Vistapresentation2
-
Upload
ianpilkington -
Category
Education
-
view
878 -
download
0
Transcript of Vistapresentation2
Preparing to Preparing to Deploy Server Deploy Server
2008 & 2008 & Windows Vista Windows Vista
Business Business DesktopsDesktops
Windows Vista Desktop Windows Vista Desktop Deployment ProcessDeployment Process
• What Are the Challenges of What Are the Challenges of Deploying a New Deploying a New Business Desktop?Business Desktop?
• Guidelines for an Effective Guidelines for an Effective Business Business Desktop DeploymentDesktop Deployment
• Considering the Cost Savings of Considering the Cost Savings of AutomationAutomation
Considering the Cost Considering the Cost Savings of AutomationSavings of Automation
Cos
t
Level of Automation, Tools Usage, and Technology Adoption
Manual-based deployment(Basic)
Lite Touch deployment(Standardized)
Zero Touch deployment(Rationalized/Dynamic)
What Are the Challenges of What Are the Challenges of Deploying a New Business Deploying a New Business Desktop?Desktop?
Application compatibilityApplication compatibility
User state migrationUser state migration
Lack of best practices and implementation guidesLack of best practices and implementation guides
Cost and complexity of the deploymentCost and complexity of the deployment
Lack of resources for performing the migrationLack of resources for performing the migration
Guidelines for an Effective Guidelines for an Effective Business Business Desktop DeploymentDesktop Deployment
Take an inventory
Determine the hardware to be reused or retired
Determine the applications to be redeployed
Define a strategy for applications that cannot be supported
Create an imaging process
Establish a process for capturing and restoring user data
Back up all relevant data before redeployment
Create a plan for training users for the updated software
Take an inventory
Determine the hardware to be reused or retired
Determine the applications to be redeployed
Define a strategy for applications that cannot be supported
Create an imaging process
Establish a process for capturing and restoring user data
Back up all relevant data before redeployment
Create a plan for training users for the updated software
Overview of the Desktop Overview of the Desktop Deployment Life CycleDeployment Life Cycle
PlanningPlanning
BuildingBuilding
DeployingDeploying
Lesson 2: Tools and Lesson 2: Tools and Technologies Used in the Technologies Used in the Desktop Deployment Life Desktop Deployment Life CycleCycle
• Tools Used to Support the Tools Used to Support the Planning PhasePlanning Phase
• Tools Used to Support the Tools Used to Support the Building PhaseBuilding Phase
• Tools Used to Support the Tools Used to Support the Deploying PhaseDeploying Phase
Tools Used to Support the Tools Used to Support the Planning PhasePlanning Phase
Application Compatibility ToolkitApplication Compatibility Toolkit
Solution Accelerator for BDD 2007 Solution Accelerator for BDD 2007
PLAN
PLAN
USMT 3.0USMT 3.0
Windows Vista Hardware AssessmentWindows Vista Hardware Assessment
Windows Hardware Windows Hardware Assessment Tool scans for-Assessment Tool scans for-
• Deployment blocker-Checks Devices Deployment blocker-Checks Devices and bios versions that are not and bios versions that are not compatiblecompatible
• Windows Vista Experience-premium Windows Vista Experience-premium or basicor basic
• Upgrade recommendations-Specific Upgrade recommendations-Specific hardware upgrades requiredhardware upgrades required
Windows Vista Hardware Windows Vista Hardware Assessment ToolAssessment Tool
Install the Windows Vista Hardware Assessment tool
Configure the Windows Vista Hardware Assessment tool
View inventory and assessment reports
Vista Hardware Assessment Vista Hardware Assessment ReportsReports
• Excel spreadsheetExcel spreadsheet
• Word document-descriptiveWord document-descriptive
Vista Hardware Assessment Vista Hardware Assessment Tool update-Tool update-
•Microsoft Assessment and Planning Microsoft Assessment and Planning Toolkit Solution Accelerator-Includes Toolkit Solution Accelerator-Includes hardware assessment for server hardware assessment for server 20082008
What Is the Application What Is the Application Compatibility Toolkit?Compatibility Toolkit?
An application inventory and analysis tool used to:An application inventory and analysis tool used to:
Identify and manage application portfolios
Determine application compatibility issues specific to deploying to a particular version of Windows
Reduce the cost and time involved in resolving application compatibility issues
Identify and manage application portfolios
Determine application compatibility issues specific to deploying to a particular version of Windows
Reduce the cost and time involved in resolving application compatibility issues
Features of the Application Features of the Application Compatibility ToolkitCompatibility Toolkit
Features of ACT 5.0 include:Features of ACT 5.0 include:
Inventory and analysis of your portfolio of applications, Web sites, and computers
Analysis of the impact to operating system deployments and Windows updates
Prioritization and categorization of application and computer inventory
Synchronization of compatibility information from the ACT Community
Developer and Tester Tools
Inventory and analysis of your portfolio of applications, Web sites, and computers
Analysis of the impact to operating system deployments and Windows updates
Prioritization and categorization of application and computer inventory
Synchronization of compatibility information from the ACT Community
Developer and Tester Tools
ACT 5.0 System ACT 5.0 System Requirements Requirements
Supported operating systems:Supported operating systems:
Microsoft Windows XP with SP1 or SP2
Microsoft Windows 2000 with SP4 Release Update (agents only)
Microsoft Windows Server 2003 with SP1
Microsoft Windows Vista
Microsoft Windows XP with SP1 or SP2
Microsoft Windows 2000 with SP4 Release Update (agents only)
Microsoft Windows Server 2003 with SP1
Microsoft Windows Vista
Supported database components:Supported database components:
Microsoft SQL Server 2000
Microsoft SQL Server 2005
Microsoft SQL Server 2005 Express Edition
Microsoft SQL Server 2000
Microsoft SQL Server 2005
Microsoft SQL Server 2005 Express Edition
Compatibility Evaluators For Compatibility Evaluators For Windows VistaWindows Vista
Compatibility evaluators specific for the Windows Vista operating system include:Compatibility evaluators specific for the Windows Vista operating system include:
Inventory Collector
User Account Control Compatibility Evaluator
Update Compatibility Evaluator
Internet Explorer Compatibility Evaluator
Vista Compatibility Evaluator
Inventory Collector
User Account Control Compatibility Evaluator
Update Compatibility Evaluator
Internet Explorer Compatibility Evaluator
Vista Compatibility Evaluator
Obtaining User StateObtaining User State
Windows Easy Transfer Windows Easy Transfer (FAST)(FAST)
USMT-User State Migration USMT-User State Migration Tool 3.0Tool 3.0
Planning For a User State Planning For a User State MigrationMigration
When you are planning your user state migration, it is important to identify which components you need to migrate to the new operating system platform
When you are planning your user state migration, it is important to identify which components you need to migrate to the new operating system platform
Components include:Components include:
User accounts
Application settings
Operating system settings
File types, files, folders, and settings
User accounts
Application settings
Operating system settings
File types, files, folders, and settings
What Is User State What Is User State Migration? Migration?
Application Settings
Application Settings
User PreferencesUser Preferences
User DataUser Data
Windows XPWindows XP
Windows VistaWindows Vista
Tools Used to Perform User Tools Used to Perform User State MigrationState Migration
User State Migration ToolUser State Migration Tool
Windows Easy TransferWindows Easy Transfer
How to Migrate User How to Migrate User Settings Using Windows Settings Using Windows Easy Transfer Easy Transfer
Target ComputerTarget Computer
Start Windows Easy TransferStart Windows Easy Transfer11
Select the transfer method and location to store the settings filesSelect the transfer method and location to store the settings files
22
Source ComputerSource Computer
Start Windows Easy TransferStart Windows Easy Transfer33
Select the transfer method and files and settings that should be migratedSelect the transfer method and files and settings that should be migrated
44
Complete the wizard on the target computerComplete the wizard on the target computer55
What Are the USMT What Are the USMT Components?Components?
Tools used with USMT include:Tools used with USMT include:
ScanStateScanState
LoadStateLoadState
Multiple Computer Migration
Multiple Computer Migration
How Does ScanState How Does ScanState Determine User State?Determine User State?
Options used with ScanState relate to:Options used with ScanState relate to:
Storage options
Migration rule options
Monitoring options
Encrypted file options
Storage options
Migration rule options
Monitoring options
Encrypted file options
Scanstate [StorePath] [/i:[path\]FileName] [Options]Scanstate [StorePath] [/i:[path\]FileName] [Options]
How Does LoadState How Does LoadState Migrate User State Migrate User State Information? Information?
Options used with LoadState are the same as ScanState except for the following:Options used with LoadState are the same as ScanState except for the following:
Storage options related to decryption
Migration rule options to allow LoadState to run without administrative credentials
User options for changing user attributes
Storage options related to decryption
Migration rule options to allow LoadState to run without administrative credentials
User options for changing user attributes
Loadstate [StorePath] [/i:[path\]FileName] [Options]Loadstate [StorePath] [/i:[path\]FileName] [Options]
What Are ScanState and What Are ScanState and LoadState LoadState Component Files? Component Files?
Component files used with LoadState and ScanState include the following:Component files used with LoadState and ScanState include the following:
MigSys.xml-O/S and browser settings
MigApp.xml-Application settings
MigUser.xml-User folders
Config.xml-custom list of O/S component
MigSys.xml-O/S and browser settings
MigApp.xml-Application settings
MigUser.xml-User folders
Config.xml-custom list of O/S component
/i:[Path\]FileName/i:[Path\]FileName
Considerations for Using Considerations for Using USMT 3.0USMT 3.0
Consider the following guidelines when using USMT:Consider the following guidelines when using USMT:
Install applications before running LoadState
Implement a managed environment
Use Chkdsk.exe
Migrate in groups
Install applications before running LoadState
Implement a managed environment
Use Chkdsk.exe
Migrate in groups
Consider the following security guidelines when using USMT:Consider the following security guidelines when using USMT:
Security Considerations for Security Considerations for Using USMT 3.0Using USMT 3.0
Encrypt the store
Scan for viruses on all computers
Maintain security of the file server and the deployment server
Encrypt the store
Scan for viruses on all computers
Maintain security of the file server and the deployment server
Using USMT 3.0 Using USMT 3.0
ScanState collects user stateScanState collects user state11
LoadState restores user stateLoadState restores user state33
New operating system is installedNew operating system is installed22
Intermediate StoreIntermediate Store
Source and Destination Computer
Source and Destination Computer
Other Planning ToolsOther Planning Tools
•BDD 2007-Microsoft Solution BDD 2007-Microsoft Solution Accelerator for Business Desktop Accelerator for Business Desktop DeploymentDeployment
What Is Business Desktop What Is Business Desktop Deployment 2007?Deployment 2007?
BDD 2007 provides tools and best practices to enable IT professionals to:BDD 2007 provides tools and best practices to enable IT professionals to:
Create a software and hardware inventory
Set up an initial lab environment
Automate and manage desktop image creation
Deploy desktop images
Secure the desktop
Create a software and hardware inventory
Set up an initial lab environment
Automate and manage desktop image creation
Deploy desktop images
Secure the desktop
BDD 2007 Technologies BDD 2007 Technologies BDD 2007 brings together well-proven desktop deployment practices:BDD 2007 brings together well-proven desktop deployment practices:
Windows PE
User State Migration Tool
Microsoft Application Compatibility Toolkit
Windows Vista deployment tools
2007 Microsoft Office System deployment tools
SMS 2003 OSD Feature Pack
1000 pages of documentation
Windows PE
User State Migration Tool
Microsoft Application Compatibility Toolkit
Windows Vista deployment tools
2007 Microsoft Office System deployment tools
SMS 2003 OSD Feature Pack
1000 pages of documentation
What Are Feature Teams? What Are Feature Teams? Categories within BDD 2007 to help deploy Windows Vista and the 2007 Microsoft Office SystemCategories within BDD 2007 to help deploy Windows Vista and the 2007 Microsoft Office System
Application Compatibility
User State Migration
Infrastructure Remediation
Business Case for BDD
BDD Project, Process & Team
Guidance
Core & Supplemental
Application Packaging
Computer Imaging System
Securing the Desktop
Upgrading Office
Operations Readiness
Deployment Process
Overview of Volume Overview of Volume ActivationActivation
Volume Activation 2.0 Keys:Volume Activation 2.0 Keys:
Multiple Activation Key-(MAK) 1 product key that can activate a specific number of computers
Key Management Service-(KMS) Uses a host computer that enables organizations to perform local activations for computers in a managed environment without connecting to Microsoft individually
Multiple Activation Key-(MAK) 1 product key that can activate a specific number of computers
Key Management Service-(KMS) Uses a host computer that enables organizations to perform local activations for computers in a managed environment without connecting to Microsoft individually
Volume Activation 2.0 provides a simple and security-enhanced activation for enterprise organizations, while addressing issues associated with Volume License keys in previous versions of Windows
Volume Activation 2.0 provides a simple and security-enhanced activation for enterprise organizations, while addressing issues associated with Volume License keys in previous versions of Windows
MAK ActivationMAK Activation
MAK Activation Methods:MAK Activation Methods:
MAK Proxy Activation enables a centralized activation request on behalf of multiple desktops with one connection to Microsoft-Pool of MAK keys that deplete /manage your licenses well!
MAK Independent Activation requires that each desktop independently connects and activates against Microsoft activation servers
Used for images
MAK Proxy Activation enables a centralized activation request on behalf of multiple desktops with one connection to Microsoft-Pool of MAK keys that deplete /manage your licenses well!
MAK Independent Activation requires that each desktop independently connects and activates against Microsoft activation servers
Used for images
KMS ActivationKMS ActivationKMS activation considerations:KMS activation considerations:
Client computers that are not activated attempt to connect with the KMS host every two hours
Client computers must renew their activation by connecting to the KMS host at least once every 180 days to stay activated
After activation, client computers attempt to renew their activation every 7 days
Client computers connect to the KMS host for activation by using anonymous RPC over TCP and by using default port 1688
A KMS host and KMS clients must use Volume License media /No retail puurchase
Client computers that are not activated attempt to connect with the KMS host every two hours
Client computers must renew their activation by connecting to the KMS host at least once every 180 days to stay activated
After activation, client computers attempt to renew their activation every 7 days
Client computers connect to the KMS host for activation by using anonymous RPC over TCP and by using default port 1688
A KMS host and KMS clients must use Volume License media /No retail puurchase
Troubleshooting Volume Troubleshooting Volume ActivationActivation
MAK Activation troubleshooting:MAK Activation troubleshooting:
Verify the activation status
Ensure that an Internet connection is available
Contact the Microsoft Activation Call Center if necessary
Determine the error message
Verify the activation status
Ensure that an Internet connection is available
Contact the Microsoft Activation Call Center if necessary
Determine the error message
KMS Activation troubleshooting:KMS Activation troubleshooting:
Verify the activation status
Verify that the KMS host has been contacted
View the client Windows Application event log
Ensure that your routers do not block TCP port 1688
Determine the error message
Verify the activation status
Verify that the KMS host has been contacted
View the client Windows Application event log
Ensure that your routers do not block TCP port 1688
Determine the error message
Tools Used to Support the Tools Used to Support the Building PhaseBuilding Phase
Deployment service 2008
Deployment service 2008
BUILD
BUILD
Windows System Image ManagerWindows System Image Manager
SYSprep/ImageXSYSprep/ImageX
Windows PEWindows PE
WAIK (Windows Automated installation kit)WAIK (Windows Automated installation kit)
What Is the Windows What Is the Windows Automated Installation Kit?Automated Installation Kit?
Windows AIK includes:Windows AIK includes:
Detailed information about the phases of the Windows deployment process:
•Preinstallation Planning•Preinstallation Preparation •Preinstallation Customization• Image Deployment• Image Maintenance
Detailed information about the phases of the Windows deployment process:
•Preinstallation Planning•Preinstallation Preparation •Preinstallation Customization• Image Deployment• Image Maintenance
The Windows AIK is a collection of documentation and tools that are used to assist in the deployment of Windows Vista The Windows AIK is a collection of documentation and tools that are used to assist in the deployment of Windows Vista
What Is the Windows What Is the Windows Automated Installation Kit? Automated Installation Kit? (con)(con)
Deployment tools
• ImageX-create, deploy and capture images
• Windows PE- pre-installation environment
• Windows System Image manager
Technical References Comprehensive technical references and step by step guides for each of the technologies used to deploy Vista Desktops
What Is the Windows What Is the Windows System Image Manager?System Image Manager?
Used to customize and automate Windows Vista installations by creating Unattend.xml filesUsed to customize and automate Windows Vista installations by creating Unattend.xml files
Use Windows SIM to:Use Windows SIM to:
Create and edit XML-based, unattended-configuration files for automation of installation
Create an answer file that installs third-party applications or device drivers, additional language packs, service packs, or other updates
View all of the configurable settings in a Windows image
Create and edit XML-based, unattended-configuration files for automation of installation
Create an answer file that installs third-party applications or device drivers, additional language packs, service packs, or other updates
View all of the configurable settings in a Windows image
What Is Windows Imaging What Is Windows Imaging Format?Format?
Provides the following benefits:Provides the following benefits:
One image for many hardware configurations One image for many hardware configurations
CompressionCompression
Multiple images in one file Multiple images in one file
Offline servicing of the image fileOffline servicing of the image file
Installation on partitions of any sizeInstallation on partitions of any size
Nondestructive deploymentsNondestructive deployments
Modification of image files using APIsModification of image files using APIs
Bootable image support for Windows PEBootable image support for Windows PE
A file-based image technology used to install Windows VistaA file-based image technology used to install Windows Vista
How Windows Vista Uses How Windows Vista Uses ModularizationModularization
Modularization allows you to:Modularization allows you to:Add multiple device drivers, services packs, and updates to the image files Add multiple device drivers, services packs, and updates to the image files
Customize optional Windows Vista components Customize optional Windows Vista components
Update individual components in the image filesUpdate individual components in the image files
Reduce testing while deploying a new operating systemReduce testing while deploying a new operating system
Deploy multiple language versions of Windows Vista using a single imageDeploy multiple language versions of Windows Vista using a single image
What Is Sysprep?What Is Sysprep?Sysprep prepares an installation of Windows Vista for duplication, auditing, and customer delivery Sysprep prepares an installation of Windows Vista for duplication, auditing, and customer delivery
Sysprep:Sysprep:
Removes system-specific data from the Windows operating system
Strips the Security Identifier
Resets Windows Product Activation
Resets computer name
Removes system-specific data from the Windows operating system
Strips the Security Identifier
Resets Windows Product Activation
Resets computer name
Alternative to Sysprep-$$$$Alternative to Sysprep-$$$$
Symantec Ghost WalkerSymantec Ghost Walker
After writing an image to a After writing an image to a computer, ghost walker updates computer, ghost walker updates configuration items such as configuration items such as computer name and security computer name and security identifieridentifier
What Is ImageX?What Is ImageX?ImageX is a command-line tool that is used to manage file-based WIM disk imagesImageX is a command-line tool that is used to manage file-based WIM disk images
Use ImageX to:Use ImageX to:
View the contents of a WIM file
Capture desktop images
Mount images for offline image editing
Store multiple images in a single file
Compress the image files
Implement scripts for image creation
View the contents of a WIM file
Capture desktop images
Mount images for offline image editing
Store multiple images in a single file
Compress the image files
Implement scripts for image creation
How ImageX Is Configured How ImageX Is Configured to Manage WIM Filesto Manage WIM Files
ImageX {/info | /capture | /apply | /append | /delete | /mountrw | /unmount} [Parameters]
CommandCommand DescriptionDescription
infoinfo Returns information about the .wim Returns information about the .wim filefile
capturecapture Captures a volume image from a Captures a volume image from a drive to a new .wim filedrive to a new .wim file
applyapply Applies a volume image to a Applies a volume image to a specified drivespecified drive
appendappend Adds a volume image to an Adds a volume image to an existing .wim fileexisting .wim file
deletedeleteRemoves the specified volume image Removes the specified volume image from a from a .wim file.wim file
mountrwmountrw Mounts a .wim file with read/write Mounts a .wim file with read/write permissionpermission
unmountunmount Unmounts a mounted image from aUnmounts a mounted image from aspecified directoryspecified directory
What Is Windows What Is Windows Preinstallation Environment Preinstallation Environment 2.0?2.0?
Windows PE 2.0 is a compact, special-purpose Windows operating system for installing, maintaining, and recovering Windows VistaWindows PE 2.0 is a compact, special-purpose Windows operating system for installing, maintaining, and recovering Windows Vista
Capabilities of Windows PE 2.0:Capabilities of Windows PE 2.0:
Driver injection support
Native support for the NTFS 5.x file system
Native support for client-based TCP/IP networking and file sharing
Native support for 32-bit (or 64-bit) Windows device drivers
Native support for a subset of the Win32 API; optional support for WMI and Windows Script Host
Ability to be customized to provide a complete recovery environment (WindowsRE for vista)
Driver injection support
Native support for the NTFS 5.x file system
Native support for client-based TCP/IP networking and file sharing
Native support for 32-bit (or 64-bit) Windows device drivers
Native support for a subset of the Win32 API; optional support for WMI and Windows Script Host
Ability to be customized to provide a complete recovery environment (WindowsRE for vista)
Windows PE Support Windows PE Support UtilitiesUtilities
Includes several utilities to support Windows Vista installation and Windows PE image creation
CommandCommand DescriptionDescription
DiskPartDiskPart Used to perform a full range of partition-Used to perform a full range of partition-maintenance activitiesmaintenance activities
DrvloadDrvload Used for adding driversUsed for adding drivers
OscdimgOscdimg Creates an ISO image of Windows PECreates an ISO image of Windows PE
PEimgPEimg Used to view and modify the contents of a Used to view and modify the contents of a Windows PE imageWindows PE image
BCDEditBCDEdit Modifies the Boot Configuration Data Modifies the Boot Configuration Data
Tools Used to Support the Tools Used to Support the Deploying PhaseDeploying Phase
D E P L O YD E P L O Y
Windows Deployment ServicesWindows Deployment Services
Systems Management Server 2003Systems Management Server 2003
SCCM (SMS)SCCM (SMS)
Deployment Service 2008Deployment Service 2008
• Server 2008 RIS equivalentServer 2008 RIS equivalent
• Built into the O/SBuilt into the O/S
• No Additional costNo Additional cost
What Is Windows What Is Windows Deployment Services?Deployment Services?
Windows Deployment Services provides the ability to deploy Windows operating systems, such as Windows Vista, to new computers through a network-based installation
Windows Deployment Services provides the ability to deploy Windows operating systems, such as Windows Vista, to new computers through a network-based installation
Windows Deployment Services components include:Windows Deployment Services components include:
Server components
Client components
Management components
Server components
Client components
Management components
What's new in the Deployment What's new in the Deployment ServiceService
• The ability to deploy Vista and Server The ability to deploy Vista and Server 0808
• Windows PE is the boot O/SWindows PE is the boot O/S• Image based installations using Image based installations using
windows image (WIM) fileswindows image (WIM) files• A higher performing PXE server A higher performing PXE server
componentcomponent• A new GUI on the client computer to A new GUI on the client computer to
select the imagesselect the images
What's new in the Deployment What's new in the Deployment Service (Continued)Service (Continued)
• Windows Deployment services MMC Windows Deployment services MMC making management easiermaking management easier
• Faster downloads of boot files using Faster downloads of boot files using TFTP TFTP (trivial file transfer protocol)(trivial file transfer protocol)
• Support for XP and Server 2003 Support for XP and Server 2003 image deploymentimage deployment
Process for Implementing a Process for Implementing a Basic Image-Based Basic Image-Based DeploymentDeployment
Windows PE, Sysprep
ImageX, WDS, distribution share
Windows SIM/WDS
Unattend.xml,
Determine deployment methodDetermine deployment methodPlanPlan
Environment setup
Environment setup
CustomizeCustomize
Install and testInstall and test
DeployDeploy
MaintainMaintain
Tools usedTools used
Build deployment environmentBuild deployment environment
Create answer fileCreate answer file
Install new computerInstall new computer
Capture, store, and deploy image
Capture, store, and deploy image
Modify existing imageModify existing image Windows SIM
WAIK/BDD 2007 Resources
Overview of the Overview of the Deployment ProcessDeployment Process
To deploy a Windows Vista business desktop:To deploy a Windows Vista business desktop:
Define the deployment project scope and objectives Define the deployment project scope and objectives 11
Roll out the deployment Roll out the deployment 44
Test and pilot the deployment plan Test and pilot the deployment plan 33
Assess your current computing environment Assess your current computing environment 22
Factors for Choosing an Factors for Choosing an Installation MethodInstallation Method
How many computers are included in the deployment How many computers are included in the deployment
Whether users install the operating system themselves, or perform unattended installations Whether users install the operating system themselves, or perform unattended installations
How much customization is required for your installations How much customization is required for your installations
What hardware is available and how the various types differ What hardware is available and how the various types differ
Whether you are using Active Directory Whether you are using Active Directory
Most tools discussed Most tools discussed today are available for today are available for
download from Microsoft download from Microsoft free of chargefree of charge