Microsoft Desktop (Part 3 of 8): Managing WDS and MDT

In a corporate network there maybe requirements to deploy images to remote computers. The remote client computers may not be the same and might differ in configuration and might even require high touch installations. We can manage such deployments tasks on remote computers using Windows Server role services such as Windows Deployment Services or WDS. In large scale enterprises requiring mass deployments or upgrades to the Windows Desktop and Server operating systems we may need to perform suitable OS configurations in less time. Microsoft offers an automated deployment solution named MDT, to automate application installation and OS configuration more efficiently. In this course we'll gain a better understanding of managing WDS and how it will allow us to simplify the desktop deployment process with end to end deployment solutions with both client and server computers. Understanding how to manage MDT will grant us the ability complete the deployment process in less time while reducing deployment costs.* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *Lesson 1: (a) Configure WDS Overview; (b) Image Transmission; (c) Unicast Transmission; (d) Multicast Transmission; (e) Multicast Transmission Types; (f) WDS Configuration Options; (g) Demo: Configure WDS; (h) Demo: Multicast Transmission.. Lesson 2: (a) Configure Images Overview; (b) Types of Image Formats; (c) WIM File Architecture; (d) Demo: Configure Capture Images; (e) Demo: Add Image Wizard; (f) Demo: Image with WDS; (g) Demo: WDS Wizard ; (h) Demo: Start Image.. Lesson 3: (a) Boot to VHD Overview; (b) Demo: Boot to VHD; (c) Demo: Create Boot Image.. Lesson 4: (a) Windows To Go; (b) Custom Windows Install DVD; (c) Demo: Custom Windows Install; (d) Demo: OS CD Image Tool.. Lesson 5: (a) Image Servicing Overview; (b) Offline Servicing Advantages; (c) Demo: Image Servicing; (d) Demo: Install files to Image.. Lesson 6: (a) VMST; (b) Microsoft Solution Accelerator; (c) Create Discover Image with WDS; (d) Requirements; (e) Demo: Create Discover Image; (f) Demo: Create Boot System; (g) Demo: Rename Images.. Lesson 7: (a) MDT Overview; (b) MDT Installation Requirements; (c) Demo: Managing MDT.. Lesson 8: (a) MDT 2012 Deployment Share; (b) Demo: MDT Deployment Share.. Lesson 9: (a) MDT Configuration Requirements; (b) Demo: MDT Config Requirements; (c) Demo: Create Drivers database ; (d) Demo: Import Drivers.. Lesson 10: (a) Implementing MDT Deployment; (b) Demo: Implement MDT Deployment; (c) Demo: Update Deployment Share.

Microsoft Desktop (Part 2 of 8): Image Capture

Operating system images are a compressed collection of reference files and folders from a reference system that are needed to successfully install and configure an operating system on a computer. Before we start to build a reference computer for imaging we need to determine the imaging strategy we are going to use. We also need to determine the applications that need to be integrated into the image, identify the appropriate image type and decide on the imaging process. Having a better understanding of setting up image capture will enable us to build and operating system image for deployment and automate the desktop deployment process. Through this course we'll review the various types of deployment images that can be made of a system. We'll also go over the various phases of preparing the operating system for the imaging capturing process. * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *Lesson 1: (a) Windows Desktop Images; (b) Types of Images; (c) Image Strategy; (d) Thick Image; (e) Thin Image; (f) Hybrid Image; (g) Boot Image; (h) Imaging Process; (i) Image Selection Criteria; (j) Volume of Images; (k) Designing Desktop Images; (l) Prepare for OS Image Capture; (m) Windows ADK; (n) Windows ADK Components; (o) Demo: Desktop Images and ADK.. Lesson 2: (a) Windows PE Overview; (b) Demo: Windows PE; (c) Demo: WDS Installation; (d) Demo: WDS Configure.. Lesson 3: (a) Answer Files Overview; (b) Windows SIM; (c) Demo: Answer Files; (d) Demo: Export Image; (e) Demo: Create Answer File .. Lesson 4: (a) Sysprep; (b) Sysprep Command-Line Options; (c) Sysprep GUI Options; (d) WDS; (e) WDS Prerequisites; (f) Deployment & Transport Servers; (g) Demo: System Preparation.

Microsoft Desktop (Part 1 of 8): Enterprise Deployments

Many system administrators are familiar with configuring a few machines at a time in their enterprise. What happens we start to get in to large organizations? Those with not just 10, 20 or more desktops but those with 500, 1000 or even more desktops all are running various applications within the enterprise. Eventually all systems reach a point when advancements in technology betray then as outdated and upgrading or deposing of those systems ends that portion of their life cycle. Though there are various tools and technologies used to deploy an operating system in large enterprise infrastructures, it is important to understand how to plan for and perform desktop deployments in the enterprise network. Through this course we'll take a high level look at the key concepts of enterprise desktop deployments. We will look at enterprise desktops and the different stages of their life cycle and then go over the process of the deployment in which we setup an enterprise computer, including the installation of operating systems and all required applications. We'll go through the desktop deployment design strategies to make sure we identify the right deployment approach to use based upon hardware and software dependences and identify a deployment strategy to use and ultimately implement. We will also touch on desktop update options and the various enterprise desktop components. Once we have an understanding of the components, we'll then focus on identifying a deployment method, identifying product licenses using volume activation management tool and creating an infrastructure readiness outline using the Microsoft assessment and planning toolkit. * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *Lesson 1: (a) Enterprise Desktop Lifecycle; (b) Enterprise Desktop Deployment; (c) Desktop Deployment Design; (d) Desktop Update Options; (e) Desktop Maintenance; (f) Desktop Components; (g) Desktop Components Guidelines; (h) Deployment Methods; (i) Capacity Planning; (j) Scalability; (k) Multisite Topology; (l) Network Load; (m) Infrastructure Change Reqs.; (n) Scheduling; (o) Multisite Distribution Points; (p) Guidelines for Planning; (q) Indentifying Product Licenses; (r) Types of Volume Activation; (s) VAMT 3.0; (t) VAMT 3.0 Features; (u) VAMT 3.0 Activation Tasks; (v) Demo: Deployments VAMT; (w) Demo: Running VAMT; (x) Demo: Licenses Status.. Lesson 2: (a) Infrastructure Readiness; (b) Infrastructure Data Collection; (c) Hardware Readiness List; (d) MAP Tool; (e) ACT; (f) Deployment Issues & Solutions; (g) Demo: Readiness with MAP; (h) Demo: Using MAP; (i) Demo: MAP Wizard; (j) Demo: Output.

Microsoft Desktop (Part 8 of 8): Security and Infrastructure

Key threats from the desktop end points of data leakage, misuse of software licenses, unprotected devices and improper configuration of privileges are key threats to an enterprise infrastructure. Microsoft offers a wide variety of security options to protect enterprise desktop endpoints from these threats. On the other hand, a desktop infrastructure has various functionalities that enable the smooth functioning of the system. These include the update infrastructure, virtual desktop infrastructure and the virtual desktop, or VD, collection. Through this course we will get familiar with managing desktop security options that we can use to protect desktop systems from malicious data access and malware threats. We will also ensure the smooth functioning of the systems by designing an update infrastructure and installing required updates using the Windows Server Update services, or WSUS.* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *Lesson 1: (a) Advanced Auditing; (b) UAC; (c) Device Restriction Policies; (d) Demo: Advanced Auditing.. Lesson 2: (a) Implement Endpoint Protection; (b) Endpoint Protection Features; (c) Endpoint Protection Alerts; (d) Client Settings; (e) Demo: Endpoint Protection Set-Up; (f) Demo: Client Settings; (g) Demo: Create Automatic Rule; (h) Demo: Deployment Package.. Lesson 3: (a) Anti-MalwareProtectionPolicies; (b) Demo: Anti-Malware Protection.. Lesson 4: (a) System Center 2012 DPM; (b) Demo: DPM Setup; (c) Demo: DPM Alerts; (d) Demo: Operations Manager.. Lesson 5: (a) BitLocker; (b) BitLocker Modes; (c) BitLocker Recovery Key; (d) Demo: Enable BitLocker; (e) Demo: New Drive; (f) Demo: BitLocker.. Lesson 6: (a) Removable Media Restrictions; (b) Demo: Removable Media Rules.. Lesson 7: (a) EFS; (b) Centrally Managed EFS Solutions; (c) Demo: EFS Folder; (d) Demo: EFS Certificates.. Lesson 8: (a) WSUS; (b) VM Pool Patching; (c) VM Manager Integration; (d) WSUS and SCCM Integration; (e) Multi-Tier WSUS; (f) Replica WSUS Servers; (g) Windows Intune; (h) UpdateInfrastructureGuidelines; (i) Demo: Updates with SCCM.. Lesson 9: (a) VDI; (b) RDS Servers; (c) RDS Capacity Analysis; (d) Bottleneck Remediation; (e) VM Guests; (f) Health Monitoring; (g) RD Session Host Server; (h) Re-Direction Modes; (i) VDI Performance Factors; (j) Demo: RDS Monitoring; (k) Demo: VDI Monitoring.. Lesson 10: (a) Pooled VD Collection; (b) Personal VD Collection; (c) Managed Collection; (d) Unmanaged Collection; (e) Demo: Monitor VDs.

Microsoft Desktop (Part 7 of 8): RD Gateway and Virtualization

In a corporate network there may be requirements from clients to remotely access virtual desktops, known as VDs, session based desktops and other applications. We can configure these tasks for clients by using server role services such as Remote Desktop Gateway and RD Web Access, both provided by Microsoft. Perhaps we have a lack of office space to deploy physical desktops. Maybe we want to enable end users to access their systems using virtual machines over a cloud. To do this we can setup a desktop virtualization host infrastructure and provide an enhanced client experience. Through this course will get a better understanding the management of the RD Gateway and Web Access which will allow us to enable authorized users to connect to resources, such as RD session host servers, RD virtualization host servers and VDs on the corporate network. We will also get a clear understanding of how the RD virtualization host infrastructure and client experience will grant us better control over centralized resources and provide enhanced user experience regardless of where users are located.* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *Lesson 1: (a) RD Gateway; (b) RD Gateway Key Features; (c) RD RAP; (d) RD CAP; (e) Planning RD RAP & RD CAP; (f) Demo: RD RAP; (g) Demo: RD CAP.. Lesson 2: (a) Gateway Server Certificates; (b) Planning Certificates; (c) SSL Bridging; (d) SSL Bridging Guidelines; (e) NAP Integration; (f) NAP Integration Guidelines; (g) Demo: NAP integration; (h) Demo: RD CAP Policy.. Lesson 3: (a) RD Web Access; (b) RD Web Access Guidelines; (c) RD Web Interface Customization; (d) SSL; (e) SSL Guidelines; (f) SSO; (g) SSO Guidelines; (h) Demo: Configuring SSO.. Lesson 4: (a) Host Infrastructure; (b) Virtual Desktop Templates; (c) Failover Clusters; (d) HAVMs; (e) HAVM Implementation; (f) HAVM Planning Guide; (g) Guest Resource Optimization; (h) FairShare Feature; (i) Placement Rules; (j) Virual Network Optimization; (k) Storage Optimizations; (l) Storage Optimization Guidelines; (m) RD Client Experience; (n) Configuration Tasks; (o) RemoteFX Role Service; (p) Local Resource Redirection; (q) Demo: Remote FX Configuration; (r) Demo: Enabling Redirection.

Microsoft Desktop (Part 6 of 8): User Migration and RD Session

In an enterprise it may often necessary to perform a regular OS deployment or OS upgrade according to the organizational requirements. In such scenarios we need to migrate users along with their data configurations and settings to the updated enterprise desktops to ensure that the user data is preserved during the OS deployment or upgrade process. This can be done by implementing the user state migration. Through this course will gain a better understanding about user state migration and how it helps us to minimize productivity loss in the enterprise environment and guarantee user satisfaction. There also may be situations where we want to dynamically increase access to critically enterprise applications on the network. In order to increase the use of such vital applications and resources for users we can use Microsoft's remote desktop role services, such as remote desktop session host and remote desktop connection broker. Through this course we will also get familiar with managing remote desktop and virtualization concepts which helps us simplify the administration tasks of applications along with remotely managing those applications. * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *Lesson 1: (a) User State Migration; (b) User State Migration Types; (c) Remote Storage; (d) Migration Automation Tools; (e) Non-Migrated Applications; (f) Migration Factors; (g) Guidelines for Planning; (h) Migration with USMT; (i) USMT Components; (j) Demo: Data Store; (k) Demo: Migration; (l) Demo: Restoring User State.. Lesson 2: (a) USMT XML Files; (b) Demo: UMST XML File.. Lesson 3: (a) Side-by-Side Migration; (b) Hard-Link Migration; (c) Demo: Hard-Link Migration; (d) Demo: Migration.. Lesson 4: (a) RDS; (b) RDS Role Services; (c) RAD Connections; (d) Demo: RDS; (e) Demo: Adding a Session host; (f) Demo: Adding RDS ; (g) Demo: Install confirm.. Lesson 5: (a) RD Session Host; (b) RD Connection Broker; (c) Demo: RD Session Host; (d) Demo: Depoly.. Lesson 6: (a) RDS Collection; (b) Session Collection; (c) RDS Deployment Types; (d) Planning a Session Collection; (e) Planning Session Collection; (f) Demo: Session Collections; (g) Demo: Add User Group; (h) Demo: Move User Profile Disk.. Lesson 7: (a) Redirection Settings; (b) Planning Redirection Settings; (c) Demo: Redirection Settings; (d) Demo: Remote Connection; (e) Demo: Changing Profile ; (f) Demo: Redirection Resources.

Microsoft Desktop (Part 5 of 8): Lite and Zero Touch Deployment

When working with organizational networks there maybe requirements where we may need to plan and automate desktop image deployments on client computers. We can do this via Lite Touch or Zero touch Deployments. In this course we'll first get familiar with configuring desktops using the Lite touch Deployment strategy. This will allow us to easily automate the image deployment process with minimal interaction thus reducing deployment time and effort. However in organizations where we need to perform a deployment for a large number of enterprise desktop systems the manual interaction requirements of the Lite Touch Deployment can make the process quite complex and time consuming. In order to simplify and automate the deployment process we can use the Zero touch Deployment strategy using the appropriate deployment tools. We will continue and look at how the ability to configure a Zero Touch Deployment strategy will allow us to automate OS deployment in less time. * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *Lesson 1: (a) Lite-Touch Deployment; (b) Lite-Touch Deployment Files; (c) Lite-touch Guidelines; (d) Unattended Answer File; (e) Configuration Phases; (f) Network Load Optimization; (g) Role of NLB During Deployment; (h) Demo: Deployment Share; (i) Demo: Multicasting; (j) Demo: Repository; (k) Demo: Task Sequence; (l) Demo: Deployment Share.. Lesson 2: (a) Image Restrictions; (b) Demo: Image Restrictions.. Lesson 3: (a) Filters; (b) Demo: Filters.. Lesson 4: (a) Zero-Touch Deployment; (b) Infrastructure Requirements; (c) Zero-Touch Configuration Tasks; (d) Slow Network Guidelines; (e) Network Load Optimization; (f) Task Sequencing; (g) Demo: Task Sequence; (h) Demo: Next Steps.. Lesson 5: (a) Advertisement; (b) Advertisement Types; (c) Deployment Tools; (d) Guidelines: OS & Applications; (e) MDT & SCCM 2012 Integration; (f) Benefits of SCCM 2012; (g) Demo: MDT; (h) Demo: More MDT Task Sequence.. Lesson 6: (a) Multicast Transmission; (b) Multicast Custom Options; (c) Demo: Multicast Transmission.

Microsoft Desktop (Part 4 of 8): DFSR Server and Virtualization

When OS deployments are preformed remotely across different sites on the enterprise using MDT we need to ensure the network performance is not affected. Microsoft offers two features, Disrupted File System Replication or DFSR and System Center 2012 Configuration Manager, known as SCCM 2012, to support OS deployment with optimized network performance. It is also important to ensure that a user is not bound and restricted to one desktop. It is our responsibility as a system administrator to allow the user access to required data from any PC or location. We can perform these tasks using User State Virtualization. Through this course we'll get familiar with configuring of the DFSR server and SCCM 2012. We'll see how we will be able to enhance the manageability and the scalability of our network during the OS deployment process. Then we will see how managing User State Virtualization will lets us create a centralized data center that providers our use the flexibility to access the required data from any location. * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *Lesson 1: (a) DFSR Overview; (b) DFS Namespace; (c) Multi-server Topology; (d) Demo: DFSR; (e) Demo: Deploy updates; (f) Demo: DFS Management.. Lesson 2: (a) Replica WDS Servers Overview; (b) Demo: Replica WDS Servers.. Lesson 3: (a) SCCM 2012 Overview; (b) SCCM Pre-requisites; (c) System Center 2012 Components; (d) Distribution Points; (e) Demo: SCCM 2012; (f) Demo: Install SCCM; (g) Demo: Run SCCM.. Lesson 4: (a) User State Virtualization; (b) USV Requirements; (c) USV Configuration Tools; (d) USV Components; (e) User Profiles; (f) Mandatory Profile; (g) Roaming Profiles; (h) Profile Guidelines; (i) Demo: Setup a Roaming Profile; (j) Demo: Config Roaming Profile.. Lesson 5: (a) Folder Redirection; (b) Folder Redirection Guidelines; (c) Demo: Folder Redirection; (d) Demo: Redirection.. Lesson 6: (a) Offline Files; (b) Demo: Offline Files.. Lesson 7: (a) Device Affinity; (b) Shared Desktop; (c) Pooled Desktops; (d) Demo: Import Computer; (e) Demo: Device Affinity.. Lesson 8: (a) UE-V; (b) Benefits of UE-V; (c) UE-V Tools; (d) UE-V Guidelines; (e) Demo: Shared Folder; (f) Demo: UE-V.