<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/phil-lawson/rss" /><link>https://www.ivanti.com/blog/authors/phil-lawson</link><item><guid isPermaLink="false">5aa3dfbb-ead3-4642-8053-97059f49a09c</guid><link>https://www.ivanti.com/blog/profile-containers-a-remedy-not-a-cure</link><atom:author><atom:name>Phil Lawson</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-lawson</atom:uri></atom:author><category>Endpoint Management</category><title>Profile Containers – A Remedy, Not a Cure</title><description>&lt;h2&gt;Introduction to User Profiles and Their Problems&lt;/h2&gt;

&lt;p&gt;First, some profile history and knowledge. To begin, let’s look at and understand the Windows Profile.&lt;/p&gt;

&lt;p&gt;The Windows user profile holds user-based application and operating system files and settings. The ntuser.dat file is effectively the user’s registry hive loaded up to HKEY_Users at logon, and is represented in HKEY_Current_User within the user session. These profiles include settings such as your wallpaper preference and Windows Explorer layout. Application files specific to the user are stored in %appdata%, with files that need to roam between PCs under %appdata%\roaming, and data to stay local under %appdata%\local.&amp;nbsp;Many applications cache a *lot* of data to the %appdata%\local folder in order to optimize the user experience—Chrome being a prime example.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There are several profile types. The main ones are local, roaming, and mandatory.&amp;nbsp;Local profiles are now the most common, with mandatory being very similar to a local profile but typically customized for a better user experience and stored on a central file server.&amp;nbsp;Both mandatory and roaming profiles come with their challenges—the main ones being that roaming profiles are prone to corruption and slow to logon when files are copied from the server. Mandatory profiles also present security risks and challenges around personal certificates, Skype for Business being a well-known offender.&lt;/p&gt;

&lt;p&gt;If you want to read more about the history of profiles, please take a look at &lt;a href="https://www.ivanti.com/blog/a-brief-history-of-windows-profiles" target="_blank"&gt;this popular blog&lt;/a&gt; written for Ivanti by James Rankin (Twitter: &lt;a href="https://twitter.com/james____rankin" target="_blank" rel="noopener"&gt;@james____rankin)&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I first became aware of the problems with roaming profiles very early in my career, where 70% of my time on the helpdesk was spent resetting roaming profiles for users who had lost all settings and personalization in their Windows desktop. Normally there was a difficult problem to troubleshoot, or a device had unexpectedly powered off, leaving the profile corrupt. This was a common problem in the industry, and something needed to be done.&lt;/p&gt;

&lt;h2&gt;Profiles – Virtualized and Optimized by Ivanti&lt;/h2&gt;

&lt;p&gt;There were numerous attempts to solve this problem, but an early solutions leader was AppSense (now part of Ivanti as the User Workspace Management (UWM) group). The AppSense Environment Manager product not only solved the problem, it also optimized the user’s profile and user experience.&amp;nbsp;And the solution wasn’t just a point product; it allowed easy management of profiles and developed into the gold standard for profile management. Competitors’ approaches stored profiles on file-server SMB shares, which might be acceptable for smaller deployments with 100% of users on virtual desktops and sessions, but these approaches didn’t fare so well for physical desktops, WAN links, and (looking to the future) cloud architectures requiring web services over HTTPS.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To learn more about how UWM is leading the march to the cloud in workspace management and tight integration with Azure, &lt;a href="https://www.ivanti.com/blog/user-workspace-management-the-cloud-and-2019" target="_blank"&gt;read this blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;The New Contender: Profile Containers&lt;/h2&gt;

&lt;p&gt;I first became aware of the idea of profile containers in the very early days of Office 365, as an AppSense engineer at HPe (now DXC). We looked to Environment Manager as a way of retaining the user’s Office 365 Outlook cache so it did not need to be re-cached each time the user logged onto a new non-persistent desktop or session. If the cache is not immediately available, the user’s experience is poor as they wait for the mailbox to be rebuilt and are initially unable to search.&lt;/p&gt;

&lt;p&gt;Why not just capture the Outlook cache file through Environment Manager, like any other personalized file? Well, the problem is size—these cache files quickly grow to multiple gigabytes, which isn’t suitable for transfer at app start or even logon. Using VHDs as an alternative approach (managed through Environment Manager) was discussed at the time, but the idea never really took off.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Around the time I joined Ivanti, the VHD idea was gaining popularity across the industry and we developed scripts for Environment Manager that allowed elements of the profile to be roamed in a VHD. These scripts worked nicely and, over time, evolved into the feature known as EM Cache Roaming, initially released in early 2018.&lt;/p&gt;

&lt;p&gt;What does this have to do with profile containers? Well, this concept of using a VHD to solve a specific application cache problem can be extended to capture the entire user profile in one large VHD blob. It mounts quickly, ensures fast logons, and, compared to other approaches, doesn’t have the performance impact on the file server, which makes for exciting demos and appears simple. You could almost say that profile containers are Folder Redirection 2.0, or are at least trying to solve the same challenges.&lt;/p&gt;

&lt;h2&gt;UWM Virtualized Profiles vs Profile Containers&lt;/h2&gt;

&lt;p&gt;So how do profile containers differ from Ivanti’s profile management? First, the concept of a profile container actually dates back to Windows Server 2012, where it was known as “User Personal Disk” and was primarily used to solve Outlook roaming problems. It was buried deep in the UI and never got much love, leaving the door open for other vendors, including FSLogix, to advance the concept and extend it to capturing the entire user profile as well as other application caches.&lt;/p&gt;

&lt;p&gt;So, do we need both approaches? Why does Environment Manager contain a mix of file and registry capture, and the option of VHD Cache Roaming for things like Office 365 caches? The key word is “Management”—if you place the entire profile into one large container then you lose so much of the ability to manage the user experience. Profile containers are a point solution to allow efficient redirection of a profile to a network share, that’s it.&amp;nbsp; Below are some genuine examples of “asks” I’ve had this week that simply are not possible (or at least very difficult) with profile containers:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A large financial organization wants the experience on its Windows 10 virtual desktops to be the same on Windows 10 laptops. This is impossible with profile containers because delivering a huge VHD file over a WAN or VPN won’t work, especially when the laptop user goes offline. In addition, sharing a single profile container across multiple devices can result in lost profile data.&lt;/li&gt;
	&lt;li&gt;If you have a user roaming geographically to different VDI farms, then a profile container cannot stretch across the world through a WAN link, unless you replicate the entire file system. The GeoSync feature in User Workspace Manager synchronizes data between datacenters.&lt;/li&gt;
	&lt;li&gt;Here’s another example I heard today: An Office setting is causing problems for 3,000 users and the organization needs to delete it from each user’s profile. With Environment Manager, this is easy to apply in bulk and just relaunch the app. With profile containers, however, it requires each user to log on again so the changes can be applied.&lt;/li&gt;
	&lt;li&gt;When profile settings cause a problem, either the administrator or the user (if self-service is enabled) can easily roll back to an earlier version either the specific application or operating system setting, rather than blowing away the entire profile.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The short version is that with Environment Manager, you have granular, centralized control over every aspect of the user profile, combined with the benefits of using VHDs for roaming caches in situations where it makes sense. In other words, the best of both worlds.&lt;/p&gt;

&lt;h2&gt;Profile Containers and Performance&lt;/h2&gt;

&lt;p&gt;When IT teams look at deploying profile containers, the most common questions we receive relate to the anticipated IOPS load on the file server that will host the VHDs. &lt;a href="https://www.leeejeffries.com/my-experiences-sizing-fslogix-profile-and-o365-containers/" target="_blank" rel="noopener"&gt;This article&lt;/a&gt; is a good discussion based on real world experience.&lt;/p&gt;

&lt;p&gt;By comparison with Ivanti, personalization only synchronizes data on demand when an application or session starts (although it can be pre-loaded and cached for offline devices). With a little configuration, it is possible to capture a relatively small amount of profile data (typically 15-20 MB per user) and still provide a full roaming experience.&lt;img alt="feature comparison between environment manager and microsoft/fslogix" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/05/phil.lawson.blog.png"&gt;&lt;/p&gt;

&lt;h2&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;When weighing up how you want to manage your user profiles across the Windows desktop, consider it from an administrative and user-experience perspective.&amp;nbsp; I’ve provided a small snapshot of requirements that would be difficult/impossible to achieve with profile containers. With Environment Manager, you can reap the performance benefits of using VHD to containerize the parts of the profile that make sense without giving up management of the rest.&lt;/p&gt;

&lt;p&gt;You can learn more about Environment Manager &lt;a href="https://www.ivanti.com/products/environment-manager" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/lp/uwm/demos/environment-manager?from=blog" target="_blank"&gt;&lt;img alt="environment manager - get a demo" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/05/environment.manager.demo.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Fri, 10 May 2019 21:19:55 Z</pubDate></item><item><guid isPermaLink="false">26ffb660-46a1-4e96-a795-94149f5a06d9</guid><link>https://www.ivanti.com/blog/ivanti-performance-manager-release-its-full-potential</link><atom:author><atom:name>Phil Lawson</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-lawson</atom:uri></atom:author><category>Endpoint Management</category><title>Ivanti Performance Manager: Release Its Full Potential!</title><description>&lt;p&gt;Far too often I hear organizations are just using the out-of-the-box configurations supplied with &lt;a href="https://www.ivanti.com/products/performance-manager" target="_blank"&gt;Ivanti Performance Manager&lt;/a&gt;&amp;nbsp;for controlling resources in their desktop and server environments. Sure, this brings many benefits, including fast time-to-value and reduced IT admin, but potentially, you may not be exploiting the true power of Performance Manager.&lt;/p&gt;

&lt;p&gt;Common resource hungry applications such as Microsoft Office, Internet Explorer, Firefox and Chrome can all be managed more efficiently. This is especially useful in a Terminal Services scenario where controlling resource will allow you to increase the user density on a server.&lt;/p&gt;

&lt;p&gt;&lt;img alt="ivanti performance manager - getting started - terminal services/RDS - screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/07/potential.blog2.jpg"&gt;&lt;/p&gt;

&lt;p&gt;In the short video&amp;nbsp;below, you will see a simple demonstration of Performance Manager, showing how the unique feature of CPU Thread throttling works, how the base priority is changed, followed by a run through of recommended CPU resource planning.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="276949897"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;In a future blog I’ll explain more on how to get the right figures for planning efficient resource levels. For now, rather than just relying on our out-of-box configurations,&amp;nbsp;&lt;a href="https://forums.ivanti.com/s/article/Example-Performance-Manager-Configuration?language=en_US" target="_blank" rel="noopener"&gt;download an example Performance Manager config to help get you going!&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Mon, 02 Jul 2018 16:44:19 Z</pubDate></item><item><guid isPermaLink="false">e27c44c0-b490-43ca-ba99-a97b900ce340</guid><link>https://www.ivanti.com/blog/windows-intune-autopilot-ivanti-user-workspace-manager</link><atom:author><atom:name>Phil Lawson</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-lawson</atom:uri></atom:author><category>Endpoint Management</category><title>Windows Intune, Autopilot, and Ivanti User Workspace Manager</title><description>&lt;p&gt;&lt;span&gt;The Cloud is far more than just a datacenter in the sky. Cloud technologies and platforms enable a multitude of new ways to work and, for IT, new ways to deliver IT services to end users. Microsoft’s recent introduction of Windows Autopilot is a new example of how the Microsoft Cloud is evolving to support these new workstyles, and of the changing role of IT in the cloud era.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;For many users, the traditional route to work computing is that IT orders computer equipment, configures it and delivers it to them. It’s often a week or more before a new employee has their laptop set up and running in most organizations. And what happens when they need to upgrade or replace that laptop? The employee is back where he started, waiting several days (or more) and possibly visiting IT once or twice while they set up and migrate applications and data to the new laptop.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;img class="alignnone wp-image-18338" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/09/screen-shot-2017-09-13-at-1.57.29-pm.png" alt="microsoft intune logo"&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;This is where Windows Autopilot and Intune come in. When IT pre-registers any new Windows 10 device, that device will be automatically enrolled in both of these cloud-based services when first switched on by their new owner and connected to the Internet. Autopilot will present the user with a logon tailored to their organization, and will allow that user to log on using the account pre-assigned to them by IT. Further, if the laptop is pre-built with Windows 10 Professional it will be automatically upgraded and licensed for Enterprise.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;After that initial logon, Intune will set basic policy, deliver applications, and give IT a high degree of control over the all-important Office 365 setup and the service branch the device is part of.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;So far so good, this all sounds promising—but wait a minute! What does IT lose through this style of management? Well, first, there is an inconvenient feature gap between SCCM and Intune. But the biggest challenge is that with Windows 10 devices using Autopilot and Intune, the user is authenticated with AzureAD, not traditional Active Directory, so Windows 10 devices using Autopilot and Intune are &lt;/span&gt;&lt;span&gt;not&lt;/span&gt;&lt;span&gt; domain-joined, which knocks out a lot of traditional IT management tools—including Group Policy.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If you want the convenience of Autopilot and InTune &lt;/span&gt;&lt;span&gt;plus&lt;/span&gt;&lt;span&gt; the ability to apply policy, help is at hand from Ivanti’s User Workspace Management products. In particular, Ivanti Environment Manager can apply Group Policy-like policies to the endpoint, but with a far higher degree of performance, flexibility and granular targeting.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;img class="alignnone wp-image-18341" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/09/screen-shot-2017-09-13-at-2.01.08-pm.png" alt="login screen for user on laptop"&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;If you’re willing to give up that control to get a low-touch way to configure new laptops, you’re still faced with this question: how do you migrate the user’s persona (settings, local files, shortcuts, printers, credentials, regional settings, favorites, etc.) from their old Windows device to a new one? And how do you ensure that if a user loses or breaks her laptop, you can give her a new one—in minutes—that will look and feel exactly the same as the old one?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;That’s something we at Ivanti call Personalization—the roaming of a user’s persona between devices—that is delivered by Environment Manager and Ivanti File Director as part of Ivanti’s User Workspace Management products. And, yes, before you ask, Environment Manager and File Director can be cloud-hosted.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;img class="alignnone wp-image-18342" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/09/screen-shot-2017-09-13-at-2.03.27-pm.png" alt="file - file director - finance screenshot"&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Need to lock down those devices? Unfortunately, Intune policies don’t cover things like app blocking, whitelists and privilege control—but Ivanti Application Control has the answer with capabilities like Trusted Ownership™.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;img class="alignnone wp-image-18343" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/09/screen-shot-2017-09-13-at-2.04.17-pm.png" alt="file - application tools - documents - sheep screenshot"&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;So—how would you put Autopilot, Intune and Ivanti products together to give IT full control of the user experience and workspace, while embracing the new world of Autopilot and Intune? What would the end-to-end workflow look like? Here’s a &lt;/span&gt;&lt;span&gt;3-minute video&lt;/span&gt;&lt;span&gt; to show it all working together.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="//player.vimeo.com/video/231775774?title=0&amp;amp;amp;byline=0" width="425" height="350" allowfullscreen="allowfullscreen"&gt;&lt;/iframe&gt;&lt;/p&gt;
</description><pubDate>Tue, 05 Sep 2017 15:55:12 Z</pubDate></item><item><guid isPermaLink="false">913802f7-ed58-4cc6-8b1d-aa7e5d94c2ea</guid><link>https://www.ivanti.com/blog/using-appsense-application-manager-to-secure-windows-server-pt-2-of-3</link><atom:author><atom:name>Phil Lawson</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-lawson</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>Using AppSense Application Manager to Secure Windows Server (Pt. 3 of 3)</title><description>&lt;p class="single-title"&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank" rel="noopener noreferrer"&gt;&lt;span class="s2"&gt;rebrand in January 2017&lt;/span&gt;&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In Part 2 of this series, we&amp;nbsp;provided the link to our new Server Lockdown Guide, which provided details on using Application Manager and Environment Manager to take control of admins logging onto your infrastructure servers so they can do their job without flouting critical process or security controls.&lt;/p&gt;
&lt;p&gt;In this post, we’re pleased to provide the link to our videos that show you how it’s done. Video 1 shows a user logging onto a server as a non-admin and how the session is secured. Video 2 shows the Application Manager role-based access and optional kiosk mode applied by Environment Manager with a tighter lockdown.&lt;/p&gt;
&lt;p&gt;Check them out—Video 1 is&lt;a href="https://www.youtube.com/watch?v=RqlMtICC29E" target="_blank" rel="noopener"&gt; here &lt;/a&gt;and Video 2 is &lt;a href="https://www.youtube.com/watch?v=SOI8T5vZxt4" target="_blank" rel="noopener"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Thanks for following this series—we’d love to see your feedback in the comments.&lt;/p&gt;</description><pubDate>Mon, 09 Jan 2017 17:48:19 Z</pubDate></item><item><guid isPermaLink="false">c7fe67e1-e895-4ccc-8a0a-5714a4773d82</guid><link>https://www.ivanti.com/blog/using-appsense-application-manager-to-secure-w-1</link><atom:author><atom:name>Phil Lawson</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-lawson</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>Using AppSense Application Manager to Secure Windows Server (Pt. 2 of 3)</title><description>&lt;p&gt;&lt;img class=" wp-image-13581 alignright" src="https://static.ivanti.com/sites/marketing/media/images/blog/2017/01/gettyimages-508178484-150x150.jpg" alt="gettyimages-508178484"&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank" rel="noopener noreferrer"&gt;&lt;span class="s2"&gt;rebrand in January 2017&lt;/span&gt;&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Part 1 in this series&amp;nbsp;(Using AppSense to Secure a Server Estate, With Role-Based Access) covered how to use AppSense to do the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Take control of who is logging onto your infrastructure servers as an Administrator using Group Policy.&lt;/li&gt;
&lt;li&gt;Use Application Manager to secure against unwanted file execution while allowing a user elevated admin privileges to the specified consoles/applications and commands required for their job role.&lt;/li&gt;
&lt;li&gt;Use AppSense Environment Manager Secure a server user session and present consoles or applications in kiosk mode.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Here’s the&amp;nbsp;&lt;a href="https://forums.ivanti.com/s/article/BP24-Server-Role-Based-Access-Application-Manager-Environment-Manager?language=en_US" target="_blank" rel="noopener"&gt;link to download&lt;/a&gt; the Server Lockdown Guide and the .aemp and .aamp files needed to configure Application Manager and Environment Manager.&lt;/p&gt;</description><pubDate>Fri, 06 Jan 2017 10:52:20 Z</pubDate></item><item><guid isPermaLink="false">72b8d0c1-bc05-44f4-ada3-a277670f8678</guid><link>https://www.ivanti.com/blog/using-appsense-to-secure-a-server-estate-with-role-based-access</link><atom:author><atom:name>Phil Lawson</atom:name><atom:uri>https://www.ivanti.com/blog/authors/phil-lawson</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>Using AppSense to Secure a Server Estate, With Role-Based Access (Pt. 1 of 3)</title><description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank"&gt;&lt;span class="s2"&gt;rebrand in January 2017&lt;/span&gt;&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;AppSense Application Manager (AM) and AppSense Environment Manager (EM) are widely used for server hardening, security, user profile management and server configuration in a Terminal Services environment.&lt;/p&gt;
&lt;p&gt;Surely the idea of using both for a role-based access solution is an extension of this proven background? The good news is, it is!&lt;/p&gt;
&lt;p&gt;The construct of AM and EM both lend themselves very well to a server role-based access solution. It makes the process of removing administrative rights and then elevating a user to have the required administrative rights to specific consoles, applications, services and commands very straightforward.&lt;/p&gt;
&lt;p&gt;A common example is the Internet Information Services Console (IIS), which requires that the user is an administrator on the server on which they are launching IIS. This means a user has full rights on the server just for the purposes of running the IIS console. Many other consoles also require that the user be an administrator on the server.&lt;/p&gt;
&lt;p&gt;IT managers must hate the above scenario, especially if the server is multi-purpose (e.g. SQL and IIS), because they are effectively giving people the ability to restart my server, install/uninstall software, stop services, etc. In a controlled environment, where changes may require ITIL change control, it makes a mockery of the change control process and best security practice. There may also be regulatory code of conduct or governing body that stipulates that control of access on servers needs to be in place. Security compliance of this type is commonplace for public sector and financial organizations.&lt;/p&gt;
&lt;p&gt;AppSense Application Manager is the key to compliance for these and other scenarios. In this post, an associated guide, and instructional videos, I’ll show you how you can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Take control of the users logging on as administrators to your IT server estate.&lt;/li&gt;
&lt;li&gt;Log a user on as a non-admin to a server and elevate them as an administrator to the consoles, applications, services, and commands they require for their role.&lt;/li&gt;
&lt;li&gt;Benefit from the security enhancements Application Manager has to offer, including trusted ownership file checking.&lt;/li&gt;
&lt;li&gt;Achieve a kiosk-style lockdown mode for users within role-based groups using Environment Manager, and apply further user session lockdown to a role using Environment Manager.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;strong&gt;Taking control of who is logging onto your infrastructure servers as an Administrator using Group Policy.&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;When enhancing security related to IT administrative tasks, you can easily incorporate fundamental security principles using Application Manager and its Built-in Elevate function.&lt;/p&gt;
&lt;p&gt;The only users that should be logging onto a server interactively as an administrator are IT System administrators (period). System administrators are in a position of trust and should operate within a change management ITIL framework. That is, if changes are made to a server they are performed within a designated planned maintenance window, under the approval of a change board. Nobody else should be an administrator. Bob, who needs to check the SQL backups on the SQL server, does not need to be an admin on the server to do this.&lt;/p&gt;
&lt;p&gt;Service accounts requiring administrative privileges also need to be a member of the administrators group, but need to be prevented from logging on interactively. As an example, as the SCCM Administrator for an estate I am very likely to know the password SCCM ‘client push account’. This has to be a member of the local administrators group. I need to prevent the service account from being used to log on interactively using the policy to ‘not grant this account the right to log on locally’.&lt;/p&gt;
&lt;p&gt;Finally, to allow the non-admins the ability to log on interactively to the server, we configure the remote desktop users group for the server using group policy.&lt;/p&gt;
&lt;p&gt;For an in-depth explanation of how you can do this on your server estate, check this blog tomorrow for a link to download the Server Lockdown Guide. We’ll also provide video demos in the next couple of days—Video One will demonstrate using the Built-in Elevate function. Again, check this blog for a link to view the videos.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Secure using Application Manager and elevating access to the Consoles, Applications and Commands required. &lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;With the Application Manager agent on the server we can reap the benefits of having a secure configuration. The users will be governed by an Application Manager restriction rule that will stop unauthorized execution of files. Users will not be considered Trusted owners and will be prevented from executing unauthorized files. &amp;nbsp;We can then use the Application Manager configuration to elevate and provide the user with administrative privileges to a consoles/applications, and only the consoles/applications for their job role.&lt;/p&gt;
&lt;p&gt;As the users are now logging on as standard users we also get all the natural benefits from the security of being a standard user. Being a non-admin user prevents the running of administrative command prompts, running consoles that require admin privileges, and removing/installing software.&amp;nbsp;Essentially the user cannot make changes that require User Account Control (UAC) privileges. You are now leveraging Microsoft security controls rather than trying to defeat them.&lt;/p&gt;
&lt;p&gt;In Video Two, which will be available later this week, I go in-depth explaining and showing how this can be set up for various job roles, including storage, web and network admins.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Using Environment Manager to further secure the device into Kiosk mode&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;Environment Manager is the final piece of the puzzle for really tightening security. I can use conditions and actions to allow a user to log on to a server as a non-admin and only get presented with the IIS console, so that user does not get the desktop experience and if he closes IIS it gets relaunched. Additionally, that user can’t gain access to Windows Explorer but can perform tasks like importing certificates from the file system. If you watch Video Two, which will be available later this week, I explain the entire Environment Manager configuration and the lockdown.&lt;/p&gt;</description><pubDate>Wed, 04 Jan 2017 11:59:06 Z</pubDate></item></channel></rss>