MS Client Virtualization Strategy.pdf

(1741 KB) Pobierz
Desktop Virtualization Strategy
Choosing the right solution for your needs
ABSTRACT
Several forms of desktop virtualization can help organizations
satisfy users’ needs for mobility and lexibility, while relieving
pressure on information technology (IT) departments
to manage cost, security, and compliance. Additionally,
desktop virtualization can enable more dynamic centralized
management by separating the elements of the traditional
desktop computing stack. This white paper describes how to
create a virtualization strategy that achieves these goals and
introduces comprehensive desktop-virtualization solutions
from Microsoft. Finally, it provides high-level guidance to help
companies develop a desktop-virtualization strategy.
917675879.267.png 917675879.278.png 917675879.289.png 917675879.300.png 917675879.001.png 917675879.012.png 917675879.023.png 917675879.034.png 917675879.045.png 917675879.051.png 917675879.052.png 917675879.060.png 917675879.071.png
Desktop Virtualization Strategy
Evolving Needs of Users and IT Departments
Today’s computing environment requires IT departments
to address more PC management challenges than they
did just a few years ago. Users are increasingly demanding
access to their applications and data anywhere and from
any device. The rapid growth of knowledge workers
who roam from one PC to another within the ofice had
led companies to provide access to the users’ desktop
experience at any computer in the workplace, effectively
detaching the user from the physical PC.
and higher pressures on cost control. The cost of
deploying a traditional PC ranges from $160 to $350
and managing each PC costs another $200 to $1,300
per year 1 . Furthermore, lost or stolen laptops are more
common, and securing laptop and desktop PCs can
require signiicant resources. Data loss is not an option
today and such damage can be immeasurable. Finally,
compliance regulations (e.g., Sarbanes-Oxley, HIPAA)
have strict requirements for protecting privacy and
corporate data as well as public disclosure when issues
arise. Failure to protect this data can lead to signiicant
punitive consequences and a negative impact to the
organization’s reputation.
Additional challenges stem from users’ shifting views
of technology in the workspace. At home, they are
increasingly savvy about technology, and they expect
similar personal conigurations and freedoms in the
workplace. Users are now more likely to use their own
devices to access corporate applications, such as accessing
corporate email from their personal mobile phones.
Organizations are also looking for ways to help protect
the environment, including looking for ways to effectively
re-use older PCs instead of sending them to the landill.
While these trends are making employees more
productive, they are causing new challenges for IT
departments. New form factors, network dispersion,
and increased mobility result in more complexity
The question then is, “How can IT fulill users’ needs while
managing complexity and cost with better eficiency,
faster responsiveness, and additional business value or
competitive edge?”
Evolving Challenges
End Users
IT Pros
Increased Mobility
Anywhere access
Security & Compliance
Stolen laptops & data loss
Device independence
Stringent regulation
Roam across PCs
Protection of IT environment
Consumerization
More workspace freedom
Cost
Increased computing complexity
Flexible conigurations
Escalating operational costs
Access through own devices
Disaster recovery
1 IDC, Optimizing Infrastructure, 2006
2 | Desktop Virtualization strategy
917675879.082.png 917675879.093.png 917675879.104.png
 
 
 
917675879.145.png
 
917675879.166.png 917675879.177.png 917675879.188.png 917675879.199.png 917675879.210.png 917675879.221.png 917675879.232.png 917675879.241.png 917675879.242.png 917675879.243.png 917675879.244.png 917675879.245.png 917675879.246.png 917675879.247.png 917675879.248.png 917675879.249.png 917675879.250.png 917675879.251.png 917675879.252.png
Desktop Virtualization Strategy
The Promise of Desktop Virtualization
Companies are increasingly turning to virtualization as the
answer to their desktop challenges. Desktop virtualization
is the act of decoupling the different computing layers
and storing some or all of them in a data center (see igure
below).
companies to do the same with enterprise desktops
by providing the tools necessary to rearrange how
PC components interact and to choose where those
components reside.
Developing a Desktop Virtualization strategy
Through virtualization, employees can access their
applications and data very safely over a network
and the risk of data loss is minimized. On the IT side,
virtualization accelerates deployment of new capabilities
without needing to acquire new hardware and conigure
components. It also reduces application testing
requirements and compatibility issues and simpliies
disaster recovery and compliance.
There are many desktop virtualization options and possible
combinations and therefore the development of a desktop
virtualization strategy requires three distinct steps:
1.
Map the available technologies
2.
Deine user needs
Over the past few years, businesses have simpliied
their data center management via server virtualization
technologies and reaped enormous cost beneits in
the process. Now, new advances in virtualization and
more ubiquitous availability of broadband access enable
3.
Match technologies with user needs.
The next sections provide more detail and guidance on
these steps.
What is Virtualization?
Virtualization is the act of decoupling one computing resource from others without impacting the usability across these resources. Rather than
locking the various layers together—the operating system (OS) to the hardware, the application to the OS, and the user interface and data to
the local machine – virtualization technologies loosen the direct reliance these parts have on each other.
Traditional Coniguration
Tight binding between layers
With Virtualization
Reduced dependency between layers
User State (Data and Settings)
User State Virtualization
Isolate and centralize user data & state
Application
Application Virtualization
Isolate and centralize applications management & deployment
Operating System
Desktop Virtualization
Isolate and centralize operating system management and deployment
Hardware
Desktop Virtualization strategy | 3
917675879.253.png 917675879.254.png 917675879.255.png 917675879.256.png 917675879.257.png 917675879.258.png 917675879.259.png 917675879.260.png 917675879.261.png 917675879.262.png 917675879.263.png 917675879.264.png 917675879.265.png 917675879.266.png 917675879.268.png 917675879.269.png 917675879.270.png 917675879.271.png 917675879.272.png 917675879.273.png 917675879.274.png 917675879.275.png 917675879.276.png 917675879.277.png 917675879.279.png 917675879.280.png 917675879.281.png 917675879.282.png 917675879.283.png 917675879.284.png 917675879.285.png 917675879.286.png 917675879.287.png 917675879.288.png 917675879.290.png 917675879.291.png 917675879.292.png 917675879.293.png 917675879.294.png 917675879.295.png 917675879.296.png
Desktop Virtualization Strategy
Desktop Virtualization Strategy Steps:
1 - Mapping the Technologies
enterprise management solution such as Microsoft
Enterprise Dekstop Virtualization (MEDV) to enhance
deployment and management of Virtual PC images on a
Windows ® Desktop, while also providing a seamless and
simple experience for the end-users, independent of the
local desktop coniguration and operating system.
Given the many layers of the computer stack and multiple
desktop virtualization options, it is useful to separate the
technologies into two groups (see igure below):
essential: These are the irst steps that the IT department
should consider given their relatively easier deployment and
possibility of obtaining signiicant beneits in the short term
with limited investments.
Server based
desktop virtualization solutions allow the execution of
an environment at one place and presentation of that
environment or user interface at a different location.
These technologies usually use remote desktop protocols,
such as RDP, to decouple the user interface location from
the execution environment location. Remote execution
enables organizations to use older PCs as “thin clients,”
giving users the beneit of newer applications and
versions of Windows while helping save the environment
by avoiding the dumping of electronics into landills.
Server-based desktop virtualization technologies include:
server-Based Desktop Virtualization:
The irst and simplest
virtualization strategy is to deploy user state
virtualization, which separates the user data and
settings from any PC and enables IT to store them
centrally (i.e., in the datacenter) while also making
them accessible on any PC. It also simpliies the central
backup of user data since data is already stored
centrally on servers.
user state virtualization.
This technology isolates
applications from each other and solves application
to application compatibility issues by allowing
applications to run together even though they may
require the same resources from the OS. It also reduces
the application testing and deployment effort because
IT no longer needs to test how different groups of
applications work together every time one of the
apps is patched or upgraded. Moreover, application
virtualization allows IT to store the application centrally
and stream the application to a desktop based on user
access. It further completely removes the applications
from the desktop footprint and allows IT to deploy a
smaller master image across variety of business groups.
application virtualization.
Microsoft terminal services remote Desktops.
Remote desktops use session virtualization to partition
a single OS into multiple user sessions in a cost
effective manner.
VDI
leverages machine virtualization technologies to allow
a single server to run many virtual machines. With
VDI, organizations can run multiple desktops, each in
a virtual machine, on the same server in a datacenter
and use remote desktop protocols to allow a user to
access the desktop outside the data center.
Desktop Virtualization Technologies
Virtualized Desktop infrastructure (VDi).
In many cases customers will choose to deploy some
applications locally on the PC and some applications
remotely using Terminal Services. Application
virtualization can be used in conjunction with the
deploy technologies available for both of these
scenarios.
Discretionary: These powerful technologies allow for
signiicant lexibility and eficiency but also require more
sophisticated technical skills and a larger investment of IT
resources. These optional technologies include:
Essential
Data Layer
User State Virtualization
Application Layer
Application Virtualization
Discretionary
Client hosted
desktop virutalization is a type of machine virtualization
technology (such as Microsoft ® Virtual PC) that separates
the operating system from the physical hardware and
allows a single PC to run virtual machines side by side
with the host OS. Typically, companies will require
Client-Hosted Desktop Virtualization.
Desktop Virtualization
Operating
System Layer
Server-based desktop
virtualization
Terminal
Services
Client-hosted
desktop
virtualization
VDI
4 | Desktop Virtualization strategy
917675879.297.png 917675879.298.png 917675879.299.png 917675879.301.png 917675879.302.png 917675879.303.png 917675879.304.png 917675879.305.png 917675879.306.png 917675879.307.png 917675879.308.png 917675879.309.png 917675879.310.png 917675879.002.png 917675879.003.png 917675879.004.png 917675879.005.png 917675879.006.png 917675879.007.png 917675879.008.png 917675879.009.png 917675879.010.png 917675879.011.png 917675879.013.png 917675879.014.png 917675879.015.png 917675879.016.png 917675879.017.png 917675879.018.png
Desktop Virtualization Strategy
Essential Desktop Virtualization Solutions
User State Virtualization
user state Virtualization
The user state includes users’ data as well as application or operating system
coniguration settings. Traditionally, users’ PCs contain the authoritative copy
of users’ data and settings. There are three main challenges with managing
the user state.
User PC
Server
Central copy of
user data and settings
The irst challenge is how to back up user data and settings that are
scattered from PC to PC and then restore users’ productivity after a laptop
is lost or stolen.
User State
Local Storage
User State
Central Storage
The second challenge is how to migrate the user state during operating
system migrations.
The inal challenge is how to make the data available to the user
regardless of the PC being used. In any case, user state virtualization
provides a solution.
With user state virtualization, organizations store users’ data and settings in a central location (and, optionally, cache them
locally for ofline usage when users are mobile). The result is that users are free to roam, and their data and settings follow
them. User state virtualization can also mitigate productivity loss of PC replacement. The central copy of the data is on the
network, so it is easily restored in case of a lost or stolen PC and the user’s settings can be re-applied automatically. When
IT sets up the policy to allow ofline access to the redirected folder, Windows ® BitLocker™ Full Volume Encryption should be
applied to the PC to help ensure data safety. A typical example of this type of virtualization is using Windows with Windows
Vista Folder Redirection with Ofline Files and a Roaming User Proile.
Folder Redirection, Ofline Files, and Roaming User Proile
Folder Redirection and Ofline Files are Windows ® features that enable IT staff to redirect users’ data and settings to a central
network location. See the last section for details.
application Virtualization
Application Virtualization
With application virtualization, organizations can store and manage
applications centrally, integrate with third party PC lifecycle management
and software distribution systems, or deploy using standalone media.
Businesses deliver applications on demand and then these applications
then cache and run locally. Application virtualization isolates applications
from one another, thus reducing application-to-application conlicts. The
application’s footprint on the PC is reduced because the application is
cached and not physically installed on the PC. Application virtualization
also enhances organizations’ ability to control access to applications, track
usage of virtual applications, and quickly test, deploy, update and remove
applications. Application virtualization simpliies the application lifecycle
from test, deployment, and management all the way through to end of life.
User PC
Server
Application loading
at launch
Applications
Central Storage
Applications
Processing
Centralized storage
and management of
applications
Applications run in
an isolated virtual
environment on the
local PC
Microsoft Application Virtualization transforms applications into centrally-managed virtual services that are never
installed and don‘t conlict with other applications. See the last section for details.
Application
Virtualization
Desktop Virtualization strategy | 5
917675879.019.png 917675879.020.png 917675879.021.png 917675879.022.png 917675879.024.png 917675879.025.png 917675879.026.png 917675879.027.png 917675879.028.png 917675879.029.png 917675879.030.png 917675879.031.png 917675879.032.png 917675879.033.png 917675879.035.png 917675879.036.png 917675879.037.png 917675879.038.png 917675879.039.png 917675879.040.png 917675879.041.png 917675879.042.png 917675879.043.png 917675879.044.png 917675879.046.png 917675879.047.png 917675879.048.png
 
917675879.049.png
 
917675879.050.png
 
 
 
 
 
 
 
 
 
 
 
 
 
917675879.053.png 917675879.054.png 917675879.055.png 917675879.056.png
 
 
 
917675879.057.png 917675879.058.png 917675879.059.png 917675879.061.png 917675879.062.png 917675879.063.png 917675879.064.png 917675879.065.png 917675879.066.png 917675879.067.png 917675879.068.png 917675879.069.png 917675879.070.png 917675879.072.png 917675879.073.png 917675879.074.png 917675879.075.png 917675879.076.png 917675879.077.png 917675879.078.png 917675879.079.png 917675879.080.png 917675879.081.png 917675879.083.png 917675879.084.png 917675879.085.png 917675879.086.png 917675879.087.png 917675879.088.png 917675879.089.png 917675879.090.png 917675879.091.png 917675879.092.png 917675879.094.png 917675879.095.png 917675879.096.png 917675879.097.png 917675879.098.png 917675879.099.png 917675879.100.png 917675879.101.png 917675879.102.png 917675879.103.png 917675879.105.png 917675879.106.png 917675879.107.png 917675879.108.png 917675879.109.png 917675879.110.png 917675879.111.png 917675879.112.png 917675879.113.png 917675879.114.png 917675879.115.png 917675879.116.png 917675879.117.png 917675879.118.png 917675879.119.png 917675879.120.png 917675879.121.png 917675879.122.png 917675879.123.png 917675879.124.png 917675879.125.png 917675879.126.png 917675879.127.png 917675879.128.png 917675879.129.png 917675879.130.png 917675879.131.png 917675879.132.png 917675879.133.png 917675879.134.png 917675879.135.png 917675879.136.png 917675879.137.png 917675879.138.png 917675879.139.png 917675879.140.png 917675879.141.png 917675879.142.png 917675879.143.png 917675879.144.png 917675879.146.png 917675879.147.png 917675879.148.png 917675879.149.png 917675879.150.png 917675879.151.png 917675879.152.png 917675879.153.png 917675879.154.png 917675879.155.png 917675879.156.png 917675879.157.png 917675879.158.png 917675879.159.png 917675879.160.png 917675879.161.png 917675879.162.png 917675879.163.png 917675879.164.png 917675879.165.png 917675879.167.png 917675879.168.png 917675879.169.png 917675879.170.png 917675879.171.png 917675879.172.png 917675879.173.png 917675879.174.png 917675879.175.png 917675879.176.png 917675879.178.png 917675879.179.png 917675879.180.png 917675879.181.png 917675879.182.png 917675879.183.png 917675879.184.png 917675879.185.png 917675879.186.png 917675879.187.png 917675879.189.png 917675879.190.png 917675879.191.png 917675879.192.png 917675879.193.png 917675879.194.png 917675879.195.png 917675879.196.png 917675879.197.png 917675879.198.png 917675879.200.png 917675879.201.png 917675879.202.png 917675879.203.png 917675879.204.png 917675879.205.png 917675879.206.png 917675879.207.png 917675879.208.png 917675879.209.png 917675879.211.png 917675879.212.png 917675879.213.png 917675879.214.png 917675879.215.png 917675879.216.png 917675879.217.png 917675879.218.png 917675879.219.png 917675879.220.png 917675879.222.png 917675879.223.png 917675879.224.png 917675879.225.png 917675879.226.png 917675879.227.png 917675879.228.png 917675879.229.png 917675879.230.png 917675879.231.png 917675879.233.png 917675879.234.png 917675879.235.png 917675879.236.png 917675879.237.png 917675879.238.png 917675879.239.png 917675879.240.png
 
Zgłoś jeśli naruszono regulamin