Upload
dell-world
View
43
Download
0
Tags:
Embed Size (px)
Citation preview
Dell World 2014
Creating a productive user environment with Desktop Authority
Bob Crosley, Senior Product Manager, November 2014
Dell WorldUser Forum
Dell World Executive Summit
Agenda
What is the “User Environment?”
What are the challenges to user environment management?
What are the four steps to user environment management?
Demo
Questions and Answers
Dell World Executive Summit
There are two halves to every endpoint
Endpoint
Computer
Patching & SecuritySoftware
DistributionAsset and Inventory
User Environment
App. ConfigurationPrivilege ManagementNetwork Resources
Endpoint: The user access point
• Physical computer
• Terminal Sever
• VDI
Computer Environment:
• Configurations that must be managed regardless of logged in user
User Environment:
• Configurations that need to be customized based on the logged in user
Dell World 2014
User environment management remains difficult
Personalize Own or access Utilize
“Maximize Flexibility”
User Perspective
Standardize Provision & deliver Support
“Minimize Cost & Risk”
$
Corporate IT
Perspective
Apps
IT needs to continually manage theoptimal balance
Physical Virtual
Cloud Mobile
User Workspace
Data Platforms
Devices Peripherals Connectivity
Dell World 2014
Everyone does user environment management
Usually managed through a variety of methods
• Login scripts
• Pushing out .REG files
• Group Policy
• Group Policy Templates
• Ad Hoc / manual
Managing multiple methods causes problems
• Inconsistent configurations
• Settings enforcement is a mixed bag
• Manual work to handle moves/adds/changes
• Troubleshooting nightmares
Dell World 2014
Desktop Authority Standard
Validation Logic (VL) targeting
Desktop Authority Management Suite
Privilege Manager
• Browser settings • Printers/drives • Registry settings
• Ports/external devices
• Office and Outlook • Energy settings • Local admin privileges/accounts • Application access
Targeted Configurations
Dell World 2014
Desktop Authority Standard Edition
Target
Dynamic enforcement
User & computer
Configure
User environment
Eliminate log-on scripts
Support
Remote management
Remote control
ManagePhysical, virtual,
published
Security
Desktop Authority Standard
Dell World 2014
Privilege Manager Professional
Target
Dynamic Enforcement
User & Computer
Elevate
User Rights
Windows Operations
Report
Compliance
Usage & Changes
Secure
Digital Certificates
File Hash
Privilege Manager
Dell World 2014
Define
• What settings do I need to apply, and who needs them?
Target
• How do I make sure the right users get the right configurations?
Enforce
• How do I keep users from making changes?
Refine
• How do I identify what needs to change to improve the configurations? keep things running smoothly?
Four steps to managing the user environment
Dell World 2014
Inventory the configurations you have in place
• What settings apply to all users?
• Do I have regional, geographic or office based configurations?
• Do I have department or OU specific configurations?
Determine how you want to categorize your user environments
• Geographic, department, OU, mixed
Find the “high risk” actors
• Identify those users with local admin rights
• Identify applications that force local admin rights
Let it grow organically
• Don’t try to define everything up front
• Target initial configurations
• “Low hanging fruit”
• Highest-priority configurations / mission critical
Step one: define
Dell World 2014
Use the “Define” groupings to identify what users need to receive settings
• Sources of existing targeting information
• What OU receives a specific Group Policy?
• What item-level targeting is applied to a Group Policy Preference?
• What OU receives a specific logon script?
• What targeting is defined in the logon script?
Keep the targeting at the highest level possible
• Use a targeting hierarchy to avoid redundancy
Avoid having to manually apply the same targeting to each similar setting
• Take advantage of containers and profiles to apply a single targeting criteria to a group of settings
Target privilege elevation to specific applications, not users or machines
Identify and manage the exceptions
Step two: target
Dell World 2014
Make sure the user can’t change target configurations
• Remove local admin rights
• Enforce the right local admins
Automatically restore any settings the user might change
• Ensures a productive environment
• Reduces help desk calls
Step three: enforce
Dell World 2014
Identify issues with desired configurations
• Client-side trace logging
• Centralized reporting
• Self-service elevation requests
Refine the desired configurations
• Update profile and element Validation Logic
• Update elevation rule Validation Logic
• Add new rules from the Rules Exchange
Step four: refine
Dell World 2014
Learn more and download a trial version of the Desktop Authority Management Suite:
• http://software.dell.com/products/desktop-authority-management-suite/
Whitepaper: Extend Your System Management Capabilities to the User Workspace
• http://www.kace.com/resource-center/resources/ThankYou?doc={E1C094F4-393F-412A-BB66-1515A988DF43}
Contact:
• Bob Crosley
• 561-886-2465
Questions and answers
Resources and Contact Information