Free Essay

Research Windows

In: Computers and Technology

Submitted By randollers
Words 10609
Pages 43
How Windows Server 2008 Delivers Business Value

Published: January 2008

© 2008 Microsoft Corporation. All rights reserved. This document is developed prior to the product’s release to manufacturing, and as such, we cannot guarantee that all details included herein will be exactly as what is found in the shipping product. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. The information represents the product at the time this document was printed and should be used for planning purposes only. Information subject to change at any time without prior notice. This whitepaper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.

Microsoft, Active Directory, PowerShell, SharePoint, SoftGrid, Windows, Windows Media, the Windows logo, Windows Vista, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

All other trademarks are property of their respective owners.

Table of Contents Table of Contents ii Introduction 1 Make Your Infrastructure More Efficient with Virtualization 1 Server Virtualization with Hyper-V 2 Presentation Virtualization with TS RemoteApp 3 Access Corporate Networks Remotely with Terminal Services 4 Terminal Services Gateway 4 Terminal Services Web Access 5 Single Sign-On 5 Hosting Secure Web Applications with Ease 6 Introduction 6 Built on a Proven and Trusted Platform 6 An Industrial Strength Web Server 7 Optimize by Running Only What You Need 7 Spend Less Time Managing Web Applications 7 Delegated Administration Saves IT Support Costs 8 Resolve Support Problems More Efficiently 9 Strong Web Application Support 9 Security and Compliance 10 Introduction 10 Stop Viruses at the Door with Network Access Protection 11 Secure Access with Identity and Access Management 12 Protect Data While Providing More Secure Access 12 A Solid Foundation for Business Enterprises 13 Introduction 13 Built to Manage Remote Infrastructures 14 Security and Flexible Administration with the Read-Only Domain Controller 14 Mitigating the Risk of Stolen Computers 15 Faster and More Reliable Networking 15 Streamlined Windows Server Administration 16 Easier Windows Server Setup and Faster Deployment 16 Powerful Automation of IT Administration Tasks 17 Group Policy Preferences 18 Enterprise Class Print Management 18 Increased Infrastructure Reliability with Server Core 19 High Availability for Business Continuity 20 Ensuring High Availability Through the Use of Failover Clusters 20 Ensuring High Availability with Hyper-V 21 Improved Backup Technology 21 Improved Power Savings 21 Summary 21

Introduction
Businesses today are under increasing pressure to be more productive and profitable with fewer resources. However, analysts report that most organizations use 70 percent of their IT budgets in maintaining and operating their existing IT infrastructure rather than on investments that add business value. A survey conducted by CIO Magazine in April 2006 found that 12 percent of the 51 Chief Information Officers (CIOs) they interviewed faced what they called "very high" pressure to cut costs, and another 28 percent had "significant" pressure. "In a lot of cases, all the business expects of IT are tactical decisions. It’s viewed as an order-taker, a big cost, just data processing," says Dennis Gaughan, research director for IT governance at AMR Research.”
Many new capabilities have been added to Microsoft® Windows Server® 2008 to help enterprises trim costs and optimize resources. Powerful new IT administration tools, such as Server virtualization with Hyper-V™, Internet Information Server (IIS) 7.0, Windows Server Manager, and Windows PowerShell make it possible for businesses of any size to create and maintain complex and flexible enterprise-wide computing infrastructures with a minimum of IT resources. The advanced security and reliability enhancements that Network Access Protection (NAP) and the Read-Only Domain Controller (RODC) provide harden the operating system and protect the corporate network without the additional expense of third-party solutions. With new Terminal Services functionality such as Presentation Virtualization with Terminal Services (TS) RemoteApp, organizations can extend network access to employees working in remote locations and optimize their investment in software applications. Windows Server 2008 can be used to optimize internal IT resources and eliminate the costs of external consultants by offering powerful administrative capabilities “right out of the box.”
Make Your Infrastructure More Efficient with Virtualization
Two new virtualization technologies are included in Windows Server 2008—Server Virtualization with Hyper-V and Presentation Virtualization with TS RemoteApp. Hyper-V is a 64-bit hypervisor-based virtualization technology that runs several operating systems on one physical server, making it possible to consolidate multiple servers into one physical server running Hyper-V, increase business continuity, provide more flexible development and test development environments, and implement dynamic datacenters that can adapt as business needs change. Presentation Virtualization with TS RemoteApp detaches the application interface from the host operating system and allows remote applications to function as if they were located on a local computer. Terminal Services Gateway and Terminal Services RemoteApp work together to provide remote workers access to internal applications over firewall-friendly ports. Server virtualization and Presentation Virtualization are part of the virtualization vision from Microsoft—integrating virtualization into a cohesive, enterprise-wide IT strategy.
Server Virtualization with Hyper-V
Many organizations own physical servers in which the storage capacity and computing speed are underutilized. An IDG research paper published in August 2006 studied the IT infrastructures of 126 companies and reported that companies are using only an average of 8 percent of the computing and storage resources of their physical servers. Over time, having many underutilized servers can result in a substantial cost to the organization as each new server purchased involves continuing electricity and office space costs in addition to the one-time capital and deployment costs.
Windows Server 2008 addresses this problem with Hyper-V, a powerful virtualization technology with strong management and security features. Hyper-V is built on 64-bit hypervisor technology, which enables increasing workloads to be effectively managed, including workloads that involve 32- and 64-bit processors. With Hyper-V, underutilized physical servers can be consolidated into virtual servers running on a single physical server, making a few optimized servers do the work of many underutilized servers. Kroll Factual Data consolidated its using a Microsoft Virtualization solution, and today its center runs 1,000 virtual machines on only 275 physical servers. Says Chris Steffan, Information Security and Compliance Manager of Kroll Factual Data, “Consider how much power we save every day by running 20 virtual servers on one machine, versus 20 stand-alone servers,” Steffen notes. “If we took every virtual machine and ran it on a stand-alone machine like we did before, our power costs would at least double—not to mention the other costs accrued in additional equipment, real estate, networking, and support.” Because servers running as virtual machines on a Hyper-V host are managed the same way, using the same tools as their physical counterparts, there is no need to retrain administrative staff when consolidating with Hyper-V. RPC Group recently consolidated IT operations using a Microsoft Virtualization solution, says Technical Architect Koenraad Meuleman of when talking about how the familiar user interface of Microsoft applications smoothes management, “It’s something the staff already knows; there’s no additional learning curve. They know, for example, what to do in backup scenarios.”
Hyper-V makes the job of IT administration easier by making it possible for all of the virtual machines in an enterprise network to be centrally managed from one familiar management console. This console, called the Hyper-V Manager, includes functionality that allows IT managers to quickly and efficiently deploy and manage virtual servers on any networked physical server. RackForce is a hosting provider that extensively uses a Microsoft Virtualization solution, and relies on Microsoft tools to streamline server management. When speaking about the previous generation management tool, James Bothe RackForce Systems Administrator said, “Virtual Machine Manager is rich with features that make managing virtual environments much easier and highly efficient. In particular, it’s back-end PowerShell scripting capabilities are extremely powerful.”
Server virtualization with Hyper-V has several new features that improve business continuity and disaster recovery. The Quick Migration feature in Enterprise and Datacenter editions of Windows Server 2008 allows virtual servers to be moved from one physical server to another with little downtime and to be quickly brought back online in a disaster recovery scenario. The Hyper-V Snapshot feature can save the state of a virtual machine or all virtual machines on a server, periodically or as needed, to a secure location. During a server failure, snapshots can be installed and launched on another server, even one in another location, making the new server functionally identical to the source server at the time the snapshot was saved. These capabilities combined with other the disaster recovery capabilities in Hyper-V enables organizations to use Hyper-V in to host their mission critical applications with an assurance of business continuity, and may allow organizations to implement rapid disaster recovery processes that are location agnostic. Kroll Factual Data has used a Microsoft Virtualization solution to implement just such capability. Says Chris Steffan, Information Security and Compliance Manager, “We don’t even have to set up the environment in disaster recovery, because as long as we have it on tape, we can load the environment whenever we need it. And really, we can load the copy of the environment on any computer, anywhere on the planet, as long as it is running the operating system that the original environment was running. If there was a major disaster, all I need is a network connection, some power, and a trailer, and I could literally set up our data center in our parking lot in 24 hours—even if it meant buying all new hardware. The complexity of our disaster recovery operations has gone from requiring a staff of 20 to a staff of 1 with one hard drive (for more information about how Hyper-V enables high-availability, refer to High Availability for Business Continuity).” Hyper-V is a flexible, high-performance, cost effective and well-supported virtualization platform. It can reduce hardware costs and operating expenses while improving security and centralizing system administration.
Hyper-V also has several new High Availability features, which are covered in the High Availability for Business Continuity portion of this paper.
Presentation Virtualization with TS RemoteApp
Today’s information workers work from everywhere—from the office, from home, and while traveling. Organizations rely heavily upon their IT departments to provide the applications their users need, wherever they are located, in a secure and reliable manner. RemoteApp in Windows Server 2008 provides a robust and user friendly solution to this business need.
With RemoteApp, users can run applications hosted on a server on the corporate network through Terminal Services and the application will operate as if it were running on the user’s local computer. The user does not need to switch between the local desktop and a remote desktop—RemoteApp applications run in resizable windows on the user’s desktop, can access local drives, devices, and printers, and run side-by-side with applications running on the local computer. Although RemoteApp uses Terminal Services functionality, Terminal Services operates transparently to the user. This means that the user does not have to learn a dedicated Terminal Services interface, which increases productivity and saves time for him or her. The organization does not have to incur the cost of training users to use any part of Terminal Services functionality. Organizations can deploy applications rapidly and manage a single installation of an application rather than many copies on remote machines. This means that organizations can greatly reduce the costs of server application maintenance and support.
RemoteApp in Windows Server 2008 empowers the mobile workforce, unobtrusively allowing them to work the way they need in today’s highly distributed business environment. It also centralizes the delivery and maintenance of applications, allowing for rapid application deployment, easier maintenance, and reduced support costs.
Access Corporate Networks Remotely with Terminal Services
In addition to RemoteApp, many new features have been added to the Terminal Services component of Windows Server 2008 that make accessing corporate networks from remote locations fast, safe, and reliable without the need for VPN connections and cumbersome logons. Vetter Health Services, a long-term healthcare service provider, looked at the enhanced features in Terminal Services available in the Windows Server 2008 operating system. Terminal Services features like RemoteAppT would integrate the Vetter Health Services application without the use of a Virtual Private Network (VPN). “Windows Server 2008 has all the features we needed built right into Terminal Services,” says Joe Sturgeon, Vetter Health Services Network Administrator. “The cost savings really caught our eye.”
Terminal Services Gateway
Terminal Services Gateway (TS Gateway) allows remote users to access selected servers and workstations on the corporate network over firewall-friendly ports from anywhere on the Internet. All of the data transferred is encrypted to prevent the security of the communication session from being compromised. Accessing corporate network resources is easy for remote users with no configuration required on their computer, and controlling remote access is easy for IT administrators because of the comprehensive security administration tools that TS Gateway provides. IT administrators only need to maintain the copies of the application residing server rather than many copies of that application installed on mobile laptops. This not only saves the time and cost of administration, but also simplifies management of the software licenses.
The Manteca Unified School District is currently implementing Terminal Services on Windows Server 2008 to provide easier remote access to remote applications. They will use the Window Server 2008 Terminal Services RemoteApp feature to provide access to any Windows-based program from any location. They will use the Terminal Services Gateway feature to enable remote users to connect to terminal servers on the district network from any Internet-connected device without establishing a VPN connection. Says Colby Clark, Systems Administrator Supervisor, “We’ll be able to eliminate the frustrating logon procedure and make it much easier for users to access remote applications.”
TS Gateway improves the productivity of remote workers and IT personnel while protecting corporate network assets.
Terminal Services Web Access
Terminal Services Web Access (TS Web Access) provides access to RemoteApp applications through a Web browser-based interface. After TS Web Access has been installed and configured, running a remote application is as easy as choosing a program from the menu. Users do not need to know which server hosts the application they need to run—TS Web Access tracks that information for them. The Manteca Unified School District is using the Terminal Services Web Access feature to allow users to log on to specific applications from a Web browser. Systems Administrator Supervisor Colby Clark says, “We hope to provide 100 percent of our families with easy remote access to 100 percent of our applications. We’ll be able to deliver classroom applications at home, over the Web, that look just like the applications the kids use at school.”
TS Web Access enhances worker productivity and end-user experience by providing an easy-to-use, Web-based menu interface to locate and launch RemoteApp applications.
Single Sign-On
When accessing resources located on more than one server in an enterprise network, it is often necessary to remember several user IDs and passwords. This is because administrators often establish additional security policies for servers with sensitive corporate data, requiring users to log on again to those servers. This adversely affects productivity and results in a poor user experience. It can also introduce security risks if users store their user ID and password information in locations where it can be seen by unauthorized people.
Windows Server 2008 includes Single Sign-On (SSO), which allows users with a domain account to log on to a Terminal Services session once, using a password or smart card, and to then gain access to remote servers within the domain without being asked for their credentials again.
Line of Business (LOB) application deployment and centralized application deployment are key scenarios for SSO. To reduce maintenance costs, many companies prefer to install their LOB applications in a Terminal Server environment and make those applications available through Terminal Services RemoteApp, Remote Desktop, or Terminal Services Web Access. LOB applications installed on a terminal server can take advantage of the time-saving benefits of SSO.
Vetter Health Services has replaced the cumbersome logon procedure for the hosted application, which required accessing a logon page through a Web browser, entering a user name and password, waiting more than a minute for the application to open, then logging on again with another user name and password. Now, using a Windows Server 2008 Terminal Services solution, users can simply click an icon on their desktop and enter a single user name and password to open the application.
SSO enhances corporate network security while saving workers time, reducing their frustration, providing them a better user experience, and improving their productivity.
Hosting Secure Web Applications with Ease
Introduction
The number of Web sites that IT support staff must configure and manage has dramatically increased in recent years. Enterprises of all sizes routinely host Web sites to provide information and services to customers and partners, to facilitate business operations between corporate divisions, to publish marketing materials, and many other purposes. All of these Web sites must be efficiently managed, monitored, and supported with a minimum of cost to the organization. To meet this need, Windows Server 2008 includes Internet Information Server 7.0 (IIS 7.0). With IIS 7.0, enterprises can deploy, configure, and manage Web applications and services, even services with advanced capabilities such as streaming audio and video.
Built on a Proven and Trusted Platform
Businesses can build their online presence with IIS 7.0, which builds on the solid and safe platform of IIS6. Its reputation as a Web server capable of meeting needs of even the largest online businesses as been established by the more than 55 percent of Fortune 1000 businesses that rely on IIS, as well as popular sites like Match.com that get 30 million pages views daily. Other well-visited sites such as MySpace.com (that gets 23 billion page views each month) and MSN.com have already upgraded their Web servers to IIS 7.0. Since it was released, the IIS 6.0 platform has had fewer than three updates of a severity level of moderate or less. This is a substantial improvement on the performance of previous versions of IIS. Also, IIS has no unpatched security issues. This approach makes software more secure and less vulnerable, resulting in fewer Web site outages, decreased downtime and reduced support costs.
Businesses can see a greater return on investment (ROI) and reduced total cost of ownership (TCO) because of the IIS 7.0’s ability to support a large number of Web sites on one server while maintaining a high level of performance. Pipex, a provider of integrated telecommunications and Internet services, is an example of a company that has done this. According to Jarrod Robinson, Hosting Products and Development Director at Pipex, “In our internal environment, we push the product quite hard. I already have solutions where we have tens of thousands of sites running on the IIS 6 platform and hope to have 100,000 sites with IIS 7.0. From what we’ve seen so far, we think it will be possible to significantly reduce the amount of ‘tin’ in the data center. IIS 7.0 appears to offer a great TCO benefit.”
An Industrial Strength Web Server
Windows Server 2008 includes a unified platform for Web publishing that integrates IIS 7.0, ASP.NET, Windows Communication Foundation, and .NET Framework 3.0. IIS 7.0 is a secure and easy-to-manage platform for developing and reliably hosting Web applications and services. It includes tools that simplify site management, increase site security, and improve the performance and extensibility of Web sites.
Optimize by Running Only What You Need
IIS 7.0 has been redesigned from the ground up to incorporate a modular architecture that enables IT administrators to customize their Web servers by selectively installing or removing modules. These modules encapsulate standard and optional server functionality such as authentication, encryption methods, and application-specific functionality. This modular design offers many benefits to IT organizations. Administrators can install only the options they need while eliminating the administration costs, server performance reductions, and security risks that come with unused server functionality. Web servers are more flexible with IIS 7.0 as modules can be easily and quickly added or removed as business needs change. The servers are also more reliable as a modular design reduces the chance that problems in one module will affect the others.
DiscountASP.net is an online Web hosting service that has made use of the modular architecture of IIS 7.0. Says Takeshi Eto, Vice President of Marketing, “A key advantage we’ve seen is the ability to do customization with IIS 7.0, versus the older versions. IIS 7.0 is factored into more than 40 feature modules that can be independently installed on the box. It provides us with more control over the server environment which, in turn, allows us to provide our customers with even more control over their individual Website [sic] account configuration. We are extremely happy with what we have seen so far.”
The core server functionality of IIS 7.0 tools is extensible, enabling organizations to develop custom modules that add to the functionality of the web service or any of the IIS 7.0 maintenance tools. These modules can call native Win32 APIs or managed .NET Framework APIs. IIS 7.0 will also work with existing automation scripts, and is fully compatible with applications that work with earlier versions of IIS.
IIS 7.0 enables organizations to better meet the unique and changing needs of their Web presence and network by tailoring Web servers to provide only the required functionality, improving security, reducing administration and support costs, and making it easier to add custom capabilities.
Spend Less Time Managing Web Applications
IIS 7.0 features a new suite of GUI-based and command-line management tools that provide an easy-to-use interface for managing Web servers and obtaining diagnostic information about Web applications and services. Other IIS 7.0 tools can be used to automate many maintenance tasks, resulting in more efficient IT administration and fewer errors. IT administrators can write their own custom modules that extend the functionality of these administration tools and can be accessed through the standard tool interface. IIS 7.0 also supports remote administration over firewall-friendly HTTPS protocols that allow Web servers to be easily managed from remote locations. Configuration settings for the Web server and the services it provides are now stored in a single folder in XML format. Because the XML format has become the industry standard for portable and extensible data representation, IT personnel can use many third-party utilities such as XCopy to further automate maintenance operations.
Web-hosting firm MaximumASP decided to offer its customers free pre-release test accounts for the Windows Server 2008 operating system with IIS 7.0. In August 2007, CyberTV started to move 25 development sites over to the new operating system, along with one high-volume production site. MaximumASP and CyberTV both are enjoying the operating system’s new user interface, which minimizes the steps necessary to complete tasks. “Over the course of a large project, needing only one-third the number of mouse clicks is a huge benefit for us,” says Cyber TV Chief Technology Officer Deke. That productivity enhancement extends to the amount of time that it takes to establish Web servers, set up new sites, and share configuration files. Adds Hooper, “We’ve noticed a dramatic decrease of about 80 percent in the total time that it takes to set up new sites and handle load balancing.”
MaximumASP is also taking advantage of the command-line utility to save time on repeated tasks. “Before, we had to have a programmer to create batch files and automate processes,” says Lead Developer Chris Morrow. “But with IIS 7.0, anyone can do it, which makes management faster and easier.”
These new features in IIS 7.0 saves costs by reducing the workload of IT administrators and streamlining the deployment of new Web sites, while making Web services more reliable and robust. Reliable and robust Web services result in fewer costly helpdesk support calls, satisfied customers, and more revenue for the company.
Delegated Administration Saves IT Support Costs
With IIS 7.0, IT administrators can delegate administrative capabilities to clients who host or administer Web sites and services. For example, an administrator may delegate the ability to maintain Web site properties, such as the default document to a content developer maintaining a Web site. The clients, who may be corporate customers, partners, developers, or other business units, can assume the responsibilities and costs of these new capabilities under the direction of the IT department. These capabilities can be easily granted, revoked, and transferred, while the IT department retains full control of critical server settings and security policies. Administrators can lock specific IIS 7.0 configuration settings to ensure that these security policies are not changed by clients who have been delegated administrative capabilities.
For the Web site owner, this removes the total reliance on the IT department to perform routine maintenance tasks such as changing the default home page. For the company, this reduces costs by reducing the workload of IT personnel.
Resolve Support Problems More Efficiently
IIS 7.0 provides a set of troubleshooting and analysis tools that are powerful yet easy to use. They enable administrators to quickly address problems as they arise by monitoring real-time diagnostic information about all aspects of server operation. This information is presented to the administrator in an organized format that allows crucial data to be quickly accessed. New features in IIS 7.0 enable administrators to troubleshoot complex and intermittent problems by automatically monitoring the activity of Web applications for error conditions. When an error occurs, detailed information about the error is written to log files that aid administrators in the troubleshooting process. IIS 7.0 also simplifies troubleshooting by providing informative error messages instead of abstract error codes, as well as information on potential causes of the problem and suggestions for resolving the problem.
Southern Star Central Gas Pipeline is one of the largest natural gas transmission providers in the United States. Southern Star decided to deploy the Windows Server 2008 operating system with IIS 7.0 in its application server environment. With new troubleshooting features in IIS 7.0, Southern Star administrators and developers can identify and correct problems with applications more quickly, without having to write code or route log entries to try to diagnose errors. Administrators are saving up to an hour per event in locating and resolving application errors. “The improved diagnostics in IIS 7.0 are the biggest benefit for us,” says Systems Administrator B.J. Stigall. “It has been a huge help in tracking down application errors.”
Strong Web Application Support
The cost of Web application development and deployment has been increasing for organizations because of the vast number of software technologies and hardware platforms that applications must reliably operate with. Customers now expect robust and full-featured Web applications and services that rely on a variety of languages such as classic ASP, ASP.NET, and PHP. A Web hosting platform that supports all of these languages while offering powerful and easy-to-use management tools will enable organizations to consolidate all of their Web applications on one platform. This can reduce or even eliminate the need to run multiple host platforms, and lower support costs. Web hosting platforms that do not support all of these languages in an integrated way can add to the cost of development and maintenance, result in lost business, and reduce the ability of their applications and services to adapt to changing business needs.
IIS 7.0 provides a unified platform for Web hosting and publishing and provides application support that goes well beyond classic ASP. An important feature of IIS 7.0 is the FastCGI module. FastCGI is a high-performance version of the Common Gateway Interface (CGI), which is the standard Web interface used by many Web client applications to communicate with Web servers. FastCGI enables CGI-based Web applications to run faster while maintaining stability while providing reliable PHP support. This makes IIS 7.0 an excellent platform that organizations can use to host of all of their Web applications.
IIS 7.0 also operates with Microsoft .NET Framework version 3.0, which combines new technologies for building applications that deliver a visually compelling user experience, communication across technology boundaries, identity management, and support for a wide range of business processes. .NET Framework 3.0 reduces development complexity by providing a consistent and comprehensive development environment, enabling solutions that work with a wide variety of mobile devices, backend services, and applications.
Applied Innovations is a Microsoft Gold Certified Partner and is a leading provider of Web hosting. Starting in early 2007, Applied Innovations became an early adopter of IIS 7.0 and Windows Server 2008. The company upgraded its corporate and support servers, as well as selected servers used by its hosted customers, from Windows Server 2003 and IIS 6.0 to Windows Server 2008 and IIS 7.0. A big advantage of the company’s move to Windows Server 2008 with IIS 7.0 is the native PHP support available in IIS 7.0. “This means that both ASP.NET and PHP applications will run in the Windows environment with greater performance and stability than before,” says CTO Carlos Caneja. “This gives Applied Innovations and its customers the versatility to use whatever application—be it ASP, ASP.NET, or PHP—best fits their needs.”
By supporting classic ASP, ASP.NET, XML and PHP, IIS 7 provides organizations with the flexibility to write applications in the language they choose, and host applications on the platform they want.
Security and Compliance
Introduction
Business environments increasingly allow workers to connect to corporate networks remotely, and businesses routinely conduct transactions through the Internet. IT administrators are faced with the challenge of supporting these capabilities while protecting corporate data from viruses, malware, and unauthorized access. A 2007 study by the Ponemon Institute found that 73 percent of the companies they studied have reported loss or theft of data assets within the last two years. To ensure the integrity and security of their data assets, organizations are increasingly adopting technologies, such as Public Key Encryption (PKI) and smartcards—however, these technologies are often seen as difficult to deploy and administer.
Windows Server 2008 offers many security features that enable organizations to meet these challenges. It features policy-driven security functionality and simplified security policy management tools that enable administrators to enforce security policy consistently throughout the organization and easily deploy PKI and smartcard technologies in their IT infrastructure. The power of these tools reduce the time and effort necessary to enforce enterprise-wide security standards, reducing costs and making IT resources more efficient.
Stop Viruses at the Door with Network Access Protection
The cost of sanitizing a network after a virus has gained access to a corporate network can be substantial. Windows Server 2008 offers Network Access Protection (NAP), a combination of technologies designed to stop viruses before they spread and ensure that all computers connecting to the network are compliant with corporate security policies.
NAP checks clients that connect to the network and enforces established client health policies by remediating noncompliant client computers before they can interact with other systems on the corporate network. These policies enforce software and security update requirements, required anti-virus solutions, and configuration settings.
The government of Fulton County Georgia serves a population of nearly one million. The IT department supports 5,000 employees within 400 buildings, dozens of agencies, airports, fire stations, police stations, courts, public-health clinics, and libraries. Its mixed IT infrastructure includes mainframes, clustered servers, workstations and desktop computers, multiple operating systems and database management systems, dozens of legacy vertical applications, and a sophisticated network encompassing multiple topologies and protocols. For Fulton County IT executives, such an infrastructure poses major challenges in terms of security and standards compliance, especially considering the sensitive nature of the data which included public-health and court documents. “Standards enforcement and policy compliance were practically impossible without a way to tie them into the larger administration of networks and systems,” explained Robert E Taylor, CIO for Fulton County. Viruses had brought the network down and resulted in both lost productivity and lawsuits against the county.

Fulton County chose to implement Windows Server 2008 and Network Access Protection with IPSec enforcement to address these issues and automate compliance. Results are being seen in the initial test deployment. Among test-bed client users, stability is noticeably higher, and there is less need of repair for problems caused by malware attacks. “We have reduced help-desk calls from an average of 20 per day for a user group of similar size down to just 5 per day—a 75 percent improvement,” Fulton County CIO Robert E. Taylor points out. Moreover, instead of the cumbersome, paper-based policy of the past, Fulton County is using NAP to enforce standards, policy, and system-health compliance. As a result, the county has been able to reassign two full-time maintenance staff members to new technology initiatives, resulting in IT maintenance cost avoidance of U.S. $157,000 annually.

With NAP, organizations can offer remote workers and partners access to the corporate network while maintaining the security of the corporate network. IT staff can spend less time enforcing security requirements on remote machines and more time on making the enterprise IT environment more efficient and productive.
Secure Access with Identity and Access Management
The theft and accidental loss of corporate information is a growing concern for many organizations. The extent of the problem is reflected in the results of a U.S. Department of Justice (DOJ) study that estimated the cost of information theft during 2004 to be U.S. $250 billion dollars and the cost of identity fraud to be U.S. $56.2 billion annually. Research conducted by Jupiter Research found that two of the top three security breach concerns cited by business decision makers were the unintended forwarding of emails and loss of mobile devices. It also reported that helpdesk staff spend one-third of their workday resetting passwords, and that each password reset costs U.S. $57 to $147. In addition, Unite States Federal Financial Institutions Examination Council (FFIEC) regulations require that organizations provide two-factor authentication for all systems access as of the end of 2006.
Organizations that transact business through the Internet often do so through many user accounts, which are accessed by a variety of computing devices, such as desktop and mobile computers, and mobile devices such as smart phones. Managing these user accounts in a way that ensures that the enterprise computing network reliably supports these online business transactions, while enforcing network security policies, is a necessary part of IT administration. Protecting an organization’s data assets also includes persistent protection that remains with the data even after it leaves the corporate network. Failure to provide for these business needs can result in security breaches, regulatory compliance breakdowns, and an inability to effectively deploy new business initiatives or collaborate with partners. However, organizations often expend considerable resources in managing user accounts in an environment of many diverse platforms. Windows Server 2008 offers several features to manage identities, and to make data and collaboration more secure.
Protect Data While Providing More Secure Access
Active Directory® Rights Management Services (AD RMS) provides persistent protection of corporate data throughout the life of the data and regardless of where it travels online. In Windows Server 2008, AD RMS is included as a server role, and is easier to deploy and administer due to self enrollment of AD RMS servers, a new Microsoft Management Console (MMC), and delegated administration through administrative roles. In Windows Server 2008, AD RMS is integrated with Active Directory Federation Services (AD FS). AD FS allows organizations to setup trust relationships between federation partners. The AD FS role only needs to be configured on one of the partners; it allows administrators to designate trusted accounts that can then gain access to resources on partner networks to which they’ve been granted permissions. This allows partners to log on once, using their local domain account, and to gain access to the resources to which they’ve been granted permissions. This eliminates the need to have separate accounts for users in each domain, making access more secure and reducing the workload of IT staff. Because AD FS is integrated with AD RMS, RMS permissions can be accessed and enforced over federated trusts. This provides the access that partners need to collaborate, and helps ensure that data is secure no matter where it travels, protecting the organization's intellectual property. Enhancements and features in Windows Server 2008 make AD RMS and AD FS easier to deploy, administer and use while reducing the burden on IT.
Windows Server 2008 Identity and Access Management features allow organizations to create a highly extensible, Internet-scalable, and secure identity access solution that can operate across multiple platforms, including both Windows and non-Windows environments. Identity and Access Management improves a company’s operational efficiency, empowers colleagues and trusted partners to share information, and provides for reliable cross-company collaboration while mitigating security risks while ensuring compliance with established security policies. This also allows organizations can better leverage their investment in Microsoft Office as AD RMS features are also built into these Microsoft productivity products.
A Solid Foundation for Business Enterprises
Introduction
Windows Server 2008 is the most reliable and manageable Windows Server operating system to date. With new technologies and features, such as Server Core, PowerShell, Windows Deployment Services (WDS), and enhanced networking and clustering technologies, Windows Server 2008 provides the most versatile and reliable Windows platform for all workloads and application requirements.
Windows Server 2008 simplifies and reduces the IT department’s workload. New tools and features streamline routine management chores, facilitate rapid deployment of desktop and server operating systems, and help IT Professionals automate common tasks. It provides a viable alternative to Linux, and its market performance relative to Linux supports this. The annual growth rate of Linux in the x86 server space has fallen from 53 percent in 2003 to negative 4 percent in 2006, while the annual growth rate of Windows Server was approximately 25 percent. Windows has continued to report positive annual growth, outpacing the total growth rate in the x86 server market by more than 4 percent in 2006, which indicates that Linux lost market share to Windows Server during this time. Bill Hilf, general manager of Windows Server marketing and platform strategy at Microsoft in Redmond says, "It appears that Linux server growth is moderating considerably and, while it's certainly still a player, it's not being considered across the broad range of workloads that Windows Server is, from ERP to CRM to messaging and collaboration to core infrastructure like file and print."
Built to Manage Remote Infrastructures
It has long been a challenge for IT departments to make their enterprise computing environment operate effectively between corporate divisions and remote locations such as branch offices. In many cases remote locations do not have their own IT staff, making the deployment of software expensive and time-consuming and enforcing security policies difficult. Connections to remote locations are often slow, even for routine tasks such as logging on, reducing productivity. Supporting remote infrastructure often requires costly onsite visits or the outsourcing of IT support to external contractors. Windows Server 2008 address these issues with new remote management technologies which improve authentication and Active Directory Domain Services, improve security, make better use of available bandwidth, and simplify administration - including remote administration.
Molinos Modernos , a leading Latin American food-product manufacturer, operates more than a dozen facilities in six countries. The company needed to overcome inconsistent connectivity to efficiently and securely share information between its branch locations. Molinos Modernos is deploying Windows Server 2008, consolidating its IT environment, improving collaboration within and between its branch offices, and getting information to the people who need it. The company is reducing costs, improving efficiency, enhancing the security of its information and its IT resources, and streamlining its IT administration. Says Director of Information Technology Luis Vidal, , “With Windows Server 2008, our whole server environment is being simplified, and we can make sure information will be there when people need it, wherever they are.”
Security and Flexible Administration with the Read-Only Domain Controller
Having no local domain controller at remote locations can delay logons and access to network services, while locating domain controllers in branch offices introduces security risks and administrative cost. The Read-Only Domain Controller (RODC) install option has been added to Windows Server 2008 as a means to mitigate the security risk of Domain Controllers installed in branch locations. IT personnel can also delegate administrative rights to remote workers to perform routine RODC tasks. These rights can be restricted to a single computer, protecting the rest of the servers in the enterprise network.
Holzer Clinic, a healthcare services provider in Ohio and West Virginia, was frustrated with the slow data authentication system that caused several minutes’ delay in accessing critical patient data. Also, without onsite IT staff or dedicated server rooms in several of its branch locations, the company needed a branch office solution that would be both secure and easy to manage. “In the clinics furthest away from the data center, employees would have to wait several minutes to authenticate and see their desktop, resulting in frustration and lost productivity,“ explains Holzer Clinic Systems Engineer Mark Oliver.
To improve performance and increase data security, Holzer decided to implement Windows Server 2008 with read-only domain controllers instead of the writeable domain controllers used previously in locations where physical security might pose a problem. “In remote clinics where the company does not have dedicated server rooms, the RODC offers an added layer of protection and peace of mind,” says Oliver. In addition to improving the log-in efficiency for remote authentication, the new solution also helps to increase employee satisfaction. Waiting for several minutes to log in proved to be a source of frustration—one that is eliminated with quicker authentication. “It’s simple,” says Oliver, “users are a lot happier now.”
RODCs minimize security vulnerabilities and improve user experience and productivity by providing remote workers faster logon times and more efficient access to domain resources.
Mitigating the Risk of Stolen Computers
Windows BitLocker™ Drive Encryption is a new security feature in all editions of Windows Server 2008 and Windows Vista Enterprise and Ultimate editions that helps to protect servers, workstations, and mobile computers. Bitlocker can help protect data on servers in remote locations where physical security cannot be guaranteed. BitLocker protects the contents of a disk drive with robust 256-Bit AES Diffussed key encryption. The encryption is powerful enough to prevent unauthorized access from breaking the file and system protections or performing offline viewing of the stored files in the event a server or hard drive is stolen. By protecting the sensitive corporate data on servers in remote locations, BitLocker helps organizations be more secure, maintain compliance with Sarbanes-Oxley and HIPAA regulations, and safeguard the organization’s competitive standing in the market and the integrity of its business alliances.
Faster and More Reliable Networking
With increased demand placed on corporate networks—such as geographically dispersed and mobile workers, expanding networks of partners and vendors, and a substantial rise in the number of branch offices—organizations need a high performing, more scalable and easy to secure networking foundation more than ever before. Historically, networking technologies have not kept pace with growing connectivity needs. Today, increasing latency issues, low throughput, and security concerns continue to be challenges for most organizations. Because of these high operational efficiency requirements, as well as the need for more people to access information and increasing numbers of network-based threats, company networks are constantly under strain. Windows Server 2008 addresses these issues with several new features designed to maximize throughput and utilization, optimize high-speed networking, and secure the network.
Windows Server 2008 maximizes throughput and bandwidth utilization with features such as TCP Receive Window Auto-Scaling, which tunes connections automatically for best performance. Compound TCP (CTCP) optimizes sender-side throughput to better utilize available bandwidth. Windows Server 2008 includes SMB 2.0, a new version of SMB designed for today’s networks that improves throughput and speeds data transfers, especially when combined with TCP Receive Window Auto-Scaling and CTCP.
Windows Server 2008 is optimized for high-speed networking. Features such as TCP Chimney Offload network acceleration. Receive-side scaling allows for more efficient processing of inbound network traffic on multi-processor/multi-core servers for increased server performance. With support for policy based Quality of Service (QoS), Windows Server 2008 allows IT administrators to prioritize network bandwidth to help ensure critical data has the bandwidth necessary.
Network performance tests show that throughput and time-to-completion improvements in Windows Server 2008 are 3.5 times faster than in Windows Server 2003. Even with pre-release versions of Windows Server 2008, Microsoft is already seeing substantial improvements in file transfer performance due to SMB 2.0 and the TCP/IP optimizations. For example, transferring 10 Gigabytes of Virtual Earth stitch files with Windows Server 2003 took six hours—with Windows Server 2008, the same data transfer takes eight minutes. This amounts to a 45-fold increase in data transfer rates.
Windows Server 2008 networking boosts security through seamlessly integrated network security features such as improvements to Windows Firewall, and Network Access Protection (NAP) to provide a solid foundation for business workloads for today and the future. When combined with the related capabilities in Windows Vista, Windows Server 2008 offers an even more enhanced networking experience helping IT administrators and business decision makers provide their organizations with an enhanced performance, scalable and secure networking experience, helping improve user access to network resources.
Streamlined Windows Server Administration
With the ever-growing number of computers and workstations in a typical enterprise network, IT personnel spend a substantial amount of time installing, deploying, and maintaining variants of the Windows operating system on servers and workstations. It is crucial to the overall productivity of the business that a consistently high level of quality is maintained in these processes. Windows Server 2008 includes many new features and enhancements designed to reduce the cost and effort of deploying and managing all Windows servers within the corporate network.
Easier Windows Server Setup and Faster Deployment
Installing operating systems has historically been a time-consuming process requiring the constant monitoring and hands-on interaction of IT administrators to ensure proper installation. Windows Server 2008 streamlines the setup process, freeing the administrator to perform other tasks. A redesigned installation interface guides administrators and users through the most common post-installation tasks, helping ensure that the server is configured correctly and securely. The improved installation process of Windows Server 2008 saves the time setting up the operating system, freeing administrators to perform more valuable tasks.
In addition to a streamlined setup, organizations can use Windows Deployment Services (WDS), a revised version of Remote Installation Services designed to be used with Windows Server 2008 and Window Vista, that provide a simplified, secure means of rapidly deploying Windows operating systems to computers over networks without requiring that administrators visit each computer or install directly from CD or DVD media. This reduces the time and work involved in deploying operating systems on servers and workstations and the costs associated with deploying new computers.
Microsoft has a published Microsoft Deployment, the next version of Business Desktop Deployment (BDD) 2007. It is the recommended process and toolset to automate desktop and server deployment. Microsoft Deployment provides detailed guidance and job aids for every organizational role involved with large-scale deployment projects. It unifies the tools and processes required for desktop and server deployment into a common deployment console and collection of guidance. Microsoft Deployment’s tools and end-to-end guidance reduce deployment time, standardize desktop and server images, limit service disruptions, reduce post-deployment help desk costs, and improve security and ongoing configuration management.
More information can be found at: http://www.microsoft.com/deployment
Simplified Administration
The Server Manager Console in Windows Server 2008 makes the task of managing and securing servers easier. The interface of the Server Manager Console is a single window that contains all of the information necessary for managing a server’s configuration and system information. It incorporates the functionality of several management tools, enabling administrators to go directly to consoles for managing specific roles, troubleshooting tools, or finding backup and disaster recovery options. Roles and features installed by using Server Manager are secure by default. Administrators don’t need to run the Security Configuration Wizard following role installation or removal unless they want to change the default settings.
Most common administration tasks in Windows Server 2008 can be performed with the assistance of wizards. Wizards in Server Manager streamline server deployment tasks in an enterprise by cutting deployment time. Most common configuration tasks, such as configuring or removing roles, defining multiple roles, and role services can now be completed in a single session using Server Manager Wizards. Dependency checks are performed as the user progresses through Server Manager wizards, ensuring that all of the prerequisite role services that a selected role needed are installed, and none are removed that remaining roles or role services might still require .
Server Manager consolidates a variety of management interfaces and tools into a unified management console, enabling administrators to complete common management tasks without having to navigate between multiple interfaces, tools, and dialog boxes reducing the time it takes to perform administration tasks, reducing configuration errors, and reducing server management costs.
Powerful Automation of IT Administration Tasks
Microsoft Windows PowerShell is a new command-line shell and scripting language that helps IT Professionals achieve greater productivity and control system administration more easily. Windows PowerShell does not require that you to migrate your existing scripts, and it is ideally suited for automation of new Windows Server 2008 features.
Windows Powershell has more than 130 standard command-line tools, a new admin-focused scripting language, and consistent syntax and utilities. It allows administrators to efficiently complete server administration tasks that are common across all Windows Server 2008 roles, such as services, processes, and storage. Windows PowerShell also allows administrators to manage specific Windows Server 2008 roles, such as IIS 7.0 and Terminal Server, as well as Microsoft Exchange Server 2007 and Microsoft Operations Manager 2007. Also, a number of partners have provided Windows PowerShell commands that improve network management and provide rich charting and gauge capabilities.
Valero Energy Corporation is North America’s largest refiner of oil and gas products has started to deploy Windows Server 2008. One of the compelling reasons to deploy is scriptability. “On the refinery side, one of the big benefits of Windows Server 2008 is scriptability and ease of configuration,” says Scott Mock, Lead I/S Specialist. Valero plans to use Windows PowerShell to create configuration scripts that automate basic server management tasks. Using the configuration scripts, refinery administrators can simply run a script rather than trying to follow written instructions, reducing the time spent on installation, deployment, and maintenance as well as the potential for configuration errors.
Windows PowerShell is easy to adopt, learn, and use, because it does not require a background in programming, and it works with your existing IT infrastructure, existing scripts, and existing command-line tools. With PowerShell, organizations can more easily automate administration tasks, reducing effort and saving costs.
Group Policy Preferences
While new tools like Powershell provide robust automation capabilities that save time, speed deployment and reduce costs by allowing organizations to automate complex and redundant tasks, scripting simpler tasks such as mapping drives and printers in logon scripts, can be unnecessarily burdensome on IT staff. These types of actions, as well as other user specific settings, are typically deployed as part of logon scripts. Logon scripts are often scattered, may vary widely from group to group in the same organization, are seldom documented, and are time consuming to troubleshoot, support and modify.
Windows Server 2008 includes Group Policy preferences built-in to the Group Policy Management Console (GPMC). Unlike Group Policy settings that are mandatory and cannot be changed by end-users, Group Policy Preferences are unmanaged settings that users can change. Group Policy preferences add to Group Policy a centralized system for deploying preferences such as system settings, mapped drives and mapped printers. By using Group Policy Preferences organizations can potentially reduce or eliminate logon scripts in their environment. Group Policy Preferences also reduce configuration errors and ease troubleshooting through precision targeting and easy to use interfaces. . Group Policy Preferences also helps organizations reduce effort and costs to support images and reducing image count by allowing organizations to deploy generic images and use Group Policy Preferences to update settings for groups of users and computers.
Group Policy Preferences simplifies deployment, and management of configuration settings to desktops. It reduces the need to track and maintain large numbers of logon scripts, and provides easy to use interfaces for configuring settings previously deployed through logon scripts, reducing configuration errors and IT costs.
Enterprise Class Print Management
A substantial part of an organization’s IT resources is usually devoted to configuring and maintaining network attached printers that require constant maintenance and administration. The techniques for configuring one printer model usually do not translate to other models, so IT personnel must devote substantial time and effort in becoming familiar with many different printer configuration methods. In addition, on previous versions of Windows, printers had to be managed on a per-server basis -there was no centralized printer management tool. This resulted in high costs in time and resources for the organization.
Windows Server 2008 addresses these issues with Print Management, an MMC snap-in that enables administrators to manage, monitor, and troubleshoot all of the printers within the enterprise network from a single interface, even those printers that are remotely connected to the network. When responding to remote printer issues, IT personnel do not have to rely on users at the remote site to check the printer and provide diagnostic information; the administrator can use Print Management’s easy-to-use console interface to access this information directly. It can also send e-mail notifications and run maintenance scripts when a printer or print server needs attention. Print Management can also access the Web interfaces of printers that support them.
Print Management can be used with Group Policy to automatically one or many desktop computers to network printers. IT administrators do not have to install and configure printers on each desktop computer, and this optimizes IT resources and saves the organization time and money.
Print Management simplifies printer management duties, optimizing IT resources and reducing time and cost for the organization.
Increased Infrastructure Reliability with Server Core
Infrastructure servers perform tasks critical to the day-to-day operation of Windows Server-based enterprise networks, such as supporting the Domain Name Service (DNS), Active Directory, and the Dynamic Host Configuration Protocol (DHCP) service. Enterprise networks depend on the stability and optimal performance of infrastructure servers.
To meet these needs, Windows Server 2008 includes a new installation option called Server Core. Server Core installations contain only the functionality needed for the server’s task in the enterprise network. Functionality that is not strictly required for the server task is not included. The Server Core installation option is available for the following roles: * Hyper-V * IIS 7.0 * Dynamic Host Configuration Protocol (DHCP) server * Domain Name System (DNS) server * File server * Active Directory Domain Services (AD DS) * Active Directory Lightweight Directory Services (AD LDS) * Windows Media Services * Print Server Because Server Core runs with a minimal set of installed functionality, less maintenance, fewer software updates, and fewer restarts are needed. Server security is enhanced as running less code reduces the attack profile of the server.
Server Core’s minimal server implementations increase network security and performance, reducing an organization’s maintenance and support costs and allowing organizations to run critical infrastructure servers in their most reliable configuration.
Valero Energy Corporation is North America’s largest refiner of oil and gas products. By using the Server Core installation option, Valero is anticipating significantly reduced downtime for maintenance at the refineries. “Server Core goes a long way in reducing the amount of security updates we have to apply, by reducing the number of components that need updating on a regular basis,” says I/S Project Manager Shawn Crow.
High Availability for Business Continuity
Organizations are increasingly expected to provide continuous service to its customers with no unplanned downtime. The goal of high availability service is to ensure that mission-critical applications and the servers that host them are always available to employees, partners, and customers. If downtime occurs due to unforeseeable events, such as power outages or hardware failures, it is important that a fast and effective recovery mechanism be in place.
High availability is built into many of the enhancements of Windows Server 2008. Failover Clusters, Network Load Balancing, and new backup and restore features ensure that mission-critical applications, services, and company data are always available.
Ensuring High Availability Through the Use of Failover Clusters
Failover clusters are a group of servers that work together to ensure high availability of mission-critical applications and services. If one server fails, another server in the cluster takes over its functions and services. Failover clusters are a key component in any high-availability scenario, but can be difficult and expensive to maintain.
Windows Server 2008 saves time and simplifies the deployment of failover clusters by making it easier to get the initial configuration right the first time. Cluster management tools with intuitive, task-based interfaces and administration wizards simplify complex administration tasks. One of these tools will verify whether an organization’s network environment is suitable for a failover cluster before any substantial investment is made in planning and implementing the cluster. If the network can support a failover cluster, another tool enables IT administrators to create one in one step. When the cluster has been created, administrators can make additional storage available for applications and services running on the cluster without shutting down the cluster or affecting the applications and services.
The latest technologies in network data encryption and authentication have been implemented in Windows Server 2008 clusters to protect the corporate data assets stored on the cluster servers. The Network Load Balancing (NLB) technology incorporated in Windows Server 2008 distributes the workload of client and server applications between servers in the failover cluster so that critical applications and services remain available for employees and customers, and run quickly and reliably.
Windows Server 2008 simplifies the deployment and management of failover clusters and improves their performance, security, and reliability. IT administrators can focus on managing applications and services rather than on managing the cluster.
Ensuring High Availability with Hyper-V
Hyper-V brings new benefits to enterprises that rely on server clusters for high availability performance. In virtualization technology, the physical computer is called the host, and an operating system running on a host is called a guest. Using Hyper-V, several guest operating systems can run on a physical host as a cluster, providing all of the benefits of server clustering with fewer physical servers. Using System Center Virtual Machine Manager, IT administrators can quickly test and deploy virtual server clusters, and even perform maintenance and configuration tasks without disrupting service.
Hyper-V offers high availability for virtual machines through its Guest Clustering and Host Clustering capabilities. Host Clustering ensures that, if the host goes down, all guest operating systems running on that server are automatically restarted on another host. With Guest Clustering, if a guest operating system fails, another guest on the same host or on a different host will automatically take over its operations.
Enterprises can use Host and Guest Clustering to easily implement high availability in their network while reducing costs and optimizing the time of their IT personnel.
Improved Backup Technology
Windows Server 2008 introduces new backup and recovery technology that includes new maintenance wizards, which make it easier and faster for IT personnel to schedule backups and restore data. Windows Server 2008 provides the backup and recovery solutions needed to complete a high-availability solution that protects both the organization’s data and the operating systems on the servers in the network. It also ensures that mission-critical data is accurately backed up and that recovery efforts are fast and error-free.
Improved Power Savings
Newer processors include power management functionality that can help companies to achieve this goal if the operating system provides access to this functionality to users and IT managers. Windows Server 2008 includes power management features based on mature and reliable technology that offer considerable power savings with negligible impact to performance or responsiveness, significantly reducing overhead costs.
Summary
Windows Server 2008 gives businesses comprehensive control over all aspects of their corporate network environment and protects and enhances security. With built-in virtualization technology, Windows Server 2008 enables organizations to reduce costs, optimize hardware utilization, and improve the availability of services and applications. It is also a powerful Web application and services platform that delivers rich, Web-based media content. Organizations that need to provide fast and secure remote connections are well served by the advanced Terminal Services technology that is an integral part of Windows Server 2008.

--------------------------------------------
[ 1 ]. (Gillett, Yates, Speyer, Brown, Atwood, & Batiancila, October 11, 2006)
[ 2 ]. CIO Magazine,”Learn to Trim Costs Strategically”, http://www.cio.com/article/22396/Learn_to_Trim_IT_Costs_Strategically.
[ 3 ]. IDG White paper. (Need reference info)
[ 4 ]. http://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=4000000664
[ 5 ]. http://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=4000000648
[ 6 ]. http://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=4000000730
[ 7 ]. http://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=4000000664
[ 8 ]. Vetter Health Services Case Study
[ 9 ]. Manteca Unified School District Case Study
[ 10 ]. Manteca Unified School District Case Study
[ 11 ]. Vetter Health Services Case Study
[ 12 ]. http://www.port80software.com/surveys/top1000webservers/
[ 13 ]. http://www.iis.net/spotlight/customer.aspx?Customer=Pipex
[ 14 ]. http://www.iis.net/spotlight/customer.aspx?Customer=DiscountASP
[ 15 ]. MaximumASP Case Study
[ 16 ]. MaximumASP Case Study
[ 17 ]. Southern Star Central Gas Pipeline Case Study
[ 18 ]. Applied Innovations Case Study
[ 19 ]. http://www.cio.com/webcast/148755/Preventing_High_Profile_Data_Breaches_A_Root_Cause_Approach
[ 20 ]. Fulton County Case Study
[ 21 ]. Fulton County Case Study
[ 22 ]. Fulton County Case Study
[ 23 ]. JupiterMedia, DRM in the Enterpise, May 2004.
[ 24 ]. JupiterMedia, DRM in the Enterpise, May 2004.
[ 25 ]. JupiterMedia, DRM in the Enterpise, May 2004.
[ 26 ]. IDC Quarterly Server Tracker.
[ 27 ]. Eweek.com, “Linux Losing Market Share to Windows Server”, http://www.eweek.com/article2/0,1759,2207368,00.asp.
[ 28 ]. Molinos Modernos Case Study
[ 29 ]. Holzer Clinic Case Stuidy
[ 30 ]. Holzer Clinic Case Study
[ 31 ]. The Tolly Group, June 2007 Source: http://download.microsoft.com/download/4/b/4/4b455e48-72c4-4a04-b9a5-892fd497087a/TollyResults.pdf
[ 32 ]. http://blogs.technet.com/windowsserver/archive/2007/11/21/some-cool-networking-numbers-with-windows-server-2008-file-transfers.aspx
[ 33 ]. Valero Energy Corporation Case Study…...

Similar Documents

Free Essay

Broken Windows

...Broken-window concept and social disorder The broken-window concept is a criminological theory introduced by James Q. Wilson and George L. Kelling in the 1982 article “The police and neighborhood safety: Broken windows.” This concept explores the effects of social disorder as it relates to community life. More importantly, it correlates the relationship between public vagrancy and the quality of community life and social norms. It is necessary to define disorder and social norms in order to examine how the broken window theory requires not only police participation, but also that of neighborhood citizens’, and how establishing order is crucial for preventing further neighborhood deterioration. For the purpose of this paper, the author considers social norms and disorder as […] the perception of common approval or disapproval of a particular behavior in general (e.g., the concept of not littering) or one common in a certain surrounding (e.g., littering in an already littered setting). These two types of social norms are not necessarily in agreement. For example, while littering may be frowned upon, there may be a lot of litter in a particular location. […] scientists define disorder as a conflict between these two types of social norms (Keizer, 2008). With this definition as a source, the broken window theory investigates how a broken window can lead to more broken windows; in other words, how social behavior influences an area in particularly. Social disorder is......

Words: 781 - Pages: 4

Free Essay

Windows

...to test because an isolated lab environment usually can emulate many of the factors that can affect the performance of a directory service. | | Definition FALSE | | | Term Active Directory was first introduced in which operating system? | | Definition Windows 2000 Server | | | Term Where do users log in when joining an Active Directory domain? | | Definition domain | | | Term There are two basic classes of objects in an Active Directory domain. Which of the following is an object? | | Definition Leaf | | | Term Which of the following is a main group type found in Active Directory? | | Definition security | | | Term Which group is used most often when designing an Active Directory infrastructure? | | Definition Security | | | Term Which group is used for nonsecurity-related functions, such as sending email messages to a collection of users? | | Definition distribution | | | Term DNS naming limitations call for a maximum of how many characters per domain name? | | Definition 63 | | | Term What type of compatibility are functional levels designed to provide in Active Directory installations running domain controllers with various versions of the Windows Server operating system? | | Definition backward | | | Term What is the name of the communications protocol called for by the original X.500 standard? | | Definition Directory Access Protocol | | | Term The Read-Only Domain Controller (RODC)......

Words: 1908 - Pages: 8

Premium Essay

Window Dressing

...statements also can be. Depending on the corporation, this information can be presented in a way that reflected an image according to the user’s needs, in other words, present the information that users want to see. In this sense, is important to know that this information is not always the most real neither the better. By definition Window Dressing is: “Window dressing is a set of actions or manipulations with financial or other information in financial documents (financial statements, reports, etc.) to make this information look more attractive to its users. Even though window dressing can occur at any time, it is commonly used at the end of a period.” The Window Dressing effect is a “fashion phenomenon” because its use has appeared in recent years in the media as really famous financial scandals around the world, like Enron, Worldcom, Parmalat and others. When Window Dressing is used in good terms and presented according to legal norms it could be a useful tool for the corporations, otherwise, the malicious use could end in frauds and illegal issues with serious consequences for the people involved. Window Dressing The Window Dressing effect can be divided into two types of accounting:  Creative Accounting Is a legal system that use the deficiencies in the accounting system to satisfy the needs in the short term and to achieve diverse objectives by the transitory use.  Fraud Accounting Sanctioned by the law, are the adjust of transactions and other......

Words: 3415 - Pages: 14

Free Essay

Windows

...INTRUCCIONES: En esta versión de Windows. No debería más que necesitar el serial si haces los pasos correctamente. Sin embargo se agrega el generador de seriales que debes correr en caso de que necesites generar más seriales. 1.- Lo primero que debes saber es que no puedes utilizar estas aplicaciones de adobe si estas conectado al internet. Cosa que resulta bastante fastidioso si es tu máquina de trabajo principal. Así que debemos aislar el ADOBE del internet virtualmente. Para ello vamos a modificar el archivo HOST del sistema, el cual resuelve las direcciones IP hacia el internet. - Abrimos el Notepad, nos vamos al menú y buscamos la opción “Abrir”. - Copia y pega esta dirección dentro del campo de dirección de archivo dependiendo de tu Windows: Windows 95/98/Me c:\windows\hosts Windows NT/2000/XP Pro c:\winnt\system32\drivers\etc\hosts Windows XP c:\windows\system32\drivers\etc\hosts Windows Vista c:\windows\system32\drivers\etc\hosts (Para editar el host en vista debes abrir el Notepad con privilegios de administrador. Para hacer eso debes presionar el botón derecho sobre el Notepad y seleccionar abrir como administrador). Si no tienes el sistema instalado......

Words: 457 - Pages: 2

Free Essay

Broken Window

...Title registration for a review proposal: Broken Windows Policing to Reduce Crime in Neighborhoods Submitted to the Coordinating Group of: _X Crime and Justice __ Education __ Social Welfare __ Other Plans to co-register: _X No __ Yes __ Cochrane __ Other __ Maybe TITLE OF THE REVIEW Broken Windows Policing to Reduce Crime in Neighborhoods BACKGROUND Briefly describe and define the problem Crime policy scholars, primarily James Q. Wilson and George L. Kelling, and practitioners, such as Los Angeles Police Chief William J. Bratton, have argued for years that when police pay attention to minor offenses—such as aggressive panhandling, prostitution, and graffiti—they can reduce fear, strengthen communities, and prevent serious crime (Bratton & Kelling, 2006; Wilson & Kelling, 1982). Spurred by claims of large declines in serious crime after the approach was adopted in New York City, dealing with physical and social disorder, or “fixing broken windows,” has become a central element of crime prevention strategies adopted by many American police departments (Kelling & Coles, 1996; Sousa & Kelling, 2006). In their seminal “broken windows” article, Wilson and Kelling (1982) argue that social incivilities (e.g., loitering, public drinking, and prostitution) and physical incivilities (e.g., vacant lots, trash, and abandoned buildings) cause residents and workers in a neighborhood to be fearful. Fear causes many stable families to move out of the neighborhood and the remaining residents...

Words: 2512 - Pages: 11

Premium Essay

Research Windows on Gender Mainstreaming

...|RESEARCH WINDOWS ON GENDER MAINSTREAMING | | | | | | | |Dr.M.Neeraja Venkat MBA,PGD-IRPM,Ph.D | |Worked as an Assistant professor, Dept.of Business Administration, | |Sri devi women’s Engineering college ,Hyderabad . | |Mobile: +254771888277, Email:tummalaneeraja@gmail.com. | | | | ......

Words: 2174 - Pages: 9

Premium Essay

Windows Server 2008 Zone Research

...Microsoft Research Assignment 2 Monday, Feb 2nd, 2015 1. The purpose of the Global Names Zone in Windows server 2008 is used to hold single label names. The Global Names zone is intended to provide single-label name resolution for a limited set of host names, typically corporate servers and web sites that are centrally managed. The Global Names zone is most commonly used to hold CNAME resource records to map a single-label name to a Fully Qualified Domain Name (FQDN). Global Names Zone functionality is not intended to fully replace Wins. GNZ provides single-label name resolution whereas WINS provides NetBIOS resolution. 2. Because the DNS server that runs on an RODC cannot directly register client updates, it has to refer the client to a DNS server that hosts a primary or Active Directory-integrated copy of the zone file. This server is sometimes referred to as a "writable DNS server." When a client presents a Find Authoritative Query, which is the precursor to an update request, the DNS server on the RODC uses the domain controller Locator to find domain controllers in the closest site.  The RODC then compares the list of domain controllers that is returned with the list of name server (NS) resource records that it has. The RODC returns to the client the NS resource record of a writable DNS server that the client can use to perform the update. The client can then perform its update.  If no domain controller in the closest site matches an entry in the......

Words: 985 - Pages: 4

Premium Essay

Broken Windows

...The Broken Windows Research Paper Graffiti on walls, trash in the sidewalks, loitering in the corner, drunks roaming in the streets and prostitutes attracting customers on the same sidewalks children walk to school on. From a certain perspective, it is viewed as minor crime something the community shouldn’t worry about. Sooner or later though that graffiti attracts more territorial vandals fighting for dominance over the streets, probably the worst trash there is. The worst thing that will occur however is still to come, the community will no longer feel at home and feel more and more distant, the city gives an image that no one cares,(community policing, pg. 64) and the citizens will start feeling the same and feel as if everything bad can get tolerated, crime rates go up and morale goes down. However there is something that can be done, a phenomenon that will give end to this non sense and incivilities; The Broken Windows theory. The Broken Windows theory introduced by social scientist James Q. Wilson and George L. Kelling states that in order to maintain control of crime in the community. Law enforcement should enforce small crimes (“petty”) in order to prevent bigger crimes from happening. Law enforcement prevents small crimes by emphasizing aggressive enforcement, sweeps, arrests, tickets, and using tactics such as directed patrol and selective enforcement. One in which you deter the crime problem by heavy policing which is usually more expensive to a department.......

Words: 1318 - Pages: 6

Premium Essay

Window

...THE COMMUNICATION OF WINDOW DISPLAY - H&M - UNIQLO YAN14434663 CHIH LING, YANG ABSTRACT This research presents a comparison of the window displays in two different high-street fashion retail brands. H&M is one of the best-known western fashion retailers, while UNIQLO is a fashion retail brand from Asia which has successfully accessed the western market. This research will focus on these two brands’ different visual merchandise strategies and their window layouts during different periods. The results show how these two fashion brands from different cultural backgrounds convey their message to customers. INTRODUCTION The designer creates the product, while visual merchandising gives the product new life. In the sales terminal, window displays not only deliver the brand culture to the customer, but they are also responsible for increasing sales for the company and attracting potential customers. In an aesthetic point of view on display throughout the product content, value and performance, but also presents the brand itself. The purpose of visual merchandising is to promote the store image—to let people know what the store is, where it stands on fashion trends, what one can expect from it, to whom it appeals, its price range, and the caliber of its merchandise and merchandising (Martin M. Pegler 2012, p.3). Nowadays, the high-street fashion market has become more competitive, and every fashion brand has its own brand identity, so it is important......

Words: 3973 - Pages: 16

Free Essay

Windows

...David Langham NT1110 Lab 1-1 Upgrading for the Best Windows 8 has not been good for most windows users. You as a user are to like the operating system that is setup with the computer you use the most. When choosing an upgrade to do first, think about what you can afford and what you will need the quickest. With each operating systems comes a different upgrade for each one. Windows, Linux, and MAC OX is always sending new updates just to compete with the other operating systems. When want to upgrade, you must first know what your computer is running currently. My computer is running windows 8.1, if I wanted to upgrade, I would go to windows 8.1 PRO. You should also research what specifications your computer must have to run that operating system. You may have to upgrade your RAM in order to keep the operating system running correctly. With wanting to upgrade your RAM, know what you have now. My operating system requires .10 GB of RAMS of background space. I have 4.00 GB installed on my laptop. If I wanted to upgrade my RAM, I would look for the highest amount of GB allowed in my computer. I would upgrade to 16 GB of RAM just to give me the fastest speed possible on my computer. With speed comes great power. With upgrading RAM, It would be highly suggested to upgrade the processor. Intel is one of the most command processor in the computer field. I currently am using an Intel Pentium. When wanting to installed a bigger processor to process quicker. I would like...

Words: 483 - Pages: 2

Free Essay

Windows

...Your familiar Windows, taken to the next level. Your advanced guide to Windows 8.1 For Windows 8.1 Update The familiar, made better. With the new Windows, you have everything you need to work efficiently. Your familiar desktop is better than ever with advanced functionalities, like the new customizable taskbar and streamlined file management. Internet Explorer 11 gives you instant and fluid access to the world. And best of all, you can use all these features feeling confident that your important data is secure. Whether you are collaborating on a large project, preparing for an upcoming conference, or traveling for work, you can use touch, mouse, and keyboard together—seamlessly—to accomplish your every task. With the advanced features of Windows 8.1, you can get the most out of your device. Windows works the way you want it to. Dive deeper into the desktop. From the Quick Link menu, you can accomplish traditional tasks (like signing out of the device), or you can tackle more advanced tasks in Task Manager and Control Panel. You can even access File Explorer to manage your files and folders with ease. To access the Quick Link menu: Press and hold the Start button. Right-click the Start button. Press + X. View the drivers installed on your device, update drivers, check to see if hardware is working properly, and modify hardware settings. View apps and programs currently running on your device. Adjust your device’s system and security settings, network preferences,......

Words: 2847 - Pages: 12

Premium Essay

Windows Server

...Windows Server Deployment Proposal Overview Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.  Scenario Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WAI with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WAI wishes to implement the “right” solution to fit their needs now and for the next 2-3 years. There are several details about WAI which will have an impact on your choices: * WAI will start with 110 employees, in the following departments: * Executives (9 employees) – manage and run the company * Accounts and Sales Department (15 employees) – perform market research and maintain accounts * Creative, Media and Production......

Words: 1074 - Pages: 5

Premium Essay

Windows 7 Research Paper

...Windows 7 I’ve had the chance to work with most mainstream operating systems that today has to offer and after exploring all the options I feel most satisfied with what Windows 7 has to offer. Whether you’re new to Windows or just upgrading, the benefits of switching are endless, ranging from new features to performance improvements, even the basic appearance. First, the new features that Windows 7 has introduced have pretty innovative ideas including Device stage; which works like a homepage for your portable devices, better wireless; stronger more stable connections, and easy sharing from a simple feature called HomeGroup that allows you to share music, pictures, and documents across your network with little hassle. The new features help simplify Windows 7 so that even the basic user can comprehend and navigate around the computer. Secondly, the performance improvements in Windows 7 take up less memory and run background services only when you need them, making it “built for speed”. It’s designed to run your programs faster and to sleep and resume quicker. Adding to the great performance improvements, USB drives can be detected faster and will be ready to use in seconds. These features are sure to guarantee more efficient performances throughout the operating system. Finally, with the new appearance including a better desktop, Windows 7 will be able to get you around your computer faster than ever. The taskbar has bigger buttons and full-sized previews. There’s also...

Words: 355 - Pages: 2

Free Essay

Window

...Windows Enabler Overview: Windows Enabler is a program that runs on Microsoft Windows 95/98/Me/NT4.0/2000. It allows the user to enable disabled windows and controls such as buttons and tick boxes and choose menu options that would normally be disabled. This is obviously a very dangerous practice if used recklessly but having said that, you’d be surprised at how often it comes in handy. Windows Enabler has a very simple user interface; it appears as an icon in the system tray and can be turned on and off simply by clicking on it. Windows enabler may be freely distributed as long as the entire package (or a superset) is distributed unaltered. Installing: Windows Enabler is a very simple utility and does not ship with an install program. The installation process is simple; just copy the two files (“Windows Enabler.exe” and “EnablerDLL.dll”) somewhere on your system and run “Windows Enabler.exe” to run the program. I normally place a shortcut to “Windows Enabler.exe” in my “Startup” program group so Windows Enabler is always available! Windows enabler does not make any registry entries or use any data files so uninstalling is accomplished by simply deleting its files (“Windows Enabler.exe” and “EnablerDLL.dll”). Using Windows Enabler: To run Windows Enabler execute the file “Windows Enabler.exe”; the simplest way to do this is to place a shortcut to it somewhere on your system such as the desktop, the start menu or the “Startup” program group. When Windows Enabler...

Words: 595 - Pages: 3

Premium Essay

Window 7

...of several stand-alone machines installed with Windows 7 Home Premium. Write a two to three (2-3) page paper in which you analyze and solve the following issues: Mr. Green recommends installing the Windows 7 Ultimate version since he believes all the networking features he requires can be provided by this “ultimate” version. Mr. Green’s stand-alone machines consist of 2 GHz processors, 4 GBs of system memory, and approximately 350 GBs of free hard drive space. At the same time, Mr. Green is concerned that this potential new edition may not be the correct one for his needs although he wants to experiment with it and be able to resort back to the previous version, if possible. 1. List and explain the concerns about Windows 7 Ultimate’s capabilities that Mr. Green should be aware of currently. 2. List and explain the concerns about Windows 7 Ultimate’s capabilities that Mr. Green should be aware of down the line as his business and network grows. 3. Use Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Note: The graphically depicted solution is not included in the required page length. 4. Explain your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. 5. Describe the concerns you have about helping Mr. Green experiment with Windows 7 Ultimate without requiring a commitment to......

Words: 910 - Pages: 4