Enterprise edition BI edition Enterprise edition Standard edition.

Slides:



Advertisements
Similar presentations
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July 2012.
Advertisements

©2012 Microsoft Corporation. All rights reserved..
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July 2012.
Name Title Company Microsoft SharePoint 2010 The business collaboration platform for the Enterprise and the Web.
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Discovering SQL all rights reserved (c) 2010 agilitator.com INSTALLING MS SQL Server 2008 R2 Express Edition.
Arjun Krishnamoorthi  Power View enables self-service BI by providing simple to use ad-hoc reporting for business users and decision.
Direct Access, Do’s and Don’ts
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Name Fabrice Romelard [MVP] SGS – Intranet & Extranet CTO Use SharePoint data in SQL Server 2008 R2 Reporting Services.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
CategoryCapability + Recommended Tool Analysis Self Service BI with Power View integration Ad-Hoc (e.g. user defined) views Interactive analysis.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
NETOP ONDEMAND What’s new in version 2.1? DECEMBER 09 NETOP ONDEMAND1.
©2012 Microsoft Corporation. All rights reserved..
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
SQL Server Management Studio Introduction
Setting up in Outlook Express. Select “Tools” from the toolbar menu.
In-Place Upgrade to TFS 2010 on existing hardware Not deploying new hardware Databases too large to move Scaling-out, not up Not deploying new hardware.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Single Sign-on Integration (SSI) MSIT 458 – Information Security Project Part 2 Prepared for Professor Yan Chen Prepared by Team Triad Radu Bulgaru Moniza.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Chapter 8 Hardening Your SQL Server Instance. Hardening  Hardening The process of making your SQL Server Instance more secure  New features Policy based.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Access Gateway Operation
Microsoft SQL Server 2008 Installation Guide Omer Alrwais.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July 2012.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Once you have contacted me to set up a new account, your computer needs to be configured to dial into.DevlinEx and use our servers for things like .
1 Web services and security ---discuss different ways to enforce security Presenter: Han, Xue.
HDNUG 27-March-2007 SQL Server 2005 Suite as a Business Intelligence Solution.
RPC Over HTTPS - Mailbox Access Note – OS & Outlook (2007/2010) should be fully patched with latest service pack and patches.
Project Server 2003: DC340: Security (Part 1 of 2): How to securely deploy Project Server in an enterprise environment Pradeep GanapathyRaj (PM), Karthik.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
1 Chapter Overview Performing Configuration Tasks Setting Up Additional Features Performing Maintenance Tasks.
Module 7 : Configuration I Jong S. Bok

IS 4506 Establishing Microsoft NNTP Service.  Overview NNTP Service benefits How the NNTP Service works Configuring and managing NNTP Service.
SIM401. A. Datum Account Forest Trey Research Resource Forest Federation Trust Microsoft (Users) E-Company Store (Resource) Contoso(Users)Contoso(Users)Fabrikam(Resource)Fabrikam(Resource)
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Module 5 : Security I Jong S. Bok
Module 11: Designing an Active Directory Federation Services Implementation in Windows Server 2008.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
More Power Out: Empowering your mobile workforce Damir Bersinic IT Pro Advisor Microsoft Canada Rick.
Configuring and Deploying Web Applications Lesson 7.
Designing a Secure Extranet with Sharepoint Russ Basiura Principal Consultant RJB Technical Consulting
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
AuthenticationService Application DelegationKerberos.
29 Copyright © 2009, Oracle. All rights reserved. Administering the Oracle Business Intelligence Presentation Catalog.
SharePoint 2013 BI Features & Options Introduction Brad Wilcox Site:
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Jeff Einig, CPA Technical Solutions Professional.
Excel Services Displays all or parts of interactive Excel worksheets in the browser –Excel “publish” feature with optional parameters defined in worksheet.
BI Reporting Tools Kalyn Kelly June 10, BI – Business Intelligence  A set of theories, methodologies, architectures, and technologies that transform.
教育卡(电子卡) 身份信息认证指导 (学生). 身份信息认证渠道 教育卡管理中心为学生提供了 “ 教育卡官方网站 ” 和 “ 教育人人通客户端 ” 两种认证渠道。 1 教育人人通客户端 2 ●● 您可以在教育卡网站的 “ 人人通客户端 ” 版块下载江苏教育人人通客户端。
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
10 Things All BI Administrators Should Know Robert L Davis Database Engineer
11 IMPLEMENTING ACTIVE DIRECTORY Chapter 2. Chapter 2: IMPLEMENTING ACTIVE DIRECTORY2 REQUIREMENTS FOR ACTIVE DIRECTORY  Microsoft Windows Server 2003.
Before we start… If you have any questions than please use the chat windows. I will answer the questions before we start and any new questions will.
Virtual Private Networks
Chapter 5 : Designing Windows Server-Level Security Processes
Securing the Network Perimeter with ISA 2004
Introduction to Computers
Novell Account Management Introduction and Overview
Presentation transcript:

Enterprise edition BI edition Enterprise edition Standard edition

Extranet connections

DMZ INTRANET EXTRANET Internal user External user Windows Authentication is required when SSRS in native mode We do not recommend keeping your SSAS instance in the DMZ

Windows Authentication is required when SSRS in native mode We do not recommend keeping your SSAS instance in the DMZ INTRANET EXTRANET Internal user External user

Sharing resources

16

17

18 NOT SUPPORTED

19 SUPPORTED BUT REQUIRES MANUAL CONFIGURATION

Double-hop issues

connect as Bob

NOT ALLOWED

NOTE: Connect to AX using the PC Proxy account Cube Server enforces Bob’s security

Why is there an “N/A” member in my Cube?

Analysis project wizard