Beruflich Dokumente
Kultur Dokumente
MICROSOFT
LEARNING
PRODUCT
10324A
Implementing and Managing Microsoft Desktop Virtualization
Be sure to access the extended learning content on your Course Companion CD enclosed on the back cover of the book.
ii
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein. 2010 Microsoft Corporation. All rights reserved. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us /IntellectualProperty/Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners.
MICROSOFT LICENSE TERMS OFFICIAL MICROSOFT LEARNING PRODUCTS - TRAINER EDITION Pre-Release and Final Release Versions
These license terms are an agreement between Microsoft Corporation and you. Please read them. They apply to the Licensed Content named above, which includes the media on which you received it, if any. The terms also apply to any Microsoft updates, supplements, Internet-based services, and support services
for this Licensed Content, unless other terms accompany those items. If so, those terms apply. By using the Licensed Content, you accept these terms. If you do not accept them, do not use the Licensed Content. If you comply with these license terms, you have the rights below.
1. DEFINITIONS. a. Academic Materials means the printed or electronic documentation such as manuals,
workbooks, white papers, press releases, datasheets, and FAQs which may be included in the Licensed Content. location, an IT Academy location, or such other entity as Microsoft may designate from time to time. conducted at or through Authorized Learning Centers by a Trainer providing training to Students solely on Official Microsoft Learning Products (formerly known as Microsoft Official Curriculum or MOC) and Microsoft Dynamics Learning Products (formerly know as Microsoft Business Solutions Courseware). Each Authorized Training Session will provide training on the subject matter of one (1) Course. Center during an Authorized Training Session, each of which provides training on a particular Microsoft technology subject matter.
b. Authorized Learning Center(s) means a Microsoft Certified Partner for Learning Solutions
c. Authorized Training Session(s) means those training sessions authorized by Microsoft and
d. Course means one of the courses using Licensed Content offered by an Authorized Learning
e. Device(s) means a single computer, device, workstation, terminal, or other digital electronic or
analog device.
f.
Licensed Content means the materials accompanying these license terms. The Licensed Content may include, but is not limited to, the following elements: (i) Trainer Content, (ii) Student Content, (iii) classroom setup guide, and (iv) Software. There are different and separate components of the Licensed Content for each Course. Software means the Virtual Machines and Virtual Hard Disks, or other software applications that may be included with the Licensed Content.
g.
h. Student(s) means a student duly enrolled for an Authorized Training Session at your location.
i.
Student Content means the learning materials accompanying these license terms that are for use by Students and Trainers during an Authorized Training Session. Student Content may include labs, simulations, and courseware files for a Course. Trainer(s) means a) a person who is duly certified by Microsoft as a Microsoft Certified Trainer and b) such other individual as authorized in writing by Microsoft and has been engaged by an Authorized Learning Center to teach or instruct an Authorized Training Session to Students on its behalf. Trainers and Students, as applicable, solely during an Authorized Training Session. Trainer Content may include Virtual Machines, Virtual Hard Disks, Microsoft PowerPoint files, instructor notes, and demonstration guides and script files for a Course. Virtual Hard Disks means Microsoft Software that is comprised of virtualized hard disks (such as a base virtual hard disk or differencing disks) for a Virtual Machine that can be loaded onto a single computer or other device in order to allow end-users to run multiple operating systems concurrently. For the purposes of these license terms, Virtual Hard Disks will be considered Trainer Content. Microsoft Virtual PC or Microsoft Virtual Server software that consists of a virtualized hardware environment, one or more Virtual Hard Disks, and a configuration file setting the parameters of the virtualized hardware environment (e.g., RAM). For the purposes of these license terms, Virtual Hard Disks will be considered Trainer Content. you means the Authorized Learning Center or Trainer, as applicable, that has agreed to these license terms.
j.
k. Trainer Content means the materials accompanying these license terms that are for use by
l.
m. Virtual Machine means a virtualized computing experience, created and accessed using
n.
2. OVERVIEW.
Licensed Content. The Licensed Content includes Software, Academic Materials (online and electronic), Trainer Content, Student Content, classroom setup guide, and associated media. License Model. The Licensed Content is licensed on a per copy per Authorized Learning Center location or per Trainer basis.
3. INSTALLATION AND USE RIGHTS. a. Authorized Learning Centers and Trainers: For each Authorized Training Session, you
may: i. either install individual copies of the relevant Licensed Content on classroom Devices only for use by Students enrolled in and the Trainer delivering the Authorized Training Session, provided that the number of copies in use does not exceed the number of Students enrolled in and the Trainer delivering the Authorized Training Session, OR
ii. install one copy of the relevant Licensed Content on a network server only for access by classroom Devices and only for use by Students enrolled in and the Trainer delivering the Authorized Training Session, provided that the number of Devices accessing the Licensed Content on such server does not exceed the number of Students enrolled in and the Trainer delivering the Authorized Training Session. iii. and allow the Students enrolled in and the Trainer delivering the Authorized Training Session to use the Licensed Content that you install in accordance with (ii) or (ii) above during such Authorized Training Session in accordance with these license terms.
i.
Separation of Components. The components of the Licensed Content are licensed as a single unit. You may not separate the components and install them on different Devices.
ii. Third Party Programs. The Licensed Content may contain third party programs. These license terms will apply to the use of those third party programs, unless other terms accompany those programs.
b. Trainers:
i. Trainers may Use the Licensed Content that you install or that is installed by an Authorized Learning Center on a classroom Device to deliver an Authorized Training Session.
ii. Trainers may also Use a copy of the Licensed Content as follows:
A. Licensed Device. The licensed Device is the Device on which you Use the Licensed Content.
You may install and Use one copy of the Licensed Content on the licensed Device solely for your own personal training Use and for preparation of an Authorized Training Session. personal training Use and for preparation of an Authorized Training Session.
B. Portable Device. You may install another copy on a portable device solely for your own 4. PRE-RELEASE VERSIONS. If this is a pre-release (beta) version, in addition to the other provisions
in this agreement, these terms also apply:
a. Pre-Release Licensed Content. This Licensed Content is a pre-release version. It may not
contain the same information and/or work the way a final version of the Licensed Content will. We may change it for the final, commercial version. We also may not release a commercial version. You will clearly and conspicuously inform any Students who participate in each Authorized Training Session of the foregoing; and, that you or Microsoft are under no obligation to provide them with any further content, including but not limited to the final released version of the Licensed Content for the Course. Microsoft, without charge, the right to use, share and commercialize your feedback in any way and for any purpose. You also give to third parties, without charge, any patent rights needed for their products, technologies and services to use or interface with any specific parts of a Microsoft software, Licensed Content, or service that includes the feedback. You will not give feedback that is subject to a license that requires Microsoft to license its software or documentation to third parties because we include your feedback in them. These rights survive this agreement.
b. Feedback. If you agree to give feedback about the Licensed Content to Microsoft, you give to
c. Confidential Information. The Licensed Content, including any viewer, user interface, features
and documentation that may be included with the Licensed Content, is confidential and proprietary to Microsoft and its suppliers. i. Use. For five years after installation of the Licensed Content or its commercial release, whichever is first, you may not disclose confidential information to third parties. You may disclose confidential information only to your employees and consultants who need to know the information. You must have written agreements with them that protect the confidential information at least as much as this agreement. Survival. Your duty to protect confidential information survives this agreement.
ii.
iii. Exclusions. You may disclose confidential information in response to a judicial or governmental order. You must first give written notice to Microsoft to allow it to seek a
protective order or otherwise protect the information. Confidential information does not include information that d. becomes publicly known through no wrongful act; you received from a third party who did not breach confidentiality obligations to Microsoft or its suppliers; or you developed independently.
Term. The term of this agreement for pre-release versions is (i) the date which Microsoft informs you is the end date for using the beta version, or (ii) the commercial release of the final release version of the Licensed Content, whichever is first (beta term). Use. You will cease using all copies of the beta version upon expiration or termination of the beta term, and will destroy all copies of same in the possession or under your control and/or in the possession or under the control of any Trainers who have received copies of the pre-released version. Copies. Microsoft will inform Authorized Learning Centers if they may make copies of the beta version (in either print and/or CD version) and distribute such copies to Students and/or Trainers. If Microsoft allows such distribution, you will follow any additional terms that Microsoft provides to you for such copies and distribution.
e.
f.
ii. Virtual Hard Disks. The Licensed Content may contain versions of Microsoft XP, Microsoft Windows Vista, Windows Server 2003, Windows Server 2008, and Windows 2000 Advanced Server and/or other Microsoft products which are provided in Virtual Hard Disks. A. If the Virtual Hard Disks and the labs are launched through the Microsoft Learning Lab Launcher, then these terms apply: Time-Sensitive Software. If the Software is not reset, it will stop running based upon the time indicated on the install of the Virtual Machines (between 30 and 500 days after you install it). You will not receive notice before it stops running. You may not be able to access data used or information saved with the Virtual Machines when it stops running and may be forced to reset these Virtual Machines to their original state. You must remove the Software from the Devices at the end of each Authorized Training Session and reinstall and launch it prior to the beginning of the next Authorized Training Session. B. If the Virtual Hard Disks require a product key to launch, then these terms apply: Microsoft will deactivate the operating system associated with each Virtual Hard Disk. Before installing any Virtual Hard Disks on classroom Devices for use during an Authorized Training Session, you will obtain from Microsoft a product key for the operating system software for the Virtual Hard Disks and will activate such Software with Microsoft using such product key. C. These terms apply to all Virtual Machines and Virtual Hard Disks:
You may only use the Virtual Machines and Virtual Hard Disks if you comply with the terms and conditions of this agreement and the following security requirements: o o You may not install Virtual Machines and Virtual Hard Disks on portable Devices or Devices that are accessible to other networks. You must remove Virtual Machines and Virtual Hard Disks from all classroom Devices at the end of each Authorized Training Session, except those held at Microsoft Certified Partners for Learning Solutions locations. You must remove the differencing drive portions of the Virtual Hard Disks from all classroom Devices at the end of each Authorized Training Session at Microsoft Certified Partners for Learning Solutions locations. You will ensure that the Virtual Machines and Virtual Hard Disks are not copied or downloaded from Devices on which you installed them. You will strictly comply with all Microsoft instructions relating to installation, use, activation and deactivation, and security of Virtual Machines and Virtual Hard Disks. You may not modify the Virtual Machines and Virtual Hard Disks or any contents thereof. You may not reproduce or redistribute the Virtual Machines or Virtual Hard Disks.
o o o o
ii. Classroom Setup Guide. You will assure any Licensed Content installed for use during an
Authorized Training Session will be done in accordance with the classroom set-up guide for the Course. iii. Media Elements and Templates. You may allow Trainers and Students to use images, clip art, animations, sounds, music, shapes, video clips and templates provided with the Licensed Content solely in an Authorized Training Session. If Trainers have their own copy of the Licensed Content, they may use Media Elements for their personal training use. iv. iv Evaluation Software. Any Software that is included in the Student Content designated as Evaluation Software may be used by Students solely for their personal training outside of the Authorized Training Session.
b. Trainers Only:
i. Use of PowerPoint Slide Deck Templates. The Trainer Content may include Microsoft PowerPoint slide decks. Trainers may use, copy and modify the PowerPoint slide decks only for providing an Authorized Training Session. If you elect to exercise the foregoing, you will agree or ensure Trainer agrees: (a) that modification of the slide decks will not constitute creation of obscene or scandalous works, as defined by federal law at the time the work is created; and (b) to comply with all other terms and conditions of this agreement.
ii. Use of Instructional Components in Trainer Content. For each Authorized Training Session, Trainers may customize and reproduce, in accordance with the MCT Agreement, those portions of the Licensed Content that are logically associated with instruction of the Authorized Training Session. If you elect to exercise the foregoing rights, you agree or ensure the Trainer agrees: (a) that any of these customizations or reproductions will only be used for providing an Authorized Training Session and (b) to comply with all other terms and conditions of this agreement.
iii. Academic Materials. If the Licensed Content contains Academic Materials, you may copy and use the Academic Materials. You may not make any modifications to the Academic Materials and you may not print any book (either electronic or print version) in its entirety. If you reproduce any Academic Materials, you agree that:
The use of the Academic Materials will be only for your personal reference or training use You will not republish or post the Academic Materials on any network computer or broadcast in any media; You will include the Academic Materials original copyright notice, or a copyright notice to Microsofts benefit in the format provided below: Form of Notice: 2010 Reprinted for personal reference use only with permission by Microsoft Corporation. All rights reserved. Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the US and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners.
6. INTERNET-BASED SERVICES. Microsoft may provide Internet-based services with the Licensed
Content. It may change or cancel them at any time. You may not use these services in any way that could harm them or impair anyone elses use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.
7. SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some
rights to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the Licensed Content only as expressly permitted in this agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only allow you to use it in certain ways. You may not install more copies of the Licensed Content on classroom Devices than the number of Students and the Trainer in the Authorized Training Session; allow more classroom Devices to access the server than the number of Students enrolled in and the Trainer delivering the Authorized Training Session if the Licensed Content is installed on a network server; copy or reproduce the Licensed Content to any server or location for further reproduction or distribution; disclose the results of any benchmark tests of the Licensed Content to any third party without Microsofts prior written approval; work around any technical limitations in the Licensed Content; reverse engineer, decompile or disassemble the Licensed Content, except and only to the extent that applicable law expressly permits, despite this limitation; make more copies of the Licensed Content than specified in this agreement or allowed by applicable law, despite this limitation; publish the Licensed Content for others to copy;
transfer the Licensed Content, in whole or in part, to a third party; access or use any Licensed Content for which you (i) are not providing a Course and/or (ii) have not been authorized by Microsoft to access and use; rent, lease or lend the Licensed Content; or use the Licensed Content for commercial hosting services or general business purposes. Rights to access the server software that may be included with the Licensed Content, including the Virtual Hard Disks does not give you any right to implement Microsoft patents or other Microsoft intellectual property in software or devices that may access the server.
8. EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and
regulations. You must comply with all domestic and international export laws and regulations that apply to the Licensed Content. These laws include restrictions on destinations, end users and end use. For additional information, see www.microsoft.com/exporting. Content marked as NFR or Not for Resale.
9. NOT FOR RESALE SOFTWARE/LICENSED CONTENT. You may not sell software or Licensed 10. ACADEMIC EDITION. You must be a Qualified Educational User to use Licensed Content marked as
Academic Edition or AE. If you do not know whether you are a Qualified Educational User, visit www.microsoft.com/education or contact the Microsoft affiliate serving your country. fail to comply with the terms and conditions of these license terms. In the event your status as an Authorized Learning Center or Trainer a) expires, b) is voluntarily terminated by you, and/or c) is terminated by Microsoft, this agreement shall automatically terminate. Upon any termination of this agreement, you must destroy all copies of the Licensed Content and all of its component parts.
11. TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you
12. ENTIRE AGREEMENT. This agreement, and the terms for supplements, updates, Internet-
based services and support services that you use, are the entire agreement for the Licensed Content and support services.
13. APPLICABLE LAW. a. United States. If you acquired the Licensed Content in the United States, Washington state law
governs the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws principles. The laws of the state where you live govern all other claims, including claims under state consumer protection laws, unfair competition laws, and in tort.
b. Outside the United States. If you acquired the Licensed Content in any other country, the laws
of that country apply.
14. LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the
laws of your country. You may also have rights with respect to the party from whom you acquired the Licensed Content. This agreement does not change your rights under the laws of your country if the laws of your country do not permit it to do so.
15. DISCLAIMER OF WARRANTY. The Licensed Content is licensed as-is. You bear the risk of
using it. Microsoft gives no express warranties, guarantees or conditions. You may have additional consumer rights under your local laws which this agreement cannot change. To the extent permitted under your local laws, Microsoft excludes the implied warranties of merchantability, fitness for a particular purpose and non-infringement.
16. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. YOU CAN RECOVER FROM
MICROSOFT AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO U.S. $5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES. This limitation applies to anything related to the Licensed Content, software, services, content (including code) on third party Internet sites, or third party programs; and claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence, or other tort to the extent permitted by applicable law.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages. Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this agreement are provided below in French. Remarque : Ce le contenu sous licence tant distribu au Qubec, Canada, certaines des clauses dans ce contrat sont fournies ci-dessous en franais. EXONRATION DE GARANTIE. Le contenu sous licence vis par une licence est offert tel quel . Toute utilisation de ce contenu sous licence est votre seule risque et pril. Microsoft naccorde aucune autre garantie expresse. Vous pouvez bnficier de droits additionnels en vertu du droit local sur la protection dues consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties implicites de qualit marchande, dadquation un usage particulier et dabsence de contrefaon sont exclues. LIMITATION DES DOMMAGES-INTRTS ET EXCLUSION DE RESPONSABILIT POUR LES DOMMAGES. Vous pouvez obtenir de Microsoft et de ses fournisseurs une indemnisation en cas de dommages directs uniquement hauteur de 5,00 $ US. Vous ne pouvez prtendre aucune indemnisation pour les autres dommages, y compris les dommages spciaux, indirects ou accessoires et pertes de bnfices. Cette limitation concerne: tout ce qui est reli au le contenu sous licence , aux services ou au contenu (y compris le code) figurant sur des sites Internet tiers ou dans des programmes tiers ; et les rclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilit stricte, de ngligence ou dune autre faute dans la limite autorise par la loi en vigueur.
Elle sapplique galement, mme si Microsoft connaissait ou devrait connatre lventualit dun tel dommage. Si votre pays nautorise pas lexclusion ou la limitation de responsabilit pour les dommages indirects, accessoires ou de quelque nature que ce soit, il se peut que la limitation ou lexclusion ci-dessus ne sappliquera pas votre gard. EFFET JURIDIQUE. Le prsent contrat dcrit certains droits juridiques. Vous pourriez avoir dautres droits prvus par les lois de votre pays. Le prsent contrat ne modifie pas les droits que vous confrent les lois de votre pays si celles-ci ne le permettent pas.
Welcome!
Thank you for taking our training! Weve worked together with our Microsoft Certied Partners for Learning Solutions and our Microsoft IT Academies to bring you a world-class learning experiencewhether youre a professional looking to advance your skills or a student preparing for a career in IT.
Microsoft Certied Trainers and InstructorsYour instructor is a technical and instructional expert who meets ongoing certication requirements. And, if instructors are delivering training at one of our Certied Partners for Learning Solutions, they are also evaluated throughout the year by students and by Microsoft. Certication Exam BenetsAfter training, consider taking a Microsoft Certication exam. Microsoft Certications validate your skills on Microsoft technologies and can help differentiate you when finding a job or boosting your career. In fact, independent research by IDC concluded that 75% of managers believe certications are important to team performance1. Ask your instructor about Microsoft Certication exam promotions and discounts that may be available to you. Customer Satisfaction GuaranteeOur Certied Partners for Learning Solutions offer a satisfaction guarantee and we hold them accountable for it. At the end of class, please complete an evaluation of todays experience. We value your feedback!
We wish you a great learning experience and ongoing success in your career!
IDC, Value of Certication: Team Certication and Organizational Performance, November 2006
xiii
Acknowledgement
Microsoft Learning would like to acknowledge and thank the following for their contribution towards developing this title. Their effort at various stages in the development has ensured that you have a good classroom experience.
xiv
xv
Contents
Module 1: Overview of Desktop and Application Virtualization
Lesson 1: Overview of Virtualization Lesson 2: Overview of Virtualization Management Lesson 3: Planning an Application and Desktop Virtualization Deployment Lab: Planning Desktop Virtualization Scenarios 1-3 1-24 1-44 1-59
xvi
xvii
xviii
Module 8 Lab B: Implementing License Enforcement Module 9 Lab: Sequencing Applications for Virtualization Module 10 Lab: Configuring RDS and RemoteApp Programs Module 11 Lab: Implementing User State Virtualization Module 12 Lab: Configuring Virtual Desktop Infrastructure
Course Description
This five-day, instructor-led course provides you with the knowledge and skills to implement and manage desktop virtualization solutions. This course provides an overview of virtualization and the various Microsoft products that you can use to implement and deploy a virtualization solution. The course explains how to configure and manage a MED-V deployment. Then, it describes the procedures for deploying an App-V solution by implementing App-V servers and clients and by sequencing applications. The course then covers the configuration of Remote Desktop Services and RemoteApp programs. Finally, the course describes the concept of user state virtualization and procedures for configuring the Virtual Desktop Infrastructure (VDI).
Audience
This course is intended for Microsoft Windows Server 2008 system and desktop administrators who will manage and implement desktop and application virtualization technologies within their networks. The students for this course typically are responsible for implementing their organizations desktop and application virtualization, or their information technology (IT) management has directed them to research and/or implement desktop and application virtualization in the existing environment. Students should have a minimum of 1.5 years of experience working with Windows Server 2008 as a server or desktop administrator. This course does not require prior experience with virtualization. However, we highly recommend familiarity with virtualization concepts and management tools.
ii
Student Prerequisites
This course requires that you meet the following prerequisites: Basic skills with Windows Command line Monitoring and Management Tools Networking AD DS, including Group Policy deployments Performance Monitoring Troubleshooting
Course Objectives
After completing this course, students will be able to: Plan desktop virtualization scenarios. Implement and configure Windows Virtual PC and the Windows XP mode. Implement Microsoft Enterprise Desktop Virtualization. Configure and deploy MED-V images. Manage a MED-V deployment. Implement App-V servers. Plan and deploy Application Virtualization clients. Administer the App-V infrastructure by using the App-V Management Console. Sequence applications for deployment by using the App-V infrastructure or a standalone installation. Configure and use Remote Desktop Services and RemoteApp programs. Implement user state virtualization. Configure and use Virtual Desktop Infrastructure.
iii
Course Outline
This section provides an outline of the course: Module 1, Overview of Desktop and Application Virtualization Many organizations are exploring the use of virtualization to optimize their information technology environment and to streamline their IT management practices. Microsoft provides several products and technologies that enable organizations to implement virtualization solutions in many different ways. This module provides an overview of the Microsoft virtualization technologies and provides information on planning and managing virtualized environments. Module 2, Implementing Windows Virtual PC and Windows XP Mode Windows 7 has introduced new version of Microsoft Virtual PC software, to support creating virtual machines with various operating systems within same virtual environment. Also, Windows 7 brings Windows XP Mode, a pre-created virtual machine with Windows XP Professional SP3 installed, for supporting older applications and to make migration to Windows 7 more convenient. In this module, you will learn how to configure and use Windows Virtual PC, virtual machines as well as how to use Windows XP Mode. Module 3, Implementing Microsoft Enterprise Desktop Virtualization Microsoft Enterprise Desktop Virtualization (MED-V) is an enterprise solution that enables incompatible or unsupported applications to be available in a virtual environment, and then used by the end users as if they were installed locally on their computers. However, the applications availability from the virtual environment is seamless, or invisible, to the user. It provides a virtual environment for legacy applications, and it enables central administration of applications. MED-V is built on Windows Virtual PC 2007 Service Pack 1 (SP1), and it is available for Windows clients such as the Windows XP, Windows Vista, and Windows 7 operating systems. Module 4, Configuring and Deploying MED-V Images MED-V uses virtualization to provide an isolated environment, in which you can run legacy applications and publish applications to the host. A virtual image contains the virtual machine and MED-V enables central management of the images. There are certain prerequisites that you must meet when you create a MED-V image. This module describes the purpose and functionality of MED-V images, and the procedures for configuring and testing of the images. The module also explains how to pack and upload MED-V images to the image repository on a MED-V server.
iv
Module 5, Managing a MED-V Deployment Managing the MED-V environment typically is one of the most time-consuming activities for MED-V administrators. After you deploy the MED-V infrastructure, you must define MED-V Workspaces by configuring MED-V policies. You then need to enable the workspaces for the users and set options to configure the workspaces that will be available to the users. MED-V users work in two separate environments, the host operating system and the MED-V Workspace. If you seamlessly integrate published applications with the host, users typically cannot differentiate them from the locally installed applications. Besides a configurable virtual environment and a seamless integration with the host, MED-V also provides reporting and diagnostics capability. The reporting feature requires Microsoft SQL Server, and it logs MED-V events and provides three basic report types. The MED-V client provides a diagnostics mode, policy updates, and diagnostic log gathering that you can use to troubleshoot MED-V issues. Module 6, Implementing Microsoft Application Virtualization The Microsoft Application Virtualization 4.5 Service Pack 1 (App-V 4.5 SP1) and the App-V 4.6 client and sequencer software provide the latest updates to application virtualization technology. This release includes new capabilities that make it easy for enterprise Information Technology (IT) organizations to support large-scale, global application virtualization implementations. This module provides an overview of application virtualization and App-V components. The module also covers the App-V infrastructure, the deployment scenarios, and the procedures for installing and configuring App-V servers and App-V clients. Module 7, Planning and Deploying App-V Clients The App-V Client software is the one component that you always require to implement Microsoft App-V solutions. Therefore, deploying the App-V client requires careful consideration of various factors. You should consider the best client to deploy, the method of deployment, and the configurations required for the deployment. You should also be aware of the prerequisites for installing the client. This module provides an overview of the desktop and remote desktop client including the several installation methods. The module also describes the recommendations for deploying and managing the App-V client.
Module 8, Managing and Administering Application Virtualization After you deploy the Microsoft Application Virtualization (App-V) infrastructure, you should be able to manage and administer the App-V solution by using the Application Virtualization Management Console to perform daily management tasks. This console enables you to control the entire App-V environment from a single workstation. You deploy the Application Virtualization Management Console on the administrative workstation, and then use it to perform administrative tasks, such as publishing virtualized applications, modifying published applications, and configuring version upgrades. This module provides an overview of the Application Virtualization Management Console and the permissions that users must have to administer the App-V Management Server. The module also covers the steps you must take to perform these administrative tasks, and how to enforce license compliance and manage server groups and server objects. Module 9, Sequencing Applications for Virtualization To use applications in an App-V solution, you must first package them into a form that can run in a virtualized environment. You can use the Microsoft Application Virtualization (App-V) Sequencer to create these application packages. You can sequence applications that you plan to deploy by using the App-V infrastructure or standalone installation. By using App-V sequencing, you create a set of files that contain the all the information about the application that is required for the application to run in a virtual environment. The App-V Sequencer provides several packaging options that you can choose based on your specific requirements. This module describes how to use install and configure the App-V Sequencer to create application packages. The module also describes how to upgrade existing packages and create standalone packages.
vi
Module 10, Configuring Remote Desktop Services and RemoteApp Remote Desktop Services (RDS) provide a form of virtualization known as presentation virtualization. Although you connect to a remote desktop or to individual remote applications, your experience is similar to running local applications on your computer. With features such as device redirection, single sign-on, and RD Easy Print, it is not easy to distinguish between remote and local applications. This module provides an overview of Remote Desktop Services and their role services, and the procedures for connecting to an RD Session host. The module also describes RemoteApp programs the methods for accessing them. The module also explains how to using RD Gateway to access RDS infrastructure securely from an external network. Module 11, Implementing User State Virtualization User state virtualization is a concept that allows administrators to provide more flexible client environments, and to provide users with ability to have documents and settings following them from computer to computer. Also, this concept provides better ability to backup and centralize user data, as well as to prevent data loss. This module discusses technologies that provide user state virtualization and various ways to provide virtualization. This module also discusses how to configure roaming profiles and users folder redirection as part of user state. Module 12, Configuring Virtual Desktop Infrastructure Using virtualization technologies for desktop virtualization can be very convenient. Microsoft provides virtual desktop infrastructure (VDI) as a technology that relies on Hyper-V and Remote Desktop Services (RDS) to enable administrators to configure virtual desktops as working environments instead of real physical desktop computers. In order to use VDI, you should be familiar with Hyper-V, RDS as well as with features and configuration procedures for VDI. Module 13, Summary of Desktop Virtualization Technologies This module summarizes the various desktop virtualization technologies that are covered in this course. The module compares the features of these technologies, and it also provides examples of real-world scenarios in which you would implement these virtualization technologies.
vii
Course Materials
The following materials are included with your kit: Course Handbook. A succinct classroom learning guide that provides all the critical technical information in a crisp, tightly-focused format, which is just right for an effective in-class learning experience. Lessons: Guide you through the learning objectives and provide the key points that are critical to the success of the in-class learning experience. Labs: Provide a real-world, hands-on platform for you to apply the knowledge and skills learned in the module. Module Reviews and Takeaways: Provide improved on-the-job reference material to boost knowledge and skills retention. Lab Answer Keys: Provide step-by-step lab solution guidance at your finger tips when its needed.
Course Companion CD. Searchable, easy-to-navigate digital content with integrated premium on-line resources designed to supplement the Course Handbook. Lessons: Include detailed information for each topic, expanding on the content in the Course Handbook. Labs: Include complete lab exercise information and answer keys in digital form to use during lab time. Resources: Include well-categorized additional resources that give you immediate access to the most up-to-date premium content on TechNet, MSDN, Microsoft Press.
Note: To access the full course content, insert the Course Companion CD into the CD-ROM drive, and then in the root directory of the CD, double-click StartCD.exe.
Course evaluation. At the end of the course, you will have the opportunity to complete an online evaluation to provide feedback on the course, training facility, and instructor.
To provide additional comments or feedback on the course, send e-mail to support@mscourseware.com. To inquire about the Microsoft Certification Program, send e-mail to mcphelp@microsoft.com.
viii
10324A -NYC-SVR2
10324A -NYC-SVR3
ix
Software Configuration
The following software is installed on each VM: Windows Server 2008 R2 Enterprise Windows 7
Classroom Setup
Each classroom computer will have the same virtual machine configured in the same way. All of the virtual machines are deployed on each student computer.
Hardware Level 6
Intel Virtualization Technology (Intel VT) or AMD Virtualization (AMD-V) processor Dual 120 gigabyte (GB) hard disks 7200 RM SATA or better* 6 GB RAM expandable to 8GB or higher DVD drive Network adapter Super VGA (SVGA) 17-inch monitor Microsoft Mouse or compatible pointing device Sound card with amplified speakers
*Striped
Additionally, the instructor computer must be connected to a projection display device that supports SVGA 1024 x 768 pixels, 16-bit colors.
1-1
Module 1
Overview of Desktop and Application Virtualization
Contents:
Lesson 1: Overview of Virtualization Lesson 2: Overview of Virtualization Management Lesson 3: Planning an Application and Desktop Virtualization Deployment Lab: Planning Desktop Virtualization Scenarios 1-3 1-24 1-44 1-59
1-2
Module Overview
Many organizations are exploring the use of virtualization to optimize their information technology (IT) environment and to streamline their IT management practices. Microsoft provides several products and technologies that enable organizations to implement virtualization solutions in many different ways. This module provides an overview of the available Microsoft virtualization technologies, and provides information on planning and managing virtualized environments.
1-3
Lesson 1
Overview of Virtualization
During the last few years, virtualization has become a key component to enable organizations to deal with the cost and complexity of managing an IT environment. You can use virtualization to decrease how much it costs significantly to provide IT services by enabling organizations to decrease the number of physical servers they need to provide network services and applications. You also can use virtualization to provide new options for deploying or managing applications for users. This lesson provides an overview of the various options available for enabling virtualization within the IT infrastructure.
1-4
Key Points
Most organizations consider using virtualization because of the challenges that they are facing and the associated benefits that it provides. The following sections describe some of the challenges that organizations are facing.
1-5
1-6
1-7
Virtualization Modes
Key Points
Virtualization separates the components of the applications and operating system that users work with from the actual physical components that provide the application or operating system services. For example, virtual machines provide all of the functionality of physical servers. However, the operating system is not tied to any particular piece of hardware, and can be made available where it is most convenient. Applications traditionally run on an operating system that is running on a particular piece of hardware. With application and presentation virtualization, those applications might run on a centralized server or in a virtual environment that is completely portable to other operating systems or hardware devices.
1-8
Virtualization Solutions
Microsoft provides virtualization solutions that address the virtualization requirements for most organizations: Server virtualization. Windows Server 2008 Hyper-V and Microsoft Virtual Server 2005 release 2 (R2) enable server virtualization, so that you can run multiple virtual machines on a single physical server. This allows you to utilize server hardware resources more fully while allowing you to maintain operational isolation and security. Application virtualization. Application virtualization enables you to run applications in a virtualized environment on a users desktop. Application virtualization separates the application configuration layer from the desktop operating system, which reduces the potential for application conflicts. With application virtualization, you isolate the application from the underlying operating system because you encapsulate it in a virtual environment. With application virtualization, you also can configure centralized servers to distribute the applications and simplify the distribution of updated virtual applications. Microsoft Application Virtualization (App-V) is an example of an application virtualization platform. Desktop virtualization. You can provide desktop virtualization by running Microsoft Virtual PC on the Windows Vista operating system, or Windows Virtual PC and Windows XP Mode on the Windows 7 operating system. Desktop virtualization enables you to run multiple operating systems on a single workstation, and to run an incompatible legacy or line-of-business (LOB) application in a virtual machine that you host on a more-current desktop operating system. Microsoft provides a way to manage a complex desktop virtualization environment through Microsoft Enterprise Desktop Virtualization (MED-V). With MED-V, you can create and manage a centralized collection of Virtual PC images, and then deliver those images to client computers as necessary. Presentation virtualization. Remote Desktop Services (RDS) in the Windows Server 2008 R2 operating system provides presentation virtualization. RDS is an upgrade of Terminal Services, which was in previous Windows versions. Presentation virtualization enables you to run applications and maintain application storage on centralized servers, while providing users with a familiar application interface on their workstations.
1-9
Microsoft also provides Virtual Desktop Infrastructure (VDI), which integrates the functionality of presentation and desktop virtualization. With VDI, you configure desktop operating systems as virtual machines that are hosted on a Hyper-V infrastructure. These virtual machines are made available to users through an RDS infrastructure, so that users can connect to the virtual machines through a Remote Desktop Protocol (RDP) connection. User state virtualization. User state virtualization enables users to take advantage of separating their files and profile information from a specific computer, which makes it easy for users to begin working when you issue them a new computer. User state virtualization also makes it easy for users to move between computers, or to experience the same desktop environment when using one of the other virtualization technologies. Virtualization management. One of the critical components in deploying virtualization is your ability to manage the solution, including both the physical and virtual components. The Microsoft System Center suite of tools provides virtualization management. Tools such as Microsoft System Center Configuration Manager, System Center Operations Manager, and System Center Virtual Machine Manager (VMM) provide a familiar set of tools for managing both the virtual environment and the physical layer that hosts the virtual environment. Cloud computing. Cloud computing enables organizations to purchase IT services from external organizations. These IT services can include e-mail service hosting, Web site hosting, or online applications. With cloud computing, organizations can purchase only the services that they require without significantly increasing the cost and complexity of managing their IT infrastructure.
1-10
Key Points
Server virtualization enables you to configure one or more virtual machines that emulate a physical computer. Multiple virtual machines can run on one physical server, with all of the virtual machines sharing the resources available on the physical server. Microsoft provides three products for server virtualization: Microsoft Virtual Server 2005 R2 Windows Server 2008 Hyper-V Windows Server 2008 R2 Hyper-V
Note: Windows Server 2008 R2 Hyper-V uses the same underlying technology to enable server virtualization as Windows Server 2008, but it also provides improved performance and significant new features, including Live Migration and Cluster Shared Volumes.
1-11
Note: You may need to invest in new server and storage hardware when you first implement server virtualization, but an important result of server virtualization is the decrease in the number of physical servers that your organization has.
Increased service and application availability. Because the service or application no longer connects directly to a specific piece of hardware, it is much easier to ensure high availability and recoverability. With Live Migration in Windows Server 2008 R2, you can move a virtual machine to another physical server with users experiencing little or no service outage. Multiple operating systems can run on one consistent platform. With server virtualization, you can deploy multiple operating system technologies on a single hardware platform. For example, you can deploy Windows Server 2003, Windows Server 2008, and Linux on one Windows Server 2008 R2 Hyper-V host. Server virtualization also makes it much easier to replace hardware when it becomes obsolete or fails.
1-12
Key Points
Desktop virtualization provides new options for deploying client desktops by enabling several ways to virtualize the desktop. Traditionally, users work on a specific piece of hardware that is running a single operating system and all applications.
1-13
In Windows 7, Microsoft provides a preconfigured Windows XP virtual machine that can be run as a Windows Virtual PC virtual machine. Windows XP mode enables you to run applications seamlessly from a Windows 7 computer or from the Windows XP virtual machine.
1-14
Key Points
You can use application virtualization to create virtual applications that you then can distribute to user desktops. Each virtual application includes its own registry entries, specific dynamic-link libraries (DLLs), and other resources. When you deploy a virtual application, it uses its own copy of these shared resources. Because the virtual application runs in an isolated environment, incompatible applications can share the same workstation. Microsoft App-V is an application virtualization solution.
1-15
1-16
Key Points
Presentation virtualization runs applications on a central server, with only the application interface, mouse movements, and keystrokes sent across the network between the central server and the client computer. Presentation virtualization creates virtual sessions in which the executing applications project their user interfaces remotely. Each session might run only a single application, or it might present users with a complete desktop that offers multiple applications. Presentation virtualization was available for several Windows Server versions as Terminal Services. In Windows Server 2008 R2, the name for the presentation virtualization feature is Remote Desktop Services, or RDS.
1-17
You can reduce the cost of managing applications significantly. For example, rather than updating each application on each individual desktop, you can change only the single shared copy on the server. Presentation virtualization also allows using simpler desktop operating system images or specialized desktop devices, commonly called thin clients, both of which can lower management costs. You can combine application virtualization with presentation virtualization to reduce the issues with incompatibilities between applications. You can install App-V applications on RDS host servers, and then run multiple instances of potentially incompatible applications on the centralized server. In some cases, presentation virtualization can improve performance. For example, if a client or server application needs to access large amounts of data from a central database, it may be quicker to run the application on an RDS host that is located close to the data, rather than pull the data across a slow network connection to the client.
1-18
Key Points
MDOP provides a package of desktop management and virtualization solutions that is available for Microsoft Software Assurance customers. Many of the application and desktop virtualization products are available as part of MDOP. MDOP includes the following components: Microsoft App-V. This application virtualization and streaming solution transforms applications into centrally managed services that are available when and where you need them. Microsoft MED-V. This provides deployment and management of virtual PC images. You can deploy these virtual PC images to user desktops to address application compatibility issues. Microsoft Asset Inventory Service. This hosted service runs a complete scan of the software installed on every computer in your environment, and then provides you with intelligent reports and analysis to understand and better manage your software assets.
1-19
Microsoft Diagnostic and Recovery Toolset (DaRT). This provides powerful tools to accelerate desktop repair for unbootable desktop computers. Microsoft Advanced Group Policy Management. This enables Group Policy object (GPO) versioning, change management, and delegation. Microsoft Desktop Error Monitoring. This makes desktops more stable by causing the client to send error messages, as they occur, to a central database.
Note: You can download all of the tools, with the exception of App-V, only as part of the MDOP. App-V is available as a separate download.
1-20
Key Points
Cloud computing is a new virtualization option that enables organizations to purchase IT services from Internet-based service providers or to provide IT services through the Internet. These services can include servers, storage, or networking resources. The services may be running on virtual environments based on Hyper-V or one of the other virtualization options. The actual server and storage deployment is largely transparent to the users who consume the services. They typically are concerned only with being able to access their required applications easily. A cloud computing environment normally includes: A data center that contains virtualization hosts and storage. In the Microsoft solution, these hosts are running Hyper-V. Virtual servers, storage and network resources located in the data center. A highly available and high bandwidth network connection to the Internet.
1-21
Automated processes and tools for deploying and configuring virtual machines. These processes may be managed entirely by the online service provider, or may be exposed to the customer to manage their own virtual environment. Tools for managing the interaction of local and cloud computing. Many organizations still host most IT services locally even as they begin to move some services to the cloud. You can use this integration tool to ensure that users can gain seamless access to both local and cloud resources. For example, most organizations will still run Active Directory Domain Services (AD DS) locally. Ideally, users should be able to authenticate once to their local domain, and gain access to all required services regardless of whether they are located internally or in the cloud.
Question: Has your organization moved any services to an environment that is hosted online? If so, which services?
1-22
Key Points
Contoso, Ltd is a large enterprise with multiple locations, and data centers in London, New York City, and Sydney, Australia. Contoso, Ltd also has several smaller branch offices and many users who work outside of the office. Contoso, Ltd has collected the following information about the current computing environment: Server utilization for most of the data center servers is less that 10%. Contoso, Ltd has deployed multiple servers in many of the branch offices. These servers are difficult to deploy and manage because the wide are network (WAN) links to some of the branch offices that have very little available bandwidth. Many of the users working outside of the office require a standard set of business applications. Some of the users who run these applications are mobile users who are using company-issued laptops, while other users work from home on their personal computers.
1-23
Contoso, Ltd has developed a large number of business applications, using different development platforms, and many of the applications do not use current technologies or may not run on the latest operating systems.
Question: How will virtualization help Contoso, Ltd address the issues in its current computing environment?
1-24
Lesson 2
Implementing virtualization can add complexity to your IT infrastructure management. Virtualization requires that you manage both the physical and virtual environments. The design of many of the Microsoft System Center tools helps you manage the virtualized data center. This lesson introduces some of the issues that relate to managing a virtualized environment, and introduces the System Center products that you can use to manage and maintain the virtual environments.
1-25
Key Points
Virtualization technologies provide a range of benefits. Yet as an organizations computing environment becomes more virtualized, it also may become more complex. A virtualized environment that you do not manage well can be less reliable, and more expensive, than its unvirtualized counterpart. For example, if an organization implements a Hyper-V environment without considering high availability, a single server failure may affect many virtual servers. If an organization implements VDI or MED-V, an outage in the server infrastructure may prevent users from accessing the virtual desktops that they need to do their work.
1-26
There are several issues that you should consider regarding the deployment and management of virtualized environments. One of the primary benefits of a virtualized environment is the option to deploy almost any virtual component rapidly. If you require an additional server, it is easy to deploy a new virtual machine in Hyper-V. If you must update an application or deploy a new one, App-V or Windows Server 2008 R2 RemoteApp makes it easy. However, to take advantage of the rapid deployment features, you must have the required infrastructure in place. This may require additional planning, tools for deploying components quickly, and monitoring to verify that the additional resources are available on the current infrastructure. You realize the many benefits of virtualization when you centralize the virtual components on a small number of physical servers. This means that it is critical to ensure that the physical servers are highly available, or that you configure the service or application deployment to be highly available. This requires advanced monitoring and management tools. You often perform the management of physical and virtual machines by using separate management solutions. This may mean that administrators must learn how to use multiple tools, which may not provide consistent information. Using a single set of administrative tools to manage both environments simplifies the management processes. Managing multiple desktops, applications, and servers is complex. With virtualization, the complexity level may increase because each physical computer now has additional components that you must manage. For example, a desktop computer running Windows 7 also may be running a Windows XP mode virtual machine. To ensure your networks security, you must install and manage updates and antivirus products on both the Windows 7 computer and Windows XP mode virtual machine. A management system that can handle all assets, regardless of whether they are virtual or physical, saves time and reduces the number of required resources. Effective physical and virtual machine management can optimize the benefits of using virtualization technologies. This includes monitoring and managing hardware and software in a distributed environment. Monitoring both the software running on physical machines, and the physical machines themselves, enables administrators to know what is happening in their environment. It also lets them respond appropriately to running tasks and taking other actions to fix problems that occur.
1-27
Key Points
Microsoft developed the Microsoft System Center products and solutions, which assist enterprises with the planning, delivery, and operation lifecycle of their entire infrastructure. These solutions capture and aggregate knowledge about an infrastructure, policies, processes, and best practices. They can help optimize the IT structure, reduce costs, improve application availability, and enhance service delivery. You can use many of the System Center products to manage your virtualized IT environment and your physical components, as well.
1-28
You can use System Center to manage the virtual environment in the following ways: A fundamental challenge in systems management is monitoring and managing the hardware and software in a distributed environment. Operations Manager 2007 R2 enables operations staff to monitor both the software running on physical machines and the virtual machines themselves, given the strong similarities between physical and virtual environments. Additionally, you also can use Operations Manager 2007 to monitor and manage virtual machines and other aspects of a virtualized world. Another concern for people who manage a computing environment is installing software and managing its configuration. While it is possible to perform these tasks manually, automated solutions provide a better approach in all but the smallest environments. To allow this, Microsoft provides System Center Configuration Manager 2007. Similar to Operations Manager, Configuration Manager handles virtual environments in much the same way as physical environments. As organizations move towards virtualization for their current servers, the process of converting the physical machines to virtual machines, and then managing the virtual machines, can be complex. To address this situation, Microsoft provides VMM 2008 R2, which you can use to manage virtual machines on hosts running Microsoft Virtual Server 2005, Hyper-V, or VMware. Among other things, this tool helps you choose the virtualization workloads, creates the virtual machines that will run those workloads, and converts physical computers to virtual machines. You also can integrate VMM 2008 R2 with Operations Manager 2007 R2 to provide enhanced reporting and management capabilities. To ensure that you can recover a virtualized environment, you must ensure that you deploy a disaster-recovery system that can back up and restore both the physical servers and virtual machines. You can use System Center Data Protection Manager 2007 Service Pack 1 (SP1) and Data Protection Manager 2010 to back up and restore servers running the virtual and virtualized components.
1-29
Key Points
VMM is the primary tool that you use to manage virtual machines that are running on Hyper-V. VMM provides a management tool that lets you manage multiple physical host computers and the virtual machines that are running on the host computers. VMM provides the following features: Enables management of virtual environments that are running on different host platforms. You can use VMM 2008 to manage host computers and virtual machines that are running Windows Server 2008 or Windows Server 2008 R2 Hyper-V, Virtual Server 2005 R2, and VMware ESX Server. With VMM, you can use a single interface to manage the host server configuration, and deploy and manage virtual machines on the host servers.
1-30
Physical and virtual machine conversion. You can use VMM to convert a physical computer to a virtual machine while the physical machine is online. You also can use VMM to convert Virtual Server 2005 and VMware-based virtual machines to Hyper-V. Intelligent virtual machine placement. When you create a new virtual machine or use VMM to move a virtual machine from one host to another, VMM 2008 analyzes the available physical hosts and provides a recommendation as to the best location for the virtual machine. You can integrate this process with Operations Manager 2007, which enables the intelligent placement process to factor in past performance characteristics to ensure the best possible match between the virtual machine and its host hardware. Self-Service Portal. VMM provides the Service Manager Self-Service Portal that enables users to create and manage their own virtual machines. The VMM administrators retain complete control of the environment, because they can set permissions that restrict which users can create virtual machines, what templates users can use to create virtual machines, and where users can create the virtual machines. VMM Library. VMM 2008 provides a centralized library to store various virtual machine components, such as offline machines, templates, virtual hard disks, and other virtualization components. Administrators can use the components in the library to deploy virtual machines rapidly using standardized templates. Windows PowerShell integration. VMM 2008 is built on the command line and scripting environment that Windows PowerShell provides. VMM provides Windows PowerShell cmdlets that allow administrators automate VMM management tasks. Operations Manager 2007 integration. VMM 2008 includes the Performance and Resource Optimization (PRO) feature, which enables dynamic management of virtual resources though management packs for Operations Manager 2007. The PRO feature enables administrators to set rules for moving or configuring virtual machines based on the host server performance.
Note: For detailed information on deploying and managing System Center Virtual Machine Manager 2008 R2, see Course 10215A, Implementing and Managing Microsoft Server Virtualization.
1-31
Key Points
Data Protection Manager (DPM) is a solution for disk-based and tape backups that enables you to back up physical servers and virtual machines. After an initial full backup, the express backups that DPM performs are significantly faster than typical full backups, because DPM backs up only disk block changes. You can use DPM to back up both the host server and the guest virtual machines.
Host Backups
Host backups require that you install a DPM protection agent only on the host server, not in each virtual machine. This can result in significant cost savings when compared to guest backup, which requires that you install the DPM protection agent in each virtual machine.
1-32
You can perform a host backup of a single virtual machine. When you perform a host backup, this backs up the entire virtual machine as a single unit. However, the backup is not application aware. Therefore, you can recover only the entire virtual machine, not just specific data.
1-33
Key Points
You can use Operations Manager 2007 R2 to monitor servers and their applications from a central location. To do this, you install an agent on remote systems. The agent gathers events and performance information about the remote systems, and then forwards it to Operations Manager 2007. The data that the agent gathers is based on rules that Operations Manager 2007 stores and distributes to the agent monitoring each server. Operations Manager 2007 also generates alerts based on the rules. You create the rules in Operations Manager 2007 by importing management packs. The rules in management packs are appropriate for most environments, and are based on best practices. However, you can modify the rules to meet the needs of your specific environment. You also can create your own rules. Centralized monitoring and alerting is important for any environment, but it is particularly important for virtualized environments where you can add many additional resources quickly and easily.
1-34
Virtualization Reports
Operations Manager 2007 also provides several reports that you can use to plan and monitor the virtualized environment, including: The Virtualization Candidates report helps to identify physical computers that are good candidates for virtualization. This report displays performance and hardware information for physical computers, which you can sort and filter to select the appropriate candidates. The Virtual Machine Allocation report enables you to calculate chargeback to cost centers, such as departments. To use this report, you must assign a cost center to the appropriate virtual machines. The Virtual Machine Utilization report contains information about the utilization of virtual processors, memory, and disk space in virtual machines. You can use this report to identify virtual machines that need additional resources or that have been allocated too many resources.
1-35
The Host Utilization report contains information about the utilization of processors, memory, and disk space on hosts. You can use this report to identify hosts that need virtual machines removed or that have sufficient resources free for hosting additional virtual machines. The Host Utilization Growth report shows the percentage of change in resource usage and number of virtual machines. You can use this for trend analysis, to predict when you will require additional hosts.
1-36
Key Points
You can use Configuration Manager 2007 R2 to manage and maintain both physical and virtual environments, and it treats a virtual machine just like any standard physical machine. Depending upon deployment settings, you can manage a virtual environment by: Automatically deploying the Configuration Manager client through standard discovery and deployment methods. You can discover both physical and virtual machines, and automatically deploy the Configuration Manager client to both. Maintaining inventory of all virtual clients that are deployed throughout the environment. Deploying applications through standard software deployment mechanisms. You can deploy applications to both virtual and physical machines. Managing software updates for both physical and virtual machines through standard update processes.
1-37
Deploying virtualized applications to desktop clients. You can integrate Configuration Manager with App-V 4.5 or newer to distribute the virtual applications prepared in App-V to desktop computers. Integrating with Virtual Machine Manager 2008 and the Offline Virtual Machine Servicing Tool to maintain updates on virtual machines stored within a VMM library. One of the biggest challenges in a virtual environment is managing virtual machines that are not always running on the network, or maintaining virtual machines that are stored within virtual machine libraries. You can accomplish this by integrating features provided by Virtual Machine Manager 2008 and the Offline Virtual Machine Servicing Tool version 2.0.1.
1-38
Key Points
Desktop virtualization enables you to run multiple desktop operating systems, either on a users client computer or on a server running Hyper-V. Implementing desktop virtualization can increase the complexity of managing your network in several ways: Individual users may use multiple desktops, both physical and virtual. In a traditional network, you only have to ensure that you update and configure one client computer per user to meet the corporate standards. With desktop virtualization, each user may have several client computers that you must maintain. As users move from one desktop computer to another, they might have very different user environments on each computer. For example, they might configure their desktop on their main computer with short cuts, mapped drives, and other settings. When they launch a virtual desktop, the customized settings may not be available, which leads to user inefficiency.
1-39
Deploying virtual desktops can be difficult. If only a few users in your organization need virtual desktops, you might be able to manually enable and configure the virtual desktops. However if you have a large number of users that need to use virtual desktops, it becomes very difficult to manually configure each virtual desktop. In this scenario, you need some means to automate the deployment of standardized virtual desktops.
Microsoft provides several tools for managing desktop virtualization: You can use tools such as Configuration Manager to manage both physical and virtual desktops. With Configuration Manager, you can monitor and maintain updates on all computers. You can use the user state virtualization technologies to provide users with a consistent experience on all desktops. You can use tools such as Group Policy and roaming user profiles to configure the user desktop, map network drives, and redirect folders so that these settings are available across multiple desktop computers. You can use MED-V to configure, manage, and deploy virtual desktops based on Virtual PC 2007. With MED-V, you can create standard virtual desktop computers and then deploy them to users. You can use VDI to manage a centralized virtual desktop deployment. With VDI, you can configure standard virtual desktops that will run on a Windows Server 2008 R2 Hyper-V server, and provide RDP access to those virtual machines. You can configure virtual machines with the same configuration for all users, or you can provide a virtual desktop that the user can customize.
1-40
Key Points
You can use application virtualization to enable users to run virtual applications on their user desktops. Implementing application virtualization increases the complexity of managing the user environment in several ways. Users may need to be able to run the applications in several different desktop scenarios. They may need to run the applications from desktop computers in the office, on mobile computers that may be connected to the corporate network, connected from the Internet, or disconnected from all networks. Users in different locations in the organization may require access to the same applications. Distributing applications to users in locations such as branch offices can be complicated. Virtual applications may require security updates or users might require new versions of the virtual applications. Applying updates to virtual applications is more difficult than updating client operating systems or applications that are installed on the client operating systems.
1-41
You must prepare applications to run in a virtual environment before you can deploy them to users. Some applications may require fairly complex virtual environments.
Microsoft provides several tools for managing the application virtualization environment. You can use the App-V Management server to manage the deployment of virtual applications to client computers. The App-V Management console provides a single location for configuring and deploying virtual applications. App-V provides a variety of options for deploying virtual applications to users. App-V can use multiple protocols, and also provides options for deploying multiple servers in different locations to deploy the same applications. You can also create virtual applications as .msi files, which you can then deploy by using Group Policy or Configuration Manager, or install them on client computers that are disconnected from the network. You can update App-V applications with new versions on the App-V Management server and the applications will automatically be distributed to clients. You can use the App-V Sequencer to package applications to prepare them for deploying them to client computers. The App-V sequencer provides a wizarddriven approach for creating virtual applications, and also provides complete customization of the virtual environment that the application will run in.
1-42
Key Points
Presentation virtualization enables users to run applications installed on centralized servers. Implementing presentation virtualization introduces some complexities to managing an organizations network. Users who are not familiar with desktop virtualization may not understand how to launch remote applications and how the remote application interacts with their usual desktop environment. Users may need to connect to the remote applications from a variety of locations. These locations could include computers on the internal network as well as from computers in branch offices or computers outside the network. In a desktop virtualization deployment, multiple applications may be installed on the same host server. Some of these applications may not be compatible with other applications running on the same server.
1-43
Windows Server 2008 R2 provides several features that optimize the deployment of presentation virtualization: Remote Desktop RemoteApp. With RemoteApp, you can publish the shortcuts for applications running on the RD Session Host computer on the user desktop. Users can launch the application using the normal procedures, and the applications user interface appears on the desktop as if that application were running locally. Remote Desktop Web Access. RD Web Access provides another means for users to launch RemoteApps or connect to remote desktops. RD Web Access provides a Web site that lists all of the applications and desktops that the user has permission to access. Remote Desktop Gateway. RD Gateway provides a secure way for users outside of the organization to connect to applications running on the RD Session Host computers. With RD Gateway, all RDP connections are tunneled through HTTPS. RemoteApp and Desktop Connections. This client application allows users running Windows 7 to easily connect to RemoteApp programs and Remote Desktops. When you configure RemoteApp and Desktop Connections, all of the applications and remote desktops that the user can access are listed on the users Start menu. This list is dynamically updated as new applications or remote desktops become available. You can combine application virtualization with presentation virtualization by deploying virtual applications on a Remote Desktop Session Host server. This enables organizations to run applications that are not compatible with other applications on the same server, and make both applications available to users through RDS.
1-44
Lesson 3
Application and desktop virtualization provide organizations with options for managing application compatibility issues, and you can use them to address some of the issues with deploying new desktop operating systems. These tools also provide options for deploying applications to users outside an organization or who run thin or mobile clients. This lesson describes some of the scenarios for deploying application and desktop virtualization, and provides guidance for planning these virtualization solutions.
1-45
Key Points
Desktop and application virtualization are designed to address issues with which many large organization need to deal. These issues relate to the applications that users need to be able to run, and to the locations or physical systems that users are using to run the applications.
1-46
Two applications may not both be able to run on the same desktop computer. In some cases, applications may use incompatible technologies or may require different versions of the same application file. Some users may be required to run both applications.
Mobile Users
Many organizations have a mobile workforce that may work both inside and outside the office. In most cases, these users carry laptop computers, but the users may need to be able to do their work regardless of whether they are connected to the internal network, connected to the Internet, or completely disconnected from any network.
Standard Users
In many organizations, large groups of users require the same user desktop with access to the same set of applications. In some cases, users may require access to just one or two applications. In other cases, they may require access to a complete set of business applications. Traditionally, the organization assigns these users to a standard business desktop computer. If the standard user environment is quite static, and the organization assigns all users to an individual desktop computer, there may not be any reason to implement virtualization for these users. If the users need to run incompatible applications, the users may require solutions for addressing application compatibility. In some cases, you may be able to deploy thin clients to all standard users, and then use VDI to provide the users with the required work environment.
External Users
Some organizations have users who work from outside the corporate network and who do not use computers that the internal IT department manages. These users may be contract workers, consultants, or people who work from home. Frequently, these users require access to a very specific set of applications or servers, and do not require a full desktop or set of applications. Question: What types of workers do you have in your organization? What options will you explore to virtualize their environment?
1-47
Key Points
Microsoft provides several different options for implementing desktop and application virtualization. You can use some of the solutions to address more than one business scenario.
Desktop Virtualization
You can use desktop virtualization to address the following scenarios: Application and operating system compatibility issues. If applications require an older operating system, consider deploying Windows Virtual PC or Windows XP Mode. These options mean that users can run the older operating system in a virtual machine that is running on the user desktop. External users. If external users need access to a full desktop computer rather than just an application, consider enabling this by using VDI. With VDI, you can provide users with a preconfigured desktop that includes all of the applications required for their tasks.
1-48
Mobile users. If a large number of mobile users require virtual desktops, consider managing the virtual desktop deployment by using MED-V. By doing this, you can manage and distribute the appropriate virtual machines to all users while the users are connected to the network. Users can then take these virtual desktops with them when they leave the office.
Application Virtualization
You can use application virtualization to address the following scenarios: Compatibility issues with running multiple applications on a single host. If two applications cannot both run on the same operating system, consider using App-V to create an isolated environment in which one or both of the applications can run. Application compatibility issues in presentation virtualization scenarios. You can deploy the App-V client on Remote Desktop Session Host servers, which enables potentially incompatible applications to run on the same remote server.
Presentation Virtualization
You can use presentation virtualization to address the following scenarios: Mobile or external users. Implement Remote Desktop Gateway and provide access to only the specific applications or computers that are required. With Remote Desktop Gateway, you can restrict what users can connect to and what they can access. For additional security, you can integrate RD Gateway with Network Access Protection to ensure that clients are compliant with your corporate security requirements. Application compatibility issues. For scenarios where applications require separate environments, consider deploying one of the applications in an RDS deployment. By using features such as RemoteApp, you can make the user experience with both applications virtually identical.
1-49
Key Points
To assist organizations in developing and delivering a virtualization strategy, Microsoft has developed free solution accelerators. These automated tools help accelerate assessment, planning, and deployment of Microsoft technologies, such as Windows Server 2008 or virtualization. Some of the Microsoft Virtualization Solution Accelerators include: Microsoft Assessment and Planning Toolkit (MAP). You can use MAP to conduct network-wide deployment-readiness assessments that focus on whether you can migrate Microsoft technologies from servers to desktops and applications. Using MAP, you now can determine which servers you can upgrade to Windows Server 2008 R2, which servers you can migrate to virtual machines on Windows Server 2008 R2 Hyper-V, which applications you may want to virtualize by using App-V, and which client computers you can upgrade to Windows 7.
1-50
Infrastructure Planning and Design Guides. The Infrastructure Planning and Design (IPD) Guides are free guides that describe the architectural considerations, and also streamline the design processes, for planning of Microsoft infrastructure technologies. Each guide addresses a unique infrastructure technology or scenario including server virtualization, application virtualization, terminal services implementation, and more. Microsoft has released the following IPD guides that relate to virtualization: Selecting the Right Virtualization Technology Windows Server Virtualization Windows Server 2008 R2 Remote Desktop Services. Microsoft Application Virtualization 4.6 Windows Optimized Desktop Scenarios Microsoft Enterprise Desktop Virtualization
Hyper-V Security Guide. Implementing virtualization can increase the number of security issues that you must consider because you need to secure both the host computer and the virtual machines. The Hyper-V Security Guide provides guidance and recommendations to address key security concerns about server virtualization. Security Compliance Management Toolkit Series. This includes several different security toolkits that you can use to help your organization plan, deploy, and monitor security baselines for Windows operating systems, including Windows 7, Windows Vista, and Windows Server 2008, and for applications such as the Microsoft Office 2007 system and Internet Explorer 8. Microsoft Deployment Toolkit. This provides guidance and tools to accelerate the deployment of client and server operating systems. The Microsoft Deployment Toolkit supports the deployment of Windows Server 2003, Windows Server 2008, the virtualization role on Windows Server 2008, and other applications. Most organizations use the Microsoft Deployment Toolkit primarily to deploy client desktops.
A typical IT project lifecycle includes three core phases: planning, delivery, and operation. Solution accelerators provide guidance and tools for each of these three key elements of the Microsoft Operations Framework (MOF).
1-51
Key Points
The Windows Optimized Desktop Scenarios IPD provides detailed guidance for mapping user and business requirements that relate to end users to the Microsoft desktop and application virtualization solutions. The guide includes two components: Windows Optimized Desktop Scenario Assessment. This document provides detailed information on how to use the desktop scenarios and selection tool to identify virtualized solutions for your work place. Windows Optimized Desktop Scenario Selection Tool. The Microsoft Excel spreadsheet enables you to select the user and business requirements that apply to your user populations, and then it identifies which desktop scenarios and virtualization solutions apply to your user population.
1-52
Identify the target user populations for which you want to optimize desktops. In most organizations, you will not be able to implement virtualization for all users at once, so it is important that you identify the specific group of users that are included in the current project. Match user groups with scenarios. You can use the Windows Optimized Desktop Scenario Selection Tool to map the user population to the desktop scenarios. This tool asks a series of questions related to user and business requirements, and then indicates the desktop scenario that applies to the user. Preview the scenario solutions. For each desktop scenario, the guide provides a mapping of potential virtualization products and technologies that can be used to address the requirements. Evaluate relevant Windows Optimized Desktop scenarios. As a final step, you will evaluate the potential solutions to determine which solutions best suit* your organizations requirements or capacity. The tool provides multiple solutions for each scenario, so you will need to identify which of the solutions you will implement.
3.
4.
5.
1-53
Key Points
In this demonstration, you will see how to use the Windows Optimized Desktop Scenario Select Tool v1.1 to identify desktop virtualization scenarios and solutions.
Demonstration steps:
1. 2. On the NYC-CL3 computer, start the Windows Optimized Desktop Scenario SelectionTool v1.1.xls from Documents folder. Review the options available on the Instructions and Scenario Selection tabs.
Question: What do you think of the Windows Optimized Desktop Scenarios Selection Tool? Are there selection criteria missing? How will you use the results that this tool produces?
1-54
Key Points
Microsoft provides many different licensing options depending on the customers requirements. At the highest level, Microsoft provides the following licensing options: OEM: You can purchase this type of license only when you purchase a new computer. Retail: You can purchase this type of license separately from a new computer purchase, and you can use it to upgrade current software or install new software. With this option, each copy of the software requires a separate license. Volume license: This type of license provides the most flexibility as it is the only type of license that you can use to deploy multiple copies of software with a single license.
1-55
Note: With the volume license options, organizations also have the option of including client access licenses (CALs). The CAL options include a core CAL, which enables access to Windows Servers, Exchange Servers, Microsoft Office SharePoint, and a System Center Configuration Manager client. Additional CAL options include Office Communication Server CALs, Operations Manager licenses, and an Enterprise CAL option, which includes enterprise access to Exchange Server, SharePoint Server, and Office Communications Server.
1-56
1-57
Key Points
You can use desktop and application virtualization to address significant business requirements within organizations. However, within large organizations that have diverse user groups, implementing virtualization can be complicated and likely will not address all business requirements at once. Consider the following recommendations when planning a desktop and virtualization deployment: Start small. It is highly unlikely, and we do not recommend, that you should virtualize your entire environment immediately. To gain a better understanding of the process for implementing virtualization, and to gain experience in managing a virtual environment, start with a small pilot project. Ensure that you plan this project well and test it thoroughly to ensure that the initial user experience with virtualization is as positive as possible.
1-58
Address a critical business need. To enhance the visibility and viability of virtualization in your organization, ensure that your initial projects address a critical business need. For example, one of the easiest virtualization solutions to deploy is RD Gateway. For organizations with a large number of users who work outside of the corporate network but who require access to internal applications and data, RD Gateway often can address one of the most critical business needs. Implement virtualization incrementally. For many of the virtualization solutions, you can implement the solutions incrementally. For example, if you are considering an App-V deployment for a small group of users, you can begin by manually distributing the App-V clients and applications. Over time, you can incorporate automatic streaming of the client and applications. If deploying desktop virtual machines running in Windows Virtual PC, you can begin by deploying the virtual machines manually, and then later adding MEDV to manage the virtual machine images. By deploying virtualization incrementally, you can gain the benefits of the solutions without investing in the entire infrastructure that may be required to automate the solution fully. Consider the target user group. When considering a virtualization solution, ensure that you keep the target user group in mind. For example, if you need to deploy a virtualization solution for only a small group of users, you likely will use a different virtualization solution than if you need to deploy the same virtualization solution for a large group of users. You also should consider the users locations. If all the users are in the office, and you assign them to the same desktop computer, you can use a different virtualization solution than if the target audience consists of mobile or external users. Consider addressing application compatibility options outside of virtualization. The desktop and application virtualization solutions provide great tools for dealing with application compatibility issues, but in some cases, it may be better to rewrite the application. For example, if all users in your organization need to run an application that can run only in old Windows versions, rewriting the application may enable you to improve the application without deploying and maintaining an entire virtualization environment for that one application.
Question: What additional considerations will you need to include when planning virtualization projects in your organization?
1-59
Lab Scenario
Contoso, Ltd., is a large corporation with offices in New York, London, and Tokyo, and branch offices in several other cities. Contoso is planning to implement application and desktop virtualization to address several critical business requirements. As a member of project team, you are responsible for analyzing the user and business requirements and identifying the best virtualization solutions for your organization.
Lab Setup
For this lab, you will plan the virtual environment assigned to you. Before you begin the lab, you must: 1. 2. 3. Start the 10324A-NYC-DC1 virtual machine. This virtual machine should remain running for the rest of the course. Start the 10324A-NYC-CL3 virtual machine. Connect to 10324A-NYC-CL3, and log on as Contoso\Administrator with the password Pa$$w0rd.
1-60
1-61
The contractors perform a variety of tasks for Contoso, Ltd. Most contractors work as sales support staff in the countries where Contoso, Ltd does not have an office. Some contractors work for software vendors and require access to servers on the Contoso, Ltd corporate network to support their software. Contractors cannot store corporate data on their computers. The contractors are currently connecting to the internal network by using a VPN. However, a new corporate security policy dictates that only laptop computers that are members of the internal AD DS domain can connect to the corporate network through the VPN. Contoso, Ltd will enforce this policy within three months. Contoso, Ltd is not planning to issue laptops to the contractors.
The main tasks for this exercise are: 1. 2. 3. Identify the user groups at Contoso, Ltd. Identify the virtualization solutions. Develop a prioritized list of projects to implement virtualization.