Académique Documents
Professionnel Documents
Culture Documents
Lorem ipsum
Dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam
dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur adipiscing elit. dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur adipiscing elit. dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur adipiscing elit.
dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur adipiscing elit. dolor sit amet, consectetur adipiscing elit. Aliquam suscipit mattis diam venenatis varius. Consectetur
Lorem ipsum
Dolor sit
dolor sit amet, c adipiscing elit. A mattis diam ven Consectetur adi
Key concepts
Virtualization
Homogenization
Resiliency
Elasticity
Automation
Asap asynchronicity
Metered Use
Packaged Services
Packaged solution for deploying highlyautomated datacenter and cloud services
Deployment Framework
Frameworks for assessing, planning, and deploying datacenter capabilities
Extensible Platform
Solution platform provides capability for extensions and value-added services
REDUCED COSTS
FLEXIBILITY
AGILITY
EASY TO IMPLEMENT
MANAGED CHANGE
Windows Azure
Windows Azure
web sites
shared
SHARED INSTANCES
shared
reserved
PUBLIC
Identity
PRIVATE
Build game.
Profit.
Start Simple
start free, scale up and out as you go, friction-free and without the headaches
Be Brilliant
with asp.net, php or node.js, develop on Windows, OSX or Linux
Linux)
GIT : FTP
On-Premises
Applications
Data Custom Software Native Code Firewall Network O/S Virtualization Hardware
Virtual Machines
Applications
Data Custom Software Native Code Firewall Rules Virtual Network O/S
Cloud Services
Applications
Data
Web Sites
Applications
Data
Startup Tasks
Native Code Firewall Rules Virtual Network
Long Running
Custom Authoring
Report Designer
Report Builder
Power View
Embedded
Operational
Business
Install SSRS in SharePoint Integrated mode Configuration settings are stored in SharePoint DB
Execution log in alerting database Trace Log is in SSRS trace log and ULS
Use performance counters to determine overloading & scale-out requirements More frequent alerts will require more resources
Discovery
Buyers confidently browse, discover, purchase, and use new content. The Marketplace is provided by a trusted brand and provides immediate access to the content consumers demand. No high-pressure sales pitches, no hidden strings, no hassles.
Ecosystem
Marketplace provides integration between content and the apps that depend on it. Office, SQL Server, Visual Studio, and other data apps are easily connected to Marketplace. The Marketplace invests in building out highquality connections so individual content providers dont have to.
Monetization
Particularly important for smaller content providers, the Marketplace manages the challenges of selling abroad. Marketplace eliminates the complexity of international business so Content Providers can focus on content.
Infrastructure
Marketplace provides account management, authorization, metering, throttling, localized UI, and a variety of other services backed by Microsofts world-class cloud computing resources.
Catalog Apps
Apps that do not yet take advantage of Marketplace services can become more discoverable by being listed in the Marketplaces extensive application catalog.
Evolution of Virtualization
35%
REDUCE COST
90%
COOLING
95%
FLOOR SPACE
89%
ADMINISTRATIO N
75%
Persisted formatting
Power View with DAX Addition and Subtraction Power View with DAX Time Intelligence Inventory Calculations Standard Deviation & Variance Text Functions Define Your Own Context
Ratios
Rank
The problem:
Finding
BI solution created by user. Context is only for user & exists as document.
My Context
BI Solution created by power user. Context: small team & managed on a server.
Our Context
BI Solution created by IT, Established corporate context & is reusable, scalable and backed up.
Visio & Visio Services Excel & PowerPivot Report Builder Excel Services PerformancePoint Services Reporting Services SQL Reporting Services SQL Integration Services SQL Analysis Services
SQL Server 2005 SQL Server 2008 SQL Server 2012 SQL Azure Retargeting Support
Microsoft Services Excel IBM DB2 SQL Data Files Server Oracle Others Feeds (OLE DB/ODBC)
After you upgrade the first server, additional servers that are not yet upgraded will become unavailable.
Running app
Windows Runtime
Running app
Windows Runtime
Windows reimagined
Cloudconnected
Consumer
Examples
B2C
LOB ISV
Custom LOB
Headtrax
Expense Approval
PLM
Windows Store or Side-loaded Tech Company
Company News
Side-loaded Enterprise
Consumer
Business
Authentication
Multi-factor authentication
Credential Picker and Shared User Certificates
Security
Crypto APIs
App Signing
tools
DESIGN TASKS
CODING TASKS
Code editing Refactoring Debugging Code analysis Profiling
Private
Private Public
Public
Block and File Storage Array, pool, logical unit, file server, file share Host Storage Disk, volume, initiator port, virtual disk
Indicates Storage SLA or Performance Guarantee Assigned to Storage Pool and Inherited by Logical Units and File Shares
Creation of Logical Units (Thick, Thin, Snapshot, Clone) and File Shares
Assignment of Logical Units and File Shares to Hyper-V servers Allocation of Storage to Host Groups and Clouds Host Disk Initialization, Partitioning, Volume Formatting
Disk Initialization, Partitioning, and Formatting Add and Remove Cluster Available Storage
Add and Remove Cluster Shared Storage
VMM Tested NetApp, EMC, HP, Dell EQL, LSI Partner Testing Hitachi, Fujitsu, Dell, IBM, StarWind (Development in Progress for Others)
SMI-S 1.3/1.4 Providers Attendance at SMI Lab Plugfests SMI-S Supported in Windows Server 2012
Test Harness Developed by VMM Team Provided to All Partners Primitives and End to End Scenarios (Functionality and Scale)
Per Service
Select Tier Based on Deployment Order
Per Machine
Per Guest OS
Per Application
Updat e Service
Deploy
Service
Install Application
Done
Built-In Step
Per Service
Select Tier Based on Servicing Order Select Machine Based on Upgrade Domain
Per Machine
Per Guest OS
Per Application
In-Place Updating
Uninstall Application
Install Application
Done
Built-In Step
Per Service
Select Tier Based on Servicing Order Select Machine Based on Upgrade Domain
Per Machine
Per Guest OS
Per Application
Remove from Load Balancer Add Data Disk to Machine Swap OS Disk Customize New OS Install Application Server App-V Backup State
Built-In Step
Empower Users
Unify Infrastructure
Simplify Administration
Empower people to be more productive from almost anywhere on almost any device.
Settings Management
Settings Management
Settings Management
Monitor drift from desired state Remediate issues impacting setting of desired state
Endpoint Protection
Enable the product Define standards for protection (AM Policy, Definitions, Alerts)
Endpoint Protection
Enable and deploy EP client Actively monitor for malware based on AM policy
Endpoint Protection
Clients remediate malware and rapidly report state Admin intervenes where required
Collections
Role-based Access
Create Templates
Create SUM administrators and assign to collections for which they need to manage updates
SUM Admin goes through the distribute software updates wizard and saves his default settings for deployments
Template
Note: for multiple SUM admins you can also use scopes to further secure console objects
Assessing Compliance
Software updates
Scanning for compliance Measuring compliance Remediation strategy
Remediating Non-compliance
Software updates
Deploying monthly updates Monitoring ongoing compliance
Settings Management
Settings Management
Configure
App Controller Orchestrator
Deploy
Self Service
App Owner
Service Model
Service Manager
Service Manager
Monitor Operate
Application Management
Infrastructure Management
Multi-tenancy
Partner Enablement
Virtual Servers
Configure Deploy
DC Admin Configuration Manager
Physical Servers
VM VM VM VM
VM
VM
ABSTRACTION
Take the underlying infrastructure of networking, storage, and compute, and abstract those resources into clouds.
HETEROGENEITY
Create cloud abstractions across virtualized infrastructure from Microsoft, VMware, and Citrix.
ACCESS
Manage resource utilization and service creation by delegating self-service access to cloud resources.
CONTROL
Standardize application deployment by using templates.
Better together
App Owner
Situation:
Traditional Datacenter
Business often views themselves as held hostage by IT They cannot introduce new IT solutions Very high cost of operations
Situation:
Server sprawl due to dedicated server per application Infrastructure is complex IT budget is less
DC Admin
Traditional Datacenter Multiple tools and manual processes result in long request fulfillment times, High operations costs and complex maintenance protocols Less-than-secure environments.
Business
IT receives request Request Initiated Provisioning Silos of resources Oversubscription Increase d IT costs
IT
Overprovisioning
CONFIGURE DEPLOY
App Owner
Self-Service
SERVICE MODEL
DC Admin
APPLICATION MANAGEMENT
INFRASTRUCTURE MANAGEMENT
Virtual Servers
DC Admin
Storage
Network
Virtual Servers
Deploy Configure
Microsoft System Center Configuration Manager
DC Admin
Physical Servers
Resource Utilization
Optimization Threshold
Time of Day
DC Admin
Application Tier
Scale-out and health policy
Data Tier
Scale-out and health policy
Application Server
HW profile
OS profile
App profile
HW profile
OS profile
App profile
HW profile
OS profile
SQL profile
W2K8R2.VHD
OS Settings
ConfigurationApplication Virtualizatio n
DC Admin
OPERATIONS MANAGER
Virtual Servers
DC Admin
Storage
Physical Servers
REDUCED COSTS
HIGHLY AUTOMATED
EFFECTIVE CONTROL
CENTRALIZE D MANAGEMEN T
SELF SERVICE
RAPID GROWTH
EFFICIENT
DC Admin
Configure
App Controller Orchestrator
Deploy
Self Service
Consumer
Service Model
Service Manager
Service Manager
Monitor Operate
Application Management
Infrastructure Management
STANDARDIZATION
SELF SERVICE
AUTOMATION
Give Consumers of IT services the ability to identify, access and request services as needed
Compliance with Regulation Define the request offerings that Increased Reliability will be part of a service offering Simplicity of Choice
Identify who needs to be involved (approvals, notifications, fulfillment) Create templates to capture process for request fulfillment
Increased Customer Satisfaction Request offerings Reduceddisplayed Costs based on user role Nothing Lost in Translation
Controlled empowerment Intuitive, easy to navigate portal Self-service reporting
Faster Time to Automate routing ofDelivery requests for approval and manual steps Reduced Costs
Traditional Approach
Unstructured Data Structured Data
Information
Collaboration
Combining business intelligence with collaboration and social software enables a higher quality decision making process.
People
Collaborative
Connect people & information On the most popular collab. platform Driving faster, more reliable decisions
Complete
Complete & integrated With IT Monitoring & Oversight On consistent & credible data from any source
On Your Terms
Flexibility & choice Scales from the desktop to the datacenter Priced for broad deployment
Microsoft BI Architecture
Connect and Provision Monitor and Manage Deploy and Future Proof
AGILITY
CONTROL
Preferred Owners
Possible Owners
VM Priority
A private cloud is a new model for IT delivery. It turns a datacenters infrastructure resources into a single compute cloud and enables the key benefits of cloud computing:
1 5 9
2
6 10
3 7 11
4 8 12
66%
run
14%
20%
transform
grow
PROLIFERATION OF DEVICES
BUDGET REDUCTIONS
IT CONSTRAINTS
ENABLING DEVICES
AVAILABILITY
ADAPTING TO CLOUD
f
RAPID RESPONSE PROTECT WHILE EXTENDING CENTRALIZE & STANDARDIZE REPORT & AUDIT
EMPOWER USERS
TAKE CONTROL
PRIVATE
PUBLIC
INFRASTRUCTURE
o Single View Mgmt. o Application of Business Rules o Automated Requests, Approvals, and Access Assignment
o User Sign-on Experience o Trusted Source o Standard and Secure Protocols o Level of Assurance
o How and where are authorizations handled o Can a user access the resource and what can they do when they access it?
o Track who does what, when, where and how o Focused Alerting o In-Depth Collated Reporting o Governance
ADMINISTRATION
AUTHENTICATION
AUTHORIZATION
AUDITING
ADMINISTRATION
AUTHENTICATION
AUTHORIZATION
AUDIT
Administration Provides
Identity Updates
Synchronizatio n
Group Managemen t
Identity Proliferation
Interface Selection
Change Control
ADMINISTRATION
AUTHENTICATION
AUTHORIZATION
AUDIT
Authentication Provides
Supported Sources
Security Protocols
Assurance Methods
ADMINISTRATION
AUTHENTICATION
AUTHORIZATION
AUDIT
Authorization Provides
Entitlement Type
Access Policies
Enforcement Strategy
ADMINISTRATION
AUTHENTICATION
AUTHORIZATION
AUDIT
Audit Provides
Reporting
Alerting
Governance methods
Collection of data
PRIVATE
PUBLIC
INFRASTRUCTURE
Innovate
Build a Plan
Assess
Modern Scalable Web Sites WebMatrix, VS, Command Line CI via Git, TFS OSS App Gallery
Full Windows Server/Linux Enterprise Apps using SQL, SharePoint, AD Porting exiting LOB apps
Multi-Tier Apps with Workers Admin Access, RDP, Custom Installs Network Isolation, Virtual Network
Pooled Resources
Self-Service
Elastic
Usage Based
Control
Customizable
Hypervisor Management
Infrastructure Monitoring
Heterogeneous Automation
PRODUCTIVE INFRASTRUCTURE
PREDICTABLE APPLICATIONS
YOUR CLOUD
monitoring Deep application application monitoring and diagnosis and diagnosis Comprehensive application Comprehensive application manageability manageability Service-centric approach Service-centric approach
Flexibility with delegation Flexibility with delegation and control and control Applications self-service across Applications self-service across clouds clouds
Physical, virtual, and cloud Physical, virtual, and cloud management management
Configure
App Controller Orchestrator
Deploy
Self Service
App Owner
Service Model
Service Manager
Service Manager
Monitor Operate
Application Management
Infrastructure Management
ABSTRACTION
Server App-V abstracts the application from the OS, encapsulated in a consistent format and dynamically configured at deployment
CONSISTENCY
Service Templates provide standardized specifications for deploying applications, defining how they are configured and scaled
INSIGHT
Application Performance Monitoring provides the structure to define desired performance levels based on end user experiences
CONTROL
App Controller provides visibility of quota utilization across applications running in both on-premise and public-cloud contexts with a single role-based identity
Application Specification
Deploy Service
Customize Deployment
Compatibility
Definition
Execution
Define which OS versions and editions the application will run on Windows 2003/2008 (x86, x64) Windows Server 2008 R2 (x64)
Capture the OS configuration and the SQL connection information Timezone, Product key, admin password, Domain join, dacpacs
Run pre-scripts, post-scripts, and executables as part of the application deployment Any commands and actions outside of the application
Deployment
Consistent configurations Named instances Product key injection for individualized installations
Configuration
Media sources Administrators and Security mode Network configuration SQL configuration file support
Service Accounts
Define accounts per profile SQL Service, Agent, and Reporting Services accounts Define via Run As Accounts
Connections
Data-Tier Application Packages capture connections Instance definition Authentication mode Upgrade and Migration behavior
SEQUENCE
DEPLOY
UPDATE
AVAILABLE
Create application packages from installers or installation procedures using Server App-V
Deploy and configure applications in a reliable and repeatable way through application profiles and Service Templates
Easily update applications that have previously been deployed through selfservice application management
Update the underlying operating system without losing deployed application state through application abstraction
HOSTS
RESOURCES
COMPONENTS
Virtualized Windows Services are registered with the Service Control Manager Web applications that run on top of IIS 6, 7, 7.5 All types of user accounts are supported (LocalSystem, Network Service, Domain Accounts)
SSRS
Local users and groups
Development
COMPUTE
Deploy your compute resources, taking them from bare metal to fully deployed for your physical and virtualization hosts.
STORAGE
Discover, classify, and allocate storage for use by the private cloud. Provide the correct storage for use with appropriate access.
NETWORK
Abstract your complex networking infrastructure into logical networks for cloud use. Assign IP, virtual IP, and MAC addresses from pools and integrate with load balancers.
CLUSTER
Consolidate your fabric elements for use in a private cloud.
4 2
WDS server
Run generic command execution scripts Host and Group configure partitions
3
OOB reboot
8 5
Enable Hyper-V
1
VMM server
9
Hyper-V server Hyper-V server
7 6
Drivers
Bare-metal server
Library server
Host profile
Application tier
Scale out & health policy
Custom Scripts App (Server Application server App-V)
Data tier
Scale out & health policy
Data (SQL) DAC Packs
IIS
SQL
HW profile
OS profile
App profile
HW profile
OS profile
App profile
HW profile
OS profile
App profile
Compute
Storage
Network
Server-Side
Client-Side
Synthetic
Monitoring the actual code that is executed and delivered by the application
End-user experiences related to page load times, server and network latency, and clientside scripting exceptions
Pre-recorded testing paths through the application that highlight availability, response times, and unexpected responses
Use the same tools to monitor with visibility across infrastructure and applications Infrastructure Monitoring
Application Specification
Define the resources and performance requirements for the application Provision application resources to the VMM library
Update the application and version control Deliver of on-going maintenance of the application and new version upgrades
Update Template and Apply to Service
Move the application to production, add into maintenance routines, and configure APM
Start the deployment of the application, either by IT or by an App Owner through App Controller
Deploy Service
Create a new Service Template in the VMM library based on the application requirements
SMS 2.0
Groups Model
Comprehensive Management
Consumerization of IT
I want to connect to Secure, anywhere people and be access to apps Application Experience productive & data anywhere, anytime
How can IT provide access to appsand andAccess data Security while maintaining security?
Empower Users
Unify Infrastructure
Simplify Administration
Empower people to be more productive from almost anywhere on almost any device.
Empower
< >
Deployment Type
Detection Method Windows Script Windows Installer CAB Install Command Requirement Rules Dependencies
Supersedence
Unify
Primary Sites
Client management and settings Delegated administration
Secondary Sites
Content routing Distributions points
Secondary Site
Secondary Site
Secondary Site
Secondary Site
Secondary Site
Secondary Site
Reactive Techniques
Proactive Techniques
APPLICATION
FILE SYSTEM
Microsoft AppLocker
Microsoft BitLocker
NETWORK
RESEARCHERS
BEHAVIOR CLASSIFIERS
REPUTATION
Updates for new threats delivered through the cloud in real time
Real time signature delivery with Microsoft Active Protection Service Immediate protection against new threats without waiting for scheduled updates
Microsoft Active Protection Service Properties/ Behavior Sample request Sample submit Real-time signature
Key Scenarios
Unified infrastructure
Unify Protect
Server setup Client deployment Signature updates Proactive protection Firewall management Role based administration Alerts and monitoring
Simplify
Reports
Global Data
Global Data Site Data Content
CENTRAL ADMINISTRATION SITE
PRIMARY SITE
PRIMARY SITE
Available at: Central Administration Site and all Primary Sites Examples include Collection rules, Package metadata, Deployments, Security Scopes A subset of global data also goes to and from Secondary sites (Package metadata and status, Program metadata)
Site Data
Available at: Central Administration Site, Replicating Primary Examples include HINV, Status, Collection Membership Results
Content
DISTRIBUTION POINT CLIENT OS
Consumerization of IT
Environment RISE OF
%
Percentage of information workers who report using at least one self-purchased device for work
Amount of hours per week Chinese millennials spend using real time communication tools
95 70 15 34 1.2
THE CLOUD
%
%
Percentage of IT spend towards public and private cloud in 2011
Percentage of IT budgets spent maintaining inflexible & siloed data center equipment
Number of mobile users worldwide by 2013 (more than 1/3 of the worlds workforce)
My Sites to manage and share documents Access documents offline Document-level permissions
25Gb mailbox with voicemail & unified messaging Integrated personal archiving Retention policies and legal hold
Free/busy coexistence
Microsoft Office Leadership in 365 Independently Verified Security, Privacy, & Trust Transparency Friday (June 29th) - 8:30 AM
Relentless on Security
You know where data resides, who can access it and what we do with it
ADFS 2.0
Role-based access
More granular role based access for administrators, partners and end users
Simplified management
Remote PowerShell and fall through experience to specific services to gain similar server configuration control
Microsoft Azure
Connect your platform with applications developed for Azure
OSP224
Microsoft Office 365 & Deployment Workload migration Management User migration flexibility flexibility Wednesday (June 27th) - 5:00 PM
Move or extend on-premises workloads to the cloud at your pace, move back from cloud to on-premises at will Keep some users on-line and some users on-premises or keep them all in a single environment
OSP324
Self service dashboard Microsoft Office 365 Service24x7 Reliability & Disaster Recovery Partner ecosystem support & community Friday (June 29th) - 10:15 AM
24x7 phone or online accessible IT-level support dedicated to Office 365 Broad community of 16,000+ WW partners and online community forums available to help you
The Service Health Dashboard provides current information about the service status accessible on the Web or via RSS
Fast set up using auto detection with a single input of Office 365 ID and password Access to email, calendar, tasks, contacts with Outlook Mobile built in Access to Office documents with Office Mobile built in SharePoint Workspace Mobile designed to keep the mobile workforce up to date Instant messaging & online meetings with Lync Mobile app available as a free download in the Marketplace New security features
Admin
Web-based admin portal to manage users & settings Impersonation console for Delegate Admin Partners (DAPS)
End User
Mobile Synchronization of Exchange Online Email, Contacts, Calendar, Tasks, Notes, etc.
Role-based administration
Familiar admin console with functionality to reset device passwords, lock & wipe lost devices BES Express set of IT Policies Support for BlackBerry Balance
Enterprise-Only Wipe
Protection of corporate data
Outlook
General Troubleshooting Calendar Connectivity OCAT
Q&A
Find
Find all documents and applications
Review
Review all documents and applications for issues and criticality
Test
Test all documents and applications that meet the importance bar
Keep Testing
Keep testing when finished, deploy
Benefits
Manage Risks
Obtain as much data as possible to assess environment
Predictable
Goal is no surprises during deployments
Tools
Heavy use of tools/ automation to provide data
Pitfalls
Costly
Additional expenses to deploy and obtain value
Modern
Discover Rationalize Remediate Manage
Business collaboration Dont over discover Business Impact Large Scale Day 1 requirements On demand Obtain value Future Planning
Make sure your tool/criteria is closely aligned with business criticality or dont use the tool!
Testing
Automated Testing Smoke Tests User Tests
Quick test pass Goal: find obvious issues to increase user cooperation rates
The only test that matters Final validation Supported by remediation engineering
Prioritization Selection and optimization Governance Resource planning Skills management Cost management
Portfolio Management
Project Management
Planning Project execution Risk management Business Intelligence Team collaboration Consistent processes
STRATEGIC ALIGNMENT
Resource Management
THEN
NOW
RESPONSIBILITY:
Data Classification and Accountability Host Level Controls Application Level Controls Identity and Access Management Network Controls Physical Security
IaaS
PaaS
SaaS
CLOUD CUSTOMER
CLOUD PROVIDER
PERIMETER SECURITY
FIRE SUPPRESSION
MULTI-FACTOR AUTHENTICATION
EXTENSIVE MONITORING
Bay Area, CA
San Antonio, TX
So Paulo, BR Sydney, AU
EXPECTED
UNEXPECTED
Education
Administer and track security training
Process
Guide product teams to meet SDL requirements
Accountability
SECURITY FUNDAMENTALS
TECHNOLOGY INNOVATIONS
INDUSTRY LEADERSHIP
Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk
Dependable, available Predictable, consistent, responsive service Maintainable Resilient, easily restored Proven, ready
Commitment to customer-centric interoperability Recognized industry leader, world-class partner Open, Transparent
CALCULATE risks
REPORT risks across Microsoft cloud environment
case
CONTROL OBJECTIVES
CONTROL ACTIVITIES
Create Policy
Design Service
Know the value of your data and processes and the security and compliance obligations you need to meet Ensure a clear understanding of security and compliance roles and responsibilities for delivered services Ensure data and services can be brought back in house if necessary
Consider the ability of vendors to accommodate changing security and compliance requirements
Vernacular
terminology specific to Windows Azure that will get us all on the same page
Vernacular
terminology specific to Windows Azure that will get us all on the same page
Information Protection
Discover, protect and manage confidential data throughout your business with a comprehensive solution integrated into the platform and applications
Protect everywhere, access anywhere Integrate and extend security Simplify security, manage compliance
Extend confidential
Secure endpoints
to reduce risk
Classification
Access Control
Auditing
RMS Protection
Save classification
Determine classification
Components
ACCESS POLICY For access to finance information that has high business impact, a user must be a finance department employee with a high security clearance, and be using a managed device registered with the finance department.
Classification
File inherits classification tags from parent folder Manual tagging by owner Automatic tagging Tagging by applications
Access Control
Central access policies based on classification Expression-based access conditions for user claims, device claims, and file tags Access denied remediation
Auditing
Central audit policies can be applied across multiple file servers Expression-based audits for user claims, device claims, and file tags Staging audits to simulate policy changes in a real environment
RMS Protection
Automatic Rights Management Services (RMS) protection for Microsoft Office documents
Information Protection
Discover, protect and manage confidential data throughout your business with a comprehensive solution integrated into the platform and applications
Protect everywhere, access anywhere Integrate and extend security Simplify security, manage compliance
Extend confidential
Secure endpoints
to reduce risk
Classification
Access Control
Auditing
RMS Protection
Save classification
Determine classification
Components
ACCESS POLICY For access to finance information that has high business impact, a user must be a finance department employee with a high security clearance, and be using a managed device registered with the finance department.
Classification
File inherits classification tags from parent folder Manual tagging by owner Automatic tagging Tagging by applications
Access Control
Central access policies based on classification Expression-based access conditions for user claims, device claims, and file tags Access denied remediation
Auditing
Central audit policies can be applied across multiple file servers Expression-based audits for user claims, device claims, and file tags Staging audits to simulate policy changes in a real environment
RMS Protection
Automatic Rights Management Services (RMS) protection for Microsoft Office documents
Protects the client, data, and corporate resources by making the client inherently secure and less vulnerable from the effects from malware.
Simplifies provisioning and compliance management the of encrypted drives on the widest variety of PC form factors and storage technologies
Modernizes access control and data management while increasing data security within the enterprise.
Z Z Z
Z Z
Z Z
ZW Z Z Z Z
Z ZW Z
Z Z
Z Z
ZW Z Z W Z Z
Z ZW Z
Z Z
Z Z
ZW Z Z W Z Z
Z ZW Z
Z Z
Z Z
ZW Z Z W Z Z
Z ZW Z
Z Z
Z Z
ZW Z Z W Z Z
Z ZW Z
Z Z
Z Z
ZW Z Z W Z Z
Productive Infrastructure
Predictable Applications
Your Cloud
3
Cloud
Public Private Hybrid
Flexibility
Beyond Virtualization
Windows Server 2012 offers a dynamic, multi-tenant infrastructure that goes beyond virtualization to provide maximum flexibility for delivering and connecting to cloud services.
Flexible Infrastructure
Flexible Infrastructure
vCloud Director VMware Service Manager Data Recovery 2.0 vCenter Orchestrator
vCenter Ops Mgmt. Suite vFabric App Perf Mgr, vFabric Hyperic vCenter vFabric Application Director
App Controller Service Manager Data Protection Manager Orchestrator Operations Manager Virtual Machine Manager Hyper-V
vSphere Hypervisor
vCloud Director VMware Service Manager Data Recovery 2.0 vCenter Orchestrator
vCenter Ops Mgmt. Suite vFabric App Perf Mgr, vFabric Hyperic vCenter vFabric Application Director
App Controller Service Manager Data Protection Manager System Center 2012 Orchestrator Operations Manager Virtual Machine Manager Hyper-V
vSphere Hypervisor
RemoteFX delivers a consistently rich user experience to users over LAN or WAN (irrespective of deployment model)
RemoteFX
Corporate LAN
Hardware and Software GPUs Rich multimedia USB Redirection Multi Touch
Internet or WAN
WAN acceleration
Single Sign On
Centralized Management
VDI helps deliver on this promise.
Windows Server 2012 provides a scalable, easy to manage, and high fidelity VDI solution.
Data Security
BYOD
Easy Deployment
One, integrated console for roles, servers, collections, users, and VMs
Unified Administration
Consistent publishing apps and desktops Automate and manage at scale with Powershell
Streamlined VM Management
Avoid patch storms by queuing maintenance updates Streamlined VM mgmt: Fast sysprep, optimized logon, auto rollback
B E
C F
User disk enables personalization on pooled VMs or sessions. User data and settings are stored on a separate vhd. Simplifies deployment of lower cost VDI (pooled VMs / Sessions) Fairshare ensures high performance across all user VMs / Sessions Dynamically distributes resources (bandwidth, CPU and I/O)
User Disks
Fair Share
Storage
Highly Available
Storage Configuration options to optimize for tiered storage Reduce storage cost while maximizing IOPS Active/Active Broker Scale-out File Server, HyperV Clustering Up to 32 nodes and 4000 VMs per cluster with Hyper-V Increase density further by using RDSH (>2X compared to VMs).
Simplified Management
2012
2015 IE10
2016
1 mo.
3 mos.
3 mos.
6-8 mos.
3 mos.
3 mos.
6-8 mos.
3 mos.
Feb 2012
May 2012
July 2012
Jan 2013
April 2013
July 2013
Dec 2013
March 2014
34
Centralized and Unified Management User State Applications UserAny State Virtually Application, Anywhere Applications Operating System
Windows Everywhere
Microsoft VDI Client Hyper-V MED-V
IE5
IE7
IE8 IE9
assess quickly
increase value
apm capabilities
apm strategy
portfolio health
assess quickly
business goals
Govern
Manage Costs
Innovation
Align to Business
Innovation
Increase Value
Increase Maturity
Deliver the best Windows experience, embrace consumerization trends with enterprise-class management
Enterprise-Grade Solutions
You save two out of every three dollars when you deploy computing seats with WMS
66%
362
Microsoft.
The Total Economic Impact Of Microsoft Windows MultiPoint Server 2011, A Forrester Study Prepared for
Windows 8 Desktop
Windows 8 Desktop
Windows 8 Desktop
Windows 8 Desktop
363
Repurposed PC/Laptop
364
MultiPoint Server
Repurpose d PC
365
1
Network virtualization
2
DHCP server failover
3
Single Root I/O Virtualization (SR-IOV)
4
Resource Metering
NIC Teaming
6
Dynamic Virtual Machine Queue IP Address Management (IPAM)
7
Quality of Service (QoS)
9
SMB Direct and Multichannel
10
BranchCache
1
Hyper-V Network Virtualization Shared-nothing live migration
3
Cluster enhancements
Massive scale
Hyper-V Replica
6
Hardware offloading Virtual Fibre Channel
7
Guest NUMA support
8
Runtime memory configuration
9
Hyper-V network switch
10
1
Website density and mutlitenancy Application Initialization
2
Dynamic IP Restrictions
4
NUMA-Aware Scalability
CPU Throttling
6
Centralized SSL management Just works with PHP and node.js
7
Embracing web standards
8
Application symmetry
9
Comming Development Platform
10
3
Simpler deployment of Active Directory
4
Domain Name System Security Extensions
Classification
DirectAccess
6
Active Directory virtualization Active Directory cloning
7
Kerberos constrained delegation
8
Private virtual LAN (PVLAN)
9
Multitenant security and isolation
10
INTELLIGENT PATCHING
CONCURRENT REDIRECT
Beyond virtualization
Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services
Efficiently manage infrastructure while maximizing uptime and minimizing failures and downtime
Build on an open and scalable web platform that supports applications across premises
Administration
Sample Scripts
Orchestration
Orchestrator Integration Packs OnCommand Plug-In for Microsoft UCS Integration Pack for System Center Orchestrator Management Packs SCVMM PRO Tips OnCommand Plug-In for Microsoft UCS Management Pack for System Center Operations Manager PowerShell Tool Kit Data ONTAP PowerShell Toolkit
End-to-end Workflows
Management
Automation
Virtualization
Hardware
3 Million HOSTED
Hosting growth is
3X that of
on-premises
90%
Application Management
Infrastructure Management
Infrastructure
its
Cloud
Private Cloud
Public Cloud
Service
Capacity on Demand
394
Authentication
Virtualization
Self-Service Model
Hybrid Deployment
395
Application Management
Physical, virtual, and cloud Consistent user experience Self-servicing Beyond virtualization Deep application insights
Infrastructure Management
Configuring Deploying Monitoring Operating Heterogeneous environment Data security
396 396
Overview
Deployment
Operations
New in DNS
Efficient - Supports existing architectures, and promotes new more efficient ones.
Detailed guidance and configuration scripts on TechNet System Center 2012 SP1 to manage it all !
1. Worldwide Enterprise Server Cloud Computing 20102014 Forecast IDC, May 2010 2. WW Enterprise Server Cloud Computing, 2011-2015 IDC 2011 3. Cloud Computing Attitudes IDC, April 2010 4. IDC, 2011, Market Analysis Perspective: Worldwide Datacenter Trends and Strategies 5. Cloud Sizing by Delivery Model and Geography Oliver Wyman, Sep 2010 6. IDC WW System Infrastructure Software Predictions
Best in class
Storage
VirtualSystem
Servers
Networking
CloudSystem
Software
AppSystem
HP Infrastructure
Deep Management
Microsoft Infrastructure
Services
Optimized rack & blade server configurations Converged, scale-out storage High performance, secure LAN and SAN connections
Intelligent rack & power management Integrated system & storage management
Virtualization
Transformation Experience Workshop 1 Day
Executive visioning workshop to align customer strategy and outline the way forward
Cloud
Virtualization Assessment VirtualSystem, Start Service Migration, Integration Services Custom
Migrate workloads into VirtualSystem and further integrate into the data center
4 Weeks
Discover and analyze Find a platform current systems to designed for virtual understand best computing or build candidates for toward partner cloud virtualization solution Included in VS1 and VS2 SOW needed for VS3
30 Days or Custom
Integration of HW, Microsoft Hyper-V, and SC Suite*
Growth
Innovation
Team
Cloud
66%
run
14%
20%
transform
grow
PROLIFERATION OF DEVICES
BUDGET REDUCTIONS
IT CONSTRAINTS
ENABLING DEVICES
AVAILABILITY
ADAPTING TO CLOUD
f
RAPID RESPONSE PROTECT WHILE EXTENDING CENTRALIZE & STANDARDIZE REPORT & AUDIT
EMPOWER USERS
TAKE CONTROL
o Single View Mgmt. o Application of Business Rules o Automated Requests, Approvals, and Access Assignment
o User Sign-on Experience o Trusted Source o Standard and Secure Protocols o Level of Assurance
o How and where are authorizations handled o Can a user access the resource and what can they do when they access it?
o Track who does what, when, where and how o Focused Alerting o In-Depth Collated Reporting o Governance
ADMINISTRATION
AUTHENTICATION
AUTHORIZATION
AUDITING
micro-
milli-
second
minute
hour
day
week
month
5. Notification
UDP
LB
Server
>_
Discovery
Buyers confidently browse, discover, purchase, and use new content. The Marketplace is provided by a trusted brand and provides immediate access to the content consumers demand. No high-pressure sales pitches, no hidden strings, no hassles.
Ecosystem
Marketplace provides integration between content and the apps that depend on it. Office, SQL Server, Visual Studio, and other data apps are easily connected to Marketplace. The Marketplace invests in building out highquality connections so individual content providers dont have to.
Monetization
Particularly important for smaller content providers, the Marketplace manages the challenges of selling abroad. Marketplace eliminates the complexity of international business so Content Providers can focus on content.
Infrastructure
Marketplace provides account management, authorization, metering, throttling, localized UI, and a variety of other services backed by Microsofts world-class cloud computing resources.
Catalog Apps
Apps that do not yet take advantage of Marketplace services can become more discoverable by being listed in the Marketplaces extensive application catalog.
Report Designer
Report Builder
Power View
Embedded
Operational
Business
SharePoint Farm
Web Front End
Power View client
App Server
SSDT BISM Model
Excel PowerPivot
Power View with DAX Addition and Subtraction Power View with DAX Time Intelligence Inventory Calculations Standard Deviation & Variance Text Functions Define Your Own Context
Ratios
Rank
SQL Server 2005 SQL Server 2008 SQL Server 2012 SQL Azure Retargeting Support
CONNECTED DEVELOPMENT
I want to connect to people and be productive anywhere, anytime How can IT support and manage all those devices?
Data Protection
50 Languages
Apps available in 180+ countries
PEOPLE
vs.
ICONS
180+ 123 31
38 Countries
180+ Countries
Windows Phone 8.0
Available today
Lower your costs with insights derived from some of the worlds largest public cloud services
Infrastructure
DEVELOP
TEST
We test software and online search results to help clients market and sell high-quality, relevant applications in global markets
We create locally relevant sales and marketing content to accelerate our clients global revenue.
SUPPORT
We author and illustrate technical documentation for clients who serve and support customers in global markets
TRANSLATE
We translate our clients applications and content, enabling them to deliver a superior customer experience worldwide
We manage our clients business-critical product and content releases in hundreds of global markets and languages
MANAGE
Instant Messaging
Authentication
Authentication
Administration Storage
Storage Compliance
Administration
On-Premises
Hybrid
In the Cloud
2 6
10
5
9
7
11
8
12
2 1
2 3
4 3
5 4
5 6
6 7
10
7 8
10
11
8 9
10
11
12
10 9
10
11
12
11 10
11
12
11 12
12