SlideShare a Scribd company logo
1 of 36
Download to read offline
Microsoft NDA Confidential
Lock Screen changes
Start Screen enhancements
Search
New Store Layout
And yes,… the Start Button
Microsoft NDA Confidential
Microsoft NDA Confidential
Boot to Desktop
Show Desktop Background on Start
Replace CMD with Powershell
Presentation of Apps
User Configuration  Administrative Templates Windows Components 
Edge UI

Microsoft NDA Confidential
CopyProfile still exists
<settings pass="specialize">
<component name="Microsoft-Windows-Shell-Setup" processorArchitecture="x86" publicKeyToken="31bf3856ad364e35" language="neutral"
versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance”>
<CopyProfile>true</CopyProfile>
</component>
</settings>
%windir%system32SysprepSysprep.exe /oobe /generalize /shutdown /unattend:f:unattend.xml

Provision Startmenu layout
Export-startlayout –path pathfile.xml –as xml (or “-as bin”)

Microsoft NDA Confidential
Pin Apps to start when installed
Based on AppIDs
AppIDs can be found via Powershell
get-startapps
Put AppIDs in a GPO
Microsoft NDA Confidential
Not available in Preview

Microsoft NDA Confidential
Cannot be removed, you can disable though

Microsoft NDA Confidential
Traditional Desktop Apps

Windows Modern Apps

Setup.exe installers
Windows Installer (MSI)

New packaging mechanism

OneClick (.NET)

Very simple installation
mechanism

App-V, Click-to-Run

Always installs quietly

Can be installed silently
(usually)
Typically requires admin
rights, usually installs per
machine
Still used in Windows 8
(unchanged)
Microsoft NDA Confidential

Does not require admin rights,
always installs per user (if form
the store)
New in Windows 8, essentially
unchanged in Windows 8.1
Installation

Provisioning

Install via an “Enterprise App Store” using:

Provision using the Microsoft Deployment
Toolkit 2012 or DISM

Microsoft NDA Confidential
Make sure your reference Image has no Apps from
the store
Apps need to be provisioned in your image
DISM /Online /Add-ProvisionedAppxPackage /PackagePath:C:App1.appx /SkipLicense
Add-AppxProvisionedPackage -Online -FolderPath C:Appx

Use ConfigMgr for Installation on demand
Microsoft NDA Confidential
Windows Store Apps cannot be installed via a TS
No native support for provisioning apps during a TS
Deep Link Support but a Microsoft ID is required
You need ConfigMgr 2012 R2 for FULL Windows
8.1 support (or-and MDT 2013)
http://blogs.technet.com/b/configmgrteam/archive/2013/09/16/support-questions-about-win-8.1-and-winsvr-2012-r2-forconfigmgr-and-endpoint-protection.aspx
Microsoft NDA Confidential
It’s all about the performance of the OS
Suspend <> Terminate Apps
Something changed when trying to close an app…

Microsoft NDA Confidential
Hardware requirements are unchanged
Desktop AppCompat is excellent
Windows Store Apps are compatible
Internet Explorer 11 compatibility (support back to IE6)
Microsoft NDA Confidential
The goal is to migrate
very fast from Win8 to
Win8.1
Consumers initiate
the update through
the Windows Store

Microsoft NDA Confidential

Enterprises
deploy the
update
themselves
using a software
distribution
tool, e.g.
System Center
Microsoft NDA Confidential
Refresh:
Capture
data and
settings

Remove
existing
OS

USMT

Install
new OS
image

Install
apps

DISM

USMT

Deployment Tools (MDT, ConfigMgr)

Update:
Capture
data
settings,
and apps

Remove
existing
OS

Install
new OS
image

Windows Setup
Microsoft NDA Confidential

Restore
data and
settings

Restore
data,
settings,
and apps
Microsoft NDA Confidential
Windows AIK
•
•
•
•
•

ADK 8.1

Windows PE 3.x
USMT 4.0
Windows System Image Manager
DISM
ImageX

•
•
•
•
•
•
•

Windows PE 5.0
USMT “6.3”
Windows System Image Manager
DISM
ImageX*
Application Compatibility Toolkit
Volume Activation Management
Tool
• Windows Performance Toolkit
• Windows Assessment Toolkit

Microsoft NDA Confidential
You might need different versions
Windows XP

Windows Vista

Windows 7

Windows 8

Windows 8.1

Windows XP

USMT 3

USMT 4

USMT 4, 5

USMT 5

Not supported

Windows Vista

Not supported

USMT 4

USMT 4, 5

USMT 5

Not supported

Windows 7

Not supported

Not supported

USMT 4, 5, “6.3”

USMT 5, “6.3”

USMT “6.3”

Windows 8

Not supported

Not supported

Not supported

USMT 5, “6.3”

USMT “6.3”

Windows 8.1

Not supported

Not supported

Not supported

Not supported

USMT “6.3”

http://blogs.technet.com/b/configmgrteam/archive/2013/09/12/how-to-migrate-user-data-from-win-xpto-win-8-1-with-system-center-2012-r2-configmgr.aspx

Support for Office 2013 (hotfix added to USMT 5.0)
Microsoft NDA Confidential
Windows 7

Windows 8

Windows 8.1

• Image size:
• 1.97GB image (WIM),
7.87GB expanded
• Installation time (new):
• 15 minutes
• Upgrade time (from
Vista):
• 30 minutes

• Image size:
• 1.96GB image (WIM),
7.76GB expanded
• Installation time (new):
• 10 minutes
• Upgrade time (from
Windows 7):
• 20 minutes

• Image size:
• 2.13GB image (WIM),
7.65GB expanded
• Installation time (new):
• ~10 minutes
• Upgrade time (from
Windows 8):
• ~20 minutes

Microsoft NDA Confidential
4 Goals
Struggle to enter credentials on touch devices
Built-in Windows Experience
Introduce new “touch” fingerprint sensors
Move from traditional to modern

Microsoft NDA Confidential
Microsoft NDA Confidential
Microsoft NDA Confidential
Users can enroll devices that configure the device
for management with Windows Intune; the user
can then use the Company Portal for easy access
to corporate applications
Data from Windows Intune is in sync
with Configuration Manager, which
provides unified management across
both on-premises and in the cloud

Users can register BYO devices for
single sign-on and access to
corporate data with Workplace Join.
As part of this, a certificate is
installed on the device
IT can publish access to corporate resources with the Web
Application Proxy based on device awareness and the user’s
identity.; multi-factor authentication can be used through
Windows Azure Active Authentication (formerly PhoneFactor)

Microsoft NDA Confidential

As part of the registration process, a new
device object is created in Active
Directory, establishing a link between the
user and their device
Authentication
Kerberos (Windows Auth)
Digest (Windows Auth)

Device management policy
File encryption / selective wipe
Require password / device lock

ADFS (OAuth)

Limit access to registered devices
(ADFS)

https://workfolders.contoso.com
Data management
Quotas
File screens
Reporting
Classification
RMS protection
Microsoft NDA Confidential
Microsoft NDA Confidential
Windows 8.1 Client Hyper-v
Support of UEFI and Secure Boot (Gen 2)
Also in WS12R2

Windows To Go
Store is not longer disabled by default

NFC Support
NFC tagging

Miracast Wireless Display
Pair with a Miracast-enabled display and project wire free
Microsoft NDA Confidential
http://technet.microsoft.com/en-us/windows/dn140266
Release Notes: http://www.microsoft.com/en-us/download/confirmation.aspx?id=40244
Microsoft NDA Confidential
Windows 8.1 a closer look
Windows 8.1 a closer look

More Related Content

What's hot

18 windows phone 8.1 for the enterprise developer
18   windows phone 8.1 for the enterprise developer18   windows phone 8.1 for the enterprise developer
18 windows phone 8.1 for the enterprise developerWindowsPhoneRocks
 
22 universal apps for windows
22   universal apps for windows22   universal apps for windows
22 universal apps for windowsWindowsPhoneRocks
 
Develop hololens
Develop hololensDevelop hololens
Develop hololensJames Quick
 
Windows 10 KKK
Windows 10 KKKWindows 10 KKK
Windows 10 KKKPrimend
 
Windows 7 For Developers
Windows 7 For DevelopersWindows 7 For Developers
Windows 7 For DevelopersDavid Nudelman
 
Dev-In-Town: Windows 7 by Jabez Gan
Dev-In-Town: Windows 7 by Jabez GanDev-In-Town: Windows 7 by Jabez Gan
Dev-In-Town: Windows 7 by Jabez GanQuek Lilian
 
Windows Phone Application Platform
Windows Phone Application PlatformWindows Phone Application Platform
Windows Phone Application PlatformDave Bost
 
Windows 8 Introduction
Windows 8 IntroductionWindows 8 Introduction
Windows 8 IntroductionAjesh Issac
 
21 app packaging, monetization and publication
21   app packaging, monetization and publication21   app packaging, monetization and publication
21 app packaging, monetization and publicationWindowsPhoneRocks
 
Windows Mobile 7 Development
Windows Mobile 7 DevelopmentWindows Mobile 7 Development
Windows Mobile 7 Developmentpranavaa
 
Windows 10 & Raspberry Pi 2
Windows 10 & Raspberry Pi 2Windows 10 & Raspberry Pi 2
Windows 10 & Raspberry Pi 2ByteMinded
 
Universal windows platform - Application development done right
Universal windows platform - Application development done rightUniversal windows platform - Application development done right
Universal windows platform - Application development done rightChristos Matskas
 
COMPARISON OF WINDOWS 7 AND WINDOWS 10
COMPARISON OF WINDOWS 7 AND WINDOWS 10COMPARISON OF WINDOWS 7 AND WINDOWS 10
COMPARISON OF WINDOWS 7 AND WINDOWS 10JadeMapola
 
Iasi 15 noiembrie 2009 Introduction to Windows Mobile programming
Iasi  15 noiembrie 2009   Introduction to Windows Mobile programmingIasi  15 noiembrie 2009   Introduction to Windows Mobile programming
Iasi 15 noiembrie 2009 Introduction to Windows Mobile programmingCatalin Gheorghiu
 
Game Republic - Yorkshire Building Awesome games for Windows
Game Republic - Yorkshire Building Awesome games for WindowsGame Republic - Yorkshire Building Awesome games for Windows
Game Republic - Yorkshire Building Awesome games for WindowsLee Stott
 

What's hot (20)

windows8 vs windows10
windows8 vs windows10windows8 vs windows10
windows8 vs windows10
 
18 windows phone 8.1 for the enterprise developer
18   windows phone 8.1 for the enterprise developer18   windows phone 8.1 for the enterprise developer
18 windows phone 8.1 for the enterprise developer
 
22 universal apps for windows
22   universal apps for windows22   universal apps for windows
22 universal apps for windows
 
Develop hololens
Develop hololensDevelop hololens
Develop hololens
 
Windows 10 KKK
Windows 10 KKKWindows 10 KKK
Windows 10 KKK
 
Windows 8
Windows  8Windows  8
Windows 8
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
Windows 7 For Developers
Windows 7 For DevelopersWindows 7 For Developers
Windows 7 For Developers
 
Dev-In-Town: Windows 7 by Jabez Gan
Dev-In-Town: Windows 7 by Jabez GanDev-In-Town: Windows 7 by Jabez Gan
Dev-In-Town: Windows 7 by Jabez Gan
 
Windows Phone Application Platform
Windows Phone Application PlatformWindows Phone Application Platform
Windows Phone Application Platform
 
Windows 8 Introduction
Windows 8 IntroductionWindows 8 Introduction
Windows 8 Introduction
 
21 app packaging, monetization and publication
21   app packaging, monetization and publication21   app packaging, monetization and publication
21 app packaging, monetization and publication
 
Windows Mobile 7 Development
Windows Mobile 7 DevelopmentWindows Mobile 7 Development
Windows Mobile 7 Development
 
Windows 10 & Raspberry Pi 2
Windows 10 & Raspberry Pi 2Windows 10 & Raspberry Pi 2
Windows 10 & Raspberry Pi 2
 
Universal windows platform - Application development done right
Universal windows platform - Application development done rightUniversal windows platform - Application development done right
Universal windows platform - Application development done right
 
COMPARISON OF WINDOWS 7 AND WINDOWS 10
COMPARISON OF WINDOWS 7 AND WINDOWS 10COMPARISON OF WINDOWS 7 AND WINDOWS 10
COMPARISON OF WINDOWS 7 AND WINDOWS 10
 
Iasi 15 noiembrie 2009 Introduction to Windows Mobile programming
Iasi  15 noiembrie 2009   Introduction to Windows Mobile programmingIasi  15 noiembrie 2009   Introduction to Windows Mobile programming
Iasi 15 noiembrie 2009 Introduction to Windows Mobile programming
 
Game Republic - Yorkshire Building Awesome games for Windows
Game Republic - Yorkshire Building Awesome games for WindowsGame Republic - Yorkshire Building Awesome games for Windows
Game Republic - Yorkshire Building Awesome games for Windows
 
Windows 8.1 Licensing Guide
Windows 8.1 Licensing GuideWindows 8.1 Licensing Guide
Windows 8.1 Licensing Guide
 
SCCM2012-UserGuide
SCCM2012-UserGuideSCCM2012-UserGuide
SCCM2012-UserGuide
 

Viewers also liked

nRF51のGPIOTEについて
nRF51のGPIOTEについてnRF51のGPIOTEについて
nRF51のGPIOTEについてHirokuma Ueno
 
Price control & s d market project
Price control & s d market projectPrice control & s d market project
Price control & s d market projectTravis Klein
 
White Paper: Hadoop on EMC Isilon Scale-out NAS
White Paper: Hadoop on EMC Isilon Scale-out NAS   White Paper: Hadoop on EMC Isilon Scale-out NAS
White Paper: Hadoop on EMC Isilon Scale-out NAS EMC
 
Catching the moving targets
Catching the moving targetsCatching the moving targets
Catching the moving targetsResearch Now
 
Day 3 wars and revolts
Day 3 wars and revoltsDay 3 wars and revolts
Day 3 wars and revoltsTravis Klein
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesEMC
 
White Paper: DB2 and FAST VP Testing and Best Practices
White Paper: DB2 and FAST VP Testing and Best Practices   White Paper: DB2 and FAST VP Testing and Best Practices
White Paper: DB2 and FAST VP Testing and Best Practices EMC
 
Presentation1
Presentation1Presentation1
Presentation1梅 梅
 
TorreReforma-Etructurales
TorreReforma-EtructuralesTorreReforma-Etructurales
TorreReforma-EtructuralesCESEIC
 
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...EMC
 
Normes de seguretat
Normes de seguretatNormes de seguretat
Normes de seguretatmgonellgomez
 
福音的開始、中斷與振興 景高
福音的開始、中斷與振興 景高福音的開始、中斷與振興 景高
福音的開始、中斷與振興 景高zenixls2
 

Viewers also liked (20)

Client Awards 2015
Client Awards 2015Client Awards 2015
Client Awards 2015
 
Day 7
Day 7Day 7
Day 7
 
Fri roman culture
Fri roman cultureFri roman culture
Fri roman culture
 
nRF51のGPIOTEについて
nRF51のGPIOTEについてnRF51のGPIOTEについて
nRF51のGPIOTEについて
 
Das
DasDas
Das
 
2015 day 9
2015 day 92015 day 9
2015 day 9
 
Price control & s d market project
Price control & s d market projectPrice control & s d market project
Price control & s d market project
 
White Paper: Hadoop on EMC Isilon Scale-out NAS
White Paper: Hadoop on EMC Isilon Scale-out NAS   White Paper: Hadoop on EMC Isilon Scale-out NAS
White Paper: Hadoop on EMC Isilon Scale-out NAS
 
20121025cafesemi
20121025cafesemi20121025cafesemi
20121025cafesemi
 
Catching the moving targets
Catching the moving targetsCatching the moving targets
Catching the moving targets
 
Day 3 wars and revolts
Day 3 wars and revoltsDay 3 wars and revolts
Day 3 wars and revolts
 
SBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing ProcessesSBIC Report : Transforming Information Security: Future-Proofing Processes
SBIC Report : Transforming Information Security: Future-Proofing Processes
 
White Paper: DB2 and FAST VP Testing and Best Practices
White Paper: DB2 and FAST VP Testing and Best Practices   White Paper: DB2 and FAST VP Testing and Best Practices
White Paper: DB2 and FAST VP Testing and Best Practices
 
Presentation1
Presentation1Presentation1
Presentation1
 
TorreReforma-Etructurales
TorreReforma-EtructuralesTorreReforma-Etructurales
TorreReforma-Etructurales
 
Круглый стол по мотивации
Круглый стол по мотивацииКруглый стол по мотивации
Круглый стол по мотивации
 
02 fc vs vc costs
02 fc vs vc costs02 fc vs vc costs
02 fc vs vc costs
 
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Backup Solution G...
 
Normes de seguretat
Normes de seguretatNormes de seguretat
Normes de seguretat
 
福音的開始、中斷與振興 景高
福音的開始、中斷與振興 景高福音的開始、中斷與振興 景高
福音的開始、中斷與振興 景高
 

Similar to Windows 8.1 a closer look

3 App Compat Win7
3 App Compat Win73 App Compat Win7
3 App Compat Win7llangit
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
 
5 modern desktop - windows autopilot
5   modern desktop - windows autopilot5   modern desktop - windows autopilot
5 modern desktop - windows autopilotAndrew Bettany
 
Windows Autopilot (1).pdf
Windows Autopilot (1).pdfWindows Autopilot (1).pdf
Windows Autopilot (1).pdfabhipotdar
 
Mdm with config mgr nico
Mdm with config mgr nicoMdm with config mgr nico
Mdm with config mgr nicoKenny Buntinx
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT ProfessionalsRishu Mehra
 
Sogeti Experience Windows 7
Sogeti Experience Windows 7Sogeti Experience Windows 7
Sogeti Experience Windows 7mphacker
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Nordic Infrastructure Conference
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Ronni Pedersen
 
Llunitebe2018 implement modern management as like brewing a beer
Llunitebe2018 implement modern management as like brewing a beerLlunitebe2018 implement modern management as like brewing a beer
Llunitebe2018 implement modern management as like brewing a beerKenny Buntinx
 
Troubleshooting the Windows Installer
Troubleshooting the Windows Installer Troubleshooting the Windows Installer
Troubleshooting the Windows Installer AppDetails
 
Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibilitymicham
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campOlav Tvedt
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized DesktopIT Masterclasses
 
Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...
Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...
Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...ITProceed
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 

Similar to Windows 8.1 a closer look (20)

3 App Compat Win7
3 App Compat Win73 App Compat Win7
3 App Compat Win7
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
5 modern desktop - windows autopilot
5   modern desktop - windows autopilot5   modern desktop - windows autopilot
5 modern desktop - windows autopilot
 
Windows Autopilot (1).pdf
Windows Autopilot (1).pdfWindows Autopilot (1).pdf
Windows Autopilot (1).pdf
 
Windows 7
Windows 7Windows 7
Windows 7
 
Mdm with config mgr nico
Mdm with config mgr nicoMdm with config mgr nico
Mdm with config mgr nico
 
Mdm with config mgr nico
Mdm with config mgr nicoMdm with config mgr nico
Mdm with config mgr nico
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 
Sogeti Experience Windows 7
Sogeti Experience Windows 7Sogeti Experience Windows 7
Sogeti Experience Windows 7
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 
Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)Getting started with the Enterprise Mobility Suite (EMS)
Getting started with the Enterprise Mobility Suite (EMS)
 
Llunitebe2018 implement modern management as like brewing a beer
Llunitebe2018 implement modern management as like brewing a beerLlunitebe2018 implement modern management as like brewing a beer
Llunitebe2018 implement modern management as like brewing a beer
 
Troubleshooting the Windows Installer
Troubleshooting the Windows Installer Troubleshooting the Windows Installer
Troubleshooting the Windows Installer
 
Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibility
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...
Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...
Sysctr Track: Managing your hybrid Mobile cloud Workforce Demystified with Sy...
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 

More from Microsoft TechNet - Belgium and Luxembourg

More from Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Windows 8.1 a closer look

  • 1.
  • 3.
  • 4. Lock Screen changes Start Screen enhancements Search New Store Layout And yes,… the Start Button Microsoft NDA Confidential
  • 6. Boot to Desktop Show Desktop Background on Start Replace CMD with Powershell Presentation of Apps User Configuration Administrative Templates Windows Components Edge UI Microsoft NDA Confidential
  • 7. CopyProfile still exists <settings pass="specialize"> <component name="Microsoft-Windows-Shell-Setup" processorArchitecture="x86" publicKeyToken="31bf3856ad364e35" language="neutral" versionScope="nonSxS" xmlns:wcm="http://schemas.microsoft.com/WMIConfig/2002/State" xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance”> <CopyProfile>true</CopyProfile> </component> </settings> %windir%system32SysprepSysprep.exe /oobe /generalize /shutdown /unattend:f:unattend.xml Provision Startmenu layout Export-startlayout –path pathfile.xml –as xml (or “-as bin”) Microsoft NDA Confidential
  • 8. Pin Apps to start when installed Based on AppIDs AppIDs can be found via Powershell get-startapps Put AppIDs in a GPO Microsoft NDA Confidential
  • 9. Not available in Preview Microsoft NDA Confidential
  • 10. Cannot be removed, you can disable though Microsoft NDA Confidential
  • 11.
  • 12. Traditional Desktop Apps Windows Modern Apps Setup.exe installers Windows Installer (MSI) New packaging mechanism OneClick (.NET) Very simple installation mechanism App-V, Click-to-Run Always installs quietly Can be installed silently (usually) Typically requires admin rights, usually installs per machine Still used in Windows 8 (unchanged) Microsoft NDA Confidential Does not require admin rights, always installs per user (if form the store) New in Windows 8, essentially unchanged in Windows 8.1
  • 13. Installation Provisioning Install via an “Enterprise App Store” using: Provision using the Microsoft Deployment Toolkit 2012 or DISM Microsoft NDA Confidential
  • 14. Make sure your reference Image has no Apps from the store Apps need to be provisioned in your image DISM /Online /Add-ProvisionedAppxPackage /PackagePath:C:App1.appx /SkipLicense Add-AppxProvisionedPackage -Online -FolderPath C:Appx Use ConfigMgr for Installation on demand Microsoft NDA Confidential
  • 15. Windows Store Apps cannot be installed via a TS No native support for provisioning apps during a TS Deep Link Support but a Microsoft ID is required You need ConfigMgr 2012 R2 for FULL Windows 8.1 support (or-and MDT 2013) http://blogs.technet.com/b/configmgrteam/archive/2013/09/16/support-questions-about-win-8.1-and-winsvr-2012-r2-forconfigmgr-and-endpoint-protection.aspx Microsoft NDA Confidential
  • 16. It’s all about the performance of the OS Suspend <> Terminate Apps Something changed when trying to close an app… Microsoft NDA Confidential
  • 17.
  • 18. Hardware requirements are unchanged Desktop AppCompat is excellent Windows Store Apps are compatible Internet Explorer 11 compatibility (support back to IE6) Microsoft NDA Confidential
  • 19. The goal is to migrate very fast from Win8 to Win8.1 Consumers initiate the update through the Windows Store Microsoft NDA Confidential Enterprises deploy the update themselves using a software distribution tool, e.g. System Center
  • 21. Refresh: Capture data and settings Remove existing OS USMT Install new OS image Install apps DISM USMT Deployment Tools (MDT, ConfigMgr) Update: Capture data settings, and apps Remove existing OS Install new OS image Windows Setup Microsoft NDA Confidential Restore data and settings Restore data, settings, and apps
  • 23. Windows AIK • • • • • ADK 8.1 Windows PE 3.x USMT 4.0 Windows System Image Manager DISM ImageX • • • • • • • Windows PE 5.0 USMT “6.3” Windows System Image Manager DISM ImageX* Application Compatibility Toolkit Volume Activation Management Tool • Windows Performance Toolkit • Windows Assessment Toolkit Microsoft NDA Confidential
  • 24. You might need different versions Windows XP Windows Vista Windows 7 Windows 8 Windows 8.1 Windows XP USMT 3 USMT 4 USMT 4, 5 USMT 5 Not supported Windows Vista Not supported USMT 4 USMT 4, 5 USMT 5 Not supported Windows 7 Not supported Not supported USMT 4, 5, “6.3” USMT 5, “6.3” USMT “6.3” Windows 8 Not supported Not supported Not supported USMT 5, “6.3” USMT “6.3” Windows 8.1 Not supported Not supported Not supported Not supported USMT “6.3” http://blogs.technet.com/b/configmgrteam/archive/2013/09/12/how-to-migrate-user-data-from-win-xpto-win-8-1-with-system-center-2012-r2-configmgr.aspx Support for Office 2013 (hotfix added to USMT 5.0) Microsoft NDA Confidential
  • 25. Windows 7 Windows 8 Windows 8.1 • Image size: • 1.97GB image (WIM), 7.87GB expanded • Installation time (new): • 15 minutes • Upgrade time (from Vista): • 30 minutes • Image size: • 1.96GB image (WIM), 7.76GB expanded • Installation time (new): • 10 minutes • Upgrade time (from Windows 7): • 20 minutes • Image size: • 2.13GB image (WIM), 7.65GB expanded • Installation time (new): • ~10 minutes • Upgrade time (from Windows 8): • ~20 minutes Microsoft NDA Confidential
  • 26.
  • 27. 4 Goals Struggle to enter credentials on touch devices Built-in Windows Experience Introduce new “touch” fingerprint sensors Move from traditional to modern Microsoft NDA Confidential
  • 30. Users can enroll devices that configure the device for management with Windows Intune; the user can then use the Company Portal for easy access to corporate applications Data from Windows Intune is in sync with Configuration Manager, which provides unified management across both on-premises and in the cloud Users can register BYO devices for single sign-on and access to corporate data with Workplace Join. As part of this, a certificate is installed on the device IT can publish access to corporate resources with the Web Application Proxy based on device awareness and the user’s identity.; multi-factor authentication can be used through Windows Azure Active Authentication (formerly PhoneFactor) Microsoft NDA Confidential As part of the registration process, a new device object is created in Active Directory, establishing a link between the user and their device
  • 31. Authentication Kerberos (Windows Auth) Digest (Windows Auth) Device management policy File encryption / selective wipe Require password / device lock ADFS (OAuth) Limit access to registered devices (ADFS) https://workfolders.contoso.com Data management Quotas File screens Reporting Classification RMS protection Microsoft NDA Confidential
  • 33. Windows 8.1 Client Hyper-v Support of UEFI and Secure Boot (Gen 2) Also in WS12R2 Windows To Go Store is not longer disabled by default NFC Support NFC tagging Miracast Wireless Display Pair with a Miracast-enabled display and project wire free Microsoft NDA Confidential