Zero-profile technology Deepdive


Published on

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Introductbedrijf / persoon
  • Today we will talk about profiles and personal settings and all that comes with it. First we will see what the problem actually is. Second, we look to the personal information that is stored in a profile. Thirdly, we look at the different profile types and their characteristics. Then we take a scenario and how to deal with it. If your goal today is to get one best practice to use than this is unfortunately not true. As in the course of this workshop will become clear there is not one best practice. A choice always depends on the customer application landscape, his needs, the existing infrastructure and the desired end result. What we want to achieve today is to provide information so before you start clicking and configuring your environment you ask yourself the right questions before you make a choice. Regarding this subject we can’t talk only about RES products but also about technologies of other vendors where we have to deal with.
  • Why should we invest time into this. What exactly is the problem. The reality is that many organizations are dealing with profile problems. They can become corrupt so a restore action must be executed. The profile of a user should be deleted. The user receives a new profile at logon and then his or herpersonal settings must be set in the profile again. They can grow large so logons can be slow. We can get into a situation where we need to deal with different profile versions which are not compatible, version 1 vs. version 2 profiles. This makes them difficult to control and that we have to deal with unsatisfied users.
  • Give an example of a real live scenario related to the perspective of a customer in combination with Zero Profile technology.
  • Zero profile management is a technique that takes little blocks out of a normal profile and stores and applies them in a different way than the traditional Microsoft way where most settings are stored in one large profile. Before starting with zero profile technology and getting the little blocks out of a profile a good understanding about the different parts of a profile is necessary.
  • Example of the different blocks in a profile
  • Explain the advantages and disadvantages of the different profile types
  • Explain the advantages and disadvantages of the different profile types. Adress limitations of mandatory profiles like unable to use certificates and encryption and remote assistance from WM.
  • In real live a lot of scenarios are possible which make that customers start with the implementation of Zero profile technology.
  • The case for this workshop. An existing situation
  • The case for this workshop. The desired situation
  • Possible solutions to create the desired situation. What are the considerations of the different solutions. Explain the Limitation of a mandatory profile for instance that Cryptografic keys and certificates cannot be used
  • Considerations per topic of the possible solutions.
  • Mandatory profile considerations. limitations:Cryptografic keys and certificates cannot be used when you create a profile for another user.  RightsIt seems very obvious but we are still getting a lot of questions about mandatory profiles and some are related to setting the correct user rights in the mandatory profile while creating one.Library PlaceholdersWhen you create a mandatory profile be aware of library placeholders. These aren’t folders but xml based files with the extension .library-ms.  Shell FoldersThe user shell folder in the current user registry hive of a mandatory profile should be empty when Language and Keyboard settingsLanguage and Keyboard settings are applied to a user from the settings which have been entered while installing the Operating System. This can result in undesired behavior and these settings must be cleared from the mandatory profile.MaintenanceAlso a mandatory profile needs maintenance. If you install windows or application updates after the mandatory profile has been created. It’s possible you need to adjust the mandatory profile
  • Explain what’s being configured on how to configure folder redirectoin
  • Explain all the user settings and theircharactaristics.
  • Mention the different kind of application virtualization technologies where we integrate with. Explain that user settings are not captured in the bubble but that we use the mechanism provided bij the manufactures.
  • After this slide start with a demo
  • Zero-profile technology Deepdive

    1. 1. Profiles in combination with zero profiletechnology
    2. 2. Agenda1. Profiles in combination with zero profile technology2. Different profile types3. Considerations4. Questions © Copyright RES Software. v2012-Mar30. 3
    3. 3. 1. Profiles in combination with zero profile technology
    4. 4. Challenge•Corrupted profiles•Profiles can grow large / slow logons•Management can be time consuming•Different profile versions (v1 and v2)•Unsatisfied users© Copyright RES Software.v2012-Mar30. 5
    5. 5. 2. Profiles
    6. 6. User Profile Structure•Personal settings – Registry settings – Files and Folders in the profile directory•Personal settings for applications•Personal settings for Windows•Data – Persistent data – Temporary data© Copyright RES Software.v2012-Mar30. 7
    7. 7. User Profile Structure© Copyright RES Software.v2012-Mar30. 8
    8. 8. v1 vs. v2 Profilesv1 Application Data v2 AppData© Copyright RES Software.v2012-Mar30. 9
    9. 9. User Profile Types•Roaming profiles – Advantage: • User settings roam with the user – Disadvantage: • They can become corrupted and can grow large•Local profiles – Advantage: • Stable – Disadvantage: • User settings are bound to the physical desktop© Copyright RES Software.v2012-Mar30. 10
    10. 10. User Profile Types•Mandatory profiles – Advantage: • Lean and mean profile – Disadvantages: • Difficult to create a good one • Has limitations • Also needs maintenance© Copyright RES Software.v2012-Mar30. 11
    11. 11. Practical examples•Virtual Applications•Migration Windows XP <> Windows 7•Save data on the desktop (Folder Redirection)•Implementation of another desktop delivery technology© Copyright RES Software.v2012-Mar30. 12
    12. 12. Existing environment•Physical desktops•Laptops•Data is saved on the desktop•Applications are local installed© Copyright RES Software.v2012-Mar30. 13
    13. 13. Desired environment•Virtual desktop delivery technology•Implementation of virtual applications•Data must be saved on the desktop•Sync data with laptops*•Users start roaming in the organization•Make use of mandatory profiles© Copyright RES Software.v2012-Mar30. 14
    14. 14. Possible solution•Mandatory profile guidelines and limitations•Folder redirection•Default RES Workspace Manager settings•Custom Resources•RES Workspace Manager and virtual applications•Settings virtual applications© Copyright RES Software.v2012-Mar30. 15
    15. 15. 3. Considerations
    16. 16. Mandatory profile•User rights in a mandatory profile•Library placeholders•Shell folders should be empty•Remove keyboard and language settings•Maintenance of a mandatory profile© Copyright RES Software.v2012-Mar30. 17
    17. 17. Folder Redirection•Make use of MS resolvable paths (%homedrive%)•Create the redirected folders with Workspace Manager•Adjust “User Shell Folders”•Make use of expandable values•Don’t save settings twice© Copyright RES Software.v2012-Mar30. 18
    18. 18. User Settings Explained•Capture targeted items…..•Track any setting changed…..•Capture targeted items once…..•Global versus Application level•Preserve•Apply© Copyright RES Software.v2012-Mar30. 20
    19. 19. Virtual Applications Packagen Integration Options © Copyright RES Software. v2012-Mar30. 21
    20. 20. Custom Resources•Custom resources can be used to distribute a mandatory profile to the local cache of RES Workspace Manager© Copyright RES Software.v2012-Mar30. 22
    21. 21. 4. Questions
    22. 22. Thank you© Copyright RES Software.v2012-Mar30. 24