SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Day 1
Introducing Windows Server 2012 R2
Server Virtualization in Windows Server 2012 R2
Cloud Optimized Networking in Windows Server 2012 R2
Storage in Windows Server 2012 R2
Day 2
Server Management & Automation with Windows Server 2012
R2
VDI with Windows Server 2012 R2
Access & Information Protection with Windows Server 2012 R2
Web Application & Platform with Windows Server 2012 R2
Access & Information Protection with Windows Server 2012 R2
DOWNLOAD
Windows Server
2012 R2 Preview
aka.ms/ws2012r2
#WS2012R2JS
DOWNLOAD
System Center
2012 R2 Preview
aka.ms/sc2012r2
Hands-On Labs
http://www.microsoftvirtualacademy.com
System Center 2012 R2 Jumpstart
July 15th - http://aka.ms/SCR2JS
The explosion of devices is
eroding the standards-based
approach to corporate IT.
Devices
Deploying and managing
applications across
platforms is difficult.
Apps Data
Users need to be productive
while maintaining
compliance and reducing
risk.
Users expect to be able to
work in any location and
have access to all their
work resources.
Users
Devices AppsUsers
Empower users
Allow users to work on the
devices of their choice and
provide consistent access to
corporate resources.
Unify your environment
Deliver a unified application and
device management on-
premises and in the cloud.
Protect your data
Help protect corporate
information and manage risk.Management. Access. Protection.
Data
Protect your data
Centralize corporate information
for compliance and data protection
Policy based access control to
applications and data
Unify your environment
Common identity to access resources
on-premises and in the cloud
Empower users
Simplified registration and
enrollment for BYO Devices
Automatically connect to internal
resources when needed
Access to company resources
consistent across devices
Challenges Solutions
Users want to use the device of their choice and have
access to both their personal and work related
applications, data and resources
Users want an easy way to be able to access their
corporate applications from anywhere
IT want to empower users to work this way but also
need to control access to sensitive information and
remain in compliance with regulatory policies
Users can register their devices which makes them known to
IT who can then use device authentication as part of providing
access to corporate resources
Users can enroll their devices which provides them with the
Company Portal for consistent access to applications, data
and to manage their devices
IT can publish access to corporate resources with
conditional access based on the users identity, the device they
are using and their location
Empower
users
IT can publish access to
resources with the Web
Application Proxy
based on device
awareness and the users
identity
IT can provide seamless
corporate access with
DirectAccess and
automatic VPN
connections.
Users can work
from anywhere on
their device with
access to their
corporate resources.
Users can register
devices for single
sign-on and access to
corporate data with
Workplace Join
Users can enroll devices for
access to the Company Portal
for easy access to corporate
applications
IT can publish Desktop
Virtualization (VDI) for
access to centralized
resources
IT can publish access to corporate resources with
the Web Application Proxy based on device
awareness and the users identity. Multi-factor
authentication can be used through Windows
Azure Active Authentication.
Users can register BYO
devices for single sign-on
and access to corporate
data with Workplace Join.
As part of this, a certificate
is installed on the device
Users can enroll devices which
configure the device for management
with Windows Intune. The user can
then use the Company Portal for easy
access to corporate applications
As part of the registration
process, a new device object is
created in Active
Directory, establishing a link
between the user and their
device
Data from Windows Intune is
sync with Configuration
Manager which provides unified
management across both on-
premises and in the cloud
Users can access
corporate applications
and data wherever
they are
IT can use the Web Application
Proxy to authenticate users and
devices with multi-factor
authentication
Use conditional access for
granular control over how
and where the application
can be accessed
Active Directory provides
the central repository of
user identity as well as
the device registration
information
Developers can leverage Windows
Azure Mobile Services to integrate
and enhance their apps
Devices
Apps & Data
Published
applications
AD Integrated
Users can sync
their work data to
their devices.
Users can register
their devices to be
able to sync data
when IT enforces
conditional access
IT can publish access directly
through a reverse proxy, or
conditional access can be
enforced via device
registration through the
Web Application Proxy
IT can configure a File Server to
provide Work Folder sync
shares for each user to store
data that syncs to their devices,
including integration with
Rights Management
IT can selectively wipe the
corporate data from
Windows 8.1 clients
Devices
Apps & Data
Active Directory
discoverability
provides users Work
Folders location
Can originate admin
connection from intranet
Connection to
intranet is always active
Cannot originate admin
connection from intranet
VPN
DirectAccess
With DirectAccess, a users
PC is automatically
connected whenever an
Internet connection is
present.
Traditional VPNs are user-
initiated and provide on-
demand connectivity to
corporate resources.
An automatic VPN
connection provides
automated starting of the
VPN when a user launches
an application that requires
access to corporate
resources.
Firewall
Unify your
environment
Challenges Solutions
Providing users with a common identity when they
are accessing resources that are located both on-
premises in corporate environment, and in cloud-
based platforms.
Managing multiple identities and keeping the
information in sync across environments is a drain on
IT resources.
Users have a single sign-on experience when
accessing all resources regardless of location.
Users and IT can leverage their common identity for
access to external resources through federation.
IT can consistently manage identities across on-
premises and cloud-based identity domains.
User provided devices are
“unknown” and IT has no control.
Partial access may be provided to
corporate information.
Registered devices are “known”
and device authentication
allows IT to provide conditional
access to corporate information
Domain joined computers
are under the full control of IT
and can be provided with
complete access to corporate
information
Browser session single
sign-on
Seamless 2-Factor Auth
for web apps
Enterprise apps single
sign-on
Desktop Single Sign-On
Run Active Directory at
scale with support for
virtualization and rapid
deployment through
domain controller
cloning.
Developers can
integrate applications for
single sign-on across
on-premises and cloud-
based applications.
Leverage cloud platforms to run
Windows Server Active Directory and
Active Directory Federation Services
to reduce infrastructure on-premises.
Manage Active Directory
using Windows
PowerShell, use the
improved deployment
experience and leverage the
Active Directory
Administrative Center for
centralized management
Activate clients
running Office on at
least Windows 8 or
Windows Server 2012
automatically using
existing Active
Directory infrastructure.
Users get access through accounts in
Windows Azure Active Directory
to Windows Azure, Office 365 and
3rd party applications
IT can provide users with a common
identity across on-premises or cloud-
based services leveraging Windows
Server Active Directory and
Windows Azure Active Directory
Users are more
productive by having
a single sign-on to
all their resources IT can use Active Directory
Federation Services to connect with
Windows Azure for a consistent
cloud based identity.
Developers can build
applications that leverage
the common identity model
Dirsync keeps user attributes in sync
across directories.
Users can register their devices to gain access
to corporate data and apps and single sign-on
through device authentication
Conditional access with multi-
factor authentication is provided on
a per-application basis, leveraging
user identity, device registration &
network location
Organizations can
federate with partners
and other organizations
for seamless access to
shared resources
Organizations can connect to SaaS
applications running in Windows
Azure, Office 365 and 3rd party
providers
Enhancements to ADFS include simplified
deployment and management
Published
applicationsFirewall
Allow users to manage their identity
with an easy to use portal, tightly
integrated with Office.
Self-service group and
distribution list
management, including
dynamic membership
calculation in these
groups and distribution
lists, is based on the
user’s attributes.
Users can reset their
passwords via Windows
logon, significantly reducing
help desk burden and costs.
Sync users identity
across
directories, including
Active
Directory, Oracle, SQL
Server, IBM DS, and
LDAP.
Manage the complete life cycle of
certificates and smart cards
through integration with Active
Directory.
FIM
Workflow
Built-in workflow for
identity management
Automatically synchronize all
user information to different
directories across the enterprise
Automate the process of
on-boarding new users
Real-time de-provisioning
from all systems to prevent
unauthorized access and
information leakage
LDAP
Certificate Management
Protect your
data
Challenges Solutions
As users bring their own devices in to use for
work, they will also want to access sensitive
information and have access to this information locally
on the device.
A significant amount of corporate data can only be
found locally on user devices.
IT needs to be able to secure, classify and protect
data based on the content it contains not just where it
resides, including maintaining regulatory compliance.
Users can work on the device of their choice and be
able to access all their resources regardless of location
or device.
IT can enforce a set of central access and audit
polices, and be able to protect sensitive information
based on the content of the documents.
IT can centrally audit and report on information
access.
Desktop
Virtualization
IT can publish resources using the
web application proxy and create
business-driven access policies with
multi-factor authentication based
on the content being accessed.
IT can audit user access to
information based on
central audit policies.
Users can access
corporate data regardless
of device or location with
Work Folders for data
sync and desktop
virtualization for
centralized applications.
IT can provide a secure and familiar
solution for users to access sensitive
corporate data from anywhere with
VDI and RemoteApp technologies.
Centralized Data
Distributed Data
Devices
1. Users attempts to login or
perform an action that is
subject to MFA
2. When the user
authenticates, the application
or service performs a MFA
call
3. The user must respond to
the challenge, which can be
configured as a txt, a phone
call or using a mobile app
5. IT can configure the type
and frequency of the MFA
that the user must respond
to
4. The response is returned
to the app which then allows
the user to proceed
Centrally manage
access control and
audit polices from
Windows Server
Active Directory.
Automatically
identify and classify
data based on
content. Classification
applies as files are
created or modified.
Integration with
Active Directory
Rights Management
Services provides
automated
encryption of
documents.
Central access and audit
policies can be applied
across multiple file servers,
with near real-time
classification and processing
of new and modified
documents.
File classification, access
policies and automated
Rights Management
works against client
distributed data through
Work Folders.
Protect your data
Centralize corporate information
for compliance and data protection
Policy based access control to
applications and data
Unify your environment
Common identity to access resources
on-premises and in the cloud
Empower users
Simplified registration and
enrollment for BYO Devices
Automatically connect to internal
resources when needed
Access to company resources
consistent across devices
DOWNLOAD
Windows Server
2012 R2 Preview
aka.ms/ws2012r2
#WS2012R2JS
DOWNLOAD
System Center
2012 R2 Preview
aka.ms/sc2012r2
Hands-On Labs
http://www.microsoftvirtualacademy.com
System Center 2012 R2 Jumpstart
July 15th - http://aka.ms/SCR2JS

Weitere ähnliche Inhalte

Was ist angesagt?

Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from Atidan
David J Rosenthal
 
Managing_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOSManaging_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOS
Grant Jolly
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Private Cloud
 

Was ist angesagt? (20)

IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceSIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Patterns and Antipatterns in Enterprise Security
Patterns and Antipatterns in Enterprise SecurityPatterns and Antipatterns in Enterprise Security
Patterns and Antipatterns in Enterprise Security
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
CIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSOCIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSO
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity Connectors
 
Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from Atidan
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Managing_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOSManaging_Devices_and_Corporate_Data_on_iOS
Managing_Devices_and_Corporate_Data_on_iOS
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management Whitepaper
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
Granite state #spug The #microsoftGraph and #SPFx on steroids with #AzureFunc...
Granite state #spug The #microsoftGraph and #SPFx on steroids with #AzureFunc...Granite state #spug The #microsoftGraph and #SPFx on steroids with #AzureFunc...
Granite state #spug The #microsoftGraph and #SPFx on steroids with #AzureFunc...
 
Azure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 MobilityAzure Introduction for IT Pros #1 Mobility
Azure Introduction for IT Pros #1 Mobility
 
WorksPad Datasheet
WorksPad DatasheetWorksPad Datasheet
WorksPad Datasheet
 

Ähnlich wie Windows Server 2012 R2 Jump Start - AIP

Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Nordic Infrastructure Conference
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Nordic Infrastructure Conference
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
Ashvin Dixit
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
Luís Serra Libório
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
MJ Ferdous
 
Microsoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterMicrosoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem Poster
David J Rosenthal
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
Olav Tvedt
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Ingram Micro Cloud
 

Ähnlich wie Windows Server 2012 R2 Jump Start - AIP (20)

Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
Ms cloud identity and access infographic 2015
Ms cloud identity and access infographic 2015Ms cloud identity and access infographic 2015
Ms cloud identity and access infographic 2015
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
MDM
MDMMDM
MDM
 
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneSystem Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
System Center 2012 R2 Configuration Manager (SCCM) with Windows Intune
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
SCU Berlín | Cloud identity for maximum productivity
 SCU Berlín | Cloud identity for maximum productivity SCU Berlín | Cloud identity for maximum productivity
SCU Berlín | Cloud identity for maximum productivity
 
Microsoft Cloud Identity and Access Management Poster - Atidan
Microsoft Cloud Identity and Access Management Poster - AtidanMicrosoft Cloud Identity and Access Management Poster - Atidan
Microsoft Cloud Identity and Access Management Poster - Atidan
 
Microsoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterMicrosoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem Poster
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD
 
JoTechies - Cloud identity
JoTechies - Cloud identityJoTechies - Cloud identity
JoTechies - Cloud identity
 
Unified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot campUnified client management session from Microsoft partner boot camp
Unified client management session from Microsoft partner boot camp
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
 

Mehr von Paulo Freitas

VMWARE Professionals - Foundation Hybrid Clouds and Costs
VMWARE Professionals -  Foundation Hybrid Clouds and CostsVMWARE Professionals -  Foundation Hybrid Clouds and Costs
VMWARE Professionals - Foundation Hybrid Clouds and Costs
Paulo Freitas
 
VMWARE Professionals - Cross-Plattform Mangement
VMWARE Professionals -  Cross-Plattform MangementVMWARE Professionals -  Cross-Plattform Mangement
VMWARE Professionals - Cross-Plattform Mangement
Paulo Freitas
 
VMWARE Professionals - App Management
VMWARE Professionals - App ManagementVMWARE Professionals - App Management
VMWARE Professionals - App Management
Paulo Freitas
 
VMWARE Professionals - Intro to System Center 2012 SP1
VMWARE Professionals -  Intro to System Center 2012 SP1VMWARE Professionals -  Intro to System Center 2012 SP1
VMWARE Professionals - Intro to System Center 2012 SP1
Paulo Freitas
 
VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and Resiliency
Paulo Freitas
 
VMWARE Professionals - Security, Multitenancy and Flexibility
VMWARE Professionals -  Security, Multitenancy and FlexibilityVMWARE Professionals -  Security, Multitenancy and Flexibility
VMWARE Professionals - Security, Multitenancy and Flexibility
Paulo Freitas
 
VMWARE Professionals - Storage and Resources
VMWARE Professionals -  Storage and ResourcesVMWARE Professionals -  Storage and Resources
VMWARE Professionals - Storage and Resources
Paulo Freitas
 
VMWARE Professionals - Intro and Scale
VMWARE Professionals -  Intro and ScaleVMWARE Professionals -  Intro and Scale
VMWARE Professionals - Intro and Scale
Paulo Freitas
 
Hyper-V Integration with other System Center 2012 Components
Hyper-V Integration with other System Center 2012 ComponentsHyper-V Integration with other System Center 2012 Components
Hyper-V Integration with other System Center 2012 Components
Paulo Freitas
 
Hyper-V Integration with System Center 2012 Virtual Machine Manager
Hyper-V Integration with System Center 2012 Virtual Machine ManagerHyper-V Integration with System Center 2012 Virtual Machine Manager
Hyper-V Integration with System Center 2012 Virtual Machine Manager
Paulo Freitas
 
Hyper-V High Availability and Live Migration
Hyper-V High Availability and Live MigrationHyper-V High Availability and Live Migration
Hyper-V High Availability and Live Migration
Paulo Freitas
 
Hyper-V Infrastructure
Hyper-V InfrastructureHyper-V Infrastructure
Hyper-V Infrastructure
Paulo Freitas
 
Windows Server 2012 R2 Jump Start - WEB
Windows Server 2012 R2 Jump Start - WEBWindows Server 2012 R2 Jump Start - WEB
Windows Server 2012 R2 Jump Start - WEB
Paulo Freitas
 
Windows Server 2012 R2 Jump Start - Intro
Windows Server 2012 R2 Jump Start - IntroWindows Server 2012 R2 Jump Start - Intro
Windows Server 2012 R2 Jump Start - Intro
Paulo Freitas
 
Windows Server 2012 R2 Jump Start - Intro
Windows Server 2012 R2 Jump Start - IntroWindows Server 2012 R2 Jump Start - Intro
Windows Server 2012 R2 Jump Start - Intro
Paulo Freitas
 
Multi site Clustering with Windows Server 2008 Enterprise
Multi site Clustering with Windows Server 2008 EnterpriseMulti site Clustering with Windows Server 2008 Enterprise
Multi site Clustering with Windows Server 2008 Enterprise
Paulo Freitas
 
SQL Server 2008 R2 System Views Map
SQL Server 2008 R2 System Views MapSQL Server 2008 R2 System Views Map
SQL Server 2008 R2 System Views Map
Paulo Freitas
 

Mehr von Paulo Freitas (20)

VMWARE Professionals - Foundation Hybrid Clouds and Costs
VMWARE Professionals -  Foundation Hybrid Clouds and CostsVMWARE Professionals -  Foundation Hybrid Clouds and Costs
VMWARE Professionals - Foundation Hybrid Clouds and Costs
 
VMWARE Professionals - Cross-Plattform Mangement
VMWARE Professionals -  Cross-Plattform MangementVMWARE Professionals -  Cross-Plattform Mangement
VMWARE Professionals - Cross-Plattform Mangement
 
VMWARE Professionals - App Management
VMWARE Professionals - App ManagementVMWARE Professionals - App Management
VMWARE Professionals - App Management
 
VMWARE Professionals - Intro to System Center 2012 SP1
VMWARE Professionals -  Intro to System Center 2012 SP1VMWARE Professionals -  Intro to System Center 2012 SP1
VMWARE Professionals - Intro to System Center 2012 SP1
 
VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and Resiliency
 
VMWARE Professionals - Security, Multitenancy and Flexibility
VMWARE Professionals -  Security, Multitenancy and FlexibilityVMWARE Professionals -  Security, Multitenancy and Flexibility
VMWARE Professionals - Security, Multitenancy and Flexibility
 
VMWARE Professionals - Storage and Resources
VMWARE Professionals -  Storage and ResourcesVMWARE Professionals -  Storage and Resources
VMWARE Professionals - Storage and Resources
 
VMWARE Professionals - Intro and Scale
VMWARE Professionals -  Intro and ScaleVMWARE Professionals -  Intro and Scale
VMWARE Professionals - Intro and Scale
 
Hyper-V Integration with other System Center 2012 Components
Hyper-V Integration with other System Center 2012 ComponentsHyper-V Integration with other System Center 2012 Components
Hyper-V Integration with other System Center 2012 Components
 
Hyper-V Integration with System Center 2012 Virtual Machine Manager
Hyper-V Integration with System Center 2012 Virtual Machine ManagerHyper-V Integration with System Center 2012 Virtual Machine Manager
Hyper-V Integration with System Center 2012 Virtual Machine Manager
 
Hyper-V High Availability and Live Migration
Hyper-V High Availability and Live MigrationHyper-V High Availability and Live Migration
Hyper-V High Availability and Live Migration
 
Hyper-V Management
Hyper-V ManagementHyper-V Management
Hyper-V Management
 
Hyper-V Storage
Hyper-V StorageHyper-V Storage
Hyper-V Storage
 
Hyper-V Networking
Hyper-V NetworkingHyper-V Networking
Hyper-V Networking
 
Hyper-V Infrastructure
Hyper-V InfrastructureHyper-V Infrastructure
Hyper-V Infrastructure
 
Windows Server 2012 R2 Jump Start - WEB
Windows Server 2012 R2 Jump Start - WEBWindows Server 2012 R2 Jump Start - WEB
Windows Server 2012 R2 Jump Start - WEB
 
Windows Server 2012 R2 Jump Start - Intro
Windows Server 2012 R2 Jump Start - IntroWindows Server 2012 R2 Jump Start - Intro
Windows Server 2012 R2 Jump Start - Intro
 
Windows Server 2012 R2 Jump Start - Intro
Windows Server 2012 R2 Jump Start - IntroWindows Server 2012 R2 Jump Start - Intro
Windows Server 2012 R2 Jump Start - Intro
 
Multi site Clustering with Windows Server 2008 Enterprise
Multi site Clustering with Windows Server 2008 EnterpriseMulti site Clustering with Windows Server 2008 Enterprise
Multi site Clustering with Windows Server 2008 Enterprise
 
SQL Server 2008 R2 System Views Map
SQL Server 2008 R2 System Views MapSQL Server 2008 R2 System Views Map
SQL Server 2008 R2 System Views Map
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Windows Server 2012 R2 Jump Start - AIP

  • 1.
  • 2. Day 1 Introducing Windows Server 2012 R2 Server Virtualization in Windows Server 2012 R2 Cloud Optimized Networking in Windows Server 2012 R2 Storage in Windows Server 2012 R2 Day 2 Server Management & Automation with Windows Server 2012 R2 VDI with Windows Server 2012 R2 Access & Information Protection with Windows Server 2012 R2 Web Application & Platform with Windows Server 2012 R2 Access & Information Protection with Windows Server 2012 R2
  • 3. DOWNLOAD Windows Server 2012 R2 Preview aka.ms/ws2012r2 #WS2012R2JS DOWNLOAD System Center 2012 R2 Preview aka.ms/sc2012r2 Hands-On Labs http://www.microsoftvirtualacademy.com System Center 2012 R2 Jumpstart July 15th - http://aka.ms/SCR2JS
  • 4. The explosion of devices is eroding the standards-based approach to corporate IT. Devices Deploying and managing applications across platforms is difficult. Apps Data Users need to be productive while maintaining compliance and reducing risk. Users expect to be able to work in any location and have access to all their work resources. Users
  • 5. Devices AppsUsers Empower users Allow users to work on the devices of their choice and provide consistent access to corporate resources. Unify your environment Deliver a unified application and device management on- premises and in the cloud. Protect your data Help protect corporate information and manage risk.Management. Access. Protection. Data
  • 6. Protect your data Centralize corporate information for compliance and data protection Policy based access control to applications and data Unify your environment Common identity to access resources on-premises and in the cloud Empower users Simplified registration and enrollment for BYO Devices Automatically connect to internal resources when needed Access to company resources consistent across devices
  • 7. Challenges Solutions Users want to use the device of their choice and have access to both their personal and work related applications, data and resources Users want an easy way to be able to access their corporate applications from anywhere IT want to empower users to work this way but also need to control access to sensitive information and remain in compliance with regulatory policies Users can register their devices which makes them known to IT who can then use device authentication as part of providing access to corporate resources Users can enroll their devices which provides them with the Company Portal for consistent access to applications, data and to manage their devices IT can publish access to corporate resources with conditional access based on the users identity, the device they are using and their location Empower users
  • 8. IT can publish access to resources with the Web Application Proxy based on device awareness and the users identity IT can provide seamless corporate access with DirectAccess and automatic VPN connections. Users can work from anywhere on their device with access to their corporate resources. Users can register devices for single sign-on and access to corporate data with Workplace Join Users can enroll devices for access to the Company Portal for easy access to corporate applications IT can publish Desktop Virtualization (VDI) for access to centralized resources
  • 9. IT can publish access to corporate resources with the Web Application Proxy based on device awareness and the users identity. Multi-factor authentication can be used through Windows Azure Active Authentication. Users can register BYO devices for single sign-on and access to corporate data with Workplace Join. As part of this, a certificate is installed on the device Users can enroll devices which configure the device for management with Windows Intune. The user can then use the Company Portal for easy access to corporate applications As part of the registration process, a new device object is created in Active Directory, establishing a link between the user and their device Data from Windows Intune is sync with Configuration Manager which provides unified management across both on- premises and in the cloud
  • 10. Users can access corporate applications and data wherever they are IT can use the Web Application Proxy to authenticate users and devices with multi-factor authentication Use conditional access for granular control over how and where the application can be accessed Active Directory provides the central repository of user identity as well as the device registration information Developers can leverage Windows Azure Mobile Services to integrate and enhance their apps Devices Apps & Data Published applications AD Integrated
  • 11. Users can sync their work data to their devices. Users can register their devices to be able to sync data when IT enforces conditional access IT can publish access directly through a reverse proxy, or conditional access can be enforced via device registration through the Web Application Proxy IT can configure a File Server to provide Work Folder sync shares for each user to store data that syncs to their devices, including integration with Rights Management IT can selectively wipe the corporate data from Windows 8.1 clients Devices Apps & Data Active Directory discoverability provides users Work Folders location
  • 12. Can originate admin connection from intranet Connection to intranet is always active Cannot originate admin connection from intranet VPN DirectAccess With DirectAccess, a users PC is automatically connected whenever an Internet connection is present. Traditional VPNs are user- initiated and provide on- demand connectivity to corporate resources. An automatic VPN connection provides automated starting of the VPN when a user launches an application that requires access to corporate resources. Firewall
  • 13. Unify your environment Challenges Solutions Providing users with a common identity when they are accessing resources that are located both on- premises in corporate environment, and in cloud- based platforms. Managing multiple identities and keeping the information in sync across environments is a drain on IT resources. Users have a single sign-on experience when accessing all resources regardless of location. Users and IT can leverage their common identity for access to external resources through federation. IT can consistently manage identities across on- premises and cloud-based identity domains.
  • 14. User provided devices are “unknown” and IT has no control. Partial access may be provided to corporate information. Registered devices are “known” and device authentication allows IT to provide conditional access to corporate information Domain joined computers are under the full control of IT and can be provided with complete access to corporate information Browser session single sign-on Seamless 2-Factor Auth for web apps Enterprise apps single sign-on Desktop Single Sign-On
  • 15. Run Active Directory at scale with support for virtualization and rapid deployment through domain controller cloning. Developers can integrate applications for single sign-on across on-premises and cloud- based applications. Leverage cloud platforms to run Windows Server Active Directory and Active Directory Federation Services to reduce infrastructure on-premises. Manage Active Directory using Windows PowerShell, use the improved deployment experience and leverage the Active Directory Administrative Center for centralized management Activate clients running Office on at least Windows 8 or Windows Server 2012 automatically using existing Active Directory infrastructure.
  • 16. Users get access through accounts in Windows Azure Active Directory to Windows Azure, Office 365 and 3rd party applications IT can provide users with a common identity across on-premises or cloud- based services leveraging Windows Server Active Directory and Windows Azure Active Directory Users are more productive by having a single sign-on to all their resources IT can use Active Directory Federation Services to connect with Windows Azure for a consistent cloud based identity. Developers can build applications that leverage the common identity model Dirsync keeps user attributes in sync across directories.
  • 17. Users can register their devices to gain access to corporate data and apps and single sign-on through device authentication Conditional access with multi- factor authentication is provided on a per-application basis, leveraging user identity, device registration & network location Organizations can federate with partners and other organizations for seamless access to shared resources Organizations can connect to SaaS applications running in Windows Azure, Office 365 and 3rd party providers Enhancements to ADFS include simplified deployment and management Published applicationsFirewall
  • 18. Allow users to manage their identity with an easy to use portal, tightly integrated with Office. Self-service group and distribution list management, including dynamic membership calculation in these groups and distribution lists, is based on the user’s attributes. Users can reset their passwords via Windows logon, significantly reducing help desk burden and costs. Sync users identity across directories, including Active Directory, Oracle, SQL Server, IBM DS, and LDAP. Manage the complete life cycle of certificates and smart cards through integration with Active Directory.
  • 19. FIM Workflow Built-in workflow for identity management Automatically synchronize all user information to different directories across the enterprise Automate the process of on-boarding new users Real-time de-provisioning from all systems to prevent unauthorized access and information leakage LDAP Certificate Management
  • 20. Protect your data Challenges Solutions As users bring their own devices in to use for work, they will also want to access sensitive information and have access to this information locally on the device. A significant amount of corporate data can only be found locally on user devices. IT needs to be able to secure, classify and protect data based on the content it contains not just where it resides, including maintaining regulatory compliance. Users can work on the device of their choice and be able to access all their resources regardless of location or device. IT can enforce a set of central access and audit polices, and be able to protect sensitive information based on the content of the documents. IT can centrally audit and report on information access.
  • 21. Desktop Virtualization IT can publish resources using the web application proxy and create business-driven access policies with multi-factor authentication based on the content being accessed. IT can audit user access to information based on central audit policies. Users can access corporate data regardless of device or location with Work Folders for data sync and desktop virtualization for centralized applications. IT can provide a secure and familiar solution for users to access sensitive corporate data from anywhere with VDI and RemoteApp technologies. Centralized Data Distributed Data Devices
  • 22. 1. Users attempts to login or perform an action that is subject to MFA 2. When the user authenticates, the application or service performs a MFA call 3. The user must respond to the challenge, which can be configured as a txt, a phone call or using a mobile app 5. IT can configure the type and frequency of the MFA that the user must respond to 4. The response is returned to the app which then allows the user to proceed
  • 23. Centrally manage access control and audit polices from Windows Server Active Directory. Automatically identify and classify data based on content. Classification applies as files are created or modified. Integration with Active Directory Rights Management Services provides automated encryption of documents. Central access and audit policies can be applied across multiple file servers, with near real-time classification and processing of new and modified documents. File classification, access policies and automated Rights Management works against client distributed data through Work Folders.
  • 24. Protect your data Centralize corporate information for compliance and data protection Policy based access control to applications and data Unify your environment Common identity to access resources on-premises and in the cloud Empower users Simplified registration and enrollment for BYO Devices Automatically connect to internal resources when needed Access to company resources consistent across devices
  • 25. DOWNLOAD Windows Server 2012 R2 Preview aka.ms/ws2012r2 #WS2012R2JS DOWNLOAD System Center 2012 R2 Preview aka.ms/sc2012r2 Hands-On Labs http://www.microsoftvirtualacademy.com System Center 2012 R2 Jumpstart July 15th - http://aka.ms/SCR2JS