Infrastructure Planning and Design: Windows Optimized Desktop Scenarios Assessment
Infrastructure Planning and Design: Windows Optimized Desktop Scenarios Assessment
Infrastructure Planning and Design: Windows Optimized Desktop Scenarios Assessment
and Design
Version 1.0
If you are using this documentation solely for non-commercial purposes internally within YOUR company or
organization, then this documentation is licensed to you under the Creative Commons Attribution-
NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or
send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.
This documentation is provided to you for informational purposes only, and is provided to you entirely "AS IS".
Your use of the documentation cannot be understood as substituting for customized service and information
that might be developed by Microsoft Corporation for a particular user based upon that user’s particular
environment. To the extent permitted by law, MICROSOFT MAKES NO WARRANTY OF ANY KIND, DISCLAIMS
ALL EXPRESS, IMPLIED AND STATUTORY WARRANTIES, AND ASSUMES NO LIABILITY TO YOU FOR ANY
DAMAGES OF ANY TYPE IN CONNECTION WITH THESE MATERIALS OR ANY INTELLECTUAL PROPERTY IN THEM.
Microsoft may have patents, patent applications, trademarks, or other intellectual property rights covering
subject matter within this documentation. Except as provided in a separate agreement from Microsoft, your
use of this document does not give you any license to these patents, trademarks or other intellectual property.
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places and events depicted herein are fictitious.
Microsoft, Active Directory, Excel, Hyper-V, Outlook, Windows, Windows Server, and Windows Vista are either
registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
You have no obligation to give Microsoft any suggestions, comments or other feedback ("Feedback") relating to
the documentation. However, if you do provide any Feedback to Microsoft then you provide to Microsoft,
without charge, the right to use, share and commercialize your Feedback in any way and for any purpose. You
also give to third parties, without charge, any patent rights needed for their products, technologies and services
to use or interface with any specific parts of a Microsoft software or service that includes the Feedback. You will
not give Feedback that is subject to a license that requires Microsoft to license its software or documentation to
third parties because we include your Feedback in them.
Terminology
This guide refers to the specific products and technologies that support the Windows
Optimized Desktop scenarios. For a list of these technologies and brief descriptions
about how they contribute to the overall solution, see Appendix A, “Products and
Technologies.”
Challenges for IT
Organizations that have users who fit the Office Worker scenario face the following
challenges:
• Support application-specific security and regulatory compliance efforts. Office
workers typically have differing levels of access to confidential information within their
organization. This confidential information can include both sensitive data and the
applications that access sensitive data. IT needs to ensure that office workers can
access the information they need to do their job, while restricting access to
confidential information. IT might also need to enforce policies around the local
storage and processing of sensitive applications or information, so that office workers
can access confidential information without it being stored on the local computer.
• Secure confidential local data. At each work location, stationary desktop computers
and their hard drives are at risk for loss, which exposes the company’s confidential
data. Physical security is typically in place to protect these locations from theft;
however, threats exist from internal sources including people who have access to the
facilities. Confidential data can be exposed at a variety of times, including during a
significant business event such as a merger and acquisition, during a routine event
such as an equipment refresh, or residual data on the drives could be exposed when
the computer is discarded at the end of its life.
• Maintain high levels of continuity. Office workers expect highly available systems.
When problems arise, they require immediate response for triage and repair, and
demand rapid restoration of services. This applies to deployment of applications to
address application fixes, and restoration of local files and preferences.
• Provide flexibility to access multiple desktop computers. Office workers
occasionally need to access different desktop computers as they work or as part of
an exception process. To maintain productivity, users are best served if their
preferences, desktop icons, files, and even key applications, are available on
different computers. This provides them with a familiar and seamless desktop
experience without requiring them to access their principal desktop computer.
• Address compatibility issues between applications or between an application
and the operating system. Office workers need to use specific applications to solve
critical issues, but such applications may not be supported on the latest operating
system, or may have interoperability issues with existing applications. By resolving
application compatibility issues, organizations can benefit from deploying the latest
operating system and still provide the applications that users need to be productive.
Challenges for IT
Organizations that have users who fit the Mobile Worker scenario face the following
challenges:
• Provide offline access to files and data. At a customer site, or just working away
from the company’s office, mobile workers need to be able to quickly access their key
files and directories. These critical assets should be up to date, and have high
integrity without having to burden mobile workers with manual copying and manual
synchronization.
• Secure confidential local data. The mobile computer and its hard drives are at risk
for loss, which can expose the company’s confidential data. Mobile workers are more
prone to having a mobile computer lost or stolen given the amount of transport and
physical handling. Analysts believe hundreds of thousands of mobile computers are
lost or stolen each year. Likewise, confidential data can be exposed at a variety of
times, including during a significant business event such as a merger and acquisition,
during a routine event such as an equipment refresh, or residual data on the drives
could be exposed when the computer is discarded at the end of its life.
• Support application-specific security and regulatory compliance efforts. IT
needs to ensure that mobile workers have access to the information they need to do
their job, while restricting access to confidential information. This constraint might
require that sensitive applications be run from an internal server, and confidential
information be stored there too so that data is not sent across the Internet or stored
on the user’s computer. Another challenge with respect to mobile workers is that they
might need to access confidential corporate data even when they travel to other
regions of the world. Corporate policies could prevent mobile workers from carrying
confidential data on mobile computers when they travel to regions where they cannot
control who can inspect their computer. In such cases, mobile workers need to be
able to access confidential information without it being stored on the local computer.
• Maintain high levels of continuity. Mobile workers expect highly available systems.
When problems arise, they require immediate response for triage and repair, and
demand rapid restoration of services. Given the increased rate of loss and theft of
mobile computers, this also applies to deployment of a new mobile computer. In order
to have high levels of continuity and restore productivity to the user, the new mobile
computer should have the same applications, local files and preferences as the one
being replaced.
• Address compatibility issues between applications or between an application
and the operating system. Mobile workers need to use specific applications to solve
critical issues, but such applications may not be supported on the latest operating
system, or may have interoperability issues with existing applications. By resolving
application compatibility issues, organizations can deploy the latest operating system
while still providing the applications that users need.
Challenges for IT
Organizations that have users who fit the Task Worker scenario face the following
challenges:
• Deliver a low-cost solution that maintains high user productivity. An
organization that matches this scenario, such as a call center, usually has a large
number of employees. The large number of users can make deploying and managing
standard desktop computers a significant cost burden because the call center
analysts will not use the full capabilities of the desktop computers. At the same time,
the solution should provide a responsive and familiar experience that is similar to a
standard desktop to maintain user productivity.
• Support application-specific security and regulatory compliance efforts. How
task workers access and handle data must adhere to regulatory compliance policies.
There are typically a large number of users within a task worker organization, and
they usually handle a significant volume of customer data interactions. This volume of
data access creates a challenge for IT to have technical and supervisory controls that
don’t overburden the users. Fortunately, task workers typically operate together
within centralized organizations.
• Provide flexibility to access multiple computers. Task workers occasionally need
to access different computers when their shift changes, or as part of their regular
daily workflow. To maintain productivity, users are best served if their preferences are
available on that different computer. This provides them with a seamless and
identical experience regardless of which computer they use.
Challenges for IT
Organizations that have users who fit the Contract/Offshore Worker scenario face the
following challenges:
• Deliver a low-cost solution that maintains high user productivity. An
organization that fits this scenario might outsource software development to a team
of contract developers. The hiring team might need to provide each developer with an
IT-managed computer, but doesn’t want to incur the cost burden associated with
standard desktop computers.
• Maintain privacy and confidentiality. Contract workers often perform activities that
require administrative privileges on the local computer and access to company-
sensitive information. How contract workers access and handle data must adhere to
policies designed to protect company security interests. Contract workers might
operate centrally as a group or distributed and work in diverse locations. They may
be out of the direct control of the client, which is a challenge for IT to have technical
and supervisory controls that don’t overburden the users.
Challenges for IT
Organizations that have users who need the Access from Home scenario face the
following challenges:
• Support application-specific security and regulatory compliance efforts. Users
who access the corporate network from home likely do so from privately owned
computers. These computers are typically unmanaged by the IT department. As a
result these computers might not meet corporate policy requirements (for example
they might not have the latest security updates and antivirus software).
• Provide emergency access from home. The principal driver of the Access from
Home scenario is to provide secure remote access to a standard corporate
environment and set of applications from the user’s home (non-managed) computer
when the user is unable to work in the office due to illness or other emergencies.
Scenario Variations
For some of these scenarios, there may be one or more variants that include
centralized execution of the entire desktop environment, depending on the needs of
the organization. There is no “one size fits all” solution; organizations can choose to
implement more than one virtualization solution to best meet the needs of their users.
The Windows Optimized Desktop Scenario Selection Tool will indicate which specific
conditions lead to scenario variations, and will display multiple options in the results.
2. Do they need to roam within the workplace from different computers to access
their data and applications?
Comment: Users who follow a workflow that requires them to roam frequently within
their office are likely to access the same applications on different computers. To
preserve the user experience, the settings, files, and state are stored centrally. For
example, a doctor might need to access patient information from the office and also
the pre-surgery station. The Office Worker scenario would be ideal to solve this
challenge. Target: Office Worker
3. Do they work outside the office for a significant amount of time (for example, to
visit customers or travel) and require access to their applications and data?
Comment: Unlike an office worker, the mobile worker must perform specific work
functions without a consistent connection to the corporate network. For example, a
field engineer works at numerous locations throughout the course of the day. The
engineer needs to use diagnostic tools and database application without being
connected to a network. Target: Mobile Worker
4. Do they perform a single job function that is highly repetitive, require a single
LOB application, and do not require personalized desktop settings?
Comment: Users who regularly access a specific set of applications and who do not
require access to a rich desktop or additional network services can utilize a task-
oriented environment. This allows the user to access only those specific applications
needed to complete their tasks and share multiple client computers as needed.
Target: Task Worker
5. Are they vendor staff who work either at your local job site or remotely?
Comment: Contract workers on temporary or offshore engagements who do not
require dedicated computers will be provided with virtual desktop environments to
complete their assignments. These virtual environments allow local administration
(when needed) for the installation and customization of applications in a managed
desktop environment that is provisioned only for the duration of the project. Target:
Contract/Offshore Worker
7. If they are unable to get to their workplace, do they need to be able to use their
home computer to access the important applications, data, and settings that their
office or business computer provides?
Comment: In cases where an office worker is not able to access their workstation
because they can’t get to their office, their lack of productivity can be costly to the
organization. The Access from Home scenario provides the user a contingency
means to access a remote computer with access to their applications and settings.
Target: Access from Home
Only the Scenario Selection tab requires user input. Questions on this tab are organized
around two sets of requirements:
• User Requirements
• Business Requirements
Your answers to these questions result in points added to or subtracted from one or more
of the scenarios and variations, depending on how well they meet the requirement.
Note To get the best results from the tool, you may need to consult different experts within
your organization who are familiar with your business and technical requirements.
The horizontal header also lists any assumptions made by the proposed solution. The
vertical columns indicate how specific Microsoft products and technologies address the
challenge and list those specific products and technologies.
Note For a brief introduction to these products and technologies, see Appendix A, “Products and
Technologies.”
Table 7.
Challenge: Deliver a Low-Cost Solution That Maintains High User Productivity
Challenge: Maintain Privacy and Confidentiality
Applicable Scenarios: T C
Cost savings can be achieved through economies of scale—for example, a large
number of task workers (or contract/offshore workers) will use Terminal Services or VDI
to offset setup costs.
Assumption: Storing confidential information on a centrally managed server will
promote privacy and confidentiality.
How specific solution components address the Solution Components
challenge
Windows Fundamentals for Legacy PCs is a lightweight Windows Fundamentals for
operating system that is well suited for older hardware. Legacy PCs for both the
This operating system supports the Remote Desktop Task Worker and Contract/
Protocol, thereby enabling users to connect remotely to Offshore Worker scenarios.
servers running Windows Server 2008 Terminal Services
(for the Task Worker), or virtual machines hosted on a
Windows Server 2008 Hyper-V Server (for the Contract/
Offshore Worker). In this manner, this technology helps
extend the life of older hardware.
The Remote Desktop Protocol (that is included with the Windows Server 2008
Windows operating system) enables the Contract/ Terminal Services,
Offshore Worker to use their laptops and Access from TS RemoteApp, Hyper-V
Home workers to use their home computers to connect technology, System Center
to virtual machines that are hosted within a secure and Virtual Machine Manager,
centrally managed corporate data center. Windows Vista Enterprise
Centralized Desktop for
Contract/Offshore Worker
and Access from Home.
Conclusion
There is a growing expectation that people will be able to work from anywhere and have
access to their data at any time. While this increases productivity, it also introduces
additional management and security burdens for an organization’s IT department.
Although it is important to deliver flexible configurations, provide offline access to data
and applications, and enable people to customize their desktop environment, IT
departments are also required to manage which applications users should have access
to, ensure data is backed up, and provide an option to centrally execute applications that
use sensitive data or require high data transfer bandwidth.
Traditionally, the desktop computing model has been one where the operating system,
applications, and user data and settings are bonded to a single computer, making it
difficult for users to move from one computer to another in case of upgrades or a lost or
stolen mobile computer. Depending on the usage scenario and business needs, the right
level of balance between user flexibility and centralized control is likely to be different
across various organizations and even across user groups within each organization. The
Windows Optimized Desktop Scenarios give organizations the ability to choose the client
computing scenarios that best meet the unique needs of their businesses.
This assessment guide helps IT pros understand the capabilities of Windows Optimized
Desktop technologies, determine which scenario(s) are right for their user communities,
and review prerequisites and guidance in planning for desktop virtualization.
Key Takeaways
After reading this guide and running the Windows Optimized Desktop Scenario Selection
Tool, the reader should:
• Understand the different Windows Optimized Desktop scenarios.
• Be able to identify which scenarios apply to their organization.
• Understand the product and technology solutions from Microsoft that address the
challenges faced by the organization in terms of relevant Windows Optimized
Desktop scenarios.
For the Windows Optimized Desktop, Windows Fundamentals for Legacy PCs is an
important part of the solution for the following main scenarios:
• Task Worker
• Contract/Offshore Worker
For more information about Windows Fundamentals for Legacy PCs , see
www.microsoft.com/licensing/sa/benefits/fundamentals.mspx
Hyper-V technology
Windows Server 2008 Hyper-V technology supports microkernel hypervisor to host
multiple guest environments running Windows Vista Enterprise. Specifically, Hyper-V
technology:
• Provides a high performance, hypervisor-based server virtualization solution that is
built right into Windows Server 2008.
• Enables server consolidation of physical systems to virtual, business continuity
management through virtual machines, the dynamic datacenter with mobile, on-
demand workloads, and simplified test and development environments.
• Integrates and leverages Windows technologies, (like Cluster service, and Active
Directory Domain Services), and the System Center family of management solutions.
For the Windows Optimized Desktop, Hyper-V technology is an important part of the
solution for the following main scenarios:
• Contract/Offshore Worker
• Access from Home
For more information about Hyper-V technology, see
www.microsoft.com/windowsserver2008/en/us/hyperv.aspx.
user profile data, which decreases data volume and improves profile synchronization.
The best way to use folder redirection is in a domain environment using Group Policy.
• Client-side caching. Windows Vista provides offline file synchronization capability to
enable consistent access to local copies of files and data that are usually stored on a
remote file server. Client-side caching is especially important for user state
virtualization because it enables offline access to data redirected to a central server
while the user is not connected to the network (for example, if the user is a mobile
worker accessing files from a laptop while on the road).
Presentation Virtualization
Presentation virtualization separates application processing from the interface, making it
possible to run an application on the server while it is controlled from a virtual session on
the user’s desktop. This centralized execution might run only a single application, or it
might present the user with a complete desktop with multiple applications. In either case,
several virtual sessions from one or many computers can use the same installation of an
application.
Presentation virtualization enables the following key benefits within the Windows
Optimized Desktop scenarios:
• Secure data and applications. Presentation virtualization helps organizations keep
critical intellectual property secure by eliminating the need to store sensitive data and
applications on the local device. This reduces the risk of data loss when a laptop is
lost or stolen, and secures application communications using secure sockets layer
(SSL) without a virtual private network (VPN) infrastructure.
• Accelerate application deployment. Presentation virtualization helps organizations
deploy applications faster by installing the software once on a server rather than on
multiple computers, allows access to new operating systems, and delivers rich
applications to devices that cannot run them natively.
• Improve remote worker efficiency. Presentation virtualization improves remote
worker efficiency by increasing server-based application performance over low-
bandwidth connections, launching applications from a Web application, and by
accessing TS RemoteApp programs installed on the local computer.
Presentation virtualization is enabled by the following technology components:
• Windows Server 2008 Terminal Services. The Terminal Services server role
consists of several sub-components known as “role services.” The Terminal Server
role service enables a Windows Server 2008–based computer to host Windows-
based programs or the full Windows desktop. Users can connect to a terminal server
to run programs, save files, and use network resources on that server. The Terminal
Service Gateway (TS Gateway) role service enables authorized remote users to
connect to resources on an internal network, from any Internet-connected device that
can run the Remote Desktop Connection client. The Terminal Service Web Access
(TS Web Access) role service enables users to access RemoteApp programs and a
Remote Desktop connection to the terminal server through a Web site.
• Terminal Services RemoteApp (TS RemoteApp). This client software allows users
to run programs from a terminal server, yet seem as if the programs were running on
the local computer, including resizable windows, drag-and-drop support between
multiple monitors, and notification icons in the notification area. The application,
rather than the entire remote desktop, launches and runs in its own resizable window
on the client computer’s desktop, which eliminates confusion between remote and
local applications. TS RemoteApp lets IT decide whether to deploy applications
directly to the client computer or to a centrally managed Terminal Server host. This
provides IT with the flexibility to determine the appropriate deployment methodology
for each application. For example, an application that is graphically intensive may be
better suited for local deployment to an end-point device, where it can directly use the
local graphics subsystem of that computer. However, a client/server application that
transmits large amounts of data across the network and requires frequent updates,
may perform much faster in a centrally hosted TS RemoteApp configuration.
Application Virtualization
Application virtualization isolates applications from one another to reduce application-to-
application compatibility issues. Using application virtualization allows applications to be
installed and run without altering the file system or the system registry.
Application virtualization enables the following key benefits within the Windows Optimized
Desktop scenarios:
• Provisioning. Application virtualization reduces the need to test applications that are
installed on a client computer for compatibility with one another. This capability allows
IT to provision applications faster, and deploy applications that would not typically be
available to users due to version conflicts.
• Continuity. The underlying operating system is protected from configuration changes
that usually happen during standard application installation. The isolation between
applications also inherently enables applications to be reverted to the previously
known good state, or the original deployment setting. With App-V, applications are
assigned to users. If a user’s computer fails or is lost or stolen, they simply need a
new computer and their applications will be available immediately. There is no need
for the user to remember which applications were installed or wait hours for the
computer to be rebuilt. The applications are available the moment the user logs on to
the new computer.
• Readily accessible applications. IT can deliver applications that meet the needs of
users regardless of whether the users are in the office, on the road, at a remote site,
or holding a meeting at the local coffee shop. IT can stream applications to desktops
on-demand over the intranet or the Internet. When the application are in cache, users
can work offline without interruptions. IT can deliver applications to remote users who
do not have network connectivity by using standalone mode for USB and CD
installation.
• Centralize management of applications. App-V Full Infrastructure or App-V
integration with System Center Configuration Manager or third-party solutions allows
IT to centrally manage, publish, and report on applications to end users. The
organization receives all the benefits of a full PC life cycle management solution and
the ability to manage both physical and virtual applications using the same
infrastructure and workflows that are already in place.
• Roaming user profiles. App-V enables the user to roam from desktop to desktop
and retain both their application and user settings. If the application has already been
loaded into cache, each user who has access to the application will use the same
cached version; There is no need to re-stream or reload into cache for each
individual user.
• Transparent, dynamic application updates. To update applications, administrators
replace only the changed files on the App-V server. Network-connected end users
have immediate access to the latest version without any downtime for application
upgrade.
• End of life. To deprecate an application, administrators simply remove it from the
App-V server and clear the client cache. To remove a particular user's rights,
administrators remove access from Active Directory Domain Services. Either of these
automatically removes the icon for the application from the user’s desktop the next
time the App-V desktop configuration is refreshed.
Application virtualization is enabled by the following technology components:
• Microsoft Application Virtualization 4.5 (App-V). App-V supports application
virtualization by hosting client applications in a small virtual environment that contains
the registry entries, files, COM objects and other components needed to run the
application. This virtual environment provides a layer between the application and
operating system.
App-V is a client/server product that is part of the Microsoft Desktop Optimization
Pack for Software Assurance. App-V includes:
• Management Server for centralized control and configuration.
• Streaming Server for lightweight deployment using Real Time Streaming Protocol
(RTSP) or Transport Layer Security (TLS) + RTSP (RTSPS).
• App-V Sequencer for creating the virtual application package.
• App-V Desktop Client, which enables the virtualization on a local desktop or
mobile computer.
The App-V Terminal Services client, which enables the virtualization on a Terminal
Server is sold separately outside of Microsoft Desktop Optimization Pack for
Software Assurance.
• System Center Configuration Manager 2007 R2. Configuration Manager provides
a platform from which IT can deploy and provision operating systems and settings,
deploy software and application updates, and perform asset inventory and
evaluations. The platform uses multiple Microsoft technologies, including Active
Directory Domain Services (AD DS), Windows Management Instrumentation (WMI),
and Windows Server Update Services (WSUS); and runs on a central Windows
Server-based computer. Configuration Manager supports application virtualization by
providing deployment capability for applications created using App-V. Virtual
application packages run on client computers that are managed by Configuration
Manager 2007 R2that have the App-V client installed. These virtual applications are
delivered in the traditional software distribution method through advertisements to
collections of users or computers, but for virtual applications, streaming from a
distribution point is also possible.
• Together, Microsoft Application Virtualization 4.5 and System Center Configuration
Manager 2007 R2 provide a full PC life cycle management solution for deploying and
managing both physical and virtual applications for enterprise customers. The
combination of these two products enables customers to leverage their existing
infrastructure investment and seamlessly integrate into existing workflows to
package, test, deliver, and manage virtual applications for their end-users alongside
physical software packages using one tool. When combined with other capabilities
such as operating system deployment, software update management, inventory and
license management, as well as model-based configuration management, this
combination provides a strong foundation of client-focused services. Building on a
platform of SQL Server, SQL Reporting Services, hierarchal site management
distribution and scale support for large enterprise workloads, App-V 4.5 and
Configuration Manager R2 can handle the distributed, mobile network landscape of
today's modern organizations.
• System Center Virtual Machine Manager 2008 (VMM). VMM enables rapid
deployment of virtual machines, centralized control of the “building blocks” of the
virtual data center, and delegated self-provisioning by authorized end users.
• Windows Server 2008 Terminal Services. The Terminal Services component of the
Windows Server® 2008 operating system provides technologies that enable users to
access a virtualized desktop environment from almost any computing device. Users
can connect to a terminal server to run programs and to use network resources on
that server.
• Connection Broker. A third-party server application serves as a Terminal Services
connection broker by controlling which Hyper-V guest the client can connect to and
by defining the security access and roles.
Acknowledgments
The Microsoft Solution Accelerator Team (SAT) would like to acknowledge the team that
produced the Windows Optimized Desktop Scenarios Assessment guide. The following
people were either directly responsible for, or made a substantial contribution to, the
writing, development, and testing of this guide.
Program Managers
Venkat Panchapagesan
Anupama Vedapuri
Content Developers
Michael Sarabosing, Covestic Inc
Sean Bethune, Covestic Inc
Product Manager
Peter Larsen
Release Manager
Gaile Simmons
Editor
Jennifer Kerns, Wadeware
Tester
Greg St. Vincent-Provo, Covestic Inc