SlideShare a Scribd company logo
1 of 56
Windows 8.1 for IT Pros
•

Start Menu and Search
• Connectivity changes and
features
• Security features

•

Windows To Go
• Management and
Sideloading
• Remote Desktop Services

Where to next?
Start Menu and Search
•

Make “All Apps” view the
default
…and set Windows Store apps to:
• appear first,
• or appear last

•

Control Start menu layout

•
•
•

Assigned Access
Windows key + X
Bing integrated Search
• Controlled by GPOs
Demo
1.

2.
3.
4.

Customising the start screen
Enforced Start screen layout
Assigned Access
Windows + X
Connectivity changes
and features
•

Native 3G/4G support

•

• Web Application Proxy

with tethering
•
•

3rd party VPN support in-box
Windows Store apps can
auto-start VPN connections

Workplace Join

•

Work Folders
• Selective Wipe over EAS or

EAS+OMA-DM
Security features
• Native biometrics
• Virtual Smart Cards
• TPM Key Attestation
non-exportability
isolated crypto
anti-hammering
• 2FA for local and remote access
• 10,000 people are enrolled on
• Client authentication/mutual auth SSL
Surfaces, 81K on x86 machines
• VSC redirection for remote
• VSC on Surfaces enables VPN
connections
and Remote Apps access
• S/MIME email encryption
• MS Policy requires users to:
• request Manager Approval or
• BitLocker keys for data volumes
• Removable drives can only be used on the original
machine

• use Physical Smart Card to
provide the same level of
assurance as Physical Smart Card
Windows To Go
Management
and Sideloading
Management
•
•
•

Windows Embedded
Auto-updating of Modern Apps
User Experience Virtualisation
(UE-V 2)

Sideloading
•
•
•
•

SCCM Application Catalog
Company Portal
Windows InTune
Mobile Device Management
(MDM)
Thin Client

Digital Signage

Kiosk

Medical Devices

Manufacturing

POS

ATM

Industry Tablet
Register Apps for the user
Always in per-user context
Enterprise Sideloading requirements
Does not require administrative rights

Installation

Sideloading or from the Windows Store

Register application on the computer
Installs automatically for each user
Requires administrative rights

Provisioning

Only Sideloading, no Windows Store
Delivering Windows 8 Apps
Download from Windows Store

Sideloading from Your Infrastructure

Self-Service
Portal (SSP)

Management
Infrastructure Cloud

Windows RT Devices

Custom LOB Apps

Public Apps
Windows 8 (x86)
Remote Desktop Services
•

•

Shadowing is BACK, adds:
•
•
•
•

VDI
Multi-mon and RemoteApp sessions
Mstsc.exe integration
Server Manager integration

•

SOFS Deduplication for VDI

•

Pluggable Authentication (2FA) in
Gateway

Storage Tiering in CSVs
Dynamically
Add/Remove
monitors

Improved
RemoteApp
behaviour

Quick
Reconnec
t

DX11.1 support and
H.264 performance
WC305

Enhance users mobile productivity with Windows 8.1

DA305

Ekstern adgang i Windows Server 2012 R2 – nye muligheder for BYOD med WAP, Workplace Join og
Work Folders

WC301

How Microsoft IT Deployed Windows 8 and Windows 8.1 Preview to the Enterprise

WC309

Microsoft VDI in 2013: VDI quantum leap with Windows 8.1 and Windows Server 2012 R2!

DE301

What’s new in Windows 8.1 for developers

WC302

Application Management using System Center Configuration Manager 2012 SP1/R2
1919
Thank you!

© 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing
market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this
presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

What's hot

RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Nederland
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation ServicesWINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation ServicesChris Spanougakis
 
SnapComms Technical Overview
SnapComms Technical OverviewSnapComms Technical Overview
SnapComms Technical Overviewleanne_abarro
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoNCCOMMS
 
Building solutions with microsoft virtualisation
Building solutions with microsoft virtualisationBuilding solutions with microsoft virtualisation
Building solutions with microsoft virtualisationRonnie Isherwood
 
eScan Product Overview
eScan Product OvervieweScan Product Overview
eScan Product OvervieweScan
 
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami LaihoCSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami LaihoNCCOMMS
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
Protecting Windows Passwords and Preventing Windows Computer / Password AttacksProtecting Windows Passwords and Preventing Windows Computer / Password Attacks
Protecting Windows Passwords and Preventing Windows Computer / Password AttacksZoho Corporation
 
Server 2008 Project
Server 2008 ProjectServer 2008 Project
Server 2008 Projectwsolomoniv
 
Data Architecture not Just for Microservices
Data Architecture not Just for MicroservicesData Architecture not Just for Microservices
Data Architecture not Just for MicroservicesEberhard Wolff
 
Network Security Flow Diagram
Network Security Flow DiagramNetwork Security Flow Diagram
Network Security Flow Diagrambcheney76
 
A Quick Guide to Windows Server 2016
A Quick Guide to Windows Server 2016A Quick Guide to Windows Server 2016
A Quick Guide to Windows Server 2016QuickStart
 
VMworld 2013: vSphere Web Client - Technical Walkthrough
VMworld 2013: vSphere Web Client - Technical WalkthroughVMworld 2013: vSphere Web Client - Technical Walkthrough
VMworld 2013: vSphere Web Client - Technical WalkthroughVMworld
 
Software Architecture for Innovation
Software Architecture for InnovationSoftware Architecture for Innovation
Software Architecture for InnovationEberhard Wolff
 
Knox premium for customer
Knox premium for customerKnox premium for customer
Knox premium for customerJavier Gonzalez
 
Synology: The Distributed Private Cloud for Businesses
Synology: The Distributed Private Cloud for BusinessesSynology: The Distributed Private Cloud for Businesses
Synology: The Distributed Private Cloud for BusinessesIngram Micro Cloud
 
Paul Woodward VMworld 2018 presentation v2 - Minneapolis VMUG Super Meeting
Paul Woodward VMworld 2018 presentation v2 - Minneapolis VMUG Super MeetingPaul Woodward VMworld 2018 presentation v2 - Minneapolis VMUG Super Meeting
Paul Woodward VMworld 2018 presentation v2 - Minneapolis VMUG Super MeetingPaul Woodward Jr
 

What's hot (20)

RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation ServicesWINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
 
SnapComms Technical Overview
SnapComms Technical OverviewSnapComms Technical Overview
SnapComms Technical Overview
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
Building solutions with microsoft virtualisation
Building solutions with microsoft virtualisationBuilding solutions with microsoft virtualisation
Building solutions with microsoft virtualisation
 
Exacq Technologies Overview June 2013
Exacq Technologies Overview June 2013Exacq Technologies Overview June 2013
Exacq Technologies Overview June 2013
 
eScan Product Overview
eScan Product OvervieweScan Product Overview
eScan Product Overview
 
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami LaihoCSF18 - Moving from Reactive to Proactive Security - Sami Laiho
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
Protecting Windows Passwords and Preventing Windows Computer / Password AttacksProtecting Windows Passwords and Preventing Windows Computer / Password Attacks
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
 
Server 2008 Project
Server 2008 ProjectServer 2008 Project
Server 2008 Project
 
Data Architecture not Just for Microservices
Data Architecture not Just for MicroservicesData Architecture not Just for Microservices
Data Architecture not Just for Microservices
 
Network Security Flow Diagram
Network Security Flow DiagramNetwork Security Flow Diagram
Network Security Flow Diagram
 
A Quick Guide to Windows Server 2016
A Quick Guide to Windows Server 2016A Quick Guide to Windows Server 2016
A Quick Guide to Windows Server 2016
 
VMworld 2013: vSphere Web Client - Technical Walkthrough
VMworld 2013: vSphere Web Client - Technical WalkthroughVMworld 2013: vSphere Web Client - Technical Walkthrough
VMworld 2013: vSphere Web Client - Technical Walkthrough
 
Software Architecture for Innovation
Software Architecture for InnovationSoftware Architecture for Innovation
Software Architecture for Innovation
 
Knox premium for customer
Knox premium for customerKnox premium for customer
Knox premium for customer
 
Synology: The Distributed Private Cloud for Businesses
Synology: The Distributed Private Cloud for BusinessesSynology: The Distributed Private Cloud for Businesses
Synology: The Distributed Private Cloud for Businesses
 
Paul Woodward VMworld 2018 presentation v2 - Minneapolis VMUG Super Meeting
Paul Woodward VMworld 2018 presentation v2 - Minneapolis VMUG Super MeetingPaul Woodward VMworld 2018 presentation v2 - Minneapolis VMUG Super Meeting
Paul Woodward VMworld 2018 presentation v2 - Minneapolis VMUG Super Meeting
 

Viewers also liked

It sikkerhed
It sikkerhedIt sikkerhed
It sikkerhedMicrosoft
 
Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fle...
Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fle...Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fle...
Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fle...Microsoft
 
Microsoft Internet of Things konference 2015 - Ny teknologi skaber ny forretn...
Microsoft Internet of Things konference 2015 - Ny teknologi skaber ny forretn...Microsoft Internet of Things konference 2015 - Ny teknologi skaber ny forretn...
Microsoft Internet of Things konference 2015 - Ny teknologi skaber ny forretn...Microsoft
 
List urok sayt_dod_2
List urok sayt_dod_2List urok sayt_dod_2
List urok sayt_dod_2lili4ka54
 
กาารบันทึกบัญชีแบบPeriodic
กาารบันทึกบัญชีแบบPeriodicกาารบันทึกบัญชีแบบPeriodic
กาารบันทึกบัญชีแบบPeriodicSupanit
 
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Microsoft
 
Digital transformation - Hvor er vi lige nu?
Digital transformation -  Hvor er vi lige nu?Digital transformation -  Hvor er vi lige nu?
Digital transformation - Hvor er vi lige nu?Microsoft
 
Unit 73 ig2 assignment creating a sample library 2013_y1
Unit 73 ig2 assignment creating a sample library 2013_y1Unit 73 ig2 assignment creating a sample library 2013_y1
Unit 73 ig2 assignment creating a sample library 2013_y1Alexballantyne
 
Skype for business - Effektiv kommunikation
Skype for business - Effektiv kommunikationSkype for business - Effektiv kommunikation
Skype for business - Effektiv kommunikationMicrosoft
 
_ig5 assignment final major project 2014 to 2015
    _ig5 assignment final major project 2014 to 2015    _ig5 assignment final major project 2014 to 2015
_ig5 assignment final major project 2014 to 2015Alexballantyne
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperMicrosoft
 
Nye digitale forretningsmodeller
Nye digitale forretningsmodellerNye digitale forretningsmodeller
Nye digitale forretningsmodellerMicrosoft
 
Digitale forandringer i grundfos: En dag i en grundfos leders liv
Digitale forandringer i grundfos: En dag i en grundfos leders livDigitale forandringer i grundfos: En dag i en grundfos leders liv
Digitale forandringer i grundfos: En dag i en grundfos leders livMicrosoft
 
Business insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
Business insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...Business insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
Business insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...Microsoft
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagMicrosoft
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleMicrosoft
 
FINANCE I MICROSOFT
FINANCE I MICROSOFTFINANCE I MICROSOFT
FINANCE I MICROSOFTMicrosoft
 

Viewers also liked (20)

It sikkerhed
It sikkerhedIt sikkerhed
It sikkerhed
 
Work flow unity
Work flow unityWork flow unity
Work flow unity
 
Workflow
Workflow Workflow
Workflow
 
Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fle...
Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fle...Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fle...
Microsoft Next 2014 - Cloud Platform session 3 - Kopenhagen fur opnår høj fle...
 
Microsoft Internet of Things konference 2015 - Ny teknologi skaber ny forretn...
Microsoft Internet of Things konference 2015 - Ny teknologi skaber ny forretn...Microsoft Internet of Things konference 2015 - Ny teknologi skaber ny forretn...
Microsoft Internet of Things konference 2015 - Ny teknologi skaber ny forretn...
 
List urok sayt_dod_2
List urok sayt_dod_2List urok sayt_dod_2
List urok sayt_dod_2
 
กาารบันทึกบัญชีแบบPeriodic
กาารบันทึกบัญชีแบบPeriodicกาารบันทึกบัญชีแบบPeriodic
กาารบันทึกบัญชีแบบPeriodic
 
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
Tre danske virksomheders erfaringer med Office 365 - den konkrete forskel for...
 
Digital transformation - Hvor er vi lige nu?
Digital transformation -  Hvor er vi lige nu?Digital transformation -  Hvor er vi lige nu?
Digital transformation - Hvor er vi lige nu?
 
Unit 73 ig2 assignment creating a sample library 2013_y1
Unit 73 ig2 assignment creating a sample library 2013_y1Unit 73 ig2 assignment creating a sample library 2013_y1
Unit 73 ig2 assignment creating a sample library 2013_y1
 
Skype for business - Effektiv kommunikation
Skype for business - Effektiv kommunikationSkype for business - Effektiv kommunikation
Skype for business - Effektiv kommunikation
 
_ig5 assignment final major project 2014 to 2015
    _ig5 assignment final major project 2014 to 2015    _ig5 assignment final major project 2014 to 2015
_ig5 assignment final major project 2014 to 2015
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paper
 
Nye digitale forretningsmodeller
Nye digitale forretningsmodellerNye digitale forretningsmodeller
Nye digitale forretningsmodeller
 
Digitale forandringer i grundfos: En dag i en grundfos leders liv
Digitale forandringer i grundfos: En dag i en grundfos leders livDigitale forandringer i grundfos: En dag i en grundfos leders liv
Digitale forandringer i grundfos: En dag i en grundfos leders liv
 
Survey presentation
Survey presentation Survey presentation
Survey presentation
 
Business insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
Business insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...Business insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
Business insight 2014 - Små og store data - hvad kan de bruges til, hvordan f...
 
One Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddagOne Step Ahead 2014 Samlet formiddag
One Step Ahead 2014 Samlet formiddag
 
Enterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alleEnterprise Mobility kan det gøres let for alle
Enterprise Mobility kan det gøres let for alle
 
FINANCE I MICROSOFT
FINANCE I MICROSOFTFINANCE I MICROSOFT
FINANCE I MICROSOFT
 

Similar to Windows 8.1 for IT-pros - presentation from Campus days 2013

InduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One ReviewInduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One ReviewAVEVA
 
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAAVEVA
 
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterpriseITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterpriseITProceed
 
InduSoft Web Studio 8.0 + Service Pack Two Overview
InduSoft Web Studio 8.0 + Service Pack Two OverviewInduSoft Web Studio 8.0 + Service Pack Two Overview
InduSoft Web Studio 8.0 + Service Pack Two OverviewAVEVA
 
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
 
Presentation design - key concepts and approaches for designing your deskto...
Presentation   design - key concepts and approaches for designing your deskto...Presentation   design - key concepts and approaches for designing your deskto...
Presentation design - key concepts and approaches for designing your deskto...xKinAnx
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep diveMurugesan Arumugam
 
Iconic_MicroWs350
Iconic_MicroWs350Iconic_MicroWs350
Iconic_MicroWs350Binod Kumar
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsBizTalk360
 
Presentation v mware horizon vision
Presentation   v mware horizon visionPresentation   v mware horizon vision
Presentation v mware horizon visionsolarisyougood
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedWes Moskal-Fitzpatrick
 
AggreGate IoT Integration Platform
AggreGate IoT Integration PlatformAggreGate IoT Integration Platform
AggreGate IoT Integration PlatformTibbo
 
Osys Tech Talk 27. Juni 2013
Osys Tech Talk 27. Juni 2013Osys Tech Talk 27. Juni 2013
Osys Tech Talk 27. Juni 2013Osys AG
 
In tune inaction
In tune inactionIn tune inaction
In tune inactionOlav Tvedt
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017Quest
 

Similar to Windows 8.1 for IT-pros - presentation from Campus days 2013 (20)

InduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One ReviewInduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One Review
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
 
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterpriseITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
 
InduSoft Web Studio 8.0 + Service Pack Two Overview
InduSoft Web Studio 8.0 + Service Pack Two OverviewInduSoft Web Studio 8.0 + Service Pack Two Overview
InduSoft Web Studio 8.0 + Service Pack Two Overview
 
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
Presentation design - key concepts and approaches for designing your deskto...
Presentation   design - key concepts and approaches for designing your deskto...Presentation   design - key concepts and approaches for designing your deskto...
Presentation design - key concepts and approaches for designing your deskto...
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep dive
 
Iconic_MicroWs350
Iconic_MicroWs350Iconic_MicroWs350
Iconic_MicroWs350
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
Presentation v mware horizon vision
Presentation   v mware horizon visionPresentation   v mware horizon vision
Presentation v mware horizon vision
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
 
AggreGate IoT Integration Platform
AggreGate IoT Integration PlatformAggreGate IoT Integration Platform
AggreGate IoT Integration Platform
 
V mware ssh orange its deck
V mware  ssh orange its deckV mware  ssh orange its deck
V mware ssh orange its deck
 
Osys Tech Talk 27. Juni 2013
Osys Tech Talk 27. Juni 2013Osys Tech Talk 27. Juni 2013
Osys Tech Talk 27. Juni 2013
 
News from Build 2013
News from Build 2013News from Build 2013
News from Build 2013
 
In tune inaction
In tune inactionIn tune inaction
In tune inaction
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Windows 8.1 for IT-pros - presentation from Campus days 2013

  • 1.
  • 2.
  • 3. Windows 8.1 for IT Pros • Start Menu and Search • Connectivity changes and features • Security features • Windows To Go • Management and Sideloading • Remote Desktop Services Where to next?
  • 4. Start Menu and Search
  • 5.
  • 6. • Make “All Apps” view the default …and set Windows Store apps to: • appear first, • or appear last • Control Start menu layout • • • Assigned Access Windows key + X Bing integrated Search • Controlled by GPOs
  • 7. Demo 1. 2. 3. 4. Customising the start screen Enforced Start screen layout Assigned Access Windows + X
  • 8.
  • 9.
  • 10.
  • 12. • Native 3G/4G support • • Web Application Proxy with tethering • • 3rd party VPN support in-box Windows Store apps can auto-start VPN connections Workplace Join • Work Folders • Selective Wipe over EAS or EAS+OMA-DM
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 25. • Native biometrics • Virtual Smart Cards • TPM Key Attestation
  • 26.
  • 28. • 2FA for local and remote access • 10,000 people are enrolled on • Client authentication/mutual auth SSL Surfaces, 81K on x86 machines • VSC redirection for remote • VSC on Surfaces enables VPN connections and Remote Apps access • S/MIME email encryption • MS Policy requires users to: • request Manager Approval or • BitLocker keys for data volumes • Removable drives can only be used on the original machine • use Physical Smart Card to provide the same level of assurance as Physical Smart Card
  • 29.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 38. Management • • • Windows Embedded Auto-updating of Modern Apps User Experience Virtualisation (UE-V 2) Sideloading • • • • SCCM Application Catalog Company Portal Windows InTune Mobile Device Management (MDM)
  • 39. Thin Client Digital Signage Kiosk Medical Devices Manufacturing POS ATM Industry Tablet
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Register Apps for the user Always in per-user context Enterprise Sideloading requirements Does not require administrative rights Installation Sideloading or from the Windows Store Register application on the computer Installs automatically for each user Requires administrative rights Provisioning Only Sideloading, no Windows Store
  • 45. Delivering Windows 8 Apps Download from Windows Store Sideloading from Your Infrastructure Self-Service Portal (SSP) Management Infrastructure Cloud Windows RT Devices Custom LOB Apps Public Apps Windows 8 (x86)
  • 46.
  • 47.
  • 48.
  • 49.
  • 51. • • Shadowing is BACK, adds: • • • • VDI Multi-mon and RemoteApp sessions Mstsc.exe integration Server Manager integration • SOFS Deduplication for VDI • Pluggable Authentication (2FA) in Gateway Storage Tiering in CSVs
  • 53. WC305 Enhance users mobile productivity with Windows 8.1 DA305 Ekstern adgang i Windows Server 2012 R2 – nye muligheder for BYOD med WAP, Workplace Join og Work Folders WC301 How Microsoft IT Deployed Windows 8 and Windows 8.1 Preview to the Enterprise WC309 Microsoft VDI in 2013: VDI quantum leap with Windows 8.1 and Windows Server 2012 R2! DE301 What’s new in Windows 8.1 for developers WC302 Application Management using System Center Configuration Manager 2012 SP1/R2
  • 54. 1919
  • 55.
  • 56. Thank you! © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Editor's Notes

  1. This slide is mandatory
  2. This slide is optional
  3. This slide is optional
  4. Get-AppxPackage | ft name
  5. This slide is optional
  6. http://technet.microsoft.com/en-us/library/dn383580.aspxhttp://blogs.technet.com/b/hritter/archive/2013/07/11/auto-triggered-vpn-verbindungen.aspx
  7. This slide is optional
  8. This slide is optional
  9. This slide is optional
  10. This slide is optional
  11. This slide is optional