SlideShare une entreprise Scribd logo
1  sur  19
System Center Configuration
Manager 2012
The application model in real life


Kim Oppalfens
Senior consultant | Inovativ
Co-Founder System Center user group Belgium
Disclaimers

1. NOT an overview session
2. NOT a sales pitch
3. No, I do NOT have an answer to all scenarios (yet).
Agenda

•   Vision behind the app model
•   The app model overview in record time
•   User device affinity
•   Content library
•   Application Supersedence
•   Application Uninstalls
•   Challenges and potential workarounds
•   Troubleshooting & Monitoring
•   Questions?
Vision behind the app model


  Lifecycle
                  •   Install
                  •   Upgrade
                  •   Uninstall

 management       •
                  •
                      Retire
                      Versioning and history




 User centric     • Deliver applications to users not computers

 deployment
Vision behind the app model
                                                         Application Installation




        Application Uninstall                                                           Application Revision




                                Application Retirement              Application Supersedence
The app model overview
Requirement Rules in 2012
State-based Application Management


 Properties of users
 and/or devices that     Rules are per          Evaluated in real-
  makes delivering     deployment type          time on the client
software appropriate


             Evaluated before
                content is           Re-evaluated on a
            downloaded to the            schedule
                  client
Detection Methods
State-based Application Management
Detection is the key to any state based software
distribution system


     Detection methods enable systems to determine
     whether or not an application is already present on a
     system (Discovery)


           Detection methods are also used to determine the
           success or failure of a deployment



                 Important to get these right!
Application evaluation flow
Application Supersedence


                                                                  But, Allows admins to
 Definition: The ability for                                         testpilot newer
  the admin to create a        This ultimately results in the      application, prior to
 relationship and declare      newer application replacing      production release. While
one application newer than      the older application for a        permitting the older
     another previous                user on a device           application to continue to
        application.                                             exist for the majority of
                                                                            users
Supersedence and the end-user UX

                  User only sees latest application
                  version in Software Catalog (by
                              default)


                Required applications are always the
                enterprise’s latest version. When the
                 user or computer receives a policy
                  that targets it with BOTH policies


                Available Applications installed by
                user can be automatically updated
Supersedence examples (1) Simple
Scenario and Assumptions
 2 applications:
   Adobe Reader X supersedes
    Adobe Reader 9
 Both applications deployed to
  same device
If client has Adobe Reader 9 already
installed
 assuming requirements are met for
      Reader X, Reader 9 will be replaced
      with Reader X (either uninstalled or
      updated)

If client has Adobe Reader X already
installed
 evaluates both 9 and X detection
      methods, X is present, 9 is not – but
      since X supersedes, it doesn’t try to
      install 9

If neither are installed, only Adobe
Reader X will be installed
Supersedence examples (2) Conflict

 2 applications:
  Adobe Reader X supersedes Adobe Reader 9
 Accounting App (AA1) depends on Reader 9
Case 1: Client receives all policies
 No applications have been previously installed
 Assuming requirements for all Deployment Types are met, Reader X will be
  installed on device
 AA1 is not installed on client, and conflict requirements not met message
Case 2: AA1 policy received prior to supersedence relationship defined.
 AA1 and Reader 9 will be installed (assuming requirements are met),
 When Reader X is deployed, a conflict for Reader X will be provided to user and
  admin
Application Uninstalls

                                          • Uninstall is a deployment action
     Admin creates an Uninstall
           Deployment                     • The App Model defines an uninstall method for each Deployment
                                            Type of an Application.


An admin defines a specific collection
to target the Uninstall Deployment to
      (either users or machines)


If a user or device is the recipient of
     both an install and uninstall
policy, then install wins and the app
         will not be removed
Troubleshooting & monitoring




                               The deployment
 What logfiles?
                               monitoring tool
Sharing our experiences / challenges



Applications installed
                          User targeted installs                           Application Uninstalls
during a tasksequence                              Roaming user logging
                         and computer targeted                              do not validate the
  generate an install                               in to my workstation
                                uninstalls                                    requirements
        policy
Challenges and potential workarounds

   Required app to
                                                   Automatically
   user on primary       Required appv with
                                                 upgrade available
  device, available on    roaming profiles
                                                    applications
     non-primary

                            Uninstall an
                         application from a
                         machine that is still
                         targetted to users
The application model in real life

Contenu connexe

Tendances

SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012Amit Gatenyo
 
Arun Prasad-R.DOCX
Arun Prasad-R.DOCXArun Prasad-R.DOCX
Arun Prasad-R.DOCXArun R
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012JasonCondo
 
MedV/AppV Overview
MedV/AppV OverviewMedV/AppV Overview
MedV/AppV OverviewStephen Rose
 
Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5ukdpe
 
Introduction to jmeter & how to view jmeter Test Result in Real-Time
Introduction to jmeter & how to view jmeter Test Result in Real-TimeIntroduction to jmeter & how to view jmeter Test Result in Real-Time
Introduction to jmeter & how to view jmeter Test Result in Real-TimeBugRaptors
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMJerry Bishop
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012ebuc
 
Psi cgl test_auto_casestudy_v01
Psi cgl test_auto_casestudy_v01Psi cgl test_auto_casestudy_v01
Psi cgl test_auto_casestudy_v01Primesoftinc
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Abdelslam Elsobky
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Amit Gatenyo
 
V mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugV mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugAlan Maloney
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012capriguy84
 

Tendances (18)

SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
Arun Prasad-R.DOCX
Arun Prasad-R.DOCXArun Prasad-R.DOCX
Arun Prasad-R.DOCX
 
App V
App VApp V
App V
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012
 
MedV/AppV Overview
MedV/AppV OverviewMedV/AppV Overview
MedV/AppV Overview
 
Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5
 
Introduction to jmeter & how to view jmeter Test Result in Real-Time
Introduction to jmeter & how to view jmeter Test Result in Real-TimeIntroduction to jmeter & how to view jmeter Test Result in Real-Time
Introduction to jmeter & how to view jmeter Test Result in Real-Time
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
kishore
kishorekishore
kishore
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
Psi cgl test_auto_casestudy_v01
Psi cgl test_auto_casestudy_v01Psi cgl test_auto_casestudy_v01
Psi cgl test_auto_casestudy_v01
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007
 
V mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugV mware+thin app+-+gcvmug
V mware+thin app+-+gcvmug
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Deployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccmDeployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccm
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012
 

En vedette

KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?Dr. Raju M. Mathew
 
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)EMC
 
20140627加古川男女共同参画センター講演
20140627加古川男女共同参画センター講演20140627加古川男女共同参画センター講演
20140627加古川男女共同参画センター講演Maco Yoshioka
 
The Origins of the Maurice Blond Agency
The Origins of the Maurice Blond AgencyThe Origins of the Maurice Blond Agency
The Origins of the Maurice Blond AgencyLaurel Blond
 
Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313EMC
 
Mon tues supply curves
Mon tues supply curvesMon tues supply curves
Mon tues supply curvesTravis Klein
 
Mit2 092 f09_lec03
Mit2 092 f09_lec03Mit2 092 f09_lec03
Mit2 092 f09_lec03Rahman Hakim
 
Aplicaciones modernas con React.js
Aplicaciones modernas con React.jsAplicaciones modernas con React.js
Aplicaciones modernas con React.jsOctavio Luna Bernal
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Microsoft TechNet - Belgium and Luxembourg
 
Mit2 092 f09_lec15
Mit2 092 f09_lec15Mit2 092 f09_lec15
Mit2 092 f09_lec15Rahman Hakim
 
Tues treaty of versailles
Tues treaty of versaillesTues treaty of versailles
Tues treaty of versaillesTravis Klein
 
NDEF WriterとOSとPaSoRi
NDEF WriterとOSとPaSoRiNDEF WriterとOSとPaSoRi
NDEF WriterとOSとPaSoRiHirokuma Ueno
 
06 trade and value
06 trade and value06 trade and value
06 trade and valueTravis Klein
 

En vedette (20)

KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
 
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
 
20140627加古川男女共同参画センター講演
20140627加古川男女共同参画センター講演20140627加古川男女共同参画センター講演
20140627加古川男女共同参画センター講演
 
Day 4
Day 4Day 4
Day 4
 
The Origins of the Maurice Blond Agency
The Origins of the Maurice Blond AgencyThe Origins of the Maurice Blond Agency
The Origins of the Maurice Blond Agency
 
การผลิตสื่อ
การผลิตสื่อการผลิตสื่อ
การผลิตสื่อ
 
Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313
 
սուրբ գեվորգ
սուրբ գեվորգսուրբ գեվորգ
սուրբ գեվորգ
 
Mon tues supply curves
Mon tues supply curvesMon tues supply curves
Mon tues supply curves
 
Mit2 092 f09_lec03
Mit2 092 f09_lec03Mit2 092 f09_lec03
Mit2 092 f09_lec03
 
Mon banking
Mon bankingMon banking
Mon banking
 
Aplicaciones modernas con React.js
Aplicaciones modernas con React.jsAplicaciones modernas con React.js
Aplicaciones modernas con React.js
 
Wrk
WrkWrk
Wrk
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
 
Mit2 092 f09_lec15
Mit2 092 f09_lec15Mit2 092 f09_lec15
Mit2 092 f09_lec15
 
Tues treaty of versailles
Tues treaty of versaillesTues treaty of versailles
Tues treaty of versailles
 
NDEF WriterとOSとPaSoRi
NDEF WriterとOSとPaSoRiNDEF WriterとOSとPaSoRi
NDEF WriterとOSとPaSoRi
 
06 trade and value
06 trade and value06 trade and value
06 trade and value
 
Citophobia apa
Citophobia apaCitophobia apa
Citophobia apa
 
Eva clas
Eva clasEva clas
Eva clas
 

Similaire à The application model in real life

Application Lifecycle Management (ALM).pdf
Application Lifecycle Management (ALM).pdfApplication Lifecycle Management (ALM).pdf
Application Lifecycle Management (ALM).pdfAmitesh Raikwar
 
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous IntegrationExperitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous IntegrationExperitest
 
Software Engineering-Part 1
Software Engineering-Part 1Software Engineering-Part 1
Software Engineering-Part 1Shrija Madhu
 
The Essentials of Mobile App Testing and Monitoring
The Essentials of Mobile App Testing and MonitoringThe Essentials of Mobile App Testing and Monitoring
The Essentials of Mobile App Testing and MonitoringMobilePundits
 
Regression Testing - A Complete Guide
Regression Testing - A Complete GuideRegression Testing - A Complete Guide
Regression Testing - A Complete GuideAbhay Kumar
 
Build vs. Buy: Designing an Effective Software Update Delivery Solution
Build vs. Buy: Designing an Effective Software Update Delivery SolutionBuild vs. Buy: Designing an Effective Software Update Delivery Solution
Build vs. Buy: Designing an Effective Software Update Delivery SolutionFlexera
 
Unified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_publicUnified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_publicHerman Arnedo
 
functional testing
functional testing functional testing
functional testing bharathanche
 
Flexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera
 
What are the top 10 performance testing tools
What are the top 10 performance testing toolsWhat are the top 10 performance testing tools
What are the top 10 performance testing toolsTestingXperts
 
App Testing SEO Expert Bangladesh LTD
App Testing SEO Expert Bangladesh LTDApp Testing SEO Expert Bangladesh LTD
App Testing SEO Expert Bangladesh LTDTasnim Jahan
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtestingAkss004
 
2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptxKENNEDYDONATO1
 
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...kalichargn70th171
 

Similaire à The application model in real life (20)

Application Lifecycle Management (ALM).pdf
Application Lifecycle Management (ALM).pdfApplication Lifecycle Management (ALM).pdf
Application Lifecycle Management (ALM).pdf
 
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous IntegrationExperitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
 
Software Engineering-Part 1
Software Engineering-Part 1Software Engineering-Part 1
Software Engineering-Part 1
 
The Essentials of Mobile App Testing and Monitoring
The Essentials of Mobile App Testing and MonitoringThe Essentials of Mobile App Testing and Monitoring
The Essentials of Mobile App Testing and Monitoring
 
Regression Testing - A Complete Guide
Regression Testing - A Complete GuideRegression Testing - A Complete Guide
Regression Testing - A Complete Guide
 
行動應用App管理 (MAM)
行動應用App管理 (MAM) 行動應用App管理 (MAM)
行動應用App管理 (MAM)
 
Build vs. Buy: Designing an Effective Software Update Delivery Solution
Build vs. Buy: Designing an Effective Software Update Delivery SolutionBuild vs. Buy: Designing an Effective Software Update Delivery Solution
Build vs. Buy: Designing an Effective Software Update Delivery Solution
 
Unified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_publicUnified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_public
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Continuos Delivery
Continuos DeliveryContinuos Delivery
Continuos Delivery
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
functional testing
functional testing functional testing
functional testing
 
Flexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera Software App Portal Datasheet
Flexera Software App Portal Datasheet
 
What are the top 10 performance testing tools
What are the top 10 performance testing toolsWhat are the top 10 performance testing tools
What are the top 10 performance testing tools
 
App Testing SEO Expert Bangladesh LTD
App Testing SEO Expert Bangladesh LTDApp Testing SEO Expert Bangladesh LTD
App Testing SEO Expert Bangladesh LTD
 
Vendor Analysis Template
Vendor Analysis TemplateVendor Analysis Template
Vendor Analysis Template
 
SE-Lecture-2.pptx
SE-Lecture-2.pptxSE-Lecture-2.pptx
SE-Lecture-2.pptx
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtesting
 
2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx
 
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
 

Plus de Microsoft TechNet - Belgium and Luxembourg

Plus de Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

The application model in real life

  • 2. The application model in real life Kim Oppalfens Senior consultant | Inovativ Co-Founder System Center user group Belgium
  • 3. Disclaimers 1. NOT an overview session 2. NOT a sales pitch 3. No, I do NOT have an answer to all scenarios (yet).
  • 4. Agenda • Vision behind the app model • The app model overview in record time • User device affinity • Content library • Application Supersedence • Application Uninstalls • Challenges and potential workarounds • Troubleshooting & Monitoring • Questions?
  • 5. Vision behind the app model Lifecycle • Install • Upgrade • Uninstall management • • Retire Versioning and history User centric • Deliver applications to users not computers deployment
  • 6. Vision behind the app model Application Installation Application Uninstall Application Revision Application Retirement Application Supersedence
  • 7. The app model overview
  • 8. Requirement Rules in 2012 State-based Application Management Properties of users and/or devices that Rules are per Evaluated in real- makes delivering deployment type time on the client software appropriate Evaluated before content is Re-evaluated on a downloaded to the schedule client
  • 9. Detection Methods State-based Application Management Detection is the key to any state based software distribution system Detection methods enable systems to determine whether or not an application is already present on a system (Discovery) Detection methods are also used to determine the success or failure of a deployment Important to get these right!
  • 11. Application Supersedence But, Allows admins to Definition: The ability for testpilot newer the admin to create a This ultimately results in the application, prior to relationship and declare newer application replacing production release. While one application newer than the older application for a permitting the older another previous user on a device application to continue to application. exist for the majority of users
  • 12. Supersedence and the end-user UX User only sees latest application version in Software Catalog (by default) Required applications are always the enterprise’s latest version. When the user or computer receives a policy that targets it with BOTH policies Available Applications installed by user can be automatically updated
  • 13. Supersedence examples (1) Simple Scenario and Assumptions  2 applications:  Adobe Reader X supersedes Adobe Reader 9  Both applications deployed to same device If client has Adobe Reader 9 already installed  assuming requirements are met for Reader X, Reader 9 will be replaced with Reader X (either uninstalled or updated) If client has Adobe Reader X already installed  evaluates both 9 and X detection methods, X is present, 9 is not – but since X supersedes, it doesn’t try to install 9 If neither are installed, only Adobe Reader X will be installed
  • 14. Supersedence examples (2) Conflict  2 applications:  Adobe Reader X supersedes Adobe Reader 9  Accounting App (AA1) depends on Reader 9 Case 1: Client receives all policies  No applications have been previously installed  Assuming requirements for all Deployment Types are met, Reader X will be installed on device  AA1 is not installed on client, and conflict requirements not met message Case 2: AA1 policy received prior to supersedence relationship defined.  AA1 and Reader 9 will be installed (assuming requirements are met),  When Reader X is deployed, a conflict for Reader X will be provided to user and admin
  • 15. Application Uninstalls • Uninstall is a deployment action Admin creates an Uninstall Deployment • The App Model defines an uninstall method for each Deployment Type of an Application. An admin defines a specific collection to target the Uninstall Deployment to (either users or machines) If a user or device is the recipient of both an install and uninstall policy, then install wins and the app will not be removed
  • 16. Troubleshooting & monitoring The deployment What logfiles? monitoring tool
  • 17. Sharing our experiences / challenges Applications installed User targeted installs Application Uninstalls during a tasksequence Roaming user logging and computer targeted do not validate the generate an install in to my workstation uninstalls requirements policy
  • 18. Challenges and potential workarounds Required app to Automatically user on primary Required appv with upgrade available device, available on roaming profiles applications non-primary Uninstall an application from a machine that is still targetted to users

Notes de l'éditeur

  1. (http://technet.microsoft.com/en-us/library/hh427342.aspx#BKMK_LogLocation)AppIntentEval.logAppDiscovery.logAppEnforce.logCcmExec.logCcmsdkprovider.logConfigMgrSoftwareCatalog.logDataTransferService.logExecMgr.logPolicyAgent.logSoftwareCatalogUpdateEndpoint.logSoftwareCenterSystemTasks.logStateMessage.logVirtualApp.log
  2. Global conditions vs Collection rulesWhentouseanapp