SlideShare uma empresa Scribd logo
1 de 97
Denis Gundarev
Senior Consultant
Entisys Solutions
SYN507: Reducing desktop
infrastructure management
overhead using “old school” tactics
SYN507: Reducing desktop
infrastructure management
overhead using “old school”
tactics
Denis Gundarev
Senior Consultant
Entisys Solutions
About me
C:>whoami /all
USER INFORMATION
----------------
User Name Twitter E-Mail
============== ============ ==================
ENTISYSdenisg @fdwl DenisG@entisys.com
GROUP INFORMATION
-----------------
Group Name Type SID
====================================== ================ =================
BUILTINGeeks Mandatory group S-1-5-32-540
Mandatory LabelCrazy Russian Label S-1-16-8192
COMMUNITYBay Area Citrix User Group Well-known group S-1-5-32-544
COMMUNITYRussia Citrix User Group Well-known group S-1-5-32-545
Agenda
Overview
Log file analysis
Windows migration
Windows Installer
User Account Control
Application Compatibility
Performance and Assessment Toolkits
Q&A
Old School != Outdated
“Free” Tools Disclaimer
TANSTAAFL*
*"There ain't no such thing as a free lunch"
“Free” Tools Disclaimer
TANSTAAFL*
*"There ain't no such thing as a free lunch"
Log File Analysis
Log Analysis
• Tons of data
– i.e. PVS logs can produce 10 Mb/minute
• Different sources and formats
– CDF Tracing
– Windows Event Logs
– Procmon
– Wireshark
– Text log Files
Log Parser Input Formats
• IIS log files (W3C, IIS, NCSA, Centralized Binary Logs, HTTP
Error logs, URLScan logs, ODBC logs)
• Windows Event Log
• Generic XML, CSV, TSV and W3C - formatted text files
• Windows Registry
• Active Directory Objects
• File and Directory information
• NetMon .cap capture files
• Extended/Combined NCSA log files
• ETW traces
SQL-Like Engine
SELECT
EXTRACT_FILENAME (Filename) as FileName,
date as date,
level as level,
message as message
INTO '[OUTPUTFILE]Errors.csv'
FROM '[LOGFILEPATH]'
order by date DESC
SQL-Like Engine
SELECT
timegenerated,
EXTRACT_TOKEN(Strings,1,'|') AS Domain,
RESOLVE_SID(EXTRACT_TOKEN(Strings,0,'|')) AS User,
EXTRACT_TOKEN(Strings,3,'|') AS SessionName,
RESOLVE_SID(EXTRACT_TOKEN(Strings,4,'|')) AS
ClientName,
EXTRACT_TOKEN(Strings,5,'|') AS ClientAddress,
EventID
FROM Security
WHERE EventID=4624 /* xp/2003 = 682 */
ORDER BY timegenerated
SQL-Like Engine
SELECT strFileName,dEventtime,strEventtype,strHostname,intThreadid,strThreadname,strThreadmessage,strSessiontype,strSessionid, strModule,strEventdata
USING
EXTRACT_FILENAME (logfilename) AS strFilename,
EXTRACT_SUFFIX(Text,0,']') AS strEventdata,
EXTRACT_SUFFIX(EXTRACT_PREFIX(Text,0,']'),0,'[') AS unparsedMeta,
EXTRACT_TOKEN(unparsedMeta,0,'|') AS unparsedDate,
TO_TIMESTAMP(unparsedDate,'yyyyMMdd?hh:mm:ss.ll?') AS dEventtime,
EXTRACT_TOKEN(unparsedMeta,1,'|') AS strEventtype,
EXTRACT_TOKEN(unparsedMeta,2,'|') AS strHostname,
EXTRACT_TOKEN(EXTRACT_TOKEN(unparsedMeta,3,'|'),0,' ') AS intThreadid,
EXTRACT_TOKEN(EXTRACT_TOKEN(unparsedMeta,3,'|'),1,' ') AS unparsedthreadname,
CASE unparsedthreadname
WHEN NULL then 'N/A'
ELSE unparsedthreadname
END AS strThreadname,
EXTRACT_TOKEN(unparsedMeta,4,'|') AS unParsedThreadmessageAndSessionID,
REPLACE_IF_NOT_NULL(LAST_INDEX_OF(unParsedThreadmessageAndSessionID,'D:'),1) AS sessD,
REPLACE_IF_NOT_NULL(LAST_INDEX_OF(unParsedThreadmessageAndSessionID,'R:'),2) AS sessR,
COALESCE(sessD,sessR,0) AS intSessionType,
case intSessionType
When 0 THEN 'N/A'
When 1 THEN 'Dynamic'
When 2 THEN 'Real'
END AS strSessiontype,
case intSessionType
When 0 THEN unParsedThreadmessageAndSessionID
When 1 THEN EXTRACT_TOKEN(unParsedThreadmessageAndSessionID,0,' D:')
When 2 THEN EXTRACT_TOKEN(unParsedThreadmessageAndSessionID,0,' R:')
END AS strThreadmessage,
case intSessionType
When 0 THEN 'N/A'
When 1 THEN EXTRACT_TOKEN(unParsedThreadmessageAndSessionID,1,' D:')
When 2 THEN EXTRACT_TOKEN(unParsedThreadmessageAndSessionID,1,' R:')
END AS strSessionid,
EXTRACT_TOKEN(unparsedMeta,5,'|') AS strModule
INTO '[OUTPUTFILE]XenServer.csv'
FROM '[LOGFILEPATH]'
WHERE dEventtime is NOT NULL
ORDER BY dEventtime
Log Parser Output Formats
– Write data to text files in different formats
(CSV, TSV, XML, W3C, user-defined, etc.)
– Send data to a SQL database
– Send data to a SYSLOG server
– Create charts and save them in either GIF or JPG
image files
– Display data to the console or to the screen
How To Use Log Parser
• From command line
– check the help file
• From PowerShell
– http://bit.ly/LogParserPowerShell
• As scheduled task
• In your scripts
– Set oLogQuery = CreateObject("MSUtil.LogQuery")
• From Log Parser Studio
– http://bit.ly/LogParserStudio
EventCombMT
EventCombMT
Account Lockout Management
Log Analysys
• Log Parser 2.2 -
http://bit.ly/LogParser
• Log Parser Studio -
http://bit.ly/LogParserStudio
• EventCombMT and Account
Lockout tools -
http://bit.ly/ALTools
Windows Migration
Once upon a time…
12 years later…..
31
32
Installation
34
Wilogutl.exe
• Assists the analysis of log files from a Windows Installer
installation, and it displays suggested solutions to errors that are
found in a log file
• Available in the Windows SDK
• Msiexec /i BadApp.msi /l*v c:tempBadApp.log
35
Wilogutl.exe
36
Wilogutl.exe
37
Wilogutl.exe
38
Orca
39
Orca
40
Windows Installer Transforms
• Generic way to customise
an installation
• A Transform describes the delta between the original MSI
package and the customised version
– Saved to an .MST file
– Is applied on the fly
41
Orca
• MSI Database Editor
• When to use?
– Removing launch conditions
– Un-advertising shortcuts
– Changing install levels for features
– Creating transforms
– http://bit.ly/OrcaMSI
42
WiX Toolset
• Builds Windows Installer (MSI) packages from XML
• Integrates with Visual Studio
• Can decompile MSI
• Can be used to repackage your apps
• Create packages for Merchandising Server
– http://bit.ly/MerchMeta
• GUI is available
– http://bit.ly/WiXEditors
43
WiX’s Simple Syntax 
<?xml version="1.0" encoding="utf-8"?>
<Wix xmlns="http://schemas.microsoft.com/wix/2006/wi">
<Product Id="{2445FCA1-F833-4C97-87A2-618A4AE1EAB7}" Language="1033" Manufacturer="IT Bubble" Name="IT Bubble
Certificates" UpgradeCode="{2A124791-AAD0-4BE9-A719-3DEED3A49041}" Version="1.0.0.0">
<Package Comments="This installer database contains the logic and data required to install IT Bubble
Certificates." Compressed="yes" Description="IT Bubble Root Certs" InstallerVersion="200" Languages="1033"
Manufacturer="IT Bubble" Platform="x86" />
<Binary Id="ITB.cer" SourceFile="binBinaryITB.cer" />
<Directory Id="TARGETDIR" Name="SourceDir">
<Directory Id="ProgramFilesFolder" Name="PFiles">
<Directory Id="IT BubbleCert" Name="IT BubbleCert">
<Component Id="IT BubbleCert" Guid="{22AA9F50-0CA6-491F-AC1B-B0FD00BEF0A1}" KeyPath="yes">
<Certificate Id="Certificate.RootCA" Name="ITB.cer" StoreName="root"
StoreLocation="localMachine" Overwrite="yes" BinaryKey="ITB.cer" xmlns="http://schemas.microsoft.com/wix/IIsExtension"
/>
</Component>
</Directory>
</Directory>
</Directory>
<Feature Id="IT BubbleCert" Level="1" Title="IT BubbleCert">
<ComponentRef Id="IT BubbleCert" />
</Feature>
<Property Id="ALLUSERS" Value="1" />
</Product>
</Wix>
44
XML Notepad 2007
• Free XML Editor with Syntax
check
• http://bit.ly/XMLNotepad
45
XMLNotepad & Profile Management
46 |
User Account Control
Every time you disable UAC…
Steve Ballmer kills a kitten
Please, think of the kittens
Every time you:
•Modifying ACLs on Program Files or
HKLM
•Making user a local admin
•Just give users
SeBackup, SeRestore, SeCreateGlobal
and SeLoadDriver privileges, but keep
them as standard users
Why Applications Are Asking For Elevation?
• Some apps are old and doesn’t have embedded manifest
• Some apps trying to write to Program Files or HKLM
• App is not signed
• Some developers are just lazy
Manifests
• XML file that contains parameters required for .exe or .dll to run
• May contain list of required components or supported OS
• May configure the need for elevation per file:
• asInvoker
• highestAvailable
• requireAdministrator
• Can be External or Internal
• Use mt.exe from the SDK to inject a manifest
• Use SigCheck.exe from SysInternals to view the manifest
UAC Manifests
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity type="win32" processorArchitecture="*" version="1.0.0.0"
name="MyApplication.exe"/>
<description>MyApplication</description>
<ms_asmv2:trustInfo xmlns:ms_asmv2="urn:schemas-microsoft-com:asm.v2">
<ms_asmv2:security>
<ms_asmv2:requestedPrivileges>
<ms_asmv2:requestedExecutionLevel
level="asInvoker||highestAvailable||requireAdministrator"/>
</ms_asmv2:requestedPrivileges>
</ms_asmv2:security>
</ms_asmv2:trustInfo>
</assembly>
UAC Virtualization
• Applications without manifest will be virtualized by default
File Virtualization Implementation
• File system virtualization is implemented in a file system filter driver, luafv.sys
Luafv.sys
Ntfs.sys
Virtualized
Application
User Mode
Kernel Mode
WindowsApp.ini
Users<user>AppDataLocal
VirtualStoreWindowsApp.ini
Non-Virtualized
Application
WindowsApp.ini
Access Denied
Virtualized Files
• Redirected file system locations:
• %ProgramFiles%
• %AllUsersProfile% (ProgramData – what was Documents and SettingsAll Users)
• %SystemRoot% (Windows)
• %SystemRoot%System32 (WindowsSystem32)
• Exceptions:
• Files that have executable extensions (.exe, .bat, .vbs, .scr, etc)
• Prevents masking of system executables for servicing and security
• Exceptions can be added or removed in HKLMSystemCurrentControlSetServicesLuafvParameters
ExcludedExtensionsAdd or ExcludedExtensionsRemove
• Per-user virtual root:
• %UserProfile%AppDataLocalVirtualStore
• Troubleshooting file virtualization
• Event Log: UAC-FileVirtualization
• Note: Virtual files do not roam with Roaming Profiles
Registry Virtualization
• Virtualizes most locations under HKLMSoftware
• Keys that are not virtualized:
• HKLMSoftwareMicrosoftWindows
• HKLMSoftwareMicrosoftWindows NT
• HKLMSoftwareClasses
• Per user location: HKCUSoftwareClassesVirtualStore
• Flag on a registry key defines if it can be virtualized
• “Reg flags HKLMSoftware” shows flags for HKLMSoftware
Useful tools
• Microsoft Windows Software Development Kit (SDK)
• mt.exe – embed manifests
• signtool.exe – Sign Executables
Assessment and Deployment Kit
59
Assessment and Deployment Kit
60
Assessment and Deployment Kit
• Combines Windows Automated Installation Kit
(AIK) and OEM Preinstallation Kit (OPK)
• Integrates tools that used to be separate
downloads
• Adds new assessment tools
• Contains lots of stuff…
• http://bit.ly/ADKToolkit
61
ADK Tools
• Application Compatibility Toolkit
– Application Compatibility Manager
– Compatibility Administrator
– Standard User Analyzer
• Deployment Tools
– BCDBoot, BCDEdit, Bootsect
– DISM (and ImageX)
– OSCDImg
– WDSMCAST
– Windows System Image Manager
• User State Migration Tool
– Scanstate
– Loadstate
– UsmtUtils
• Volume Activation Management
Tool
• Windows PE
– CopyPE
– SetSANPolicy
– MakeWinPEMedia
• Windows Performance Toolkit
– Wpa
– Wpr
– XBootMgr
• Windows Assessment Services
• Windows Assessment Toolkit
62
What is in ACT?
• Application Compatibility Manager
– Helps to create and analyse applications
• Standard User Analyser
– Easy to use GUI to create shims
• Windows Application Verifier
– Checks application for potential compatibility issues
• Windows Compatibility Administrator
– helps you select and apply compatibility fixes
63
Application Compatibility Manager
64
Application Verifier
65
Introduction to Shims
66
What Are Shims?
• Applied to specific apps
– Configured with Compatibility Administrator in the App Compat Toolkit
– Deployable to enterprise
• Changes what the app thinks it sees
• Does not change what app is allowed to do
67
What Are Shims Good For?
• Great for many kinds of bugs:
– Bad Windows version checks
– Writing to HKCR at runtime
– Unnecessary checks for “am I admin?”
– Writing to WRP-protected keys and files
– Windows thinks your app is an installer
– File/Registry redirections
68
Version Lie Shims
• Win95VersionLie
• WinNT4SP5VersionLie
• Win98VersionLie
• Win2000VersionLie
• Win2000SP1VersionLie
• Win2000SP2VersionLie
• Win2000SP3VersionLie
• WinXPVersionLie
• WinXPSP1VersionLie
• WinXPSP2VersionLie
• Win2K3RTMVersionLie
• Win2K3SP1VersionLie
• VistaRTMVersionLie
• VistaSP1VersionLie
• VistaSP2VersionLie
• Win7RTMVersionLie
69
Most Used Shims
• VirtualRegistry
– Fixes the problem with
reading/writing registry value
– AddRedirect ( HKLMKey ^
HKCUKey ^ HKLMKey2 ^
HKCUKey2)
• CorrectFilePaths
– Fixes the problem with
reading/writing a file
– c:Program.ini=
%AppData%Program.ini
• WRPRegDeleteKey
– Lie when app tries to delete
protected OS registry key
• ForceAdminAccess
– Spoofs queries of administrator
group membership
• VirtualizeDeleteFile
– Spoofs deletion of global file
• LocalMappedObject
– Forces global section objects into
user’s namespace
• VirtualizeHKCRLite, VirtualizeRe
gisterTypeLib
– Redirects global registration of COM
objects
70
Compatibility Administrator
71
Warning Messages
Citrix Confidential - Do Not
72
Compatibility Administrator
• Used to create advanced shims
• Can be used to create a warning messages
• Windows 8 contain 7239 apps in a AppCompat database
• Shims can be installed using %windir%system32sdbinst.exe
utility
• About 400 shims available
73
Citrix Confidential - Do Not
74
Standard User Analyzer
Citrix Confidential - Do Not
75
Standard User Analyzer
Citrix Confidential - Do Not
76
LUABudLight
Citrix Confidential - Do Not
77
Why Applications Are Asking For Elevation?
• Some apps really need it
Performance and Assessment
Toolkits
Assessment and Deployment Kit
Xperf
• Was a part of Windows 7 SDK
• Grab process lifetimes
• Captures and analyzes information to help troubleshoot Windows
performance issues
– Slow boot
– GPO processing delays
– Application performance issues
– Slow services
– Ugly minifilter drivers
Xperf
Xperf
Xperf
Xperf
C:>xperf -on base+latency+dispatcher+NetworkTrace+Registry+FileIO -
stackWalk CSwitch+ReadyThread+ThreadCreate+Profile -BufferSize 128 -start
UserTrace -on "Microsoft-Windows-Shell-Core+Microsoft-Windows-
Wininit+Microsoft-Windows-Folder Redirection+Microsoft-Windows-User
Profiles Service+Microsoft-Windows-GroupPolicy+Microsoft-Windows-
Winlogon+Microsoft-Windows-Security-Kerberos+Microsoft-Windows-User
Profiles General+e5ba83f6-07d0-46b1-8bc7-7e669a1d31dc+63b530f8-29c9-4880-
a5b4-b8179096e7b8+2f07e2ee-15db-40f1-90ef-9d7ba282188a" -BufferSize 1024
-MinBuffers 64 -MaxBuffers 128 -MaxFile 1024
Windows 8 ADK
• Windows Performance
Analyzer replaces xperview
• Windows Performance
Recorder replaces
xbootmgr
– Also replaces xperf trace
capture functionality
• xperf command line actions
remain in WPT
Windows ADK
Windows Assessment Console and Engine
Windows Assessment Console and Engine
System assessment basics
• System assessment is a process that uses the ADK tools to
measure
and analyze a PC
• Assessments are core functionality tests
• Combinations of these tests provide additional measures of the
entire PC experience
• Quality expectations are changing
• Software + hardware + Windows = PC experience
• The way we measure PC quality must also change
System assessments
• CheckLogo and driver assessments
• File handling
• Photo handling
• Internet Explorer launch/tab create
• Hybrid boot
• On/off assessments (boot/shutdown/S3/S4)
• Browser assessment
• Media transcode performance
• Metro performance
• Memory footprint
• First boot experience
• Media streaming
• WinSAT comprehensive
• Battery life (and idle efficiency analysis)
• MiniFilter driver performance impact
(option for other assessments)
• Internet browsing workload for battery
life assessment
• Windows Media Player performance
and quality
What Metrics are captured by the Assessment
• Both Boot and Shutdown durations are captured using Event Tracing
for Windows (ETW)..
• Process level details such as CPU and Disk utilization are also
provided.
• Assisted Performance Diagnostics identifies potentially problematic
performance issues.
• Run the assessments on computers without
downloading the ADK on all systems.
• Use Log Parser to combine or transform log files
• Use Manifests to control UAC behavior and enable UAC
Virtualization
• Use Application Compatibility Administrator to “patch” your
applications
• Use Assessment Engine to compare performance of your
desktops and servers
• Use Performance Recorder and Analyzer to optimize boot
Key Takeaways
Confidential – Internal Use Only
Confidential – Internal Use Only
Q&A
• @fdwl
• denisg@entisys.com
• http://BayCUG.com
• http://blog.itbubble.ru

Mais conteúdo relacionado

Mais procurados

Beyond xp_cmdshell: Owning the Empire through SQL Server
Beyond xp_cmdshell: Owning the Empire through SQL ServerBeyond xp_cmdshell: Owning the Empire through SQL Server
Beyond xp_cmdshell: Owning the Empire through SQL ServerScott Sutherland
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevDenis Gundarev
 
I Have the Power(View)
I Have the Power(View)I Have the Power(View)
I Have the Power(View)Will Schroeder
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...Benjamin Delpy
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаPositive Hack Days
 
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012Scott Sutherland
 
Hardening cassandra q2_2016
Hardening cassandra q2_2016Hardening cassandra q2_2016
Hardening cassandra q2_2016zznate
 
Troubleshooting Apache Cloudstack
Troubleshooting Apache CloudstackTroubleshooting Apache Cloudstack
Troubleshooting Apache CloudstackRadhika Puthiyetath
 
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...enigma0x3
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itBenjamin Delpy
 
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard BlueHat Security Conference
 
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
DerbyCon2016 - Hacking SQL Server on Scale with PowerShellDerbyCon2016 - Hacking SQL Server on Scale with PowerShell
DerbyCon2016 - Hacking SQL Server on Scale with PowerShellScott Sutherland
 
Attacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit FrameworkAttacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit FrameworkChris Gates
 
Software Development with Apache Cassandra
Software Development with Apache CassandraSoftware Development with Apache Cassandra
Software Development with Apache Cassandrazznate
 
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...
BlueHat v17 ||  Mitigations for the Masses: From EMET to Windows Defender Exp...BlueHat v17 ||  Mitigations for the Masses: From EMET to Windows Defender Exp...
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...BlueHat Security Conference
 
Red team upgrades using sccm for malware deployment
Red team upgrades   using sccm for malware deploymentRed team upgrades   using sccm for malware deployment
Red team upgrades using sccm for malware deploymentenigma0x3
 
Passwords#14 - mimikatz
Passwords#14 - mimikatzPasswords#14 - mimikatz
Passwords#14 - mimikatzBenjamin Delpy
 
Signature verification of kernel module and kexec
Signature verification of kernel module and kexecSignature verification of kernel module and kexec
Signature verification of kernel module and kexecjoeylikernel
 

Mais procurados (20)

Beyond xp_cmdshell: Owning the Empire through SQL Server
Beyond xp_cmdshell: Owning the Empire through SQL ServerBeyond xp_cmdshell: Owning the Empire through SQL Server
Beyond xp_cmdshell: Owning the Empire through SQL Server
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
 
Bridging the Gap
Bridging the GapBridging the Gap
Bridging the Gap
 
I Have the Power(View)
I Have the Power(View)I Have the Power(View)
I Have the Power(View)
 
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не окончена
 
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
 
Hardening cassandra q2_2016
Hardening cassandra q2_2016Hardening cassandra q2_2016
Hardening cassandra q2_2016
 
Troubleshooting Apache Cloudstack
Troubleshooting Apache CloudstackTroubleshooting Apache Cloudstack
Troubleshooting Apache Cloudstack
 
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get it
 
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v17 || Securing Windows Defender Application Guard
 
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
DerbyCon2016 - Hacking SQL Server on Scale with PowerShellDerbyCon2016 - Hacking SQL Server on Scale with PowerShell
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
 
Attacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit FrameworkAttacking Oracle with the Metasploit Framework
Attacking Oracle with the Metasploit Framework
 
Software Development with Apache Cassandra
Software Development with Apache CassandraSoftware Development with Apache Cassandra
Software Development with Apache Cassandra
 
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...
BlueHat v17 ||  Mitigations for the Masses: From EMET to Windows Defender Exp...BlueHat v17 ||  Mitigations for the Masses: From EMET to Windows Defender Exp...
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...
 
Red team upgrades using sccm for malware deployment
Red team upgrades   using sccm for malware deploymentRed team upgrades   using sccm for malware deployment
Red team upgrades using sccm for malware deployment
 
Passwords#14 - mimikatz
Passwords#14 - mimikatzPasswords#14 - mimikatz
Passwords#14 - mimikatz
 
Signature verification of kernel module and kexec
Signature verification of kernel module and kexecSignature verification of kernel module and kexec
Signature verification of kernel module and kexec
 

Destaque

Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDenis Gundarev
 
Citrix PVS Advanced memory and storage considerations for provisioning services
Citrix PVS Advanced memory and storage considerations for provisioning servicesCitrix PVS Advanced memory and storage considerations for provisioning services
Citrix PVS Advanced memory and storage considerations for provisioning servicesNuno Alves
 
Презентация UserGate Proxy & Firewall VPN GOST
Презентация UserGate Proxy & Firewall VPN GOSTПрезентация UserGate Proxy & Firewall VPN GOST
Презентация UserGate Proxy & Firewall VPN GOSTКомпания ИНТРО
 
PVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DivePVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DiveDavid McGeough
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...David McGeough
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDenis Gundarev
 
Briforum 2011 Chicago
Briforum 2011 ChicagoBriforum 2011 Chicago
Briforum 2011 ChicagoDan Brinkmann
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDenis Gundarev
 
RSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityRSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityMike Schwartz
 
Cloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher EducationCloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher EducationMike Schwartz
 
ID Next 2013 Keynote Slides by Mike Schwartz
ID Next 2013 Keynote Slides by Mike SchwartzID Next 2013 Keynote Slides by Mike Schwartz
ID Next 2013 Keynote Slides by Mike SchwartzMike Schwartz
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDenis Gundarev
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5Denis Gundarev
 
Mule security - saml
Mule  security - samlMule  security - saml
Mule security - samlcharan teja R
 
Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Mike Schwartz
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VDenis Gundarev
 
Clickjacking DevCon2011
Clickjacking DevCon2011Clickjacking DevCon2011
Clickjacking DevCon2011Krishna T
 

Destaque (20)

Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix Troubleshooting
 
Citrix PVS Advanced memory and storage considerations for provisioning services
Citrix PVS Advanced memory and storage considerations for provisioning servicesCitrix PVS Advanced memory and storage considerations for provisioning services
Citrix PVS Advanced memory and storage considerations for provisioning services
 
Презентация UserGate Proxy & Firewall VPN GOST
Презентация UserGate Proxy & Firewall VPN GOSTПрезентация UserGate Proxy & Firewall VPN GOST
Презентация UserGate Proxy & Firewall VPN GOST
 
PVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep DivePVS and MCS Webinar - Technical Deep Dive
PVS and MCS Webinar - Technical Deep Dive
 
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
Citrix TechEdge 2014 - How to Troubleshoot Deployments of StoreFront and NetS...
 
The Tools I Use
The Tools I UseThe Tools I Use
The Tools I Use
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
 
Briforum 2011 Chicago
Briforum 2011 ChicagoBriforum 2011 Chicago
Briforum 2011 Chicago
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
RSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityRSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud Identity
 
Cloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher EducationCloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher Education
 
ID Next 2013 Keynote Slides by Mike Schwartz
ID Next 2013 Keynote Slides by Mike SchwartzID Next 2013 Keynote Slides by Mike Schwartz
ID Next 2013 Keynote Slides by Mike Schwartz
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
 
Mule security - saml
Mule  security - samlMule  security - saml
Mule security - saml
 
Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
 
Clickjacking DevCon2011
Clickjacking DevCon2011Clickjacking DevCon2011
Clickjacking DevCon2011
 
How to Fail at VDI
How to Fail at VDIHow to Fail at VDI
How to Fail at VDI
 
Kantara OTTO slides
Kantara OTTO slidesKantara OTTO slides
Kantara OTTO slides
 

Semelhante a SYN507: Reducing desktop infrastructure management overhead using “old school” tactics

Under the Wire PowerShell workshop - BSides Augusta 2018
Under the Wire PowerShell workshop - BSides Augusta 2018Under the Wire PowerShell workshop - BSides Augusta 2018
Under the Wire PowerShell workshop - BSides Augusta 2018Fernando Tomlinson, CISSP, MBA
 
A miało być tak... bez wycieków
A miało być tak... bez wyciekówA miało być tak... bez wycieków
A miało być tak... bez wyciekówKonrad Kokosa
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidMatthew Johnson
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsVlad Fedosov
 
Php My Sql Security 2007
Php My Sql Security 2007Php My Sql Security 2007
Php My Sql Security 2007Aung Khant
 
Performance schema in_my_sql_5.6_pluk2013
Performance schema in_my_sql_5.6_pluk2013Performance schema in_my_sql_5.6_pluk2013
Performance schema in_my_sql_5.6_pluk2013Valeriy Kravchuk
 
Instrumenting plugins for Performance Schema
Instrumenting plugins for Performance SchemaInstrumenting plugins for Performance Schema
Instrumenting plugins for Performance SchemaMark Leith
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchVic Hargrave
 
CCI2018 - Automatizzare la creazione di risorse con ARM template e PowerShell
CCI2018 - Automatizzare la creazione di risorse con ARM template e PowerShellCCI2018 - Automatizzare la creazione di risorse con ARM template e PowerShell
CCI2018 - Automatizzare la creazione di risorse con ARM template e PowerShellwalk2talk srl
 
So you want to be a security expert
So you want to be a security expertSo you want to be a security expert
So you want to be a security expertRoyce Davis
 
My SQL Skills Killed the Server
My SQL Skills Killed the ServerMy SQL Skills Killed the Server
My SQL Skills Killed the ServerdevObjective
 
Containers: The What, Why, and How
Containers: The What, Why, and HowContainers: The What, Why, and How
Containers: The What, Why, and HowSneha Inguva
 
PostgreSQL Performance Problems: Monitoring and Alerting
PostgreSQL Performance Problems: Monitoring and AlertingPostgreSQL Performance Problems: Monitoring and Alerting
PostgreSQL Performance Problems: Monitoring and AlertingGrant Fritchey
 
CQRS / ES & DDD Demystified
CQRS / ES & DDD DemystifiedCQRS / ES & DDD Demystified
CQRS / ES & DDD DemystifiedVic Metcalfe
 
Cloud patterns applied
Cloud patterns appliedCloud patterns applied
Cloud patterns appliedLars Fronius
 
Designing an extensible tooling platform (Dmitry Zeldin, Skyscanner)
Designing an extensible tooling platform (Dmitry Zeldin, Skyscanner)Designing an extensible tooling platform (Dmitry Zeldin, Skyscanner)
Designing an extensible tooling platform (Dmitry Zeldin, Skyscanner)London Microservices
 

Semelhante a SYN507: Reducing desktop infrastructure management overhead using “old school” tactics (20)

Under the Wire PowerShell workshop - BSides Augusta 2018
Under the Wire PowerShell workshop - BSides Augusta 2018Under the Wire PowerShell workshop - BSides Augusta 2018
Under the Wire PowerShell workshop - BSides Augusta 2018
 
A miało być tak... bez wycieków
A miało być tak... bez wyciekówA miało być tak... bez wycieków
A miało być tak... bez wycieków
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applications
 
Php My Sql Security 2007
Php My Sql Security 2007Php My Sql Security 2007
Php My Sql Security 2007
 
Performance schema in_my_sql_5.6_pluk2013
Performance schema in_my_sql_5.6_pluk2013Performance schema in_my_sql_5.6_pluk2013
Performance schema in_my_sql_5.6_pluk2013
 
Azure from scratch part 4
Azure from scratch part 4Azure from scratch part 4
Azure from scratch part 4
 
Instrumenting plugins for Performance Schema
Instrumenting plugins for Performance SchemaInstrumenting plugins for Performance Schema
Instrumenting plugins for Performance Schema
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with Elasticsearch
 
CCI2018 - Automatizzare la creazione di risorse con ARM template e PowerShell
CCI2018 - Automatizzare la creazione di risorse con ARM template e PowerShellCCI2018 - Automatizzare la creazione di risorse con ARM template e PowerShell
CCI2018 - Automatizzare la creazione di risorse con ARM template e PowerShell
 
So you want to be a security expert
So you want to be a security expertSo you want to be a security expert
So you want to be a security expert
 
My SQL Skills Killed the Server
My SQL Skills Killed the ServerMy SQL Skills Killed the Server
My SQL Skills Killed the Server
 
Sql killedserver
Sql killedserverSql killedserver
Sql killedserver
 
Rapidly deploying software
Rapidly deploying softwareRapidly deploying software
Rapidly deploying software
 
Rails Security
Rails SecurityRails Security
Rails Security
 
Containers: The What, Why, and How
Containers: The What, Why, and HowContainers: The What, Why, and How
Containers: The What, Why, and How
 
PostgreSQL Performance Problems: Monitoring and Alerting
PostgreSQL Performance Problems: Monitoring and AlertingPostgreSQL Performance Problems: Monitoring and Alerting
PostgreSQL Performance Problems: Monitoring and Alerting
 
CQRS / ES & DDD Demystified
CQRS / ES & DDD DemystifiedCQRS / ES & DDD Demystified
CQRS / ES & DDD Demystified
 
Cloud patterns applied
Cloud patterns appliedCloud patterns applied
Cloud patterns applied
 
Designing an extensible tooling platform (Dmitry Zeldin, Skyscanner)
Designing an extensible tooling platform (Dmitry Zeldin, Skyscanner)Designing an extensible tooling platform (Dmitry Zeldin, Skyscanner)
Designing an extensible tooling platform (Dmitry Zeldin, Skyscanner)
 

Mais de Denis Gundarev

Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeDenis Gundarev
 
Citrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityCitrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityDenis Gundarev
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseDenis Gundarev
 
How to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSHow to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSDenis Gundarev
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityDenis Gundarev
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUGDenis Gundarev
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDenis Gundarev
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI securityDenis Gundarev
 
Anton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudAnton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudDenis Gundarev
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...Denis Gundarev
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterRUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterDenis Gundarev
 
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныRUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныDenis Gundarev
 
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDXAlexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDXDenis Gundarev
 
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностейRUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностейDenis Gundarev
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоDenis Gundarev
 
Citrix XenApp — будущее и настоящее
Citrix XenApp — будущее и настоящееCitrix XenApp — будущее и настоящее
Citrix XenApp — будущее и настоящееDenis Gundarev
 
Citrix и мобильность
Citrix и мобильностьCitrix и мобильность
Citrix и мобильностьDenis Gundarev
 
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergyтехники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix SynergyDenis Gundarev
 
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущееxen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущееDenis Gundarev
 

Mais de Denis Gundarev (19)

Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
Citrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityCitrix Internals: ICA Connectivity
Citrix Internals: ICA Connectivity
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
How to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSHow to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWS
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobility
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick Dehlinger
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
Anton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudAnton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloud
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterRUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
 
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войныRUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
 
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDXAlexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
 
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностейRUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
 
Citrix XenApp — будущее и настоящее
Citrix XenApp — будущее и настоящееCitrix XenApp — будущее и настоящее
Citrix XenApp — будущее и настоящее
 
Citrix и мобильность
Citrix и мобильностьCitrix и мобильность
Citrix и мобильность
 
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergyтехники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
 
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущееxen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
 

Último

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Último (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

SYN507: Reducing desktop infrastructure management overhead using “old school” tactics

  • 1. Denis Gundarev Senior Consultant Entisys Solutions SYN507: Reducing desktop infrastructure management overhead using “old school” tactics
  • 2. SYN507: Reducing desktop infrastructure management overhead using “old school” tactics Denis Gundarev Senior Consultant Entisys Solutions
  • 3. About me C:>whoami /all USER INFORMATION ---------------- User Name Twitter E-Mail ============== ============ ================== ENTISYSdenisg @fdwl DenisG@entisys.com GROUP INFORMATION ----------------- Group Name Type SID ====================================== ================ ================= BUILTINGeeks Mandatory group S-1-5-32-540 Mandatory LabelCrazy Russian Label S-1-16-8192 COMMUNITYBay Area Citrix User Group Well-known group S-1-5-32-544 COMMUNITYRussia Citrix User Group Well-known group S-1-5-32-545
  • 4. Agenda Overview Log file analysis Windows migration Windows Installer User Account Control Application Compatibility Performance and Assessment Toolkits Q&A
  • 5. Old School != Outdated
  • 6. “Free” Tools Disclaimer TANSTAAFL* *"There ain't no such thing as a free lunch"
  • 7. “Free” Tools Disclaimer TANSTAAFL* *"There ain't no such thing as a free lunch"
  • 9. Log Analysis • Tons of data – i.e. PVS logs can produce 10 Mb/minute • Different sources and formats – CDF Tracing – Windows Event Logs – Procmon – Wireshark – Text log Files
  • 10.
  • 11. Log Parser Input Formats • IIS log files (W3C, IIS, NCSA, Centralized Binary Logs, HTTP Error logs, URLScan logs, ODBC logs) • Windows Event Log • Generic XML, CSV, TSV and W3C - formatted text files • Windows Registry • Active Directory Objects • File and Directory information • NetMon .cap capture files • Extended/Combined NCSA log files • ETW traces
  • 12. SQL-Like Engine SELECT EXTRACT_FILENAME (Filename) as FileName, date as date, level as level, message as message INTO '[OUTPUTFILE]Errors.csv' FROM '[LOGFILEPATH]' order by date DESC
  • 13. SQL-Like Engine SELECT timegenerated, EXTRACT_TOKEN(Strings,1,'|') AS Domain, RESOLVE_SID(EXTRACT_TOKEN(Strings,0,'|')) AS User, EXTRACT_TOKEN(Strings,3,'|') AS SessionName, RESOLVE_SID(EXTRACT_TOKEN(Strings,4,'|')) AS ClientName, EXTRACT_TOKEN(Strings,5,'|') AS ClientAddress, EventID FROM Security WHERE EventID=4624 /* xp/2003 = 682 */ ORDER BY timegenerated
  • 14.
  • 15. SQL-Like Engine SELECT strFileName,dEventtime,strEventtype,strHostname,intThreadid,strThreadname,strThreadmessage,strSessiontype,strSessionid, strModule,strEventdata USING EXTRACT_FILENAME (logfilename) AS strFilename, EXTRACT_SUFFIX(Text,0,']') AS strEventdata, EXTRACT_SUFFIX(EXTRACT_PREFIX(Text,0,']'),0,'[') AS unparsedMeta, EXTRACT_TOKEN(unparsedMeta,0,'|') AS unparsedDate, TO_TIMESTAMP(unparsedDate,'yyyyMMdd?hh:mm:ss.ll?') AS dEventtime, EXTRACT_TOKEN(unparsedMeta,1,'|') AS strEventtype, EXTRACT_TOKEN(unparsedMeta,2,'|') AS strHostname, EXTRACT_TOKEN(EXTRACT_TOKEN(unparsedMeta,3,'|'),0,' ') AS intThreadid, EXTRACT_TOKEN(EXTRACT_TOKEN(unparsedMeta,3,'|'),1,' ') AS unparsedthreadname, CASE unparsedthreadname WHEN NULL then 'N/A' ELSE unparsedthreadname END AS strThreadname, EXTRACT_TOKEN(unparsedMeta,4,'|') AS unParsedThreadmessageAndSessionID, REPLACE_IF_NOT_NULL(LAST_INDEX_OF(unParsedThreadmessageAndSessionID,'D:'),1) AS sessD, REPLACE_IF_NOT_NULL(LAST_INDEX_OF(unParsedThreadmessageAndSessionID,'R:'),2) AS sessR, COALESCE(sessD,sessR,0) AS intSessionType, case intSessionType When 0 THEN 'N/A' When 1 THEN 'Dynamic' When 2 THEN 'Real' END AS strSessiontype, case intSessionType When 0 THEN unParsedThreadmessageAndSessionID When 1 THEN EXTRACT_TOKEN(unParsedThreadmessageAndSessionID,0,' D:') When 2 THEN EXTRACT_TOKEN(unParsedThreadmessageAndSessionID,0,' R:') END AS strThreadmessage, case intSessionType When 0 THEN 'N/A' When 1 THEN EXTRACT_TOKEN(unParsedThreadmessageAndSessionID,1,' D:') When 2 THEN EXTRACT_TOKEN(unParsedThreadmessageAndSessionID,1,' R:') END AS strSessionid, EXTRACT_TOKEN(unparsedMeta,5,'|') AS strModule INTO '[OUTPUTFILE]XenServer.csv' FROM '[LOGFILEPATH]' WHERE dEventtime is NOT NULL ORDER BY dEventtime
  • 16.
  • 17. Log Parser Output Formats – Write data to text files in different formats (CSV, TSV, XML, W3C, user-defined, etc.) – Send data to a SQL database – Send data to a SYSLOG server – Create charts and save them in either GIF or JPG image files – Display data to the console or to the screen
  • 18.
  • 19.
  • 20.
  • 21. How To Use Log Parser • From command line – check the help file • From PowerShell – http://bit.ly/LogParserPowerShell • As scheduled task • In your scripts – Set oLogQuery = CreateObject("MSUtil.LogQuery") • From Log Parser Studio – http://bit.ly/LogParserStudio
  • 25. Log Analysys • Log Parser 2.2 - http://bit.ly/LogParser • Log Parser Studio - http://bit.ly/LogParserStudio • EventCombMT and Account Lockout tools - http://bit.ly/ALTools
  • 27. Once upon a time…
  • 28.
  • 30.
  • 31. 31
  • 32. 32
  • 34. 34 Wilogutl.exe • Assists the analysis of log files from a Windows Installer installation, and it displays suggested solutions to errors that are found in a log file • Available in the Windows SDK • Msiexec /i BadApp.msi /l*v c:tempBadApp.log
  • 40. 40 Windows Installer Transforms • Generic way to customise an installation • A Transform describes the delta between the original MSI package and the customised version – Saved to an .MST file – Is applied on the fly
  • 41. 41 Orca • MSI Database Editor • When to use? – Removing launch conditions – Un-advertising shortcuts – Changing install levels for features – Creating transforms – http://bit.ly/OrcaMSI
  • 42. 42 WiX Toolset • Builds Windows Installer (MSI) packages from XML • Integrates with Visual Studio • Can decompile MSI • Can be used to repackage your apps • Create packages for Merchandising Server – http://bit.ly/MerchMeta • GUI is available – http://bit.ly/WiXEditors
  • 43. 43 WiX’s Simple Syntax  <?xml version="1.0" encoding="utf-8"?> <Wix xmlns="http://schemas.microsoft.com/wix/2006/wi"> <Product Id="{2445FCA1-F833-4C97-87A2-618A4AE1EAB7}" Language="1033" Manufacturer="IT Bubble" Name="IT Bubble Certificates" UpgradeCode="{2A124791-AAD0-4BE9-A719-3DEED3A49041}" Version="1.0.0.0"> <Package Comments="This installer database contains the logic and data required to install IT Bubble Certificates." Compressed="yes" Description="IT Bubble Root Certs" InstallerVersion="200" Languages="1033" Manufacturer="IT Bubble" Platform="x86" /> <Binary Id="ITB.cer" SourceFile="binBinaryITB.cer" /> <Directory Id="TARGETDIR" Name="SourceDir"> <Directory Id="ProgramFilesFolder" Name="PFiles"> <Directory Id="IT BubbleCert" Name="IT BubbleCert"> <Component Id="IT BubbleCert" Guid="{22AA9F50-0CA6-491F-AC1B-B0FD00BEF0A1}" KeyPath="yes"> <Certificate Id="Certificate.RootCA" Name="ITB.cer" StoreName="root" StoreLocation="localMachine" Overwrite="yes" BinaryKey="ITB.cer" xmlns="http://schemas.microsoft.com/wix/IIsExtension" /> </Component> </Directory> </Directory> </Directory> <Feature Id="IT BubbleCert" Level="1" Title="IT BubbleCert"> <ComponentRef Id="IT BubbleCert" /> </Feature> <Property Id="ALLUSERS" Value="1" /> </Product> </Wix>
  • 44. 44 XML Notepad 2007 • Free XML Editor with Syntax check • http://bit.ly/XMLNotepad
  • 46. 46 | User Account Control
  • 47.
  • 48. Every time you disable UAC… Steve Ballmer kills a kitten Please, think of the kittens
  • 49. Every time you: •Modifying ACLs on Program Files or HKLM •Making user a local admin •Just give users SeBackup, SeRestore, SeCreateGlobal and SeLoadDriver privileges, but keep them as standard users
  • 50. Why Applications Are Asking For Elevation? • Some apps are old and doesn’t have embedded manifest • Some apps trying to write to Program Files or HKLM • App is not signed • Some developers are just lazy
  • 51. Manifests • XML file that contains parameters required for .exe or .dll to run • May contain list of required components or supported OS • May configure the need for elevation per file: • asInvoker • highestAvailable • requireAdministrator • Can be External or Internal • Use mt.exe from the SDK to inject a manifest • Use SigCheck.exe from SysInternals to view the manifest
  • 52. UAC Manifests <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <assemblyIdentity type="win32" processorArchitecture="*" version="1.0.0.0" name="MyApplication.exe"/> <description>MyApplication</description> <ms_asmv2:trustInfo xmlns:ms_asmv2="urn:schemas-microsoft-com:asm.v2"> <ms_asmv2:security> <ms_asmv2:requestedPrivileges> <ms_asmv2:requestedExecutionLevel level="asInvoker||highestAvailable||requireAdministrator"/> </ms_asmv2:requestedPrivileges> </ms_asmv2:security> </ms_asmv2:trustInfo> </assembly>
  • 53. UAC Virtualization • Applications without manifest will be virtualized by default
  • 54. File Virtualization Implementation • File system virtualization is implemented in a file system filter driver, luafv.sys Luafv.sys Ntfs.sys Virtualized Application User Mode Kernel Mode WindowsApp.ini Users<user>AppDataLocal VirtualStoreWindowsApp.ini Non-Virtualized Application WindowsApp.ini Access Denied
  • 55. Virtualized Files • Redirected file system locations: • %ProgramFiles% • %AllUsersProfile% (ProgramData – what was Documents and SettingsAll Users) • %SystemRoot% (Windows) • %SystemRoot%System32 (WindowsSystem32) • Exceptions: • Files that have executable extensions (.exe, .bat, .vbs, .scr, etc) • Prevents masking of system executables for servicing and security • Exceptions can be added or removed in HKLMSystemCurrentControlSetServicesLuafvParameters ExcludedExtensionsAdd or ExcludedExtensionsRemove • Per-user virtual root: • %UserProfile%AppDataLocalVirtualStore • Troubleshooting file virtualization • Event Log: UAC-FileVirtualization • Note: Virtual files do not roam with Roaming Profiles
  • 56. Registry Virtualization • Virtualizes most locations under HKLMSoftware • Keys that are not virtualized: • HKLMSoftwareMicrosoftWindows • HKLMSoftwareMicrosoftWindows NT • HKLMSoftwareClasses • Per user location: HKCUSoftwareClassesVirtualStore • Flag on a registry key defines if it can be virtualized • “Reg flags HKLMSoftware” shows flags for HKLMSoftware
  • 57. Useful tools • Microsoft Windows Software Development Kit (SDK) • mt.exe – embed manifests • signtool.exe – Sign Executables
  • 60. 60 Assessment and Deployment Kit • Combines Windows Automated Installation Kit (AIK) and OEM Preinstallation Kit (OPK) • Integrates tools that used to be separate downloads • Adds new assessment tools • Contains lots of stuff… • http://bit.ly/ADKToolkit
  • 61. 61 ADK Tools • Application Compatibility Toolkit – Application Compatibility Manager – Compatibility Administrator – Standard User Analyzer • Deployment Tools – BCDBoot, BCDEdit, Bootsect – DISM (and ImageX) – OSCDImg – WDSMCAST – Windows System Image Manager • User State Migration Tool – Scanstate – Loadstate – UsmtUtils • Volume Activation Management Tool • Windows PE – CopyPE – SetSANPolicy – MakeWinPEMedia • Windows Performance Toolkit – Wpa – Wpr – XBootMgr • Windows Assessment Services • Windows Assessment Toolkit
  • 62. 62 What is in ACT? • Application Compatibility Manager – Helps to create and analyse applications • Standard User Analyser – Easy to use GUI to create shims • Windows Application Verifier – Checks application for potential compatibility issues • Windows Compatibility Administrator – helps you select and apply compatibility fixes
  • 66. 66 What Are Shims? • Applied to specific apps – Configured with Compatibility Administrator in the App Compat Toolkit – Deployable to enterprise • Changes what the app thinks it sees • Does not change what app is allowed to do
  • 67. 67 What Are Shims Good For? • Great for many kinds of bugs: – Bad Windows version checks – Writing to HKCR at runtime – Unnecessary checks for “am I admin?” – Writing to WRP-protected keys and files – Windows thinks your app is an installer – File/Registry redirections
  • 68. 68 Version Lie Shims • Win95VersionLie • WinNT4SP5VersionLie • Win98VersionLie • Win2000VersionLie • Win2000SP1VersionLie • Win2000SP2VersionLie • Win2000SP3VersionLie • WinXPVersionLie • WinXPSP1VersionLie • WinXPSP2VersionLie • Win2K3RTMVersionLie • Win2K3SP1VersionLie • VistaRTMVersionLie • VistaSP1VersionLie • VistaSP2VersionLie • Win7RTMVersionLie
  • 69. 69 Most Used Shims • VirtualRegistry – Fixes the problem with reading/writing registry value – AddRedirect ( HKLMKey ^ HKCUKey ^ HKLMKey2 ^ HKCUKey2) • CorrectFilePaths – Fixes the problem with reading/writing a file – c:Program.ini= %AppData%Program.ini • WRPRegDeleteKey – Lie when app tries to delete protected OS registry key • ForceAdminAccess – Spoofs queries of administrator group membership • VirtualizeDeleteFile – Spoofs deletion of global file • LocalMappedObject – Forces global section objects into user’s namespace • VirtualizeHKCRLite, VirtualizeRe gisterTypeLib – Redirects global registration of COM objects
  • 72. 72 Compatibility Administrator • Used to create advanced shims • Can be used to create a warning messages • Windows 8 contain 7239 apps in a AppCompat database • Shims can be installed using %windir%system32sdbinst.exe utility • About 400 shims available
  • 74. 74 Standard User Analyzer Citrix Confidential - Do Not
  • 75. 75 Standard User Analyzer Citrix Confidential - Do Not
  • 77. 77 Why Applications Are Asking For Elevation? • Some apps really need it
  • 80.
  • 81. Xperf • Was a part of Windows 7 SDK • Grab process lifetimes • Captures and analyzes information to help troubleshoot Windows performance issues – Slow boot – GPO processing delays – Application performance issues – Slow services – Ugly minifilter drivers
  • 82. Xperf
  • 83. Xperf
  • 84. Xperf
  • 85. Xperf C:>xperf -on base+latency+dispatcher+NetworkTrace+Registry+FileIO - stackWalk CSwitch+ReadyThread+ThreadCreate+Profile -BufferSize 128 -start UserTrace -on "Microsoft-Windows-Shell-Core+Microsoft-Windows- Wininit+Microsoft-Windows-Folder Redirection+Microsoft-Windows-User Profiles Service+Microsoft-Windows-GroupPolicy+Microsoft-Windows- Winlogon+Microsoft-Windows-Security-Kerberos+Microsoft-Windows-User Profiles General+e5ba83f6-07d0-46b1-8bc7-7e669a1d31dc+63b530f8-29c9-4880- a5b4-b8179096e7b8+2f07e2ee-15db-40f1-90ef-9d7ba282188a" -BufferSize 1024 -MinBuffers 64 -MaxBuffers 128 -MaxFile 1024
  • 86. Windows 8 ADK • Windows Performance Analyzer replaces xperview • Windows Performance Recorder replaces xbootmgr – Also replaces xperf trace capture functionality • xperf command line actions remain in WPT
  • 87.
  • 91. System assessment basics • System assessment is a process that uses the ADK tools to measure and analyze a PC • Assessments are core functionality tests • Combinations of these tests provide additional measures of the entire PC experience • Quality expectations are changing • Software + hardware + Windows = PC experience • The way we measure PC quality must also change
  • 92. System assessments • CheckLogo and driver assessments • File handling • Photo handling • Internet Explorer launch/tab create • Hybrid boot • On/off assessments (boot/shutdown/S3/S4) • Browser assessment • Media transcode performance • Metro performance • Memory footprint • First boot experience • Media streaming • WinSAT comprehensive • Battery life (and idle efficiency analysis) • MiniFilter driver performance impact (option for other assessments) • Internet browsing workload for battery life assessment • Windows Media Player performance and quality
  • 93. What Metrics are captured by the Assessment • Both Boot and Shutdown durations are captured using Event Tracing for Windows (ETW).. • Process level details such as CPU and Disk utilization are also provided. • Assisted Performance Diagnostics identifies potentially problematic performance issues.
  • 94. • Run the assessments on computers without downloading the ADK on all systems.
  • 95. • Use Log Parser to combine or transform log files • Use Manifests to control UAC behavior and enable UAC Virtualization • Use Application Compatibility Administrator to “patch” your applications • Use Assessment Engine to compare performance of your desktops and servers • Use Performance Recorder and Analyzer to optimize boot Key Takeaways
  • 97. Confidential – Internal Use Only Q&A • @fdwl • denisg@entisys.com • http://BayCUG.com • http://blog.itbubble.ru

Notas do Editor

  1. I’m going to talk about old school, so let’s make slides look older first!
  2. We will talk about Tools that are available from MicrosoftTools that will help you in your day-to-day workTools that will help with Windows XP Migration
  3. Disclaimer:Free software doesn’t mean that it’s totally free, please read EULA each time when you download anything from any website
  4. Disclaimer:Free software doesn’t mean that it’s totally free, please read EULA each time when you download anything from any website
  5. Hard to find required info
  6. Query for combining PVS Logs
  7. EVENTS: Find All Remote Logons
  8. Typical output of XenServer logging
  9. Query that transform unreadable XenServer output into CSV format
  10. Event Comb allows you to:Define either a single Event ID, or multiple Event IDs to search forDefine a range of Event IDs to search forLimit the search to specific event logsLimit the search to specific event message typesLimit the search to specific event sourcesSearch for specific text within an event descriptionDefine specific time intervals to scan back from the current date and timeFor a complete set of featureshttp://support.microsoft.com/kb/308471/en-us
  11. Gather specific events from event logs from several different computers into one central location Specifying the Event Logs and Event Types to SearchEvent LogsSystemApplicationSecurityEvent typesError Informational WarmingFor more details on Auditing and monitoringhttp://www.microsoft.com/technet/security/topics/auditingandmonitoring.mspx
  12. Xpirience Windows XP and Metaframe XP delivering Microsoft Office XP Running on AMD Athlon XP Processor
  13. Everyone need to migrate from Windows XP
  14. Can we migrate to MacOS or Linux??
  15. No, we can’t migrate to fancy-looking OS, there is no LOB apps there
  16. Ok, we trying to migrate, first problem that we see there is installation failure
  17. If installer built using MSI, try to enable logging and use Wilogutl.exe from SDK
  18. When you will find the root cause of error, use orca to edit MSI
  19. When ORCA is not enough, use WiX toolset
  20. Example of WiX file for creating msi with a root cert
  21. Use free tools to edit XML
  22. Use the same free tools for creating UPM Cross-Platform files
  23. requireAdministratorThe application runs only for administrators and requires that the application be launched with the full token of an administrator asInvokerThe application runs with the same token as the parent processhighestAvailableThe application runs with the highest privileges the current user can obtain
  24. Windows ADK OverviewKey Messages:Collection of assessment and deployment tools to aid in the deployment of Windows 8Required for any automated Windows 8 operating system deployment using the MDT and/or the Operating System Deployment (OSD) feature in System Center 2012 Configuration Manager Keep the discussion brief as this is not the primary focus of the sessionThe Windows ADK is a collection of assessment and deployment tools that aid in the deployment of Windows 8.These tools are required for any automated Windows 8 operating system deployment using the MDT and/or the OSD feature in System Center 2012 Configuration Manager.Each of the tools in the Windows ADK will be discussed in separate slides.
  25. So, there a tons of shims, how to choose the right one?
  26. Use SUA
  27. Or LUABudLight from Aaron Margosis
  28. How to deal with slow logons?
  29. Xperf command line for troubleshooting slow logons. Not easy?
  30. Use WPA
  31. Windows Assessment Console Create consistent metrics from systems with reproducible targeted testsAssessmentsShow the results and issuesDemoStartStart &gt; All Programs&gt;Windows Kits&gt;Windows ADK&gt;Windows Assessment ConsoleHome tab Introduce Jobs, Details, Results, and RunRun a jobResults tab Introduce Chart and Table, Issues and detailsLink to Windows Performance Analyzer
  32. Easily create a collection of most useful assessments Start a new jobSelect assessments Configure the settingsSave
  33. There is a lot of free tools available from Microsoft, some of them are well-known, such as Resource Kits and Support tools for Windows. Lot of tools like where.exe, ktlist, robocopy or taskkill were included with the latest version of windowsResource Kits, Support Tools, Administration Kits and RSATSysinternals http://live.sysinternals.com/procmon.exeSoftware Development Kits (SDK)Blah Kits and Yada YadaYada ManagerWindows Assessment and Deployment Kit (ADK)Windows Automated Installation Kit (AIK)Application Compatibility Toolkit (ACT)Enhanced Mitigation Experience Toolkit (EMET)Deployment Toolkit (MDT)Business Desktop Deployment (BDD)Security Compliance Manager (SCM)Assessment and Planning (MAP) Toolkit