RSS | MY PROFILE | PRIVACY 

WServerNews (formerly W2Knews) - Apple in the Enterprise

Vol. 17, #8 - February 20, 2012 - Issue #867

Apple in the Enterprise

  1. Editor's Corner
    • From the Mailbag
    • Apple in the Enterprise
    • Tip of the Week
    • Recommended for Learning
    • Quotes of the Week
  2. Admin Toolbox
    • Admin Tools We Think You Shouldn't Be Without
  3. Webinars & Seminars
    • Conferences, Expos and Other Events  
    • Upcoming Microsoft Webcasts
    • Upcoming VMware Webcasts
    • Upcoming O'Reilly Webcasts
    • Cisco Events
    • Oracle Events
  4. Tech Briefing
    • The IT certs that no longer pay extra -- and the new skills that do
    • Windows 8 will let you sign in to your PC using a Windows Live ID
    • How Microsoft Tracks Phishing Sites and Phishing Impressions
    • Virtualization Licensing; VMware vs. Microsoft (Apples vs. Oranges)
  5. Windows Server News
    • The cloud market in 2012: Through the eyes of experts
    • Shedding light on Hyper-V 3.0 resource monitoring
    • How virtual desktops enhance a virtualization disaster recovery strategy
    • Avoid the numbers game with Windows Server 8 
  6. WServerNews FAVE Links
    • This Week's Links We Like. Tips, Hints And Fun Stuff.
  7. WServerNews - Product of the Week
    • Accident or Malicious? Find out with Centrify DirectAudit for Windows 

 

Accident or Malicious?

With Centrify's detailed recordings of privileged user sessions, you've got a better way of knowing whether suspicious activity on Windows Servers is a result of unintentional actions?or malicious insider. Capturing detailed actions of privileged users is critical in today's business environment where IT outsourcing, off-shoring and contractorsare the norm. Compliance regulations require documenting what users do with the privileges granted to them and how their actions impact the IT environment. Log files are well suited to aggregating and correlating events for alerting purposes, but for a full accounting of what specific actions were taken there is no substitute for a high-fidelity recording of individual user sessions. 

View Demo Now

 

Editor's Corner

Save this newsletter so you can refer back to itand find helpful tips, tools and other resources that can help you when you face some planning decision, management task or troubleshooting headache!

From the Mailbag

From the volume of mail we received this week from readers suggesting keyboard shortcuts for Windows 7 and Office 2010, it seems that a lot of you are "power users" who like to use keyboard shortcuts to get things done quickly. Here is a short selection of recommendations we got from our readers:

John from the UK offered this tip for working with Word:

I use the Shift+F3 occasionally ? whenever I accidentally hit the caps lock button and continue to type without looking up. 

But my favourite tip is SHIFT + ALT + uparrow / downarrow. Select a line or two, or a paragraph or two , then use SHIFT+ALT+uparrow to move it around your document.  Even more fun ? select some rows in table, do the same, and it moves the rows around the table. It will also move the rows out and create a new table, or from one table to another.

Mark, also from the UK, added a bit more to the above suggestion:

If you couple it with up-arrow or down-arrow to move the cursor around, and/or shift-up /down arrow to select more than one line (or if you?re really clever, ctrl-shift-up / down arrow to do this for whole paragraphs) then you have some really good editing tools for moving text and/or table rows around in a document.

And another Mark from somewhere said:

Very useful for many Windows programs (Office, Browsers, etc).  Handy for small screens, laptops, and netbooks. Hold down the CTRL key and roll the mouse wheel up and down, to zoom in and out. (this is the same as holding the CTRL key and using "+", "-", and ZERO keys.

Thanks but just to clarify, the CTRL+ and CTRL- combinations work in IE but not in Office programs--see here for how to zoom in Word 2010:
http://www.wservernews.com/go/1329478267573

Apple in the Enterprise

For this issue I thought I'd talk about something I have absolutely no hands-on experience with whatsoever, namely, integrating Apple products like Macs, iPads and iPhones into enterprise environments built upon Windows Server technologies like Active Directory, Exchange, SharePoint, System Center and so on. So why am I talking about something I don't know much about? Because I'm hoping to get some responses from those of you, the readers of this newsletter, who DO have some hands-on experience in this area, so I can include them in my Mailbag column in the next newsletter.

But first, let's see what The Oatmeal says about WHAT IT'S LIKE TO OWN AN APPLE PRODUCT:
http://www.wservernews.com/go/1329478427643

Having done a bit of research on integrating Apple products into a Windows-centric infrastructure, here's what I've learned (or think I've learned) so far.  Please forgive any inaccuracies in my observations as I don't own, use or work with any Apple products.

Apple iOS devices and SCCM 2012

Here's a quote from TechNet Magazine:

"SCCM 2012 introduces multivendor platform support, with native support for all devices that leverage Exchange ActiveSync technology. This includes Windows Phone-, Apple iOS-, Symbian- and Android-based devices. You can manage multiple mobile device platforms, complete with asset tracking and policy enforcement. You can even manage mobile devices that connect to public cloud-hosted e-mail infrastructure, like Office 365."
http://www.wservernews.com/go/1329478536781

Here's a blog post by James Bannan that demonstrates how to import Apple iOS and Android into SCCM 2012:
http://www.wservernews.com/go/1329478584645

If anyone here has more knowledge concerning managing iOS devices using SCCM 2012, or if they know of any third-party products that can integrated into System Center and be used to manage iOS devices, email me at wsn@mtit.com.

Apple Macs and SCCM 2012

Here's a quote from a thread from 2010 in the Microsoft System Center Forums:

"The product managers were pretty clear that Mac OS X support is not being added to ConfigMgr v.Next"
http://www.wservernews.com/go/1329478621519

Know anything more about this? Email me at wsn@mtit.com.

Integrating Macs into Windows networks

Back in 2008 Don Jones wrote this article in TechNet Magazine about getting Macs to network with Windows computers to share files between them:
http://www.wservernews.com/go/1329478666613

Does anyone know if the information in this article is still accurate? Email me at wsn@mtit.com if you've tried integrating Macs into your Windows-based networks and let me know what works and what doesn't.

Joining a Mac to an Active Directory domain

So, can you join Macs to a domain? The Mac IT Guy says you absolutely can do this and it?s actually pretty easy:
http://www.wservernews.com/go/1329478709880

That's nice to know at least!

Some Third-Party Solutions

Absolute Software says their Absolute Manage product is: "the world?s only persistent computer lifecycle management solution that allows you to manage the PC and Mac devices in your deployment from a single interface." They also say Absolute Manage is "fully integrated with SCCM, providing an export module to send Mac inventory data directly to SCCM in the same native format and mechanism as a standard Windows PC. This means you can automatically integrate Mac and Windows PC data into a single set of SCCM reports for an overview of your entire deployment."
http://www.wservernews.com/go/1329746448146

McAfee says their Enterprise Mobility Management (EMM) product can provide a complete mobile security solution for Apple iOS, Windows Phone 7, Android and BlackBerry:
http://www.wservernews.com/go/1329478822936

Quest Software says that version 4.0.4 of their Quest Management Xtensions (QMX) product "supports Microsoft SCCM integration for mobile devices running iOS 4 or greater (iPhone/iPad). Features include Remote Wipe, Lock and Passcode Clearing, Hardware Inventory, iOS MDM policies enforcement, and profile distribution integrated with Configuration Manager software distribution." They also say that QMX 4.0.4 "supports integration with Microsoft SCOM 2012 RC and Hardware/Software Inventory reporting as well as Package/Program Software Distribution for Microsoft SCCM 2012 RC."
http://www.wservernews.com/go/1329478872795

Quest also has a LiveMeeting demo of their solution at:
http://www.wservernews.com/go/1329478883832

Don Jones, co-founder of Concentrated Technology, also wrote a whitepaper awhile back about using Quest software with SCCM 2007 to manage Macs in the enterprise. He says "Apple?s Mac computers are becoming more and more popular in organizations. This creates the need to manage Macs in much the same way you manage your Windows machines, including: discovering Macs on your network, supplying patches, inventorying hardware and software, remote controlling your Macs to the help desk, tracking application usage to identify needs for software license compliance, and so on. Why continue to spend time and money duplicating your management efforts? The solution? With Quest, you can leverage System Center Configuration Manager 2007 (or the prior version SMS 2003) to manage your Macs ? not just your Windows systems. This means your Mac/*nix administrators can focus on more critical tasks, allowing Configuration Manager to be the central management point for more routine change, configuration and system updates?for both your Windows systems as well as your Mac clients!"
http://www.wservernews.com/go/1329478925585

So it looks like the Quest-plus-SCCM solution for managing Macs has been around for awhile, which is something I wasn't aware of. Cool, I learned something today. 

Centrify says their Centrify Suite for Mac OS X product "enables a Macintosh OS X computer to participate seamlessly in a Windows Active Directory domain, with advanced Windows Group Policy support for desktop lockdown"
http://www.wservernews.com/go/1329478978419

And finally of course there's Apple, which has a page that lists a number of third-party Mobile Device Management (MDM) products that can provide businesses with the ability to manage scaled deployments of iPad and iPhone:
http://www.wservernews.com/go/1329479009081

Do any readers of this newsletter have any hands-on experience with any of these third-party solutions for managing Macs and/or iOS devices in Windows-based environments? If so, email me your stories at wsn@mtit.com and I'll share them with other readers so we can learn this together. 

After all, if ComputerWorld is correct then we'll all need to "adapt or die" when it comes to managing Apple devices in the enterprise:
http://www.wservernews.com/go/1329479045630

Tip of the Week

In Outlook 2007 when you type something into the Instant Search box and press ENTER, if your search results are too broad you can narrow your search by clicking the Expand The Query Builder control to the right of the search box and specify additional query text in the From, To, Subject or Body fields. But if you've migrated to Outlook 2010 you'll probably have noticed that the Expand The Query Builder control is no longer available to the right of the search box. How then can you narrow your search results when you're using Outlook 2010?

The answer is to look at the ribbon.  When you click in the Instant Search box, a new tab called Search Tools appears on the ribbon, and when you select this tab you'll see four tab groups on it as follows:

While learning new things can be a pain, it's actually a lot easier to quickly broaden or narrow your search in Outlook 2010 using the ribbon than it was using the Expand The Query Builder control in Outlook 2007 once you get used to it.

"Use the Ribbon, Luke."  --Star Wars, the Microsoft extended version 

Recommended for Learning

Since SCCM 2012 will have some capability for managing Apple iOS devices, you might want to become more familiar with SCCM 2012 and you can do this in a couple of ways.

First, you can download an evaluation version of SCCM 2012 from the TechNet Evaluation Download Center at:
http://www.wservernews.com/go/1329479334555

And second, you can take some free online training on SCCM 2012 at the Microsoft Virtual Academy at:
http://www.wservernews.com/go/1329479362537

Finally, here are three networking titles you might want to consider adding to your library:

Computer Networks, Fifth Edition: A Systems Approach from Morgan Kaufmann is an introductory level textbook on networking technologies and protocols designed for a university audience. The book assumes some background knowledge of UNIX shell programming and some higher maths skills, but you can learn a lot from reading it even if you don?t have such background. Some of the chapter-end exercises seem a bit dated (SONET, anyone?) but that?s pretty much to be expected with any university textbook and especially one that has gone through multiple editions like this one. Experienced network engineers will probably skip through the book and read only what they find relevant, for example if they needed to learn how some network protocol worked for troubleshooting purposes.  To sum up: there are lots of introductory networking books around, and I?d place this one somewhere around the middle of the pack as far as usefulness is concerned.
http://www.wservernews.com/go/1329479422119

IPv6 for Enterprise Networks from Cisco Press provides a good introduction to implementing IPv6 on your organization?s network. The book covers everything from rationale for IPv6 to network design to coexistence with and migration from IPv4. A lot of the book is relevant even if you don?t use Cisco hardware on your network, but the configuration examples all use Cisco IOS of course. And although there are lots of configuration examples, I wouldn?t quite call this book a recipe for deploying IPv6. It?s more like a heads-up on everything you need to know and be aware of as you begin planning your IPv6 deployment. I read about the first third of this book and learned quite a lot.
http://www.wservernews.com/go/1329479467702

Mobile IPv6: Protocols and Implementation from Morgan Kaufmann is a bit beyond me I?m afraid. I wanted to learn more about the Mobile IPv6 protocol (RFC 3775) and thought I was a geek, but after struggling through the first couple of chapters I quickly got lost. And I?m the guy that used to fire up Network Monitor just so I could while away a spare hour watching the different kinds of traffic moving across the LAN... Hey, I guess that shows my age. The book really lost me when it started using C code for describing how Mobile IPv6 headers are implemented and processed. At that point my fluency in Fortran failed to help me the way I hoped it would. Wow, I guess that really shows my age, LOL.
http://www.wservernews.com/go/1329479512172

Quotes of the Week

"The one human freedom that cannot be taken from you is the capacity to choose your attitude in any given set of circumstances--to choose one's own way." --Viktor Frankl

"Never limit yourself to what you think is reasonable or possible. You have to learn that your ambition and desires may seem more unreasonable to you than they do to other people." --Michael Korda

"When I wrote it was in bursts: an eighteen-thousand-word novelette all one night long, taking the last page out of the typewriter at noon and falling exhausted to sleep. It was not a bad novelette, but the way I wrote it was very bad. To produce so much so quickly and so exhaustingly makes it that much harder to sit down to produce again. The experience gives you the confidence that a great deal can be done in a short time, which encourages delay."  --Science fiction author Frederik Pohl in his autobiography The Way the Future Was
http://www.wservernews.com/go/1329480291886

Be sure to forward this newsletter to a friend or colleague who might find the tips and tools in it helpful for performing their job. And if you have feedback concerning anything in this newsletter, feel free to send it to my mailbag at wsn@mtit.com


Cheers, Mitch Tulloch 
Twitter: @mitchtulloch 
Facebook: mitchtulloch
Website: mtit.com

 

Admin Toolbox

Admin Tools We Think You Shouldn't Be Without

Accident or Malicious? Learn whether suspicious activity on Windows Servers is a result of unintentional actions?or malicious insider. View Demo:
http://www.wservernews.com/go/1329482767534

mPowerTools - an AD Admin essential! 200+ reports, bulk import/export, scheduling, GPO/File Share Reports. Eliminate scripting! Only $1499!
http://www.wservernews.com/go/1329482877977

Absolute Manage lets you to manage PCs, Macs, and iOS and Android devices from a single interface:
http://www.wservernews.com/go/1329746683849

Centrify Suite for Mac OS X lets a Mac OS X computer participate seamlessly in a Windows Active Directory domain:
http://www.wservernews.com/go/1329480463940

 

Webinars & Seminars

Conferences, Expos and Other Events

February 21-22, 2012 - Creating & Managing a Private Cloud with System Center 2012 Jump Start is a free public two-day virtual event where you can learn how to deploy, manage and maintain Microsoft?s private cloud solution using System Center 2012:
http://www.wservernews.com/go/1329480650724

March 26 - 29, 2012 - SQL Server 2012 Launch Conference and Expo at the MGM Grand in Las Vegas:
http://www.wservernews.com/go/1329480806625

April 16-20, 2012 - Microsoft Management Summit 2012 is where skilled IT professionals can meet to increase their technical expertise through hands-on training, breakout sessions and interacting with industry leaders in desktop and device management, datacenter, and cloud technologies:
http://www.wservernews.com/go/1329480856073

Upcoming Microsoft Events and Webcasts

Sign up for these and other Microsoft events and webcasts at:
http://www.wservernews.com/go/1329481066345

Upcoming VMware Webcasts

Sign up these and other VMware webcasts at: 
http://www.wservernews.com/go/1329481155129

Upcoming O'Reilly Webcasts

Sign up for these and other O'Reilly webcasts at:
http://www.wservernews.com/go/1329481228577

Upcoming Cisco Events

Browse the Cisco Corporate Events Calendar to find Cisco at events, trade shows and conferences around the world:
http://www.wservernews.com/go/1329481973555

Upcoming Oracle Events

Browse the Oracle Events page to find in-person events and live webcasts for your location:
http://www.wservernews.com/go/1329482013597

 

Tech Briefing

The IT certs that no longer pay extra -- and the new skills that do

ComputerWorld tells us that while overall employment in IT is improving, IT certifications are starting to lose their special value:
http://www.wservernews.com/go/1329482068086

Windows 8 will let you sign in to your PC using a Windows Live ID

A post on the Building Windows 8 blog describes the benefits of this new feature:
http://www.wservernews.com/go/1329482103711

How Microsoft Tracks Phishing Sites and Phishing Impressions

From the Microsoft Security Blog comes this post describing who phishers target, where they come from, and how to defend yourself against them:
http://www.wservernews.com/go/1329482140213

Virtualization Licensing; VMware vs. Microsoft (Apples vs. Oranges)

The Irish IT Professional explains why he favors Microsoft's virtualization licensing over VMware's:
http://www.wservernews.com/go/1329482176053

 

Windows Server News

The cloud market in 2012: Through the eyes of experts

Do your enterprise cloud plans align with industry strategies? What cloud developments can we expect in 2012? In this featured article, industry experts predict on this year's cloud landscape, taking a look at the possible ups and downs that lie ahead for the cloud computing industry.
http://www.wservernews.com/go/1329482224215

Shedding light on Hyper-V 3.0 resource monitoring

Microsoft is adding new resource-monitoring capabilities directly into Hyper-V 3.0, but the extent of these improvements still remains a mystery. This expert tips gives you a peek at some of the things you can expect from these new functionalities.
http://www.wservernews.com/go/1329482268410

How virtual desktops enhance a virtualization disaster recovery strategy

With the dizzying array of disaster recovery tools for virtualization, one can quickly lose sight of disaster recovery's ultimate goal: keeping users connected. For a solid disaster recovery strategy, using virtual desktops may be just the ticket to maintain connectivity. 
http://www.wservernews.com/go/1329482312470

Avoid the numbers game with Windows Server 8

The promise of improved IP address management could be one incentive for organizations to switch to Windows Server 8. Gain insight into the ways Windows 8 can ease IP management and help you avoid the numbers game in this expert tip.
http://www.wservernews.com/go/1329482349929

 

WServerNews FAVE Links

This Week's Links We Like. Tips, Hints And Fun Stuff

Inside the Museum of Nonsense:
http://www.wservernews.com/go/1329482387124

Computer geeks like it dark, like in a cave.  What's the best type of lighting for such an environment?
http://www.wservernews.com/go/1329482402834

Microsoft .NET Gadgeteer is an open-source toolkit for building small electronic devices using the .NET Micro Framework and Visual Studio/Visual C# Express:
http://www.wservernews.com/go/1329482414942

Hacker's demo shows how easily credit cards can be read through clothes and wallets:
http://www.wservernews.com/go/1329482430577

 

WServerNews - Product of the Week

Accident or Malicious?

With Centrify's detailed recordings of privileged user sessions, you've got a better way of knowing whether suspicious activity on Windows Servers is a result of unintentional actions?or malicious insider. Capturing detailed actions of privileged users is critical in today's business environment where IT outsourcing, off-shoring and contractorsare the norm. Compliance regulations require documenting what users do with the privileges granted to them and how their actions impact the IT environment. Log files are well suited to aggregating and correlating events for alerting purposes, but for a full accounting of what specific actions were taken there is no substitute for a high-fidelity recording of individual user sessions. 

View Demo Now

 

 

WServerNews - Editors

Mitch Tulloch is Senior Editor of WServerNews and is a widely recognized expert on Windows administration, deployment and virtualization.  Mitch was lead author of the bestselling Windows 7 Resource Kit from Microsoft Press and has published hundreds of articles for IT pros.  Mitch is also a seven-time recipient of Microsoft's Most Valuable Professional (MVP) award for his outstanding contributions in support of the global IT pro community. Mitch owns and runs an information technology content development business based in Winnipeg, Canada. For more information see www.mtit.com

Ingrid Tulloch is Associate Editor of WServerNews and was co-author of the Microsoft Encyclopedia of Networking from Microsoft Press.  Ingrid is also Head of Research for our content development business and has co-developed university-level courses in Information Security Management for a Masters of Business Administration program.