About the talk
Citrix Endpoint Management service provides centralized endpoint management from Citrix Cloud. In this session, we will discuss the integration of Citrix Endpoint Management and Workspace Environment Management services, focusing on performance optimization, workspace customization, policy enforcement, and efficient monitoring. You will leave this session with a more in-depth understanding of CEM and WEM service technical details and recommendations that will help you provide a better experience to your Citrix Workspace users.Note: This session will be available for on-demand viewing post-event on Citrix Synergy TV.
Okay, let's get started the welcome. Welcome to Windows management use fishing Sand Point magnet fishing. My name is Wayne. I'm the product manager for Windows device management in general. And this is my co-presenter. It will be a quiz at the end. But for now, just call me Terry. Okay, so indecision we're going to walk through with you about the Windows device management. We're going to talk about to pour that offer that we have today in Citrus. Why is endpoint Management Service status walk specimen Management Service
record of how it works and I were also going to show you why the two product is so important for your most tradition to the digital workspace. So talking about the device management, this is really something you right there. There is a lot of different options in the market already about device management. And if you look at all those Market leaders Hugo MN do they find out that there is really something in common. First of all the solution Master be optimized for you to experience
that made the effort for the end user and also for the it administrator when they go into the solution everything needs to be very thing for. All right, maybe want to sing simple click then talk to them so that the solution must be very simple and more importantly the solution must be transparent for end-user the main to know about back in the day when it goes blank Lane Byram and everything is there and and also that they know that the purpose of all those Simplicity is to improve the end of the protect productivity.
And if you still remember the key notes in the key now to announce intelligent workspace, right all those fancy notification, you know prioritize based on your urgency all those aspects of the work space right? There is also addressed act like, you know, we need to have the workspace app setup. You need to configure workspace up properly and there is also add application like for example office with his wife there is a bunch of configuration. They are right so that the management solution kind of needs to facilitate the configuration of all those different places and bring them together and
provide and user experience. So there's also other aspect and about the workplace, which is also important. Yeah, that's right. So look at it be great. If all that we had to worry about which is easier to use for our end users. But the reality is security is a huge part of what we do. Honestly, I would say it's probably at the Forefront what you guys are being asked to do on behalf of your customers are here at your end users in so forthright and the nice
thing is with the two offerings ever going to show you get both in the past. It's always been this like you're balancing of Hades abused versus security, right? I see the people nodding their heads. Well, honestly that doesn't have to be that way we offer a lot of Rich functionality like single sign-on enablement. We do a lot of that in that really adds security and it makes it even easier for your end user so you don't have to worry about password management. How to type in their passwords again like that's a win-win right? That one's a no-brainer for you guys.
So security is at the Forefront and then you know, we have a cloud service. I might be a cloud architect. So I'm kind of biased on this area but Citrix has been you know, we've been solid in the cloud for a long time. Now, we have a sitter Cloud platform that we build on and it's really an enabler for all of your Citrix offerings. That's why I saw the endpoint management solution that we provide is really to connect 9 years experience in security and make them much seamlessly and provide service to a new user. So I feel go back like 10 years before I
have to look at Citrix, right we do with the knives in their store with virtualization a recent years, if its work space and if you look at pictures work space today, there is really more things than just a virtualization and in walks past you will also have your mobile device. Sandpoint, right? Do I have your different workstation? You will have laptop all those different device is already part of your workspace. So for an investor management solution or any kind of need to cover both the virtualization pod and physical part
this needs to be covered and on top of the device itself, there will also be lots of different elements that you need to take care for the importation rate in the kind of need to provide that I can make sure there a way to put on application action figure those. Preference for that Patricia and you need to make the application ready before your end users can use it and they're so awesome cross documents like an Enterprise data. You want to make sure that the right people have access to the documents and more importantly. You also want to make sure that
only the right people have set the day that you don't want anal leakage, you know don't want no sanding Enterprise confidential information, right? So they are securities or rear sway very important and there is also an identity meaning that you know, how do you want to import that user account machine account to assistant? And how do you want to organize them? Those are something that is very basic that endpoint Management Solutions needs to provide. There is more like security experiments configuration device needs to provide.
And looking at 6 today, we have to provide to solution. When is Citrus employment service stand for sure. So this is will also call it's a modern a Windows device management solution. Why is that because the solution is actually based on the Windows 10 a medium protocol which is mobile device management protocol and this solution is focused on Windows 10 only that's a terrible name, but the key point is this is what Microsoft is pushing right now. So if you had your if your subscription Stadium service already
then say and service will be a standalone tire and you're my service or List it if you haven't subscribed to see you and Siri yet. I'll be in your my service available service list. So the other option that we provide is when replacing battery Management Service that actually comes along with the store itself. So it provides on Prime versing and the cow bushing and for the unplugged version. If you have the nuts in desktop Enterprise and above license, then you will have access to when on Prime bushing and on the other
hand, we also have the Constitution which one we announced last with energy and we make it at the available in August last year. So when trouser is is also an atom to the pictures virtual app and Desktop Service and there's a bunch of other service like in the not-so-distant well, so if you if you purchase, you know, such a letter if you have that one then when service will already be part of your my available service list, so that's what we offer. So entitled under the
super Q like in a walk play from an appointment pass. So that's the ones that is. So one of the common question I have is real estate like in Outlook. I have my dentist appointment, but I also have my what is actually say I'm service. We actually put web service in Cairo man Angus a.m. Service. So if you have the Samsung gas already then Wham service will also be available so that you can cover both specialization and physical. So I assume that in a week since we provide both routine, right the modern management and
Investment Management. There is some similarity and there is some difference so Terrier going to show us some of those difference and common things, right? Tell me about this out a little bit. And so there's a lot of similarities right there. Both of them have a cloud service option. And again, that's what I recommend us. There's just a lot of options in settings and configurations that are coming just because they're both doing Windows management and they're both optimized for portfolio.
They're meant to integrate and work with your existing environment. But also a lot of differences that it is important to keep in mind. So right earlier about how Windows is really considering this as the modern way to manage all of your desktop going for that's only available in Windows 10. Now keep in mind on the right hand side is your traditional client-based management way of doing things right that the one of the big kind of God chose their you that you have to keep in mind. Is it active directory-based so it's not always
suitable for Like a BYOD a kind of scenario that you're trying to be probably are seeing more and more of just about every single Windows platform out there with their servers are win7. I hope you don't have too many of those left. I'm sure you do and so on and so forth. Now you can kind of see I'm talking about device and that's true but keep in mind that you can actually always Target a combination of device in User. It's just what the centricity is if that's the word right? So the combination of the two
is honesty better than just a sum-of-the-parts, right? So by having both you getting this unified Solution that's going to cover the breadth of everything that you need to do whether it's a base or whether you're having BYOD scenarios and so forth. Are okay with active directory as a requirement than that, you know that kind of dictates some of the extra functionality that you're going to show later on. In fact, we're going to show you some demos that leverage aspects of both and see how by having both and get a complete end-to-end
story. The one of the train that way I usually observe observe is saying that there's more and more customer transition from Windows 7 to Windows 10 for one reason. I think they don't have Minute Rice ride because Microsoft is pushing Windows 10, but don't add hand actually Windows 10 is also provide a more and more security features. Like, you know, you will have to use case I have personal data. I have Enterprise data. How can I isolate them? Right there is information protection are there is encryption software like in a BitLocker which is how I
know increasing your data, right? So Microsoft more and more security feature into the system is salt a kind of security system and tell me what is a play in the security area for employment service 10 offers a lot of functionality that's built into the operating system. But to be honest, it's not really manageable in a sane way so cem and are unified offering here. Is really a way to make that manageable for you. So with us you when you get your your basic stuff your OS updates in publishing a u x
e a n s. I even Microsoft Store app and so forth. Right? All of that is covered but Windows 10 offers a lot of really cool features Windows information protection. I'm not sure if everyone knows about that. We're going to show demo later on talking about that stuff like BitLocker. I mean, I think that's a no-brainer of a man that's a pain to set up. In fact, one of the things that were left in that what are things that were considering doing is handling the device recovery key for BitLocker for you. So I love to hear your back on that.
But again, I mean BitLocker, right? It does full disk encryption is absolutely a necessity in my mind if you have laptops because of that gets stolen. You don't know your customer data getting stolen and of course your engineers. Personal photos and stuff getting stolen either. So, you know, I think that really offer secure path across all the dog is still the most critical part for any successful digital transformation. You want you and use it to feel better by there's nothing
aspect off you'll experience and when service is really for that purpose is all those different configurations for the user and they want to make sure that when they go thing ever since they all do you want to optimize their work space right frequency go to work space for them and also that you want the login to be quick you want application to respond faster. You don't want to let you know. I want them to wait till I get to 1 minutes for an application to open so it won't they they they they can immediately expect that to all and it made it to the use their throat
excessive data. a decent use experiments and another party security right like Terry defamation Windows 10 already did a lot of security features for the sentence. There is still the Windows server still amount of Legacy pass from Detroit today, right like Windows 7, how do I improve the security for the servers for Windows 7 to in when we also provide a lot of security features like an application security which allows you to configure what is allowed to wrong and what is not allowed to run?
So I will just want to use one example from a real customer to spend further about the application performance optimization in Wham so this is actually from T-Mobile. They have a big deployment of Wham today unveiled EDI environment environment. So this is actually the first amounts when they deploy to where I'm going to try to do a Samsung beta calculation and this is the data for the first amount. So by just at the point where I'm going to the environment doing nothing but yourself in
my position and they immediately say there is 10% How do I take a credit to increase 10% and also that before they Implement when I actually there are no windows logging is like a hundred forty-three seconds and after they instrumentals optimization what they say is locking up to Talking Tom videos from 104. 3 seconds two notches. 69 seconds, which is 56% increase. Do my say that 10% is not a big deal. But in reality is 10% increase of the house work at the bilty nest at the gas plant $1000000 for other items YouTube. So 10% Augusta 1 million,
but a lot of you are probably already have an entitlement to win today and I don't know if you're using it. Maybe that's why you're here at the session will if this is just money that you're giving up if you're not already leveraging with him, right? So I left you money on the table and got to send this. There is also a lot of things right because 56% increase of the login time for that. Make that means one minute login to optimize videos for a single loving and at T-Mobile they have I think they'd have 50,000 the users in general and on average
every user login five. 728 times a day that increase main stat in a for T-Mobile they can they can have two thousand additional two thousand hours additional time for their real production work that depicts a v let's take one step back. I think about magnets lose yourself, right? There is always sweet aspect of any management software on this device in the user onboarding you want to make sure that there is a way that you can properly import use and devices to the system and more importantly you want you
want to argue organize them nicely to fit into the business requirements, right? I think I sing of course, it's management at 112 to go to be able to configure to put downstairs in his manager stating is to roam the settings all those things a lot less very important. We also want to monitor the system you want to understand what's going on, right? What's going wrong? And if there's something wrong you want to put down some changes and continue Moana Moana make sure that your mitigation really remove tissue from you. So this is really on low price continues to monitor
you continue to make configuration changes and Daniel go back to Marcus and again, Weather in to breakout product into the street categories and expand to you how we're going to stay and work in this three different categories. The first of all is about device onboarding and we have a bunch of boxes for the by somebody else that right. Terry you are if you do it manually and the end-user renal text in a bunch of information and in that kind of stuff to be honest, if I
write that might work well for you know, I'm testing it out that kind of stuff for your end-users that much. So what I really feel is the best way is this is that Windows feature if you are getting the devices, you know, for the very first time we haven't even install the OS yet. When does autopilot is the way to go? We have some great blogs on how to do this in his it's really just, you know, hands-free you automatically get that MDM enrollment and you don't have to worry about it
again now, I'm sure you guys also have a lot of existing Windows environments that you also need to do. So for that Vulcan Roman is really the solution Give you a demo on how to do bulk enrollment and you can kind of see what the user experience is going to be for the end user and what you have to do beforehand now based solution. I'm service. Obviously, that's just installing an exe and so forth and you can use all of your traditional mechanisms and what not. In fact, if you're using like a v a sour punch, you can bake it into the image and so
forth, right? I won't belabor that point. So now let me go over to the demo. And when I'm looking at right now is the endpoint Management console, right and we go over to manage and go to device whitelist and here is basically is his car like a security feature. We allow you to specify all of the devices that are allowed to enroll you can add to manually don't recommend it instead. We have this import CSV salsa Sopris, you're going to download a template which I've already filled out here and you have two options. You can specify the device either be a hardware device name. Honestly, the
device name is what I recommend is really the only realistic option in my opinion and it's way easier to set up so you just fill this out and then you upload it back into the endpoint management and you're going to get a lift. So like this of all of the devices that you want to be able to control. The second part is going to settings in Windows bulk enrollment in case it was a lot of information here and we're about to use this information. But the only thing you have to actually add to this is the identity of the person that's going to actually do the enrollment. So I have the special
unroll user in active directory environment and that's the person that's going to be doing that. So now I'm going to switch over to a Microsoft tool and it's called Windows configuration designer and any hear this creates a provisioning package going to get a lot of what we do is we just make existing Windows Funk. Easier. You're going to see a lot of things. And by the way, you did see my password earlier. I don't know if you noticed that if you did and I'm glad you didn't was very secret. But that's what goes under the secret thing right there. That's where you put in a password.
Everything else is just what you see on the screen here really simple. You going to end up with a PKG file and this is like a self-contained file and then you can distribute that however you want you can even send it over email to your end users input on the network file share Microsoft put recommend putting it in like a SharePoint environment. How are you doing? So what are we to do now is going to transition to a prototypical Windows 10 environment and I've already discovered that file, you know, however, I've done that and you can kind of see how easy this is going to be for the end
user. All they have to do is double click on a PKG file. And of course they have to accept this and then it's going to ask you really want to enroll this device. They say yes, go ahead and add it and that's it. It's a simple monkey could do it like it is really easy. So now I'm back into settings for Windows and then into your account and then finally access work or school and you're going to see the enrollment. In fact, you can see there. I am I have been enrolled into his MGM environment. And in fact Down Below on the lower right-hand corner, you can see encryption. I
didn't mess it up with policies on my in the environment. They're already kicking in you can also see the last thing fate and some other information as well in the middle left side there. So and honestly, that's really all you have to do in order to get started. Okay. Now that you have your device in the using Road, right? The next thing is about configure. What is the option that we have? And there is always some challenges, challenges and experience sign one that's in my system is too slow.
How come my login take so many time how come my application to take so many time to lunch and also there is issues like you know, is that too complicated. I need to go to a different place for the same work like, you know, if you want to do the counter for you. You need to go to different page found out different information isn't feeling right. It's kind of complicated. I last play, you know, you have your virtualized environment. You have your physical device. Sometimes they use experience is not very consistent, right you make changes in one place, but it goes to another place to
change is not there. So what is The Challenge from item in stock? And there's a lot of challenges for sure. I have a mixed environment with your legacy environment your server environment and your Windows 10 environment and so forth, right? There's a lot of concerns and concerns means complexity often timer. And you know, that's something that we aim to to fax. I mean that's a large part of making this easier and then finally the combination of new apps and Taps and apps I mean
that's just ridiculous. This happens right in that kind of stuff. So we are really making it easy people smiling and might have been that guy stuff that you know, what you really need some kind of measurement tool to help you with options that provide today or the feature that list here is the future that we always already released. Unpause applications to low ride there is always sleep you memory optimization. We can optimize the way that operate application use the resource. And we also have you know application configuration and
all those different options for you to configure the environment knows that supposed to help you with the throw login issues because one of the biggest end portal login is ready to process a GPO Incipio is pretty slow and you can convert all those can be anything to win and one of the one of the powerful engine model biggest you can select a different attribute to Define. How does the dance is applied to a user for them for you can use ID attributes on desktop, right? So you can use to see that attributes to assign
different configurations to the user not say about doing it, you know in contestants of Confederation. The profile management is going to help you write a profile antenna. Toyota direct part of your profile into a container and that contain a well be mounted on the fly. When you log into a new machine to all the setting will be there and a way that we do profile container. Is it a little bit different from the market offer diggers in the market off of
yesterday. You redirect the entire profile into the Container right? And the way you lie, and I know this is allows you to define a small portion of your profile like to know the real big files big folders into the profile so that only a small portion will be redirected into the Container. The benefit of this approach is really the mounted fishing environment for them for you have your than that it is very common that you might login to different application at the same time. Right? And if you put all the profile include a container, that means the conflict zone is actually Add
profile label at the user profile label and if we allows you to to Justice grab a small portion Of the fire on the folder into the Container then we reduce the conflict Zone to the file and folder label which will help in the mountain current scenario. And there's like an application profiler that can't give you the option to really defend a small portion of the profile into the into the you know, you're the shell. So that's the equation. That's also a feature of European that allows you map to settings between different operating system.
So next time going to give you one quick demo of how the optimization working. Well, so this is the way I'm cloud service and in-house service. It's identical to the one on Pine Bush identical. What I do is I enabled us a few optimization. And the next thing I'm going to do is I'm going to log into war machine with mine and I log into machine that it takes some time to login, but it was said that it's Porta 6 minutes and 6 seconds the most so you log into the machine and in the machine, I have a pre-loaded application cost if you either die efficient. Nothing but
contempt if you okay you can say that a lot of sleep you and it's when I click on and it was time to eat to sleep you then see if your goes to 98% already right in an almost at raising you cannot launch application, but it might taste I open my OneDrive I go to a demo. So, you know, I can still browser all the different to sing and if you go back to the see if you either you want Is that the priority of that process goes to low so that's the way that we optimize it up to master. Let up add application to have the chance to use the CPU resource. So that vacation will be optimized for
the music theory for that application responsiveness. And after that is about security, right? This is another case study. So insecurities are there is always challenges as well. Like, you know in a walk space today you have so many different devices. Can you have your mobile device in Windows device Mobility is wrong. I want to sing challenges and I saw so many different use case right today. You have BYOD device to have contract all those those different your case and contacts it into the
Enterprise data security protection and there's a lot of options from it as well and Windows 10 kind of gives you that already kind of built-in you get that for free with Windows information protection for Windows 10. Like why is BitLocker that's actually not, you know, just Windows 10 an absolutely key thing. If you just want to do full disk encryption and you'll handle a lot of those scenarios. So what I want To do is I can give you a demo of how to configure that from the Citrix endpoint Management console and you can kind of see how to push that out to all of your end users.
So here I am once again back in the cloud version of the Citrix endpoint Management console. I already have a number of device policies pre-configured just to kind of speed things up a little bit. We're going to take a look at the BitLocker one first and you're going to see that the very first thing you going to want to do is actually enable it to be honest. This should probably be on but I'm not really sure why it's lights off by default cuz if you get my benefit out of it and everything that you might want to take a look at our the encryption methods which is really your algorithms and what
do you want to use to encrypt it and so forth and then finally whether or not to have an additional prompt for the authentication in this one's a little bit misleading if Kinship will automatically handle that for you. And if you get really annoying for your end users if they have to type in yet another password just to give the thing to to get started but just be aware that you have kind of cognizant of what kind of Hardware that can you play too. So the next part is just
deciding which delivery group in other words which set of users and that's what I'm going to do is take a look at Windows information protection. And this is really need it allows you to get that position for your customer data. And in fact that the settings now for Whip and the first thing you do is you to find which apps and their controls and that's be allowed to call him on the right hand side there. There's three options about the night and exempt allowed means that they're allowed to access customer data denied as for like no pad
for instance or not going to be able to open up customer data and then exempt The terrible name it means read only. And then enforcement level in this one's keep theirs. Once again three options silent is basically we're just going to login. Are you just going to get aware of it? But no notification to the end user override might be quite common. That's the one where they can you give a warning to the end user that they were login this but you can still continue if you really think you need to and then last one is just block him. The next thing you do to find your Enterprise boundary in person
to do is for your identities so that right there is your active directory domain information and then there's a data recovery certificate and this is probably the only confusing part fortunately. I have a demo on that shows just how easy it actually is you just type this in into power show or command prompt you decide on a password for securing the pfx file a c e r n a p f x y don't have to show up you go into settings you upload that CER file and that's it. You will see that that's an option. Right the next parts are defining your network
boundary and that includes, you know, your FTD ends for your internal sites and so forth and then your private IP range for your internal Network and anything within that is considered your customer data Foundry. And there's going to be all of those are behaviors are going to get applied to that boundary. Send it right here. You can kind of see him going once again to specifying whatever your internal private IP range is there's a couple of other settings. So I'm going to go ahead now and just apply it to a delivery group once again. And
that's it. I now have traded my policies of his final to my users. I'm going to log in to a Windows 10 machine and see what it looks like. Once again, I'm going to go into settings. This is Emmanuel rubbish way of doing this right accounts access work and you can see I only have it. Type of the cool way of doing that that's the right way to do it and now you're going to see that we have enrolled actually I have to refresh now, you're going to see it sooner old. And once again, there's my BitLocker stuff automatically kicking in
and then the policies on the left hand side. Once again show you that data protection and that Network isolation and that's that when does information protection that's kicking in and again, the behavior that you're going to see is stuff. Like I can be able to save it or export those files outside of your network because it's deemed cuz it's containerized big benefit. You really get Windows 10 for this Windows information protection feature. So Daddy was PlayStation it really you know, let's say I'm a traitor so I crave a lot of script to automate
send push down Powershell. Maybe this is more of the advanced functionality. Soon as I push the right button and I wanted two things that we really do is unable to give the full functionality of power supposed to eat anything you can imagine you probably do with Powershell. We allow you to push down a Powershell script execute that and importantly it will report back to status of that and only execute at once with that you can do all kinds of stuff like handle really weird
at publishing configuration scenarios, and that kind of stuff. I really need stuff like per app VPN and then I mean that's the kind of stuff that I think is absolutely killer if you want to limit access having something like a private VPN really gives you that that date security when it's in transit for those are two features that we're going to talk more about at the end. We have some links and you can take photos of that and see how we do that. Are the last case that I was going to
share with you is about transitioning for transition from one family member to the cowl and this is for when because we have the unplugged version to call version way and we will talk about this already in the lattice energy. So Into You Why are we actually give you the option to download a migration tool? And the way it works is you know, it download it to all your executed in on the environment and what it does it what generates configuration file and you can upload a configuration file into your account deployment. And what they do is knowing that the car service
will automatically ink photos uploaded the configuration file and import into the database. That's very quick is a way for you to buy create your own Prime environment to lockout service. So that's an antigen part of the last Apollo. We want to talk about this monitoring. Right and it's and it's time canceled today and we provide monitoring the reporting. I will also provide some reporting and Matt monitoring function in warm as well. So this is this is a list of things that we can do today for the morning report in part. It's not that much
picture but we are in the way of adding more monitoring and Reporting function to the product itself. So again, I think our strategy is moving towards unification way unification means that we want to provide you one single your wife or Windows device management and it'll cover both MDM and when we don't need to worry about what is the back-end Technologies we can handle all those things similar stay in the back end and all you need to know is it support both warm and MDMA say no Windows 10 for Morgan and also Windows server. And of course, we were supposed to know physical
and virtue and it's now because we have example that you know, this is a feature that our relationship has shipped for GPO management and this is actually an example of how does how does unification is it going to work in the future? So in this group policy management function and this is actually something that we can configure in the same console bee and Council of those different settings and the way it works is all those didn't act. Configit Tell City and swept be pushed into the wind service. And then when service Where You Tube and channel to
push down the conversion to the way magent to process it still remember one of the benefits of wine for spitting management is quick right is its performance? So if you use this way, you will get the benefit of performance and in the same time all the things that coupon if they can manage can be down by a council. Yet another benefit is it really helps also act like, you know, I'm disconnected laptops in that kind of stuff cuz they're the wind component will still be able to get
those GPO policies. So let's take a look as to how this would look and first one to start out in Citrix endpoint Management console. Once again, I'm looking at the device policies and there is one for GPS the windows GPO configuration policy and I'm going to go in and take a look at the settings and there are a lot of things pretty much all the settings that you would expect are going to be available here in this is just an example of what you would expect to see, you know, the three states before through your typical policy. We do both device and user. So what I'm going to do is just show
you two policies that have configured one device and one user and the first one is for whether or not to show the lock option in the user menu. And then I'm going to do another one to show you whether or not to display the time in CEST ride and look at these are not really useful policies, but I'm just going to show you that it is possible. No rocking the boat here. You do have to apply it to active directory joined Machines, of course, and then how I would think I should make clear you do need to have both offerings right to eat. This is a combination of
stem and Wham working together. So now when you go to a Windows 10 laptop before and if I take there's my lock option to get rid of that and then there's the time and I'm going to get rid of that too. Right then. I'm going to reboot the machine and we're going to take a look at what that looks like the words Windows GPO policies get applied. So now in the agent has contacted and we take a look at lock option is gone and As you can see, there's no more time. So it mission accomplished. We have secured this Windows 10 laptop
fantastic. So then I will go about some of the balance the configuration options. You can use the customer at 6 tomorrow to configure a VPN on a Windows password. They can't deploy the in a wintry to add apps as well using those small bounce that acknowledges when you guys are ready for the advanced stuff. This is your Batman utility write anything that you can think of you can accomplish with these two mechanisms. Yes, so as a pizza takeaway, that's that's just the remember those things right first place. We're going to a we actually provide this already. So we approach will provide you a
unified Windows Management Solutions about Cabos MDM and wam wam agent-based management solution and the for the for the MDM part, we won't be more focusing on the more than device management, which is Windows 10 device management and for when we're focusing on something and then we're focusing on the Windows Server platform. We are focusing on things cannot be down by the resource optimization those things. So that's the thing that we're going to do. As you're free to really in hotel at your comments thinking in a feedback all those things. We are
here to listen to you to you and understand what you need. And what we really want is taking your on your comments and make them into the product and improve the product and eventually help you with your digital transformation. And we are the last recession of things in point management product. But there is a bunch of different sessions that happened already that you may want to take a look at such a TV as a replay and those are really something you know updates of things happening in those technical updates for those things.
Buy this talk
Access to all the recordings of the event
Buy this video
With ConferenceCast.tv, you get access to our library of the world's best conference talks.