ppt - Common Solutions Group

advertisement
Common Solutions Group Workshop:
Managing Large Environments
Introduction and Background
Susan Grajek, Yale
Steven Sather, Princeton
2
Overview of Today’s Workshop
1. Introduction and background
2. Managing desktop security
3. Asset and inventory management
4. Mobile device management
5. Wrap up, next steps
3
Workshop goals
• What are managed environments?
• Where do we stand today?
– Challenges
– Best practices
• What are the benefits of managing
environments?
4
What are managed environments?
• Ad hoc Managed Device group met in Chicago in July
– Brown: Karen Asquith & Alan Usas
– Chicago: Greg Anderson, Corey Liss & Kevin Vaccaro
– Duke: John Cook
– Princeton: Charlayne Beavers, Phil Immordino & Steven Sather
– Stanford: There in spirit!
– Virginia Tech: Bill Plymale
– Yale: Lee Fontaine, Susan Grajek & Adriene Radcliffe
5
Chicago workshop recap
Goals
• Define managed devices
• Describe best practices
• Identify opportunities for collaboration
6
Defining device management

Security
–
–
–
–
–



•
•
•
•
≠
Initial Configuration
Patching/Updates
Access Control
Malware (virus/spyware)
Privacy (encryption, hipaa)
Application deployment
Inventory and asset management
Image management
Data integrity
Remote assistance
Connectivity and registration
Software and licensing
(Accounts Management)
7
Management environments
Fully managed
•
Dumb terminals, thin clients.
•
No data or local applications other than those that
facilitate access.
Wide open
•
End users have administrative privileges at both the
application and operating system levels.
•
Applications and data are stored locally.
•
No common base configuration.
•
Subscription and self-service tools unlikely to be
available, so machine is managed manually.
•
No up-front prohibited protocols, devices, applications,
or actions (but machine will be disconnected if it causes
a problem to the rest of the network).
8
Application
storage
Data
Updates
storage
Common base
configuration?
Admin
privileges
Fully
managed
Centrally
Centrally
Complete
To central
configuration
None
Locked
down
Locked down or
served centrally
Centrally
Updated image
Delivered
centrally
None
Secure
Local or centralized
Locally
Initial image,
some updates
Subscription to
managed
updates
None, but
options for
configuring
Open
managed
Locally
Locally
Initial image
Managed
updates or use
self-service
tools
Application,
OS or both
Open
unmanaged
Locally
Locally
None
Self-service
tools or manual
Yes, some
few
prohibitions
Wide open
Locally
Locally
None
Manual
Yes, no
prohibitions
9
Results of CSG Survey
10
24 respondents for 21 Schools and EDUCAUSE
•
•
•
•
•
•
•
•
•
•
•
•
•
Brown University
Carnegie Mellon University
Columbia University
CU-Boulder
Duke University
Harvard - Central Administration
Indiana University
MIT
Princeton University
Stanford University
University of Chicago
University of Delaware
University of Michigan
–
–
•
•
•
•
•
•
•
•
•
Campus Computing Sites
Health System
University of Minnesota
USC
University of Texas @ Austin (two submissions, data averaged)
University of Washington
University of Wisconsin-Madison
University of Virginia
Virginia Tech
Yale University
EDUCAUSE
11
Desktop Management Environments
Faculty
% current
Staff
% potential
Configuration
% current
Students
% potential
% current
% potential
1. Fully
managed
0
1
0
2
0
1
2. Locked down
8
12
11
19
7
10
3. Secure
11
25
27
42
4
2
4. Open
managed
34
45
35
28
14
44
5. Open
unmanaged
47
18
27
9
75
43
12
Some highlights
• University of Michigan reports 100% locked down
for faculty, staff and students
• Four schools reported more than 80% of faculty
machines are fully unmanaged:
–
Chicago, Delaware, USC, CU-Boulder
• Only three schools guessed that faculty machines
could be fully managed:
– Stanford (10%), UT-Austin (2%) and UVa (1%)
• Two-thirds of schools believe that at least 50% of
student machines could be at least partially
managed.
13
14
Different tools and processes will work in
each environment.
15
Process used
Mapped each device management activity
(e.g., application deployment) against each
environment to:
• describe what each of us is currently doing
• consider other, additional options
• draft best practices for each environment
16
Example: Application deployment

Most managed

Locked down

Secure

Open
managed

Open
unmanaged

Wide open































Thin client apps delivery
Imaging
Minimum requirements
Imaging (initial setup and changes)
Thin client apps delivery
Subscription-based updates (GPO’s, SMS, WSUS, etc) -required
Software virtualization
Minimum requirement
Thin client apps delivery
Subscription-based updated (GPO’s, SMS, WSUS, etc) -required
Imaging – initial setup only
Installers mediated by technicians (technician activation)
Software virtualization
Minimum requirements
Thin client apps delivery
Subscription-based updated (GPO’s, SMS, WSUS, etc) -recommended
Imaging – initial setup only
Installers mediated by technicians
Software virtualization (self-activation)
Bundle on CD’s
Minimum requirements
Imaging
Minimum requirements
Subscription-based updated (GPO’s, SMS, WSUS, etc) -recommended
Thin client apps assigned
Installers
CD bundles
Software virtualization contingent on image
Technician mediated (optional)
Installers (written for minimums)
Bundle on CD’s
17
Summary of management tools and processes
• Managed update tools (SMS, Zenworks, GPOs,
WSUS, Shavlik)
• Manual update (end user or technician)
• Self-service configuration tools
• Images
• Remote data wipe
• Tools to enable end-users select their management
preference
• Installers
• Software virtualization
• Thin client applications delivery
18
Summary of management tools and processes
• Network quarantine
• Life cycle management (leasing, mediated
purchasing and disposal)
• Asset management tool
• Vendor-supplied data
• Bundle on CDs
• Mac address/network registration
• Published guidelines
• Site licenses
• Minimum requirements
19
Results of CSG Survey
20
Which practices and tools are we using?
Remote data wipe for compromised laptops
Tools for users to manage deployment prefs
Application virtualization
Thin client applications delivery
Vendor data integrated w. asset management data
Self-service installers, etc. on C Ds
Network quarantine for unpatched machines
Web-based self-service installers & config. tools
Life cycle management
Minimum hardware and software requirements
End-user guidelines for managing devices
Asset management tool
Images
Manual update (by end users or technicians)
Update tools
Registration of Mac addresses
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100
% of schools using
%
21
How widely are we deploying tools & practices?
Application virtualization
Remote data wipe for compromised laptops
Thin client applications delivery
Tools for users to manage deployment prefs
Vendor data integrated w. asset management data
Self-service installers, etc. available on C D
Asset management tool
Manual update (by end users or technicians)
Life cycle management
Images
Web-based self-service installers & config. tools
Update tools
Network quarantine for unpatched machines
Minimum hardware and software requirements
End-user guidelines for managing devices
Registration of Mac addresses
<20%
20-50%
50-80%
% of devices used with
>80%
22
How widely are we deploying tools & practices?
16
14
12
10
8
6
4
2
0
23
Questions?
24
30
Download