SlideShare ist ein Scribd-Unternehmen logo
1 von 58
Windows 8 Client Part 1
"The OS internals for IT-Pro's"

Tom Decaluwé
Infrastructure Manager
                                                        Contact me:
Macintosh Retail Group                             tom@decaluwe.eu
                                  http://trycatch.be/blogs/decaluwet
Windows 8 slow adoption

-   Touch UI
-   Different
-   Disruptive leap
-   Bad economical times
-   We just migrated to Windows 7
-   Apple is better
-   Lack of “devices”
-   Lack of “time” for IT pro’s

                                    Keala group
Enthusiasm
My Promise


  “I’ll show every one of
 you at least 1 feature to
  be enthusiastic about”
The ecosystem
Lab for the Day




                  192.168.1.1
                                          DEMONET




                           192.168.1.50
What we will Cover
What we will Cover
The History
27 years of evolution
                        V1.0
                        1985
                        16 Bit   V1.0
                                 1985
                                 16 Bit
             V3.1                V2000                   XP
             1992                                        2001




      V6                V7
      2007              2009                      V8
                                                  2012
                                          V8
              V7                          2012?
Windows 8 Editions


               • Windows 8
        X86
        PC     • Windows 8 Pro
               • Windows 8 Enterprise

        ARM    • Windows RT
         /
        WOA
Setup Experience
Upgrade speed

Win7 vs Win8
• Win 7 => 4 wizards +/- 60
  screens
• Win 8 => one wizard +/- 11
  clicks

Upgrade Performance
• Win 7 => moved file by
  file,…
• Win 8 => moves the whole
  folder in one go,…
Source and Destinations


          ISO       VHD         USB




                   Virtual      USB
       Hard disk                           VHD
                   Machine   (Win To GO)
The simple and detailed upgrade UI
Windows To Go
How it differs from a normal pc

•   Internal disks disabled
•   TPM not used => replaced with pre-operating system
    boot password
•   No hibernation
•   No Recovery Environment
•   No Push button reset
•   Disabled windows Store
•   No MAK activation

You have limited hard disk space, like SSD but worse ;-)
Some usage scenarios

-Contractors that bring their own PC
-Shared PC’s
-Quick DR
-Home computing / BYOD
-…
Computer roaming
Windows uniquely identifies computers based on constant characteristics of the machine
firmware -SMBIOS UUID if present or certain SMBIOS strings

This ID is used to ensure when Windows returns to a computer, only the necessary set of
drivers are loaded

When roaming to a new computer drivers are installed on the first boot, similar to the first time
you boot a generalized Windows image

              System Partition - Boot Files   Operating System Partition -
                                              Apps, Data, Settings
              • FAT32 File System
              • 300MB                         • NTFS File System
              • Legacy Boot Manager
                (Bootmgr)
              • UEFI Boot Manager
                (Bootmgfw.efi)
Boot Disk Removal

Boot disk removal is detected by the USB stack
The kernel freezes the system
The stack will wait 60 seconds for the boot disk to return
  and then power down the system
If the boot disk is returned, the system will resume




Put it back in the same USB port
DEMO
Quick DR

           Keep all personal data, Metro style apps,
           and important settings from the PC, and
           reinstall Windows.



           Remove all personal data, apps, and
           settings from the PC, and reinstall Windows




           Recovery Environment
Reset you PC

                Remove everything and start from scratch

1. Win RE - Boots into the Windows
   Recovery Environment
2. Win RE - Erases and formats
3. Win RE - Installs a fresh copy
4. PC restarts into the newly installed
   OS
Refresh your PC
                     Fix a problem with your computer
                 It’s a reinstall without losing your data,
                       settings, and Metro style apps
1. Boots into Windows RE
2. Win RE scans the hard drive for your data, settings, and apps, and puts
   them aside (on the same drive).
3. Win RE installs a fresh copy of Windows.
4. Win RE restores the data, settings, and apps,
5. The PC clean boots
Kept or removed?

Kept                                  Removed
• Wireless network connections           • File type associations
• Mobile broadband connections           • Display settings
• BitLocker and BitLocker To Go          • Windows Firewall settings
  settings                               • Classic apps
• Drive letter assignments
• Personalization settings such as
  lock screen background and
  desktop wallpaper
• Metro apps (not the classic apps)
Include the apps

Refresh from a previous state

mkdir C:RefreshImage
recimg -CreateImage C:RefreshImage
DEMO
Windows 8 Boot
Pre-OS environment
         Win7
Bios vs UEFI boot speed
                                                            Explorer Ready
 Windows 7                                                            Service & App
                    POST                    OS Initialization
                                                                       Initialization




                       Explorer Ready
Windows 8    POS            Service &
              T              App Init
                           Device
                           Initialization
              Hiberfile Read
              (Session0)

                            End-users judge their pc performance according to boot speed
Power -> logon

                                                    Seamless single graphics transition
         Post with highest supported native         from firmware to native OS driver
         resolution
                                     Clean, high-resolution branding elements
                                     persist through OS boot


    User View        OEM                         OEM
                     Logo                        Logo




    Boot Phase                                                   Device
                     POST                Hiber Resume                      Explorer Init.
                                                                  Init.
    Seconds                     2s                   4s                   6s          7s
How to shutdown

                                                   Shutdown => system
                                                   kernel hibernate

                                                   Restart => full restart
                                                   null boot

     shutdown /s /full /t 0 => force full shutdown without hibernate file
3 Security Components for boot
UEFI secure boot

 “Protects against bootkits by verifying the boot loader before loading”

 Step1:
 MS creates a signature of the boot loader and pre-stages it onto PC’s


            MS
      RSA2048 key pair


      Priv       Pub




     Boot loader                                Hash                         sig
                              SHA256                               Encrypt
UEFI secure boot
Step2:
UEFI firmware database are pre-staged on Windows 8 logo devices



                                           • db: sig database, keys you trust
                                           • dbx: forbidden signature database,
                                             blacklist a loader or key
                                           • KEK: key exchange keys, to update db or
                                             dbx
                                           • PK: platform key => to update KEK


For windows 8 certified devices they must adhere to the hardware certification requirements => KEK and
DB must contain a Microsoft key, secure boot must be enabled out of the box.
Measured boot
                                         Creates a log with hash of
                                         everything that was loaded
  BIOS          Hash of next item(s)



  Boot
 loader


 Kernel


             Kernel initializes ELAM can look at the hashes of the drivers and decide
  Early
   Early
             to load yes/no before loading early drivers into memory
    Early
 Drivers
  Drivers
   Drivers
Remote Attestation

Allow a boot log to be evaluated and enforce a policy

                                   Measured
                                   boot log


         Client                                         Attestation
                                                          Server




                                      TOKEN
All 3 components

  UEFI
   POST




  Win8
Boot loader

                                    Measured
                                    boot log              Attestation
 Windows                                                       server
              ELAM
  Kernel



                                                 Anti-
              3rd party   Windows
                                                           TOKEN

                                               Malware
              software     logon
                                               software
Connected state
Connected Standby

               Screen On                            Screen Off                   Shutdow
                                                                                    n
                (Active)                           (Connected
                                                     Standby)                     User not
               User present
                                                                                  present,
                and using
                                                   User not present,             no context
                 device
                                                    still connected                saved




New Windows power state
The PC’s screen is off, but the device remains in a very low idle state
The network adapter maintains a connection to the network
Metro style apps continue to receive live tile updates and toast notifications
Background Tasks and Push Notifications enable customers to receive real-time
communication via apps such as email, IM and VoIP
Power consumption
Consistent plow power




Less than 5% battery drain over 16 hour period in Connected Standby
App model for connected standby



                   App model is right by design for power
                   Apps are suspended when the computer enters Connected
                   Standby
                   Apps may register background activity in Background Tasks
                   Notifications API allows suspended apps to handle
                   incoming events from the cloud



                   Pattern matching and wake used for push notifications and
                   real-time apps
Win File system
Storage Spaces
             Resilience   Thin provisioning

             - mirror     Logical vs physical size
                          10GB vs 4 GB
             - Parity
DEMO
Checkdisk

                      Win7
Only two states                                         Fix corruption with a minimum of downtime
- Volume is healthy
- Volume is not healthy => volume goes offline          ReFS => no longer requires fixing offline
Fix time was directly related to #files on the volume


A disk has 2 health states

                                                        A disk has 4 health states
4 Point Health State
Check phase
BitLocker

-   Support Encrypted Hard Drive to offload cryptography to disk processor
-   BitLocker Pre-provisioning in WinPE environment
-   Used space encryption
-   Standard user PIN change
-   Network Unlock
Storage Optimizer


-   Trim Support for SSD
Virtualisation
Client Hyper-V

-       Same technology as Windows Server 2012
-       Requirements
    -    64-bit system
    -    SLAT (second level address translation)
    -    4 GB RAM




* We are missing seamless apps
Overview
Cheat sheet
I want to hear your questions

1. After this session
2. On the booth floor
3. This evening during the ask the experts
4. By email: tom@decaluwe.eu
Windows 8 is
   great!
 Share your
enthusiasm
END
“Part 1”

Weitere ähnliche Inhalte

Was ist angesagt?

201304 mms2013 feedback-pc-device管理
201304 mms2013 feedback-pc-device管理201304 mms2013 feedback-pc-device管理
201304 mms2013 feedback-pc-device管理
Osamu Takazoe
 
Wd share space_release_notes_2_2_93_final
Wd share space_release_notes_2_2_93_finalWd share space_release_notes_2_2_93_final
Wd share space_release_notes_2_2_93_final
interviz
 
Medooze MCU Video Multiconference Server Installation and configuration guide...
Medooze MCU Video Multiconference Server Installation and configuration guide...Medooze MCU Video Multiconference Server Installation and configuration guide...
Medooze MCU Video Multiconference Server Installation and configuration guide...
sreeharsha43
 
Delivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiDelivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefi
Norman Mayes
 

Was ist angesagt? (15)

Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...
Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...
Windows 7 Deployment with Novell ZENworks Configuration Management and ENGL I...
 
The Boot Process
The Boot ProcessThe Boot Process
The Boot Process
 
201304 mms2013 feedback-pc-device管理
201304 mms2013 feedback-pc-device管理201304 mms2013 feedback-pc-device管理
201304 mms2013 feedback-pc-device管理
 
Wd share space_release_notes_2_2_93_final
Wd share space_release_notes_2_2_93_finalWd share space_release_notes_2_2_93_final
Wd share space_release_notes_2_2_93_final
 
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationLecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 Configuration
 
Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
 
Medooze MCU Video Multiconference Server Installation and configuration guide...
Medooze MCU Video Multiconference Server Installation and configuration guide...Medooze MCU Video Multiconference Server Installation and configuration guide...
Medooze MCU Video Multiconference Server Installation and configuration guide...
 
Delivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiDelivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefi
 
Android Custom Kernel/ROM design
Android Custom Kernel/ROM designAndroid Custom Kernel/ROM design
Android Custom Kernel/ROM design
 
bios booting process
bios booting processbios booting process
bios booting process
 
4th
4th4th
4th
 
Hbcd
HbcdHbcd
Hbcd
 
ZCM 3rd Party Imaging
ZCM 3rd Party ImagingZCM 3rd Party Imaging
ZCM 3rd Party Imaging
 
boot
bootboot
boot
 
UEFI Spec Version 2.4 Facilitates Secure Update
UEFI Spec Version 2.4 Facilitates Secure UpdateUEFI Spec Version 2.4 Facilitates Secure Update
UEFI Spec Version 2.4 Facilitates Secure Update
 

Andere mochten auch

Mon trade how does our economy work
Mon trade how does our economy workMon trade how does our economy work
Mon trade how does our economy work
Travis Klein
 
Mon contrast comm with today
Mon contrast comm with todayMon contrast comm with today
Mon contrast comm with today
Travis Klein
 
Thurs rus revolution
Thurs rus revolutionThurs rus revolution
Thurs rus revolution
Travis Klein
 
Block mexico conquest
Block mexico conquestBlock mexico conquest
Block mexico conquest
Travis Klein
 
Thurs review latin amer and europe
Thurs review latin amer and europeThurs review latin amer and europe
Thurs review latin amer and europe
Travis Klein
 
Linux kursu-esenyurt
Linux kursu-esenyurtLinux kursu-esenyurt
Linux kursu-esenyurt
sersld67
 

Andere mochten auch (19)

Exchange Server 2013 Architecture Deep Dive, Part 2
Exchange Server 2013 Architecture Deep Dive, Part 2 Exchange Server 2013 Architecture Deep Dive, Part 2
Exchange Server 2013 Architecture Deep Dive, Part 2
 
旅行カバンとNFC
旅行カバンとNFC旅行カバンとNFC
旅行カバンとNFC
 
Federmanager Bologna Servizi 15marzo2013
Federmanager Bologna  Servizi 15marzo2013Federmanager Bologna  Servizi 15marzo2013
Federmanager Bologna Servizi 15marzo2013
 
Daragh presburundi
Daragh presburundiDaragh presburundi
Daragh presburundi
 
Mon trade how does our economy work
Mon trade how does our economy workMon trade how does our economy work
Mon trade how does our economy work
 
Mon contrast comm with today
Mon contrast comm with todayMon contrast comm with today
Mon contrast comm with today
 
Thurs rus revolution
Thurs rus revolutionThurs rus revolution
Thurs rus revolution
 
Wed militarism
Wed militarismWed militarism
Wed militarism
 
Block mexico conquest
Block mexico conquestBlock mexico conquest
Block mexico conquest
 
Thurs review latin amer and europe
Thurs review latin amer and europeThurs review latin amer and europe
Thurs review latin amer and europe
 
Mon start of ww1
Mon start of ww1Mon start of ww1
Mon start of ww1
 
Mobile Broadband For Everyone
Mobile Broadband For Everyone Mobile Broadband For Everyone
Mobile Broadband For Everyone
 
What photosensitive epilepsy
What photosensitive epilepsyWhat photosensitive epilepsy
What photosensitive epilepsy
 
The Best Infrastructure for OpenStack: VMware vSphere and Virtual SAN
The Best Infrastructure for OpenStack: VMware vSphere and Virtual SANThe Best Infrastructure for OpenStack: VMware vSphere and Virtual SAN
The Best Infrastructure for OpenStack: VMware vSphere and Virtual SAN
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
Mon printing press
Mon printing pressMon printing press
Mon printing press
 
Actionable IAM
Actionable IAMActionable IAM
Actionable IAM
 
Linux kursu-esenyurt
Linux kursu-esenyurtLinux kursu-esenyurt
Linux kursu-esenyurt
 
Day 3 mon world
Day 3 mon worldDay 3 mon world
Day 3 mon world
 

Ähnlich wie Windows 8 Client Part 1 "The OS internals for IT-Pro's"

Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
fm2008
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Gene Carboni
 
Lotus Foundations Start 1 0 English Version
Lotus Foundations Start 1 0 English VersionLotus Foundations Start 1 0 English Version
Lotus Foundations Start 1 0 English Version
Enzo Stanzione
 
Distro Recipes 2013: Secure Boot and Linux: several issues, one solution
Distro Recipes 2013: Secure Boot and Linux: several issues, one solutionDistro Recipes 2013: Secure Boot and Linux: several issues, one solution
Distro Recipes 2013: Secure Boot and Linux: several issues, one solution
Anne Nicolas
 
Delivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiDelivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefi
Scientia Groups
 
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docxModern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
raju957290
 

Ähnlich wie Windows 8 Client Part 1 "The OS internals for IT-Pro's" (20)

Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
 
Linux booting process, Dual booting, Components involved
Linux booting process, Dual booting, Components involvedLinux booting process, Dual booting, Components involved
Linux booting process, Dual booting, Components involved
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
 
The operating system (os),
The operating system (os),The operating system (os),
The operating system (os),
 
Lotus Foundations Start 1 0 English Version
Lotus Foundations Start 1 0 English VersionLotus Foundations Start 1 0 English Version
Lotus Foundations Start 1 0 English Version
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
 
Let’s talk virtualization
Let’s talk virtualizationLet’s talk virtualization
Let’s talk virtualization
 
Linux kernel booting
Linux kernel bootingLinux kernel booting
Linux kernel booting
 
File000124
File000124File000124
File000124
 
101 1.1 hardware settings v2
101 1.1 hardware settings v2101 1.1 hardware settings v2
101 1.1 hardware settings v2
 
Distro Recipes 2013: Secure Boot and Linux: several issues, one solution
Distro Recipes 2013: Secure Boot and Linux: several issues, one solutionDistro Recipes 2013: Secure Boot and Linux: several issues, one solution
Distro Recipes 2013: Secure Boot and Linux: several issues, one solution
 
Spectre meltdown performance_tests - v0.3
Spectre meltdown performance_tests - v0.3Spectre meltdown performance_tests - v0.3
Spectre meltdown performance_tests - v0.3
 
Delivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiDelivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefi
 
COC. 1 COMPUTER SYSTEM SPECIFICATIONS-BIOS.pptx
COC. 1 COMPUTER SYSTEM SPECIFICATIONS-BIOS.pptxCOC. 1 COMPUTER SYSTEM SPECIFICATIONS-BIOS.pptx
COC. 1 COMPUTER SYSTEM SPECIFICATIONS-BIOS.pptx
 
ITE7_Chp10.pptx
ITE7_Chp10.pptxITE7_Chp10.pptx
ITE7_Chp10.pptx
 
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docxModern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
 
Ch04 system administration
Ch04 system administration Ch04 system administration
Ch04 system administration
 
Ch04
Ch04Ch04
Ch04
 
Ite v5.0 chapter5
Ite v5.0 chapter5Ite v5.0 chapter5
Ite v5.0 chapter5
 
Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8Comparison of Windows 7 & Windows 8
Comparison of Windows 7 & Windows 8
 

Mehr von Microsoft TechNet - Belgium and Luxembourg

Mehr von Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Windows 8 Client Part 1 "The OS internals for IT-Pro's"

  • 1. Windows 8 Client Part 1 "The OS internals for IT-Pro's" Tom Decaluwé Infrastructure Manager Contact me: Macintosh Retail Group tom@decaluwe.eu http://trycatch.be/blogs/decaluwet
  • 2. Windows 8 slow adoption - Touch UI - Different - Disruptive leap - Bad economical times - We just migrated to Windows 7 - Apple is better - Lack of “devices” - Lack of “time” for IT pro’s Keala group
  • 4. My Promise “I’ll show every one of you at least 1 feature to be enthusiastic about”
  • 6. Lab for the Day 192.168.1.1 DEMONET 192.168.1.50
  • 7. What we will Cover
  • 8. What we will Cover
  • 10. 27 years of evolution V1.0 1985 16 Bit V1.0 1985 16 Bit V3.1 V2000 XP 1992 2001 V6 V7 2007 2009 V8 2012 V8 V7 2012?
  • 11. Windows 8 Editions • Windows 8 X86 PC • Windows 8 Pro • Windows 8 Enterprise ARM • Windows RT / WOA
  • 13. Upgrade speed Win7 vs Win8 • Win 7 => 4 wizards +/- 60 screens • Win 8 => one wizard +/- 11 clicks Upgrade Performance • Win 7 => moved file by file,… • Win 8 => moves the whole folder in one go,…
  • 14. Source and Destinations ISO VHD USB Virtual USB Hard disk VHD Machine (Win To GO)
  • 15. The simple and detailed upgrade UI
  • 17. How it differs from a normal pc • Internal disks disabled • TPM not used => replaced with pre-operating system boot password • No hibernation • No Recovery Environment • No Push button reset • Disabled windows Store • No MAK activation You have limited hard disk space, like SSD but worse ;-)
  • 18. Some usage scenarios -Contractors that bring their own PC -Shared PC’s -Quick DR -Home computing / BYOD -…
  • 19. Computer roaming Windows uniquely identifies computers based on constant characteristics of the machine firmware -SMBIOS UUID if present or certain SMBIOS strings This ID is used to ensure when Windows returns to a computer, only the necessary set of drivers are loaded When roaming to a new computer drivers are installed on the first boot, similar to the first time you boot a generalized Windows image System Partition - Boot Files Operating System Partition - Apps, Data, Settings • FAT32 File System • 300MB • NTFS File System • Legacy Boot Manager (Bootmgr) • UEFI Boot Manager (Bootmgfw.efi)
  • 20. Boot Disk Removal Boot disk removal is detected by the USB stack The kernel freezes the system The stack will wait 60 seconds for the boot disk to return and then power down the system If the boot disk is returned, the system will resume Put it back in the same USB port
  • 21. DEMO
  • 22. Quick DR Keep all personal data, Metro style apps, and important settings from the PC, and reinstall Windows. Remove all personal data, apps, and settings from the PC, and reinstall Windows Recovery Environment
  • 23. Reset you PC Remove everything and start from scratch 1. Win RE - Boots into the Windows Recovery Environment 2. Win RE - Erases and formats 3. Win RE - Installs a fresh copy 4. PC restarts into the newly installed OS
  • 24. Refresh your PC Fix a problem with your computer It’s a reinstall without losing your data, settings, and Metro style apps 1. Boots into Windows RE 2. Win RE scans the hard drive for your data, settings, and apps, and puts them aside (on the same drive). 3. Win RE installs a fresh copy of Windows. 4. Win RE restores the data, settings, and apps, 5. The PC clean boots
  • 25. Kept or removed? Kept Removed • Wireless network connections • File type associations • Mobile broadband connections • Display settings • BitLocker and BitLocker To Go • Windows Firewall settings settings • Classic apps • Drive letter assignments • Personalization settings such as lock screen background and desktop wallpaper • Metro apps (not the classic apps)
  • 26. Include the apps Refresh from a previous state mkdir C:RefreshImage recimg -CreateImage C:RefreshImage
  • 27. DEMO
  • 30. Bios vs UEFI boot speed Explorer Ready Windows 7 Service & App POST OS Initialization Initialization Explorer Ready Windows 8 POS Service & T App Init Device Initialization Hiberfile Read (Session0) End-users judge their pc performance according to boot speed
  • 31. Power -> logon Seamless single graphics transition Post with highest supported native from firmware to native OS driver resolution Clean, high-resolution branding elements persist through OS boot User View OEM OEM Logo Logo Boot Phase Device POST Hiber Resume Explorer Init. Init. Seconds 2s 4s 6s 7s
  • 32. How to shutdown Shutdown => system kernel hibernate Restart => full restart null boot shutdown /s /full /t 0 => force full shutdown without hibernate file
  • 34. UEFI secure boot “Protects against bootkits by verifying the boot loader before loading” Step1: MS creates a signature of the boot loader and pre-stages it onto PC’s MS RSA2048 key pair Priv Pub Boot loader Hash sig SHA256 Encrypt
  • 35. UEFI secure boot Step2: UEFI firmware database are pre-staged on Windows 8 logo devices • db: sig database, keys you trust • dbx: forbidden signature database, blacklist a loader or key • KEK: key exchange keys, to update db or dbx • PK: platform key => to update KEK For windows 8 certified devices they must adhere to the hardware certification requirements => KEK and DB must contain a Microsoft key, secure boot must be enabled out of the box.
  • 36. Measured boot Creates a log with hash of everything that was loaded BIOS Hash of next item(s) Boot loader Kernel Kernel initializes ELAM can look at the hashes of the drivers and decide Early Early to load yes/no before loading early drivers into memory Early Drivers Drivers Drivers
  • 37. Remote Attestation Allow a boot log to be evaluated and enforce a policy Measured boot log Client Attestation Server TOKEN
  • 38. All 3 components UEFI POST Win8 Boot loader Measured boot log Attestation Windows server ELAM Kernel Anti- 3rd party Windows TOKEN Malware software logon software
  • 40. Connected Standby Screen On Screen Off Shutdow n (Active) (Connected Standby) User not User present present, and using User not present, no context device still connected saved New Windows power state The PC’s screen is off, but the device remains in a very low idle state The network adapter maintains a connection to the network Metro style apps continue to receive live tile updates and toast notifications Background Tasks and Push Notifications enable customers to receive real-time communication via apps such as email, IM and VoIP
  • 42. Consistent plow power Less than 5% battery drain over 16 hour period in Connected Standby
  • 43. App model for connected standby App model is right by design for power Apps are suspended when the computer enters Connected Standby Apps may register background activity in Background Tasks Notifications API allows suspended apps to handle incoming events from the cloud Pattern matching and wake used for push notifications and real-time apps
  • 45. Storage Spaces Resilience Thin provisioning - mirror Logical vs physical size 10GB vs 4 GB - Parity
  • 46. DEMO
  • 47. Checkdisk Win7 Only two states Fix corruption with a minimum of downtime - Volume is healthy - Volume is not healthy => volume goes offline ReFS => no longer requires fixing offline Fix time was directly related to #files on the volume A disk has 2 health states A disk has 4 health states
  • 48. 4 Point Health State
  • 50. BitLocker - Support Encrypted Hard Drive to offload cryptography to disk processor - BitLocker Pre-provisioning in WinPE environment - Used space encryption - Standard user PIN change - Network Unlock
  • 51. Storage Optimizer - Trim Support for SSD
  • 53. Client Hyper-V - Same technology as Windows Server 2012 - Requirements - 64-bit system - SLAT (second level address translation) - 4 GB RAM * We are missing seamless apps
  • 56. I want to hear your questions 1. After this session 2. On the booth floor 3. This evening during the ask the experts 4. By email: tom@decaluwe.eu
  • 57. Windows 8 is great! Share your enthusiasm

Hinweis der Redaktion

  1. http://www.keala.nl/websiteN.nsf/news/windows-8-markt-aarzelt#.US6UV7UVEdU
  2. -> Software => new interface andapp model enablesbusinessestocreatetheirown lob appsto help improveproductivity-> The operating systems is faster, more reliableand more secureHardware makers delivered 90 million PCs in Q4 2012
  3. -> Software => new interface andapp model enablesbusinessestocreatetheirown lob appsto help improveproductivity-> The operating systems is faster, more reliableand more secure
  4. MS DOS 1,0=>1981
  5. http://blogs.msdn.com/b/b8/archive/2011/11/21/improving-the-setup-experience.aspx
  6. The reason for this is that in Windows 7, the upgrade process preserved the customer’s applications in the Program Files folder and their files in the Users folder by moving each file to a transport location (so that the original folders can be deleted to make way for the newer installation), and then moving them back again to complete the installation. With music and photo collections, it’s not unusual to have hundreds of thousands of files, so even relatively fast move operations can really add up.Simplifying the transport In Windows 7 the transport (this is the place where we store the files and settings being preserved between the old and new operating systems) was comprised of two folders: “Windows.~q” and “Windows.~tr”. In Windows 8 we have simplified this to just one folder. We have repurposed the “Windows.old” naming convention for consistency with clean install (which creates a “Windows.old” folder containing the previous OS in order to be able to roll back should the installation fail). Merging the transport folders into the single Windows.old folder speeds up the upgrade process, as it removes the need to move files between the ~tr and ~q folders.Switching to hard links In upgrades to Windows 7, files were moved between the old OS, the transport, and Windows 7 by using file move operations. In upgrades to Windows 8, we use hard link operations instead. This means we can link to the actual data on disk in the transport location without having to physically move the file, which has a significant performance gain. And if something goes wrong with setup and we have to roll back, we just need to delete the hard links, and the files are completely unaffected on disk.
  7. What isit? It’s a full no compromis pc on a memory stick
  8. ■■ Offline internal disks When booted into a Windows To Go workspace, internal harddisks are disabled by default. The Windows To Go workspace completely disassociatesitself from the other drives in a machine. This minimizes the risk of unwantedmanipulationof either device as well as data leakage.■■ Absence of Trusted Platform Module (TPM) Traditionally, BitLocker isimplementedusing the TPM integrated hardware. Because the TPM is linked with aspecific computer, it cannot be used with Windows To Go because it can be used onmultiple computers. To replace TPM for a Windows To Go workspace, a preoperatingsystem boot password is used for security.■■ Disabled hibernation Hibernation has been disabled by default to maximize aworkspace’s versatility to move between machines. If a machine is in hibernate, a usermight remove the USB media, thinking the computer is turned off.■■ Removed Windows Recovery Environment In a Windows To Go workspace, theWindows Recovery Environment is not available. In the event that a recovery is needed,re-image the drive.■■ Disabled Push Button Reset This feature was disabled due to the nonsensicalnatureof resetting to the manufacturer’s standard for a computer while runningWindowsTo Go.■■ Disabled Microsoft Store The Windows store uses hardware identification forlicensing purposes. For this reason, the Windows Store is disabled on Windows To Go.If the Windows To Go workspaces will not be moving to multiple computers, the storecan be re-enabled.■■ Absence of Multiple Activation Key (MAK) method The MAK activation methodis not supported for Windows
  9. Windows To Go can be configured to boot on both UEFI and BIOS computersBoth sets of boot components are placed on a FAT32system partition
  10. Boot a PC from the USB stick + play a movie + remove the USB stick
  11. http://blogs.msdn.com/b/b8/archive/2012/01/04/refresh-and-reset-your-pc.aspx
  12. Thoroughly => clean whipe, option will write random patterns to every sector of the drive, overwriting any existing data visible to the operating systemQuick => ETA 6minThorough => ETA 23min
  13. Unlike manually reinstalling Windows, you don’t have to go through the Windows Welcome screens again and reconfigure all the initial settings, as your user accounts and those settings are all preservedETA => 8 min
  14. we deliberately chose not to preserve the following settings, as they can occasionally cause problems if misconfigured:File type associationsDisplay settingsWindows Firewall settings
  15. Install a metro appand a non metro app + refresh the pc => show the existingapp is stillthere, the legacyapp is listerd in the TXT file.
  16. 2,2TB max boot MBRhttp://en.wikipedia.org/wiki/Master_boot_recordFASTERThe ExperienceLong Bios boot + difficult to get to the functionsSecurity risksVGA dependency = low resolutionBoot disk size limit 2,2 TB (MBR)
  17. Bios standardsince 1980
  18. BIOS issues:- Time delay at POST - Boot Kit threats- Lots of <Fn> key options at boot- Confusing OS boot menus- No connection between OS and BIOS boot menus- BIOS menus circa 1980- Boot disk size limited to 2.2TBPost mustbe long to show logo’s and have x secondsfor the FunctionkeysOS initialisation takes long as kernel, drivers,... NeedtoberestartedServices & app, all the appsneedtocome back online.Win8 hiberfile is a hibernation of Session0
  19. http://blogs.msdn.com/b/b8/archive/2011/09/08/delivering-fast-boot-times-in-windows-8.aspxhttp://www.windowsitpro.com/article/windows8/force-full-shutdown-windows-8-closing-kernel-session-140921?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+windowsitpro+%28WIN%3EArticles%3ETop+Stories%29
  20. Secureboot => boot loaderprotection (local)Measured boot => (local)Remote attestation => evaluates the boot log remotely (local)
  21. http://www.youtube.com/watch?v=35D0_feZnK8Secure Boot does not require a Trusted Platform Module (TPM).Youcannotjust update dbanddbx => they are protectedfrom editing via the KEK. An update on dbanddbxneedstobesignedby a key in the kek. To update the kek the update must besignedbysomething in PK.PK is pre injectedduring Setup mode byvendorAllcoponents are bakedinto a machine
  22. http://www.youtube.com/watch?v=oiqcog1sk2EIs a boot loaderand os feature thatuses TMP to keep a record of early boot components as they load, Starting at Bios/Uefi => beforeach next component in the boot sequence is loaded the previouscomponentscomputes the hash of the next component and stores it in the TPM into the PCR’s of the TPMBios hash of bootloader (bootmanger.exe) => hands off to bootmanger.exe thathasheswinload,exe or winresume.exe => launch the kernal => the kernal loads the early drivers into memory andbeforeitinitialises the early boot drivers itinitilises ELAM that scans the drivers beforethey load.
  23. http://mbt.codeplex.com/http://www.youtube.com/watch?v=oiqcog1sk2EA TPM based feature, itallows a boot log tobeevaluatedby a remote system andcanallows a policy beevaluatedClient boots andcreates log, Log signedwithyourtpmkey, the log is sent to remote system forverification, the remote server thansends a token back. The clientcanthensendthis token onwardsand say i’m clean
  24. http://channel9.msdn.com/Events/BUILD/BUILD2011/HW-456T
  25. Awindows 8 will have 3 types of statesOnConnectedstandbyOffYouwillhardly ever go to the shutdown state on a connectedstandby device.Whenyoususspend the system there is a very short time where the appscan save their state.
  26. Win 7 PCDimm display at 60 secTurn off display after 120 minutesSleep state after 180 seconds S3-mode => nothinghappens no connectivityPhone180 seconds screen offIdle time has small pieksbursts of stuff happening, cellconnecting, sms,...
  27. Graph 1 => win7with screen off => 15,6 ms timer tickGraph 2 => win8 connectedstandby > rarand well structured power usageThe cpuonlywakeswhen i has something “important” to doWindows 8 connected standby requiresNon-rotational boot volumeWiFi device supports NDIS 6.3 features (D0 offload, Wake on Push, etc.)ACPI 5.0 flag indicating low-power S0 over S3
  28. http://blogs.msdn.com/b/b8/archive/2012/01/05/virtualizing-storage-for-scale-resiliency-and-efficiency.aspxhttp://blogs.msdn.com/b/b8/archive/2012/05/09/redesigning-chkdsk-and-the-new-ntfs-health-model.aspxblogs.msdn.com/b/b8/archive/2012/01/16/building-the-next-generation-file-system-for-windows-refs.aspx
  29. Its logical capacity is listed as 10TB although the underlying physical disks in the pool have only 4TB of total raw capacity. As a result, you no longer need to worry up-front about the size.Resiliency is built in by associating the mirrored attribute, which means that there are at least two copies of all data contained within the space on at least two different physical disks. Because the space is mirrored, it will continue to work even if one of the physical disks within the pool fails.
  30. Create a storage space on the home computer
  31. We developed a new method of communication that describes types of corruptions as “verbs” that act upon the key components and points of the design – the file system driver (NTFS), the self-healing module, the spot-verification service, and the chkdsk utility. All file system corruptions are classified as needing one of 18 different “verbs” that we’ve defined in Windows 8. We have also left room for possible new verb definitions that can help us diagnose issues even better in the future.Online and healthy – In this state there are no detected file system corruptions and there is no action required of you. The file system remains in this state most of the time.Online spot verification needed– The file system stays in this transient state only for a brief instant after the file system finds a corruption that it cannot self-heal; it puts the volume in this state until the spot verification service verifies the corruption. Again, there is no user action required.Online scan needed– When the spot-verification service confirms the corruption, it puts the file system in the “online scan needed” state. In the next maintenance window, an online scan is performed; there is no user action required. This state is reflected in the Action Center, so you can run the scan manually if you want to do that before the next maintenance window. The scan is run as a background operation, which means that you can continue using the computer while the scan is performed. During this online scan, all verified issues and fixes are logged for later repair. On Windows Server 8 systems, idle time is determined by monitoring the CPU and storage idle times.
  32. Online and healthy – In this state there are no detected file system corruptions and there is no action required of you. The file system remains in this state most of the time.Online spot verification needed– The file system stays in this transient state only for a brief instant after the file system finds a corruption that it cannot self-heal; it puts the volume in this state until the spot verification service verifies the corruption. Again, there is no user action required.Online scan needed– When the spot-verification service confirms the corruption, it puts the file system in the “online scan needed” state. In the next maintenance window, an online scan is performed; there is no user action required. This state is reflected in the Action Center, so you can run the scan manually if you want to do that before the next maintenance window. The scan is run as a background operation, which means that you can continue using the computer while the scan is performed. During this online scan, all verified issues and fixes are logged for later repair. On Windows Server 8 systems, idle time is determined by monitoring the CPU and storage idle times.
  33. Online self-healing: The NTFS self-healing feature was introduced in Windows Vista (and in Windows Server 2008) to reduce the need to run chkdsk. Self-healing is a feature built into NTFS that fixes certain classes of corruptions encountered during normal operation, and can make these fixes while still online. If all issues that are detected are self-healed online, there is no need for an offline repair. In Windows 8 we increased the number of issues that can be handled online and hence reduced any further need for chkdsk.Online verification: Some corruptions are intermittent due to memory issues and may not be a result of an actual corruption on the disk; so we added a new service to Windows 8, called the spot verification service. It is triggered by the file system driver and it verifies that there is actual corruption on the disk before moving the file system along in the health model. This new service runs in the background and does not affect the normal functioning of the system; it does nothing unless the file system driver triggers it to verify a corruption.Online identification and logging: When an issue is verified, this triggers an online scan of the file system, which runs as a maintenance task in the file system. In Windows 8, scheduled tasks that are for the maintenance of the computer run only when appropriate (during idle time, etc.). This scan can run as a background task while other programs continue to run in the foreground. As the file system is scanned, all issues that are found are logged for later correction.Precise and rapid correction – At the user or administrator’s convenience, the volume can be taken offline, and the corruptions logged in the previous step can be fixed. The downtime from this operation, called “Spotfix,” takes only seconds, and on Windows Server 8 systems with cluster shared volumes, we’ve eliminated this downtime completely. With this new model, chkdskoffline run time is now directly proportional to the number of corruptions, rather than being proportional to the number of files as in the old model.
  34. http://www.windowsitpro.com/article/security/bitlocker-windows-8-142661Administrators can enable BitLocker pre-provisioning from the Windows Preinstallation Environment (WinPE) by using the Manage-bde BitLocker command-line utility. WinPE is a lightweight Windows environment that is used for installing the Windows OS. For example, to pre-provision BitLocker on your F drive, type the following Manage-bde command at a WinPE command prompt: manage-bde -on f:Network Unlock works like the TPM plus startup key unlock method. Instead of reading a startup key from a USB medium, Network Unlock uses an unlock key. This key is composed of a key that is stored on the machine's local TPM and a key that Network Unlock receives from a Windows 8 Windows Deployment Services (WDS) server on the trusted network. If the WDS server is unavailable, then BitLocker displays the standard startup key unlock screen
  35. New Defrag tool Now supports SSD bydoing a doing “Trim Hints”, allows the OS totell the drive hardware thatit’snotusingcertainareas of the flash. The drive then issues a reclaimto free that areaSSD Their disadvantage is that they have a finite amount of write entries available to them over the life of the drive itself. Defragmentation involves moving lots of data to different places on the surface of a drive, so it follows that the process itself is very write-intensive. Thus, consistent and periodic defragmentation can negatively affect the life of a drive.http://www.corsair.com/blog/how-to-enable-trim-support-for-your-ssd/Since a memory block must be erased before it can be re-programmed, TRIM improves performance by pro-actively erasing pages containing invalid data, allowing the SSD to write new data without first having to perform a time-consuming erase command. Since a memory block must be erased before it can be re-programmed, TRIM improves performance by pro-actively erasing pages containing invalid data, allowing the SSD to write new data without first having to perform a time-consuming erase command.