SlideShare uma empresa Scribd logo
1 de 19
System Center Configuration
Manager 2012
The application model in real life


Kim Oppalfens
Senior consultant | Inovativ
Co-Founder System Center user group Belgium
Disclaimers

1. NOT an overview session
2. NOT a sales pitch
3. No, I do NOT have an answer to all scenarios (yet).
Agenda

•   Vision behind the app model
•   The app model overview in record time
•   User device affinity
•   Content library
•   Application Supersedence
•   Application Uninstalls
•   Challenges and potential workarounds
•   Troubleshooting & Monitoring
•   Questions?
Vision behind the app model


  Lifecycle
                  •   Install
                  •   Upgrade
                  •   Uninstall

 management       •
                  •
                      Retire
                      Versioning and history




 User centric     • Deliver applications to users not computers

 deployment
Vision behind the app model
                                                         Application Installation




        Application Uninstall                                                           Application Revision




                                Application Retirement              Application Supersedence
The app model overview
Requirement Rules in 2012
State-based Application Management


 Properties of users
 and/or devices that     Rules are per          Evaluated in real-
  makes delivering     deployment type          time on the client
software appropriate


             Evaluated before
                content is           Re-evaluated on a
            downloaded to the            schedule
                  client
Detection Methods
State-based Application Management
Detection is the key to any state based software
distribution system


     Detection methods enable systems to determine
     whether or not an application is already present on a
     system (Discovery)


           Detection methods are also used to determine the
           success or failure of a deployment



                 Important to get these right!
Application evaluation flow
Application Supersedence


                                                                  But, Allows admins to
 Definition: The ability for                                         testpilot newer
  the admin to create a        This ultimately results in the      application, prior to
 relationship and declare      newer application replacing      production release. While
one application newer than      the older application for a        permitting the older
     another previous                user on a device           application to continue to
        application.                                             exist for the majority of
                                                                            users
Supersedence and the end-user UX

                  User only sees latest application
                  version in Software Catalog (by
                              default)


                Required applications are always the
                enterprise’s latest version. When the
                 user or computer receives a policy
                  that targets it with BOTH policies


                Available Applications installed by
                user can be automatically updated
Supersedence examples (1) Simple
Scenario and Assumptions
 2 applications:
   Adobe Reader X supersedes
    Adobe Reader 9
 Both applications deployed to
  same device
If client has Adobe Reader 9 already
installed
 assuming requirements are met for
      Reader X, Reader 9 will be replaced
      with Reader X (either uninstalled or
      updated)

If client has Adobe Reader X already
installed
 evaluates both 9 and X detection
      methods, X is present, 9 is not – but
      since X supersedes, it doesn’t try to
      install 9

If neither are installed, only Adobe
Reader X will be installed
Supersedence examples (2) Conflict

 2 applications:
  Adobe Reader X supersedes Adobe Reader 9
 Accounting App (AA1) depends on Reader 9
Case 1: Client receives all policies
 No applications have been previously installed
 Assuming requirements for all Deployment Types are met, Reader X will be
  installed on device
 AA1 is not installed on client, and conflict requirements not met message
Case 2: AA1 policy received prior to supersedence relationship defined.
 AA1 and Reader 9 will be installed (assuming requirements are met),
 When Reader X is deployed, a conflict for Reader X will be provided to user and
  admin
Application Uninstalls

                                          • Uninstall is a deployment action
     Admin creates an Uninstall
           Deployment                     • The App Model defines an uninstall method for each Deployment
                                            Type of an Application.


An admin defines a specific collection
to target the Uninstall Deployment to
      (either users or machines)


If a user or device is the recipient of
     both an install and uninstall
policy, then install wins and the app
         will not be removed
Troubleshooting & monitoring




                               The deployment
 What logfiles?
                               monitoring tool
Sharing our experiences / challenges



Applications installed
                          User targeted installs                           Application Uninstalls
during a tasksequence                              Roaming user logging
                         and computer targeted                              do not validate the
  generate an install                               in to my workstation
                                uninstalls                                    requirements
        policy
Challenges and potential workarounds

   Required app to
                                                   Automatically
   user on primary       Required appv with
                                                 upgrade available
  device, available on    roaming profiles
                                                    applications
     non-primary

                            Uninstall an
                         application from a
                         machine that is still
                         targetted to users
The application model in real life

Mais conteúdo relacionado

Mais procurados

Arun Prasad-R.DOCX
Arun Prasad-R.DOCXArun Prasad-R.DOCX
Arun Prasad-R.DOCX
Arun R
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
ebuc
 
Psi cgl test_auto_casestudy_v01
Psi cgl test_auto_casestudy_v01Psi cgl test_auto_casestudy_v01
Psi cgl test_auto_casestudy_v01
Primesoftinc
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007
Amit Gatenyo
 
V mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugV mware+thin app+-+gcvmug
V mware+thin app+-+gcvmug
Alan Maloney
 

Mais procurados (18)

SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
Arun Prasad-R.DOCX
Arun Prasad-R.DOCXArun Prasad-R.DOCX
Arun Prasad-R.DOCX
 
App V
App VApp V
App V
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012
 
MedV/AppV Overview
MedV/AppV OverviewMedV/AppV Overview
MedV/AppV Overview
 
Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5
 
Introduction to jmeter & how to view jmeter Test Result in Real-Time
Introduction to jmeter & how to view jmeter Test Result in Real-TimeIntroduction to jmeter & how to view jmeter Test Result in Real-Time
Introduction to jmeter & how to view jmeter Test Result in Real-Time
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
kishore
kishorekishore
kishore
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
Psi cgl test_auto_casestudy_v01
Psi cgl test_auto_casestudy_v01Psi cgl test_auto_casestudy_v01
Psi cgl test_auto_casestudy_v01
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007
 
V mware+thin app+-+gcvmug
V mware+thin app+-+gcvmugV mware+thin app+-+gcvmug
V mware+thin app+-+gcvmug
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Deployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccmDeployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccm
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012
 

Destaque

The Origins of the Maurice Blond Agency
The Origins of the Maurice Blond AgencyThe Origins of the Maurice Blond Agency
The Origins of the Maurice Blond Agency
Laurel Blond
 
Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313
EMC
 
Tues treaty of versailles
Tues treaty of versaillesTues treaty of versailles
Tues treaty of versailles
Travis Klein
 

Destaque (20)

KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
 
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
The 2015 Guide to SDN and NFV: Part 1 – Software Defined Networking (SDN)
 
20140627加古川男女共同参画センター講演
20140627加古川男女共同参画センター講演20140627加古川男女共同参画センター講演
20140627加古川男女共同参画センター講演
 
Day 4
Day 4Day 4
Day 4
 
The Origins of the Maurice Blond Agency
The Origins of the Maurice Blond AgencyThe Origins of the Maurice Blond Agency
The Origins of the Maurice Blond Agency
 
การผลิตสื่อ
การผลิตสื่อการผลิตสื่อ
การผลิตสื่อ
 
Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313
 
սուրբ գեվորգ
սուրբ գեվորգսուրբ գեվորգ
սուրբ գեվորգ
 
Mon tues supply curves
Mon tues supply curvesMon tues supply curves
Mon tues supply curves
 
Mit2 092 f09_lec03
Mit2 092 f09_lec03Mit2 092 f09_lec03
Mit2 092 f09_lec03
 
Mon banking
Mon bankingMon banking
Mon banking
 
Aplicaciones modernas con React.js
Aplicaciones modernas con React.jsAplicaciones modernas con React.js
Aplicaciones modernas con React.js
 
Wrk
WrkWrk
Wrk
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
 
Mit2 092 f09_lec15
Mit2 092 f09_lec15Mit2 092 f09_lec15
Mit2 092 f09_lec15
 
Tues treaty of versailles
Tues treaty of versaillesTues treaty of versailles
Tues treaty of versailles
 
NDEF WriterとOSとPaSoRi
NDEF WriterとOSとPaSoRiNDEF WriterとOSとPaSoRi
NDEF WriterとOSとPaSoRi
 
06 trade and value
06 trade and value06 trade and value
06 trade and value
 
Citophobia apa
Citophobia apaCitophobia apa
Citophobia apa
 
Eva clas
Eva clasEva clas
Eva clas
 

Semelhante a The application model in real life

Regression Testing - A Complete Guide
Regression Testing - A Complete GuideRegression Testing - A Complete Guide
Regression Testing - A Complete Guide
Abhay Kumar
 
App Testing SEO Expert Bangladesh LTD
App Testing SEO Expert Bangladesh LTDApp Testing SEO Expert Bangladesh LTD
App Testing SEO Expert Bangladesh LTD
Tasnim Jahan
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtesting
Akss004
 

Semelhante a The application model in real life (20)

Application Lifecycle Management (ALM).pdf
Application Lifecycle Management (ALM).pdfApplication Lifecycle Management (ALM).pdf
Application Lifecycle Management (ALM).pdf
 
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous IntegrationExperitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
 
Software Engineering-Part 1
Software Engineering-Part 1Software Engineering-Part 1
Software Engineering-Part 1
 
The Essentials of Mobile App Testing and Monitoring
The Essentials of Mobile App Testing and MonitoringThe Essentials of Mobile App Testing and Monitoring
The Essentials of Mobile App Testing and Monitoring
 
Regression Testing - A Complete Guide
Regression Testing - A Complete GuideRegression Testing - A Complete Guide
Regression Testing - A Complete Guide
 
行動應用App管理 (MAM)
行動應用App管理 (MAM) 行動應用App管理 (MAM)
行動應用App管理 (MAM)
 
Build vs. Buy: Designing an Effective Software Update Delivery Solution
Build vs. Buy: Designing an Effective Software Update Delivery SolutionBuild vs. Buy: Designing an Effective Software Update Delivery Solution
Build vs. Buy: Designing an Effective Software Update Delivery Solution
 
Unified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_publicUnified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_public
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Continuos Delivery
Continuos DeliveryContinuos Delivery
Continuos Delivery
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
functional testing
functional testing functional testing
functional testing
 
Flexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera Software App Portal Datasheet
Flexera Software App Portal Datasheet
 
What are the top 10 performance testing tools
What are the top 10 performance testing toolsWhat are the top 10 performance testing tools
What are the top 10 performance testing tools
 
App Testing SEO Expert Bangladesh LTD
App Testing SEO Expert Bangladesh LTDApp Testing SEO Expert Bangladesh LTD
App Testing SEO Expert Bangladesh LTD
 
Vendor Analysis Template
Vendor Analysis TemplateVendor Analysis Template
Vendor Analysis Template
 
SE-Lecture-2.pptx
SE-Lecture-2.pptxSE-Lecture-2.pptx
SE-Lecture-2.pptx
 
Desktop applicationtesting
Desktop applicationtestingDesktop applicationtesting
Desktop applicationtesting
 
2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx2.-IT-266_APDET-Module-2-of-3.pptx
2.-IT-266_APDET-Module-2-of-3.pptx
 
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
Automated Front End Testing_ Navigating Types and Tools for Optimal Web Devel...
 

Mais de Microsoft TechNet - Belgium and Luxembourg

Mais de Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

The application model in real life

  • 2. The application model in real life Kim Oppalfens Senior consultant | Inovativ Co-Founder System Center user group Belgium
  • 3. Disclaimers 1. NOT an overview session 2. NOT a sales pitch 3. No, I do NOT have an answer to all scenarios (yet).
  • 4. Agenda • Vision behind the app model • The app model overview in record time • User device affinity • Content library • Application Supersedence • Application Uninstalls • Challenges and potential workarounds • Troubleshooting & Monitoring • Questions?
  • 5. Vision behind the app model Lifecycle • Install • Upgrade • Uninstall management • • Retire Versioning and history User centric • Deliver applications to users not computers deployment
  • 6. Vision behind the app model Application Installation Application Uninstall Application Revision Application Retirement Application Supersedence
  • 7. The app model overview
  • 8. Requirement Rules in 2012 State-based Application Management Properties of users and/or devices that Rules are per Evaluated in real- makes delivering deployment type time on the client software appropriate Evaluated before content is Re-evaluated on a downloaded to the schedule client
  • 9. Detection Methods State-based Application Management Detection is the key to any state based software distribution system Detection methods enable systems to determine whether or not an application is already present on a system (Discovery) Detection methods are also used to determine the success or failure of a deployment Important to get these right!
  • 11. Application Supersedence But, Allows admins to Definition: The ability for testpilot newer the admin to create a This ultimately results in the application, prior to relationship and declare newer application replacing production release. While one application newer than the older application for a permitting the older another previous user on a device application to continue to application. exist for the majority of users
  • 12. Supersedence and the end-user UX User only sees latest application version in Software Catalog (by default) Required applications are always the enterprise’s latest version. When the user or computer receives a policy that targets it with BOTH policies Available Applications installed by user can be automatically updated
  • 13. Supersedence examples (1) Simple Scenario and Assumptions  2 applications:  Adobe Reader X supersedes Adobe Reader 9  Both applications deployed to same device If client has Adobe Reader 9 already installed  assuming requirements are met for Reader X, Reader 9 will be replaced with Reader X (either uninstalled or updated) If client has Adobe Reader X already installed  evaluates both 9 and X detection methods, X is present, 9 is not – but since X supersedes, it doesn’t try to install 9 If neither are installed, only Adobe Reader X will be installed
  • 14. Supersedence examples (2) Conflict  2 applications:  Adobe Reader X supersedes Adobe Reader 9  Accounting App (AA1) depends on Reader 9 Case 1: Client receives all policies  No applications have been previously installed  Assuming requirements for all Deployment Types are met, Reader X will be installed on device  AA1 is not installed on client, and conflict requirements not met message Case 2: AA1 policy received prior to supersedence relationship defined.  AA1 and Reader 9 will be installed (assuming requirements are met),  When Reader X is deployed, a conflict for Reader X will be provided to user and admin
  • 15. Application Uninstalls • Uninstall is a deployment action Admin creates an Uninstall Deployment • The App Model defines an uninstall method for each Deployment Type of an Application. An admin defines a specific collection to target the Uninstall Deployment to (either users or machines) If a user or device is the recipient of both an install and uninstall policy, then install wins and the app will not be removed
  • 16. Troubleshooting & monitoring The deployment What logfiles? monitoring tool
  • 17. Sharing our experiences / challenges Applications installed User targeted installs Application Uninstalls during a tasksequence Roaming user logging and computer targeted do not validate the generate an install in to my workstation uninstalls requirements policy
  • 18. Challenges and potential workarounds Required app to Automatically user on primary Required appv with upgrade available device, available on roaming profiles applications non-primary Uninstall an application from a machine that is still targetted to users

Notas do Editor

  1. (http://technet.microsoft.com/en-us/library/hh427342.aspx#BKMK_LogLocation)AppIntentEval.logAppDiscovery.logAppEnforce.logCcmExec.logCcmsdkprovider.logConfigMgrSoftwareCatalog.logDataTransferService.logExecMgr.logPolicyAgent.logSoftwareCatalogUpdateEndpoint.logSoftwareCenterSystemTasks.logStateMessage.logVirtualApp.log
  2. Global conditions vs Collection rulesWhentouseanapp