MDT, ACT, MAP, AIK, IE9, Windows 7 deployment,och så vidare. Ett av de bästa nyhetsbreven, tycker jag, är Springboard Series Insider. Nyhetsbrevet är sprängfyllt av information som jag tror att få it-proffs klarar sig utan – om man jobbar inom “deployment and client”, vill säga. Ta god tid på dig, för här finns mycket intressant läsning!
I senaste nyhetsbrevet skriver de även om våra svenska experters kostnadsfria seminarier online:
Varför inte bli prenumerant du med?
NOTE FROM THE EDITOR
Welcome to the October edition. Depending on where you live, it might be time to pull out some warmer clothes and start to get ready for shorter days, longer nights, and a review of your organization's network security and remote access infrastructure. So take a few minutes, read this month's Springboard Series Insider, and pick up some good tricks on how to better manage and secure the Windows desktops on your network.
In the world of Windows news, I am excited to announce that November will kick off a Springboard Series mini-tour of South America. As part of the tour, I will be conducting free sessions for local IT pros in Brazil on November 10th, in Peru on November 15th, and a possible session and "tweet up" in Argentina on November 18th. I will also be speaking at TechDays Chile on November 21st. More information on dates, times, locations, and how to register for these events will be available later this month on the Springboard Series Blog and in next month's Insider.
Finally, how are your Windows 7 deployment skills? Know when (and how) to use the Microsoft Deployment Toolkit (MDT), Application Compatibility Toolkit (ACT), Microsoft Assessment and Planning (MAP) Toolkit, and Windows Automated Installation Kit (AIK)? Understand how best to approach Internet Explorer 9 deployment and management? Check out information on improvements to the Windows 7 Deployment Learning Portal below in the New Resources section.
So let's get into the cool tips and tips to make your job easier.
Stephen Rose Sr. Community Manager, Microsoft Windows Client IT Pro email@example.com
Microsoft BitLocker Administration and Monitoring Overview Learn how Microsoft BitLocker Administration and Monitoring (MBAM), as part of the Microsoft Desktop Optimization Pack (MDOP), can help you better manage, deploy and support BitLocker in Windows 7. This video discusses some of the MBAM features and functionality that will help you simplify BitLocker provisioning and deployment independent or as part of your Windows 7 migration, improve compliance and reporting on BitLocker, and reduce support costs.
Microsoft App-V and MED-V Deployment Tutorials Get step-by-step guidance on how to deploy Microsoft Application Virtualization (App-V) and Microsoft Enterprise Desktop Virtualization (MED-V) using MDT and System Center Configuration Manager (often referred to simply as ConfigMgr) with new videos from the Springboard Series:
Microsoft DaRT Deployment Tutorials Learn how to deploy the Microsoft Diagnostics and Recovery Toolset (DaRT) using a variety of methods and tools with these new step-by-step demonstrations from the Springboard Series:
IPv6 Security Considerations and Recommendations IPv6 provides many benefits over Internet Protocol version 4 (IPv4). However, before deploying IPv6 you should be aware of additional security considerations. This article describes each of these security considerations in detail and provides Microsoft recommendations and best practices for mitigating the potential risks associated with IPv6 traffic. Find more helpful resources with the IPv6 Survival Guide.
Internet Explorer 9 Modules Added to Windows 7 Deployment Learning Portal The Deployment Learning Portal now features two brand new modules designed to help you assess your skills around determining, and addressing, the compatibility of older (including Internet Explorer 6) applications as part of your migration to Windows 7 and Internet Explorer 9. The Windows 7 Deployment Learning Portal is designed to help you identify the strengths and gaps in your knowledge around Windows 7 deployment and provide some targeted learning recommendations to help you reach the top of your game. All questions are written by the same team who authored the Microsoft Certified IT Professional (MCITP) certification exams for Windows 7 so they are sure to test your knowledge around the tools and techniques used to do everything from taking a complete inventory and addressing application compatibility to application packaging and driver management. The best part is that, after completing the assessment, you will receive customized learning recommendations to help you strengthen your skills.
TechNet Edge: Application Compatibility vs. Security: A Delicate Balance Multiple technologies exist to help you to make your legacy applications work on Windows 7, but what about security? Can all of these be used in a secure way or do you have to make a trade-off? If so, what are the risks? This presentation explores application compatibility technologies, best practices, and popular strategies such as shimming, Windows XP mode, Microsoft Enterprise Desktop Virtualization (MED-V), Internet Explorer Compatibility Mode, Enhanced Mitigation Experience Toolkit (EMET), and others—and looks at their impact on the security of the platform.
SOMETHING TO BLOG ABOUT
Next Release of Windows Intune Available October 17th Windows Intune brings together Windows Intune cloud services and upgrade rights to Windows 7 Enterprise to help businesses simplify PC management and security while getting the benefits of a modern operating system. At Microsoft's Worldwide Partner Conference in July, we announced the beta for the next release of Windows Intune. Our next release of Windows Intune, which includes new features and updates to the July 2011 Beta, will be available on October 17, 2011. Here is a quick reminder of just a few of the features that will be included in the next version:
TIPS AND TRICKS
Take 2: Discovering 16-Bit Applications Before Migrating to 64-Bit Versions of Windows 7 By Chris Jackson, Principal Consultant, Microsoft Corporation
Back in 2009, I wrote an article on my blog about how to detect 16-bit applications present in your existing ACT inventory. Andreas Stenhall, one of our Windows Expert IT Pro MVPs, brought this to the forefront again in last month's edition of the Springboard Series Insider, taking my SQL query and writing some new text around it, reminding people of their ability to leverage existing data for new uses, even if this data isn't surfaced through the ACT user interface. But, the benefit of a couple of extra years with customers has led me to believe that this isn't the end of the line for this problem—it's still not perfectly solved. When you think of the business questions you're trying to answer with this data, they are:
Free One-Hour Seminars with Windows Deployment and ConfigMgr Experts October 6 and December 5, 2011; February 16, 2012 Join TrueSec, Microsoft Deployment MVPs Johan Arwidmark and Mikael Nystrom, and System Center Configuration Manager (ConfigMgr) MVP Kent Agerlund for insights into the latest news and tools in the world of Windows deployment, as well as tips and tricks gained from the field. Scheduled for October 6, the first session will provide an overview of the new functionalities and features in the forthcoming Microsoft Deployment Toolkit (MDT) 2012. Future sessions will discuss MDT 2012 in greater detail and explore new features and functionality in ConfigMgr 2012.
TechNet Radio: Tips and Tricks for Setting Up Windows Deployment Services Now available on demand, this TechNet Radio podcast features Microsoft Setup and Deployment MVP Rhonda Layfield and provides her top five tips and tricks for setting up Windows Deployment Services (WDS) as well as a discussion of some key infrastructure issues that you can avoid.
OFFICE FOR IT PROS
Office 2010 Security Controls for IT Pros By Andy O'Donald, Product Manager, Microsoft Office
With Microsoft Office 2010, Microsoft invested heavily in security improvements and there are four key controls in Office 2010 to help IT pros: Data Execution Prevention (DEP) for Office applications, Office File Validation, expanded file block settings, and Protected View.
Lately, I've been receiving questions around trusted locations and Protected View. Specifically, I hear from IT pros that their users say they see the Protected View yellow bar too much. Using the Office Customization Tool (OCT) and group policy, you can control how frequently users experience protected view. The most impactful way to lower the appearance of the Protected View is to make sure certain locations are trusted by the client inside your organization. If you've already deployed Office 2010, it is still easy to update the trusted locations by creating a new MSP file and pushing it out like any other update.
You can find all of the Office 2010 security resources that are available today on the Office 2010 Security top task page in the Office Springboard Series TechCenter. Here are the top three Office 2010 security resources every IT pro should be familiar with:
Andy O'Donald is a product manager in the Microsoft Office team currently focused on Office deployment and Office 365. Check out his TechNet Radio interview for answers to common IT pro questions on topics such as Office 2010 planning, deployment tools such as the Office Migration Planning Manager, end user resources, and the Office Web Apps.
INTERNET EXPLORER IT CORNER
Accelerate Enterprise Application Compatibility for Internet Explorer 9 Group Policy provides an infrastructure for centralized configuration management of the applications that run on the Windows. By using Group Policy to configure Internet Explorer, you can configure a setting one time and enforce that setting on many computers. In comparison to techniques like scripting, Group Policy can be the most efficient way to affect many computers with a low risk of human error. You can configure Internet Explorer security settings in a GPO that you link to the domain, for example, and Group Policy can apply those settings to every computer in the domain.
We will soon be launching a Group Policy top task page on the Internet Explorer TechCenter to help you more easily locate recommendations, tools, and step-by-step guidance related to Group Policy. Until then, here is a list of the top resources available to IT pros today:
Getting Started with Group Policy
Group Policy Tools
Group Policy Settings in Internet Explorer
This month, we're following a few individuals who support the motto, "for the community, by the community":
If you would like to be considered for this column, send a message to Stephen Rose via Twitter @stephenlrose and tell him, in 140 characters or less, why we should feature you next month. Also, for the latest information on what's going on here at Microsoft follow the Springboard Series @MSSpringboard.
EVENTS AND TRAINING
A Day with Microsoft Virtualization: Hyper-V, SCVMM 2012 and SCOM 2012 October 10 - December 15, 2011 - Central United States Does your company use VMware? Are you sure it's the best choice? If you're eager to explore the cloud and alternative ways of building next-generation data centers, please join us for a technical look at the next set of Microsoft virtualization technologies and how they can help you harness the cloud—on your own terms. The morning session will take a look at Microsoft virtualization technologies and all the products you need to take your data center to the next level. We will do direct comparisons of Microsoft Virtualization and VMware, and get down to real facts about which is the best choice in terms of performance, management, and total cost of ownership. In the afternoon, provided you've brought a sufficiently powered laptop, you'll have a chance to get hands-on and explore these new technologies on your own terms. Ask questions, compare notes with your peers and get the answers you need. The day will wind down with a bonus session presented by a local IT Pro Evangelist to highlight additional topics, certification roadmaps, and more. Register today by visiting http://technetevents.com to save your seat for a free, full-day event in your area.
E-Learning Course 10242: Securing Windows 7 Desktops This two-hour course describes how to configure Windows 7 security management tools. This course helps you prepare for the Microsoft Certification Exam 70-680: TS: Windows 7, Configuring. At the end of the course, students will be able to:
E-Learning Course 10243: Configuring Network Security in Windows 7 This two-hour course provides an overview of the skills required to configure Windows Firewall, security-related settings in Internet Explorer, and Windows Defender. This course also helps you prepare for the Microsoft Certification Exam 70-680: TS: Windows 7, Configuring. At the end of the course, students will be able to:
Desktop Virtualization for the Education Industry Thursday, October 06, 2011 10:00 AM Central Time As education institutions look at alternatives to the traditional computer lab to serving up a more manageable and secure desktop to its students and external users, desktop virtualization can be seen as the ultimate solution. However, choosing which technologies are relevant and how they can be used together can be confusing. Explore the technologies that make up the joint Microsoft and Quest solution for delivering a virtualized desktop experience and learn how these technologies are currently being combined and used at education institutions today.
How to Leverage System Center to Manage and Optimize your Infrastructure Tuesday, October 11, 2011 2:00 PM Eastern Time The Microsoft System Center suite is a comprehensive set of technologies designed to evolve your device, datacenter, and IT management practices. Come take a look at what's new with System Center, and learn how to manage and monitor clients, servers, services, and assets as well as consolidate your infrastructure to help reduce data center costs.
TechNet Webcast: Information about Microsoft Security Bulletins for October (Level 200) Wednesday, October 12, 2011 11:00 AM Pacific Time Join us for a brief overview of the technical details of the Microsoft security bulletins for October. We intend to address your concerns in this webcast; therefore, most of the webcast is devoted to attendees asking questions and getting answers from Microsoft security experts.
Windows 7 Deployment - Why and How October 25, 2011 9:30 AM Greenwich Mean Time Attend this one-stop online conference to find out why Windows 7 makes sense for your organization and how it can be easily deployed to your users. This event will feature two tracks, one for implementers covering the nuts and bolts of deploying software, and another for strategic IT decision makers. The afternoon will offer a deep dive into deployment strategies, tools, and real world best practices.
Virtualization and Management: Device to Datacenter Tuesday, November 01, 2011 8:30 AM Pacific Time Join a virtual interactive panel discussion with Tony Scott and Brad Andersen to hear how enterprises can take advantage of the increase in personal devices in the workspace without affecting management or security. This event will explore managing consumer and professional devices in an enterprise environment, addressing the process and management IT challenges associated with virtualization, and much more.
Upcoming Springboard Series Technical Expert Program (STEP) Events:
SNEAK PEEK: FOR INSIDERS ONLY
The following resources will be released in October on the Springboard Series for Windows on TechNet. Bookmark or subscribe to our RSS feed and receive automatic notification when these and other resources, announcements, and downloads are released.