Presentation is loading. Please wait.

Presentation is loading. Please wait.

Agenda Understanding the optimized desktop Windows 7 To Date Office 2010 Windows 7 Resources, Resources, Resources.

Similar presentations


Presentation on theme: "Agenda Understanding the optimized desktop Windows 7 To Date Office 2010 Windows 7 Resources, Resources, Resources."— Presentation transcript:

1

2 Agenda Understanding the optimized desktop Windows 7 To Date Office 2010 Windows 7 Resources, Resources, Resources

3

4 Windows, Office and the Optimized Desktop

5 So…Is Windows 7 A Success? 5 Every 7 Seconds…We Sell A Copy Of Windows 7 Somewhere In The World

6 Windows 7 is the worthy successor to Windows XP that Vista never was. – PC World Windows 7 is, overall, a fantastic OS. It builds on a solid platform, and just makes it even better. – ARS Technica Our final and definitive verdict on the best Windows operating system ever – TechRadar With Windows 7, the OS is great again. Solid, more nimble and the easiest, prettiest Windows yet. - Gizmodo Finally, Microsoft releases a successor worthy of Windows XP – Maximum PC Lucky No. 7 Is Microsoft's Best Windows Yet - Wired Our final and definitive verdict on the best Windows operating system ever - TechRadar Windows 7 is the operating system that both Microsoft and its consumers have been waiting for. - CNet

7 Network World – Sept 2010 Over 60% of all companies are currently piloting Windows 7 in their organization. 11% of Microsoft customers have finished Windows 7 upgrades 50% will start upgrading in the next six to 12 months, and an additional 27% plan to start upgrading in the next one to two years.

8 What About 64 Bit? Windows 7 64 bit makes up over 20% of all editions sold today. 8

9 So what is the optimized desktop?

10 What Is The Optimized Desktop?

11

12 Ok…let’s talk office….

13 Information sharing is open, collaborative Consumerization: Driving New Business & User Needs Proliferation of Devices Increasingly Mobile Workforce

14 Anywhere Access Quick Viewing Basic Editing Sharing

15 Office Web Apps Office 2010 suites Office Mobile

16

17

18

19 Improved document protection Helps you comply with standards User friendly retention policy controls

20 Flexible to user’s workflow Item-level retention policy Policies can be applied to user-created files Exceptions can be made Search integration Works when online and in cached mode

21 Ok… what about Windows 7?

22 What’s The Killer Feature In Windows 7?

23 “I Don’t Care How It Works. I Just Want It To Work.” There is no one “killer feature”. It is the combination of features that each company, department or individual would you to achieve their daily goals Mobility Direct Access / VPN Reconnect/ Mobile Broadband / BranchCache Security and Control BitLocker/ BitLocker To Go / Improved UAC / Desktop Auditing / NAP / AppLocker / IE8 GUI New Aero Features / Search / Wireless support / Device Stage / Location Aware Printing / Home Groups / Libraries General Speed / Efficiency / Capabilities / Flexibility / Reliability

24 Windows 7 and Access Anywhere

25 Information Worker’s World Has Been Changing BRANCH OFFICES MOBILE & DISTRIBUTED WORKFORCE CENTRAL OFFICE REMOTE WORK

26 The Evolving Needs Mobile & Remote Work-Force needs: Work anywhere Fast access IT Professional needs: Secure and flexible infrastructure for “work anywhere” Reduce costs

27 Situation Today Remote Access for Mobile Workers Corporate network boundary includes managed assets no matter where they are on the Internet Easy to service mobile PCs and distribute updates and polices New network paradigm increases mobile user productivity by providing same experience inside & outside the office Challenging for IT to manage, update, patch mobile PCs while disconnected from company network Difficult for users to access corporate resources from outside the office HomeOfficeHomeOffice DirectAccess Windows 7 Solution

28 DirectAccess Server Compliant Client IPsec/IPv6 Data Center and Business Critical Resources Internet Intranet User Enterprise Network Intranet User IPsec/IPv6 Assume the underlying network is always insecure Redefine enterprise network edge to insulate the datacenter and business critical resources Tunnel over IPv4 UDP, HTTPS, etc. DirectAccess Technical Details NAP / NPS Servers Security policies based on identity, not location

29 DirectAccess Server DirectAccess Client Internet

30 Enterprise Network DirectAccess Server Line of Business Applications

31 DirectAccess Deployment Determine your strategy Be ready to monitor IPv6 traffic Choose an Access Model: Full Intranet Access vs. Selected Server Access? Assess deployment scale Get your infrastructure ready Windows 7 clients Windows Server 2008 R2 DirectAccess Server DC, DNS Server, Active Directory, PKI, Application Servers, etc. During deployment Use DirectAccess configuration wizard to setup DirectAccess Server and generate policies for clients, application servers, and DC/DNS Customize policies as needed Get ready step by step

32 IT Pro Benefits Improved manageability of remote users IT simplification and cost reduction Consistent security for all access scenarios Seamless & secure access to corporate resources Consistent connectivity experience in / out office Combined with other Windows 7 features enhances the end to end IW experience DirectAccess Benefits End User Benefits

33 Branch Office Enhancements Branch Office Enhancements Caches content downloaded from file and Web servers Users in the branch can quickly open files stored in the cache Frees up network bandwidth for other uses BranchCache™ Application and data access over WAN is slow in branch offices Slow connections hurt user productivitySlow connections hurt user productivity Improving network performance is expensive and difficult to implement Windows 7 Solution Situation Today

34 Get ID Get Data Get ID Data

35 Get ID Put Data Get Data ID Search Get Search Request Advertize ID Data ID Data

36 Help Desk Made Easier Problem Steps Recorder Windows Troubleshooting Platform

37 Application Control Eliminate unwanted/unknown applications in your network Enforce application standardization within your organization Easily create and manage flexible rules using Group Policy Users can install and run non-standard applications Even standard users can install some types of software Unauthorized applications may:Unauthorized applications may: Introduce malwareIntroduce malware Increase helpdesk callsIncrease helpdesk calls Reduce user productivityReduce user productivity Undermine compliance effortsUndermine compliance efforts

38 AppLocker

39 BitLocker / BitLocker To Go Extend BitLocker drive encryption to removable devices Create group policies to mandate the use of encryption and block unencrypted drives Simplify BitLocker setup and configuration of primary hard drive BitLocker To Go + Gartner “Forecast: USB Flash Drives, Worldwide, 2001-2011” 24 September 2007, Joseph Unsworth Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa, George Shiffler III Worldwide Shipments (000s)

40 So what are the resources available to me?

41

42

43

44

45 Microsoft Certifications for Windows 7

46 Free E-book: Deploying Windows® 7 Essential Guidance from the Windows 7 Resource Kit and TechNet Magazine

47 Questions?

48 Thank You! stephen.rose@microsoft.com Twitter - @stephenlrose and @MSSpringboard http://microsoft.com/springboard http://windowsteamblog.com/windows/b/springboard/


Download ppt "Agenda Understanding the optimized desktop Windows 7 To Date Office 2010 Windows 7 Resources, Resources, Resources."

Similar presentations


Ads by Google