />BranchCache™<br />Caches content downloaded from file and Web servers<br />Users in the branch can quickly open files stored in the cache<br />Frees up network bandwidth for other uses<br />Application and data access over WAN is slow in branch offices<br />Slow connections hurt user productivity <br />Improving network performance is expensive and difficult to implement <br />
    48. 48. BranchCache<br />Technical Details<br /><ul><li>Authenticates current state of data and access rights of the user against the server
    49. 49. Supports commonly used protocols: HTTP(S), SMB
    50. 50. Support network security protocols (SSL, IPsec)
    51. 51. Requires Windows Server 2008 R2 in the data center and Hosted Cache</li></li></ul><li>BranchCache Distributed Cache<br />Main Office<br />Data<br />Get<br />Get<br />ID<br />ID<br />Data<br />Data<br />Get<br />Get<br />Branch Office<br />
    52. 52. BranchCache Hosted Cache<br />Main Office<br />Get<br />Get<br />ID<br />ID<br />ID<br />ID<br />ID<br />Data<br />ID<br />Data<br />Data<br />Data<br />Search<br />Search<br />Get<br />Put<br />Advertize<br />Get<br />Request<br />Branch Office<br />
    53. 53. BranchCache<br />Hosted CacheData cached at the host server<br />Distributed Cache<br />Data cached in cache pool<br /><ul><li>Cache stored centrally: existing Windows Server 2008 R2 in the branch
    54. 54. Cache availability is high
    55. 55. Enables branch-wide caching
    56. 56. Increased reliability
    57. 57. Recommended for branches without a branch server
    58. 58. Easy to deploy: Enabled on clients through Group Policy
    59. 59. Cache availability decreases with laptops that go offline</li></ul>Enterprise<br />
    60. 60. BranchCache Framework<br />3rd Party Applications<br />IE<br />WMP<br />Explorer<br />BITS<br />SharePoint<br />CopyFile<br />Office<br />Office<br />HTTP (WebIO/http.sys)<br />SMB(CSC/SRV)<br />BranchCache<br />
    61. 61. BranchCache Benefits<br />IT Pro Benefits<br /><ul><li>Optimize network utilization:
    62. 62. HTTP and HTTPS-based intranet traffic
    63. 63. SMB (and signed SMB) shares on the read path
    64. 64. Support network security protocols (SSL, IPsec)
    65. 65. Reduce the cost of managing WAN
    66. 66. Improve application responsiveness and reduce file transferwait time
    67. 67. Combined with other SMB offerings enhance the userexperience on remote shares</li></ul>End User Benefits<br />
    68. 68. Enhance Security & Control in Windows 7<br />
    69. 69. Windows 7 Enterprise Security<br />Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable.<br />Fundamentally Secure Platform<br />Helping Protect Users & Infrastructure<br />Helping Secure Anywhere Access<br />Helping<br />Protect <br />Data<br />Windows Vista Foundation<br />Streamlined User Account Control<br />Enhanced Auditing<br />Network Security<br />Network Access Protection<br />DirectAccessTM<br />AppLockerTM<br />Internet Explorer 8<br />Data Recovery<br />RMS<br />EFS<br />BitLocker & BitLocker To GoTM<br />
    70. 70. Fundamentally Secure Platform<br />Windows Vista Foundation<br />Enhanced Auditing<br />Streamlined User Account Control<br />Make the system work well for standard users<br />Administrators use full privilege only for administrative tasks<br />File and registry virtualization helps applications that are not UAC compliant <br />Group Policy Configurable<br />XML based<br />Granular audit categories<br />Detailed collection of audit results<br />Simplified compliance management<br />Security Development Lifecycle process<br />Kernel Patch Protection<br />Windows Service Hardening<br />DEP & ASLR<br />IE 8 inclusive<br />Mandatory Integrity Controls<br />
    71. 71. User Account Control<br />Windows Vista<br />System Works for Standard User<br />All users, including administrators, run as Standard User by default<br />Administrators use full privilege only for administrative tasks or applications<br />Influence the ecosystem to write software that does not need administrative rights<br />Streamlined UAC<br />Reduce the number of OS applications and tasks that require elevation<br />Refactor applications into elevated/non-elevated pieces<br />Flexible prompt behavior for administrators<br />Continued ecosystem influence for standard user applications<br />Challenges<br />Customer Value<br />User provides explicit consent before using elevated privilege<br />Disabling UAC removes protections, not just consent prompt<br />Users can do even more as a standard user<br />Administrators will see fewer UAC Elevation Prompts<br />Windows 7<br />
    72. 72. Desktop Auditing<br />Windows Vista<br />Enhanced Auditing<br />New XML based events<br />Fine grained support for audit of administrative privilege<br />Simplified filtering of “noise” to find the event you’re looking for<br />Tasks tied to events<br />Simplified configuration results in lower TCO<br />Demonstrate why a person has access to specific information<br />Understand why a person has been denied access to specific information<br />Track all changes made by specific people or groups<br />Challenges<br />Granular auditing complex to configure<br />Auditing access and privilege use for a group of users<br />Windows 7<br />
    73. 73. UAC & Auditing<br />demo <br />
    74. 74. Securing Anywhere Access<br />Network Security<br />DirectAccess<br />Network Access Protection<br />Ensure that only “healthy” machines can access corporate data<br />Enable “unhealthy” machines to get clean before they gain access <br />Security protected, seamless, always on connection to corporate network<br />Improved management of remote users <br />Consistent security for all access scenarios<br />Policy based network segmentation for more secure and isolated logical networks<br />Multi-Home Firewall Profiles<br />DNSSec Support<br />
    75. 75. Network Access Protection<br />Remediation<br />Servers<br />Example: Patch<br />Restricted<br />Network<br />Corporate Network<br />Policy Servers<br />such as: Patch, AV<br />Health policy validation and remediation<br />Helps keep mobile, desktop and server devices in compliance<br />Reduces risk from unauthorized systems on the network<br />Not policy compliant<br />Policy compliant<br />DHCP, VPN<br />Switch/Router <br />Windows<br />Client<br />NPS<br />Windows 7<br />
    76. 76. Protect Users & Infrastructure<br />AppLockerTM<br />Data Recovery<br />Internet Explorer 8<br />Protect users against social engineering and privacy exploits<br />Protect users against browser based exploits<br />Protect users against web server exploits<br />File back up and restore<br />CompletePC™ image-based backup <br />System Restore<br />Volume Shadow Copies<br />Volume Revert <br />Enables application standardization without increasing TCO<br />Increase security to safeguard against data and privacy loss<br />Support compliance enforcement<br />
    77. 77. Help Desk Made Easier<br />Problem Steps Recorder<br />Windows Troubleshooting Platform<br />
    78. 78. Application Control<br />Situation Today<br />AppLocker<br />Eliminate unwanted/unknown applications in your network<br />Enforce application standardization within your organization<br />Easily create and manage flexible rules using Group Policy<br />Users can install and run non-standard applications<br />Even standard users can install some types of software<br />Unauthorized applications may:<br />Introduce malware<br />Increase helpdesk calls<br />Reduce user productivity<br />Undermine compliance efforts<br />Windows 7 Solution<br />
    79. 79. AppLocker<br />demo <br />
    80. 80. AppLocker<br />Technical Details<br />Simple Rule Structure: Allow, Exception & Deny<br />Publisher Rules<br />Product Publisher, Name, Filename & Version<br />Multiple Policies<br />Executables, installers, scripts & DLLs<br />Rule creation tools & wizard<br />Audit only mode<br />SKU Availability<br />AppLocker – Enterprise, Ultimate<br />Legacy SRP – Business & Enterprise<br />
    81. 81. BitLocker / BitLocker To Go<br />Situation Today<br />BitLocker To Go<br />+<br />Worldwide Shipments (000s)<br />Extend BitLocker drive encryption to removable devices<br />Create group policies to mandate the use of encryption and block unencrypted drives <br />Simplify BitLocker setup and configuration of primary hard drive<br /><ul><li>Gartner “Forecast: USB Flash Drives, Worldwide, 2001-2011” 24 September 2007, Joseph Unsworth  
    82. 82. Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa, George Shiffler III </li></ul>Windows 7 Solution<br />
    83. 83. BitLocker /BitLocker To Go<br />Technical Details<br />BitLocker Enhancements<br />Automatic 200 Mb hidden boot partition<br />New Key Protectors<br />Domain Recovery Agent (DRA)<br />Smart card – data volumes only<br />BitLocker To Go<br />Support for FAT*<br />Protectors: DRA, passphrase, smart card and/or auto-unlock<br />Management: protector configuration, encryption enforcement<br />Read-only access on Vista & XP<br />SKU Availability<br />Encrypting – Enterprise, Ultimate<br />Unlocking – All<br />
    84. 84. BitLocker To Go Demo<br />demo <br />
    85. 85. Windows 7 Enterprise Security<br />Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable.<br />Fundamentally Secure Platform<br />Protect Users & Infrastructure<br />Securing Anywhere Access<br />Protect Data from Unauthorized Viewing<br />Windows Vista Foundation<br />Streamlined User Account Control<br />Enhanced Auditing<br />Network Security<br />Network Access Protection<br />DirectAccess<br />AppLocker<br />Internet Explorer 8<br />Data Recovery<br />RMS<br />EFS<br />BitLocker<br />
    86. 86. Windows 7Deployment and Application Compatibility Tools<br />
    87. 87. APPLICATION COMPATIBILITY PROCESS<br />&gt; COLLECT &gt;<br />&gt; MITIGATE<br />&gt; ANALYZE &gt;<br />Collect an Application Inventory<br />Rationalize and Consolidate Applications<br />Analyze for Compatibility and ISV Support<br />Test for and Mitigate Compatibility Issues<br />
    88. 88. Deployment Investments For Windows Vista Carry Forward<br />Application and device compatibility core tenets are unchanged between Windows Vista and Windows 7<br />System image management tools and processes are consistent for both operating systems<br />Deployment tools developed for Windows Vista will carry forward to Windows 7 with incremental updates<br />Post-deployment desktop management leverages the same tools and processes for both operating systems<br />
    89. 89. Application Compatibility Tools <br />&gt; COLLECT &gt;<br />&gt; ANALYZE &gt;<br />&gt; MITIGATE<br />Application Compatibility Toolkit<br />Application Virtualization<br />Application Quality Cookbook<br />Virtual Legacy Windows OS<br />(MED-V, XP Mode) <br />Application Compatibility Toolkit<br />Windows Compatibility Center<br />Compatible Applications List<br />Application Quality Cookbook<br />Application Verifier<br />Application Compatibility Toolkit<br />Asset Inventory Service<br />Microsoft Assessment and Planning<br />System Center Family<br />
    90. 90. Windows 7 Deployment<br />IMAGING<br />MIGRATION<br />DELIVERY<br />Deployment Image Servicing and Management<br />Add/Remove Drivers and Packages<br />WIM and VHD Image Management<br />User State Migration Tool<br />Hard-link Migration<br />Offline File Gather<br />Improved user file detection<br />Windows Deployment Services<br />Multiple Stream Transfer<br />Dynamic Driver Provisioning<br />VHD and WIM Support<br />INTEGRATED SOLUTIONS CONTINUE<br />Microsoft Assessment and Planning<br />Application Compatibility Toolkit<br />Microsoft Deployment Toolkit<br />
    91. 91. Deployment Image Servicing And Management<br />Enable and disable, enumerate, add, remove packages and updates<br />Add, remove, enumerate drivers<br />WIM and VHD support<br />OEMs can select OS editions offline<br />
    92. 92. Windows Deployment Services Multicast Enhancements<br />Multiple Stream Transfer<br />Multiple bands to broadcast images to clients<br />Optimized rates per client connection<br />Client Auto Removal<br />Slower clients can be dropped to unicast or entirely (only in standard multicast)<br />Boot Image Multicast<br />Windows PE boot images can use multicast (clients with EFI) <br />Fast<br />Medium<br />Slow<br />
    93. 93. Multicast<br />WDS Server<br />Multicast <br />Transmission<br />First client joins “transmission”<br />Clients<br />
    94. 94. Multicast<br />WDS Server<br />Multicast <br />Transmission<br />Waiting for other clients to join…<br />Clients<br />
    95. 95. Multicast<br />WDS Server<br />Multicast <br />Transmission<br />Transmission begins…<br />Clients with multiple transfer speeds<br />Medium<br />Fastest<br />
    96. 96. Multicast<br />WDS Server<br />Multicast <br />Transmission<br />Additional clients join stream <br />Clients with multiple transfer speeds<br />Medium<br />Slowest<br />Medium<br />Fastest<br />
    97. 97. Multicast<br />WDS Server<br />Multicast <br />Transmission<br />More clients to join<br />Clients with multiple transfer speeds<br />Fastest<br />Medium<br />Fastest<br />Medium<br />Medium<br />Slowest<br />Medium<br />
    98. 98. Multicast<br />WDS Server<br />Multicast <br />First clients complete. Second broad-cast begins. One client removed.<br />Clients with multiple transfer speeds<br />Medium<br />Medium<br />Medium<br />Medium<br />Slowest<br />
    99. 99. Multicast<br />WDS Server<br />Multicast <br />Last clients complete…<br />Clients with multiple transfer speeds<br />Medium<br />Medium<br />Slowest<br />
    100. 100. Multicast<br />WDS Server<br />Multicast <br />All clients complete. <br />Transmission ends. <br />Clients<br />
    101. 101. WDS Server<br />ImagesDrivers<br />Client<br />Windows Deployment Services Dynamic Driver Provisioning<br />Driver targeting to match drivers to hardware<br />Reduces image size and centralizes deployment driver management<br />
    102. 102. User State Migration Tool<br />Hard-link Migration <br />Enables local file migration without copying or moving files<br />Processes migration jobs in third of the time or less <br />Offline User State Capture <br />Capture during Windows PE phase to improve speed<br />Volume Shadow Copy<br />Capture files even while they are in use<br />Improved File Discovery<br />Reduces XML customization need <br />
    103. 103. Volume Activation in Windows 7<br />Based on Volume Activation 2.0 for Windows Vista and Windows Server 2008<br />Activation is required for all editions of Windows 7 client<br />Employs the same key hierarchy (KMS, MAK)<br />Online validation experience unchanged<br />
    104. 104. Volume Activation 2.0 for Windows 7<br />
    105. 105. Microsoft Assessment and Planning<br />Application Compatibility Toolkit<br />Microsoft Deployment Toolkit<br />Inventory, Compatibility And Deployment Tools<br />
    106. 106. Conclusion<br />IMAGING<br />MIGRATION<br />DELIVERY<br />Deployment Image Servicing and Management<br />Add/Remove Drivers and Packages<br />WIM and VHD Image Management<br />User State Migration Tool<br />Hardlink Migration<br />Offline File Gather<br />Improved user file detection<br />Windows Deployment Services<br />Multiple Stream Transfer<br />Dynamic Driver Provisioning<br />VHD and WIM Support<br />INTEGRATED SOLUTIONS CONTINUE<br />Microsoft Assessment and Planning<br />Application Compatibility Toolkit<br />Microsoft Deployment Toolkit<br />
    107. 107. Want Windows 7 now?<br />Fill out a survey<br />We will draw for a copy of TechNet+ for every 50 surveys we receive<br />Vancouver -<br />Winnipeg -<br />Calgary -<br />What is TechNet+?<br />
    108. 108. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.<br />The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.<br />