SlideShare a Scribd company logo
1 of 2
Download to read offline
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. This document is for informational purposes only. MICROSOFT
MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2004 Microsoft Corporation. All rights reserved.
Microsoft® Server 2003 SP1
B a t t l e C a r d
Key Features
Download, Attachment, and Authenticode Enhancements
Prompts that are used for file downloads, mail attachments,
shell process execution, and program installation have been
modified to be more consistent and clearer than they were in
previous versions of Windows Server. In addition, the publisher
information will be shown before a file type that is signable and
can potentially harm the user’s machine is openedputer
•
• Broad Set of Partner Solutions: A broad set of partner
solutions and prescriptive guidance for Virtual Server
maximizes business value.
• A key deliverable for Microsoft’s Dynamic Systems
Initiative: Microsoft’s industry wide effort to dramatically
simplify and automate how businesses design, deploy, and
operate IT systems, Virtual Server 2005 is another
example of how Microsoft is continuing to deliver
technology that results in improved server hardware
utilization and provides for more flexible provisioning of
data center resources.
Overview
Windows Server 2003 Service Pack 1 incorporates a set of
security technologies that will help to reduce the attack surface of
Windows Server systems and ease the administrative tasks
associated with configuring server security. Many of these
technologies were first introduced with Windows XP Service Pack
2, but many are specific to the Windows Server family of operating
systems. In addition a feature may be implemented differently on
the server operating system than it is on the desktop operating
system.
Windows Server 2003 Service Pack 1 has enhanced several
technologies in order to make it more difficult to attack systems
running Windows Server 2003, even if the latest updates are not
applied. The technologies include enhanced:
 Management, security, and performance
 File, print, and collaboration services
 Internet, application, and networking services
This service pack also includes updates designed to improve the
performance and stability of several Windows features.
Key Features
Administrative Tools are a set of Microsoft Management Console
(MMC) snap-ins that you can use to administer users,
computers, services, and other system components on local
and remote computers.
These new administrative tool features apply to
administrators who need to manage their computer from a
remote location using the affected administrative tools, which
are listed below. Administrators and users who are using
these tools to manage the local computer are not affected.
Data Execution Prevention (DEP) is a set of hardware and
software technologies that perform additional checks on
memory to help protect against malicious code exploits. In
Windows Server 2003 with Service Pack 1, DEP is now
enforced by both hardware and software.
Hardware-enforced DEP marks all memory locations in a
process as non-executable unless the location explicitly
contains executable code. There is a class of attacks that
attempt to insert and execute code from non-executable
memory locations. DEP helps prevent these attacks by
intercepting them and raising an exception.
Software-enforced DEP An additional set of DEP security
checks have been added to Windows Server 2003 with
Service Pack 1. These checks, known as software-enforced
DEP, are designed to mitigate exploits of exception handling
mechanisms in Windows. Software-enforced DEP runs on
any processor that is capable of running Windows Server
2003 with Service Pack 1. By default, software-enforced DEP
protects only `limited system binaries, regardless of the
hardware-enforced DEP capabilities of the processor.
DCOM Security Enhancements provides computer-wide access
controls that govern access to all call, activation, or launch
requests on the computer. The simplest way to think about
these access controls is as an additional AccessCheck call
that is done against a computerwide access control list (ACL)
on each call, activation, or launch of any COM server on the
computer.
The Microsoft Component Object Model (COM) is a platform-
independent, distributed, object-oriented system for creating
binary software components that can interact. The Distributed
Component Object Model (DCOM) allows applications to be
distributed across locations that make the most sense to you
and to the application. The DCOM wire protocol transparently
provides support for reliable, secure, and efficient
communication between COM components.
Filter for Add or Remove Programs
Internet Explorer Add-on Management and Crash Detection
Broad x86 guest OS compatibility: Runs all major x86
Scenarios
Four key scenarios for developers and server
administrators point to the ways in which Microsoft Virtual
Server 2005 leverages these advantages and delivers
maximally on improving hardware efficiency and increasing
administrator productivity and IT responsiveness.
Migrate Legacy Applications - Virtual Server enables
application compatibility with legacy environments, while
taking advantage of the reliability, manageability and
security of Windows Server 2003. Virtual Server delivers
this capability by enabling customers to run legacy
applications in their native software environment in virtual
machines, without rewriting application logic, reconfiguring
networks or retraining end users.
Consolidate Multiple Server Workloads - Virtual Server
is the recommended approach for server consolidation of
infrastructure services, disaster recovery environments and
department or branch office services—especially for
server-based applications on industry-standard hardware.
Virtual Server accomplishes this by allowing multiple
applications and services on disparate operating systems
to coexist on the same hardware, thus increasing hardware
utilization and manageability while reducing capital and
recurring costs related to hardware and hosting.
Consolidate and Automate Software Test and
Development Environments - For x86-based servers,
Virtual Server enables better test coverage, developer
productivity and user experience. Virtual Server enables
side-by-side testing and production partitions on the same
physical system.
Simulate Distributed Server Applications on a Single
Physical Server - Virtual Server is a potent time- and
resource-saving solution that minimizes hardware and
human resources in distributed server application
development scenarios. Virtual Server enables individual
developers to easily deploy and test a distributed server
application using multiple virtual machines on one physical
server.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. This document is for informational purposes only. MICROSOFT
MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2004 Microsoft Corporation. All rights reserved.
Guest Operating System Requirements
Guest Operating System Minimum Hard Disk Minimum Memory
Windows 2000 Server 2 GB 96 MB
Windows NT® 4.0 1 GB 64 MB
Virtual Server System Requirements
Component Requirement
Operating
System
Windows Server 2003 (Standard, Enterprise, or Datacenter Edition)
Windows Small Business Server 2003 (Standard or Premium Edition)
(Windows XP can be used for non-production systems)
Processor 550 MHz or faster processor (1.0 GHz or faster recommended); Requires a
Celeron, Pentium III, Pentium 4, Xeon, Athlon, Duron, or Opteron processor
Disk Space 2 GB of available hard disk space (additional disk space needed for each guest
operating system)
Memory 256 MB of RAM plus memory for all simultaneously running guest operating
systems
What are the competitors to Virtual Server?
Virtual Server’s primary competitor is VMware.
Does Virtual Server emulate Microsoft Windows®?
No. Virtual Server virtualizes PC and Server hardware. The guest operating system isn’t emulated, but
instead is a fully functioning version of the operating system.
Are there any limitations to Virtual Server?
Virtualization technology running on an x86 platform has certain limitations.
Most x86 applications should run normally in a virtual machine environment. Certain x86 applications will
not run in a virtual machine environment. These include:
• Applications that require direct access to a specific hardware device.
• Applications that require more than one processor.
Virtual Server is only supported on fully x86 compliant Windows Server machines. Also, Microsoft will only
support Windows operating systems and Microsoft applications running on Windows virtual machines.
Is there a limit to the number of virtual machines that can run simultaneously?
The number of virtual machines that can be hosted on any server depends on both: 1) the combined
processor, memory and IO load the virtual machines put on the host, and 2) the processor, memory and IO
capacity available on the host system.
What is a saved state?
Saved state is similar to “hibernating” a PC. You can turn off a virtual machine and put it into a saved state
at any time—even in the middle of an installation. Starting a virtual machine from a saved state takes only a
few seconds—much faster than booting it up.
What are undo disks?
Undo disks let you specify whether any changes made during machine use should be made permanent or
deleted when you turn off a virtual machine. This lets you experiment and make system changes, then
revert back to the original system state. Undo disks are specified on a per-virtual machine basis.
What is a differencing disk?
Differencing disks provide a way to allow multiple virtual machines to share a base configuration. Only the
differences in each virtual machine need to be saved, and those differences are saved in a local
differencing file. Whereas undo disks are specified on a per-virtual machine basis, differencing disks are
specified on a per-VHD basis.
Is there any hardware I can't use with Virtual Server 2005?
Virtual Server can run on nearly any x86 architecture server. Virtual Server takes advantage of the broad
hardware support already in place for the Windows operating system and can work with almost any
hardware environment an IT organization intends to use.
What's the difference between shared networking and virtual networking?
Shared networking allows virtual machines to connect to a network using built-in Network Address
Translation (NAT). Virtual networking allows each virtual machine to appear as a separate device, which
means you can run server services within the virtual machine.
What happens if a guest operating system crashes?
Virtual machine isolation ensures that if one virtual machine crashes or hangs, it cannot impact any other
virtual machine or the host system.
Can I move a virtual machine to another computer?
Yes. All you have to do is copy the .vhd and the ..vmc configuration files. Be aware that all operating
systems must be properly licensed.
Can I start a virtual machine stored on a network share?
Yes, just point virtual machine configuration to the location. You can even use a guest operating system
that other people are running, if you use a local differencing disk to store the information to ensure your
virtual machine is unique. Note that you must have the appropriate operating system licenses in place for
each user.
Talking Points
Microsoft vs. VMware
The Microsoft competitive position relative to VMware is centered on how
Microsoft solutions, support, and prescriptive guidance help solve specific customer
problems.
1. “Virtualize Everything” is not a sound business and technical decision for
Server Consolidation. Virtual Server 2005 with Windows Server 2003 complemented
by other members of the Windows Server System addresses many consolidation
scenarios without resorting to stretching a single virtual machine solution as a server
consolidation cure-all.
2. Microsoft offers a more comprehensive management solution.
3. One call support: customers make one call to Microsoft support and get issues
resolved regardless of it occurring in the MS application, guest OS, VS2005, or host
OS.
4. Virtual Server 2005 has greater extensibility through its COM API
5. Virtual Server 2005 is the most cost-effective solution: consider the total cost of
ownership
6. Virtual Server 2005 and Windows Server System (WSS): less compatibility issues
between OSes, applications, and VS2005.
7. Virtual Server 2005 is a key deliverable in Microsoft’s Dynamic System

More Related Content

What's hot

Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Tuan Yang
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGene Carboni
 
Active Directory Upgrade
Active Directory UpgradeActive Directory Upgrade
Active Directory UpgradeSpiffy
 
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) DeploymentsPlanning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) DeploymentsStuart McIntyre
 
Network operating systems
Network operating systems Network operating systems
Network operating systems Sachin Awasthi
 
Designing an Update-Friendly MSI Installation
Designing an Update-Friendly MSI InstallationDesigning an Update-Friendly MSI Installation
Designing an Update-Friendly MSI InstallationFlexera
 
Sql server 2012 autoexec event no 39
Sql server 2012 autoexec event no 39Sql server 2012 autoexec event no 39
Sql server 2012 autoexec event no 39Antonios Chatzipavlis
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGene Carboni
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesJeff Stokes
 
Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLockerutahmisfit
 
TDF Professional Conf 2010 - Rapid Windows 7 Deployments
TDF Professional Conf 2010 - Rapid Windows 7 DeploymentsTDF Professional Conf 2010 - Rapid Windows 7 Deployments
TDF Professional Conf 2010 - Rapid Windows 7 Deploymentsjimboks
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideKingfin Enterprises Limited
 
Desktop system,clustered system,Handheld system
Desktop system,clustered system,Handheld systemDesktop system,clustered system,Handheld system
Desktop system,clustered system,Handheld systemLokesh Singrol
 
Add remove roles & features win server 2012
Add remove roles & features win server 2012Add remove roles & features win server 2012
Add remove roles & features win server 2012شرف الشريف
 
MSI Sequences and Standard Actions: An Introduction
MSI Sequences and Standard Actions: An IntroductionMSI Sequences and Standard Actions: An Introduction
MSI Sequences and Standard Actions: An IntroductionFlexera
 

What's hot (19)

Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Wsus best practices
Wsus best practicesWsus best practices
Wsus best practices
 
Active Directory Upgrade
Active Directory UpgradeActive Directory Upgrade
Active Directory Upgrade
 
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) DeploymentsPlanning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
 
Network operating systems
Network operating systems Network operating systems
Network operating systems
 
Designing an Update-Friendly MSI Installation
Designing an Update-Friendly MSI InstallationDesigning an Update-Friendly MSI Installation
Designing an Update-Friendly MSI Installation
 
Sql server 2012 autoexec event no 39
Sql server 2012 autoexec event no 39Sql server 2012 autoexec event no 39
Sql server 2012 autoexec event no 39
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing Disks
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLocker
 
DPM 2010 Overview
DPM 2010 OverviewDPM 2010 Overview
DPM 2010 Overview
 
TDF Professional Conf 2010 - Rapid Windows 7 Deployments
TDF Professional Conf 2010 - Rapid Windows 7 DeploymentsTDF Professional Conf 2010 - Rapid Windows 7 Deployments
TDF Professional Conf 2010 - Rapid Windows 7 Deployments
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter Guide
 
Desktop system,clustered system,Handheld system
Desktop system,clustered system,Handheld systemDesktop system,clustered system,Handheld system
Desktop system,clustered system,Handheld system
 
Add remove roles & features win server 2012
Add remove roles & features win server 2012Add remove roles & features win server 2012
Add remove roles & features win server 2012
 
Ultima 14th March
Ultima 14th MarchUltima 14th March
Ultima 14th March
 
MSI Sequences and Standard Actions: An Introduction
MSI Sequences and Standard Actions: An IntroductionMSI Sequences and Standard Actions: An Introduction
MSI Sequences and Standard Actions: An Introduction
 
Install
InstallInstall
Install
 

Viewers also liked

Acc 410 entire course material auditing
Acc 410 entire course material  auditingAcc 410 entire course material  auditing
Acc 410 entire course material auditingProfessorLance
 
Cách Giảm Cân Cho Nam Giới
Cách Giảm Cân Cho Nam GiớiCách Giảm Cân Cho Nam Giới
Cách Giảm Cân Cho Nam Giớiyon546
 
Epic research daily agri report 12th may 2015
Epic research daily agri report 12th may  2015Epic research daily agri report 12th may  2015
Epic research daily agri report 12th may 2015Epic Research Limited
 
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...IJERA Editor
 
Relazione rendiconto 2014
Relazione rendiconto 2014Relazione rendiconto 2014
Relazione rendiconto 2014PATT Trento
 
Narcotics Anonymous-NA
Narcotics Anonymous-NA  Narcotics Anonymous-NA
Narcotics Anonymous-NA maryam lotfi
 
Jurnal FSTPT17 abadi dwi saputra
Jurnal FSTPT17 abadi dwi saputraJurnal FSTPT17 abadi dwi saputra
Jurnal FSTPT17 abadi dwi saputraabadi1982
 
Tehilim vbm course 30 ps 111 112 20150206 ftw
Tehilim vbm course 30 ps 111 112 20150206 ftwTehilim vbm course 30 ps 111 112 20150206 ftw
Tehilim vbm course 30 ps 111 112 20150206 ftwAkiva Berger
 
ความรู้เบื่องต้นเรื่องการทำ blogger
ความรู้เบื่องต้นเรื่องการทำ bloggerความรู้เบื่องต้นเรื่องการทำ blogger
ความรู้เบื่องต้นเรื่องการทำ bloggerJay's Watcharakorn
 
Оборудование для обработки куриных яиц
Оборудование для обработки куриных яицОборудование для обработки куриных яиц
Оборудование для обработки куриных яицqwer78
 
фотоальбом 10 річок світу
фотоальбом 10 річок світуфотоальбом 10 річок світу
фотоальбом 10 річок світуOlya Yavorivska
 
Speed Synchronization of Multiple Bldcmotors In Textile &Paper Mills Using Mi...
Speed Synchronization of Multiple Bldcmotors In Textile &Paper Mills Using Mi...Speed Synchronization of Multiple Bldcmotors In Textile &Paper Mills Using Mi...
Speed Synchronization of Multiple Bldcmotors In Textile &Paper Mills Using Mi...IJERA Editor
 
что сколько разлагается
что сколько разлагаетсячто сколько разлагается
что сколько разлагаетсяKurilskiy
 
Ideology or Pragmatism
Ideology or PragmatismIdeology or Pragmatism
Ideology or PragmatismRandy McCauley
 

Viewers also liked (16)

Acc 410 entire course material auditing
Acc 410 entire course material  auditingAcc 410 entire course material  auditing
Acc 410 entire course material auditing
 
Cách Giảm Cân Cho Nam Giới
Cách Giảm Cân Cho Nam GiớiCách Giảm Cân Cho Nam Giới
Cách Giảm Cân Cho Nam Giới
 
Epic research daily agri report 12th may 2015
Epic research daily agri report 12th may  2015Epic research daily agri report 12th may  2015
Epic research daily agri report 12th may 2015
 
Tugas ilmu lingkungan
Tugas ilmu lingkunganTugas ilmu lingkungan
Tugas ilmu lingkungan
 
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
Review of Use of Nonlocal Spectral – Spatial Structured Sparse Representation...
 
Relazione rendiconto 2014
Relazione rendiconto 2014Relazione rendiconto 2014
Relazione rendiconto 2014
 
Narcotics Anonymous-NA
Narcotics Anonymous-NA  Narcotics Anonymous-NA
Narcotics Anonymous-NA
 
Jurnal FSTPT17 abadi dwi saputra
Jurnal FSTPT17 abadi dwi saputraJurnal FSTPT17 abadi dwi saputra
Jurnal FSTPT17 abadi dwi saputra
 
Tehilim vbm course 30 ps 111 112 20150206 ftw
Tehilim vbm course 30 ps 111 112 20150206 ftwTehilim vbm course 30 ps 111 112 20150206 ftw
Tehilim vbm course 30 ps 111 112 20150206 ftw
 
ความรู้เบื่องต้นเรื่องการทำ blogger
ความรู้เบื่องต้นเรื่องการทำ bloggerความรู้เบื่องต้นเรื่องการทำ blogger
ความรู้เบื่องต้นเรื่องการทำ blogger
 
Оборудование для обработки куриных яиц
Оборудование для обработки куриных яицОборудование для обработки куриных яиц
Оборудование для обработки куриных яиц
 
фотоальбом 10 річок світу
фотоальбом 10 річок світуфотоальбом 10 річок світу
фотоальбом 10 річок світу
 
Speed Synchronization of Multiple Bldcmotors In Textile &Paper Mills Using Mi...
Speed Synchronization of Multiple Bldcmotors In Textile &Paper Mills Using Mi...Speed Synchronization of Multiple Bldcmotors In Textile &Paper Mills Using Mi...
Speed Synchronization of Multiple Bldcmotors In Textile &Paper Mills Using Mi...
 
что сколько разлагается
что сколько разлагаетсячто сколько разлагается
что сколько разлагается
 
Ideology or Pragmatism
Ideology or PragmatismIdeology or Pragmatism
Ideology or Pragmatism
 
Close up on film 1.11
Close up on film 1.11Close up on film 1.11
Close up on film 1.11
 

Similar to SP1_Battlecard

Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docxLinux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docxSHIVA101531
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxPoornimaGhodke3
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Louis Göhl
 
Virtualization
VirtualizationVirtualization
VirtualizationBirju Tank
 
Momentum Webcast HP Virtualization
Momentum Webcast HP VirtualizationMomentum Webcast HP Virtualization
Momentum Webcast HP Virtualizationaljimenez
 
TechNet Live spor 1 sesjon 2 - sc-forefront 2
TechNet Live spor 1   sesjon 2 - sc-forefront 2TechNet Live spor 1   sesjon 2 - sc-forefront 2
TechNet Live spor 1 sesjon 2 - sc-forefront 2Anders Borchsenius
 
Vskills certified enterprise applications integration specialist with micros...
Vskills certified enterprise applications integration specialist  with micros...Vskills certified enterprise applications integration specialist  with micros...
Vskills certified enterprise applications integration specialist with micros...Vskills
 
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docxDBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docxseifusisay06
 
Microsoft Product Licensing
Microsoft Product LicensingMicrosoft Product Licensing
Microsoft Product LicensingMotty Ben Atia
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software TestingColloquium
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 

Similar to SP1_Battlecard (20)

Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Windows Server 2003
Windows Server 2003Windows Server 2003
Windows Server 2003
 
John
JohnJohn
John
 
Clustering overview2
Clustering overview2Clustering overview2
Clustering overview2
 
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docxLinux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtual pc
Virtual pcVirtual pc
Virtual pc
 
Momentum Webcast HP Virtualization
Momentum Webcast HP VirtualizationMomentum Webcast HP Virtualization
Momentum Webcast HP Virtualization
 
TechNet Live spor 1 sesjon 2 - sc-forefront 2
TechNet Live spor 1   sesjon 2 - sc-forefront 2TechNet Live spor 1   sesjon 2 - sc-forefront 2
TechNet Live spor 1 sesjon 2 - sc-forefront 2
 
Vskills certified enterprise applications integration specialist with micros...
Vskills certified enterprise applications integration specialist  with micros...Vskills certified enterprise applications integration specialist  with micros...
Vskills certified enterprise applications integration specialist with micros...
 
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docxDBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
 
Microsoft Product Licensing
Microsoft Product LicensingMicrosoft Product Licensing
Microsoft Product Licensing
 
Windows sever 2008
Windows sever 2008Windows sever 2008
Windows sever 2008
 
MBESProductSheet (1)
MBESProductSheet (1)MBESProductSheet (1)
MBESProductSheet (1)
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 

SP1_Battlecard

  • 1. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2004 Microsoft Corporation. All rights reserved. Microsoft® Server 2003 SP1 B a t t l e C a r d Key Features Download, Attachment, and Authenticode Enhancements Prompts that are used for file downloads, mail attachments, shell process execution, and program installation have been modified to be more consistent and clearer than they were in previous versions of Windows Server. In addition, the publisher information will be shown before a file type that is signable and can potentially harm the user’s machine is openedputer • • Broad Set of Partner Solutions: A broad set of partner solutions and prescriptive guidance for Virtual Server maximizes business value. • A key deliverable for Microsoft’s Dynamic Systems Initiative: Microsoft’s industry wide effort to dramatically simplify and automate how businesses design, deploy, and operate IT systems, Virtual Server 2005 is another example of how Microsoft is continuing to deliver technology that results in improved server hardware utilization and provides for more flexible provisioning of data center resources. Overview Windows Server 2003 Service Pack 1 incorporates a set of security technologies that will help to reduce the attack surface of Windows Server systems and ease the administrative tasks associated with configuring server security. Many of these technologies were first introduced with Windows XP Service Pack 2, but many are specific to the Windows Server family of operating systems. In addition a feature may be implemented differently on the server operating system than it is on the desktop operating system. Windows Server 2003 Service Pack 1 has enhanced several technologies in order to make it more difficult to attack systems running Windows Server 2003, even if the latest updates are not applied. The technologies include enhanced:  Management, security, and performance  File, print, and collaboration services  Internet, application, and networking services This service pack also includes updates designed to improve the performance and stability of several Windows features. Key Features Administrative Tools are a set of Microsoft Management Console (MMC) snap-ins that you can use to administer users, computers, services, and other system components on local and remote computers. These new administrative tool features apply to administrators who need to manage their computer from a remote location using the affected administrative tools, which are listed below. Administrators and users who are using these tools to manage the local computer are not affected. Data Execution Prevention (DEP) is a set of hardware and software technologies that perform additional checks on memory to help protect against malicious code exploits. In Windows Server 2003 with Service Pack 1, DEP is now enforced by both hardware and software. Hardware-enforced DEP marks all memory locations in a process as non-executable unless the location explicitly contains executable code. There is a class of attacks that attempt to insert and execute code from non-executable memory locations. DEP helps prevent these attacks by intercepting them and raising an exception. Software-enforced DEP An additional set of DEP security checks have been added to Windows Server 2003 with Service Pack 1. These checks, known as software-enforced DEP, are designed to mitigate exploits of exception handling mechanisms in Windows. Software-enforced DEP runs on any processor that is capable of running Windows Server 2003 with Service Pack 1. By default, software-enforced DEP protects only `limited system binaries, regardless of the hardware-enforced DEP capabilities of the processor. DCOM Security Enhancements provides computer-wide access controls that govern access to all call, activation, or launch requests on the computer. The simplest way to think about these access controls is as an additional AccessCheck call that is done against a computerwide access control list (ACL) on each call, activation, or launch of any COM server on the computer. The Microsoft Component Object Model (COM) is a platform- independent, distributed, object-oriented system for creating binary software components that can interact. The Distributed Component Object Model (DCOM) allows applications to be distributed across locations that make the most sense to you and to the application. The DCOM wire protocol transparently provides support for reliable, secure, and efficient communication between COM components. Filter for Add or Remove Programs Internet Explorer Add-on Management and Crash Detection Broad x86 guest OS compatibility: Runs all major x86 Scenarios Four key scenarios for developers and server administrators point to the ways in which Microsoft Virtual Server 2005 leverages these advantages and delivers maximally on improving hardware efficiency and increasing administrator productivity and IT responsiveness. Migrate Legacy Applications - Virtual Server enables application compatibility with legacy environments, while taking advantage of the reliability, manageability and security of Windows Server 2003. Virtual Server delivers this capability by enabling customers to run legacy applications in their native software environment in virtual machines, without rewriting application logic, reconfiguring networks or retraining end users. Consolidate Multiple Server Workloads - Virtual Server is the recommended approach for server consolidation of infrastructure services, disaster recovery environments and department or branch office services—especially for server-based applications on industry-standard hardware. Virtual Server accomplishes this by allowing multiple applications and services on disparate operating systems to coexist on the same hardware, thus increasing hardware utilization and manageability while reducing capital and recurring costs related to hardware and hosting. Consolidate and Automate Software Test and Development Environments - For x86-based servers, Virtual Server enables better test coverage, developer productivity and user experience. Virtual Server enables side-by-side testing and production partitions on the same physical system. Simulate Distributed Server Applications on a Single Physical Server - Virtual Server is a potent time- and resource-saving solution that minimizes hardware and human resources in distributed server application development scenarios. Virtual Server enables individual developers to easily deploy and test a distributed server application using multiple virtual machines on one physical server.
  • 2. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2004 Microsoft Corporation. All rights reserved. Guest Operating System Requirements Guest Operating System Minimum Hard Disk Minimum Memory Windows 2000 Server 2 GB 96 MB Windows NT® 4.0 1 GB 64 MB Virtual Server System Requirements Component Requirement Operating System Windows Server 2003 (Standard, Enterprise, or Datacenter Edition) Windows Small Business Server 2003 (Standard or Premium Edition) (Windows XP can be used for non-production systems) Processor 550 MHz or faster processor (1.0 GHz or faster recommended); Requires a Celeron, Pentium III, Pentium 4, Xeon, Athlon, Duron, or Opteron processor Disk Space 2 GB of available hard disk space (additional disk space needed for each guest operating system) Memory 256 MB of RAM plus memory for all simultaneously running guest operating systems What are the competitors to Virtual Server? Virtual Server’s primary competitor is VMware. Does Virtual Server emulate Microsoft Windows®? No. Virtual Server virtualizes PC and Server hardware. The guest operating system isn’t emulated, but instead is a fully functioning version of the operating system. Are there any limitations to Virtual Server? Virtualization technology running on an x86 platform has certain limitations. Most x86 applications should run normally in a virtual machine environment. Certain x86 applications will not run in a virtual machine environment. These include: • Applications that require direct access to a specific hardware device. • Applications that require more than one processor. Virtual Server is only supported on fully x86 compliant Windows Server machines. Also, Microsoft will only support Windows operating systems and Microsoft applications running on Windows virtual machines. Is there a limit to the number of virtual machines that can run simultaneously? The number of virtual machines that can be hosted on any server depends on both: 1) the combined processor, memory and IO load the virtual machines put on the host, and 2) the processor, memory and IO capacity available on the host system. What is a saved state? Saved state is similar to “hibernating” a PC. You can turn off a virtual machine and put it into a saved state at any time—even in the middle of an installation. Starting a virtual machine from a saved state takes only a few seconds—much faster than booting it up. What are undo disks? Undo disks let you specify whether any changes made during machine use should be made permanent or deleted when you turn off a virtual machine. This lets you experiment and make system changes, then revert back to the original system state. Undo disks are specified on a per-virtual machine basis. What is a differencing disk? Differencing disks provide a way to allow multiple virtual machines to share a base configuration. Only the differences in each virtual machine need to be saved, and those differences are saved in a local differencing file. Whereas undo disks are specified on a per-virtual machine basis, differencing disks are specified on a per-VHD basis. Is there any hardware I can't use with Virtual Server 2005? Virtual Server can run on nearly any x86 architecture server. Virtual Server takes advantage of the broad hardware support already in place for the Windows operating system and can work with almost any hardware environment an IT organization intends to use. What's the difference between shared networking and virtual networking? Shared networking allows virtual machines to connect to a network using built-in Network Address Translation (NAT). Virtual networking allows each virtual machine to appear as a separate device, which means you can run server services within the virtual machine. What happens if a guest operating system crashes? Virtual machine isolation ensures that if one virtual machine crashes or hangs, it cannot impact any other virtual machine or the host system. Can I move a virtual machine to another computer? Yes. All you have to do is copy the .vhd and the ..vmc configuration files. Be aware that all operating systems must be properly licensed. Can I start a virtual machine stored on a network share? Yes, just point virtual machine configuration to the location. You can even use a guest operating system that other people are running, if you use a local differencing disk to store the information to ensure your virtual machine is unique. Note that you must have the appropriate operating system licenses in place for each user. Talking Points Microsoft vs. VMware The Microsoft competitive position relative to VMware is centered on how Microsoft solutions, support, and prescriptive guidance help solve specific customer problems. 1. “Virtualize Everything” is not a sound business and technical decision for Server Consolidation. Virtual Server 2005 with Windows Server 2003 complemented by other members of the Windows Server System addresses many consolidation scenarios without resorting to stretching a single virtual machine solution as a server consolidation cure-all. 2. Microsoft offers a more comprehensive management solution. 3. One call support: customers make one call to Microsoft support and get issues resolved regardless of it occurring in the MS application, guest OS, VS2005, or host OS. 4. Virtual Server 2005 has greater extensibility through its COM API 5. Virtual Server 2005 is the most cost-effective solution: consider the total cost of ownership 6. Virtual Server 2005 and Windows Server System (WSS): less compatibility issues between OSes, applications, and VS2005. 7. Virtual Server 2005 is a key deliverable in Microsoft’s Dynamic System