Scriptlogic - Implementing Windows Vista
Scriptlogic - Implementing Windows Vista
® 2007 ScritpLogic®
Chapter 2
Selected Vista Features?.........................................................................17
Introduction ...............................................................................................17
Security .......................................................................................................17
Security Development Lifecycle..................................................................17
Windows Services Hardening.....................................................................18
User Account Control .........................................................................................18
Windows Defender ......................................................................................20
Network Access Protection................................................................................22
Data Protection and Encryption .................................................................23
Other Security Enhancements ...................................................................25
Networking..................................................................................................27
New TCP/IP Stack .......................................................................................27
Simpler connectivity ..........................................................................................28
Higher security ...................................................................................................28
Improved Manageability ....................................................................................28
Management and Control .........................................................................29
Microsoft Management Console (MMC) ..........................................................29
Windows Eventing Architecture.........................................................................29
Increased Automation.................................................................................................32
New Group Policy Management........................................................................33
Reliability and Performance Monitoring ...........................................................35
Feature Assessment ..................................................................................38
Vista’s new features. .................................................................................39
Summary. ...........................................................................................40
® 2007 ScritpLogic®
Chapter 3
Preparing and Planning for Deployment ..............................................41
Introduction..............................................................................................41
Tell me again: why are we doing this?.............................................41
Planning Methodology......................................................................43
Application Compatibility..................................................................44
Application Management/Deployment ...........................................46
Define Computer Imaging System ...................................................47
Choosing an Image Strategy .....................................................................47
Deployment Planning .......................................................................48
Select the appropriate deployment scenarios. ........................................48
Ensure that the required infrastructure exists.........................................48
Determine the monitoring plan.................................................................49
Infrastructure Remediation (Preparation) ......................................49
Gather and Analyze Infrastructure Inventories ........................................49
Propose Infrastructure Modifications.......................................................49
Security Planning..............................................................................49
System Security Settings...........................................................................50
Planning User Account Control..................................................................51
Planning Windows Firewall ........................................................................51
Planning Data Encryption..........................................................................52
Restricting the Use of Removable Storage Devices ................................53
Planning Windows Defender .....................................................................53
Third-part Security Applications................................................................53
Infrastructure and Deployment Security ..................................................53
® 2007 ScritpLogic®
Chapter 3 continued
Testing ...............................................................................................54
Lab Requirements .....................................................................................54
Bug Rating, Reporting, and Tracking ........................................................54
Change Control ..........................................................................................54
Test Schedules...........................................................................................54
Training..............................................................................................55
Training Requirements ..............................................................................55
Training Schedule ......................................................................................55
Training Methods .......................................................................................55
Materials and Resources ..........................................................................56
User State Migration ........................................................................56
Application Inventory and Prioritization....................................................56
Identify Application Files and Settings .....................................................56
Identifying Operating System Settings......................................................57
Develop and Test........................................................................................57
Summary...........................................................................................58
® 2007 ScritpLogic®
Chapter 4
Deployment ..............................................................................................59
Introduction.......................................................................................59
Vista Deployment Technologies.......................................................59
Modularization ...........................................................................................59
Windows Image Format (WIM)..................................................................60
Nondestructive imaging ............................................................................61
XML-based answer files.............................................................................61
Script-based installations..........................................................................62
The Windows Automated Installation Kit (WAIK)............................62
ImageX........................................................................................................63
Windows Preinstallation Environment (WinPE)........................................63
Windows System Image Manager.............................................................63
Windows Deployment Services (WDS). ....................................................65
Windows Business Desktop Deployment........................................66
Light Touch Installation (LTI) .....................................................................66
Zero Touch Installation (ZTI) ............................................................................66
Comparing LTI and ZTI ...............................................................................67
Summary...........................................................................................68
® 2007 ScritpLogic®
Introduction
Even before its release for mainstream consumer use, much of the hype behind the launch of Microsoft’s
latest operating system—Windows Vista—has settled. Five years of development and millions in
marketing have come to an end, now it’s time to get down to some serious evaluations and answer some
serious questions: When should we deploy Windows Vista? What’s our return on investment? What kind
of resources will it take to implement it?
These are tough questions to answer, especially for IT professionals responsible for hundreds or
thousands of Windows desktops in an enterprise environment. Not only is Vista the most complex release
of Windows in Microsoft’s history, but it will also have a huge impact on infrastructure of an enterprise.
Vista requires a lot more computing power, memory, and graphics than its predecessors. On the upside, it
contains features that increase security, improve end users’ productivity, and tools that simplify and
accelerate deployment and maintenance.
Providing information that will help IT professionals decide when to deploy Vista, and what
methodologies to use, is the overall objective of this eBook. We are especially interested in providing
information to IT organizations that manage a large population of desktops across an enterprise. These
organizations are responsible for maintaining (or increasing) satisfaction and productivity of the user
community, reducing costs, and hitting bottom-line budgets, all while performing what is probably the
largest operating environment migration in any organization’s history.
In this eBook we will cover some basics, such as “What exactly is Windows Vista?” and “How should
we plan for deployment?” Looking deeper into the impact on an enterprise, we’ll cover significant areas
of change, including security, management and operations, and networking differences. Finally, we’ll
discuss specific deployment methodologies, tools that are available, and different ROI scenarios. So
buckle up, grab some manuals, and let’s begin!
® 2007 ScritpLogic®
Chapter 1
What is Microsoft® Windows® Vista™?
Background
Windows Vista is the latest release of Microsoft’s Windows operating environment. According to
Microsoft, the name “Vista” was chosen because it delivers a “personal vista” for its users. Referencing
the Merriam-Webster dictionary, a vista (noun) is “a distant view through or along an avenue or
opening”—although the best definition we’ve seen is more along the lines of “a pleasing view, especially
one seen through a long, narrow opening.” Regardless, the implication is that the experience will be
pleasing, productive, and safe. Microsoft wants consumers to think of Vista as something that will bring
clarity to their world, allowing the users to focus on what’s important (instead of the focusing on the
tools that get them there).
Vista development began in late 2001, and was based on the then-Windows XP code base. Microsoft had
multiple goals in the next release of Windows, notably 64-bit capabilities, a new file system, improved
reliability and security, and a revamped user interface. However, in mid-2004, Microsoft reset the code
base, largely because of difficulties in keeping up with the rapid changes that were occurring in Windows
XP (e.g., Service Pack 2). With the reset, Windows Server 2003 became the new base for Vista
(codenamed “Longhorn1”). Vista ended up being based upon large portions of Windows XP with Service
Pack 2, especially in the area of security, and Windows Server 20032.
Microsoft released various beta releases to developers throughout 2003-2005, with initial public release
to volume licensed users on November 30, 2006. During the preview period, Microsoft was making
decisions on what functionality would be included in the final release, and a fair number of features
never made the final release (or were packaged differently, more on that later). A new underlying file
system (WinFS), and a security framework based on the Next-Generation Secure Computing Base
(NGSCB) were notable omissions from the final release. It is generally acknowledged that Microsoft
scaled back the introduction of new technology in the interest of security and reliability of the initial
release of Vista.
What’s new
While there is a long list of new-and-improved features, Windows Vista is more than that. Microsoft has
gone to great lengths to improve overall acceptance of a computer, and its operating system, as an
integrated part of a user’s work and entertainment.
The Vista “experience”
Before we begin a feature-by-feature list, a short discussion about the overall “experience” of using Vista
is in order. Microsoft uses the word “experience” often in their Vista marketing materials. There is
obviously a concerted effort to more fully engage end users—to give them the feeling that the operating
environment is their friend (not dissimilar to what Apple has done with the Macintosh over the years).
From the box it
1The Windows XP codename was “Whistler,” and the codename for Vista was originally “Blackcomb”—both ski areas in
British Colombia. The current release of Vista was intended to be an interim release between the two; the codename
“Longhorn” came from a bar that is between the two resorts.
2“Windows Vista Product Guide,” November 2006.
® 2007 ScritpLogic®
comes in, to the startup screen, to the translucent, glass-like windows on the desktop, Vista has a much
more “modern” look to it (although you can dumb it down to the good old Windows XP look if you’re
inclined). There are new high-quality wallpapers, system icons, and new system sounds (composed by
Robert Fripp, one of the founders of progressive rock group King Crimson3)—all of which are design to
give users a feeling that Vista is designed for them, and will provide security, a pleasant experience, and,
well, a great vista of their computing world (sorry).
The experience isn’t limited to end user consumers. Vista sports a wide collection of new features,
cleverly packaged and marketed, to assure businesses of increased security, reliability, and productivity.
The “experience” is intentionally extended to include business owners and IT professionals.
A last important word about the Vista experience: it’s not free. All of this technology requires a great deal
of computing power. The new user interface takes one or more graphics cards that just a few years ago
would be considered high-end. And, of course, a basic premise of Vista is that the system is connected to
the Internet with a high-speed connection (although it’s not necessary, things work a lot more smoothly
with such a connection). However, Microsoft has cleverly made the need for new hardware less painful
by providing different experience levels based on your system’s hardware configuration (processor
speed, memory size and speed, etc.). In fact, there is a software tool that will measure your “Vista
experience index” based upon an inventory of the hardware available on your system4.
Packaging and Editions
Marketing 101 dictates that consumers are presented with a choice of options for a particular product.
First, it increases the likelihood of a sale when the consumer is asked to choose between option “A” or
option “B,” second, multiple options offer the vendor multiple price points and an opportunity to increase
profits. For example, many consumers were willing to pay incrementally more for Windows XP
Professional Edition over Windows XP Home Edition.
For the release of Vista, Microsoft stepped up the multiple-options concept a notch, and releases Vista in
multiple option levels, or “editions.” Conceptually, the different editions address different needs of the
diverse user base, allowing consumers to somewhat tailor the release to their specific needs. There are
essentially six editions of Vista5, described briefly below. For an overview of the feature set in each, see
Table 1.
Windows Vista Starter
“Starter” is designed for beginning PC users and low-cost, lower-level functionality. It is not currently
available in the United States or “other high income markets as defined by the World Bank.6”
3http://www.microsoft.com/whdc/resources/news/newsletters/MHN_012006.html
4http://windowshelp.microsoft.com/Windows/en-US/Help/f59082f4-6385-4a61-ba7e-2de9625a780a1033.mspx
5There are actually more, including some European editions that ship without Windows Media-related technologies.
6http://www.microsoft.com/windowsvista/getready/editions.
® 2007 ScritpLogic®
® 2007 ScritpLogic®
® 2007 ScritpLogic®
remain the same, interaction with them has become more intuitive and consistent across the entire
system. For example, the start menu is still in the lower left corner (sporting a new icon) and its basic
functionality remains the same.
The new Start Menu does have some improvements however; it features an interface to Desktop Search
(more on that, below), and access to applications has been streamlined away from the cascading “All
Programs” menu in Windows XP.
The main windows navigation tool—Explorer Windows—have been completely revamped to be more
streamlined, easier to use, and incorporate instant search.
Windows Sidebar and Gadgets are a way of managing “lightweight” utility applications from the
desktop. The translucent sidebar contains a user-selectable collection of mini-applications that provide
information or execute simple tasks (in fact, gadgets can be scripts) without opening an application. For
example, there are gadgets to provide current weather information, stock prices, and news headlines. All
are accessible from the sidebar, which can be hidden, on the desktop and resting below windows, or
always on top.
Windows Aero
Aero (Authentic, Energetic, Reflective and Open7) is large part of the Vista experience. On hardware that
supports WDDM, users are presented with a variety of professional visual effects, including translucent
windows (“glass”), dynamically minimizing windows, and live taskbar thumbnails. WDDM and Aero
provide higher screen resolutions, and smoother movement of windows as they are resized or moved.
7 http://windowsvistablog.com/blogs/windowsvista/archive/2006/11/09/the-sounds-of-windows-vista.aspx
® 2007 ScritpLogic®
Perhaps one of the more appealing Aero effects is Windows Flip and Windows Flip 3D. Windows Flip
is an update to Alt+Tab feature in Windows XP, used to navigate open applications. Windows Flip shows
live thumbnails of open windows instead of generic icons, making it easier to identify windows.
Windows Flip 3D, activated with the Start+Tab keys, dynamically displays all the open windows in a
three-dimensional stacked view. Even live processes (such as a video that is playing) are shown in the
thumbnails. The entire set of panes can be rotated and scrolled (in fact, you can even view the panes from
“the back”—seeing the live thumbnails in reverse!). Navigation is by arrow keys, mouse, or the scroll
wheel on the mouse.
Instant Search and Search Folders
Instant Search, and its related feature Search Folders, is an integrated search facility based on a behind-
the-scenes indexing capability. The indexing capability provides instant access to filenames, file
properties, and text within files.
Every Explorer Window contains an Instant Search field where the user may enter a word, part of a word,
or a phrase. Instant Search uses the index and performs a context-sensitive search based on the current
navigation location and the current activity, returning the results immediately in the open window. The
search can be cleared and a new one begun, or the user has the option of invoking an advanced search
(Figure 3), which allows further refinement of the search.
® 2007 ScritpLogic®
Instant Search criterion can be saved by creating a Search Folder—a virtual folder where the results of
the search are kept. Search Folders are updated in real-time, such that changes in files and folders are
immediately reflected in the Search Folder itself. For example, we could create a Search Folder that
contains documents that have been updated today; as document modification dates change (and
obviously the system time changes), different documents will appear in the Search Folder.
XML Paper Specification
Windows Vista introduces The XML Paper Specification (XPS), which is used as a document format, a
Windows spool file format, and a page description language (PDL) for printers. XPS is the basis for
entirely rewritten document handling and printing subsystems in Vista. Microsoft Office 2007 is based on
XPS, but XPS itself is platform independent, openly published, and available royalty-free.
Productivity
Changes in the UI are generally for productivity, however we also include a category of new features
specifically designed to increase users’ productivity. In many cases, these features are have similar
counterparts in Windows XP but with improvements and extensions.
Network and Sharing Center
As its name implies, the Network and Sharing Center brings all network and sharing configuration
options into one central location. It allows users to verify that they are connected to a network and
whether their system can successfully reach the Internet. The user’s view of the network can be
graphically displayed via a Network Map (Figure 4), which visually describes the systems, switches, and
routers on the network and how everything is interconnected.
® 2007 ScritpLogic®
Network settings can also be saved to a portable USB flash drive to make adding additional desktops to
the network a quick and easy process. Desktops can be configured to interrogate the configuration data
on the flash drive, allowing the desktop to join the network.
® 2007 ScritpLogic®
® 2007 ScritpLogic®
® 2007 ScritpLogic®
Reliability
Windows Vista has multiple improvements to reliability utilities, as well as some new functionality.
Backup and Restore Center
The Backup and Restore Center is a one-stop place to manage local backup and restore activities. For
users that do not have a centrally managed backup/restore process, it makes system backups easy and
automatic. The Backup and Restore Center allows users to specify a regular backup schedule, and to
backup selected files and folders, or to backup the entire system. Backup can be to CD, DVD, another
hard drive, or to another system over the network.
Shadow Copy
An innovation first introduced in Windows Server 2003 is that of Shadow Copy—incrementally saving
files that are changed or deleted with an easy-to-use interface that allows the user to selectively and
easily restore them. Shadow Copy creates copies of changed files on a scheduled basis, only saving
incremental changes to save disk space.
® 2007 ScritpLogic®
Shadow copy is accessed by right-clicking a file or folder and selecting Restore Previous Versions. It
allows the user to go back in time and access files and folders as they were on previous dates. Users are
provided with a read-only preview each file to determine which file to restore. When accessing a
previous version of a folder, users can browse the folder hierarchy as it was in a previous point in time.
Performance
Windows Vista supports multiple new features aimed at performance. Like much of the rest of Vista,
these features scale with the available hardware, and in some cases, anticipate hardware that will be
available in the future.
Vista incorporates a new control panel that provides a central point for maintenance of performance
issues, including an analysis of the system to determine the Windows Vista Experience Index (described
earlier).
Startup, sleep, and shutdown performance
Improvements have been made in startup and shutdown performance (over Windows XP). A new state—
sleep—provides a mechanism for turning the computer off without requiring a reboot to restart. The
system state is written to memory and disk, and will remain in memory as long as there is power to the
system. To save power, the disks and processor(s) are powered off. The benefit of Sleep mode is an
operational system within a few seconds after the user pushes the power button.
® 2007 ScritpLogic®
Windows SuperFetch
A new technology with Vista, SuperFetch is an intelligent memory management mechanism that attempts
to keep most-often used memory pages in memory. However, it goes beyond a simple last-used
algorithm; SuperFetch understands which applications are most often used (and even when certain
applications are accessed), and preloads these applications into memory to make their invocation faster.
Windows ReadyBoost
ReadyBoost is a quick way of making the system appear as if it has additional memory. ReadyBoost uses
a removable flash memory device, such as a USB thumb drive, to keep data that would normally be
placed out on a hard drive. System performance is improved because data on the memory device can be
accessed faster than out on the disk.
ReadyBoost still writes data to disk though, to prevent data loss if the memory device is removed. In
addition, the data on the memory device is encrypted to ensure that unauthorized access to the device
will not result in a security breach.
Low-priority I/O
On most desktop systems, multiple applications all have equal priority to the I/O system (especially the
disk drives). For example, if a virus scan program is running in the background, disk accesses made by
that program have equal priority to other running user applications, and will typically slow down
response time to those applications.
Vista has introduced low-priority I/O, the ability for a process to voluntarily have lower-priority access to
the I/O subsystem. Some of Vista’s internal processes, such as search indexing, disk defragmentation,
and Windows Defender’s system scan are written to utilize low-priority I/O.
® 2007 ScritpLogic®
Feature Assessment
We will wrap up this overview of Vista’s new features with an admittedly subjective assessment of the
impact each feature has on an enterprise. We are assuming a “typical” hypothetical end-user
environment, specifically:
• The majority of end users have a few specific applications that are the core of their workload. These
applications are centrally managed with some sort of enterprise desktop management tool such as
ScriptLogic’s Desktop Authority, or are browser-based.
• A large part of the remaining workload is browser-based, searching the Internet and/or executing web-
based applications for the enterprise.
• Most of the remaining time is spent with Office applications, including word-processing, creating
presentations, and working with email.
For each of the features described in the preceding sections, we make an assessment on the feature’s
impact on the bottom line; a return on the investment in upgrading the desktop to Windows Vista.
Impact on productivity/usefulness
Instant Search and Search Folders Instant search will be useful for typical users
that often need to find files.
Productivity
Network and Sharing Center For most enterprise users, the network and
sharing center will be of little use.
Windows Meeting Space Windows Meeting Space will be useful for those
enterprise users that do not have their own col-
laboration tools.
® 2007 ScritpLogic®
Impact on productivity/usefulness
Feature - neutral + Comments
Security
User Account Control (UAC) User Account control will have little use for in an
enterprise environment that is centrally man-
aged. However, if left activated, it may have a
slightly negative effect, since it requests verifi-
cation for almost any control panel activity.
Reliability
Backup and Restore Center Backup and Restore center may help some en-
terprise users, but in general, this function is
centrally managed and will have little impact.
Performance
Startup, sleep, and shutdown performance Performance in startup, sleep, etc. will have a
minor effect on productivity, more so for mobile
users.
Chapter 2
Selected Vista Features
Introduction
In the previous chapter, we reviewed and evaluated the features that are most visible to an end user.
In this chapter, we will delve deeper into Vista, uncovering features that are less visible but no less
important. These “deeper” features are generally more important to, and have more of an impact on, an
IT professional that is responsible for the maintenance of desktops and mobile systems in an enterprise
setting.
This chapter will focus on new and improved security, new networking features, and management and
operations features.
Security
The new Aero user interface is quite entertaining, and the instant search feature is certainly helpful;
however, ultimately one of the primary reasons to implement Vista is its design for security. While
Windows XP Service Pack 2 made substantial progress in increased security, Vista’s security
enhancements go beyond that, and are so fundamental to the architecture that they could only be
implemented through extensive changes to core operating system functions.
SDL also enforces coding design rules and testing scenarios that reduce opportunities for attacks and
streamline security management functions. The SDL employs software development tools that analyze
code for logic and code constructs that would not be detectable by standard compilers. The tools search
for certain kinds of code vulnerabilities, such as overruns caused by string copies and unexpected
combinations of conditions that result in the execution of obscure code paths.
Finally, since Vista was being developed concurrent with the deployment of Windows XP Service Pack
2, the SDL processes took vulnerabilities that were being exposed in Windows XP and tested them
against Vista, with development implementing appropriate patches to both systems when appropriate.
® 2007 ScritpLogic®
9 See http://www.microsoft.com/downloads
® 2007 ScritpLogic®
A second feature of UAC is that all processes with administrator privileges will by default start with
standard user access. When logging in, an administrative user is granted two levels of access (called
Administrator Approval Mode): full administrator and standard user. However, the standard user level is
the default, reducing the opportunity for malware to obtain administrator privileges. Should the
administrator attempt a task that truly requires administrative privileges, he or she is prompted for the
administrator password.
UAC is highly configurable, and administrators are generally able to configure it to suite their unique
circumstances. However, as with all things Vista, the default is to protect the user and the operating
system, and provide the maximum practical protection against malware attacks.
Windows Defender
First introduced in 2005 as “Microsoft Windows AntiSpyware,” Windows Defender provides an anti-
spyware capability to Windows XP and Windows Vista. Windows Defender is based upon a product from
Giant Company Software, which Microsoft acquired in 2004. According to Microsoft, “Windows
Defender helps protect against and remove spyware, adware, rootkits, bots, keystroke loggers, control
utilities, and some other forms of so-called ‘malware.’ (Windows Defender does not provide preventive
protection against malware that is classified solely as a worm or virus.)10” Note that Microsoft
specifically states that Windows Defender is targeted at individual users and does not include enterprise
management tools; typically an enterprise has other means or uses other third-party desktop management
tools to manage anti-spyware.
Windows Defender protects a Vista system through several methods, including scheduled system scans
for spyware, a real-time monitoring function, and a “software explorer” user interface.
Scheduled system scans are based upon spyware definitions kept up-to-date by the Automatic Updates
capability of Vista. Scans can be scheduled or initiated manually. Enhancements in Vista (beyond the
capabilities provided in Windows XP) provide additional performance and security enhancements,
including the ability to scan only files that have changed, to run under a security-enhanced account,
and to scan executables when invoked. Windows Defender also allows files to be scanned as they are
downloaded by Internet Explorer 7.
10 See http://www.microsoft.com/athome/security/spyware/software/default.mspx
® 2007 ScritpLogic®
Real-time monitoring employs a set of agents that continually check for unauthorized access to file
system elements, changes to system configurations, and the like. There is a long list of agents available
(Table 3); although configurable through the Windows Defender Options dialog, Microsoft recommends
that all agents be enabled.
System Configuration (Settings) Monitors security-related settings in Windows. Spyware and other potentially unwanted software can change
hardware and software security settings, and then collect information that can be used to further undermine
the computer's security.
Internet Explorer Add-ons Monitors programs that automatically run when Internet Explorer is started.
Internet Explorer Configurations Monitors browser security settings, which are the first line of defense against malicious content on the Inter-
(Settings) net.
Internet Explorer Downloads Monitors files and programs that are designed to work with Internet Explorer, such as ActiveX controls and
software installation programs. These files can be downloaded, installed, or run by the browser itself. Spy-
ware and other potentially unwanted software can be included with these files and installed without the
user’s knowledge.
Services and Drivers Monitors services and drivers as they interact with Windows and other programs. Because services and driv-
ers perform essential computer functions they have access to important software in the operating system.
Spyware and other potentially unwanted software can use services and drivers to gain access to a computer
or to try to run undetected on a computer like normal operating system components.
Application Execution Monitors when programs start and any operations they perform while running. Spyware and other potentially
unwanted software can use vulnerabilities in programs to run malicious or unwanted software. For example,
spyware can run itself in the background when a program is started. Windows Defender monitors programs
and alerts the user if suspicious activity is detected.
Application Registration Monitors tools and files in the operating system where programs can register to run at any time, not just
when programs are started. Spyware and other potentially unwanted software can register a program to start
without notice and run, for example, at a scheduled time each day. This allows the program to collect informa-
tion about the computer or gain access to important software in the operating system without your knowl-
edge.
Windows Add-ons Monitors add-on programs (also known as software utilities) for Windows. Add-ons are designed to enhance
the user’s computing experience in areas such as security, browsing, productivity, and multimedia. However,
add-ons can also install programs that will collect information that could expose sensitive, personal informa-
tion, often to advertisers.
Software explorer is a user interface that provides users with visibility in a system’s software and
system state. Software Explorer provides detailed information about currently running software that can
affect system security or user privacy. For example, the user can view which programs run automatically
when Windows is started, and information about how these programs interact with other Windows
programs and services (Figure 8).
Software Explorer helps the user monitor the following items:
• Startup programs, which are programs that run automatically (with or without the user’s knowledge)
when Vista starts.
• Currently running programs, which are programs that are running onscreen or in the background.
• Network-connected programs, which are programs or processes that can connect to the Internet or to
the local area network.
• Winsock service providers, which are programs that perform low-level networking and communication
services for Windows and programs that run on Windows.
® 2007 ScritpLogic®
NAP prevents Vista-based clients from connecting to a private network if the system lacks current
security updates or virus signatures, or otherwise fails to meet defined health requirements. The NAP
agent also reports system health status, such as having current updates installed, back to the enforcement
service in the server. The server then determines whether to grant the client access to the network.
Client-side NAP is configurable through the NAP Client Configuration snap-in to the MMC (Figure 9).
® 2007 ScritpLogic®
The new Certificates snap-in for the Microsoft Management Console provides tools to backup keys and
migrate existing EFS files to new keys. Administrators have the capability to set requirements such as
minimum encryption strength and the use of smart cards.
12 See http://en.wikipedia.org/wiki/Public_key_infrastructure
® 2007 ScritpLogic®
Several new Group Policy options have been added to help administrators define and implement
organizational policies for EFS. These include the ability to require smart cards for EFS, enforce page
file encryption, stipulate minimum key lengths for EFS, and enforce encryption of the user’s Documents
folder.
BitLocker Drive Encryption
BitLocker Drive Encryption is a data protection feature that encrypts an entire Windows volume,
preventing access to the data on the volume even if the disk drive is physically in the hands of an
unauthorized user. Additionally, BitLocker enables integrity checking on early boot components,
preventing the computer from booting if it detects tampering with system files or data. Note that
BitLocker is only available on Vista Ultimate and Vista Enterprise editions.
BitLocker uses the v1.2 TPM security hardware13—available on most new systems—to help secure the
encryption keys and to prevent software-based attacks on system integrity or security of other data,
applications, DLL files, and files stored on the operating system volume. Protection is achieved by
encrypting the entire Windows system volume, including all user files, system files, swap, and
hibernation files.
Once BitLocker authenticates access to the protected operating system volume, a driver in the Vista file
system encrypts and decrypts disk sectors transparently as data is written to and read from the protected
volume. When the computer hibernates, the hibernation file is also saved encrypted to the protected
volume. According to Microsoft, the performance penalty for encryption and decryption is minimal.
To provide system integrity protection, BitLocker uses the TPM to collect and store measurements from
multiple sources within the boot process to create a system “fingerprint.” This fingerprint remains the
same unless the boot system is tampered with. Once the integrity of the boot process is proven,
BitLocker uses the TPM to unlock the rest of the data. The system then continues startup and system
protection is handed over to the running operating system.
BitLocker may optionally be configured to lock the normal boot process until the user supplies a PIN
or inserts a USB flash drive that contains keys to unlock the system.
13 See http://www.trustedcomputinggroup.org/
® 2007 ScritpLogic®
® 2007 ScritpLogic®
Networking
Microsoft Windows Vista includes significantly improved networking technology, including a new
TCP/IP stack, improved wireless networking management, and multiple security enhancements.
According to Microsoft, Vista’s improvements represent the largest set of networking innovations since
Windows 9514, and benefit users as well as administrators.
IPv6 Support
Vista supports both IPv4 and IPv6 through a dual IP layer architecture. IPv6 is enabled by default
without any additional steps necessary by the administrator. The dual IP layer support enables a gradual
migration using IPv6 transition technologies that tunnel IPv6 traffic across private IPv4 networks or the
IPv4 Internet. Applications and services that support both IPv4 and IPv6 will by default prefer the use of
IPv6 to IPv4 (although this behavior can be configured by the administrator).
Higher performance
The Vista networking stack has multiple performance improvements. In a high-loss environment such as
sending/receiving audio and video files, throughput is improved by a new algorithm that allows a sender
to send more data while simultaneously retrying a partial acknowledgement.
Another significant change is the automatic resizing of the TCP receive window. Vista networking
performs auto tuning by continually monitoring the bandwidth and latency of a TCP connection, and
optimizing the receive window size for each connection. For example, in a high-bandwidth, high-latency
situation the window size will be increased to allow more data to be transferred in each block, increasing
overall throughput16.
To improve overall performance, Vista is capable of distributing TCP traffic processing across multiple
system processors, and supports certain network cards that have hardware-accelerated TCP/IP processing
on the card.
14 See http://technet.microsoft.com/en-us/windowsvista/aa905086.aspx
15 See http://www.microsoft.com/technet/network/evaluate/new_network.mspx
16 See http://www.microsoft.com/technet/community/columns/cableguy/cg1105.mspx
® 2007 ScritpLogic®
Lastly, Windows Vista supports Microsoft’s NetDMA architecture (Direct Memory Access), which
reduces the number of data copies in the system by allowing data transfers directly to/from a network
card to users’ buffers. It requires specific hardware DMA architectures, such as Intel I/O Acceleration to
be enabled.
Simpler connectivity
The proliferation of mobile computer systems requires much more flexibility in acquiring network
connectivity “on the fly,” while maintaining a seamless workplace environment and its related security.
Vista contains a new Network Center (discussed in Chapter 1). The Network and Sharing Center
provides a clear view of the current connection status, available wireless networks, a network map to
show surrounding network resources, and easy methods to create or join ad-hoc wireless networks.
Diagnostic tools built into Network Center simplify troubleshooting connectivity problems and users
can browse network resources.
Higher security
Vista networking uses the updated Windows Firewall (discussed in Chapter 1) to create network filtering
rules or require authentication. Network data can be encrypted, and through Network Access Protection
(see “Security” section in Chapter 2) clients that are deemed unhealthy can be banned from the network.
Wireless security has been enhanced, with support for more protocols and standards, and tight integration
with other related security features. For example, the capabilities of the wireless network adapter are
examined by Vista, and the most secure protocol is chosen by default when connecting to or creating
wireless networks.
Improved Manageability
Networking manageability has been improved in Vista, largely for management of wireless devices and
the inclusion of additional group policy settings.
Vista includes a native wireless networking architecture (Native Wi-Fi) as part of its core networking
support17. Native Wi-Fi provides many benefits, including deployment across many hardware brands and
models and more reliable third-party wireless adapter drivers.
Vista’s wireless features can be managed via Group Policy or command-line scripting to deploy
configuration settings and security requirements across an entire organization.
17 See http://www.microsoft.com/technet/technetmag/issues/2006/11/VistaNetworking
® 2007 ScritpLogic®
® 2007 ScritpLogic®
18 See http://www.microsoft.com/technet/technetmag/issues/2006/11/EventManagement
® 2007 ScritpLogic®
Table 4. New Windows Eventing Architecture event types and typical users
Operational Like Admin events, Operational events enable problem di- Advanced administrators,
agnosis. Operational events consist of more than just er- support personnel, and mon-
rors and warnings. They also inform users about normal itoring and analysis pro-
operation of an application or OS component. The volume grams
of these events is kept quite low so Operational events can
be enabled without affecting system performance. The Op-
erational events—along with the Admin events—are used by
support personnel, monitoring utilities, and administra-
tors..
Audit Audit events provide a historical record of any resource ac- Advanced administrators, se-
cess or actions taken by the users. These events do not in curity auditors, and Foren-
themselves represent failure or success of the program, sics specialists
but indicate a failure or success of the action. Audit events
can be completely disabled or selectively enabled with
varying levels of granularity. Security auditing at the OS
level is supported (the events can be found in the Security
log of the Event Log).
Analytic Analytic events, which are not very different from Opera- Support personnel Monitor-
tional events, are logged during normal operation of appli- ing and analysis programs
cations and components. But the volume and detail of
Analytic events is much greater than Operational events
and therefore there is a potential of them having a nega-
tive effect on system performance. Thus, Analytic events
are normally disabled. To make use of Analytic events, en-
able them before a diagnostic session and then disable
them before examining the trace.
Debug Debug events are also high-volume events that are nor- Developers
mally disabled. They are used mainly by developers and
are seldom viewed by IT professionals.
New appearance. The event viewer has been improved to provide additional information (Figure 12)
while retaining the structure of the Windows XP GUI, allowing administrators familiar with Windows
XP to easily begin using it. The viewer provides a new preview pane that will display event information
in a “friendly view” or the raw XML.
® 2007 ScritpLogic®
Figure 12. The redesigned event viewer snap-in for the MMC.
A new event structure based on XML. The standards-based event structure and publishing the schema
simplifies reporting and manipulation of events. The new structure also facilitates automation and
integration with the Windows Task Scheduler.
New event query capability based on the XPath language and a user interface for creating queries. An
important query improvement is the ability to securely forward events, generally to a system that is
dedicated to collecting them.
Additional event attributes for queries and reporting. Events now contain additional information,
including the time at which the event occurred, the process ID, the thread ID, the computer name, and the
Security Identifier (SID) of the user. The XML provides additional details, including the EventID, Level,
Task, an Opcode, and Keywords properties.
Increased Automation
The task scheduler is used to automate management and configuration tasks. Vista features a completely
redesigned task scheduler interface and a snap-in for the MMC, which combines multiple UIs into a
single and consistent interface (Figure 13).
® 2007 ScritpLogic®
Figure 13. The redesigned task scheduler snap-in for the MMC.
Scheduling tasks is much more flexible and comprehensive than in Windows XP. Tasks can be scheduled
to run at predefined times, or configured to run when specific events occur. In addition, multiple triggers
may be configured to initiate one or more tasks, which may run simultaneously or in a predetermined
sequence. Tasks can also be configured to run based on a system status, such as being idle for a pre-
configured amount of time, startup, logoff, or other triggers.
The Task Scheduler supports new security features, including employing the new Credentials Manager
for storing passwords, and running tasks at a reduced privilege level (by running the task as its own
session instead of in the same session as the administrator).
® 2007 ScritpLogic®
Background Intelligent Transfer Service Configures the new BITS Neighbor Casting feature to facilitate peer-to-peer file transfer
(BITS) within a domain. This feature is supported in Windows Vista and Windows Server "Longhorn."
Client Help Determines where users access Help systems that may include untrusted content.
Deployed Printer Connections Allows or denies a device installation, based upon the device class or ID.
Device Installation Debug events are also high-volume events that are normally disabled. They are used mainly
by developers and are seldom viewed by IT professionals.
Disk Failure Diagnostic Controls the level of information displayed by the disk failure diagnostics.
Enterprise Quality of Service (QoS) Alleviates network congestion issues by enabling central management of Windows Vista net-
work traffic.
Hybrid Hard Disk Configures the hybrid hard disk (with non-volatile cache) properties.
Internet Explorer 7 Replaces and expands the current settings in the Internet Explorer Maintenance extension to
allow administrators the ability to read the current settings without affecting values.
Networking: Quarantine Manages three components: Health Registration Authority (HRA), Internet Authentication
Service (IAS), and Network Access Protection (NAP).
Networking: Wired Wireless Applies a generic architecture for centrally managing existing and future media types.
Power Management Configures any current power management options in the Control Panel.
Removable Storage Allows administrators to protect corporate data by limiting the data that can be read from
and written to removable storage devices.
Security Protection Combines the management of both the Windows Firewall and IPsec technologies to reduce
the possibility of creating conflicting rules.
Shell First Experience, Logon, and Privileges Configures the logon experience to include expanded Group Policy settings.
Shell Sharing, Sync, and Roaming Customizes selected schedules and behaviors.
Terminal Services Configures features to enhance security, ease-of-use, and manageability of Terminal Serv-
ices remote connections.
Troubleshooting and Diagnostics Controls the diagnostic level from automatically detecting and fixing problems to indicating to
the user that assisted resolution is available.
Windows Error Reporting Disables Windows Feedback only for Windows or for all components. By default, Windows
Feedback is turned on for all Windows components.
19 See http://technet2.microsoft.com/WindowsVista/en/library/ab3b2cfc-b177-43ec-8a4d-0bfac62d88961033.mspx
® 2007 ScritpLogic®
A new Reliability Monitor calculates a System Stability Index that reflects whether unexpected
problems reduced the reliability of the system. See details in the Reliability section below.
Unified property configuration for data collection and scheduling consolidates the interface for
creation and modification of data collector sets. Sets that are useful can be saved or propagated to other
systems for analyzing performance and reliability of user populations.
A new reporting interface, largely based on the Server Performance Advisor in Windows Server 2003.
The new user interface is more flexible and thorough, allowing reports to be quickly generated from any
Data Collector Set. Of course, Vista includes preconfigured performance and diagnosis reports for quick
analysis and troubleshooting.
Performance Monitor
The performance monitoring tools for Vista combines multiple Windows XP utilities (Performance Logs
and Alerts, Server Performance Advisor, Performance Monitor, and System Monitor) and wraps them in
the new standard MMC GUI. Using the performance monitor, administrators can monitor nearly every
aspect of system performance, presenting the information graphically or in report format.
The performance monitor is a component of the Windows Performance Diagnostic Console, a snap-in for
MMC (Figure 15). The console displays real-time information, allows for alerts and automatic actions,
and report generation. It can also be used to recall historical data.
® 2007 ScritpLogic®
Configuring the performance monitor to sample selected metrics is a drag-and-drop interface. Multiple
metrics can be combined and saved as custom data collector sets, which can be recalled at any time.
Reliability Monitor
The reliability monitor offers a graph of the system’s stability over time, and generates a “stability index”
that quickly quantifies the overall reliability of the system, it’s software, and applications (Figure 16).
The user can quickly zoom in on each day and/or event and generate a snapshot stability report, which
provides details on the incident.
For example, a user can view a graphical log of changes to the system (installation or removal of
applications or updates to the operating system) side by side with a similar log of failures (application,
operating system, or hardware failures). The comparison helps quickly pinpoint events that lead to
reliability issues.
® 2007 ScritpLogic®
Feature Assessment
We will wrap up this chapter with an admittedly subjective assessment of the impact the features
discussed in this chapter might have on a typical enterprise. For this assessment,
we will assume a hypothetical enterprise environment, specifically:
• Desktops are centrally managed, either with Microsoft’s Group Policy infrastructure, some sort of
enterprise desktop management tool such as ScriptLogic’s Desktop Authority, or a combination of both.
• Most desktop users have a fairly static environment—a collection of corporate and third-party
applications, and are continuously connected to the corporate network.
• The enterprise has a moderate number of mobile users that move about within the enterprise, with a
subset that travels worldwide.
For each of the features described in the preceding sections, we make an assessment on the feature’s
impact on the bottom line; a return on the investment in upgrading the desktop to Windows Vista.
® 2007 ScritpLogic®
User Account Control The reduced privilege level of users should re-
duce malware-induced incidents, however this
could be offset by the sheer annoyance of UAC,
and by its affects on applications that assumed
administrator priveleges.
Networking
New TCP/IP Stack The new TCP/IP stack won’t be outwardly no-
ticeable, but should help migration to IPv6, im-
prove performance, and improve mobility and
security for mobile users.
® 2007 ScritpLogic®
Impact on productivity/usefulness
Feature - neutral + Comments
Management and Control
Microsoft Management Console (MMC) The new MMC provides a consistent interface,
however most administrators are familiar with
the old ones.
Windows Eventing Architecture The new Eventing Architecture will provide ad-
ministrators with additional information when
diagnosing performance or application prob-
lems.
New Group Policy Management For administrators that use GP, the new set-
tings will provide additional ways of managing
desktops, however sorting through the 800-
odd new settings will require research.
Reliability and Performance Monitoring The new reliability and performance monitoring
tools will provide administrators with additional
information when diagnosing performance or
application problems
Summary
In contrast to the user-visible features reviewed in Chapter 1, it is our opinion that the core improvements
covered in this chapter have more of an impact on an enterprise. As might be expected, improvements in
security, networking, and management tools should substantially improve an IT manager’s life.
Features of particular note are Network Access Protection (once “Longhorn” is available and an
enterprise is able to implement it), increased automation, and improved networking for mobile users.
Group Policy improvements also enhance an administrator’s control over a large population of desktops,
improving security and ostensibly reducing user incidents.
That said, the deployment of Vista, and related activities, are not for the faint of heart, as we shall see in
the next chapter, “Preparing for Vista Deployment.”
® 2007 ScritpLogic®
Chapter 3
Preparing and Planning for Deployment
Introduction
In previous chapters we’ve reviewed the new features in Microsoft® Windows® Vista™, and provided a
cursory analysis of the benefits of each feature. In this chapter, we will make a “plan for a plan,” that is,
discuss what it will take to migrate to Vista and what the process might look like.
While the benefits of implementing Vista might be obvious to an IT manager, it is probably not obvious
to the end user or mid-level manager. In fact, just the opposite—any change is regarded as disruptive and
looked upon with suspicion and trepidation. For that reason it is imperative to create and manage a
detailed plan, train and inform clients, and maintain constant communication to the affected population.
Much of the migration to Vista involves analyzing and inventorying the installed base (both hardware
and software components), and determining impacts on the enterprise infrastructure. An additional, and
non-trivial, aspect is taking inventory of applications and determining their readiness for the new
operating environment. Lastly, we must not forget preparing end users for the change—educating them,
garnering buy-in, and generating enthusiasm for the change.
Tell me again: why are we doing this?
Let’s begin our plan with the obvious: the business case for doing a lot of work, spending a lot of money,
and potentially disturbing the user base. Every situation will be different, but Vista provides
improvements in many areas, including benefits as outlined below (straight from Microsoft20).
IT Department Benefits
• Reduced Security Mgmt
• Reduced Information Theft
• PC Recycling
• Automated Desktop Management
• Reduced Help Desk Support
• Reduced Image Management
• Third-Party Application Savings
20 http://www.microsoft.com/technet/desktopdeployment/bdd/2007/WdBusCase_9.mspx
® 2007 ScritpLogic®
Business Benefits
• Performance and Reliability
• Computer Failures
• Power Management
• Application Responsiveness
• Information Management
Of course, all of these benefits are offset by the time, cost, and effort required to deploy a new operating
system. Thus, the first step in our plan is to develop a business case. The business case will help garner
the crucial buy-in from management, as well as provide insight into the scope of the project.
At a minimum, the business case should develop a clear-cut and easily expressed reason for the new
deployment. For example, “Substantially improve productivity, security, and maintainability of enterprise
desktops by standardizing on the Windows Vista operating environment.” The business case will quantify
what is meant by “substantially improve,” as well as outline project scope and objectives, costs, risks,
and schedule. Microsoft provides an in-depth example case study with the Solution Accelerator for
Business Desktop Deployment (BDD) 2007 toolkit. For our purposes, a successful plan is one where the
right things (and no more) were at the right place at the right time.
® 2007 ScritpLogic®
Planning Methodology
Microsoft recommends using BDD 2007 for planning, building, testing, and deployment of Vista (See
Figure 17). BDD 2007 is a downloadable collection of sample templates, technology files (such as scripts
and configuration files), and a case study. It also documents software that must be downloaded from
Microsoft to assist in Vista deployment. BDD assumes a Microsoft Windows Server® 2003 or Windows
Server (“Longhorn”) server domain.
Figure 17. Microsoft’s Business Desktop Deployment (BDD) model21
Generally, other tools will be used to complement BDD, including Microsoft’s Systems Management
Server (SMS), the Windows User State Migration Tool (USMT), and/or third-party products. While it is
obviously not necessary to employ BDD, we will use the model as the basis for developing our Vista
deployment plan22.
Microsoft breaks the project tasks into cross-organizational teams that are responsible for individual parts
of the overall project; however, each team is responsible for all phases of the project, including planning,
development, stabilization, and deployment.
21 http://www.microsoft.com/technet/desktopdeployment/bdd/2007/default.mspx
22 We use BDD as model only loosely; for brevity some of Microsoft’s recommended tasks are omitted in this document.
® 2007 ScritpLogic®
The cross-organizational teams recommended by Microsoft, and used here as a template for planning, are:
• Application Compatibility
• Application Management/Deployment
• Define Computer Imaging System
• Deployment Planning
• Infrastructure Remediation (Preparation)
• Operations Readiness
• Security Assessment
• Testing
• User State Migration
Since these planning activities are somewhat independent, they are presented (and can generally be
executed) in no particular order. Staffing requirements and availability will dictate the scheduling of each
activity.
Application Compatibility
Application compatibility is one the most important challenges faced by organizations when deploying
new operating systems. An organization is typically supported by hundreds or thousands of in-house and
third-party applications, many of which are critical to the conduct of the business. These applications can
be categorized as:
• Core line-of-business applications, such as Enterprise Resource Planning, accounting, and customer
relationship management applications. Further, these applications are generally supported by some kind
of database management system(s).
• Desktop applications such as office productivity suites and other third-party suites like Adobe
Photoshop and the like.
• Administrative tools, such as antivirus, file management, and backup/restore utilities.
• Custom tools such as logon scripts.
Some of the interactions between applications and the operating system have changed with Windows
Vista; these changes can result in behaviors from not executing at all to running but producing incorrect
results. To help plan and manage the migration to Vista, Microsoft provides the Application
Compatibility Toolkit (ACT).
® 2007 ScritpLogic®
ACT is a comprehensive tool that allows administrators to deploy “compatibility evaluator” agents to the
client desktops to collect information on applications’ compatibility, analyze the information, and
manage test results (Figure 18). Administrators can select different agents, depending upon the type of
information desired:
• Inventory Collector: Examines client computers to identify the installed applications and system
information.
• User Account Control Compatibility Evaluator (UACCE): Enables identification of potential
compatibility issues that are due to permission restrictions enforced by the User Account Control
(UAC). UACCE provides information about both potential application permission issues and suggests
ways to fix the problems.
• Update Compatibility Evaluator (UCE): Provides insight and guidance about the potential effects of
a Windows operating system security update on installed applications. The compatibility evaluator
collects information about the modules loaded, the files opened, and the registry entries accessed by the
applications currently running on the computers and writes that information to log files that are
uploaded to the ACT database.
• Internet Explorer Compatibility Evaluator (IECE): Enables identification of potential Web
application and Web site issues that occur due to the release of a new operating system. IECE works by
enabling compatibility logging in Internet Explorer, parsing logged issues, and creating a log file for
uploading to the ACT Log Processing Service.
• Windows Vista Compatibility Evaluator: Enables identification of issues that relate to the Graphical
Identification and Authentication (GINA) DLLs, to services running in Session 0 in a production
environment, and to any application components made obsolete by changes in the Windows Vista
operating system (Figure 19).
® 2007 ScritpLogic®
Figure 19. Sample ACT client analysis for Windows Vista Compatibility
ACT allows administrators to maintain an application inventory, test and assess applications, and log
results in a sharable database.
Application Management/Deployment
Once applications have been inventoried, the next step is to determine priorities and deployment
mechanisms. Microsoft recommends23:
Identify core and supplemental applications. An enterprise environment typically requires multiple
applications to be deployed to different computers. Some applications, such as office productivity
applications, may be required on the majority of the computers. Others may be required on a small set of
computers. Applications should be categorized as core or supplemental. Core applications, such as
Microsoft Office programs, are built into the client computer images that organizations deploy so that all
users in the organization have the application. Supplemental applications, such as line-of-business
applications, are installed on a user-by-user basis as necessary.
Understand packaging techniques. Understand the different ways an application can be packaged for
deployment and whether the package can be incorporated in the base operating system image.
Inventory applications. Identify all applications that must be packaged for deployment before starting
to create packages.
Prioritize applications. After applications have been identified, prioritize them and create packages
based on the established priority.
® 2007 ScritpLogic®
Identify application subject matter experts (SMEs). The deployment team may not be aware of all the
intricacies of the various applications that will be deployed in the enterprise architecture. SMEs for the
different applications can help the team understand installation and migration needs for the applications.
Additionally, SMEs can help develop end-user training materials to help users adapt to any changes that
influence them.
Identify files and settings. Different applications may contain settings that must be implemented or
migrated. SMEs can help with the identification of such settings and files that may be necessary for
deploying the applications.
Choose distribution techniques. Determine and document how to distribute enterprise applications.
Define Computer Imaging System
A specific solution is recommended for imaging the operating systems and the core applications that are
part of a standard desktop. The solution should be modular to allow team members to separately manage
each system component. The advantage of the modular approach is that when changes occur, team
members do not have to re-engineer the entire process. The solution should also provide the tools and
scripts to install, configure, and customize the Windows platforms and incorporate device drivers and
updates.
Choosing an Image Strategy
Most organizations strive for a standard desktop configuration based on a common image for each
operating system version. Of course, a single image is rarely attainable; however it is a worthy goal to
minimize the number of images. The tradeoffs between many, more specialized, images against fewer,
more general images involve development, testing, storage, and networking costs. Microsoft suggests
categorizing images by size and complexity of deployment24:
Thick Image. Thick images are monolithic images that contain core applications, language packs, and
other files. Part of the image development process is installing core applications and language packs
prior to capturing the disk image. Thick images are simpler to create, because the image contains all core
applications and language packs and can be deployed in a single (albeit large) step.
The disadvantages of thick images are increased costs. For example, updating a thick image with a new
version of an application or language packs requires rebuilding, retesting, and redistributing the entire
image.
Thin Image. Thin images contain few core applications and/or language packs; these will be installed
separately from the OS disk image. There are several advantages to thin images, including less cost to
build, maintain, and test, and lower bandwidth requirements during deployment.
The primary disadvantages of thin images are that they can be more complex to develop initially, and
core applications and language packs are not available on first start.
24 From BDD 2007 documentation, “Computer Imaging System Feature Team Guide.doc”
® 2007 ScritpLogic®
Hybrid Image. As the name implies, a hybrid image mixes thin and thick strategies. In a hybrid image,
the disk image is configured to install applications and language packs on first run, giving the illusion of
a thick image but applications and language packs are installed from a network source. Hybrid images
have most of the advantages of thin images; however, they are not quite as complex to develop. They do
require longer installation times, , which can raise initial deployment costs.
Deployment Planning
Deployment planning involves examining the existing production environment and deciding how to
approach deployment. Considerations include determining the deployment scenario and deployment
methods, insuring the required infrastructure is in place, and establishing a monitoring and feedback
mechanism.
High-level steps in the deployment Planning Phase include those described below.
Select the appropriate deployment scenarios.
Different deployment scenarios are used depending upon each desktop’s current state and the deployment
method (Table 7). The deployment scenario is logged with all of the other information collected during
the client population inventory.
Table 7. Deployment scenarios depending upon current system state.25
Upgrade Computer The current Windows operating system on the target com- Yes Yes Yes
puter is upgraded to the new operating system. The existing
user state migration data, user profile, and applications are
retained (as supported by the new operating system).
Refresh Computer A computer currently running a supported Windows operat- Yes Yes No
ing system is refreshed. This scenario includes computers
that must be re-imaged for image standardization or to ad-
dress a problem. This scenario assumes that the team is
preserving the existing user state data on the computer..
® 2007 ScritpLogic®
® 2007 ScritpLogic®
Group Memberships and Limited Vista includes multiple built-in groups, and different users can be made members of different groups. Some
Users groups (e.g., Administrators) have elevated security privileges; care must be taken in assigning users to these
groups. Pay particular attention to elevating security levels just to run legacy applications which made the as-
sumption that all users executing the application would have administrator rights (see User Account Control
in Chapter 2 for additional information on UAC).
Password Settings Passwords are the most popular authentication mechanism for desktops. Administrators may want to change
password requirement properties, including password length, complexity, and frequency of change.
File Permissions Generally, Vista’s default file permissions are sufficient to provide a level of security without limiting users’
functionality or ease-of-use. However, some legacy applications may make assumptions on file permissions;
see information on User Account Control and Application Compatibility Testing (ACT) in Chapter 2.
Registry Permissions The system’s registry is a critical repository of operating system and application configuration information.
Similar to password settings and file permissions, care must be used in granting access to the registry, espe-
cially just to allow a legacy application to execute.
Service Permissions Services executing in the background traditionally (under Windows XP) had elevated permission levels; Win-
dows Vista dramatically changed this model by running services with minimal privileges by default. See Chap-
ter 2 for additional information on Services.
Event Log and Auditing Settings While the default settings for Event Logging and Auditing are generally sufficient, security planners might
want to employ third-party software that analyzes these logs to provide intrusion detection capabilities.
User Rights Settings User Rights describe what actions users are allowed to take (e.g., program debugging, system profiling, sys-
tem shutdown). Planners will need to consider changing user rights for some selected users, especially appli-
cation development users.
Other Security Options There are a myriad of additional security options. Often the default settings will suffice, however, each situa-
tion should be reviewed and documented to insure that security settings are not changed “on the fly,” poten-
tially opening a security loophole that goes undetected.
28 From Microsoft Vista BDD 2007 Documentation, “Security Feature Team Guide.”
® 2007 ScritpLogic®
29 From Microsoft Vista BDD 2007 Documentation, “Security Feature Team Guide.”
® 2007 ScritpLogic®
Protecting Windows PE and Client Deployment Scripts. If an organization uses the Microsoft
Windows Preinstallation Environment (Windows PE) during the client deployment process, keep
Windows PE updated and thoroughly tested. In addition, consider security in developing Windows PE
scripts, including the avoidance of including user credentials in clear text and using file and share
permissions to protect the scripts.
Other Infrastructure Security Considerations. Microsoft includes planning on additional security
considerations during deployment; see the Microsoft BDD 2007 documentation for additional
information.
Testing
A large part of a successful deployment is testing target configurations, applications, and security
settings. The testing team should develop an in-depth test plan and use that plan to establish lab
requirements, risks, and schedule. The Microsoft BDD 2007 documentation provides a detailed sample
test plan, as well as a template that follows the BDD 2007 testing methodology. An abbreviated
discussion of the most relevant topics of the test plan is discussed below.30
To keep the scope of the project manageable, it is generally simpler to assume that applications
themselves are tested independently (probably by the vendor). Assuming the application works correctly
reduces testing to those components that are sensitive to the application environment.
Lab Requirements
To accurately test applications, the test plan should specify a lab environment that closely matches the
production environment. The lab environment should reflect software packages, operating system
image(s), and networking components to insure that application behavior will be consistent after
deployment.
Bug Rating, Reporting, and Tracking
Bug reporting, rating, and tracking will allow problems to be tackled quickly and by the right
development team or SME. Issues should be prioritized and tracked, with periodic reports to the other
deployment teams. The test plan should concisely define these teams and mechanisms for
communicating with them.
Change Control
Change control centralizes management of issues and permits collaboration on changes to infrastructure,
system images, or processes. The test plan should put in place change control procedures to insure
accurate and timely communication of changes and/or proposed changes.
30 Adapted from BDD 2007 Documentation “Test Feature Team Guide,” pp 14-16
® 2007 ScritpLogic®
Test Schedules
A big part of the test plan is the testing schedule. Much of testing is dependent upon other planning
activities, depending on the types of tests and whether tests are done piecemeal (as items are released), or
testing is done on complete system images prior to deployment.
The testing schedule should include, at minimum, the following tasks:
• Test environment setup
• Documentation review
• Preparation of high-level test scenarios
• Test case preparation
• Test execution
• Number and duration of testing cycles
Training
Training IT staff and end users plays a critical role in a successful deployment. Planners should develop a
base set of training requirements; from that they should develop a plan that comprehends the schedule,
training methods, and the materials and resources that will be required.
The IT staff will need training on new deployment methods, security features, and changes in networking
and configuration tools. Training planners should work closely with other deployment team members to
insure consistency across teams and to minimize impact on schedule.
At a minimum, users should be trained on the new productivity and security features in Windows Vista.
Additionally, if line-of-business applications have any externally visible changes, training will be
required to avoid surprises after deployment. For example, an enterprise will generally deploy Office
2007 with Vista; users will need training on the new user interface that those applications offer.
Training Requirements
Initial steps in planning training should define the baseline requirements; given the staff and user base,
what are the minimum training requirements for testing, deployment, and ongoing operations?
Application SMEs should be consulted for materials on user visible changes to applications and
enterprise-developed tools.
Training Schedule
Given requirements, planners should develop a schedule that takes into account the user base, deployment
schedule, staff and materials availability, and budget. Certainly, IT Staff will be trained first as planning
and testing proceeds, with the user base trained in parallel as staff gains experience during testing.
® 2007 ScritpLogic®
Training Methods
Once requirements and schedule are scoped, the training methods may be determined. Depending upon
the subject matter, there are many methods for training. Microsoft offers extensive training opportunities
(especially for developers ). Additionally, there are any number of third-party training organizations that
support multiple delivery methods. Consider the following training methods31:
• Hands-on Training
• Presentations
• Computer-based training (CBT), Web-based training (WBT)
• Handouts
• Certification (identify training requirements that will require certification to demonstrate a specified
level of proficiency).
Materials and Resources
Planners will need to make decisions on the materials and resources required to carry out the training as
it is scoped. Considerations include whether the materials need to be developed or purchased, and timing
for obtaining the materials (make sure they show up on time).
Resources also need to be scheduled, including staff to provide the training, facilities, and budget
requirements. If travel is required, the schedule and budget will need to reflect the appropriate resources.
User State Migration
The user state on a system is the user’s preferences (such as screen savers, browser favorites, etc.),
documents, and applications data. Retaining this information through an upgrade or system replacement
to Vista is obviously critical to the operation of the enterprise.
Systems that are to be upgraded in-place, using the standard Vista upgrade process, will not need state
migration because the data remains on the system throughout the upgrade. (Of course, it is advisable to
perform a system backup before any upgrade.)
It is expected that in-place upgrades will be the exception, however, and most systems will be upgraded
either through a “wipe and load” (use the same computer, but wipe it clean and load the system image from
scratch), or a “side-by-side” upgrade (where the user’s state is moved to a new system)32. Automating this
process is almost a necessity, since it is time-consuming and error-prone. Microsoft recommends using the
User State Migration Tool (USMT 3.033), updated to version 3.0 for Windows Vista.
A side note here—preserving users’ states on top of a standard system image (by whatever method)
almost guarantees that the resulting images will not adhere to a standard. Consider third-party tools that
manage enterprise-wide user settings.
® 2007 ScritpLogic®
Mail. Includes the information required to connect to mail servers, signature files, views, mail rules,
local mail, and contact lists
If USMT is employed, the ScanState process of USMT is an automated method of determining which
items will be migrated. As with applications state migration, document which of these items will be
moved during the upgrade.
Develop and Test
User state migration plans should be handed off to the testing teams to test the migration scripts. As
mentioned in the Test planning section, testing in an accurate lab setting reduces surprises during
deployment.
Summary
Migrating to Vista could quite possibly be the largest project an IT organization has ever undertaken. If
migration is years away, or will take place over the next few years, it is advisable to be proactive and put
a plan in place. Even if it’s a back-of-the-envelope plan, the organization needs estimated duration,
budget, manpower, and IT resources that will be required.
Microsoft has developed a huge toolset to help with the migration. While many IT organizations may
“roll their own” migration toolset, it wouldn’t hurt to take a look at the Microsoft SMS (Systems
Management Server) 2003, and all of its related tools.
An obvious alternative is the range of third-party tools that are available. If an organization already has a
third-party desktop management toolset in place, check with the vendor(s) to get the details on Vista
migration. For example, ScriptLogic, Altiris, and LANDesk have been working with Vista beta releases
for several years, and their products are already Vista compatible. Most of these vendors offer tools that
allow a proactive approach to deployment—begin planning now for future Vista deployment.
Lastly, because Vista can require extensive infrastructure changes, the tools are only a part of the plan.
Determining when to upgrade is just as important. It is advisable to work with lifecycle management
teams within the organization; upgrading to Vista when a desktop is replaced makes a lot of sense. Resist
the urge to make a wholesale upgrade within the organization—Vista migration is a big enough challenge
without trying to tackle the entire enterprise at once.
® 2007 ScritpLogic®
Chapter 4
Deployment
Introduction
In previous chapters, we reviewed some of Vista’s improvements to desktop lifecycle management,
especially in the areas of planning and migration. In this chapter we’ll examine the deployment tools
themselves, providing a foundation for the methodologies used to deploy Vista into an enterprise
environment with minimal costs and user disruption.
During the development of Vista, Microsoft addressed one of the more common complaints about
Windows—the lack of deployment tools and technology. In previous versions of Windows, a few basic
rollout concepts were common, but Microsoft provided only rudimentary higher-level mechanisms for
software deployment across an enterprise. Out of necessity, most organizations developed “roll your
own” techniques, or employed third-party software, to deploy new versions of applications and the
operating system. These techniques have been tweaked and tuned over multiple Windows releases, and
generally work quite well in the organizations’ specific environment.
Deployment can take place over days, months, or years; however, a few basic deployment concepts
remain the same. Microsoft developers examined these concepts, and, in an attempt to standardize and
streamline processes, developed sweeping changes to the underlying Windows deployment technologies.
This chapter examines these technologies and evaluates several different rollout scenarios.
Note that this chapter assumes that extensive planning has already taken place (Chapter 3); systems are
inventoried, applications are identified, and a deployment laboratory has been created and sufficiently
equipped for testing.
® 2007 ScritpLogic®
In developing Vista, Microsoft took a much more modular approach. Rather than deploying a single
monolithic block of code that accepts different configuration parameters, Vista is based on a relatively
small block of code that contains about 95% of core Vista functionality; additional functionality is
attained by adding code modules. Not only is this a more reliable way to develop code (it tends to isolate
the effects of bugs to a single module), but it also is an effective way to introduce configuration
flexibility.
Modularization (combined with the new Windows Image Format, below) enables a more streamlined
approach to deployment. It also provides a selective customization capability, enabling36:
• It is easier to add device drivers, service packs, updates, and languages to a Vista distribution.
• It is easier to customize certain optional Windows Vista component to specific requirements.
• Microsoft can service an individual component without breaking the whole operating system.
• It reduces testing during deployment.
It turns out that even the commercial Vista distribution uses this mechanism—there is only one Vista
core, combined with different modules, to produce the different end-user editions of Vista (see Chapter 1
for information on editions). Similarly, releases of Vista for different languages simply include the
desired language modules when the distribution disk image is created (the Vista core has no reliance on
languages whatsoever).
Windows Image Format (WIM)
The modularization of Vista is complemented by a completely new (to Microsoft) deployment
mechanism using a file-based (as opposed to sector-based) imaging format. Windows Imaging format
(WIM—the file suffix “WIF” was taken, and besides, it just didn’t sound right as a file type for
deploying system images).
Using a file-based imaging format has multiple advantages, including37:
• Hardware-agnostic (only one image is needed as long as the target hardware understands a
standard file system).
• Allows multiple images to be stored in a single file. This is how Microsoft distributes Vista; a
single WIM image file contains multiple Microsoft SKUs (Stock Keeping Unit—in this case
multiple editions) of Vista. It also allows for one of the images to be marked as bootable, allowing
a system to be booted from a disk image contained in a WIM file.
• The WIM image format enables compression and “single instancing,” which reduces the size of
image files significantly. Single instancing allows storage of two or more copies of a file for the
space cost of a single copy. For example, if images 1, 2, and 3 all contain file A, single-instancing
stores a single copy of the file A and points images 1, 2, and 3 to that copy.
36 Based on http://technet.microsoft.com/en-us/windowsvista/aa905119.aspx
37 Largely taken from http://technet.microsoft.com/en-us/windowsvista/aa905070.aspx
® 2007 ScritpLogic®
• Allows for offline “servicing.” Certain operating system components, patches, and drivers can be
added without creating a new image. For example, to add a patch to a Windows XP image, the
master image needs to be booted, the patch added, then the image prepared again. With Windows
Vista, the image can be service offline, without the need to be prepared a second time.
• Allows for a disk image to be installed on a partition of any size (that will hold it); sector-based
images require deployment to a partition that is the same size or larger than the original source
disk.
• Developers have access to WIM image files through an API (“WIMGAPI”), allowing application
developers to become more standardized and deployments more integrated.
• Allows for non-destructive deployment. That is, because the image is filesystem-based, application
of the image does not erase the disk’s existing contents (see below).
Management of WIM files is performed through a set of tools provided by Microsoft in the Windows
Automated Installation Kit (WAIK). The WAIK contains a collection of tools, including:
• ImageX—a command-line tool that captures and modifies WIM-based disk images.
• Windows Preinstallation Environment (WinPE)—a miniature, bootable version of Vista that can
exist in RAM and bootstrap the Vista install process.
• Windows System Image Manager—a tool that builds answer files, which Windows Setup uses to
apply custom settings for hands-off Vista installs.
• Windows Deployment Services (WDS)—a new tool that replaces the Microsoft Remote
Installation Services (RIS) in previous versions of Windows. WDS provides for the storage,
management, and deployment of images.
The WAIK toolset is discussed in greater detail in a following section.
Nondestructive imaging
Vista’s modularity and the file-based imaging changes the way systems are upgraded in place. Instead of
upgrades in which registry settings and partial files are replaced and edited (a tricky business), Vista is
always cleanly installed. After the install, data settings, and applications are applied to the new operating
system. As a by-product, if anything goes wrong with the install (prior to the first logon), the installation
can automatically be rolled back and the system restored to its original state38.
XML-based answer files
Answer files are used by the installation process to customize and installation. In previous versions of
Windows, multiple, text-based answer files were needed to create an automated installation environment.
Since Vista standardizes on XML for many applications (e.g., Office 2007), it makes sense that XML is
used during the setup process as well. The use of XML allows additional automation of the deployment
process, and provides for consolidation into a single file that supports the entire deployment process.
Employing XML also makes editing the answer file more consistent (hopefully reducing errors
introduced during editing), and is supported by a more user- (or rather, administrator-) friendly interface.
Script-based installations
Windows Vista includes extensive support for using the command line and scripting that enables remote,
automated, and repeatable deployment scenarios. For example, ImageX, Migration and Windows System
Image Manager are completely scriptable.
Table 10. Deployment Tools summary.39
Feature Brief Description
Application and Migration Planning
APIs for ISVs Windows Vista provides extensibility and an application programming interface (API) set for independent soft-
ware vendors (ISVs) and third-party applications through a software development kit (SDK).
Compatibility mitigation Windows Vista creates custom compatibility databases based on analysis and tests the fixes to make sure
they will work.
Filtering analysis reports Reports provide information about application compatibility issues and mitigation information. This informa-
tion is improved with user input.
Software Inventory Analyzer Inventories all the applications installed on user desktops across the enterprise, stores them in a central lo-
cation, and performs compatibility analysis against a compatibility database.
Engineering Desktop
Customization of images Add, update, and remove optional components (including languages, drivers, and service packs) to create a
custom image.
Desktop image creation Takes an image of an existing PC for distribution or for backup. You can save to a distribution share, from
which users can install the gold image or IT professionals can push the image to the desktop.
Hardware abstraction layer (HAL) Retail versions of Windows Vista can be HAL-independent.
independence
Offline image servicing Patch and service an offline image without creating a new image for distribution.
Scripting support in image Scripting tools can be used to create and edit images.
creation
Unattended file manipulation Create and edit XML-based configuration files for unattended installation.
Non-destructive imaging Allows for system upgrades in-place by using a wipe-and-reload (clean install) of the operating system that
stores existing data locally or remotely on a network share.
Multiple boot options Boot from the network (PXE boot), CD, DVD, hard disk, or RAM disk.
PXE server support Allows remote installations using the PXE boot process to install the operating system.
Scripting support Enables administrators to script and automate large wipe-and-reload deployments, installations, and migra-
tions.
Secure remote deployment IT professionals can install the new desktop remotely.
39 Adapted from the BDD 2007 documentation; this is a subset of the BDD-recommended teams.
40 The WAIK may be obtained from www.microsoft.com/downloads/
® 2007 ScritpLogic®
ImageX
ImageX is a command-line tool that captures and modifies WIM-based disk images. It allows an
engineer to view and modify Vista install images so they can be deployed either from a custom
installation DVD or from a network file share. ImageX mounts and unmounts an installation image
(see Figure 1).
Figure 21. Options available for the ImageX command-line image manager.
® 2007 ScritpLogic®
The Image Manager accepts an installation image (named install.wim) and an associated Windows
catalog file (if the catalog file is not available, the Image Manager can create one). Once opened, all of
the available configurable components are available in the Image Manager’s GUI; the deployment
engineer can now customize the image by selecting each component, and specifying the desired
configuration parameters (see Figure 3).
Figure 23. Using the System Image Manager, individual components may be configured.
® 2007 ScritpLogic®
After all of the desired changes have been made, the Image Manager generates and saves and XML-
based answer file. The answer file itself can subsequently be edited with the Image Manager, or any
XML editor.
Windows Deployment Services (WDS)
Windows Deployment Services is an updated version of Remote Installation Services (RIS) in Windows
Server 2000 and Windows Server 2003. (In fact, an installed version of Windows Server 2003 RIS is a
requirement to downloading WDS). WDS provides a mechanism for systems to connect to a networked
server during initial boot-up, allowing the server to then perform a local installation of Windows Vista.
The WDS update to RIS is included in the Windows Automated Installation Kit (WAIK), and includes the
WDS snap-in to the Microsoft Management Console. The WDS snap-in enables deployment engineers to
manage all of the WDS features from a single GUI. The WDS enhancements to RIS include41:
• Ability to deploy Windows Vista and Windows Server "Longhorn".
• Support for Windows PE as a boot operating system.
• Support for the Windows Imaging (WIM) format.
• Ability to transmit data and images using multicast functionality.
• Ability to transmit data and images using multicast functionality on a standalone server (when
Transport Server role service is installed).
• An extensible and higher-performing PXE server component.
• A new boot menu format for selecting boot operating systems.
• A new graphical user interface used to select and deploy images and to manage Windows
Deployment Services servers and clients.
WDS represents a suite of components, and are organized into three categories:
Server components: These components include a Pre-Boot Execution Environment (PXE) server and
Trivial File Transfer Protocol (TFTP) server for network booting a client to load and install an operating
system. Also included is a shared folder and image repository that contains boot images, installation
images, and files needed for a network boot.
Client components: These components include a graphical user interface that runs within the Windows
Pre-Installation Environment (Windows PE) and communicates with the server components to select and
install an operating system image.
Management components: These components are a set of tools used to manage the server, operating
system images, and client computer accounts.
41 “Windows Deployment Services Update Step-by-Step Guide for Windows Server 2003,” April, 2007
® 2007 ScritpLogic®
® 2007 ScritpLogic®
Time required Requires less up-front configuration time. Requires more up-front configuration time.
Network connection Can be used with slow-speed connections or in in- Requires a high-speed, persistent connection.
stances where no network connectivity exists.
Infrastructure requirements Requires little or no infrastructure to support de- Requires an infrastructure sufficient to deploy op-
ployment. erating system images by using SMS 2003 OSD
Feature Pack.
Deployment medium Supports deployment over the network or locally. Supports only network deployments.
SMS 2003 requirements Target computers are not required to be managed Target computers must be managed by SMS
by SMS 2003 (or other software management 2003.
tools).
Security policy handling Supports security policies where automatic soft- Supports only security where automatic software
ware installation is prohibited. installation is allowed.
Firewall requirements Supports deployment of target computers isolated Requires Remote Procedure Call (RPC) communi-
by firewalls. cation with the target computers (and as such
usually requires too many ports to be opened
through firewalls).
Upgrade vs. Clean Install Supports Upgrade Computer deployment scenario. Upgrade Computer scenario is not supported.
Management Pack support LTI does not support the BDD management pack Supports the BDD management pack
® 2007 ScritpLogic®
Summary
The migration to Vista is not to be taken lightly (as if any Windows migration might be!). However,
Microsoft has developed an extensive toolset—beyond anything in any previous version of Windows—to
aid in the deployment process. The new modular architecture greatly facilitates flexibility in deployment
while simplifying the entire process. At the same time, the new WAIK, WDS, and user migration tools
provide a more powerful deployment environment without adding a great deal of complexity.
Having said that “everything will be ‘easy,’” it is vital that planning begin now. For example, if it hasn’t
been done already, the enterprise desktop should be standardized well before the deployment process
begins. After all, the best operating system image can be overlaid with the messiest of user states if the
user state is that way initially. Windows deployment tools and/or other third party products that manage
existing operating environments (e.g. Windows XP) can greatly aid in pre-deployment planning and
standardization.
Finally, the migration to Vista is by definition methodical; plan, plan, and plan some more—then take a
measured approach to bringing the enterprise into the Vista world.
® 2007 ScritpLogic®