SlideShare ist ein Scribd-Unternehmen logo
1 von 56
http://aka.ms/jeffstokes
http://blogs.msdn.com/b/rds/archive/2012/11/26/remotefx-features-for-windows-
8-and-windows-server-2012.aspx
64-bit
32-bit
link
CPU-emulated
DirectX 11
software GPU
Provides 3-D capabilities to sessions and virtual machines at
high scale
Optimized for knowledge worker workloads such as Microsoft
Office and web browsing
Provides the highest scale for session host and VDI
RemoteFX vGPU
Provides a virtualized hardware-accelerated DirectX 11 GPU
for VDI, optimized for:
Best performance for 3-D graphics-intensive applications
Best experience with full animations and transitions
Best application compatibility, running as a console session in
a virtual machine
1
Maximum
Resolution
Number of Monitors supported
Windows 7 w/SP1 Windows 8
1024 x 768 4 8
1280 x 1024 4 8
1600 x 1200 3 4
1920 x 1200 2 4
2560 x 1600 N/A 2
Configuration Name Function
Configure Event log size/retention Set event log sizes to minimum size and configure retention to
overwrite when needed, reduces overhead for event logging
(especially in pooled VM scenarios)
Disable Hard Disk timeouts,
increase disk I/O timeout, disable
NTFS last access timestamp,
disable System Restore, disable
hibernation, perform a disk
cleanup
Reduce I/O load when writes happen, allow longer writes, and
clean up disk before Sysprep process
Disable unneeded scheduled
tasks
36 scheduled tasks associated with disabled services or services
not useful in virtual environment
Reconfigure boot (quiet boot/no
animation), Disable UAC secure
desktop prompt, set visuals to a
minimum
Reduce overhead on vGPU and/or vCPU
Creates a VBScript that can then be run on the machine to configure the settings as defined.
The last release date was Aug of 2010, and there are no current plans to update to support Windows 8.
http://social.technet.microsoft.com/wiki/contents/articles/44
95.list-of-resources-on-windows-7-optimization-for-
vdi.aspx?wa=wsignin1.0
PFE Windows 8 VDI Script
http://blogs.technet.com/b/jeff_stokes/archive/2013/
04/09/hot-off-the-presses-get-it-now-the-windows-
8-vdi-optimization-script-courtesy-of-pfe.aspx
After:
Before:
http://msdn.microsoft.com/en-
us/library/hh162977.aspx
http://blogs.technet.com/b/jeff_stokes/archive/2013/03/16/xperf-for-the-
layman-performance-analysis-unchained-windows-assessment-toolkit-
revealed.aspx
By leveraging the power of the ETW model, we can capture metrics previously
unavailable outside of a debugger/instrumented code environment.
With this level of granularity, we can capture metrics like….
• All processes and threads in user mode and kernel mode
• Deferred procedure calls (DPCs) and interrupt service requests (ISRs)
• Scheduling
• Disk and file I/O
• Memory
• Network
It also helps analyze what the customer experiences:
• Catch the problem as it happens
• Capture anywhere, decode anywhere
• Integration with symbols
So what does that all mean? Well… it means we can use a single tool to
tackle many of the most common problems for customers:
• Troubleshooting application behavior – High CPU, Handles, Etc.
• Gathers both usermode and kernel events at the same time
• Benchmark disk performance (or lack there of)
• Get a deep view into the entire boot/shutdown lifecycle
XPERF is incredibly powerful and can be leveraged for a wide range of
issues customers and engineers face daily.
Event Tracing for Windows (ETW) infrastructure allows the capture of kernel and/or
application events, and can be enabled/disabled at any time without any restarts
required.
Xperf –on Diag –BufferSize 1024 –MaxBuffers 1024 -MaxFile 250 –FileMode Circular
Ever wonder what the system was truly doing right before that
performance hang or disconnect?
“Black Box” ETW tracing can enable you to obtain the last few seconds
prior to your VDI / Physical system having problems
Always running, with minimal (~4mb) memory overhead
• How did the user log in?
• Console
• ICA
• PCoIP
• RDP
• What type of latency did the
user experience when starting
their session?
• Identify latency of an
application
• Identify latency with an
application calling a back-
end Server
• Identify application and
website focus
VDI Detail Performance Analysis
Industry standard
benchmarking tool to
test the performance
and scalability of
centralized Windows
user environments, using
simulated workloads
“Login VSI is the de facto standard for SBC and VDI benchmarking”,
Gartner
41
http://blogs.technet.com/b/jeff_stokes/
http://blogs.technet.com/b/jeff_stokes/archive/2013/04/09/hot-off-the-presses-get-it-now-the-
windows-8-vdi-optimization-script-courtesy-of-pfe.aspx
http://blogs.technet.com/b/jeff_stokes/archive/2012/10/15/the-microsoft-premier-field-engineer-
pfe-view-on-virtual-desktop-vdi-density.aspx
http://blogs.technet.com/b/jeff_stokes/archive/2012/10/18/deconstructing-the-pfe-vdi-
optimization-script.aspx
Performance and Architecture of VDI:
http://video.ch9.ms/sessions/mms/2013/DV-B310.pptx
http://blogs.msdn.com/b/rds/archive/2013/05/22/2000-seat-vdi-deployment-benchmark.aspx
Windows Enterprise: windows.com/enterprise
windows.com/ITpro
microsoft.com/mdop
microsoft.com/dv
microsoft.com/windows/wtg
tryoutlook.com
http://microsoft.com/msdn
www.microsoft.com/learning
http://channel9.msdn.com/Events/TechEd
http://microsoft.com/technet
Service Name Default Recommended Details
Application Layer Gateway Service Manual Disabled
This service manages mobile broadband (GSM & CDMA) data
card/embedded module adapters and connections by auto-configuring
the networks. It is strongly recommended that this service be kept
running for best user experience of mobile broadband devices.
Background Intelligent Transfer
Service
Manual Disabled
VDI infrastructure is usually connected to fast LAN/WAN links to
infrastructure servers hosting data
BitLocker Drive Encryption Service Manual (TS) Disabled BitLocker is not available to be used on a virtual machines
Block Level Backup Engine Service Manual Disabled
Service is used to backup data on the workstation – not used for virtual
machines
Bluetooth Support Service Manual (TS) Disabled Bluetooth Wireless not supported from a virtual machine
BranchCache Manual Consider This service caches network content from peers on the local subnet.
Computer Browser Manual (TS) Disabled
Maintains an updated list of computers on the network and supplies
this list to computers designated as browsers.
Device Association Service Manual (TS) Disabled Enables pairing between the system and wired or wireless devices.
Device Setup Manager Manual (TS) Disabled
Enables the detection, download and installation of device-related
software. If this service is disabled, devices may be configured with
outdated software, and may not work correctly.
Service Name Default Recommended Details
Diagnostic Policy Service Automatic Disabled
The Diagnostic Policy Service enables problem detection,
troubleshooting and resolution for Windows components. If this service
is stopped, diagnostics will no longer function.
Diagnostic Service Host Manual Disabled
The Diagnostic Service Host is used by the Diagnostic Policy Service to
host diagnostics that need to run in a Local Service context. If this
service is stopped, any diagnostics that depend on it will no longer
function.
Diagnostic System Host Manual Disabled
The Diagnostic System Host is used by the Diagnostic Policy Service to
host diagnostics that need to run in a Local System context. If this
service is stopped, any diagnostics that depend on it will no longer
function.
Distributed Link Tracking Client Automatic Consider
Tracks NTFS links locally and across the network (but only if the service
is also running on the remote system)
Encrypting File System (EFS) Manual (TS) Consider
Provides the core file encryption technology used to store encrypted
files on NTFS file system volumes. If this service is stopped or disabled,
applications will be unable to access encrypted files.
Extensible Authentication Protocol Manual Consider
The Extensible Authentication Protocol (EAP) service provides network
authentication in such scenarios as 802.1x wired and wireless, VPN, and
Network Access Protection (NAP).
Family Safety Manual Disabled
This service is a stub for Windows Parental Control functionality that
existed in Vista. It is provided for backward compatibility only.
Service Name Default Recommended Details
Fax Manual Disabled
Enables you to send and receive faxes, utilizing fax resources available
on this computer or on the network.
Function Discovery Resource
Publication
Manual Disabled
Publishes this computer and resources attached to this computer so
they can be discovered over the network. If this service is stopped,
network resources will no longer be published and they will not be
discovered by other computers on the network.
File History Service Manual (TS) Consider
Protects user files from accidental loss by copying them to a backup
location
Home Group Listener Manual Disabled
Used to establish Home Groups, not used with virtual machines in a
corporate environment
Home Group Provider Manual (TS) Disabled
Used to establish Home Groups, not used with virtual machines in a
corporate environment
Internet Connection Sharing (ICS) Disabled Disabled
Provides network address translation, addressing, name resolution
and/or intrusion prevention services for a home or small office network.
Microsoft Account Sign-in Assistant Manual (TS) Consider
Enables user sign-in through Microsoft account identity services. If this
service is stopped, users will not be able to logon to the computer with
their Microsoft account.
Service Name Default Recommended Details
Microsoft iSCSI Initiator Service Manual Disabled iSCSI will not be used on virtual desktops
Microsoft Software Shadow Copy
Provider
Manual Disabled
Manages software-based volume shadow copies taken by the Volume
Shadow Copy service. If this service is stopped, software-based volume
shadow copies cannot be managed. If this service is disabled, any
services that explicitly depend on it will fail to start.
Network List Service Manual Automatic
Identifies the networks to which the computer has connected, collects
and stores properties for these networks, and notifies applications when
these properties change.
Offline Files Manual (TS) Disabled – REQUIRES GPO
The Offline Files service performs maintenance activities on the Offline
Files cache, responds to user logon and logoff events, implements the
internals of the public API, and dispatches interesting events to those
interested in Offline Files activities and changes in cache state.
Optimize Drives Manual Disabled
Helps the computer run more efficiently by optimizing files on storage
drives.
Sensor Monitoring Service Manual (TS) Consider
Monitors various sensors in order to expose data and adapt to system
and user state. If this service is stopped or disabled, the display
brightness will not adapt to lighting conditions. Stopping this service
may affect other system functionality and features as well.
Secure Socket Tunneling Protocol
Service
Manual Disabled
This service publishes a machine name using the Peer Name Resolution
Protocol. Configuration is managed via the netsh context 'p2p pnrp
peer'
Shell Hardware Detection Automatic Disabled Provides notifications for AutoPlay hardware events.
Service Name Default Recommended Details
SNMP Trap Manual Disabled
Receives trap messages generated by local or remote Simple Network
Management Protocol (SNMP) agents and forwards the messages to
SNMP management programs running on this computer. If this service
is stopped, SNMP-based programs on this computer will not receive
SNMP trap messages. If this service is disabled, any services that
explicitly depend on it will fail to start.
SSDP Discovery Manual Disabled
Discovers networked devices and services that use the SSDP discovery
protocol, such as UPnP devices. Also announces SSDP devices and
services running on the local computer. If this service is stopped, SSDP-
based devices will not be discovered. If this service is disabled, any
services that explicitly depend on it will fail to start.
Telephony Manual Disabled
Provides Telephony API (TAPI) support for programs that control
telephony devices on the local computer and, through the LAN, on
servers that are also running the service.
Themes Automatic Consider Provides user experience theme management.
UPnP Device Host Manual Disabled
Allows UPnP devices to be hosted on this computer. If this service is
stopped, any hosted UPnP devices will stop functioning and no
additional hosted devices can be added. If this service is disabled, any
services that explicitly depend on it will fail to start.
Volume Shadow Copy Manual Consider
Manages and implements Volume Shadow Copies used for backup and
other purposes. If this service is stopped, shadow copies will be
unavailable for backup and the backup may fail. If this service is
disabled, any services that explicitly depend on it will fail to start.
Service Name Default Recommended Details
Windows Backup Manual Disabled Provides Windows Backup and Restore capabilities.
Windows Color System Manual Disabled
The WcsPlugInService service hosts third-party Windows Color System
color device model and gamut map model plug-in modules.
Windows Connect Now - Config
Registrar
Manual Disable
WCNCSVC hosts the Windows Connect Now Configuration which is
Microsoft's Implementation of Wi-Fi Protected Setup (WPS) protocol.
Windows Defender Automatic (TS) Consider – REQUIRES GPO
Helps protect users from malware and other potentially unwanted
software
Windows Error Reporting Service Manual (TS) Disabled
Allows errors to be reported when programs stop working or
responding and allows existing solutions to be delivered. Also allows
logs to be generated for diagnostic and repair services.
Windows Media Player Network
Sharing Service
Manual Disabled
Shares Windows Media Player libraries to other networked players and
media devices using Universal Plug and Play
Windows Search Automatic (Delayed) Consider
Provides content indexing, property caching, and search results for files,
e-mail, and other content.
WLAN AutoConfig Manual Disabled
The WLANSVC service provides the logic required to configure,
discover, connect to, and disconnect from a wireless local area network
(WLAN) as defined by IEEE 802.11 standards.
WWAN AutoConfig Manual Disabled
This service manages mobile broadband (GSM & CDMA) data
card/embedded module adapters and connections by auto-configuring
the networks. It is strongly recommended that this service be kept
running for best user experience of mobile broadband devices.

Weitere ähnliche Inhalte

Was ist angesagt?

VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3Digicomp Academy AG
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualizationxKinAnx
 
How-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made EasierHow-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made EasierSolarWinds
 
Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Digicomp Academy AG
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
GeekOn with Ron #4: Tuning and Optimizing Your Gold Image
GeekOn with Ron #4: Tuning and Optimizing Your Gold ImageGeekOn with Ron #4: Tuning and Optimizing Your Gold Image
GeekOn with Ron #4: Tuning and Optimizing Your Gold ImageUnidesk Corporation
 
Co je novĂŠho v XenDesktop 7.6 a XenApp 7.6
Co je novĂŠho v XenDesktop 7.6 a XenApp 7.6 Co je novĂŠho v XenDesktop 7.6 a XenApp 7.6
Co je novĂŠho v XenDesktop 7.6 a XenApp 7.6 MarketingArrowECS_CZ
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5netlogix
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecturesolarisyougood
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overviewkoesteruk22
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep diveMurugesan Arumugam
 
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the HoodVMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the HoodVMworld
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?eG Innovations
 
XenApp XenDesktop 7.8 Workshop
XenApp XenDesktop 7.8 Workshop XenApp XenDesktop 7.8 Workshop
XenApp XenDesktop 7.8 Workshop Digicomp Academy AG
 
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and CitrixCTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and CitrixSpiffy
 
Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMd Yousup Faruqu
 

Was ist angesagt? (19)

VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualization
 
Vdi in-a-box
Vdi in-a-boxVdi in-a-box
Vdi in-a-box
 
How-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made EasierHow-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made Easier
 
Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
GeekOn with Ron #4: Tuning and Optimizing Your Gold Image
GeekOn with Ron #4: Tuning and Optimizing Your Gold ImageGeekOn with Ron #4: Tuning and Optimizing Your Gold Image
GeekOn with Ron #4: Tuning and Optimizing Your Gold Image
 
Deployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccmDeployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccm
 
Co je novĂŠho v XenDesktop 7.6 a XenApp 7.6
Co je novĂŠho v XenDesktop 7.6 a XenApp 7.6 Co je novĂŠho v XenDesktop 7.6 a XenApp 7.6
Co je novĂŠho v XenDesktop 7.6 a XenApp 7.6
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overview
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep dive
 
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the HoodVMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
 
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
VDI Choices - Citrix XenDesktop, XenApp or VDI in a Box?
 
XenApp XenDesktop 7.8 Workshop
XenApp XenDesktop 7.8 Workshop XenApp XenDesktop 7.8 Workshop
XenApp XenDesktop 7.8 Workshop
 
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and CitrixCTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
CTU June 2011 - Enterprise Desktop Virtualisation with Microsoft and Citrix
 
Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private Cloud
 

Ähnlich wie Optimize Windows 8 VDI Performance

Electronic document management system
Electronic document management systemElectronic document management system
Electronic document management systemBiodor Bonifacio
 
Case study for it03 roshan
Case study for it03 roshanCase study for it03 roshan
Case study for it03 roshanrosu555
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedWes Moskal-Fitzpatrick
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
Vmware desktop infrastructure virtualization assessment
Vmware  desktop infrastructure virtualization assessmentVmware  desktop infrastructure virtualization assessment
Vmware desktop infrastructure virtualization assessmentsolarisyougood
 
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) DeploymentsPlanning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) DeploymentsStuart McIntyre
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answermandarshetye45
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_BattlecardLarry Yurdin
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxssuser20fcbe
 
All in one
All in oneAll in one
All in oneAkash Sahoo
 
Data Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformData Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformIJCSIS Research Publications
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active DirectoryJessica Myers
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Louis GĂśhl
 

Ähnlich wie Optimize Windows 8 VDI Performance (20)

Electronic document management system
Electronic document management systemElectronic document management system
Electronic document management system
 
Gopu_CV_2016
Gopu_CV_2016Gopu_CV_2016
Gopu_CV_2016
 
Case study for it03 roshan
Case study for it03 roshanCase study for it03 roshan
Case study for it03 roshan
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
Vmware desktop infrastructure virtualization assessment
Vmware  desktop infrastructure virtualization assessmentVmware  desktop infrastructure virtualization assessment
Vmware desktop infrastructure virtualization assessment
 
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) DeploymentsPlanning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Introduction
IntroductionIntroduction
Introduction
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
 
All in one
All in oneAll in one
All in one
 
Data Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformData Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux Platform
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active Directory
 
Karunakar Kondam
Karunakar KondamKarunakar Kondam
Karunakar Kondam
 
What's New in Windows 7
What's New in Windows 7What's New in Windows 7
What's New in Windows 7
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 

Mehr von Jeff Stokes

Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff StokesWindows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff StokesJeff Stokes
 
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesTmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesJeff Stokes
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesJeff Stokes
 
Advanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff StokesAdvanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff StokesJeff Stokes
 
Sustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesSustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesJeff Stokes
 
Walking deck
Walking deckWalking deck
Walking deckJeff Stokes
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden UserJeff Stokes
 

Mehr von Jeff Stokes (7)

Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff StokesWindows 8 and the Windows Assessment Services overview- Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff Stokes
 
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff StokesTmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
Advanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff StokesAdvanced vdi configuration - Jeff Stokes
Advanced vdi configuration - Jeff Stokes
 
Sustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff StokesSustainability in Infrastructure Design - Jeff Stokes
Sustainability in Infrastructure Design - Jeff Stokes
 
Walking deck
Walking deckWalking deck
Walking deck
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
 

KĂźrzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

KĂźrzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Optimize Windows 8 VDI Performance

  • 1.
  • 2.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 11.
  • 13.
  • 14.
  • 15. link
  • 16.
  • 17. CPU-emulated DirectX 11 software GPU Provides 3-D capabilities to sessions and virtual machines at high scale Optimized for knowledge worker workloads such as Microsoft Office and web browsing Provides the highest scale for session host and VDI RemoteFX vGPU Provides a virtualized hardware-accelerated DirectX 11 GPU for VDI, optimized for: Best performance for 3-D graphics-intensive applications Best experience with full animations and transitions Best application compatibility, running as a console session in a virtual machine 1
  • 18. Maximum Resolution Number of Monitors supported Windows 7 w/SP1 Windows 8 1024 x 768 4 8 1280 x 1024 4 8 1600 x 1200 3 4 1920 x 1200 2 4 2560 x 1600 N/A 2
  • 19. Configuration Name Function Configure Event log size/retention Set event log sizes to minimum size and configure retention to overwrite when needed, reduces overhead for event logging (especially in pooled VM scenarios) Disable Hard Disk timeouts, increase disk I/O timeout, disable NTFS last access timestamp, disable System Restore, disable hibernation, perform a disk cleanup Reduce I/O load when writes happen, allow longer writes, and clean up disk before Sysprep process Disable unneeded scheduled tasks 36 scheduled tasks associated with disabled services or services not useful in virtual environment Reconfigure boot (quiet boot/no animation), Disable UAC secure desktop prompt, set visuals to a minimum Reduce overhead on vGPU and/or vCPU
  • 20.
  • 21. Creates a VBScript that can then be run on the machine to configure the settings as defined. The last release date was Aug of 2010, and there are no current plans to update to support Windows 8.
  • 23. PFE Windows 8 VDI Script http://blogs.technet.com/b/jeff_stokes/archive/2013/ 04/09/hot-off-the-presses-get-it-now-the-windows- 8-vdi-optimization-script-courtesy-of-pfe.aspx
  • 24.
  • 26.
  • 28.
  • 29. By leveraging the power of the ETW model, we can capture metrics previously unavailable outside of a debugger/instrumented code environment. With this level of granularity, we can capture metrics like…. • All processes and threads in user mode and kernel mode • Deferred procedure calls (DPCs) and interrupt service requests (ISRs) • Scheduling • Disk and file I/O • Memory • Network It also helps analyze what the customer experiences: • Catch the problem as it happens • Capture anywhere, decode anywhere • Integration with symbols
  • 30. So what does that all mean? Well… it means we can use a single tool to tackle many of the most common problems for customers: • Troubleshooting application behavior – High CPU, Handles, Etc. • Gathers both usermode and kernel events at the same time • Benchmark disk performance (or lack there of) • Get a deep view into the entire boot/shutdown lifecycle XPERF is incredibly powerful and can be leveraged for a wide range of issues customers and engineers face daily.
  • 31. Event Tracing for Windows (ETW) infrastructure allows the capture of kernel and/or application events, and can be enabled/disabled at any time without any restarts required.
  • 32.
  • 33. Xperf –on Diag –BufferSize 1024 –MaxBuffers 1024 -MaxFile 250 –FileMode Circular Ever wonder what the system was truly doing right before that performance hang or disconnect? “Black Box” ETW tracing can enable you to obtain the last few seconds prior to your VDI / Physical system having problems Always running, with minimal (~4mb) memory overhead
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. • How did the user log in? • Console • ICA • PCoIP • RDP • What type of latency did the user experience when starting their session? • Identify latency of an application • Identify latency with an application calling a back- end Server • Identify application and website focus VDI Detail Performance Analysis
  • 40. Industry standard benchmarking tool to test the performance and scalability of centralized Windows user environments, using simulated workloads “Login VSI is the de facto standard for SBC and VDI benchmarking”, Gartner
  • 41. 41
  • 42.
  • 43.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Service Name Default Recommended Details Application Layer Gateway Service Manual Disabled This service manages mobile broadband (GSM & CDMA) data card/embedded module adapters and connections by auto-configuring the networks. It is strongly recommended that this service be kept running for best user experience of mobile broadband devices. Background Intelligent Transfer Service Manual Disabled VDI infrastructure is usually connected to fast LAN/WAN links to infrastructure servers hosting data BitLocker Drive Encryption Service Manual (TS) Disabled BitLocker is not available to be used on a virtual machines Block Level Backup Engine Service Manual Disabled Service is used to backup data on the workstation – not used for virtual machines Bluetooth Support Service Manual (TS) Disabled Bluetooth Wireless not supported from a virtual machine BranchCache Manual Consider This service caches network content from peers on the local subnet. Computer Browser Manual (TS) Disabled Maintains an updated list of computers on the network and supplies this list to computers designated as browsers. Device Association Service Manual (TS) Disabled Enables pairing between the system and wired or wireless devices. Device Setup Manager Manual (TS) Disabled Enables the detection, download and installation of device-related software. If this service is disabled, devices may be configured with outdated software, and may not work correctly.
  • 52. Service Name Default Recommended Details Diagnostic Policy Service Automatic Disabled The Diagnostic Policy Service enables problem detection, troubleshooting and resolution for Windows components. If this service is stopped, diagnostics will no longer function. Diagnostic Service Host Manual Disabled The Diagnostic Service Host is used by the Diagnostic Policy Service to host diagnostics that need to run in a Local Service context. If this service is stopped, any diagnostics that depend on it will no longer function. Diagnostic System Host Manual Disabled The Diagnostic System Host is used by the Diagnostic Policy Service to host diagnostics that need to run in a Local System context. If this service is stopped, any diagnostics that depend on it will no longer function. Distributed Link Tracking Client Automatic Consider Tracks NTFS links locally and across the network (but only if the service is also running on the remote system) Encrypting File System (EFS) Manual (TS) Consider Provides the core file encryption technology used to store encrypted files on NTFS file system volumes. If this service is stopped or disabled, applications will be unable to access encrypted files. Extensible Authentication Protocol Manual Consider The Extensible Authentication Protocol (EAP) service provides network authentication in such scenarios as 802.1x wired and wireless, VPN, and Network Access Protection (NAP). Family Safety Manual Disabled This service is a stub for Windows Parental Control functionality that existed in Vista. It is provided for backward compatibility only.
  • 53. Service Name Default Recommended Details Fax Manual Disabled Enables you to send and receive faxes, utilizing fax resources available on this computer or on the network. Function Discovery Resource Publication Manual Disabled Publishes this computer and resources attached to this computer so they can be discovered over the network. If this service is stopped, network resources will no longer be published and they will not be discovered by other computers on the network. File History Service Manual (TS) Consider Protects user files from accidental loss by copying them to a backup location Home Group Listener Manual Disabled Used to establish Home Groups, not used with virtual machines in a corporate environment Home Group Provider Manual (TS) Disabled Used to establish Home Groups, not used with virtual machines in a corporate environment Internet Connection Sharing (ICS) Disabled Disabled Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small office network. Microsoft Account Sign-in Assistant Manual (TS) Consider Enables user sign-in through Microsoft account identity services. If this service is stopped, users will not be able to logon to the computer with their Microsoft account.
  • 54. Service Name Default Recommended Details Microsoft iSCSI Initiator Service Manual Disabled iSCSI will not be used on virtual desktops Microsoft Software Shadow Copy Provider Manual Disabled Manages software-based volume shadow copies taken by the Volume Shadow Copy service. If this service is stopped, software-based volume shadow copies cannot be managed. If this service is disabled, any services that explicitly depend on it will fail to start. Network List Service Manual Automatic Identifies the networks to which the computer has connected, collects and stores properties for these networks, and notifies applications when these properties change. Offline Files Manual (TS) Disabled – REQUIRES GPO The Offline Files service performs maintenance activities on the Offline Files cache, responds to user logon and logoff events, implements the internals of the public API, and dispatches interesting events to those interested in Offline Files activities and changes in cache state. Optimize Drives Manual Disabled Helps the computer run more efficiently by optimizing files on storage drives. Sensor Monitoring Service Manual (TS) Consider Monitors various sensors in order to expose data and adapt to system and user state. If this service is stopped or disabled, the display brightness will not adapt to lighting conditions. Stopping this service may affect other system functionality and features as well. Secure Socket Tunneling Protocol Service Manual Disabled This service publishes a machine name using the Peer Name Resolution Protocol. Configuration is managed via the netsh context 'p2p pnrp peer' Shell Hardware Detection Automatic Disabled Provides notifications for AutoPlay hardware events.
  • 55. Service Name Default Recommended Details SNMP Trap Manual Disabled Receives trap messages generated by local or remote Simple Network Management Protocol (SNMP) agents and forwards the messages to SNMP management programs running on this computer. If this service is stopped, SNMP-based programs on this computer will not receive SNMP trap messages. If this service is disabled, any services that explicitly depend on it will fail to start. SSDP Discovery Manual Disabled Discovers networked devices and services that use the SSDP discovery protocol, such as UPnP devices. Also announces SSDP devices and services running on the local computer. If this service is stopped, SSDP- based devices will not be discovered. If this service is disabled, any services that explicitly depend on it will fail to start. Telephony Manual Disabled Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the LAN, on servers that are also running the service. Themes Automatic Consider Provides user experience theme management. UPnP Device Host Manual Disabled Allows UPnP devices to be hosted on this computer. If this service is stopped, any hosted UPnP devices will stop functioning and no additional hosted devices can be added. If this service is disabled, any services that explicitly depend on it will fail to start. Volume Shadow Copy Manual Consider Manages and implements Volume Shadow Copies used for backup and other purposes. If this service is stopped, shadow copies will be unavailable for backup and the backup may fail. If this service is disabled, any services that explicitly depend on it will fail to start.
  • 56. Service Name Default Recommended Details Windows Backup Manual Disabled Provides Windows Backup and Restore capabilities. Windows Color System Manual Disabled The WcsPlugInService service hosts third-party Windows Color System color device model and gamut map model plug-in modules. Windows Connect Now - Config Registrar Manual Disable WCNCSVC hosts the Windows Connect Now Configuration which is Microsoft's Implementation of Wi-Fi Protected Setup (WPS) protocol. Windows Defender Automatic (TS) Consider – REQUIRES GPO Helps protect users from malware and other potentially unwanted software Windows Error Reporting Service Manual (TS) Disabled Allows errors to be reported when programs stop working or responding and allows existing solutions to be delivered. Also allows logs to be generated for diagnostic and repair services. Windows Media Player Network Sharing Service Manual Disabled Shares Windows Media Player libraries to other networked players and media devices using Universal Plug and Play Windows Search Automatic (Delayed) Consider Provides content indexing, property caching, and search results for files, e-mail, and other content. WLAN AutoConfig Manual Disabled The WLANSVC service provides the logic required to configure, discover, connect to, and disconnect from a wireless local area network (WLAN) as defined by IEEE 802.11 standards. WWAN AutoConfig Manual Disabled This service manages mobile broadband (GSM & CDMA) data card/embedded module adapters and connections by auto-configuring the networks. It is strongly recommended that this service be kept running for best user experience of mobile broadband devices.

Hinweis der Redaktion

  1. 40
  2. 41