<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/oliver-sills/rss" /><link>https://www.ivanti.com/blog/authors/oliver-sills</link><item><guid isPermaLink="false">3d730bf6-4fdf-4e31-98c9-e45310a701b8</guid><link>https://www.ivanti.com/blog/new-set-windows-10-default-apps-with-ivanti-environment-manager</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Endpoint Management</category><title>NEW! Set Windows 10 Default Apps with Ivanti Environment Manager</title><description>&lt;p&gt;Ivanti is always looking to help IT simplify the administration of &lt;a href="https://www.ivanti.com/products/environment-manager" target="_blank"&gt;Windows 10&lt;/a&gt; environments and with thanks to our talented development team over in 's-Hertogenbosch in the Netherlands, we’re delighted to announce a number of new tools to ease Windows 10 administration when utilizing &lt;a href="https://www.ivanti.com/products/user-workspace-manager" target="_blank"&gt;Ivanti User Workspace Manager&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Set Default Browser&lt;/li&gt;
	&lt;li&gt;Set Default Mail Client&lt;/li&gt;
	&lt;li&gt;Set Default PDF Viewer&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each of these utilities can be called from an &lt;a href="https://www.ivanti.com/products/environment-manager" target="_blank"&gt;Environment Manager&lt;/a&gt; configuration and triggered to apply at logon, to ensure users have the correct default applications in place for their session.&lt;/p&gt;

&lt;p&gt;Each zipped tool file contains a PDF file with usage instructions, an .exe file and an Environment Manager .xml Policy template file for importing:&lt;img alt="set windows 10 default apps with ivanti environment manager screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/03/jon.rolls.blog.resized.jpg"&gt;&lt;/p&gt;

&lt;p&gt;These tools are easily implemented by copying the relevant .exe file to a fully accessible share for all users, and then importing the Environment Manager .xml Policy Template into either a new or existing configuration, on the &lt;strong&gt;User | Logon | Desktop Created&lt;/strong&gt; trigger.&lt;img alt="policy configuration - environment manager - desktop created - policy templates screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/03/jon.rolls.blog222.png"&gt;&lt;/p&gt;

&lt;p&gt;In this example, the &lt;em&gt;Set Default Mail Client&lt;/em&gt; policy template is imported.&lt;/p&gt;

&lt;p&gt;Once imported, a relevant node is created beneath the &lt;strong&gt;User | Logon | Desktop Created&lt;/strong&gt; trigger which contains a custom action and a number of dependent Execute actions.&lt;img alt="policy configuration - environment manager - set default mail client - actions screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/03/jon.rolls.blog3333.jpg"&gt;&lt;/p&gt;

&lt;p&gt;The custom action is used to trigger a 5 second pause to ensure the s&lt;em&gt;et x as default y &lt;/em&gt;Execute action is always applied &lt;em&gt;after&lt;/em&gt; UWP application provisioning into the user’s session is complete.&lt;/p&gt;

&lt;p&gt;From then, it is possible to enable your chosen default mail client from the list of actions provided.&lt;/p&gt;

&lt;p&gt;Each Execute action points to the relevant tool copied earlier, in this example, &lt;em&gt;SetMailClient.exe &lt;/em&gt;and contains a parameter to point to the chosen default application:&lt;img alt="execute - enter execute action - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/03/jon.rolls.blog4.jpg"&gt;&lt;/p&gt;

&lt;p&gt;The &lt;em&gt;-s&lt;/em&gt; parameter allows the relevant default app to be specified, in this instance &lt;em&gt;Google&lt;/em&gt; &lt;em&gt;Chrome&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: If the app name contains a space, then quotes must be used, e.g. &lt;em&gt;-s&lt;/em&gt; “Microsoft Outlook”&lt;/p&gt;

&lt;p&gt;All that is left to do is save and deploy the configuration to your endpoints.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Further Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Additional default application options can be added to the configuration manually by adding further Execute Actions and specifying the &lt;em&gt;-s&lt;/em&gt; parameter followed by the name of the application.&lt;/p&gt;

&lt;p&gt;Running any of the tools &lt;em&gt;without&lt;/em&gt; a parameter from the command line lists the available browsers, mail clients or PDF viewers, dependent on the tool used, within the user’s session, e.g.&lt;img alt="set windows 10 default apps with ivanti environment manager screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/03/jon.rolls.blog5.png"&gt;Running any of the tools with the &lt;em&gt;-i&lt;/em&gt; parameter will list the default browser, mail client or PDF viewer, dependent on the tool used, currently set within the user session:&lt;img alt="set windows 10 default apps with ivanti environment manager screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/03/jon.rolls.blog6.png"&gt;&lt;/p&gt;

&lt;p&gt;These tools are now &lt;a href="https://marketplace.ivanticloud.com/?page=4&amp;amp;typesearch=P%23UserWorkspaceManagement" target="_blank" rel="noopener"&gt;available to download from the Ivanti Marketplace&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Thu, 21 Mar 2019 21:23:05 Z</pubDate></item><item><guid isPermaLink="false">80d66175-0a12-41eb-911e-56e2097a6c02</guid><link>https://www.ivanti.com/blog/new-file-director-2018-3-windows-client-cache-management</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Endpoint Management</category><title>NEW! File Director 2018.3 – Windows Client Cache Management</title><description>&lt;p&gt;Ivanti &lt;a href="https://www.ivanti.com/products/filedirector" target="_blank"&gt;File Director&lt;/a&gt; has been steadily growing its customer base in the last few years, solving problems related to sync and roaming of local files on Windows and other devices, and doing it securely over HTTPS with zero user disruption or change in user behavior.&lt;/p&gt;

&lt;p&gt;As this solution has matured we wanted to provide new options to manage the time for which a user’s synced files remain on an endpoint. This solves problems for devices with limited storage capacity, as well as making the client more suitable for virtual and non-persistent desktops (where caching adds little benefit).&lt;/p&gt;

&lt;p&gt;In File Director 2018.3 it is now possible to remove cached files on the endpoint, based on the last access time of files. Exclusions can be configured to ensure that certain files types, .PDF files for example, remain in the local endpoint cache, irrespective of their last access time, whilst other file types are removed after a period of inactivity.&lt;/p&gt;

&lt;h2&gt;How it works&lt;/h2&gt;

&lt;p&gt;This new feature is disabled by default and is configured via an engineering key. A configurable grace period value can be specified, in seconds, with a default period of 5 minutes. Any files within the local endpoint cache whose last access time is less than the current time &lt;em&gt;minus&lt;/em&gt; the grace period, will be considered for deletion from the cache.&lt;/p&gt;

&lt;p&gt;A file, or files, may be excluded from the cache clean-up by adding its file extension to a set of existing exclusions in the registry. A default exclusion is automatically set for &lt;em&gt;.PST&lt;/em&gt; files, the &lt;em&gt;Personal Storage Table&lt;/em&gt; format, used by Microsoft Outlook personal messages, calendar events and other mail items.&lt;/p&gt;

&lt;p&gt;Once a file has been considered for deletion, File Director checks that all of the criteria have been satisfied:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The File Director client is online&lt;/li&gt;
	&lt;li&gt;The file is in-sync, i.e. no uploads are pending or in progress for the file&lt;/li&gt;
	&lt;li&gt;The file exists both locally, on the endpoint, and remotely, in the designated file store (so as to avoid data loss)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If the above criteria are satisfied, the file, or files, will be marked for deletion from the endpoint cache. If any of the criteria is not met, File Director re-tries once the file is in-sync or when the File Director client becomes online.&lt;/p&gt;

&lt;p&gt;If the file is locked and cannot be deleted, File Director will retry at the next File Director client logon or when the client becomes online from an offline state. However, typically a file close is triggered following the file becoming unlocked which would also re-queue the file for deletion.&lt;/p&gt;

&lt;p&gt;Any file removed from the endpoint cache using this functionality will be audited.&lt;/p&gt;

&lt;p&gt;Process exclusions automatically exist for applications such as &lt;em&gt;explorer.exe&lt;/em&gt; and &lt;em&gt;searchprotoclhost.exe&lt;/em&gt; that continually open and close files, as File Director is only interested in file access from the user themselves.&lt;/p&gt;

&lt;h2&gt;Enabling Windows Client Cache Management&lt;/h2&gt;

&lt;p&gt;To enable or disable Windows Client Cache Management, the following engineering key must be utilized:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Key&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;HKLM\SOFTWARE\AppSense\DataNow\CacheCleanupEnabled&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Type&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;REG_DWORD&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Value&lt;/strong&gt;:&amp;nbsp; &lt;em&gt;1 (Enabled) or 0 (Disabled)&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="new file director 2018 3 windows client cache management - registry editor - computer - datanow - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/12/ollie.blog.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Configuring a Grace Period&lt;/h2&gt;

&lt;p&gt;The &lt;em&gt;Grace Period&lt;/em&gt; defines how long File Director waits after a file close before it removes that file from the endpoint cache.&lt;/p&gt;

&lt;p&gt;The default grace period is set to 300 seconds.&lt;/p&gt;

&lt;p&gt;Setting the grace period to &amp;lt; 10 seconds will result in the value being automatically re-set to a minimum of 10 seconds. This is because some applications will still be in the process of initializing when File Director attempts to delete a file they are opening, which could result in &lt;em&gt;Access Denied&lt;/em&gt; messages.&lt;/p&gt;

&lt;p&gt;To set the grace period:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Key&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;HKLM\SOFTWARE\AppSense\DataNow\CacheCleanupGracePeriod&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Type&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;REG_DWORD&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Value&lt;/strong&gt;:&amp;nbsp; &lt;em&gt;300 (Default)&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="new file director 2018 3 windows client cache management - registry editor - computer - datanow - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/12/ollie.blog.2.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Excluding processes from Cache Clean-up&lt;/h2&gt;

&lt;p&gt;To add a process exclusion (to ignore file access from specific apps):&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Key&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;HKLM\SOFTWARE\AppSense\DataNow\CacheCleanupBlackList&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Type&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;REG_MULTI_SZ&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Value&lt;/strong&gt;:&amp;nbsp; &lt;em&gt;explorer.exe, mspeng.exe, svchost.exe, runtimebroker.exe, searchprotocolhost.exe&lt;/em&gt; (Default)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="new file director 2018 3 windows client cache management - registry editor - computer - datanow - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/12/ollie.blog.3.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Excluding file types from Cache Clean-up&lt;/h2&gt;

&lt;p&gt;To add a file type exclusion:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Key&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;HKLM\SOFTWARE\AppSense\DataNow\CacheCleanupExcludedFileTypes&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Type&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;REG_MULTI_SZ&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Value&lt;/strong&gt;:&amp;nbsp; &lt;em&gt;pst &lt;/em&gt;(Default)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="new file director 2018 3 windows client cache management - registry editor - computer - datanow - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/12/ollie.blog4.jpg"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NOTE:&lt;/strong&gt; any process exclusion or file exclusion engineering key change will be picked up automatically. However, all other engineering key changes require a File Director client logoff / logon or service restart before they are applied.&lt;/p&gt;

&lt;h2&gt;Summary&lt;/h2&gt;

&lt;p&gt;The new client cache management options provide an effective, low-maintenance way of ensuring the client cache sizes do not grow out of control, and that unwanted and unnecessary file data does not waste space on user devices. It also saves space in non-persistent sessions and virtual desktops where there is limited benefit in caching files.&lt;/p&gt;

&lt;p&gt;For more information on Ivanti File Director, &lt;a href="https://www.ivanti.com/products/filedirector" target="_blank"&gt;please see this page&lt;/a&gt;&amp;nbsp;or join in the discussion on the &lt;a href="https://forums.ivanti.com/s/file-director-fd-powered-by-appsense?language=en_US" target="_blank" rel="noopener"&gt;Ivanti Community here&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 04 Dec 2018 23:12:16 Z</pubDate></item><item><guid isPermaLink="false">809d6ae9-5880-4a4b-9e8f-2e659e2e5be1</guid><link>https://www.ivanti.com/blog/new-environment-manager-2018-3-onedrive-cache-roaming-for-virtual-sessions</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Endpoint Management</category><title>NEW! Environment Manager 2018.3: OneDrive Cache Roaming for Virtual Sessions</title><description>&lt;p&gt;Back in March 2018, we released &lt;a href="https://www.ivanti.com/blog/environment-manager-10-1-fr4" target="_blank"&gt;version 10.1 FR4 of Ivanti Environment Manager&lt;/a&gt;&amp;nbsp;which included a new &lt;em&gt;Cache Roaming for Virtual Sessions&lt;/em&gt; feature, primarily aimed at solving issues with persisting Office 365 offline caches in non-persistent Virtual Desktop Infrastructure (VDI) and Remote Desktop Server Host (RDSH) sessions.&lt;/p&gt;

&lt;p&gt;This enables Microsoft Outlook .OST files to be persisted through use of redirection to a mounted Virtual Hard Disk (VHD) container, allowing mail folders to roam across different sessions, whilst also solving performance issues associated with the loading of large mail files at user logon.&lt;/p&gt;

&lt;p&gt;The advantage of this approach is that it can also be used for other application caches that need persisting such as Microsoft OneNote of Skype for Business 2016/365 Global Address List.&lt;/p&gt;

&lt;p&gt;However, a supported use case that was missing from the original implementation was the ability to persist Microsoft OneDrive caches.&lt;/p&gt;

&lt;p&gt;OneDrive depends on a local cache being present for syncing cloud hosted files to the local endpoint. In non-persistent environments, this cache is lost at logoff and would need to be re-synced at each logon, which may cause performance issues, resulting in a poor user experience.&lt;/p&gt;

&lt;p&gt;With the release of Environment Manager 2018.3, OneDrive Cache Roaming is now possible for non-persistent environments!&lt;/p&gt;

&lt;h2&gt;How is this achieved?&lt;/h2&gt;

&lt;p&gt;A VHD container is attached to a user’s virtual desktop or session allowing necessary folders within the user profile to be redirected to the container. Third party applications require zero reconfiguration and no changes are made to the user profile, making is seamless to the user.&lt;/p&gt;

&lt;p&gt;OneDrive Cache Roaming for Virtual Sessions is configured through two Environment Manager Policy Actions:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Manage VHD&lt;/strong&gt; – Mount an existing VHD or create and mount a new VHD.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Cache Roaming&lt;/strong&gt; – Redirect an application cache to the VHD&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Each action is configured, and can be used, independently but most commonly, they will be used together.&lt;/p&gt;

&lt;p&gt;The actions are available from the Pre-Desktop and Desktop Created triggers at user logon and any mounted VHD is automatically detached at logoff.&lt;/p&gt;

&lt;p&gt;From within the &lt;strong&gt;Manage VHD&lt;/strong&gt; action, an IT admin needs to specify the location of an existing VHD file or choose to automatically create it if it doesn’t already exist.&lt;/p&gt;

&lt;p&gt;In addition, a VHD Root Folder needs to be specified which is the root directory of where the VHD will be mounted. This folder will contain the VHD contents, such as the OneDrive Cache or Outlook PST files.&lt;/p&gt;

&lt;p&gt;If creating a new VHD, the &lt;em&gt;type&lt;/em&gt; of VHD also needs specifying:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Fixed&lt;/strong&gt; – The size of the virtual hard disk is determined on creation and will always be the size set in the &lt;em&gt;Max Size&lt;/em&gt; field.&amp;nbsp;

	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;Note:&lt;/strong&gt; This option offers better performance than expandable VHDs, however it can negatively impact logon times.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Expandable&lt;/strong&gt; – The size of the VHD is variable and will grow to the maximum size as data is added.
	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;Note&lt;/strong&gt;: Even though each user is provided with 1TB of free OneDrive for Business storage with Office 365, it isn’t necessary to set the Max Size of the VHD to 1TB as it is unlikely this full allocation of disk space will ever be used. However, the Max Size can be configured on a contextual basis, using Policy Conditions, to meet individual user needs.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;​&lt;img alt="manage vhd - configure vhd settings - specify vhd locations screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/03/screenshot1.png"&gt;&lt;/p&gt;

&lt;p&gt;Next, the&lt;strong&gt; Cache Roaming&lt;/strong&gt; Action needs to be configured:&lt;/p&gt;

&lt;p&gt;&lt;img alt="cache roaming - environment manager screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/03/screenshot-2edit.png"&gt;&lt;/p&gt;

&lt;p&gt;Select the &lt;em&gt;OneDrive Cache&lt;/em&gt; template, which automatically adds &lt;em&gt;OneDrive&lt;/em&gt; as the application.&lt;/p&gt;

&lt;p&gt;A Tenant Name for your OneDrive implementation then needs specifying.&lt;/p&gt;

&lt;p&gt;Finally, a Redirect Location needs configuring, which in this case, points to the VHD root folder created with the VHD Action earlier.&lt;/p&gt;

&lt;p&gt;Conditions can be applied to both the &lt;strong&gt;VHD&lt;/strong&gt; and &lt;strong&gt;Cache Roaming&lt;/strong&gt; actions for context-aware control of OneDrive Cache Roaming for virtual sessions.&lt;/p&gt;

&lt;h2&gt;What happens on the endpoint?&lt;/h2&gt;

&lt;p&gt;When a user next logs on, a VHD will be created – if one doesn’t already exist – or mounted, and the user’s OneDrive cache will be redirected to a &lt;em&gt;OneDrive&lt;/em&gt; subfolder in the root directory of the VHD.&lt;/p&gt;

&lt;p&gt;When the user logs off&amp;nbsp;from their sessions, the VHD will automatically be detached and then re-mounted at next logon.&lt;/p&gt;

&lt;p&gt;This is all totally transparent to the end user, with their OneDrive Cache roaming effortlessly between non-persistent sessions.&lt;/p&gt;

&lt;p&gt;This helps to ensure the success of OneDrive for Business implementations in non-persistent VDI or RDSH environments.&lt;/p&gt;

&lt;h2&gt;Concurrent User Access for Office 365 VHD Containers&lt;/h2&gt;

&lt;p&gt;In addition to the One Drive Cache Roaming for virtual sessions feature, Environment Manager 2018.3 also now supports concurrent user access for Office 365 VHD containers.&lt;/p&gt;

&lt;p&gt;This enables a user within a non-persistent Windows environment to have multiple sessions running at the same time, for example to access Outlook from multiple virtual sessions.&lt;/p&gt;

&lt;p&gt;The Cache Roaming capabilities within Environment Manager 2018.3 allow users to access their cache when working across multiple non-persistent sessions, further enhancing the Office 365 user experience.&lt;/p&gt;

&lt;p&gt;For further details, please check out our &lt;a _blank="" href="https://www.ivanti.com/resources/v/doc/ivi/1969/9e1b19f4acc7"&gt;Cache Roaming for Virtual Desktops Datasheet&lt;/a&gt;.&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Headache-free Windows 10 migration whitepaper" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/11/windows-10_ppc-bnr-728x90.png"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Mon, 05 Nov 2018 18:42:07 Z</pubDate></item><item><guid isPermaLink="false">86b5eff6-9f35-4a62-83d5-fb35a2fc6551</guid><link>https://www.ivanti.com/blog/from-ivanti-workspace-control-to-ivanti-environment-manager</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Endpoint Management</category><title>Ivanti Automation Integration With Ivanti Environment Manager</title><description>&lt;h2&gt;&lt;em&gt;How Ivanti Environment Manager Can Trigger an Ivanti Automation Task to Make a Change in AD Using an Automation Connector&lt;/em&gt;&lt;/h2&gt;

&lt;h2&gt;INTRODUCTION&lt;/h2&gt;

&lt;p&gt;For former RES customers, it has always been possible from within &lt;a href="https://www.ivanti.com/products/user-workspace-manager" target="_blank"&gt;Ivanti Workspace Control&lt;/a&gt; (formerly RES ONE Workspace), to launch &lt;a href="https://www.ivanti.com/products/automation" target="_blank"&gt;Ivanti Automation&lt;/a&gt; tasks based on specific triggers occurring, for example, adding a user to a specific AD Group:&lt;/p&gt;

&lt;p&gt;&lt;img alt="edit automation task - settings - properties - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie1.png"&gt;&lt;/p&gt;

&lt;p&gt;These automation tasks can be used to remove unnecessary burden on the IT department by automating common tasks that users require – thus saving IT time and money.&lt;/p&gt;

&lt;p&gt;Below we discuss how &lt;a href="https://www.ivanti.com/products/environment-manager" target="_blank"&gt;Ivanti Environment Manager&lt;/a&gt; (formerly AppSense Environment Manager) can also be used to trigger Ivanti Automation Tasks.&lt;/p&gt;

&lt;p&gt;With Ivanti Automation, it is possible to use&amp;nbsp;&lt;strong&gt;Automation Connectors&lt;/strong&gt;&amp;nbsp;to configure automation tasks to achieve different outcomes.&amp;nbsp; These automation tasks can now be triggered using the forthcoming version of Ivanti Environment Manager’s new&amp;nbsp;&lt;strong&gt;Automation Action&amp;nbsp;&lt;/strong&gt;which communicates with an existing&amp;nbsp;&lt;strong&gt;Automation Dispatcher&lt;/strong&gt;&amp;nbsp;to initiate configured tasks on-demand, as required.&lt;/p&gt;

&lt;h2&gt;USE CASE&lt;/h2&gt;

&lt;p&gt;We will use the same example as above – to add a user to an AD Group when a specific trigger occurs – this will be when a user launches&amp;nbsp;&lt;em&gt;WordPad.exe&lt;/em&gt;. This change in AD Group Membership could perhaps then be utilized to provide access to a certain file share or printer for a user.&lt;/p&gt;

&lt;p&gt;In this example, a&amp;nbsp;&lt;em&gt;WordPad Users&lt;/em&gt;&amp;nbsp;group exists in Active Directory (AD) but currently contains no users:&lt;/p&gt;

&lt;p&gt;&lt;img alt="active directory users and computers - groups - wordpad users properties - members - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie2.png"&gt;&lt;/p&gt;

&lt;h2&gt;CONFIGURING IVANTI AUTOMATION&lt;/h2&gt;

&lt;p&gt;The Ivanti Automation Console is used to create an Automation Module that manages a specific Active Directory Group.&lt;/p&gt;

&lt;p&gt;This is achieved by providing details of the relevant domain, including the&amp;nbsp;&lt;em&gt;WordPad Users&lt;/em&gt;&amp;nbsp;group for which we want to manage membership:&lt;/p&gt;

&lt;p&gt;&lt;img alt="manage active directory group - settings - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie3.png"&gt;&lt;/p&gt;

&lt;p&gt;From the&amp;nbsp;&lt;em&gt;Members&lt;/em&gt;&amp;nbsp;tab, we specify the user we wish to add to the AD Group when the automation task is instigated:&lt;/p&gt;

&lt;p&gt;&lt;img alt="manage active directory group - members - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie4.png"&gt;&lt;/p&gt;

&lt;p&gt;That’s it from an Automation perspective!&lt;/p&gt;

&lt;h2&gt;CONFIGURING IVANTI ENVIRONMENT MANAGER&lt;/h2&gt;

&lt;p&gt;We will now utilize Ivanti Environment Manager to trigger the task via an Automation Agent installed on a Windows 10 desktop.&lt;/p&gt;

&lt;p&gt;In this instance we will use a&amp;nbsp;&lt;strong&gt;Process Started&lt;/strong&gt;&amp;nbsp;trigger - other triggers are available including, but not limited to, Computer Startup/Shutdown, User Logon/Logoff, Session Connect/Disconnect or Session Lock/Unlock - to configure when the Automation Task applies.&lt;/p&gt;

&lt;p&gt;This is achieved by first specifying where the Automation Dispatcher resides and under which context we want to run the automation task:&lt;/p&gt;

&lt;p&gt;&lt;img alt="configuration on W10 - environment manager - automation settings - policy configuration - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie5.png"&gt;&lt;/p&gt;

&lt;p&gt;Next, a&amp;nbsp;&lt;strong&gt;Process Started&lt;/strong&gt;&amp;nbsp;node is created and&amp;nbsp;&lt;em&gt;Wordpad.exe&lt;/em&gt;&amp;nbsp;is specified as the starting application:&lt;/p&gt;

&lt;p&gt;&lt;img alt="policy configuration - node - user process name - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie6.png"&gt;&lt;/p&gt;

&lt;p&gt;Once added, an&amp;nbsp;&lt;strong&gt;Automation Action&lt;/strong&gt;&amp;nbsp;needs to be configured beneath the&amp;nbsp;&lt;strong&gt;User&lt;/strong&gt;&amp;nbsp;&lt;strong&gt;Process Name&amp;nbsp;&lt;/strong&gt;Condition:&lt;/p&gt;

&lt;p&gt;&lt;img alt="file - actions - policy configuration - node - create an automation task - modules - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie7.png"&gt;&lt;/p&gt;

&lt;p&gt;From here, we can select the automation action&amp;nbsp;&lt;em&gt;Manage Wordpad Users Group&lt;/em&gt;&amp;nbsp;created earlier in Ivanti Automation:&lt;/p&gt;

&lt;p&gt;&lt;img alt="file - actions - policy configuration - node - automation screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie8.png"&gt;&lt;/p&gt;

&lt;p&gt;Once selected, this will appear beneath the&amp;nbsp;&lt;strong&gt;User Process Name&lt;/strong&gt;&amp;nbsp;Condition on the&amp;nbsp;&lt;strong&gt;Process Started&lt;/strong&gt;&amp;nbsp;Trigger:&lt;/p&gt;

&lt;p&gt;&lt;img alt="file - actions - policy configuration - node - automation screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie9.png"&gt;&lt;/p&gt;

&lt;p&gt;The Environment Manager Configuration can now be saved and deployed to the Windows 10 endpoint.&lt;/p&gt;

&lt;h2&gt;TESTING THE CONFIGURATION&lt;/h2&gt;

&lt;p&gt;A user logs on to the Windows 10 desktop and launches&amp;nbsp;&lt;em&gt;WordPad.exe.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;WordPad.exe&lt;/em&gt;&amp;nbsp;runs and the Automation Task configured is executed immediately.&lt;/p&gt;

&lt;p&gt;On the Administrative endpoint, within&amp;nbsp;&lt;em&gt;Active Directory Users and Computers&lt;/em&gt;, User1 will now be visible within the&lt;em&gt;WordPad Users&amp;nbsp;&lt;/em&gt;AD Group:&lt;/p&gt;

&lt;p&gt;&lt;img alt="active directory users and computers - groups - wordpad users properties - members - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/ollie10.png"&gt;&lt;/p&gt;

&lt;p&gt;To see a short video of this in action, &lt;a href="https://vimeo.com/291807106/fda5302e59" target="_blank" rel="noopener"&gt;please follow this link&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="ivanti - 5 reasons you need user workspace manager" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/uwm.banner.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Wed, 10 Oct 2018 11:42:21 Z</pubDate></item><item><guid isPermaLink="false">c0e42c47-641b-4970-82ac-d63f8c8e59d1</guid><link>https://www.ivanti.com/blog/from-res-one-workspace-to-ivanti-environment-manager-just-in-time-app-v-5-x-apps</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Endpoint Management</category><title>From RES ONE Workspace to Ivanti Environment Manager: Just-In-Time App-V 5.x Apps</title><description>&lt;p&gt;When Ivanti acquired the two market-leading user workspace management vendors in AppSense and RES, it was always going to be difficult to develop and maintain two similar solutions that each offer unique and innovative ways of solving IT desktop configuration challenges. AppSense Environment Manager and RES ONE Workspace have, for many years, both been extremely successful in solving customer’s desktop challenges and so Ivanti had to find a common ground in terms of how to support both sets of customers, as one, moving forward.&lt;/p&gt;

&lt;p&gt;Ivanti has been looking at ways of ensuring the most compelling and widely-used features available within the former RES ONE Workspace solution, can also be achieved using Ivanti Environment Manager, whilst offering existing, or new, Environment Manager customers the same powerful features set across the board.&lt;/p&gt;

&lt;p&gt;Just-in-time App-V 5.x application package delivery is just one of these features. This enables App-V 5.x application delivery to be initiated by the user themselves, by clicking on an application shortcut delivered to the user’s workspace via Ivanti Environment Manager.&lt;/p&gt;

&lt;p&gt;Working in conjunction with consultants from &lt;a href="https://www.t4change.com/" target="_blank" rel="noopener"&gt;T4Change&lt;/a&gt; in the Netherlands, and utilizing a combination of native Environment Manager functionality and custom PowerShell scripts, Ivanti has now been able to replicate the just-in-time App-V 5.x delivery capabilities available in RES ONE Workspace within Ivanti Environment Manager. This v1 implementation is the first step towards a more native Environment Manager solution to this use case.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuring just-in-time App-V 5.x apps with Ivanti Environment Manager &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let’s assume the user would like to make use of Foxit Reader, delivered via App-V 5.x.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 1:&lt;/strong&gt; We need to perform a check to see if the App-V instance of Foxit Reader already exists for the user. This will allow us to determine whether we need to deliver the App-V instance at all, else, the delivery process can be started.&lt;/p&gt;

&lt;p&gt;This is achieved with the help of an Environment Manager &lt;strong&gt;&lt;em&gt;If Else&lt;/em&gt; Group Condition&lt;/strong&gt; configured within the &lt;strong&gt;Pre-Desktop Logon&lt;/strong&gt; &lt;strong&gt;Trigger&lt;/strong&gt;, that runs a short PowerShell script to check for the existence of the app when the user logs on:&lt;/p&gt;

&lt;p&gt;&lt;img alt="action - if else group screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/07/oliver.blog.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 2&lt;/strong&gt;: Next, by utilizing an Environment Manager &lt;strong&gt;Custom Action &lt;/strong&gt;on the &lt;strong&gt;Computer Startup Node&lt;/strong&gt; that makes use of another PowerShell Script, a dummy executable named ‘RefreshNow.exe’ can be generated on-the-fly when the computer is started up.&lt;/p&gt;

&lt;p&gt;&lt;img alt="enter custom action - powershell screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/07/oliver.blog2.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 3:&lt;/strong&gt; The path to where the Foxit Reader App-V content share resides can be set with an Environment Manager &lt;strong&gt;Set Environment Variable Action&lt;/strong&gt; on the &lt;strong&gt;Pre-Session Logon Trigger&lt;/strong&gt;, so that the value is set and in place before the user is fully logged on to their session.&lt;/p&gt;

&lt;p&gt;&lt;img alt="set environment variable - details screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/07/oliver.blog3.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 4&lt;/strong&gt;: A second variable, &lt;em&gt;$App&lt;/em&gt;, which is the name of the application you want to publish - in this case Foxit Reader - is set using a PowerShell &lt;strong&gt;Custom Condition&lt;/strong&gt; within the &lt;strong&gt;If Else Group&lt;/strong&gt; Flow Control condition.&lt;/p&gt;

&lt;p&gt;&lt;img alt="enter custom condition - powershell screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/07/oliver.blog4.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 5&lt;/strong&gt;: After these variables have been set, a shortcut to the newly configured ‘RefreshNow.exe’ dummy executable, which was created at Startup, is placed on the user’s desktop, using a &lt;strong&gt;Create Shortcut Action&lt;/strong&gt;, which makes use of a parameter pointing to Foxit Reader.&lt;/p&gt;

&lt;p&gt;&lt;img alt="shortcut management - shortcut information - create - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/07/oliver.blog5.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 6&lt;/strong&gt;: When the ‘Refreshnow.exe’ dummy application is launched at Startup, a &lt;strong&gt;User Process Name Condition&lt;/strong&gt; is invoked from the &lt;strong&gt;Process Started Trigger&lt;/strong&gt; which contains the Foxit Reader application variable set earlier, in its parameter field:&lt;/p&gt;

&lt;p&gt;&lt;img alt="user process name - choose process name - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/07/oliver.blog6.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 7&lt;/strong&gt;: Another Environment Manager &lt;strong&gt;Custom Action&lt;/strong&gt;, configured with PowerShell, is then invoked, which adds the App-V package, with the correct path, to the actual App-V 5.x .&lt;em&gt;appv&lt;/em&gt; file:&lt;/p&gt;

&lt;p&gt;&lt;img alt="custom action - enter custom action - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/07/oliver.blog7.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 8&lt;/strong&gt;: Once the .&lt;em&gt;appv&lt;/em&gt; file has been updated, a package publishing operation is instigated, using another Environment Manager &lt;strong&gt;Custom Action&lt;/strong&gt; employing PowerShell:&lt;/p&gt;

&lt;p&gt;&lt;img alt="custom action - enter custom action - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/07/oliver.blog8.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 9&lt;/strong&gt;: Finally, a Foxit Reader App-V application shortcut is created for the user with an Environment Manager &lt;strong&gt;Shortcut Action&lt;/strong&gt;, making use of the variables configured earlier.&lt;/p&gt;

&lt;p&gt;Once these few simple steps have been configured, the icon for the Foxit Reader App-V application shortcut will be present on their desktop at next logon.&lt;/p&gt;

&lt;p&gt;For access to a full example configuration, along with more detailed instructions on how to set this up for other App-V delivered applications, please download the &lt;a href="https://marketplace.ivanticloud.com/packages/AppVPublishing/" target="_blank" rel="noopener"&gt;App-V Publishing Guide&lt;/a&gt; available from the Ivanti Marketplace.&lt;/p&gt;

&lt;p&gt;Please try out this first version and do feedback any issues or enhancement requests you may have via our &lt;a href="https://success.ivanti.com/customers/Community_RegStep1_Page?startURL=%2Fcustomers%2Fidp%2Flogin%3Fapp%3D0sp130000008P1f%26SAMLRequest%3DfZJdT8MgGIX%252FSu%252B46gft1m1krWm2mCyZZtnUC28MpdSRtIC8MPXfSzuNM1G5hPOcc3hhCbTvNKmcPco9f3EcbFABcGOFkislwfXcHLg5Ccbv99sCHa3VQOJYnKi0InJeelL%252BMGKqjwezmJ0pFKy9mZB0cPrmwDHGAaJPfqCYA6t8DMSi0XGnnoW8oloXCWicJeOa73CLgs26QE90XrPFvMnC2XTWhpNFnYT1pMlD3NZ5kzGc5%252BnUSwEc30iwPqVAaZLiMFmEeHKXZiSZE4wfUfDgI8duaZSg4K3vJJDhBgVyRhJFQQCRtOdALCOH6mZLvJDQr%252BlcIvp%252FRhtlFVMdKpeDmoztTPnbDJfxpWJ5fp5b77hZ71Qn2HtQdZ16XRlOLS%252BQNc5P%252BlqZntq%252FO%252BAIjzuiCdtRSpwEzZloBW9QXJ5Df36D8gM%253D" target="_blank" rel="noopener"&gt;User Voice Portal&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 11 Jul 2018 21:13:37 Z</pubDate></item><item><guid isPermaLink="false">8e3106af-0118-445c-9e9c-dc4b3508aad3</guid><link>https://www.ivanti.com/blog/using-office-365-ivanti-file-director-saves-you-money-by-migrating-files-to-the-cloud</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Ivanti News</category><title>Using Office 365? Ivanti File Director Saves You Money by Migrating Files to the Cloud</title><description>&lt;p&gt;Unlock 1TB of OneDrive for Business storage for every user!&lt;/p&gt;

&lt;p&gt;Does your organization make use of Office 365? Are you aware that each of your users is entitled to 1TB of free OneDrive for Business cloud storage? Eliminate the cost of on-premises storage by effortlessly migrating user files to the cloud, freeing up server resources and reducing infrastructure management.&lt;/p&gt;

&lt;h2&gt;Ivanti File Director&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/filedirector" target="_blank"&gt;Ivanti File Director&lt;/a&gt; employs In-Location Sync capabilities and a OneDrive Connector to effortlessly migrate user files from local devices and on-premises storage to OneDrive for Business cloud storage. There’s no need for user retraining as all file sync and migration actions are imperceptible to the user.&lt;/p&gt;

&lt;p&gt;This allows centralization of your data in the cloud and eradicates costly and time-consuming management of data sprawl.&lt;/p&gt;

&lt;p&gt;And by migrating user files away from on-premises datacenters, File Director enables organizations to make huge savings in storage costs.&lt;/p&gt;

&lt;p&gt;Acting as a broker to your OneDrive for Business storage, File Director enables IT to have complete visibility of how OneDrive storage is being used. In addition, user files are made available immediately to any device or platform, or by syncing data either in real time, in the background or on-demand to make desktop migration projects easy.&lt;/p&gt;

&lt;p&gt;Want to know more? Check out our two free whitepapers:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;Do More With Ivanti and Office 365&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;Freedom From On-Premises Storage&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Fri, 25 May 2018 20:16:09 Z</pubDate></item><item><guid isPermaLink="false">ee8a8f19-8fe6-45bd-8973-550cf079951b</guid><link>https://www.ivanti.com/blog/three-biggest-obstacles-windows-10-migration</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Endpoint Management</category><title>The 3 Biggest Obstacles to Windows 10 Migration</title><description>&lt;p&gt;Windows 10 presents an updated and unfamiliar interface that has the potential to confuse and frustrate users.&lt;/p&gt;

&lt;p&gt;In fact..&lt;/p&gt;

&lt;p&gt;Recent industry research from Dimensional Research reveals that almost..&lt;/p&gt;

&lt;p&gt;1/3 of&amp;nbsp;Windows 10 end-user early adopters were confused by the interface.&lt;/p&gt;

&lt;p&gt;New features in Windows 10 like the Edge browser, Cortana, and Windows Store can increase confusion, security issues, and user resistance, which can delay or derail a migration project.&lt;/p&gt;

&lt;p&gt;Not to mention the 3 biggest obstacles to a Windows 10 migration for enterprise users:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Roaming Profiles&lt;/li&gt;
	&lt;li&gt;Folder Redirection&lt;/li&gt;
	&lt;li&gt;Offline Files&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So why make the change?&lt;/p&gt;

&lt;h2&gt;Migrating to Windows 10&lt;/h2&gt;

&lt;p&gt;One of the biggest drivers of Windows 10 adoption is hardware replacement. It is increasingly difficult to order new PC hardware that is supported in Windows 7 or 8.1, forcing IT departments without a Windows 10 strategy to stockpile old equipment, or to accept new devices onto the network with unmanaged versions of Windows.&lt;/p&gt;

&lt;p&gt;Furthermore, Windows 10 introduces a new release cadence, with two releases a year that need to be centrally managed and deployed by IT to limit user confusion and potential application-compatibility issues.&lt;/p&gt;

&lt;p&gt;Finally, continual architectural changes in the Windows platform are forcing IT departments to review their current practices for managing users and their workspaces, and consider what they will need to rework to address those challenges with Windows 10 endpoints.&lt;/p&gt;

&lt;h2&gt;1. Roaming Profiles&lt;/h2&gt;

&lt;h3&gt;What is a Roaming Profile?&lt;/h3&gt;

&lt;p&gt;Roaming Profiles have been a Windows feature for many years, with the goal of ensuring personal settings are available to users when they log on to different endpoints within an organization. However, they have always been fraught with challenges.&lt;/p&gt;

&lt;h3&gt;Challenges of Roaming Profiles:&lt;/h3&gt;

&lt;p&gt;First, they are susceptible to bloat. As a user personalizes their desktop, changes to registry and file settings are saved to the network as part of the user’s roaming profile when they log off. The more changes the user makes, the larger these roaming profiles become.&lt;/p&gt;

&lt;p&gt;When a user logs on, their roaming profile needs to be loaded across the network. A large roaming profile causes a logon delay as the profile is loaded across the network.&lt;/p&gt;

&lt;h3&gt;Migrating Roaming Profiles From Windows 7 To Windows 10&lt;/h3&gt;

&lt;p&gt;In Windows 7, a typical roaming profile would be 25-50MB in size. However, in Windows 10, a typical roaming profile is around 160MB – and that’s before the user has even started to personalize it! Over time, as the profile bloats, the user’s logon time lengthens, resulting in an impatient, unproductive user. Large roaming profiles are also prone to corruption when saving them across the network, causing data and productivity loss for the user and time loss for IT staff attempting to restore settings from backup.&lt;/p&gt;

&lt;p&gt;Windows updates add further complexity and issues. Hybrid computing environments are common today, with users employing a variety of devices, platforms, and operating systems to get their work done.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;p&gt;Windows 7 introduced the v2 profile, where roaming profiles created in a Windows XP environment would no longer function as expected under Windows 7, causing issues for users who wanted to migrate their personal settings. This trend and similar anomalies have continued through each Windows release, with the original release of Windows 10 introducing a v6 profile.&lt;/p&gt;

&lt;p&gt;Each feature update of Windows 10 could potentially a new profile version, as happened in the Anniversary addition. With two feature releases per year, supporting roaming profiles will be a complex and expensive endeavor.&lt;/p&gt;

&lt;h2&gt;2. Folder Redirection&lt;/h2&gt;

&lt;h3&gt;What is Folder Redirection?&lt;/h3&gt;

&lt;p&gt;IT has employed Folder Redirection to ensure that users can access their files and folders, irrespective of which endpoint device they connect from. Folder Redirection works by redirecting common profile folders, such as Desktop, Documents, Favorites, etc., away from the user’s local endpoint in favor of storing files and folders in a central location on the network. It’s also a useful way of addressing elements of data sprawl where users typically store data locally on their endpoints.&lt;/p&gt;

&lt;p&gt;Folder Redirection works well for endpoint devices that are located on-premises, safely within organizational firewalls.&lt;/p&gt;

&lt;p&gt;Yet..&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Challenges of Folder Redirection:&lt;/h3&gt;

&lt;p&gt;Folder Redirection can become an issue when on-premises locations containing user files are not accessible via endpoint devices for off-premises users. This can sometimes be resolved by use of a Virtual Private Network (VPN), where a user “tunnels” through the organizational firewall to gain access to specific resources. However, using a VPN adds complexity that can degrade the user experience, leading to user frustration and an increase in IT support tickets.&lt;/p&gt;

&lt;h2&gt;3. Offline Files&lt;/h2&gt;

&lt;h3&gt;What is Windows Offline Files?&lt;/h3&gt;

&lt;p&gt;Windows’ Offline Files capability allows user files to be accessible locally when users work offline by attempting to sync user files and folders from the on-premises file share down to local endpoint devices. The Offline Files technology was introduced in Windows XP and hasn’t really changed in Windows 10.&lt;/p&gt;

&lt;h3&gt;Challenges of Offline Files:&lt;/h3&gt;

&lt;p&gt;Offline Files can cause sync issues so users are unable to access their data. For example, when a user’s file cache has been encrypted and the user changes their password, cached offline files become invalid. Additionally, when a user is employing a Distributed File System (DFS), Offline Files does not function well. When the user moves to an offline state, DFS shifts the entire tree path rather than the individual branch path, forcing far more data than necessary to be synced.&lt;/p&gt;

&lt;p&gt;If connection speed is low, and a heavily loaded file server can practically stop serving files to users, it creates—you guessed it—more user frustration, less productivity, and more IT support tickets. Still more sync problems can occur when user permissions aren’t set correctly on the file server.&lt;/p&gt;

&lt;h2&gt;Having Migration Migraines?&lt;/h2&gt;

&lt;p&gt;Ivanti can help ease your pain!&lt;/p&gt;

&lt;p&gt;Ease migration woes, improve the user experience, and ensure acceptance of Windows 10 migration projects with Ivanti solutions&lt;/p&gt;

&lt;p&gt;Check out &lt;a href="https://www.ivanti.com/blog/windows-10-migration-ivanti" rel="noopener" target="_blank"&gt;Migrating to Windows 10 With Ivanti: Migraine Managed&lt;/a&gt; to see how Ivanti’s solution specifically pinpoints roaming profiles, folder redirection, and offline files.&lt;/p&gt;

&lt;p&gt;Want a fuller picture of just how effortless migration can be when challenges are overcome with Ivanti?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management/unified-endpoint-management" rel="noopener" target="_blank"&gt;&lt;img alt="Steps to Windows 10 migration success" class="alignnone wp-image-20655 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/01/cta-blogbanner-win10.jpg"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Fri, 27 Apr 2018 20:45:10 Z</pubDate></item><item><guid isPermaLink="false">89cfab27-720a-41f9-b08a-b6f4fa6c0c4e</guid><link>https://www.ivanti.com/blog/windows-10-migration-ivanti</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Endpoint Management</category><title>Windows 10 Migration With Ivanti: Migraine Managed</title><description>&lt;p&gt;In an independent, global survey of IT professionals conducted by &lt;a href="https://dimensionalresearch.com/" rel="nofollow noopener" target="_blank"&gt;Dimensional Research&lt;/a&gt;, it appears that although &lt;a href="https://www.ivanti.com/products/environment-manager" rel="noopener" target="_blank"&gt;Windows 10 migration&lt;/a&gt; is limited, it is on the increase.&lt;/p&gt;

&lt;p&gt;Over 1,800 IT professionals with responsibility for corporate desktops and laptops took part in the survey and were questioned on the status of Windows 10 adoption, their future plans, experiences, concerns, and more.&lt;/p&gt;

&lt;p&gt;Of those surveyed, 93 percent of organizations have Windows 10 installed, but only 37 percent have it rolled out in production to a fraction of end users (only 10 percent have Windows 10 fully in production). Despite this slow start, 78 percent are looking to be fully migrated to Windows 10 by 2019.&lt;/p&gt;

&lt;p&gt;However, many concerns still persist for organizations looking to migrate to Windows 10; in fact, 88 percent of those polled reported having significant concerns about moving to Windows 10. Application compatibility worries, the need for user training, and the manual effort required to migrate users and their workspaces are the top concerns. And the larger the organization is, the higher these concerns are.&lt;/p&gt;

&lt;p&gt;Those organizations that have already begun their migration are still faced with user-related issues, including user confusion with the new interface and users resisting migration because they see no benefit to them in moving to Windows 10. Because of worries such as application compatibility, user confusion, and user resistance, 80 percent of the IT professionals surveyed are delaying their migration to Windows 10 while they attempt to address those concerns.&lt;/p&gt;

&lt;h2&gt;Effortless Migration With Ivanti&lt;/h2&gt;

&lt;p&gt;Are your users ready to leave their happy, familiar Windows 7 workspace behind? Are you? Windows 10 migration is daunting, but Ivanti technology significantly reduces migration complexity. Adopting the steps below will enable you to control the process, reduce surprises, eliminate Stealth or Shadow IT, and provide users with a familiar workspace—on top of a shiny, new, powerful operating system.&lt;/p&gt;

&lt;h3&gt;Step 1 – Baseline Your Existing Environment&lt;/h3&gt;

&lt;p&gt;To gain foresight and plan a future Windows 10 workspace that’s secure, compliant, and delivers a great user experience, we recommend analyzing existing user workspaces to identify potential performance bottlenecks, productivity limitations, and security vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons" rel="noopener" target="_blank"&gt;Ivanti Insight&lt;/a&gt; is a virtual appliance that can be installed on your existing desktop and server estate to collect and analyze data regarding user experience and endpoint security. An unobtrusive agent is deployed to endpoints either via Active Directory, third-party tools such as Microsoft System Center, or using our centralized deployment mechanism, Ivanti Management Center.&lt;/p&gt;

&lt;p&gt;The Insight Agent collects data relating to the user workspace experience and uploads the data periodically to the Insight Appliance. Endpoints are analyzed to record metrics, including logon times, resource utilization, and application usage or privileges required to access resources. Details on how and where users are currently storing their files are recorded as a first step in preparing to migrate user files and folders—another necessary and problematic element in a Windows 10 migration scenario.&lt;/p&gt;

&lt;p&gt;Insight provides a simple way to baseline existing environments before moving to Windows 10. Organizations can identify potential performance issues and security or compliance vulnerabilities, and use the data to ensure optimum user experience post migration to drive user acceptance of Windows 10.&lt;/p&gt;

&lt;h3&gt;Step 2 – Centralize Management of Users’ Personal Settings&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/environment-manager" rel="noopener" target="_blank"&gt;Ivanti Environment Manager&lt;/a&gt; decouples users’ personal settings from the workspace and manages this data independent of the device.&lt;/p&gt;

&lt;p&gt;This provides centralized management of user settings while enabling user settings to be applied dynamically to any workspace, regardless of the delivery method or operating system.&lt;/p&gt;

&lt;p&gt;This offers a far more efficient and robust alternative to roaming profiles and eases &lt;a href="https://www.ivanti.com/blog/topics/endpoint-management" rel="noopener" target="_blank"&gt;Windows 10 migrations&lt;/a&gt;, break/fix, Citrix-related migrations, desktop transformation projects, even on-premises to cloud projects.&lt;/p&gt;

&lt;p&gt;Environment Manager makes use of a three-tier architecture for optimum performance, built-in failover, disaster recovery, and business continuity, to ensure unlimited scalability across distributed, geographic locations.&lt;/p&gt;

&lt;p&gt;Environment Manager virtualizes users’ changes to application and operating system settings. It then compresses and stores both locally, for offline access, as well as centrally—either on-premises or in the cloud. This ensures that personalized settings can be streamed, on-demand, to any user workspace or operating system, irrespective of how the desktop or applications are delivered.&lt;/p&gt;

&lt;p&gt;For Windows 10 migration projects, Environment Manager captures settings that already exist in legacy local or roaming profiles and delivers this personalization instantly on-demand to new Windows 10 workspaces. Delivery can include all elements of the profile or just selected application or operating system content.&lt;/p&gt;

&lt;p&gt;By applying user settings on-demand, IT can cater to increasingly mobile users, moving users effortlessly between platforms and operating systems with no negative impact to the user experience. In fact, personalization delivered by Environment Manager is proven to speed up user logons and eliminate profile-related support calls, improving the user experience.&lt;/p&gt;

&lt;p&gt;Additionally, while a typical Windows 10 roaming profile is 160MB, Environment Manager-stored user personalization data saved in the SQL database is around 10MB per user, reducing storage costs and freeing up disk space for other uses.&lt;/p&gt;

&lt;p&gt;Delta changes to personalized settings are also saved in the SQL database, so if profile inconsistencies occur, personalization settings can be rolled back on a per-user, per-application basis to a known good point in time by the user or by IT, without affecting any other aspect of the user profile. This ensures the highest user productivity and eliminates profile-related support tickets.&lt;/p&gt;

&lt;h3&gt;Step 3 – Application Control and User Privileges&lt;/h3&gt;

&lt;p&gt;The threat of ransomware, unlicensed software, or non-productive applications being introduced to Windows 10 endpoints—either via the Windows Store or traditional means—can be eliminated using &lt;a href="https://www.ivanti.com/products/application-control" rel="noopener" target="_blank"&gt;Ivanti Application Control&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Its unique Trusted Ownership&amp;nbsp;model provides an easy-to-manage alternative to traditional whitelisting and blacklisting. This approach protects endpoints from zero-day threats and eradicates the problem of out-of-date reactive solutions such as antivirus software that needs to know about a threat before it can download and apply update definitions.&lt;/p&gt;

&lt;p&gt;With Application Control, Trusted Ownership security is delivered out-of-the-box and works by examining the NTFS owner of an application. If an application or executable is introduced to the user workspace, Trusted Ownership considers that app or executable to be owned by the user that introduced it. ‘Trusted’ apps and executables are owned by a ‘Trusted Owner’, e.g. an administrator or software deployment system such as Microsoft System Center, and can be installed and run by the user. Apps and executables introduced or installed by ‘untrusted’ owners like standard users are instantly prevented from running. Additionally, applications or executable code attempted to be run or installed from network drives or removable media such as USB drives or CDs are also prevented automatically unless otherwise stated.&lt;/p&gt;

&lt;p&gt;Traditional whitelisting and blacklisting technologies typically require ongoing maintenance when new service packs or upgrades are released, which can result in high IT support costs. In addition, these types of solutions are often bypassed by renaming an unknown or black-listed application to that of an application on the whitelist. Trusted Ownership alleviates the IT burden associated with application control solutions that require ongoing maintenance of whitelists when an application or OS component requires patching.&lt;/p&gt;

&lt;p&gt;White and blacklist configurations can still be used in conjunction with Trusted Ownership to control known applications that pass the NTFS owner check. Applications that users should not have access to, such as administrator-owned tools like cmd.exe or ftp.exe, can be denied automatically. Alternatively, using whitelists in conjunction with digital hash checking can guarantee only known, trusted applications can execute on an endpoint.&lt;/p&gt;

&lt;p&gt;Application access in Windows 10 environments can be tailored with security and compliance in mind, using Environment Manager’s context-aware policies. Access is dependent on the user, where they’re logging on from, when, and how. These rules are based on Groups, Users, Devices, Processes, or custom rules to target specific scenarios when users should or shouldn’t be allowed access to specific applications.&lt;/p&gt;

&lt;p&gt;Due to these flexible application-control techniques, Ivanti Application Control is recognized by Microsoft for enforcing device-based software licensing. By governing which users or devices have permission to run named applications, limits can be placed on the number of application instances, the devices or users that can run the application, when users run a program, and for how long. This helps to reduce software license costs when migrating to Windows 10.&lt;/p&gt;

&lt;p&gt;To enable regulatory compliance, Application Control’s privilege management capabilities allow IT to easily remove end users’ full administrative rights and provide them with elevated privileges for just the apps or tasks that they need.&lt;/p&gt;

&lt;h2&gt;Summary&lt;/h2&gt;

&lt;p&gt;Extended support for Windows 7 ends in 2020, which is right around the corner in “IT years.” However, some IT departments see Windows 10 migration as a project, but not a priority.&lt;/p&gt;

&lt;p&gt;This is unfortunate. Windows 10 is substantially different from Windows 7 from an IT-architecture and user-interface perspective. Additionally, Windows 10’s new release cadence is going to challenge IT—and users—to keep up.&lt;/p&gt;

&lt;p&gt;Even If budget hasn’t been allocated yet to a Windows 10 migration project, IT can build a migration model for their organization now to determine the cost in time, dollars, and effort involved in the move. IT can use the results to engage with executive management (they are end users, too), and at minimum, start the conversation. A proactive approach allows IT to make thoughtful decisions rather than hasty ones driven by necessity.&lt;/p&gt;

&lt;p&gt;As part of the process, consider Microsoft’s faster release cadence and how IT will accommodate it. The new cadence will push IT to run multiple Windows versions in parallel, imposing a continuous state of migration. Windows 10 migration is a tough challenge, but one that can be overcome by starting now.&lt;/p&gt;

&lt;h2&gt;Having Migration Migraines?&lt;/h2&gt;

&lt;p&gt;Ivanti can help ease your pain!&lt;/p&gt;

&lt;p&gt;Ease migration woes, improve the user experience, and ensure acceptance of Windows 10 migration projects with Ivanti solutions. &lt;a href="https://www.ivanti.com/company/contacts"&gt;Contact us&lt;/a&gt;&amp;nbsp;for help.&lt;/p&gt;

&lt;p&gt;Want a fuller picture of just how effortless migration can be when challenges are overcome with Ivanti? Check out our whitepaper, &lt;a href="https://www.ivanti.com/resources/v/doc/ivi/1909/4c1316144c56"&gt;Painless User Migration with Ivanti&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management/unified-endpoint-management" rel="noopener" target="_blank"&gt;&lt;img alt="Steps to Windows 10 migration success" class="alignnone wp-image-20655 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/01/cta-blogbanner-win10.jpg"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Mon, 23 Apr 2018 23:50:21 Z</pubDate></item><item><guid isPermaLink="false">47bd730c-0c68-43b7-9d71-f8739f0998f6</guid><link>https://www.ivanti.com/blog/got-office-365-get-control-users-onedrive-storage</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Endpoint Management</category><title>Got Office 365? Get Control of Users’ OneDrive Storage!</title><description>&lt;p&gt;&lt;span lang="en-AU"&gt;One of Office 365’s significant customer benefits is the 1TB of cloud storage provided to every business user. It’s a great offer, but it has challenges.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span lang="en-AU"&gt;For users, using OneDrive requires changes in their working behavior, which usually means that IT needs to provide retraining and can expect an increase in helpdesk calls. Additionally, users utilizing multiple endpoints to do their work may find that they cannot access OneDrive from one or more of their devices—which to IT usually means more helpdesk calls.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span lang="en-AU"&gt;For IT, because the OneDrive storage is provided to users, IT admins lack the controls they need to view and manage OneDrive storage and its content—until now.&lt;/span&gt;&lt;/p&gt;
&lt;h6&gt;&lt;strong&gt;&lt;span lang="en-AU"&gt;Capture, Control, and Audit Office 365 Users’ OneDrive Storage&lt;/span&gt;&lt;/strong&gt;&lt;/h6&gt;
&lt;p&gt;Ivanti File Director’s OneDrive Connector allows IT to capture, control, and audit Office 365 users’ 1TB of OneDrive storage. The Connector uses File Director’s granular sync engine and In-Location Sync to map user files to OneDrive. And, as with on-premises storage, user get their everyday Windows experience when accessing files and folders.&lt;/p&gt;
&lt;div&gt;Take a look at our infographic to learn more.&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;img class="alignnone size-full wp-image-18253" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/09/file-director-onedrive-for-business-connector1.jpg" alt="file directer onedrive  for business connector - screenshot"&gt;&lt;/div&gt;
</description><pubDate>Wed, 06 Sep 2017 00:17:09 Z</pubDate></item><item><guid isPermaLink="false">f4b2788e-8b13-4fea-b261-bae71292d572</guid><link>https://www.ivanti.com/blog/windows-10-migration-a-tale-of-two-herds</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Endpoint Management</category><title>Windows 10 Migration: A Tale of Two Herds</title><description>&lt;p&gt;The Great Wildebeest Migration in the Serengeti is the largest single movement of animals anywhere in the world. It occurs annually and continues indefinitely.&lt;/p&gt;
&lt;p&gt;Millions of wildebeest, along with hundreds of thousands of zebras and gazelles, leave their calving grounds in the Southern Serengeti and head for new water sources in the Kenyan Masai Mara, traversing different countries and terrains, to reach their goal.&lt;/p&gt;
&lt;p&gt;So, what do these stunning beasts have to do with Windows 10?&lt;/p&gt;
&lt;p&gt;Well, with Microsoft Windows 10 operating system updates now being pushed out more regularly, this enforced release cadence is imposing continuous migrations on organizations and forcing mass movements of users.&lt;/p&gt;
&lt;p&gt;Like the wildebeest, millions of Windows 7 users, in fact &lt;strong&gt;49.5 percent&lt;/strong&gt;&amp;nbsp;of overall desktop operating system users, according to &lt;a href="https://www.netmarketshare.com/" target="_blank" rel="noopener"&gt;netmarketshare.com&lt;/a&gt;, need to undertake a long and arduous journey to the Windows 10 promised land.&lt;/p&gt;
&lt;p&gt;Additionally, a huge number of Windows XP (10.5 percent) and Windows 8. x (12.1 percent) users, comparable to the zebras and gazelles of the Serengeti, need to tag along too.&lt;/p&gt;
&lt;p&gt;Let’s take a deeper look at the annual Great Serengeti Wildebeest Migration and contrast how two different metaphorical “organizational herds” typically address Windows migration projects.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 1&lt;img class="wp-image-6545 alignright" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/02/gettyimages-155146707.jpg" alt="lion"&gt;&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;Typically, wildebeest herds prepare to leave their calving grounds and start the long journey south. With a lot of inexperienced calves tagging along, the beginning of the journey is difficult and dangerous. Predators lie in wait.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Supporting IT users of differing abilities is always difficult. From Baby Boomers (50+ years old), through Generation X (36-50 years old) to Millennials (18 to 35 years old), users require different levels of support when working with Windows Desktops.&lt;/p&gt;
&lt;p&gt;Inexperienced users are more susceptible to social engineering and fall prey to ransomware and other malicious attacks more easily. They need more protection.&lt;/p&gt;
&lt;p&gt;In addition, an inexperienced IT department can be unprepared for a Windows migration and thus pitfalls await.&lt;/p&gt;
&lt;p&gt;Without upfront analysis of the existing IT environment, it will be a difficult journey to identify how to optimize and secure the Windows 10 estate, which will ultimately lead to a poor user experience and reduced user acceptance.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational &lt;/strong&gt;&lt;strong&gt;Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;With proper preparation and the concept of user experience at the forefront of planning, common migration pitfalls can be avoided.&lt;/p&gt;
&lt;p&gt;By analyzing the current endpoint environment and identifying application requirements such as license usage, required privileges and attempted installs, the new operating system environment can be secured and streamlined to satisfy user needs.&lt;/p&gt;
&lt;p&gt;In addition, benchmarking user experience metrics such as logon times, CPU usage or memory consumption will ensure the user acceptance and hence success of the Windows migration project will be heightened.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 2&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;During this period the wildebeest typically graze and wait for the next step of their gruelling journey.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A long period of reflection on how and when the migration will continue. What unexpected issues were uncovered during Proof of Concept phase? Were unforeseen stability and reliability issues experienced? What about performance? Security? What can be done to avoid future dangers?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational &lt;/strong&gt;&lt;strong&gt;Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Migration Phase 2 is short for this organizational herd as the up-front analysis identified a large majority of potential pitfalls associated with security, performance and application requirements.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 3&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;There is no food left for the Wildebeest in their current location. The herd begins to gather in readiness for a move.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;On business devices, end-users are stuck on older operating systems, while their personal devices are up-to-date and making use of the latest applications and resources. There is an urgency and desire from employees to force a move to Windows 10.&lt;/p&gt;
&lt;p&gt;This urgency leads to mistakes, which can set the migration back and lengthen Migration Phase 3 dramatically.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational &lt;/strong&gt;&lt;strong&gt;Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;End users have heard about the quick success of the proof of concept phase. Word spreads quickly and, using centralized deployment techniques with templated installation, IT is ready for an influx of devices to be migrated. Migration Phase 3 doesn’t last long for this organizational herd.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 4&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;The wildebeest re-start their journey across the Serengeti, the migration begins in earnest.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Steady at first, a sub-set of user’s desktops are now being migrated to Windows 10 as part of a pilot implementation. After rollout, performance, productivity and security issues become apparent. Troubleshooting is difficult. Some endpoints are rolled back.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Through proper planning and the use of the correct solutions to aid with the rapid deployment of OS images, applications, data and personal settings, Migration Phase 4 is a huge success and is accomplished quickly.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 5&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;The Wildebeest funnel together and mass herds are now en route to their next destination.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The pilot was eventually completed, but wasn’t without issue. Unforeseen problems such as slow logon times, poor desktop and application response times or missing applications hampered initial progress. As market awareness of Windows 10 grows, other business units are now becoming interested to have their desktops migrated to Windows 10, putting further pressure on the IT department.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The quick success of the pilot phase had become legendary amongst the end users. Everyone wants to reap the benefits of a fast, secure and modern desktop operating system.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 6&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;The herds are now mid-migration and pre-pare for the toughest part of their journey.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;IT are busy utilising disparate toolsets and scripts to attempt to manage and monitor the migration of many thousands of users. Some users fall by the wayside as issues hamper deployment. Others lose interest due to delays and slow troubleshooting of issues.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Hundreds if not thousands of desktops have now been successfully migrated to Windows 10. User feedback is very positive.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 7&lt;img class="wp-image-6553 alignright" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/02/gettyimages-506889352-1.jpg" alt="crocodile/alligator attacking a bison"&gt;&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;The wildebeest must now undertake a perilous river crossing. Not everyone will make it. Nile crocodiles take the weak and vulnerable.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Business units are mid-migration. Reports of poor logon times, bad user experience or lack of user privileges result in some users opting out of the migration process.&lt;/p&gt;
&lt;p&gt;Insecure and unpatched desktops can lead to malicious attacks that take down devices. Ransomware outbreaks successfully deliver their payload and put the migration project back days, if not weeks, while data is attempted to be restored or ransoms are arranged to be paid, ultimately affecting future IT budgets.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There are no victims of ransomware as the new environment has all the latest security patches deployed, all users have had admin rights removed and application control techniques are enforced to stop malicious code from being introduced.&lt;/p&gt;
&lt;p&gt;The IT estate is a safe haven for end users.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 8&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;The survivors that successfully crossed the river pause and celebrate by feasting.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The migration has been a long and difficult process. Large numbers of users have been migrated, but many users are unhappy due to the false promises of a faster desktop and implemented security techniques have locked the system down to within an inch of its life, massively affecting user productivity.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;From day one, the migration project has been seamless to the end user. Optimum user experience and a more secure desktop is achieved through upfront planning and proper implementation. User acceptance is high and the migration is viewed as successful by both end users and senior executives.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 9&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;The herds now break up into smaller groups.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Various business units within the organization are now using Windows 10. However, certain users no longer have access to specific required applications or tools. Personal settings have been lost. User files are missing. Productivity is again affected and user perception of the IT department is diminished.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;IT have delivered context-aware Windows 10 desktops to differing business units or user personas. Each user workspace is personalized to their own needs and personal settings and data is exactly where the user expects it to be.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 10&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;Each of the smaller groups stabilize and become self-sufficient&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;IT believe their job is done – they have delivered a Windows 10 endpoint to the business and its employees. The management of the desktop is handed down to individual business units.&lt;/p&gt;
&lt;p&gt;Lack of training or handover quickly results in increased support calls and inter-departmental blame. Due to the complexity of the new solution, no trust is placed on the users to help themselves.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Windows 10 migration has been a complete success. Self-service tools included with the selected migration solutions allow users to help themselves and resolve any common issues without IT intervention and with very little training. Self-sufficiency is achieved rapidly.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 11&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;The rains begin, forcing the wildebeest to leave the grasslands and head back to the Serengeti.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;After migrating to Windows 10, user experience is extremely poor, if not worse than the legacy desktop estate. This can lead uses to resort to shadow IT or to roll back to older platforms.&lt;/p&gt;
&lt;p&gt;This introduces new security vulnerabilities, application compatibility issues and increased support costs, just adding to the IT department’s existing pain.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;An increased Windows 10 release cadence drives both users and IT towards continuous migration patterns.&amp;nbsp; Having planned correctly and utilized the correct migration solutions upfront, this organizational herd is future proof and ready for further migrations.&lt;/p&gt;
&lt;h5&gt;&lt;strong&gt;Migration Phase 12&lt;/strong&gt;&lt;/h5&gt;
&lt;p&gt;The wildebeest return to fresh grazing on the Serengeti plains. Calving begins again. Predators, including lions, hyenas and cheetahs return.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd A&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;With users stuck with an unstable, insecure and complex workspace, Microsoft releases additional updates to the OS. This increases instability of the desktops and introduces further fear, uncertainty and doubt in the environment.&lt;/p&gt;
&lt;p&gt;On top of this, new end-users join the herd and need on-boarding. Some are not tech savvy and susceptible to social engineering and other forms of malicious attack.&lt;/p&gt;
&lt;p&gt;The whole sorry migration process needs to begin again.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Organizational Herd B&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The latest Windows updates arrive. No problem.&lt;/p&gt;
&lt;p&gt;Operating system and application patches are rolled out quickly and successfully to endpoints without any user disruption. If anything, this was far easier than last time!&lt;/p&gt;
&lt;p&gt;User experience is still massively high. Security is strong, yet unobtrusive, so it doesn’t interfere with user productivity.&lt;/p&gt;
&lt;h6&gt;&lt;strong&gt;Get there fast and avoid the predators!&lt;/strong&gt;&lt;/h6&gt;
&lt;p&gt;What can we learn from the different journeys these metaphorical organizational herds took to mass migration?&lt;/p&gt;
&lt;p&gt;Organizational Herd A lacked insight into their existing environment, failed to plan and used incorrect solutions to assist with their migration. This led to a bad and costly experience for both users and the business as a whole.&lt;/p&gt;
&lt;p&gt;Organizational Herd B had a safer, much faster route to migration success. Through forethought, preparation and by utilizing the most suitable migration aids, mass movement of users to a new desktop was quick, secure and cost effective.&lt;/p&gt;
&lt;p&gt;So, unlike the annual migration of the wildebeest, any update to your existing operating system doesn’t need to be daunting.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.ivanti.com/products/environment-manager" target="_blank"&gt;Ivanti’s solutions&lt;/a&gt; are designed to reduce the time and complexity associated with Windows migration projects and to secure users from malicious attacks.&lt;/p&gt;
&lt;p&gt;By separating all the user-specific aspects from the underlying OS and applications, Ivanti removes the manual IT effort required for new platform implementations, dramatically speeding up the migration process and making you future proof for any further OS updates.&lt;/p&gt;
&lt;p&gt;In addition, stopping unknown apps from running and preventing unnecessary access to IT resources through privilege management vastly decreases the predatory threats from ransomware and other malicious attacks.&lt;/p&gt;
&lt;p&gt;Users will always seek fresh grazing on the latest OS releases. With Ivanti, you can ensure a fast and safe migration while protecting the weak and vulnerable from lurking predators.&lt;/p&gt;
&lt;p&gt;Discover&amp;nbsp;&lt;a href="https://www.ivanti.com/products/environment-manager" target="_blank"&gt;more by clicking here.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management/unified-endpoint-management" target="_blank"&gt;&lt;img class="alignnone wp-image-15180 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/03/cta-blogbanner-win10.jpg" alt="Steps to Windows 10 migration success"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Tue, 21 Feb 2017 17:30:17 Z</pubDate></item><item><guid isPermaLink="false">49b4b317-4605-4422-8ff2-c339b1df1155</guid><link>https://www.ivanti.com/blog/controlling-windows-store-applications-when-using-windows-10-pro</link><atom:author><atom:name>Oliver Sills</atom:name><atom:uri>https://www.ivanti.com/blog/authors/oliver-sills</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>Controlling Windows Store Applications When Using Windows 10 Pro</title><description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank" rel="noopener"&gt;&lt;span class="s2"&gt;rebrand in January 2017&lt;/span&gt;&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;IT administrators who have rolled out Windows Pro for their organization are finding an unwelcome surprise from the Anniversary Update (build 1607).&lt;/p&gt;
&lt;p&gt;The update no longer allows restricting of Windows 10 Store Apps to prevent users from installing third party apps using Group Policy. This capability is now only supported by Microsoft on Windows 10 Enterprise and Education editions.&lt;/p&gt;
&lt;p&gt;In preventing this control of Windows 10 Store Apps, Microsoft is opening the door to more security issues since users can download apps which are not related to productivity, and very likely fall into the ‘Shadow IT’ category of uncontrolled devices and high-risk activity.&lt;/p&gt;
&lt;p&gt;&lt;img class="alignnone size-full wp-image-20672" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-10-pro.jpg" alt="microsoft home windows desktop screenshot"&gt;&lt;/p&gt;

&lt;p&gt;In order to completely prevent unwanted Windows Store Applications from being installed or executed in a Windows 10 Pro environment, Microsoft now suggest upgrading to the Enterprise edition, which obviously comes at an additional cost to organizations. This could stall Windows 10 Pro upgrade projects and result in migrations being postponed or even cancelled completely. Many small to medium sized businesses, which chose to take advantage of Microsoft’s free upgrade promotion to Windows 10 Pro, are not inclined to add this additional cost.&lt;/p&gt;
&lt;p&gt;When using Windows 10 Pro, the following key policies are still displayed in the Group Policy Editor but contain a note stating they only apply successfully on certain Windows 10 editions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;h3&gt;&lt;span&gt;&lt;strong&gt;Turn off Microsoft consumer experiences&lt;/strong&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This setting disables specific third party Windows Store apps from being automatically installed and disables promotional links to other third party apps&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;h3&gt;&lt;span&gt;&lt;strong&gt;Disable all apps from Windows Store&lt;/strong&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This setting disables the Windows Store completely and prevents all Windows Store Apps that were pre-installed or downloaded from running&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Why would I need to control Windows Store Apps?&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;If users are able to download or run any type of Windows Store App onto their Windows 10 Pro desktop, the probability of introducing compatibility issues with operating system components and other corporate delivered applications is greatly heightened, which can lead to IT support headaches and user experience issues.&lt;/p&gt;
&lt;p&gt;For example, on a Windows 10 Pro desktop, a user may now choose to run Microsoft Edge as their default Web browser as opposed to Internet Explorer, Google Chrome or another type of browser rolled out and supported by IT. Microsoft Edge’s known incompatibilities with many web pages and web apps will more than likely result in unnecessary IT helpdesk incidents being raised and user productivity being adversely affected.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro3.png" target="_blank" rel="noopener"&gt;&lt;img class="alignleft wp-image-13384 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro3.png" alt="IT in black box"&gt;&lt;/a&gt;Within educational establishments such as schools, colleges and universities, and amongst the millennial generation (those typically below 35 years old), users are now extremely tech savvy and it has become second nature to access applications and data via a host of different endpoint devices and platforms. Students will typically find ways to bypass campus IT security and install or run applications they are more familiar with or prefer using. This ability to bypass IT delivered services and use alternative sources is known as ‘Shadow IT’.&lt;/p&gt;
&lt;p&gt;With many games freely available for download from the Windows Store, end-user productivity can be badly affected. The most popular free Windows Store Apps currently include the likes of Facebook, Messenger, Netflix, Amazon and Dropbox – non-productivity apps and apps that can potentially be used as shadow IT to bypass existing IT delivered technologies and security controls already in use within your organization. This could ultimately lead to regulatory compliance issues and security breaches.&lt;/p&gt;
&lt;p&gt;When utilizing the Windows 10 Pro Anniversary Edition, the inability to prevent access to unauthorized applications from the Windows Store, especially with the ongoing proliferation of Ransomware and Malware attacks, could also introduce a huge security conundrum for those organizations that have already adopted Windows 10 Pro or were looking to roll this edition out in the near future.&lt;/p&gt;
&lt;p&gt;Often, the most hazardous third-party Windows Store Apps do not explicitly contain Malware or Ransomware themselves (so as to pass initial Microsoft Windows Store security checks). Instead, once they are installed, they deliver their lethal payload via links to external executables, built-in app updates or in-app purchases.&lt;/p&gt;
&lt;p&gt;With Microsoft AppLocker and Windows 10’s Group Policy security settings now only supported on Enterprise and Education editions, how do Windows 10 Pro customers go about securing the Windows App Store and preventing these types of applications from being installed or run?&lt;/p&gt;
&lt;p&gt;Microsoft suggest it’s still possible, using Group Policy, to ‘filter’ which third party applications are displayed to end-users through “store suggestions”, but this still wouldn’t completely stop those applications from being accessed and installed on Windows 10 Pro endpoints.&lt;/p&gt;
&lt;p&gt;So, step up to AppSense Application Manager. A marriage made in heaven.&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;How can AppSense Application Manager help?&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;AppSense Application Manager has the ability to easily control which Windows Store Apps are allowed to be run or installed based on simple, context-aware rules.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro4.jpg" target="_blank" rel="noopener"&gt;&lt;img class="alignnone wp-image-13385 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro4.jpg" alt="applocker windows 10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;These rules can be based on Groups, Users, Devices, Processes or even custom rules to target specific scenarios as to when users should or shouldn’t be allowed access to specific Windows Store Apps.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro-5.png" target="_blank" rel="noopener"&gt;&lt;img class="alignnone size-full wp-image-13386" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro-5.png" alt="windows-pro-5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Through simple whitelisting and/or blacklisting techniques, IT admins can now lock down Windows 10 Pro Store Apps within seconds, securing endpoints, eliminating shadow IT, preventing unlicensed software from being utilized and ensuring regulatory compliance.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro-6.png" target="_blank" rel="noopener"&gt;&lt;img class="aligncenter wp-image-13387 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro-6.png" alt="Windows 10 Applocker "&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In addition, AppSense Application Manager’s unique Trusted Ownership Checking capabilities mean that if an official Windows Store App does attempt to deliver a Malware or Ransomware payload via an update or in-app purchase, it is instantly prevented without the need for IT intervention.&lt;a href="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro-7.jpg" target="_blank" rel="noopener"&gt;&lt;img class="aligncenter wp-image-13388" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/10/windows-pro-7.jpg" alt="Appsense Application Manager Warning"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;How this works is if a standard user copies, downloads or attempts to install any unauthorized executable, they take ownership of that file (via NTFS permissions) and it’s instantly blocked because the user in question is not a &lt;em&gt;Trusted Owner&lt;/em&gt;. This means IT admins don’t even need to know the name of the executable the user is attempting to install or run.&lt;/p&gt;
&lt;p&gt;If the application is attempted to run directly from the Internet, an email attachment or from a non-local drive, it is also instantly denied.&lt;/p&gt;
&lt;p&gt;Alternatively, if the application is installed, and hence owned, by a Trusted User, e.g. an Administrator or other Trusted Installer account, then the application &lt;em&gt;is&lt;/em&gt; allowed to run by default for everyone, unless stated otherwise. This reduces the IT burden of maintaining complex whitelists and blacklists and frees up IT admins to concentrate on more urgent tasks, while maintaining the highest level of endpoint protection.&lt;/p&gt;
&lt;p&gt;These capabilities help protect the Windows 10 Pro environment from unnecessary applications and content, thus improving user productivity and ongoing user experience. It also provides the deepest level of security for your Windows 10 Pro endpoints and ensures Malware and Ransomware, which may have already circumvented your installed anti-virus and perimeter security, is stopped dead in its tracks.&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Lock Down Security with AppSense Application Manager&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;AppSense Application Manager ensures a consistently good user experience and helps improve end-user productivity and increased security for organizations that choose to adopt Windows 10 Pro.&lt;/p&gt;
&lt;p&gt;It ensures IT departments can lock down Windows 10 Pro images and guarantee only IT delivered applications and Windows components are allowed to be accessed by users. This eliminates user introduced shadow IT, which may otherwise have been used without explicit organizational approval.&lt;/p&gt;
&lt;p&gt;Endpoints are protected from malicious Windows Store Apps and other, unauthorized Win32 applications, improving security and compliance while eliminating the IT burden of maintaining complex whitelists and blacklists.&lt;/p&gt;
&lt;p&gt;AppSense Application Manager avoids putting Windows 10 Pro roll-outs on hold due to concerns with security features being removed from the Anniversary Update edition.&lt;/p&gt;
&lt;p&gt;For organizations still looking to upgrade to Windows 10, AppSense Application Manager eliminates the requirement to upgrade to the more expensive Enterprise edition – so as to make use of the built-in Windows Store controls – and instead allows IT to lock down Windows Store Apps and other Win32 apps in Windows 10 Pro, thus reducing both costs and complexity.&lt;/p&gt;
&lt;p&gt;Organizations now have a compelling reason to celebrate the Windows 10 Pro Anniversary update - by utilizing it without fear of opening the door to new security risks.&lt;/p&gt;</description><pubDate>Mon, 10 Oct 2016 13:31:10 Z</pubDate></item></channel></rss>