SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Windows RT in the Enterprise


Nico Sienaert
Lead Infrastructure Consultant | Getronics
V-Technology Solutions Professional | Microsoft
Session Objectives and Takeaways

Positioning of Windows RT devices

Where does Windows RT in the Enterprise makes sense

What are the challenges

How do you manage and keep control
Flavors of Windows 8 tablets




      Windows 8 tablets   Windows 8 tablets   Windows RT tablets
       with Intel Core     with Intel Atom        with ARM
      64-bit processors   32-bit processors      processors
Windows tablets in Business Environments

       Devices & Experiences   Ready for Business
       People Love             to Embrace
What capabilities are needed?

           Windows 8 tablets with Atom or Windows RT tablets


           Windows 8 tablets with Intel Core

           Desktop Apps: W8 tablets with Intel CPU
           W8 LOB Apps: Intel Core, Atom or ARM

           (Full) Management: IntuneConfigMgr

           Best Connectivity: W8 tablets with Intel CPU
           Always on Capability: Atom or Windows RT
Modern Device Management


                           Devices & Platforms




       Single admin
       console
Configuration Steps
1.   PurchaseTry Windows Intune Subscription
2.   Add Public Company Domain and CNAME for enrollment redirection
3.   Verify Users have Public Domain UPNs and perform AD User Discovery
4.   Deploy and Configure AD Federated Services (ADFS 2.0)
5.   Deploy and Configure AD Directory Synchronization
6.   Configuring Configuration Manager for Mobile Device Management
      Creating a Windows Intune Subscription in the Configuration Manager Admin Console
      Creating the Windows Intune Connector Site System role
7. Verification of Configuration Manager is successfully connecting to Windows Intune
   Service.
        CloudUserSync
        DMPDownloader
        DMPUploader
Windows 8 App Delivery

   Download from Windows Store                Side Load from Your Infrastructure



                                                                             Management
                                                  Self-Service Portal
                                                                          Infrastructure Cloud
                                                         (SSP)



                                 Windows RT




                                                                        Custom LOB Apps
      Public Apps
                                                                        App Delivery



                                 Windows 8
Enroll a Windows RT device
Get a certificate (for instance internal PKI) to sign your Apps

Sign your Apps with the certificate

Upload the certificate into ConfigMgrIntune

Upload Sideloading key into ConfigMgrIntune

Go on the Windows RT device to “Company Applications”

Connect to the Windows Intune Service

Install Company Portal

You are ready to manage and to deploy Apps
Troubleshooting of Software Distribution

 HKCUSoftwareMicrosoftWindowsCurrentVersionMDMJobDB

 •   BITSId
 •   DeployRetryCount
 •   LastError
 •   Status
     Initialized /Created = 10
     Download In Progress = 20
     Download Failed       = 30
     Download Complete = 40
     Install In Progress = 50
     Install Failed    = 60
     Install Complete = 70
Problem Scenarios (1)

Symptom:
Application is not installing and Reg status of the App is 10
Problem Cause:
Most likely sideloading is not enabled
Mitigation:
HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsAppxAllowTrustedApps=1

Symptom:
Application is not installing and Reg status of the App is 30
Problem Cause:
Internet Connection downDP where content is hosted was downCert to issue the device is expired
Mitigation:
Solve above
Problem Scenarios (2)

Symptom:
Application is not installing and Reg status of the App is 60
Problem Cause:
Application Package corruptCertificate expired...
Mitigation:
Install App locally with Add-AppxPackage

Symptom:
No Job entry is created in the Registry corresponding to the application requested
Problem Cause:
Internet Connection lost during installnotification channel with the device is not created
Mitigation:
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionMDMWNSChannelURi value in
this case would be empty.
User Experience on Windows RT

                                                                • Run on both Windows RT
• Thin, light, and sleek
                                                                  and x86
• Long battery life
                                                                • Leverage existing developer
• Includes class drivers for                                      language and tools
  most peripherals
                                 Hardware and   Applications
                                 Software                       • Sideloading (for line-of-
• Secure by default                                               business WinRT apps) and
  (UEFI, TPM)                    Innovation                       Windows Store
                                                                • New UI, including desktop
• Integrated engineering
  with ecosystem                                                • Office Home and Student 2013
                                                                  RT is included
• Predictable and reliable
  over time                      High Quality   Work and Life   • Inbox Mail client
  • Pre-configured environment                                  • Touch, mouse, keyboard
    on certified hardware
                                                                • Multiple user accounts
Driver Compatibility




   www.microsoft.com/en-us/windows/compatibility/winrt/CompatCenter/Home
Office Home and Students 2013 RT

                  • Preinstalled on ARM-based Windows RT devices
                  • Includes new Office applications:
                    Word, Excel, PowerPoint, OneNote
                  • Office Home & Student 2013 RT commercial use rights
                    are included in:
                        Office 365 or
                        Office Standard/Professional Plus 2013 (as secondary use right)
                        or
                        Commercial use license via Volume Licensing
Connectivity (1)

         VPN connection
         • Inbox VPN client for Microsoft server is included
         • Inbox VPN client can interoperate with 3rd party VPN servers via
             PPTP, L2TP, SSTP and IKEv2.
         •   Encryption:
             3DES, AES_128, AES_192, AES_256, CBC_3DES, CBC_DES
         •   Integrity: SHA1, SHA_256, SHA_384
         •   Password: PAP / CHAP / MS-CHAPv2 / EAP
         •   Certificates: User & Machine
         •   Support for split-tunnel
         •   Web Proxy and intranet settings
Connectivity (2)

         VPN Client Provsioning
         • Get Connected Wizard
         • IntuneConfigMgr
         • Powershell
Provisioning VPN via IntuneConfigMgr


                            InTune MDM




                  4 - VPN Connection establishment
                                                                   SCCM
                                                     RRAS Server

                                                        Enterprise Premises
Connectivity (2)

         VPN Client Provsioning
         • Get Connected Wizard
         • IntuneConfigMgr
         • Powershell


        Multi-factor authentication
        • Smartcard (PIV, GIDS) or Virtual Smartcards
        • RSA Token
OTP using RSA Secure ID




              VPN Tunnel          Internet
                                                        VPN Server
 Windows RT                                                          RSA Authentication
   device                                                                Manager

                                                                Enterprise Premises
                     TTLS-PAP authentication protocol

                     Only one OTP vendor supported: Odyssey
Connectivity (2)

         VPN Client Provsioning
         • Get Connected Wizard
         • IntuneConfigMgr
         • Powershell


        Multi-factor authentication
        • Smartcard (PIV, GIDS) or Virtual Smartcards
        • RSA Token
           • Limitations:
             • PIN Changes
             • Token Challenge-Response
           • Workaround:
             • Web-login page protected by the RSA Web Agent
Data and App Access

       RemoteApp
       • Grant access to line-of-business applications and data
       • Seamlessly launch apps from Windows RT
       • Secure corporate data: avoid storing enterprise data on
         consumer devices
       • Ensure compliance requirements

       VDI
       • Full VDI experience (RemoteFX, USB redirection, Multi-touch remoting)
       3rd Party
       •   Citrix Receiver
       Remote Assistance
Security and Manageability (1)

                             Security capabilities on Windows RT devices
                             •   Secured Boot, Trusted Boot
                             •   Device Encryption
                             •   Picture password
                             •   Windows Firewall, Windows Defender
                             •   NAP (Network Access Protection) supported
                             Governance through Exchange ActiveSync (EAS)*
                             • Password requirements (e.g., password complexity, picture
                               password, device lock, password expiration etc.)
                             • No support of external encryption
                             • Remote Content Wipe & lockout behavior
                             • Mail App limitations (Alternative OWA with Exchange 2013 or O365)
* Enabled through Mail app
Security and Manageability (2)
        Diagnostics and troubleshooting
        • Windows PowerShell supported
        • The traditional Windows tools (Eventvwr, TaskMgr, Troubleshooting,…)


        Cloud-based management with Windows Intune
        Single pane-of-glass administration through ConfigMgr 2012 SP1
        • Distribute and manage new Windows apps (via sideloading)
        • Push configurations (e.g., VPN config)
        • Enforce more governance settings
        • Ensure compliance (e.g., monitor security settings)
        • Collect inventory information (e.g., which LOB apps are installed)
Windows RT Management Details

                                             Windows RT Direct
                                           Management via Windows
                                                  Intune          Exchange ActiveSync
Setting
Allow convenience logon policy                                            
Alphanumeric password required policy                                     
Attachments enabled                                                       
Hardware inventory                                                        
Maximum inactivity time lock                                              
Password management                                                       
Require device encryption                                                 
Capability
Application publishing                                                    
Deep-link into public application stores                                  
User self-service portal                                                  
VPN Client configuration                             !                    
Capabilities in a glance
                      Capability   Windows RT                       Portal Capability     Windows RT


Application management                         Enroll Device                                Yes

Endpoint Protection                    O        Rename Device                                Yes

Hardware Inventory                             Retire (un-enroll local device)              Yes

Software Inventory                     !       Wipe (remotely other devices)                Yes

Remote control                         O        Install LOB Applications                     Yes

Reporting                                      Install publicly available applications      Yes

Software updates                       O        Contact IT                                   Yes

Compliance settings                    !
                                                                      Retire Device       Windows RT
Power management                       O
                                                Removal of Side-loading key                  Yes
Software metering                      O
                                                Continue usage of side-loaded Apps           No

                                                Install new side-loaded Apps                 No

                                                Policies retain on device                    Yes
Miscellaneous
RECAP
 Windows RT devices are primarily designed as consumer
 devices, but can be used in corporate
 environments as well, either using employee-owned
 devices or company-owned devices depending on the situation.
 To properly support Windows RT devices in the
 workplace, enterprises should understand the
 capabilities provided in and restrictions imposed by
 Windows RT, as well as the specific infrastructure
 requirements for supporting Windows RT devices within
 their organization.
Interesting Links
Windows RT VPN user guide
     http://technet.microsoft.com/en-us/library/jj900206.aspx

Windows 8 VPN – PowerShell support
      http://technet.microsoft.com/en-us/library/jj613766.aspx

Compatibility and Interoperability
      http://technet.microsoft.com/en-us/library/jj613768.aspx

How to Manage Mobile Devices by Using the Windows Intune
Connector in Configuration Manager
     http://technet.microsoft.com/en-us/library/jj884158.aspx
Windows RT in the Enterprise


Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

CEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features ImpactCEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features Impactsthirion
 
Applying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsApplying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsNovell
 
Sonexis release 10 specs
Sonexis release 10 specsSonexis release 10 specs
Sonexis release 10 specsFrankSegarra
 
Sonexis Conference Manager 9.3 Data Sheet
Sonexis Conference Manager 9.3 Data SheetSonexis Conference Manager 9.3 Data Sheet
Sonexis Conference Manager 9.3 Data SheetFrankSegarra
 
IT Camp Windows Server 2012 Beta Hyper-V Overview
IT Camp Windows Server 2012 Beta Hyper-V OverviewIT Camp Windows Server 2012 Beta Hyper-V Overview
IT Camp Windows Server 2012 Beta Hyper-V OverviewHarold Wong
 
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...Novell
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewSteven Wilder
 
It camp ws8 beta hyper-v
It camp   ws8 beta hyper-vIt camp   ws8 beta hyper-v
It camp ws8 beta hyper-vChris Avis
 
What's new in zimbra 8 presentation
What's new in zimbra 8 presentationWhat's new in zimbra 8 presentation
What's new in zimbra 8 presentationsolarisyourep
 
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Intergen
 
Installing and Configuring Novell Conferencing
Installing and Configuring Novell ConferencingInstalling and Configuring Novell Conferencing
Installing and Configuring Novell ConferencingNovell
 
Zimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentationZimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentationsolarisyourep
 
Data power v7 update - Ravi Katikala
Data power v7 update - Ravi KatikalaData power v7 update - Ravi Katikala
Data power v7 update - Ravi Katikalafloridawusergroup
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training Yuvaraj1986
 
Whats new in Citrix XenApp 6
Whats new in Citrix XenApp 6Whats new in Citrix XenApp 6
Whats new in Citrix XenApp 6gadi_fe
 

Was ist angesagt? (20)

Bcit win8 ws2012 session
Bcit win8 ws2012 sessionBcit win8 ws2012 session
Bcit win8 ws2012 session
 
CEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features ImpactCEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features Impact
 
Applying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday ProblemsApplying Novell Identity Manager to Your Everyday Problems
Applying Novell Identity Manager to Your Everyday Problems
 
Sonexis release 10 specs
Sonexis release 10 specsSonexis release 10 specs
Sonexis release 10 specs
 
Sonexis Conference Manager 9.3 Data Sheet
Sonexis Conference Manager 9.3 Data SheetSonexis Conference Manager 9.3 Data Sheet
Sonexis Conference Manager 9.3 Data Sheet
 
IT Camp Windows Server 2012 Beta Hyper-V Overview
IT Camp Windows Server 2012 Beta Hyper-V OverviewIT Camp Windows Server 2012 Beta Hyper-V Overview
IT Camp Windows Server 2012 Beta Hyper-V Overview
 
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
 
It camp ws8 beta hyper-v
It camp   ws8 beta hyper-vIt camp   ws8 beta hyper-v
It camp ws8 beta hyper-v
 
What's new in zimbra 8 presentation
What's new in zimbra 8 presentationWhat's new in zimbra 8 presentation
What's new in zimbra 8 presentation
 
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Installing and Configuring Novell Conferencing
Installing and Configuring Novell ConferencingInstalling and Configuring Novell Conferencing
Installing and Configuring Novell Conferencing
 
Internet Explorer 8
Internet Explorer 8Internet Explorer 8
Internet Explorer 8
 
Zimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentationZimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentation
 
Data power v7 update - Ravi Katikala
Data power v7 update - Ravi KatikalaData power v7 update - Ravi Katikala
Data power v7 update - Ravi Katikala
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Whats new in Citrix XenApp 6
Whats new in Citrix XenApp 6Whats new in Citrix XenApp 6
Whats new in Citrix XenApp 6
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 

Andere mochten auch

Texas s ta r powerpoint
Texas  s ta r powerpointTexas  s ta r powerpoint
Texas s ta r powerpointHalogen30
 
Delivering ITaaS With a Software-Defined Data Center
Delivering ITaaS With a Software-Defined Data CenterDelivering ITaaS With a Software-Defined Data Center
Delivering ITaaS With a Software-Defined Data CenterEMC
 
Fotonovel·la tutorial adrià, roger i gerard
Fotonovel·la tutorial adrià, roger i gerardFotonovel·la tutorial adrià, roger i gerard
Fotonovel·la tutorial adrià, roger i gerardmgonellgomez
 
AEEF MLS - Market Report Q2 2015
AEEF MLS - Market Report Q2 2015AEEF MLS - Market Report Q2 2015
AEEF MLS - Market Report Q2 2015Costin Ciora
 
Dedicated Networks For IP Storage
Dedicated Networks For IP StorageDedicated Networks For IP Storage
Dedicated Networks For IP StorageEMC
 
Prezentace 1.SG
Prezentace 1.SGPrezentace 1.SG
Prezentace 1.SGanatoni19
 
Information security
Information securityInformation security
Information securityxrayjamie79
 
Lessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanzaLessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanzaCristina Belloni
 
The Emerging Strategic CIO Infographic
The Emerging Strategic CIO InfographicThe Emerging Strategic CIO Infographic
The Emerging Strategic CIO InfographicEMC
 
Mobile Innovations Workshop
Mobile Innovations WorkshopMobile Innovations Workshop
Mobile Innovations WorkshopResearch Now
 

Andere mochten auch (20)

Texas s ta r powerpoint
Texas  s ta r powerpointTexas  s ta r powerpoint
Texas s ta r powerpoint
 
1 tribe review
1   tribe review1   tribe review
1 tribe review
 
2015 day 11
2015 day 112015 day 11
2015 day 11
 
2015 day 1
2015 day 12015 day 1
2015 day 1
 
Delivering ITaaS With a Software-Defined Data Center
Delivering ITaaS With a Software-Defined Data CenterDelivering ITaaS With a Software-Defined Data Center
Delivering ITaaS With a Software-Defined Data Center
 
Fotonovel·la tutorial adrià, roger i gerard
Fotonovel·la tutorial adrià, roger i gerardFotonovel·la tutorial adrià, roger i gerard
Fotonovel·la tutorial adrià, roger i gerard
 
Doug museum
Doug museumDoug museum
Doug museum
 
Conceptos matematicos
Conceptos matematicosConceptos matematicos
Conceptos matematicos
 
AEEF MLS - Market Report Q2 2015
AEEF MLS - Market Report Q2 2015AEEF MLS - Market Report Q2 2015
AEEF MLS - Market Report Q2 2015
 
Venture for America Summary
Venture for America SummaryVenture for America Summary
Venture for America Summary
 
Dedicated Networks For IP Storage
Dedicated Networks For IP StorageDedicated Networks For IP Storage
Dedicated Networks For IP Storage
 
Prezentace 1.SG
Prezentace 1.SGPrezentace 1.SG
Prezentace 1.SG
 
Animal power pont
Animal power pontAnimal power pont
Animal power pont
 
Information security
Information securityInformation security
Information security
 
Doc2
Doc2Doc2
Doc2
 
Lessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanzaLessico civico. Teorie e pratiche della cittadinanza
Lessico civico. Teorie e pratiche della cittadinanza
 
The Emerging Strategic CIO Infographic
The Emerging Strategic CIO InfographicThe Emerging Strategic CIO Infographic
The Emerging Strategic CIO Infographic
 
Mobile Innovations Workshop
Mobile Innovations WorkshopMobile Innovations Workshop
Mobile Innovations Workshop
 
Client Awards 2015
Client Awards 2015Client Awards 2015
Client Awards 2015
 
Presentation2michaelcollins
Presentation2michaelcollinsPresentation2michaelcollins
Presentation2michaelcollins
 

Ähnlich wie Managing Windows RT devices in the Enterprise

ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010Michael Noel
 
Mct summit 2013 rt in the enterprise
Mct summit 2013   rt in the enterpriseMct summit 2013   rt in the enterprise
Mct summit 2013 rt in the enterprisePeter De Tender
 
Mct summit 2013 Windows RT in the enterprise
Mct summit 2013  Windows RT in the enterpriseMct summit 2013  Windows RT in the enterprise
Mct summit 2013 Windows RT in the enterprisePeter De Tender
 
Windows 8.1 for IT-pros - presentation from Campus days 2013
Windows 8.1 for IT-pros - presentation from Campus days 2013Windows 8.1 for IT-pros - presentation from Campus days 2013
Windows 8.1 for IT-pros - presentation from Campus days 2013Microsoft
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overviewkoesteruk22
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoQuek Lilian
 
Deploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSDeploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSAmazon Web Services
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsBizTalk360
 
InduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration WebinarInduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration WebinarAVEVA
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?Tobias Koprowski
 
Client Continuum Dec Fy09
Client Continuum Dec Fy09Client Continuum Dec Fy09
Client Continuum Dec Fy09Martha Rotter
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
KoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginnersKoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginnersTobias Koprowski
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 

Ähnlich wie Managing Windows RT devices in the Enterprise (20)

ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
 
Mct summit 2013 rt in the enterprise
Mct summit 2013   rt in the enterpriseMct summit 2013   rt in the enterprise
Mct summit 2013 rt in the enterprise
 
Mct summit 2013 Windows RT in the enterprise
Mct summit 2013  Windows RT in the enterpriseMct summit 2013  Windows RT in the enterprise
Mct summit 2013 Windows RT in the enterprise
 
W8 client management
W8 client managementW8 client management
W8 client management
 
Windows 8.1 for IT-pros - presentation from Campus days 2013
Windows 8.1 for IT-pros - presentation from Campus days 2013Windows 8.1 for IT-pros - presentation from Campus days 2013
Windows 8.1 for IT-pros - presentation from Campus days 2013
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overview
 
Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John Delizo
 
Deploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSDeploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWS
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
InduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration WebinarInduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration Webinar
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
Sanjeev Kumar
Sanjeev KumarSanjeev Kumar
Sanjeev Kumar
 
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
InfoTRAMS - Czy platforma Microsoft Azure jest biznoseow bezpieczna?
 
Client Continuum Dec Fy09
Client Continuum Dec Fy09Client Continuum Dec Fy09
Client Continuum Dec Fy09
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
KoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginnersKoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginners
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 

Mehr von Microsoft TechNet - Belgium and Luxembourg

Mehr von Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 
Configuring and Implementing DirectAccess with Windows Server 2012
Configuring and Implementing DirectAccess with Windows Server 2012 Configuring and Implementing DirectAccess with Windows Server 2012
Configuring and Implementing DirectAccess with Windows Server 2012
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Managing Windows RT devices in the Enterprise

  • 1. Windows RT in the Enterprise Nico Sienaert Lead Infrastructure Consultant | Getronics V-Technology Solutions Professional | Microsoft
  • 2. Session Objectives and Takeaways Positioning of Windows RT devices Where does Windows RT in the Enterprise makes sense What are the challenges How do you manage and keep control
  • 3. Flavors of Windows 8 tablets Windows 8 tablets Windows 8 tablets Windows RT tablets with Intel Core with Intel Atom with ARM 64-bit processors 32-bit processors processors
  • 4. Windows tablets in Business Environments Devices & Experiences Ready for Business People Love to Embrace
  • 5. What capabilities are needed? Windows 8 tablets with Atom or Windows RT tablets Windows 8 tablets with Intel Core Desktop Apps: W8 tablets with Intel CPU W8 LOB Apps: Intel Core, Atom or ARM (Full) Management: IntuneConfigMgr Best Connectivity: W8 tablets with Intel CPU Always on Capability: Atom or Windows RT
  • 6. Modern Device Management Devices & Platforms Single admin console
  • 7. Configuration Steps 1. PurchaseTry Windows Intune Subscription 2. Add Public Company Domain and CNAME for enrollment redirection 3. Verify Users have Public Domain UPNs and perform AD User Discovery 4. Deploy and Configure AD Federated Services (ADFS 2.0) 5. Deploy and Configure AD Directory Synchronization 6. Configuring Configuration Manager for Mobile Device Management Creating a Windows Intune Subscription in the Configuration Manager Admin Console Creating the Windows Intune Connector Site System role 7. Verification of Configuration Manager is successfully connecting to Windows Intune Service. CloudUserSync DMPDownloader DMPUploader
  • 8. Windows 8 App Delivery Download from Windows Store Side Load from Your Infrastructure Management Self-Service Portal Infrastructure Cloud (SSP) Windows RT Custom LOB Apps Public Apps App Delivery Windows 8
  • 9. Enroll a Windows RT device Get a certificate (for instance internal PKI) to sign your Apps Sign your Apps with the certificate Upload the certificate into ConfigMgrIntune Upload Sideloading key into ConfigMgrIntune Go on the Windows RT device to “Company Applications” Connect to the Windows Intune Service Install Company Portal You are ready to manage and to deploy Apps
  • 10. Troubleshooting of Software Distribution HKCUSoftwareMicrosoftWindowsCurrentVersionMDMJobDB • BITSId • DeployRetryCount • LastError • Status Initialized /Created = 10 Download In Progress = 20 Download Failed = 30 Download Complete = 40 Install In Progress = 50 Install Failed = 60 Install Complete = 70
  • 11. Problem Scenarios (1) Symptom: Application is not installing and Reg status of the App is 10 Problem Cause: Most likely sideloading is not enabled Mitigation: HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsAppxAllowTrustedApps=1 Symptom: Application is not installing and Reg status of the App is 30 Problem Cause: Internet Connection downDP where content is hosted was downCert to issue the device is expired Mitigation: Solve above
  • 12. Problem Scenarios (2) Symptom: Application is not installing and Reg status of the App is 60 Problem Cause: Application Package corruptCertificate expired... Mitigation: Install App locally with Add-AppxPackage Symptom: No Job entry is created in the Registry corresponding to the application requested Problem Cause: Internet Connection lost during installnotification channel with the device is not created Mitigation: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionMDMWNSChannelURi value in this case would be empty.
  • 13.
  • 14. User Experience on Windows RT • Run on both Windows RT • Thin, light, and sleek and x86 • Long battery life • Leverage existing developer • Includes class drivers for language and tools most peripherals Hardware and Applications Software • Sideloading (for line-of- • Secure by default business WinRT apps) and (UEFI, TPM) Innovation Windows Store • New UI, including desktop • Integrated engineering with ecosystem • Office Home and Student 2013 RT is included • Predictable and reliable over time High Quality Work and Life • Inbox Mail client • Pre-configured environment • Touch, mouse, keyboard on certified hardware • Multiple user accounts
  • 15. Driver Compatibility www.microsoft.com/en-us/windows/compatibility/winrt/CompatCenter/Home
  • 16. Office Home and Students 2013 RT • Preinstalled on ARM-based Windows RT devices • Includes new Office applications: Word, Excel, PowerPoint, OneNote • Office Home & Student 2013 RT commercial use rights are included in: Office 365 or Office Standard/Professional Plus 2013 (as secondary use right) or Commercial use license via Volume Licensing
  • 17. Connectivity (1) VPN connection • Inbox VPN client for Microsoft server is included • Inbox VPN client can interoperate with 3rd party VPN servers via PPTP, L2TP, SSTP and IKEv2. • Encryption: 3DES, AES_128, AES_192, AES_256, CBC_3DES, CBC_DES • Integrity: SHA1, SHA_256, SHA_384 • Password: PAP / CHAP / MS-CHAPv2 / EAP • Certificates: User & Machine • Support for split-tunnel • Web Proxy and intranet settings
  • 18. Connectivity (2) VPN Client Provsioning • Get Connected Wizard • IntuneConfigMgr • Powershell
  • 19. Provisioning VPN via IntuneConfigMgr InTune MDM 4 - VPN Connection establishment SCCM RRAS Server Enterprise Premises
  • 20. Connectivity (2) VPN Client Provsioning • Get Connected Wizard • IntuneConfigMgr • Powershell Multi-factor authentication • Smartcard (PIV, GIDS) or Virtual Smartcards • RSA Token
  • 21. OTP using RSA Secure ID VPN Tunnel Internet VPN Server Windows RT RSA Authentication device Manager Enterprise Premises TTLS-PAP authentication protocol Only one OTP vendor supported: Odyssey
  • 22. Connectivity (2) VPN Client Provsioning • Get Connected Wizard • IntuneConfigMgr • Powershell Multi-factor authentication • Smartcard (PIV, GIDS) or Virtual Smartcards • RSA Token • Limitations: • PIN Changes • Token Challenge-Response • Workaround: • Web-login page protected by the RSA Web Agent
  • 23. Data and App Access RemoteApp • Grant access to line-of-business applications and data • Seamlessly launch apps from Windows RT • Secure corporate data: avoid storing enterprise data on consumer devices • Ensure compliance requirements VDI • Full VDI experience (RemoteFX, USB redirection, Multi-touch remoting) 3rd Party • Citrix Receiver Remote Assistance
  • 24.
  • 25.
  • 26. Security and Manageability (1) Security capabilities on Windows RT devices • Secured Boot, Trusted Boot • Device Encryption • Picture password • Windows Firewall, Windows Defender • NAP (Network Access Protection) supported Governance through Exchange ActiveSync (EAS)* • Password requirements (e.g., password complexity, picture password, device lock, password expiration etc.) • No support of external encryption • Remote Content Wipe & lockout behavior • Mail App limitations (Alternative OWA with Exchange 2013 or O365) * Enabled through Mail app
  • 27. Security and Manageability (2) Diagnostics and troubleshooting • Windows PowerShell supported • The traditional Windows tools (Eventvwr, TaskMgr, Troubleshooting,…) Cloud-based management with Windows Intune Single pane-of-glass administration through ConfigMgr 2012 SP1 • Distribute and manage new Windows apps (via sideloading) • Push configurations (e.g., VPN config) • Enforce more governance settings • Ensure compliance (e.g., monitor security settings) • Collect inventory information (e.g., which LOB apps are installed)
  • 28. Windows RT Management Details Windows RT Direct Management via Windows Intune Exchange ActiveSync Setting Allow convenience logon policy   Alphanumeric password required policy   Attachments enabled   Hardware inventory   Maximum inactivity time lock   Password management   Require device encryption   Capability Application publishing   Deep-link into public application stores   User self-service portal   VPN Client configuration ! 
  • 29. Capabilities in a glance Capability Windows RT Portal Capability Windows RT Application management  Enroll Device Yes Endpoint Protection O Rename Device Yes Hardware Inventory  Retire (un-enroll local device) Yes Software Inventory ! Wipe (remotely other devices) Yes Remote control O Install LOB Applications Yes Reporting  Install publicly available applications Yes Software updates O Contact IT Yes Compliance settings ! Retire Device Windows RT Power management O Removal of Side-loading key Yes Software metering O Continue usage of side-loaded Apps No Install new side-loaded Apps No Policies retain on device Yes
  • 30.
  • 32. RECAP Windows RT devices are primarily designed as consumer devices, but can be used in corporate environments as well, either using employee-owned devices or company-owned devices depending on the situation. To properly support Windows RT devices in the workplace, enterprises should understand the capabilities provided in and restrictions imposed by Windows RT, as well as the specific infrastructure requirements for supporting Windows RT devices within their organization.
  • 33. Interesting Links Windows RT VPN user guide http://technet.microsoft.com/en-us/library/jj900206.aspx Windows 8 VPN – PowerShell support http://technet.microsoft.com/en-us/library/jj613766.aspx Compatibility and Interoperability http://technet.microsoft.com/en-us/library/jj613768.aspx How to Manage Mobile Devices by Using the Windows Intune Connector in Configuration Manager http://technet.microsoft.com/en-us/library/jj884158.aspx
  • 34. Windows RT in the Enterprise Thank you!