19
Dell World 2014 Creating a productive user environment with Desktop Authority Bob Crosley, Senior Product Manager, November 2014 Dell World User Forum

Creating a Productive User Environment with Desktop Authority

Embed Size (px)

Citation preview

Dell World 2014

Creating a productive user environment with Desktop Authority

Bob Crosley, Senior Product Manager, November 2014

Dell WorldUser Forum

Dell World Executive Summit

Agenda

What is the “User Environment?”

What are the challenges to user environment management?

What are the four steps to user environment management?

Demo

Questions and Answers

Dell World Executive Summit

There are two halves to every endpoint

Endpoint

Computer

Patching & SecuritySoftware

DistributionAsset and Inventory

User Environment

App. ConfigurationPrivilege ManagementNetwork Resources

Endpoint: The user access point

• Physical computer

• Terminal Sever

• VDI

Computer Environment:

• Configurations that must be managed regardless of logged in user

User Environment:

• Configurations that need to be customized based on the logged in user

Dell World 2014

User environment management remains difficult

Personalize Own or access Utilize

“Maximize Flexibility”

User Perspective

Standardize Provision & deliver Support

“Minimize Cost & Risk”

$

Corporate IT

Perspective

Apps

IT needs to continually manage theoptimal balance

Physical Virtual

Cloud Mobile

User Workspace

Data Platforms

Devices Peripherals Connectivity

Dell World 2014

Everyone does user environment management

Usually managed through a variety of methods

• Login scripts

• Pushing out .REG files

• Group Policy

• Group Policy Templates

• Ad Hoc / manual

Managing multiple methods causes problems

• Inconsistent configurations

• Settings enforcement is a mixed bag

• Manual work to handle moves/adds/changes

• Troubleshooting nightmares

Dell World 2014

Desktop Authority Standard

Validation Logic (VL) targeting

Desktop Authority Management Suite

Privilege Manager

• Browser settings • Printers/drives • Registry settings

• Ports/external devices

• Office and Outlook • Energy settings • Local admin privileges/accounts • Application access

Targeted Configurations

Dell World 2014

Desktop Authority Standard Edition

Target

Dynamic enforcement

User & computer

Configure

User environment

Eliminate log-on scripts

Support

Remote management

Remote control

ManagePhysical, virtual,

published

Security

Desktop Authority Standard

Dell World 2014

Privilege Manager Professional

Target

Dynamic Enforcement

User & Computer

Elevate

User Rights

Windows Operations

Report

Compliance

Usage & Changes

Secure

Digital Certificates

File Hash

Privilege Manager

Dell World 2014

Define

• What settings do I need to apply, and who needs them?

Target

• How do I make sure the right users get the right configurations?

Enforce

• How do I keep users from making changes?

Refine

• How do I identify what needs to change to improve the configurations? keep things running smoothly?

Four steps to managing the user environment

Dell World 2014

Inventory the configurations you have in place

• What settings apply to all users?

• Do I have regional, geographic or office based configurations?

• Do I have department or OU specific configurations?

Determine how you want to categorize your user environments

• Geographic, department, OU, mixed

Find the “high risk” actors

• Identify those users with local admin rights

• Identify applications that force local admin rights

Let it grow organically

• Don’t try to define everything up front

• Target initial configurations

• “Low hanging fruit”

• Highest-priority configurations / mission critical

Step one: define

Dell World 2014

Demo: Define

Dell World 2014

Use the “Define” groupings to identify what users need to receive settings

• Sources of existing targeting information

• What OU receives a specific Group Policy?

• What item-level targeting is applied to a Group Policy Preference?

• What OU receives a specific logon script?

• What targeting is defined in the logon script?

Keep the targeting at the highest level possible

• Use a targeting hierarchy to avoid redundancy

Avoid having to manually apply the same targeting to each similar setting

• Take advantage of containers and profiles to apply a single targeting criteria to a group of settings

Target privilege elevation to specific applications, not users or machines

Identify and manage the exceptions

Step two: target

Dell World 2014

Desktop Authority Management Suite: Validation Logic

Dell World 2014

Demo: Target

Dell World 2014

Make sure the user can’t change target configurations

• Remove local admin rights

• Enforce the right local admins

Automatically restore any settings the user might change

• Ensures a productive environment

• Reduces help desk calls

Step three: enforce

Dell World 2014

Demo: Enforce

Dell World 2014

Identify issues with desired configurations

• Client-side trace logging

• Centralized reporting

• Self-service elevation requests

Refine the desired configurations

• Update profile and element Validation Logic

• Update elevation rule Validation Logic

• Add new rules from the Rules Exchange

Step four: refine

Dell World 2014

Demo: Refine

Dell World 2014

Learn more and download a trial version of the Desktop Authority Management Suite:

• http://software.dell.com/products/desktop-authority-management-suite/

Whitepaper: Extend Your System Management Capabilities to the User Workspace

• http://www.kace.com/resource-center/resources/ThankYou?doc={E1C094F4-393F-412A-BB66-1515A988DF43}

Contact:

• Bob Crosley

[email protected]

• 561-886-2465

Questions and answers

Resources and Contact Information