Virtualizing the Desktop with ScriptLogic Desktop Authority
|
|
|
- Warren Simmons
- 10 years ago
- Views:
Transcription
1 Virtualizing the Desktop with ScriptLogic Desktop Authority A ScriptLogic Product Positioning Paper By Nick Cavalancia w w w. s c r i p t l o g i c. c o m
2 Information in this document is provided in connection with ScriptLogic products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in the End User License Agreement for such products, ScriptLogic assumes no liability, and ScriptLogic disclaims any express or implied warranty, relating to the products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. ScriptLogic may make changes to this document or related product specifications and descriptions, at any time, without notice. ScriptLogic makes no warranty for the use of this document and assumes no responsibility for any errors that can appear in the document nor does it make a commitment to update the information contained in this document. Copyright 2009, ScriptLogic Corporation. All rights reserved. 2 Virtualizing the Desktop with ScriptLogic Desktop Authority
3 Table of Contents Defining Desktop Virtualization... 5 Desktop Virtualization Goals... 5 Desktop Virtualization: a complete failure?... 6 A Virtual User Environment: The Truly Virtualized Desktop... 7 Defining what s in a Virtual User Environment... 7 How to Create a Virtual User Environment... 7 Step 1: Virtualize the OS Workspace... 7 Step 2: Virtualize the Applications... 8 Step 3: Virtualize the User Experience... 8 Completing the Virtual Desktop Comprehensive, Centralized Configuration Real-Time Validation Terminal Clients Virtual OS Clients Enforcing Security Conclusion: Making the Virtual Desktop a Reality Virtualizing the Desktop with ScriptLogic Desktop Authority
4 Virtualizing the Desktop with ScriptLogic Desktop Authority In IT today, the term virtualization is so overused to define various solutions that seemingly have the same end result, that the term itself has lost much of its true meaning. Many focus the term on moving the operating system from physical hardware to a software-based (and therefore, far more portable) solution. Others focus on the ability to deliver whatever application the user needs ondemand without the need for waiting for an install to complete. Still others look to server-based computing solutions that move the users individual desktop to one shared among many users. Virtualizing the operating system or applications is a goal so wide with options of how to get there, that more and more vendors are dipping their toes into the virtualization waters and providing solutions that yield some form of virtual experience for the user. IT Executive Summary Desktop Authority and its family of solutions provide comprehensive coverage of the desktop lifecycle, from beginning to end, with a specific focus, unique to Desktop Authority as a desktop management platform, on the area of desktop and user configuration. While virtualization, regardless of the specific implementation, provides an OS and application workspace for the user, it lacks the management ability to cater the desktop to meet the business needs of the user beyond that of just having a copy of Office installed or streamed. In this whitepaper, I ll provide some thought leadership on the topic of desktop virtualization by first defining the types of virtualization available today and the issues with each and then by introducing ScriptLogic s Desktop Authority solution, which can be used to complete that which today s virtualization solutions can only attempt to accomplish: the complete virtualization of the user desktop experience. In addition to virtualization, many of the terms used in this whitepaper are equally somewhat open to interpretation. So let me define a few terms I ll use throughout whitepaper so we re clear on what is being discussed. Desktop I ll use this term to refer to the user s actual Windows desktop; the working environment in which they interact with the OS. Workstation I ll use this term to generically mean a physical computer, whether a laptop or desktop computer. Terminal Environments I ll generically use this term to refer to the use of Microsoft s Terminal Server and/or Citrix s Presentation Server. 4 Virtualizing the Desktop with ScriptLogic Desktop Authority
5 Defining Desktop Virtualization To narrow the focus from all the hype in the media today, and all the me too vendors claiming to have created yet another virtualization solution, let s concentrate on three specific, mainstream, and accepted forms of virtualization. 1) Application Virtualization sometimes called app streaming, virtualization of applications are accomplished usually through delivery of applications by streaming them from a server rather than by traditional installation onto a workstation. This is a muddied term in and of itself, as there are a myriad of solutions today that yield the same end result (instant access to a completely functioning application), but do it using varied methods. 2) OS Virtualization This is most commonly associated with products like VMWare s ESX Server, Citrix s XenServer or Microsoft s Virtual Server. In this case, the entire client OS runs within software-based virtual hardware, resulting in the ability to run multiple machines on a single piece of server hardware. This can be accomplished using both workstationbased and server-based solutions. In the case of server-based OS virtualization, users will connect to the desktop using a remote control protocol, such as Microsoft s Remote Desktop protocol (RDP). 3) Terminal Environments ( desktop virtualization ) Microsoft s Terminal Server and Citrix s Presentation Server provide a similar experience to server-based OS virtualization, where users connect to the server to establish a desktop in which to work. Applications can be either preinstalled or streamed to provide access to needed resources. Even these three solutions are intertwined; it is possible that you will connect to a Citrix Presentation server using a streamed version of their ICA client to run a VMWare guest OS on the Citrix desktop that uses streamed applications within the Guest OS. Sounds overly complicated, I know, but it is a reality today. Desktop Virtualization Goals Because the definition of desktop virtualization is a moving target in the industry today, I d like to instead focus on the goals of desktop virtualization to bring all this into focus. 1) Anytime, anywhere, on-demand access The core idea behind all three of the types of virtualization previously covered is to give the user instantaneous access to their working environment. App streaming gives you instant access to applications (no need to wait 45 minutes for Office to install the first time you sit down at a workstation), while OS virtualization and terminal environments give you access to an entire desktop. 2) A secure, consistent, and functional working environment Creating a desktop with these characteristics means less helpdesk calls, more productive users and, therefore, more productive IT organizations. Virtualization can provide each of these aspects of a user s desktop to varying degrees. App virtualization can create this environment but only within the context of a delivered application (that is, the app itself will be secure, functional and consistent even when running on a desktop that is not). OS virtualization and thin client solutions have the ability to create this type of environment, but require the use of logon 5 Virtualizing the Desktop with ScriptLogic Desktop Authority
6 scripts, group policies, and/or desktop configuration solutions to accomplish this goal; pretty much the same as the desktop of a physical workstation. 3) Lower TCO Whatever the solution implemented, it cannot be less cost-effective than a traditional physical machine. So the overall objective is to give the user a desktop that is not tied to a physical piece of hardware such that they have consistency in their working environment no matter where they are, and do it in a cost-effective manner. Table 1 compares the virtualization types using the goals previously mentioned. Virtualization Goal Application OS Terminal Anytime, anywhere, Yes (limited to on-demand access applications ) Create a secure, consistent, functional working environment Lower TCO Yes (limited to applications ) Yes (limited to applications ) Yes (requires access to the guest OS via local storage on a laptop, USB drive, etc. or via a remote protocol such as RDP or ICA using a VPN and/or the Internet) No (this method requires additional solutions such as scripts, group policies or a desktop management product) Possible (the addition of setup and maintenance of a virtual OS raises costs, while the potential for needing less hardware could lower costs) Table 1: Comparing Virtualization Solutions Yes (available internally and requires external access via VPN and/or the Internet) No (this method requires additional solutions such as scripts, group policies or a desktop management product) Yes (only a single server OS needs to be installed instead of multiple workstation OSes) Desktop Virtualization: a complete failure? None of the virtualization solutions today get you all the way to the goals of virtualization; app streaming is closest but is always limited to the app itself. And the OS virtualization and thin client solutions still leave you in much the same position as with physical workstations; the OS is setup, but the user experience needs to be configured. The reason why app virtualization is so much closer to the goal of virtualization (which I believe is the reason it gets so much attention) is that the streamed application can be completely configured prior to streaming and can be delivered in a matter of seconds (not minutes or hours), but is limited to the app itself. With the OS virtualization and terminal solutions, the user s desktop is not configured, although it is available within an equally short timeframe. Therefore, while the hype is high, the question remains, is a virtualized desktop possible? 6 Virtualizing the Desktop with ScriptLogic Desktop Authority
7 A Virtual User Environment: The Truly Virtualized Desktop The answer lies in the ability to take the central configuration and instantaneous delivery strengths of application virtualization and apply that to the entire desktop in either an OS virtualization or terminal environment scenario to create what we at ScriptLogic refer to as a Virtual User Environment. Think about it: if you could deliver every aspect of the user s desktop in the same timeframe as a streamed application no matter where the user logged onto (be it a physical workstation, virtualized OS or terminal environment), you d have a virtual environment where all three goals are met in one: accessing a secure, consistent and functional working environment from any machine in the world that results in a lower desktop TCO. ScriptLogic s Desktop Authority is the only solution that can bring this virtual user environment into a reality: the anytime, on-demand access is provided by either the virtual OS or terminal environment, the instantaneous use of virtualized applications and the secure, consistent and functional working environment provided by Desktop Authority. Other Desktop Management or Client Configuration management solutions that exist on the market focus on applications and patching, but lack the ability to centrally and comprehensively configure all the desktop elements from a simple point-and-click GUI. Defining what s in a Virtual User Environment To be clear, let s define what needs to be immediately accessible on the desktop for a user to be productive. If we can centrally configure these aspects of the desktop and deploy them in the same way an application is streamed, you ll have a completely virtualized desktop by creating this Virtual User Environment: Applications Security Policies Application Settings Endpoint Device Lockdown Drive Mappings, Printers Patches (both MS and 3 rd party) Profiles File/Registry Permissions Shortcuts (desktop, Start Menu, etc) Windows Firewall settings Registry settings Power Management (when applicable) How to Create a Virtual User Environment So let me talk about the three steps to create a Virtual User Environment: virtualizing the OS workspace, virtualizing the applications and virtualizing the user experience. Step 1: Virtualize the OS Workspace This can be accomplished either by truly using a virtual guest OS (via VMWare/XenServer/Virtual PC) or using a terminal environment; in either case, the OS is not tied to a physical machine in front of the user. The OS environment should be clean; not one crammed with common applications, settings, etc. Doing so only makes the OS ready for the business needs the day it was configured. Instead by using a clean OS image or terminal environment and later configuring the settings needed by the user at the time of use, the business needs of today can be met. 7 Virtualizing the Desktop with ScriptLogic Desktop Authority
8 Step 2: Virtualize the Applications While Desktop Authority does not have its own virtualization solution to facilitate immediate access to applications, third-party solutions such as Citrix s Application Streaming ( Microsoft s SoftGrid ( Thinstall ( or StreamTheory ( can meet the need for streaming applications with varying capabilities and are compatible to be deployed via Desktop Authority. Step 3: Virtualize the User Experience This last step is the most critical. Without it, you simply have a desktop with applications and nothing more. If you ve spent any time supporting a desktop, you know you cannot simply walk up to a user and say I setup your new Vista machine with Office 2007 see you later! There is so much more the user needs configured to make them productive. What is needed here is a solution that meets the virtual OS and virtual applications where they stop (which is basically at the point of deployment) and then takes over to configure each of the supporting elements of the desktop listed previously to create a completely virtualized user experience. It is the combination of all three of these elements that create a comprehensive virtualized experience for the user. Figure 1 shows the relationship shared by each of these three aspects of virtualization to provide a complete virtualized user environment. 8 Virtualizing the Desktop with ScriptLogic Desktop Authority
9 Figure 1: The Complete Virtual User Environment By moving to either a virtual OS- or Terminal-based OS workspace, the user is no longer tied to a physical machine. By streaming the applications, they are instantly available, consistently configured, and accessible without the traditional constraint of is it already installed on a given machine. By virtualizing the user environment, the desktop elements that support the streamed applications actually complete the initial intent of streaming in the first place an instantly accessible, secure, consistent and functional working environment no matter where the user logs on. 9 Virtualizing the Desktop with ScriptLogic Desktop Authority
10 What about the Physical Desktop? It should be noted that most organizations are using a hybrid approach, utilizing a mix of physical, virtual and terminal environments to facilitate user access to company resources. Streamed applications and the user environment can still be easily applied to a physical desktop as easy as the virtual. The benefits are the same: a secure, consistent, and functional working environment. All the streamed app solutions listed in this document as well as Desktop Authority work on physical desktops. In the next section, I ll demonstrate how Desktop Authority can be used in both a virtual OS and terminal environment to complete the virtual desktop initiative started by each. I ll use the terms physical, virtual, and terminal to represent a physical workstation, a virtual guest OS via VMWare, XenSource or Virtual PC, as well as a Terminal Server or Presentation Server-based environment respectively. Completing the Virtual Desktop I d like to cover three specific aspects of the virtualized desktop that need to be addressed beyond creating the OS environment, whether terminal or virtual, as well as beyond the accessibility to virtualized applications and show you how Desktop Authority can be used to complete the virtual desktop and create the virtual user environment by implementing a user desktop that includes: 1) Comprehensive, Centralized Configuration Each of the desktop elements listed previously need to be centrally configured to ensure a consistent experience for users. 2) Real-Time Validation To facilitate an experience that is functional based on the user s current needs, any validation that is used to determine whether a particular desktop element should be applied (such as deploying an application or a printer) needs to be done at the time of configuration. More on this later. 3) Enforced Security Once the desktop is setup, security policies, device lockdown, patching and anti-malware initiatives needs to be put into effect to ensure the security of both the user and the network on which they are working. 10 Virtualizing the Desktop with ScriptLogic Desktop Authority
11 Comprehensive, Centralized Configuration Desktop Authority touts management of over 30 different aspects of the user s desktop; each one easily configured using an intuitive and simple interface. Figure 2 shows the various configuration objects, as well as an example of adding a printer using nothing more than a UNC path to the printer. Figure 2: Comprehensive User Settings Management with Desktop Authority Each of these configuration objects uses a simple interface to quickly and easily configure the user s desktop, as shown in Figure 3. Each element (that is, an individual drive mapping, shortcut, registry setting, etc) is grouped together by type and then the configuration is store within a profile, which is essentially a folder used to separate configurations. Figure 2 previously shows a New York Office profile (at the upper left of the screenshot) that houses the configuration elements for the users of that office. 11 Virtualizing the Desktop with ScriptLogic Desktop Authority
12 Figure 3: Configuring the desktop is simple and intuitive with Desktop Authority Real-Time Validation The challenge in configuring a virtual desktop is not the mapping of a drive or the deployment of a printer; those tasks can be scripted if necessary. The real challenge is deciding first who of the hundreds or thousands of users need the particular configuration element, as well as if the configuration is currently applicable. Here s what I mean: suppose you are deploying a Sales application out to salespeople in the field. You would first need to somehow dictate that only salespeople will get the application. The obvious method is to simply use membership within the Sales group. Additionally, you only want the sales printer deployed if the user is using a physical desktop within the organization (because they won t need it if they are connected remotely to either a virtual OS or terminal-based desktop). Here, you would need a more advanced method of determining whether a user is on a physical desktop or not. The validation needed not only needs to be powerful, with multiple options (such as group membership and OS-type), but also needs to be determined at the time of configuration (as in the case of the printer deployment) to ensure a configuration appropriate for the user, the OS, the desktop type, etc all at the time the configuration occurs. 12 Virtualizing the Desktop with ScriptLogic Desktop Authority
13 Desktop Authority s patented Validation Logic uses over 40 different validation types, as shown in Figure 4. These validation rules establish the configuration granularity necessary to configure the desktop appropriately for each user s needs. In addition, Boolean operators (AND and OR statements) are supported to bridge separate validation rules to create essentially 40 n levels of granularity. Desktop Authority configures the user s desktop at logon, at logoff and refreshes the configuration (by default every 60 minutes). As shown in Figure 4, each configuration element can be deployed to the user s desktop at any or all of the three times. Logon this is perfect for establishing the user s working environment before they see the Windows desktop. So applications, drive mappings, printers, shortcuts, registry tweaks, INI file settings, Outlook profiles and more can all be setup prior to the user working. Logoff some elements lower user productivity, such as the deployment of a Service Pack. This can be configured to deploy when the user logs off. The logoff process is suspended, Desktop Authority does its configuration and then the process is resumed. Refresh this is perfect for those elements that need to be changed throughout the workday, those that will raise user productivity by being re-implemented should they be changed (such as a desktop shortcut that accidentally gets deleted), or those that involve enforcing security settings. Figure 4: Ensure appropriate configurations with Desktop Authority s Validation Logic 13 Virtualizing the Desktop with ScriptLogic Desktop Authority
14 Terminal Clients Clients using either Terminal Server or Presentation Server environments can be configured differently from physical or virtual OS clients using a simple Terminal Server Client checkbox (shown previously in middle of Figure 4). Additionally, five specific terminal-related Validation Logic elements exist to further narrow the focus of a desktop configuration, also shown in middle right of Figure 4. It should be noted that while the Validation Logic section is titled Terminal Services, those Validation logic elements apply to both Terminal Server and Presentation Server environments. Virtual OS Clients Desktop Authority currently supports detecting whether a user is logging in via a VMWare-based OS, using its VMWare Virtual Machine rule, shown in Figure 5. Support for Microsoft Virtual PC and Virtual Server clients will be available in future versions of Desktop Authority. Figure 5: Desktop Authority can easily detect VMWare-based clients. Enforcing Security The last aspect of establishing the virtual desktop takes the last two covered and applies them to security. Providing a mechanism to lock down policies, patches, protection from malware, etc all cannot simply be done across the board; each environment (physical, virtual and terminal) has its own needs and requirements. For example, you would not initiate patching while connected to a Citrix session. Nor would you give internal users running a physical desktop the same restrictions as contractors using a VMWare-based guest OS running on the contractor s laptop when outside the building. So to bring this around full circle, you need to be able to a) comprehensively deploy securityrelated settings, but b) be able to easily differentiate between users logged on in a physical, virtual or terminal environment. Desktop Authority has a number of security-related measures it uses to secure desktops, each of which can be independently established based on the client type, as well as any of the 40+ Validation Logic values: 14 Virtualizing the Desktop with ScriptLogic Desktop Authority
15 Group Policy-based Security Policies Malware Protection Endpoint Device Lockdown Securing with Group Policies Utilizing Microsoft s knowledge of their own operating systems, Desktop Authority has the ability to import Group Policy Administrative Template (ADM) files for use within Desktop Authority, as shown in Figure 6. Figure 6: Deploy Group Policy-Based Security Settings with Desktop Authority The benefits of using Desktop Authority instead of native Group Policies are twofold: First, a single solution can be used to push out these settings to clients instead of doing half with Desktop Authority and half with Group Policies. Second (and most important) is the use of Validation Logic to establish who will be receiving the security settings. Group Policies has essentially six levels of granularity (domain, user or computer group membership, user or computer OU and AD site) none of which assist in separating settings for the different client types whereas, Desktop Authority has its 40 n levels of granularity, including the previously mentioned ability to differentiate physical workstations from virtual OS clients from terminal environment clients. Protection from Malware Desktop Authority has two optional components to assist with keeping users safe from malicious software: Patch Deployment and Anti-Spyware. Each one can be separately configured using Validation Logic to ensure only the appropriate types of client environments should be protected by each. For example, the Anti-Spyware scans can be run on all three types of clients, but patching wouldn t be appropriate for terminal clients. The Patch Deployment for Desktops option, shown in Figure 7, patches Microsoft and select 3 rd party vendor s solutions to centrally patch the desktop. This option also includes turnkey patchingspecific reports. 15 Virtualizing the Desktop with ScriptLogic Desktop Authority
16 Figure 7: Desktop Authority patches Microsoft and 3 rd party solutions The Spyware Detection and Removal option, shown in Figure 8, scans the client for known spyware and can be configured to automatically remove it. Figure 8: Known malicious spyware can be detected and removed automatically Endpoint Device Lockdown Patching and Spyware protection are reactive measures of protection, in that they protect against known vulnerabilities. To truly protect a client, the introduction of unknown malware must be stopped before it ever occurs. This can be accomplished by locking down any mediums by which malicious code can enter the system. This includes USB sticks, CD/DVD s, Bluetooth, WiFi, FireWire drives, and more. The USB/Port Security option in Desktop Authority, shown in Figure 9, locks down 20 different device types, allowing Read or Read/Write access to any device that can read or write (such as 16 Virtualizing the Desktop with ScriptLogic Desktop Authority
17 a USB stick or a CD Burner). USB devices can be restricted using identifiers such as serial number, VID and PID, as shown in Figure 10. Locking down these devices both prevents the introduction of malicious software, but also prevents data theft. Figure 9: Twenty different device types can be granularly locked down Figure 10: USB Devices can be white/black listed based on Serial Number or VID/PID combination 17 Virtualizing the Desktop with ScriptLogic Desktop Authority
18 Conclusion: Making the Virtual Desktop a Reality So despite the hype today about creating a virtual desktop, without a solution like Desktop Authority to complete the virtualization, all you really have is yet another way to put a user at a desktop without any means of making them productive. Even with streamed applications, the user is lacking all of the supporting desktop elements that make an application truly functional. With Desktop Authority, you will not only be able to establish a secure, consistent and functional working environment for the user regardless of what client type they log into the network with, but also be able to easily differentiate the client types and should users move from one client type to another, their configuration can be dynamically updated to use the configuration appropriate for that client type. Resources More information on Desktop Authority, as well as a 30-day fully-functional evaluation is available on our website. Other products listed in this document can be found at: Desktop Authority Microsoft SoftGrid Citrix Thinstall StreamTheory VMWare Microsoft Virtual Server About the Author: Nick Cavalancia, MCSE/MCT/MCNE/MCNI, is ScriptLogic s VP of Windows Management where he assists in driving innovation and the evangelism of ScriptLogic solutions. He has over 15 years of enterprise IT experience and is an accomplished consultant, trainer, speaker, columnist and author. He has co-authored and contributed to over a dozen books on Windows, Active Directory, Exchange and other Microsoft technologies, and is the author of Microsoft Exchange Server 2007: A Beginner s Guide. 18 Virtualizing the Desktop with ScriptLogic Desktop Authority
Desktop Authority vs. Group Policy Preferences
Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft
Desktop Authority and Group Policy Preferences
Desktop Authority and Group Policy Preferences A ScriptLogic Product Positioning Paper 1.800.813.6415 www.scriptlogic.com Desktop Authority and Group Policy Preferences Introduction Group Policy Preferences
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client
LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled
RES PowerFuse Version Comparison Chart (1/9)
RES PowerFuse Version Comparison Chart (1/9) Alerting Allows you to set up notifications of specific events, which can consist of sending e-mails to one or more recipients, sending SNMP notifications (
Leostream Corporation leostream.com [email protected] Share this Whitepaper!
Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using
Implementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
Simplify Suite in a VDI Environment
Simplify Suite in a VDI Environment Before jumping onto the VDI bandwagon, ensure a smooth transition. tricerat solves the problems you may face when transitioning to VDI. Andrew Parlette, VP of Product
Benefit. Allows you to integrate RES PowerFuse with application virtualization technologies other than SoftGrid (e.g. Citrix XenApp, VMWare Thinapp).
Core (1/2) Access Control Access to settings and applications can be based on Organizational Units in Directory Services like (Active Directory and Novell) or through users and groups in the domain. This
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
RES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses
WHITE PAPER: LICENSE MANAGEMENT........................................ Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that
Augmenting VMware View Horizon (VDI) with Micro Focus Client Management
White Paper ZENworks Augmenting VMware View Horizon (VDI) with Micro Focus Client Management Table of Contents page Making the VMware View Horizon Management Solution Work Beyond Your Wildest Dreams...2
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
Classroom Management, part of Intel Education User Manual
Classroom Management, part of Intel Education User Manual Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE
Using TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
Desktop Management, Profile Migration and Cross Platform Delivery. Technical Overview
Desktop Management, Profile Migration and Cross Platform Delivery Executive Summary This document provides a technical overview of how AppSense Environment Manager can deliver a flexible and managed user
Desktop Application Virtualization and Application Streaming: Function and Security Benefits
Desktop Application Virtualization and Application Streaming: Function and Security Benefits Tom Olzak August 2007 Current security issues caused by an increasing number of threats, application vulnerabilities,
Cluster Guide. Version: 9.0 Released: March 2015. Companion Guides:
Cluster Guide Version: 9.0 Released: March 2015 Companion Guides: UniPrint Infinity Companion Guides can be found online for your convenience and are intended to assist Administrators with the operation
Release Version 3 The 2X Software Server Based Computing Guide
Release Version 3 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Egress Switch Client Deployment Guide V4.x
Egress Switch Client Deployment Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents System Requirements... 4 Deployment Process... 4 Computer & User Based Policy Application...
Release Version 4.1 The 2X Software Server Based Computing Guide
Release Version 4.1 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
DIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
DESKTOP AUTHORITY AND MICROSOFT SYSTEMS MANAGEMENT SERVER
S O L U T I O N S DESKTOP AUTHORITY AND MICROSOFT SYSTEMS MANAGEMENT SERVER A ScriptLogic Product Positioning Whitepaper NICK CAVALANCIA 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m 1.
THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper
THE COMPLETE VIEWER FOR MS PROJECT Seavus DOOEL 2010 2 TABLE OF CONTENTS 1 DEPLOYMENT OPTIONS... 3 1.1 SINGLE USER INSTALLATION... 3 1.2 CONCURRENT USER INSTALLATION... 4 1.3 SINGLE COMPANY KEY INSTALLATION...
Managing Remote Access
VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following
Using WMI Scripts with BitDefender Client Security
Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...
ManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
Virtual Desktop Infrastructure
Virtual Desktop Infrastructure Thomas Huber Regional SE Manager EMEA Eastern Region [email protected] New Product Announcements at VMworld Infrastructure Optimization Management & Automation Distributed
Goverlan Remote Control
Goverlan Remote Control Feature Overview Goverlan Remote Control Powerful IT remote control, made easy Support, control and manage multiple users anywhere securely and seamlessly. With its powerful broadscope
Citrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All. www.citrix.com
Citrix XenDesktop with FlexCast technology White Paper Citrix XenDesktop: Desktop Virtualization For All www.citrix.com Today s organizations encompass a diverse range of users, from road warriors using
Quick Start Guide. For Thick and/or Thin Client Environments. Released: February 2012
Quick Start Guide For Thick and/or Thin Client Environments Released: February 2012 Revised: August 12, 2013 Copyright Notice UniPrint, a Division of ACCEO Solutions, Inc. and its affiliates, makes no
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
Desktop Virtualization Strategy
Choosing the right solution for your needs ABSTRACT Several forms of desktop virtualization can help organizations satisfy users needs for mobility and flexibility, while relieving pressure on information
Sage 100 ERP. Installation and System Administrator s Guide
Sage 100 ERP Installation and System Administrator s Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the
In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.
QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions
Manage, Extend, and Simplify Group Policy using Quest Group Policy Solutions Technical Brief written by Darren Mar-Elia Chief Technology Officer Windows Management Quest Software, Inc. Copyright Quest
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting By: Brien M. Posey, Microsoft MVP Published: June 2008 About the Author: Brien M. Posey, MCSE, is a Microsoft Most Valuable
System Planning, Deployment, and Best Practices Guide
www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties
Running Windows XP Mode with Windows Virtual PC A How-to Guide for Small Businesses
Running Windows XP Mode with Windows Virtual PC A How-to Guide for Small Businesses Contents Section 1: Introduction to Windows XP Mode for Windows 7 2 Section 2: Getting Started with Windows XP Mode 4
How to Migrate Citrix XenApp to VMware Horizon 6 TECHNICAL WHITE PAPER
How to Migrate Citrix XenApp to VMware Horizon 6 TECHNICAL WHITE PAPER Table of Contents Introduction... 3 Horizon and XenApp Components Comparison.... 4 Preparing for the Migration.... 5 Three Approaches
How To Use Outlook On A Virtual Desktop On A Pc Or Macbook
Virtual Desktop Frequently Asked Questions 1. How do I download the VMWare agent? 2. I downloaded the client from another computer. Why don t I see the shortcut on the desktop of this computer? 3. How
VMware User Environment Manager
VMware User Environment Manager Deployed in 60 Minutes or Less Author: Dale Carter Senior Solution Architect VMware Technology Consulting Services April 2015 Table of Contents 1. VMware User Environment
WHITE PAPER. Avoiding the Pitfalls when Transitioning into Managed Services. By Nick Cavalancia
Avoiding the Pitfalls when Transitioning into Managed Services By Nick Cavalancia As you begin your journey transitioning into managed services, you ll quickly find the transition is more about how you
www.chippc.com Xcalibur Global 1.2
Xcalibur Global 1.2 www.chippc.com Xcalibur Global 1.2 Management Software One Platform No Limits... Thin Client Management Active Directory Users & Groups Policy Based Management Devices Users VDI Management
Classroom Management, part of Intel Education User s Guide. Available in the U.S. only for the K-12 market starting fall 2014.
Classroom Management, part of Intel Education User s Guide Available in the U.S. only for the K-2 market starting fall 20. Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
Group Policy for Beginners
Group Policy for Beginners Microsoft Corporation Published: April 2011 Abstract Group Policy is the essential way that most organizations enforce settings on their computers. This white paper introduces
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
How To Get A Client Side Virtualization Solution For Your Financial Services Business
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
RES Workspace Manager 2012 SR2 Release Notes Fixpack 9.7.2.6
RES Workspace Manager 2012 SR2 Release Notes Fixpack 9.7.2.6 Contents 1. Enhancements and Improvements 6 Citrix XenApp 6: Registry value to make Citrix XenApp server act as Session Host Only server6 Workspace
CITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS Number: 1Y0-A17 Passing Score: 800 Time Limit: 120 min File Version: 38.7 http://www.gratisexam.com/ CITRIX 1Y0-A17 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
Workspace Manager 2014 Module Comparison Chart
Workspace Manager 2014 Module Comparison Chart DYNAMIC CONFIGURATION MODULE Desktop Transformation Transforms any existing desktop infrastructure into managed user workspaces using live data and a step-bystep
Best Practices for Enterprise Mobile Printing
Micro Focus iprint Best Practices for Enterprise Mobile Printing Mobility is changing the way people do everything. Today s workers are constantly on the move and armed with apps often unsanctioned by
Licensing Windows for Virtual Desktops
Licensing Windows for Virtual Desktops This document is intended to explain licensing Windows virtual desktops and how to calculate the number of licenses required for common usage scenarios. Contents
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
Executive Summary: Cost Savings with ShutdownPlus Rolling Restart
ShutdownPlus Rolling Restart Executive Summary: Cost Savings with ShutdownPlus Rolling Restart Saving money and preventing user interruptions from system downtime due to restarting Remote Desktop Servers
High Availability Setup Guide
High Availability Setup Guide Version: 9.0 Released: March 2015 Companion Guides: The UniPrint Infinity Administrator s Guide, Cluster Guide and Mobile Setup Guide can be found online for your convenience
Stellar Active Directory Manager
Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly
Trusteer Rapport Virtual Implementation Scenarios
Trusteer Rapport Virtual Implementation Scenarios Technical White Paper Version 1.0 October 2012 new threats, new thinking Contents About this Document 1 1. Overview of Virtual Desktop/Machine Environments
Accelerating Microsoft Windows 7 migrations with Citrix XenApp
Citrix XenApp and Microsoft Windows 7 White Paper Accelerating Microsoft Windows 7 migrations with Citrix XenApp XenApp will accelerate your Windows 7 migration, save money and resources, minimize disruption
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Server based computing An introduction to server based computing, its advantages and how it works.
Server based computing An introduction to server based computing, its advantages and how it works. This whitepaper explains the concept of server based computing and defines the main components of its
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
Virtual Printing Solutions with View in Horizon 6
VMware Horizon 6.x TECHNICAL WHITE PAPER Table of Contents Overview.... 3 Printer Redirection.... 3 Location-Based Printing.... 3 Virtual Printing Compatibility Matrix.... 4 Use Cases and Topology....
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief
Frequently Asked Questions: Desktone s Offerings and Market
Frequently Asked Questions: Desktone s Offerings and Market General Virtualization Q: What is desktop virtualization? A: Desktop virtualization is the separation of a client operating system/environment
Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4
Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection
How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection Revised 09/2014 These instructions presume that you already have the Cisco AnyConnect Secure
