Vous êtes sur la page 1sur 507

Dolor Sit Amet Elit Mattis Diam

Dolor sit amet

Lorem ipsum

Dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam

dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur adipiscing elit. dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur adipiscing elit. dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur adipiscing elit.

dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur adipiscing elit. dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur

Lorem ipsum

Dolor sit

dolor sit amet, c adipiscing elit. A mattis diam ven Consectetur adi

New platform/new applications


Scheduling a service call

Key concepts

Virtualization

Homogenization

Resiliency

Elasticity

Real-time system health

Automation

Asap asynchronicity

Adaptive insightful experience

Network Access everywhere


Resource Pooling Elasticity

Metered Use

Packaged Services
Packaged solution for deploying highlyautomated datacenter and cloud services

Deployment Framework
Frameworks for assessing, planning, and deploying datacenter capabilities

Service Delivery Best Practices


Best practices for operating datacenters from Microsoft Cloud Services

Extensible Platform
Solution platform provides capability for extensions and value-added services

REDUCED COSTS

FLEXIBILITY

AGILITY

EASY TO IMPLEMENT

MANAGED CHANGE

Windows Azure

Windows Azure

application building blocks

web sites
shared
SHARED INSTANCES

shared

reserved

PUBLIC

Identity

PRIVATE

Build game.

Magic happens here.

Profit.

cloud data services

Web Sites In Seconds


As Powerful As You Need Them To Be

Start Simple
start free, scale up and out as you go, friction-free and without the headaches

Be Brilliant
with asp.net, php or node.js, develop on Windows, OSX or Linux

Go Live deploy live in seconds,


easily monitor performance, rapidly diagnose and fix issues

Rapid deployment for quick iteration


Integrated source control with Team Foundation Server (TFS) and Git Built-in monitoring of performance and usage data Quick access to request logs, failed requests diagnostics and diagnostics

Linux)

GIT : FTP

On-Premises
Applications
Data Custom Software Native Code Firewall Network O/S Virtualization Hardware

Virtual Machines
Applications
Data Custom Software Native Code Firewall Rules Virtual Network O/S

Cloud Services
Applications
Data

Web Sites
Applications
Data

Startup Tasks
Native Code Firewall Rules Virtual Network

application building blocks

Relax the limits and warn me before I cross them

Make the service less of a black box

Give me caches bigger than 4GB

Cache should be cheaper than $45/mo for 128MB

Hold the bar

Windows Azure Caching (Preview)

Long Running

Composition Application & Coordination Visibility

Custom Authoring

Characteristics of Big Data

Sophisticated Design Environment Report Viewer Controls Rich Design Capabilities

Productive Authoring Re-use of insights Flexible layout

Visual data representation Highly Interactive Rich Presentation

Report Designer

Report Builder

Power View

Embedded

Operational

Business

Install SSRS in SharePoint Integrated mode Configuration settings are stored in SharePoint DB

Execution log in alerting database Trace Log is in SSRS trace log and ULS

Use performance counters to determine overloading & scale-out requirements More frequent alerts will require more resources

Discovery
Buyers confidently browse, discover, purchase, and use new content. The Marketplace is provided by a trusted brand and provides immediate access to the content consumers demand. No high-pressure sales pitches, no hidden strings, no hassles.

Ecosystem
Marketplace provides integration between content and the apps that depend on it. Office, SQL Server, Visual Studio, and other data apps are easily connected to Marketplace. The Marketplace invests in building out highquality connections so individual content providers dont have to.

Monetization
Particularly important for smaller content providers, the Marketplace manages the challenges of selling abroad. Marketplace eliminates the complexity of international business so Content Providers can focus on content.

Infrastructure
Marketplace provides account management, authorization, metering, throttling, localized UI, and a variety of other services backed by Microsofts world-class cloud computing resources.

Premium Data & Services


The Marketplace offers more than 15 categories of highquality curated data and data services. Publishers of premium data and Web services enjoy the full breadth of Marketplace services.

Premium Cloud Apps


Cloud Application developers depend on the Marketplace to manage the business of selling access to their applications, focusing instead on giving buyers the best value from their purchases.

Free Data & Services


Premium data and services often add insight on top of publically available knowledge. The Marketplace encourages Content Providers to distribute their free data to give uniform access to our ecosystem.

Catalog Apps
Apps that do not yet take advantage of Marketplace services can become more discoverable by being listed in the Marketplaces extensive application catalog.

Evolution of Virtualization

35%
REDUCE COST

Drive Green IT:


in the first year
ENERGY

90%

COOLING

95%

FLOOR SPACE

89%

ADMINISTRATIO N

75%

The BI Semantic Model

Three Investment Areas for Analysis Services in SQL Server 2012

Persisted formatting

Power View with DAX Addition and Subtraction Power View with DAX Time Intelligence Inventory Calculations Standard Deviation & Variance Text Functions Define Your Own Context

Ratios

Rank

The problem:
Finding

BI solution created by user. Context is only for user & exists as document.

My Context

BI Solution created by power user. Context: small team & managed on a server.

Our Context

BI Solution created by IT, Established corporate context & is reusable, scalable and backed up.

The Orgs Context

Visio & Visio Services Excel & PowerPivot Report Builder Excel Services PerformancePoint Services Reporting Services SQL Reporting Services SQL Integration Services SQL Analysis Services

SQL Server Object Explorer T-SQL Editor

T-SQL IntelliSense T-SQL Debugging View/Edit Data

Drift Detection Schema Comparison

Table Designer View Code Error Information

Go To Definition Find All References Refactoring

Source Code Based F5 Debugging & Testing with LocalDB

Source Code Control MSBuild Headless Command Line Tools

Point-in-time Snapshots Visualize Schema Differences T-SQL Static Code Analysis

Model Based Incremental Schema Deployment

SQL Server 2005 SQL Server 2008 SQL Server 2012 SQL Azure Retargeting Support

DACPAC Connected SQL Script

Format Engine API & REDIST

Microsoft SQL Azure Teradata

Text Files Reporting

Microsoft Services Excel IBM DB2 SQL Data Files Server Oracle Others Feeds (OLE DB/ODBC)

Browser Interactivity Management Dashboard

Multiple PowerPivot Application Servers

PowerPivot App Servers

After you upgrade the first server, additional servers that are not yet upgraded will become unavailable.

Running app

Windows Runtime

Running app

Windows Runtime

Windows reimagined

All the apps you want

Cloudconnected

Get more at the Windows Store

Reimagined browsing with IE10

At home and at work

Great experience across hardware

Built on a solid foundation

Consumer
Examples

B2C

LOB ISV

Custom LOB
Headtrax

Expense Approval

PLM
Windows Store or Side-loaded Tech Company

Company News

Distribution Built by Used by

Windows Store Tech Company

Windows Store Enterprise

Side-loaded Enterprise

Consumer

Business

Meeting enterprise standards


Integrated Windows authentication
Enterprise Authentication and Private Network

Authentication

App Certificate My and Root stores


Windows.Security. Cryptography. Certificates

Multi-factor authentication
Credential Picker and Shared User Certificates

Federated ADFS Authentication


WebAuthentication Broker. AuthenticateAsync

Single Sign On with Live, Facebook, etc..


WebAuthentication Broker. AuthenticateAsync

Security

Isolated App Containers

Robust Capabilities framework

Support for SSL/TLS

Crypto APIs

App Signing

tools
DESIGN TASKS

CORE AUTHORING TASKS


Control creation VISUAL STUDIO Layout Property editing BLEND Basic data View authoring

CODING TASKS
Code editing Refactoring Debugging Code analysis Profiling

Styling Path-editing Animation Visual States Transitions

Private

Private Public

Public

Block and File Storage Array, pool, logical unit, file server, file share Host Storage Disk, volume, initiator port, virtual disk

Correlation - Block and File Storage to Host Storage

Indicates Storage SLA or Performance Guarantee Assigned to Storage Pool and Inherited by Logical Units and File Shares

Placement Based on Classification and Usage

Creation of Logical Units (Thick, Thin, Snapshot, Clone) and File Shares
Assignment of Logical Units and File Shares to Hyper-V servers Allocation of Storage to Host Groups and Clouds Host Disk Initialization, Partitioning, Volume Formatting

SAN based VM Creation using Snapshot/Clone

VM Creation to Host and Cluster


One VM per LUN

Unmasking and Masking


iSCSI Initiator Log-On/Log-Off NPIV vPort Creation/Deletion

Persistent iSCSI Sessions (Explicit or Subnet Match)


Initiator Log-On SPC per Cluster or per Node in Cluster

Disk Initialization, Partitioning, and Formatting Add and Remove Cluster Available Storage
Add and Remove Cluster Shared Storage

VMM Tested NetApp, EMC, HP, Dell EQL, LSI Partner Testing Hitachi, Fujitsu, Dell, IBM, StarWind (Development in Progress for Others)

SMI-S 1.3/1.4 Providers Attendance at SMI Lab Plugfests SMI-S Supported in Windows Server 2012

Test Harness Developed by VMM Team Provided to All Partners Primitives and End to End Scenarios (Functionality and Scale)

Per Service
Select Tier Based on Deployment Order

Per Machine

Per Guest OS

Per Application
Updat e Service

Create Templ ate


Customiz e Deploym ent

Create New VM from Template

Deploy

Power On and Wait for VM

Install VMM guest agent

Service

Install Application

Done

Add to Load Balancer

Built-In Step

Per Service
Select Tier Based on Servicing Order Select Machine Based on Upgrade Domain

Per Machine

Per Guest OS

Per Application

In-Place Updating

Remove from Load Balancer

Apply Application Level Changes

Uninstall Application

Install Application

Done

Add to Load Balancer

Built-In Step

Per Service
Select Tier Based on Servicing Order Select Machine Based on Upgrade Domain

Per Machine

Per Guest OS

Per Application

Image Based Updating

Remove from Load Balancer Add Data Disk to Machine Swap OS Disk Customize New OS Install Application Server App-V Backup State

Server App-V Restore State Done Add to Load Balancer

Built-In Step

Empower Users

Unify Infrastructure

Simplify Administration

Empower people to be more productive from almost anywhere on almost any device.

Reduce costs by unifying IT management infrastructure.

Improve IT effectiveness and efficiency.

Building Your Compliance Management Solution With Configuration Manager 2012


Plan and Configure Software Updates
Planning and setup Targeting and Delegation Maximizing productivity

Assessing Compliance Software Updates


Scanning for compliance Measuring compliance

Remediating Non-compliance Software updates


Deploying monthly updates Monitoring ongoing compliance

Settings Management

Define standards Create baselines and CIs

Settings Management

Deploy compliance baselines to collections of users or systems

Settings Management

Monitor drift from desired state Remediate issues impacting setting of desired state

Endpoint Protection

Enable the product Define standards for protection (AM Policy, Definitions, Alerts)

Endpoint Protection

Enable and deploy EP client Actively monitor for malware based on AM policy

Endpoint Protection

Clients remediate malware and rapidly report state Admin intervenes where required

Collections

Role-based Access

Create Templates

Build collections through dynamic queries

Create SUM administrators and assign to collections for which they need to manage updates

SUM Admin goes through the distribute software updates wizard and saves his default settings for deployments

All Windows 7 Desktops in North America

Template

Note: for multiple SUM admins you can also use scopes to further secure console objects

Collection Deployment Schedule User Experience

Alerts Download settings

Plan and Configure


Software updates
Planning and setup Targeting and Delegation Maximizing productivity

Assessing Compliance
Software updates
Scanning for compliance Measuring compliance Remediation strategy

Remediating Non-compliance
Software updates
Deploying monthly updates Monitoring ongoing compliance

Settings Management

Settings Management

Define standards Create baselines and CIs

Deploy compliance baselines to collections of users or systems

Configure
App Controller Orchestrator

Deploy

Virtual Machine Manager

Self Service
App Owner

Service Model

Service Delivery and Automation

Operations Manager Configuration Manager Data Protection Manager


DC Admin

Service Manager

Service Manager

Monitor Operate

Application Management

Service Delivery and Automation

Infrastructure Management

Multi-tenancy

Partner Enablement

Windows Server 2012

Perf and Scale

Virtual Machine Manager

Virtual Servers

Configure Deploy
DC Admin Configuration Manager

Physical Servers

Host Reserve (10%)


Dynamic Optimization Threshold (30%)

Host Reserve (10%)


Dynamic Optimization Threshold (30%)

Host Reserve (10%)


Dynamic Optimization Threshold (30%)

Host Reserve (10%)


Dynamic Optimization Threshold (30%)

VM VM VM VM

VM
VM

ABSTRACTION
Take the underlying infrastructure of networking, storage, and compute, and abstract those resources into clouds.

HETEROGENEITY
Create cloud abstractions across virtualized infrastructure from Microsoft, VMware, and Citrix.

ACCESS
Manage resource utilization and service creation by delegating self-service access to cloud resources.

CONTROL
Standardize application deployment by using templates.

Opalis 6.3 -> Orchestrator 2012

Better together

Learn new capabilities Incorporate best practices

Jeff: Datacenter Administrator


DC Admin

App Owner

Emily: Application Owner

Situation:

We are heavily dependent on IT to increase revenue IT takes it forever to do it IT Slows me down

Traditional Datacenter
Business often views themselves as held hostage by IT They cannot introduce new IT solutions Very high cost of operations

Situation:

Server sprawl due to dedicated server per application Infrastructure is complex IT budget is less

DC Admin

Traditional Datacenter Multiple tools and manual processes result in long request fulfillment times, High operations costs and complex maintenance protocols Less-than-secure environments.

Business
IT receives request Request Initiated Provisioning Silos of resources Oversubscription Increase d IT costs

IT

Deployment and registration of management tools Ongoing maintenance

Overprovisioning

CONFIGURE DEPLOY

App Owner

Self-Service

SERVICE MODEL

Service Delivery and Automation


MONITOR OPERATE

DC Admin

APPLICATION MANAGEMENT

SERVICE DELIVERY AND AUTOMATION

INFRASTRUCTURE MANAGEMENT

VIRTUAL MACHINE MANAGER

Virtual Servers

DC Admin

Storage

Network

DYNAMIC SERVICE LIFECYCLE OPTIMIZATIO MANAGEMENT N


Physical Servers

Virtual Servers

Microsoft System Center Virtual Machine Manager

Deploy Configure
Microsoft System Center Configuration Manager

DC Admin

Physical Servers

Resource Utilization

Optimization Threshold

VIRTUAL MACHINE MANAGER

Time of Day
DC Admin

Service Template (Multi-Tier .NET Application) Web Tier


Scale-out and health policy

Application Tier
Scale-out and health policy

Data Tier
Scale-out and health policy

Internet Information Services

Application Server

Microsoft SQL Server

HW profile

OS profile

App profile

HW profile

OS profile

App profile

HW profile

OS profile

SQL profile

W2K8R2.VHD

OS Settings

MSDeploy Configuratio Package n

Service Template Library

ConfigurationApplication Virtualizatio n

SQL Server Configuration Data Tier Application s

DC Admin

OPERATIONS MANAGER

Virtual Servers

DC Admin

Network APPLICATION MONITORING

Storage

Physical Servers

REDUCED COSTS

HIGHLY AUTOMATED

EFFECTIVE CONTROL

CENTRALIZE D MANAGEMEN T

END USER PRODUCTIVIT Y

SCALABLE AND ELASTIC

SELF SERVICE

RAPID GROWTH

EFFICIENT

Discover application dependen cies

Monitor end-user and applicatio n componen ts

Isolate root cause

Triage and remediate

DC Admin

Configure
App Controller Orchestrator

Deploy

Virtual Machine Manager

Self Service
Consumer

Service Model

Service Delivery & Automation

Operations Manager Configuration Manager Data Protection Manager


DC Admin

Service Manager

Service Manager

Monitor Operate

Application Management

Service Delivery & Automation

Infrastructure Management

STANDARDIZATION

SELF SERVICE

AUTOMATION

Standardize the services provided by IT to Consumers

Give Consumers of IT services the ability to identify, access and request services as needed

Automate the processes and systems necessary to fulfill Consumer requests.

Compliance with Regulation Define the request offerings that Increased Reliability will be part of a service offering Simplicity of Choice

Define the services to be offered

Identify who needs to be involved (approvals, notifications, fulfillment) Create templates to capture process for request fulfillment

Increased Customer Satisfaction Request offerings Reduceddisplayed Costs based on user role Nothing Lost in Translation
Controlled empowerment Intuitive, easy to navigate portal Self-service reporting

Faster Time to Automate routing ofDelivery requests for approval and manual steps Reduced Costs

Minimize Human Error Automate fulfillment of the service request


Automate notifications

Traditional Approach
Unstructured Data Structured Data

BI for the Masses


Structured & Structured Data

IT Owned and Managed Slow to Respond Monolithic Not Interactive

Business Owned, IT Managed Agile and Flexible Self-service Collaborative

Information

Collaboration

Combining business intelligence with collaboration and social software enables a higher quality decision making process.

People

Breakthrough Insight with IT Oversight


Familiar
Intuitive, fun & easy to use tools Enabling immersive data exploration Highest usage & productivity

Collaborative
Connect people & information On the most popular collab. platform Driving faster, more reliable decisions

Complete
Complete & integrated With IT Monitoring & Oversight On consistent & credible data from any source

On Your Terms
Flexibility & choice Scales from the desktop to the datacenter Priced for broad deployment

Microsoft BI Architecture

The Microsoft Difference


End-User IT Professional

Find and Access Mash-up and Analyze Share and Collaborate

Connect and Provision Monitor and Manage Deploy and Future Proof

AGILITY

CONTROL

Massive clusters & CSV2

Preferred Owners

Possible Owners

VM Priority

VMM Availability Sets

Let me use my existing customerfacing UI

Web APIs to enable Hosted IaaS Portals

Add Multitenancy to System Center

Manage across multiple instances of System Center

Customize and extend offerings to differentiate

Remove need for me to manage tenant networks

Value-add services such as monitoring or backup

Virtual Machine Manager

A private cloud is a new model for IT delivery. It turns a datacenters infrastructure resources into a single compute cloud and enables the key benefits of cloud computing:

1 5 9

2
6 10

3 7 11

4 8 12

application building blocks

66%
run

14%

20%

transform

grow

EXPLOSIVE DATA GROWTH

PROLIFERATION OF DEVICES

BUDGET REDUCTIONS

IT CONSTRAINTS

Companies are under pressure to do more with less

ENABLING DEVICES

AVAILABILITY

ROLE & DEVICE DRIVEN PRIVILEGES

ALLOW CUSTOMERS & PARTNERS

Companies must facilitate productivity without impacting security

ADAPTING TO CLOUD

RAPID ON-BOARDING OF SERVICES

MERGERS & ACQUISITIONS

PROLIFERATION OF GROUPS & USERS

Management must adapt rapidly to changing business needs

f
RAPID RESPONSE PROTECT WHILE EXTENDING CENTRALIZE & STANDARDIZE REPORT & AUDIT

Companies need an integrated security strategy

EMPOWER USERS

TAKE CONTROL

PLAN FOR THE FUTURE

Incorporating Identity into your environment can transform your business

USERS & DEVICES

PRIVATE

PUBLIC

INFRASTRUCTURE

APPS & SERVICES TRADITIONAL IT

IDENTITY HYBRID CLOUD

o Single View Mgmt. o Application of Business Rules o Automated Requests, Approvals, and Access Assignment

o User Sign-on Experience o Trusted Source o Standard and Secure Protocols o Level of Assurance

o How and where are authorizations handled o Can a user access the resource and what can they do when they access it?

o Track who does what, when, where and how o Focused Alerting o In-Depth Collated Reporting o Governance

ADMINISTRATION

AUTHENTICATION

AUTHORIZATION

AUDITING

ADMINISTRATION

AUTHENTICATION

AUTHORIZATION

AUDIT

Administration Provides

Provision & Deprovision

Identity Updates

Synchronizatio n

Group Managemen t

Identity Proliferation

Interface Selection

Change Control

ADMINISTRATION

AUTHENTICATION

AUTHORIZATION

AUDIT

Authentication Provides

Flexible Sign-on Methods

Supported Sources

Security Protocols

Assurance Methods

ADMINISTRATION

AUTHENTICATION

AUTHORIZATION

AUDIT

Authorization Provides

Entitlement Type

Access Policies

Enforcement Strategy

ADMINISTRATION

AUTHENTICATION

AUTHORIZATION

AUDIT

Audit Provides

Reporting

Alerting

Governance methods

Collection of data

USERS & DEVICES

PRIVATE

PUBLIC

INFRASTRUCTURE

APPS & SERVICES TRADITIONAL IT

IDENTITY HYBRID CLOUD

Innovate

Build a Plan

Assess

http://vishalrjoshi.com @vishalrjoshi vishal.joshi@microsoft.com

Modern Scalable Web Sites WebMatrix, VS, Command Line CI via Git, TFS OSS App Gallery

Full Windows Server/Linux Enterprise Apps using SQL, SharePoint, AD Porting exiting LOB apps

Multi-Tier Apps with Workers Admin Access, RDP, Custom Installs Network Isolation, Virtual Network

Pooled Resources

Self-Service

Elastic

Usage Based

Plus with Private Cloud

Control

Customizable

Its cloud, dedicated to you

All About the App

Cross-Platform From the Metal Up

Foundation For the Future

Cloud On Your Terms

Application Frameworks Management OS Hypervisor Fabric

Hypervisor Management

Infrastructure Monitoring

Heterogeneous Automation

PRODUCTIVE INFRASTRUCTURE

PREDICTABLE APPLICATIONS

YOUR CLOUD

Heterogeneous support Process automation Self-service infrastructure

monitoring Deep application application monitoring and diagnosis and diagnosis Comprehensive application Comprehensive application manageability manageability Service-centric approach Service-centric approach

Flexibility with delegation Flexibility with delegation and control and control Applications self-service across Applications self-service across clouds clouds

Physical, virtual, and cloud Physical, virtual, and cloud management management

Configure
App Controller Orchestrator

Deploy

Virtual Machine Manager

Self Service
App Owner

Service Model

Service Delivery & Automation

Operations Manager Configuration Manager Data Protection Manager


DC Admin

Service Manager

Service Manager

Monitor Operate

Application Management

Service Delivery & Automation

Infrastructure Management

ABSTRACTION
Server App-V abstracts the application from the OS, encapsulated in a consistent format and dynamically configured at deployment

CONSISTENCY
Service Templates provide standardized specifications for deploying applications, defining how they are configured and scaled

INSIGHT
Application Performance Monitoring provides the structure to define desired performance levels based on end user experiences

CONTROL
App Controller provides visibility of quota utilization across applications running in both on-premise and public-cloud contexts with a single role-based identity

Application Specification

Update Template and Apply to Service

Create Service Template

Deploy Service

Customize Deployment

Compatibility

Definition

Execution

Define which OS versions and editions the application will run on Windows 2003/2008 (x86, x64) Windows Server 2008 R2 (x64)

Capture the OS configuration and the SQL connection information Timezone, Product key, admin password, Domain join, dacpacs

Run pre-scripts, post-scripts, and executables as part of the application deployment Any commands and actions outside of the application

Deployment
Consistent configurations Named instances Product key injection for individualized installations

Configuration
Media sources Administrators and Security mode Network configuration SQL configuration file support

Service Accounts
Define accounts per profile SQL Service, Agent, and Reporting Services accounts Define via Run As Accounts

Connections
Data-Tier Application Packages capture connections Instance definition Authentication mode Upgrade and Migration behavior

SEQUENCE

DEPLOY

UPDATE

AVAILABLE

Create application packages from installers or installation procedures using Server App-V

Deploy and configure applications in a reliable and repeatable way through application profiles and Service Templates

Easily update applications that have previously been deployed through selfservice application management

Update the underlying operating system without losing deployed application state through application abstraction

HOSTS

RESOURCES

COMPONENTS

Virtualized Windows Services are registered with the Service Control Manager Web applications that run on top of IIS 6, 7, 7.5 All types of user accounts are supported (LocalSystem, Network Service, Domain Accounts)

Application binaries COM+ and DCOM Text-based configurations WMI providers

Registry settings COM Java apps .NET components

SSRS
Local users and groups

State-persisted information stored on the local disk

DELEGATION WITH CONTROL

EMPOWERING APPLICATION OWNERS

SINGLE MANAGEMENT POINT

Take advantage of standardized templates


Quota enforcement with clear guidance on utilization

Role-based access to content


Create, manage, and move resources between repositories

Private and public cloud services plus virtual machines


Job auditing and task progress Change history

Standardized Services Delegated Capacity


Production

Development

Assign dedicated and shared resources


Windows Server 2012/2008 R2 Hyper-V, VMware, Citrix XenServer Intel, AMD, OEM hardware Fiber Channel, iSCSI

Cloud Abstraction Configure & Deploy

COMPUTE
Deploy your compute resources, taking them from bare metal to fully deployed for your physical and virtualization hosts.

STORAGE
Discover, classify, and allocate storage for use by the private cloud. Provide the correct storage for use with appropriate access.

NETWORK
Abstract your complex networking infrastructure into logical networks for cloud use. Assign IP, virtual IP, and MAC addresses from pools and integrate with load balancers.

CLUSTER
Consolidate your fabric elements for use in a private cloud.

Download Boot from WINPE PXE

4 2
WDS server

Run generic command execution scripts Host and Group configure partitions

Authorize PXE boot

3
OOB reboot

Customize and domain join

8 5
Enable Hyper-V

contoso Host Group

1
VMM server

Hyper-V server Hyper-V server


Download Inject drivers VHD
VHD

9
Hyper-V server Hyper-V server

7 6
Drivers

Bare-metal server

Library server

Host profile

Service template (Multi-tier applications)


Web tier
Scale out & health policy

Application tier
Scale out & health policy
Custom Scripts App (Server Application server App-V)

Data tier
Scale out & health policy
Data (SQL) DAC Packs

IIS

Web (IIS) Web Deploy

SQL

HW profile

OS profile

App profile

HW profile

OS profile

App profile

HW profile

OS profile

App profile

Compute

Storage

Network

Server-Side

Client-Side

Synthetic

Monitoring the actual code that is executed and delivered by the application

End-user experiences related to page load times, server and network latency, and clientside scripting exceptions

Pre-recorded testing paths through the application that highlight availability, response times, and unexpected responses

Use the same tools to monitor with visibility across infrastructure and applications Infrastructure Monitoring

Application Specification

Define the resources and performance requirements for the application Provision application resources to the VMM library

Update the application and version control Deliver of on-going maintenance of the application and new version upgrades
Update Template and Apply to Service

Create Service Template

Move the application to production, add into maintenance routines, and configure APM
Start the deployment of the application, either by IT or by an App Owner through App Controller
Deploy Service

Create a new Service Template in the VMM library based on the application requirements

Publish Service Template, delegate authority and quota


Customize Deployment

Choose most appropriate cloud of server instances for the application

Evolution of Microsoft Client Management


2012 2011 2007 2003 1999 1994
SMS 1.0
2012

SMS 2.0

Client Management Infancy (NT Domain)

Groups Model

Laptops, Servers, Enterprise Scale

Comprehensive Management

Management from the Cloud

Consumerization of IT

Challenges to Enabling Consumerization Infrastructure Considerations


How can IT support Devices User and manage all Corporate Consumer those devices?

Management ofI want to use the diverse devicesdevice I prefer

I want to connect to Secure, anywhere people and be access to apps Application Experience productive & data anywhere, anytime

How can IT provide access to appsand andAccess data Security while maintaining security?

Empower Users

Unify Infrastructure

Simplify Administration

Empower people to be more productive from almost anywhere on almost any device.

Reduce costs by unifying IT management infrastructure.

Improve IT effectiveness and efficiency.

Empower

General Information Application Package


Administrator Properties End User Metadata

< >

Deployment Type
Detection Method Windows Script Windows Installer CAB Install Command Requirement Rules Dependencies

Supersedence

Reduced Infrastructure Requirements


Central Administration Site
Central primary site administration Reporting

Unify

Primary Sites
Client management and settings Delegated administration

Secondary Sites
Content routing Distributions points

Central Administration Site Primary Site Primary Site

Secondary Site

Secondary Site

Secondary Site

Secondary Site

Secondary Site

Secondary Site

(Against Known Threats)

Reactive Techniques

(Against Unknown Threats)

Proactive Techniques

DYNAMIC CLOUD UPDATES

APPLICATION

Dynamic Signature Service

FILE SYSTEM

Internet Explorer 8 SmartScreen

Microsoft AppLocker

Microsoft BitLocker

NETWORK

System Center Endpoint Protection Windows 7

Microsoft Malware Protection Center

Data Execution Prevention

Address Space Layout Randomization

User Account Control

Windows Resource Protection

Live system monitoring identifies new threats


Tracks behavior of unknown processes and known bad processes Multiple sensors to detect OS anomaly

RESEARCHERS

REAL-TIME SIGNATURE DELIVERY

BEHAVIOR CLASSIFIERS

REPUTATION

Updates for new threats delivered through the cloud in real time
Real time signature delivery with Microsoft Active Protection Service Immediate protection against new threats without waiting for scheduled updates

Microsoft Active Protection Service Properties/ Behavior Sample request Sample submit Real-time signature

Key Scenarios
Unified infrastructure

Forefront Endpoint Protection 2010


System Center Configuration Manager 2007 Separate install ConfigMgr distribution process Multiple sources (WSUS, File Share, Microsoft Update)

System Center 2012 Endpoint Protection


System Center 2012 Configuration Manager Unified setup Integrated Multiple sources with automatic deployment rules from ConfigMgr console

Unify Protect

Server setup Client deployment Signature updates Proactive protection Firewall management Role based administration Alerts and monitoring

Simplify

New Real time alerts

Reports

Additional user centric reports

Global Data
Global Data Site Data Content
CENTRAL ADMINISTRATION SITE

PRIMARY SITE

PRIMARY SITE

Available at: Central Administration Site and all Primary Sites Examples include Collection rules, Package metadata, Deployments, Security Scopes A subset of global data also goes to and from Secondary sites (Package metadata and status, Program metadata)

Site Data

SECONDARY SITE W/DISTRIBUTION POINT DISTRIBUTION POINT

Available at: Central Administration Site, Replicating Primary Examples include HINV, Status, Collection Membership Results

Content
DISTRIBUTION POINT CLIENT OS

Available where content has been distributed to a Distribution Point

Consumerization of IT

Environment RISE OF
%

Infrastructure Cost & Complexity

Percentage of information workers who report using at least one self-purchased device for work

Multi Generational Workforce

Amount of hours per week Chinese millennials spend using real time communication tools

95 70 15 34 1.2
THE CLOUD
%
%
Percentage of IT spend towards public and private cloud in 2011

Percentage of IT budgets spent maintaining inflexible & siloed data center equipment

Mobile & Distributed Workforce

Number of mobile users worldwide by 2013 (more than 1/3 of the worlds workforce)

Pay-as-you-go, per-user licensing


Complete Office experience with services integration Always the latest version of Office and Office Web Apps Familiar Office user experience

IM & Presence across firewalls


GAL/Skill search in SharePoint Online meeting with desktop sharing Windows Live federation

My Sites to manage and share documents Access documents offline Document-level permissions

25Gb mailbox with voicemail & unified messaging Integrated personal archiving Retention policies and legal hold

Share documents securely with Extranet Sites

Free/busy coexistence

Cohesive Process Combining 4 Pillars OSP323


Your Privacy Matters

Microsoft Office Leadership in 365 Independently Verified Security, Privacy, & Trust Transparency Friday (June 29th) - 8:30 AM

Relentless on Security

We respect your privacy

You know where data resides, who can access it and what we do with it

Compliance with World Class Industry standards verified by 3rd parties

Excellence in Cutting edge security practices

ADFS 2.0

Federated identity and single sign-on


Different identity options for your organization, including full support for single sign on with the cloud

Role-based access
More granular role based access for administrators, partners and end users

Simplified management
Remote PowerShell and fall through experience to specific services to gain similar server configuration control

Platform Web Services


New programmability layer allowing third parties to interact with platform

Office 365 Marketplace


Helps you find partner applications and services to complement the Office 365 platform

Microsoft Azure
Connect your platform with applications developed for Azure

OSP224
Microsoft Office 365 & Deployment Workload migration Management User migration flexibility flexibility Wednesday (June 27th) - 5:00 PM
Move or extend on-premises workloads to the cloud at your pace, move back from cloud to on-premises at will Keep some users on-line and some users on-premises or keep them all in a single environment

Single licensing agreement


Supports all scenarios, to help you optimize costs and transition when it make sense for your business

OSP324
Self service dashboard Microsoft Office 365 Service24x7 Reliability & Disaster Recovery Partner ecosystem support & community Friday (June 29th) - 10:15 AM
24x7 phone or online accessible IT-level support dedicated to Office 365 Broad community of 16,000+ WW partners and online community forums available to help you

The Service Health Dashboard provides current information about the service status accessible on the Web or via RSS

Kiosk worker offer


1 GB mailbox

Information worker offer


25GB mailbox

Outlook Web App only


POP & ActiveSync support Messaging, calendar, contacts Forefront antivirus & anti-spam SharePoint Access (0MB storage)

500MB SharePoint storage


Client Connectivity Mobility Lync capabilities Exchange & SharePoint capabilities

Site search capabilities


Office Web Apps

Office Professional Plus


On-premises access rights

Fast set up using auto detection with a single input of Office 365 ID and password Access to email, calendar, tasks, contacts with Outlook Mobile built in Access to Office documents with Office Mobile built in SharePoint Workspace Mobile designed to keep the mobile workforce up to date Instant messaging & online meetings with Lync Mobile app available as a free download in the Marketplace New security features

Admin
Web-based admin portal to manage users & settings Impersonation console for Delegate Admin Partners (DAPS)

End User
Mobile Synchronization of Exchange Online Email, Contacts, Calendar, Tasks, Notes, etc.

Role-based administration
Familiar admin console with functionality to reset device passwords, lock & wipe lost devices BES Express set of IT Policies Support for BlackBerry Balance

BlackBerry Balance Support


Web-based self-service console Device Switch, Backup & Restore Set Enterprise Activation Password Remotely Lock/Wipe Device

Enterprise-Only Wipe
Protection of corporate data

Familiar BlackBerry experience & performance

Extend the reach of Enterprise Data


Bring data from external systems into SharePoint and Office, interact with it, reuse it, and empower end users to gain insight into the underlying data in a reusable way.

Centrally manage reusable connections

Easily create custom solutions

Outlook
General Troubleshooting Calendar Connectivity OCAT

Word Excel PowerPoint

Q&A

Find
Find all documents and applications

Review
Review all documents and applications for issues and criticality

Test
Test all documents and applications that meet the importance bar

Keep Testing
Keep testing when finished, deploy

Is this cost effective?

Are you reducing risk?

Benefits

Manage Risks
Obtain as much data as possible to assess environment

Things Keep Working


IT is tasked with managing the environment, and must deliver

Predictable
Goal is no surprises during deployments

Tools
Heavy use of tools/ automation to provide data

Pitfalls

Lengthy evaluations Treats docs/apps equally Tools can misguide


12-18 months of evaluationbefore doing any work. Agility is hindered ROI is not evaluated against risk Tools provide technical data, not business data

Costly
Additional expenses to deploy and obtain value

Modern
Discover Rationalize Remediate Manage

Business collaboration Dont over discover Business Impact Large Scale Day 1 requirements On demand Obtain value Future Planning

Using Tools Goal Risk Challenge Suggestion

Automate: What do I need?

Using technical criteria to derive business value adds degrees of separation

Using any filtering introduces risk of False positives/negatives

Make sure your tool/criteria is closely aligned with business criticality or dont use the tool!

Testing
Automated Testing Smoke Tests User Tests

Augment skilled engineers Tune for deployment blocking issues only

Quick test pass Goal: find obvious issues to increase user cooperation rates

The only test that matters Final validation Supported by remediation engineering

Prioritization Selection and optimization Governance Resource planning Skills management Cost management

Portfolio Management

Project Management

Planning Project execution Risk management Business Intelligence Team collaboration Consistent processes

STRATEGIC ALIGNMENT

Resource Management

Collaboration & Communication

Key Scale Tools: The Caches

THEN

NOW

IDENTITY AND ACCESS MANAGEMENT

RESPONSIBILITY:
Data Classification and Accountability Host Level Controls Application Level Controls Identity and Access Management Network Controls Physical Security

IaaS

PaaS

SaaS

CLOUD CUSTOMER
CLOUD PROVIDER

Some of the measures we employ:

PERIMETER SECURITY

FIRE SUPPRESSION

MULTI-FACTOR AUTHENTICATION

EXTENSIVE MONITORING

Seoul, KR Seattle, WA Ashburn, VA

Bay Area, CA
San Antonio, TX

So Paulo, BR Sydney, AU

EXPECTED

UNEXPECTED

Enable interoperable access across networks

Provide well-managed, common identity infrastructure

Secure remote access to business resources

Integrated Identity service

Education
Administer and track security training

Process
Guide product teams to meet SDL requirements

Accountability

SECURITY FUNDAMENTALS

TECHNOLOGY INNOVATIONS

INDUSTRY LEADERSHIP

Ongoing Process Improvements 12 month cycle

Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk

Protects from unwanted communication User choice and control

Dependable, available Predictable, consistent, responsive service Maintainable Resilient, easily restored Proven, ready

Commitment to customer-centric interoperability Recognized industry leader, world-class partner Open, Transparent

Products, online services adhere to fair information principles

IDENTIFY threat & vulnerabilities

CALCULATE risks
REPORT risks across Microsoft cloud environment
case

ADDRESS risks based on impact assessment & business


TEST remediation effectiveness & residual risks MANAGE risks on an ongoing basis

I want to understand my compliance requirements.

I want to manage my IT environment in a compliant manner.

I design my IT environment in a compliant manner.

I want to report on the results of my compliance efforts.

AUTHORITY DOCUMENTS & RISKS

CONTROL OBJECTIVES

CONTROL ACTIVITIES

Discover regulatory requirements

Create Policy

Design Service

Align audit requirements

Consult guidance from organizations such as the Cloud Security Alliance

Know the value of your data and processes and the security and compliance obligations you need to meet Ensure a clear understanding of security and compliance roles and responsibilities for delivered services Ensure data and services can be brought back in house if necessary

Consider the ability of vendors to accommodate changing security and compliance requirements

Require transparency in security policies and operations

Why are we even discussing Active Directory?


Is there a session on running NOTEPAD.EXE in Windows Azure, too? (no, there isnt)

Vernacular
terminology specific to Windows Azure that will get us all on the same page

Considerations for a cloud-deployment

Why are we even discussing Active Directory?


Is there a session on running NOTEPAD.EXE in Windows Azure, too? (no, there isnt)

Vernacular
terminology specific to Windows Azure that will get us all on the same page

Considerations for a cloud-deployment

Information Protection
Discover, protect and manage confidential data throughout your business with a comprehensive solution integrated into the platform and applications
Protect everywhere, access anywhere Integrate and extend security Simplify security, manage compliance

Protect critical data wherever it


goes

Extend confidential

Protect data wherever


it resides

communication to partners and Microsoft applications

Simplify deployment and


ongoing management

Built into the Windows platform

Enable compliance with

Secure endpoints
to reduce risk

information security policy

Persistent Protection Encryption Policy: Access Permissions Use Right Permissions

Classification

Access Control

Auditing

RMS Protection

Modify / Create file

In-box content classifier 3rd party classification plugin

Save classification

Determine classification

Components

USER CLAIMS User.Department = Finance User.Clearance = High

DEVICE CLAIMS Device.Department = Finance Device.Managed = True

FILE PROPERTIES File.Department = Finance File.Impact = High

ACCESS POLICY For access to finance information that has high business impact, a user must be a finance department employee with a high security clearance, and be using a managed device registered with the finance department.

Classification
File inherits classification tags from parent folder Manual tagging by owner Automatic tagging Tagging by applications

Access Control
Central access policies based on classification Expression-based access conditions for user claims, device claims, and file tags Access denied remediation

Auditing
Central audit policies can be applied across multiple file servers Expression-based audits for user claims, device claims, and file tags Staging audits to simulate policy changes in a real environment

RMS Protection
Automatic Rights Management Services (RMS) protection for Microsoft Office documents

Near real-time protection when a file is tagged


Extensibility for non-Office RMS protectors

Information Protection
Discover, protect and manage confidential data throughout your business with a comprehensive solution integrated into the platform and applications
Protect everywhere, access anywhere Integrate and extend security Simplify security, manage compliance

Protect critical data wherever it


goes

Extend confidential

Protect data wherever


it resides

communication to partners and Microsoft applications

Simplify deployment and


ongoing management

Built into the Windows platform

Enable compliance with

Secure endpoints
to reduce risk

information security policy

Persistent Protection Encryption Policy: Access Permissions Use Right Permissions

Classification

Access Control

Auditing

RMS Protection

Modify / Create file

In-box content classifier 3rd party classification plugin

Save classification

Determine classification

Components

USER CLAIMS User.Department = Finance User.Clearance = High

DEVICE CLAIMS Device.Department = Finance Device.Managed = True

FILE PROPERTIES File.Department = Finance File.Impact = High

ACCESS POLICY For access to finance information that has high business impact, a user must be a finance department employee with a high security clearance, and be using a managed device registered with the finance department.

Classification
File inherits classification tags from parent folder Manual tagging by owner Automatic tagging Tagging by applications

Access Control
Central access policies based on classification Expression-based access conditions for user claims, device claims, and file tags Access denied remediation

Auditing
Central audit policies can be applied across multiple file servers Expression-based audits for user claims, device claims, and file tags Staging audits to simulate policy changes in a real environment

RMS Protection
Automatic Rights Management Services (RMS) protection for Microsoft Office documents

Near real-time protection when a file is tagged


Extensibility for non-Office RMS protectors

Groundbreaking Malware Resistance


Protect and Manage Threats

Protects the client, data, and corporate resources by making the client inherently secure and less vulnerable from the effects from malware.

Pervasive Device Encryption

Protect Sensitive Data

Simplifies provisioning and compliance management the of encrypted drives on the widest variety of PC form factors and storage technologies

Protect Access to Resources

Modernized Access Control

Modernizes access control and data management while increasing data security within the enterprise.

Z Z Z

Z Z

Z Z

ZW Z Z Z Z

Z ZW Z

Z Z

Z Z

ZW Z Z W Z Z

Z ZW Z

Z Z

Z Z

ZW Z Z W Z Z

Z ZW Z

Z Z

Z Z

ZW Z Z W Z Z

Z ZW Z

Z Z

Z Z

ZW Z Z W Z Z

Z ZW Z

Z Z

Z Z

ZW Z Z W Z Z

Windows Server 2012

Productive Infrastructure

Predictable Applications

Your Cloud
3

Cloud
Public Private Hybrid

Flexibility

Beyond Virtualization
Windows Server 2012 offers a dynamic, multi-tenant infrastructure that goes beyond virtualization to provide maximum flexibility for delivering and connecting to cloud services.

The Power of Many Servers, the Simplicity of One


Windows Server 2012 offers excellent economics by integrating a highly available and easy to manage multiserver platform with breakthrough efficiency and ubiquitous automation.

Every App, Any Cloud


Windows Server 212 is a broad, scalable and elastic server platform that gives you the flexibility to build and deploy applications and websites onpremises, in the cloud and in a hybrid environment, using a consistent set of tools and frameworks.

Modern Workstyle, Enabled


Windows Server 2012 empowers IT to provide users with flexible access to data and applications from virtually anywhere on any device with a rich user experience, while simplifying management and helping maintain security, control and compliance.

Scalability, Performance & Density

Security & Multitenancy

Flexible Infrastructure

High Availability & Resiliency

Scalability, Performance & Density

Security & Multitenancy

Flexible Infrastructure

High Availability & Resiliency

Hyper-V: A More Complete Virtualization Platform

Self-Service Service Mgmt. Protection Automation Monitoring VM Management Hypervisor

vCloud Director VMware Service Manager Data Recovery 2.0 vCenter Orchestrator
vCenter Ops Mgmt. Suite vFabric App Perf Mgr, vFabric Hyperic vCenter vFabric Application Director

App Controller Service Manager Data Protection Manager Orchestrator Operations Manager Virtual Machine Manager Hyper-V

vSphere Hypervisor

Self-Service Service Mgmt. Protection Automation Monitoring VM Management Hypervisor

vCloud Director VMware Service Manager Data Recovery 2.0 vCenter Orchestrator
vCenter Ops Mgmt. Suite vFabric App Perf Mgr, vFabric Hyperic vCenter vFabric Application Director

App Controller Service Manager Data Protection Manager System Center 2012 Orchestrator Operations Manager Virtual Machine Manager Hyper-V

vSphere Hypervisor

All About the App

Cross-Platform From the Metal Up

Foundation For the Future

Cloud On Your Terms

Constructing, Delivering & Consuming Apps

Maintaining, Managing & Monitoring Apps

Protection of Key Applications & Workloads

RemoteFX delivers a consistently rich user experience to users over LAN or WAN (irrespective of deployment model)

RemoteFX

Corporate LAN

Hardware and Software GPUs Rich multimedia USB Redirection Multi Touch

Internet or WAN

WAN acceleration

Single Sign On

Centralized Management
VDI helps deliver on this promise.

Anywhere, Any Device

Windows Server 2012 provides a scalable, easy to manage, and high fidelity VDI solution.

Data Security

BYOD

Simple to deploy, intuitive to manage, easy to expand at scale


Set up a simple VDI deployment easily and quickly Wizard-based setup and deployment for multiple scenarios Automatic creation of VM with settings

Easy Deployment

One, integrated console for roles, servers, collections, users, and VMs

Unified Administration

Consistent publishing apps and desktops Automate and manage at scale with Powershell

Master images for personal and pooled VMs

Streamlined VM Management

Avoid patch storms by queuing maintenance updates Streamlined VM mgmt: Fast sysprep, optimized logon, auto rollback

Key Platform Capabilities


A

B E

C F

User disk enables personalization on pooled VMs or sessions. User data and settings are stored on a separate vhd. Simplifies deployment of lower cost VDI (pooled VMs / Sessions) Fairshare ensures high performance across all user VMs / Sessions Dynamically distributes resources (bandwidth, CPU and I/O)

User Disks

Fair Share

Applicable to both Sessions and VMs

Direct Attached Storage, Network Attached Storage, and Clustered/SAN

Storage

Highly Available

Storage Configuration options to optimize for tiered storage Reduce storage cost while maximizing IOPS Active/Active Broker Scale-out File Server, HyperV Clustering Up to 32 nodes and 4000 VMs per cluster with Hyper-V Increase density further by using RDSH (>2X compared to VMs).

Simplified Management

Best VDI Platform Value

Rich Experience Everywhere

2012

2013 IE5 IE7

2014 IE8 IE9

2015 IE10

2016

Windows XP End of Support (EoS) is Coming

If you started planning your migration to Windows 7 today:

1 mo.

3 mos.

3 mos.

6-8 mos.

3 mos.

3 mos.

6-8 mos.

3 mos.

Feb 2012

May 2012

July 2012

Jan 2013

April 2013

July 2013

Dec 2013

March 2014

34

Centralized and Unified Management User State Applications UserAny State Virtually Application, Anywhere Applications Operating System

Change the Device, Keep your Experience


User Experience Virtualization (UE-V) Folder Redirection

Windows Everywhere
Microsoft VDI Client Hyper-V MED-V

Application Operating System Virtualization (App-V)


RemoteApp

Deliver virtualization to the user through a more comprehensive platform!

IE5

IE7
IE8 IE9

assess quickly

address the urgent

manage the important

increase value

apm capabilities

apm strategy

portfolio health

assess quickly

business goals

address the urgent

Govern

Manage Costs

Innovation

Manage the Important

Align to Business

Measure Business Value

Increase Portfolio Value

Innovation

Increase Value

Increase Maturity

Deliver the best Windows experience, embrace consumerization trends with enterprise-class management

Devices & Experiences Users Love Want

Enterprise-Grade Solutions

No Compromise Business Tablet

New Possibilities in Mobile Productivity

Enhanced End-toEnd Security

Management and Virtualization

You save two out of every three dollars when you deploy computing seats with WMS

66%

362

Microsoft.

The Total Economic Impact Of Microsoft Windows MultiPoint Server 2011, A Forrester Study Prepared for

Windows MultiPoint Server

Windows 8 Desktop

Windows 8 Desktop

Windows 8 Desktop

Windows 8 Desktop

363

Windows MultiPoint Server

USB Video Connect

Direct Video Connect

Repurposed PC/Laptop

LAN Thin Client

364

MultiPoint Server

LAN Thin Client

Repurpose d PC

Direct Video Connect

USB Video Connect

Broad client support local stations and thin clients

Desktop Orchestration monitor, control, collaborate

Simplified Administration non-IT Pro

Familiar Windows Experience Windows 8 user experience

Disk Protection reboot to known-good-state

Application Compatibility simple, single box VDI

365

1
Network virtualization

2
DHCP server failover

3
Single Root I/O Virtualization (SR-IOV)

4
Resource Metering

NIC Teaming

6
Dynamic Virtual Machine Queue IP Address Management (IPAM)

7
Quality of Service (QoS)

9
SMB Direct and Multichannel

10

BranchCache

1
Hyper-V Network Virtualization Shared-nothing live migration

3
Cluster enhancements

Massive scale

Hyper-V Replica

6
Hardware offloading Virtual Fibre Channel

7
Guest NUMA support

8
Runtime memory configuration

9
Hyper-V network switch

10

1
Website density and mutlitenancy Application Initialization

2
Dynamic IP Restrictions

4
NUMA-Aware Scalability

CPU Throttling

6
Centralized SSL management Just works with PHP and node.js

7
Embracing web standards

8
Application symmetry

9
Comming Development Platform

10

TOP FEATURES FOR SECURITY & ACCESS


1
Dynamic Access Control

3
Simpler deployment of Active Directory

4
Domain Name System Security Extensions

Classification

DirectAccess

6
Active Directory virtualization Active Directory cloning

7
Kerberos constrained delegation

8
Private virtual LAN (PVLAN)

9
Multitenant security and isolation

10

TOP FEATURES FOR VDI

SIMPLIFIED USER CONNECTION

USER PROFILE DISKS

FAIR SHARE SESSION VIRTUALIZATION

INTELLIGENT PATCHING

RDS SMART CACHE

QUICK VDI WIZARD

CONCURRENT REDIRECT

REMOTE FX ADAPTIVE GRPHICS

REMOTE FX OVER WAN

REMOTE FX USB REDIRECTION & TOUCH

Beyond virtualization

Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services

The power of many servers, the simplicity of one


Every app, any cloud

Efficiently manage infrastructure while maximizing uptime and minimizing failures and downtime

Build on an open and scalable web platform that supports applications across premises

Modern workstyle, enabled

Support a mobile and flexible work style

Administration

Sample Scripts

CMDB: Fabric state UI: Initiate workflows

Orchestration

Orchestrator Integration Packs OnCommand Plug-In for Microsoft UCS Integration Pack for System Center Orchestrator Management Packs SCVMM PRO Tips OnCommand Plug-In for Microsoft UCS Management Pack for System Center Operations Manager PowerShell Tool Kit Data ONTAP PowerShell Toolkit

End-to-end Workflows

Management

Manage Processes and Operations

Automation

Centralized Automation and Configuration

SnapDrive for Windows

Virtualization

SnapManager for Hyper-V Cisco UCS Service Profiles

Virtualization and Resource Pools

Hardware

WS-Man PowerShell SMI-S Interfaces

Data ONTAP Cisco UCS

Management and Provisioning

3 Million HOSTED

Hosting growth is

3X that of

on-premises

The Opportunity 19 Million

Off-premises instances will grow

Windows Server Instances Install Base (Physical + Virtual)

between now & 2015

90%

Source: Microsoft, Spring 2012

Service Delivery & Automation

Windows Server 2012


Web Virtualization Networking Availability Scalability Security Applications Storage Remote Desktop Services Management

Application Management

Infrastructure Management

Infrastructure

Enabling the Mobile Workforce: Unified Remote Access


Great User Experience
Unified Remote Access management
Works with existing networks

Off premise provisioning


Hybrid Cloud VPN interoperability with mobile devices

Scale and Performance

Reporting and accounting Integrated client experience


Enhanced authentication Connect through local server

High performance in virtual environments

Deployment and Monitoring

Enabling New Scenarios

High availability Thousands of users per server

Consistent Customer Feedback


Less expensive storage solutions

File-based access storage option

Reliability & continuous availability

Server Storage in Windows Server 2012

Enterprise storage on industrystandard server hardware

its

Cloud

Private Cloud

Public Cloud

Service

Capacity on Demand
394

Authentication

Virtualization

Common Management Platform

Self-Service Model

Hybrid Deployment

395

Private Cloud Management


Virtual Machine Manager Configuration Manager Operations Manager Data Protection Manager Service Manager Orchestrator Application Controller

Application Management
Physical, virtual, and cloud Consistent user experience Self-servicing Beyond virtualization Deep application insights

Service Delivery Management


Workflow Task automation Process orchestration Change management

Infrastructure Management
Configuring Deploying Monitoring Operating Heterogeneous environment Data security

396 396

Overview

Deployment

Operations

New in DNS

Flexible Different cloud architectures to fit your needs

Efficient - Supports existing architectures, and promotes new more efficient ones.
Detailed guidance and configuration scripts on TechNet System Center 2012 SP1 to manage it all !

1. Worldwide Enterprise Server Cloud Computing 20102014 Forecast IDC, May 2010 2. WW Enterprise Server Cloud Computing, 2011-2015 IDC 2011 3. Cloud Computing Attitudes IDC, April 2010 4. IDC, 2011, Market Analysis Perspective: Worldwide Datacenter Trends and Strategies 5. Cloud Sizing by Delivery Model and Geography Oliver Wyman, Sep 2010 6. IDC WW System Infrastructure Software Predictions

Best in class

Storage

VirtualSystem

Servers

Networking

CloudSystem

Software
AppSystem

HP Infrastructure

Deep Management

Microsoft Infrastructure

Services

Optimized rack & blade server configurations Converged, scale-out storage High performance, secure LAN and SAN connections

Intelligent rack & power management Integrated system & storage management

Windows Server 2008 R2 Microsoft System Center 2012

Factory integration Installation & support Consulting Holistic delivery

Virtualization
Transformation Experience Workshop 1 Day
Executive visioning workshop to align customer strategy and outline the way forward

Cloud
Virtualization Assessment VirtualSystem, Start Service Migration, Integration Services Custom
Migrate workloads into VirtualSystem and further integrate into the data center

Services for partner cloud

Services for Exchange Private Cloud 45 Days or Custom


Layered on top of Compute Service; Based on Exchange 2010*

4 Weeks
Discover and analyze Find a platform current systems to designed for virtual understand best computing or build candidates for toward partner cloud virtualization solution Included in VS1 and VS2 SOW needed for VS3

30 Days or Custom
Integration of HW, Microsoft Hyper-V, and SC Suite*

Growth

Innovation

Team

Cloud

66%
run

14%

20%

transform

grow

EXPLOSIVE DATA GROWTH

PROLIFERATION OF DEVICES

BUDGET REDUCTIONS

IT CONSTRAINTS

Companies are under pressure to do more with less

ENABLING DEVICES

AVAILABILITY

ROLE & DEVICE DRIVEN PRIVILEGES

ALLOW CUSTOMERS & PARTNERS

Companies must facilitate productivity without impacting security

ADAPTING TO CLOUD

RAPID ON-BOARDING OF SERVICES

MERGERS & ACQUISITIONS

PROLIFERATION OF GROUPS & USERS

Management must adapt rapidly to changing business needs

f
RAPID RESPONSE PROTECT WHILE EXTENDING CENTRALIZE & STANDARDIZE REPORT & AUDIT

Companies need an integrated security strategy

EMPOWER USERS

TAKE CONTROL

PLAN FOR THE FUTURE

Incorporating Identity into your environment can transform your business

o Single View Mgmt. o Application of Business Rules o Automated Requests, Approvals, and Access Assignment

o User Sign-on Experience o Trusted Source o Standard and Secure Protocols o Level of Assurance

o How and where are authorizations handled o Can a user access the resource and what can they do when they access it?

o Track who does what, when, where and how o Focused Alerting o In-Depth Collated Reporting o Governance

ADMINISTRATION

AUTHENTICATION

AUTHORIZATION

AUDITING

EDW Regulatory Monitoring OA&M OLTP TX SLA Monitoring VAR


0

micro-

milli-

second

minute

hour

day

week

month

2. Service call 1. Schedule service

3. Dynamic dispatch 6. Notification 4. GPS Telemetry

5. Notification

AZR316: Extending Enterprise Networks to Windows Azure

UDP

Loadbalancing for virtual machines Custom loadbalancer probes

LB

Server

>_

application building blocks

Discovery
Buyers confidently browse, discover, purchase, and use new content. The Marketplace is provided by a trusted brand and provides immediate access to the content consumers demand. No high-pressure sales pitches, no hidden strings, no hassles.

Ecosystem
Marketplace provides integration between content and the apps that depend on it. Office, SQL Server, Visual Studio, and other data apps are easily connected to Marketplace. The Marketplace invests in building out highquality connections so individual content providers dont have to.

Monetization
Particularly important for smaller content providers, the Marketplace manages the challenges of selling abroad. Marketplace eliminates the complexity of international business so Content Providers can focus on content.

Infrastructure
Marketplace provides account management, authorization, metering, throttling, localized UI, and a variety of other services backed by Microsofts world-class cloud computing resources.

Premium Data & Services


The Marketplace offers more than 15 categories of highquality curated data and data services. Publishers of premium data and Web services enjoy the full breadth of Marketplace services.

Premium Cloud Apps


Cloud Application developers depend on the Marketplace to manage the business of selling access to their applications, focusing instead on giving buyers the best value from their purchases.

Free Data & Services


Premium data and services often add insight on top of publically available knowledge. The Marketplace encourages Content Providers to distribute their free data to give uniform access to our ecosystem.

Catalog Apps
Apps that do not yet take advantage of Marketplace services can become more discoverable by being listed in the Marketplaces extensive application catalog.

Sophisticated Design Environment

Productive Authoring Re-use of insights Flexible layout

Visual data representation Highly Interactive Rich Presentation

Report Viewer Controls


Rich Design Capabilities

Report Designer

Report Builder

Power View

Embedded

Operational

Business

SharePoint Farm
Web Front End
Power View client

App Server
SSDT BISM Model

Excel PowerPivot

Heterogeneous Data sources

Power View with DAX Addition and Subtraction Power View with DAX Time Intelligence Inventory Calculations Standard Deviation & Variance Text Functions Define Your Own Context

Ratios

Rank

SQL Server Object Explorer T-SQL Editor

T-SQL IntelliSense T-SQL Debugging View/Edit Data

Drift Detection Schema Comparison

Table Designer View Code Error Information

Go To Definition Find All References Refactoring

Source Code Based F5 Debugging & Testing with LocalDB

Source Code Control MSBuild Headless Command Line Tools

Point-in-time Snapshots Visualize Schema Differences T-SQL Static Code Analysis

Model Based Incremental Schema Deployment

SQL Server 2005 SQL Server 2008 SQL Server 2012 SQL Azure Retargeting Support

DACPAC Connected SQL Script

Format Engine API & REDIST

CONNECTED DEVELOPMENT

PROJECT BASED DEVELOPMENT

Worldwide PC Market: 4Q11 Review,

I want to connect to people and be productive anywhere, anytime How can IT support and manage all those devices?

Security and Access

Data Protection

100,000 Windows Phone Apps

50 Languages
Apps available in 180+ countries

PEOPLE

vs.

ICONS

180+ 123 31

Windows Phone 7.x

38 Countries

180+ Countries
Windows Phone 8.0

Available today

Coming this year

What about Windows Phone 8?

Global customer base, moving to Hybrid IT

Create new, high-value services on top of a unified cloud platform

Lower your costs with insights derived from some of the worlds largest public cloud services

Infrastructure

DEVELOP

TEST
We test software and online search results to help clients market and sell high-quality, relevant applications in global markets

Enabling every touch point of the global customer lifecycle

We create locally relevant sales and marketing content to accelerate our clients global revenue.

SUPPORT
We author and illustrate technical documentation for clients who serve and support customers in global markets

TRANSLATE
We translate our clients applications and content, enabling them to deliver a superior customer experience worldwide

We manage our clients business-critical product and content releases in hundreds of global markets and languages

MANAGE

Future of Communications Communications Today


Instant Messaging (IM) Voice Mail Video Conferencing Telephony Web Conferencing E-mail and Calendaring Audio Conferencing

Telephony and Voice Mail

E-mail and Calendaring

Unified Conferencing: Audio, Video, Web

Instant Messaging

Authentication Administration Storage

Authentication Administration Storage

Authentication Administration Storage

Authentication Administration Storage

Authentication Administration Storage

Authentication

Authentication

Authentication Administration Storage

Administration Storage
Storage Compliance

Administration

On-Premises

Hybrid

In the Cloud

2 6
10

5
9

7
11

8
12

2 1

2 3

4 3

5 4

5 6

6 7

10

7 8

10

11

8 9

10

11

12

10 9

10

11

12

11 10

11

12

11 12

12

Vous aimerez peut-être aussi