Today we will talk about profiles and personal settings and all that comes with it. First we will see what the problem actually is. Second, we look to the personal information that is stored in a profile. Thirdly, we look at the different profile types and their characteristics. Then we take a scenario and how to deal with it. If your goal today is to get one best practice to use than this is unfortunately not true. As in the course of this workshop will become clear there is not one best practice. A choice always depends on the customer application landscape, his needs, the existing infrastructure and the desired end result. What we want to achieve today is to provide information so before you start clicking and configuring your environment you ask yourself the right questions before you make a choice. Regarding this subject we can’t talk only about RES products but also about technologies of other vendors where we have to deal with.
Why should we invest time into this. What exactly is the problem. The reality is that many organizations are dealing with profile problems. They can become corrupt so a restore action must be executed. The profile of a user should be deleted. The user receives a new profile at logon and then his or herpersonal settings must be set in the profile again. They can grow large so logons can be slow. We can get into a situation where we need to deal with different profile versions which are not compatible, version 1 vs. version 2 profiles. This makes them difficult to control and that we have to deal with unsatisfied users.
Give an example of a real live scenario related to the perspective of a customer in combination with Zero Profile technology.
Zero profile management is a technique that takes little blocks out of a normal profile and stores and applies them in a different way than the traditional Microsoft way where most settings are stored in one large profile. Before starting with zero profile technology and getting the little blocks out of a profile a good understanding about the different parts of a profile is necessary.
Example of the different blocks in a profile
Explain the advantages and disadvantages of the different profile types
Explain the advantages and disadvantages of the different profile types. Adress limitations of mandatory profiles like unable to use certificates and encryption and remote assistance from WM.
In real live a lot of scenarios are possible which make that customers start with the implementation of Zero profile technology.
The case for this workshop. An existing situation
The case for this workshop. The desired situation
Possible solutions to create the desired situation. What are the considerations of the different solutions. Explain the Limitation of a mandatory profile for instance that Cryptografic keys and certificates cannot be used
Considerations per topic of the possible solutions.
Mandatory profile considerations. limitations:Cryptografic keys and certificates cannot be used when you create a profile for another user. RightsIt seems very obvious but we are still getting a lot of questions about mandatory profiles and some are related to setting the correct user rights in the mandatory profile while creating one.Library PlaceholdersWhen you create a mandatory profile be aware of library placeholders. These aren’t folders but xml based files with the extension .library-ms. Shell FoldersThe user shell folder in the current user registry hive of a mandatory profile should be empty when Language and Keyboard settingsLanguage and Keyboard settings are applied to a user from the settings which have been entered while installing the Operating System. This can result in undesired behavior and these settings must be cleared from the mandatory profile.MaintenanceAlso a mandatory profile needs maintenance. If you install windows or application updates after the mandatory profile has been created. It’s possible you need to adjust the mandatory profile
Explain what’s being configured on how to configure folder redirectoin
Explain all the user settings and theircharactaristics.
Mention the different kind of application virtualization technologies where we integrate with. Explain that user settings are not captured in the bubble but that we use the mechanism provided bij the manufactures.