Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.

Slides:



Advertisements
Similar presentations
Anders Vinger, University of Oslo Personal Data Recovery The pain of laptops.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
WSUS Presented by: Nada Abdullah Ahmed.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Barracuda Backup Service Data Backup and Disaster Recovery.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Instructional Technology, SBBC Wireless Cart Strategies Effective Management.
Networking, Hardware Issues, SQL Server and Terminal Services Session VII.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
IT Priorities and Concerns Update December 19, 2006.
The Cost of Cheap Understanding Your IT Investment Options.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
DAY TO DAY USAGE OF THE NETWORK for academic and administrative support (How we make it work) Presented by: Donnie Mize, Network Manager, FTCC Wanda Jones,
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Tim Vander Kooi Systems
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Normalized Endpoint Computing Research Team Results PSU Technology Solution Mat B. & Alice S.
Module 13: Maintaining Software by Using Windows Server Update Services.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
Keeping you Running Part I Experiences in Helping Local Governments Develop Cyber Security and Continuity Plans and Procedures Stan France & Mary Ball.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Lucity GIS and IT Services. Lucity IT Services.
Module 7: Fundamentals of Administering Windows Server 2008.
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland t OIS Update on Windows 7 at CERN & Remote Desktop.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Microsoft Management Seminar Series SMS 2003 Change Management.
KTAC Security Task Force Superintendents Update April 23, 2015.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
Introduction TO Network Administration
Staff Assessment Technology Services Department Palmyra Area School District.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
What’s New in Fireware v WatchGuard Training.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Basharat Institute of Higher Education
Self-service enrollment for Windows desktops
Information Technology (IT) Department
CYB 110 Education for Service-- tutorialrank.com
Unit 27: Network Operating Systems
Sloan Technology Services PC Recommendations
Implementing Client Security on Windows 2000 and Windows XP Level 150
Agenda The current Windows XP and Windows XP Desktop situation
Introduction to the PACS Security
John Taylor, Deputy CISO Martin Myers, IT Architect
Presentation transcript:

Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment

Background Desktop Systems Council Upgraded infrastructure systems increased flexibility offered potential for more efficient managed support using fewer resources Software Deployment Strategies Evaluation Project Departments became vocal about their specific business needs for mobile computing

Historical Issues Including Laptops in a Managed Environment Current Managed Environment’s Deployments & Backups Evening/Night/Weekend Schedules  Application Upgrade/Patches Software Distribution (SMS & GPO)  MS Critical Updates (WSUS)  Incremental backups (TSM)  Systems objects for Bare Metal Restore (TSM) Laptops Availability  Software Deployments and Backups  Conferences, workshops, leaves, sabbaticals, etc. Wireless Issues  Backing up and deploying software over wireless not ideal  VPN Server connection contention

Project Evaluations Hardware Requirement Application Upgrade/Patch Solutions Current and Future Models TSM Backup Solution VPN Contention Local Administrator Password Management

DeSC Local Administrator Password Management Background LAPM System and DeSC Clients Access to LAPM Web Application Quarterly Password Update Out of Office Laptops Best Practices Guidelines

Laptop Best Practices Guidelines 1) Laptop models proposed by the DeSC Hardware Sub-committee and approved by the Desktop Systems Council are the only notebooks allowed in the DeSC environment. The Dell Latitude D610 and D620 are currently the only authorized models. 2) It is against DeSC policy for users of DeSC machines to have access to local administrator privileges on a DeSC machine 3) The laptop will be the user’s primary machine 4) User would need to have slightly higher understanding of computers and be more conscientious then the average user, willing to be responsible for and aware of their role in ensuring their laptop is available to the network for maintenance on a daily basis. 5) For large GPO updates (Dreamweaver, Photoshop, etc) SFI laptop users on a 10mps network connection will receive notification one week before, along with the rest of users of DeSC machines, and an additional reminder on the day of the evening of a push. DeSC will request that the user leave their laptop in the office plugged in so that their laptop will received the distribution during the evening hours. 6) To reduce contention for the limited VPN server connections, the Council crafted a “Best Practices Guidelines for DeSC Laptop Network Use” document for when users are at their desk. Some of these “best practices” are: i. The Ethernet cable will be utilize for network connectivity whenever the user is at their desk. ii. Port Replicator are a strongly recommended option. 7) TSM server will be restricted from accessing Dormnet wireless subnets 8) A laptop account will be moved out of the DeSC environment and to the user’s department container after thirty (30) consecutive days of not contacting the SMS server unless an exemption has been received by and approved by the DeSC Security Sub-Committee. 9) If an employee, with a laptop which has been removed from DeSC, is away and needs the local administrator password, the SCAD/DCS member should request a department LAPM DeSC password change from DeSC or OIT Software Support and after all of their DeSC machines’ local admin passwords have updated give the previous password to user. 10) A laptop joining DeSC for any reason will require a re-image with the DeSC image to maintain the integrity and security of the DeSC environment. 11) DeSC mandates a data protection solution in case of loss or theft of a laptop participating in DeSC. 12) Users and departments requesting a “Laptop in DeSC” must demonstrate that the user requires access to university applications and has a business need for mobile computing

Outstanding Issues/Evaluations Tool to automate disabling/enabling of wireless NIC. Managing Lost or Stolen Laptops  “LoJack” service & Hard disk wipe  Encryption of data on hard drive Vendor Evaluations  Data Protection and Asset Location Services  Smart Card Solutions

Proposed Timeline December 2006-March 2007  Formal Pilot for “Wintel Laptops in DeSC” Spring 2007  Dell Latitude D620 replacement model Late Spring 2007  DeSC Approve Windows Laptops models inclusion in DeSC managed environment January 2008  Vista Migration commences in DeSC managed environment

Questions Charlayne Beavers Princeton University (609)