SlideShare a Scribd company logo
1 of 18
BIGGER than ever!
195
event locations
#GlobalAzure
Deeper into DSC
Matt Hitchcock, PowerShell MVP
3rd year in Singapore
http://matthitchcock.com
Windows Operating System
APIAPIAPIAPIAPIAPI
Windows Management Framework
WinRMWMI PowerShellBITS LCM
PowerShell
Web Access
Agent
• Local Configuration
Manager (LCM) Delivers
DSC
• Supports Industry Standard
MOF Documents from
DMTF
• Uses PowerShell and API’s
to Deliver Configuration
• Understands how to
configure settings using
Resources
• Other Vendors are plugging
into the LCM now and
building resources
Term Explanation
Local Configuration Manager (LCM) The agent within the Windows Management
Framework that can enact Configurations on a
system
Configuration / Document / Configuration
Document
A file formatted in Industry Standard syntax (MOF)
that describes the configuration of the system
Resource Used by the Local Configuration Manager to:
• Understand the components in the Configuration
• Understand how to Test if they are compliant
• Understand how to Set them to a compliant State
• Understand how to Get Compliance Status
information
Intent Environment
Configuration
(Dev -> Test -> Production)
$SystemDrive = "C:"
$DemoFolder = "$SystemDriveDemo"
$global:WebServerCount = 3
…
Structural
Configuration
WindowsFeature IIS {
Name = "Web-Server"
Ensure = "Present"
}
…
Make It So Idempotent
Automation
foreach -parallel ($featureName in $Name)
{
$feature = Get-WindowsFeature -Name
$featureName
if(($Ensure -eq "Present") -and (!$feature.Installed))
{
Install-WindowsFeature -Name $featureName
}
….
}
…
Technology Benefit Limitaton
Group Policy • Controlled and Delivered from Active Directory
• Locks settings from change
• Keeps everything defined in the Policy set
• Prevents changes being made in a valid Troubleshooting scenario
• High overhead in most organisations and slows server change tasks
• Cannot Sequence the settings
• Hard to report on a large number of servers, servers treated
individually
Desired State
Configuration
• Uses Industry Standard Document Standards )MOF from DMTF)
• Extensible for in-house applications
• Produces Configuration Files compatible with Linux OMI
• Leveraged by Industry Leading configuration management tools
(Chef/Puppet)
• Allows full server configuration through automation (if
modules/resources are present)
• Configuration is pulled from SMB or HTTP/HTTPS
• Server can Autocorrect or just log Configuration drift
• Configurations can be sequenced
• Change process becomes comparing MOF Files
• Server configuration happens without an extra agent and without
someone requiring Administrator rights
• Easy to query compliance state
• Spin up test labs that look like Production without the overhead of
SCCM or AD Configuration - build out AD before GPO can even be
used!
• Bare-OS Provisioning
• Servers treated like Cattle - Service oriented
• No GUI Configuration Tools
• Leaves settings in place when no longer in Configuration
• Limited Reporting features
SCCM DCM • Supports multiple Scripting Languages
• Configurable with a GUI
• Rich reporting features
• Supports Mac OS X & Mobile Devices
• Requires SCCM
• Difficult to move to another technology
• Persons managing configuration need SCCM Permissions to do so -
moving the bottleneck/process from GPO to SCCM
• Machine oriented
Directory &
Identity
Team
Systems
Management
Team
Application
Team
1. Group Policy applies the Security and
Audit settings
2. Once built, the Server has the
ConfigMgr agent installed and lands
in a collection
3. Based on the Collection, a Pull Server
Certificate is installed and a DCM
Baseline is applied
4. DCM see’s that LCM is not configured
and configures it for the appropriate
Pull Server
5. LCM reaches out to the Pull Server to
configure its role and applications
from here on in
Group
Policy
DCM
DSC
Get the SDKs and command-line tools you need
http://azure.microsoft.com/en-us/downloads/
Learn more
http://azure.microsoft.com/
Like us our
Facebook
page
Join us @
meetup
group

More Related Content

What's hot

Smart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond BitcoinSmart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond BitcoinJim McKeeth
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorialLen Bass
 
Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Financial Poise
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technologyAlket Cecaj
 
Writing and testing high frequency trading engines in java
Writing and testing high frequency trading engines in javaWriting and testing high frequency trading engines in java
Writing and testing high frequency trading engines in javaPeter Lawrey
 
Embyrogenesis of the CNS and its disorders
Embyrogenesis of the CNS and its disordersEmbyrogenesis of the CNS and its disorders
Embyrogenesis of the CNS and its disordersAmr Hassan
 
Blockchain in banking 2020
Blockchain in banking 2020Blockchain in banking 2020
Blockchain in banking 2020celine anderson
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureEC-Council
 
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitDistributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitPablo Junco
 
Smart Contract & Ethereum
Smart Contract & EthereumSmart Contract & Ethereum
Smart Contract & EthereumAkshay Singh
 
Cranial nerves pathway update
Cranial  nerves  pathway updateCranial  nerves  pathway update
Cranial nerves pathway updateIdris Siddiqui
 
Microsurgical anatomy of fourth ventricle
Microsurgical anatomy of fourth ventricleMicrosurgical anatomy of fourth ventricle
Microsurgical anatomy of fourth ventricleSHAMEEJ MUHAMED KV
 
InterPlanetary File System (IPFS)
InterPlanetary File System (IPFS)InterPlanetary File System (IPFS)
InterPlanetary File System (IPFS)Gene Leybzon
 
The cerebello pontine angle
The cerebello pontine angleThe cerebello pontine angle
The cerebello pontine angleDr Himanshu Soni
 
intracranial hemorrhage- by KEMISA HASSEN ZAINABU IIHS_jinjaUGANDA (2).pptx
intracranial hemorrhage- by KEMISA HASSEN ZAINABU IIHS_jinjaUGANDA (2).pptxintracranial hemorrhage- by KEMISA HASSEN ZAINABU IIHS_jinjaUGANDA (2).pptx
intracranial hemorrhage- by KEMISA HASSEN ZAINABU IIHS_jinjaUGANDA (2).pptxHASSENZAINABUKEMISA
 

What's hot (20)

Smart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond BitcoinSmart Contracts - The Blockchain Beyond Bitcoin
Smart Contracts - The Blockchain Beyond Bitcoin
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
Third ventricle
Third ventricle Third ventricle
Third ventricle
 
Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)Blockchain and Smart Contracts (Series: Blockchain Basics)
Blockchain and Smart Contracts (Series: Blockchain Basics)
 
Distributed systems and blockchain technology
Distributed systems and blockchain technologyDistributed systems and blockchain technology
Distributed systems and blockchain technology
 
Writing and testing high frequency trading engines in java
Writing and testing high frequency trading engines in javaWriting and testing high frequency trading engines in java
Writing and testing high frequency trading engines in java
 
Embyrogenesis of the CNS and its disorders
Embyrogenesis of the CNS and its disordersEmbyrogenesis of the CNS and its disorders
Embyrogenesis of the CNS and its disorders
 
Blockchain in banking 2020
Blockchain in banking 2020Blockchain in banking 2020
Blockchain in banking 2020
 
What makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security ArchitectureWhat makes blockchain secure: Key Characteristics & Security Architecture
What makes blockchain secure: Key Characteristics & Security Architecture
 
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitDistributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
 
EMBRYOLOGY OF BRAIN,NEW
EMBRYOLOGY OF BRAIN,NEWEMBRYOLOGY OF BRAIN,NEW
EMBRYOLOGY OF BRAIN,NEW
 
Smart Contract & Ethereum
Smart Contract & EthereumSmart Contract & Ethereum
Smart Contract & Ethereum
 
Cranial nerves pathway update
Cranial  nerves  pathway updateCranial  nerves  pathway update
Cranial nerves pathway update
 
Microsurgical anatomy of fourth ventricle
Microsurgical anatomy of fourth ventricleMicrosurgical anatomy of fourth ventricle
Microsurgical anatomy of fourth ventricle
 
InterPlanetary File System (IPFS)
InterPlanetary File System (IPFS)InterPlanetary File System (IPFS)
InterPlanetary File System (IPFS)
 
009 youmans cerebral edema
009 youmans cerebral edema009 youmans cerebral edema
009 youmans cerebral edema
 
Membranes of brain
Membranes of brainMembranes of brain
Membranes of brain
 
The cerebello pontine angle
The cerebello pontine angleThe cerebello pontine angle
The cerebello pontine angle
 
intracranial hemorrhage- by KEMISA HASSEN ZAINABU IIHS_jinjaUGANDA (2).pptx
intracranial hemorrhage- by KEMISA HASSEN ZAINABU IIHS_jinjaUGANDA (2).pptxintracranial hemorrhage- by KEMISA HASSEN ZAINABU IIHS_jinjaUGANDA (2).pptx
intracranial hemorrhage- by KEMISA HASSEN ZAINABU IIHS_jinjaUGANDA (2).pptx
 
Circle of willis 360°
Circle of willis 360°Circle of willis 360°
Circle of willis 360°
 

Similar to Deeper into DSC - Automating Windows Server Configuration at Scale with Desired State Configuration

Jan Egil Ring - Get started with windows power shell desired state configuration
Jan Egil Ring - Get started with windows power shell desired state configurationJan Egil Ring - Get started with windows power shell desired state configuration
Jan Egil Ring - Get started with windows power shell desired state configurationNordic Infrastructure Conference
 
#DFWVMUG - Automating the Next Generation Datacenter
#DFWVMUG - Automating the Next Generation Datacenter#DFWVMUG - Automating the Next Generation Datacenter
#DFWVMUG - Automating the Next Generation DatacenterJosh Atwell
 
System center 2012 configutation manager rc2
System center 2012 configutation manager rc2System center 2012 configutation manager rc2
System center 2012 configutation manager rc2Dubravko Marak
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementSharkrit JOBBO
 
Microsoft Forefront - What’s New in FIM 2010 RC1 Presentation
Microsoft Forefront - What’s New in FIM 2010 RC1 PresentationMicrosoft Forefront - What’s New in FIM 2010 RC1 Presentation
Microsoft Forefront - What’s New in FIM 2010 RC1 PresentationMicrosoft Private Cloud
 
Wellington MuleSoft Meetup 2021-02-18
Wellington MuleSoft Meetup 2021-02-18Wellington MuleSoft Meetup 2021-02-18
Wellington MuleSoft Meetup 2021-02-18Mary Joy Sabal
 
Configuration management comes to Windows
Configuration management comes to WindowsConfiguration management comes to Windows
Configuration management comes to WindowsRavikanth Chaganti
 
SharePoint on demand with System Center - Matija Blagus
SharePoint on demand with System Center - Matija BlagusSharePoint on demand with System Center - Matija Blagus
SharePoint on demand with System Center - Matija BlagusSPC Adriatics
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAMOlav Tvedt
 
InterConnect2016_4932
InterConnect2016_4932InterConnect2016_4932
InterConnect2016_4932Clare Carty
 
Unleashing the Power: A Lap Around PowerShell 3.0
Unleashing the Power: A Lap Around PowerShell 3.0Unleashing the Power: A Lap Around PowerShell 3.0
Unleashing the Power: A Lap Around PowerShell 3.0Sarah Dutkiewicz
 
A Lap Around PowerShell 3.0
A Lap Around PowerShell 3.0A Lap Around PowerShell 3.0
A Lap Around PowerShell 3.0Sarah Dutkiewicz
 
Mdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campMdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campOlav Tvedt
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedWes Moskal-Fitzpatrick
 
Centralized Application Configuration with Spring and Apache Zookeeper
Centralized Application Configuration with Spring and Apache ZookeeperCentralized Application Configuration with Spring and Apache Zookeeper
Centralized Application Configuration with Spring and Apache ZookeeperRyan Gardner
 
bfx and studio server - Bluebeam eXtreme Conference 2014
bfx and studio server - Bluebeam eXtreme Conference 2014bfx and studio server - Bluebeam eXtreme Conference 2014
bfx and studio server - Bluebeam eXtreme Conference 2014bluebeamslides
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationPrecisely
 
GCP Deployment- Vertex AI
GCP Deployment- Vertex AIGCP Deployment- Vertex AI
GCP Deployment- Vertex AITriloki Gupta
 

Similar to Deeper into DSC - Automating Windows Server Configuration at Scale with Desired State Configuration (20)

Jan Egil Ring - Get started with windows power shell desired state configuration
Jan Egil Ring - Get started with windows power shell desired state configurationJan Egil Ring - Get started with windows power shell desired state configuration
Jan Egil Ring - Get started with windows power shell desired state configuration
 
#DFWVMUG - Automating the Next Generation Datacenter
#DFWVMUG - Automating the Next Generation Datacenter#DFWVMUG - Automating the Next Generation Datacenter
#DFWVMUG - Automating the Next Generation Datacenter
 
Bcit win8 ws2012 session
Bcit win8 ws2012 sessionBcit win8 ws2012 session
Bcit win8 ws2012 session
 
System center 2012 configutation manager rc2
System center 2012 configutation manager rc2System center 2012 configutation manager rc2
System center 2012 configutation manager rc2
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server Management
 
Microsoft Forefront - What’s New in FIM 2010 RC1 Presentation
Microsoft Forefront - What’s New in FIM 2010 RC1 PresentationMicrosoft Forefront - What’s New in FIM 2010 RC1 Presentation
Microsoft Forefront - What’s New in FIM 2010 RC1 Presentation
 
Wellington MuleSoft Meetup 2021-02-18
Wellington MuleSoft Meetup 2021-02-18Wellington MuleSoft Meetup 2021-02-18
Wellington MuleSoft Meetup 2021-02-18
 
Configuration management comes to Windows
Configuration management comes to WindowsConfiguration management comes to Windows
Configuration management comes to Windows
 
SharePoint on demand with System Center - Matija Blagus
SharePoint on demand with System Center - Matija BlagusSharePoint on demand with System Center - Matija Blagus
SharePoint on demand with System Center - Matija Blagus
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
InterConnect2016_4932
InterConnect2016_4932InterConnect2016_4932
InterConnect2016_4932
 
Unleashing the Power: A Lap Around PowerShell 3.0
Unleashing the Power: A Lap Around PowerShell 3.0Unleashing the Power: A Lap Around PowerShell 3.0
Unleashing the Power: A Lap Around PowerShell 3.0
 
A Lap Around PowerShell 3.0
A Lap Around PowerShell 3.0A Lap Around PowerShell 3.0
A Lap Around PowerShell 3.0
 
Mdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campMdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot camp
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
 
Centralized Application Configuration with Spring and Apache Zookeeper
Centralized Application Configuration with Spring and Apache ZookeeperCentralized Application Configuration with Spring and Apache Zookeeper
Centralized Application Configuration with Spring and Apache Zookeeper
 
bfx and studio server - Bluebeam eXtreme Conference 2014
bfx and studio server - Bluebeam eXtreme Conference 2014bfx and studio server - Bluebeam eXtreme Conference 2014
bfx and studio server - Bluebeam eXtreme Conference 2014
 
Essential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security ConfigurationEssential Layers of IBM i Security: IBM i Security Configuration
Essential Layers of IBM i Security: IBM i Security Configuration
 
GCP Deployment- Vertex AI
GCP Deployment- Vertex AIGCP Deployment- Vertex AI
GCP Deployment- Vertex AI
 
Sp automation with dsc
Sp automation with dscSp automation with dsc
Sp automation with dsc
 

Deeper into DSC - Automating Windows Server Configuration at Scale with Desired State Configuration

  • 1. BIGGER than ever! 195 event locations #GlobalAzure Deeper into DSC Matt Hitchcock, PowerShell MVP 3rd year in Singapore
  • 3.
  • 4. Windows Operating System APIAPIAPIAPIAPIAPI Windows Management Framework WinRMWMI PowerShellBITS LCM PowerShell Web Access Agent • Local Configuration Manager (LCM) Delivers DSC • Supports Industry Standard MOF Documents from DMTF • Uses PowerShell and API’s to Deliver Configuration • Understands how to configure settings using Resources • Other Vendors are plugging into the LCM now and building resources
  • 5.
  • 6. Term Explanation Local Configuration Manager (LCM) The agent within the Windows Management Framework that can enact Configurations on a system Configuration / Document / Configuration Document A file formatted in Industry Standard syntax (MOF) that describes the configuration of the system Resource Used by the Local Configuration Manager to: • Understand the components in the Configuration • Understand how to Test if they are compliant • Understand how to Set them to a compliant State • Understand how to Get Compliance Status information
  • 7.
  • 8. Intent Environment Configuration (Dev -> Test -> Production) $SystemDrive = "C:" $DemoFolder = "$SystemDriveDemo" $global:WebServerCount = 3 … Structural Configuration WindowsFeature IIS { Name = "Web-Server" Ensure = "Present" } … Make It So Idempotent Automation foreach -parallel ($featureName in $Name) { $feature = Get-WindowsFeature -Name $featureName if(($Ensure -eq "Present") -and (!$feature.Installed)) { Install-WindowsFeature -Name $featureName } …. } …
  • 9.
  • 10.
  • 11.
  • 12. Technology Benefit Limitaton Group Policy • Controlled and Delivered from Active Directory • Locks settings from change • Keeps everything defined in the Policy set • Prevents changes being made in a valid Troubleshooting scenario • High overhead in most organisations and slows server change tasks • Cannot Sequence the settings • Hard to report on a large number of servers, servers treated individually Desired State Configuration • Uses Industry Standard Document Standards )MOF from DMTF) • Extensible for in-house applications • Produces Configuration Files compatible with Linux OMI • Leveraged by Industry Leading configuration management tools (Chef/Puppet) • Allows full server configuration through automation (if modules/resources are present) • Configuration is pulled from SMB or HTTP/HTTPS • Server can Autocorrect or just log Configuration drift • Configurations can be sequenced • Change process becomes comparing MOF Files • Server configuration happens without an extra agent and without someone requiring Administrator rights • Easy to query compliance state • Spin up test labs that look like Production without the overhead of SCCM or AD Configuration - build out AD before GPO can even be used! • Bare-OS Provisioning • Servers treated like Cattle - Service oriented • No GUI Configuration Tools • Leaves settings in place when no longer in Configuration • Limited Reporting features SCCM DCM • Supports multiple Scripting Languages • Configurable with a GUI • Rich reporting features • Supports Mac OS X & Mobile Devices • Requires SCCM • Difficult to move to another technology • Persons managing configuration need SCCM Permissions to do so - moving the bottleneck/process from GPO to SCCM • Machine oriented
  • 14. 1. Group Policy applies the Security and Audit settings 2. Once built, the Server has the ConfigMgr agent installed and lands in a collection 3. Based on the Collection, a Pull Server Certificate is installed and a DCM Baseline is applied 4. DCM see’s that LCM is not configured and configures it for the appropriate Pull Server 5. LCM reaches out to the Pull Server to configure its role and applications from here on in Group Policy DCM DSC
  • 15.
  • 16.
  • 17.
  • 18. Get the SDKs and command-line tools you need http://azure.microsoft.com/en-us/downloads/ Learn more http://azure.microsoft.com/ Like us our Facebook page Join us @ meetup group

Editor's Notes

  1. Note: Scale * Complexity => exceeds our skill level… Demo: ConfigurationEnv Assert-Website with ConfigurationEnv1.psd1 (show easy configuration and flow of $Node, etc) Demo: Continuous Deployment cd ..\WebsiteWithVM simply show number of machines change… Assert-Website with ConfigurationEnv.psd1 Show consistency of Structural Configuration Demo: SCVMM and DSC (?) or at Ecosystem time Obviously DSC is not itself a Fabric Controller, but SC happens to have one… where DSC can easily integrate
  2. Unfortunately at this time Microsoft has a lot of overlapping technologies and no clear story. This is because we are in the midst of extreme change in IT.   Traditionally, we have used Group Policy as this is a way to set what we want and enforce it. However, this comes with some inherent issues: 1. Process - Because Active Directory is involved in delivering Group Policy, the Active Directory team are often involved in the process of configuration changes for Servers. They have to vet the Policy, be the ones to implement and apply it, be the ones to roll it back. Sometimes teams are delegated their own GPO admin rights but not often 2. Rigidity - Once a GPO is applied the settings are enforced and cannot be changed. In a troubleshooting scenario this can create an issue, you may need to legitimately stop a service, remove some settings. You have to fight against GPO 3. You cannot control Processing Order 4. It’s hard to tell if systems that are part of a service are in compliance of everything they are meant to have applied At the same time you have DCM that does do a lot of this itself but if you use DCM you then shift the problem to the SCCM Console rather than AD. Application Teams need to have SCCM Knowledge and permissions, or, they depend on the SCCM Team to deliver what they need. Configuration Management is about enabling DevOps scenarios to deliver
  3. Active Directory Team – They care about Identity & Access management. They want to ensure the appropriate level of Security is implemented but are not interested in what else is happening on the server Systems Management Team – They care that the Server is being manager i.e. Part of a lifecycle, managed by SCCM, Security standards are in effect i.e. the Server is using the right Certificates and connected to the right Pull Server with no Rogue settings, they too do not care about the application Application Team – Can be given the freedom to change the server and application as needed to run the service. Cannot change the LCM to Go-Rogue, do not need Administrator rights to the Server because they are not making Manual changes, can prove the changes they are making through MOF File differences, speed up their Change process.