PLEASE READ (hidden slide) Please use PowerPoint 2003. If you do not use PowerPoint 2003, it is your...
-
date post
19-Dec-2015 -
Category
Documents
-
view
216 -
download
0
Transcript of PLEASE READ (hidden slide) Please use PowerPoint 2003. If you do not use PowerPoint 2003, it is your...
How to Take the How to Take the JourneyJourneyHow to Take the How to Take the JourneyJourney
Tim RoweTim RoweInfrastructure Optimization LeadInfrastructure Optimization LeadMicrosoft CorporationMicrosoft Corporation
The Infrastructure Optimization JourneyThe Infrastructure Optimization Journey
Identify where you are in the Identify where you are in the Infrastructure Optimization ModelInfrastructure Optimization Model
Identify highest impact options Identify highest impact options
Identify biggest challengesIdentify biggest challenges
Build a plan that maps to your business Build a plan that maps to your business and IT prioritiesand IT priorities
Work with your Microsoft Sales Rep and Work with your Microsoft Sales Rep and /or Partner to help you/or Partner to help you
“Microsoft can help plan, build and execute the journey to Infrastructure Optimization”
Snapshot of Infrastructure What to focus on…
Identity and Access ManagementIdentity and Access Management
Desktop EngineeringDesktop Engineering
Security, Networking and MonitoringSecurity, Networking and Monitoring
Disaster RecoveryDisaster Recovery
SUS, WU & SMS for SUS, WU & SMS for Patch ManagementPatch ManagementDefined Set of ImagesDefined Set of Images
Manual or no Patch Manual or no Patch ManagementManagement
No Image ManagementNo Image Management
No Active DirectoryNo Active Directory Active Directory for Active Directory for AuthenticationAuthentication
AV on DesktopAV on DesktopAutomated basic Automated basic networkingnetworking
Limited SecurityLimited SecurityLimited DHCP / WINSLimited DHCP / WINSNo MonitoringNo Monitoring
Disaster Recovery PlanDisaster Recovery PlanNo plan for server No plan for server recoveryrecovery
Snapshot of Infrastructure What to focus on…
Identity and Access ManagementIdentity and Access Management
Desktop EngineeringDesktop Engineering
Security, Networking and MonitoringSecurity, Networking and Monitoring
Disaster RecoveryDisaster Recovery
XP / W2K desktop OSXP / W2K desktop OSDesktop Image MgmtDesktop Image Mgmt
Automated Patch Automated Patch ManagementManagement
Defined Set of ImagesDefined Set of Images
Active Directory for Active Directory for Authentication onlyAuthentication only
Group PolicyGroup PolicyDirectory Enabled AppsDirectory Enabled Apps
Remote Access Remote Access IPSec Server IsolationIPSec Server IsolationRich MonitoringRich Monitoring
AntiVirus on DesktopsAntiVirus on DesktopsCentralized FirewallCentralized FirewallInternal DNS / DHCPInternal DNS / DHCP
Backup/Restore on Backup/Restore on Critical ServersCritical Servers
Disaster Recovery Disaster Recovery PlanPlan
Snapshot of Infrastructure What to focus on…
Identity and Access ManagementIdentity and Access Management
Desktop EngineeringDesktop Engineering
Security, Networking and MonitoringSecurity, Networking and Monitoring
Disaster RecoveryDisaster Recovery
Automated App Automated App Compatibility TestingCompatibility Testing
W2K / XP primary OSW2K / XP primary OSAutomated distributionAutomated distributionManual app compatManual app compat
Directory tools for central Directory tools for central admin of configs and admin of configs and securitysecurity
Metadirectory ServicesMetadirectory Services
Desktop FirewallDesktop FirewallSecure WirelessSecure WirelessSingle Server Mgmt Single Server Mgmt ToolsetToolsetDesktop MonitoringDesktop Monitoring
Remote Access / VPNRemote Access / VPNIPSec Server IsolationIPSec Server IsolationMonitoring of ServersMonitoring of Servers
Backup/Restore on all Backup/Restore on all Servers & Desktop w/ Servers & Desktop w/ SLASLA
Backup/Restore on all Backup/Restore on all Servers with SLAServers with SLA
Microsoft IO Framework Microsoft IO Framework Example – Determining Optimization Roadmap: Example – Determining Optimization Roadmap: http://microsoft.com/io http://microsoft.com/io
Security Security and and NetworkinNetworkingg
Security Security and and NetworkinNetworkingg
Identity & Identity & Access Access MgmtMgmt
Identity & Identity & Access Access MgmtMgmt
Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt
Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt
Data Data Protection Protection and and RecoveryRecovery
Data Data Protection Protection and and RecoveryRecovery
IT and IT and Security Security ProcessProcess
IT and IT and Security Security ProcessProcess
Detailed Classifying Questions (Binary)Detailed Classifying Questions (Binary)In order to be “Standardized”, a customer must answer yes to the following questions (otherwise, it is a “Basic” customer):
1. Do you use Active Directory for authenticating 80% or more of your users?2. Do you have an automated patch distribution covering 80% or more of your desktops? 3. Do you have AV software (with automated signature updating) running on 80% or more your desktops? 4. Do you have a backup and restore solution for 80% or more of your business critical servers? 5. Do you have a centralized firewall (not per desktop) for your enterprise protecting 80% or more of your systems (e.g. ISA, Checkpoint,
Nokia) ?6. Do you use have internal servers for basic network services (DNS, DHCP)?7. Do you have a defined set of standard basic images for 80% or more of your desktops and laptops?8. If customer is using Exchange Server as their messaging Infrastructure: (If they don’t , please skip the question(s) below in yellow)
a) Do you use the same directory infrastructure for access and messaging?b) Do you block SPAM at multiple server levels and viruses with multiple scanning engines?
In order to be “Rationalized”, a customer must answer yes to the following questions (otherwise, it is a “Standardized” customer):
1. Do you have a directory based tool to centrally administrate configurations and security on 80% or more of your desktops (e.g. Group Policy)?
2. Do you have 80% or more of your desktops are running Windows XP or 2000 as your primary OS? Do you have 80% or more of your XP desktops running SP2?
3. Do you have an automated tracking of HW and SW assets of 80% or more of your desktops? 4. Do you use manual compatibility/app certification testing to verify/deploy 80% or more of your SW distributions to your desktops?5. Do you have a manual reference image system for the images of 80% or more of your desktops and laptops?6. Do you provide employees remote access to internal resources and LOB applications beyond email (e.g. VPN and/or Terminal
Services)?7. Do you have monitoring for 80% or more of your servers for ensuring consistent and reliable user experiences (e.g. ensuring that
email is always available)?8. Do you use secured and guaranteed way to verify communication between servers to secure network communications between critical
servers such as domain controllers and email servers? (Examples of a secured communication are IPsec, Certificates)9. Do you have backup and restore and defined recovery times for 80% of all servers?10. If customer is using Exchange Server as their messaging Infrastructure: (If they don’t , please skip the question(s) below in yellow)
a) Do you use an application-layer firewall for secure web-based e-mail access and pre-authentication of users before they reach the mailbox server?
In order to be “Dynamic”, a customer must answer yes to the following questions (otherwise, it is a “Rationalized” customer):
1. Do you have a central tool to automate user provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of your heterogeneous systems?
2. Do you have an automated patch management solution for 80% or more of your servers?3. Do you use automated compatibility/app certification testing to verify/deploy 80% or more of your SW distributions to your desktops?4. Do you have monitoring for 80% or more of your desktops for ensuring consistent and reliable user experiences?5. Do you have firewall software (e.g. BlackICE, Windows Firewall, Zone Alarm) running on 80% of your servers and desktop?6. Have you deployed a secure wireless network using Active Directory and IAS/RADIUS for authentication and authorization?7. Do you have backup and restore and defined recovery times for 80% of servers and desktops?8. If customer is using Exchange Server as their messaging Infrastructure: (If they don’t , please skip the question(s) below in yellow)
a) Can you secure mobile devices with remote reset and remote wipe after too many log-on attempts?
Microsoft IO Framework Microsoft IO Framework Example – Plot of Current Optimization State Example – Plot of Current Optimization State
Security Security and and NetworkinNetworkingg
Security Security and and NetworkinNetworkingg
Identity & Identity & Access Access MgmtMgmt
Identity & Identity & Access Access MgmtMgmt
Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt
Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt
Data Data Protection Protection and and RecoveryRecovery
Data Data Protection Protection and and RecoveryRecovery
IT and IT and Security Security ProcessProcess
IT and IT and Security Security ProcessProcess
Identify Where You Want To BeIdentify Where You Want To Be
Understand the model: Understand the model: http://microsoft.com/IO http://microsoft.com/IO
Ask your MS Account Team for an Ask your MS Account Team for an Infrastructure Optimization Strategy Infrastructure Optimization Strategy BriefingBriefing
Have your Infrastructure Staff Attend a Have your Infrastructure Staff Attend a Deployment WorkshopDeployment Workshop
Review your Profile Results and Identify:Review your Profile Results and Identify:Highest impact options Highest impact options
Biggest challengesBiggest challenges
Deployment WorkshopsDeployment Workshops
Objective: Learn what an optimized Objective: Learn what an optimized infrastructure can doinfrastructure can do
Toolset: Microsoft Solution Accelerator for Toolset: Microsoft Solution Accelerator for Business Desktop Deployment (BDD)Business Desktop Deployment (BDD)
Duration: 3 DaysDuration: 3 Days
Format: Hands-on LabFormat: Hands-on Lab
Audience: Architects and IT ProfessionalsAudience: Architects and IT Professionals
Deployment WorkshopsDeployment WorkshopsTopics Covered Include:Topics Covered Include:
Application Compatibility (Issues and Application Compatibility (Issues and Testing)Testing)
ImagingImaging
Infrastructure ManagementInfrastructure Management
Deployment ProcessDeployment Process
Windows XP (with Service Pack 2) & Office Windows XP (with Service Pack 2) & Office 2003 Deployment2003 Deployment
User State MigrationUser State Migration
Security & Patch ManagementSecurity & Patch Management
Provisioning ServicesProvisioning Services
Deployment WorkshopsDeployment WorkshopsContact your MS Account Manager to Contact your MS Account Manager to RegisterRegister
MonthMonth DateDate CityCitySeptember 2006September 2006 1212thth – 14 – 14thth BrisbaneBrisbane
September 2006September 2006 1919thth – 21 – 21stst AdelaideAdelaide
September 2006September 2006 26th – 2826th – 28thth PerthPerth
September 2006September 2006 1919thth – 21 – 21stst Melbourne Melbourne
September 2006September 2006 2626thth – 28 – 28thth Melbourne Melbourne (REPEAT)(REPEAT)
October 2006October 2006 33rdrd – 5 – 5thth SydneySydney
October 2006October 2006 1010thth – 12 – 12thth Sydney (REPEAT x 2)Sydney (REPEAT x 2)
October 2006October 2006 1010thth – 12 – 12thth Sydney (REPEAT x 3)Sydney (REPEAT x 3)
Identify Where You Want To BeIdentify Where You Want To Be
Review your profile results (from online Review your profile results (from online profiler)profiler)You can get started today and move your IT systems toward a more cost-effective standardized infrastructure.
Recommendation Enabling Technology Microsoft Technologies
•Move to a more stable infrastructure environment
•Develop standards, policies, and controls with an enforcement strategy
•Layer security at the perimeter, server, desktop, and application levels
•Automate manual and time-consuming tasks
•Adopt best practices, make IT a strategic asset rather than a burden
•Reduce hardware and software standards complexity
•Antivirus on desktops Centralized firewall
Internal DNS and DHCP
Identity management for
authentication and authorization only
Automated updates management (operating system, software, server management)
Defined set of standard basic images
Backup/restore on all servers
Anti-virus on servers
•Windows Desktop Deployment
•Active Directory-based applications with Group Policy-based management Systems Management Server for
patch management and desktop deployment Microsoft Operations Manager
for monitoring servers
Backup/restore solution
Remote access via VPN and Terminal Services
IPSec server isolation
Microsoft IO framework Microsoft IO framework Example – Plot of Future Optimization State Example – Plot of Future Optimization State
Security Security and and NetworkinNetworkingg
Security Security and and NetworkinNetworkingg
Identity & Identity & Access Access MgmtMgmt
Identity & Identity & Access Access MgmtMgmt
Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt
Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt
Data Data Protection Protection and and RecoveryRecovery
Data Data Protection Protection and and RecoveryRecovery
IT and IT and Security Security ProcessProcess
IT and IT and Security Security ProcessProcess
Make a PlanMake a Plan
Engage a Qualified PartnerEngage a Qualified Partner
Develop a detailed profile and plan with an Develop a detailed profile and plan with an Architectural Design SessionArchitectural Design Session
Software Assurance BenefitSoftware Assurance Benefit
Desktop Deployment Planning Service (DDPS)Desktop Deployment Planning Service (DDPS)
If needed, test components with a Proof-of-If needed, test components with a Proof-of-ConceptConcept
PartnersPartners
Microsoft Consulting ServicesMicrosoft Consulting Services
Part of the DDPS for 10 and 15 day eventsPart of the DDPS for 10 and 15 day events
OverviewOverview: : Designed to provide mutual benefits for partners, Designed to provide mutual benefits for partners, customers, and Microsoftcustomers, and MicrosoftSoftware Assurance Benefit made available to Microsoft Software Assurance Benefit made available to Microsoft customers worldwide in March 2006customers worldwide in March 2006A customized deployment plan delivered by DDPS certified A customized deployment plan delivered by DDPS certified and registered Microsoft partners as a packaged service to and registered Microsoft partners as a packaged service to qualified customers based on Software Assurance level qualified customers based on Software Assurance level Offered at no cost to the customer - Microsoft pays partners Offered at no cost to the customer - Microsoft pays partners to deliver the deployment plan services via the DDPS to deliver the deployment plan services via the DDPS programprogramHelps move customers toward a more efficient Helps move customers toward a more efficient infrastructureinfrastructure
Desktop Deployment Planning Services Desktop Deployment Planning Services (DDPS)(DDPS)
Value of DDPSValue of DDPS
You will:You will:Benefit from an efficient infrastructure with a Modern DesktopBenefit from an efficient infrastructure with a Modern Desktop
Lower cost infrastructureLower cost infrastructureImproved IT security Improved IT security Increased operational agilityIncreased operational agilityReady for new software (VistaReady for new software (VistaTM, Office 12), Office 12)Getting ready for the New World Of WorkGetting ready for the New World Of Work
Get more value from Software Assurance BenefitsGet more value from Software Assurance BenefitsA critical service for customers delivered A critical service for customers delivered free free (including a desktop deployment (including a desktop deployment plan)plan)Benefit available at four levels: 10-, 5-, 3-, and 1-day engagements (upgradeable Benefit available at four levels: 10-, 5-, 3-, and 1-day engagements (upgradeable to 15 days)to 15 days)
Deploy a Modern Desktop at much lower costDeploy a Modern Desktop at much lower costConsistent and pervasive need-based tools (Business Desktop Deployment Consistent and pervasive need-based tools (Business Desktop Deployment Solution Accelerator (BDD))Solution Accelerator (BDD))Standard and repeatable partner service offeringsStandard and repeatable partner service offerings
Be introduced to a greater breadth of deployment servicesBe introduced to a greater breadth of deployment servicesDeployment services brought to the forefront by MicrosoftDeployment services brought to the forefront by MicrosoftDeployment partner ecosystem with more trained partners worldwideDeployment partner ecosystem with more trained partners worldwideQualified Partner experts equipped and incented to deliver with quality assurance Qualified Partner experts equipped and incented to deliver with quality assurance built into the processbuilt into the process
DDPS will get you thereDDPS will get you there
Desktop Deployment Planning Desktop Deployment Planning Service (DDPS) ActivationService (DDPS) Activation
If you have Software Assurance: If you have Software Assurance: On http://www.microsoft.comOn http://www.microsoft.com
Search for Desktop Deployment Planning ServiceSearch for Desktop Deployment Planning Service
To get Software Assurance:To get Software Assurance:On http://www.microsoft.com On http://www.microsoft.com
Search for How to Get Software AssuranceSearch for How to Get Software Assurance
Select a DDPS participating partner: Select a DDPS participating partner: On Desktop Deployment Planning Service see the linkOn Desktop Deployment Planning Service see the link
Search for a Desktop Deployment Planning Solutions Search for a Desktop Deployment Planning Solutions provider provider
Co-develop a profile and deployment planCo-develop a profile and deployment plan
285 IO PSPs285 IO PSPs
155 Partners in IO Solutions Catalog155 Partners in IO Solutions Catalog265 unique solutions265 unique solutions
"The combination of our security practice and expertise in enabling security solutions with Microsoft's Infrastructure Optimization Model represents a unique dynamic that will continue to strengthen our partnership and enable our customers to maximize investments in Microsoft products and security features. We see this as a clear win-win proposition for everyone.“
Jim Tiller, CSO
International Network Services Inc
“IO has been a positive force in engaging with enterprise customers and a great roadmap to follow inMigrating them to the next infrastructure optimization level with our joint Citrix-Microsoft solutions”
Garry Olah Alliance VP, Citrix Corporate Development "Getronics builds and delivers Infrastructure Optimization (IO) solutions, such as RDX,
that help our clients automate the laborious and time consuming task of desktop & server migration and deployment. This has opened the door to other optimization projects for Getronics and our pipeline continues to grow as a by-product of IO". Brad Gleason Global Service Director, Technology Transformation Services
Avanade has embraced the Microsoft IO framework in our solutions approach and will use it as a basis to help customers address their IT infrastructure to keep their business moving forward."
Larry LeSueur, Vice President, Technology Infrastructure Solutions
6 DDPS Certified Partners6 DDPS Certified Partners
Core Infrastructure CompetencyCore Infrastructure Competency9 Enterprise Partners9 Enterprise Partners
40 Mid-Market Partners40 Mid-Market Partners
Server and Domain IsolationServer and Domain Isolation
Service Management AssessmentService Management Assessment
Software Update ManagementSoftware Update Management
Desired Configuration MonitoringDesired Configuration Monitoring
Service Level ManagementService Level Management
Lotus Notes Messaging Migration AnalysisLotus Notes Messaging Migration Analysis
BizTalk Server 2004/2006 Infrastructure BizTalk Server 2004/2006 Infrastructure Monitoring & Performance TuningMonitoring & Performance Tuning
CoreCoreIOIO
BusinessBusinessProductivityProductivity
IOIO
ApplicationApplicationPlatformPlatform
IOIO
Contact MS Services at: Contact MS Services at: [email protected]@microsoft.com
The Infrastructure Optimization JourneyThe Infrastructure Optimization Journey
Identify where you are in the Identify where you are in the Infrastructure Optimization ModelInfrastructure Optimization Model
Identify highest impact options Identify highest impact options
Identify biggest challengesIdentify biggest challenges
Build a plan that maps to your business Build a plan that maps to your business and IT prioritiesand IT priorities
Work with your Microsoft Sales Rep and Work with your Microsoft Sales Rep and /or Partner to help you/or Partner to help you
“Microsoft can help plan, build and execute the journey to Infrastructure Optimization”
Source: GCR & IDC data analyzed by Microsoft, 2006
IT Labor IT Labor Cost/PCCost/PC
$1320$1320
IT Labor IT Labor Cost/PCCost/PC
$230$230
Comprehensive PC Security$160/PC Savings
Standardization & Standards Compliance$220/PC Savings
Identity Management$210/PC Savings
Others ….
IT Labor IT Labor Cost/PCCost/PC
$580$580
Tell us how you want to start the journeyTell us how you want to start the journey
2
1 Which IOs are critical to you? Which IOs are critical to you?
Who are your preferred Who are your preferred partners?partners?
Where would you like to Where would you like to start?start?
3
© 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Launch a Proof-of-ConceptLaunch a Proof-of-Concept
Use the DDPS findings to determine needsUse the DDPS findings to determine needs
Select PoC: <need a link or list and way to Select PoC: <need a link or list and way to invoke OR have them contact MS/Partner>invoke OR have them contact MS/Partner>
Select partner or MCS: <need to tell how>Select partner or MCS: <need to tell how>
Select project scope for PoC w/partnerSelect project scope for PoC w/partner
Test build the solutionTest build the solution
Software Update ManagementSoftware Update Management
Service Management AssessmentService Management Assessment
Server and Domain Isolation for SecurityServer and Domain Isolation for Security
Enterprise Patch Management & Software Enterprise Patch Management & Software DistributionDistribution
Branch Office Infrastructure SolutionBranch Office Infrastructure Solution
Deploying Windows Rights Management ServicesDeploying Windows Rights Management Services
Server Monitoring using MS MOMServer Monitoring using MS MOM
Deploying Windows Server VirtualizationDeploying Windows Server Virtualization
Identity Provisioning, Workflow and Life-Identity Provisioning, Workflow and Life-Cycle ManagementCycle Management
Lotus Notes Messaging Migration AnalysisLotus Notes Messaging Migration Analysis
Communications & Collaboration Assessment, Communications & Collaboration Assessment, Business Case & Architecture planningBusiness Case & Architecture planning
BizTalk Server 2004/2006 Infrastructure Monitoring BizTalk Server 2004/2006 Infrastructure Monitoring & Performance Tuning& Performance Tuning
CoreCoreIOIO
BusinessBusinessProductivityProductivity
IOIO
ApplicationApplicationPlatformPlatform
IOIO