SlideShare a Scribd company logo
1 of 21
Windows Server 2008 R2
Windows Server 2008 R2
           BETA
Marin Franković
Algebra
Sponzori
Windows Server 2008 R2
Sadržaj predavanja
                     •   Hyper-V 2.0
                     •   DirectAccess
                     •   BranchCache
                     •   AD Recycle Bin
                     •   App Locker
                     •   BitLocker
                     •   PowerShell 2.0
                     •   Windows 7?
Hyper-V 2.0
• Live Migration
                    Virtual                    Virtual
                   Machine                    Machine




                        Configuration Data
                         Memory Content
                          Memory Sync
       Cluster                                           Cluster
User   Node 1                                            Node 2
                                        VHD



                              Network
                              Storage
Hyper-V 2.0
• Migracija VM-a bez prekida poslovanja
• Visoka dostupnost
• Jednostavno upravljanje
   • Hyper-V konzola
   • PowerShell 2.0
   • SCVMM 2008
• Boot s VHD-a
• Više o Hyper-V 2.0 (srijeda, Hotel Kvarner, Kristalna dvorana)
   •   11:00 - 11:50 Hyper-V V2
   •   14:30 - 15:20 Backup, restore i disaster recovery u Hyper-V okruženju
   •   15:40 - 16:30 System Center Virtual Machine Manager
DirectAccess
                                              IPv4 uređaj
           IPv6 Uređaji
                                                             Podržava IPv4 kroz
                                                            6to4 tranzitne servise
 Upravljanje
                                                                  ili NAT-PT
 računalima
                                                                          Omogućava
                                                                          DirectAccess
                          Nativni IPv6                                    upravljanje s
                                                                           omogućava
                          s IPSec-om
                                                                          DirectAccess
   AD Group
                                                                     transparentan, siguran
Policy, NAP, soft                                                           klijentima
                                                   IPv6 Tranzicijski
                                                                         pristup intranet
 ware updates                                          Servisi
                                                                      resursima bez VPN-a
     Podržava direktno
      spajanje s IPv6                                        Internet
                              DirectAccess
   baziranim resursima u         Server
         intranetu
                                                              Podrška za razne
                                 Omogućava IPSec              remote protokole Windows 7
                               enkripciju i autentikaciju                        Klijent
BranchCache (Distributed)


                                             2. Klijent 2 povuče
                                                identifikacijske oznake s
                                                servera u glavnom
                                                uredu
                                  Klijent1

Glavni
 ured

                                                                       Klijent 2
         1. Klijent 1 povuče                         Udaljeni ured
            podatke s servera u
            glavnom uredu
                                                3. Klijent 2 pretražuje lokalnu
                                                   mrežu i podatke povuče s
                                                   klijenta 1
BranchCache (Hosted)
                                                         4. Klijent 2 povlači
                                                            podatke s servera
                                                            u udaljenom
                       2. Klijent 1 podatke stavlja
                                                            uredu
                          na server u udaljenom
                          uredu

                                      Klijent1

Glavni
 ured
         1. Klijent 1 povuče                                           Klijent2
                                                      Udaljeni ured
            podatke s servera u
            glavnom uredu
                                                      2. Klijent 2 povuče
                                                         identifikacijske oznake s
                                                         servera uglavnom
                                                         uredu
AD Recycle Bin
• Forest Level Windows 2008 R2
• Omogućiti Recycle Bin koristeći AD PowerShell
  • Set-ADForestMode –Identity demo.local -ForestMode
    Windows2008R2Forest
  • Enable-ADOptionalFeature –Identity ‘CN=Recycle Bin
    Feature,CN=Optional Features,CN=Directory
    Service,CN=Windows NT,CN=Services,CN=Configuration,
    DC=demo,DC=local’ –Scope Forest –Target ‘demo.local’
App Locker
• Dozvole prema:
    publisher, file
    name, version, product
    name …
•   Što nije
    dozvoljeno, zabranjeno je
•   Grupe i korisnici (ne
    računala)
•   Audit mode
•   AppLocker i Software
    Restriction Policy?
BitLocker
• Bitlocker ToGo
  • USB diskovi, stickovi, …
  • Zabrana korišćenja ne enkriptiranih USB uređaja
    (samo Win 7)
• A drugi operativni sustavi?
PowerShell 2.0
•   Novi cmdlet-i
•   Remote upravljanje (prema 1 ili n+1 računala)
•   ISE (Integrated Scripting Environment )
•   Background (asinhrono) izvršavanje
•   Debuger
•   Cmdlet-i za skoro sve role na Windows 2008
    R2 serveru
Windows 7?
•   DirectAccess
•   BrancheCache
•   AppLocker
•   Power management with GP
• Više o Windows 7 (četvrtak, Hotel Imperijal, Zlatna
    dvorana):
    •   11:00 - 11:50, Windows 7 (200)
    •   12:10 - 13:00, Windows Server 2008 R2 i Windows 7 zajedno (300)
    •   16:50 - 17:40, Windows 7 – sigurna budućnost (200)
    •   18:00 - 18:50, Windows 7 novosti i poboljšanja u korisničkom iskustvu
        (200)
DEMO
       •   BranchCache
       •   DirectAccess
       •   AD Recycle Bin
       •   BitLocker To Go
       •   App Locker
       •   PowerShell 2.0 (GUI)
       •   AD Admin Center
DEMO

        DirectAccess
       BranchCache
Windows Server 2008 R2
Ispunite upitnike i osvojite nagradu!

          Wireless Mobile Mouse 3000
Korisni linkovi
• http://www.microsoft.com/windowsserver200
  8/en/us/r2.aspx
• http://blog.frankovic.net
OPATIJA | 20 – 24.4. 2009.




   Hvala!

More Related Content

What's hot

NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7Nuno Alves
 
Ws 2012 feature comparison hyper v
Ws 2012 feature comparison hyper vWs 2012 feature comparison hyper v
Ws 2012 feature comparison hyper vRamakrishnan M
 
Решение Cisco Collaboration Edge
Решение Cisco Collaboration EdgeРешение Cisco Collaboration Edge
Решение Cisco Collaboration EdgeCisco Russia
 
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...David McGeough
 
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesAdvanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesDavid McGeough
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell
 
DotNetPanel VPS Solution Configuration Guide
DotNetPanel VPS Solution Configuration GuideDotNetPanel VPS Solution Configuration Guide
DotNetPanel VPS Solution Configuration Guidewebhostingguy
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
Oracle 10g Performance: chapter 11 SQL*Net
Oracle 10g Performance: chapter 11 SQL*NetOracle 10g Performance: chapter 11 SQL*Net
Oracle 10g Performance: chapter 11 SQL*NetKyle Hailey
 
V cloud director 5.1 what's new overview technical presentation
V cloud director 5.1 what's new overview   technical presentationV cloud director 5.1 what's new overview   technical presentation
V cloud director 5.1 what's new overview technical presentationsolarisyourep
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforcedeimos
 
Rickson_Rijoy_Windows, Exchange, Lync,Scom server support Engineer with 7.5 y...
Rickson_Rijoy_Windows, Exchange, Lync,Scom server support Engineer with 7.5 y...Rickson_Rijoy_Windows, Exchange, Lync,Scom server support Engineer with 7.5 y...
Rickson_Rijoy_Windows, Exchange, Lync,Scom server support Engineer with 7.5 y...Rickson Rijoy
 
What You Need to Know to Move from a Relational to a NoSQL Database
What You Need to Know to Move from a Relational to a NoSQL DatabaseWhat You Need to Know to Move from a Relational to a NoSQL Database
What You Need to Know to Move from a Relational to a NoSQL DatabaseDATAVERSITY
 
What's new in Citrix xen Desktop
What's new in Citrix xen DesktopWhat's new in Citrix xen Desktop
What's new in Citrix xen DesktopDigicomp Academy AG
 
Troubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKTroubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKDavid McGeough
 
V cloud director 5.1 what's new overview technical presentation
V cloud director 5.1 what's new overview   technical presentationV cloud director 5.1 what's new overview   technical presentation
V cloud director 5.1 what's new overview technical presentationsolarisyourep
 
David mootrey july 2018 resume
David mootrey july 2018 resumeDavid mootrey july 2018 resume
David mootrey july 2018 resumeDavid Mootrey
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...David McGeough
 

What's hot (20)

NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7NetScaler Deployment Guide for XenDesktop7
NetScaler Deployment Guide for XenDesktop7
 
Ws 2012 feature comparison hyper v
Ws 2012 feature comparison hyper vWs 2012 feature comparison hyper v
Ws 2012 feature comparison hyper v
 
Решение Cisco Collaboration Edge
Решение Cisco Collaboration EdgeРешение Cisco Collaboration Edge
Решение Cisco Collaboration Edge
 
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
Citrix TechEdge 2014 - Best Practices for Implementing, Administering, and Tr...
 
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler AppliancesAdvanced Tools and Techniques for Troubleshooting NetScaler Appliances
Advanced Tools and Techniques for Troubleshooting NetScaler Appliances
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
 
DotNetPanel VPS Solution Configuration Guide
DotNetPanel VPS Solution Configuration GuideDotNetPanel VPS Solution Configuration Guide
DotNetPanel VPS Solution Configuration Guide
 
Citrix Day 2014: NetScaler 10.5
Citrix Day 2014: NetScaler 10.5Citrix Day 2014: NetScaler 10.5
Citrix Day 2014: NetScaler 10.5
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
Oracle 10g Performance: chapter 11 SQL*Net
Oracle 10g Performance: chapter 11 SQL*NetOracle 10g Performance: chapter 11 SQL*Net
Oracle 10g Performance: chapter 11 SQL*Net
 
V cloud director 5.1 what's new overview technical presentation
V cloud director 5.1 what's new overview   technical presentationV cloud director 5.1 what's new overview   technical presentation
V cloud director 5.1 what's new overview technical presentation
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforce
 
Sanjeev Kumar
Sanjeev KumarSanjeev Kumar
Sanjeev Kumar
 
Rickson_Rijoy_Windows, Exchange, Lync,Scom server support Engineer with 7.5 y...
Rickson_Rijoy_Windows, Exchange, Lync,Scom server support Engineer with 7.5 y...Rickson_Rijoy_Windows, Exchange, Lync,Scom server support Engineer with 7.5 y...
Rickson_Rijoy_Windows, Exchange, Lync,Scom server support Engineer with 7.5 y...
 
What You Need to Know to Move from a Relational to a NoSQL Database
What You Need to Know to Move from a Relational to a NoSQL DatabaseWhat You Need to Know to Move from a Relational to a NoSQL Database
What You Need to Know to Move from a Relational to a NoSQL Database
 
What's new in Citrix xen Desktop
What's new in Citrix xen DesktopWhat's new in Citrix xen Desktop
What's new in Citrix xen Desktop
 
Troubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDKTroubleshooting a XenDesktop Environment using the PowerShell SDK
Troubleshooting a XenDesktop Environment using the PowerShell SDK
 
V cloud director 5.1 what's new overview technical presentation
V cloud director 5.1 what's new overview   technical presentationV cloud director 5.1 what's new overview   technical presentation
V cloud director 5.1 what's new overview technical presentation
 
David mootrey july 2018 resume
David mootrey july 2018 resumeDavid mootrey july 2018 resume
David mootrey july 2018 resume
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
 

Viewers also liked

Media Management
Media ManagementMedia Management
Media ManagementDanielpaul
 
Educ3313blogscaavengerhunt
Educ3313blogscaavengerhuntEduc3313blogscaavengerhunt
Educ3313blogscaavengerhuntCassi jo
 
Bullying 1
Bullying 1Bullying 1
Bullying 1jls13
 
Ehistöörakised
EhistöörakisedEhistöörakised
Ehistöörakisedandryki
 
Entreprenörer är bäst
Entreprenörer är bästEntreprenörer är bäst
Entreprenörer är bästguestfc54e7a
 
Niágara
NiágaraNiágara
Niágaradeliaa
 
5.dev meetup2 adobe_air_d_zhugin
5.dev meetup2 adobe_air_d_zhugin5.dev meetup2 adobe_air_d_zhugin
5.dev meetup2 adobe_air_d_zhuginNata Isaevich
 
Nuclear Fission
Nuclear FissionNuclear Fission
Nuclear Fissionstooty s
 
Sabr 39 Team Trivia Finals
Sabr 39 Team Trivia FinalsSabr 39 Team Trivia Finals
Sabr 39 Team Trivia FinalsSABR Office
 
會計報告89711010 黃嘉惠
會計報告89711010  黃嘉惠會計報告89711010  黃嘉惠
會計報告89711010 黃嘉惠jim77771988
 
Final
FinalFinal
Finaljls13
 
E learning exemplars
E learning exemplarsE learning exemplars
E learning exemplarsAngie Simmons
 
Visual Resume of Marc Campman
Visual Resume of Marc CampmanVisual Resume of Marc Campman
Visual Resume of Marc CampmanMarc Campman
 
Protecting Vulnerable Applications with IIS7
Protecting Vulnerable Applications with IIS7Protecting Vulnerable Applications with IIS7
Protecting Vulnerable Applications with IIS7webserverguard
 
6.Social Sciences And The Humanities Curriculum Review In Ontario Kim Crupi
6.Social Sciences And The Humanities Curriculum Review In Ontario  Kim Crupi6.Social Sciences And The Humanities Curriculum Review In Ontario  Kim Crupi
6.Social Sciences And The Humanities Curriculum Review In Ontario Kim CrupiLGRIS
 

Viewers also liked (20)

Media Management
Media ManagementMedia Management
Media Management
 
Presentacio Caillou 2 Cati
Presentacio Caillou 2 CatiPresentacio Caillou 2 Cati
Presentacio Caillou 2 Cati
 
Educ3313blogscaavengerhunt
Educ3313blogscaavengerhuntEduc3313blogscaavengerhunt
Educ3313blogscaavengerhunt
 
Bullying 1
Bullying 1Bullying 1
Bullying 1
 
CRM
CRMCRM
CRM
 
Derivadas
DerivadasDerivadas
Derivadas
 
Ehistöörakised
EhistöörakisedEhistöörakised
Ehistöörakised
 
Entreprenörer är bäst
Entreprenörer är bästEntreprenörer är bäst
Entreprenörer är bäst
 
Niágara
NiágaraNiágara
Niágara
 
5.dev meetup2 adobe_air_d_zhugin
5.dev meetup2 adobe_air_d_zhugin5.dev meetup2 adobe_air_d_zhugin
5.dev meetup2 adobe_air_d_zhugin
 
Nuclear Fission
Nuclear FissionNuclear Fission
Nuclear Fission
 
Sabr 39 Team Trivia Finals
Sabr 39 Team Trivia FinalsSabr 39 Team Trivia Finals
Sabr 39 Team Trivia Finals
 
會計報告89711010 黃嘉惠
會計報告89711010  黃嘉惠會計報告89711010  黃嘉惠
會計報告89711010 黃嘉惠
 
Ea Presentation
Ea PresentationEa Presentation
Ea Presentation
 
Final
FinalFinal
Final
 
E learning exemplars
E learning exemplarsE learning exemplars
E learning exemplars
 
strategi belajara mengajar
strategi belajara mengajarstrategi belajara mengajar
strategi belajara mengajar
 
Visual Resume of Marc Campman
Visual Resume of Marc CampmanVisual Resume of Marc Campman
Visual Resume of Marc Campman
 
Protecting Vulnerable Applications with IIS7
Protecting Vulnerable Applications with IIS7Protecting Vulnerable Applications with IIS7
Protecting Vulnerable Applications with IIS7
 
6.Social Sciences And The Humanities Curriculum Review In Ontario Kim Crupi
6.Social Sciences And The Humanities Curriculum Review In Ontario  Kim Crupi6.Social Sciences And The Humanities Curriculum Review In Ontario  Kim Crupi
6.Social Sciences And The Humanities Curriculum Review In Ontario Kim Crupi
 

Similar to Windows Server 2008 R2

Windows Server 2008 R2 Overview 1225768142880746 9
Windows Server 2008 R2 Overview 1225768142880746 9Windows Server 2008 R2 Overview 1225768142880746 9
Windows Server 2008 R2 Overview 1225768142880746 9Stephan - Gabriel Georgescu
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 OverviewTudor Damian
 
Tudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overviewTudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overviewITCamp
 
Fy09 Sask Tel Learn It Ws 2008 R2 Charlie Russel
Fy09 Sask Tel Learn It   Ws 2008 R2   Charlie RusselFy09 Sask Tel Learn It   Ws 2008 R2   Charlie Russel
Fy09 Sask Tel Learn It Ws 2008 R2 Charlie Russelsim100
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Microsoft TechNet - Belgium and Luxembourg
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionDigicomp Academy AG
 
Website hosting and infrastructure
Website hosting and infrastructureWebsite hosting and infrastructure
Website hosting and infrastructurewebhostingguy
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoQuek Lilian
 
Microsoft Pwrpt
Microsoft PwrptMicrosoft Pwrpt
Microsoft PwrptRBratton
 
5 dani künzli citrix networking news 1
5 dani künzli citrix networking news 15 dani künzli citrix networking news 1
5 dani künzli citrix networking news 1Digicomp Academy AG
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft Private Cloud
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Controlzayedalji
 
Building Business Continuity Solutions With Hyper V
Building Business Continuity Solutions With Hyper VBuilding Business Continuity Solutions With Hyper V
Building Business Continuity Solutions With Hyper Vrsnarayanan
 

Similar to Windows Server 2008 R2 (20)

Server 2008 R2 Yeniliklər
Server 2008 R2 YeniliklərServer 2008 R2 Yeniliklər
Server 2008 R2 Yeniliklər
 
Windows Server 2008 R2 Overview 1225768142880746 9
Windows Server 2008 R2 Overview 1225768142880746 9Windows Server 2008 R2 Overview 1225768142880746 9
Windows Server 2008 R2 Overview 1225768142880746 9
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
DirectAccess
DirectAccessDirectAccess
DirectAccess
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 Overview
 
Tudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overviewTudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overview
 
Fy09 Sask Tel Learn It Ws 2008 R2 Charlie Russel
Fy09 Sask Tel Learn It   Ws 2008 R2   Charlie RusselFy09 Sask Tel Learn It   Ws 2008 R2   Charlie Russel
Fy09 Sask Tel Learn It Ws 2008 R2 Charlie Russel
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introduction
 
Website hosting and infrastructure
Website hosting and infrastructureWebsite hosting and infrastructure
Website hosting and infrastructure
 
Windows Server 2012 Hyper-V Networking Evolved
Windows Server 2012 Hyper-V Networking Evolved Windows Server 2012 Hyper-V Networking Evolved
Windows Server 2012 Hyper-V Networking Evolved
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John Delizo
 
Microsoft Pwrpt
Microsoft PwrptMicrosoft Pwrpt
Microsoft Pwrpt
 
5 dani künzli citrix networking news 1
5 dani künzli citrix networking news 15 dani künzli citrix networking news 1
5 dani künzli citrix networking news 1
 
Resume 28th June 2016
Resume 28th June 2016Resume 28th June 2016
Resume 28th June 2016
 
Resume 28th June 2016
Resume 28th June 2016Resume 28th June 2016
Resume 28th June 2016
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
 
Windows 7 For Itpro
Windows 7 For ItproWindows 7 For Itpro
Windows 7 For Itpro
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
 
Building Business Continuity Solutions With Hyper V
Building Business Continuity Solutions With Hyper VBuilding Business Continuity Solutions With Hyper V
Building Business Continuity Solutions With Hyper V
 

Recently uploaded

UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 

Recently uploaded (20)

UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 

Windows Server 2008 R2

  • 2. Windows Server 2008 R2 BETA Marin Franković Algebra
  • 5. Sadržaj predavanja • Hyper-V 2.0 • DirectAccess • BranchCache • AD Recycle Bin • App Locker • BitLocker • PowerShell 2.0 • Windows 7?
  • 6. Hyper-V 2.0 • Live Migration Virtual Virtual Machine Machine Configuration Data Memory Content Memory Sync Cluster Cluster User Node 1 Node 2 VHD Network Storage
  • 7. Hyper-V 2.0 • Migracija VM-a bez prekida poslovanja • Visoka dostupnost • Jednostavno upravljanje • Hyper-V konzola • PowerShell 2.0 • SCVMM 2008 • Boot s VHD-a • Više o Hyper-V 2.0 (srijeda, Hotel Kvarner, Kristalna dvorana) • 11:00 - 11:50 Hyper-V V2 • 14:30 - 15:20 Backup, restore i disaster recovery u Hyper-V okruženju • 15:40 - 16:30 System Center Virtual Machine Manager
  • 8. DirectAccess IPv4 uređaj IPv6 Uređaji Podržava IPv4 kroz 6to4 tranzitne servise Upravljanje ili NAT-PT računalima Omogućava DirectAccess Nativni IPv6 upravljanje s omogućava s IPSec-om DirectAccess AD Group transparentan, siguran Policy, NAP, soft klijentima IPv6 Tranzicijski pristup intranet ware updates Servisi resursima bez VPN-a Podržava direktno spajanje s IPv6 Internet DirectAccess baziranim resursima u Server intranetu Podrška za razne Omogućava IPSec remote protokole Windows 7 enkripciju i autentikaciju Klijent
  • 9. BranchCache (Distributed) 2. Klijent 2 povuče identifikacijske oznake s servera u glavnom uredu Klijent1 Glavni ured Klijent 2 1. Klijent 1 povuče Udaljeni ured podatke s servera u glavnom uredu 3. Klijent 2 pretražuje lokalnu mrežu i podatke povuče s klijenta 1
  • 10. BranchCache (Hosted) 4. Klijent 2 povlači podatke s servera u udaljenom 2. Klijent 1 podatke stavlja uredu na server u udaljenom uredu Klijent1 Glavni ured 1. Klijent 1 povuče Klijent2 Udaljeni ured podatke s servera u glavnom uredu 2. Klijent 2 povuče identifikacijske oznake s servera uglavnom uredu
  • 11. AD Recycle Bin • Forest Level Windows 2008 R2 • Omogućiti Recycle Bin koristeći AD PowerShell • Set-ADForestMode –Identity demo.local -ForestMode Windows2008R2Forest • Enable-ADOptionalFeature –Identity ‘CN=Recycle Bin Feature,CN=Optional Features,CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration, DC=demo,DC=local’ –Scope Forest –Target ‘demo.local’
  • 12. App Locker • Dozvole prema: publisher, file name, version, product name … • Što nije dozvoljeno, zabranjeno je • Grupe i korisnici (ne računala) • Audit mode • AppLocker i Software Restriction Policy?
  • 13. BitLocker • Bitlocker ToGo • USB diskovi, stickovi, … • Zabrana korišćenja ne enkriptiranih USB uređaja (samo Win 7) • A drugi operativni sustavi?
  • 14. PowerShell 2.0 • Novi cmdlet-i • Remote upravljanje (prema 1 ili n+1 računala) • ISE (Integrated Scripting Environment ) • Background (asinhrono) izvršavanje • Debuger • Cmdlet-i za skoro sve role na Windows 2008 R2 serveru
  • 15. Windows 7? • DirectAccess • BrancheCache • AppLocker • Power management with GP • Više o Windows 7 (četvrtak, Hotel Imperijal, Zlatna dvorana): • 11:00 - 11:50, Windows 7 (200) • 12:10 - 13:00, Windows Server 2008 R2 i Windows 7 zajedno (300) • 16:50 - 17:40, Windows 7 – sigurna budućnost (200) • 18:00 - 18:50, Windows 7 novosti i poboljšanja u korisničkom iskustvu (200)
  • 16. DEMO • BranchCache • DirectAccess • AD Recycle Bin • BitLocker To Go • App Locker • PowerShell 2.0 (GUI) • AD Admin Center
  • 17. DEMO DirectAccess BranchCache
  • 19. Ispunite upitnike i osvojite nagradu! Wireless Mobile Mouse 3000
  • 20. Korisni linkovi • http://www.microsoft.com/windowsserver200 8/en/us/r2.aspx • http://blog.frankovic.net
  • 21. OPATIJA | 20 – 24.4. 2009. Hvala!