Вы находитесь на странице: 1из 105

C O N T E N T S

41 Esse
Essential Windows
COVER STORY Server 22008 R2 Features for A PENTON PUBLICATION
Managing Your File Server
Managin
Infrastructure
Infrastru AUGUST 2010
Four tools in the new OS—DFS
Consolidation Root, File Server Resource VOLUME_16
Manager, File Classification Infrastructure,
and Access Based Enumeration—bring you NO_8
greater control over your file structure.

COLUMNS
BY ERIC B. RUX

45 Error Trapping and


Handling in PowerShell CROCKETT | IT PRO PERSPECTIVES
PowerShell 2.0 introduces the Try…Catch…
Finally construct to trap and handle errors.
5 Real Data for IT
Find out why it’s an improvement over the Pros and Developers
Trap construct, which is available in both Richard Campbell, consultant to
PowerShell versions. IT and developer departments,
BY DON JONES discusses Microsoft Visual Studio
2010, which includes new tools
that help IT organizations and
24
4 DNS Enhancements in 48 Setting Up Network developer teams produce efficient
Windows Server 2008 R2 Device Enrollment Service business applications.
Windows Server 2008 R2 introduces powerful Secure your non-Active Directory devices
feature enhancements and new technologies to by setting up Network Device Enrollment THURROTT | NEED TO KNOW
give you confidence in the security of your DNS
infrastructure.
Service, a solution for issuing and managing
security certificates. 7 What You Need
BY JOHN SAVILL BY RUSSELL SMITH to Know About
Windows Server
52 Exchange Server’s Client
FEATURES Access: Deploying Your
2008 R2 SP1,
Communications
Servers Server 14, Windows
29 Mobile Security with Client Access servers are relatively new to
InTune, and More
MDM 2008 SP1 Exchange, and in Exchange 2010 they’re
more important than ever. Learn how to Quick info about what’s new at Microsoft, including
Mobile device management continues to be an IT deploy Client Access server with the GUI and Windows InTune, MCS 14, SP1 for Server 2008 and
headache, but MDM 2008 SP1 can help tame your using automation. Windows 7, and IE 9 HTML 5 compatibility.
Windows Mobile smartphone environment. Follow
these steps to install and implement device control BY KEN ST. CYR
with MDM. MINASI | WINDOWS POWER TOOLS
BY JOHN HOWIE 56 Get Proactive with 9 Creating
SharePoint 2010’s Improved
Monitoring Bootable VHDs with
37 Virtualizing Active Directory SharePoint 2010’s monitoring feature—with
Disk2VHD
Disk2VHD simplifies the
Follow these recommendations to decide what improved timer jobs, reporting, and
you should virtualize for Active Directory, how to process of converting drives
SharePoint Health Analyzer—could make
build and deploy it, and how to administer AD and on running systems into one
you a more efficient, and perhaps, even
maintain security in a virtual environment. or more VHDs.
happier, admin.
BY SEAN DEUBY BY TODD KLINDT
For DCs, Simple Storage is Better Storage 38 SharePoint 2010 Improvements 58 OTEY | TOP 10

11 TCP/IP Ports
Used by VMM 2008
Microsoft System Center Virtual
Machine Manager 2008 relies
on specific TCP/IP ports in order

INTERACT IN EVERY to communicate with other


components; make sure these

ISSUE
ports for the Administrator
Console, the VMM library server,
15 Reader to Reader RDP, and other components are
Create PDF files with the doPDF utility, get the always available.
real workgroup name in VBScript and PowerShell
code, and investigate CPU spikes by using System
Monitor in conjunction with Process Monitor. 79 Directory of Services WHEELER | WHAT WOULD MICROSOFT
SUPPORT DO?

19 Ask the Experts 79 Advertising Index 13 Monitor System


Set up a miniature Virtual Desktop Infrastructure 79 Vendor Directory Startup Performance
lab, create your own self-signed certificates, log on in Windows 7
to ESX’s service console as root, create bootable
Virtual Hard Disks, and more. 80 Ctrl+Alt+Del Use the Windows 7 Event Viewer,
which lets you filter events and
perform queries on XML event
data, along with the Wevtutil tool
Access articles online at www.windowsitpro.com. Enter the article ID (located at the end of each to find and collect event data
article) in the InstantDoc ID text box on the home page. and view boot-time trends.
B7VH966JF98UY YHE445J
J45CJ9G76NNHP9DOG GF2RPQQG
2FGREEHGT4V;RTUA6FW[FV3YX6 6ZW488MXLRH4 476N7
S9DFF494JJ5VT
T7DL1ZAT;ON HEFKO6A990FF
F9ENGF FKF0
L788YKX6
6ZGHH96W8;3TH5 5XD9VV5C3S9MMD0664C6EEHS
O2
29GDFF9GJJDFWEFKKGJEGJJ5J77MANAGMXXD9VV7V5FFC
M6
60FI33U00JFOMROOR4Y5O79DGS0FF9GEM3NT8FG5Y Y3
IFHTUU45DF94JT T9GF8G3G9KRFGF88YUFKELT3 3TE5J
J3LRKKC9
9XC7G8S S9T4KJ44E75T2D3D
DIG5H3F FHTTU45T
Y5H5JJ47
7LR9XC7 7NF6MOTJU5T3KH77JV09GR RQ331RT0
T4R7HH4300YJ4NDDFM2QG6FG40FG699USG94 4J355J4Y
YE
9G
GJPEGG0RRGIB8Y445HR8VB6D87DDF3GFGRH HE7
7BJB00E
GK55JDGOT7UVRG3ER RGMXD9VVX3J6F9RO44T226T4YY4W
W488FXDV
V9VS1MPL3RV5C34GI42OZGH HOEFF5JT3HH5S
5F399V7VC;;XMEEG8S9TYGY35E4GB445FUFFQ7F2 2D09U
E4J3RRG5JWOOI9RG667GK7DU44TWF25GHH94JG00PGW3T T
B7VH966JF98UY YHE445J
J45CJ9G76NNHP9DOG GF2RPQQG
2FGREEHGT4V;RTUA6FW[FV3YX6 6ZW488MXLRH4 476N7
S9DFF494JJ5VT
T7DL1ZAT;ON HEFKO6A990FF
F9ENGF FKF0
L788YKX6
6ZGHH96W8;3TH5 5XD9VV5C3S9MMD0664C6EEHS
O2
29GDFF9GJJDFWEFKKGJEGJJ5J77MANAGMXXD9VV7V5FFC
M6
60FI33U00JFOMROOR4Y5O79DGS0FF9GEM3NT8FG5Y Y3
IFHTUU45DF94JT T9GF8G3G9KRFGF88YUFKELT3 3TE5J
J3LRKKC9
9XC7G8S S9T4KJ44E75T2D3D
DIG5H3F FHTTU45T
Y5H5JJ47
7LR9XC7 7NF6MOTJU5T3KH77JV09GR RQ331RT0
T4R7HH4300YJ4NDDFM2QG6FG40FG699USG94 4J355J4Y
YE
9G
GJPEGG0RRGIB8Y445HR8VB6D87DDF3GFGRH HE7
7BJB00E
GK55JDGOT7UVRG3ER RGMXD9VVX3J6F9RO44T226T4YY4W
W488FXDV
V9VS1MPL3RV5C34GI42OZGH HOEFF5JT3HH5S
5F399V7VC;;XMEEG8S9TYGY35E4GB445FUFFQ7F2 2D09U
E4J3RRG5JWOOI9RG667GK7DU44TWF25GHH94JG00PGW3T T
C O N T E N T S

PRODUCTS
60 New & Improved EDITORIAL ADVERTISING SALES
Check out the latest products to hit the Editorial and Custom Strategy Director Publisher
marketplace. Michele Crockett mcrockett@windowsitpro.com Peg Miller pmiller@windowsitpro.com
PRODUCT SPOTLIGHT: ProStor Systems’ InfiniVault Director, International and Agency Services
Executive Editor, IT Group
Amy Eisenberg amy@windowsitpro.com Don Knox don.knox@penton.com
61 Paul’s Picks Technical Director
EMEA Managing Director
Irene Clapham irene.clapham@penton.com
Apple iOS 4 beefs up the iDevice world; and Michael Otey motey@windowsitpro.com
Hotmail doesn’t get any respect, although it does Director of IT Strategy and Partner Alliances
get Exchange ActiveSync. Senior Technical Analyst Birdie J. Ghiglione birdie.ghiglione@penton.com
619-442-4064
BY PAUL THURROTT Paul Thurrott news@windowsitpro.com
Online Sales and Marketing
Custom Group Editorial Director Manager
62 Best of TechEd 2010 Award Dave Bernard dbernard@windowsitpro.com Dina Baird Dina.Baird@penton.com
Web and Developer Strategic Editor Key Account Director
Winners Anne Grubb agrubb@windowsitpro.com Chrissy Ferraro christina.ferraro@penton.com
The Best of TechEd Awards recognize the most 970-203-2883
innovative Microsoft platform products and Systems Management Account Executives
services offered by Microsoft partners exhibiting at Karen Bemowski kbemowski@windowsitpro.com Barbara Ritter barbara.ritter@penton.com
the annual conference. Here are this year’s winners. Caroline Marwitz cmarwitz@windowsitpro.com 858-367-8058
BY JASON BOVBERG Zac Wiggy zwiggy@windowsitpro.com Cass Schulz cassandra.schulz@penton.com
858-357-7649
Messaging , Mobility, SharePoint, and Office
64 Corner Bowl Disk Monitor 2010 Brian Keith Winstead bwinstead@windowsitpro.com
Client Project Managers
Michelle Andrews 970-613-4964
Check out this feature-packed program for Networking and Hardware Kim Eck 970-203-2953
monitoring and managing enterprise disk data. It’s Ad Production Supervisor
Jason Bovberg jbovberg@windowsitpro.com
a great addition to any IT pro’s toolkit. Glenda Vaught glenda.vaught@penton.com
BY TONY BIEDA Security
Lavon Peters lpeters@windowsitpro.com MARKETING & CIRCULATION
65 Spiceworks 4.5 SQL Server
Megan Bearly Keller mkeller@windowsitpro.com
Customer Service service@windowsitpro.com
Management, monitoring, inventory control, and a IT Group Audience Development Director
ticketing system, all in one package—and it’s free! Sheila Molnar smolnar@windowsitpro.com
Marie Evans marie.evans@penton.com
BY MICHAEL DRAGONE Editorial Web Architect Marketing Director
Brian Reinholz breinholz@windowsitpro.com Sandy Lang sandy.lang@penton.com
67 Rove Mobile Admin IT Media Group Editors
Phone-sized administration tools let you handle Linda Harty, Chris Maxcer, Rita-Lyn Sanders CORPORATE
emergencies as well as perform routine maintenance
on your servers and network infrastructure. CONTRIBUTORS
BY ERIC B. RUX
SharePoint and Office Community Editor
Dan Holme danh@intelliem.com
68 Kerio Connect 7 Senior Contributing Editors
If setting up Exchange for your small business David Chernicoff david@windowsitpro.com
Chief Executive Officer
sounds like too much of a headache, this Sharon Rowlands Sharon.Rowlands@penton.com
Mark Joseph Edwards mje@windowsitpro.com
alternative could be what you need. Chief Financial Officer/Executive Vice President
Kathy Ivens kivens@windowsitpro.com
BY RYAN FEMLING Jean Clifton jean.clifton@penton.com
Mark Minasi mark@minasi.com
Paul Robichaux paul@robichaux.net
69 NetPoint Pro Mark Russinovich mark@sysinternals.com
T E C H N O LO G Y G R O U P
Smaller businesses can benefit from this agent-less Contributing Editors Senior Vice President, Technology Media Group
asset management and inventory system. Alex K. Angelopoulos aka@mvps.org Kim Paulsen kpaulsen@windowsitpro.com
BY JEFFERY HICKS Sean Deuby sdeuby@windowsitpro.com
Michael Dragone mike@mikerochip.com
70 VMware Workstation 7.0 Jeff Fellinge jeff@blackstatic.com
Windows®, Windows Vista®, and Windows Server®
are trademarks or registered trademarks of Microsoft
Brett Hill brett@iisanswers.com Corporation in the United States and/or other countries
Rises Above the Virtual Pack Darren Mar-Elia dmarelia@windowsitpro.com and are used by Penton Media under license from
Take a quick dive into VMware’s Workstation 7.0 and owner. Windows IT Pro is an independent publication
see how this desktop virtualization product works, then Tony Redmond 12knocksinna@gmail.com not affiliated with Microsoft Corporation.
scope out the rest of the desktop virtualization market. Ed Roth eroth@windowsitpro.com WRITING FOR WINDOWS IT PRO
BY MICHAEL OTEY Eric B. Rux ericbrux@whshelp.com Submit queries about topics of importance to Windows
managers and systems administrators to articles@
An Overview of Desktop Virtualization Products 71 John Savill john@savilltech.com
windowsitpro.com.
William Sheldon bsheldon@interknowlogy.com
PROGRAM CODE
73 SharePoint Auditing and Randy Franklin Smith rsmith@montereytechgroup.com
Curt Spanburgh cspanburgh@scg.net
Unless otherwise noted, all programming code in this
issue is © 2009, Penton Media, Inc., all rights reserved.
Reporting Tools Orin Thomas orin@windowsitpro.com These programs may not be reproduced or distrib-
uted in any form without permission in writing from
Explore third-party solutions available to support your Douglas Toombs help@toombs.us the publisher. It is the reader’s responsibility to ensure
organization’s compliance needs through change Ethan Wilansky ewilansky@windowsitpro.com procedures and techniques used from this publication
tracking, reporting, data security features, and more. are accurate and appropriate for the user’s installation.
No warranty is implied or expressed.
BY BRIAN REINHOLZ ART & PRODUCTION
LIST RENTALS
Production Director
76 Industry Bytes Linda Kirchgesler linda@windowsitpro.com
Contact MeritDirect, 333 Westchester Avenue,
White Plains, NY or www.meritdirect.com/penton.

Use biometric security to secure nearly any aspect Senior Graphic Designer REPRINTS
Diane Madzelonka, Diane.madzelonka@penton.com,
of your business, and more. Matt Wiebe matt.wiebe@penton.com 216-931-9268, 888-858-8851
IT PRO PERSPECTIVES
Crockett
“Become familiar with Visual Studio 2010’s
built-in testing features to understand how
applications can perform better in a
production environment.”

Real Data for IT Pros and Developers


New Visual Studio 2010 testing tools improve applications and business productivity

A
s IT organizations look at ways to support their busi- determine which features they should address. Application data
nesses with fewer resources—a trend that will likely can help developers connect with the IT department’s view of an
continue even as the economy improves—one corner app’s performance. “The production environment is where the
that could benefit from a bright light is the interaction rubber meets the road, so that’s a process of getting the truth back,”
between the developers who are building applications Campbell said.
and the administrators who commandeer the produc- Another tool that helps IT departments and developers get better
tion environment. With the release of Visual Studio 2010, which won application data is Runtime Intelligence, a profiling tool produced
the Best Microsoft Product award in our Best of TechEd program, by PreEmptive Solutions that’s available in every version of Visual
Microsoft introduces tools that help sync the IT department and the Studio 2010. “Runtime Intelligence provides the ability to instrument
developers in a way that helps businesses run more efficiently. the assemblies at a fairly low level and then feed that data back into
During our series of video interviews from the TechEd show a web service,” Campbell said. “And you can do that without actu-
floor in New Orleans, I spoke with Richard Campbell, a consultant ally recompiling the app. So from an IT perspective, this is detailed
who co-produces .NET Rocks, a Web-based audio talk show for instrumentation of how the app is running, where the errors occurred
.NET developers, and Run As Radio, a show for IT professionals. in production, and also what parts are being used. So this gives the
Campbell—who often straddles the developer and IT worlds in his ability for a deeper view into the app—not just a focus group but a
consulting business—pointed out some little-known features of day-in, day-out view of how the staff is using the application.”
the Visual Studio 2010 release that further break down the barriers Typically, this level of detailed application data was available
between the IT and dev worlds. “I work as a consultant with a lot of only in a test lab, but Runtime Intelligence can run in the produc-
teams where you do have a good relationship between IT and dev, tion department full time, providing steady feedback that helps IT
where the way the app runs in the production environment is as departments and developers make decisions about resource alloca-
important to the developers as it is to the IT folks,” Campbell said. tion based on quantitative data rather than conjecture. Campbell
“They have a good discipline, and a good feedback mechanism. encourages every IT pro to become familiar with all the built-in testing
But the next phase past this discipline is tooling, and with Visual features that Visual Studio 2010 provides to understand how applica-
Studio 2010, we’re starting to get good tooling. Some of the new tions could perform better in the production environment. Campbell
tools in Visual Studio 2010 really speak heavily to how developers said that by offering these testing tools, “Microsoft has poured a lot
can communicate more effectively with IT pros so that they have of energy into making every failure reproducible, so we capture the
that common language.” image of the machine so we know exactly the state it was in.”
Campbell called IntelliTrace, available in Visual Studio 2010 My TechEd talk with Campbell was one of many conversations
Ultimate, one of the most important new debugging tools because we captured on film from our booth. If you couldn’t make it to New
it provides developers and IT departments hard data rather than Orleans, you can relive the best of the tech talk (if not the humidity,
speculation about an application’s use and points of failure. The tool the jazz, and the beignets) at our Taste of TechEd virtual trade show
reduces time spent in trying to reproduce errors. “IntelliTrace gives on August 25 (www.vconferenceonline.com/shows/summer10/
you the ability to capture the machine at the moment of failure,” teched). We’ll kick off the show with a technology overview from
Campbell said. “The operators of the app—the production guys— Michael Otey and Paul Thurrott and follow with more interviews
can get a clean record of how the app fails so developers can see it. with IT and developer experts, official TechEd session footage,
On the test side of things, it’s much easier to communicate back and and demo booths where you can put new solutions through their
forth and see those kinds of failures.” paces.
Getting this level of detail about the application is a big busi- InstantDoc ID 125491
ness win because IT and developer teams can identify and solve
problems much more quickly. Campbell stressed the importance of MICHELE CROCKETT (michele.crockett@penton.com) helped launch
SQL Server Magazine in 1999, has held various business and editorial roles
being able to see where real performance issues lie and which appli- within Penton Media, and is currently editorial and custom strategy director
cations’ features are being used. Developers sometimes struggle to of Windows IT Pro, SQL Server Magazine,
e and System iNEWS.

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 5


NEED TO KNOW
Thurrott
“Windows InTune offloads system
management to the cloud and provides
a way to manage all of the PCs in your
environment remotely.”

What You Need to Know about Windows Server 2008 R2


SP1, Communications Server 14, Windows InTune,
and More

A
lthough summer is usually a quiet time in the PC together starting with SP1. These two product generations—Vista/
and electronics industries, Microsoft holds its annual Server 2008 and Windows 7/Server 2008 R2—are incompatible from
TechEd conference at this time of year, and there’s a servicing perspective. And Microsoft tells me it has no plans at all
always a lot of good product and technology informa- for a Vista/Server 2008 SP3 release. I have to think a rollup will hap-
tion coming out of the show. Here’s what you need to pen eventually, however.
know about the news from TechEd 2010. Of course, some Windows Server users are facing bigger prob-
lems. Windows 2000 will have hit “end of life” by the time you read
Windows Server 2008 R2 and Windows 7 SP1 Beta this, meaning that it has exited the support lifecycle. So unless you
As of press time, Microsoft is to deliver by the end of July a public don’t mind paying for security updates, this OS is dead in the water.
beta version of SP1 for Windows Server 2008 R2 and Windows 7. And although Win2K Server usage is down to the single digits, these
The company says it will use feedback from the beta to determine machines are still out there.
the final release schedule, but I expect to see the final release hit For Windows Server 2003, it’s even worse. This OS represents
before the end of 2010. about 50 percent of the installed base and it hits extended support
SP1 adds almost no new functionality to Windows 7 beyond a in July 2010. That means that the majority of Microsoft’s server
Remote Desktop update. However, it represents a major functional customers have five years to move to something more modern. The
update to Windows Server 2008 R2, with support for new features big issue with Windows 2003—and as it turns out, Server 2008—is
like Hyper-V Dynamic Memory and RemoteFX. Another new fea- 32-bit application compatibility. In fact, the number-one reason that
ture, RemoteFX USB Devices, aims to provide better USB device Server 2008 R2 customers exercise their downgrade rights is to install
redirection over RDP than the shipping version of Server 2008 R2. a 32-bit version of Server 2008. Server 2008 R2, as you know, is 64-bit
You’ll be able to use virtually any USB device transparently over RDP, only, and there’s an entire generation of 32-bit in-house and line of
including scanners, all-in-one printers, web cameras, VoIP phones business (LOB) apps that need to be updated or replaced, and from
and headsets, and biometric devices. what I can see, few are moving to do so with any alacrity.
And since I knew you were just thinking about this, yes—the “Windows Server 2003 is a power-hungry, non-virtualized, x86
Dynamic Memory feature from SP1 is being added to Hyper-V Server world,” Microsoft group product manager Ward Ralston told me
2008 R2. And System Center Virtual Machine Manager 2008 R2 will recently. “It’s the classic server sprawl problem. Newer versions of
get an update this year to support Dynamic Memory as well. Windows Server are just so much more efficient.” Exactly right. Get
busy, people. If you’re on Windows Server 2003, it’s time to start
Looking Back and Looking Ahead with Windows Server planning a migration today.
Speaking of Windows Server, you can expect some changes in
naming and branding when the next version hits in 2012. Microsoft Small Business Server “7” and “Aurora”
is dropping the major/minor release cadence silliness and the Microsoft will follow up the current Small Business Server version,
even sillier R2 naming scheme. Instead, Windows client and server SBS 2008, with two products, each of which serves a particular need.
releases will be developed and released in lockstep going forward, The first, currently code-named SBS “7”” will be a traditional SBS
starting with vNext, as they call it internally. product update and will offer, as before, on-premises versions of
Think about this for a second. Windows Vista SP1 and Server Windows Server (2008 R2), Exchange 2010, Windows Server Update
2008 were developed on the same code base, so they were updated Services (WSUS), and more.
together with the SP2 release that applied to both—although it The second product is, perhaps, more interesting. Currently
was Vista’s second service pack and Server 2008’s first. Meanwhile, code-named SBS “Aurora””, this SBS version is based on the same
Windows 7 (a major release) and Windows Server 2008 R2 (a minor code base as Windows Home Server “Vail” and assumes that your
release) were developed on the same code base and will be serviced email and other services will be hosted in the cloud. It can create but

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 7


NEED TO KNOW
not join domains, and offers only very sim- Apple added to Safari 5. Given Chrome’s improvements to the presence model so
plified on-site management tools. But it has update schedule, it might prove the most that MCS exposes only those conversation
a super-simple interface and works with the popular browser for those who like to use the types for your location.
WHS-based Drive Extender technologies to latest technologies. Aside from branding, there are some
consolidate all attached storage as a single Mozilla Firefox, of course, is still the other questions around scheduling and
block of storage. Good-bye, drive letters. alternative browser of choice, though it licensing. But Microsoft says you can expect
I’ll be writing more about Aurora soon. seems to have hit a plateau in usage shares. a public preview release by the end of 2010.
This is a product that could transform the Current versions of Firefox do support
small business market. HTML video and audio, but not with the Windows InTune
popular H.264 video and AAC audio for- Thanks to the cloud computing phenom-
HTML 5 and the Future mats. Mozilla has been moving slowly, enon, Microsoft has scaled back plans for
HTML 5 is years away from being ratified as not just with HTML but in general, and its on-premises server products in small and
an international standard, but browser mak- browser updates seem to be on an ever- medium-sized businesses and is focusing
ers are jumping all over this technology. The slower schedule. I wouldn’t be surprised instead on delivering hosted services that
reason is simple: HTML 5 is the future of the to see Firefox begin a gradual decline. make more sense for those environments.
web, and they want to prove that their prod- The one I think will have the broadest
uct will get you there. Microsoft’s response Microsoft’s initial implications over time is Windows InTune.
to HTML 5 involves Internet Explorer (IE) 9, Currently aimed at midsized businesses, it
as well as calls to the industry to rally around public beta offering offloads system management to the cloud
standards test that make sense. That last bit and provides a way to manage all of the PCs
is important because today’s web standards of Windows InTune in your environment remotely. That it does
test seem designed to make IE fail. Though so outside of Active Directory (AD) will be
I don’t expect to see IE 9 until early 2011, it
in April 2010 was, controversial to some.
will include hardware acceleration of video
and SVG graphics.
perhaps, too There are two bit of news up front: First,
Microsoft’s initial public beta offering of
Microsoft isn’t the first to step up to the
HTML 5 challenge, not by a long shot, and
popular, and the Windows InTune in April 2010 was, perhaps,
too popular, and the company had to shut
by the time IE 9 does happen, it could be company had to down the sign-up site. If you didn’t get in,
swamped by a field of competitors that there should be a second, larger, public beta
have already exceeded whatever HTML 5 shut down the offering by the time you read this. Second,
compatibility IE offers. Browser makers are Microsoft is addressing the concerns of
talking up HTML 5, but two in particular, sign-up site. partners who will want to support their own
Apple and Google, have been rapidly ship- customers using InTune by offering a part-
ping new products as well. Communications Server “14” ner dashboard interface so they can manage
Apple’s offering is, perhaps, less inter- A couple of years ago, Microsoft’s Uni- multiple sites more easily.
esting, but Safari 5 does offer one IE 9 fied Communications (UC) vision was, I’m happy to report that Microsoft
feature—hardware acceleration, even on well, more vision than reality. But with is now actively seeking to expand InTune
Windows—and it’s aggressively adopting the release of Microsoft Communications and will someday offer versions of the ser-
HTML 5 features, including full-screen Server (MCS) “14” (it still doesn’t have a vice for small businesses and AD-wielding
video, closed captioning for video, geolo- final branding), later this year, the vision is enterprises as well. Although the company
cation, and more. Safari 5 finally offers an becoming reality. And that’s especially true is mum about how it will change InTune to
extensibility model, an area in which this for those environments that can standard- accommodate AD, in the short term you can
browser was lacking. I don’t expect Safari ize on Exchange 2010, SharePoint 2010, and rest easy by understanding that AD-based
to make major inroads in the Windows Office 2010 as well, given the hooks that tie policies will always supersede any InTune-
market, but it’s not wise to discount Apple. each together. specific policies, so it should be safe to use
And Safari is certainly the overwhelming MCS 14 provides real-time communica- in smaller environments. Microsoft plans to
champion in the mobile space right now. tions solutions around instant messaging deliver the initial InTune version in the first
Google’s latest browser, Chrome 5, also (IM)— text, voice, and video—and it does quarter of 2011.
embraces HTML 5, and Google is shipping so via a tiered experience where you locate InstantDoc ID 125391
Chrome updates at an amazing clip. Chrome a contact by using presence information
5 features a great extensions infrastructure, in the MCS client, in Outlook, in Share-
PAUL THURROTT (thurrott@windowsitpro
browser bookmarks and preferences sync, Point, or in other areas, then can escalate .com) is the news editor for Windows IT Pro.
and should have an integrated version of the discussion to different conversation He writes a weekly editorial for Windows IT Pro
Adobe Flash available by the time you read types, including VoIP. New features include UPDATEE (www.windowsitpro.com/email) and a
daily Windows news and information newsletter
this. On the HTML front, it now supports enterprise skill searching through inte- called WinInfo Daily UPDATEE (www.wininformant
many of the same HTML 5 features that gration with SharePoint 2010, and major .com).

8 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


WINDOWS POWER TOOLS
Minasi
“Why would you want to boot a physical system
from a VHD? I can think of several reasons, but two
important reasons relate to ease of OS deployment.”

Creating Bootable VHDs with Disk2VHD


Boot a physical system from a system drive stored as a VHD—a capability that you
might find very handy

T
his month, I’d like to start covering a few tools that contains an image of a bootable Windows drive. Acquiring a VHD to
enable a feature in Windows 7 and Windows Server 2008 that specification requires that you create an empty VHD file (which
R2 that could be quite significant: the ability to boot a I’ve covered in previous months), grab a bootable system, use Sys-
physical system not from the physical C drive (as we’re prep to prepare it, boot it with an OS (probably WinPE), then use
used to) but from a system drive stored as a virtual hard ImageX /capture to convert that working system to a WIM file. Then,
disk (VHD). This particular column is a little unusual, you’d have to select and mount the VHD file as some drive letter and
however, because typically when I introduce a tool to solve a prob- use ImageX again (this time with /apply) to deploy that image to the
lem, you already understand the nature of that problem. But booting VHD. At that point, you’re done, and you can distribute the VHD to
from a VHD is a new concept, so I’ll start by explaining it, then I’ll new VMs or physical systems that will boot from that VHD.
introduce this month’s tool—Disk2VHD. That process is a fairly tall order, and I’ll show you how to do
Why would you want to boot a physical system from a VHD? I those things in the coming months. But our friends at Sysinternals
can think of several reasons, but two important reasons relate to ease offer some instant gratification with a free tool called Disk2VHD
of OS deployment. First, consider how you get an OS onto a server (technet.microsoft.com/en-us/sysinternals/ee656415.aspx). Disk2-
or workstation in the first place. You can install the system manually VHD takes drives on running systems and converts them to one or
by popping the installation DVD into the system’s drive, booting it, more VHDs—no ImageX, no WinPE, no Sysprep—all thanks to the
and answering a lot of questions; you could use the installation DVD Volume Shadow Copy Service (VSS). Its syntax is simple:
and simplify the process with an unattended installation script; or
you could use one of the many available imaging tools to take a pre- disk2vhd <drive>|* <vhdfilename>
built OS image and blast it onto a new system’s empty hard disk.
Imaging is usually the fastest of the three options, but how do you So, for example,
accomplish that imaging?
Symantec Ghost is probably the best-known commercial tool, disk2vhd C: E:\a.vhd
and Microsoft offers a free alternative called ImageX, but in both
cases the imaging process is fairly opaque. If something goes wrong would create a VHD from drive C, and
during the image transfer, it can be difficult to determine the cause.
In contrast, booting from VHD essentially requires that you copy a disk2vhd * E:\a.vhd
specially prepared VHD file onto the target system’s hard disk. So,
booting from VHD offers what might be called XCOPY deployment. t would copy all volumes—even Window 7’s unlettered volume—to
The second reason is ease of virtual machine (VM) deployment. a VHD file. Alternatively, just start up Disk2VHD to get a GUI. Even
By creating and maintaining your system images as VHDs—rather if you specify more than one volume, Disk2VHD packs them up
than, say, as Ghost GHO files or ImageX WIM files—you can quickly into one VHD.
deploy (i.e., copy) those VHD-format images to physical systems or Now, that’ll work in very specific situations, but not in most
as new, quickly built VMs under a Hyper-V server by simply copy- cases: Simply creating an image and handing out identical copies
ing the VHDs to the Hyper-V server and creating a new VM around of that image to zillions of machines can cause security trouble. For
the VHD. Microsoft has even made VHDs a bit more attractive as non-trivial deployments, however, we’ll need to make the images
deployment tools by including VHD support in Server 2008 R2’s generic with Sysprep. Next month, we’ll get closer to making boot-
Windows Deployment Services (WDS) servers. from-VHD work.
To create a system that boots from a VHD, you need to accomplish InstantDoc ID 125422
several steps. First, you need a VHD file that contains a bootable,
generalized image based on a Windows 7 or Server 2008 R2 system. MARK MINASI (www.minasi.com/gethelp) is a senior contributing
editor for Windows IT Pro, an MCSE, and the author of 25 books, including
(If you’re unfamiliar with the term generalized, d it’s just Microsoft’s Mastering Windows Server 2008 R2 (Sybex). He writes and speaks around
latest word for “Sysprep-prepared.”) Second, you’ll need a VHD that the world about Windows networking.

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 9


TOP 10
Otey
RDP is a staple in my VM management;
I have one or more RDP sessions going
to my VMs almost all day.

TCP/IP Ports Used by VMM 2008


If you’re using a firewall, be sure to keep these ports open for VMM

M
icrosoft System Center Virtual Machine Manager same system as the VMM server, or it can instead be a preexisting
2008 (VMM) is Microsoft’s platform for virtualiza- SQL Server instance. VMM uses port 1433 to access a networked
tion management. VMM offers a host of enterprise- SQL Server system.
level virtualization management capabilities that

5
go far beyond the features in the more basic VMConnect to Hyper-V hosts, Port: 2179; Protocol: RDP—
Hyper-V Manager. VMM is a complex product VMConnect is an application that’s part of Hyper-V Manager
with many different connected components. Knowing what’s actually and VMM; it lets you connect to a console session of a
going on under the hood in VMM is important when it comes to solv- Hyper-V VM. By default VMConnect uses port 2179.
ing problems because each of the VMM components relies on specific

6
TCP/IP ports in order to communicate with other components. If VMM Self-Service Web Portal to VMM server, Port: 8100;
these ports aren’t available when called upon, select pieces of VMM Protocol: WCF—In addition to the VMM Administrator Con-
functionality won’t be available. If there’s a network firewall between sole, VMM provides a web-based portal that enables end users
systems or if you’re using Windows Firewall, you need to make sure to manage their own VMs. The web-based portal must be installed on
these ports are available. In this column I’ll list the top 10 TCP/IP ports a system that has Microsoft IIS, and it uses the same port as the Admin-
used by VMM and explain what they’re used for. Bear in mind these istrator Console, port 8100, to communicate to the VMM server.
are the default port settings; all the port settings can be customized.

7
For a complete list of the ports and protocols used by VMM, refer to Remote Desktop to Hyper-V VMs, Port: 3389; Protocol:
the TechNet article “VMM Ports and Protocols” (technet.microsoft RDP—Another important protocol for managing VMs is the
.com/library/cc764268.aspx). standard Remote Desktop Protocol. RDP is a staple in my VM
management; I have one or more RDP sessions going to my VMs

1
Administrator Console to VMM server, Port: 8100; almost all day. RDP uses port 3389.
Protocol: WCF—The VMM Administrator Console and the

8
VMM server can be installed on the same server, or you can VMM server to VMware vCenter (administration), Port:
manage the VMM server remotely. For remote management, you 443; Protocol: HTTPS—The release of VMM 2008 added
need to have port 8100 open on the VMM server. support for managing VMware’s ESX Server via an instance
of VMware vCenter Server. The VMM server communicates with

2
VMM server to VMM agents, Port: 80; Protocol: WinRM vCenter Server over port 443.
(control); Port: 443; Protocol: SMB (data)—VMM
— uses

9
agents on the target hosts in order to manage them. The VMM server to ESX 3.0 and 3.5 file transfer, Port: 22; Proto-
VMM agents use port 80 for management tasks such as viewing or col: SFTP—The VMM server can also conduct file transfers
changing the state of your virtual machines (VMs) and port 443 for directly with ESX Server 3.5 and ESX Server 3.0. These
data transfers to the VMM server. versions of ESX Server use the SFTP protocol over port 22 for remote
file access.

3
VMM library server to Hyper-V hosts, Port: 443; Protocol:
BITS—The VMM library server stores VM templates and VMM server to ESXi file transfer, Port: 443; Protocol: SSH/
stores gold image VM and Virtual Hard Disk (VHD) files that 10 HTTPS—The free version of VMware’s virtualization server,
the VMM administrator can use to rapidly create new VMs. A gold ESXi, uses a different port for file transfers. The VMM server
imagee is an OS image that you use as a basis for deploying new sys- communicates with ESXi hosts through port 443, and it uses both
tems. The VMM server uses port 443 to transfer these files to the SSH and HTTPS.
Hyper-V host. InstantDoc ID 125379

4
VMM server to Microsoft SQL Server database storage,
MICHAEL OTEY (motey@windowsitpro.com) is technical director for
Port: 1433; Protocol: T-SQL—VMM uses SQL Server as a Windows IT Pro and SQL Server Magazine and author of Microsoft SQL Server
back-end data store. This SQL Server instance can be on the 2008 New Features (Osborne/McGraw-Hill).

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 11


WHAT WOULD MICROSOFT SUPPORT DO?
Wheeler
“You need a way to monitor desktop startup
times across the enterprise and collect boot-
time measurements from every machine.”

Monitor System Startup Performance in Windows 7


Use Windows 7’s Event Viewer and Wevtutil to monitor boot- and start-time
trends on enterprise PCs

R
ecently Microsoft support has fielded inquiries from 10 seconds. The other time values listed represent the elapsed time
several customers asking how to troubleshoot prob- for various stages during this boot process. You can find more infor-
lems that cause delays during the boot and user mation about the stages of the boot process in the Windows On/
logon processes on a desktop or laptop. The Windows Off Transition Performance Analysis white paper at www.microsoft
Performance Toolkit xbootmgr.exe tool works well for .com/whdc/system/sysperf/On-Off_Transition.mspx.
troubleshooting boot and startup issues on a single The other boot performance events record information about
machine. But what if you’re a large enterprise with thousands of specific events that contributed to delays during the boot/startup
desktops? You need a way to identify problem machines before a sequence. The trick is how to know which boot instance these mes-
user reports them to the Help desk. You need to monitor desktop sages belong to. This is where the ActivityID comes in handy. In
startup times over time and across the enterprise. And you need a Figure 1, you’ll see the following in the XML data:
way to collect boot-time measurements, similar to those collected by
xbootmgr.exe, from every machine for every boot. Here, I’ll explain <Correlation ActivityID="{00000001-0000-0000-1020-
how you can use an event log, the new Windows 7 Event Viewer, and 5CA87BB1CA01}" />
the Wevtutil tool to do these things.
All events related to this boot instance in this Event 100 record have
A New Event Log to Aid in Troubleshooting this same ActivityID. By performing the following steps, we can use
Beginning with Windows Vista, Windows now includes a new cate- this information to create a more complex filter:
gory of event logs: Applications and Services logs. The infrastructure 1. Click Filter Current Log… in the Actions Pane of Event
underlying event logging now conforms to an XML schema. You can Viewer.
easily access the XML data for any event. The new event log interface 2. On the XML tab, check the box Edit query manually, y then
lets you construct XML-based queries against event logs. The Event answer Yes when prompted to continue.
Viewer gives you to access to the new XML functionality in an easy-
to-use graphical interface.
One of the logs in this new category is the Diagnostics-
Performance/Operational log. This log contains events that
record performance measurements similar to those provided
by xbootmgr.exe. In fact, the data recorded is generated by the
same mechanisms that Xbootmgr uses. Event IDs 100 through
110 record boot and startup performance statistics.

Using the Event Viewer in Windows 7


The new Event Viewer in Windows 7 lets you do more powerful filter-
ing. The new UI lets you specify ranges of events. Under the covers,
it builds an XPath query to filter out the events based on the criteria
you specify. In our example, we will filter for events 100 through 110.
We’re interested in Event ID 100 for the purpose of measuring the
boot performance. Figure 1 shows the XML view for event 100.
The XML presentation of the event contains a lot of interesting
information. The BootTime value represents the number of milli-
seconds that elapsed from the time the system booted to the point
after the user logged in that the system reached 80 percent idle for Figure 1: XML Event Viewer view of event 100

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 13


WHAT WOULD MICROSOFT SUPPORT DO?
at boot time could be significant when
you’re investigating changes in perfor-
mance. With historical data like this, you
can now begin to do some trend analysis.
For example, this system was built on
1/13/2010. Application installations and
configuration changes continued over the
next couple of days. By 1/21/2010 the con-
figuration changes had been completed.
After that, the BootTime value was averag-
ing about 124 seconds. However, notice
that on 2/4/2010 and 2/9/2010 the times
were significantly longer than average.

Extending the Value


Now that we have an automated way
to extract the event data in XML form,
Figure 2: Sample data collected using Wevtutil
we can collect this data periodically
3. Enter the following XML text into the This creates an XML data file that from multiple computers and store the
query box: contains all instances of the boot perfor- results in a database. Using some simple
mance event for a machine. With each reporting, it’s easy to do trend analysis.
<QueryList> ActivityID, you could then query for the A complete enterprise solution will
<Query Id="0" Path="Microsoft- other related events. For example, the require more code development and
Windows-Diagnostics- following query extracts the same three data management, but it’s feasible. And
Performance/Operational"> event records displayed after further that’s exactly what one of my largest
<Select Path="Microsoft-Windows- filtering the query: customers did.
Diagnostics-Performance/ Using a VBScript program I wrote,
Operational">*[System[(Correlation wevtutil qe Microsoft-Windows- the customer collects event data into
[@ActivityID="{00000001-0000- Diagnostics-Performance/ a SQL Server database. They’ve used
0000-1020-5CA87BB1CA01}"])]] Operational /rd:true /f:xml this data to establish some baseline
</Select> /q:"* [System[(Correlation[@ statistics for their desktop image build.
</Query> ActivityID='{00000001-0000-0000- They can pivot this data based on the
</QueryList> 1020-5CA87BB1CA01}'])]]" /e:Events > hardware (e.g., memory, CPU, model)
bootrelated.xml and software configuration. Using SQL
4. Click OK. Server Reporting Services, the customer
Wevtutil.exe has many more options. built a dashboard view that displays the
After the query has been edited, a total of Run the utility without any parame- boot-time health status of all desktops
three events for this ActivityID will be dis- ters to see a list of available options. in the enterprise. With specific reports,
played. We can now examine these events to For more information, see the MSDN they can compare this baseline to new
understand the problems that contributed article “Event Queries and Event XML” data collected after deploying new group
to any boot/startup delays. at msdn.microsoft.com/en-us/library/ policies, new security tools, or a hard-
bb399427.aspx. And for more informa- ware upgrade. They also use this data to
Collecting Data with Wevtutil tion about learning XPath to define proactively identify machines that take
So far we’ve looked at only one boot event queries, see XPath Syntax at longer than the average baseline. This
instance. How do we collect data for all boot go.microsoft.com/fwlink/?LinkId=94637 information allows IT to address issues
instances? By using Wevtutil, a Windows and XPath Examples at go.microsoft before users call the Help desk, reducing
command-line tool for querying the Event .com/fwlink/?LinkId=94638. the time to resolution and making end
logs. Using the following example, you can users happier.
extract all the Event ID 100 records from the Putting It All Together InstantDoc ID 125383
event log on a system: Once you have the event data in XML
format, it’s fairly easy to extract the most
SEAN WHEELER (seanw@microsoft.com) is
wevtutil qe Microsoft-Windows- interesting data points. Figure 2 shows a senior premier field engineer on Microsoft’s
Diagnostics-Performance/ some sample data I collected from one Premier Support team, assigned to support some
Operational /rd:true /f:xml machine. In this example, I converted of the largest enterprise customers. He’s one
of the original creators of the MPS Reporting
/q:"*[System[(EventID = 100)]]" the time values to seconds. Differences tool. He specializes in scripting, debugging, and
/e:Events > boot.xml in the number of applications that start performance issues.

14 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


READER TO READER

■ PDF Files ■ CPU Spikes on a Laptop


■ Workgroup Names

READER TO READER

Tool Time: Use doPDF to Create Getting the Real Workgroup Name credentials used on standalone systems,
PDF Files in VBScript and PowerShell the local host name is used in the role of
When it comes to creating PDF fifiles, Mac If you have scripts that need to run in both the domain name, making the computer
users are probably more happy than domain-based and workgroup-based name the correct value to return.
Windows users. Mac OSs include a utility to environments, you might encounter However, when you’re dealing with shar-
create PDF files, whereas Windows OSs don’t. problems using the %USERDOMAIN% ing issues in a workgroup-based environment
If Windows users want to create PDF fi files, environment variable or the UserDomain (where the computers are not actually mem-
they need to install an additional program. property exposed by Windows Script bers of a domain), you might need the real
One such program is doPDF (www Host’s (WSH’s) WshNetwork object to ob- workgroup name. For that purpose, your best
.dopdf.com), a freeware PDF tain wor
workgroup names. You can gen- bet is to use WMI’s Win32_ComputerSystem
converter that can create PDF erally work around the problem class. Its Domain property specifies
fi the actual
files from virtually any type wit
with Windows Management domain or workgroup name for the computer.
of printable document. Al- Ins
Instrumentation (WMI). The code at callout A in Listing 1
though there are a few oth- The problem is that if a demonstrates how to use the Domain
er free PDF converters, such co
computer isn’t logged onto a property to retrieve and display the local
as ActivePDF’s PrimoPDF do
domain, the %USERDOMAIN% computer’s workgroup name in VBScript
(see “Tool Time: Create PDF var
variable and the UserDomain code. You can do the same thing in
Files with PrimoPDF,” March property don’t return PowerShell with code such as
2009, InstantDoc ID 101217), the computer’s work-
Claudiu Spulber
most of them require downloading ding group membership. (Get-WmiObject `
additional software, such as Ghostscript Instead, they return Win32_ComputerSystem).domain
or the Microsoft .NET Framework. The the name of the local computer. This isn’t
doPDF converter doesn’t require any a bug or oversight. The %USERDOMAIN% Note that this technique doesn’t produce
additional programs, which means you variable and UserDomain property relate the same result if you happen to run it on
can install it in seconds. to the security domain and not the name a computer within a domain. In a domain,
Once installed, creating PDF fifiles is as used for grouping computers. Because the the Win32_ComputerSystem’s domain
simple as printing a document: security authority for a standalone com- property is the name of the computer’s
1. Open the document you want to puter in a workgroup is the local computer DNS domain.
convert to a PDF. itself, the value is correct. Furthermore, in The Win32_ComputerSystem class also
2. Select Print on the File menu. On the has the JoinDomain-
Listing 1: VBScript Code That Displays Then Changes the Local
drop-down list of printers, select doPDF. Computer’s Workgroup Name OrWorkgroup method
3. Click OK or Print (depending on your A Dim result, results, domain that you can use to set
Windows OS), and select where you want Set results = GetObject("winmgmts:"). _ the workgroup name
execquery("select domain from win32_computersystem")
to save the PDF file. For Each result in results for individual comput-
' Returns the workgroup name if in a workgroup. ers. In a workgroup en-
' If a domain member, returns the DNS domain name.
The doPDF program has an executable .domain = result.domain vironment, it’s very easy
Next
fi so if you don’t like the method just
file, WScript.Echo domain to use. All you need
described for creating PDF fi
files, you to do is specify the
can simply go to Programs and click the B For Each result in results new workgroup name.
' On Vista and later, only works if script
doPDF icon. You’ll be able to select your runs elevated. Note that on Windows
results.JoinDomainOrWorkgroup("Workgroup")
document and create the PDF file from the Next Vista or later systems,
program’s interface. You can use doPDF you need elevated
on Windows 7, Windows Vista, Windows
XP, Windows Server 2008, Windows Server Tell the IT community about the free tools you use, your solutions to problems,
or the discoveries you've made. Email your contributions to r2r@windowsitpro.com.
2003, and Windows 2000 Server.
If we print your submission, you’ll get $100.
—Claudiu Spulber, support technician for a
software development company Submissions and listings are available online at www.windowsitpro.com.
Enter the InstantDoc ID in the InstantDoc ID text box.
InstantDoc ID 125413

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 15


privileges to use the JoinDomainOrWork- InstantDoc ID 102479) interest-
group method. ing and thought I would share
The code at callout B in Listing 1 a technique I used to deal with
demonstrates how to use the the same issue. I had a particu-
JoinDomainOrWorkgroup method lar process (BESClient.exe) that
to change the workgroup name in was spiking the CPU on my
VBScript. In PowerShell, you can run laptop. The BESClient process
code such as is the client for the BigFix patch
management solution. I used
(Get-WmiObject ` System Monitor in conjunction
Win32_ComputerSystem).` with the Sysinternals Process
JoinDomainOrWorkgroup("Wkgp") Monitor utility (technet
.m
.microsoft
Before using either the VBScript .co
.com/en-us/
or PowerShell code, you’d need sys
sysinternals/
to replace Wkgp with your bb
bb896645
workgroup’s name. Although it .as
.aspx) to gain Figure 3: Configuring the arguments
can take a few minutes for the so
some insight as to what was occur when an alert is triggered, you have
workgroup change information go
going on with my system several options, as Figure 2 shows. When
to propagate on a network, du
during the spikes. you want to run a batch file or another
the change will take effect
ff im- First, I created a short type of program, you must pass at least
mediately on the PC without a batch fi
file, one argument to it, whether or not that
reboot. Alex K. Angelopoulos BigFix.bat, to argument is used. In my case, BigFix.bat
—Alex K. Angelopoulos, IT
T consultant
lt t run Process didn’t need an argument, so I simply used
InstantDoc ID 125503 Monitor and put it in the C:\data\bat a text-message argument that I tailored to
folder. Listing 2 shows this batch fi file. A be self-documenting, as Figure 3 shows.
Dealing with CPU Spikes on a Laptop fifilter that limits the normally extensive • If the program needs to run interactively,
I found the article on how to solve output can be created within Process you must change some settings in
high CPU usage problems by Michael Monitor if desired. the Performance Logs and Alerts
Morales (“Got High-CPU-Usage Prob- Then, within System Monitor, I created service properties page—a situation
lems? ProcDump ‘Em!” September 2009, an alert that would both log an entry in that the “How to create and configure
the application event log performance alerts in Windows Server
Listing 2: BigFix.bat and run my batch fi file when 2003” article doesn’t mention. If you
"C:\Utilities\Sysinternals\Process Monitor\Procmon.exe" CPU usage (%Processor want to trigger an interactive program,
/BackingFile "C:\Tmp\Sysinternals\Process Monitor\
EventStore.PML" /Quiet Time) was more than 95 you need to do the following:
percent for the BESClient 1. In the Performance Logs and
pprocess. The Microsoft Alerts page, select the Log On tab.
aarticle “How to create and 2. Choose Local System accountt in
cconfigure
fi performance the Log on as option and select the Allow
aalerts in Windows Server service to interact with desktop check box.
22003” (support.microsoft 3. Click Apply.
.c
.com/kb/324752) explains
hhow to create an alert. When you’re done troubleshooting the
AAlthough the article is problem, make sure that you change
wwritten for Windows 2003, the Log on as option back to the default
th
the instructions are appli- NT Authority\Network Service setting.
ccable to other OSs. I used Leave the password box blank because
th
them to create an alert the system will create and manage one.
oon my laptop, which runs
WWindows XP SP3. By using System Monitor in conjunction
The instructions for with Process Monitor, I was able to
ccreating an alert are determine the reason for the spikes: The
ggenerally easy to follow, BigFix client was iterating through all the
eexcept for two tricky parts: thousands of files on my laptop.
• When selecting the —Dave Bartholomew, IT consultant
Figure 2: Selecting the actions that you want to occur actions that you want to InstantDoc ID 125439

16 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


ASK THE EXPERTS
■ PowerShell ■ Outlook
■ VDI ■ ESX
■ Hyper-V
Q: How can I schedule a
Windows PowerShell script?
ANSWERS TO YOUR QUESTIONS
A: Scheduling a PowerShell script is
easy: Just schedule PowerShell.exe,
which is located in \Windows\System32\
WindowsPowerShell\v1.0 (even v2 is
located in that folder for some reason).
You can add help simply by creating spe- PowerShell.exe has command-line
cially formatted comments, as described in parameters that let you specify a
PowerShell’s own online help. Run command—such as the name of a
script—that you want to run. Be sure
help about_comment_based_help that the scheduled task is running under
a user account that has permission to do
to read about it. The shell parses these spe- whatever the script is trying to do.
cially formatted comments and constructs a —Don Jones
Help page that looks exactly like the “real” help InstantDoc ID 125135
Q: If I use application
tion virtu
virtualization, that comes with shell cmdlets. Adding this
how does application activatio
activation work? Help page is a great idea. It helps to document an equal chance of being given the job.
your functions and scripts, making it easier for While this responsibility doesn’t come into
A: Youu shouldn’t think of application vivirtu- someone else to use them. By integrating the play often—typically, Hyper-V interacts
on as a way around activation. When
alization Whe information into the shell’s existing Help fea- with its disk files directly, not necessarily
you virtualize an application, you typically ture, your scripts and functions will look more through a coordinator node—it’s impor-
don’t activate it. Instead, it’s confi
figured like “real” commands, and other users will have tant for certain types of actions. One of
with the required information as part of the t an easier time fi
finding the information. those actions is copying VHD fi files to a LUN.
encing, but activated when it’s exec
sequencing, executed —Don Jones Hyper-V transparently redirects the file fi
on userr desktops. Many applications check
ch InstantDoc ID 125329 copy through the coordinator node.
ware that they’re running on
the hardware on, so This redirection obviously means that
ivate them during sequencing,
even if you activate Q: What’s a Hyper-V cluster’s VHD file copies can take longer if you initiate
you have to reactivate them when the appli- coordinator node, and what does them from servers other than the coordina-
cation actually runs on the user’s desktop. it do? How can I tell which Hyper-V tor node. So always do heavy VHD fi file work
This also applies to licensing—you need to host is also the coordinator node? so from the coordinator node to save your-
consider which desktops will run the virtual- self time. So how do you know which node
ized application and license accordingly. Just A: Hyper-V R2 added a new capability called is the coordinator node? There are a couple
because you virtualize an application doesn’t Cluster Shared Volumes (CSV). This feature of ways to discover who’s got the job:
mean the license model of the applica- provides the much-desired ability to handle • Inside the Failover Cluster Manager con-
tion changes to, for example, concurrent individual Virtual Hard Disk (VHD) fi files as indi- sole, click on the Cluster Shared Volumes
executions instead of per desktop. vidual items for failover. Prior to CSV, as you link and browse through the CSVs you’ve
—John Savill probably know, you had to fail over an entire created. You’ll notice that each CSV has a
InstantDoc ID 125275 disk, rather than individual VHD fi files within it. listing for a Current Owner. The Current
Fast-forward to today. The technologies Owner is the coordinator node.
Q: How can I add syntax help to that let CSV-enabled volumes operate still • Using Windows PowerShell, you can
my Windows PowerShell scripts or require one cluster node that’s responsible identify the coordinator node with the
functions? for the coordination of fi file access. This Get-ClusterSharedVolume cmdlet. Look
cluster node is called the coordinator node, for the Node column in the results for
A: I’ve seen a number of folks spend a lot with each individual LUN having its own your current coordinator node.
of eff
ffort adding a -help parameter to their coordinator node. That node can be any of —Greg Shields
scripts or functions—and there’s no need! your cluster hosts, with each host having InstantDoc IDs 125303 and 125325

Jan De Clercq | jan.declercq@hp.com John Savill | jsavill@windowsitpro.com


Don Jones | powershell@concentratedtech.com Greg Shields | virtualgreg@concentratedtech.com
William Lefkovics | william@mojavemediagroup.com

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 19


ASK THE EXPERTS
Q: I don’t have a Certification users that something is wrong with the SSL damage to your ESX environment. Being
Authority (CA) or Public Key setup or refuse to open the site. a command line-based UI, you can see
Infrastructure (PKI). Can I use To fi
fix this problem, you can use the how just a few characters in the wrong
SSL on my test website without SelfSSL.exe utility to generate a self-signed place can do that.
purchasing a certificate? SSL certificate
fi for your web server and link If you insist on having the ability
it to your website. SelfSSL is part of the IIS6 to log on as root, you can enable root
A: Microsoft has built in support for Resource Kit and can be used to generate logons by editing the /etc/ssh/sshd_
the creation of self-signed certificates self-signed certificates
fi in earlier IIS versions. confifig file using your favorite text editor,
In IIS 7.0. These allow you to create web You can download the IIS6 Resource Kit Tools such as nano or vi. Look for the line that
server certificates easily, without the from Microsoft. Run SelfSSL using the syntax says PermitRootLogin and change its no
need for a PKI or an externally purchased entry to yes. Restart the sshd daemon
certificate. Selfssl /N:CN=<your_websitename> with the command service sshd restart
You can create self-signed certificates fi /V: <cert_validityperiod> and you’re done.
from the Server Certifi ficates section in the /S: <site_ID> /P: <portnumber> —Greg Shields
IIS Manager MMC snap-in. To get to this InstantDoc ID 125225
section, click the root machine node in Make sure that in the above command,
the left-hand pane of the IIS Manager, and you replace <your_websitename> with Q: How do I quote command
then select the “Server Certifi ficates” icon the actual name of your website (such parameters for an external
in the right pane. The Server Certificates fi as mytest.internal.net), <cert_validity- command in Windows PowerShell?
section lists all certificates
fi that are regis- period> with the numbers of days the
tered on the machine, and it allows you to certificate
fi should be valid, <site_ID> A: Normally, PowerShell can run external
import and create certificates.fi with the actual site ID (see note below) commands, such as ipconfig,
fi ping, and
To create a self-signed certificate, fi click and <portnumber> with the actual port nslookup, if you simply type the com-
Create Self-Signed Certificate… fi in the number (defaults to 443 for HTTPs). To mand name. However, some commands
Actions pane of the IIS Manager. IIS will look up the site ID of your website, select require extensive command-line param-
prompt you to enter a name for the cer- the Sites node in the IIS Manager—you eters. When those parameters start to
tificate.
fi When you click OK, IIS automati- can find the site ID in the ID column in involve quotation marks, it can get tricky
cally creates a self-signed certificate fi and the right pane. to get PowerShell to properly parse the
registers it on the machine. —Jan De Clercq arguments and pass them to the external
Once you’ve registered an SSL certifi- fi InstantDoc ID 125195 command. For example, consider this
cate on your IIS machine, you still need to simple command:
SSL-enable the website itself. To do so, Q: How can I directly log on to
select your website in the Web Sites node in ESX’s Service Console as root? Wdsutil /replace-image /
the left-hand pane of the IIS Manager and image:"MyImage"
click the Bindings link in the Actions pane. A: Right out of the box, you can’t.
This brings up a dialog box that shows all And most security guidelines say you The easiest way to run it to use Power-
the binding rules for the site. To enable SSL shouldn’t. Shell’s Start-Process cmdlet, which can
for your site, click the Add… button. This What you’re asking for is the ability accept the complete argument as a
brings up an Add Web Site Binding dialog to use Secure Shell (SSH) to connect here-string:
box that you can use to add HTTPs protocol directly to an ESX server’s Service
support. In this dialog, you must select Console, login as root, and manage the Start-Process WdsUtil -argument @"
https in for Type: and the self-signed certifi- fi server with your administrative cre- /replace-image /image:"MyImage"
cate you created earlier for SSL certificate:. fi dentials. You’re used to doing that in "@
Finally, click the OK button. Windows, but in the UNIX world, root is
There’s one small but important intended only for limited use. Note that you have to type it just like
problem you must be aware of that has to That’s why the standard procedure this: The @” must be the last thing on
do with the way IIS 7.0 creates self-signed is to log on to your ESX server’s Service the first line, then you type whatever
certificates.
fi IIS 7.0 always creates the SSL Console as someone else and use the arguments you want passed, and finally
certificate
fi with the local computer name sudo command to run specific fi com- the closing “@ must be the first
fi two
as the Common Name (CN). To make SSL mands that require root privileges. Some- characters on the next line. There’s a
function properly, the certificate’s
fi CN times, when you have lots of commands more technical discussion of this trick
should match the website’s DNS address, to run, you can elevate your privileges at bit.ly/9c0p5Y, which also discusses
and in many cases the website’s DNS name to root using the “su –” command and how PowerShell parses arguments for
is diff
fferent from the computer name. If the root password. This separation helps external commands.
your certificate
fi CN doesn’t match the web- protect you against an errant keystroke —Don Jones
site DNS address, browsers will tell your that accidentally causes catastrophic InstantDoc ID 125140

20 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


ASK THE EXPERTS
Q: How can I publish a Q: How do I open Outlook 2010 entirely well-publicized anywhere on the
Certificate Revocation List (CRL) email in a web browser? Internet. You can find more information
or Certification Authority (CA) about this nifty feature is in a 2009 Tech
certificate to an Active Directory A: There are some circumstances where you Ed presentation by Symon Perriman of
(AD) Lightweight Directory might want to view an email in a web browser. Microsoft, “Multi-Site Clustering with
Services (LDS) instance? For example, you might receive an email that Windows Server 2008 Enterprise,” at bit
doesn’t render well in Microsoft Outlook. Or .ly/dilV86.
A: A Windows Enterprise CA (that is, an perhaps you want to print an email using a Clusters where every node exists
AD-integrated CA) automatically publishes more controlled interface; for example you within the same LAN probably don’t
its certificates
fi and CRLs in AD. But if you’re might want to print a single page of an email, need intra-cluster traffi
ffic encryption, but
using a different
ff LDAP server, such as an see my tip Printing Only the First Page of an those that span to multiple sites can.
AD LDS instance, you must publish the Outlook 2007 Email, InstantDoc ID 100555. If you intend to stretch your cluster to
certificates
fi and CRLs manually. The easiest Outlook 2010 provides a simple mechanism another site across a Multiprotocol Label
way to do this is to use the Certutil com- for viewing emails in a browser. Switching (MPLS) network or other shared
mand line utility. To manually publish a When Outlook identifies fi that a mes- Internet connection, consider encrypting
certificate
fi to an AD LDS instance, use the sage might have some rendering issues, it your cluster communication to protect it
command includes advice in the MailTips section of against spying eyes.
the message: “If there are problems with Setting up encryption requires
certutil –addstore "ldap://<Server_ how this message is displayed, click here to Windows PowerShell, specifi fically the
name>/<Distinguished_Name>? view it in a web browser.” Clicking this ban- Get-Cluster cmdlet. Running
CACertificate?base?ObjectClass= ner reveals a context menu, which includes
CertificationAuthority" <Cert_ the option to View in Browser. You can Get-Cluster clusterName | fl *
file_name> also find the View in Browser option in the
Move section of the Ribbon of an opened against your cluster will display the full
For example, message. Select Actions, View in Browser. list of cluster properties. The property
This option opens Internet Explorer (IE). It you’re interested in for this purpose is
certutil -addstore "ldap:// won’t open your default browser, if you use SecurityLevel. A SecurityLevel of 0 will
myadldsserver.mycompany a default browser other than IE. use clear text for communication. A
.net/CN=myCA,CN=Certification Outlook saves a copy of your message SecurityLevel of 1 (the default) will sign
Authorities,CN=Public Key Services, as a web archive (a Microsoft proprietary the traffi
ffic. Setting SecurityLevel to 2
CN=Services,CN=Configuration, format) with the extension .mht in a tem- will encrypt it communication. To start
DC=mycompany,DC=net?CACertificate? porary fifiles folder. For example: encrypting, use the command
base?ObjectClass=Certification
Authority" mycacertificate.cer file://localhost/C:/ Get-Cluster clusterName | ForEach-
Users/<username>/AppData/Local/ Object { $_.SecurityLevel = 2 }
To manually publish a CRL to an AD LDS Microsoft/Windows/Temporary%20
instance, use the command Internet%20Files/Content.Outlook/ The cmdlets that are associated with
WW7HRH1C/email%20(3).mht. Windows Failover Clustering are part
certutil –addstore "ldap://<Server_ of a module called FailoverClusters.
name>/<Distinguished_Name>? By default, fi
files with the .mht extension are This module isn’t loaded by default
CertificateRevocationList?base? associated with IE. It’s this file association that when you fifirst launch PowerShell,
Objectclass=CRLDistributionPoint" determines which application is opened. even from the console of your cluster
<CRL_file_name> You can change this fi file association within nodes. To load this cmdlet and enable
Windows if you want another browser to the use of cmdlets such as Get-Cluster,
In the above commands, you must try to view messages, but not all can render first run
replace <Server_name> with the name .mht fi
files—Firefox and Chrome can’t do it by
of the AD LDS server, <Distinguished_ default, but Opera can render .mht fi files. Import-Module FailoverClusters
Name> with the LDAP path you’ve used to —William Lefkovics
publish CRLs in the CA configuration
fi (this InstantDoc ID 125320 If, down the road, you forget the exact
is a CRL Distribution Point), <CRL_fi file_ name of this module, you can always
name> with the fi file name of the CRL you Q: Can I encrypt the get a listing of the available modules
want to publish, and <Cert_file_name>
fi communication between my using
with the file name of the certifificate you Hyper-V cluster hosts?
want to publish. Get-Module -ListAvailable
—Jan De Clercq A: Absolutely, although where this —Greg Shields
InstantDoc ID 125193 setting is done is neither obvious nor InstantDoc ID 125346

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 21


COVER STORY

in
Windows Server
2008 R2
D
DNSSEC, DNS NS is our trusted guide to
DNS to give us the IP ad
t the digital world. When we access a server by name, we’re trusting
address
ddress of the correct destination. If our DNS infrastructure is compro
compro-
Devolution, mised, names might bee resolved to malicious hosts, which could capture sensitive informa-
stribute misinformation, or just disrupt our access to services.
tion and credentials, distribute
and DNS ure houses highly sensitive information and forms the backbone
Today’s infrastructure

Cache Locking of many businesses, so we need something more. Confidence in our DNS infrastructure
and the information it provides is crucial to maintaining an organization’s security and integrity. With
introduce a new Windows Server 2008 R2, we have some very powerful technologies with which to gain this confidence.
Let’s start with a little background, then see what new enhancements such as DNS Security Extensions
world of secure (DNSSEC), DNS Devolution, and DNS Cache Locking can provide.

communications Traditional DNS Shortcomings


With traditional DNS, clients can perform only basic checks to determine whether DNS responses have
been spoofed. A client can check whether the DNS server address matches the expected address; how-
by John Savill ever, this capability is often disabled due to network infrastructure configurations. This check is also easy
to fake: The port used in the response needs to match the client request’s port, which is easy to guess.
Even with new Server 2008 R2 DNS enhancements to source-port randomization, the risk isn’t
mitigated so much as the time required for an attack is increased. The random XID value sent by the
client (included in the response) is sent in clear text, so it’s easy to duplicate. Also, in traditional DNS,
the client’s query is echoed back by the DNS server, but if a technology is smart enough to capture the
request and spoof a response, echoing back the initial response is easy.
There’s no checksum within the DNS response—say, to ensure that the content of the response hasn’t
been altered. So, man-in-the-middle attacks can modify the content as it’s transmitted to the client. Also,
consider that many of our DNS results don’t come from the authoritative DNS server; rather, they come
from an in-between DNS server that has a cached lookup and returns the information in the cache. Many
hackers poison the cache of DNS servers by bombarding them with false records.

DNSSEC for All


DNS Security Extensions (DNSSEC) isn’t a proprietary Microsoft technology but rather an Internet-
standard extension to DNS defined in RFCs 4033, 4034, and 4035 that Microsoft has implemented as
part of the Server 2008 R2 DNS role. An earlier version of DNSSEC was defined in RFC 2535, but it’s

24 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


DNS ENHANCEMENTS
b en replaaced
be d by the aafo f rreement
fo ntio
ione
io ned
ne d RF
R Css in you ur DNDNS zo zone
nee, an nd you u weree aasked for interim solution to enable clients to trust the
and
an d imimpl p em
pl emen e ta tati
tion
onss ththatat follo ow RFRFC C 252535 35..
35 reecord C, th thee re
resp
spponse se woulouldld be A NSEC E DNS zones that are DNSSEC-enabled.
W nd
Wi ndow
do owws Se Serv r err 2200
rv 0033 an nd evveen n Sererve
v r 20008 wiith
w h a sig igna
natu ure
re,, th
ther e eb
eby notifyyin ng you that Whenever we talk about digital signa-
aarren n’’tt com ompa patibltiib
blle wiwith
th theh Serve verr 20
2 08 R2 th
the
he as askkeed-
d-for re recoco
ordrd doesn
oesn n’t exxist because tures, we need a mechanism for clients to
im mpl plem
e en
em entatati t on.
ti th
th
her
erre are
arre nno o record
ordsds bet etwweeen
w n A and d E. be able to validate the signature. This is
At iti s mom sstt baassicc llev evvel
evele , DN NSSSSEC
EC
E C eens
nsures
nsur
ns urress The criiti tica
cal el
cal
ca eleem
ement ent is the trustt. The cli-
en achieved through public key cryptography.
th he in inteegrrityitty of of thee DNS N inf n raastru uctur
cttur
uree ennt mum st tru r stt thee zo on ne’
e’s pu
publblicic ke
key because A public key for the secured DNS zone
th hrrooug
ugh h tetech
chn nollo
nolo
no ogiies ttha
hatt veeriify tthe
ha h authe
he h n- thee publ
th public
pu icc kkey
eyy iiss u
usseed d to au authen ntticate the is available for clients to use to validate
ttiiciityy of re rece
ceiv ived
iv d d dat
ata,, inc nclu
luudi
ding
ngg authe
n hen- resp
re sppon
onsesee by ded crrypypttiin
ing
ng th hee siiggnature, which the digital signature that was generated
tica
ti cateteed de deni n al
ni al-o
l-o
-of-f ex
f- e iste
isstenc ncee re
nc r sp
spononssees. s was crea
wa cr ate tedd us
usinin
ng ththe privvate key. Ensuringg
the using the DNS zone’s private key. This
Veriifi
Ve fica
c ti
ca t on iiss en nab ble
l d th thro oug
ugh h pup blic
blicc key e that
th att cli
l ennts trurustst only ly the real auth horitative public key at the root of a DNSSEC trusted
cryp
cr y to
yp togr
grap
gr aphy
ap h , wh
hy whic ich enenaba le l s th
thee us
use o
use off d
dig
iiggi-
i DN NS zozonee owne wn ner
er is acachieve
eved thrroug ough chains namespace—for example, .net—is known
taal si
s gngnatatur
at ures
ur es on alll DN DNS re resp
spon
sp onsses.
on s A su ucc- off trrust
ru
ustt. as the trust anchor; it’s the anchor of trust
c sssfu
ce fu di
ful digi
g tal siign g atturu e va vali
lida
ida
dati
tion
ti on
n mean nss In an iide dealal wo orrlld
d, th
t is
i publicc kkey infra- between the client and DNS namespace. If a
thatt thee data reeceeiv
th i ed iiss ge
genunuin
nu i e an
in nd cacann be stru
st uctctur
tur
uree (P (PKI
PKII) hi hier
erararcchhy wowoulld be self- client has a trust anchor to a zone, the client
ttrrus
u teted
ed.
d. T The
hee dig igit
ital
al sigignaatu
igna ture
re is geene n rate tedd c n
co ntai
nt aine
need in i tthe
hee DNS hiera ieraarcchy in n that the builds a chain of authentication to any child
usin ng tth he DN D S zo zonene’ss pri riva
v tet key (wh hicichh isis roo
ro ot o off DNS— S " . "— "—w would be D DNSSEC- zone of the trust anchor, removing the need
kept
ke ptt ssec
ecre ret)
ret) aand nd d tth
he con
he onte
on teent
n off th he rreecord rdd, enaaab
en ableledd an
and d gl
g ob bally
ally trustted byy al all clients. for DNS clients to explicitly trust every zone
an nd cacan n bee vallid idaated
ated with h th
thee pup bl
blic
ic key
e . If a Theeen
Th en,, th
thee ro rootot cou o ld sign thee to op-level within a namespace. Don’t panic, though:
pack
pa cket et iiss ge
genen ra rate
ted d fr
from
om a malicious
al sou
o rcce,, dom
do main nam
ma
m ames (e.g. g., com m, net et, or
orgg)
g , which You don’t need a full PKI deployed in your
its digi
it
its diggi
gita
tall si
signggnataturu e wiwill fail; if a p pack
pa cket
et has cou
co uld
ul
u d th
thenen ssig
ignn th hei
eir su ubo
bordrdininatte doma m ins environment. The public keys for the secu-
been modified,, tthe
be he sigigna
natu ture
re wil ill no longe gerr (e.gg., com
(e ompa panyn .com),
om), thereby
t crreating a rity zones are actually stored within the DNS
match h th
thee cocontent. trusst path. This means that clien nts would infrastructure, but how do you know who to
Facilitating this public key cryptogra- neeed only to trust the root zone, ssince the trust? How do you get valid trust anchors
phy are several new DNS record types— root zone is used to authenticat a te all the since the root DNS zone can’t sign?
specifically, DNS Public Key (DNSKEY), other child zones. In Figure F 1’s eexample, Through a process called DNSEC Look-
which is a container for a DNS zone’s zone s public .nett is DNSSEC
DNSSEC-enabled enabled, d, so any ch hild zone aside Validation (DLV), public keys can be
key; Resource Record Signature (RRSIG), that is signed by the .net parent w would be configured to be trusted by DNS clients.
which contains the digital signature of a trusted by any DNS client that trus trusts .net. There are repositories on the Internet that
DNS response; Delegation Signer (DS), You see this today with normal PKI allow DNSSEC-enabled zones to upload
which is used between a child and par- certificates. Most computers are configured their public keys, which clients can then use.
ent zone that are both DNSSEC-enabled; to trust certain Internet root certificate These public repositories are trust anchors
and Next Secure (NSEC), which allows authorities (CAs), such as VeriSign, Thawte, on the clients. We trust these repositories to
authenticated denial-of-existence records and Equifax. These authorities grant sites do the right thing and make sure the public
by effectively returning the name that would certificates that are signed by the root CAs; keys they store are legitimate—the same way
be prior to the non-existent requested name because clients trust the root CA, they we trust VeriSign to ensure that a company
(if they were in alphabetical order) and trust certificates signed by a CA that has is genuine before giving the company SSL
notifying what the next secure record would effectively been vouched for by the root or code-signing certificates. An organization
be. For example, if you had records A and E CA. DNS works similarly: Clients trust the can download the content of this repository,
r
root and top-level domains and Active Directory (AD) can replicate the
(
(assuming the root and DNSSEC information downloaded to all
t
top-level domains are the DNS servers. (DLV isn’t supported in Server
t
trust anchors), which then 2008 R2.)
a
authenticate the child sites. Alternatively, you can manually config-
At this time, the DNS ure trust anchors within DNS by specifying
r
root zone doesn’t support a zone name and specifying the public key
D
DNSSEC, and neither does that zone name servers give, as Figure 2
C
COM, but this will change shows. When the entry point for a trust chain
i the near future as the use
in (i.e., a trust anchor) is being configured, and
o DNSSEC is being man-
of you’re specifying the key signing key (more
d
dated by many governments on this later), you would select the Secure
a
around the world. The Entry Point (SEP) option in addition to the
D
DNS root will be DNSSEC- zone signing key. If you want to share your
e
enabled in mid-2010, and public key so that another organization or
C
COM some time in 2011 or repository can add it as a trust anchor, that
Figure 1: Setting the trust anchor 2
2012. Therefore, we need an organization will need the content of the

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 25


DNS ENHANCEMENTS
w
what determines how R2, and you need to ensure that your net-
ssecurity should be used work can handle the increased DNS packet
ffor DNS, whether you size that comes with DNSSEC enablement.
h
have entries for vari- For example, ensure that you have support
o
ous DNS namespaces for Extended DNS 0 (EDNS0), which per-
((e.g., microsoft.com), mits DNS packets up to 4KB instead of the
w
whether DNSSEC valida- standard 512 bytes.
ttion is required for each To enable DNSSEC on your Server 2008
n
namespace, and whether R2 zones, you use the DnsCmd utility to
IIPsec should be used generate the key signing keys and zone
b
between the client and signing keys, and store them in the local
iits next DNS hop (i.e., the computer’s certificate store (MS-DNSSEC).
cclient’s local DNS server). The zone signing key (ZSK K in the code
Y
You typically manage below) signs all the records in the zone, and
N
NRPT through Group the key signing key (KSK K in the code) signs
P
Policy instead of trying only other keys. You also need to create the
Figure 2: Trusting DNS responses
tto manually configure it DNSSEC resource records at the root of the
\%systemroot%\System32\dns\keyset-zone across many clients. Figure 4 shows a trust chain. (This occurs automatically.) To
name file, as you see in Figure 3. sample policy. Note that you can base your create my certificates, for example, I type
This functionality isn’t between a DNS NRPT on more than just the DNS suffix:
client (e.g., your workstation) and the You can use prefix, fully qualified domain dnscmd /offlinesign /genkey /alg rsasha1
authoritative DNS server for the lookup name (FQDN), and subnet. /flags KSK /length 2048 /zone secure
you’re performing. We can’t actually define Now that you understand how DNS- .savilltech.com /SSCert /FriendlyName
trust anchors on a DNS client! In fact, even SEC ensures DNS responses are genuine, KSK-secure.savilltech.com
though I’ve been using the term DNS client, t how do you get it? In the Microsoft world,
DNSSEC is actually more important between you need your DNS servers to run Server dnscmd /offlinesign /genkey /alg rsasha1
DNS servers. In the typical DNS-resolution 2008 R2 and your clients to run Windows 7, /length 2048 /zone secure.savilltech
flow, you ask your local DNS server and it and because of the way DNSSEC functions, .com /SSCert /FriendlyName ZSK-secure
recursively looks up the answer, so your there are some restrictions on its use. You .savilltech.com
DNS server is the component that needs to aren’t going to turn DNSSEC on for every
validate responses. In most environments, record in your organization; you’ll use DNS- For your AD-integrated zones, you need
the client won’t perform DNSSEC validation; SEC to secure records that are used with a to export the zone to a file, sign the file-based
it relies on its DNS server to do that by asking wider, Internet-focused audience, such as zone with your certificates, and save to a
the DNS server to use DNSSEC. your secure website address. A zone that new file. Then, you need to delete the exist-
To provide maximum protection for is digitally signed with DNSSEC will no ing zone, import the new signed zone file,
end clients, best practice is to use IPsec to longer accept any dynamic updates, which and reset the zone to be AD integrated. The
authenticate the data and perhaps encrypt most environments use for their hosts to major steps I used in my environment after
communication between the client and register their host-to-IP mappings without creating the aforementioned certificates are
the local DNS server. This method ensures any manual intervention. Therefore, you’ll
no local corruption of data from the DNS create a separate zone to use for your secure dnscmd /zoneexport secure.savilltech
server to the client. records, in addition to a zone facing the .net securesavilltechnet.dns
To configure the DNS clients’ expec- Internet for dynamic updates (if necessary).
tation of DNSSEC, you use the Name Every DNS server that hosts a copy of the dnscmd /offlinesign /signzone /input
Resolution Policy Table (NRPT), which is signed zone must be running Server 2008 securesavilltechnet.dns /output
securesavilltechnetsigned.dns /zone
C:\Windows\System32\dns>type keyset-secure.savilltech.net secure.savilltech.net /signkey /cert
secure.savilltech.net. 3600 IN DNSKEY 257 3 5 (
/friendlyname KSK-secure.savilltech
AwEAAZAP23IinKsyBp5WU4YTM7fFj/uutBph
HyNp617eps5haOjr0fKanri23VL4DEfjvjRw .net /signkey /cert /friendlyname
JMAqh9Sx5QWpXpltudM1WSaRVyvLns/ILSUJ ZSK-secure.savilltech.net
t/1ta0ceVmAwqLmXb6lYzRGat9RK64izJVtz
AlTEzdUzW89Q+dmm+2GsXaY4U6bUGaE1pxD6
WKVpGOk3eahJoc4+eUlO9SKvDzrR4othF6hi dnscmd /zonedelete secure.savilltech
Wl/YsZs6O8iLTxoXcIfz2EUq9ioYSvpWPxOz
.net /dsdel /f
KnwnmSFVRBtpJA/bxRPvYNuf6a1l6q2OuTSG
JVNbeyOFLcpbCAwlR2uX6G3VPdYxX5HIzF+u
B3PQJZvM8pjRgNQDJrgu/lc= dnscmd /zoneadd secure.savilltech
) ; key tag = 33509
.net /primary /file
Figure 3: Sharing the public key securesavilltechnetsigned.dns /load

26 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


DNS ENHANCEMENTS
second-level domain (e.g., savilltech.net).
Setting a devolution level of 3 means you
would devolve only to the third-level DNS
domain (e.g., na.savilltech.net).
You can configure DNS Devolution
using Group Policy, through the Primary
DNS Suffix Devolution and Primary DNS
Suffix Devolution Level policies found
at \Computer Configuration\Policies\
Administrative\Templates\Network\DNS
Client, as Figure 6 shows. You can also set
DNS Devolution directly in the registry with
the HKEY_LOCAL_MACHINE\SOFTWARE\
Figure 4: Specifying DNSSEC requirements for a DNS zone Policies\Microsoft\Windows NT\DNSClient\
UseDomainNameDevolution and HKEY_
dnscmd /zoneresettype secure namespace to a parent is a devolution to LOCAL_MACHINE\SYSTEM\Current
.savilltech.net /dsprimary one level above.) An example is savdalfile01: ControlSet\services\Dnscache\Parameters\
With DNS Devolution enabled, when a DomainNameDevolutionLevel subkeys.
Figure 5 shows the various DNSSEC-related client attempts to resolve savdalfile01, This functionality is useful in environ-
entries. savdalfile01.dallas.na.savilltech.net would ments that have multiple levels of DNS
Implementing DNSSEC involves many be initially queried, then it would be up namespace. The Microsoft security advi-
steps, and keeping it running and ensuring to the parent to search for savdalfile01 sory “Update for DNS Devolution” (www
that the keys are maintained is similarly .na.savilltech.net. (It’s checking a third-level .microsoft.com/technet/security/advisory/
time consuming. The keys we created have devolution because the DNS suffix has three 971888.mspx) offers an update for older
a limited lifetime and need to be updated; parts—na, savilltech, and net.) If there’s no versions of Windows.
if we have trust anchors configured, those match, it’s up to that zone’s parent to look for
public keys will change and therefore savdalfile01.savilltech.net (which now has a DNS Cache Locking
require updating. I strongly recommend devolution level of 2, as this DNS suffix has At the beginning of this article, I mentioned
reading the Microsoft article “Deploying two parts). Basically, it allows a member of that one DNS vulnerability was that DNS
DNS Security Extensions (DNSSEC)” at a child namespace to access resources in the servers cache entries for recursive lookups
technet.microsoft.com/en-us/library/ parent without having to specify the parent’s (lookups for records they aren’t authorita-
ee649268(WS.10).aspx; it’s a great step-by- namespace as part of the DNS query. tive for, and for which they have to consult
step guide. New to the Server 2008 R2 and Windows 7 other DNS servers) they’ve performed to
DNS client is the ability to set a devolution speed up future lookup requests for the
DNS Devolution level. As an administrator, you can define same information. Those lookups have a
DNSSEC is probably the most famous Server whether DNS devolution is enabled and specific time to live (TTL) before the record
2008 R2 DNS feature, but there are some which DNS devolution level you’ll devolve must be rechecked to see if it’s changed.
other useful enhancements. In environ- down to. For example, setting a devolution The exploit uses DNS cache poisoning to
ments that have a deep DNS namespace, level of 2 means you would devolve down send incorrect responses to a DNS server
it can sometimes be tricky to know the cor- to the two-part Forest Root Domain (FRD) to try and update that cache so that clients
rect DNS suffix for an address. For example,
in my environment, I know the host is
called savdalfile01, but I’m a member of
dallas.na.savilltech.net, and I’m not sure if
savdalfile01 should be savdalfile01.dallas
.na.savilltech.net, savdalfile01.na.savilltech
.net, or savdalfile01.savilltech.net. In the
past, we would define a global suffix list of all
the DNS suffixes that should be tried when
resolving a name.
Server 2008 R2 and Windows 7 offer an
update to a key feature—DNS Devolution—
that lets DNS resolution requests traverse
up the DNS namespace until a match is
found or until a certain number of devo-
lutions is reached. (Every move up the Figure 5: DNSSEC-related entries

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 27


DNS ENHANCEMENTS
In addition to DNSSEC, the NRPT is
used for one other key piece of Windows 7
and Server 2008 R2 functionality—namely,
DirectAccess, which is the new technology
that lets Windows 7 clients communicate
with corporate resources no matter where
they are on the Internet, without hav-
ing to use VPNs. The client just accesses
a corporate resource, and DirectAccess
facilitates secure communication back to
the corporate network.
This automatic use of DirectAccess
to get to resources raises an important
question: How does the Windows 7 client
know which destinations in the corpo-
rate network should be accessed through
DirectAccess and which should just use
Figure 6: Setting the DNS devolution level
normal Internet connectivity? I don’t want
using the server will receive incorrect this setting’s registry value at HKEY_LOCAL_ my Amazon purchases to be sent via my
information. MACHINE\SYSTEM\CurrentControlSet\ corporate network when I’m sitting at
DNS Cache Locking is a new Server services\DNS\Parameters\CacheLocking home or at Starbucks.
2008 R2 feature that helps mitigate cache Percent to your desired percentage. Note This decision is based on the NRPT—
poisoning: It locks the entries in the cache that if this value isn’t present, the default of and just as we can define DNSSEC actions
for the record’s TTL. So, if someone tries to 100 is used. for various DNS name and IP values, we
poison the cache with a replacement record, can do exactly the same thing for Direct-
the DNS server will ignore it and thus main- More on the NRPT Access using the DirectAccess tab as
tain the integrity of the cache content. I already discussed how the NRPT helps shown in Figure 7. If you want to check a
To use Cache Locking, you set a percent- define the way clients and servers act for machine’s Group Policy rules, you’ll find
age of the TTL of records that the cache different DNS zone requests. You have them in the HKEY_LOCAL_MACHINE\
content is locked for—for example, a setting numerous entries in the NRPT, and if a DNS SOFTWARE\Policies\Microsoft\Windows
of 75 means that cached records can’t be query matches an entry in it, the query is NT\DNSClient\DnsPolicyConfig registry
overwritten until 75 percent of their TTL handled according to the configuration of entry. You can also create exceptions,
has passed. The default value is 100, which the matching NRPT entry. If no match is which let you establish general rules for
means records can’t be updated until the found, the system performs default DNS an entire namespace but then treat a
TTL has expired. However, you can change handling. particular host or namespace portion
differently.
Server 2008 R2 brings you a very pow-
erful DNS service that adheres to some
of the most recent specifications. You
should definitely consider Server 2008 R2
DNS to be the most secure release and
use it to replace previous Microsoft DNS
services to provide maximum protection.
DNS is your trusted advisor to the com-
puter world, so make sure it can really be
trusted!
InstantDoc ID 125360

John Savill
(john@savilltech.com) is a
Windows technical specialist,
an 11-time MVP, and an MCITP:
Enterprise Administrator for
Windows Server 2008. He's a
contributing editor for Windows
IT Pro, and his latest book is The
Complete Guide to Windows
Figure 7: Enabling the use of DirectAccess Server 2008 (Addison-Wesley).

28 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


FEATURE

Mobile
Security
with
MDM 2008 SP1
T
h use
he ussee of mobile
mo d
devices,
evices,
e or smartphones, for business isn’t
isn t new; however, the patterns
of use and ndd the ffea
features
aat these devices offer have changed radically in recent years. Today, It’s a complex
it’s possible to browse the web, send and receive email, and run countless applications—
from customer relationship management (CRM) apps to word processing to social
setup, but you’ll
networking software—all while talking with someone on a call. The increased process- get tight control
ing power, memory, and storage make these devices powerful business tools, and your
users probably have corporate documents, customer lists, and sensitive pricing information on their over mobile
devices. Responding to the loss of a device might involve n
and partners, and potentially paying fines and other penalties.
sending breach notifications to customers
devices when
However, losing devices isn’t the only risk a company faces. Employees who quit or are terminated you follow these
could potentially walk out with your company’s intellectual property, and it’s possible that data could
be accidentally leaked to social networking sites, as well as leaked through web browsing and personal steps
email use. Previously, the response to these risks might have been to ban the use of mobile devices
altogether, but their popularity and usefulness means that more and more organizations are seeking
ways to integrate them into the enterprise while applying corporate policies to them. by John Howie
There are solutions available today that can be used to integrate mobile devices with corporate
networks and apply policies to them. In this article, I’ll describe Microsoft System Center Mobile
Device Manager (MDM) 2008 SP1, focusing on installation and configuration.

MDM vs. Exchange 2010


MDM isn’t the only solution Microsoft has that supports mobile devices. Organizations with Micro-
soft Exchange Server 2010 can use Exchange to manage mobile devices so that devices can send and
receive email using the Exchange infrastructure with Exchange ActiveSync (EAS). In addition, EAS
can be used to push basic policies to mobile devices.
Basic policies for mobile devices can be used to enforce password policies, such as a policy that
requires the use of a complex password. They can also be used to enforce what users can do with
their devices, including disallowing removable storage such as memory cards; preventing use of the
camera and Wi-Fi; restricting what Bluetooth features are available; and controlling which applica-
tions can run, including the browser and non-Exchange email apps. A broad EAS setting lets you
enable or disable nonprovisionable devices, which are devices that won’t or can’t enforce policies
pushed by Exchange.
Exchange 2010 ties basic policies to mailboxes, not devices, and doesn’t offer true end-to-end
management of security and devices. Nor does it offer a remote-access solution, which permits
mobile devices to consume resources on the corporate network. MDM offers these features, and
it has much richer policy and enforcement features. However, MDM supports only Windows

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 29


MDM 2008 SP1
Mobile–based devices running Windows the functional level raised to Server 2008 corp.infosecresearch.com. When you enter
Mobile 6.1 or later, whereas Exchange Forest Functional mode. the command, you’ll be asked to confirm
2010 can support any EAS-enabled device. Before you install MDM, you need to the action before configuring AD. Take
MDM and Exchange 2010 can coexist and configure AD. This configuration doesn’t particular note of the settings you speci-
can be used simultaneously for device extend your AD schema; it simply involves fied because the instance name can’t be
management. creating objects to support MDM. Log on changed after the command completes.
to the server on your network on which you As the command runs, it tells you what
Preparing to Install MDM intend to install either the Device Manage- it’s doing and shows the success or failure
MDM is a reasonably complex product to ment Server role or the Enrollment Server of each configuration change. You’ll be
deploy, consisting of several components. role, run MDM Setup.exe, and select the asked to confirm whether you want to
First, MDM requires Microsoft SQL Server Configure Active Directory for MDM M option enable your instance as the final step of
2005 or later to store policy and configu- under the Prepare section of the setup the command.
ration information. MDM itself requires splash screen. You need to be logged on If you have multiple domains in your
a Gateway Server, Device Management as a member of the Enterprise Administra- forest and you want the mobile devices
Server, and Enrollment Server. You can tors group. When you select this option, a associated with each domain to be managed
deploy the Device Management Server and command prompt window opens, and the by this instance of MDM, you need to run
Enrollment Server roles on the same server, the command
which is a typical scenario for smaller envi-
ronments. The Gateway Server is deployed
MDM is a 64-bit– ADConfig.exe /enableinstance:<instance>
in your demilitarized zone (DMZ), and it only product, so /domain:<domain>
requires one network interface for internal
communications and one for external com- it requires 64-bit– where instance is the name of your
munications. The Gateway Server’s external instance and domain is the FQDN for
interface must have a public IP address,
capable hardware each domain. You should run ADConfig
must have a default route configured, and and a 64-bit OS: with the /enableinstance flag only after
can’t be published behind Microsoft ISA you’re sure that the initial configuration
Server or Forefront Threat Management Windows Server has replicated throughout the forest.
Gateway (TMG). The Device Management Next, you create the certificate tem-
Server and Enrollment Server roles are
2003 R2 64-bit. plates used by MDM. Certificate templates
deployed on your intranet. Installation on are used to control how keys in issued
The three server roles form an instance certificates can be used, what the certificate
of MDM, and an instance can support as Windows Server policy is, and how long it’s valid for. Run
many as 30,000 mobile devices. You can the command
deploy multiple instances to support more
2008 isn’t supported.
than 30,000 users, or to accommodate ADConfig.exe
users in different regions so that users can command ADConfig.exe /help p runs before /createtemplates:<instance>
connect to a local MDM instance for best giving you a command prompt. If you scroll
connection speeds, and you can manage back through the Help text, you’ll find where instance is the name of your
groups with disparate policy requirements. that the ADConfig command has many instance. ADConfig again asks you to con-
Note that MDM doesn’t require Exchange command-line options. firm the operation before proceeding, and
(or its mobility features) but can be used to Despite looking very confusing, using it displays status information as it runs.
offer Exchange services to mobile devices. ADConfig is relatively simple. Run the After you create the templates, you need
MDM is a 64-bit–only product, so it command to enable them so that your CA can issue
requires 64-bit–capable hardware and a them. Run the command
64-bit OS: Windows Server 2003 R2 64-bit. ADConfig.exe /createinstance:<instance>
Installation on Windows Server 2008 /domain:<domain> ADConfig.exe
isn’t supported—some tools and utilities /enableTemplates:<instance>
simply fail to install, although there are where instancee is the name you want to /ca:<CA server FQDN>\<CA instance>
some workarounds. Before you can deploy give to your MDM instance and domain
MDM, you need a Certification Authority is the domain in your forest in which it where instancee is the name of your MDM
(CA), which should be an enterprise CA will run. The instance name can be no instance, CA server FQDN N is the FQDN of
integrated with Active Directory (AD). The longer than 30 characters and can contain the CA that will issue the certificates, and
enterprise CA can run on Server 2008, only alphanumeric characters, the dash CA instancee is the CA’s instance name. You
and the Windows Server 2003 R2 servers (-), and the underscore (_). The domain can find the CA’s instance name by running
that you install MDM on can be member name must be specified as a Fully Quali- certutil.exe from the command line; the
servers in a Server 2008–based forest with fied Domain Name (FQDN)—for example, instance is the Name value. As with other

30 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


MDM 2008 SP1
ADConfig commands, you’ll be asked to need to add the external FQDN to your and Report Viewer from the Microsoft
confirm the operation before it runs. public DNS and ensure that the server can Download Center (www.microsoft.com/
The next step in preparing to install be reached from the Internet. The wizard downloads/default.aspx).
MDM is to add a domain account to the then asks you to specify the port that the To install the Device Management
SCMDMSecurityAdmins (instance) and Enrollment Server Administration web- Server, select Mobile Device Management
SCMDMServerAdmins (instance) groups, site will listen on. You can’t use port 443 Server on the setup splash screen. You’ll be
where instancee is the name of the MDM because the Enrollment Server itself uses asked to accept the license terms, select the
instance you’ve used in the previous steps. that port. Setup provides a random port MDM instance that the Device Manage-
An account in the first group can add users number, which you can usually use unless ment Server will be added to, the location
to other MDM groups for the instance, and it conflicts with another service or you have to install the software to, and the database
an account in the second group can install a policy that dictates which ports to use. server to use. Note that if you install the
and manage MDM servers for the instance. Make sure you record the port number Device Management Server on the same
Although you can use two accounts, I rec- so you can reuse it if you install multiple server as your Enrollment Server, setup
ommend that you use a single account, Enrollment Servers. uses the same installation location and
which will become the MDM administrator Next, you need to specify the CA server database server, so these options will be
account. If you’re logged on with an account and instance name you specified when grayed out.
that was added to the MDM groups, you’ll preparing AD for MDM. The CA issues cer- Next, the installation wizard asks for the
need to log off and log back on for the addi- tificates to mobile devices. You also need FQDN for the Device Management Server,
tional group memberships to take effect. to specify a CA to issue SSL certificates for which is an intranet FQDN. If you’re install-
MDM during the remainder of the setup. ing multiple Device Management Servers,
Installing the Enrollment Server This CA can be any issuing CA in your enter the FQDN of the load balancer that
The next step is to install the MDM Enroll- enterprise, including the CA used during will front them. Setup validates that the
ment Server. Every MDM instance requires device enrollment. After you specify the FQDN exists in DNS. The wizard then
an Enrollment Server, and you can install necessary information, the wizard presents asks you for the Device Management and
more than one of this role for fault toler- you with your choices, which you confirm Administration website ports. If this is your
ance and load balancing. Mobile devices by clicking Install. first server, take note of the ports chosen
must be enrolled through the Enrollment and ensure that they’re used when con-
Server so that MDM can manage them. Installing the Device Management figuring subsequent Device Management
This role needs to be published so mobile Server Servers. The next step asks you for a CA
devices can access it from both the intra- You need to install at least one Device Man- that can issue SSL certificates during setup
net (internal) and the Internet (external). agement Server for your MDM instance. If of the Device Management Server. If you’re
Before you install the Enrollment Server, you install multiple Device Management installing the Device Management Server
you need to know the internal and external Servers for scalability and fault tolerance, on the same server as the Enrollment
FQDNs that will identify the server. you have to use a load balancer to spread Server, the CA is automatically populated.
To install the server, select Enrollment the mobile devices across them. Like the At the end of the setup, you’ll be shown the
Server from the setup splash screen. The Enrollment Server, the Device Manage- selections you made. Click Install to begin
Enrollment Server requires Microsoft IIS ment Server is web-based, so you also need the installation process.
6.0 and the full suite of IIS 6.0 management to install IIS 6.0 along with its full suite of
tools. Without this prerequisite, the server management tools. Installing the MDM Administrator
won’t install. Before you install the Device Manage- Tools
The server installation process is wizard- ment Server, you need to install Windows The next step in getting MDM up and run-
based. After you accept the license agree- Server Update Services (WSUS) 3.0 SP1 on ning is to install the MDM Administrator
ment, the wizard asks you to select the each server that will be a Device Manage- Tools. You can install the tools on 32-bit
MDM instance you’re installing the Enroll- ment Server. Note that WSUS 3.0 SP2 isn’t or 64-bit systems. Prerequisites for the
ment Server for. Next, it asks you to confirm recognized by MDM, so you must use tools are to install Windows PowerShell
the installation location on the file system, SP1. MDM uses WSUS to deploy software 1.0, Group Policy Management Console
and then to specify the SQL Server instance packages to mobile devices, but WSUS can (GPMC), and the WSUS administration
the Enrollment Server will use. You can also be used to manage software updates console. Note that Windows 7 ships with
use an existing instance of SQL Server if in your enterprise. If you’re using WSUS PowerShell 2.0, which the tools installer
desired. You need systems administrator only to deploy software packages to mobile doesn’t recognize. You can’t install Power-
access on the SQL Server instance to con- devices, you can configure it to download Shell 1.0 alongside PowerShell 2.0, meaning
figure the MDM database. updates only for Microsoft Report Viewer you can’t install the MDM Administrator
At this point, you specify the external because you must select at least one prod- Tools on Windows 7 systems. If you don’t
and internal Enrollment Server FQDNs. uct to update. WSUS itself requires you to have PowerShell 1.0 or GPMC, you can get
The external Enrollment Server FQDN install the Report Viewer 2005 Redistrib- them from the Microsoft Download Center.
is used by mobile devices to enroll. You utable or later. You can get both WSUS GPMC for Windows Vista SP1 and later is

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 31


MDM 2008 SP1
included in the Remote Server Adminis- replacing instance with the name of server on which you installed the Admin-
tration Tools (RSAT), which you can also your MDM instance. If you have more istrator Tools, launch the Mobile Device
download from Microsoft. than one issuing CA in your forest, Manager Shell, change into a temporary
You install the MDM Administrator you’ll be prompted to select the CA you working directory, and enter
Tools by selecting the item on the MDM want to use. It must be the same CA you
setup splash screen. You’re asked to accept installed the templates on earlier. Copy Export-MDMGatewayConfig
the license and whether to install all tools the output file, GatewayCert.cer, back
(the default) or a custom installation. After to your MDM Gateway Server and enter A file called GatewayConfig.xml is gener-
you make your selection, you’re presented the command ated and written to the working directory.
with a summary of what will be installed. Copy the file to the Gateway Server.
Click the Install button to begin installa- certreq -accept GatewayCert.cer Now that you’ve prepared the Gateway
tion. The installed tools can be found on Server, you can run Gateway Server setup
the Start menu under a program group Next, you need to install the certificate of by selecting that option from the Install
called Microsoft System Center Mobile your root CA, any intermediate CAs, and section of the setup screen. In the Gate-
Device Manager. the issuing CA. If you’re using Certificate way Server Setup wizard, after the license
Services, simply browse to the root CA’s screen, you’re prompted for the internal
Preparing For and Installing the virtual directory (\certsrv) from a domain- IP address that the server will listen on for
Gateway Server joined machine, click the Download a CA connections from the Device Management
The next-to-last step is to get the Gate- certificate, certificate chain, or CRL
L link, then Server and the TCP port to listen on. The
way Server up and running. The Gateway click Download CA certificatee and save the default is port 443. Next, you’re prompted
Server lets your mobile devices access file. By default, the file is named certnew.cer. to browse for and select the GatewayConfig
resources such as SharePoint sites or file If your root CA isn’t the CA that issued your .xml file you copied. You then select the
servers inside your corporate network, Gateway Server authentication and root CA
without the need to publish each one or
duplicate them in your DMZ. The Gateway
When entering certificates that you’ve imported. Finally,
you’re prompted to confirm your choices
Server needs IIS 6.0 and the Microsoft .NET the name for the before installing the software.
Framework 2.0 SP1. After installation, you’ll be prompted to
Before you install the Gateway Server, Gateway Server, you run the Add MDM Gateway Wizard. Before
you need to configure the server OS with a
certificate that MDM will use to authenticate
should use its FQDN you do that, however, you need to go back to
a system that has the MDM Administrator
it in SSL sessions. The steps to install the cer- to avoid name Tools installed, launch the Mobile Device
tificate are a bit complex. Start by creating Manager Shell, and enter the command
a Notepad document called GatewayCert conflicts.
Req.inf, and enter the following text in it: Set-EnrollmentConfig
Gateway Server’s certificate, browse to the -GatewayURI <ExternalFQDN>
[NewRequest] issuing CA’s virtual directory and download
Subject="CN=<MDMGatewayServerFQDN>" the certificate chain; save the file, then copy where ExternalFQDN N is the FQDN of the
MachineKeySet=True it to your Gateway Server. This file is named Gateway Server as mobile devices outside
KeySpec=1 certnew.p7b by default. your network see it. When the command
You install the certificates on the Gate- completes, you’ll see some configuration
Replace MDMGatewayServerFQDN with way Server by launching Microsoft Manage- information displayed. Now you can launch
the internal FQDN of the server, not the ment Console (MMC) with the Certificates the Add MDM Gateway Wizard, which you
external FQDN (although it’s possible snap-in, making sure that you specify you do from the MDM Console. In the console,
they’re the same). Next, run the command want the Computer Account option. With expand your instance, then select Gateway
the snap-in loaded, expand the Trusted Management. In the Actions pane, select
certreq -new GatewayCertReq.inf Root Certification Authorities node, right- Add MDM Gateway Wizard.
GatewayCertReq.txt click Certificates, select All Tasks, then The first step in the wizard is to enter
Import. In the Certificate Import Wizard, a name for the Gateway Server. I recom-
Copy the output file, GatewayCertReq.txt, select the file certnew.cer. Repeat this pro- mend you use its FQDN to avoid name
to a member server in your domain and cess for the intermediate CAs by importing conflicts. The next step is to configure
run the command certnew.p7b to the Intermediate Certifica- access points. The first access point is the
tion Authorities node. external IP address that mobile devices
certreq -submit -attrib Next, you need to create the Gateway will use to establish a VPN connection
"CertficateTemplate:SCMDMWebServer Server’s configuration file, which is a short through the Gateway Server. This address
(<instance>)" piece of XML used when you install the must be a public, routable IP address. The
GatewayCertReq.txt GatewayCert.cer Gateway Server. Go to the workstation or second access point is the internal FQDN

32 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


MDM 2008 SP1
Server. (MDM extends the Windows logs
to add its own.) Chances are you probably
can’t access the Gateway Server in the DMZ
because of a firewall issue. Alternatively, you
might have a conflict between the address
pools you configured and the networking
setup of the Gateway Server itself.

Configuring ISA Server, TMG, and


Firewalls
Most of the communication between the
MDM servers and mobile devices uses SSL-
based connections. However, some other
protocols are also used. Depending on how
you deploy MDM, you might need to con-
figure ISA Server or TMG servers, as well as
network and built-in Windows firewalls.
To begin, you need to ensure that the
Device Management Server can commu-
nicate with the Gateway Server. The default
port is 443/TCP (HTTPS), unless you speci-
fied another port during Gateway Server
installation. Mobile devices need to be able
Figure 1: Adding address pools in the Add MDM Gateway Wizard to talk to the Enrollment Server over port
443/TCP, and you’ll need to publish the
of the Gateway Server, which the Device connecting through a VPN will need to Enrollment Server so that it can be seen
Management Server uses to connect to, reach resources on your intranet, includ- from the Internet. Mobile devices also need
and the SSL port, which defaults to 443. ing the Device Management Server. When to be able to communicate with the Device
Next, you specify the address pool from you’ve entered all the necessary informa- Management Server via the IPsec VPN in
which IP addresses are allocated to mobile tion in the wizard, click the Add button. the DMZ over port 8443/TCP (unless you
devices that connect through a VPN. You You can add more gateways if necessary, or specified another port during installation)
can add one or more address pools, as you can click Finish to exit the wizard. and with the Gateway Server to establish
Figure 1 shows, and each can have as To verify that the Gateway Server is IPsec tunnels, which require IP protocol 50,
many as 65,535 addresses (using a subnet configured, launch the MDM Console 500/UDP and 4500/UDP to be opened.
mask of 255.255.0.0). Note that the address and select Gateway Management under You also need to open access to DNS
pools must be consistent with the internal your MDM instance. As Figure 2 shows, and to specific servers, such as email
IP address of the Gateway Server, meaning the Service Configuration State should be servers, using the ports they conventionally
that the subnets and subnet masks must “Running” and the Sync State should be use for VPN access. For clients terminating
be complementary, with no conflict or “Up to date.” If the service isn’t running or in the DMZ, use addresses allocated
overlaps. If required, you can also specify a the state is “Error,” check the MDM logs in from the address pools configured on the
default gateway for clients to access intra- the Windows Event Viewer on the Gateway Gateway Server.
net resources, which might be
necessary if the address pools
aren’t on the same subnet as
the Gateway Server itself.
After the address pool
is configured, you’re asked
for the IP addresses of your
DNS and WINS servers. You
must specify at least one DNS
server. The IP addresses you
provide should be for DNS
servers either in your DMZ or
reachable from it. You should
also enter any routing infor-
mation that mobile devices Figure 2: Verify Gateway Server configuration in the MDM Console

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 33


MDM 2008 SP1
only the E-mail address/User namee and
Enrollment password. A pre-enrollment is
valid for only eight hours by default.
To use the pre-enrollment, the device
owner needs to go into the phone’s Set-
tings menu, select Connections, then
select Domain Enroll to launch the device
Domain Enrollment. When launched, the
owner selects the Enroll option and enters
the E-mail address/User namee and Enroll-
ment password d provided. If the mobile
device isn’t able to automatically find an
Enrollment Server, the device owner is
alerted and can manually enter the public
FQDN. The phone contacts the enroll-
ment server, downloads necessary enroll-
ment information, completes enrollment,
then prompts the user to connect to the
Device Management Server to finish the
configuration. The mobile device needs
to reboot during enrollment and con-
figuration. When the device has completed
enrollment and configuration, the Domain
Figure 3: A completed pre-enrollment request in the Pre-Enrollment Wizard Enroll function on the device is disabled
and enrollment information is displayed,
Enrolling Devices for mobile devices, you might want to as Figure 4 shows. The enrolled mobile
With MDM successfully installed, you can create new OUs and place mobile device device is also visible in the MDM Console,
begin enrolling mobile devices by creating objects in those OUs. If you use alternative as Figure 5 shows.
enrollment requests. In limited deploy- OUs, you must run the PowerShell cmdlet Enrolled and configured devices
ments and in smaller organizations, it’s Set-EnrollmentPermissions and specify establish VPN connections to the
possible to manage enrollment requests each OU to prepare it.
manually, but in larger deployments and Next, you’re prompted to specify the
organizations, you’ll want to install and device’s user, for which you have three
configure the Self Service Portal so users options: Active Directory User, Other user
can manage their own enrollment and identifier,
r and Anonymous User. If you
device configuration. For information select Active Directory User, you can use
about installing the Self Service Portal, Group Policy to manage the mobile device,
see the Microsoft article “Install MDM Self and you can email the selected user with
Service Portal” (technet.microsoft.com/ enrollment information, which makes
library/dd261730.aspx). setup easy for users who already get email
To manually enroll a mobile device, on their mobile devices. I recommend that
launch the MDM Console, expand the you avoid the other options because their
MDM instance you want to manage, usefulness is limited. An example of when
expand the Device Management node, you might use these options is if multiple
then select All Managed Devices. In the people share a mobile device. When add-
Actions pane, click Create Pre-Enrollment ing AD users, you select them from a list by
to launch the Pre-Enrollment Wizard. using the Browse button in the wizard, or
After the introductory step, the wizard you can manually enter their distinguished
prompts you for a name for the mobile name (DN).
device that will be enrolled; this name Next, you need to confirm the choices
must be unique and a maximum of 15 you’ve made and create the pre-enroll-
characters in length. You can override the ment. When the pre-enrollment operation
organizational unit (OU) that a mobile completes, the wizard provides you with
device object is placed into in AD. For information to pass along to the owner
large environments or environments in of the device to complete enrollment, as Figure 4: Enrollment information displayed on
which you use OUs to set different policies Figure 3 shows. The device owner needs an enrolled mobile device

34 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


MDM 2008 SP1
Distributing Software to Mobile
Devices
You can create and distribute software
packages to mobile devices by launching
the MDM Software Distribution Console,
which is available in the MDM Adminis-
trator Tools collection. Before you create
a package, you need to point the console
to a WSUS server running on a Device
Management Server. You then launch the
Create Package Wizard from the console
by expanding the Software Distribution
node, the node representing the WSUS
server, and the Packages node. In the Pack-
ages node, right-click Software Packages to
launch the wizard.
In the wizard, you specify the location
of the .cab file containing the software to
be distributed, along with information
Figure 5: An enrolled mobile device displayed in the MDM Console to sign the .cab file if desired. You can
restrict software on mobile devices to only
Gateway Server, then on to the Device dialog box that appears, click the Add that which is distributed with MDM or
Management Server as well as to other button, then scroll down the list of fold- Group Policy. Other information required
resources on your corporate network. ers and templates displayed in the Policy when creating packages for distribution
Keeping a constant VPN connection Templates picker until you find one called to mobile devices includes which devices,
can drain batteries on mobile devices; mobile.adm. Double-click it. mobile OS versions, and languages the
therefore you might want to advise your After the mobile device policy tem- package is intended for, as well as depen-
users to disconnect the mobile VPN on plate is loaded, you’ll find that addi- dencies and uninstall options. After a
the device when not in use. However, tional policies have been added to package has been created for distribution,
you might need to configure an option the Group Policy Management Editor you can track its installation by running
through Group Policy to let users discon- under both Computer Configuration reports with the Software Distribution
nect the VPN. and User Configuration. In each one, Console.
You can use the Update Device Details you’ll find Windows Mobile Settings
option in the MDM Console to refresh under Administrative Templates in the Complex, Yet Versatile
device information at any time. It’s from the Policies node. On Vista systems, they’re You should now have a good grasp of
MDM Console that you can wipe a lost or under Classic Administrative Templates how to deploy MDM 2008 SP1, as well as
stolen device, or block it from connecting (ADM). Device policies let you control some of its capabilities for mobile device
to the corporate network via the Gateway things such as passwords, device fea- management. Although it’s a reasonably
Server. tures (e.g., camera, Bluetooth), appli- complex product to get up and running,
cations, encryption, VPN connections, MDM offers an excellent platform to man-
Managing Mobile Devices by GPO and software distribution. User policies age security of mobile devices, especially
Mobile devices can be managed in a are limited to EAS settings and the use to enterprises with sophisticated mobile
fashion similar to desktops or laptops of Secure MIME (S/MIME) for secure device management needs. However,
through the use of Group Policy Objects email. MDM can be used to manage just a small
(GPOs). However, you first need to load To apply a policy to mobile devices, number of mobile devices as well—for
an administrative template contain- simply link the GPO to an OU contain- instance, those belonging to key personnel
ing mobile settings. To do so, launch ing objects representing mobile devices. or other employees who have business-
GPMC from Administrative Tools on the Note that the Group Policy modeling critical data on their devices.
machine where you installed the MDM tools don’t work well with mobile device InstantDoc ID 125481
Administrator Tools. Next, right-click settings, but you can use the Windows
Group Policy Objects, select New, and Mobile Group Policy Results Wizard
give the GPO a name to create it. Next, to generate a report of settings that John Howie
edit the GPO and expand the Policies apply to a device or user. This wizard (jhowie@microsoft.com) is a
node under Computer Configuration. is available from GPMC on the sys- senior director in the Online
Services Security & Compliance
Right-click Administrative Templates and tem on which you installed the MDM team at Microsoft, where he
select Add/Remove Templates. In the Administrator Tools. manages cloud security.

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 35


FEATURE

Virtualizing
Active Directory
V
irtualization is all the rage b
because
c of
o the cost savings and flexibility it can
a bring to yo
our
ur
data center. The first step companiess usually take is to consolidate their physical servers Implement
onto host machines as virtual machinesi (VM
(VMs).) C
Company management naturally
to maximize savings by virtualizing as many servers as possible. When companies go
ll wants
virtual domain
through this process, the policy is often “virtual by default”: Applications will be vir- controllers while
tualized unless you can provide a good reason they shouldn’t be virtualized. Can you
virtualize Active Directory (AD)? Should you virtualize your AD forest, or part of it? maintaining
Virtual vs. Physical
fault tolerance
The first and most important question is: “Does Microsoft support virtual domain controllers and security
(VDCs)?” Moving a chunk of your critical infrastructure to an unsupported configuration is definitely
a career-limiting move. Fortunately, Microsoft does support VDCs as part of Microsoft server software
on both Microsoft and third-party virtualization products; you can find complete details of the com- by Sean Deuby
pany’s support policies in the Microsoft article “Microsoft server software and supported virtualiza-
tion environments” (support.microsoft.com/kb/957006). However, there are some important best
practices you must pay attention to. Just because a configuration is supported doesn’t mean you can’t
get yourself in trouble with it. Microsoft’s Problem Resolution Services will be happy to help you—at
a price—but if you follow the recommendations in this article, you won’t need their help.
The next decision is when to virtualize a domain controller (DC) and when you should leave it
physical. Performance isn’t really a factor anymore; the 64-bit hypervisors available from VMware
and Microsoft provide excellent performance compared with physical hardware; for instance, the
Microsoft article “Performance and capacity requirements for Hyper-V” (technet.microsoft.com/
library/dd277865(office.12).aspx) reports results of running Microsoft Office SharePoint Server 2007
in a virtual environment. Virtualization host clusters let you use features such as VMware VMotion or
Hyper-V Live Migration to create highly available DCs more easily than ever. Still, I think there are two
compelling reasons to keep at least some physical DCs in a forest: fault tolerance and security.
AD is fault tolerant because it’s a distributed system. A company might have anywhere from the
recommended minimum of two up to hundreds of DCs providing AD services. The domain or for-
est will survive the loss of one or more DCs because no single DC contains unique information that
can’t be recovered or otherwise reset. In a purely physical AD installation, there’s an implied fault
tolerance provided because each DC is a different physical box, and they’re spread across physical
locations. In a virtual infrastructure, you can’t make these assumptions. For example, you could have
several DCs on a single host, putting them all at riskk if the host fails. Or your company’s standard
virtualization plan might call for all servers to use a SAN instead of local disks, which exposes much
or all of your AD to a SAN failure. (For more information about AD storage, see the sidebar “For DCs,

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 37


VIRTUALIZING AD
installation, be sure the VDC is using the

For DCs, Simple Storage Is synthetic network adapter rather than the
legacy emulated adapter; the synthetic NIC

Better Storage is much faster.


You can use either fixed or dynamically
expanding disks for the hard disk configu-
Virtualization frees systems from residing on a single piece of hardware, giving virtualized ration; Microsoft now claims that Hyper-V
systems a flexibility of location that’s restricted mainly by where the virtual machine’s (VM’s) R2’s dynamic disk performance is nearly
disk files can be accessed from. In a simple network, if you want to use a virtual disk on identical to fixed disks. However, a DC’s
another host, you must copy that multigigabyte file over your network, which takes time disk requirements are fairly static, so after
and can be a complicated sequence of exporting, copying, and importing files. you’ve determined the optimal disk size for
A SAN can simplify this process because the disk files don’t necessarily move—the your DC—by looking at your physical DC’s
machines that access them are what changes. Depending on how it’s configured, in a cen- disk usage—I would recommend creating
tralized SAN an available VM disk file can run in a data center in California, then quickly be a fixed disk of the same size. Write caching
changed so a server in New York is using it. When the SAN is configured for shared storage, on volumes that contain the AD database
you can put multiple VMs into a virtualization failover cluster. and log files is disabled by default to ensure
But should you place your domain controllers (DCs) on a SAN? Active Directory (AD) that any interruption in the I/O process
is a distributed system. Its fault tolerance stems from the fact that its components—for doesn’t corrupt data.
example, its disks—are scattered throughout the enterprise. As you begin to consolidate You should also evaluate deploying
its pieces, it begins to lose its fault tolerance. A DC’s disk needs are modest. It must support read-only domain controllers (RODCs) in
an indexed, sequential database file that’s read from more frequently than it’s written to, your forest. Because an RODC has only a
and is usually less than 10GB in size. But the availability of every AD domain is absolutely read-only copy of AD, with no passwords
essential. by default, it helps mitigate some of the
If your data center rules are that every VM’s disk must be on the SAN, and you lose the security concerns associated with VDCs.
SAN, you’ve lost your domain or even your forest until the SAN is back up. You can argue that RODCs require at least Server 2008.
SANs don’t often fail, but when you’re working with such a basic level of your company’s IT Disable the Synchronize time with host
infrastructure as AD, systems should depend on each other as little as possible. You expect setting for your VDC; DCs have their own
a SAN failure to prevent multiple application servers from functioning, but a completely time-synchronization architecture and
redundant SAN can be extremely expensive and cost-prohibitive. But do you want to lose don’t need or expect any other synchroni-
the ability to log on to the network also? zation. If you’re using Hyper-V, be sure that
With a distributed, straightforward database application such as AD, SAN storage is the virus scanner in the parent partition is
not only unnecessary, but it also increases the risk of a single point of failure. Using local excluding the VHD files of the child parti-
disks, a single DC might fail due to disk failure, but the outage will be isolated to the DC. tions or you might encounter performance
Locating your DC’s AD databases on a SAN makes your forest dependent on the SAN. The problems and error messages when trying
recommendation: Keep it simple. Keep it local. to start up VMs.
InstantDoc ID 125463 A VDC can be deployed in the same
manner as other VMs—typically, with a
management product such as Microsoft
Simple Storage Is Better Storage.”) There- is dwarfed by the potential cost to your System Center Virtual Machine Manager
fore, when you’re designing a virtualiza- company of losing an entire domain. (VMM) or VMware vCenter. If you need to
tion plan for your AD forest, look closely run a highly automated DC deployment,
at the supporting infrastructure and work Building and Deploying VDCs the Dcpromo process can be scripted
with the virtualization team to eliminate After you’ve decided what to virtualize, it’s to run as a post-deployment option; see
any single points of failure. I’ll talk about time to configure your VDCs. From a purely the Microsoft articles “Configuring the
security reasons to not virtualize your DCs technical viewpoint, this is a straightfor- Automatic Installation of Active Direc-
later in this article. ward process. If your DCs run Windows tory” (tinyurl.com/22umult) and “How to
I recommend leaving at least two physi- Server 2008 or Server 2008 R2, consider Configure Guest Operating System Profile
cal DCs in each domain, one of which using Server Core for the OS because of Scripts” (tinyurl.com/2fzotwg).
should be the PDC Flexible Single-Master its reduced attack surface. Choose proces-
Operation (FSMO) role holder. This archi- sor and memory requirements to emulate Administering VDCs
tecture ensures that if your entire virtual your current configuration—or what you’d The most important technical principle to
infrastructure becomes unavailable, you’ll like your current configuration to be if you remember when administering VDCs is that
still have a fully functional domain with could have afforded it. Ensure that the you don’t want to pull any virtualization
distributed fault tolerance. It’s up to you to virtual machine enhancement for your tricks on a VDC that the directory service
provide a sense of perspective: The cost of virtualization solution (e.g., VMware Tools) isn’t aware of. What does this mean? Virtu-
keeping two servers on physical hardware is installed on the VDC. If it’s a Hyper-V alization lets you do interesting and useful

38 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


VIRTUALIZING AD
things with a VM that you can’t do with a service that a restore has taken place. This Considerations for Virtualized Domain
physical machine, such as take snapshots process resets the AD database’s invocation Controllers” (tinyurl.com/ydw8b5w).
that let you quickly roll a system back to ID, which causes the DC’s replication Should you even back up every VDC?
a previous state, or restore the entire VM partners to recognize a restore has been I’d argue that for small forests, you should
from a backup of the image file, or make take system-state backups of two DCs in
copies of the image file for safe keeping or Moving a chunk every domain, period. Larger forests with
reuse. Don’t do these things with a VDC, or large (over 5GB) AD databases (ntds.dit)
you’ll be setting yourself up for that Micro- of your critical or geographically dispersed DCs should
soft support phone call.
Why? Remember, AD is a distributed
infrastructure to have more, following the principle of keep-
ing a backup on the same LAN as the
system. If AD resided on only one DC, an unsupported DCs, to speed the process of performing a
these operations might be safely possible. Dcpromo from media. If you should lose
But because the multiple DCs in a domain configuration is a VDC for some reason, there are faster
or forest must communicate with each
other, each DC must therefore have a cor-
definitely a career- options for recovery than restoring one
from backup. (For other options, see the
rect understanding of every other DC’s limiting move. DC Recovery page of my Active Direc-
state. Virtualization capabilities such as tory Recovery Flowchart at tinyurl.com/
snapshots, image-based restores (with one Fortunately, adrecovery.)
exception), and cloning don’t pass their
state changes to the directory service on
Microsoft does VM snapshots. Restoring a VDC using
VM snapshots isn’t supported. These snap-
the target VM; it has no idea what’s been support VDCs. shots (not to be confused with directory
done to it and therefore neither do its rep- snapshots taken with Ntdsutil or volume
lication partners. This condition can wreak performed, so replication coming from the snapshots taken by VSS) are a point-in-
havoc in your domain or forest. Let’s review DC is valid. time capture of a VM’s state. Restoring a
what virtualization operations are sup- Client backups. The other supported VDC to its previous state by using a saved
ported for DCs, and which aren’t. method of backing up a VDC is by run- snapshot causes the same inconsistency
Image-based (aka host-based) back- ning client backups, just as if it were a problems in your directory as an image-
ups. Restoration from image-based back- physical DC. This process isn’t as speedy based backup.
ups, in which you copy or otherwise back as a host-based backup that uses the VSS Cloning. Cloning a DC by duplicating
up the virtual hard disk files that contain the writer, but it has an advantage over many a VDC’s hard disk file isn’t supported. If
VDC, isn’t supported (with one exception). current host-based backup applications the cloned VDC comes online in the same
In this kind of operation, the OS and AD because you can restore individual files on forest as the original, and you resolve
database are returned to a previous state the guest. Most host-based backup applica- the immediate problems with identical
without resetting the invocation ID (the tions don’t support file-level restore, but server names and IP addresses, you’ll
version of the local database) so the other as they become more sophisticated (for encounter problems with duplicate direc-
DCs don’t know the target DC has been example, Microsoft System Center Data tory service agent (DSA) GUIDs, duplicate
restored. This situation violates AD’s data Protection Manager 2010), they, too, can SIDs, duplicate Relative Identifier (RID)
integrity and can create lingering objects pools—and worse if the cloned VDC is a
or an update sequence number (USN)
rollback scenario; you can find out more
Frankly, I believe RID master—secure channel problems,
machine account password updates . . . you
about this problem in the Microsoft article provisioning and just don’t want to go there.
“How to detect and recover from a USN Physical to virtual (P2V) conversion.
rollback in Windows Server 2003” (support promoting a new P2V conversion is supported, but only if the
.microsoft.com/kb/875495).
The exception is when the guest OS
VDC is safer and source physical DC is offline; VMM 2008
enforces this requirement. DC P2V conver-
is running Windows Server 2003 or later just about as fast as sion with the source DC online creates a
and the backup utility on the host, such as problem similar to cloning. Frankly, I believe
Windows Server Backup, calls the guest’s performing a P2V provisioning and promoting a new VDC is
Volume Shadow Copy Service (VSS) writer
to ensure the guest is backed up properly;
conversion on an safer and just about as fast as performing a
P2V conversion on an existing DC.
Windows 2003 was the first OS to include existing DC. Pausing. Pausing a VDC (i.e., putting
this service. The guest VSS writer takes it in suspended animation) is actually OK,
a volume snapshot of the guest, which restore individual files from guest OSs that just “do not pause the domain controller
ensures data integrity of the backup. In the support VSS. Microsoft has documented its for long periods,” to quote the Microsoft
event of a restore, the VSS-aware restore best practices for backing up and restoring article “Considerations when hosting
program notifies the guest’s directory VDCs in the article “Backup and Restore Active Directory domain controller in

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 39


VIRTUALIZING AD
virtual hosting environments” (support Console access. DC administrators
.microsoft.com/kb/888794). What hap- should be granted console access to VDCs Learning Path
pens when you pause a DC? To its rep- in the same manner they would have Q&As on Active Directory and virtualization:
lication partners, it suddenly falls off the access to physical DCs via an out-of-band
“Q. What Active Directory (AD) domain mode do I need
network—the equivalent of pulling out console utility that doesn’t require an
to be in to use System Center Virtual Machine Man-
the network cable. When the paused DC installed OS. In a VMware shop, you can ager (SCVMM) 2008 R2?” InstantDoc ID 125408
comes back online, time has suddenly use vCenter Server to manage console
“Q. I’m using System Center Virtual Machine Manager
jumped forward. Its Kerberos tickets access, and in a Hyper-V installation you
(SCVMM). How can I delete an emulated NIC from
have expired, its machine passwords can use Authorization Manager (AzMan) a virtual machine (VM) within a script?”
might need to be updated, and if it’s been or VMM’s Self-Service Portal. InstantDoc ID 125421
paused longer than the tombstone life- DC awareness. Full VDCs hold the
“Q. How does dynamic memory in Hyper-V in Win-
time, it can no longer replicate and must “keys to the kingdom,” and personnel with dows 2008 R2 SP1 work?” InstantDoc ID 125409
be rebuilt. I’d suggest pausing be used administrative access to the host have the
“Q. Is dynamic memory a good solution for all types of
sparingly and not for extended periods ability to access and possibly disrupt activ-
virtualized application?” InstantDoc ID 125426
of time. ity of the VDC on that host. It’s essential
Standardized configuration. Because that all personnel with host access be “Q. Can I roll back Active Directory (AD) to an AD
snapshot?” InstantDoc ID 125471
a VM requires a different hardware trained to understand the implications of
abstraction layer (HAL) and a different having a DC on their host servers. “Q. I need to make a major change to the schema
device driver set than what you’re using RODCs.You can reduce some of the secu- of my Active Directory (AD). If it goes wrong,
can I perform an authoritative restore to reset?”
for your physical DCs, VDCs require a rity risks associated with VDCs by deploying
InstantDoc ID 125456
separate OS build standard. Most com-
panies have at least two standard build I recommend “Q. How can I estimate the size of my Active Directory
(AD) based on a number of objects?”
configurations, one for widely deployed
hardware nearing its end of life, and one leaving at least two InstantDoc ID 101617

for new hardware beginning a broader


adoption. VMs, because of their HAL and
physical DCs in More articles about using virtualization:

device driver set, will require a third build each domain, one “Going Virtual with SharePoint 2010,”
InstantDoc ID 125111
configuration.
of which should be “Going Virtual with Exchange 2010,”
VDC Security the PDC FSMO role InstantDoc ID 104653
Security best practices for VDCs are a com- “Make SQL Server Sing on Hyper-V,”
bination of the established best practices holder. InstantDoc ID 103658
for DC security, such as physical security, “The Virtualization Stakes,” InstantDoc ID 103476
and virtualization security, such as isolated RODCs instead of full DCs wherever possi-
“Understanding Microsoft’s Virtualization
networks. One hazard of virtualizing DCs ble. RODCs don’t perform any writes to AD,
Technologies,” InstantDoc ID 103245
is that your directory services team and and by default user and machine account
virtualization team probably aren’t familiar passwords aren’t replicated to them. So, for “Hyper-V Live Migration: A Step-by-Step Guide,”
InstantDoc ID 125262
with each other’s security practices. These example, if a virtual RODC’s hard disk file is
teams must sit down together and review stolen, the attacker can’t crack passwords
how to accomplish both teams’ require- out of it. A corrupted RODC hard disk file
ments. Here are a few examples of impor- can’t harm the rest of the forest, nor will any article “Running Domain Controllers in
tant security considerations. changes made to it be replicated to the rest Hyper-V” (tinyurl.com/2fm7hd8). Don’t do
Virtual disk security. Access to the of the forest. This situation doesn’t mean a anything to your VDCs that their directory
VDC’s virtual disks is the same as granting compromised RODC is harmless; possession services can’t comprehend, and be aware
physical access to a physical DC; if you will reveal organization structures, DNS that the very advantages virtualization brings
grant access, you can’t guarantee secu- records—in general, lots of information you to VDCs also mean that their security is more
rity. Access to these virtual disk files must don’t want to share. complicated.
be carefully protected, especially because InstantDoc ID 125464
more people will require access to them Do Your Homework
as a result of virtual host administration Virtualizing some of your AD infrastructure
needs. Therefore, host admins, enclosure might yield corporate benefits, but there’s Sean Deuby
(sdeuby@windowsitpro.com) is a
admins, SAN storage admins, and data cen- practically no benefit to the AD administra- contributing editor for Windows
ter admins are all groups that might need tor. It can be done though, and Microsoft IT Pro, a senior analyst with Plat-
to be added to the list of personnel that supports it, but you must do your homework form Vision, and former technical
lead of Intel’s core directory ser-
are flagged as having access to corporate before you begin. The key Microsoft VDC vices team. He’s been a directory
directory information. documentation can be found in TechNet services MVP since 2004.

40 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


FEATURE
Essential Windows Server 2008 R2
Features for
Managing Your
File Server
Infrastructure

O
ne of the first articles I wrote for Windows IT Pro—“Let’s Get Organized: File Server
Basics” (InstantDoc ID 95354)—discussed some time-tested methods for getting the
Four tools in
most out of your file server. If your data is scattered all over your network, or your file
system security is all over the place, or your folder structure is a mess, that article pro-
the new OS
vides some good ideas for organizing your file server. Now that Windows Server 2008 bring you
R2 has been out in the wild for some time, I thought I’d revisit this topic, update it for
Microsoft’s newest OS, and talk about some of the great tools you can use for migration and file-server
greater control
management. over your file
First, Migrate! structure
Before you can even get started using your new Server 2008 R2 server, you need to migrate your data
from the old server. Don’t underestimate this process. I’m always surprised by how many adminis-
trators don’t take the time to plan their migration. Many servers have hundreds of gigabytes—if not by Eric B. Rux
terabytes—of data that can take a long time to copy from one server to another. If you use drive map-
pings (most companies do), you’ll need to change them to reflect the new file server name (unless you
name it the same as the old server). You also need to consider that many users have created their own
shortcuts to the UNC path (\\Server\Share), and that
yyou’ll invalidate all their links if you change the name
of the file server. These are just some of the challenges
yyou’ll face when your shiny new server arrives on your
front doorstep.
Fortunately, you don’t have to go it alone. The File
Server Migration Toolkit (FSMT) is a free Microsoft
tool that helps you migrate any Microsoft file server
to Server 2008. You can find it at www.microsoft.com/
downloads/details.aspx?FamilyID=d00e3eae-930a-
42b0-b595-66f462f5d87b. The FSMT comes in both
32-bit and 64-bit versions, so be sure to download
the correct file. After you download the 1.3MB file,
yyou’re ready to test it in your lab. I highly recommend
kicking the tires on a non-production server before
going for broke on something as important as your
company’s files.
The application walks you through the complete
migration process, from setting up shares on the new
sserver to ensuring that all the data has been copied
b
before going live. It even shuts down the old file shares
w
when the time is right. Figure 1 shows you what this
Figure 1: The migration process p
process looks like.

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 41


MANAGE YOUR FILE SERVER
instead of the entire volume. The settings
are pretty granular, including distinctions
for hard and soft limits. Setting a hard limit
prevents the user from using more space
than he or she is allowed. A soft limit is only
a “warning” and doesn’t actually prevent the
user from using more space than allocated.
Multiple notification methods—including
email, event log entry, custom report, and
a script of your choice—keep you informed
about the quota status. The quota section is
by far the easiest area of FSRM to understand
and configure: You simply click Quotas in
FSRM, choose Create Quota, enter the path
(either an entire volume or a specific folder),
select a predefined quota template, and click
Create. If the built-in Quota Templates don’t
meet your needs, you can create your own in
the Quota Template area.
Another new feature worth mentioning
is File Screening Management, which lets
you block certain types of files from being
stored in a specific folder. For example,
the marketing department probably has
Figure 2: Sample reports a business case for storing movies and
videos on its departmental folder. Other
One extremely cool FSMT feature is the For example, to generate a report on dupli- departments, however, might not have
Distributed File System (DFS) Consolida- cate files, you’d walk through these steps: that same business need, and preventing
tion Root, which lets your users continue 1. Open FSRM. them from storing such large files on the
to use their old UNC paths even after the 2. Right-click Storage Report Man- server can save gigabytes of space. Server
old server is long gone. For a walkthrough agement, and choose Generate Reports 2008 R2 comes with 11 predefined, built-in
of a sample migration, check out the web- Now. (You can schedule this procedure by File Groups, but you can create your own if
exclusive sidebar “A Simple File Server choosing Schedule a New Report Task.) the file type you want to block isn’t listed.
Migration” (InstantDoc ID 125461). 3. Add the folder or partition that you Some of the built-in File Groups are Audio
want to analyze. and Video Files (37 file types), Executable
Who’s Using the Storage? 4. Click Duplicate Files. Files (20 file types), and Image Files (18 file
Setting up a file server has always meant 5. Choose the report format that you types). Figure 3 shows a few of the provided
one thing: “Build it, and they will fill it up.” want (e.g., DHTML, HTML, XML, CSV, Text). File Screen Templates.
It's a universal truth. Users will still manage 6. Click OK to generate the report. The FSRM installation process is quick
to take all the space on the server if you let and easy—once you find the silly thing.
them. Unfortunately, you have no real idea The report is neatly laid out, displaying the You install the application from Server
of the types of files that are stored on your duplicate files in descending order with the Manager, Role Services near the bottom of
drives. To get that “look” into your file server larger offenders at the top of the page. the page. (Don’t confuse Role Services with
that you’ve always wanted, check out the FSRM also lets you set quotas. And Roles at the top of the screen.) When the
File Server Resource Manager (FSRM). unlike Windows Server 2003’s Disk Quota installation is complete, you can find the
In just a few minutes, you can have feature, Server 2008 R2’s implementation Microsoft Management Console (MMC)
reports about exactly the kind of data that’s lets you set quotas on individual folders FSRM snap-in under Administrative tools.
stored on the file server—for example,
what kind of files (e.g., documents, movies,
music), where the data is located, and who
owns the data. A few examples of the built-in
HTML-based reports are Duplicate Files,
Large Files, Least Recently Accessed Files,
Most Recently Accessed Files, and Files by
Owner. Figure 2 shows an example of the
kind of reports that you can generate. Figure 3: File Screen Templates

42 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


MANAGE YOUR FILE SERVER
Clean Up that Clutter!
Access Based Enumeration (ABE) is a
relatively new technology in the Microsoft
world, but it’s one that’s been around for
quite a while. I can still see the puzzled
look of those Novell administrators when I
told them that my users could see (but not
access) folders that they didn’t have per-
missions to. It wasn’t until a special out-of-
band download for Windows 2003 that this
feature came to Windows file servers.
What exactly is ABE? In short, ABE
hides folders that users don’t have at least
Read access to. Figures 4 and 5 show a
simple before-and-after example of how
ABE can clean up your file server and make
Figure 4: Before ABE file server cleanup
it easier for your users to navigate through
Windows Explorer.
ABE was available for Windows 2003 only
via a separate download. But Server 2008
includes ABE and is ready to go out of the
box. You don’t have to download it, install it,
or even enable it. Folders that are shared are
ABE-enabled by default. If you decide that
you don’t want to use ABE on a particular
folder, you can disable it on a share-by-share
basis in Server Manager. Once Server Man-
ager is open, expand Roles, File Services,
Share and Storage Management. Choose
Figure 5: After ABE file server cleanup the share for which you want to disable ABE,
right-click it, and choose Properties. Click
How Important Is the Data? Next, you create a rule that defines Advanced, then clear the Enable access-
All files have levels of importance, and exactly what each level of Confidentiality based enumeration n check box.
some need to be handled a certain way. means. In my hypothetical example, I want
Unfortunately, the only ways to differentiate to make sure that all files dealing with NASA’s Go Forth and Organize!
between files have been the file type (by Space Shuttle are kept secure. So, I can cre- You’d think that serving up files would be
extension) and the date they were last ate a rule that marks any file containing the the least of our worries in today’s high-tech
accessed. This limitation severely affects word “shuttle” as Confidential; High. server rooms. But as data stores get bigger
your ability to manage files based on their The final step in this simple example is and regulations get tighter, we need to learn
actual usage. Wouldn’t it be nice if you could to create a task that acts on the files that fall to use the built-in tools that can make our
ensure that files with personal data were within a Classification Rule. I can create a jobs easier. If you know of a server that’s
stored on an encrypted drive? Wouldn’t you task that moves files that are Confidential; completely disorganized, try the techniques
love to ensure that your most important files High h (those with the word “shuttle” within I discussed in the first article, then enhance
are stored on high-availability storage? the text of the file) to a more secure loca- what you offer your users by using these
The answer lies in Server 2008 R2’s File tion. You could set up a similar process new, powerful Server 2008 R2 features.
Classification Infrastructure (FCI). The FCI for files that contain a United States Social InstantDoc ID 125461
process isn’t exactly intuitive, but once Security Number (SSN), or even for files
you’ve played with it for a while, it starts to that haven’t been accessed for a specified
make sense. amount of time.
Eric B. Rux
(ebrux@whshelp.com) is a
The first step is to create one or more Moving the file is just one of the actions contributing editor for Windows
Classification Properties. These can be that can be taken on a file that meets the clas- IT Pro, is cofounder of WHSHelp
.com, and writes a monthly
confusing the first time you set them up, sification criteria—as long as you’re versed column at svconline.com/
but essentially they’re the “tag” you’ll in scripting. The plan is that Microsoft and connectedhome/windows
place on a file. For example, I can set a even third-party vendors (e.g., SAN manu- homeserver. Eric teaches the
Microsoft Certified Systems
level of Confidentiality as either Low, facturers) can tap into the FCI API. In the Administrator (MCSA) program at
Medium, or High. meantime, you’re a bit limited. a tech college.

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 43


FEATURE

and

in
PowerShell

S
omet etim
iss, th
imes
her
es whe
ere ar
ere
hen some
someetth
so
are ceerttaaiin co
are
hin
hin
cond
cond
ing go
ndit
itio
it
goes wro
ionnss tha
rong
h t yo
ng in Wi
ng
youu ca
Window
nd
n
can anti
an
dow
ows
ntici
ws P
ticipa
ticip
Po
paaate
owweerS
erS
te aand
te nd
She
hell
d poten
l , it iisn
otten
enti tial
ti
sn’t
sn ’t a bad
allly d
ally
d thin
deeal wi
with
hing.
hing Th
ng Thaat
th, such
th
th,
at
such aas
su
How to use the
a mi
miss
migh
migh
mi
ssiing file
ghtt wa
want
file or a co
ntt tto
o pr
prom
comp
ompt
mput
mp
mpututer
er tth
pt the use
hat ca
hat
serr fo
can’
n’t
’t be
be ccon
forr an act
cti
tion
onta
tact
tac
ta
ion to
cted o
cted
to take
ove
verr th
thee ne
k or just logg th
netw twork.
thee er
k. IIn
erro
n res
respon
ror so th
onsse, yo
you
hat you can
u Trap and Try…
trry again laater. PowerShell makes this possibl b e through a scheme called error trappingg Catch…Finally
and handliing.
constructs
First, You Need an Error
To trap and handle an error, you actually need one to occur. Technically, in PowerShell terminology,
youu need an exception to occur. That can actually be a little tricky to do, believe it or not. For example, by DDon Jones
try running th
he followiing command. It will fail, but pay attention to what happens:

Get
t-WmiObjec
Object
ct Win32
3 _BIOS
OS -comp
co p 'localhost','not-here'
oca ost , ot e e

First, you should see the Win32_BIOS instance from your local computer. Then, you should see an
error message (unless you actually have a computer named not-heree on your network). Think you’ve
seen an exception? Wrong. In PowerShell, just because you’ve seen an error message doesn’t mean
an exception was created. You can’t trap or handle an error message. You can only trap and handle
exceptions.
What you just saw was an example of a non-terminating exception. That is, an exception really did
happen, but it wasn’t so bad that the cmdlet needed to stop executing. So the cmdlet basically held
the exception deep inside, suppressing its feelings of failure, and continued trying to do what you’d
asked. You can’t help the cmdlet if it isn’t going to be more open with its feelings. In other words, you
can’t trap and handle non-terminating exceptions. Many of the problems a cmdlet can run into will
typically generate a non-terminating exception. That’s because cmdlets don’t want folks to start calling
them crybabies, so if something moderately bad happens, they just shut up and keep going.
This cmdlet behavior is controlled by a built-in PowerShell variable named $ErrorAction
Preference. You can view its contents by simply typing the variable’s name at the command line:

$ErrorActionPreference

By default, it’s set to Continue, which is what cmdlets do when they encounter a non-terminating
error—they keep going. The cmdlets also display error messages by default, but you can shut them
off by setting $ErrorActionPreference to SilentlyContinue. Try it:

$ErrorActionPreference = "SilentlyContinue"
Get-WmiObject Win32_BIOS -comp 'localhost','not-here'

This time, the failure occurred but not a word was said about it. Our cmdlet just bit its lip and kept on
going, not so much as whimpering about the error. Now, this is where a lot of new PowerShell users go

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 45


ERROR TRAPPING AND HANDLING

Listing 1: A Trap Construct


Function Do-Something {
Trap {
Write-Host 'Error in function' -fore white -back red
Continue
}
Write-Host 'Trying' -fore white -back black
gwmi Win32_BIOS -comp localhost,not-here -ea stop
Write-Host 'Tried' -fore white -back black
}

Write-Host 'Starting' -fore white -back green


Do-Something
Write-Host 'Ending' -fore white -back green

wrong, so I need you to picture me standing


up on a table and screaming, “Do not set Figure 1: Results from the Trap construct in Listing 1
$ErrorActionPreference to SilentlyContinue
just to make the error messages go away.” stop, which tells the cmdlet to turn a into a problem trying to contact not-here,
Error messages are, by and large, good non-terminating exception into a terminat- so an exception occurred. The -ea stop
things. They tell us what’s broken. They’re ing exception—and terminating exceptions parameter turned that into a terminating
like the nerves in your fingertips that tell are ones you can trap and handle. For this exception, so PowerShell looked for a Trap
you the stove you’re about to touch is very example, you’d run the command construct within the same scope. It found
hot. People who have problems with those one inside the function and executed it.
nerves often burn themselves. We usually Get-WmiObject Win32_BIOS That’s why Error in function displayed. The
wantt to see error messages. What we don’t -comp 'localhost','not-here' -ea stop trap finished with the Continue statement,
want to see are the error messages that we which kept the execution inside the same
can anticipate and deal with on our own. (Although this command wraps here, you’d scope (i.e., inside the function), and Tried
enter it all on one line in the PowerShell was displayed. Finally, the function exited
Just Cry Out Loud console. The same holds true for the next and Endingg was displayed.
When you anticipate a cmdlet running into command that wraps.) Traps can be tricky because they are
a problem that you want to deal with, you their own scope. Specifically, they’re a child
need to tell that cmdlet to stop bottling Tricky Traps of whatever scope they live in. Consider
up its emotions. You’re not doing this for The first way you can trap an error is to the modified Trap construct in Listing 2.
every cmdlet across the shell, but just for use a Trap construct. Listing 1 shows an Figure 2 shows the output from this version,
a specific cmdlet that you know you can example of a trap that’s defined within a and I want you to follow the value of the
handle. Since you don’t want to make a function. This code works in PowerShell 1.0 $test variable.
global behavior change, you should leave as well as PowerShell 2.0. The script set the $test variable to One,
$ErrorActionPreference set to Continue. Figure 1 shows the output from the code in and that’s displayed in the Trying One
Instead, you can modify the error action for Listing 1. As you can see, PowerShell first dis- output. When the exception occurred, the
just one cmdlet. played the line Starting.
g It then executed the trap set the $test variable to Two. How-
Every cmdlet in PowerShell sup- function, which displayed the line Trying. ever, when the trap exited, the output still
ports a set of common parameters, one Next, PowerShell ran Get-WmiObject, displayed Tried One. What happened? As
of which is -ErrorAction (which can be which can be abbreviated as gwmi. It first a child scope, a trap can access its parent’s
abbreviated -ea). It accepts the same values ran this cmdlet against localhost, and you variables for reading only. So, when the
as $ErrorActionPreference, including can see the Win32_BIOS output. But it ran trap tried to modify $test, it actually created

Listing 2: A Problematic Trap Construct


Function Do-Something {
Trap {
Write-Host 'Error in function' -fore white
-back red

A $test = 'Two'
Continue
}
$test = 'One'
Write-Host "Trying $test" -fore white -back black
gwmi Win32_BIOS -comp localhost,not- here -ea stop
Write-Host "Tried $test" -fore white -back black
}

Write-Host 'Starting' -fore white -back green


Do-Something
Write-Host 'Ending' -fore white -back green
Figure 2: Results from the problematic Trap construct in Listing 2

46 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


ERROR TRAPPING AND HANDLING

Listing 3: An Alternative Trap Construct


Trap {
Write-Host 'Error in script' -fore white -back red
Continue
}
Function Do-Something {
Trap {
Write-Host 'Error in function' -fore white -back red
Break
}
Write-Host "Trying" -fore white -back black
gwmi Win32_BIOS -comp localhost,not-here -ea stop
Write-Host "Tried" -fore white -back black
}

Write-Host 'Starting' -fore white -back green


Do-Something Figure 3: Results from the alternative Trap construct in Listing 3
Write-Host 'Ending' -fore white -back green
shell will then look you put the command that might fail in the
to see if a trap exists Try block and the command that deals with
a new local $test variable, which means in thatt scope, and I have indeed defined the failure in the Catch block. You can even
that $test from the parent scope (i.e., the one. add a Finally block that will execute whether
function) was never changed. This is a real Figure 3 shows what the results look or not an error occurred.
bummer if you want your trap to modify like. When the exception occurred in the Within the Catch block, you can do
something so that your script can continue. function, its trap executed and “broke out almost anything, including writing to log
There are ways to remedy this. For example, of” the function. The exception was passed files, logging an event log entry, and send-
you can replace the command in callout A to the script, so its trap executed. Notice ing email messages. It’s even possible to
in Listing 2 with the following command to that Triedd isn’t displayed. That’s because create multiple Catch blocks, each of which
change the variable’s contents: the function exited before that command deals with a certain kind of error. In Power-
could run. All you see is Ending, g which Shell 2.0, you can run the command
Set-Variable -name test is the last line in the script. Although the
-value 'Two' -scope 1 script’s trap concludes with the Continue Help about_Try_Catch_Finally
statement, all it does is keep the shell’s
The -scope parameter treats scope 0 as execution in the same scopee (i.e., the script). for more details.
the local scope, which is within the trap. The shell can’t dive back into the function;
The next scope up—the trap’s parent—is it broke out of the function and is out for What’s Your Preference?
scope 1. So by changing testt in scope 1, good unless you call the function afresh. In PowerShell 1.0, you must use the Trap con-
you’re modifying the variable that had As this example shows, you can include struct to trap and handle errors. In Power-
been set to One. Note that when you use more than one Trap construct in a script. Shell 2.0, you have a choice between the
the Set-Variable cmdlet (as well as the other This means you can set different traps Trap and Try . . . Catch . . . Finally constructs.
-Variable cmdlets), you don’t use a dollar for different types of errors. To get more I prefer using the latter. Not only is the Try
sign ($) when specifying a variable’s name. details, run the command . . . Catch . . . Finally construct easier to use,
There’s one more tricky bit about traps but it also keeps the error-handling logic
that I want to share. Take a look at the Help about_Trap closer to the location of the command that
alternative Trap construct in Listing 3. might fail. If you’re using PowerShell 1.0
What I’ve done is defined a trap within the if you’re using PowerShell 2.0. Although and you often need to catch and handle
script itself, prior to the function’s defini- PowerShell 1.0 supports the Trap construct, exceptions, you might consider upgrad-
tion. I’ve also modified the trap within the there isn’t a Help file for it. So, if you’re ing to PowerShell 2.0 so that you can take
function to use a Break statement rather using PowerShell 1.0, you need to access advantage of this new error trapping and
than a Continue statement. The Break the information at technet.microsoft.com/ handling tool.
statement forces the trap to exit the scope en-us/library/dd347548.aspx. InstantDoc ID 125327
in which the error occurred (in this case,
the function) and to pass the exception to Try a Different Approach Don Jones
the parent scope, which is the script. The Frankly, I find the Trap construct and its (powershell@concentratedtech
scope rules pretty con- .com) is the author of more than
Listing 4: A Try . . . Catch . . . Finally Construct 35 books and is a speaker at
fusing. But fortunately,
Try { technology conferences such as
gwmi Win32_BIOS -comp localhost,not-here -ea stop PowerShell 2.0 provides Microsoft TechEd and Windows
} Catch { an alternative: the Try Connections. He’s a multiple-year
Write-Host 'Something bad happened' -fore white -back red
} Finally { . . . Catch . . . Finally con- recipient of Microsoft’s MVP and
Write-Host 'Glad that is over' is technical guide for PowerShell
} struct, which Listing 4 at www.windowsitpro.com/go/
shows. As you can see, DonJonesPowerShell.

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 47


FEATURE

Setting Up

D
ist
is
str
trib
bu
uttin
ing
ng cert
cceert
rtiffic
icat
cates
ates
tes to Wi
Wind
ndow
do
dowss OS
ow OSs fr
OSs from
om aan
om nAAccti
cttiivee D
Dir
i ec
irecto
tory
ryy ((AD
AD)) en
AD ente
e teerp
pri
rise
isee cer
ceer
e-
er-
Windows Server tifi
ifi
fication
i autthorit ity ((CA
CA)) is relati
CA l ivelly simple and can be automated using Gr G oup Poli licy
2008 R2 lets you Ce t cate Auto
Certificate utoeenrollment
o e t after
a te a PKI iss in place.
p ace. But ut to issue
ssue certificates
ce t cates to devices
that don’t have accounts in AD, admins must manually create Public-Key Cryptogra-
de ces

issue certificates phy Standards (PKCS) requests and install certificates on those devices. This can be a
time-consuming task for organizations with hundreds of devices that aren’t part of AD.
to network If you have a large network with many network devices that need to be issued with a certificate
devices that must also be trusted by Windows clients, Windows Server 2008 R2’s Network Device Enroll-
ment Service (NDES) provides a solution for issuing and managing certificates. NDES is Microsoft’s
implementation of the Simple Certificate Enrollment Protocol. SCEP is an Internet-Draft standard

by Russell Smith developed by Cisco Systems that helps solve the problem of manually requesting and installing cer-
tificates by enabling devices to enroll for x509 v3 certificates from any CA that supports SCEP. NDES
in Server 2008 and later includes some welcome improvements over the old SCEP add-on, such as
the ability to renew certificates using a previously issued certificate to validate the request.
This article provides an overview of how to set up NDES as part of an already existing PKI, and the
steps for issuing a network device with a certificate. Due to the complexity of PKIs and the varying
requirements for different scenarios, you should carefully study “Microsoft SCEP Implementation
Whitepaper” (www.microsoft.com/downloads/details.aspx?familyid=E11780DE-819F-40D7-8B8E-
10845BC8D446) for how to implement NDES. You should also test thoroughly in a lab environment
before deploying NDES in your production environment.

SCEP in Windows Server


NDES is a native component of Server 2008 (Enterprise and Datacenter editions only) and later. It can
be installed on a machine that’s running a standalone CA or on a dedicated server that communicates
with an issuing enterprise CA. The NDES server role shouldn’t be installed on a device that’s running
the enterprise CA role, to minimize the attack surface and protect the CA’s private key.
NDES is intended for organizations that already have a PKI in place and want to issue certificates
to network devices, such as routers and firewalls, to improve security by protecting network traffic with
IPsec. For example, this could include IPsec VPNs between routers or from notebooks to network edge
devices. Not all devices support SCEP, so you should check with the equipment manufacturer.
Previous implementations of SCEP were available in the Windows Server 2003 Resource Kitt or as a
downloadable add-on for Windows 2000 Server, but differ from what’s outlined in this article. If you’re
working with versions of Windows earlier than Server 2008, you should check Microsoft’s website,
where you can download the add-on for Windows Server 2003 (www.microsoft.com/downloads/
details.aspx?familyid=9f306763-d036-41d8-8860-1636411b2d01). For additional information, see

48 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


NETWORK DEVICE ENROLLMENT SERVICE
“Setting Up a VPN that Uses Certificates,” domain-joined Windows clients. You’ll need 4. In the Duplicate Template dialog
InstantDoc ID 49738. an AD enterprise CA already in place, with a box, select Windows Server 2008 Enter-
root CA configured and taken offline. prise and click OK.
NDES in Windows Server 2008 R2 5. In the Properties dialog box on
Server 2008 R2 and Server 2008 SP2 include Prerequisites the General tab, enter NDES Exchange
changes to NDES that let administrators Before installing NDES, we need to create Enrollment Agent (Offline request) into the
more easily request and renew expired cer- two domain user accounts: NDES_Admin Template display name box.
tificates. Single Password Mode, which can and NDES_ServiceAccount. The NDES_ 6. Switch to the Security tab and click
be enabled on the NDES machine by setting Admin account is used for installing the Add to assign permissions for the NDES_
the HKEY_LOCAL_MACHINE\Microsoft\ NDES server role and requesting an enroll- Admin group. Enter NDES_Admin in the
Cryyptography\MSCEP\UseSinglePassword ment password. The NDES_ServiceAccount box and click OK.
REEG_DWORD registry value to 1, lets is used to run the service and is specified 7. Set permissions on the Security tab
adm mins request a password for certificate during the setup process. for NDES_Admin to Read d and Enroll.
enrrollment that doesn’t expire and is stored Add NDES_Admin to the local Admin- 8. Repeat steps 3 through 7 for the
and encrypted in the system registry. This istrators group on the NDES box and to the CEP Encryption template.
maakes it easier to renew expired certificates, Enterprise Admins group in the AD domain. 9. Repeat steps 3 through 7 for the
and a single password can be deployed Add the NDES_ServiceAccount group to the IPsec (Offline Request) template. You also
to multiple network devices. Certificate local IIS_IUSRS group on the NDES box. need to set permissions for NDES_Service
rennewal is enabled by default in Server 2008 Account on the NDES IPsec (Offline
R2 and Server 2008 SP2. Duplicate the Certificates Request) template to Read d and Enroll.
Now we need to duplicate the CEP 10. Close Certificate Templates.
Design Considerations Encryption, Exchange Enrollment Agent 11. In the Certification Authority
If your PKI consists of a standalone CA, it (Offline Request), and IPsec (Offline snap-in, click the Certificate Templates
should be in an isolated certification hierar- Request) certificates. To do so, log on to your folder in the left pane. The currently
chy that serves only SCEP-enabled devices. issuing CA as a domain administrator. published templates will be displayed
The root CA shouldn’t be trusted by other 1. Open the Microsoft Management on the right.
devices on the network. If your organization Console (MMC) Certification Authority 12. Right-click the Certificate
uses Cisco equipment and your Windows snap-in from Administrative Tools on the Templates folder in the left pane and
clients don’t need to trust network devices, Start menu. select New, Certificate Template to Issue
you might be able to deploy a Cisco IOS 2. In the left pane, expand the CA. Right- from the menu.
Certification Authority server—a CA that click the Certificate Templates folder and 13. In the Enable Certificate Tem-
runs on a Cisco device running Internet- select Manage from the menu. The MMC plates dialog box, which Figure 1 shows,
work Operating System. Additionally, some Certificate Templates snap-in will open. select the three NDES templates and
devices have limited support for certain PKI 3. In the Certificate Templates click OK.
configurations, including long encryption snap-in, right-click the Exchange
key lengths, subordinate CAs, and multi- Enrollment Agent (Offline request) Assign Permissions
tier PKI hierarchies. template and select Duplicate Template Now that you’ve put the necessary tem-
from the menu. plates in place, you need to assign the
Standalone or Enterprise CA?
Implementing NDES with a standalone
CA that’s dedicated to providing network
devices with certificates might be better
suited to situations in which Windows
clients aren’t required to trust network
devices; for instance, when router-to-router
VPNs will be configured with IPsec encryp-
tion. An enterprise CA and an NDES server
might be more convenient if Windows
clients need to trust network devices for the
purposes of establishing VPN connections.

Setting up NDES
Let’s install the NDES server role to commu-
nicate with an issuing enterprise CA. This is a
typical setup in which certificates are issued
to network devices that will be trusted by Figure 1: Enable Certificate Templates dialog box

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 49


NETWORK DEVICE ENROLLMENT SERVICE
5. Select Active Direc- the Country/Region field as necessary
ttory Certificate Services and click Next.
oon the Select Server Roles 13. On the Configure Cryptography
sscreen and click Next. for Registration Authorityy screen, accept
6. Click Next on the the default settings, which you can see in
IIntroduction screen. Figure 3, and click Next.
7. On the Select Role 14. Click Next on the Web Server (IIS)
SServices screen, clear introduction screen.
CCertification Authority 15. Accept the defaults on the Select
aand select Network Device Role Services screen by clicking Next.
EEnrollment Service. As 16. Click Install on the Confirm
I mentioned previously, Installation Selections screen.
NNDES can’t be installed on 17. Click Close on the Installation
tthe same machine as a CA. Results screen.
8. In the Add Roles
WWizard dialog box, click Modify the NDES Registry
AAdd Required Role Before you can request a password from
SServices to install the NDES to start the certificate request process,
nnecessary IIS and Remote you need to set some registry keys on the
SServer Administration Tool NDES server to point to the NDES IPsec
ccomponents. (Offline Request) certificate, then restart IIS.
9. On the Specify 1. Open regedit from the Search
UUser Account screen click programs and filess box on the Start menu.
Figure 2: Setting permissions for NDES ServiceAccount
NDES_ServiceAccount SSelect User. In the Windows 2. In the left pane of Registry Editor,
Security dialog box, enter navigate to the following registry key:
accounts appropriate permissions to the the username and password for the NDES_ HKLM\Software\Microsoft\
issuing CA. ServiceAccount and click Next. Cryptography\MSCEP (see Figure 4).
1. In the Certification Authority 10. Click Browse in the Specify CA 3. You’ll find three REG_SZ
snap-in, right-click the CA in the left for Network Device Enrollment Service values: EncryptionTemplate, General-
pane and select Properties from the dialog box. PurposeTemplate and Signature-
menu. 11. In the Select Certification Template. Set all three values to
2. Select the Security tab and click Authority dialog box, select the issuing NDESIPSECIntermediateOffline, then
Add to assign permissions for NDES_ CA, then click OK and Next to continue. close Registry Editor.
ServiceAccount. 12. On the Specify Registration 4. Type cmd into the Search programs
3. Type NDES_ServiceAccount into Authority Information screen, modify and filess box on the Start menu and press
the box and click OK.
4. Set permissions on the Security tab
for NDES_ServiceAccount to Read d and
Request Certificatess (see Figure 2).
5. Click OK to close the properties
dialog box.

Install NDES
The issuing CA is properly configured. Now
you can install the NDES server role on a
separate server.
1. Log on to the NDES box using
the NDES_Admin account created
earlier.
2. Open Server Manager from the
Start menu.
3. In the left pane of Server Manager,
right-click Roles and select Add Roles
from the menu.
4. Click Next on the Before You Begin
screen in the Add Roles Wizard. Figure 3: Add Roles Wizard

50 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


NETWORK DEVICE ENROLLMENT SERVICE
address http://localhost/certsrv/mscep_
admin/. You’ll be presented with a hash
value for the CA certificate and an enroll-
ment challenge password that’s good for
60 minutes (Figure 5).
The network device then needs to be
configured to trust the enterprise CA.
Again, this procedure differs with every
device, and you will need to refer to the
manufacturer’s instructions. When con-
figuring the device to trust the enterprise
CA, you’ll need to specify the name of the
key pair created earlier and the enrollment
URL for the enterprise CA, http://NDES1/
certsrv/mscep.dll?operation=GetCACert&
message=NetworkDeviceID. SCEP calls to
the NDES server are made via mscep.dll
and HTTP GET commands. In the URL
above you can see that the GetCACert com-
Figure 4: Changing the registry setting mand is issued to NDES.
After the network device trusts the enter-
Ctrl+Shift+Enter to start the command IOS, the command might look something prise CA, you can issue a certificate request.
prompt with administrative privileges. like this: Some devices require you to authenticate
5. Type the following two commands the enterprise as a separate step before you
to restart IIS: crypto key generate rsa general-keys can issue a certificate request. You also need
modulus 2048 the one-time enrollment password (OTP)
net stop w3svc issued by NDES to complete the request.
net start w3svc If you don’t specify the label switch in If a value for the KeyUsage extension
the crypto command, the name of the isn’t specified in the request, a default
6. Close the command prompt. key pair defaults to the name of the net- value of 0xa0 is used that refers to the
work device. The key length, stated here GeneralPurposeTemplate as specified in
Request a Certificate as 2048, should match that specified on the system registry. Other possible values
Next, you need to request a certificate the Configure Cryptography for Registra- include 0x80 for the SignatureTemplate
for the network device. The first step in tion Authorityy screen when NDES was and 0x20 for the EncryptionTemplate.
the process of setting up a certificate set up. The enterprise CA processes the certifi-
is to generate a public/private key pair On the NDES server, log on using the cate request on behalf of NDES, which
on the device. This procedure will vary NDES_Admin account and open Internet then issues the certificate to the network
depending on your equipment. In Cisco Explorer. Enter the NDES admin page device.

Complexity Worth the Trouble


You now know how to set up NDES as
part of an already existing PKI. However,
before you ever do so, you should read the
Microsoft white paper I referenced at the
beginning of the article, and you should
also test thoroughly in a lab environment
before deploying NDES in your production
environment.
InstantDoc ID 125385

Russell Smith
(rms45@rsitc.com) is an indepen-
dent IT consultant specializing
in systems management and
security, and author of Least
Privilege Security for Windows 7,
Figure 5: CA certificate and enrollment challenge password Vista and XPP (Packt).

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 51


FEATURE

Exchange Server’s

Deploying Your Servers

I
n Exchange
c a ge Se
Server
e 2010,
0 0, tthee C
Client
e t Access
ccess server
se e role
o e plays
p ays a much
uc larger
a ge papartt in tthee messag-
essag
Get this ing organization than in any previous version. Because of this, it’s critical to deploy the Client
important Access server role correctly up front and avoid any unnecessary or unplanned downtime.
In my previous article, “Exchange Server’s Client Access: An Introduction,” InstantDoc ID
part of your 125061, I provided an introduction to the Client Access server role in Microsoft Exchange
Server 2010 and Exchange 2007. In this article, I’ll expand on that topic and talk about
Exchange deploying and installing Client Access server. I’ll focus on Exchange Server 2010, but I’ll point out the
infrastructure differences for Exchange 2007 as I go. I’ll walk you through a manual, GUI-based installation and an
unattended installation, as well as discuss the prerequisites. I’ll wrap up by looking at coexistence and
running transition, including transitioning to the Exchange 2010 Client Access server from older versions of
Exchange, and how to ensure that multiple versions of the Client Access server live in harmony.

by Ken St. Cyr Prerequisites


Before installing the Client Access server role, make sure your server meets the prerequisites.
I prefer to install prerequisites in a scriptable, repeatable manner that requires as little admin-
istrator interaction as possible. Therefore, I’ll supply the commands you need to install the
prerequisites rather than use the GUI. Table 1 outlines the prerequisites; note that they differ
between Exchange 2007 and Exchange 2010. The .NET Framework, Windows PowerShell, and
Windows Remote Management (WinRM) are base system requirements for Exchange. The web
server and remote procedure call (RPC) over HTTP requirements are specifically for the Client
Access server role.
When installing Exchange 2010 on Windows Server 2008, you’ll need to download the .NET
Framework 3.5 SP1 from the Microsoft website at bit.ly/9aZw and install it separately. You can install
the framework without user interaction by running the executable you download with the /passive
switch. The installation still displays status dialog boxes so you can see its progression.
The .NET Framework 3.5 SP1 is included as a feature that you can add in Server 2008 R2. You
can install it using the Add Features option in Server Manager or with PowerShell. To install it using
PowerShell, you first have to open PowerShell with the system modules loaded, which you do by right-
clicking the PowerShell application and selecting Import system modules, as Figure 1 shows. Note that
this option isn’t available to you until you’ve run PowerShell at least once as the current user. After
you’ve imported the system modules, use the command

Add-WindowsFeature Net-Framework-Core

PowerShell 2.0 and WinRM are already installed in Server 2008 R2, so there are no additional
steps to get those components working, but you need to install them in Server 2008. Microsoft
offers PowerShell 2.0 and WinRM packaged into a single download called the Windows Manage-
ment Framework Core, available from support.microsoft.com/kb/968929. You only need the Core
version of the framework, not the other downloads on that page. Install the update silently using
the command

Windows6.0-KB968930-x64.msu /quiet

52 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


DEPLOYING CLIENT ACCESS
setup on the DVD—setup.exe and setup.com.
Table 1: Software Prerequisites for Installing the Client Access Server Role
Setup.com is the command-line installer,
Prerequisite Exchange Server 2007 Exchange Server 2010 which I’ll talk about later. Launch setup.exe.
.NET Framework .NET 3.0 .NET 3.5 SP1 In this example, steps 1 and 2 are grayed out
PowerShell PowerShell 1.0 PowerShell 2.0 because I already took care of these items
Windows Remote Management Not required WinRM 2.0 when I installed the prerequisites. Click Step
Web server IIS 6.0 IIS 7.0 3 and choose the language options you want
to use. For this example, I’m going to use only
After you install the correct version of the Add-WindowsFeature PowerShell the languages that are on the DVD.
the .NET Framework and PowerShell, cmdlet: You can then click Step 4 to launch the
you’ll need to make sure the following setup wizard. You’ll see an introduction
components are installed before you can Add-WindowsFeature NET-Framework, screen, followed by a License Agreement
install the Client Access server role on NET-HTTP-Activation, that you must accept, then the option to
your server: RPC-Over-HTTP-Proxy,RSAT-ADDS, report errors to Microsoft automatically.
• Web Server role on Server 2008 Web-Server,Web-Basic-Auth, When you come to the Installation Type
• Web Server: basic authentication Web-Windows-Auth,Web-Metabase, screen, select Custom Exchange Server
feature Web-Net-Ext,Web-Lgcy-Mgmt-Console, Installation and click Next.
• Web Server: Windows authentication WAS-Process-Model,RSAT-Web-Server, Next is the Server Role Selection screen.
feature Web-ISAPI-Ext,Web-Digest-Auth, This screen is where you’ll select the option
• Web Server: digest authentication Web-Dyn-Compression -Restart for installing the Client Access server role.
feature When you do this, the Management Tools
• Web Server: Microsoft IIS 6.0 metabase The Client Access server role requires are automatically selected as well. Because
compatibility feature that the .NET TCP Port Sharing Service I’m installing only the Client Access server
• Web Server: .NET extensibility feature (NetTcpPortSharing) be set to automatic. role, those are the only two options I select,
• Web Server: IIS 6.0 management This service allows multiple processes as Figure 2 shows.
console feature running on a server to use a single port. It The Configure Client Access Server
• Web Server: Internet Server API (ISAPI) adds a layer of logic between the network External Domain screen is next. This screen
extensions feature and the application. In Exchange 2010, the is new in Exchange 2010 and lets you specify
• Web Server: dynamic content Mailbox Replication service relies on TCP (during install) the external namespace that
compression feature Port Sharing to coordinate move requests the Client Access server will service. As part of
• Windows Process Activation Service: originating from multiple clients. You can the installation, your virtual directories will be
process model feature set up the service manually through the configured with this external namespace, so
• Remote Server Administration Tools: Services snap-in, or use one of the follow- you don’t have to do it manually after setup.
web server tools feature ing commands. At a Windows command This screen is completely optional, and you
• .NET Framework: HTTP activation prompt, use should only configure it for Internet-facing
feature Client Access servers. If you’re setting up an
• RPC over HTTP Proxy feature sc config NetTcpPortSharing start= Internet-facing Client Access server and you
auto don’t specify the external namespace, you
You don’t have to install each of these can still go back in and configure it after-
components through the Server Manager Or in PowerShell, you can use ward.
interface—the Exchange team provides The remaining screens in the setup
a much easier way. There’s a set of XML Set-Service NetTcpPortSharing wizard run the prerequisite check for
files in the Scripts folder on the Exchange -StartupType Automatic
DVD. The Exchange-CAS.xml file contains
the Server Manager packages that you GUI-Based Installation
need for the Client Access server role. Now that the prerequisites are installed,
You can install these packages using the you can install a Client Access server using
command the setup wizard. The Client Access server
role can be installed on servers alongside of
ServerManagerCmd.exe other roles, but in this example, I’m install-
-ip d:\scripts\Exchange-CAS.xml ing only the Client Access server role on
the server.
ServerManagerCmd.exe is deprecated in Insert the Exchange 2010 installation
Server 2008 R2, so it might not be there media. If AutoPlay doesn’t fire up the installer,
in future versions. To install the pack- you can launch setup.exe from the root of
ages without ServerManagerCmd, use the DVD. Note that there are two versions of Figure 1: Importing system modules in PowerShell

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 53


DEPLOYING CLIENT ACCESS
c
certificate and use one issued servers, you want your Exchange 2010
b
by a trusted third-party Cer- Client Access servers to use your existing
ttificate Authority. Don’t use this namespace and you want to adopt a new
ccommand unless you intend namespace for your legacy servers.
tto install an issued certificate. For example, if your external name-
Y
You should also consider using space with your current Exchange 2007
tthe ExternalCASServerDomain or Exchange 2003 servers is mail.contoso
p
parameter. For example: .com, you probably want to use this
namespace for Exchange 2010. If you
setup.com /mode:install
s keep it, users won’t have to remember a
/roles:clientaccess new URL for Outlook Web App (OWA; for-
/ExternalCASServerDomain: merly Outlook Web Access) or reconfigure
mail.contoso.com their mobile phones or IMAP/POP clients.
If you’re keeping your legacy Exchange
T parameter lets you specify
This 2003 front-end servers or Exchange 2007
Figure 2: Installing only the Client Access server role your external domain name for Client Access servers online, temporarily
the Client Access server and perform the Internet-facing Client Access servers, as I or permanently, there might be cases in
installation. If you followed the guidance mentioned in the section using the setup which your Exchange 2010 Client Access
I provided for the prerequisite software, wizard. After you're fininshed executing server has to redirect an external client
you shouldn’t run into any problems in the setup.com command, the installation to a legacy front-end or Client Access
the prerequisite check. After Exchange is hands-off. server. For this redirection to work, your
installs successfully, you should see a legacy servers need to have a differ-
screen similar to Figure 3. Coexistence and Transition ent external namespace, such as legacy
Coexisting with and transitioning from .contoso.com.
Unattended Installation legacy versions of Exchange aren’t too dif- When you’re ready to transition, you
Running through the setup wizard makes ficult in Exchange 2010—if you understand can deploy your Exchange 2010 Client
the installation of a Client Access server a few basics. Remember that Exchange Access servers without affecting your leg-
fairly simple, but if you’re deploying mul- 2010 Client Access servers can’t commu- acy Exchange infrastructure. Make sure
tiple Exchange servers running the Client nicate with Exchange 2003 or Exchange that you don’t make any DNS changes
Access server role, you might be better 2007 Mailbox servers by using MAPI. to your production external namespace
off using a less interactive installation. Your external-facing legacy servers need (e.g., mail.contoso.com) until after you
Exchange lets you run unattended instal- a different external namespace than your configure the legacy namespace and are
lations using the command-line setup external-facing Exchange 2010 Client ready for your external users to use the
.com tool on the Exchange installation Access server. You might require new cer- Exchange 2010 Client Access servers. The
media. tificates—your legacy servers will have a steps to configure the legacy namespace
You can run setup.com with command- different namespace, so if you don’t have a differ between Exchange 2007 and
line parameters or you can specify an wildcard certificate, you’ll have to request Exchange 2003.
answer file. Answer files are helpful if you a new SAN certificate.
have a lot of options that you want to specify And you should always
for a command, but unless you’re install- transition Internet-fac-
ing and customizing additional roles on ing Client Access serv-
the same server, they won’t help much for ers first, followed by
the Client Access server role. If you’re not those that don’t face
specifying any additional setup options, you the Internet.
can install the Client Access server role with Maintaining an
the command additional namespace
is the portion of the
setup.com /mode:install coexistence and tran-
/roles:clientaccess sition process that has
the most impact on
You might want to use the NoSelf- your Exchange setup.
SignedCertificates parameter for your Because Exchange
installation. This parameter installs the 2010 is designed to
role without a self-signed certificate, interoperate with
which can be helpful if you’re plan- legacy Client Access
ning to remove the default self-signed servers and front-end Figure 3: An example successful installation screen

54 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


DEPLOYING CLIENT ACCESS
For Exchange 2003 front-end servers: environment, make sure public folder– the OAB to add the Exchange 2010 web
1. Create DNS entries for the legacy based distribution is still enabled as service to the list of virtual directories.
namespace (e.g., legacy.contoso.com) well. The virtual directory for web- Similar to the Exchange 2003 transition
and point them to your Internet-facing based OAB distribution is added by process described above, make sure you’re
Exchange 2003 front-end infrastructure. default on the Client Access server, but using version 4 OABs. Also, when you
2. Use the Set-OwaVirtualDirectory you’ll need to configure the OAB itself execute the Set-OfflineAddressBook com-
Exchange Management Shell cmdlet to tell by adding the virtual directory as a mand, keep the existing virtual directories
Exchange 2010 OWA what the legacy URL is web distribution point. Use the Set-Of- in the VirtualDirectories parameter or
so it knows where to redirect users. Specify flineAddressBook cmdlet in Exchange they’ll be omitted. For example,
the Exchange2003URL parameter on all 2010 to add the Client Access server
Client Access servers that legacy Exchange OAB virtual directory to the list of vir- Set-OfflineAddressBook
2003 mailboxes connect to for OWA. For tual directories allowed for your OABs. "Default Offline Address Book"
example, When you make this change, you must -VirtualDirectories
ensure that version 4 OABs are being "CONTOSO-CAS01\oab*"
Set-OwaVirtualDirectory generated. Also, make sure you include
"CONTOSO-CAS01\owa*" all of the existing virtual directories 5. Turn off Outlook Anywhere on your
-Exchange2003URL and the virtual directory you’re adding Exchange 2007 Client Access servers and
https://legacy.contoso.com/exchange when you execute this command. Any turn it on on your Exchange 2010 Client
virtual directories that you omit will be Access servers.
3. If you use ActiveSync, ensure that removed from the list. Your commands
Integrated Windows authentication is should look like this: The process of transitioning your legacy
turned on for ActiveSync at your Exchange infrastructure will vary between different
2003 mailbox server. You need this authen- Move-OfflineAddressBook Exchange environments. I’ve given you
tication so that the Exchange 2003 server "Default Offline Address Book" a high-level understanding of this pro-
hosting ActiveSync can accept Kerberos -Server CONTOSO-MBX01 cess, but you should thoroughly test
credentials from the Exchange 2010 Client your transition and coexistence scenarios
Access server. Set-OfflineAddressBook before rolling out Exchange 2010 to
4. Update the certificates on your "Default Offline Address Book" production.
Exchange 2003 front-end servers to include -VirtualDirectories
the legacy namespace. "CONTOSO-CAS01\oab*" Deployed, and Ready for
5. When you’re ready for your users the Next Layer
to use the Exchange 2010 Client Access 7. If you use RPC over HTTP, move the You should now have a good grasp of the
servers, modify the DNS records of your connection point to Exchange 2010 and work involved with deploying the Client
production namespace to point to your turn off RPC over HTTP on your Exchange Access server role in your Exchange envi-
Exchange 2010 servers. 2003 servers. ronment. Of course, the Client Access server
6. Reconfigure the Offline Address role has many layers. In the next article in
Book (OAB). If you have Outlook 2007 To create a legacy namespace for Exchange this series, I’m going to peel back another
or Outlook 2010 clients running in 2007 Client Access servers: layer and show you how you can add
your organization, you’ll want to move 1. Create DNS entries for the legacy redundancy and high availability to your
the OAB to an Exchange 2010 Mailbox namespace (e.g., legacy.contoso.com) Client Access servers. Until then, you might
server so you can take advantage of and point them to your Internet-facing want to take a look at the Exchange team
web-based OAB distribution, which is Exchange 2007 Client Access server blog post “Transitioning Client Access to
more efficient than public folder–based infrastructure. Exchange Server 2010,” msexchangeteam
distribution and requires less network 2. Update the External URLs on your .com/archive/2009/11/20/453272.aspx.
bandwidth. Although web-based OAB Exchange 2007 Client Access servers so It’s a great resource to learn more about the
distribution is performed by the Cli- they use the legacy namespace. Client Access server role.
ent Access server, the generation of the 3. When you’re ready for your users InstantDoc ID 125347
OAB is performed by the Mailbox server. to use the Exchange 2010 Client Access
Therefore, if you want to enable web- servers, modify the DNS records of your
based distribution, you need to move the production namespace to point to your Ken St. Cyr
OAB generation process to an Exchange Exchange 2010 servers. Make sure to (ken.stcyr@microsoft.com) is a
solution architect at Microsoft with
2010 Mailbox server first using the change the AutoDiscover record, too. more than 10 years of industry
Move-OfflineAddressBook cmdlet. 4. Reconfigure the OAB. Use the experience. He’s a Microsoft
Outlook 2003 and older clients still Set-OfflineAddressBook cmdlet to allow Certified Master in Directory
Services and the author of
use public folders to download the your Exchange 2010 Client Access servers Exchange Server 2010 Administra-
OAB, so if you have these clients in your to distribute the OAB. The cmdlet modifies tion Instant Referencee (Sybex).

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 55


FFEEAATTUURREE

Get Proactive with


SharePoint
2010's
Improved Monitoring

S
Harness
a
arness the harePo
hare Poin
intt 20
2010
10’ss n
neew andd improved features can help administrators in man
(see the sidebar “SharePoint 2010 Improvements””, page 58), including finding prob-
power
o of Health
ower llems iin their
Point
P
h i Sh
i 2010—in
SharePoint
2010 i particular,
i ffarm. Let’s
i l timer
i
’ llookk at the
jobs,
j b reporting,
h iimproved
i and
d monitoring
d the
i i ffeatures iin Sh
h Health
H l hAAnalyzer,
l
Share-
as they
h show
h
Analyzer and up in Central Administration—and examine how they can help you manage SharePoint

reporting to in a more proactive way. By the end of this article, your powers to prevent SharePoint
problems will make it seem like you can almost predict the future.
improve your Timer Jobs
farm The first stop on our whirlwind tour of SharePoint 2010’s monitoring improvements is timer jobs.
Timer jobs are the workhorses of SharePoint, making sure things are provisioned, email alerts are
sent, and other ugly tasks get done. In SharePoint 2007, the problem was there was no good way to
by Todd Klindt troubleshoot timer jobs, and if you needed a timer job to run, you had no choice but to wait for it to
run the next time it was scheduled.
The first improvement in SharePoint 2010 monitoring is the timer job dashboard, which now
offers a snapshot of the timer job subsystem and what’s going on. You get to the dashboard by going
to Central Administration and clicking the Monitoring link in the left pane, which Figure 1 shows. The
set of links pertaining to timer jobs is in the second group of links, cleverly hidden under the heading
labeled Timer Jobs. When you click the Check job statuss link, you see what Figure 2 shows: the ghosts
of timer jobs past, present, and future.
The top of the page shows the timer jobs that are scheduled to run. Clicking on any of the
timer jobs brings up its definition, a screen that explains what the timer job does. You can also
edit the schedule of the timer job, as Figure 3 shows, including disabling it completely or running
it immediately. This is a huge improvement.

Figure 1: Monitoring options in SharePoint 2010's Central Administration

56 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


SHAREPOINT MONITORING
This command shows you how to start
timer jobs at will. The other cmdlets
work similarly. Although timer jobs in
SharePoint 2010 and SharePoint 2007
function in similar ways, in SharePoint
2010 the administration experience is
much better.

Reporting
The reporting system in SharePoint 2010
has also been improved and enhanced. Like
timer jobs, Reporting has its own heading
with links (see Figure 1) on the Monitoring
page of Central Administration. The first
link, View administrative reports, takes you
to a library of administrative reports. As of
the beta, this library included reports only
Figure 2: The Timer Job Status page from the Search team on statistics like query
If a timer job b fails for some reason in SharePoint 2010. It now lists all the latency and crawl rate per content source. I
or if you need d to execute a timer job’s timer jobs defined in the farm, regardless hope other groups will eventually include
functionality (like collecting incoming of whether they’re scheduled to run or not. reports here, too. The structure for these
email), you don’t have to wait for its Clicking a job definition opens its proper- reports will be documented, so you’ll be
regularly scheduled occurrence. To get ties. You can also view the definition by able to create custom reports as well.
the full list of scheduled timer jobs, click clicking the Scheduled Jobs link in the left The second link takes you to the page
Scheduled Jobs under Timer Links in the pane of the Timer Job Status page. where diagnostic logging is configured.
upper left pane. Not to be left out, Windows PowerShell Several aspects of logging are configured
The middle section of the Timer Job Sta- also lets you manage timer jobs in the here, and you’ll see two big improvements.
tus page in Figure 2 shows running tasks. SharePoint Management Console. I won’t First, any category not using the default
This is an improvement over SharePoint cover PowerShell options very deeply here, logging settings now shows up in bold. In
2007, where we had no idea what timer but I will do so in a later article. Open the SharePoint 2007, if you altered any cat-
jobs were currently running nor did we SharePoint Management Console and type egory’s settings, you had no way of knowing
have any information about them. With which ones you had changed or what value
SharePoint 2010, you see which jobs are Get-Command *SPTimerJob you had changed them from. That leads us
currently running on which servers, how to the second improvement: a new logging
far along they are, and when they started— to get a list of all the cmdlets you can use to level, Reset to default. Now you can crank
and it comes with a progress bar at no extra manipulate timer jobs. To get specific help up your SharePoint logging with reckless
charge. You’ll also see a page dedicated to on any of them, use Get-Help, like this: abandon, knowing that bolded categories
displaying the running jobs only. You can and Reset to defaultt will help you get things
get to it by clicking Running Jobs in the Get-Help Start-SPTimerJob back to normal. This page also lets you
upper left pane.
The bottom part of the Timer Job Status
page shows the timer jobs that have run
in the past. SharePoint 2007 has a similar
screen, but SharePoint 2010 takes it a step
farther. Each finished timer job has a status
attached to it: Succeeded or Failed. Click-
ing the status takes you to the job history
page, where you can get information about
that instance of the timer job execution,
such as how long the job took, and which
web apps and content databases it ran
against. In the case of a timer job failure,
the history screen tells why the failure
occurred, which helps in troubleshooting.
Finally, the trusty timer job definition
from SharePoint 2007 has gotten a facelift Figure 3: Editing an existing timer job

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 57


SHAREPOINT MONITORING

SharePoint 2010 Improvements


SharePoint 2010 has improved in many areas. These are a few gems that really get my IT pro juices flowing.

Windows PowerShell
In SharePoint 2003 and 2007, command-line junkie administrators had a powerful tool, Stsadm. With it, we could do repetitive tasks quickly
without wearing out our clicking fingers. We thought we had it made. Then SharePoint 2010 introduced us to Windows PowerShell. Power-
Shell is replacing Stsadm, which is deprecated. The good news is that anything Stsadm can do, PowerShell can do better. Since PowerShell
lets us access SharePoint at the object model level we can make scripts with unprecedented power, things we could only dream of with
Stsadm. Want to get a list of all the blog sites in your farm? PowerShell can do that. Want to back up all of your site collections with a single
line? PowerShell can do that too. Now that your appetite is whetted you can look forward to a future issue of this magazine, where we’ll
run an article dedicated to PowerShell with SharePoint.

Throttling
Most articles about SharePoint 2010 tell you about all the new things you can do. There are also a few things that SharePoint 2010 won’t let
you do anymore. For instance, if you want to load up a list view with 10,000 items in it, well, you can’t anymore. Do you want to overload
your server so that form submissions fail? You can’t do that anymore, either. SharePoint has implemented some throttling options to help
save users from themselves. We now have large list throttling that will truncate a large list view to 5,000 items to keep users from bogging
down SQL Server with large queries or killing their web browser. SharePoint also keeps a close tab on its wellbeing; if it gets too busy, it will
pause its timer jobs and reject new connections so that existing connections can be completed. This means that users submitting surveys
won’t get their hard work rejected because the server is too busy to handle their requests. Survey users around the world rejoice!

Monitoring
SharePoint 2010 has also expanded its monitoring capabilities. SharePoint 2010 introduces a new database dedicated to the purpose of
collecting logging information. This database collects logs—your Unified Logging Service (ULS) trace logs, IIS logs, and even Windows Event
Log events—from all the servers in your farm and puts them all in one database. Even better, this database is completely documented, and
we can read and write to it. SharePoint 2010 also has a Health Analyzer to monitor different aspects about itself; it alerts administrators
when there are problems. It can even fix some problems. It’s a lazy administrator’s dream.

Service Applications
SharePoint Server 2007 had Shared Service Providers (SSPs) that provided common services to web applications. Search, profile import, Excel
services, and InfoPath forms are some examples of services the SSP provided. SharePoint 2010 has taken the SSP model and broken it into
its individual components. This gives you more flexibility to run the service applications you want. You can also have multiple instances of
some service applications if you choose, and now different people can administer the individual service applications. If you want to take
your SharePoint 2010 administration to the next level, you can even share individual service applications across farms.

Database Mirroring
SharePoint has become as critical to business these days as email. Since SharePoint lives in SQL Server, making your databases fault toler-
ant is one step an administrator can take to keep SharePoint from going offline in case there is trouble. If you had your SharePoint 2007
databases mirrored, failing over to your mirrored databases was a completely manual task. SharePoint 2010 has native support for database
mirroring. After you have your databases mirrored in SQL Server, SharePoint can fail over automatically without any intervention from an
administrator. Less downtime for users, less work for administrators. It’s a classic win-win scenario.
InstantDoc ID 125095

restrict log size by number of days kept or farm, which should let you isolate and files. As with your ULS logs, it’s a good idea
by space used. It’s also a good idea to use deal with trouble pages before the users to save your usage logs on a drive other
this page to move the Unified Logging Ser- come to you. The second report lists your than the C drive.
vice (ULS) logs off of your servers’ C drives most active users and their activity. These The page does have one setting you can’t
and onto another drive. Just remember that reports, like the administrative reports, change: the location of the logging database.
this setting is a farm setting, so all of your allow some basic filtering to help you get SharePoint 2010 requires you to use the
SharePoint servers must have the location the information you’re interested in. PowerShell cmdlet Set-SPUsageApplication
you move your logs to. The next link under Reporting lets you to alter the location of this database. Central
At the View health reportss link, auto- configure usage and health data collection. Administration reports only the location of
matically generated health reports give you This screen lets you configure which data, the logging database.
information about two potential problem if any, is logged by SharePoint. You can Moving the logging database is a good
areas concerning your farm. One report choose which events SharePoint logs as idea. Because SharePoint aggregates all its
provides a list of the slowest pages in your well as where SharePoint stores its usage usage and health data to this database, it

58 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


SHAREPOINT MONITORING
with an RSS feed. Not only is Health Ana-
lyzer out there patrolling your perimeter,
but it also contacts you when it finds some-
thing. When a problem does show up in the
list, you have some options. If you click the
item, a pop-up window, which you can see
in Figure 5, shows a wealth of information.
I’ll point out some notable features. First,
you can see a good explanation of the prob-
lem. There’s also a Remedy section that
describes how to fix the problem and an
external link with more information. Micro-
Figure 4: Health Analyzer’s Review problems and solutions page
soft really put a lot of work into making sure
can get large, and it can also experience a link on the Monitoring page. This link not that administrators have all the information
lot of disk I/O. If either of these becomes only shows the problems but also the solu- we need to understand and deal with prob-
a problem for your Microsoft SQL Server tions. Each of the rules specifies the error lems when they surface. If the problem is
instance, you might consider moving the condition and provides an explanation of scoped to a particular server, web app, or
logging database to its own instance or at the problem and a link to the remedy for the service, it’s also called out here. The Ribbon
least to its own spindles on your default problem. at the top also offers a few more options. For
SQL Server instance. Both SQL Server and For most of us, our first introduc- all rules, the Reanalyze Now button offers
your users will appreciate it. tion to the SharePoint Health Analyzer is the chance to verify you’ve fixed a problem.
after installation. Unless you did a very This way you don’t have to wait for the next
SharePoint Health Analyzer good and thorough scripted installation of scheduled run for verification.
You might have noticed I didn’t start at the top SharePoint, the Health Analyzer will show Some, though not all, rules also have
of the Monitoring page in Central Admin and up the first time Central Administration a button labeled Repair Automatically.
work down. This was by design. I was building is loaded. You’ll recognize it as a red bar Click View next to Rule Settings, then Edit
anticipation for the big finish, the SharePoint across the top of Central Administration. Item and select the box next to Repair
Health Analyzer. If there is any part of Share- Clicking the View these issuess link takes Automatically. That tells SharePoint to
Point 2010 that’s magic, this is it. you to the same page as Review problems fix this problem any time it comes up.
The Health Analyzer uses XML-based and solutions does under the Monitoring Or you can leave the check box alone
rules combined with timer jobs to periodi- section. To fully appreciate the gift we’ve and just click the Repair Automatically
cally scan different aspects of your Share- been given with Health Analyzer, let’s look button when the problem occurs. Not all
Point farm and look for problems. When at that page, which Figure 4 shows. rules offer this option, which isn’t a bad
it finds aspects of your farm that violate As you can see, the list of problems is thing, necessarily. Letting the rule Drives
the rules that are defined, it reports them a SharePoint list. Because of that, you can are running out of free space do anything
under the Review problems and solutions subscribe to alerts to that list, or follow it automatically seems a touch scary.

All’s Well on the Farm


SharePoint 2010’s improved monitoring
should help overworked and under-
appreciated administrators keep a better
eye on the SharePoint farm. This will free up
your time to do things other than fight fires,
and you’ll be able to keep your users happy,
too. But whatever you do, don’t let it clean up
drive space for you automatically—that’s just
asking for trouble.
InstantDoc ID 125029

Todd Klindt
(todd@sharepoint911.com) is a
SharePoint MVP and a consultant
working for SharePoint911. When
he’s not writing magazine articles,
he's speaking at conferences, writ-
ing books, or fighting his cats for
Figure 5: Health Analyzer pop-up window sunspots on the carpet.

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 59


P R O D U C T S
NEW & IMPROVED

■ Storage ■ Backup and Recovery


■ Cloud Computing ■ Security

TS1U-B SATA Utilizes USB 3.0 Specops Upgrades


Sans Digital has released a single bay USB Password Management
3.0 product, the TowerSTOR TS1U-B. Products
According to the vendor, the TS1U-B pro- Specops Software has
vides 10x the data bandwidth of USB 2.0 (up upgraded its password
to 5Gb/s). Additionally, the single bay enclo- management products,
sure supports 3.5" SATA hard drives with Password Reset and Pass-
USB 3.0 interface, and the device is cooled word Policy. Password
without a fan, so it is quieter than traditional Reset lets users unlock
solutions. If your computers do not have their own Active Directory
USB 3.0 ports, you’ll need a Sans Digital con- accounts to reset their pass-
troller card. The TS1U-B costs $59. To learn words without a Help desk
more, visit www.sansdigital.com. call, and Password Policy
enforces strong password
policies set by your organization. The new that are expiring. To learn more or
versions offer real-time reporting and download 30-day trials of either product,
monitoring of system activity, enrollment visit www.specopssoftware.com.
of mobile numbers for mobile authentica-
tion, and email notification for passwords Symplified Trust Cloud Enhances
Amazon EC2
PRODUCT Symplified has announced Symplified Trust
SPOTLIGHT Cloud, an identity and access management
solution designed for companies using
Amazon EC2, Amazon’s cloud platform.
ProStor InfiniVault Offers 1TB RDX Symplified Trust Cloud addresses regulatory

Removable Disk Cartridges compliance, single sign-on, and access man-


agement issues on the Amazon platform. It
ProStor Systems has announced the ProStor Systems. “The availability of 1TB also offers tools for multinational companies
general availability of its ProStor RDX drives is a significant milestone that to manage various global data governance
InfiniVault product line and a newly greatly expands this technology’s fit for protocols. Finally, the product removes the
released 1TB RDX removable disk data-intensive customer environments and need for federation software, according to
cartridge. RDX is ProStor’s brand of markets.” the vendor. To learn more about Trust Cloud,
removable disk-based storage, a ProStor’s RDX-based storage systems visit www.thetrustcloud.com.
growing alternative to tape-based are resold through a number of large-scale
backup solutions. According to an IDC vendors, such as Dell (as RD 1000) and HP Aprigo Unleashes SaaS Data
study cited by the vendor, RDX-based (as StorageWorks RDX). Governance NINJA
storage systems are expected to grow “The adoption of RDX technology Aprigo has announced Aprigo NINJA, a
in revenue by 1,400 percent between by all the major computer vendors Software-as-a-Service (SaaS) data gov-
2008 and 2012. including Dell, Fujitsu, HP, IBM and ernance application. According to the
“The rapid growth and adoption of Lenovo have validated the growing role vendor, “Aprigo NINJA quickly discovers
ProStor InfiniVault and RDX removable of these products in backup and archive data vulnerabilities, identifies cost saving
disk technology through our global environments,” said Henry Baltazar, senior opportunities, remediates and monitors the
OEMs, valued partners like SSL DV, and analyst, Storage & Systems for The 451 environment by alerting of changes, con-
end-users like Atlanta Interfaith Broad- Group. “With the current disk capacity trols data vulnerabilities, and streamlines
casters validates the markets’ universal roadmap, the RDX capacity point is the fixing of file permissions and access
demand for higher capacity and more forecasted to surpass many magnetic rights.” As a hosted product, NINJA requires
scalable data protection solutions— tape formats by 2011.” no changes to a company’s existing
whether on-site or in the cloud,” said To learn more about ProStor’s solutions, infrastructure and can easily process across
Frank Harbist, president and CEO of visit www.prostorsystems.com. sites, according to Aprigo. To learn more or
download a free trial, visit www.aprigo.com.

AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


P R O D U C T S
NEW & IMPROVED Paul’s Picks
www.winsupersite.com

SUMMARIES of in-depth pth product


reviews on Paul Thurrott’s
t’s SuperSite
for Windows

Apple iOS 4
PROS: Free; multitasking and folders are impor-
tant updates; many enterprise features and small
niceties
CONS: Not all features are available on older
devices; no iPad update yet; no answer to
Windows Phone’s integrated apps approach
RATING:
RECOMMENDATION: Apple iOS 4 is a nice
update to an already impressive smartphone
platform. Even those with more antiquated
hardware can take advantage of some of the iOS
4 features, and when you factor in the price—
free—and Apple’s aggressive habit of obsolesc-
ing old hardware, that's not bad. Apple iOS 4
Rebit Offers Automatic Lyzasoft Announces Free Version of puts the iDevice world—iPhones, iPod Touches,
Backup on NAS Lyza in the Cloud and, eventually, iPads—on par with what’s hap-
Rebit has announced NetSmart, a Lyzasoft announced a free version of pening at Google with Android. Looking ahead,
Windows Phone 7 still retains its single important
fully automatic backup solution that Lyza Commons, a cloud-based version of
advantage—a rejection of the app-based inter-
supports Network Attached Storage Lyza that enables data analysts to mine face metaphor—and that’s something Apple
(NAS). NetSmart automatically and volumes of data, extract information, and will need to address by the next-generation iOS
continuously backs up laptops and socialize those insights with team mem- release. But when it comes to technical prowess,
PCs to NAS, even as users come and bers. Lyza Commons integrates with all capability, and usability, iOS 4 really delivers.
go from the network, according to the leading database solutions and offers CONTACT: Apple • www.apple.com
DISCUSSION: www.winsupersite.com/alt/ios4.asp
the vendor. The software behind the a variety of analysis features to focus on
automatic backup, called SaveMe, is trends, specific groups, and anomalies.
also available for use with USB hard Finally, Lyza offers a social networking
Hotmail (2010 Update)
PROS: Free; finally supports Exchange
drives. SaveMe NetSmart starts at tool to build customer profiles and col- ActiveSync; email de-clutter features really work
$34.95. To learn more, visit www.rebit laborate on information with your group. CONS: Performance efficiency issues; EAS
.com. To learn more, visit www.lyzasoft.com. works only on mobile devices, not PC clients
RATING:
RECOMMENDATION: Microsoft’s popular
web mail client almost gets what it needs
to take on Google’s excellent Gmail service.
Almost. On the good-news front, Hotmail picks
up Exchange ActiveSync (EAS) support, allowing
it to push-sync email, contacts, and calendars
over the air with mobile devices like the iPhone
or those based on Google Android. It adopts
decent Inbox anti-clutter features that actually
work. And it offers nice integration with vari-
ous Microsoft online services, including Live
Photos and, more important to business users,
Office 2010 and SkyDrive web storage. On the
minus side, Hotmail is still a performance dog
compared to Gmail, and it’s slow to update the
Inbox with new messages. It’s also less efficient,
with annoying interim screens that pop up after
responding to messages. Too, Hotmail’s ads
are a lot heavier than what Google offers. It’s a
mixed bag: The new Hotmail is good enough to
retain existing users but not good enough for
most Gmail users to consider switching.
CONTACT: Microsoft • www.microsoft.com
DISCUSSION: www.winsupersite.com/live/
hotmail.asp
InstantDoc ID 125451

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 61


Best of TechEd 2010
AWARD WINNERS by Jason Bovberg

M
icrosoft TechEd was a wild, jazzy, hot, humid affair this year in New
In the heart (and heat) Orleans, and Windows IT Pro and SQL Server Magazine’s editors were

of New Orleans, we in the spirit when they recognized this year’s Best of TechEd Award
winners. The team interviewed the finalists and evaluated the prod-
narrowed an impressive ucts to determine a final list of winners. As always, the three criteria for
the judging process were strategic importance, competitive advantage,
field of nearly 300 and value to customers. Show attendees also cast their votes to determine the winner of
the prestigious Attendees’ Pick Award. We would like to congratulate our 2010 winners!
submissions down to
Backup & Recovery: Symantec—Backup Exec 2010
14 winners Backup Exec 2010 wins because of the exciting new energy poured into version 2010 (the
fastest-adopted version of the tool ever). With new integrated features such as data dedu-
plication, archiving, OST-based management features, and granular restore technology—
all leveraging powerful Symantec technologies and teams—Backup Exec 2010 expands its
horizons while becoming extremely user-friendly and community-aware.

Business Intelligence: Dundas Data Visualization—Dundas Dashboard 2.0


Dundas is back with Dundas Dashboard 2.0! The company, well known for its wide array of
components, came on strong with the new version of its web-based platform for digital dash-
board creation, integration, and delivery. This version—leveraging Silverlight 4.0
and offering OLAP capabilities, SharePoint integration, customization and exten-
sibility, DashFlow-streamlined development, Key Performance Indicator (KPI)
mashups, and more—is sure to please the business intelligence (BI) community.

Database Administration: Idera—SQL toolbox


Idera, a finalist last year with its fine SQL admin toolset, wins this year with a
cost-effective uber-toolset (SQL toolbox) that includes the admin toolset (with
its 24 tools, plus three more offerings—SQL comparison toolset, SQL safe lite,
and SQL virtual database). The virtual database is a unique product that lets
administrators recover data from backup files without doing a restore. DBAs can
use that virtual database in as many ways as their imaginations allow—reporting,
data extraction, data analysis, and more.

Database Development: Quest Software—Toad for SQL Server 4.6


Toad for SQL Server is the Swiss Army knife of development tools. This product
won because it offers an incredibly wide range of functionality, including Intelli-
Idera takes the prize Sense, group server query execute for running queries on multiple servers, and an

62 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


advanced SQL optimizer to analyze alterna-
tive SQL statements, as well as server, data-
base, and data-comparison tools.

1 2
Developer Tools:
AVIcode—Intercept Studio 5.6 1. A10 gets the nod. 2. Argent is all smiles. 3. Quest is looking proud. 4. Brocade seals the deal.
AVIcode’s Intercept Studio wins for its end-
to-end web application troubleshooting
tools. The new release offers a unique web
application capture feature and full sup-
port for troubleshooting the performance The Bestof Tech Ed
of SharePoint applications.

Hardware & Storage:


Brocade—Brocade DCX-4S Backbone 3 4
The Brocade DCX-4S Backbone network
switching platform wins for its robust focus uniquely flexible architecture—provide for a Systems Management & Operations:
on the evolving data center. Extremely truly scalable solution that boasts excellent ScriptLogic—Active Administrator 5.5
scalable and reliable—far surpassing “five security and 64-bit performance. For businesses that rely on Active Direc-
9s” and entering the realm of “six and tory (AD), Active Administrator is the
seven 9s”—the DCX-4S is a powerhouse Security: Symantec—Symantec End- go-to choice. With the functions of several
that will grow with any business, bringing point Protection Small Business Edition 12 other products built into one, it’s a leader
authoritative focus to the storage network. Symantec Endpoint Protection Small Busi- in AD management. This product won
A future-aware multiprotocol architecture ness Edition 12 provides smaller busi- because, as we all know, AD administra-
and intelligent traffic management func- nesses with a centrally managed security tion is a big task in many shops, and this
tionality cap off an impressive backbone. system similar to what enterprises have, single product covers what most of these
but with a price and ease of use suited to shops need.
Messaging: Argent Software— SMBs. This product won because of its
Argent for Exchange 2.0 focus on a market where there have been Virtualization:
Argent for Exchange is both automated few choices for small businesses that need VMware—VMware vSphere 4
and highly customizable. Argent Software’s suites with these kinds of features. Industry-standard VMware vSphere 4 won
round-the-clock support, quarterly updates this award because it’s a mature, stable,
to customers, and ability to monitor SharePoint: Quest Software— well-known technology that continues to
Exchange transport, storage, traffic logs, and Site Administrator for SharePoint 4.0 be an essential component of a large per-
account rules (among others)—through In the explosive SharePoint market, Quest’s centage of IT shops.
PowerShell, Exchange Management Shell, Site Administrator for SharePoint 4.0 is a
WMI, and classic Windows APIs—offer a winner because it provides administrators Breakthrough Product:
strong value proposition to customers. (and “accidental” SharePoint admins) a Citrix Systems—XenDesktop 4
comprehensive means to take control of Although Virtual Desktop Infrastructure
Microsoft Product: their burgeoning SharePoint environments. (VDI) isn’t even mainstream yet, Citrix
Microsoft—Visual Studio 2010 This product offers tools that provide cen- Systems is already working to expand what
Visual Studio 2010 raises the standard for tralized administration, discovery, site the phrase “virtual desktop” means. This
development tools, providing new native and content browsing, data collection and product wins as breakthrough product
WPF support, support for multiple moni- reporting, global policy and permissions because Citrix Systems is providing easy
tors, a new historical debugging capabil- management, and audit data collection and powerful virtual desktops, and there’s a
ity, and significantly enhanced SharePoint and reporting. good chance that will be the future of IT.
development and deployment capabilities.
Software Components & Attendees’ Pick:
Networking: Middleware: Telerik— VMware—VMware vSphere 4
A10 Networks—64-bit AX Series Telerik Ultimate Collection for .NET 2010 VMware vSphere 4 also took the coveted
The 64-bit AX Series wins this award because The Telerik Ultimate Collection provides a Attendees’ Pick award this year. VMware’s
of its innovative approach to network load complete set of WinForms, ASP.NET, and support for private and public clouds,
balancing, high availability, and health moni- Silverlight Controls. This product also sup- added to its well-respected features, has
toring. A10 Networks strives to “monitor the ports the OpenAccess data access frame- ensured the company a continuing place
water, not the plumbing.” Site-level and global- work and WebUI Test Studio for testing web in many environments.
level geographic redundancy—through a applications. InstantDoc ID 125376

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 63


P R O D U C T S
REVIEW

Corner Bowl Disk Monitor 2010


Mounting piles of data—common in the folders for when a large
corporate environment—can easily bury an file is added or tracking
organization’s servers. Storage is inexpensive, server disk space before
but data management, data tiering, and it reaches critically low
backup can be costly. Server space hogs such levels. The email alerts
as image-based backup files and videocon- are the most useful. The
ferencing data can quickly overtake network graphical HTML email
drive space. Corner Bowl Disk Monitor messages are easy to
helps keep tabs on data by monitoring drive- read and decipher; they
space usage, directories and files, and SMART feature graphs and a
drive health. In addition to monitoring and text breakdown of the
reporting, an easy-to-configure and easy-to- state of the share or
schedule feature is also included for deleting drive, as you can see in
profile or Windows temp files. Figure 1. You can use a Figure 1: Graphical HTML email alert
The program’s opening view features four custom HTML template, as well. a server must be part of a disk monitor or
tabs for configuration in a Microsoft Outlook– Further digging into the product reveals directory monitor. This approach is less than
style user environment: Disk Explorer, Disk a feature for viewing access permissions by ideal if you simply want to analyze network
Monitors, Directory Monitors, and Reports any of the NTFS permission levels. This fea- space on the fly for a particular server.
and Views. Machines chosen for monitoring ture is handy not only for compliance pur- As you become accustomed to the prod-
can be either mapped manually or added poses but also for configuration purposes. uct, you’ll find more uses for it. However,
via Active Directory (AD) integration. Within The access permission is selectable based defining too many alerts will quickly over-
a few minutes of opening the program, you on all NTFS permissions. A few quick clicks, whelm your email. Also, I found it difficult
can analyze a problematic server for disk- and you can ensure that sensitive data has to view all the different disk and directory
space concerns by, for example, reviewing the correct permissions applied. monitors on a per-server basis. But after
the 25 largest files and directories taking up The Directory Monitors functionality is using Corner Bowl Disk Monitor for several
most of the storage space. Doing so lets you broken down into two components—the weeks, I saved numerous hours of research
reduce the space used on the server. The Directory Size Monitor and the Directory time by quickly developing an alert or
system is fast: Scanning a 40GB partition took Watcher—that detect when certain types cleanup job using the disk monitor.
less than a minute over a 100Base-T network. of files are added to a directory. You can InstantDoc ID 125428
The program’s Disk Monitors are very define a Directory Size Monitor to check
useful, letting you monitor disk space for increases in directory size when the
used by the administration shares and the size exceeds a certain amount, when it Corner Bowl Disk Monitor 2010
Windows shares. A wizard-based approach changes in size, or even when the directory PROS: Easy to install and configure; wide range
makes it easy to add new monitors. The changes. The functionality is granular and of monitoring features; flexible alerting options;
alerting capabilities are flexible, and they’re can be set on a per-directory basis for customizable
separately configurable for warning and monitoring, even when you’ve configured CONS: Unintuitive report development; difficult
critical alert thresholds. Alerts for disks/ the wizard to monitor only a parent to track multiple configurations of disk monitors
and disk alerts per server
shares or directories can be logged to email, directory.
event logs, files, message boxes, SNMP The Directory Watcher lets you break RATING:
traps, sounds, or Syslog. Additional historical down your analysis to changed, created, PRICE: Starts at $29 for one computer; $99 to
data can be stored as text files or logged to deleted, and renamed files by file masks. monitor 20 computers from a desktop; $269 to
monitor 50 disks with one server license
a Microsoft SQL Server or MySQL database. This capability is useful for compliance
In addition to logging, a process can also be purposes because it logs or alerts you to RECOMMENDATION: Corner Bowl Disk
Monitor 2010 automates routine scans of drives
launched to fix the condition. changes in directories.
and directories and is extremely configurable at
The numerous alerts include default The Reports and Views module is less the most granular storage levels. Setup simplicity
options for when storage grows by more polished than the rest of the program. and excellent support make this an easy recom-
than a preset size or percentage, or when Reports come in four different templates: mendation, despite some caveats.
the free space drops below a certain per- Disk Summary, Directory Summary, File CONTACT: Corner Bowl Software • 866-501-8670 •
centage. These options are helpful since IIS Access, and Duplicate Files. For reporting, www.diskmonitor.com
log files, SQL Server backups, and disk-to-
disk backups can sometimes routinely fill
Tony Bieda | tonybieda@yahoo.com
up local disks. There are several practical
uses for these alerts, such as monitoring FTP

64 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:04 PM Page 1

“ THE CONVERSATION BEGINS HERE



QUESTIONS ANSWERED • STRATEGY DEFINED • RELATIONSHIPS BUILT

NOVEMBER 1-4, 2010


LAS VEGAS • MANDALAY BAY RESORT & CASINO

WinConnections ... Providing the vision


intelligence to keep you and your company competitive in today’s market!
+
Only Microsoft and Industry Experts speak at WinConnections! A sampling of our speakers ...

JEREMY KEVIN LAAHS MIKE DANSEGLIO ALAN SUGANO MARK MINASI DON JONES
MOSKOWITZ HP MICROSOFT ADS CONSULTING MR&D CONCENTRATED
MOSKOWITZ, INC GROUP TECHNOLOGY

STEVE RILEY RHONDA LAYFIELD CHRIS AVIS PAUL ROBICHAUX TONY REDMOND KIERAN MCCORRY
AMAZON WEB CONSULTANT/TRAINER MICROSOFT TRAINER/AUTHOR TONY REDMOND HP
SERVICES AND ASSOCIATES

EARLY BIRD DISCOUNT! Register by July 29 and book a minimum of three nights at
Mandalay Bay and you’ll receive a $100 Mandalay Bay Gift Certificate
and save $100 off conference registration!

800.505.1201 • 203.400.6121 • www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:04 PM Page 2 F1

THE CONVERSATION STARTS WITH YOU


THE CONVERSATION STARTS ON NOVEMBER 1.
Come to Las Vegas and participate in the IT Professionals community! Meet other professionals in sessions,
in the expo hall, and at conference events. This is your chance to network and make those personal connections
with conference speakers, the product teams from Microsoft plus our sponsors and vendors. Round out your
professional educational experience with great evening entertainment available only in Las Vegas!

WINDOWS CONNECTIONS, FALL 2010: EXCHANGE CONNECTIONS FALL 2010:


LEARN TO DO MORE WITH LESS! GET THE STRAIGHT SCOOP
Messaging and collaboration technologies move at a
WINDOWS CONNECTIONS brings you the
dizzying pace. Microsoft and its ecosystem partners
top names from today’s IT industry… the most well-
are continually releasing new software, hardware,
known experts, delivering the most hard-hitting
procedures, and updates that make the world of
sessions that help you solve today’s IT challenges
Unified Communications ever more complicated.
and prepare for tomorrow.
What's the best way to keep up? Come to Exchange
We know that today’s IT professionals are being asked Connections to get the answers you need! Our
to do more, with less, and we want to help. We sessions cover using Exchange and other related
assembled a business-focused group of technology products the real world: deploying, managing, and
experts, to bring you the answers to your technology maintaining Microsoft’s Exchange and OCS products in
questions. You’ll find original content specifically your business to get the functionality you need.
crafted to help you succeed in today’s business
This year, we’re going deep on Exchange 2010,
technology environments, organized around five key
including coverage of deployment and information
focus areas:
protection, as well as the new features to expect in SP1.
■ Virtualization We’ll be delving into discussions of how to integrate
■ Windows 7 Exchange with SharePoint (and other collaboration
■ Windows Server 2008 R2 solutions), as well as exploring the best way to make
use of Unified Communications in your organization.
■ Business, not “Information,” Technology
If you’re still running Exchange 2003 or Exchange 2007,
■ Build Your Skill Set - and Your Resume
don’t worry— we're covering them too, with content to
help you make the most out of your existing
investments and to prepare for the future, whether it's
on Exchange 2010 or Microsoft's Business Productivity
Online Services (BPOS) cloud offering.

SHAREPOINT CONNECTIONS, FALL 2010: GET A HEAD START ON THE NEW VERSION
Leading SharePoint experts from Microsoft and from on the server (LINQ) and off the server (client object
the field have teamed up to bring to you the model), leveraging Silverlight, working with data that
knowledge you need to succeed with SharePoint 2010. does not live within SharePoint with the new Business
IT PROS! Come hear Dan Holme, Michael Noel and Connectivity Services.
others lay out the best practices for installing, SOLUTIONS! Join Asif Rehmani and special guest
upgrading, configuring, securing, and managing speakers from our IT Pro and Developer tracks as they
SharePoint 2010. Go beyond the hype and dive deep unveil the big-win solutions that SharePoint delivers,
into what it takes to successfully deploy SharePoint out-of-the-box. Learn to create high-value, no-code
2010 in the real world. solutions with tools like SharePoint Designer, InfoPath,
DEVELOPERS! Come hear Andrew Connell, SharePoint Workspaces, Excel and Access Services, and
Ted Pattison, Scot Hiller and others provide guidance Office Web Apps. Discover what you can do to
on how to best customize and extend your SharePoint automate processes and deliver the composite and
2010 investments using the new data access methods collaboration solutions that your users are demanding.

2 I Register Today! Call 800-505-1201 I www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:04 PM Page 3

JOIN THE CONVERSATION


Schedule at a Glance
MONDAY, NOVEMBER 1, 2010
7:30 am Registration Opens
9:00am - 4:00 pm Pre-conference Workshops
TUESDAY, NOVEMBER 2, 2010
7:00 am - 5:00 pm Conference Registration
7:30 am - 8:30 am Continental Breakfast

WIN!
8:30 am - 10:00 am Keynote C R U I S E G I V E A W AY

Enter to
10:00 am - 11:00 am Expo Hall Open
11:00 am - 12:15 pm Conference Sessions
12:15 pm - 1:45 pm Lunch
1:45 pm - 6:15 pm Conference Sessions
WEDNESDAY, NOVEMBER 3, 2010
7:00 am - 5:00 pm Conference Registration Enter the contest in the Expo Hall to
7:00 am - 8:00 am Continental Breakfast WIN a 1 week Caribbean Cruise for two!
8:00 am - 9:15 am Keynote You must be present in the Expo Hall at the time of the drawing to win.
9:15 am - 11:45 am Expo Hall Open
10:15 am - 1:00 pm Conference Sessions KEYNOTES
1:00 pm - 2:30 pm Lunch
2:30 pm - 5:15 pm Conference Sessions
5:15 pm - 6:45 pm Expo Hall Reception MARK TONY
MINASI REDMOND
6:30 pm - 7:30 pm Vendor Sessions
MR&D Tony Redmond
THURSDAY, NOVEMBER 4, 2010 and Associates
7:00 am - 8:00 am Continental Breakfast
8:00 am - 1:00 pm Conference Sessions
10:30 am - 2:30 pm Expo Hall
1:00 pm - 2:30 pm Lunch
STEVE STEVE
2:15 pm Cruise Raffle FOX RILEY
2:30 pm - 3:30 pm Conference Sessions Microsoft Amazon Web
Closing Session Services
4:00 pm - 4:30 pm & Prize Drawing
FRIDAY, NOVEMBER 5, 2010
9:00 am - 4:00 pm Post-conference Workshops Check online for speaker bios and additional keynotes to be announced.

CONFERENCE AND EXPO INCLUDES:

Exchange and Windows Connections registration includes a one-year Your Conference & Expo registration
(12 issues) print subscription to Windows IT Pro magazine for Exchange includes:
and Windows conference attendees only. Current subscribers will have ■ Three Continental Breakfasts
an additional 12-months added to their subscription. Subscriptions out- ■ Three Lunches
side of the United States will be served in digital; $12.50 of the funds will ■ Reception
be allocated toward a subscription to Windows IT Pro ($49.95 value) ■ Conference T-Shirt and Bag

■ Proceedings Resource CD … and more

SharePoint Connections registration includes a print subscription (4 issues: Nov, March, June, Sept) to SharePointPro-
Connections magazine for SharePoint and Windows conference attendees only. Current subscribers will have an addi-
tional one year (4 issues) added to their subscription. Subscriptions outside of the United States will be served in digital.

November 1-4, 2010 I Las Vegas, NV I Register Today! I3


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:04 PM Page 4 F1

MICROSOFT EXCHANGE SESSIONS

EXC04: CAS 2010 – MORE FOOD 2007, but there are some important EXC20: FAULT TOLERANT CLIENT
FOR THOUGHT changes and restrictions on interoperabili- ACCESS SERVERS FOR SMALL AND
KEVIN LAAHS ty that any organization in the early stages MEDIUM SIZED BUSINESS
The Client Access Server (CAS) plays a big- of planning a move to Exchange 2010 BRIAN REID
ger role in Exchange 2010 environments should be aware of. This session will give an
It is easy to see the benefits of a highly
than it does in Exchange 2007. While it still overview of the best practices for Exchange
available CAS infrastructure for large
supports Outlook Web Access (OWA), 2010 deployment and focus on the inter-
Exchange Server 2010 deployments, but
ActiveSync, Web Services and Outlook operability and migration aspects from
what about the majority of businesses who
Anywhere, there are some fundamental previous versions of Exchange.
are in the small to medium business cate-
changes that affect the way you architect EXC08: EXCHANGE 2010 gory? This session will cover the benefits of
Exchange environments. This session looks INFORMATION PROTECTION considering why to build your Exchange
at major architectural changes (such as infrastructure to include high availability
AND RETENTION
RPC Client Access Service) as well as all the for CAS. You will learn to build your
features that are delivered by the likes of KIERAN MCCORRY Exchange infrastructure with recovery and
OWA (even to Firefox and Safari browsers!) Exchange 2010 brings with it the most growth in mind. Building for high availabil-
and ActiveSync, such as the ability to send comprehensive set of Exchange features ity, even for small/medium businesses,
and receive text messages from yet from Microsoft to help you safeguard brings many benefits. In the event of a fail-
Outlook/OWA. and protect your data and where it goes in ure of an Exchange Server, having consid-
your Exchange organization. This new ver- ered a highly available infrastructure will
EXC24: CLOUD-PROOFING sion has sophisticated rules for controlling reduce your recovery time.
YOUR CAREER information flows within the organization
PAUL ROBICHAUX and taking actions when certain events EXC06: FEAR WEB SERVICES NO MORE
You can’t throw a poker chip around an IT occur. In addition, Exchange 2010 has a – HOW ADMINISTRATORS AND END
department without hitting someone completely revamped model for informa- USERS CAN EASILY LEVERAGE
who’s interested in cloud services – but tion retention and archiving by means of EXCHANGE WEB SERVICES
where does that leave the on-premises the ONline Archive. This session will KEVIN LAAHS
admins? Can you take effective steps to describe those new features and explain
PowerShell is often considered within the
cloud-proof your job? What kinds of things what it means for you as a system admin-
realm of IT Administrators, whereas Web
should you be doing to build a protective istrator and your users as information
Services is firmly in the developer camp –
umbrella of your own value to help you if workers.
and usually, never the twain shall meet! But
the clouds come to your office? This ses- EXC09: EXCHANGE 2010 SERVICE now the combination of PowerShell and
sion will offer some practical tips to help Exchange Web Services can be harnessed
PACK 1
you weather cloudy times. by end users to build and run scripts to
KIERAN MCCORRY manage mailbox data on desktop
EXC18: COMMUNICATIONS SERVER There’s nothing like waiting for the first machines. This session shows IT
2010: WHAT’S NEW AND IMPROVED? service pack before looking in earnest at a Administrators how friendly Web Services
LEE MACKEY new product deployment. Exchange 2010 can be, and how you can easily leverage
This session will walk you through the var- Service Pack 1 brings a host of improve- them to automate many operations in
ious versions of Communications Server 14 ments and enhancements to the core plat- your Exchange environment.
starting with Live Communications Server form. In this session, we’ll see what comes
2005, through OCS 2007 and R2. We’ll talk with the update and why it makes sense to EXC01: GOING BIG! DEPLOYING
about what’s new and improved for CS 14, think about deploying Exchange now that LARGE MAILBOXES WITH MICROSOFT
design considerations, changes from cur- SP1 is here. EXCHANGE SERVER 2010 WITHOUT
rent hardware required, and through the BREAKING THE BANK
EXC05: EXCHANGE 2010, OFFICE 2010
new pieces that will help build a better ROI KARL ROBINSON
for your organization. We’ll also talk AND SHAREPOINT 2010 –
With each new generation of Microsoft
through the various partners you might BETTER TOGETHER?
Exchange, features are added and
want to work with to leverage your organ- KEVIN LAAHS Exchange is further refined in its capabilities
ization and improve your overall cost to What integration points exist between as an email system. Exchange Server 2010
deploy and support an environment run- SharePoint 2010, Office 2010 and enables the use of multiple storage options
ning CS 14. Exchange 2010? Does the combination of in its deployment, and allows you to pro-
these three flagship products (and other vide large mailboxes at a cheaper cost. Will
EXC07: EXCHANGE 2010 such as OCS) bring any new opportunities it work in your environment? Are you hesi-
DEPLOYMENT AND MIGRATION for my overall environment? And what tant to increase mailbox sizes due to chal-
BEST PRACTICES about the existing integration points that lenges around storage? How do you know
KIERAN MCCORRY were there in the 2007 suite of products? when to use a specific type of storage? Do
Exchange 2010 is yet another version of Are they still available? In this session, we you need to enable Exchange high-avail-
Exchange. Its architecture and topology is answer the numerous questions in this ability when using a JBOD configuration?
similar to that introduced with Exchange abstract! Can you really use SATA disks with

4 I Register Today! Call 800-505-1201 I www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:04 PM Page 5

MICROSOFT EXCHANGE SESSIONS

Exchange? If you want the answers to these examples, examines the requirements, advancements such as x64 architectures,
questions; be sure to attend this session. caveats, and best practices available for multi-core processors, SATA, SAS and SSD
designing appropriate load balancing disk technology, and how these technolo-
EXC22: HEY! YOU! GET OFF solutions for Exchange 2007 and 2010 gies will play a key role moving forward
MY CLOUD! deployments. It compares Windows with Exchange 2010. Finally, the session
PAUL ROBICHAUX Network Load Balancing, software load provides rules of thumb, based jointly on
Cloud services are great – some of the balancers, and hardware load balancers. HP characterization testing and HP /
time. Unfortunately, there’s too much hype We recommend you take this session in Microsoft best practices, for sizing the key
and hot air surrounding cloud-based mes- conjunction with the session: The RPC server roles and technologies associated
saging and collaboration services, so it’s Client Access Array: The Missing Piece of with typical Exchange 2010 deployments.
hard to see what’s real and what’s not. In Exchange HA.
this session, you’ll gain a clear understand- EXC11: MIGRATING TO EXCHANGE
ing of what cloud vendors aren’t telling EXC23: MICROSOFT ADVANCED 2010 FROM EXCHANGE 2003
you about retention, regulatory compli- CERTIFICATIONS: BEYOND THE JIM MCBEE
ance, maintenance, migration, and coexis- BRAIN DUMP This session will cover the practical aspects
tence. Come learn about the pros and cons PAUL ROBICHAUX of migrating from Exchange Server 2003 to
of cloud-based and hybrid Exchange Certification is more important than ever – Exchange 2010 including meeting the nec-
deployments so you’ll be prepared for the but how do you prove to employers that essary prerequisites, interoperability, and
inevitable questions. you’re more than a run-of-the-mill MCSE potential showstoppers. Topics include fac-
or MCITP? Microsoft’s solution is to offer tors to evaluate before migrating, the steps
EXC10: HIGH AVAILABILITY FOR
more advanced certifications like the necessary to prepare your organization,
SMALL AND MEDIUM-SIZED BUSI-
Microsoft Certified Master (MCM) and mail routing, web client redirection, mov-
NESSES WITHOUT THE HIGH COST Microsoft Certified Architect (MCA) pro- ing public folder content, and moving
JIM MCBEE grams. They’re expensive and intensive – mailbox data.
In older versions of Exchange, achieving but are they worth it? In this session, Paul
high availability and site resiliency usually Paul Robichaux (who teaches in the MCM EXC21: MODERATED EMAILS – THE
entailed having four or more servers, third- Exchange program) will bring you up to GOOD, THE BAD AND THE UGLY
party products and/or additional storage speed on these certifications and discuss BRIAN REID
technologies. Clustering in Exchange their costs and benefits. (Special guest There can be significant impacts with inap-
Server 2010 has evolved into database appearances by current MCMs are likely, so propriate emails send to the wrong distri-
availability groups (DAGs). Unlike previous be prepared!) bution group, or off subject emails sent to
versions where availability and databases specific mailboxes. With moderation
are tied to a specific servers, with DAGs a EXC02: MICROSOFT EXCHANGE implemented correctly you can remove
database can be active on any server with- SERVER 2010: SIZING AND these issues from your business. This ses-
in the availability group and each database PERFORMANCE – GET IT RIGHT sion will look at how to configure modera-
can be made active on any server within THE FIRST TIME tion in Exchange 2010, and how to imple-
the group. This session will cover using KARL ROBINSON mented it in a coexistence legacy Exchange
Exchange Server 2010 in a small or medi- Microsoft Exchange is a mission-critical organization.
um sized business (under 1,000 users) that infrastructure staple in organizations of all
want to achieve high availability and/or sizes. As an application which demands EXC14: OUTLOOK: MAC 101
site resilience using only two Exchange high levels of the "-abilities" (availability, BILL SMITH
2010 servers. Topics include database reliability, scalability, etc.) and stringent NADYNE RICHMOND
availability groups, Client Access arrays, resource demands, the sizing process is Office:Mac 2011 brings Outlook to the
and providing high availability for the mes- critical to ensuring a healthy production Mac. What can your Mac users expect of
sage transport when using two server environment. Sizing Exchange 2010, which this new application? What can you as the
DAGs. introduces a new replication and resiliency Exchange admin expect from it? Learn how
model (DAGs), a personal archive as well as Outlook:Mac fits into your Exchange envi-
EXC15: LOAD BALANCING YOUR dramatic I/O reductions, radically changes ronment, and see a side-by-side compari-
EXCHANGE DEPLOYMENT the approach to storage design. son of Outlook 2010 for Windows and
DEVIN L. GANGER Enhancements and new functionality host- Outlook:Mac 2011.
When it comes to highly available ed in the client access server, support for
Exchange deployments, a lot of attention is role consolidation on a single server and EXC12: OUTSOURCED E-MAIL:
focused on the Mailbox role. As the CAS optimization for software + services mod- IS IT FOR MY ORGANIZATION?
role in Exchange 2007 and Exchange 2010 els bring similar challenges when design- JIM MCBEE
takes over more of the client connections, ing servers. This session addresses sizing Depending on whose marketing material
load balancing incoming connections at and performance tuning methodology, you read, EVERYONE should outsource
the CAS and Hub Transport becomes more and a time-tested approach for applying their e-mail to a hosted provider. There are
important to successful Exchange deploy- this methodology to your environment. definitely advantages to this approach
ments. This session, drawn from real-world The session covers key enabling hardware including significant cost savings,

November 1-4, 2010 I Las Vegas, NV I Register Today! I5


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:05 PM Page 6 F1

MICROSOFT EXCHANGE SESSIONS MICROSOFT DAY


improved availability, and allowing some- deploy it. Devin will also examine how EXCHANGE SESSIONS
one else to take on the hassle of fighting deploying RPC Client Access Arrays affects
spam and viruses. But there are many fac- the clients, load balancers, reverse proxies, ■ How Microsoft IT Implemented
tors you need to consider before leaping in and other parts of your Exchange organi- Microsoft Exchange Server 2010
to hosted Exchange including determining zation. We recommend you take this ses- ■ Microsoft Exchange Server 2010
if there are legal or corporate restrictions sion in conjunction with the session: Load Unified Messaging in the Real World
on doing so, establishing service-level Balancing for Exchange Deployments.
agreements, and determining exactly what ■ Using Microsoft Exchange Server
you will get for your money. This session EXC17: WAN OPTIMIZATION FOR 2010 to Achieve Rich Coexistence
will discuss the pros and cons of outsourc- EXCHANGE with Exchange Online
ing e-mail as well as reviewing some case DEVIN L. GANGER ■ Microsoft Communications Server
studies of organizations that have done so. WAN optimizers provide on-the-fly band- “14”: What's New in Microsoft
width reduction for a variety of applica- Communicator “14” Experience
EXC19: PROVIDING FAULT TOLERANT tions, mainly websites and file services. and Backend
MAIL DELIVERY WITHIN AND However, Exchange MAPI-RPC client ses-
BETWEEN ORGANIZATIONS ■ Microsoft Exchange Server 2010:
sions may also benefit from these devices.
BRIAN REID This session, drawn from real-world exam- Sizing and Performance - Get It Right
A new core feature of Exchange Server ples, explains how current WAN optimizer the First Time
2010 is the ability to ensure email delivery offerings work with MAPI, both client-to- ■ What's New in Archiving, Retention,
even if you have outages in your transport server and server-to-server, and helps give and Discovery in Microsoft Exchange
infrastructure. This session looks at how you information to assess what kind of Server 2010 SP1
fault tolerant mail delivery works, and then bandwidth savings you might see in your
■ What's New in OWA, Mobility, and
how to extend it to operate across different environment. How does SMB signing affect
your optimization? Can optimization be Calendaring in Microsoft Exchange
Exchange organizations.
extended to mobile clients? Can optimiza- Server 2010 SP1
EXC03: STORAGE OPTIONS FOR tion help with the replication of multiple ■ Microsoft Exchange Server 2010
EXCHANGE 2010 DAG copies into a secondary site? Devin High Availability Design
KARL ROBINSON will examine these topics and provide clear Considerations
With each new generation of Microsoft answers to help you determine if WAN
Exchange, features are added and optimization is right for you.
Exchange is further refined in its capabili-
ties as an e-mail system. This can lead to EXC13: ADMINISTRATING MACS IN
confusion as the number of options AN EXCHANGE ENVIRONMENT
increases. Exchange 2010 enables the use BILL SMITH WINDOWS SESSIONS
of multiple storage options in its deploy- NADYNE RICHMOND ■ Deploying Windows
ment ranging from Storage Area Networks This session provides an in-depth look at ■ PowerShell – The Basics and More
(SAN) to Direct-attached storage (DAS). how to administer Macs in your Exchange
How do you know when to use a specific environment. Learn how to set up your ■ Three Screens and a Cloud -
type of storage? Will it work in your envi- Exchange servers to maximize the experi- Bringing Traditional Desktop
ronment? Do you need to enable ence for your Mac users. Also, learn how to Computing, Mobility and Cloud
Exchange high-availability when using a use AppleScript to quickly deploy and Computing Together
JBOD configuration? Can you use SATA update Entourage (in Office:Mac 2008) or ■ Windows XP-Mode in Windows 7
disks to provide your users with 5GB mail- Outlook (in Office:Mac 2011) to all of your
boxes? If you want the answers to these Mac users at once. Tips, tricks, and trou- ■ Direct Access: The Death of the VPN
questions, be sure to attend this session. bleshooting are all included. ■ Top 10 Reasons to Upgrade to
EXC16: THE RPC CLIENT ACCESS Windows 7
ARRAY: THE MISSING PIECE OF ■ Top 10 Reasons to Upgrade to
EXCHANGE AVAILABILITY Windows Server 2008 R2
DEVIN L. GANGER ■ Hyper-V: Securing your
Exchange 2010’s Database Availability Virtualization Environment
Group functionality has received a lot of
■ Windows Azure: Clear or Cloudy?
press and hype (and deservedly so) for
enabling better, easier HA scenarios. CHECK WEB SITE AS WE ■ Introduction to Application
There’s a missing piece, however: the RPC CONTINUE TO ADD MORE Virtualization (APP-V)
Client Access Array. This session, drawn SESSIONS, SPEAKERS ■ Introduction to Microsoft Enterprise
from real-world examples, explains what AND MAKE UPDATES
Desktop Virtualization (MED-V)
the RPC Client Access Array object is (and WWW.WINCONNECTIONS.COM
what it isn’t), when you need it, and how to

6 I Register Today! Call 800-505-1201 I www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:05 PM Page 7

WINDOWS SESSIONS

WIN12: ASSESSING AND get productive with the AD PoSH cmdlets availability, management and other fea-
INTEGRATING CLOUD SERVICES in no time. Every attendee will scratch his tures in the comparison shootout. If you’re
IN YOUR INFRASTRUCTURE or her head and say, "hey, I could use that!" evaluating virtualization platforms, make
MIKE DANSEGLIO at least once in this session! sure to attend this session to assist in your
decision making process.
Cloud computing is one of the hottest, WIN11: CONDUCTING A FORENSIC
fastest growing services in the IT industry COMPUTER INVESTIGATION FOR WIN02: GOING, GOING, GONE?
today. It is changing the way enterprises VIRTUALIZING YOUR ACTIVE
IT STAFF
and small business interact and collaborate: DIRECTORY FOREST
providing access to IT computer resources, MIKE DANSEGLIO
enabling sharing and distribution of data, Computer crime has been on the rise for SEAN DEUBY
integrating communications and many decades. There are many situations where Virtualization is all the rage today. Can
more business critical services, all on a pay- an incident occurs that doesn’t break the you apply virtualization to the critical
as-you-go model that makes it affordable law but is still cause for concern, such as infrastructure of your Active Directory for-
to virtually any size organization. In this ses- corporate policy violations, information est? What about backup and recovery?
sion, we examine how cloud computing mishandling, or internal system compro- Learn from Sean how to safely virtualize
services extend IT capabilities seamlessly mise. Many companies are forming their and manage your domain controllers with
and with nearly infinite resources and serv- own internal investigative units to address the latest recommendations and best
ices. Commercial cloud service examples these situations. In this session, we’ll exam- practices from the Microsoft Directory
are shown, many of which require very little ine what kinds of investigations can be Services Team.
work before you can extend your infra- handled internally, when and how to
engage law enforcement, how to best pre- WIN01: HOW DO YOU SCORE
structure into the space.
pare for incidents, and the best practices to AGAINST THE ACTIVE DIRECTORY
WIN09: AUTOMATING YOUR AD: use. We will also focus on building your BEST PRACTICES ANALYZER?
OPERATE AND DOCUMENT YOUR computer investigation toolkit including SEAN DEUBY
DOMAIN MORE EASILY, the tools you should have and how you Windows Server 2008 R2 features a Best
AUTOMATICALLY AND REPEATABLY should use them. Practices Analyzer for Active Directory that
WITH WINDOWS’ FREE TOOLS will tell you how to improve your AD con-
WIN14: ENEMY AT THE GATES: figuration. It’s a great tool, but you have to
MARK MINASI
YOUR WIRELESS NETWORK IS WEAK upgrade to R2 to use it. Besides, you can
Still administering your AD the click-and-
drag way? For most AD admins, the answer MIKE DANSEGLIO get all the best practices advice right in this
is sadly "yes," and often for the same rea- The proliferation of wireless networks has session! See how your AD shapes up
son: busy AD admins just don’t get the exploded to the point that virtually every against the rules and recommendations of
time to learn how to use the many free AD enterprise has one – whether they know it the R2 AD Best Practices Analyzer.
automation tools built right into or not. And increasingly the wireless net-
work is the primary target of malicious WIN23: IMPLEMENTING AFFORDABLE
Windows... until now. Join Mark Minasi, AD
attackers. Can wireless networks be pro- DISASTER RECOVERY WITH HYPER-V
expert and author of over 150 installments
tected? What does that cute little padlock AND MULTI-SITE CLUSTERING
of the popular "Windows Power Tools" and
"This Old Resource Kit" columns, in a clear, icon mean? Is it ‘security theater’ – the illu- GREG SHIELDS
example-filled explanation of some of the sion of security without real substance? In You already know that Hyper-V can be an
best in-the-box Active Directory automa- this session, you’ll see the technical details inexpensive solution for virtualization. But
tion tools. First, you’ll learn bulk account of a variety of wireless security technolo- did you know it can also be an inexpensive
creation with CSVDE and LDIFDE. Then gies including cryptography, authentica- solution for disaster recovery? All you need
we’ll take a quick peek under the hood of tion, authorization, filtering, and more. is a bit of VHD replication and an extension
AD’s structure with ADSIEdit to enable us Hands on demonstrations will illustrate of your Windows Failover Cluster to a sec-
to speak a bit of "LDAP-ese," a skill we’ll both strong and weak wireless security ondary site. What’s hard is correctly con-
need to take the next step and start bene- strategies. The knowledge you’ll gain from necting the pieces. Join renowned Hyper-V
fiting from 2008 R2’s 76 new Active this session will help you decide what level guru Greg Shields to learn the step-by-step
Directory-oriented cmdlets. With these of security is necessary to protect your own along with a set of smart strategies for
new cmdlets, you can often convert a task assets against the barbarians. implementation. Greg will show you the
that once required a few hundred clicks – very best ways to extend a Hyper-V cluster
or two days of VBScripting – into just a few WIN17: ESX AND HYPER-V to a DR site as well as reveal the costly mis-
commands. What’s that you say, you don’t COMPARISON takes that you’ll want to avoid.
have 2008 R2? No problem; Mark will show ALAN SUGANO
you how you can get the PowerShell tools Microsoft’s own hypervisor, Hyper-V, was WIN13: IMPLEMENTING SERVER
running on any 2003-based AD. Or per- released with Windows Server 2008. It is CONSOLIDATION WITH
haps you don’t know PowerShell yet? No designed to compete directly against VIRTUALIZATION
need to worry, as this session tosses in VMware’s ESX server. How do the two MIKE DANSEGLIO
enough PowerShell basics to enable any- products compare? We’ll consider price, We all hear the "do more with less"
one comfortable with Active Directory to performance, hardware requirements, high mantra from our pointy-haired boss. But

November 1-4, 2010 I Las Vegas, NV I Register Today! I7


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:05 PM Page 8 F1

WINDOWS SESSIONS

how do we actually implement the tion. App-V is a big place, but come to this server is wasted. Server virtualization
changes in our IT infrastructure to make it session to make sure you know the ins and allows you to efficiently use the processing
happen? One effective method is server outs before you get it in your test lab and power of new servers and the 64-bit plat-
consolidation through virtualization. But then into your organization! form by consolidating multiple physical
is it really possible to take a rack of bare- servers onto a single virtual server host.
ly-used servers and collapse them into a WIN19: MIGRATE YOUR XP We’ll look at virtualization software tech-
single physical host while keeping the MACHINES TO WINDOWS 7 nologies and how they work with server
changes transparent to users and business RHONDA LAYFIELD virtualization. We’ll examine hardware
services? It’s not only possible, it’s right at Whether migrating 20 or 20,000 XP configuration issues in the virtualization
your fingertips. Come see how you can machines to Windows 7, the Microsoft environment and tips on selecting the
implement these kinds of changes using Deployment Toolkit 2010 Update 1 (MDT) proper hardware for server consolidation.
tools and resources that you have today is the tool to use. In this session, Rhonda We’ll review management options with
in your effort to lower operational costs will show you how to install, deploy and demos of VMware ESX (vSphere and
and offer more services with less equip- automate your XP migrations and vCenter) and Hyper-V (Hyper-V Manager
ment. You’ll see demonstrations of com- Windows 7 bare metal installations. Don’t and the System Center Virtual Machine
monly used tools and technologies. just consider migration but creating a Manager).
complete deployment solution including
WIN06: MICROSOFT AND 3RD-PARTY re-imaging for troubleshooting your desk- WIN03: SYSTEM CENTER
GPO TOOLS YOU NEVER HEARD OF top environment. MDTs task sequences can ESSENTIALS 2010
(AND SHOULDN’T MISS) be a little tricky until you understand them SEAN DEUBY
JEREMY MOSKOWITZ and how to make them do your bidding. If you’re handling IT for a small to mid-
It’s now more important to "do more with Also learn how to integrate MDT and WDS sized business, one of the biggest chal-
less." And if you’re an Active Directory to get the best of both tools! lenges you face is proactively managing
administrator, you’re also a Group Policy your environment. Staying ahead of prob-
administrator. And that means you need to WON08: NIGHT OF THE LIVING lems, instead of getting pulled off more
do more with what you’ve got. The good DIRECTORY: UNDERSTANDING THE strategically important work to fix them, is
news is, there are a gaggle of free, low cost, WINDOWS SERVER 2008 R2 ACTIVE a far better way to spend your day.
and pay tools to help round out your DIRECTORY RECYCLE BIN Growing IT when you need to is also tough
Group Policy experiences. Some tools are MARK MINASI due to the capital costs a new server
in the box, downloadable from Microsoft Windows Server 2008 R2 brought a num- requires. System Center Essentials (SCE)
or available with a license. Some tools we’ll ber of nice changes to Active Directory, but 2010 is designed specifically to address
explore are 3rd-party tools. Together, these the number one crowd pleaser had to be these problems. It simplifies the manage-
tools can help you troubleshoot, lock down the Active Directory Recycle Bin, a useful ment tasks for servers, clients, hardware,
your desktops, make your applications tool for undeleting Active Directory objects and software for mid-sized companies. It
more secure, manage what you’ve got that have been deleted, so to speak, handles monitoring, software distribution
more efficiently and be a better adminis- "before their time." Powerful and useful as and inventory, and – new for 2010 – virtu-
trator. In this session, you’ll walk away with the Recycle Bin is, however, there is more alization management. Come see what
a huge list of applications you can experi- to it than a bit of clicking and dragging, as SCE 2010 is all about in this overview and
ment with today to see if they’re a good fit there is no Recycle Bin GUI built into R2 – demo session.
for your environment and see if you can the only in-the-box way to make use of the
really "do more with less." WIN10: TEN (OR MORE) THINGS YOU
Recycle Bin is a set of PowerShell com-
mands. (There ARE third-party GUIs for the PROBABLY DON’T KNOW ABOUT
WIN07: MICROSOFT APPLICATION Recycle Bin, though, as you’ll learn in this WINDOWS SERVER 2008 R2
VIRTUALIZATION (APP-V / SOFTGRID) session.) How long can something stay MARK MINASI
JEREMY MOSKOWITZ "dead" before it can’t be revived? Must you Okay, so maybe you’ve read about or even
Let me guess: your machines just “blow up“ reboot your domain controllers to un- played around with Windows Server 2008
now and again. And I know why. It’s delete things? Is there a way in an R2 R2. You know a bit about Active Directory’s
because you have a zillion applications on domain to delete something and ensure PowerShell cmdlets, DirectAccess,
them with a half a zillion conflicts and that it CAN’T be revived? Find out in this BranchCache and the new backup pro-
things just “deteriorate“ over time. fast-paced, comprehensive look at the new gram. It’s all great stuff, but... did you know
Wouldn’t it be neat if you could just elimi- Active Directory Recycle Bin, presented by that R2’s the first print server whose spool-
nate that problem altogether? Well, with Mark Minasi, author of some of the best- er service WON’T crash just because a print
Microsoft’s newest App-V technology, you selling books on Active Directory around! driver failed? Or that R2’s DHCP server
can. It works by “wrapping up“ your exist- service has a cool new MAC filter feature,
ing software into “sequences,” and then WIN04: SERVER VIRTUALIZATION combined with helpful new support for
putting them into a virtual sandbox. The ESSENTIALS split scopes? Well, that’s just the start. Ever
upshot? Your applications aren’t running ALAN SUGANO needed to resize a VHD? R2’s got com-
“on” Windows. They’re running within the As server hardware becomes more power- mand-line support for that, as well as a
sandbox. So, no more desktop deteriora- ful, much of the processing power of the whole new kind of built-in SMB cache. And

8 I Register Today! Call 800-505-1201 I www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:05 PM Page 9

WINDOWS SESSIONS

of course you know that R2 shores up your SteadyState tool and some non-Microsoft Conversions. All of these practices were
system’s security by blocking those scary tools to help enhance your PC control. developed as a result of real-world imple-
old 1980s LM-type logons – but did you mentations of ESX. Find out how to avoid
know that R2’s got the tool that you need WIN22: USING FREE TOOLS TO potential pitfalls when implementing ESX
to smoke out and stomp those persistent RAPIDLY DEPLOY SOFTWARE IN YOUR and ensure a stable, secure and fast virtu-
early 90s NTLM logons? Join server geek ENVIRONMENT alization infrastructure.
Mark Minasi in a fast-paced review of all of GREG SHIELDS
the R2 features that haven’t really gotten Running around the office with installation WIN16: WHAT TYPE OF
the attention that he thinks that they DVDs is a massive time waste. But investing VIRTUALIZATION TECHNOLOGY
ought to, complete with demos and step- in an automated software deployment IS RIGHT FOR MY COMPANY?
by-step instructions to try them out in your solution can be expensive. So if you’re a ALAN SUGANO
own network. Hey, what would be crazier small environment, how do you get soft- Virtualization has now become main
than paying for a new server operating ware installed everywhere with a minimum stream in the IT Infrastructure world.
system and not squeezing all of the juice of effort? Free tools along with a few nifty Everyone knows about server virtualiza-
out of it? tricks can help. Master Packager Greg tion, but what about other virtualization
Shields shares his experience with software technologies? This session will give an
WIN21: THE BEST FREE TOOLS packaging and automated deployment in overview of virtualization technologies and
FOR WINDOWS DESKTOP this make-your-brain-explode session. He’ll how they might be used in your company.
ADMINISTRATION give you the secret knowledge to reconfig- These technologies include server virtual-
GREG SHIELDS ure virtually any piece of software for silent ization, desktop virtualization, application
IT professionals are a unique group. We’re installation, and explain how free tools can virtualization, storage virtualization, and
tasked with the ultimate responsibility of rapidly deploy that software to anywhere database virtualization. Learn how your
our business’ critical applications and data, you need. company can benefit from these technolo-
but we’re rarely given a budget to do so. gies and which ones are a good fit for your
Heck, many of us aren’t even allowed to WIN24: VDI, RDS, MED-V, AND company’s IT strategy.
see the budget. As a result, we’re forced to APP-V: MAKING THE RIGHT
either beg for tools or find them for free on DECISION IN DEPLOYING WIN18: WINDOWS POWERSHELL
the Internet. Cheapskate IT Pro Greg APPLICATIONS CRASH COURSE
Shields has been collecting the very best GREG SHIELDS DON JONES
free tools for over ten years, and wants to There’s an alphabet soup of options for Ready to start using Windows PowerShell
share those in his quiver with you! In this connecting users to applications and data. v2? PowerShell guru Don Jones gives you a
must-see session, Greg highlights the very You can stream down that app. You can jump start with this information-packed
best no cost Windows tools – some you’ve present it atop RDS or XenApp. You can crash course that involves no scripting!
used, many you’ve never seen. Join this deliver an entire desktop, either over the That’s right, no programming allowed –
session and leave Windows Connections network or atop an existing workstation. just killer commands, remote control capa-
with a brand new toolset for solving the But while the technology is exciting, the bilities, background jobs, and other key
daily tasks in desktop administration. hardest part is determining when to use PowerShell skills that will make you effec-
each approach. When is presentation bet- tive in Windows, SQL Server, Exchange,
WIN05: TOTAL WORKSTATION SharePoint, and more.
ter than streaming? When is a virtual desk-
LOCKDOWN: YOUR ACTION PLAN top better than a RemoteApp, and when is
JEREMY MOSKOWITZ VDI better for your vendor’s pocketbook WIN20: ZERO TOUCH INSTALLATIONS
Total workstation lockdown isn’t for every than your own budget? Join virtualization WITH SYSTEM CENTER CONFIGURA-
machine in your organization but some expert Greg Shields for the no-nonsense TION MANAGER (SCCM)
machines require it. It’s usually those "pub- facts. He’ll share his experience in right-siz- RHONDA LAYFIELD
lic walk up" machines that we need to ing application delivery, ensuring that your When learning the Microsoft Deployment
manage a little bit differently. These kinds users, your budget, and your employer will Tools there is only one tool that can per-
of machines are in the cafeterias, the lobby thank you. form an Operating System Deployment
and the library. Microsoft has a variety of (OSD) with no human intervention
technologies you can choose (and mix and WIN15: VMWARE ESX BEST required on the client machines and that’s
match) to make your workstations as PRACTICES SCCM. In this session, Rhonda will show
locked down as they need to be. In this ALAN SUGANO you how to deploy Windows 7 using SCCM
session, Group Policy MVP Jeremy Over the years of installing ESX, we have along with all its options. Beginning with a
Moskowitz will demonstrate a myriad of developed a list of best practices when quick tutorial through SCCM’s terminology
ways to make your public desktops more implementing ESX. These include ESX Host and server roles right into SCCMs OSD
secure. If your team is already using Group Selection, Storage Groups, SAN Design, advanced features – this session has it all.
Policy, come learn about Starter GPOs, Storage Planning – Thin versus Thick provi-
common GP Scenarios, the GP Preferences, sioning, vCenter Server, Backup, Cloning
and how to efficiently use loopback pro- Virtual Machines, Security, Virtual Machine
cessing. Learn about Microsoft’s OS Selection, Physical to Virtual (PtoV)

November 1-4, 2010 I Las Vegas, NV I Register Today! I9


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:05 PM Page 10 F1

SHAREPOINT SESSIONS

IT PROFESSIONAL HITP12: AUTHENTICATION CHANGES practical, nuts-and-bolts look at the close


IN SHAREPOINT 2010 relationship between your information
HITP09: ADMINISTRATION OF TODD KLINDT management requirements and
SHAREPOINT 2010 USING WINDOWS SHANE YOUNG SharePoint’s manageability controls, and
POWERSHELL, THE NEW COOLNESS the demands that relationship places on
SharePoint 2010 brings with it some excit- your design and infrastructure. This session
TODD KLINDT ing changes to authentication. Not only do is focused on architecting a logical design
SHANE YOUNG we have the options we had in SharePoint of SharePoint that effectively supports your
All your friends are doing it, why aren’t 2007, but we have a new option, Claims. In
information management requirements
you? Stsadm.exe is so 2007. Come to this this session, we’ll explain exactly what a
and governance plan—the “technical” side
session to figure out why you need to be a claim is and why it could revolutionize how
of governance. You will learn how to align
PowerShell guru ASAP and how to amaze your users get into SharePoint 2010. Then
your governance requirements with
your friends and confound your enemies we’ll show how to use Claims to access
SharePoint farms, Web applications, and
with your new PowerShell skills. When you SharePoint 2010.
site collections. You’ll discover why some
leave this session, you’ll have a good foun- third-party applications are a “design poi-
dation for figuring out PowerShell with HITP01: BEST PRACTICES FOR
LEAST-PRIVILEGE INSTALLATION, son pill” and what SharePoint 2010 offers
SharePoint, as well as some practical scripts to greatly improve the deployment of a
you can use. ADMINISTRATION, AND SECURITY OF
SHAREPOINT 2010 governable design. Gain a deeper under-
standing of the intricacies and challenges
HITP05: ARCHITECTING AND DAN HOLME of designing the logical structure of
MANAGING VIRTUALIZED It’s one thing to install and administer SharePoint, and take away practical, blue-
SHAREPOINT 2010 FARMS SharePoint with all of the defaults, perhaps print-like guidance to what a governed
MICHAEL NOEL even running as a Domain Admin. It’s SharePoint implementation might look like
Organizations have been taking advantage another to make it work with a nod to least in your enterprise.
of Server virtualization in great numbers privilege, manageability, and auditability.
over the past few years, and more and In this highly practical session, SharePoint HITP18: ENTERPRISE SOCIAL
more SharePoint environments are subse- MVP Dan Holme discusses everything you COMPUTING WITH
quently being virtualized. There are design ever wanted to know about user accounts SHAREPOINT 2010
caveats associated with virtual SharePoint and SharePoint, across a variety of MATTHEW MCDERMOTT
farms, however, which must be taken into SharePoint scenarios. You’ll learn exactly
SharePoint 2010 introduces new features
account when considering SharePoint what service accounts are necessary to cre-
that support Social Computing for organi-
2010 virtualization. In addition, manage- ate a least-privilege installation of
zations of all types. Whether you have a
ment of a distributed virtual SharePoint SharePoint, and how they must be config-
“formal vision” or loose idea of what
ured. You’ll learn how to manage service
environment can be tricky without the “Social” means to your organization, this
accounts and their passwords to ensure
proper tools to help provision servers session will introduce you to the key con-
compliance with your IT security policies.
quickly and properly. This session focuses cepts and features that can aid in your
You’ll explore the pros and cons of multiple
on outlining the design criteria for virtual planning and implementation of Social
app pools and identities. You’ll examine
SharePoint farms, and demonstrates how Computing for your organization. This ses-
approaches to user and group manage-
virtualization management can allow for sion will highlight how companies gain
ment to identify the best practices for dif-
quick provisioning of a virtual SharePoint value out of the Social Computing capabil-
ferent parts of your intranet. And you’ll
farm or adding a new server into an exist- ities of SharePoint.
learn how to delegate administrators the
ing farm within a matter of minutes. Exact ability to use PowerShell to administer • Introduction to the “Social Vision” for
design criteria and sample real-world SharePoint. You’ll be surprised by some of SharePoint 2010
SharePoint 2010 designs will be illustrated, the very important, underdocumented • What’s Important: Tagging, Rating and
and specific PowerShell commandlets to guidance you’ll take away, and you’ll be Notes
be used will be provided. equipped to succeed. • What’s Happening: Activity Feeds
• Learn best practice architectural guide- • Where Is It: Social Search
lines for SharePoint 2010 role virtual- HITP02: DESIGNING GOVERNANCE: • Who Can Help: People and Expertise
ization HOW INFORMATION MANAGEMENT Search
• Learn how virtualization management AND SECURITY MUST DRIVE YOUR
software can be used to allow develop- DESIGN HITP14: FARM ARCHITECTURE
ers and others the ability to quickly DAN HOLME PLANNING AND PERFORMANCE
provision SharePoint environments or You’ve read the white papers, you’ve TESTING
add new servers to farms “Binged” governance, but how, exactly, do BEN CURRY
• Gain access to custom PowerShell you design a SharePoint implementation There are many tools that can be used to
scripts that can be used in a virtual that will support governance, security, and plan and test a SharePoint Server 2010
environment for automatic provision- information management? Join SharePoint server farm. In the year 2010, there’s just
ing of SharePoint 2010 farms MVP and consultant Dan Holme for a no reason to guess what will happen when

10 I Register Today! Call 800-505-1201 I www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:05 PM Page 11

SHAREPOINT SESSIONS

you turn on the brand new, shiny server HITP04: INFORMATION • View various Extranet and Intranet
farm! But, understanding how each Web ARCHITECTURE AND THE MANAGED deployment models using SharePoint
and Application Service functions in the METADATA SERVICE 2010
farm and how those services can impact DAN HOLME • Understand the need for identity man-
the end user experience is critical to user Join SharePoint MVP Dan Holme for a agement across SharePoint farms
adoption and system success. The real fun down-and-dirty, deep examination of the • Examine real-world deployment guid-
of this session will be the live demonstra- configuration and management of the ance and architecture for SharePoint
tion of tools to stress and test a live server Managed Metadata Service, and what the environments using FIM
farm. Come prepared for a fast-paced ses- MMS does to support your enterprise
sion with tons of live demonstrations! HITP17: PLANNING AND DEPLOYING
information architecture. You’ll explore
SOCIAL COMPUTING FOR
every nook and cranny of this powerful
HITP03: FILE SHARING SMACKDOWN: SHAREPOINT 2010
service application, and see how to provide
SHARES VS. SHAREPOINT MATTHEW MCDERMOTT
both centrally managed taxonomy and
DAN HOLME user-driven folksonomy for enterprise tags. SharePoint 2010 introduces new features
SharePoint document libraries are the new You’ll also explore content type syndication that support social computing for organi-
file share, or are they? What are the pros and best-practice guidance for topologies zations of all types. This session details the
and cons of using SharePoint as a file store, to support your information architecture. considerations for planning and deploying
particularly with SharePoint 2010? What the Enterprise Social features of SharePoint
do file servers offer that SharePoint does HITP11: KEEPING AN EYE ON 2010. This session will detail the adminis-
not, particularly with Windows Server 2008 SHAREPOINT 2010 trative controls and best practices for
R2? Is a hybrid environment desirable or TODD KLINDT deploying the User Profile Service and
even possible? How can an enterprise SHANE YOUNG other features that support SharePoint
migrate and integrate these two disparate Social features. This session will highlight
You’ve got SharePoint 2010 installed, but
approaches to a common goal? These how organizations can plan, design and
how do you make sure it’s running at peak
questions and more will be answered by deploy the social features that will provide
performance? In this session, we’ll cover all
Dan Holme as you take a deep dive into business value to help increase employee
the built-in monitoring tools in SharePoint
the best practices and real-world experi- connection to their work and workforce.
2010. We’ll show how logging and usage
ences of enterprises large and small. This • Review the “Social Vision” for SharePoint
analysis all come together to give you a
session will address both the strategic and 2010
view of exactly what your SharePoint 2010
technical details you need to know to sup- • Implementing the User Profile Service
server is up to. By the end of this session,
port collaboration around files in your • Import/Export Connections for People
you’ll be able to look at your SharePoint
organization. You’ll also learn what’s new in Data
2010 farm and fix problems before they
SharePoint 2010 document libraries, • Extending the User Profile
actually become problems. You won’t be
including document sets, document IDs,
able to predict the future, but it will sure • Management and Governance of Social
in-place records management, document
look like it. Data
routing, location-based metadata, and
metadata-based navigation. ITP07: MANAGING MULTIPLE HITP13: SHAREPOINT 2010
AUTHENTICATION PROVIDERS IN DEPLOYMENT DEMOFEST
HITP10: GETTING COZY WITH
SERVICE APPLICATIONS SHAREPOINT 2010 FOR EXTRANETS BEN CURRY
TODD KLINDT MICHAEL NOEL Come get a first look at proven SharePoint
Organizations planning for Extranet access Server 2010 deployment Best Practices.
SHANE YOUNG This session is full of real-world lessons
to SharePoint 2010 or faced with providing
Just when you got comfortable with access to an Intranet from multiple internal learned, tips, and tricks learned from the
Shared Service Providers, SharePoint 2010 authentication platforms often find it chal- field. Ben will give you a LIVE guided tour
throws them out and replaces them with lenging to manage identities across these of a multi-server farm deployment. Learn
Service Applications. In this session, we’ll disparate systems. The complexity involved the basics for creating and managing Web
explain what Service Applications are. Then in provisioning and deprovisioning and Service applications, scaling services,
we’ll talk through the decisions you’ll make account access to SharePoint can lead to and selecting basic server farm topologies
when deploying them. We’ll show several security breaches and confusion. This ses- for most implementations.
different ways to deploy them in your envi- sion focuses on Extranet and Intranet
ronment whether you’re a single server or authentication approaches with SharePoint HITP06: SHAREPOINT 2010 DISASTER
a worldwide installation. After this session 2010, and how various tools and processes RECOVERY AND HIGH AVAILABILITY
you won’t miss your SSPs at all, we promise. such as Microsoft’s Forefront Identity MICHAEL NOEL
Manager (FIM) 2010 can be used for better Significant architectural changes have
control, automatic account provisioning, been made between SharePoint 2007 and
and synchronization of profile information SharePoint 2010, including a complete
across multiple SharePoint authentication removal of the infamous Shared Services
providers. Provider and the ability to have redundant

November 1-4, 2010 I Las Vegas, NV I Register Today! I 11


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:05 PM Page 12 F1

SHAREPOINT SESSIONS

indexing functionality in a farm. In addi- HITP08: SHAREPOINT 2010 UPGRADE 2010, you can create powerful data-driven
tion, the number of databases in a single DRILL-DOWN form solutions on your SharePoint sites.
farm has increased significantly and JOEL OLESON InfoPath gives you the ability to pull data
Microsoft has overhauled the authentica- You’ve heard about the upgrade methods, from databases and lists, and create forms
tion model used by SharePoint. All of this but where are the real-world pros and with data validation and conditional for-
translates to some significant architectural matting. SharePoint Designer’s workflows
cons? What happens when in-place
changes between SharePoint 2007 farm let you then design powerful multi-step
upgrade fails? How do you roll back visual
architecture and SharePoint 2010 farm workflows centered around the form col-
upgrades and what are the best strategies
architecture, changing the paradigm for lected data. In this session, you see how to
around visual upgrade? We’ll cover this
SharePoint infrastructure architects and design a robust form using InfoPath and
and much more as we take things down a
changing the Disaster Recovery and High then design a workflow using SharePoint
level and really dig into the strategy.
Availability requirements of the applica- Designer to route this form appropriately.
• Determine the best approach to
tion. This session focuses on outlining how
upgrade for your environment HNCS02: CREATING BI SOLUTIONS
the changes in SharePoint 2010 architec-
ture allow for new design scenarios, and • Walk through visual upgrade delegation WITH SHAREPOINT 2010 USING
how you can design a new fault tolerant options PERFORMANCEPOINT SERVICES
and high performance SharePoint 2010 • Identify upgrade issues in upgrading site TED PATTISON
environment to migrate your existing definition, features, and workflows
SharePoint Server 2010 provides a power-
SharePoint 2007 content into. ful platform for creating Business
HITP15: WHAT DO YOU NEED FOR
• Learn how the significant architectural Intelligence (BI) solutions using
EFFECTIVE COMMUNICATION
changes between SharePoint 2007 and PerformancePoint Services (PPS). PPS
BETWEEN IT PROS AND DEVELOPERS?
SharePoint 2010 change how to build in makes it possible to create a visual front
A REFEREE!
fault tolerance and high availability in a end to Data warehouses and cubes created
SharePoint farm BEN CURRY with SQL Server 2008 R2 Analysis Services.
• Examine best practice farm architecture Come learn how you can fire the referee This session shows you how to use
and real world SharePoint design models and get on the same team with your devel- PerformancePoint Services and the
that are both disaster tolerant and high- opers. This session will focus on developing Dashboard Designer to create SharePoint
ly available goals and strategies that we can all agree
2010 sites with Dashboard components
• Understand Backup and Restore con- on. You’ll learn how to define the rules of
such as Key Performance Indicators (KPIs),
cepts in SharePoint 2010, and how the engagement and accompanying terminol-
Scorecards, Reports and Filters.
out-of-the-box backup can be extend- ogy so IT Pros are doing what they like to
ed and streamlined with new tools and do, and Developers spend their time writ- HNCS01: CREATING CONTENT-
technologies. ing code (because that’s what Developers CENTRIC SITES WITH SHAREPOINT
like to do!). See how to agree on a devel- 2010 WEB CONTENT MANAGEMENT
HITP16: SHAREPOINT 2010 SEARCH opment life cycle, how to be nice to your
Developers, and how to get something in ANDREW CONNELL
MATTHEW MCDERMOTT
return! Developers can be great allies in SharePoint 2010 provides all the tools you
Search has taken a huge step forward with need to create content-centric
the introduction of SharePoint 2010. This scaling one-off solutions, creating sand-
boxed solutions, automating tasks, and Internet/Extranet/Intranet-facing solutions
session will focus on what is new to Search
getting home before midnight. Seriously, that do not fit the mold of traditional
in SharePoint 2010. Presented through
come to this session to learn how to better SharePoint collaboration solutions. These
demonstrations of the search capabilities
communicate with your developers, and capabailities, dubbed Web Content
and advancements, this presentation will
how to make them your allies in your Management (WCM), enable content
provide the background necessary to
SharePoint adventure. owners and managers to create sites that
understand how Search has improved and
are consumed by a very large user base. In
how to plan for the smooth implementa-
tion of SharePoint Search for your organi- NO CODE SOLUTIONS this session, you’ll learn how to create
zation. compelling content-centric sites using just
HNCS07: AUTOMATING BUSINESS the browser and SharePoint Designer 2010
• SharePoint 2010 Search Scalability
PROCESSES USING INFOPATH 2010 including creating custom page types,
Options
FORMS WITH INTEGRATED page templates, modifying the user expe-
• Improved User Experience
SHAREPOINT DESIGNER 2010 rience as well as enforcing certain business
• Social and People Search
WORKFLOWS rules for content publication and storage.
• Improved Metadata Processing
ASIF REHMANI
• Improved Management and Tuning HNCS05: LEVERAGE EXCEL SERVICES
Forms and Workflows are essential to busi-
• FAST Search for SharePoint 2010 TO DRIVE OTHER WEB PARTS
ness processes. Companies usually rely on
programmers to create the forms and WITHOUT CODE!
workflows using code. Not any more! If MAURICE PRATHER
you have access to Microsoft InfoPath Everyone knows that Excel and Excel
2010 and Microsoft SharePoint Designer Services are great for calculations. Most

12 I Register Today! Call 800-505-1201 I www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:06 PM Page 13

SHAREPOINT SESSIONS

folks tend to think Excel Services is the this purpose? This session shows how each DEVELOPMENT
endpoint of a business process — input functionality works and explores the pros
data, read results. Wouldn’t it be cool to and cons of using each method to cus- HDEV07: ADVANCED EXTERNAL LISTS
leverage the calculation power of Excel tomize your SharePoint list forms. IN SHAREPOINT 2010
Services to drive other Web Parts? We’ll SCOT HILLIER
learn how to do this without writing a sin- HNCS03: USING OUTLOOK AND THE
SHAREPOINT WORKSPACE WITH External Lists allow data from External
gle line of code. Systems to appear as lists in SharePoint
SHAREPOINT 2010
2010. External Lists, however, do not have
HNCS08: MANAGE YOUR EXTERNAL SCOT HILLIER all of the capabilities of standard lists and
DATA USING BUSINESS SharePoint 2010 provides powerful ways to database tables. This session will present
CONNECTIVITY SERVICES … use data offline through Outlook 2010 and the differences, limitations, and work-
WITHOUT CODE! the SharePoint Workspace. In this session, arounds that allow you to get the most out
ASIF REHMANI you’ll learn how to synchronize sites, lists, of External Lists. The differences between
The Business Connectivity Services (BCS) is and libraries with Outlook and the standard SharePoint lists and External Lists
an evolution of the concept of Business SharePoint Workspace. You’ll learn how will be presented first along with strategies
Data Catalog (BDC) that was introduced in data is installed and managed on the client and workarounds for limitations such as
SharePoint 2007 to get access to your line so that you can understand the proper way attachments and workflow support. Then,
of business data. In addition to consuming to work with offline data. You’ll learn limi- the differences between database tables
your data, BCS lets you also write back data tations and workarounds associated with and External Lists will be presented along
to your external systems. SharePoint offline data including conflict resolution with strategies and workarounds for limita-
Designer 2010 is used to define your con- and collaborative document creation. tions such as attachments, folders, and ver-
Attendees will exit this session with a com- sions. Attendees will exit the session with
nection properties by creating External
plete understanding of how offline data is new ideas for implementing External Lists
Content Types (ECT) without the need for
synchronized, managed, and utilized in in their SharePoint 2010 solutions.
programming! In this session, you see how
Office clients.
you can surface this data using external
HDEV09: BEST PRACTICES FOR
lists, metadata in SharePoint lists and also HNCS04: VISUALLY CREATING SANDBOXED SOLUTIONS
your Outlook application to create robust VISUALLY COMPELLING WORKFLOWS
business solutions. SCOT HILLIER
(WITHOUT WRITING ANY CODE!)
SharePoint 2010 introduces a new para-
HNCS06: USE DATA VIEWS TO GET TO TODD BAGINSKI digm for feature development known as
YOUR DATA — BOTH INSIDE AND Modeling SharePoint workflows has never Sandboxed Solutions. While the
OUTSIDE OF SHAREPOINT been easier to do, and understanding the Sandboxed Solutions paradigm con-
ASIF REHMANI current state of a workflow status has never tributes significantly to overall farm stabili-
been easier on the eyes! Microsoft Visio ty, it also presents unique challenges for
You can use SharePoint Designer to make
and SharePoint Designer are now capable the SharePoint developer due to the severe
connections to and present data from
of modeling, editing, configuring, and restrictions placed on such solutions. In this
internal and external data sources such as deploying workflows to SharePoint sites
SharePoint lists, libraries, xml files, databas- session, we will examine the limitations
and lists. Additionally, the Visio Graphics placed on Sandboxed Solutions and pres-
es and Web services. The focus of this ses- Service now provides the ability to repre-
sion is on exposing the data to the user ent several patterns that can be used to
sent the status of a workflow in a visual work within these limitations. These pat-
using the XSLT Web Parts. These Web Parts manner! This session demonstrates how to
can be manipulated in a variety of ways to terns will include the use of web parts, site
create a SharePoint workflow in Microsoft pages, client object model code, and fully-
present the information to the end user. In Visio and export it to SharePoint Designer.
this session, it is shown how the list view trusted proxies. Attendees will exit the ses-
The session goes on to demonstrate how
and data view tools available can be used sion with a strong understanding of
to edit the workflow in SharePoint design-
to reformat the presentation of the data Sandboxed Solution development, limita-
er, add a custom coded workflow activity
using conditional formatting, pre-format- tions, and best practices.
to it, and publish it to a SharePoint site as a
ted styles, xPath expressions and more. reusable workflow. Finally, the session HDEV14: BEST PRACTICES FOR UP-
demonstrates how to configure workflow GRADING WEB PARTS
HNCS09: USING INFOPATH 2010 AND
visualizations with the Visio Graphics
SHAREPOINT DESIGNER 2010 TO
Service to see the current state of a work- MAURICE PRATHER
MANAGE SHAREPOINT LIST FORMS flow. In this session, you will learn how to Web Parts have been around for three
ASIF REHMANI create a SharePoint workflow in Microsoft generations. We’ll talk about all the differ-
SharePoint Designer has been a great tool Visio, make changes to it in SharePoint ent ways Web Part code can be upgraded.
to customize SharePoint list forms for a Designer, publish it to a SharePoint site, We’ll discuss how to best move your Web
long time. Now in SharePoint 2010, you configure the Visio Graphics Service, and Parts from where they are today to where
can use InfoPath 2010 to customize the visually view the status of the workflow as you want them tomorrow.
forms as well. What’s the difference? Why represented in the workflow diagram.
should you use one tool over the other for

November 1-4, 2010 I Las Vegas, NV I Register Today! I 13


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:06 PM Page 14 F1

SHAREPOINT SESSIONS

HDEV11: BUILDING CUSTOM build line of business applications upon. HDEV04: DEVELOPING A CUSTOM
APPLICATIONS (MASHUPS) ON The BDC and SharePoint make connecting CLAIMS PROVIDER
THE SHAREPOINT PLATFORM to data in external systems and working TED PATTISON
TODD BAGINSKI with it easier than ever before. This session SharePoint 2010 introduces a new security
Custom applications which combine com- shows how to combine External Content architecture based on claims, federation
ponents from several different systems, Types, External Lists, .NET Assembly and the Windows Identity Framework
services, and data sources are more com- Connectors, External Data Web Parts, and (WIF). This session introduces the concepts
monplace in today’s world than ever the SharePoint search service to search, and architecture of claim-based security in
before, not to mention they are usually the create, read, update, and delete data from SharePoint 2010 and demonstrates how to
most fun to build! This session shows how multiple external data sources. In this ses- create and debug a custom claim provider.
to combine Business Connectivity Services, sion, you will learn how to create and con-
the SharePoint Client Object Model, figure all of these components to create a HDEV18: EXTENDING THE SOCIAL
SharePoint Search, Silverlight, Bing Maps, powerful line-of-business application with EXPERIENCE USING THE SHAREPOINT
the Digital Assets Library (Images & the SharePoint platform. 2010 SOCIAL NETWORKING API
Videos), SharePoint list data, and even
HDEV12: CREATING CUSTOM
GARY LAPOINTE
SharePoint’s new rating functionality to SharePoint 2010 introduces several new
WORKFLOWS AND REUSABLE
create a "mashup" application that pro- capabilities to allow end-users to share
WORKFLOW ACTIVITIES FOR
vides a wide variety of functionality. In this what they’re doing, discover what others
SHAREPOINT DESIGNER are doing, and more easily locate col-
session, you will learn how to combine all
of these components to create eye catch- TODD BAGINSKI leagues and data that are relevant to their
ing applications that provide a wide variety Complex business processes often demand specific needs. The out-of-the-box user
of functionality. custom coded workflows. Understanding experience gets you part of the way by
how to reuse pieces of the custom work- exposing most of the capabilities of the
HDEV13: BUILDING CUSTOM flows you create saves time and effort in API, but by writing our own custom appli-
APPLICATIONS WITH THE the future and empowers end users to cre- cations we can take it to the next level. In
POWERPIVOT API ate their own workflows with custom activ- this session, we’ll take a deep dive into the
MAURICE PRATHER ities inside them. In the long run, taking SharePoint Social Networking APIs and see
PowerPivot is an exciting new data analysis this approach saves your IT department how to use the wealth of information pro-
time and money. This session demon- vided to extend and enhance the end-user
feature set. It’s tied closely to Excel Web
strates how to create custom workflows experience by providing rich and intuitive
Access, but did you know that it doesn’t
with Visual Studio 2010 which use out-of- access to social data. This session is appli-
have to be? The PowerPivot API will allow
the-box workflow activities, as well as cus- cable to any developers who are wishing to
you to create custom Web Part and con-
tom-coded workflow activities. This session leverage and extend the social capabilities
trols that are designed to fit your business
also demonstrates how to create custom of SharePoint in their own applications.
needs. We’ll look at how to easily integrate
workflow activities that may be reused
your data into your own controls. HDEV05: EXTENDING THE VISUAL
inside of SharePoint Designer workflows. In
this session, you will learn how to create STUDIO 2010 SHAREPOINT TOOLS
HDEV01: CREATING A RICH BUSINESS
APPLICATION WITH THE MANAGED custom coded workflows and activities in TED PATTISON
CLIENT OBJECT MODELS IN SHARE- Visual Studio 2010 and how to package, The new Visual Studio 2010 SharePoint
POINT 2010 deploy, and reuse them in SharePoint Tools represent a significant step forward
Designer workflows. for SharePoint as a development platform.
ANDREW CONNELL While this new tools set provides a great
SharePoint 2010 introduced a new way to HDEV08: CREATING SEARCH-BASED deal of functionaility out of the box, there
work with SharePoint data when you have SOLUTIONS WITH SHAREPOINT 2010 are scenarios where you must extend them
an application that does not run on the SCOT HILLIER to accomplish certain tasks. This session
server: the Client Object Model Search-based solutions are applications will teach you the concepts and techniques
(ClientOM). In this session, you’ll see how that use a search page as the primary inter- required to create extensions so you can
to create rich desktop applications with face. Solutions such as image searching or leverage the full extent of your SharePoint
WPF and the .NET ClientOM. In addition, travel searching in Bing are good examples development knowledge when developing
see how to create robust business applica- of search-based solutions. SharePoint 2010 SharePoint 2010 solutions.
tions deployed as sandbox solutions using offers developers new ways to extend
the Silverlight ClientOM. HDEV15: HOW TO BUILD
search and create search-based solutions.
CLAIMS-AWARE APPLICATIONS
In this session, attendees will learn to cre-
HDEV10: CREATING CUSTOM LINE AND CONTROLS
ate search-based solutions by using cus-
OF BUSINESS SOLUTIONS WITH MAURICE PRATHER
tom relevance models, extending
BUSINESS CONNECTIVITY SERVICES What exactly are claims? In this session,
SharePoint 2010 search parts, and utilizing
TODD BAGINSKI .NET Assembly Connectors to access exter- we’ll quickly cover the fundamentals of
Business Connectivity Services and nal systems. The techniques presented will claims authentication. Then we’ll dive into
Microsoft SharePoint Server provide devel- prepare attendees to create search-based details needed to leverage claims within
opers an excellent platform to quickly solutions on their own. your applications.

14 I Register Today! Call 800-505-1201 I www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:06 PM Page 15

SHAREPOINT SESSIONS

HDEV03: INCORPORATING the Ribbon and plug into the Dialog the network. This session demonstrates
MANAGED METADATA IN CUSTOM Framework as well as how to show transient development techniques involving the
SOLUTIONS and persistent messages to your users using Client Object Model and WCF Data
ANDREW CONNELL the new Notification capabilities. This ses- Services. You will see how to access lists
sion is applicable to any developers who using the native support for REST-based
Microsoft injected strong support for
are creating applications for SharePoint Web services in SharePoint 2010. The ses-
metadata, taxonomies and folksonomies in
which need to interact with the end-user. sion will also describe how to develop
SharePoint 2010 with the addition of the
components for SharePoint 2010 using the
Managed Metadata service application HDEV02: LOCAL DATA ACCESS IN new Open Data Protocol (OData).
and Managed Metadata field type. While SHAREPOINT 2010: LINQ AND BEST
there is plenty of support for metadata PRACTICES HDEV16: SHAREPOINT 2010
across the platform out-of-the-box, POWERSHELL FOR DEVELOPERS
Microsoft has included a very robust API in
ANDREW CONNELL
this latest release of SharePoint 2010 to One of the most common tasks developers GARY LAPOINTE
create custom solutions. In this session, do day-to-day is accessing data stored In this session, we’ll examine how
we’ll explore how we can create custom within SharePoint. In the past, this always SharePoint developers can leverage the
metadata-based solutions for use in meant getting data out using CAML-based capabilities of the PowerShell scripting lan-
SharePoint 2010. queries or tediously creating items one by guage and the various tools available to
one. In this session, you’ll learn about the help create and debug scripts. We’ll exam-
HDEV17: LEVERAGING THE new LINQ support in SharePoint 2010 and ine Visual Studio 2010’s support for
SHAREPOINT 2010 USER EXPERIENCE what you’ll need to do in order to leverage PowerShell and dive deep into creating
ENHANCEMENTS this new support. In addition, we’ll cover custom PowerShell cmdlets and PipeBind
GARY LAPOINTE some best practices to employ when utiliz- objects as well as custom type modifiers,
ing the new LINQ support in SharePoint help files, and views. This session is applica-
SharePoint 2010 has introduced several
2010 to ensure users do not inadvertantly ble to any developers who need to build
new capabilities for interacting with end-
break your LINQ queries. custom cmdlets to support an application
users. The most obvious of these new capa-
or product or who needs to automate cer-
bilities is the implementation of the Fluent HDEV06: REMOTE DATA ACCESS IN tain aspects of their development process-
UI, or Ribbon, but significant work has also SHAREPOINT 2010 es; it is not meant to teach you PowerShell
gone into reducing pop-ups and page
refreshes through the use of a new Dialog
TED PATTISON scripting.
Framework and Notification capabilities. In SharePoint 2010 provides new opportuni-
this session, we’ll examine how to extend tiies to access list-based items from across

W O R K S H O P S
PRE-CONFERENCE WORKSHOPS Automated Installation Kit for Windows 7 (WAIK), Windows
Deployment Service (WDS), Microsoft Deployment Toolkit 2010
MONDAY, NOVEMBER 1, 2010 9AM - 4PM Update 1 (MDT) or System Center Configuration Manager (SCCM)?
EPR01: MAKING EXCHANGE HIGHLY AVAILABLE – The last thing you want to do is waste time learning a tool that’s
not right for you or your environment. Let Setup and Deployment
BRILLIANCE IN RESILIENCE (HANDS-ON WORKSHOP)
MVP and Desktop Deployment Product Specialist Rhonda Layfield
PETER O’DOWD help you figure out which tool is right for you. In this full day
Microsoft has made some outstanding improvements to deployment workshop, you’ll learn how create, deploy and man-
Exchange 2010 redundancy and the rules have all changed; SANs age your images using the Windows Automated Installation Kit for
are less important, JBOD can be supported, Outlook talking to Windows 7 (ImageX, DISM, CopyPE, OSCDImg, USMT 4.0). Perform
CAS, movable databases, and logs and EDBs living together in
bare metal installations using WDS – learn to install, configure and
harmony. This one day workshop will focus on how you can con-
troubleshoot WDS. Migrate your XP machines to Windows 7 using
figure your Exchange Server organization to increase availability
the MDT 2010 Update 1. Then there’s the golden tool – SCCM –
with Database Availability Groups, CAS clusters, and more. In this
which allows you to perform zero touch installations. More impor-
information-packed day, you’ll use an 8GB Windows Server 2008
R2 laptop provided by Microsoft to walk through several hands- tantly, learn the differences between these tools so you can make
on labs developed by Wadeware® with Exchange MVP Peter your deployment solution work for you.
O’Dowd. Space is limited so sign up now.
MONDAY, NOVEMBER 1, 2010 9AM - 4PM
MONDAY, NOVEMBER 1, 2010 9AM - 4PM HPR01: SHAREPOINT 2010 PROFESSIONAL
WPR01: WINDOWS 7 DEPLOYMENT MASTER CLASS DEVELOPMENT WORKSHOP
RHONDA LAYFIELD ERIC SHUPPS, ROBERT BOGUE
Learning Windows Deployment Tools can be quite a daunting task Go to www.devconnections.com for complete abstract.
– where do you start and which one do you use? Windows

November 1-4, 2010 I Las Vegas, NV I Register Today! I 15


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:06 PM Page 16 F1

WORKSHOPS CONTINUED

MONDAY, NOVEMBER 1, 2010 9AM - 4PM FRIDAY, NOVEMBER 5, 2010 9AM - 4PM
HPR02: SHAREPOINT COLLABORATION JUMPSTART HPS302: DAN HOLME’S WINDOWS ADMINISTRATION
MASTER CLASS
DAN HOLME
Go to www.devconnections.com for complete abstract.
DAN HOLME
Join best-selling author and world-famous consultant Dan Holme
for a master class in administration. A full day of best practices, tips,
POST-CONFERENCE WORKSHOPS tricks, and tools that will enable you to accelerate, automate,
secure, and manage your Windows clients, servers, and Active
FRIDAY, NOVEMBER 5, 2010 9AM - 4PM Directory. Dan Holme has amassed a wealth of experience and
EPS01: EXPLORING EXCHANGE 2010 - CONFIGURE AND expertise—solutions which enable you to deliver real-world
administrative best practices within the constraints of real-world
SUPPORTING (HANDS-ON WORKSHOP)
budgets and technologies.
PETER O’DOWD & TOM PHILLIPS
With your head packed full of valuable information from a week of THIS WORKSHOP WILL FEATURE:
Exchange 2010 sessions, put it all together in this one-day journey ■ Provisioning Applications and Configuration
through Microsoft Exchange Server 2010 and experience its new
■ Role-Based Management Extreme Makeover
and improved features hands-on. Let the MVP Peter O’Dowd and
Tom Phillips lead you through hands-on-labs, including: ■ Advanced Active Directory & Administrative Delegation
■ Archiving – yes, now available out of the box. ■ Administrators’ Idol: Tips and Tricks for Administrative
■ Mailtips – find out if your recipient isn’t available before
Automation and Brilliance
sending the message. ■ Ten Years Later: Best practice administration and design for
■ Exchange Control Panel – Where users can manage their di-
Active Directory.
rectory data and groups. FRIDAY, NOVEMBER 5, 2010 9AM - 4PM
■ Role Based Access Control – Allows different types of users WPS01: WINDOWS POWERSHELL V2 “ZERO SCRIPTING”
to search for different types of content across the organiza- MASTER CLASS
tion. DON JONES
■ Information Leakage and Protection – Transport rules and Are you ready to take Windows PowerShell as far as you possibly
Rights Management Server unite. can—without writing a single line of “script code?” Join the
PowerShell “War on Scripting” with this exclusive full-day session
■ Database Availability Groups – The new HA. No longer does
by Windows PowerShell guru Don Jones, author of the “PowerShell
a database need be associated with a single server. with a Purpose” blog at WindowsITPro.com, more than 45 books,
■ Unified Messaging – Try the new voice to text translation, and the PowerShell columnist for TechNet Magazine. No
dial plans, and more… PowerShell experience is necessary, and even if you have some,
This instructor led hands-on-lab experience will get you deep into you’ll discover new (and easier) approaches to some of the tricki-
Exchange and guide you through these features, showing you how est administrative tasks. Learn to use PowerShell remoting, how to
they are configured and how they can be used to improve your master pipeline parameter binding, and how to create simple
organization’s Unified Communications platform. No need to parameterized “batch files” that require no programming—just
bring your laptop, 8GB Windows Server 2008 R2 laptop will be pro- copying and pasting! This isn’t “dumbed down” PowerShell, either
vided by Microsoft for this event. Space is limited, so sign up now. —this is PowerShell as it was meant to be used and experienced.
Customize visual displays, create custom inventory reports, sched-
ule PowerShell commands to run at specific times, create and man-
FRIDAY, NOVEMBER 5, 2010 9AM - 4PM
age configuration baselines, and much more. This workshop focus-
EPS02: COMMUNICATION SERVER 14 (AKA OCS) es on Windows Server 2008 R2 but is also perfect for Win2003
– FIRST LOOK PREVIEW shops using WinXP, Vista, or Win7 clients. This is not a hands-on
THOMAS FOREMAN workshop; no need to bring your laptop. A complete transcript will
Be one of the first to get your hands on Communications Server be made of everything Don types, and made available to you for
14. See what all the fuss is about and how this version of OCS has downloading a few days after the conference is over. This is the
taken a big step forward. This one day workshop will walk you only sure bet in Las Vegas—you’re sure to go home ready to start
through several hands-on-labs such as: automating key administrative tasks, saving time, improving con-
sistency, and building out your resume!
■ New install process and tools
■ PowerShell features FRIDAY, NOVEMBER 5, 2010 9AM - 4PM
■ Configuration tools HPS301: ADVANCED SHAREPOINT 2010
■ Client experience
ADMINISTRATION WITH TODD AND SHANE
In this information-packed day, you’ll use an 8GB Windows Server TODD KLINDT & SHANE YOUNG
2008 laptop provided by Microsoft to walk through several hands- Go to www.devconnections.com for complete abstract.
on labs developed by Wadeware® with CS expert Thomas
Foreman. Space is limited so sign up now.

16 I Register Today! Call 800-505-1201 I www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:07 PM Page 17

Check Web site for Microsoft and additional speakers.


A UNIQUE OPPORTUNITY TO GET YOUR TECHNOLOGY AND TRAINING FROM MICROSOFT AND INDUSTRY EXPERTS!

SPEAKERS

SCOTT ALLEN CHRIS AVIS ANDREW BEN CURRY MIKE SEAN DEUBY THOMAS DEVIN L.
MICROSOFT CONNELL DANSEGLIO FOREMAN GANGER
PLURALSIGHT SUMMIT 7 ADVAIYA INC.
CRITICAL PATH SYSTEMS MICROSOFT WADEWARE CONSULTANT/
TRAINING, LLC AUTHOR

SCOT HILLIER DAN HOLME DON JONES TODD KLINDT KEVIN LAAHS GARY LAPOINTE RHONDA LEE MACKEY
SCOT HILLIER INTELLIEM, INC. CONCENTRATED SHAREPOINT 911 HP SHARESQUARED, LAYFIELD HP
TECHNICAL TECHNOLOGY INC. CONSULTANT/
SOLUTIONS, LLC TRAINER

JIM MCBEE KIERAN MATTHEW MARK MINASI JEREMY MICHAEL NOEL PETER O'DOWD JOEL OLESON
ITHICOS MCCORRY MCDERMOTT MINASI RESEARCH MOSKOWITZ CONVERGENT BLADE/ QUEST SOFTWARE
SOLUTIONS HP ABLEBLUE AND MOSKOWITZ, INC. COMPUTING WADEWARE
DEVELOPMENT

TED PATTISON TOM PHILLIPS MAURICE TONY REDMOND ASIF REHMANI NADYNE STEVE RILEY BRIAN REID
TED PATTISON WADEWARE PRATHER TONY REDMOND SHAREPOINT- RICHMOND AMAZON WEB C7 SOLUTIONS
GROUP, INC. INDEPENDENT AND ASSOCIATES ELEARNING.COM MICROSOFT SERVICES
CONSULTANT

PAUL KARL ROBINSON WILLIAM SMITH ALAN SUGANO SHANE YOUNG


GREG SHIELDS
ROBICHAUX HP MERRILL ADS CONSULTING SHAREPOINT 911
TRAINER/AUTHOR
CONCENTRATED COMMUNICATIONS GROUP
TECHNOLOGY LLC

And many more... Check our Web site as we continue to update it with speaker pictures and bios!
November 1-4, 2010 I Las Vegas, NV I Register Today! I 17
F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:07 PM Page 18 F1

HOTEL INFORMATION

Enjoy the excitement of one


of Las Vegas’ premiere hotels!
Positioned at the south end of The Strip, Mandalay Bay
Resort and Casino offers elegance, excitement and
escape. Enjoy its restaurants, entertainment and
enormous beach-pool, as well as wireless internet in
your room and optional VIP access to shows, restaurants,
the spa and more.

HOTEL ACCOMMODATIONS
Mandalay Bay Resort and Casino, 3950 Las Vegas Blvd.
South, Las Vegas, Nevada, is the conference site and host hotel.
SPACE IS LIMITED so reserve your room early by calling the
conference hotline at 800-505-1201 or 203-400-6121.

AIRLINE
Please call Pericas Travel at 203-562-6668 for airline reservations.
TAX DEDUCTION
Your attendance to a DevConnections CAR RENTAL
conference may be tax deductible. Visit Hertz is offering auto rental discounts to attendees. Call the
www.irs.ustreas.gov. Look for topic 513 - Hertz Meeting Desk at 800-654-2240 for reservations and refer
Educational Expenses. You may be able to to code CV# 010R0043 (Hertz) under Connections Vegas to
deduct the conference fee if you undertake to receive your attendee discount.
(1) maintain or improve skills required in your
present job; (2) fulfill an employment condition ATTIRE
mandated by your employer to keep your The recommended dress for the conference is casual and
salary, status, or job. comfortable. Please bring along a sweater or jacket, as
the ballrooms can get cool with the hotel’s air conditioning.
GROUP DISCOUNT
Register individuals from one company at the SPONSORSHIP/EXHIBIT INFORMATION
same time and receive a group discount. For sponsorship information,
contact Rod Dunlap
1-3 registrants $1,595 per person 480-917-3527 phone
Additional registrants $1,395 per person E-mail rod@devconnections.com
after the 3rd ($200 off each) See Web site for more details. www.WinConnections.com
(4th, 5th, 6th...)

Call 800-438-6720 to take advantage of group


discount pricing.

Notes & Policies: The Conference Producers reserve the right to cancel the conference by refunding the registration fee. Producers can substitute speakers and topics and cancel sessions with-
out notice or obligation. Updates will be posted on our Web site at www.DevConnections.com. Tape recording, photography is not allowed at any session. Conference producers will be taking
candid pictures of events and reserve the right to reproduce. By attending this conference you agree to this policy. You may transfer this registration to a colleague by notifying us before the
start of the event. Please inform us if you have any special needs or dietary restrictions when you register. The conference registration includes the following subscriptions. This is not an addi-
tional expense and subtraction from prices listed is not permissible. Exchange and Windows Connections registration includes a one-year (12 issues) print subscription to Windows IT Pro mag-
azine for Exchange and Windows conference attendees only. Current subscribers will have an additional 12-months added to their subscription. Subscriptions outside of the United States will
be served in digital; $12.50 of the funds will be allocated toward a subscription to Windows IT Pro ($49.95 value). SharePoint Connections registration includes a print subscription (4 issues;
Nov, March, June, Sept) to SharePointProConnections magazine for SharePoint and Windows conference attendees only. Current subscribers will have an additional one year (4 issues) added
to their subscription. Subscriptions outside of the United States will be served in digital.
Registration & Cancellation Policy: Registrations are not confirmed until payment is received. Cancellations before September 28, 2010 must be received in writing and will be refunded minus
a $100 processing fee. After September 28, 2010 cancellations and no shows are liable for full registration; it can be transferred to the next Conference within 12 months or to another person.
Microsoft, Microsoft .NET, ASP.NET, Visual Studio.NET, Microsoft SQL Server, Exchange and Windows are either trademarks or registered trademarks of Microsoft Corporation. All other trade-
marks are property of their owners.

18 I Register Today! Call 800-505-1201 I www.WinConnections.com


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:15 PM Page 19

CONFERENCE REGISTRATION • NOVEMBER 1-4, 2010 ONLINE: www.WinConnections.com


FULL CONFERENCE REGISTRATION INCLUDES KEYNOTE ON NOVEMBER 2ND 8:00AM, E-MAIL: info@DevConnections.com
THROUGH CLOSING SESSION NOVEMBER 4TH, 4:30PM PHONE: (800) 438-6720
(203) 400-6121
FAX: (913) 514-9362
NAME PRIORITY CODE
MAIL:

COMPANY TITLE
Penton Media
c/o Tech Conferences, Inc.
STREET ADDRESS (REQUIRED TO SHIP MATERIALS) 731 Main Street Ste C3
Monroe CT 06468
CITY, STATE, POSTAL CODE COUNTRY

TELEPHONE FAX E-MAIL ADDRESS (IMPORTANT)

� Microsoft Exchange Connections Conference and Expo


� Windows Connections Conference and Expo
� SharePoint Connections Conference and Expo
On or Before August 19th, 2010 ..................................................................................................................................$1495 ________________
After August 19th, 2010 ............................................................................................................................................................$1595 ________________

LAS VEGAS, NEVADA


FOR WHICH CONFERENCE ARE YOU REGISTERING? __________________________________________________________

PRE-CONFERENCE WORKSHOP MONDAY, NOVEMBER 1, 2010 LUNCH IS INCLUDED WITH FULL DAY WORKSHOPS.
� EPR01: Making Exchange Highly Available – Brilliance in Resilience
(HANDS-ON WORKSHOP) O’DOWD..............................................................................................................................................................9AM – 4PM ..................................$449 __________________
� WPR01: Windows 7 Deployment Master Class LAYFIELD ............................................................................................9AM – 4PM ..................................$399 __________________
� HPR01: SharePoint 2010 Professional Development Workshop SHUPPS & BOGUE ..................9AM – 4PM ..................................$399 __________________
� HPR02: SharePoint Collaboration Jumpstart HOLME ......................................................................................................9AM – 4PM ..................................$399 __________________

POST-CONFERENCE WORKSHOPS FRIDAY, NOVEMBER 5, 2010 LUNCH IS INCLUDED WITH FULL DAY WORKSHOPS.
� EPS01: Exploring Exchange 2010 - Configure and Supporting
(HANDS-ON WORKSHOP) O’DOWD & PHILLIPS ..........................................................................................................9AM – 4PM ..............................$449 ________________
� EPS02: COMMUNICATION SERVER 14 (AKA OCS)–FIRST LOOK PREVIEW
(HANDS-ON WORKSHOP) FOREMAN............................................................................................................................9AM – 4PM ..............................$449 ________________
� HPS302: Dan Holme’s Windows Administration Master Class HOLME ..........................................9AM – 4PM ..............................$399 ________________
� WPS01: Windows PowerShell v2 “Zero Scripting” Master Class JONES ........................................9AM – 4PM ..............................$399 ________________
� HPS301: Advanced SharePoint 2010 Administration
with Todd and Shane KLINDT & YOUNG ..............................................................................................................................9AM – 4PM ..............................$399 ________________

CONFERENCE MATERIALS
FULL CONFERENCE REGISTRATION INCLUDES MATERIALS FOR THE CONFERENCE FOR WHICH YOU REGISTER;
YOU MAY PURCHASE MATERIALS FOR THE OTHER CONCURRENTLY RUN EVENTS.
� Microsoft Exchange Connections Conference and Expo CD ..................................................................................................................................$75 ________________
� Windows Connections Conference and Expo CD ....................................................................................................................................................$75 ________________
� SharePoint Connections Conference and Expo CD..................................................................................................................................................$75 ________________

TOTAL
� CHECK (payable to Penton Media) All payments must be in US Currency. Checks must be drawn on a US bank.
� CREDIT CARD � VISA � MASTERCARD � AMEX
CREDIT CARD NO. EXPIRATION DATE

Cardholder’s Signature Cardholder’s Name (print)


F10_Win_ITBrochure_v5:Layout 1 6/23/10 2:07 PM Page 20

Penton Media
c/o Tech Conferences, Inc.
731 Main Street, Suite C-3
Monroe, CT 06468
Mailroom: If addressee is no longer here,
please route to MIS Manager or Training Director

“ THE CONVERSATION BEGINS HERE

NOVEMBER 1-4, 2010


LAS VEGAS • MANDALAY BAY RESORT & CASINO

Book by July 29th to get a special rate of $149 (a limited number of rooms at this rate, so reserve today).

CHECK WEB SITE FOR DESCRIPTIONS OF SESSIONS AND WORKSHOPS


www.WinConnections.com • 800.505.1201 • 203.400.6121 • Register Early!
P R O D U C T S
REVIEW

Spiceworks 4.5
IT management tools are as varied as links that invite you to download and signed up with a valid email address that
blades of grass on a freshly mowed lawn. install the product. A single executable I use for testing—and I did receive a few
It’s often difficult to slice through vendor file downloads to your computer without email messages of the “Welcome to Spice-
marketing-speak to obtain the details you you having to sign up for any type of works” variety.
need to determine if a management tool account or provide an email address. The The next screen is where the good stuff
is right for you and your environment. For file is reasonably sized (about 20MB) and starts to happen. You can configure the
example: Does the tool support all the downloads quickly. product to start with an inventory, the Help
OSs you use? What about non-computer When the installation routine launches, desk (ticketing) feature, or Spiceworks com-
devices, such as routers and switches? the first screen asks which port you want munity support. I was most interested in the
Does the tool take a software inventory to have Spiceworks listen on. The default is inventory functionality because I wanted
from your computers, or just a hardware port 80, which is a clue that indicates how to see how well Spiceworks could find and
inventory? How do you obtain technical Spiceworks will interact with you; the soft- analyze my network, so I selected Start with
support if you need it? How much will the ware installs the Apache web server. This Inventory.
product cost you in licensing fees? is important to note if you plan to install To avoid immediately subjecting my
One product that aims to solve all of Spiceworks on a machine that’s already network to any invasive testing, I opted to
your IT management woes is Spiceworks. running a web server on port 80. You’ll have the software first scan the machine
This software includes management, either need to adjust one of the servers it was running on. Isolating the selection
monitoring, inventory control, and a to run on a port other than 80 or install process to target just the local machine
ticketing system, all in one package. You Spiceworks on a different machine. by IP address and selecting an account
might have already heard of Spiceworks The installation process proceeds with administrator-level privileges to
from a colleague, because it’s reasonably quickly from that point and offers to run the scan with was easy. A dialog box
popular for one key reason: It’s free. The launch Spiceworks when the install is launches to indicate that the scan is in
caveat of the software being free is that complete. Here is where I ran into my process.
you have to see ads while you use it- only real technical issue. The initial Scanning a machine is a quick yet
but I found the ads to be unobtrusive. launch of Spiceworks took an abnormally thorough process. If you have a host-
You can purchase a version that has the long time, about two minutes, with the based firewall installed, you need to
ads removed if you find them to be too Spiceworks.exe process consuming 50 ensure that exceptions are created to
cumbersome. percent of the CPU usage. This occurred allow Spiceworks to access the sys-
I reviewed Spiceworks 4.5 from the only on the first launch of the product, tem. After this is done, Spiceworks can
perspective of someone who has heard however. determine a myriad of details from the
good things about the software but One annoying requirement is that you base hardware (e.g., CPU, RAM, free disk
doesn’t know much about it other than the must sign up for a Spiceworks account space), as Figure 1 shows, all the way to
fact that it’s a free IT management product. when you launch
I installed Spiceworks on a Windows XP the product for the
SP3 machine and ran it against a mixed first time. It’s unclear
test network consisting of XP, Windows from the sign-up
Vista, Mac OS X 10.6, and Red Hat Enter- form if this is a local
prise Linux 10 computers. The network also account, isolated
contains a variety of networking gear from to your own Spice-
Cisco. Spiceworks’ system requirements are works installation,
modest; the documentation states that a or if your informa-
machine with a 1GHz Pentium III proces- tion will be sent to
sor (remember those?), with 1GB of RAM, Spiceworks even if
running XP SP2, Windows Server 2003 SP1, you clear the check
or Windows Server 2008 is sufficient. For a boxes for receiving
comprehensive list of the items Spiceworks partner offers and
can discover and manage, see the Spice- participating in sur-
works Requirements page at community veys. I cleared both
.spiceworks.com/help/Spiceworks_ check boxes and Figure 1: Viewing configuration details
Requirements.
Installing Spiceworks appears to be
Michael Dragone | mike@mikerochip.com
a cinch at first. You go to the Spiceworks
website and click any of the bright orange

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 65


P R O D U C T S
REVIEW

a list of installed software, including vari- process. The tick-


ous updates to the software, as Figure 2 eting system is
shows. The software also captures details fully aware of the
such as the last time the system was gathered inven-
rebooted. tory and lets you
After my local machine was success- reference any of
fully scanned, I expanded the scan to a your assets. A list
local subnet, supplied the appropriate of open tickets and
credentials, and received results with their assignees is
similar details. One item to note is that provided. Editing
Spiceworks never detected any antivirus an existing ticket is
software on any of the machines I ran it also very straight-
against, although I do have up-to-date forward. Any IT pro-
antivirus software installed. Some quick fessional who has
investigating on the Spiceworks website used even the most
proved this behavior is to be expected. basic of ticketing
Spiceworks claims to be able to detect systems will feel
any antivirus software that integrates with right at home with
Windows Security Center. Although all the the Spiceworks
test machines I was using had managed system.
antivirus software installed, Windows The software Figure 2: Finding installed software
Security Center was turned off. also includes the
I attempted to have Spiceworks scan a ability to track services, such as support simplicity is a bit deceiving at first. If you
subnet consisting primarily of networking contracts and ISP subscriptions. This is a dive right in like I did for review purposes,
devices. This was far less successful, because great feature because it lets you see the sta- you could be caught off-guard. You need
many of these devices are desktop switches tus of your services at a glance. You can also to think about where you will install
and consumer routers that don’t respond reference your services in Help desk tickets Spiceworks, especially if you already have
to SNMP queries. Spiceworks can’t query a just as you can reference your assets. These a web server installed. In addition, you
networking device that doesn’t respond to features all tie together nicely with Spice- need to make sure you have the proper
SNMP, even if the device supports Secure works’ monitoring and alerts. credentials to access your devices and
Shell (SSH) access, as some of my devices The product lets you specify a plethora computers and ensure that any host-
do. This might also explain why when I of options for monitoring not only your based firewalls are configured to allow
asked Spiceworks to create a map of my connected computers and devices but Spiceworks access.
network, several intermediary switches were also your services (e.g., the end date of a Taking these few preliminary steps
missing from the map. I had to manually contract). Options range from the basics, before you jump in will ensure a good
add some devices that Spiceworks couldn’t such as remaining disk space, to the experience from the get-go. Uninstallation
capture automatically. advanced, such as software compliance. is also a cinch, leaving little to no cruft
The product was also unable to moni- At a periodic interval that you can adjust, behind. You have little to lose and a lot to
tor the health of an Exchange 2007 server Spiceworks sniffs your connected com- gain by giving Spiceworks a try. I highly
on my network. Unfortunately, Spiceworks puters and devices to ensure they are recommend it.
can monitor only Exchange 2003 servers. in compliance. No agents are necessary, InstantDoc ID 125235
This limitation is especially disappointing although you need administrator-level
because Exchange 2003 will soon leave access to the scanned machines. Windows
Microsoft’s Extended Support phase. It Management Instrumentation (WMI)
Spiceworks 4.5
would be nice to see support for newer must also be configured for Spiceworks to PROS: Comprehensive; easy to use; free
versions of Exchange. gather information.
CONS: More involved setup and installation than
Despite the few shortcomings, Overall, I was impressed with Spice- the documentation suggests
overall I was impressed with Spiceworks’ works. The most compelling feature of the
inventory capabilities. After I was done product, aside from the $0 price tag, is the RATING:
giving the inventory functionality a way all the components tie in together. PRICE: Free
thorough test, I moved on to the Help You don’t have to maintain separate lists RECOMMENDATION: Recommended for
desk component. of assets or use another interface to query administrators who want a comprehensive
Spiceworks provides a comprehensive a network device. Everything is integrated management package that won’t break the bank.
ticketing system in the Help desk arena. in the single Spiceworks interface. My CONTACT: Spiceworks • 512-346-7743 •
Creating a new ticket is a straightforward only concern with the product is that its www.spiceworks.com

66 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


P R O D U C T S
REVIEW

Rove Mobile Admin


If you’re like most system administrators, and install the client on your
you’re either on-call on a set rotation or phone. However, if you have an
on-call all of the time. With laptops and iPhone, you need to download the
netbooks, you can roam freely when you app from the iTunes Store.
aren’t physically at work, but even a light I used my iPhone to test the
computer is a pain to lug around. Rove functionality of the Rove Mobile
Mobile Admin solves this problem by Admin Professional edition. You
providing phone-sized administration can also use it with Apple iPod,
tools that let you handle emergencies as BlackBerry, Google Android 1.5+,
well as perform routine maintenance on and Windows Mobile 6 mobile
your servers and network infrastructure. devices.
What can you do with Rove Mobile Like any form of remote
Admin? Besides managing Windows and access, the first hurdle is to open
Active Directory (AD) from your phone, you a secure network path from your
can manage Cluster service, DHCP, DNS, phone to the Rove Mobile Admin
Exchange Server, Hyper-V, IIS, and SQL server. Make sure that your con-
Server. That’s just the supported Microsoft nection adheres to your compa-
software. You can also manage Citrix, HP ny’s security policy. For example,
Integrated Lights-Out (iLO), IBM Lotus some companies might require a
Domino, Novell NetWare, Oracle, Research VPN connection, whereas others
in Motion BlackBerry Enterprise Server, RSA, might simply require an SSL con-
Symantec Backup Exec, VMware, and more. nection through port 4054.
If the software that you need to manage isn’t For my tests, I used the iPhone’s
supported, you can use the included remote Wi-Fi connection to access my virtual
desktop client and do it the old-fashioned test network, which consists of a DC
way. You can also manage a network running Windows Server 2003 and
through a Telnet or Secure Shell (SSH) con- Exchange Server 2003. The first thing
nection. I noticed was how simple and clean
There are two editions of the product: the interface was. There isn’t a lot of Figure 1: Managing services with Rove
Professional ($595 per CAL) and Basics real estate on a smartphone screen, Mobile Admin
($295 per CAL). For the most part, the and Rove Mobile Admin makes good
Basics edition supports only Windows use of the limited space, as Figure 1 I can quickly solve the problem with this
and AD, but that might be enough to shows. useful tool.
meet your needs. If you need to manage I spent some time in the various InstantDoc ID 125358
a NetWare, Oracle, SQL Server, or virtual areas of the Rove Mobile Admin tool and
environment or advanced Microsoft tech- found each area intuitive and easy to Rove Mobile Admin
nologies like Cluster service or IIS, you’ll use. I tested the command-prompt fea- PROS: Easy to set up; makes remote administra-
need to invest in the Professional ver- ture and remote desktop connection—I tion a breeze; supports the software you’d expect
sion. (You can check out the differences could see myself using these in times it to, plus tons more
between the two editions at www.roveit when I didn’t have a laptop handy. On CONS: None
.com/products.) my Exchange server, I edited the storage
RATING:
Rove Mobile Admin requires the .NET limits and viewed the mail queue. And
Framework 2.0 and can be installed on I quickly reset a user’s password with PRICE: $595 per CAL for the Professional version;
a domain controller (DC) or another just a few clicks—a perfect example of a $295 for the Basics version
server. Licensing for the product is problem that often pops up at the most RECOMMENDATION: If you need remote
provided by an activation code that inopportune time. administration capabilities on a mobile device,
requires that the server be connected to I sure don’t like to be called in the you owe it to yourself to give this product a
the Internet. middle of my golf game to fix a network- serious look.
The installation is quick and painless ing issue. However, if I do, at least I know CONTACT: Rove • 888-482-3646 • www.roveit.com
—it literally takes two minutes from start
to finish. After the software has been
installed, you simply point your mobile Eric B. Rux | ebrux@whshelp.com
device to Rove Mobile Admin’s website

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 67


P R O D U C T S
REVIEW

Kerio Connect 7
I have to admit that, being an Exchange Mobile devices
guy, I came into this review with a bit of a are supported via
prejudice against any Exchange alterna- ActiveSync functionality.
tive. I’ve been asked to look at several To end users, this means
during my career with the aim of saving that they won’t know the
money, and none of them passed my difference between an
tests for functionality or usability. Kerio Exchange back end and
Connect 7 succeeded where competitors the Kerio Connect server.
haved failed. Aimed at small companies Also added to the new
and offered at a very attractive price, release is native support
Kerio Connect 7 delivers the functions for Apple’s iPad device,
that most small companies want—email, giving Kerio the unique
calendaring, and mobile access. bragging rights to being
Installation is quick and easy, and the the first to explicitly
administration interface, which Figure 1 support the iPad. Figure 1: Kerio’s interface
shows, is well laid out. When I set it up in Finally, included in the list of features first year, server renewal is $162, and your
my lab to do this evaluation, I found that is a must-have for any Exchange additional users are $8.60 each. You can
the Linux install (Kerio runs on Windows, alternative—an Outlook plugin that order without the antivirus licensing, but
Linux, and Mac OS) wasn’t any more dif- gives your end users the experience the pricing more than justifies going for
ficult than the Windows install, again put- they know and are comfortable with by the whole package.
ting it ahead of much of its competition. allowing Outlook to connect with Kerio I stated earlier that I had a prejudice
The wizard asks you most of what you Connect. against Exchange alternatives, but I have
need to get up and running, including So, what does it all mean? Well, it to say that if I had a small customer
DNS domain information, and enables all means that if you have a small company, who was looking for an inhouse email
of the common client protocols for you. and no need for a highly available (which solution that was affordable, I’d definitely
Integration with Active Directory (AD) usually means highly expensive) solution, recommend Kerio.
is straightforward and requires little effort Kerio will probably be a good fit for you. InstantDoc ID 125453
on the part of the administrator. The only Most Exchange alternatives currently on
negative here is that although it’s easy to the market have made big investments in Kerio Connect 7
import users from AD, there’s no ability adding features to their webmail in order
to bring in groups to use as mailing lists. to woo customers. Although this is attrac- PROS: Inexpensive; easy to configure and main-
tain; low barrier to entry for small businesses
These must be managed separately within tive to those of us who go in for those
Kerio Connect. things, our users typically want comfort CONS: No high availability option; no native use
All of the security features you’d expect more than anything, and that’s where of AD groups for mailing lists, so user and group
administration has to happen in two places; not
in a mail server are present, including anti- Kerio Connect shines. It presents a familiar
feasible for larger businesses because of these
virus, spam, and attachment filtering. The end-user experience regardless of the weaknesses
attachment filtering is configured to block connection method.
RATING:
according to common best practices by Kerio really seems to know its target
default. Like everything else in the prod- market, and the company is giving users PRICE: First year: $540/server with five user
uct, security is easy to configure. McAfee’s exactly what they want—a simple solu- licenses, $28.80/user (sold in packs of 5);
renewals: $162/server and $8.60/user
antivirus engine is included and activated tion that meets their needs without a
by default, and there’s also an option to steep learning curve. Not only that, but RECOMMENDATION: Kerio Connect is an
enable other engines. Backup capabilities the company does it at an initial price of affordable and easy-to-maintain solution for
small companies. The product might not be a
are included as well, allowing for tradi- $540 for a server license, which includes
good option for a small business with a large
tional backup scheduling, and again, the five user licenses. (Additional user budget that wants advanced Exchange features
defaults are configured out of the box licenses are a reasonable $28.80 each.) such as high availability, Outlook Voice Access,
according to long standing best practices. These prices are for one-year licenses and Unified Messaging.
Tape backup isn’t supported, but backup that include support, virus definition CONTACT: Kerio Technologies • 888-775-3746 •
to a network location is available. Robust updates, and version updates. After your www.kerio.com
logging and a traffic-chart feature make
troubleshooting and monitoring easy.
Ryan Femling | ryan@palador.com
The logs are well organized and verbose
without confusing the reader.

68 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


P R O D U C T S
REVIEW

NetPoint Pro
Hardware inventory and asset manage- properly configured.
ment have never been administrators’ You don’t have to worry
favorite tasks. In small to midsized IT about what WMI class
shops, or those with limited budgets, to use. All results are
administrators often get by with ad hoc stored in the SQL Server
scripted solutions using Windows Manage- database. NetPoint also
ment Instrumentation (WMI) and a hodge- tracks when components
podge of spreadsheets, text files, and duct are added or removed,
tape. However, Neutex Systems offers a such as memory or disk
more cost-effective and easier-to-use solu- drives. You can even sub-
tion called NetPoint Pro. This agentless scribe to an RSS feed to
solution leverages existing Windows tech- alert you when a change
nologies such as WMI and Active Directory is made. Email alerts
(AD) that you already know and trust. aren’t supported in the
Figure 1: NetPointPro OS display
current version.
Installation NetPoint utilizes AD to discover com- polling. You can unlock these features by
NetPoint installs on just about every puter objects and can’t manage non-domain installing a NetPoint Pro license.
Windows OS. But because it requires IIS, and non-Windows computers. You can
you’ll most likely install it on a server. configure a standard polling schedule for Great for Small Shops
It also requires a Microsoft SQL Server all computers, perform on-demand polling, For large and complex enterprises, I don’t
back end, but this can be one of the free or use an included VBScript as a computer feel NetPoint Pro’s feature set is mature
express editions of SQL Server 2008 or start-up script to provide auto-polling. enough to meet their needs. For example,
2005. You don’t need to run the web multi-domain environments require a
server on the database server, but for my Asset and System Management polling server in each domain and some
small scale test I elected to use Windows The web interface is easy to use and query- tweaking via scripts. But for small to
Server 2008 R2. During setup, you can ing systems couldn’t be simpler. Need to midsized shops lacking an affordable,
specify what database server to use. If you know what OSs are deployed? A click or easy-to-use inventory and asset manage-
want to use the included Windows Power- two provides the answer. (See Figure 1.) ment solution, NetPoint Pro is the solution
Shell snap-in, you’ll need PowerShell 2.0. You can also supply non-WMI information you’ve been looking for.
NetPoint ships 32- and 64-bit versions such as purchase order and procurement InstantDoc ID 125442
that install with minimal configuration. dates, making this a basic, yet effective,
NetPoint Pro
The current version is limited to managing asset management system. NetPoint Pro
computers in a single AD domain. Future includes a great set of PowerShell cmdlets PROS: Easy to install and use; cost-effective price
versions should support querying a global for managing inventory information. point; leverages existing technologies such as
WMI and Active Directory; PowerShell cmdlets
catalog server, which will simplify configu- Another terrific feature is the ability to
available
ration for more complex environments. track application licenses. You define the
My installation, using an existing SQL application by associating one or more CONS: Limited access control; can query only
Server instance, took only a few minutes. queried products with a license count and single-domain members; no email notifications;
simple polling options, typical of its limited enter-
After it loaded, I configured NetPoint purchase information. You can then tell at
prise features
through its web interface. There I added a glance if you’re in compliance or not.
my license file and set up my polling NetPoint Pro is licensed per invento- RATING:
schedule. The server will poll all computer ried computer on a sliding scale starting PRICE: NetPoint Pro starts at $5 per computer;
accounts it finds in the current AD domain at $5 per computer in 25-unit bundles. NetPoint Essentials is free
for hardware and software inventory infor- Neutex also offers a free version, NetPoint RECOMMENDATION: Small to midsized shops
mation. I quickly inventoried items such as Essentials. You can inventory (hardware- should give NetPoint Pro a try; larger, more com-
memory, disks, printers, drivers, and OSs. only) an unlimited number of systems for plex organizations will need a more complete
free. But you miss out on other features solution. Watch Neutex for future releases.
Uses Existing Technologies such as PowerShell support, license track- CONTACT: Neutex Systems • 415-763-8839 •
NetPoint uses WMI primarily for its inven- ing, remote desktop, and on-demand www.neutex.net
torying. In almost all Windows-based net-
works WMI is enabled and accessible, which
Jeffery Hicks | jdhitsolutions.com/blog and twitter.com/jeffhicks
means no agents to install. Because it uses
WMI, your computers are most likely already

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 69


P R O D U C T S
REVIEW

VMware Workstation 7.0 Rises Above the Virtual Pack


Desktop virtualization products in a nutshell

virtualization currently revolves around


server virtualization products such as
Microsoft’s Hyper-V technology and
VMware’s ESX Server, the virtualization
trend actually began on the desktop with
the original VMware Workstation product
launched back in 1999. Today, desktop
virtualization remains a vital technology
for IT and developers. Developers use
desktop virtualization to test applica-
tions on multiple platforms and to eas-
ily roll back changes brought about by
application testing. Help desk and QA
professionals use it to replicate end-user
scenarios. IT professionals use it for host-
ing legacy applications and testing OS
changes and patches. The latest release Figure 1: VMware Workstation 7.0
of the Workstation product, VMware
Workstation 7.0, sets a new standard for 400 guest OSs including Windows 7 and wizard, which steps you through creating
desktop virtualization. Windows Server 2008 R2. I installed Work- a VM, including installing the OS. As you
station 7.0 on a 64-bit Windows 7 desktop can see in Figure 2, the wizard even lets
Desktop vs. Server Virtualization with 4GB of RAM. After completing a you set your Windows product code and
Unlike the current crop of server virtu- pretty hefty 525MB download, the instal- the Windows machine name and initial
alization products that are hypervisor lation of Workstation 7.0 was uneventful, password. Another nice touch is that
based, VMware Workstation is a hosted taking only a few minutes. The installation VMware tools are automatically installed
virtualization solution. This means that process required me to input a rather in the guest OS.
the virtualization layer runs on top of a lengthy license code, then rebooted the In addition, Workstation 7.0 can
host OS. Hosted virtualization doesn’t system when it was complete. You can see import VMs using its built-in Conversion
offer the same levels of performance and the VMware Workstation 7.0 console in Wizard. You launch this wizard using the
scalability as hypervisor-based virtual- Figure 1. File, Import and Export option. The Con-
ization. However, hosted virtualization version Wizard can perform a Physical-
solutions can offer a level of integration Creating and Importing Virtual to-Virtual (P2V) conversion as well as
with the host OS that exceeds what Machines convert Microsoft Virtual PC and Virtual
hypervisor-based solutions can offer. This On the technical side, Workstation 7.0 Server VMs, but it doesn’t support the
integration makes desktop virtualization supports virtual machines (VMs) with conversion of Hyper-V VMs. The wizard
a good solution for desktop develop- up to four virtual processors. To take leaves the source VM intact and outputs
ment scenarios, which don’t need the advantage of this, you must have at least a new VM that contains the VMware
scalability or performance required by four cores in your host. Support is avail- device drivers.
server virtualization but can benefit able for up to 32GB of RAM per VM. VMs
from the greater degree of host desktop can also be encrypted using 256-bit AES 3D Graphics Support
integration. For more information about encryption. Workstation 7.0 VMs support One limitation of VMs has been their lack
desktop virtualization products using a USB, DVD, CD-ROM, sound, and webcam of support for graphically intensive appli-
hosted virtualization architecture, refer devices. cations. Graphical drawing and rendering
to the sidebar, “An Overview of Desktop With Workstation 7.0, you create programs, games, and advanced graphics
Virtualization Products”, page 71. new VMs using the New Virtual Machine such as the Windows Aero interface

Installation and Testing


VMware Workstation runs on virtually
Michael Otey | motey@windowsitpro.com
all releases of Windows as well as every
major Linux distribution. It supports over

70 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


P R O D U C T S
REVIEW

An Overview of Desktop Virtualization Products


They say you get what you pay for; however, in terms of desktop Optimization Pack (MDOP), and the new Windows Virtual PC for Windows 7.
virtualization products, you can get a lot of value from the free Virtual PC 2007 is free and can be downloaded at Microsoft’s website (www
products that are available. Although these products don’t offer .microsoft.com/windows/virtual-pc/support/virtual-pc-2007.aspx).
anywhere near the same feature set as VMware Workstation, they Windows Virtual PC is the successor to Virtual PC 2007. It runs only on
are all very capable and most of them are free. Windows 7, and it supports both x86 and x64 hardware. It offers several
important improvements over Virtual PC 2007, including support for USB
Parallels Desktop 4 for Windows & Linux ports, support for Windows XP Mode—which allows seamless running
Parallels plays primarily in the desktop virtualization space with its of VM applications from a Windows 7 desktop—and integration with
Mac product, Parallels Desktop for Mac. Lagging behind the flagship Windows Explorer for VM management, support for multiple threads, and
Mac version is its Windows version, Parallels Desktop 4 for Windows host printer access for VMs. Like Virtual PC 2007, Windows Virtual PC lacks
& Linux, which runs on either x86 or x64 platforms. Unlike the other support for 64-bit guest OSs, and it’s limited to one virtual CPU and 3.6GB
desktop virtualization products in this sidebar, Parallels Desktop 4 for of RAM per VM.
Windows & Linux isn’t free: The product retails for $79. For the price, Windows Virtual PC is an improvement over Virtual PC 2007, but
the product does offer several cool features. On the technological side its main purpose is really to support Windows XP Mode in Windows 7.
it supports VMs with up to eight virtual CPUs and up to 8GB of RAM Windows Virtual PC is a prerequisite for Windows XP Mode and is a
per VM. It provides USB support for VMs and can take advantage of separate download that you can find at www.microsoft.com/windows/
Intel-VT or AMD-V hardware virtualization if present. Parallels Desktop virtual-pc/download.aspx. If you’re confused about Virtual PC 2007
brings the Convergence feature to Windows, which essentially lets and Windows Virtual PC, just remember that Virtual PC 2007 is for Vista
you seamlessly integrate VM applications with your Windows desktop and earlier, whereas Windows Virtual PC is for Windows 7. You can get
similar to Windows 7 XP Mode. You can download a free trial of Paral- Windows Virtual PC from www.microsoft.com/windows/virtual-pc.
lels Desktop 4 for Windows & Linux at www.parallels.com/download/
desktop/pd4wl. VMware Player 3.0
Parallels is currently working on a new version of Parallels Another VMware product in the desktop virtualization space is the free
Desktop for Windows & Linux, which should be out about the time VMware Player product. Previously, VMware Player was able to run only
this review is published. In addition, Parallels also offers the Paral- existing VMs and couldn’t create new VMs. VMware Player 3.0 is now
lels Workstation 4.0 Extreme desktop virtualization product. Like completely capable of creating VMs as well as running them. Player 3.0
VMware Workstation 7.0, Parallels Workstation 4.0 Extreme provides runs on both x86 and x64 hardware and supports most Windows and
support for 3D graphics. It supports up to 16 virtual CPUs per VM Linux OSs for the host and in the guest VMs. Player supports VMs with
and up to 64GB of RAM per VM. The current version requires the four virtual processors and up to 32GB of RAM per VM. However, as you
Intel Xeon 5500 processor and NVIDIA Quadro FX graphics card with would expect, it lacks the high-end features found in VMware’s Work-
SLI-MOS technology. Parallels Workstation 4.0 Extreme costs $399. station product. For instance, Player doesn’t support clones, snapshots,
You can find out more about it at www.parallels.com/products/ or VM recording. VMware Player 3.0 is free and can be downloaded at
extreme/features#faster. VMware’s website (www.vmware.com/tryvmware/?p=player&lp=1).

Microsoft Virtual PC 2007 and Oracle VirtualBox 3.2


Windows Virtual PC If you’re immersed in the Windows world, you might not be familiar
Microsoft’s Virtual PC 2007 is more than three years old, which is like with the other major player in the desktop virtualization market:
a millennia in the fast-moving virtualization market. When you com- Oracle’s VirtualBox (formerly Sun’s VirtualBox). VirtualBox runs on x86
bine that with the fact that this product was never close to being the and x64 hardware and has the broadest host OS support of any of the
technological leader in this space, well, you get the idea. However, the desktop virtualization products. VirtualBox runs on Windows, Linux, Mac
product still provides basic desktop virtualization for Windows-based OS, and OpenSolaris. It provides support for VMs with up to 32 virtual
VMs. Supported guests are limited to Windows. Linux will run, but CPUs and up to 1.5GB of RAM per VM on a 32-bit Windows host. This
Virtual PC 2007 has no Linux VM integration components and Linux limit doesn’t apply to 64-bit hosts. VirtualBox provides a virtual USB
isn’t officially supported. Virtual PC 2007 supports x86 and x64 hosts. controller, enabling you to connect to physical USB devices on the host
There is no x64 guest support, but it does support a single virtual CPU. for your VMs. It also provides built-in support for up to eight monitors.
VMs can access up to 3.6GB of RAM. It offers good multiple monitor One unique feature in VirtualBox is its support for teleportation, which
support but no USB support in the VMs. is like live migration. Teleportation enables you to move VMs between
Although Microsoft has essentially put Virtual PC 2007 out to pasture, it’s hosts with no downtime for the VM. VirtualBox 3.2 is free and can be
the technology behind a couple of other Microsoft virtualization technol- downloaded from dlc.sun.com/virtualbox/vboxdownload.html.
ogy, including the Med-V product, which is part of the Microsoft Desktop InstantDoc ID 125517

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 71


P R O D U C T S
REVIEW
Other advanced features include sup-
port for the Unity feature. Introduced in
Workstation 6.5, Unity provides seamless
desktop VM application integration similar
to Windows 7’s XP Mode. Workstation
also has a capture movie feature that can
record all activity in a VM and save it in
AVI format.
Workstation 7.0 offers the ability
to take an unlimited number of VM
snapshots, to create full or linked VM
clones, and to create VM teams, which
are a collection of VMs connected by one
or more private network segments. You
can control the boot order between the
different VMs.
Another cool feature in Workstation
7.0 is the ability to print from VMs
without mapping network printers
or installing printer drivers in each
VM. Virtual printing enables all of the
printers installed on the host OS to be
automatically available to the guest OSs
in each VM.
Figure 2: Creating a new VM
At the Top of the Heap
couldn’t run in a VM because they used VMware Workstation was the first product
the physical graphics adapter, which VMs Windows Vista and Windows 7 VMs and in the desktop virtualization space, and its
couldn’t directly address. Instead, VMs were is capable of displaying the Windows maturity shows in its advanced feature set:
limited to the capabilities provided by a Aero UI. (It also supports OpenGL Workstation 7.0 is the clear leader in the
virtual graphics adapter. 1.4 and Shader Model 3.0.) Worksta- desktop virtualization market. However,
However, Workstation 7.0 includes tion 7.0 is well integrated with the at $189, Workstation 7.0 is also one of the
advanced 3D graphics for VMs, includ- new Windows 7 desktop. You can see most expensive desktop virtualization
ing the ability to support the Windows Workstation 7.0’s integration with the products on the market. If you need 3D
Aero interface. VMware developed a Windows 7 taskbar and its support for support or Workstation’s other advanced
new graphics driver that’s compliant showing running VMs in Jump Lists in features, it’s worth the price. A 30-day trial
with the Windows Display Driver Model Figure 3. is available. Desktop virtualization doesn’t
get any better than this.
InstantDoc ID 125447

VMware Workstation 7.0


PROS: Extremely broad host and guest OS
support; VM support for 3D graphics and the
Windows Aero interface; support for snapshots,
clones, and virtual printers

CONS: More expensive than all the competing


desktop virtualization products

RATING:
PRICE: $189
RECOMMENDATION: If you need a desktop
virtualization product with a full set of top-of-
the-line features, then VMware Workstation 7.0 is
a must-have.
CONTACT: VMware • www.vmware.com/
Figure 3: VMware Workstation Jump Lists products/workstation

72 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


P R O D U C T S
BUYER’S GUIDE

SharePoint Auditing
and Reporting Tools
Navigate the sea of compliance laws and security “what ifs”
by Brian Reinholz
Information in this buyer’s guide comes from vendor Act, respectively), where businesses have a special responsibility to
representatives and resources and is meant to jump-start, not replace, protect the personal information of clients. Finally, all companies
your own research; also, some products might have been left out, need to be aware of the possibility of e-discovery, when a lawsuit
either as an oversight or from lack of vendor response. requires a company to sift through all available electronic data (on
that company’s dime) for some form of data that holds weight in the

S
harePoint can be used for a variety of functions, including case. Lastly, there are specific statewide compliance laws that every
as a document management solution, an organization- organization should be aware of. Together, these laws and standards
wide intranet, a project management tool, and even as an make ignorance out of the question, even for small organizations,
external-facing website. But at its core, SharePoint is an and force all companies to take compliance very seriously.
information storehouse, logically segmenting your data
and enabling efficient collaboration, thereby reducing fear Native Tools on SharePoint and Their Limitations
of miscommunication, inconsistent versions, and lost documents. Fortunately, native compliance tools do exist on SharePoint.
Storing data on a SharePoint site makes sense for many organi- Although they do not cover the same scope as third-party solutions,
zations. It reduces the load the local network handles and makes they might offer sufficient compliance protection for some organiza-
collaborating on documents much easier. Plus, it offers customiz- tions. First, SharePoint lets you configure user permissions, letting
ability in terms of restricting and managing access to individuals you prevent unauthorized access that could lead to data loss or theft.
at varying levels within the company. SharePoint also has basic reports to audit site collections.
However, there is a downside. The Internet is only as secure as Some of the things that SharePoint’s native tools can’t do include:
the systems that protect it, and threats grow and evolve every day. In audit data at levels other than the site collection level, prevent data
today’s Internet age, where 10 million people were victims of identity from being uploaded beforehand, audit sites based on more robust
theft in 2008 (according to Javelin Strategy & Research Center), many criteria such as time frame, and track all site changes and deletions.
governmental agencies have pushed for compliance laws to prevent
future attacks. And according to the Privacy Rights Clearing House What to Look for in Third-Party Solutions
data, which documents significant data breaches, wide-scale secu- It’s important to note that although each third-party solution in this
rity breaches occur almost every day in the United States (and since buyer’s guide seeks to solve the same common SharePoint difficulties,
2005, 354,537,108 records have been lost or stolen). each works differently. Which solution is best will vary by organization.
For instance, some of the more suite-like products, such as AvePoint’s
Evolution of Compliance Laws DocAve Auditor and Vyapin’s Admin Report Kit, offer auditing/
Compliance laws are good, in principle. They protect individuals and reporting, migration, and backup and recovery. Other products, such
businesses, and they force organizations to take seriously the threat as Muhimbi’s SharePoint Audit Suite, offer similar capabilities to
of data theft before it’s too late. However, each ounce of prevention SharePoint’s native tools, but expand on the capabilities, offering more
in compliance comes at a cost. According to a Financial Executives in-depth auditing. Netwrix’s SharePoint Change Reporter, meanwhile,
International study, the average cost of Sarbanes-Oxley (SOX) com- offers change tracking but doesn’t focus on reporting.
pliance in 2007 for large-scale enterprises was $1.7 million. In addition to auditing for compliance, you’ll also find that some
Like it or not, SOX is here, forcing all public companies to keep of the products that focus more heavily on reporting, such as Nintex
industrious financial records. A number of other laws exist for specific Reporting, also offer business efficiencies through this reporting. The
industries, such as the financial and medical industries (Gramm- same types of reports that aid in compliance can help the business to
Leach-Bliley Act and Health Insurance Portability and Accountability remain efficient through visibility into the organizational structure.

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 73


SHAREPOINT AUDITING & REPORTING TOOLS

In other words, individual compliance measuring compliance. Other companies place, but it’s important to understand the
needs will vary extensively depending on will have stores of sales and contractual differences.
the organization. Some organizations will data continually being uploaded to the
have constantly changing user documents SharePoint site, so controlling, tracking, Customization Is Always an Option
and spreadsheets that contain key informa- and restricting new files uploaded to the Because SharePoint is a very flexible tool, you
tion, so tracking changes to these docu- site would be very important. Whatever might decide to have a developer custom-
ments on a step-by-step level is essential for your need, there is likely a solution in tailor reports that best serve your compliance

Company Name Product Price (Per Change Change Multiple Site Change Track User Track Details
Server) Tracking Tracking to Tracking Tracking to Permissions of Document
SQL Server Web Parts Usage

AvePoint DocAve Auditor $2,290 Yes Yes Yes Yes Yes Yes
www.avepoint.com
201-793-1111
800-661-6588

Muhimbi SharePoint Audit $799 Yes No Yes No Yes Yes


www.muhimbi.com Suite
+44-7799-624931

NetWrix NetWrix $300 first Yes Yes Yes No Yes Yes


www.netwrix.com SharePoint server, $75
201-490-8840 Change per additional
888-638-9749 Reporter server

Nintex Nintex Call for quote No No Yes No No Yes


www.nintex.com Reporting 2008
425-201-5840

Quest Software Site $2,995 Yes No Yes No Yes Yes


www.quest.com Administrator
614-726-4768 for SharePoint

ScriptLogic Enterprise $616 Yes Yes Yes Yes Yes Yes


www.scriptlogic.com Security
800-813-6415 Reporter

Syntergy Audit for $7,500 Yes Yes Yes No Yes Yes


www.syntergy.com SharePoint
905-266-0676

Vyapin Software Admin $1,099 Yes No Yes No Yes Yes


Systems Report Kit for
www.vyapin.com SharePoint
+91-44-24717142 2003/2007/2010

74 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


SHAREPOINT AUDITING & REPORTING TOOLS

needs. Although this might not be the most with the vendors in this space to see how
efficient model (in terms of cost and time), their solutions stack up. In the meantime, I Brian Reinholz
(breinholz@windowsitpro
it might be valuable if you feel that your encourage you to review the buyer’s guide .com) is editorial web
company’s needs are radically different from table, which will shed insight on the capa- architect for Windows
most. My advice would be to carefully review bilities of each offering and provide you with IT Pro and SQL Server
Magazine, specializing
your company’s compliance needs with a a head start. in training and
security expert, and then discuss these needs InstantDoc ID 125249 certification.

Export Real-Time Native Customizable Custom SharePoint Versions Windows Server Windows Desktop
Formats Alerting Reports to Data Auditing Report Supported OSs Supported OSs Supported
Measure Creation
Compliance

CSV, PDF, XML No No Yes Yes SharePoint 2010, Windows Server Windows 7, Vista,
2007 MOSS Enter- 2008 R2, 2008, XP
prise, 2007 MOSS 2003
Standard, Share-
Point Portal Server
2003, WSS 3.0

Excel No No Yes Yes 2007 MOSS Enter- Windows Server


prise, 2007 MOSS 2008 R2, 2008,
Standard, WSS 3.0 2003

Email, Excel, No No Yes Yes SharePoint 2010, Windows Server Windows 7, Vista,
HTML, PDF 2007 MOSS Enter- 2008 R2, 2008, XP
prise, 2007 MOSS 2003
Standard, Share-
Point Portal Server
2003, WSS 3.0

Excel, HTML, PDF Yes No Yes Yes 2007 MOSS Enter- Windows Server
prise, 2007 MOSS 2008 R2, 2008,
Standard, WSS 3.0 2003

Excel, PDF, RTF No No Yes Yes SharePoint 2010, Windows Server Windows XP
2007 MOSS Enter- 2008 R2, 2008,
prise, 2007 MOSS 2003
Standard, Share-
Point Portal Server
2003, WSS 3.0

CSV, HTML, PDF, No Yes Yes Yes SharePoint 2010, Windows Server Windows 7, Vista,
RTF, TIF, TXT 2007 MOSS Enter- 2008 R2, 2008, XP
prise, 2007 MOSS 2003
Standard, WSS 3.0

Excel Yes No Yes Yes 2007 MOSS Enter- Windows Server


prise, 2007 MOSS 2008 R2, 2008,
Standard, Share- 2003
Point Portal Server
2003, WSS 3.0

Excel, CSV, HTML, No No Yes Yes SharePoint 2010, Windows Server


MDB, PDF, TIF 2007 MOSS Enter- 2008 R2, 2008,
prise, 2007 MOSS 2003
Standard, Share-
Point Portal Server
2003, WSS 3.0

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 75


P R O D U C T S
INDUSTRY BYTES

■ Security ■ Exchange

INSIGHTS FROM THE INDUSTRY

Biometric Security Done Right


When I wrote about current biometric Founding Principles of BIOWRAP first is to make sure to use high-quality fin-
security devices recently (windowsitpro Essentially, BIOWRAP cuts through the clut- gerprint readers. All readers are not created
.com, InstantDoc ID 125285), I was a ter by offering one central management equal, and the best readers can choose
bit disappointed that the security on system, but then puts extra verification pro- what level of resolution to scan for, weigh-
these devices wasn’t that robust. But cesses in place to make sure that that one ing convenience (more false positives)
shortly after that article was published, identity is really secure. The primary way against security (more false negatives).
I was contacted by Stephen Nation with that they do this is in the initial verification According to Nation, “I’ve had this system
Nation Technologies, a small start-up that process. Before you can get an identity, you up and running and have yet to hear of a
specializes in a biometric-based security need to meet with a notary-like individual false positive.”
product called BIOWRAP. called a registar. The registrar meets with The second step is to also have a
Unlike a lot of the current biometric you in person, and only by that individual username/password authentication. The
products, which offer convenience and a being an eyewitness to your biometric username and password are encrypted and
little bit of security (plus some added risk), scanning (and running the same type of the password isn’t stored anywhere, but it
BIOWRAP is all business when it comes to proof-of-identity checks that a financial promises that even if someone can somehow
security. It offers two-factor authentication company would when you want a loan) get your fingerprint, they still won’t be able
(username/password and fingerprint can you get the identity.
recognition), and it has an extensive veri- Oh, and they have to verify
fication process, which I’ll get to. Another this process with their own
advantage of BIOWRAP is that it offers one fingerprint scan too.
central management infrastructure for the Sound a little over the
biometric identity, versus having a bunch top? Perhaps, but if you’re
of separate biometric identities (which a financial or medical
is just as confusing as today’s username/ company, a government
password situation.) agency, or any enterprise
“The biometrics market today is that handles loads of
focused on biometrics simply as a matter sensitive data, it’s better
of convenience. I mentioned facility safe than sorry. “In today’s
control and access management— environment, there’s no
that’s really a convenience. Yes you way to prove that a person
have an additional level of security and is physically present to indi-
transparency, but it conveniently allows cate they are who they say
you to get access to the door, or log in they are. It’s a username/
to your PC, but outside that transaction password, or a token, or
there’s no value to the biometrics. And something. But with the
I say that because it’s typically a self- registrar, they have to be
enrolled or admistrative-enrolled bio- physically present, and have
metric, and outside that enterprise or PC to verify that they are physi-
there’s no true value to it. And it requires cally present with their own
every time you perform a transaction in a fingerprint,” said Nation.
separate system, you have to do another So, let’s assume the
enrollment. So we get back to this same company has a pretty
model where you have 10 identities, or good idea that you are
10 biometric identities, that are all cre- you. From there, Nation
dentialed, as opposed to having a single Technologies performs two
source of identity,” said Nation. more security steps. The

76 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


P R O D U C T S
INDUSTRY BYTES
to get in. (Similarly, your username and pass- with multiple-factor authentication— management solution that comes with it,
word are useless without your finger.) username, password, and fingerprint. We but most enterprises will prefer to integrate
Additionally, this multi-factor authen- perform a one-to-few comparison." it with their existing content management
tication makes the biometric scan more As one final feature, you can create contact system in place. (It currently does not
accurate. Instead of skimming through a groups and have access based on the groups. integrate with SharePoint but it may in the
database of available fingerprints in your For instance, if HR is a group, you could make future.) Down the road, the technology
company, this system knows exactly who all personnel files encrypted access to work should also work with website logins.
it’s looking for (because of the username/ only for people in HR. “It’s basically an Active The per-device cost of BIOWRAP is:
password), so it’s just scanning your Directory on steroids,” said Nation. $250 for a one-time set up, and a licensing
fingerprint reading against it. fee is $20/month for unlimited usage and
“When you perform the authentication Implementation Details and Cost support. BIOWRAP has just recently made
[with other solutions], it has to scan through The BIOWRAP technology currently works its national debut—Nation Technologies
all the other fingerprints to match against the for hardware logins, file access, and facility was founded in 2005.
enrolled fingerprint. That’s why we operate access. BIOWRAP has a standalone file —Brian Reinholz

Azaleos Takes a Hybrid Approach to Exchange Storage


Microsoft has made some big storage- “Exchange 2010 is the most stable ver- experts proactively manage the environ-
related changes in Exchange Server 2010. sion of Exchange yet,” says Dumas, “but it ment on a 24x7x365 basis. “Our software
Specifically, it’s now easier to afford a comes with extra complexities. At a time lets us manage data remotely,” Dumas says.
high-availability Exchange infrastructure when companies just want to lower their “Software sits on both sides. We’ve invested
by using existing or inexpensive commod- costs, that’s a difficult pill to swallow. Yes, a lot in our operations team. We’re all Aza-
ity hardware (SATA in some cases)—rather Exchange 2010 has made it possible to leos employees; there’s no outsourcing.”
than expensive, new SAN devices, for achieve lower-cost storage. Don’t throw Azaleos offers a comprehensive, reli-
example. So, what’s the safest and most away your SAN! Microsoft is saying you can able set of remotely managed services for
economical storage approach for the next take advantage of that low-cost storage. But Exchange messaging, SharePoint Server, and
generation of Exchange Server? you still need management and alerting. The Office Communications Server. Azaleos is
I recently spoke with Azaleos’s Lee complexity is still there.” offering four different Exchange 2010 stor-
Dumas, a Microsoft Ranger and a leading Azaleos is taking a unique approach age configurations designed to decrease
Exchange authority outside of Microsoft. In to the challenge by offering a hybrid solu- hardware costs and meet each organization’s
the past, Dumas has written for Windows IT tion that’s essentially a managed-service unique business requirements. Depending
Pro about storage basics. We talked about product. The data stays in-house, and on the configuration chosen and the type
how today’s companies—stretched thin management occurs from afar. The com- of infrastructure already in place, companies
by the economy, or just looking for a more pany’s patented technology remotely can reduce their deployment costs by up to
manageable approach to a highly complex monitors Exchange 2003, Exchange 2007, or 40 percent when migrating from Exchange
back-end technology—can best handle Exchange 2010 wherever it resides, sending 2007 to Exchange 2010, and even more
the changes that Microsoft has made in key data points to Azaleos’s Network Opera- when switching from Exchange 2003.
Exchange 2010’s storage architecture. tions Centers, where certified Exchange —Jason Bovberg

78 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m


AD INDEX
For detailed information about products in this issue of Windows IT Pro, visit the web sites listed below.

COMPANY/URL PAGE COMPANY/URL PAGE COMPANY/URL PAGE

1&1 Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77 Hotels.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 Sunbelt Software Inc. . . . . . . . . . . . . . . .Cover 3


www.1and1.com www.hotels.com/hotel-deals/wrwin1 www.sunbelt-software.com
APC/Schneider Electric . . . . . . . . . . . . . . . . . . .17 IBM Corporation . . . . . . . . . . . . . . . . . Cover 2, 1
Train Signal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
www.apcc.com/promo www.ibm.com/systems/ex5
Citrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22, 23 PowerWF Studio. . . . . . . . . . . . . . . . . . . . . . . . . .78 www.trainsignal.com
www.citrix.com/XenDesktop www.powerwf.com/mg1 WinConnections Fall Event . . . . . . . . . . 12, 64B
Diskeeper Corporation . . . . . . . . . . . . . . . . . . . . 6 Privacyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76
www.WinConnections
www.diskeeper.com/v2 www.privacyware.com
Windows IT Pro. . . . . . . . . . . . . . . . . . . . . . . 18, 44
HP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Cover 4 Quest Software Inc. . . . . . . . . . . . . . . . . . . . . . . . 3
www.hp.com/servers/unleash12 www.quest.com/trabsform www.windowsitpro.com

VENDOR DIRECTORY The following vendors or their products are mentioned in this issue of Windows IT Pro on the pages listed below.

A10 Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63 Kerio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68 Rove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67


Apple . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61 Lyzasoft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61 Sans Digital . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
Aprigo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60 Muhimbi Ltd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74 ScriptLogic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63, 74
Argent Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63 Nation Technologies. . . . . . . . . . . . . . . . . . . . . . . . . .76 Specops Software . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
AvePoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74 NetWrix Corporation . . . . . . . . . . . . . . . . . . . . . . . . .74
Spiceworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
AVIcode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63 Neutex Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Symantec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Azaleos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Nintex. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Symplified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
Brocade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63 Oracle. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Citrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63 Parallels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71 Syntergy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74

Corner Bowl Software . . . . . . . . . . . . . . . . . . . . . . . .64 ProStor Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60 Telerik. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63


Dundas Data Visualization . . . . . . . . . . . . . . . . . . . .62 Quest Software. . . . . . . . . . . . . . . . . . . . . . . . . . . 62, 74 VMware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63, 70
Idera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62 Rebit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61 Vyapin Software Systems . . . . . . . . . . . . . . . . . . . . .74

DIRECTORY OF SERVICES | WINDOWS IT PRO NETWORK


Search our network of sites dedicated to hands- Windows IT Pro VIP NEW WAYS TO REACH
on technical information for IT professionals. Get exclusive access to over 40,000 articles and WINDOWS IT PRO EDITORS:
www.windowsitpro.com solutions on CD and via the Web. Includes FREE
Support access to eBooks and archived eLearning events, LinkedIn: To check out the Windows IT Pro
Join our discussion forums. Post your questions plus a subscription to either Windows IT Pro or group on LinkedIn, sign in on the LinkedIn
and get advice from authors, vendors, and other SQL Server Magazine. homepage (www.linkedin.com), select the Search
IT professionals. www.windowsitpro.com/go/vipsub Groups option from the pull-down menu, and use
www.windowsitpro.com/go/forums “Windows IT Pro” as your search term.

News
Check out the current news and information
Facebook: We’ve created a page on Face-
book for Windows IT Pro, which you can access
about Microsoft Windows technologies. SQL
Q SERVER MAGAZINE at: http://tinyurl.com/d5bquf. Visit our Facebook
www.windowsitpro.com/go/news page to read the latest reader comments, see links
Explore the hottest new features of SQL Server, and
EMAIL NEWSLETTERS discover practical tips and tools. to our latest web content, browse our classic cover
www.sqlmag.com gallery, and participate in our Facebook discus-
Get free news, commentary, and tips delivered sion board.
automatically to your desktop.
asp.netNOW
ASSOCIATED WEBSITES Twitter: Visit the Windows IT Pro Twitter page at
DevProConnections UPDATE www.twitter.com/windowsitpro.
Exchange & Outlook UPDATE DevProConnections
Security UPDATE Discover up-to-the-minute expert insights, infor-
SharepointPro Connections UPDATE mation on development for IT optimization, and
solutions-focused articles at DevProConnections.com,
SQL Server Magazine UPDATE
where IT pros creatively and proactively drive busi-
Windows IT Pro UPDATE ness value through technology.
Windows Tips & Tricks UPDATE www.devproconnections.com
WinInfo Daily UPDATE
www.windowsitpro.com/email SharePointPro Connections
RELATED PRODUCTS Dive into Microsoft SharePoint content offered in
specialized articles, member forums, expert tips,
Custom Reprint Services and Web seminars mentored by a community of
Order reprints of Windows IT Pro articles. Diane peers and professionals.
Madzelonka at Diane.madzelonka@penton.com. www.sharepointproconnections.com

w w w. w i n d o w s i t p ro. c o m W e ’ r e i n I T w i t h Yo u Windows IT Pro AUGUST 2010 79


CTRL+ALT+DEL
by Jason Bovberg

For the Ladies


PRODUCT OF THE MONTH
Our favorite product this month is Efficient Software’s Efficient Lady’s
Organizer, a Windows personal information management (PIM)
application designed especially for women—by women. “Behind the
stunningly fashionable interface is a software powerhouse that com-
bines a calendar, contact manager, planner, reminder, diary, notepad,
and password manager,” the company’s decidedly pink website reads.
Our favorite quote? “It has a fashionable and pretty interface—a
ce—a
e—a
choice only of happy and demanding ladies!” product
ies! This produ
roduct
ct iiss id
ideal
for the Sex and the Cityy fan. information,
an. For more iinforma
ati
tion, visit
sit the Effi
E
Efficient
Softwaree website at www
www.ladysorganizer.com.
w.ladysorganizer.co
l r.co
com.
om
EEfficient
Effic
ficient Lady’s
y Organizer
g

User Moment of
… um
um … the Month
In the 1990s, I worked as temporary Desktop Support
at a software company. One of the first tickets given to
me read, “I need a battery recharger that doesn’t plug
into a wall outlet.” I called the user and asked for more
clarification to better assist her. She said, “I’m flying to
Asia in two weeks, and it’ll be about a 20-hour flight.
… ye
y ah
h… I’m taking my laptop and two laptop batteries with
me. Since I’ll be using one battery to do work on my
SEND US YOUR laptop, I figured I could plug the other battery into the

INDUSTRY HUMOR! recharger. But there are no outlets on the airplane, so


the battery recharger needs to be able to recharge with-
Email your industry humor, out using a wall outlet.” I told the user to go ahead and
scandalous rumors, funny screenshots, submit the paperwork to purchasing. The purchasing
favorite end-user moments, and
department still gets on my case about that one.
IT-related pics to rumors@
windowsitpro.com. If we use your —Paul
submission, you’ll receive a
CTRL+ALT+DEL
GIFT.
August 2010 issue no. 192, Windows IT Pro (ISSN 1552-3136) is published monmonthly.
nthly. Copyright 2010, Penton Media, Inc., all rights reserved. Windows is a trademark or registered trademark rk of
Microsoft Corporation in the United States and/or other countries, and Win Windows
ndows IT Pro is used under license from owner. Windows IT Pro is an independent publication not affiliated
affili with
Microsoft Corporation. Microsoft Corporation is not responsible in any way for th
the editorial policy or other contents of the publication. Windows IT Pro, 221 E. 29th St.,
St. Loveland,
Lo CO 80538, (800)
793-5697 or (970) 663-4700. Sales and Marketing Offices: 221 E. 29th St., Loveland
Loveland,
nd, CO 80538. Advertising rates furnished upon request. Periodicals Classlass postage
posta paid at Loveland, Colorado, and
additional mailing offices. POSTMASTER: Send address changes to Windows IT T Pro,
P 221 E. 29th St., Loveland, CO 80538. SUBSCRIBERS: RS: Send all inquiries, payments, and address changes to
Windows IT Pro, Circulation Department, 221 E. 29th St., Loveland, CO 80538. Printed
Printted in the USA.

80 AUGUST 2010 Windows IT Pro W e ’ r e i n I T w i t h Yo u w w w. w i n d o w s i t p ro. c o m

Вам также может понравиться