Tải bản đầy đủ (.pdf) (34 trang)

Tài liệu Module 6: Designing a Computer Management Strategy pptx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (941.59 KB, 34 trang )







Contents
Overview 1
Determining the Current Environment 2
Determining the Organizational
Requirements 9
Group Policy Settings for Computer
Management 11
Selecting CCM Options for Computer
Management 20
Lab A: Meeting Computer Management
Requirements 23
Review 27

Module 6: Designing a
Computer Management
Strategy



Information in this document, including URL and other Internet Web site references, is subject to
change without notice. Unless otherwise noted, the example companies, organizations, products,
domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious,
and no association with any real company, organization, product, domain name, e-mail address,
logo, person, places or events is intended or should be inferred. Complying with all applicable
copyright laws is the responsibility of the user. Without limiting the rights under copyright, no


part of this document may be reproduced, stored in or introduced into a retrieval system, or
transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.

Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.

 2001 Microsoft Corporation. All rights reserved.

Microsoft, MS-DOS, Windows, Windows NT, Active Desktop, Active Directory, IntelliMirror,
Outlook, PowerPoint, and Visio are either registered trademarks or trademarks of Microsoft
Corporation in the U.S.A. and/or other countries.

The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.


Module 6: Designing a Computer Management Strategy iii


Instructor Notes
In this module, students learn how to determine the functional roles of
computers in an organization. They also learn how to use Microsoft
®

IntelliMirror
®
management technologies to apply standard configurations, to

control the functionality of workstations, and to reduce the total cost of
ownership (TCO) associated with administering client computers.
After completing this module, students will be able to:

Determine the current computer management environment.

Determine organizational requirements for computer management.

Assess common computer management options.

Select the appropriate option to meet the organizational requirements.

Materials and Preparation
This section provides the materials and preparation tasks that you need to teach
this module.
Required Materials
To teach this module, you need the following materials:

Microsoft PowerPoint
®
file 2410a_06.ppt

Module 6, “Designing a Computer Management Strategy”

Trainer Materials compact disc

Preparation Tasks
To prepare for this module, you should:

Read all of the materials for this module.


Read the technical white papers located on the Trainer Materials compact
disc.

Read any relevant information in the Microsoft Windows
®
2000 or
Microsoft Windows XP Help files, and in the Windows 2000 or
Windows XP Resource Kit.

Be familiar with the principles and practice of Change and Configuration
Management (CCM).

Read the instructor notes that precede each module. These contain
preparation suggestions for each module.

Read the review questions and be prepared to elaborate on the answers
provided in the text.

Complete the lab and be prepared to elaborate on the solutions found there.

Presentation:
45 Minutes

Lab:
45 Minutes
iv Module 6: Designing a Computer Management Strategy


Module Strategy

Use the following strategy to present this module:

Determining the Current Environment
In this section, students determine how client computers are to be used, and
by whom, in terms of the job roles of the user base and the configurations of
the client computers. Take the following actions:
• Acknowledge that there are significant overlaps between determining
user settings and computer settings. Therefore, decisions about the
settings and the technologies required to support them are mutually
dependent.
• It is important to determine computer settings that will support users’
evolving needs over time. Encourage students to adopt a flexible
approach to computer settings, and to avoid settings that may need to
change.
• Consider the possibility of layered computer configurations, which can
then be adapted to the needs of specific user groups. For example, a
standard office computer configuration could be defined, which could
then be the basis for an enhanced computer configuration.

Determining the Organizational Requirements
In this section, students define the exact computer configurations required
by answering a number of questions about the computer configurations,
each of which should map to one or more job roles. Take the following
actions:
• The questions listed are only a starting point for evaluating user settings
needs. Ask students if they can think of any other questions.
• Emphasize that it is not only the responses to the questions that matter,
but also the impact of the responses. The underlying issue for each
question is the identification of unnecessary costs incurred by user
settings management. These costs determine the potential for savings

through CCM technologies.

Group Policy Settings for Computer Management
In this section, students determine the most appropriate technologies to meet
the CCM requirements for computer management.

Selecting CCM Options for Computer Management
In this section, students assess what options are appropriate to specific
network configurations. Students consider the similarities between the
common configuration needs of the users with the settings provided by
standard scenarios.
The categories discussed here repeat those in previous sections, and do not
need to be explained again.

Module 6: Designing a Computer Management Strategy v


Lab Strategy
Use the following strategy to present this lab.
Lab A: Meeting Computer Management Requirements
The lab is designed to assist the student in applying the information presented
in this module. Students are expected to have:

Experience in editing Group Policy settings.

The knowledge and skills necessary to define and implement a computer
management plan.

The lab has a scenario in which a company is in the process of analyzing its
computer management needs. In this exercise, students determine appropriate

computer configurations for a number of job roles.
To conduct this lab:

Read the lab carefully, playing close attention to the instructions and to the
details of the scenario.

Divide the class into groups of two or more students.

Present the lab and make sure that students understand the instructions and
the purpose of the lab.

Explain each of the exercises and highlight any key information.

Take the opportunity to assess each student’s comprehension of the
technology features of Group Policy presented in the module.

Allow time to discuss the solutions after the lab is completed. A solution is
provided on the Trainer Materials compact disc. Encourage students to look
critically at each others’ solutions and to discuss any ideas for improving the
designs.


Module 6: Designing a Computer Management Strategy 1


Overview

Determining the Current Environment

Determining the Organizational Requirements


Group Policy Settings for Computer Management

Selecting CCM Options for Computer Management

*****************************
ILLEGAL FOR NON
-
TRAINER USE
******************************
In a Microsoft
®
Windows
®
2000 deployment, it is not possible to produce one
workstation configuration that is suitable for all workstation roles. The level of
administrative control that you require and the associated administrative
overhead are dependent on the tasks that users must perform on a workstation.
In this module, you will learn how to determine the functional roles of
computers in an organization. You will also learn how to use Microsoft
IntelliMirror
®
to apply standard configurations, to control the functionality of
these workstations, and to reduce the total cost of ownership (TCO) associated
with administering client computers.
After completing this module, you will be able to:

Determine the current computer management environment.

Determine organizational requirements for computer management.


Assess common computer management options.

Select the appropriate options to meet the organizational requirements.

Topic Objective
To provide an overview of
the module topics and
objectives.
Lead-in
In this module, you will learn
the principles of evaluating
computer management
options based on
organizational needs and
the current and planned
environment.
2 Module 6: Designing a Computer Management Strategy






Determining the Current Environment

Classifying User Base by Job Roles

Determining Client Computer Configurations


Incorporating the Organization’s Current Policies

*****************************
ILLEGAL FOR NON
-
TRAINER USE
******************************
Workstations in a corporate network are tools that enable users to complete job-
related tasks. With the range of functions that a workstation is expected to
provide for the user base, it is not possible to configure all computers in the
same way.
Classifying User Base by Job Roles
To provide users with the workstation environment that they need, you must
understand their computer use, which you can do by categorizing users
according to their job roles.
It is possible to use generic roles as a starting point. However, you will find it
most appropriate to classify users based on the actual roles in your organization.
Determining Client Computer Configurations
To understand the configuration needs of different workstations, analyze the
functional roles that these computers fulfill. These roles will vary widely. For
example, the level of security needed on a developer’s workstation differs
significantly from that on a computer used for public access to the network.
By understanding these roles, you can identify generic configurations that can
be applied to manage computers on the network. The configurations act as
default computer settings. However, they can be modified easily to tailor
computer management to your environment, and to accommodate the changing
needs of your user base.
Topic Objective
To explain how to determine
the organization’s current

computer management
environment.
Lead-in
As designer of the CCM
infrastructure, you need
information about the
computer environment to
create a successful
computer management
strategy.
Module 6: Designing a Computer Management Strategy 3


Incorporating the Organization’s Current Policies
If you are implementing a Change and Configuration Management (CCM) plan
in an existing environment, you must allow for and possibly plan to incorporate
any existing computer management policies.
These existing policies are system policies in a Microsoft Windows NT
®

environment, or Group Policies in an existing Active Directory


directory service environment in Windows 2000.
One of the most important actions you must take is to determine whether you
must retain any existing policies, particularly in the case of supporting older
client computers not running Windows 2000, which are not affected by
Windows 2000 Group Policies.
Even if you are planning an upgrade from Windows NT to Windows 2000 on
your servers and your client computers, there is likely to be an interim period,

during which you must provide support for both types of policies, such as
system policies and Group Policies. Therefore, this upgrade requires careful
planning to allow for and support this type of environment.
In addition, by using existing settings as a starting point, you can merge your
current policy with the new strategy for CCM. This ensures that existing user
and administrative needs are met in the new computer management strategy.
4 Module 6: Designing a Computer Management Strategy


Classifying User Base by Job Roles

CCM Strategy Should Be:

Flexible

Concise

Appropriate

Example Job Roles:

Call center representatives

Client advisors

Supervisors

Determine Succinct Set of Roles, Covering Majority of User Needs

*****************************

ILLEGAL FOR NON
-
TRAINER USE
******************************
It is recommended that the CCM strategy that you develop be:

Flexible to meet a range of users’ needs.

Concise, thereby reducing the administrative overhead associated with
maintaining the workstations.

Appropriate to the needs of the users.

Example Job Roles
Consider an investor relations team working in a finance company. The team
has three job roles: call center representative, client advisor, and supervisor.
Each of these job roles has very different computer configuration needs.
Call Center Representatives
Call center representatives work on desktop computers that are connected
directly to the network. Although they tend to sit at the same workstations, they
can move around the office during the day and, therefore, need to log on to
several computers. They need only a line-of-business application for their job.
These users do not generate any data that is saved outside this application.
Client Advisors
Client advisors are field based. They use portable computers that have
infrequent direct connections to the network. Access is normally provided by
using Routing and Remote Access Service. They have both a line-of-business
application and Microsoft Office 2000 installed for e-mail and client computer
reporting purposes.
Topic Objective

To determine the
organization’s requirements
for computer management
classified by the job roles of
the users.
Lead-in
To understand your users’
needs for computer
management, it will help to
categorize users by their
jobs roles.
Delivery Tip
Emphasize that these are
example roles only, and that
students should make their
own classifications of users’
job roles.
Module 6: Designing a Computer Management Strategy 5


Supervisors
Supervisors in the organization have similar needs to the representatives, but
these users normally use just one desktop computer. They have a line-of-
business application and Office 2000 installed for e-mail and staff reporting
purposes.
Some job roles have similar needs. For example, managers and secretaries have
similar ways of working because they typically work only on their own
computers and are unlikely to roam from one computer to another. They
probably save their data to either their local computer or to a local network
server. Similarly, mobile sales and service staff have similar ways of working,

because their jobs involve traveling to several different locations during the
working day. These users are more likely to use portable computers where data
is saved locally and then requires synchronization with the network servers
upon return to the main office. It is important to determine a set of roles that
covers the majority of user needs. If you have too many classifications, the
administrative overhead is too high. If there are two few classifications, the
resulting computer configurations may be insufficient.
6 Module 6: Designing a Computer Management Strategy


Determining Client Computer Configurations
Mobile User
Mobile User
Lightly Managed / Application Station
Lightly Managed / Application Station
Task Station / Kiosk
Task Station / Kiosk
Multi-User
Multi-User

Determine Computer Configurations at a High Level

Map Specified Configurations Against Job Roles

*****************************
ILLEGAL FOR NON
-
TRAINER USE
******************************
After you classify job roles, you can determine appropriate computer

configurations at a high level.
Determine Computer Configurations at a High Level
To determine computer configurations at a high level, you must understand the
potential configurations so that you can define your own specific configurations
for each job role. Windows 2000 provides several template configurations
against which you can compare your own configurations:

Lightly Managed

Mobile User

Multi-User

Application Station

Task Station

Kiosk

Topic Objective
To determine the
organization’s requirements
for computer management
by mapping potential
configurations against job
roles.
Lead-in
To determine appropriate
computer configurations,
you may consider potential

configurations and define
suitable settings for each of
the job roles.
Delivery Tip
Explain that students can
determine their own
computer configurations by
comparing their
configurations with pre-
configured template
configurations that
Windows 2000 supplies.
Students will examine these
template configurations later
in the module.
Module 6: Designing a Computer Management Strategy 7


Map Specified Configurations Against Job Roles
The templates contain specific user and computer settings that you can use to
support the requirements of your users based on their job roles. For example, by
using the job roles from the previous section, you could determine the
following:

The call center representatives are roaming users that need little or no
control over their workstations beyond being able to change desktop
settings. These settings can be saved to a roaming profile. These users need
only one software application to perform their jobs and do not need to install
or configure any more applications. Because they do not generate any data,
they do not need access to the local hard disk or any network resources.


The client advisors have very different needs, because they are not always
connected to the network. Instead of having a roaming profile, these users
must have local profiles. These local profiles include their desktop settings
and application data. Administrative support staff do not have direct access
to portable computers, so users have sufficient permissions to alter aspects
of the operating system, and to install software and software updates when
needed.

The supervisors have different requirements than the other two user groups.
These users generate a range of important reports, including overtime data
and staff appraisals. These users must have a secure network location to
save their files. For this reason, they should be configured to use Roaming
User Profiles (RUPs) and possibly Folder Redirection. Because they are
constantly connected to the network, there is little need for them to have
permissions to configure their computers, beyond desktop settings. The
administrative support staff perform all software installation.

Just as job roles may share the same needs, a single computer configuration
might be appropriate for more than one job role. By analyzing other users in the
organization, you will find that there are common configuration needs between
different user groups. For example, users that work remotely need greater
freedom than office-based users to configure their workstations and install new
software or software updates.
By identifying common needs, you can define standard configuration settings
for the majority of users’ computers. To ensure that you cover all of the
applicable job roles, you can produce a matrix table that maps the job roles to
the computer configurations that you define.

×