SQL Server Windows Vista TM & Windows Server Longhorn Brad Sarsfield Test Lead, SQL Server.

Slides:



Advertisements
Similar presentations
IEs Protected Mode in Windows Vista TM January 20, 2006 Marc Silbey Program Manager.
Advertisements

Configuring Windows to run Dr.Web scanner remotely.
Why migrate to it? Wally Mead Senior Program Manager Microsoft Corporation SYSTEM CENTER 2012 CONFIGURATION MANAGER.
Windows Server 2003 SP1. Windows Server™ 2003 Service Pack 1 Technical Overview Jill Steinberg: Added TM Jill Steinberg: Added TM.
Windows Vista Security model and vulnerabilities.
1 Module 4 Setting Up Group Accounts. 2  Overview Introduction to Groups Planning a Group Strategy Creating Local and Global Groups Implementing Built-in.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
ASU Windows 2000 AD Environment OU Presentation. Agenda OU structure Domain Admin Support OU Administrator Control/Access Migration from NT to W2K OU.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 2 Installing Windows Server 2008.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Chapter 7 WORKING WITH GROUPS.
Module 16: Software Maintenance Using Windows Server Update Services.
SQL Express. Confidential Information What’s New in Version 10  SQL Server 2005 Express Edition will replace the Pervasive Workgroup engine for Maximizer.
IT:Network:Applications Fall  Running one “machine” inside another “machine”  OS in Virtual machines sees ◦ CPU(s) ◦ Memory ◦ Disk ◦ USB ◦ etc.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Installing the Microsoft Office Project Server from Scratch Adrian Jenkins Supportability Program Manager Microsoft Corporation.
Verify Hardware Requirements Install Windows Server 2008 R2 Configure Active Directory Install SQL Server 2008 Install SharePoint Server 2010 Configure.
Managing Windows Server 2008 R2 Lesson 2. Objectives.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Chapter 7: WORKING WITH GROUPS
Windows 2003 Overview Lecture 1. Windows Networking Evolution Windows for Workgroups – peer-to-peer networking built into the OS Windows NT – separate.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Designing Group Security Designing security groups Designing user rights.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Field Level Security. Experience Kurt Quiggle: GP Solution Architect/Project Manager Microsoft Certified Trainer Worked with the Microsoft Dynamics.
New SharePoint 2016 Features
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Microsoft Exchange 2000 Service Pack 2 Features Mark Barringer Support Professional Enterprise Messaging Support Microsoft Corporation.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
User Account Control Requirements. Agenda Introducing UAC The shield icon UAC manifests Least User Access (LUA) predictor tool Partitioning an application.
ACTIVE DIRECTORY : AN INTRODUCTION The Network Team Knox County Schools.
Module 6: Configuring User Environments Using Group Policy.
1 NTC/TCS Training Dallas 2009 TaxWise, TrueCrypt, and Vista There are several issues that need to be addressed when using TaxWise and TrueCrypt on computers.
Security Windows 2000 Richard Goldman © December 4, 2001.
Module 12 Upgrading from Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010.
Working with Workgroups and Domains Lesson 9. Objectives Understand users and groups Create and manage local users and groups Understand the difference.
Pulse for TM1 Version 4 New features, improvements and lots more.
Bezpečnost Windows pro pokročilé: zajímavosti a UAC GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. |
Windows Role-Based Access Control Longhorn Update
Windows SharePoint Services Managing users and rights.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
1 National Technology Committee 2008 TaxWise and VISTA There are several issues that need to be addressed when using computers with the Windows VISTA Operating.
System Center & SharePoint On- Prem Matija Blagus, Acceleratio
© 2010 Megabyte Systems, Inc. All rights reserved. Setting up a new Document Type for Image Indexing Create a new directory Create a new directory.
A user guide to accessing, reviewing and contributing to the Online Registry System.
VISTA Brief. What you see first The new Start Menu Note the search dialog at the bottom left Note at the bottom right how to enter sleep mode, lock the.
Understand Permissions LESSON Security Fundamentals.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Three Managing Recipients.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Module 6: Configuring User Environments Using Group Policies.
12/3/98 Stanford Linear Accelerator Center Patrick R. Hancox
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
How To Uninstall AVG Antivirus?. Restart Your Computer And Log Into Windows As A User With Administrative Account Please restart your computer to make.
(ZCO) ZIMBRA Connector for Outlook User Manual
City-wide Active Directory Project Town Hall II
Create Virtual Directory Windows 8 - IIS 8.5
Active Directory Administration
Access Control in Windows
The Dirty Business of Auditing
Local Administrator Rights
Better Together: Secure SQL Server on Secure Windows
Windows 7 at UNC Brad Sharp Planning Deployment Lessons Learned.
Unit 6 NT1330 Client-Server Networking II Date: 7/19/2016
SharePoint Server Assessment Results
Presentation transcript:

SQL Server Windows Vista TM & Windows Server Longhorn Brad Sarsfield Test Lead, SQL Server

Agenda What is supported SQL’s Strategy; how we did it Running SQL on Windows Vista, Longorn Server New with Windows Vista and SQL

What is supported Production: SQL Server TM 2005 SP2 Testing: SQL Server 2005 SP1 + Windows Vista Beta 2 today Upgrade: Migrate MSDE to SQLExpress Upgrade tools/resources available

Our strategy 1.Make sure it works in XP/WS2K3 2.Test with UAC off x86, x64, x64WOW 3.Turn it on, see what breaks Test automation Product features 4.Provision users explicitly for your application and grant rights as needed 5.Work though updates and adding new Windows Vista feature support 6.Virtualization

SQL works well with Windows Vista Networking (IPv6) Full Text Search Reporting Services IIS Install is Different (KB ) User access control and Security..

User Account Control Being an admin no longer gets you into SQL! Built in Administrator account is disabled SQL Group Membership required Provision SQL accounts Explicitly grant access to resources Do not rely on BUILTIN\Administrators to check if application is running non-elevated Do not change the security policy for UAC Do not silently elevate applications with admin token

User Account Control Service Control: Provision access to control service (KB ) Users can not perform service control (start/stop/account change) Global objects are restricted to Admins as before You can now access via standard users If provisioned

User Account Control Summary Create your own users; grant them permissions to only what they need (you will need to do this)

Please me your experience good or bad.