Duration 43:59
16+
Play
Video

Citrix Synergy TV - SYN205 - Windows management using Citrix Endpoint Management

Wayne Liu
Manager, Product Management at Citrix
  • Video
  • Table of contents
  • Video
Citrix Synergy Atlanta 2019
May 23 2019, Atlanta, GA, United States
Citrix Synergy Atlanta 2019
Video
Citrix Synergy TV - SYN205 - Windows management using Citrix Endpoint Management
Available
In cart
Free
Free
Free
Free
Free
Free
Add to favorites
343
I like 0
I dislike 0
Available
In cart
Free
Free
Free
Free
Free
Free
  • Description
  • Transcript
  • Discussion

About speakers

About the talk

Topic: IT

Citrix Endpoint Management service provides centralized endpoint management from Citrix Cloud. In this session, we will discuss the integration of Citrix Endpoint Management and Workspace Environment Management services, focusing on performance optimization, workspace customization, policy enforcement, and efficient monitoring. You will leave this session with a more in-depth understanding of CEM and WEM service technical details and recommendations that will help you provide a better experience to your Citrix Workspace users.Note: This session will be available for on-demand viewing post-event on Citrix Synergy TV.

Share

Okay, let's get started the welcome. Welcome to Windows management use fishing Sand Point magnet fishing. My name is Wayne. I'm the 00:06 product manager for Windows device management in general. And this is my co-presenter. 00:16 It will 00:22 be a quiz at the end. But for now, just call me Terry. Okay, so indecision we're going to walk through with you about the Windows device management. 00:32 We're going to talk about to pour that offer that we have today in Citrus. Why is endpoint Management Service status walk specimen Management Service 00:40

record of how it works and I were also going to show you why the two product is so important for your 00:49 most tradition to the digital workspace. So talking about the device management, this is really 00:58 something you right there. There is a lot of different options in the market already about device management. And if you look at all those Market 01:08 leaders Hugo MN do they find out that there is really something in common. First of all the solution Master be optimized for you to experience 01:16

that made the effort for the end user and also for the it administrator when they go into the solution everything needs to be very thing for. All 01:26 right, maybe want to sing simple click then talk to them so that the solution must be very simple and more importantly the solution must be 01:35 transparent for end-user the main to know about back in the day when it goes blank Lane Byram and everything is there 01:44 and and also that they know that the purpose of all those Simplicity is to improve the end of the protect productivity. 01:53

And if you still remember the key notes in the key now to announce intelligent workspace, right all those fancy notification, you know prioritize 02:03 based on your urgency all those aspects of the work space right? There is also addressed act like, you know, we need to have the workspace app setup. 02:11 You need to configure workspace up properly and there is also add application like for example office with his wife there is a bunch of configuration. 02:21 They are right so that the management solution kind of needs to facilitate the configuration of all those different places and bring them together and 02:29

provide and user experience. So there's also other aspect and about the workplace, which is also important. 02:38 Yeah, that's right. So look at it be great. If all that we 02:47 had to worry about which is easier to use for our end users. But the reality is security is a huge part of what we do. Honestly, I would say it's 02:57 probably at the Forefront what you guys are being asked to do on behalf of your customers are here at your end users in so forthright and the nice 03:05

thing is with the two offerings ever going to show you get both in the past. It's always been this like you're balancing of Hades 03:14 abused versus security, right? I see the people nodding their heads. Well, honestly that doesn't have to be that way we offer a lot of Rich 03:24 functionality like single sign-on enablement. We do a lot of that in that really adds security and it makes it even easier for your end user so you 03:31 don't have to worry about password management. How to type in their passwords again like that's a win-win right? That one's a no-brainer for you guys. 03:40

So security is at the Forefront and then you know, we have a cloud service. I might be a cloud architect. So I'm kind of biased on this area but 03:46 Citrix has been you know, we've been solid in the cloud for a long time. Now, we have a sitter Cloud platform that we build on and it's really an 03:55 enabler for all of your Citrix offerings. That's why I saw the endpoint management solution that we provide is really to connect 9 years 04:02 experience in security and make them much seamlessly and provide service to a new user. So I feel go back like 10 years before I 04:12

have to look at Citrix, right we do with the knives in their store with virtualization a recent years, if its work space 04:22 and if you look at pictures work space today, there is really more things than just a virtualization and in walks past you will also have your mobile 04:31 device. Sandpoint, right? Do I have your different workstation? You will have laptop all those different device is already part of your workspace. So 04:40 for an investor management solution or any kind of need to cover both the virtualization pod and physical part 04:50

this needs to be covered and on top of the device itself, there will also be lots of different elements that you need to take care 04:59 for the importation rate in the kind of need to provide that I can make sure there a way to put on application action figure those. 05:09 Preference for that Patricia and you need to make the application ready before your end users can use it and they're so awesome cross documents like 05:18 an Enterprise data. You want to make sure that the right people have access to the documents and more importantly. You also want to make sure that 05:28

only the right people have set the day that you don't want anal leakage, you know don't want no sanding Enterprise confidential information, right? So 05:37 they are securities or rear sway very important and there is also an identity meaning that you know, how do you want to import that user account 05:46 machine account to assistant? And how do you want to organize them? Those are something that is very basic that endpoint Management Solutions needs to 05:55 provide. There is more like security experiments configuration device needs to provide. 06:04

And looking at 6 today, we have to provide to solution. When is Citrus employment service stand for sure. So 06:17 this is will also call it's a modern a Windows device management solution. Why is that because the solution is actually based on the Windows 10 06:27 a medium protocol which is mobile device management protocol and this solution is focused on Windows 10 only that's a terrible name, 06:37 but the key point is this is what Microsoft is 06:46 pushing right now. So if you had your if your subscription Stadium service already 06:56

then say and service will be a standalone tire and you're my service or List it if you haven't subscribed to see you and Siri yet. 07:06 I'll be in your my service available service list. So the other option that we provide is when replacing battery Management Service that 07:17 actually comes along with the store itself. So it provides on Prime versing and the cow bushing and for the 07:27 unplugged version. If you have the nuts in desktop Enterprise and above license, then you will have access to when on Prime bushing and on the other 07:37

hand, we also have the Constitution which one we announced last with energy and we make it at the available in August last year. So 07:45 when trouser is is also an atom to the pictures virtual app and Desktop Service and there's a bunch of other service like in the not-so-distant well, 07:55 so if you if you purchase, you know, such a letter if you have that one then when 08:04 service will already be part of your my available service list, so that's what we offer. So entitled under the 08:13

super Q like in a walk play from an appointment pass. So that's the ones that is. So one of the common question I have is 08:23 real estate like in Outlook. I have my dentist appointment, but I also have my 08:33 what is actually say I'm service. We actually put web service in Cairo 08:39 man Angus a.m. Service. So if you have the Samsung gas already then Wham service will also be available so that you can cover both specialization and 08:49 physical. So I assume that in a week since we provide both routine, right the modern management and 08:59

Investment Management. There is some similarity and there is some difference so Terrier going to show us some of those difference and common 09:08 things, right? Tell me about this out a little bit. And so there's a lot of similarities 09:18 right there. Both of them have a cloud service option. And again, that's what I recommend us. There's just a lot of options in 09:28 settings and configurations that are coming just because they're both doing Windows management and they're both optimized for portfolio. 09:38

They're meant to integrate and work with your existing environment. But also a lot of differences that it is important to keep in mind. So 09:47 right earlier about how Windows is really considering this as the modern way to manage all of your 09:56 desktop going for that's only available in Windows 10. Now keep in mind on the right hand side is your traditional client-based management way of 10:06 doing things right that the one of the big kind of God chose their you that you have to keep in mind. Is it active directory-based so it's not always 10:16

suitable for Like a BYOD a kind of scenario that you're trying to be probably are seeing more and more of just about every single 10:24 Windows platform out there with their servers are win7. I hope you don't have too many of those left. I'm sure you do and so on and so forth. Now you 10:34 can kind of see I'm talking about device and that's true but keep in mind that you can actually always Target a combination of device in User. 10:42 It's just what the centricity is if that's the word right? So the combination of the two 10:52

is honesty better than just a sum-of-the-parts, right? So by having both you getting this unified Solution that's going to cover the breadth of 11:01 everything that you need to do whether it's a base or whether you're having BYOD scenarios and so forth. 11:10 Are okay with active directory as a requirement than that, you know that kind of dictates some of the extra functionality that you're going to show 11:25 later on. In fact, we're going to show you some demos that leverage aspects of both and see how by having both and get a complete end-to-end 11:31

story. The one of the train that way I usually observe observe is saying that there's more and more customer transition 11:40 from Windows 7 to Windows 10 for one reason. I think they don't have Minute Rice ride because Microsoft is pushing Windows 10, but don't add hand 11:50 actually Windows 10 is also provide a more and more security features. Like, you know, you will have to use case I have personal data. I have 11:59 Enterprise data. How can I isolate them? Right there is information protection are there is encryption software like in a BitLocker which is how I 12:06

know increasing your data, right? So Microsoft more and more security feature into the system is salt a kind of security system and tell me 12:15 what is a play in the security area for employment service 10 offers a lot of functionality that's built into the operating system. But 12:25 to be honest, it's not really manageable in a sane way so cem and are unified offering here. Is really a way to make that manageable for you. 12:35 So with us you when you get your your basic stuff your OS updates in publishing a u x 12:45

e a n s. I even Microsoft Store app and so forth. Right? All of that is covered but Windows 10 offers a lot of really cool features Windows 12:54 information protection. I'm not sure if everyone knows about that. We're going to show demo later on talking about that stuff like BitLocker. I mean, 13:03 I think that's a no-brainer of a man that's a pain to set up. In fact, one of the things that were left in that what are things that were considering 13:11 doing is handling the device recovery key for BitLocker for you. So I love to hear your back on that. 13:21

But again, I mean BitLocker, right? It does full disk encryption is absolutely a necessity in my mind if you have laptops because of that gets stolen. 13:31 You don't know your customer data getting stolen and of course your engineers. Personal photos and stuff getting stolen either. So, you know, I think 13:38 that really offer secure path across all the dog 13:47 is still the most critical part for any successful digital transformation. You want you and use it to feel better by there's nothing 13:55

aspect off you'll experience and when service is really for that purpose is all those different configurations for the user 14:05 and they want to make sure that when they go thing ever since they all do you want to optimize their work space right frequency go to work space for 14:15 them and also that you want the login to be quick you want application to respond faster. You don't want to let you know. I want them to wait till I 14:22 get to 1 minutes for an application to open so it won't they they they they can immediately expect that to all and it made it to the use their throat 14:31

excessive data. a decent use experiments and another party security right like Terry 14:39 defamation Windows 10 already did a lot of security features for the sentence. There is still the Windows server still amount of 14:48 Legacy pass from Detroit today, right like Windows 7, how do I improve the security for the servers for Windows 7 to in when we also provide a lot of 14:58 security features like an application security which allows you to configure what is allowed to wrong and what is not allowed to run? 15:08

So I will just want to use one example from a real customer to spend further about the application performance 15:18 optimization in Wham so this is actually from T-Mobile. They have a big deployment of Wham today unveiled EDI environment 15:27 environment. So this is actually the first amounts when they deploy to where I'm going to try to do a Samsung 15:37 beta calculation and this is the data for the first amount. So by just at the point where I'm going to the environment doing nothing but yourself in 15:46

my position and they immediately say there is 10% How do I take a credit to increase 10% and also that before they Implement 15:54 when I actually there are no windows logging is like a hundred forty-three seconds and after they instrumentals optimization what they say is 16:04 locking up to Talking Tom videos from 104. 3 seconds two notches. 69 seconds, which is 16:13 56% increase. Do my say that 10% is not a big deal. But in reality is 10% 16:23 increase of the house work at the bilty nest at the gas plant $1000000 for other items YouTube. So 10% Augusta 1 million, 16:33

but 16:43 a lot of you are probably already have an entitlement to win today and I don't know if you're using it. Maybe that's why you're here at the session 16:52 will if this is just money that you're giving up if you're not already leveraging with him, right? So I left you money on the table and got to send 16:59 this. There is also a lot of things right because 56% increase of the login time for that. Make that means one minute login to 17:06 optimize videos for a single loving and at T-Mobile they have I think they'd have 50,000 the users in general and on average 17:16

every user login five. 728 times a day that increase main stat in a 17:26 for T-Mobile they can they can have two thousand additional two thousand hours additional time for their real production work that depicts a v 17:36 let's take one step back. I think about magnets lose yourself, right? There is always sweet aspect of any management software on this device in the 17:48 user onboarding you want to make sure that there is a way that you can properly import use and devices to the system and more importantly you want you 17:58

want to argue organize them nicely to fit into the business requirements, right? I think I sing of course, it's management at 112 to go to be able to 18:07 configure to put downstairs in his manager stating is to roam the settings all those things a lot less very important. We also want to monitor the 18:16 system you want to understand what's going on, right? What's going wrong? And if there's something wrong you want to put down some changes and 18:23 continue Moana Moana make sure that your mitigation really remove tissue from you. So this is really on low price continues to monitor 18:31

you continue to make configuration changes and Daniel go back to Marcus and again, Weather in to breakout product into the street categories 18:41 and expand to you how we're going to stay and work in this three different categories. The first of all is about device onboarding and we have a bunch 18:51 of boxes for the by somebody else that right. Terry you are if you do it manually 19:00 and the end-user renal text in a bunch of information and in that kind of stuff to be honest, if I 19:10

write that might work well for you know, I'm testing it out that kind of stuff for your end-users 19:17 that much. So what I really feel is the best way is this is that Windows feature if you are 19:25 getting the devices, you know, for the very first time we haven't even install the OS yet. When does autopilot is the way to go? We have some great 19:35 blogs on how to do this in his it's really just, you know, hands-free you automatically get that MDM enrollment and you don't have to worry about it 19:41

again now, I'm sure you guys also have a lot of existing Windows environments that you also need to do. So for that Vulcan Roman is really the 19:48 solution Give you a demo on how to do bulk enrollment and you can kind of see what the user experience is going to be for the end user and what you 19:56 have to do beforehand now based solution. I'm service. Obviously, that's just installing an exe and so forth and 20:03 you can use all of your traditional mechanisms and what not. In fact, if you're using like a v a sour punch, you can bake it into the image and so 20:13

forth, right? I won't belabor that point. So now let me go over to the demo. And when I'm looking at right now is the endpoint Management console, 20:19 right and we go over to manage and go to device whitelist and here is basically is his car like a security feature. We allow you to specify all of the 20:28 devices that are allowed to enroll you can add to manually don't recommend it instead. We have this import CSV salsa Sopris, you're going to download 20:38 a template which I've already filled out here and you have two options. You can specify the device either be a hardware device name. Honestly, the 20:47

device name is what I recommend is really the only realistic option in my opinion and it's way easier to set up so you just fill this out and then you 20:56 upload it back into the endpoint management and you're going to get a lift. So like this of all of the devices that you want to be able to control. 21:06 The second part is going to settings in Windows bulk enrollment in case it was a lot of information here and we're about to use this information. 21:14 But the only thing you have to actually add to this is the identity of the person that's going to actually do the enrollment. So I have the special 21:23

unroll user in active directory environment and that's the person that's going to be doing that. So now I'm going to switch over to a Microsoft tool 21:31 and it's called Windows configuration designer and any hear this creates a provisioning package going to get a lot of what we do is we just make 21:39 existing Windows Funk. Easier. You're going to see a lot of things. And by the way, you did see my password earlier. I don't know if you noticed that 21:47 if you did and I'm glad you didn't was very secret. But that's what goes under the secret thing right there. That's where you put in a password. 21:54

Everything else is just what you see on the screen here really simple. You going to end up with a PKG file and this is like a self-contained file and 22:00 then you can distribute that however you want you can even send it over email to your end users input on the network file share Microsoft put 22:10 recommend putting it in like a SharePoint environment. How are you doing? So what are we to do now is going to transition to a prototypical Windows 10 22:17 environment and I've already discovered that file, you know, however, I've done that and you can kind of see how easy this is going to be for the end 22:26

user. All they have to do is double click on a PKG file. And of course they have to accept this and then it's going to ask you really want to enroll 22:33 this device. They say yes, go ahead and add it and that's it. It's a simple monkey could do it like it is really easy. So now I'm 22:42 back into settings for Windows and then into your account and then finally access work or school and you're going to see the enrollment. In fact, you 22:52 can see there. I am I have been enrolled into his MGM environment. And in fact Down Below on the lower right-hand corner, you can see encryption. I 23:01

didn't mess it up with policies on my in the environment. 23:11 They're 23:13 already kicking in you can also see the last thing fate and some other information as well in the middle left side there. So and honestly, that's 23:24 really all you have to do in order to get started. Okay. Now that you have your device in the using Road, right? The next thing is about configure. 23:33 What is the option that we have? And there is always some challenges, challenges and experience sign one that's in my system is too slow. 23:40

How come my login take so many time how come my application to take so many time to lunch and also there is issues like you know, is that too 23:50 complicated. I need to go to a different place for the same work like, you know, if you want to do the counter for you. You need to go to different 24:00 page found out different information isn't feeling right. It's kind of complicated. I last play, you know, you have your virtualized environment. You 24:07 have your physical device. Sometimes they use experience is not very consistent, right you make changes in one place, but it goes to another place to 24:15

change is not there. So what is The Challenge from item in stock? And there's a lot of challenges 24:23 for sure. I have a mixed environment with your legacy environment your server environment and your 24:32 Windows 10 environment and so forth, right? There's a lot of concerns and concerns means complexity often timer. And you know, that's something that 24:42 we aim to to fax. I mean that's a large part of making this easier and then finally the combination of new apps and Taps and apps I mean 24:51

that's just ridiculous. This happens right in that kind of stuff. So we are really making it easy people smiling and might have been that guy 25:01 stuff that you know, what you really need some kind of measurement tool to help you with options that provide today 25:10 or the feature that list here is the future that we always already released. Unpause applications to low ride there is always sleep you memory 25:19 optimization. We can optimize the way that operate application use the resource. And we also have you know application configuration and 25:29

all those different options for you to configure the environment knows that supposed to help you with the throw login issues because one of the 25:38 biggest end portal login is ready to process a GPO Incipio is pretty slow and you can convert all those can be anything to win and one of the one of 25:46 the powerful engine model biggest you can select a different attribute to Define. How does the dance is applied to a user for 25:56 them for you can use ID attributes on desktop, right? So you can use to see that attributes to assign 26:06

different configurations to the user not say about doing it, you know in 26:15 contestants of Confederation. The profile management is going to help you write a profile antenna. 26:25 Toyota direct part of your profile into a container and that contain a well be mounted on the fly. When you log into a new machine to 26:35 all the setting will be there and a way that we do profile container. Is it a little bit different from the market offer diggers in the market off of 26:45

yesterday. You redirect the entire profile into the Container right? And the way you lie, and I know this is allows you to define a small portion of 26:53 your profile like to know the real big files big folders into the profile so that only a small portion will be redirected into the Container. The 27:02 benefit of this approach is really the mounted fishing environment for them for you have your than that it is very common that you might login to 27:12 different application at the same time. Right? And if you put all the profile include a container, that means the conflict zone is actually Add 27:20

profile label at the user profile label and if we allows you to to Justice grab a small portion Of the fire on the folder into the Container then we 27:28 reduce the conflict Zone to the file and folder label which will help in the mountain current scenario. And there's like an application 27:38 profiler that can't give you the option to really defend a small portion of the profile into the into the you know, you're the shell. So that's the 27:47 equation. That's also a feature of European that allows you map to settings between different operating system. 27:56

So next time going to give you one quick demo of how the optimization working. Well, so this is the way I'm cloud service and in-house service. It's 28:07 identical to the one on Pine Bush identical. What I do is I enabled us a few optimization. And the next thing I'm going to do is I'm going to log into 28:16 war machine with mine and I log into machine that it takes some time to login, but it was said that it's Porta 6 minutes and 6 seconds 28:24 the most so you log into the machine and in the machine, I have a pre-loaded application cost if you either die efficient. Nothing but 28:34

contempt if you okay you can say that a lot of sleep you and it's when I click on and it was time to eat to sleep you then see if your goes to 98% 28:44 already right in an almost at raising you cannot launch application, but it might taste I open my OneDrive I go to a demo. So, you know, I can still 28:53 browser all the different to sing and if you go back to the see if you either you want Is that the priority of that process goes to low so that's the 29:02 way that we optimize it up to master. Let up add application to have the chance to use the CPU resource. So that vacation will be optimized for 29:11

the music theory for that application responsiveness. And after that is about security, right? This is another case study. 29:21 So insecurities are there is always challenges as well. Like, you know in a walk space today you have so many different devices. Can you have your 29:30 mobile device in Windows device Mobility is wrong. I want to sing challenges 29:40 and I saw so many different use case right today. You have BYOD device to have contract all those those different your case and contacts it into the 29:50

Enterprise data security protection and there's a lot of options from it as well and Windows 10 kind of gives you that already kind of 30:00 built-in you get that for free with Windows information protection for Windows 10. Like why is BitLocker that's actually not, you know, just Windows 30:09 10 an absolutely key thing. If you just want to do full disk encryption and you'll handle a lot of those scenarios. So what I want To do is I can give 30:19 you a demo of how to configure that from the Citrix endpoint Management console and you can kind of see how to push that out to all of your end users. 30:27

So here I am once again back in the cloud version of the Citrix endpoint Management console. I already have a number of device policies pre-configured 30:35 just to kind of speed things up a little bit. We're going to take a look at the BitLocker one first and you're going to see that the very first thing 30:43 you going to want to do is actually enable it to be honest. This should probably be on but I'm not really sure why it's lights off by default cuz if 30:52 you get my benefit out of it and everything that you might want to take a look at our the encryption methods which is really your algorithms and what 31:00

do you want to use to encrypt it and so forth and then finally whether or not to have an additional prompt for the authentication in this one's a 31:10 little bit misleading if Kinship will 31:17 automatically handle that for you. And if you get really annoying for your end users if they have to type in yet another password just to give the 31:27 thing to to get started but just be aware that you have kind of cognizant of what kind of Hardware that can you play too. So the next part is just 31:34

deciding which delivery group in other words which set of users and that's what I'm going to do is take a look at Windows information 31:43 protection. And this is really need it allows you to get that position for your customer data. And in fact 31:53 that the settings now for Whip and the first thing you do is you to find which apps and their controls and that's be allowed to call him on the right 32:03 hand side there. There's three options about the night and exempt allowed means that they're allowed to access customer data denied as for like no pad 32:12

for instance or not going to be able to open up customer data and then exempt The terrible name it means read only. And then enforcement level in this 32:21 one's keep theirs. Once again three options silent is basically we're just going to login. Are you just going to get aware of it? But no notification 32:31 to the end user override might be quite common. That's the one where they can you give a warning to the end user that they were login this but you can 32:39 still continue if you really think you need to and then last one is just block him. The next thing you do to find your Enterprise boundary in person 32:47

to do is for your identities so that right there is your active directory domain information and then there's a data recovery certificate and this is 32:56 probably the only confusing part fortunately. I have a demo on that shows just how easy it actually is you just type this in into power show or 33:06 command prompt you decide on a password for securing the pfx file a c e r n a p f x y don't have to show up you go 33:13 into settings you upload that CER file and that's it. You will see that that's an option. Right the next parts are defining your network 33:23

boundary and that includes, you know, your FTD ends for your internal sites and so forth and then your private IP range for your internal Network and 33:33 anything within that is considered your customer data Foundry. And there's going to be all of those are behaviors are going to get applied to that 33:42 boundary. Send it right here. You can kind of see him going once again to specifying whatever your internal private IP range 33:49 is there's a couple of other settings. So I'm going to go ahead now and just apply it to a delivery group once again. And 33:59

that's it. I now have traded my policies of his final to my users. I'm going to log in to a Windows 10 machine and see what it looks like. Once again, 34:09 I'm going to go into settings. This is Emmanuel rubbish way of doing this right accounts access work and you can see I only 34:19 have it. Type of the cool way of doing that that's the right way to do it and now you're going to see that we 34:28 have enrolled actually I have to refresh now, you're going to see it sooner old. And once again, there's my BitLocker stuff automatically kicking in 34:38

and then the policies on the left hand side. Once again show you that data protection and that Network isolation and that's that when does information 34:48 protection that's kicking in and again, the behavior that you're going to see is stuff. Like I can be able to save it or export those files outside 34:55 of your network because it's deemed cuz it's containerized big benefit. You really get Windows 10 for this Windows information protection feature. 35:05 So Daddy was PlayStation it really you know, let's say I'm a traitor so I crave a lot of script to automate 35:16

send push down Powershell. Maybe 35:24 this 35:30 is more of the advanced functionality. Soon as I push the right button and I wanted two things that we really do is unable to give the full 35:40 functionality of power supposed to eat anything you can imagine you probably do with Powershell. We allow you to push down a Powershell script execute 35:50 that and importantly it will report back to status of that and only execute at once with that you can do all kinds of stuff like handle really weird 35:58

at publishing configuration scenarios, and that kind of stuff. I 36:07 really need stuff like per app VPN and then I mean that's the kind of stuff that I think is absolutely killer if you want to 36:17 limit access having something like a private VPN really gives you that that date security when it's in transit for those are two features that we're 36:27 going to talk more about at the end. We have some links and you can take photos of that and see how we do that. Are the last case that I was going to 36:36

share with you is about transitioning for transition from one family member to the cowl and this is for when because we have the unplugged version to 36:45 call version way and we will talk about this already in the lattice energy. So Into You Why are we actually give you the option to download a 36:53 migration tool? And the way it works is you know, it download it to all your executed in on the environment and what it does it what generates 37:00 configuration file and you can upload a configuration file into your account deployment. And what they do is knowing that the car service 37:08

will automatically ink photos uploaded the configuration file and import into the database. That's very quick is 37:18 a way for you to buy create your own Prime environment to lockout service. So that's an antigen part of the last Apollo. We want to talk about this 37:28 monitoring. Right and it's and it's time canceled today and we provide monitoring the reporting. I will also provide some reporting and Matt 37:38 monitoring function in warm as well. So this is this is a list of things that we can do today for the morning report in part. It's not that much 37:45

picture but we are in the way of adding more monitoring and Reporting function to the product itself. So again, I think our strategy is 37:55 moving towards unification way unification means that we want to provide you one single your wife or Windows device management and it'll cover both 38:05 MDM and when we don't need to worry about what is the back-end Technologies we can handle all those things similar stay in the back end and all you 38:15 need to know is it support both warm and MDMA say no Windows 10 for Morgan and also Windows server. And of course, we were supposed to know physical 38:23

and virtue and it's now because we have example that you know, this is a feature that our relationship has shipped 38:32 for GPO management and this is actually an example of how does how does unification is it going to work in the future? So in this group policy 38:41 management function and this is actually something that we can configure in the same console bee and Council of those different settings and the way 38:51 it works is all those didn't act. Configit Tell City and swept be pushed into the wind service. And then when service Where You Tube and channel to 39:01

push down the conversion to the way magent to process it still remember one of the benefits of wine for spitting management is 39:09 quick right is its performance? So if you use this way, you will get the benefit of performance and in the same time all the things that coupon if 39:18 they can manage can be down by a council. Yet another benefit 39:28 is it really helps also act like, you know, I'm disconnected laptops in that kind of stuff cuz they're the wind component will still be able to get 39:38

those GPO policies. So let's take a look as to how this would look and first one to start out in Citrix endpoint Management console. Once again, I'm 39:45 looking at the device policies and there is one for GPS the windows GPO configuration policy and I'm going to go in and take a look at the settings 39:55 and there are a lot of things pretty much all the settings that you would expect are going to be available here in this is just an example of what you 40:03 would expect to see, you know, the three states before through your typical policy. We do both device and user. So what I'm going to do is just show 40:10

you two policies that have configured one device and one user and the first one is for whether or not to show the lock option in the user menu. 40:18 And then I'm going to do another one to show you whether or not to display the time in CEST ride and look at these are not really useful 40:28 policies, but I'm just going to show you that it is possible. No rocking the boat here. You do have to apply it to active directory 40:37 joined Machines, of course, and then how I would think I should make clear you do need to have both offerings right to eat. This is a combination of 40:47

stem and Wham working together. So now when you go to a Windows 10 laptop before and if I take there's my lock option to get rid of that 40:57 and then there's the time and I'm going to get rid of that too. Right then. I'm going to reboot the machine and we're going to take a look at what 41:06 that looks like the words Windows GPO policies get applied. So now in the agent has contacted and we take a look 41:15 at lock option is gone and As you can see, there's no more time. So it mission accomplished. We have secured this Windows 10 laptop 41:25

fantastic. So then I will go about some of the balance the configuration options. You can use the 41:34 customer at 6 tomorrow to configure a VPN on a Windows password. They can't deploy the in a wintry to add apps as well using those small bounce that 41:44 acknowledges when you guys are ready for the advanced stuff. This is your Batman utility 41:54 write anything that you can think of you can accomplish with these two mechanisms. Yes, so as a pizza takeaway, 42:04 that's that's just the remember those things right first place. We're going to a we actually provide this already. So we approach will provide you a 42:13

unified Windows Management Solutions about Cabos MDM and wam wam agent-based management solution and the for the for the MDM 42:21 part, we won't be more focusing on the more than device management, which is Windows 10 device management and for when we're focusing on something and 42:31 then we're focusing on the Windows Server platform. We are focusing on things cannot be down by the resource optimization those things. So that's the 42:40 thing that we're going to do. As you're free to really in hotel at your comments thinking in a feedback all those things. We are 42:50

here to listen to you to you and understand what you need. And what we really want is taking your on your comments and make them into 42:59 the product and improve the product and eventually help you with your digital transformation. And we are the last recession of things in point 43:09 management product. But there is a bunch of different sessions that happened already that you may want to take a look at such a TV as a 43:19 replay and those are really something you know updates of things happening in those technical updates for those things. 43:29

So feel free to radio station as well as the requirements. 43:39

Cackle comments for the website

Buy this talk

Access to the talk “Citrix Synergy TV - SYN205 - Windows management using Citrix Endpoint Management”
Available
In cart
Free
Free
Free
Free
Free
Free

Video

Get access to all videos “Citrix Synergy Atlanta 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket

Interested in topic “IT”?

You might be interested in videos from this event

September 28 2018
Moscow
16
122
app store, apps, development, google play, mobile, soft

Buy this video

Video

Access to the talk “Citrix Synergy TV - SYN205 - Windows management using Citrix Endpoint Management”
Available
In cart
Free
Free
Free
Free
Free
Free

Conference Cast

With ConferenceCast.tv, you get access to our library of the world's best conference talks.

Conference Cast
505 conferences
19653 speakers
7164 hours of content