PLEASE READ (hidden slide) Please use PowerPoint 2003. If you do not use PowerPoint 2003, it is your...

30
  • date post

    19-Dec-2015
  • Category

    Documents

  • view

    216
  • download

    0

Transcript of PLEASE READ (hidden slide) Please use PowerPoint 2003. If you do not use PowerPoint 2003, it is your...

How to Take the How to Take the JourneyJourneyHow to Take the How to Take the JourneyJourney

Tim RoweTim RoweInfrastructure Optimization LeadInfrastructure Optimization LeadMicrosoft CorporationMicrosoft Corporation

How to Take the JourneyHow to Take the Journey

The Infrastructure Optimization JourneyThe Infrastructure Optimization Journey

Identify where you are in the Identify where you are in the Infrastructure Optimization ModelInfrastructure Optimization Model

Identify highest impact options Identify highest impact options

Identify biggest challengesIdentify biggest challenges

Build a plan that maps to your business Build a plan that maps to your business and IT prioritiesand IT priorities

Work with your Microsoft Sales Rep and Work with your Microsoft Sales Rep and /or Partner to help you/or Partner to help you

“Microsoft can help plan, build and execute the journey to Infrastructure Optimization”

Snapshot of Infrastructure What to focus on…

Identity and Access ManagementIdentity and Access Management

Desktop EngineeringDesktop Engineering

Security, Networking and MonitoringSecurity, Networking and Monitoring

Disaster RecoveryDisaster Recovery

SUS, WU & SMS for SUS, WU & SMS for Patch ManagementPatch ManagementDefined Set of ImagesDefined Set of Images

Manual or no Patch Manual or no Patch ManagementManagement

No Image ManagementNo Image Management

No Active DirectoryNo Active Directory Active Directory for Active Directory for AuthenticationAuthentication

AV on DesktopAV on DesktopAutomated basic Automated basic networkingnetworking

Limited SecurityLimited SecurityLimited DHCP / WINSLimited DHCP / WINSNo MonitoringNo Monitoring

Disaster Recovery PlanDisaster Recovery PlanNo plan for server No plan for server recoveryrecovery

Snapshot of Infrastructure What to focus on…

Identity and Access ManagementIdentity and Access Management

Desktop EngineeringDesktop Engineering

Security, Networking and MonitoringSecurity, Networking and Monitoring

Disaster RecoveryDisaster Recovery

XP / W2K desktop OSXP / W2K desktop OSDesktop Image MgmtDesktop Image Mgmt

Automated Patch Automated Patch ManagementManagement

Defined Set of ImagesDefined Set of Images

Active Directory for Active Directory for Authentication onlyAuthentication only

Group PolicyGroup PolicyDirectory Enabled AppsDirectory Enabled Apps

Remote Access Remote Access IPSec Server IsolationIPSec Server IsolationRich MonitoringRich Monitoring

AntiVirus on DesktopsAntiVirus on DesktopsCentralized FirewallCentralized FirewallInternal DNS / DHCPInternal DNS / DHCP

Backup/Restore on Backup/Restore on Critical ServersCritical Servers

Disaster Recovery Disaster Recovery PlanPlan

Snapshot of Infrastructure What to focus on…

Identity and Access ManagementIdentity and Access Management

Desktop EngineeringDesktop Engineering

Security, Networking and MonitoringSecurity, Networking and Monitoring

Disaster RecoveryDisaster Recovery

Automated App Automated App Compatibility TestingCompatibility Testing

W2K / XP primary OSW2K / XP primary OSAutomated distributionAutomated distributionManual app compatManual app compat

Directory tools for central Directory tools for central admin of configs and admin of configs and securitysecurity

Metadirectory ServicesMetadirectory Services

Desktop FirewallDesktop FirewallSecure WirelessSecure WirelessSingle Server Mgmt Single Server Mgmt ToolsetToolsetDesktop MonitoringDesktop Monitoring

Remote Access / VPNRemote Access / VPNIPSec Server IsolationIPSec Server IsolationMonitoring of ServersMonitoring of Servers

Backup/Restore on all Backup/Restore on all Servers & Desktop w/ Servers & Desktop w/ SLASLA

Backup/Restore on all Backup/Restore on all Servers with SLAServers with SLA

Microsoft IO Framework Microsoft IO Framework Example – Determining Optimization Roadmap: Example – Determining Optimization Roadmap: http://microsoft.com/io http://microsoft.com/io

Security Security and and NetworkinNetworkingg

Security Security and and NetworkinNetworkingg

Identity & Identity & Access Access MgmtMgmt

Identity & Identity & Access Access MgmtMgmt

Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt

Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt

Data Data Protection Protection and and RecoveryRecovery

Data Data Protection Protection and and RecoveryRecovery

IT and IT and Security Security ProcessProcess

IT and IT and Security Security ProcessProcess

Detailed Classifying Questions (Binary)Detailed Classifying Questions (Binary)In order to be “Standardized”, a customer must answer yes to the following questions (otherwise, it is a “Basic” customer):

1. Do you use Active Directory for authenticating 80% or more of your users?2. Do you have an automated patch distribution covering 80% or more of your desktops? 3. Do you have AV software (with automated signature updating) running on 80% or more your desktops? 4. Do you have a backup and restore solution for 80% or more of your business critical servers? 5. Do you have a centralized firewall (not per desktop) for your enterprise protecting 80% or more of your systems (e.g. ISA, Checkpoint,

Nokia) ?6. Do you use have internal servers for basic network services (DNS, DHCP)?7. Do you have a defined set of standard basic images for 80% or more of your desktops and laptops?8. If customer is using Exchange Server as their messaging Infrastructure: (If they don’t , please skip the question(s) below in yellow)

a) Do you use the same directory infrastructure for access and messaging?b) Do you block SPAM at multiple server levels and viruses with multiple scanning engines?

In order to be “Rationalized”, a customer must answer yes to the following questions (otherwise, it is a “Standardized” customer):

1. Do you have a directory based tool to centrally administrate configurations and security on 80% or more of your desktops (e.g. Group Policy)?

2. Do you have 80% or more of your desktops are running Windows XP or 2000 as your primary OS? Do you have 80% or more of your XP desktops running SP2?

3. Do you have an automated tracking of HW and SW assets of 80% or more of your desktops? 4. Do you use manual compatibility/app certification testing to verify/deploy 80% or more of your SW distributions to your desktops?5. Do you have a manual reference image system for the images of 80% or more of your desktops and laptops?6. Do you provide employees remote access to internal resources and LOB applications beyond email (e.g. VPN and/or Terminal

Services)?7. Do you have monitoring for 80% or more of your servers for ensuring consistent and reliable user experiences (e.g. ensuring that

email is always available)?8. Do you use secured and guaranteed way to verify communication between servers to secure network communications between critical

servers such as domain controllers and email servers? (Examples of a secured communication are IPsec, Certificates)9. Do you have backup and restore and defined recovery times for 80% of all servers?10. If customer is using Exchange Server as their messaging Infrastructure: (If they don’t , please skip the question(s) below in yellow)

a) Do you use an application-layer firewall for secure web-based e-mail access and pre-authentication of users before they reach the mailbox server?

In order to be “Dynamic”, a customer must answer yes to the following questions (otherwise, it is a “Rationalized” customer):

1. Do you have a central tool to automate user provisioning (e.g. issuing new accounts, changing passwords, synchronizing permissions, enabling access to business applications) across 80% or more of your heterogeneous systems?

2. Do you have an automated patch management solution for 80% or more of your servers?3. Do you use automated compatibility/app certification testing to verify/deploy 80% or more of your SW distributions to your desktops?4. Do you have monitoring for 80% or more of your desktops for ensuring consistent and reliable user experiences?5. Do you have firewall software (e.g. BlackICE, Windows Firewall, Zone Alarm) running on 80% of your servers and desktop?6. Have you deployed a secure wireless network using Active Directory and IAS/RADIUS for authentication and authorization?7. Do you have backup and restore and defined recovery times for 80% of servers and desktops?8. If customer is using Exchange Server as their messaging Infrastructure: (If they don’t , please skip the question(s) below in yellow)

a) Can you secure mobile devices with remote reset and remote wipe after too many log-on attempts?

Microsoft IO Framework Microsoft IO Framework Example – Plot of Current Optimization State Example – Plot of Current Optimization State

Security Security and and NetworkinNetworkingg

Security Security and and NetworkinNetworkingg

Identity & Identity & Access Access MgmtMgmt

Identity & Identity & Access Access MgmtMgmt

Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt

Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt

Data Data Protection Protection and and RecoveryRecovery

Data Data Protection Protection and and RecoveryRecovery

IT and IT and Security Security ProcessProcess

IT and IT and Security Security ProcessProcess

Identify Where You Want To BeIdentify Where You Want To Be

Understand the model: Understand the model: http://microsoft.com/IO http://microsoft.com/IO

Ask your MS Account Team for an Ask your MS Account Team for an Infrastructure Optimization Strategy Infrastructure Optimization Strategy BriefingBriefing

Have your Infrastructure Staff Attend a Have your Infrastructure Staff Attend a Deployment WorkshopDeployment Workshop

Review your Profile Results and Identify:Review your Profile Results and Identify:Highest impact options Highest impact options

Biggest challengesBiggest challenges

Deployment WorkshopsDeployment Workshops

Objective: Learn what an optimized Objective: Learn what an optimized infrastructure can doinfrastructure can do

Toolset: Microsoft Solution Accelerator for Toolset: Microsoft Solution Accelerator for Business Desktop Deployment (BDD)Business Desktop Deployment (BDD)

Duration: 3 DaysDuration: 3 Days

Format: Hands-on LabFormat: Hands-on Lab

Audience: Architects and IT ProfessionalsAudience: Architects and IT Professionals

Deployment WorkshopsDeployment WorkshopsTopics Covered Include:Topics Covered Include:

Application Compatibility (Issues and Application Compatibility (Issues and Testing)Testing)

ImagingImaging

Infrastructure ManagementInfrastructure Management

Deployment ProcessDeployment Process

Windows XP (with Service Pack 2) & Office Windows XP (with Service Pack 2) & Office 2003 Deployment2003 Deployment

User State MigrationUser State Migration

Security & Patch ManagementSecurity & Patch Management

Provisioning ServicesProvisioning Services

Deployment WorkshopsDeployment WorkshopsContact your MS Account Manager to Contact your MS Account Manager to RegisterRegister

MonthMonth DateDate CityCitySeptember 2006September 2006 1212thth – 14 – 14thth BrisbaneBrisbane

September 2006September 2006 1919thth – 21 – 21stst AdelaideAdelaide

September 2006September 2006 26th – 2826th – 28thth PerthPerth

September 2006September 2006 1919thth – 21 – 21stst Melbourne Melbourne

September 2006September 2006 2626thth – 28 – 28thth Melbourne Melbourne (REPEAT)(REPEAT)

October 2006October 2006 33rdrd – 5 – 5thth SydneySydney

October 2006October 2006 1010thth – 12 – 12thth Sydney (REPEAT x 2)Sydney (REPEAT x 2)

October 2006October 2006 1010thth – 12 – 12thth Sydney (REPEAT x 3)Sydney (REPEAT x 3)

Identify Where You Want To BeIdentify Where You Want To Be

Review your profile results (from online Review your profile results (from online profiler)profiler)You can get started today and move your IT systems toward a more cost-effective standardized infrastructure.

 Recommendation  Enabling Technology  Microsoft Technologies

•Move to a more stable infrastructure environment

•Develop standards, policies, and controls with an enforcement strategy

•Layer security at the perimeter, server, desktop, and application levels

•Automate manual and time-consuming tasks

•Adopt best practices, make IT a strategic asset rather than a burden

•Reduce hardware and software standards complexity

•Antivirus on desktops Centralized firewall

Internal DNS and DHCP

Identity management for

authentication and authorization only

Automated updates management (operating system, software, server management)

Defined set of standard basic images

Backup/restore on all servers

Anti-virus on servers

•Windows Desktop Deployment

•Active Directory-based applications with Group Policy-based management Systems Management Server for

patch management and desktop deployment Microsoft Operations Manager

for monitoring servers

Backup/restore solution

Remote access via VPN and Terminal Services

IPSec server isolation

Microsoft IO framework Microsoft IO framework Example – Plot of Future Optimization State Example – Plot of Future Optimization State

Security Security and and NetworkinNetworkingg

Security Security and and NetworkinNetworkingg

Identity & Identity & Access Access MgmtMgmt

Identity & Identity & Access Access MgmtMgmt

Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt

Desktop, Desktop, Device and Device and Server Server ManagemeManagementnt

Data Data Protection Protection and and RecoveryRecovery

Data Data Protection Protection and and RecoveryRecovery

IT and IT and Security Security ProcessProcess

IT and IT and Security Security ProcessProcess

Make a PlanMake a Plan

Engage a Qualified PartnerEngage a Qualified Partner

Develop a detailed profile and plan with an Develop a detailed profile and plan with an Architectural Design SessionArchitectural Design Session

Software Assurance BenefitSoftware Assurance Benefit

Desktop Deployment Planning Service (DDPS)Desktop Deployment Planning Service (DDPS)

If needed, test components with a Proof-of-If needed, test components with a Proof-of-ConceptConcept

PartnersPartners

Microsoft Consulting ServicesMicrosoft Consulting Services

Part of the DDPS for 10 and 15 day eventsPart of the DDPS for 10 and 15 day events

OverviewOverview: : Designed to provide mutual benefits for partners, Designed to provide mutual benefits for partners, customers, and Microsoftcustomers, and MicrosoftSoftware Assurance Benefit made available to Microsoft Software Assurance Benefit made available to Microsoft customers worldwide in March 2006customers worldwide in March 2006A customized deployment plan delivered by DDPS certified A customized deployment plan delivered by DDPS certified and registered Microsoft partners as a packaged service to and registered Microsoft partners as a packaged service to qualified customers based on Software Assurance level qualified customers based on Software Assurance level Offered at no cost to the customer - Microsoft pays partners Offered at no cost to the customer - Microsoft pays partners to deliver the deployment plan services via the DDPS to deliver the deployment plan services via the DDPS programprogramHelps move customers toward a more efficient Helps move customers toward a more efficient infrastructureinfrastructure

Desktop Deployment Planning Services Desktop Deployment Planning Services (DDPS)(DDPS)

Value of DDPSValue of DDPS

You will:You will:Benefit from an efficient infrastructure with a Modern DesktopBenefit from an efficient infrastructure with a Modern Desktop

Lower cost infrastructureLower cost infrastructureImproved IT security Improved IT security Increased operational agilityIncreased operational agilityReady for new software (VistaReady for new software (VistaTM, Office 12), Office 12)Getting ready for the New World Of WorkGetting ready for the New World Of Work

Get more value from Software Assurance BenefitsGet more value from Software Assurance BenefitsA critical service for customers delivered A critical service for customers delivered free free (including a desktop deployment (including a desktop deployment plan)plan)Benefit available at four levels: 10-, 5-, 3-, and 1-day engagements (upgradeable Benefit available at four levels: 10-, 5-, 3-, and 1-day engagements (upgradeable to 15 days)to 15 days)

Deploy a Modern Desktop at much lower costDeploy a Modern Desktop at much lower costConsistent and pervasive need-based tools (Business Desktop Deployment Consistent and pervasive need-based tools (Business Desktop Deployment Solution Accelerator (BDD))Solution Accelerator (BDD))Standard and repeatable partner service offeringsStandard and repeatable partner service offerings

Be introduced to a greater breadth of deployment servicesBe introduced to a greater breadth of deployment servicesDeployment services brought to the forefront by MicrosoftDeployment services brought to the forefront by MicrosoftDeployment partner ecosystem with more trained partners worldwideDeployment partner ecosystem with more trained partners worldwideQualified Partner experts equipped and incented to deliver with quality assurance Qualified Partner experts equipped and incented to deliver with quality assurance built into the processbuilt into the process

DDPS will get you thereDDPS will get you there

Desktop Deployment Planning Desktop Deployment Planning Service (DDPS) ActivationService (DDPS) Activation

If you have Software Assurance: If you have Software Assurance: On http://www.microsoft.comOn http://www.microsoft.com

Search for Desktop Deployment Planning ServiceSearch for Desktop Deployment Planning Service

To get Software Assurance:To get Software Assurance:On http://www.microsoft.com On http://www.microsoft.com

Search for How to Get Software AssuranceSearch for How to Get Software Assurance

Select a DDPS participating partner: Select a DDPS participating partner: On Desktop Deployment Planning Service see the linkOn Desktop Deployment Planning Service see the link

Search for a Desktop Deployment Planning Solutions Search for a Desktop Deployment Planning Solutions provider provider

Co-develop a profile and deployment planCo-develop a profile and deployment plan

285 IO PSPs285 IO PSPs

155 Partners in IO Solutions Catalog155 Partners in IO Solutions Catalog265 unique solutions265 unique solutions

"The combination of our security practice and expertise in enabling security solutions with Microsoft's Infrastructure Optimization Model represents a unique dynamic that will continue to strengthen our partnership and enable our customers to maximize investments in Microsoft products and security features. We see this as a clear win-win proposition for everyone.“

Jim Tiller, CSO

International Network Services Inc

“IO has been a positive force in engaging with enterprise customers and a great roadmap to follow inMigrating them to the next infrastructure optimization level with our joint Citrix-Microsoft solutions” 

Garry Olah Alliance VP, Citrix Corporate Development "Getronics builds and delivers Infrastructure Optimization (IO) solutions, such as RDX,

that help our clients automate the laborious and time consuming task of desktop & server migration and deployment. This has opened the door to other optimization projects for Getronics and our pipeline continues to grow as a by-product of IO". Brad Gleason Global Service Director, Technology Transformation Services

Avanade has embraced the Microsoft IO framework in our solutions approach and will use it as a basis to help customers address their IT infrastructure to keep their business moving forward."

Larry LeSueur, Vice President, Technology Infrastructure Solutions

6 DDPS Certified Partners6 DDPS Certified Partners

Core Infrastructure CompetencyCore Infrastructure Competency9 Enterprise Partners9 Enterprise Partners

40 Mid-Market Partners40 Mid-Market Partners

Server and Domain IsolationServer and Domain Isolation

Service Management AssessmentService Management Assessment

Software Update ManagementSoftware Update Management

Desired Configuration MonitoringDesired Configuration Monitoring

Service Level ManagementService Level Management

Lotus Notes Messaging Migration AnalysisLotus Notes Messaging Migration Analysis

BizTalk Server 2004/2006 Infrastructure BizTalk Server 2004/2006 Infrastructure Monitoring & Performance TuningMonitoring & Performance Tuning

CoreCoreIOIO

BusinessBusinessProductivityProductivity

IOIO

ApplicationApplicationPlatformPlatform

IOIO

Contact MS Services at: Contact MS Services at: [email protected]@microsoft.com

The Infrastructure Optimization JourneyThe Infrastructure Optimization Journey

Identify where you are in the Identify where you are in the Infrastructure Optimization ModelInfrastructure Optimization Model

Identify highest impact options Identify highest impact options

Identify biggest challengesIdentify biggest challenges

Build a plan that maps to your business Build a plan that maps to your business and IT prioritiesand IT priorities

Work with your Microsoft Sales Rep and Work with your Microsoft Sales Rep and /or Partner to help you/or Partner to help you

“Microsoft can help plan, build and execute the journey to Infrastructure Optimization”

Source: GCR & IDC data analyzed by Microsoft, 2006

IT Labor IT Labor Cost/PCCost/PC

$1320$1320

IT Labor IT Labor Cost/PCCost/PC

$230$230

Comprehensive PC Security$160/PC Savings

Standardization & Standards Compliance$220/PC Savings

Identity Management$210/PC Savings

Others ….

IT Labor IT Labor Cost/PCCost/PC

$580$580

Tell us how you want to start the journeyTell us how you want to start the journey

2

1 Which IOs are critical to you? Which IOs are critical to you?

Who are your preferred Who are your preferred partners?partners?

Where would you like to Where would you like to start?start?

3

© 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.

MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Launch a Proof-of-ConceptLaunch a Proof-of-Concept

Use the DDPS findings to determine needsUse the DDPS findings to determine needs

Select PoC: <need a link or list and way to Select PoC: <need a link or list and way to invoke OR have them contact MS/Partner>invoke OR have them contact MS/Partner>

Select partner or MCS: <need to tell how>Select partner or MCS: <need to tell how>

Select project scope for PoC w/partnerSelect project scope for PoC w/partner

Test build the solutionTest build the solution

Software Update ManagementSoftware Update Management

Service Management AssessmentService Management Assessment

Server and Domain Isolation for SecurityServer and Domain Isolation for Security

Enterprise Patch Management & Software Enterprise Patch Management & Software DistributionDistribution

Branch Office Infrastructure SolutionBranch Office Infrastructure Solution

Deploying Windows Rights Management ServicesDeploying Windows Rights Management Services

Server Monitoring using MS MOMServer Monitoring using MS MOM

Deploying Windows Server VirtualizationDeploying Windows Server Virtualization

Identity Provisioning, Workflow and Life-Identity Provisioning, Workflow and Life-Cycle ManagementCycle Management

Lotus Notes Messaging Migration AnalysisLotus Notes Messaging Migration Analysis

Communications & Collaboration Assessment, Communications & Collaboration Assessment, Business Case & Architecture planningBusiness Case & Architecture planning

BizTalk Server 2004/2006 Infrastructure Monitoring BizTalk Server 2004/2006 Infrastructure Monitoring & Performance Tuning& Performance Tuning

CoreCoreIOIO

BusinessBusinessProductivityProductivity

IOIO

ApplicationApplicationPlatformPlatform

IOIO