This document provides an overview of how to use Windows Small Business Server 2011. It discusses managing user accounts, client computers, shared folders, remote web access, and mobile devices. It also describes administrative tasks like pre-deployment checks, connecting client computers, and customizing remote web access. Best practices for security and managing the system using the Windows SBS console are also covered.
Building solutions with microsoft virtualisationRonnie Isherwood
Based on Microsoft TechEd virtualization 360 talks this is my first community based presentation given in Jersey. A very real-world look using Microsoft slide decks and discussing all type of virtualization technology.
Building solutions with microsoft virtualisationRonnie Isherwood
Based on Microsoft TechEd virtualization 360 talks this is my first community based presentation given in Jersey. A very real-world look using Microsoft slide decks and discussing all type of virtualization technology.
Microservices: Architecture to scale AgileEberhard Wolff
Microservices allow for scaling agile processes. This presentation shows what Microservices are, what agility is and introduces Self-contained Systems (SCS). Finally, it shows how SCS can help to scale agile processes.
Presentation by Shree Prasad Khanal, Leader, Himalayan SQL Server User Group, on "Where should I be encrypting my data? " at "Braindigit 9th National ICT Conference 2013" organized by Information Technology Society, Nepal at Alpha House, Kathmandu, Nepal on 26th January, 2013
Data Architecturen Not Just for MicroservicesEberhard Wolff
Microservices change the way data is handled and stored. This presentation shows how Bounded Context, Events, Event Sourcing and CQRS provide new approaches to handle data.
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...Micro Focus
Solving Desktop Challenges with Application Virtualisation Trying to keep your desktop infrastructure and operating systems current is a huge challenge, especially when legacy Windows applications have dependences on old runtimes and browsers. Come to this session to see how creating a sandbox on the desktop to virtualise these applications can help solve real world desktop issues. Presenter: Ron van Herk, Solution Consultant
Azure Remoteapp is a SAAS from Microsoft Azure. It is a great tool for SME and Large enterprise level businesses. The problem most people have is they didn't understand the eco system of Azure Remoteapp and imagine it like a local computing system. To make them understand how Azure remoteapp works and how to build a Remoteapp collection, I did this presentation on 4th June 2015 at Microsoft Sri Lanka office.
This is my 75 minutes "highlights" presentation on what's new in WS2012 R2. It's not all encompassing - intended just to get across the key points of the core OS. It followed a "Cloud OS" keynote and preceded a "System Center hybrid cloud" presentation.
SSDN Technology is a training institute located in Delhi Gurgaon, NCR & India which offer best MCSA - SQL SERVER 2012 training by our experienced trainer. We are providing live project training with full lab facility. For more details for a bright future call us at +91-9999-111-686.
http://www.ssdntech.com/sql-server-training.aspx
Microservices: Architecture to scale AgileEberhard Wolff
Microservices allow for scaling agile processes. This presentation shows what Microservices are, what agility is and introduces Self-contained Systems (SCS). Finally, it shows how SCS can help to scale agile processes.
Presentation by Shree Prasad Khanal, Leader, Himalayan SQL Server User Group, on "Where should I be encrypting my data? " at "Braindigit 9th National ICT Conference 2013" organized by Information Technology Society, Nepal at Alpha House, Kathmandu, Nepal on 26th January, 2013
Data Architecturen Not Just for MicroservicesEberhard Wolff
Microservices change the way data is handled and stored. This presentation shows how Bounded Context, Events, Event Sourcing and CQRS provide new approaches to handle data.
#MFSummit2016 Operate: Solving desktop challenges with application virtualisa...Micro Focus
Solving Desktop Challenges with Application Virtualisation Trying to keep your desktop infrastructure and operating systems current is a huge challenge, especially when legacy Windows applications have dependences on old runtimes and browsers. Come to this session to see how creating a sandbox on the desktop to virtualise these applications can help solve real world desktop issues. Presenter: Ron van Herk, Solution Consultant
Azure Remoteapp is a SAAS from Microsoft Azure. It is a great tool for SME and Large enterprise level businesses. The problem most people have is they didn't understand the eco system of Azure Remoteapp and imagine it like a local computing system. To make them understand how Azure remoteapp works and how to build a Remoteapp collection, I did this presentation on 4th June 2015 at Microsoft Sri Lanka office.
This is my 75 minutes "highlights" presentation on what's new in WS2012 R2. It's not all encompassing - intended just to get across the key points of the core OS. It followed a "Cloud OS" keynote and preceded a "System Center hybrid cloud" presentation.
SSDN Technology is a training institute located in Delhi Gurgaon, NCR & India which offer best MCSA - SQL SERVER 2012 training by our experienced trainer. We are providing live project training with full lab facility. For more details for a bright future call us at +91-9999-111-686.
http://www.ssdntech.com/sql-server-training.aspx
Windows Small Business Server "Aurora" is a new edition of Windows Small Business Server that introduces cross-premise functionality, providing small businesses with on-premise file and print, security, backup, remote access, and identity management services, combined with optional off-premise services.
In this session we will go through new and extended functions in the User Profile area. We will cover the planning and implementation from the organizational to the technical perspective, not only in theory but also in the live demo.
Aleksandar Drašković
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation ServicesChris Spanougakis
Η αγορά έχει γεμίσει ταμπλέτες και φορητές συσκευές κάθε είδους, ενώ οι admins πρέπει να βρουν έναν τρόπο να διαχειριστούν αυτή την νέα κατάσταση και να δώσουν πρόσβαση στα δεδομένα από παντού… Γίνεται; Σε αυτή την παρουσίαση θα εξερευνήσουμε σε βάθος πως αυτό μπορεί να γίνει δυνατό χρησιμοποιώντας την τεχνολογία των Work Folders που προσφέρει ο νέος Windows Server 2012 R2, αλλά επίσης και το νέο Workplace Join, που μπορεί να δώσει πρόσβαση στις εταιρικές εφαρμογές ακόμα και σε αυτούς που …. δεν χρησιμοποιούν Microsoft λειτουργικά. Θα εξερευνήσουμε επίσης και την δυνατότητα MFA (Multi-Factor Authentication) για την πρόσβαση στα δεδομένα της εταιρίας από οπουδήποτε.
PortalGuard’s Password Synchronization offers a comprehensive solution which supports multiple directories including Microsoft Active Directory, Novell eDirectory, IBM System i, any LDAP v3-compliant directory and custom SQL user tables. Beyond being easy to implement and forcing user enrollment, PortalGuard enables self-service password reset, recovery and account unlock to manage forgotten passwords. PortalGuard helps reconcile any password complexity policies by enforcing a consistent set of password rules.
Tutorial: http://pg.portalguard.com/server-based_password_synch_tutorial
The Skype for Business (Lync) apps are one of the ubiquitous aspect of the product. Mobility is cross platform (Android, IOS and Windows are supported), has specific requirements and (in Skype for Business) adds some specific limits for clients on authentication, security and features. As part of the default server features, mobility is now both easier and more critical to understand. In this session, we will see what has been made available for the mobile users and what will be released. Configurations, requirements and deployment suggestions will be explained for on-premises, Cloud and hybrid deployments
RES Automation Manager 2012 - What's new...Online Seminar 17 July 2012RES Software Nederland
Met RES Automation Manager kunnen organisaties, vanuit een centraal beheerde omgeving, vele dagelijkse taken automatiseren en IT-middelen effici�nter inzetten. Daarnaast vormt RES Automation Manager 2012 de basis voor RES service orchestration, waarmee gebruikers toegang hebben tot een persoonlijke catalogus met applicaties. Met service orchestration kunnen organisaties beter inspelen op de mobiliteit en vereiste flexibiliteit van gebruikers. RES Automation Manager 2012 is begin dit jaar gelanceerd en levert diverse nieuwe features, waaronder: ? Cross platform management support (waaronder Red Hat, SuSE en AIX) ? Integratie van Microsoft System Center Configuration Manager ? Verbeteringen in schaalbaarheid en prestatie, waaronder de ondersteuning van native 64-bits ? Verdere ondersteuning voor een multi-tenancy infrastructuur; het bijstaan van sytems integrators met Desktop-as-a-Service initiatieven ? Introductie van window support; hulp bij risicobeperking door hetgeen wat beheerd kan worden tijdens kantooruren te beperken Tijdens dit online seminar laat Arie Joosse u graag alle nieuwe features en voordelen zien van RES Automation Manager 2012.
bfx and studio server - Bluebeam eXtreme Conference 2014bluebeamslides
Bluebeam develops advanced technologies to seamlessly work with your enterprise systems. Bluebeam’s bFX protocol enables Revu to open PDF files from a remote location, such as a website, add markups and post them back to the remote location. Studio Server allows you to host collaboration sessions behind your own firewall for enhanced security.
Microsoft Ignite 2019’un Göze Çarpanları Webcast SunumuMustafa
Mshowto Topluluğundan Baki Onur Okutucu ve Onur Yüksektepeli ile birlikte gerçekleştirdiğim Microsoft Ignite 2019 notlarını ve göze çarpanları paylaştığımız webcast'e ait sunuma buradan erişebilirsiniz.
Quest Software Kullanıcı Deneyimleri Konferansımızda bende ZeroIMPACT Migration çözümleri ile Microsoft Active Directory, Exchange Server, SharePoint ve Office 365 migrationı katılımcılarımıza anlatmaya çalıştım. Etkinlikte yapmış olduğum sunumu buradan incelebilirsiniz.
Microsoft Teknoloji Zirvesi 2018'de Müşterimiz Dutch Sprouts ve Springg Yazılım ile birlikte gerçekleştirdiğimizin oturuma ait sununu buradan inceleyebilirsiniz.
MSHOWTO ile Tech Summit 1'de Bende Özgür Çebi ile birlikte Citrix on Azure oturumunu gerçekleştirdim. Bu oturuma ait sunumu bu adresten inceleyebilirsiniz.
Önder Değer ile birlikte gerçekleştirdiğimiz MSHOWTO teknolojisinde sohbetlerinde sizlere yep yeni bir Azure çözümünü Azure Stack'i anlatmıştık. Anlatım sırasında kullandığımız sunumu buradan inceleyebilirsiniz.
7 Kasım 2017 günü yapmış olduğum Azure DevTest Labs Nedir ? ve Yazılım Geliştiriciler için Nasıl Kolaylılar Sağlar ? webinarına ait sunumu buradan inceleyebilirsiniz.
Azure Advisor Hemen Yanınızdaki En İyi DanışmanMustafa
12 Eylül 2017 günü gerçekleştirmiş olduğum webinarda Azure Advisorın ortamınızı optimize etmek için en iyi yöntemleri uygulamanıza yardımcı olacak bir danışman olarak karşınıza geldiğinden bahsetmiştim. Bu webinara ait sunuma buradan erişebilirsiniz.
2 Ocak 2018 Salı günün gerçekleştirmiş olduğum Bulut sektörünün iki lider üreticisi olan AWS ve Azure platformlarının servislerinin karşılatırılmasını anlattığım webinara ait sunumu inceleyebilirsiniz.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
3. User Tasks
General User Tasks
• Add new account
• Add multiple accounts
• Change user roles for accounts
• Change password policies
• Redirect folders
• Help
Specific User Tasks
• Edit user properties
• Remove user account
• Reset user password
• Change group membership
• Disable user account
• Add new user role based on this user
• Print a Getting Started page for user
4. Modifying User Account Properties
Properties
• Remote access permissions
• VPN permissions
• E-mail information and
mailbox quotas
• Access to Remote Web Access
• Access to Outlook Web Access
• Computer access
• Access to internal shared folders
• Group membership
5. User Roles and Groups
User Roles
• Add a new role
• Edit role properties
• Remove role
Groups
• Add new group
• Edit group properties
• Change group membership
• Remove group
6. Best Practice
Security best practice for managing
user accounts:
• Implement strong passwords
• Change password policies
• Educate users
• Do not use the administrator
account for daily work
7. Managing with the Windows SBS Console
Network Page
Computers
Devices
Connectivity
8. Pre-deployment Administrative Tasks
Did you check applications for compatibility?
Do you have the latest BIOS?
Drivers up-to-date?
Latest service packs and security updates applied?
Network connectivity configured properly?
Local admin password set and documented?
9. Connecting Client Computers
http://connect
• From Internet Explorer address bar
Connect Computer Wizard
• From portable media (USB)
User can join the client computer
• Does not require administrative privileges
10. Connect Client Computer Wizard
Launch Client Computer Wizard
Set up for yourself Set up for others
Runs Client Advisor utility
Enter username Enter admin name
Enter password Enter admin password
Verify computer name
Move profile data Assign user
Move profile data
Select user role
Restarts computer, joins to the SBS domain
11. Managing Client Computers
Computer Properties
• General settings
• Administer user access to the client
• Configure updates
13. Managing with the Windows SBS Console
Shared Folders and Web Sites Page
Shared
Folders
Web
Sites
14. Redirecting User’s Folders
Applies GPO to redirect
Redirect folder options:
• Desktop
• Documents
• Start Menu
2GB default storage quota
Enables Previous Client Version
Enables Offline Files
15. Using Shared Folders
Users access data stored on the SBS server using network
shared folders
• Windows Search Service allows users to quickly find files
The Company folder is created by default
Administrators use the Dashboard to create
additional shared folders
Access is controlled using simplified permissions:
• Full access (Read/Write)
• Read only
• No access
Shared folders support Shadow Copies
• Users can use Previous Versions tab in Windows Explorer to recover accidently
deleted or overwritten files
16. Remote Web Access
RWA Features
• E-mail, Calendars, Contacts via Outlook Web Access
• Intranet portal (Companyweb)
• Computer desktops (Admins can connect to the SBS server)
• Shared folders
• Single Sign-On experience
• Self-service password change
17. Customizing Remote Web Access
Customizable features:
• Remote Web Access user access
• Remote Web Access sign-in page
• Remote Web Access home page
• Check e-mail
• Connect to computer
• Internal Web site (SharePoint)
• Change password
• Help
• Organizational links
• Administration links
18. Remote Web Access Requirements
Prerequisites to access RWA
• Member of Remote Web Access users
• RDP client software 6.0 or later
• Router ports 443 and 987 must be open and
forwarded to SBS server
• optionally port 80 for redirection to port 443
• Ports 443 and 987 must be open on the SBS server
• optionally port 80 for redirection to port 443
• Browser must accept cookies
19. Request & Install a Third-party Certificate
Windows SBS 2011 creates a self-issued certificate that
can be used to established secure remote connections
• Connected client computer have certificate installed automatically
• Remote client computers must install certificate manually
• PDAs/smart phones must install this certificate
Certificates generated by third-party providers are
easier to implement and manage
• Nothing to install on client devices
• Have become very inexpensive
20. Configuring Mobile Devices
What is Exchange ActiveSync? (EAS)
Mobile devices supported
• Microsoft® Windows Mobile® 5.0 (Messaging & Security Feature
Pack)
• Windows Mobile® 6.x and Above
• Any device that supports Exchange ActiveSync
Exchange ActiveSync features
• Direct Push
• Device Security policy enforcement
• Remote device wipe
22. TEŞEKKÜRLER
SBS Kaynak Blogu,SBS Hakkında
Herşey:
www.sbs-2008.com
System Center Blogu,Tüm System
Center Ürünleri tek blogta:
systemcenterblog.wordpress.com Microsoft Türkiye:
www.microsoft.com/turkiye
Small Business Server 2011 Standard
hakkında daha fazla bilgi:
www.microsoft.com/sbs
Mustafa KARA kişisel blog:
www.mustafakara.net.tr
Editor's Notes
Key Message: Title Slide Instructor:Introduce Module
Timing: 1 min max. Key Message: Run through the agenda for the presentation.Instructor: Describe the course agenda.
Timing: 2 min Key Message:User management is fully integrated into SBS 2011 Standard console. Instructor: All user management can be performed within the SBS 2001 Standard Console. This includes simple add-user wizards, editing user properties and defining user roles. Basically all user account management is centralized in a single view. For users, administrators can Add new accountAdd multiple accountsChange user roles for accountsChange password policiesAutomatically enable Redirected foldersEdit user propertiesRemove user accountReset user passwordChange group membershipDisable user accountAdd new user role based on this userPrint a Getting Started page for userThis user wizard will also create mailboxes, and determine access to tools such as RWA.Slide Transition Note: Lets look at modifying user accounts
Timing: 1 min Key Message:All user account properties are stored in simple admin view Instructor: Modifying user properties is simple, and you have very granular control using a simple inbuilt tool. You can not only do simple tasks like update user information and reset the user password, you can also determine email, RWA and SharePoint access through a single view. In the user properties view you can administerRemote access permissionsVPN permissionsE-mail information andmailbox quotasAccess to Remote Web AccessAccess to Outlook Web AccessComputer accessAccess to internal shared foldersGroup membershipSlide Transition Note: Lets look at User roles and groups
Timing: 2 min Key Message:SBS 2011 Standard has a number of inbuilt user roles to provide a base level template for new users, which can be customized or created from new. Instructor: Role in SBS 2011 Standard provide a standard template in creating new users. They can define the level of access to certain resources, mailbox quotas, external access and much more. By using User Roles, you can ensure that new users all adhere to the same level of access for that specific use type. You can also create new User Roles and apply them to new users (as well as defining a User Role from a new or existing user themselves). Groups are simple to create, edit and maintain using the Group task. Admins can Add new groupsEdit group propertiesChange group membershipRemove groupsSlide Transition Note: Lets look at some best practices in regards to new and existing users
Timing: 2 min Key Message: User security is low in many SMB’s, and through implemented process and user guidance you can increase identity security easily. Instructor:Implement strong passwords:Password policies are a set of rules that can enhance the security of your SBS 2011 Standard network. Using strong password provides an additional layer of defense against an unauthorized user gaining access to your network. To help implement strong passwords, password polices are enabled by default during installation. You can ensure that users implement strong passwords by enforcing password polices in your network. The password policies in SBS 2011 Standard include the following:Minimum length Enable this policy to determine the least number of characters that a password can contain. Setting a minimum length helps protect your network by preventing users from having short or blank passwords. The default is eight characters.Complexity Enable this policy to determine whether passwords must contain different types of characters. If this policy is enabled, passwords cannot contain all or part of a user's account name, and it must contain characters from three of the following four categories: ·English uppercase characters (A through Z) ·English lowercase characters (a through z) ·Numerals (0 through 9) ·Non-alphanumeric characters (such as , !, $, #, %)Maximum age Enable this policy to determine the period of time (in days) that a password can be used before the system requires that the user change it. The default is 42 days.Educate usersAfter implementing strong password policies, educate users about strong and weak passwords. Ask users to treat their password as they would private information, such as a credit card personal identification number (PIN). Following are typical guidelines for creating a strong password. When implemented, they provide protection for your local network.A strong password consists of the following:·At least eight characters.·Characters from three of the following four categories:·Uppercase letters (A through Z)·Lowercase letters (a through z)·Numbers (0 through 9)·Non-alphanumeric characters (for example, !, $, #, %)Do not use administrator accounts for daily workBecause user accounts that are based on the Network Administrator user role are very powerful, consider basing user accounts on the Standard User user role. Using the Network Administrator user role increases the chance that the user will inadvertently delete important files or gain unintended access to an account with administrative permissions
Timing: 1 min Key Message:All computer, device (such as fax and printers), and connectivity (such as Internet connection administration) is performed via the Network tab Instructor: Using the Network tab you can view the current state of all Servers and PC’s on your network (such as general, security and update status) and enable power management policies for Vista and Windows 7 clients. You can also add new printers and fax cards, as well as administer your internet connectivity and associated tools.Slide Transition Note: Lets look at connecting clients to SBS 2011 Standard
Timing: 2 min Key Message:Management of PC’s is done via the computer tab under the network page in the console.Instructor: Administering computers is simple through the computer tab in the console. From here you can view computer properties (such as users who can access the machine locally or via RWA, patch management status, and general information about the PC).Slide Transition Note: You can even offer remote assistance from the console
Timing: 2 min Key Message:Management of Shared folders and websites such as RWA is performed via the Shared Folders and Websites page in the consoleInstructor: Creating, administering or deleting shared folders is completed via the shared folders tab. Sharing a folder may sound easy, but can be complex to a users with low IT skills. SBS makes this easer by using a simple wizard for creating and sharing new and existing folders. Including extending them to SMB/NFS, Quota ability and DFS. You can also configure client folder redirection using this tool. Why is this important – Folder Redirection ensure you can capture local user data and personalization to the centralized server. This allows further client redundancy, allowing you to centralize your data and provide full backups.Further to this the core SBS websites such as RWA, OWA and SharePoint access can be administered through these tools. While deeper configuration will be done via the specific admin tools (such as IIS for RWA and OWA, and SharePoint Central for SharePoint Foundation), activities such as user permissions/access, customization, and links can be configured using this tool.Slide Transition Note: Lets look more at redirected folders
Timing: 2 minKey Message: Users access SBS network shared folders based on a simplified set of permissions Instructor:Users access data stored on the SBS server using network shared foldersWindows Search Service allows users to quickly find filesThe Company folder is created by defaultAdministrators use the Dashboard to createadditional shared foldersAccess is controlled using simplified permissions:Full access (Read/Write)Read onlyNo accessShared folders support Shadow CopiesUsers can use Previous Versions tab in Windows Explorer to recover accidently deleted or overwritten files
Timing: 2 min Key Message:Remote Web Access provides a simple way for external and roaming users to access content, email, company intranet and important links through a browser.Instructor: Remote Web Access is the new update of the Remote Web Workplace. It provides external access to a pre-installed secured portal from most web browsers. Users can access their email and calendar, contacts and tasks through Outlook Web Access. You can also access your intranet (CompanyWeb) based on Sharepoint Foundation Server 2010. Access to data stored in shared folders is also capable, including download and uploading of content. Users can also change passwords through the self-service password change tool, and take control of internal clients on the intranet securely through the in-built RDS gateway.Slide Transition Note: Lets look at customizing the RWA experience
Timing: 2 min Key Message:Remote Web Access provides many ways to customize the experience including logon pages, access rights for users and various features.Instructor: The below list shows the customization features.Remote Web Access user access:Specify which users and groups have permission to sign in to Remote Web Access. Remote Web Access sign-in page:Display the name of your organization and choose a custom background image. Remote Web Access home page:Provide a name, description, and logo for your Remote Web Access to display on the home page. You can also choose which Organizational and Administration links to make available to Remote Web Access users to suit the needs of your organization. Check e-mail:Display this link to enable users to access their e-mail and calendar from your Outlook Web Access site:Connect to computerDisplay this link to enable users to establish a remote connection to a computer at work. Internal Web Site (SharePoint):Display this link to enable users to connect to your organizations Internal Web site. Access Shared Files:Display this link to enable users to access files and folders that are shared by network users. Owners of shared files and folders assign and manage access permissions for their content. Change password:Display this link to enable users to change their network passwords. Help:Display this link to give users access to Help topics for learning about network features. Organization links:Display this link section to expose custom links that are specific to your organization. Add, edit, and remove links in accordance with the needs of your organization. Personal links:Display this link section to give users access to the personal links that they added by using the Desktop Links gadget. Administration Links:Display this link and assign permissions to enable users with administrative roles to use Remote Web Access to perform assigned tasks. Slide Transition Note: Lets look at RWA requirements
Timing: 2 min Key Message:Users must have rights to access RWA, and the router must be correctly configured to support external RWA access.Instructor: These are the minimum requirements a client must meet in order to access RWA features.RWA is setup out of the box and finalized when running the IAMW, and only client side configuration is required for access. Further customizations to RWA can be done in the SBS management console.Students may wonder why the Router does not need port 3389 for RDP. This is due to RWA using the RDS Gateway which does not require 3389.Slide Transition Note: lets look a securing our access to RWA
Timing: 2 min Key Message: Using 3rd party certificates is easy and simple to use, integrated into the wizard and saves the hassle of installing on multiple machines.Instructor: This is a fairly straight forward process in SBS. SBS Management console>Network tab>Connectivity , in the task pane “Add trusted certificate”The wizard launches and asks you to verify your domain information. On the Generate a certificate request page, click Generate request. Windows Small Business Server 2011 Standard server generates encoded information that the certification authority requires. After the request is generated, click Copy, and then paste the information into the space provided on the certification authority's Web site.If you do not receive the certificate information from the certification authority immediately, do the following:Verify that I will re-run the wizard after I receive the certificate file from my certificate-service provider is selected, and then click Next.On The certificate request was postponed page, click Finish.If you receive the certificate information from the certification authority immediately, do the followingClick I am ready to import the certificate file from my certificate-service provider, and then click Next.On the Import the trusted certificate file page, browse to the location where you saved the trusted certificate file, and then click Next.On The certificate file is installed page, click FinishIn order to run this wizard, the IAMW must have first been completed and Internet address setup successfully.Slide Transition Note: Lets finish up with looking at remote devices
Timing: 2 min Key Message:Exchange ActiveSync supports mobile connection to your email server through RWA. Users can access email, contacts and calendar easily and support activities such as direct mail push, device policy enforcement and remote device wipe.Instructor:What is Exchange Active Sync?Exchange ActiveSync is a communications protocol that enables mobile access, over the air, to e-mail messages, scheduling data, contacts, and tasks. Exchange ActiveSync is available on Windows Mobile powered devices and third-party devices that are enabled for Exchange ActiveSync.Uses Direct push technology which is an encrypted HTTPS connections established between the client and the server.Configuring the mobile device to sync with Exchange (for a device using ActiveSync)After you have installed the certificate on the mobile device and confirmed that the mobile device can use the Internet service provided by the user's wireless carrier, complete the following tasks: On the Today screen, tap Start, and then tap ActiveSync. This displays the ActiveSync screen.Tap Menu, and then tap Configure Server.Tap anywhere within the address bar, and then type the Exchange ActiveSync URL, such as https://remote.domainname.com. Select This Server Requires An Encrypted (SSL) Connection.Click Next. When prompted, enter your user name, password, and domain information.Select the Save Password check box, and then click Next.Select the types of information you want to sync with the server, such as inbox, calendar, and contacts, and then click Finish.It will take a couple of minutes to sync the first time depending on the size of the users mailbox and speed of the wireless connection.
Key Message: Elicit questions from the audience.Instructor:Timing: As long as necessary.