Smackdown - v2.1
Transcription
Smackdown - v2.1
User Environment Management (UEM) Comparison Whitepaper (aka Smackdown) Author(s): Rob Beekmans Version: 16.03 Date: May 2016 User Environment Management Comparison Whitepaper © 2016 PQR, all rights reserved. All rights reserved. Specifications are subject to change without notice. PQR, the PQR logo and its tagline ICT altijd binnen bereik are trademarks or registered trademarks of PQR in the Netherlands and/or other countries. All other brands or products mentioned in this document are trademarks or registered trademarks of their respective holders and should be treated as such. Version 16.03 may 2016 Page i User Environment Management Comparison Whitepaper CONTENT 1. Introduction ..............................................................................................................................1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 2. Objectives .................................................................................................................................1 Intended Audience ....................................................................................................................1 Vendor Involvement .................................................................................................................1 Community involvement ..........................................................................................................1 Document creation process ......................................................................................................1 Suggestions and improvements ................................................................................................2 Sponsoring ................................................................................................................................2 Contact ......................................................................................................................................2 About.........................................................................................................................................4 2.1 2.2 2.3 2.4 About PQR .................................................................................................................................4 Acknowledgments.....................................................................................................................4 Community effort .....................................................................................................................6 Quotes from CTOs and Founders of UEM Product Companies ................................................8 3. Definitions and Terms used in this paper .................................................................................9 4. What is User Environment Management (and why should you care?) ..................................11 4.1 4.2 4.3 4.4 5. UEM: Defined ..........................................................................................................................11 UEM and the “Layer Cake” analogy ........................................................................................12 The Pre-History of UEM (and the case for better solutions) ..................................................13 Why UEM? ..............................................................................................................................16 In-Box UEM from Microsoft ....................................................................................................17 5.1 5.2 5.3 6. Microsoft’s own in-box UEM solution: Group Policy and Group Policy Preferences .............17 A quick note about Microsoft’s AGPM ...................................................................................22 Microsoft’s “now included” Roaming Profile Replacement / Successor: UE-V ......................22 Before deciding on a 3rd party UEM Solution .........................................................................25 6.1 6.2 6.3 7. Frequently Asked Questions (FAQ) about 3RD party UEM tools .............................................25 What else should I look for in a UEM tool? ............................................................................28 The future of UEM and the UEM whitepaper .........................................................................30 Solution Overview ...................................................................................................................32 7.1 7.2 7.3 7.4 7.5 7.6 7.7 Introduction ............................................................................................................................32 Vendor matrix, who has focus on what!? ...............................................................................33 AppiXoft ..................................................................................................................................34 AppSense ................................................................................................................................39 Citrix ........................................................................................................................................44 FSLogix: ...................................................................................................................................48 Liquidware Labs ......................................................................................................................53 Version 16.03 may 2016 Page ii User Environment Management Comparison Whitepaper 7.8 7.9 7.10 7.11 7.12 7.13 7.14 8. Norskale .................................................................................................................................58 PolicyPak Software..................................................................................................................61 RES ..........................................................................................................................................67 Tricerat ....................................................................................................................................72 Unidesk ...................................................................................................................................75 VMware User Environment Manager .....................................................................................80 VMware View Persona Management .....................................................................................85 UEM features Comparison ......................................................................................................87 8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 8.10 Introduction ............................................................................................................................87 Roadmap and Future additions ..............................................................................................89 Feature Compare Matrix.........................................................................................................90 Generic features and functionality .........................................................................................91 User Profile Management .....................................................................................................103 User Personalization, Application and Desktop Management .............................................108 Application Access Control, Security Management ..............................................................117 Resource Management .........................................................................................................124 License Management ............................................................................................................126 Monitoring, Auditing and Reporting .....................................................................................127 9. Conclusion .............................................................................................................................132 10. Change Log ............................................................................................................................134 Version 16.03 may 2016 Page iii User Environment Management Comparison Whitepaper 1. INTRODUCTION Are you overwhelmed by all the different User Environment Management (UEM) solutions available? Are you looking for insights into User Environment Management? Are you looking for an independent overview of the User Environment Management solutions and curious about the different features and functions each UEM vendor is offering? If so, this updated Comparison Whitepaper (also known as PQR’s Smackdown) is a must read! In the current market, there is an increasing demand for unbiased information about User Environment Management solutions. This whitepaper focuses on solutions enabling businesses to manage the User Environment. An overview of features has been created to enable a better understanding and comparison of capabilities. 1.1 OBJECTIVES The overall goal of this whitepaper is to share information about: 1.2 What is User Environment Management? User Environment Management functionality and solutions overview; Describe the different UEM vendors and their solutions; Compare the functionality and features of various UEM solutions; INTENDED AUDIENCE This document is intended for IT Managers, Architects, Analysts, System Administrators and ITProfessionals in general who are responsible for and/or interested in designing, implementing and maintaining User Environment Management solutions. 1.3 VENDOR INVOLVEMENT All major vendors whose products are analyzed and described in the feature comparison have been approached in advance to create awareness of this whitepaper and discuss the different features and functionality. The product descriptions are written by the vendors, they had four pages of freedom to show their product to you. 1.4 COMMUNITY INVOLVEMENT Members of the UEM community were approached to help with the update of this document. In the next chapter we’ll introduce the member of the community. 1.5 DOCUMENT CREATION PROCESS The document has been created with the help of the community and co-workers who did the initial review of solutions. The reviews were then reviewed by a peer reviewer before we ac- Version 16.03 6 juni 2016 Page 1 User Environment Management Comparison Whitepaper cepted them in the matrix. The vendors got the opportunity to review the matrix before publication and provide input about the review. If the input was considered valid the document was updated. 1.6 SUGGESTIONS AND IMPROVEMENTS We’ve done our best to be truthful, clear, complete and accurate in investigating and writing down the different solutions. Our goal is to write an unbiased objective document where possible, which is valuable for the readers. If you have any comments, corrections or suggestions for improvements of this document, we want to hear from you. We appreciate your feedback. Please send e-mail Rob Beekmans ([email protected]) include the product name and version number and the title of the document in your message. 1.7 SPONSORING PQR does not receive any sponsoring from any vendor for this document. This document is created with the help of many community friends and the vendors. We find it of the utmost importance to be independent and stay independent in our whitepapers. The only sponsoring we get from vendors is their valuable review of the document for which we are very grateful. 1.8 CONTACT PQR; Tel: +31 (0)30 6629729 E-mail: [email protected]; www.PQR.com; Twitter: http://www.twitter.com/pqrnl Version 16.03 6 juni 2016 Page 2 User Environment Management Comparison Whitepaper THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND FOR REFERENCE PURPOSES ONLY COPYRIGHT PQR PUBLISHING IN PART OR WHOLE IS PROHIBITED WITHOUT WRITTEN APPROVAL Version 16.03 6 juni 2016 Page 3 User Environment Management Comparison Whitepaper 2. ABOUT 2.1 ABOUT PQR PQR, trusted advisor and integrator for modern datacenter, workspace and cloud solutions, focuses on availability of data, applications and work spaces in a secure and manageable way. Along with a suite of IT services PQR guarantees a stable environment, to ensure ICT is always within your reach. PQR customers are active in all sectors of society and can be classified as medium to large organizations where ICT is essential to the business. PQR has profound knowledge of the education, government, profit and healthcare markets. In addition to many traceable references PQR absorbs a wide range of knowledge areas, according to high status levels and preferable certifications. PQR is Cisco Premier Partner, Citrix Platinum Solution Advisor, Hitachi Data Systems Platinum Partner, HP Platinum Partner, Microsoft Gold Partner, NetApp Star Partner, RES Platinum Partner and VMware Premier Partner. PQR, founded in 1990, is established in De Meern and counts over 100 employees. 2.2 ACKNOWLEDGMENTS LEADER Rob Beekmans is a 26-year IT veteran that worked in many fields in IT before he joined PQR almost 8 year ago. Rob is a senior consultant with a strong focus on Application and desktop delivery, User Environment Management, Mobility and Monitoring. Rob is a VMware vExpert and is a member of the VMware EUC-Champion group, The End-User Computing Champions Program is an “Outsiders-who-are-Insiders” Expert Program designed with the help of several EUC experts in the community. Rob shares his vision and insights on his personal blog, on webinars or on stage. Follow Rob on Twitter or visit his blog. If you want to contact Rob you can do so at [email protected] The document previously was managed by my former PQR colleague Ruben Spruijt. After Ruben left a new “leader” was needed to make sure the document was updated. I took up the task to update the document and gathered a team of experts to help me. I thank Ruben for his hard work over the past years and wish him the best at his new job. Version 16.03 6 juni 2016 Page 4 User Environment Management Comparison Whitepaper Founder Ruben Spruijt is Chief Technology Officer at Atlantis Computing, responsible for driving vision, technology evangelism and thought leadership with Atlantis customers, partners and communities. Mr. Spruijt is a well-regarded author, speaker, market analyst, technologist, and all-around geek. An established industry leader and luminary, he is one of only a few individuals in the world to hold three prestigious virtualization awards: Microsoft Most Valuable Professional (MVP), Citrix Technology Professional (CTP) and VMware vExpert. Mr. Spruijt has presented more than 150 sessions at national and international events such as BriForum, Citrix iForum Japan, Citrix Synergy, Gartner Catalyst, Microsoft Ignite, Microsoft TechEd, NVIDIA GTC, and VMworld. Mr. Spruijt founded several independent industry analysis bodies including Project Virtual Reality Check (VRC), Team Remote Graphics Experts (TeamRGE), AppVirtGURU written and co-authoring multiple disruptive ‘Smackdown’ research whitepapers. Mr. Spruijt is based in the Netherlands where he lives with his wife and three kids. Major contributors Special thanks go out to Jeremy who helped me with the initial review and edit of the first 50 pages of the document. He worked through the Dutch-English sentences and turned them to English. Without his hours of work on this the readability of the document would be worse. Further on he worked on the Microsoft piece of the document, which is a separate chapter for it’s the base everyone starts off from. Jeremy Moskowitz, Group Policy MVP: Jeremy is a 13-year recipient of the Microsoft MVP award with a concentration in Group Policy. He runs GPanswers.com for Group Policy training and consulting. He also leads the solutions design at PolicyPak Software. Jeremy contributed the Microsoft Group Policy and Microsoft UE-V sections as well as the PolicyPak section. Follow Jeremy on twitter @jeremymoskowitz or at www.GPanswers.com or www.PolicyPak.com Another big thanks goes out to my co-workers Hayscen de Lannoy who worked with me on the last edits of those 50 pages and the general review before this document was able to go live. Hayscen de Lannoy: Hayscen had his start in the IT field 18 years ago doing application migrations and desktop deployments. He is now a senior workspace consultant at PQR with a passion for Server Based Computing, VDI, User Environment Management, automation and deployment. Follow Hayscen on twitter at @hdelannoy. Version 16.03 6 juni 2016 Page 5 User Environment Management Comparison Whitepaper 2.3 COMMUNITY EFFORT The community is a very important part of my professional life, I can’t imagine not being in contact with many of the guys listed here. When I took up the job to update the paper I knew the community had to be included. So here are the community hero’s that made this version of the whitepaper possible. Of course this little piece of text does not reflect the time they invested, thanks guys for all the effort. It’s more than appreciated. Version 16.03 Igor van der Burgh Ryan Revord @Igor_vd_Burgh @rsrevord Sven Huisman Patrick van den Born @svenh @pvdnBorn Marius Sandbu Julien Sybille @msandbu @jsybille Rob Aarts Erik Bakker @Rob_Aarts @Bakker_Erik 6 juni 2016 Page 6 User Environment Management Comparison Whitepaper Mathias Kowalkowski Sean Massey @stflr @SeanpMassey David Seaman Henk Hoogendoorn @vyvere @HenkHoogendoorn Neo Crazy Dad @neocrazydady Patrick Rouse @Patrick_C_Rouse Geoffrey van der Molen Hayscen de Lannoy @hdlannoy @GeoffreyvdMolen Richard Kuiper @RKuiper Version 16.03 6 juni 2016 Page 7 User Environment Management Comparison Whitepaper 2.4 QUOTES FROM CTOS AND FOUNDERS OF UEM PRODUCT COMPANIES "Whether you want to get the latest insights on desktop virtualization or you are new to the space and need to quickly understand it, the UEM whitepaper is the essential guide to read. It provides detailed analysis of the different offerings in the market today and gives an overview of the strategic questions one should evaluate. This guide will be an excellent companion on your Application and Desktop Delivery journey. Kudos to PQR for their continuing effort." Bob Janssen, CTO and Founder, RES "As the UEM space continues to grow and mature, the capabilities of the solutions and products in this space are evolving - PQR's UEM whie paper educates the world on the depth and complexity of delivering true User Environment Management, and highlights the many different areas of functionality required for a comprehensive solution that can scale for organizations of all sizes. It is important for the technical community to have an independent, detailed review of UEM solutions and at AppSense, we're delighted to see PQR fill that void." Jon Rolls, VP Product Management, Appsense “In their efforts of balancing productivity and manageability, businesses will eventually see the value of User Environment Management. PQR’s UEM whitepaper is the invaluable guide for those who are looking for ways to make this balancing act feasible and affordable.” Richard Kuijpers, Managing Director, Appixoft “The UEM whitepaper is a good resource for starting your evaluation of UEM products. Desktop transformation involves many steps and User Management is an important one to get right. Choosing the best solution for your organization based on architecture, features, and value is essential and the UEM whitepaper of PQR brings this information together in one document.” Jason Mattox, CTO, Liquidware Labs “UEM can mean different things to different people. Ultimately it’s about adding more horsepower to managing the desktop and the user’s experience, than what is normally possible out of the box. The information in the UEM whitepaper offers IT admins solutions from different vendors to augment or supplant what’s in the box. The information in this guide could be the key you need to a true ‘next generation’ desktop experience as we head into the era of Windows 10 everywhere.” Jeremy Moskowitz, Founder, PolicyPak Software "We believe that workspace performance is key for all organizations, large and small, because it directly impacts the success of the most important aspects of an IT environment: user experience, simplicity, and budget. Our innovative algorithms optimize the way applications run, allowing up to 70% more end-users in virtual environments, while our UEM engine allows you to deliver fully managed workspaces with less than 10 second login times. All of this can be easily achieved by configuring only a few settings in the management console.” Pierre Marmignon, Founder and CEO of Norskale Version 16.03 6 juni 2016 Page 8 User Environment Management Comparison Whitepaper 3. DEFINITIONS AND TERMS USED IN THIS PAPER This table below gives an overview of various terms that we will be using in this paper. You can refer back to this section as needed throughout the paper. Term Definition User Profile The unique location within a Windows desktop to which a user has write access. Application will write user preferences to this location and the user can store data such as documents and pictures in this location as well. The profile is created when the user first logs onto a Windows desktop and persists on that desktop unless an administrator or policy deletes it Personalization (or Persona) A user’s customizations to their environment – e.g. wallpaper, shortcut placement, pinned items etc. Also includes application preferences written to the user profile. Used as a term to describe what is contained in a user profile User Environment Management A controlled and structured approach to managing components of the environment related to the user. This includes user profiles, preference, policy management, monitoring, auditing, application control and application deployment. Can be achieved with the Windows in-box tools, or can be enhanced using scripting or 3rd party solutions to achieve a particular desired result User State Virtualization Abstraction of user data and profile from the operating system – Roaming Profiles, Folder Redirection and Offline Files. User State is still tied to the version of the operating system and provides no separation of individual application preferences Originator: Microsoft User Virtualization When used alongside OS Virtualization and Application Virtualization; is a term that makes it easy to describe a layered approach to desktop management and building the user environment on demand. Usage extends to user profiles, user environment management, application control and user installed applications. Originator: AppSense Workspace Management Used to describe the process of abstracting user data and preferences from the operating system and along with application delivery, shortcut and file type association management, building the user environment dependent on the users’ context (identity, location, device etc.) Originator: RES User Profile Management Version 16.03 Move beyond roaming profiles to actively manage the user profile – may or may not provide segmentation of the profile 6 juni 2016 Page 9 User Environment Management Comparison Whitepaper Term Definition Layered User Personalization See User Virtualization Decoupling Personalization Separating the user profile from the operating system. See User Virtualization Profile Segmentation Segment the profile into smaller chunks of related profile settings – e.g. per-application settings. Those application settings may now be portable across operating systems User Virtualization Management See User Virtualization Application and Workspace Personalization See Workspace Management User Workspace Virtualization See User Virtualization Persistent Personalization Persist user profile data across sessions Persona Management See User Profile Management Profile Virtualization Implementing file system redirection to move the profile or parts of the profile from its real location on disk to another location. Not to be confused with Folder Redirection built into Windows Profile Streaming Rather than load the entire profile at logon, stream only the data to the client as it is requested. This improves logon times. Used in conjunction with profile virtualization Hybrid Profile Management Managing the user profile as a combination of a local or mandatory profile with user preferences or personalization added at logon or application start Profile Management See User Profile Management Profile Acceleration See Profile Streaming User Installed Applications The ability for a user to install an application and have that application then persist across different Windows desktops User Rights Management or Privilege Management Dynamic elevation of specific user rights via a defined policy to make administrative access more granular. Individual applications, Control Panel applets or Windows tasks can be delegated without adding the user to the local Administrators group Dynamic Privileges See User Rights Management Version 16.03 6 juni 2016 Page 10 User Environment Management Comparison Whitepaper 4. WHAT IS USER ENVIRONMENT MANAGEMENT (AND WHY SHOULD YOU CARE?) 4.1 UEM: DEFINED User Environment Management, or UEM for short, is an easy way to describe any addition to the in-the-box Windows experience to make the desktop more manageable. That being said, at one time, the (perhaps original) definition of UEM was somewhat more narrow; UEM once meant to roam settings from machine to machine without the use of roaming profiles. Since end-user computing needs got more sophisticated, use cases evolved, VDI, BYOD, and other desktop-enablement technologies emerged from infancy to adulthood, so transformed the original definition of UEM as well. UEM goes beyond the traditional “Configuration Management” (CM) and, indeed, in many cases is a complement and not a competition to Configuration Management utilities. Traditional CM solutions are products like Altiris Endpoint Management, LANDESK, IBM BigFix, Microsoft System Center Configuration Manager (SCCM), Novell ZenWorks and others. To help to understand the difference between UEM and CM, here are some core feature examples that describe typical non-overlapping features between the two concepts. CM product features sample: Deploy operating systems and desktop software Perform patch management Perform hardware and software inventory Configure antivirus UEM product features sample: Roam end-user settings between machines Configure desktop look and feel Map drives, deploy printers, create shortcuts Show / hide / layer applications on a desktop Manage and configure Internet Explorer As such, the primary focus of the Client Management solutions is the client device and not primarily the end-user’s workspace. UEM products, on the other hand are about the user’s experience and interaction to their desktop, and not about the client device. Version 16.03 6 juni 2016 Page 11 User Environment Management Comparison Whitepaper Therefore our definition of User Environment Management (UEM) for 2016 is: “User Environment Management (UEM) is any software solution which facilitates the management of the end-user user computing environment. The software’s primary focus would be about the end-user experience and not on the end user's device”. That being said, in the same way no two products are the same, neither will you find the exact same feature set in a CM product, nor will you find the same feature set in a UEM product. One UEM product might roam settings between machines, and another might not have that feature at all, and instead, do an amazing job at configuring the desktop look and feel. Another UEM product might not do either of those functions, but instead perform application hiding. Said another way, the spectrum of UEM products is quite diverse. Because of that an IT department might start by using the in-the-box UEM solution (Group Policy) augment or replace it with one or more 3rd party UEM products to make a whole solution which solves the particular business and end-user cases needed. Some UEM products try to do “everything.” Some UEM products try to do just one thing. Other UEM products do a handful of things. 4.2 UEM AND THE “LAYER CAKE” ANALOGY A user with a fresh install of Windows 10 and nothing else equals a user who cannot do any real work. To perform real work, a user needs: Applications. Drive maps. Shortcuts. Printers. Security, desktop and application settings. Personalized look and feel settings. Access to documents. …..and a lot more. As such, just providing a desktop to a user gives him very little to do. Therefore, the term “Layer Cake” has emerged as model to express what must happen after the desktop is deployed. These layers can be layered on directly or in virtualized pieces. The ideal situation is to break up (or isolate) the Operating System (OS), the Applications (Apps) and the User Components. By isolating each piece, you can interchange any of the pieces, and still have a functioning desktop system “cake.” Version 16.03 6 juni 2016 Page 12 User Environment Management Comparison Whitepaper In the figure 1, we can see the basis of the layer cake: OS is first (bottom) Applications are second (middle) User settings are last (top) Figure 1 To go deeper into the layer model: 4.3 OS: OS delivery can occur in a myriad of ways such as golden / master image, streaming image, layered, VDI, RDS, etc. Applications: Applications can be present by being “physically installed” (using MSI), placed there with Application Virtualization, and/or layered and/or hidden. User: User settings (and restrictions) are last, which include personalization, security policies, look and feel settings, and so on. THE PRE-HISTORY OF UEM (AND THE CASE FOR BETTER SOLUTIONS) Before vendors came along with elegant solutions to solve desktop environment challenges, it was reasonably common for IT admins to cobble together their own rudimentary solutions for desktop management. For instance, if you couldn’t install two applications on the same desktop, admins would simply install the applications on two different servers (siloing them), and publishing the applications for use. Poof! Instant workaround! But, with workarounds come problems. While this reduced application conflicts, now the silo introduced problems ensuring that user’s preferences are available across different hosts and kept consistent between sessions! So Roaming Profiles (in Microsoft Windows) were introduced to store and recall settings. The goal of Microsoft Windows Roaming Profiles goals was to store user-changed settings so they were recalled and available the next time the user logged on, or when the user changed machines. Version 16.03 6 juni 2016 Page 13 User Environment Management Comparison Whitepaper But with Roaming Profiles came other problems. Some problems with roaming profiles were real, actual problems. Other problems with roaming profiles felt like real problems, but instead were misunderstanding or perception problems. Other problems were simply mere annoyances with the way Microsoft handled roaming profiles’ implementation. Let’s break down the three categories of roaming profile issues: Roaming Profile implementation annoyances Roaming profile “real problems” Roaming profile “perceived problems” Roaming profile implementation annoyances Roaming profiles should have been implemented such that it was drop-dead easy to roam from machine to machine and operating system to operating system. However, the implementation from Microsoft is simply not that way. Instead, Microsoft’s recommendation is that all versions of the profile (mostly based upon operating system revisions) should be siloed. That is, you shouldn’t intermingle user preference data from one version to another; nor can you intermingle 32 and 64 bit profiles (Microsoft KB http://support.microsoft.com/kb/2384951). Therefore, the Operating System to Profile Version chart looks like what’s seen in Figure 2. Figure 2 Then after successfully siloing each operating system’s data, the next prescription would then to use Redirected Folders to get to end-user data. The end-result would be roaming from machine to machine, regardless of machine type. And even though there was a different profile for each operating system, at least the user could access the same data, because of the folder redirection. Roaming profile “real” problems: Besides the implementation annoyance of having to silo roaming profiles, there are some actual real problems with roaming profiles. Over time, lots of user settings can be stored in the profile. And therefore at login time, when speed is most needed, that time is wasted loading the (now large) user profile. That being said, even since Windows XP, roaming profiles only need to download only the NTUSER.DAT file and Version 16.03 6 juni 2016 Page 14 User Environment Management Comparison Whitepaper only the changes between the profile and what's already on the machine. This does pose a real problem for non-persistent VDI desktops and whenever users log into a brand new machine or session, because that first login is always downloading the whole profile; thus being slow (the first time.) Another real problem of roaming profiles is that if a user made an undesired change or for whatever reason the user's state needed to be restored, there was no good way to do this. Even performing a real backup and restore could sometimes not restore the state back as users expected. Roaming profile “not real” & perception problems: It is definitely true that you can corrupt a profile if you don’t heed Microsoft’s warning to silo your roaming profiles based upon operating system. And in the distant past, it was quite easy to roam from Windows NT to Windows 2000 and causing actual profile corruption along the way. One of the perceived problems with roaming profiles might not actually be a problem at all. Since windows 7 and continuing on to Windows 10, actual profile corruption could be a perceived phenenomon as opposed to a real actual problem occurance. This blog entry from Mike Stephens at Microsoft really says it all, and is worth a read. It's entitled "Mythical Creatures - Corrupt User Profiles" and is found here. If you want a second opinion from a profile expert read "Corrupt User Profiles - Do They Even Exist?" which is found here. Said another way, roaming profiles are not without problems and drawbacks. But actual hardcore “corruption” could simply be misintrepration of what is really occurring on a system. Using scripts to compensate for Roaming Profiles and missing functions out of the box. Logon scripts, logoff scripts, startup scripts, shutdown scripts and manually executed scripts have often been used to work around in-box limitations where IT admins have wanted to enhance the user environments. Script engines like VBscript, KiXstart, Powershell, and others aren’t usually optimized for speed nor do they often have error handling or reporting. Scripts cannot cater for everything a user could potentially do during their session. Scripts also have to be maintained by engineers who understand how to write and maintain scripts. Which is good for job security but bad for continuity, agility and long term supportability. Some organizations have even written their own full-blown in-house UEM solutions because, historically, the market wasn’t mature enough with commercial solutions. Even if an in-house UEM solution works reasonably well, even one minor feature change could introduce a large IT cost to build and maintain as well as distract the IT team from other important tasks. Version 16.03 6 juni 2016 Page 15 User Environment Management Comparison Whitepaper 4.4 WHY UEM? Now that we’ve established why UEM was needed, let’s continue onward with a slightly different angle. Let’s try to sussinclty answer the question: “What are the primary reasons for implementing any UEM solution?” The potential answers are as varied as they are many: Version 16.03 Improve user experience when logging on Migrate between OS’s while maintaining user settings Enable installing of user’s own applications (User-installed applications) Avoiding use of Windows Roaming profiles Extending Group Policy to do more (and go to more places) Replace scripts with something graphical and consistent. Provide better and granular support of user and application preferences. Enforce / enable access to applications, file-types, (removable) devices, network and data resources. Enable context awareness (ie: Based on user location, device and custom settings, grant access to applications, data, network resources, devices and preferences dynamically) It facilitates Resource Management to control and optimize usage of CPU, Memory resources with focus on applications and (Virtual) Desktops. Facilitate BYOD Layer applications not already found in the base image Hide applications pre-installed in the base image Report on detailed information changes inside the User Environment Management environment which could be needed for compliancy and certification standards such as Persona Information Acts (HIPAA), ISO 27001, SOX and NEN 7510. Audit and monitor user environments for security events 6 juni 2016 Page 16 User Environment Management Comparison Whitepaper 5. IN-BOX UEM FROM MICROSOFT Almost all IT departments use Windows as their platform of choice; and as such all the areas we discuss will be Windows-centric. And with the pre-paid investment in Windows already comes a small advantage: there’s already a UEM solution in the box from Microsoft. This section explores what is ostensibly “free” since it’s already paid for and in most cases already partially or fully utilized. Most organizations will have a Microsoft environment and with that comes the license agreement. That license agreement hands you an in-box UEM solution from Microsoft. Is this one product? No the UEM solution Microsoft is handing you is a combination of multiple tools imbedded in Windows. With the Microsoft license agreement comes Group Policy and Group Policy Preferences. Depending on the license agreement, SA licensed or not, you get access to UE-V. These tools will offer you a basic UEM solution that might just do for you. For more advanced UEM features or more complex scenario’s you need to look at other vendors to complement Microsoft in your organization.So first we will show you what Microsoft has to offer, you have to understand what is there before you can decide if it will do for you. 5.1 MICROSOFT’S OWN IN-BOX UEM SOLUTION: GROUP POLICY AND GROUP POLICY PREFERENCES Microsoft’s solution for User Environment Management is built in the Group Policy mechanism. There’s a lot to be said for the native Microsoft tools. Both Group Policy (GP) with Group Policy Preferences (GPPrefs) form the basis of an excellent solution for managing computers and the user environment. Indeed, Microsoft acquired DesktopStandard in order to acquire Group Policy Preferences, which has positively delighted many administrators since its inclusion in 2008. However some customers find that Group Policy either requires additional 3rd party add-ons (Group Policy is extensible) or a complete replacement via alternate solutions. Group Policy does a great job for managing the Microsoft pieces in the box. Microsoft ships more than 3500 policy settings that will set and lock down various operating system look and feel items and set various security settings. That being said, there are two types of settings within the Group Policy system: Version 16.03 Policy Settings: These are “True policy” in that a standard user cannot actively work around these set settings. These are all the Adminitrative Template items and security items. Preferences Items: Microsoft’s Group Policy Preferences acts differently, in that nearly all the directives can be worked around – by design – by the user. That’s why they’re 6 juni 2016 Page 17 User Environment Management Comparison Whitepaper called “Preferences.” For instance, Group Policy Preference’s most popular features are delivering Drive Maps, Printers and Shortcuts. And the user at whim can delete all of these settings. It is notable that Group Policy Preferences settings can re-apply during Group Policy background refresh, but only if the client can actively make contact with a Domain Controller and is not offline. The Group Policy ecosystem is only a “settings delivery” mechanism and doesn’t care what happens after the settings are delivered. After settings are delivered, if a user changes “user controllable” areas, then Roaming Profiles will typically contain these settings. Group Policy and Group Policy preferences’ additions greatly enhance the administrator’s toolbox and opportunities for managing the user environment; however there are several important pieces still missing from this arsenal: • • • Microsoft’s own Roaming profiles have the same continued challenges: Roaming Profiles are still only supported per OS – organizations are unable to provide application settings across operating system versions. Scripts could still be necessary for some tasks: Scripts might still be needed, and maintained plus they continue to have the same limitations as the scripts we used to write. Though skillful use of Group Policy Preferences can often eliminate the need for many, if not all, of a company’s scripts. Some Group Policy Preferences items have not been made upwardly compatible with Windows 10, such as File Open assignments. As stated, a Group Policy infrastructure is made up of Group Policy Objects (GPOs) and can natively contain directives called Policy or Preferences, but is also extensible to 3rd party directives. Group Policy can be configured by creating a GPO and linking the GPO to a Site, Domain or Organizational Unit in Active Directory. GPOs can contain both User and Computer side directives. The configured settings are applied by the client at startup, logon and approximately every 90 minutes in the background (processed independently on User and Computer side.) Group Policy Preferences provides 21 user-environment management (UEM) abilities to Group Policy and works from Windows XP clients onward. Group Policy Preferences greatly extend the possibilities to configure the user environment and in many cases eliminates the need for complex logon scripts. Group Policy Preferences’ most popular features include delivering drive mappings, shortcuts and printer assignments Roaming Profiles may or may not be used with Group Policy. That is, there is no “all or nothing” with regard to Group Policy and Roaming Profiles. Many organizations choose to take advantage of Group Policy and Group Policy Preferences without ever turning on roaming or mandatory profiles. Version 16.03 6 juni 2016 Page 18 User Environment Management Comparison Whitepaper The configuration of roaming or mandatory profiles is usually handled using Active Directory Users and Computers directly upon a users’ Active Directory account. Benefits Group Policy, Group Policy Preferences are free as they come with the Microsoft Windows installation. Since it’s in the box most administrators have had some use of Group Policy and/or Group Policy Preferences. Other benefits are: Works across any Windows experience - Physical, Virtual, and Laptops. Works across all Windows operating systems from Windows XP onward; continued support for all Windows 10 endpoint systems. Compatible with Microsoft RDS, VMware Horizon View, Citrix XenApp and Citrix XenDesktop. No software to install on desktops, no additional shell environment. Data stays in Windows native format, you're never locked into a data jail. No architecture to deploy – everything is stored on domain controllers; the Group Policy client is already on all Windows endpoints. One-single solution for all of your Windows desktops. Rich history of being extended by 3rd parties to perform specialized functions that are not present “in the box”. Functionality With Group Policy Settings, the main functionality is: Configure the look and feel of the desktop for in-the-box Windows functions (Control Panel, Desktop, etc.) Manage security aspects: underlying operating system, firewall security, application whitelisting / blacklisting (AppLocker) Lockdown supported areas to prevent unauthorized changes to the system. Configure behavior of roaming profiles, folder redirection and offline files With Group Policy Preferences, the following functionality is available for user and computer configuration (user-side shown in screenshot below): Version 16.03 Map Drives, Printers, Shortcuts and more. Set environment variables. Deliver files, create folders folder. Simple INI files and Registry edits. ODBC settings. Perform device restrictions. Set folder options, Internet Explorer settings, Start Menu. 6 juni 2016 Page 19 User Environment Management Comparison Whitepaper Group Policy Objects and Preferences contain functionality to configure both the user and computer as well. Generally, when a computer receives a computer-side setting, all users who use that computer are affected. Context-awareness using Item-Level Targeting Group Policy Preferences items have a rich collection of built-in “Item Level Targeting” filters. These enable specific Group Policy Preferences items to affect machines specifically based on location, machine, group, IP address, OU, and other filters. Figure 3: Targeting A partial list of ILT filters is shown in the screenshot. A full list of context-aware ILT filters can be found at http://technet.microsoft.com/en-us/library/cc733022.aspx Architecture Active Directory Services is required to centrally manage and assign Group Policy Objects and Preferences. Although some Group Policy settings can be configured on each computer – one by one -- locally (using gpedit.msc). This is not a great option when mass configuration in an enterprise environment is desired. Group Policy Objects containing Policy and Preferences can be linked to Active Directory at different levels (sites, domain, OU) and directed to users and/or computers. Version 16.03 6 juni 2016 Page 20 User Environment Management Comparison Whitepaper When using multiple Group Policy Objects, the processing order is always: Local, Site, Domain, OU. The last effective Group Policy Object wins, but higher-level administrators can always ensure their directives “win” by using the “Enforced” setting upon a GPO. Some Group Policy settings directly or indirectly change registry settings. Microsoft provides Administrative Templates (*.adm, admx), which affect operating system settings, and some applications like Microsoft Office or App-V. Licensing No additional licenses are needed to get started with Group Policy Objects and/or Group Policy Preferences. The default Windows Client Access License is enough. Speed concerns While there are some reasons that Group Policy could be slowing down a startup or a login, in practice the most common reason Group Policy can be perceived to be “slow” is the improper use of startup and login scripts which try to perform “too much”; such as copying large files (every time at login), waiting for user input (and timing out), or referencing servers which don’t exist -- thus holding up prescious startup or login time. Another common reason for slowdowns is trying to deploy “very large” printer drivers via Group Policy Preferences (which can be 30 – 500MB depending on the vendor.) Said another way, when using Login or Startup scripts, or deploying large printer drivers via Group Policy, Group Policy is performing exactly what it’s supposed to do. While not every administrative action can be accounted for, the Group Policy engine itself has several built in throttling mechanisms to specifically prevent slowness at startup and login: Version 16.03 Each GPO has a “version number” so that GPO’s contents are not re-downloaded if a client has already seen the contents of a GPO. Said another way the client doesn’t redownload each GPO every time, it only downloads new or changed GPOs, automatically speeding up startups and logins. Starting in Windows XP (and continuing onward thru all Windows clients), all Group Policy operations are, by default, performed in the background when possible. This prevents most slowdowns from even being “felt” by the end user. Starting in Windows 8.1, and when synchronous processing is required, the client will use “locally cached GPOs” which exist on the client machine to speed login time (which would have traditionally occurred over the network). Starting in Windows 8.1, one of the more popular Group Policy Preferences items, Drive Maps, was re-written to always work in the background, speeding up login time whenever Group Policy Preferences Drive Maps was used on a client, and therefore all Group Policy processing overall. Starting in Windows 8.1, login scripts are delayed for processing until 5 minutes after login. This is to prevent disk contention during the most critical time of setting up the 6 juni 2016 Page 21 User Environment Management Comparison Whitepaper users’ Explorer and (possible first time profile setup.) The delayed login script feature of Windows 8.1 is is configurable to any value, including turning this feature off. Therefore, Group Policy’s slowness can be mitigated when admins know where to look. In these cases, a wholesale “replacement” of Group Policy and Group Policy Preferences for another tool which replicates the Group Policy or Group Policy Preferences functionality isn’t something every company should be looking to do until they’ve exhausted all troubleshooting options with the Windows product they’ve already paid for. For very detailed information about finding and locating Group Policy slowdown issues, see Group Policy: Notes from the Field - Tips, Tricks, and Troubleshooting, a talk from TechEd North America 2014 from Jeremy Moskowitz, Group Policy MVP found here. 5.2 A QUICK NOTE ABOUT MICROSOFT’S AGPM Microsoft’s Advanced Group Policy Management (AGPM) gets a special note here for two reasons. First, Microsoft AGPM is often misunderstood in what it can and cannot do. Specifically, Microsoft AGPM adds “change management” around Group Policy Objects themselves. That is, AGPM’s main goal is to help multiple administrators create, edit, approve and rollback GPOs in a systematic way. Contrary to popular believe, AGPM provides zero added client-side superpowers or benefits beyond what’s already in the box with Group Policy and Group Policy Preferences. AGPM is simply a way to store GPOs “offline”, manage them with a team, and put them into production in a systemized fashion. For a quick rundown of AGPM Myths and Facts, see the document at (this link). As a side note, AGPM 4.0 SP3 was recently released with minor update to work with Windows 10 clients and recently added Powershell support. 5.3 MICROSOFT’S “NOW INCLUDED” ROAMING PROFILE REPLACEMENT / SUCCESSOR: UE-V In previous UEM whitepaper, Microsoft’s UE-V was considered a “competitor” to other UEM solutions found in the next section of this paper which sought to work around the limitations of Roaming Profiles. That’s because Microsoft previously sold and licensed UE-V as part of a suite of utilities called MDOP or the Microsoft Desktop Optimation Pak. But Microsoft doesn’t sell MDOP anymore. MDOP is now simply included to all Software Assurance customers. Therefore, understanding UE-V before investigating 3rd party UEM tools is paramount, because ostensibly, you can think of UE-V being almost like it’s “in the box” now for Software Assurance customers. Version 16.03 6 juni 2016 Page 22 User Environment Management Comparison Whitepaper Architecture, Operations and Functionality Overview Microsoft UE-V has main four components: UE-V Agent (as an MSI); UE-V Settings Location Templates; UE-V Settings Storage Location. UE-V Template Generator utlity. The UE-V agent must be deployed to all machines where user preferences are to be managed. The agent looks for the presence of UE-V templates on the machine or a network location defined by the administrator. UE-V templates define the application to be monitored and the locations within that application to monitor. The UE-V agent then traps user-created preferences changes to applications and stores them remotely for later use. UE-V storage of settings can be stored in a file share or the users home drive. When applications are launched (on the same machine or different machine), the user’s application settings are downloaded before the application is launched. The UE-V agent will send the user’s changed settings back at the following times: Logon, logoff, locking the machine, unlocking the machine and connecting to an RDS session. If the user is offline when he makes an application settings change, then it is stored and forwarded the next time the user connects. Lastly, UE-V has a PowerShell interface to accept a command that can roll back settings for a particular application to an initial state. Additionally available is the UE-V Generator utility, which enables administrators to create their own templates for most applications. Benefits UE-V is a step up from Microsoft’s traditional roaming profiles because only the applications’ settings the user needs are downloaded at application launch time, instead of the entire profile and all settings being downloaded at login time. UE-V ships with some UE-V templates to help roam common Microsoft applications such at Internet Explorer, Microsoft Office, and operating system desktop settings and accessories. UE-V also ships with a template Generator utility that enables administrators to create their own templates for well-behaved applications. Microsoft officially supports the in the box templates for UE-V, and also has non-supported additional UE-V templates available for download in the UE-V Gallery (link here). The UE-V agent can be managed using Group Policy with downloadable ADMX templates and adive from this link. Detractors There are some known issues with UE-V as follows: Version 16.03 6 juni 2016 Page 23 User Environment Management Comparison Whitepaper There is no “Roaming Profiles to UE-V” wizard to help existing administrators migrate from roaming profiles, although administrators could run both solutions together during a migration phase. UE-V is now out for several years, and there really is still no guidance or documentation from Microsoft to help administrators migrate from roaming profiles to UE-V. UE-V is not supported on Windows XP and there are no plans to make it work on Windows XP machines. Licensing and Download UE-V is ostensibly free for al Microsoft SA customers. UE-V is download as part of the MDOP (Microsoft Desktop Optimization Pack). More info on licensing MDOP (which includes UE-V and AGPM as discussed in this document) can be found at (this link.) Again, MDOP contains six total tools, of which UE-V is just one of them. Version 16.03 6 juni 2016 Page 24 User Environment Management Comparison Whitepaper 6. BEFORE DECIDING ON A 3RD PARTY UEM SOLUTION Most of the remainder of this paper details 3rd party UEM solutions. Because no two solutions are alike, and there is Microsoft’s in-box UEM tools (Group Policy, Group Policy Preferences and UE-V), here are some items you might want to think about before you even start to investigate any 3d party UEM tool. 6.1 FREQUENTLY ASKED QUESTIONS (FAQ) ABOUT 3RD PARTY UEM TOOLS Q: Now that Microsoft has its own roaming profile replacement tool (Microsoft UE-V) and it’s ostensibly “free” tool (for SA customers), what does this mean for me as an IT admin, and what does it mean for other UEM vendors? A: The release of a true profile management solution by Microsoft is a significant step in validating that profile management and cross desktop roaming matters to enterprise customers. It effectively confirms that profile management has now become a commodity, especially now that all of the 3 main desktop virtualization vendors (Microsoft, Citrix and VMware) essentially bundle roaming profile replacement solutions with their core products. Microsoft is marching forward with developing UE-V features, but they are effectively behind other UEM players in terms of maturity and feature sets. If you are a Microsoft SA customer you might first take a look at your Microsoft tooling since they are included in the license. Depending on your business requirements you might want to look at other UEM solutions. Q: Do 3rd party UEM solutions make desktop virtualization projects cheaper? A: So, you need to be careful when asking this question. All the vendors with 3rd party UEM solutions will try to “Yes” to the question “Does UEM make managing the desktop cheaper?” The short answer to this is No, it won’t make it cheaper, UEM is not meant to make projects cheaper, it’s meant to offer you a solution in the end-user environment that makes end-users more happy and flexible. It will, when implemented correctly, save money on management of the environment. Q: Do these solutions make desktop virtualization easier and faster to implement? A: Customers who already have User Environment Management solutions deployed should see a benefit and improvement in deployment times and adoption when implementing desktop virtualization (or even a new physical desktop) – in-house knowledge and processes should already exist making implementation simpler and thus faster. If the customer is migrating from an existing desktop environment to new environment, these tools are intended to assist in migrating profiles and login scripts from the older desktops into the new desktops. This would be the ideal way to ease entry into desktop virtualization; however other than replacing scripts with GUI tools, desktop virtualization may not necessarily be Version 16.03 6 juni 2016 Page 25 User Environment Management Comparison Whitepaper faster. It will make implementation easier as you can guarantee that settings are deployed to each and ever desktop identically. Q: How difficult are 3rd party UEM solutions to install, configure and maintain? A: Although some of these solutions have been around for some time, the knowledge required for implementation is not as broadly available as those that are included with the in –box Windows UEM tools. The difficulty of using a solution depends per product; one is more difficult to learn than the other. In general you could say that anyone with several years of experience in IT should be able to learn if rather fast. This knowledge “issue” is also there with the standard in-box Windows possibilities, to use the tools offered there requires learning as well. If you start with a solid understanding of what you want to solve you’re half way there. Technically, all UEM products were niche solutions – trying to solve a particular problem. Remember that many UEM solutions sprang from problems born from the world of Terminal Server deployments and the problems found there. As you consider a 3rd party UEM solution, making a decision implementation includes knowing: • • • • Infrastructure requirements - database and file storage, network requirements etc. Configuration optimization - creating an initial configuration and optimizing it as the project progresses. Implementing the best configuration solution for specific scenarios – there are multiple ways to solve a configuration scenario. Training and staffing: who is going to “own” this new 3rd party UEM solution in your organization. How will you train the next team member? Q: Do these solutions replace any existing tools/processes? A: In most deployments, large portions of logons scripts (VBscript, Jscript, KiXtart) can be replaced with graphical user interfaces from different UEM solutions. That should, in theory, generalize the knowledge required to support the user environment (replacing specialized knowledge). As you move more and more User related management in one tool other tools and processes might be obsolete. Will it replace all tools you currently use? Probably not, but that will differ for each organization. Q: Are all UEM vendors selling the same thing? A: Actually, no. It’s true many UEM vendors are first and foremost trying to resolve the issues with “Roaming” Profiles and often make logins faster. That being said, some UEM vendors aren’t trying to do anything like that at all. Version 16.03 6 juni 2016 Page 26 User Environment Management Comparison Whitepaper And still other UEM vendors are also selling add-ons to their core solutions and branching out to other areas as well. For instance, AppSense, RES, Citrix, VMware and Microsoft all have something that tries to replace in-box Roaming Profiles. But vendors like Unidesk and FSLogix are building solutions, which add (or hide) application layers, making applications interchangeable on an already-delivered desktop. And, to take a brief look at some other varying examples, AppSense, RES, Liquidware Labs, and PolicyPak Software are all taking very different approaches with their portfolios. AppSense is branching into Mobile Device Management, Data Access and User Installed Applications Unidesk layers applications on VDI images FSLogix hides applications pre-installed in golden images Liquidware Labs has branched out to User Installed Applications and application layering RES now delivers Workflow Automation, Data Access and an Service Store as well a security in their UEM solutions PolicyPak focuses on “what’s missing” in Microsoft’s portfolio and leverages customers existing Microsoft Group Policy or SCCM intrastructure and/or AGPM, Roaming Profiles or UE-V to make a complete solution. Q: Will Windows 10 change the game? A: When Windows 8 was released, Microsoft introduced some new roaming features with modern (aka Metro / Universal) applications. These settings can be roamed when users marry their on-premises accounts with a Windows SkyDrive account. Or, they can also be roamed with Microsoft’s product UE-V, discussed earlier. What about Windows 10? The main feature of Windows 10 is that it’s supposedly the “last” version of Windows, with in-place upgrades going forward. In this way, it becomes less important for UEM vendors to say that they are always on the bleeding edge of operating system compatibility, because eventually, nearly all systems will be on Windows 10. Therefore, UEM solutions will always be needed to fill the gap, to manage the desktop experience, and provide an awesome experience for end-users. Will Windows 10 be a game changer? I don’t think so, I think the game changer has been the development in storage that made virtual desktop environments more interesting from a cost perspective. Before storage was the bottleneck for many many disks where needed to offer any performance, today speed isn’t an issue and more organizations move to virtual desktops and of course Window 10. Q: Do these solutions really help with Application Virtualization, or is that just marketing? Version 16.03 6 juni 2016 Page 27 User Environment Management Comparison Whitepaper A: Yes. Various UEM solutions can actually manage user personalization data inside of “bubbles” or “sandboxes” where virtual applications reside. If you’re using Application Virtualization products like App-V or ThinApp, then ensure your UEM product works alongside it and can manage and/or roam user’s settings from within the bubbles. The market of application virtualization is shifting from virtualization to layering as Unidesk, Liquidware Labs Profile Unity and VMware Appvolumes offer application layering methods where applications are installed in reference machine and attached to desktops when needed. This is not virtualization and won’t isolate anything. It is a new way of offering departemental applications. 6.2 WHAT ELSE SHOULD I LOOK FOR IN A UEM TOOL? Remember that no UEM tool is right for everyone. As such, here are the key items to look for within all the tools in this guide, and see which one is right for you. User personalization and/or Application and Desktop Management This is typically the core of most UEM tools, but not all. The usual complement of features would be items like: • • • • • • • Configure the users look and feel of the desktop Assign drive mappings to network shares Assign printers Assign applications and corresponding settings Set, change or delete Registry settings Provision specific application settings, such as Microsoft Outlook profile(s) Provision Database connection settings (ODBC) Both in-box Microsoft’s Group Policy / Group Policy Preferences Preferences and, in general, 3rd party UEM solutions offer the possibility to make many of these configurations. The difference to Microsoft offering and the other UEM solution is that most others are offering contextawerness with all the features. Allowing you to controle when a printer is connected and when a setitngs is loaded versus it is loaded always at logon in every scenario. Whitelist / blacklist: Application Access Control As of Windows 7 Microsoft provides Applocker which can be used to allow or block user-context applications from running. New to Windows 10 is DeviceGuard, which can provide both user-mode and kernel-mode code integrity. That being said, some UEM solutions give the IT admin-enhanced ability to strictly determine what applications the user is allowed the use, and make that context aware. For instance, when working on a desktop on-premises the user is allowed to access and use the HRM data- Version 16.03 6 juni 2016 Page 28 User Environment Management Comparison Whitepaper base application. However, when accessing a desktop from a computer at home the HRM database application is not available. This functionality can be extended to time, location, device or with specific requirements on the computer the user uses. With security management, the User Environment Management solution provides and enforces access to applications. Some vendors offer the ability to deliver a functionality of an application or button in an application based on a user or group whereas other cannot do this other than per server/desktop. User Rights Management / Elevation Newer to some 3rd party UEM tools is the ability to sidestep UAC prompts. If you want to accelerate your walk away from admins on all workstations, consider a solution which enables you to specify where UAC prompts can be automatically run with admin rights. Resource Management Resource Management monitors individual users and/or processes for excessive usage and takes appropriate action when exceeding thresholds. In addition logging of these events can be very useful to determine system bottlenecks. This can help pack more users onto shared resources like VDI and RDS. License Management UEM solutions with license management enable you to configure the licensing model (per named user, per device/system, concurrent user or site) for each application. License management can provide insights into application usage. With monitoring application usage, organizations can better determine the amount of licenses needed. In some cases this means that many users don’t use specific applications and therefore savings are possible. Monitoring, Auditing and Reporting Make sure that the UEM solution you invest in has reporting that makes sense for your organization. Sometimes “too much” reporting means you wont use it at all. Likewise make sure you understand how to troubleshoot your UEM solution so when something goes wrong, you have a basic understanding of what to try to fix. “Just in time” / Layered Application Delivery / User-installed applications. Some UEM solutions can help you manage your number of gold images. They will enable you to layer applications on after the image is deployed. Others will help you hide applications after the image is deployed. Others will enable you to provide a method for users to install their own applications. Just-in-time delivery achieves several things: Version 16.03 6 juni 2016 Page 29 User Environment Management Comparison Whitepaper 1. It improves the user experience by allowing the user to get to their applications and data faster – the user is productive sooner. 2. IT has better control and view of the user environment because we are now having a clearer view of the user layer. 3. The business can now have more trust and confidence in their computing environment because it can be a more proactive environment. A way to think about why you might need Just-in-time delivery of applications is shown in Figure 3. Here you can see that the largest percentage of users uses the same number of applications (say, Microsoft Office.) But the more applications you have, the fewer number of your users actually utilize them. Figure 4: Applications in specific user context Source: Citrix You might also need the ability to enable users to install their own applications. This might sound odd within the context of User Environment Management – allowing users to make changes in a managed environment, but this will become part of the toolset for getting any application to the user in any context. 6.3 THE FUTURE OF UEM AND THE UEM WHITEPAPER One question I get on a regular basis is how do you see the future of this document? Will there be a next version alike? In the field we all see customers working with a versatile number of devices working while using resources in a cloud or on on-premises. These devices need to be managed. They have applications, data and settings that need central management. This is not different from the UEM management where we want central management for applications, data and settings for employees working on FAT clients or in a virtual environment. Merging of those two businesses is Version 16.03 6 juni 2016 Page 30 User Environment Management Comparison Whitepaper coming our way, there is no us and them anymore in the near future. UEM and EMM will merge into one, there is no way we can stop that. In the future, and the future is now, users will work on different devices expecting the same experience everywhere. UEM and EMM will need to work together offering that, one managing the device the other everything on the device. Look at what VMware is doing with UEM and Airwatch and Horizon View, look at what Microsoft is doing with Enterprise State Roaming and OneDrive. Citrix also has all the tools in hand with XenMobile, VDA agent and receiver to manage any device for any user. So to answer the question, I think the next version or at least one of the next versions will be a merge of the two worlds, a workspace management comparison whitepaper of some sort, perhaps a different name but one with both worlds combined. Version 16.03 6 juni 2016 Page 31 User Environment Management Comparison Whitepaper 7. SOLUTION OVERVIEW 7.1 INTRODUCTION To get an overview of the major players in the User Environment Management space, a number of solutions are explained in this chapter (sorted alphabetically by vendor). These solutions have a broad range of lighter functionality to “everything included” functionality. This time we’ve done things a bit different, before we played the teacher who would take out too much marketing fluff of what was deliverd. That was a huge task and actually not one I was looking forward to. One vendor might think I cut them short in favor of the other. So in this edition we let the vendors go free, they all got the freedom to write four pages about their product, their solution, their suite. I don’t mind what they write, they have four pages to convince you they are what you need. Some vendors are small some are Enterprises, some are part of bigger companies. All vendors have equall amount of pages to write on, we don’t judge we compare. I call this the UEM Vendor marketplace so mind the step, when you enter this chapter you leave the unbiased sector and you’re in the hand of marketing. Hope we see you again in chapter 8. Version 16.03 6 juni 2016 Page 32 User Environment Management Comparison Whitepaper 7.2 VENDOR MATRIX, WHO HAS FOCUS ON WHAT!? Version 16.03 Scense AppSense DesktopNow Citrix User Profile Management Liquidware Labs ProfileUnity Microsoft GPO, GPPrefs, USV, UE-v Norskale VUEM PolicyPak PolicyPak Suite RES ONE Workspace Tricerat Simplify Suite VMware Persona Management VMware User environment Management 6 juni 2016 Application Delivery Resource Management User Rights Management License Management Page 33 Monitor, Audit and Report Product Application Access Control Vendor Appixoft User Personalisation User Profile Mgmt There are quite some vendors in the “User Environment Management space”. The diagram below gives an overview of the focus of the various User Environment Management (UEM) software vendors. This diagram has nothing to do with the (possible) discussion which vendor provides the most and the best functionality and features. A complete overview of the features and functionality is available in chapter 6 – Feature Overview. User Environment Management Comparison Whitepaper 7.3 APPIXOFT Introduction AppiXoft enhances productivity for both end-users and administrators with the Scense UEM solution. Scense makes it easy for the administrator to provide great and consistent user experience. Scense WSM extends the workspace as we know today to a personalized and customized one. Universal access to IT resources, a context-aware user experience, location services, Live Profiles, software metering, reporting and dynamic printer management all ensure a high level of freedom and personalization for the user, while leaving control firmly in the hands of the IT department. Scense Workspace Management is a true One-Stop shop for solutions to your IT challenges of today and tomorrow. Solution Scense has been known for years as an easy to use, efficient workspace management solution for desktop environments with Pc's, laptops, terminal services and virtual desktops. Managing workspace environments with temporary staff, task workers and power users has never provided any challenges to Scense administrators. The latest release, Scense 10, continues to address the latest IT challenges and use cases in the same elegant way. Figure 5: Scense 10 Employee owned devices (BYOD, BYOC and CYOD) - Scense supports unmanaged devices without the need for a complex to manage and expensive data center for hosted desktops or terminal server sessions. Earlier versions of Scense have resulted in already tens of thousands of end users using their own laptop or PC to use corporate applications and resources. As opposed to the way previous Scense versions made it possible to do ‘on premises’ BYOD, Scense will be able to service BYOD remotely over the internet, including software distribution. The Scense location services and context awareness will address the IT managers’ most urgent concerns related to fear of data loss or leakage, compliancy rules and, last but not least, dirty PC’s. At the same time, Scense Live Profiles will ensure a consistent user experience for the end user by transferring personal application settings between corporate, managed and personal devices. Version 16.03 6 juni 2016 Page 34 User Environment Management Comparison Whitepaper Mobile users - Facilitating mobile users with access to corporate applications and data, while keeping IT regulations in place, has been a challenge for both administrators and end users for years. By delivering workspace management over the internet, end users are able to use corporate resources or add new applications as soon as internet is available. No more hassle with VPN connections or network cables. At the same time, IT is able to update machines of mobile end users and enforce IT policies in real time to mobile devices. A mobile user is no longer a risk to, but a friend of the IT department. Functionality Scense contains many unique, innovative, features that focus on user freedom, as well as control by and cost savings for the IT department. The new service oriented architecture of Scense extends the reach of these features outside the corporate network. Figure 6: Scense service oriented architecture Dynamic Application Delivery and Control - Applications and all related information, like user settings, policies, drive mappings or printers, are centrally managed and dynamically delivered, personalized and configured accordingly to the circumstances under which a user operates. Context aware access to these applications is provided in a secure, safe, efficient and elegant way. Conflict Free Provisioning - Scense “Conflict free Workspace Provisioning” is based on a technology called “Adaptive Installer: unique technology that enables real-time conflict isolation during the installation of a Windows application. In combination with the integration of all major application virtualization vendors, Scense always provides a 100% conflict free workspace, even on unmanaged PCs and without the need for a client hypervisor. Scense Live Profiles - A fire and forget solution for user profile management. Workspace and application related user settings are separately and centrally stored but transparently available regardless of the version and architecture of the Microsoft Windows operating system and accessible throughout the entire landscape of physical and virtual desktops, laptops, terminal server sessions, unmanaged PCs and natively installed and virtual applications. User Workspace Management as a Service - With the support of WCF, the Scense Engines run within Microsoft’s Internet Information Services. IIS's scalable and open architecture is ready Version 16.03 6 juni 2016 Page 35 User Environment Management Comparison Whitepaper to handle the most demanding tasks. The switch to WCF also results in a change of communication protocols, opening up new use scenarios. The full Scense service portfolio will be available over the internet, including application distribution. Real time Monitoring and auditing - Scense’s “Session Control Engine” provides the administrator with real time information and control over his desktop environment from machine startup until machine shutdown. Intervene directly, in real time when problems arise. Block applications instantly, provide the end user with understandable messages, install on the fly updates or applications and implement new policies when needed. Self-service and Remote Support - Because of Scense’s session control engine, administrators are empowered to proactively prevent desktop problems from happening. When issues do occur, users are encouraged to address these themselves. Repairing applications, refreshing workspaces or resetting parts of the user-profile are all available to all user types: locked down or not managed at all. Remote support functionality is available for the rare occasions that it is really needed. Software Metering and Reporting - Scense will track the usage of applications on all workstations and store this information in the central database from which clear and informative reports are generated by the Scense Report Viewer. Scense comes with several preset reports that show application usage in several ways. Reports can be added and modified. Having a firm grip on costs is very important for the IT manager. Excessive software costs coming from unnecessary renewals or over-compliance on expensive software can very easily stack up to large amounts. IT Managers who are looking for ways to reduce the IT expenses will quickly appreciate the insight Scense Software Metering will bring to them. Architecture Scense is easy to install, has minimal impact on your existing IT architecture and will support on premises and hosted environments. Version 16.03 6 juni 2016 Page 36 User Environment Management Comparison Whitepaper Figure 7: Scense Architecture The server elements of Scense are installed centrally in the company’s data center or hosted externally. Scense supports centralized and distributed multi-site implementations. Performance and availability can be guaranteed by the use of Network Load Balancing, Database mirroring and Scense’s own multi-site support mechanisms. Scense Database - The Scense database, containing all information and instructions related to applications, user settings, desktop configurations etcetera, is stored on an Oracle or MS SQL database server. Scense agents will contact this database, via the web service, to retrieve instructions during the clients’ user and computer sessions. Scense Server - At the heart of the Scense system are the Scense web services. These services are used by the Scense Executive component installed on the clients. The Scense Engine web service communicates tasks received from Scense Executive to the database engine. The Scense web services make full use of IIS’s scalability. Scense will use the communication protocol that best fits the use case in play: http(s), ftp(s) or a WCF communication channel. Scense File shares - The Scense file shares (App Store and Profile Store) store all the (virtual or physical) application packages that need to be available to end-users as well as multiple historical versions of the Windows profile per user and per application. As soon as an end-user requests an application that is not available yet, the application is installed or streamed and started or activated. The user profile for that application is injected during application startup and stored after an application is stopped. Version 16.03 6 juni 2016 Page 37 User Environment Management Comparison Whitepaper Every client managed by Scense needs the Scense client components. These can be installed on virtual or physical desktops, on Terminal Servers, on laptops or employee-owned devices that are not part of the Active Directory. Administrators can use the Scense update manager to install and update Scense clients in an unattended and reliable way. Scense Client and Scense Executive - The Scense Client and Scense Executive work together to execute the Scense instruction on the desktop and give feedback to the user. If the client software is unable to retrieve instructions from the Scense database (because the Scense Engine is not responding) a local database is used, the Local Cache. Licensing The Scense Workspace Management Solution is licensed per named user or per device Version 16.03 6 juni 2016 Page 38 User Environment Management Comparison Whitepaper 7.4 APPSENSE Introduction Founded in 1999, AppSense is the global leader in “Secure User Environment Management.” This comprehensive, highly scalable set of solutions enable IT teams to deliver an enhanced user experience with improved endpoint security across physical, virtual, and cloud based desktops. With over 3,600 customers worldwide, AppSense has now been deployed to over 9,000,000 endpoints. AppSense revenues exceed $100M and it employs around 400 employees across the globe. AppSense was recently acquired by LANDESK, who plan to allow AppSense products to continue to innovate independently and help them gain market share in user environment management. AppSense operates a channel-based model and works with both global and regional system integrators and partners to deliver its solutions. AppSense offers a number of services including pre and post sales consultancy packages and operates a 24/7 support desk. AppSense technologies are commonly sold as the DesktopNow Plus suite. DesktopNow Plus allows organizations to abstract the management and user elements away from the underlying platform, OS and application delivery mechanism. This is done to deliver a consistent yet secure productive workspace regardless of how the environment is being delivered. This layer of abstraction allows AppSense to create something known as “USER DNA.” The user’s DNA consists of both user personal settings and data in addition to policies and configurations placed on the user by IT. By managing and applying the USER DNA on demand, organizations can improve the user experience provide contextual security to windows endpoints without effecting productivity, and reduce costs associated with Windows migrations and. The DesktopNow Plus Suite is made up of the following components which whilst are commonly sold together, can be purchased independently to help organizations solve a particular use case. Environment Manager Application Manager Performance Manager DataNow Insight AppSense believes that user data is a key element of “User DNA”. However, this “UEM whitepaper” document will only discuss and compare the AppSense DesktopNow suite (Application Manager, Environment Manager and Performance Manager). In other words, Insight and DataNow technologies which make up the DesktopNow Plus suite are excluded from this report. For more information on DesktopNow Plus, Insight or DataNow, please visit our website at www.appsense.com, and also look out for the PQR “Enterprise File Sync and Share comparison whitepaper” document that discusses DataNow in more detail. Version 16.03 6 juni 2016 Page 39 User Environment Management Comparison Whitepaper Whilst AppSense agents and configurations can be deployed via any 3rd party tool (such as SCCM), AppSense also provides the AppSense Management Center at no addition cost to its customers. This is a highly scalable, 3-tier deployment and management platform that allows both deployment and auditing of DesktopNow. Many organizations already have multiple ways in which they deliver desktops and applications to users (Desktop, Datacenter, Cloud). This “hybrid Windows world” means that it is becoming more difficult to manage users across these multiple delivery platforms. The user requires an environment tailored and personalized to their needs to be productive. They want flexibility in what they can do and or change, but also expect their preferences to roam with them and carry forward onto new platforms. IT needs to lower the cost of managing the multiple environments, deliver a fast and predictable user experience, and monitor and secure the environment on behalf of the business. Delivering a secure yet productive Windows environment has historically been challenging. AppSense solves this challenge by… Version 16.03 Improving user experience o Extremely fast logon times o Complete removal of profile related support calls and profile bloat o Consistent user experience across multiple platforms o Consistent user experience during Windows migration o Ability to carry both user data and personal preferences from one environment to another. Securing the endpoint o Application control and whitelisting without the administrative overhead of creating lists of known or unknown executables o Protection against user-introduced and unknown executables o The ability to implement least privilege management and remove the need to provide users with local admin rights o Containerize user sessions by limiting both users and applications to only communication on certain addresses or ports. Reduction in Capital expenditure o Audit and control application execution based on user, device and connecting device to reduce application license costs o Manage CPU and memory to increase user density which decreases hardware and associated management costs. Reduction in Operational Costs o Reduction in 3rd line profile related support calls o Consolidate management of policies and management across multiple estates. o Reduction in both OS image management and application packaging o Reduction in the cost associated with remediation and break-fix o Reduced time and cost associated with any Windows migration and /or transformation project 6 juni 2016 Page 40 User Environment Management Comparison Whitepaper Functionality AppSense can take any Windows image no matter where it resides and upon machine startup and/or user logon, dynamically configure, personalize, secure and optimize the environment specific to the user and their context. This removes the need for logon scripts, Group Policies, Roaming profiles, whitelisting, admin rights, server isolation, multiple images, multiple application packages, offline files, and folder redirection. Profile Management – the key to desktop personalization AppSense replaces traditional user profile management with an on-demand personalization approach delivering a more secure and user friendly workspace. AppSense utilizes a 3-tier architecture for synchronizing user application profiles to an endpoint. User application profiles are stored in a SQL database and synchronized down to end points via an IIS server over HTTPS. Whilst a SMB share can be used, AppSense recommends this 3-tier approach as it provides a number of unique benefits. “Multiple Application Delivery Support” and “cross OS support” means that AppSense does not care how the application is delivered and on what desktop. User profile information can roam freely from locally installed applications on Windows 7 to a virtualized application on Windows 10 as an example. Roaming of this profile can be done in session without the need for the user to logoff and logon. AppSense supports both desktop and server operating systems, varying CPU architectures, and multiple desktop and application delivery technologies such as XenApp, XenDesktop, VMware Horizon View, RDSH, App-V, ThinApp, AppVolumes, Unidesk, SCCM and many others. Because profile data is being stored in SQL, snapshotting, rollback, last known good, and delta sync is possible out of the box. This allows both user self-service and web based support tools to easily manage user profile information and remediate where needed. The use of IIS and SQL also provides support options for mirroring, failover, scalability and DR. A contextual Rules Engine at the heart of all AppSense technologies means that the User DNA can be applied on user/user group, but extend to more contextual rules such as IP address, NetBIOS name, device type, date/time, etc. More recent versions of AppSense have also introduced new rules enabling file checks, registry checks, NetScaler policies, and both Citrix and Version 16.03 6 juni 2016 Page 41 User Environment Management Comparison Whitepaper VMware conditions. In addition to the rules engine, AppSense also utilizes a number of “triggers”. These triggers allow AppSense to check rules and process actions at other times in addition to logon and logoff. “Session connect”, “network connect”, “desktop unlock” and “process start” are just some of these triggers allowing more granular control over when profile management and configuration takes place. Unlike traditional roaming profiles which are loaded during logon and logoff, AppSense enables a just-in-time load of application settings instead of a just-in-case. Unlike a traditional logon script which executes in sequence, AppSense achieves ultra-fast logons thanks to its multithreaded and optimized agent which can cache and process configurations in parallel. AppSense also includes “pre”, “during” and “post” logon triggers, allowing admins to control when Windows desktop configuration takes place to further reduce logon times. DPI settings, for example can be set “pre desktop” but other items can be placed under the “post logon” trigger to allow tasks to run after the and not impact logon times. Another example could utilize the “unlock trigger” to allow printer mappings to be amended based on location when the user unlocks their desktop. Endpoint Security – Application control and User Rights Management (Least Privilege) Regardless of whether you are deploying a VDI image to developers or a physical laptop to a standard user, local administrative rights continue to cause organizations a challenge when it comes to providing a secure and productive environment. Windows endpoint security is a major focus for many organizations and removing local admin rights from the user based can have significant benefits when it comes to protecting Windows endpoints. The challenge is that too many Windows admin tasks (like changing the Date/Time) and applications still require local admin privileges. AppSense user rights management can elevate tasks and applications asneeded, allowing organizations to implement a least privilege management practice. In addition, application control and whitelisting is recommended to secure, control and audit which applications are being installed and run by users. AppSense utilizes a unique approach called Trusted Ownership™ Checking which removes the administrative overhead of whitelisting. Users can run executables which have been delivered by the business and 3rd party application deployment tools, but are protected against unknown and user-introduced executables. Application control also allows authorized applications to be controlled based on context, allowing AppSense to audit and control per device licensed applications and those applications which need to be controlled for compliance reasons. (See Gartner report on how AppSense helps “Ensure Applications Are Properly Licensed on VDI”, Nathan Hill & Stewart Buchanan, March 7th, 2016.) Additional features known as “Self Authorization” and “emergency change control” also allows users to self-install and self-authorize unknown applications when they are offline or away from the office. Lockdown The majority of applications at customer sites are non-Microsoft and do not come with Administrative Templates (ADM and ADMX) files. It is therefore not possible to block functionality based on rules. AppSense Environment Manager’s Lockdown technology enables administrators to strip out unwanted application and Operating System functionality depending on the user’s context, to reduce the complexity of the end user experience or for security purposes. For example, it is possible to hide or prevent access to specific application interface Version 16.03 6 juni 2016 Page 42 User Environment Management Comparison Whitepaper components such as buttons, menus and toolbar items, disable keyboard strokes such as Print Screen, Copy or Paste and prevent certain text from being entered into edit controls such as Web browser address bars. Performance Management Simultaneously reducing capital expenditure associated with user density and hardware in virtualized environment and improving user experience, AppSense has patented technology which manages and controls both CPU and Memory. By managing runaway CPU thread, scheduling CPU processes, optimizing DLL rebasing and trimming memory, AppSense can prevent CPU lock ups, reduce memory hungry applications and ensure a consistent quality of service yet increase user density. Solutions: Windows Migrations Endpoint security Profile Management Privileged Management File and Data Sync Performance Management User based analytics. Licensing Options AppSense User Virtualization software is typically licensed on a named user basis. A license is required for each managed user regardless of how many devices they use. Concurrent licensing is also available on request. Version 16.03 6 juni 2016 Page 43 User Environment Management Comparison Whitepaper 7.5 CITRIX Introduction Citrix’s User Environment Management solution is premised on the following technologies. Some are Citrix delivered capabilties and others are leveraging the inherent capabilties of Group Policy with Group Policy Preferences. Profile Management: Citrix UPM (User Profile Manager); UPM Cross-Platform Settings; Micrsoft’s UE-V (may be leveraged with UPM instead of Cross-Platform Settings feature) Data: ShareFile is the recommended method to manage user data such as documents across all devices and OS platforms. User Environment Settings: Microsoft GPP (a component GPO) is a very powerful method for managing all user environment settings (like printers, home drives, shortcuts etc). It is inherent within AD at no additional cost and includes item level targeting (and other methods) to highly customize and focus user environment settings. Apps Control/Licensing: XenApp with features like App Limits; Microsoft AppLocker adds an additional layer of app control and is also built into AD. Monitor, Audit, Report o UPM Log Parser, Troubleshooter and a PowerSehll based UPM best practice validation tool o Citrix Director logon and profile related statistics Profile Management (Citrix UPM) Citrix Profile management is intended as a user profile solution for XenApp, XenDesktop, and physical desktops. Profile management ensures that the user’s Windows’s profile is roamed effectively and reliably across all the user’s sessions and connections. Profile management is enabled through a profile optimization service that provides an easy, reliable way for managing these settings in Windows environments to ensure a consistent experience by maintaining a profile that follows the user. It auto-consolidates and optimizes user profiles to minimize management and storage requirements and requires minimal administration, support and infrastructure, while providing users with improved logon and logout. The most common challenges that impact the user experience and that administrators have to address when managing user profiles are: Version 16.03 Last writer wins – When users work on more than one physical or virtual device, their individual personal settings may be overwritten in a seemingly random manner when they log off. Profile bloat and logon speed – Profile bloat creates unwieldy growth in user profiles and resulting storage and management issues. Typically during logon Windows copies the user’s roaming profile over the network down to the local machine. Logon time is 6 juni 2016 Page 44 User Environment Management Comparison Whitepaper prolonged by the time it takes to transfer the whole profile over the network. The larger the profiles are and the more files they contain the slower the logons will be Benefits Citrix Profile Management provides fast logons, the most control over profile settings and addresses the last-write wins issues all from a central management point (GPOs). Citrix Profile Management provides more flexibility as of what needs to be included or excluded from a user profile. With Profile Management one can configure which registry keys in the HKCU hive needs to be ignored or included during logoff. Also files and directories can be configured so that they are exclude from a user profile. Profile Management addresses the last-write-wins issue. No longer is the complete user profile copied at logoff. Environments where users work within multiple sessions, i.e. one remote session and a local session, are always faced with the default Windows profile handling procedure where the user profile from the last session overrides all the other session user profiles. Profile Management also provides a streaming functionality. With profile streaming, users’ profiles are synchronized on the local computer only when they are needed. Registry entries are cached immediately, but files and folders are only cached when accessed by users or applications. Features Version 16.03 Profile streaming. Profile streaming completely negates the impact of the user’s profile size and its impact to logon and logoff. When profile streaming is leveraged, the profile load time for a profile whether it’s 100 MB or even 500 MB may remain in the 6-7 seconds load range. The profile data is then only copied down on demand when it’s actually needed or requested by a user action or application acitivity. Active write back. With Active Write Back, setitngs are written back to the user store as they occur instead of ewaiting for a logoff event to synchronize all the setitngs back. This both improves the reliability of capturing changed settings during a session but also prevents loss should a logoff event never occur. Profile migration allows you to migrate profiles to and from physical computers and virtual ones. Depending on the configuration settings, Profile management can copy existing roaming profiles and local Windows profiles to the user store. Existing mandatory profiles can be used as the basis for Citrix user profiles when saved as a template. Wildcard support. Allows the use of wildcard characters in file names for synchronization, inclusion, and exclusion lists. Logging. All entries in log files are identified with the user name, domain, and session id (where identifiable). Consistent user settings. Solves the "last-write-wins" problem that occurs when the last open session overwrites all of the profile data from previously closed sessions. 6 juni 2016 Page 45 User Environment Management Comparison Whitepaper Easy integration. Profile management can be integrated easily into existing deployments. No new infrastructure or changes to logon and logoff scripts are required. Active Directory-managed licensing. You can manage user entitlement using an Active Directory user group. Improved monitoring and reporting. Additional Performance Monitor counters and Citrix Director/EdgeSight integrations allow you to measure several new aspects of logon and logoff, providing improved benchmarking. Licensing Citrix Profile Manager is a feature of XenApp and XenDesktop (All Editions). Citrix licenses users are extended rights for UPM usage to the user's physical devices e.g. you have 1,000 XenApp Enterprise users - these users may install UPM on their Windows device(s) to also manage their profiles on those respective devices. There is no separate licensing options for UPM, only as a feature of XenApp and XenDesktop. Architecture You install the Profile Management agent on each computer whose profiles you want to manage. The installation is straight forward and available for x86 and x64 operating systems. All currently available operating systems are supported. The Profile Management runs as a service and can be configured using ini-files and/or centrally with the use of Microsoft Group Policy Object’s (GPO). ADM and ADMX templates are provided. Citrix Profile Management intercepts the default Windows user profile handling process. As soon as a Windows profile process starts, the Profile Management service kicks in and takes care of the necessary actions based on the GPO settings and INI settings. Version 16.03 6 juni 2016 Page 46 User Environment Management Comparison Whitepaper As with a Windows roaming profile a central location is needed to store the profile. This central location is called the User Store. Every user should have access to the user store, a network folder where profiles are stored centrally. Alternatively, profiles can be stored in users' home drive if preferred Figure 8: Citrix Profile Management overview Version 16.03 6 juni 2016 Page 47 User Environment Management Comparison Whitepaper 7.6 FSLOGIX: Introducing: FSLogix™ Office 365 Container for Citrix (Q2 2016) Best of Citrix Synergy 2015 Winner, Application and Desktop Virtualization, FSLogix addresses problems that have prevented wide scale adoption of the enterprise virtual workspace, simplifying administration and providing the best user experience for maximum productivity. FSLogix Apps dynamically provides per user application visibility, and allows applications to run at native speed with no need for sequencing and repackaging. FSLogix Profile Containers provide the industry's fastest logon time and allow applications like MS Outlook and Windows Search to run at speeds on par with local installations (finally!). Profile Containers enable large file access and true Cached Exchange Mode for Office 365 and other hosted email products, eliminate the logon storm impact of folder redirection, and significantly reduces load on network and server resources. New in Q2: Starting in Q2, 2016, a subset of Profile Containers will be sold as a separate dropin module, FSLogix™ Office 365 Container for Citrix, allowing administrators to take full advantage of our Office 365 support without having remove their existing profile solution. This new offering is the industry’s first drop-in solution that enables true Cached Exchange Mode for all virtual workspaces using Office 365, and real time search for virtual desktops. FSLogix™ Office 365 Container for Citrix installs in minutes, and allows enterprises to virtualize and persist OST files for users with XenApp, Terminal Services, and non-persistent or ‘pooled’ virtual desktop infrastructure. In addition to addressing email and search performance, critical settings for Office 365 such as OneDrive cache, Skype for Business global address list (GAL), and Windows search database will now persist between sessions. Version 16.03 6 juni 2016 Page 48 User Environment Management Comparison Whitepaper Image Masking Drives Revolutionary Innovation FSLogix Apps is a solution designed to enable IT Administrators to manage the emerging enterprise workspace, reducing the amount of hardware, time and labor required to support physical, virtual, and cloud desktops. FSLogix has developed a technique called Image Masking to create a single Unified Base Image that hides everything a logged in user should not see. This approach provides predictable and real-time access to applications and other workspace components like fonts, browser plugins, application and add-ons, easily addressing complex management problems like regional or departmental uniqueness of plugins – all from a single image. Image Masking uses advanced file system filtering which extends from the base image out to VHDs and other critical infrastructure areas. Image masking functions identically and transparently across a wide range of Windows-based platforms, simplifying the path from traditional to virtual environments, with a single, unified approach to image management, profile access, and application delivery. Installed as a software agent, FSLogix Apps seamlessly integrates with Windows centric desktop virtualization solutions from Microsoft, Citrix, VMware, and other industry leaders. Solution FSLogix Apps targets the following three solution areas: 1. Gold Image Consolidation: With Unified Base Images, enterprises can combine all applications, plus browser and app plugins, onto a single gold image, or greatly reduce their current number of images. Based on the image masking technique, users see only the applications, plugins and other components that they are licensed and authorized to see, simplifying application delivery across physical and virtualized Windows infrastructures. Every application, extension, font, etc., installed in the Unified Base Image is available in real time only to users authorized to access them. Unlike traditional application virtualization, Image Masking allows real-time application execution with natively installed applications, and no repackaging or sequencing. 2. User Profile Containerization: Profile Containers are local or remote volumes which eliminate the need for folder redirection or Roaming Profile optimization, allowing users to have a consistent, familiar, workspace experience with no limitations on the size of the profile or the size of any individual files. This approach solves the problem of large files (like OST’s and PST’s) in VDI and RDSH. Users and businesses increase productivity by having access to their unique work environment on any device, native application speeds and unbeatable logon times. Unlike other products, FSLogix provides this solution without the overhead of remote servers and additional configuration databases. Version 16.03 6 juni 2016 Page 49 User Environment Management Comparison Whitepaper FSLogix Profile Container Provides sub 15-second logons across all environments and locations for most enterprises Enables true Cached Exchange Mode, allowing Office 365 and internally managed email on virtual desktops to perform like locally installed Eliminates logon storms and recovers critical server and network infrastructure Consolidates profile contents to a single point of management for data retention Slow logon and application launch times are one of the top complaints in virtual desktops. Profile Containers are a new architectural approach to address this problem. Instead of placing all of the user’s files on a network share like in the redirected files approach, FSLogix encapsulates the entire profile –including the registry– in an in-guest container. This advanced filtering approach removes the maximum amount of resource utilization from processing user profile data and eliminates the need for legacy profile products and folder redirection. User profile performance is indistinguishable to local, yet administrators receive the benefits of centralized profiles, including easy off loading for data retention and compliance, with little or no ongoing administration. FSLogix Office 365 Container for Citrix (New in Q2, 2016) This component provides just the award winning Office 365 support from Profile Containers, in a simple, drop-in solution that works alongside your existing profile management system. True Cached Exchange Mode – with patent-pending OST containerization, Outlook on XenApp and XenDesktop can now function and perform as if locally installed on a high performance workstation. Users don’t need to compromise email and calendar performance to adopt strategic initiatives like virtual desktops. Version 16.03 6 juni 2016 Page 50 User Environment Management Comparison Whitepaper Real-Time Search – enables inbox and personal folder search to work as designed on XenDesktop, with maximum performance, and no workarounds requiring end-user training or unique behavior between physical and virtual environments. Plug and Play management – features a micro-application footprint with drop-in installation, GPO templates, simple rules based configuration, and the use of existing CIFS/SMB servers, improving the ROI of existing enterprise infrastructure. Infrastructure compatibility – works on all major virtual desktop and hosted email solutions, complimenting profile management products traditionally used in virtual workspace environments. Affordable pricing – with an expected retail list price of $10 per user, there’s no barrier to making email on virtual desktops enterprise class. FSLogix Apps, Application and Profile Containers, and FSLogix™ Office 365 Container for Citrix provide multi-platform support for all major Windows™ based virtual desktops, hosted email providers, and profile management products, turning virtual desktops into the enterprise class virtual workspace. 3. Just-in-Time Application Delivery: FSLogix supports an unlimited number of Application Containers for situations where combining all applications into a single image is not practical, for licensing or technical reasons. Application Containers may be either local or remote volume libraries. Combining Application Containers with Unified Base Image technology provides the flexibility to IT to use the optimal design approach for their unique requirements. When using Apps it is not necessary to sequence or package applications. All applications are installed natively using the application’s .msi install. From there, FSLogix Apps takes advantage of Active Directory to control the visibility of when any application is visible to individual users or groups. Installed as a software agent, Apps has key advantages over traditional application virtualization solutions: Version 16.03 Native application performance. Since applications run natively, performance is not impacted. Supports all Windows applications. Platforms can be traditional or virtual desktops. No need to sequence or package applications. Since applications run natively, there is no need to sequence or package. Consequently, all applications, including applications with device drivers, are supported (e.g. iTunes, Adobe Acrobat, Citrix and View clients). Compatible with existing application virtualization solutions. Complements existing solutions especially for applications that cannot be virtualized. Citrix XenApp/RDSH silo consolidation. A single image can contain all virtualized and remote applications for all users, eliminating the need for silos. Multiple application versions in the same image. Application versions reside in the image and are assigned to individual users. 6 juni 2016 Page 51 User Environment Management Comparison Whitepaper Time-to-deploy significantly reduced. Since no packaging is required, FSLogix Apps can be installed onto existing servers and systems for quick deployment. Simplified image management. A single image can contain all versions of all applications for all users. Easy license management. Applications can be revealed or removed in accordance with license requirements. Compatible with application management systems. Can be used with solutions from a variety of vendors, including Altiris Client Management Suite or Microsoft System Center. Licensing FSLogix is engineering the enterprise class virtual workspace. Request a fully functional trial version for your enterprise at www.fslogix.com Version 16.03 6 juni 2016 Page 52 User Environment Management Comparison Whitepaper 7.7 LIQUIDWARE LABS Introduction Liquidware Labs ProfileUnity provides sophisticated User Environment Management with advanced features that lead the industry. The company separately innovated FlexApp, a unique and robust application layering technology with a very high application compatibility rate – to date higher than other similar offerings on the market. While the two products can be licensed separately, Liquidware Labs is the only independent vendor to provide this unique combination of solutions from a single management console if desired. User Environment Management ProfileUnity has been on the market since 2005, therefore the product’s User Environment Management features are mature and comprehensive. Liquidware Labs acquired the solution and development team in 2009 and added significant development resources – focusing on new features, ease-of-use and innovation in the area of Application Rights Management and Application Delivery though User Environment Management. Today, ProfileUnity provides great value to organizations who are looking to replace roaming profiles and folder redirection or basic profile management tools. Not only does ProfileUnity address these needs with precision, the solution go beyond much of the competition, offering many advanced features that are not found in competing products. In some cases features that are built in to ProfileUnity are sold separately by competitors as additional add-on components. Below are the four core areas covered by ProfileUnity’s User Environment Management features: Version 16.03 Advanced Profile Management - ProfileUnity supports multiple versions of Microsoft Operating Systems therefore customers can leverage ProfileUnity to on-board physical desktop users to any new Windows desktop including virtual and server hosted desktops. Subsequent to moving to ProfileUnity the first time, profiles never have to be “migrated” as a ProfileUnity-managed profile can be made compatible across OS versions. Data outside of the profile in locations such as the HKLM area of the system registry and files anywhere within the system, can be made portable with ProfileUnity. Exclusive ProfileUnity Profile Disk technology can be leveraged for superior performance with large profiles and files including .PST and OST files. Advanced Policy Management – ProfileUnity can be leveraged to go beyond the limits of Microsoft Group Policies. ProfileUnity is much faster than similar Microsoft Group Policy actions mainly because the solution’s Active Directory (AD) lookups are far more efficient. ProfileUnity policies are also well documented which is useful when there is a change of desktop administrators or audit. Any profile or policy attribute can be assigned on a “Context-Aware” basis, including Microsoft AD attributes or on virtually any type of criteria including virtual client name/client address, or location. It is very important to note that ProfileUnity runs “as Admin” privileges and can therefore be used to secure (or lockdown) desktops or change machine level policy settings. Some 6 juni 2016 Page 53 User Environment Management Comparison Whitepaper UEM solutions do not “run as Admin” and so, are very limited in their policy management. Application Rights Management – While some UEM vendors charge separately for Application Rights Management, ProfileUnity includes these features as standard. Application Rights Management features enable administrators to manage application privileges or restrict applications (whitelist or blacklist) from running by using one or more context-aware settings. These features enable you to keep your desktops and network secure by limiting and elevating user rights per application and process. This allows you to keep your users as Standard Users and only elevate them to local Administrator when needed to perform a specific task/application. Advanced User Data Management – ProfileUnity includes robust folder redirection options that will not only redirect key folders for best practices, like My Document and the Desktop, but can also migrate user authored data in the background. This feature is particularly helpful when on-boarding users from legacy physical desktops to new physical or virtual desktops. Architecture Straight-forward, yet Highly Scalable Architecture ProfileUnity was designed by Desktop Administrators for Desktop Administrators. Since the beginning, the Liquidware Labs development team has always made it a priority to keep the product architecture straight-forward, easy to scale to tens of thousands, and highly available. There are no SQL clusters or other servers needed in the architecture therefore there are no hidden costs and no challenges when you scale to hundreds or thousands of users. For this reason, ProfileUnity is also very easy and quick to install and configure. A proof of concept is possible in under one hour. ProfileUnity’s architecture leverages existing network and Windows® infrastructure. The main agent is very lightweight (apx. 6mb) it can be cached down at logon to users’ desktops through an included Microsoft® Group Policy template. It can also be easily included in the base image of your desktops. Regardless, the agent files, configuration and related services are hosted on a network file share that is already highly available, scaled, and features read-only access for users. Because of these requirements, the best location for this file share is the Netlogon share on your domain controllers. The Netlogon location is not a hard requirement, an alternative file share path can be used. Version 16.03 6 juni 2016 Page 54 User Environment Management Comparison Whitepaper User Profiles are stored in the user’s standard replicated network file share location such as their “home drive.” Even if FlexApp application layering features are leveraged, virtual disks are also hosted on replicated storage paths. With this straightforward architecture, even if the ProfileUnity Management Console goes offline, ProfileUnity will continue to run on users’ desktops. If VMDK layers are chosen the architecture remains straightforward but the ProfileUnity Management console will be replicated to standard Windows Servers to ensure high-availability. Application Layering Liquidware Labs FlexApp Application Layering is an advanced technology, tightly integrated within the ProfileUnity User Environment Management platform. It is a fully integrated solution that leverages profile settings and policies but can also be implemented as a stand-alone solution. FlexApp enables Administrators to assign department-level applications to groups of users, and to, optionally, empower selected users to install their own applications. FlexApp complements application virtualization solutions that use isolation, such as Microsoft App-V and VMware ThinApp. FlexApp application layering is also compatible with many desktop virtualization platforms, including Citrix XenApp/XenDesktop and VMware Horizon View. These environments can be kept ultra-secure, by leveraging ProfileUnity's Application Rights Management features, which eliminates the need to make users full "Local Admins" in order to run or install applications. FlexApp technology supports Application Strategy design, Application Delivery approaches and Application Lifecycle Management. Delivering applications as layers requires a robust management and often times User Environment Management is very closely related. Because Liquidware Labs has integrating Application Layering with User Environment Management, the two solutions solves many needs in the area of Application Delivery including: Version 16.03 6 juni 2016 Page 55 User Environment Management Comparison Whitepaper Robust User Profile Availability – ProfileUnity makes a complete user profile available including the persona settings of virtualized and layered applications. Delivery of layered applications by user environment settings, including assignment per Active Directory Group, user, or one of over 300 combinations of context aware settings included with ProfileUnity. Application Restrictions – often applications may need to be layered to a shared environment such as an RDSH server. Application Rights Management in ProfileUnity allows for applications to be restricted by a context-aware setting and/or Active Directory criteria. Privilege Elevation – often applications may require local Administrator rights. ProfileUnity includes secure privilege elevation of select applications per user, group, or other context-aware setting. Registry modifications – often applications may need registry settings to be changed to function as desired. For example, run once dialog boxes may need to be repressed. ProfileUnity can merge, exclude, or replace registry keys to enhance the seamlessness of application delivery. Exclusive Features and Benefits of ProfileUnity Compared to other UEM solutions There are many reasons to choose ProfileUnity for your User Environment Management needs. Many Fortune 500 as well as industry-leading organizations have chosen the solution for one or more of the following compelling reasons: Fast user logins Robust and complete User Environment Management Straight-forward and highly –scalable architecture with no hidden costs Ease-of-use – short learning curve with no need to hire dedicated staff Proof-of-concept can be completed in under an hour INCLUDED Application Rights Management features License cost that is often half the price of competitors FlexApp Application Layering that leads the industry (optional licensing) Highly-available and highly resilient design Liquidware Labs Essentials Suite Liquidware Labs provides comprehensive User Environment Management, Application Layering and User Experience Monitoring in one convenient and extremely affordable suite known as Essentials, which includes ProfileUnity with FlexApp, Stratusphere UX, and Flex-IO. Thousands of customers have discovered that the following solutions are necessary to launch, scale and optimize next-generation desktops: User Environment Management with ProfileUnity One user profile across VDI, RDSH, DAAS & physical devices Up to 10X faster logons vs. roaming profiles or basic profile tools Version 16.03 6 juni 2016 Page 56 User Environment Management Comparison Whitepaper Application and User Right Management features Location/context-aware policy and profile capabilities Automated migration to Windows 7/8.x and Server 2008/2012r2 Application Layering with FlexApp Reduce the number of master desktop images to manage Deliver applications on demand Gain persistent user experience with non-persistent infrastructure Provision application volumes as VHD or VMDK Gain full compatibility with Citrix Provisioning Services and Machine Creation Services Visibility with Stratusphere UX - User-Experience Monitoring Diagnose true root cause and identify resource constraints Optimize resource utilization and performance Grow and scale virtual desktop environments with confidence IOPS Acceleration – Flex-IO Boost resources for an apx. 25,000 additional IOPS per virtual host Reduce latency by as much as 75% Compatible with persistent and non-persistent VDI environments A Flex-IO server license is provided upon request per Liquidware Labs customer Licensing and Contact Information ProfileUnity with FlexApp is available for $59 per named user. The Liquidware Labs Essentials Suite is available for $79 per named user. Concurrent licensing is available for Education and Healthcare customers. Other pricing configurations are available. Pricing subject to change at any time and may be regional. Liquidware Labs products are Citrix Ready, VMware-certified, and are available through a global network of partners. Visit www.LiquidwareLabs.com to learn more or download trial software. Contact [email protected] for more information. Version 16.03 6 juni 2016 Page 57 User Environment Management Comparison Whitepaper 7.8 NORSKALE Introduction Norskale believes that user experience, simplicity, and cost savings are the most important factors when choosing a workspace management platform. Norskale is an easy-to-use, 100% software solution that cuts the cost of desktops and applications, and delivers the best possible workspace performance—best application response times, accelerated logons, and a truly dynamic desktop—for any IT environment. The Norskale solution and its benefits have been proven in large and small environments alike, including in an 80K seat environment that reached peak performance and simplicity of management after less than a week in production. 56% of users say that application reactivity and instant login are the main benefit of a new desktop. Norskale ensure a constant high level of performance on any Windows device throughout the life of the device. Norskale delivers the functionality users need in only a few days, and offers a variety of licensing options for optimal flexibility and value. Norskale provides the best and most consistent user and end-user experience, while ensuring the lowest installation and management costs for all physical and virtual desktops and applications. Benefits Version 16.03 10-second logon and response times for all physical and virtual desktops and applications. Consistently fast application reactivity through constant CPU and RAM optimization. Optimized CPU and RAM utilization reduces each end-user’s footprint, and on the whole, a minimum of 20-25% more users can be accommodated per server. Intuitive central console for all user environment management. Because management is simple, administrators are fully trained in a single day, no matter their level of technical expertise. Scripts/GPO/GPPrefs can be eliminated in a few clicks. Brings full context awareness to all elements of the workspace, and provides all endusers with the custom resources and access they need. Optimizes and simplifies management of Citrix User Profile Management (UPM) and Microsoft Roaming Profiles (USV). Proprietary self-services and self-healing for end-user workspaces reduce support calls by up to $200 per user annually. Fully installed and configured in just a few days, even in the most complex environments. Granular and completely delegated admin console. Fast, easy, and complete reversibility; no uninstall impact or vendor lock-in. 6 juni 2016 Page 58 User Environment Management Comparison Whitepaper Functionality User Profile Management By replacing logon scripts and desktop lockdown Group Policy Objects (GPO), Norskale simplifies the job of the IT team by removing complexity from any new or existing implementation. The settings are intuitively designed for easy learning and are accessible through the central console. Norskale optimizes and centrally manages both Microsoft Roaming Profiles and Citrix User Profile Management (UPM) profiles. Both technologies are the de facto standard on SBC and “fat” environments. Norskale ensures profile integrity, while making sure that sizes and speed are always best in class, and in the process, greatly reduces the cost of high-end storage typically associated with profiles. User Personalization Scripts, GPO, and GPPrefs are messy and often result in slow desktop logon times. Norskale quickly eliminates these factors that cause complexity, and automates workspace management through a simple, intuitive console. Because Norskale is easy to manage and maintain with limited training required, there is no need to rely on a limited number of experts. The flexible Actions engine allows users to easily define every action needed to replace even the most complex login script, while ensuring top-notch performance. Application Access Control Norskale keeps the IT environment agile, and quickly identifies each end-user device type, and dynamically adjusts the workspace for optimal efficiency and security. In addition, by using dynamically configured software restriction policies through Whitelist and blacklist, Norskale protects the system as a whole. Norskale Transformer (patent-pending) further reduces project rollout times and deployment costs, by instantly converting a connected Windows terminal into virtual machine clients. This add-on module transforms the PC into a customizable and user-friendly kiosk interface, where end-users launch their virtual or hosted desktops and applications, and locally installed applications seamlessly, while the underlying Windows operating system remains fully locked down and secure. Resource Management By using innovative algorithms that change the way applications consume system resources, patent-pending Norskale technology extends the life of hardware, and delivers desktops and applications that are significantly faster and more costeffective. Norskale optimizes the way applications consume RAM, CPU, and Input/Output (I/O), reducing hardware requirements—including during application migration—by up to 70%. Virtual server sizing is based on average usage—not peak usage, delivering a better ROI and extending hardware life for a lower TCO. The non-intrusive Norskale technology monitors and analyzes user behavior in real time, optimizing the resource allocation process and the way applications run, to ensure that all users have the required amount of resources. In addition, Memory Management functionality analyzes and optimizes idle applications and processes, dynamically forcing them to release any extra memory they are not using. Version 16.03 6 juni 2016 Page 59 User Environment Management Comparison Whitepaper Norskale optimizes RAM, CPU, and Input/Output (I/O) in any pure or hybrid desktop environment, including physical and virtual desktops, and published desktops and applications. The results are fast application response times, and up to 70% more users per server. Application Delivery Norskale supports local and virtual applications, including Citrix XenApp, and Microsoft RDS and App-V. All application and resource types are delivered and controlled according to end-user context. Further, the Manage Applications feature allows end-users to access their context-available resources and self-create shortcuts in desired locations. Monitor, Audit and Report Through the Modeling Wizard and the Resultant Actions Viewer, administrators are able to view assigned actions applied to specific users, and data is provided to understand them; for example, the reason certain actions were discarded during an assignment process. Norskale also includes useful issue-tracking functionality with helpdesk features that save time and reduce support calls. For example, if an administrator needs to report an issue, he can instantly send screenshots and a detailed automated email report that includes data about the current environment to his Support Team. Architecture The Norskale architecture is highly scalable and resilient, allowing administrators to centrally manage large environments (80K+ users) without added complexity or high infrastructure costs. This non-intrusive and compatible technology ensures a smooth deployment in new and existing IT environments. It can be deployed within a few hours and managed on a daily basis, without the need for extensive training. Norskale is committed to streamlining product development on an ongoing basis to maintain minimum infrastructure requirements. All major client and server operating systems are supported, including native 64-bit support on all platforms (no emulation). A Low Footprint Agent is deployed in each user workspace to minimize network usage without impacting performance. The server itself is extremely compact and can withstand a very large user base within a single VM. Norskale natively supports mirroring and clustering on the SQL Server side, and the Broker and Workspace Agents are equipped with full offline capabilities. Licensing Norskale is licensed on a per-named-user basis. This license is perpetual. The maintenance contract includes support, and major and minor release access. Site licenses, rentals, and other licensing options are also available, so that each customer can benefit from a licensing model that meets their workspace and budget requirements. Version 16.03 6 juni 2016 Page 60 User Environment Management Comparison Whitepaper 7.9 POLICYPAK SOFTWARE Introduction PolicyPak delivers, enforces, locks down and remediates application, browser and operating system settings. For brevity, we will describe only the following three components: PolicyPak Application Settings Manager PolicyPak Browser Router and PolicyPak Admin Templates Manager There are two editions of PolicyPak: PolicyPak On-Premise Edition: for domain joined machines which are managed by Group Policy, SCCM or any on-premise management system. PolicyPak Cloud Edition: for domain joined or non-domain joined machines. PolicyPak Cloud edition has the special ability to deliver all real Microsoft Group Policy settings using the Internet (Video demo.) You can see where PolicyPak On-Premise and/or PolicyPak Cloud might be used in your company in the Figure below. Figure 9: PolicyPak has two suites which can be used separately or together All directives are created and edited in the familiar Group Policy environment. Computers and/or Users can be managed. Version 16.03 6 juni 2016 Page 61 User Environment Management Comparison Whitepaper Figure 2: PolicyPak directives are created, edited and (optionally) exported using the Group Policy editor interface All items can then be delivered using Group Policy, or optionally exported and delivered using SCCM (or any other on-premise delivery tool), or uploaded and delivered to PolicyPak Cloud. Quite simply: IT administrators don’t need to add any additional infrastructure or learn anything new. If they use Group Policy, SCCM or another on-premise delivery tool, then IT admins already know how to use PolicyPak and have everything they need in order to implement immediately. PolicyPak’s settings are simply delivered and enforced when a user roams to a new machine, uses a Terminal Server or Citrix machine or starts up a VDI machine. PolicyPak also works with virtualized applications (Microsoft App-V 4.6 or 5.0, VMware ThinApp 4 or 5, Symantec Workspace Virtualization, and others). All PolicyPak components and settings are “Context Aware” with the same “Item Level Targeting” editor that the Group Policy Preferences uses. This enables administrators to specify conditions as to when PolicyPak directives should apply to users or computers. The UI is exactly like Group Policy Preferences and requires no training for existing Group Policy administrators. (Video link to PolicyPak and Item Level Targeting). Note additionally that these Item-Level Targeting filters are active and available when PolicyPak directives are deployed via Group Policy, or when using your own systems management utility like SCCM, or when using PolicyPak cloud. For details on the other components in the suite, check out the PolicyPak Website, PolicyPak.com. PolicyPak Application Settings Manager PolicyPak can deliver and enforce settings for just about any application that stores their settings in the Registry, INI files, XML files, JS files, or any other formats (that Microsoft’s built-in Group Policy, Group Policy Preferences and ADM/ADMX templates simply cannot manage.) Version 16.03 6 juni 2016 Page 62 User Environment Management Comparison Whitepaper PolicyPak has pre-configured Paks to configure common applications like Firefox, Flash Player, Java JRE, Internet Explorer, Google Chrome, Acrobat Reader, Acrobat Pro, Skype for Business Client, AutoCad, Shockwave and over four hundred more. PolicyPak has special enhanced coverage for Firefox, Java, and Internet Explorer to manage nearly all aspects of these applications including deploying certificates, managing bookmarks, and preventing add-ons. Figure 3: PolicyPak Application Manager, some pre-defined Paks, and user interface PolicyPak Application Settings Manager also comes with the PolicyPak Design Studio which enables admins to quickly create their own Paks and manage their own in-house applications. (Video demo.) PolicyPak’s AppLock™ feature can gray out or hide many applications’ user interface settings as well as perform lockout on applications’ entire tabs. This prevents users from working around its recommended application settings within the UI. PolicyPak’s ACL Lockdown™ feature takes ownership of the Registry and/or file-system pieces from the user and application. In this way, settings are strictly guaranteed and cannot be worked around. PolicyPak keeps IT settings enforced even when the user is completely offline and disconnected from the network. See how PolicyPak Application Settings Manager can manage Internet Explorer, Firefox, Chrome, Java, and 400+ more applications (website with video demos.) PolicyPak Browser Router PolicyPak Browser Router manages your modern multiple-browser environment. Version 16.03 6 juni 2016 Page 63 User Environment Management Comparison Whitepaper Now you can automatically ensure that users launch the right browser for the right website. The result is that websites load in for the most compatible and secure browser as dictated by the IT team. Guide specific websites or website patterns to open in Internet Explorer, Firefox, Google Chrome or Edge (forthcoming) as well as Custom browsers for use with App-V or ThinApp for specific websites or patterns. Users never have to think; you’ve done all the thinking for them. Figure 4: PolicyPak Browser Router will open the right browser for the right website Creating a rule is point-and-click easy within the Group Policy editor to make a “route” between a website (or pattern) and the browser you want to open. Your rules are created and contained within the GPO. Additionally for Internet Explorer, you can dynamically set Compatibility and Enterprise modes like what is seen here. Version 16.03 6 juni 2016 Page 64 User Environment Management Comparison Whitepaper Figure 5: PolicyPak Browser Router User Interface within Group Policy PolicyPak Admin Templates Manager PolicyPak Admin Templates Manager enables you to consolidate Group Policy settings from many GPOs into only a few GPOs. So instead of having many, many GPOs, you can consolidate your GPOs and target which policy settings will occur under what specific conditions (Video Demo). Version 16.03 6 juni 2016 Page 65 User Environment Management Comparison Whitepaper Figure 6: PolicyPak Admin Templates Manager enables Collections of real ADMX and ADM Group Policy settings As a bonus, once policies are in a collection, Group Policy settings can be exported as XML files and be optionally: delivered using SCCM or other on-premise management tool (Video Demo) or delivered using PolicyPak Cloud (Video Demo). Licensing There are multiple components in the PolicyPak suites, and all components are included to customers in good standing. PolicyPak On-Premise is licensed per active (non-disabled) computer account in Active Directory plus any concurrent connections to Terminal Services or XenApp. PolicyPak on-premise can be licensed per OU, multiple OUs (parent-child, or unrelated OUs), or for an entire domain. PolicyPak Cloud is licensed in 100-license blocks. Licenses are consumed from a “pool” of licensed. Any desktop or laptop can consume a license. More about licensing PolicyPak can be found here. Version 16.03 6 juni 2016 Page 66 User Environment Management Comparison Whitepaper 7.10 RES Introduction RES was founded in 1999 by Bob Janssen while he was looking for a way to simplify the management of several users on a Microsoft Terminal Server. Today, RES is a leader in digital workspace technology, empowering IT to make digital workspaces secure, automated and people-centric for easy adoption and use. RES ONE Workspace allows IT to centrally manage and secure apps and services for the workforce across the most complex environments, including physical, virtual and cloud based solutions. RES ONE Workspace offers today’s digital workforce a better, more personal technology experience, while giving IT the control to increase security and reduce costs. Configuration and management are centralized, so IT can build workspaces that roam across devices, operating systems, delivery platforms and more. RES ONE Workspace can be combined with RES ONE Automation and RES ONE Service Store in the RES ONE Suite to fully empower the workforce through self-service and automated delivery and return of the right apps and services to each person’s secure digital workspace. Architecture Figure 10: RES ONE Workspace Architecture The RES ONE Workspace architecture is simple and capable of managing many network topologies, scalable and easy to install and maintain. None of the components require dedicated hardware. Version 16.03 6 juni 2016 Page 67 User Environment Management Comparison Whitepaper RES ONE Workspace Console: The RES ONE Workspace Console is the administration center of your workspace environment(s) and installed on a Windows-based platform. The management console is used to create the list of all possible desktop items that need to be composed and secured in a user workspace. The management console is intuitive by offering a workspace designer which helps you setup the environment. Workspace simulation lets you find out which configuration items are used to build a specific user workspace and offers a way to simulate the behavior of changes. In the management console, you can create role-based access to the console, and itis the main interface for the IT professional. RES ONE Workspace Datastore: The Datastore is the central database for your RES ONE Workspace environment. All computers in a RES ONE Workspace environment connect to this database. It runs on a central database server that you have installed prior to installing the RES ONE Workspace Console. The datastore can exist on any of the following database types: MS SQL (including Express and Azure), Oracle, DB2 and MySQL. RES ONE Workspace Relay Server (optional): The Relay Server component makes it possible to create a flexible architecture that consolidates and centralizes all RES ONE Workspace configuration data into one central database, while ensuring that dispersed Agents across multiple sites obtain configuration data efficiently and in a timely manner. Relay Servers are an optional infrastructure component and are used by many organizations in order to improve scalability, reduce network traffic and reduce the overall Datastore load. Relay Servers Cache information from the Datastore and pass it on to Agents or to other Relay Servers. Agents can be configured to contact the Datastore directly, or to use Relay Servers. The relay server can be installed on Windows, but RES also have a Linux version available on request. RES ONE Workspace Agent: An agent can be installed on Windows, Mac (OS X) or Linux. This can be a terminal Server, a workstation, laptop or a VDI desktop. Each Agent is available in the Management Console. All data is available in the local data cache, regardless of the availability of the Datastore. Each Agent presents the end user with a uniform workspace managed by the Workspace Composer. The RES ONE Workspace Composer builds the users workspace, regardless of the technology stack used. This includes all applications, registry, menu items, files, and settings to which the user is granted access. Linux and Mac OS X agents support the managed applications Security feature, providing the capability to allow or block executables in user sessions based on Authorized Files with MD5, SHA-1 and SHA-256 file hashes and must be connected to a RES ONE Workspace Relay Server. Version 16.03 6 juni 2016 Page 68 User Environment Management Comparison Whitepaper Functionality User Profile Management: Save and apply profile data per application (instead of loading the whole Windows profile during logon). Setup can be done by using built-in templates or can be discovered by running an application in learning mode. You can offer users to restore their own profile settings (per application) via self-service. Context Awareness: RES builds a workspace based on the current and actual user state such as location, time, device and identity of the user. Context can be based on AD group membership, location awareness by determining the strongest wireless access point and device type. Context awareness can be used to deliver the right services to the right user at the right time and location. Security: Restricting access to applications, data, network, websites and removable storage based on context. Enabling user rights management by elevating privileges on applications instead of elevating the user to local administrator. Rendering all local drives read-only by a simple check-box instead of cumbersome policies and NTFS configurations. File access based on hash (MD5, SHA-1 and SHA-256) is a recent addition to RES ONE Workspace. For organizations that have strict security and compliance initiatives, a RES ONE Workspace installation can be configured for FIPS compliance for superior security and encryption across components and the way they communicate with each other. Desktop and Application Management: Enables object oriented management of what IT offers the end user. This includes items such as printers, applications, data sources, e-mail templates, folder redirection and synchronization. Giving the user access only to the items he/she needs to be productive from a standard desktop. Integration: Simplifies management, access and configuration of application virtualization technologies, publishing technologies and application deployment technologies from a single console. Compliance: Supporting software license and asset management by enabling application license metering and enforcement in hybrid desktop environments. Providing detailed audit information and insight on configuration changes and enforcing change management through granular role based access control. Reporting & Analysis: Providing first line support with analysis that helps them perform advanced real-time troubleshooting to resolve issues quicker as well as providing detailed insight in workspace usage including applications, sessions and websites. RES Viewpoint is used as a companion to RES ONE Workspace, and provides customers a wealth of information about the as-is environment prior to deployment of RES ONE Workspace or any other change to the desktop. Because it is based on Microsoft Azure, there are no infrastructure requirements at all. Session Performance: Ensure a stable and resource efficient end user experience by enabling performance optimization mechanisms. Version 16.03 6 juni 2016 Page 69 User Environment Management Comparison Whitepaper Desktop Transformation: Transform any existing desktop infrastructure into managed user workspaces with an intuitive wizard. Desktop transformation allows IT professionals to use current user state data to design the user workspace and implement step-by-step only applying the necessary configuration. Simple and Efficient Management: Simplify management of the desired user state by providing video tutorials, setup wizards and instant reporting of configuration. Building-blocks enable easy and quick move of any configuration between environments such as development, test & verification and production. Workspace Simulation allow the IT administrator to test impact of infrastructure changes before actual implementation. Delegation of Control: Role-based access to specific configuration parts in the console. Reverse Seamless Technology: Deliver local application and data experiences to remote, hosted virtual desktops. Benefits RES ONE Workspace offers enterprises a variety of benefits around increased productivity, reduced costs and improved security and compliance. Increased Productivity: The ability to mask routine technology changes and upgrades and limit workforce disruption is a major advantage of RES ONE Workspace. Migrations become zero impact, and day-in and day-out, users have an optimized workspace that dynamically adapts based on context. RES enables a mobile workforce. Lower Cost of IT Operations: By centralizing management of users across all virtual and physical delivery platforms, IT no only saves time, but also maximizes the investment made in virtual desktop technology. RES has also been proven to reduce service desk tickets related the user experience by delivering an optimal workspace. Additionally, enterprises are able to better control license use by having full visibility into the usage of apps and services in the workspace, eliminating costly finds for over-usage. Greater Security and Compliance: The need to protect and organization and mitigate risks has never been higher. RES allows IT teams to define and enforce granular context aware access policies to ensure that access is safe and compliant. Application and web security features protect the organization from cybersecurity threats and other risks at the user level, giving enterprises an added layer of security. In addition to these benefits, RES ONE Workspace provides the foundation that organizations need to provide the most comprehensive digital workspace experience to employees. RES customers can leverage other solutions in the RES ONE Suite to power their workspace with automation, predictable service delivery and return and self-service capabilities. Combined, IT has the tools needed to design, build, deliver and control every Version 16.03 6 juni 2016 Page 70 User Environment Management Comparison Whitepaper aspect of the worker’s business journey with intuitive self-service and security that adapt at each step along the way. Licensing RES ONE Workspace can be purchased using either the concurrent or named user licensing model. RES ONE Workspace consists of three modules and customers can purchase any combination of the modules to match their needs: • • • Dynamic Configuration - delivers a context aware user workspace independent from the infrastructure; Delegation and Compliance – Diagnostic, troubleshooting and the integration with other technologies; Adaptive Security – delivers a context aware security layer that is created around the workspace. References Website: Youtube channel: Admin guide: Version 16.03 http://www.res.com https://www.youtube.com/user/RESSoftware/videos https://support.ressoftware.com/WorkspaceAdminGuide2015/ 6 juni 2016 Page 71 User Environment Management Comparison Whitepaper 7.11 TRICERAT Introduction TriCerat has been helping organizations ranging from 20 users to multi-national corporations address the complexities of virtual environments since 1997. Although the company started with ScrewDrivers, a product for solving the printing headache in server based computing environments; the portfolio has grown to address all of the most common challenges in managing physical and virtual desktop estates. The Simplify Suite consists of a set of solutions that enable an administrator to easily manage all main aspects of the user desktop environment from one pane of glass, while overcoming the typical complexities found in IT environments today. These solutions include enterprise profile management, application access restriction, desktop customisation, server stability and a true print management solution. The triCerat approach remains true to its ScrewDrivers beginnings, namely to create a fully scalable solution that gives the right level of functionality to solve the fundamental issues without adding to the management complexity elsewhere. The result is that not only do common problem areas get addressed, but triCerat's approach promises that even the most junior of administrators can quickly get to grips with the console, ensuring customers can quickly adapt their IT environment to meet the changing needs of their users. As well as the enterprise tools that form the Simplify Suite, triCerat offers a set of point solutions that offer a quick-fix to issues like slow logons from roaming profiles and the challenge of scanning in a server based computing environment. Functionality TriCerat’s Simplify Suite includes the following solutions: PROFILE MANAGEMENT TriCerat’s hybrid profile solution solves all common profile issues like slow logon times, profile corruption and bloat, while overcoming v1/v2 and 32-/64-bit profile issues encountered when migrating to a new OS or server platform. Registry keys are migrated into the Simplify database and can be assigned rules (Save/Restore, Set, and Delete) in order to restrict profile bloat and ensure a fully personalized user profile. A corrupted registry setting can be replaced with the last known good version that was saved on the database. Folder redirection, drive mapping, drive restrictions, and Windows Explorer restrictions can be quickly and easily configured in the console. PRINT MANAGEMENT TriCerat’s driverless printing solutions addresses slow printing, network bandwidth spikes, and spooler crashes. The proprietary TMF print format achieves an average of 90% compression rates and the print job streaming minimizes stress on the network. This solution is superior to Version 16.03 6 juni 2016 Page 72 User Environment Management Comparison Whitepaper universal print drivers because it is compatible with 100% of printers, recognizes advanced printer functionality, and eliminates the need to install printer drivers on the server. The Active Directory integration enables proximity printing and through a print server fully supports printing to any device (including thin clients, PDAs etc.). DESKTOP SECURITY & CUSTOMIZATION The administrator is given the tools to quickly and easily create a lock down on all aspects of the user environment including the desktop, start menu, and taskbar functionality. This includes the triShell OS shell replacement that offers a similar experience across access devices and is more secure and less memory intensive than the explorer.exe shell. APPLICATION CONTROL TriCerat uses trusted and banned lists to together with secure application signatures to control what applications can be accessed by the user and ensure licensing compliance. Application access is also location aware, allowing an application to launch depending on whether the user is in the office or not. SYSTEM PERFORMANCE TriCerat’s system performance component ensures system stability and maximizes the number of quality user sessions on the server by controlling CPU and memory resources. This is particularly suited for controlling legacy and rogue applications that hoard CPU and affect all users on the server. Rules are set to first lower the priority and then clamp down CPU on the application and user level until normal levels return. Benefits TriCerat’s approach to user environment management is not only to cut the costs of managing an enterprise IT environment, but to do so at a level of complexity that even a junior administrator on the helpdesk could manage. TriCerat will allow all aspects of the user environment to be controlled and altered based on the changing needs of users from the straightforward, powerful Simplify Console. TriCerat offers a superior method to environment management in the following ways: • • Version 16.03 Centralized management for controlling whole user environments. One Active Directory querying management console is shared between all solutions that comprise the Simplify Suite. This works with any combination of virtual or physical desktop environments, giving administrators an accurate picture of what the user sees on their desktop. Group Policy and script-free management. The Simplify Suite reduces the reliance on policies and scripts for both setting up and managing the user environment. This reduces the time needed for new environment configurations and allows administrators to quickly apply changes required by the user without the risk of undermining baseline policy. 6 juni 2016 Page 73 User Environment Management Comparison Whitepaper • • • • Full personalization for the user and full control for the administrator. User acceptance of a new environment is ensured by allowing users to personalize their work environment while administers retain full control. This includes assigning rules to what parts of the registry are to be save/restored, set, or deleted. Solves main migration headaches when changing OS, server bit platform, access devices, and virtualization technology. Migrations throw up unexpected hurdles that affect profiles, printing and the user desktop experience. TriCerat addresses all of these issues in advance and includes migration tools for bringing existing user settings into a new environment. Reduces helpdesk costs by speeding resolution times. TriCerat overcomes most of the common problems associated with managing the user environment in real-time, reflecting changes immediately on the desktop without requiring the user to restart their machine. Doing so allows administrators to assist employees in getting back to work quickly. Increased security of the user desktop minimizes threats. Full control of the user desktop allows administrators to close all potential security holes that could cause problems for the user. Should users need further flexibility, changes are simply made in the console. Architecture Simplify Suite modules need to be installed on every machine (workstation, Terminal Server, virtual desktop) that requires Simplify Suite functionality. The installation of all Simplify Suite modules comes under 100MB and can be fully automated. The Simplify database is built on a Microsoft SQL database, which is built on Microsoft standards and thus supports SQL clustering and maintenance plans for backup and replication. Figure 11: TriCerat Simplify Suite architecture Version 16.03 6 juni 2016 Page 74 User Environment Management Comparison Whitepaper Licensing & Pricing TriCerat products are sold on a per user or per server basis. Product modules that make up the Simplify Suite (including Simplify Profiles, Simplify Printing, Simplify Lockdown, and Simplify Stability) can be sold alone or as part of the Simplify Suite. During the time this document was going to press, triCerat was exploring a SPLA model for managed services partners 7.12 UNIDESK Note from the author: Unidesk is an increasingly popular desktop provisioning, application delivery, and management platform in the Server Hosted Desktop (VDI) space. Unidesk’s layering technology is often used in place of VMware Linked Clones, View Composer, View Persona, and VMware ThinApp by VMware View customers and in place of Citrix Provisioning Server, Citrix Machine Creation Services, Citrix XenApp, Microsoft App-V, Citrix Personal vDisk, and Citrix Profile Management by Citrix XenDesktop customers. Unidesk isn’t a User Environment Management solution as such, we believe it is wise to add Unidesk to this whitepaper and inform you about the functionality and potential. Introduction Unidesk is a provisioning and application delivery solution for virtual desktops hosted on VMware vSphere. Customers use the Unidesk layering platform in combination with VMware View, Citrix XenDesktop, and other brokers when: They have a large number of applications that cannot be easily virtualized; They want to keep the number of gold images to 1 to simplify Windows OS patching and updates; They have users who require persistent desktops to keep user-installed applications and other customizations. They want to reduce the amount of storage needed for VDI up to 85%. Benefits Cost Savings Version 16.03 Reduce storage requirements: Unidesk shares single layers of the OS and applications across many virtual desktops and thin provisions user space to reduce SAN and NAS capacity requirements up to 85% for both persistent and non-persistent desktops. Reduce OpEx: Customers report that with Unidesk, they can layer almost any application in less than 30 minutes, compared to the days it may require to virtualize the same applications. Also, most Unidesk customers have only 1 gold image for all desktops, compared to the 1 gold image for every 50-100 desktops required by nonUnidesk VDI implementations. The savings in Windows patching and application delivery time alone enables Unidesk to pay for itself in less then 6 months. Reduce desktop support costs. Unidesk enables Level 1 service desk personnel to repair damaged virtual desktops simply by rolling the desktop’s User layer back to a previous snapshot. Bad registry keys and DLLs, malware, viruses, and other problems 6 juni 2016 Page 75 User Environment Management Comparison Whitepaper can be fixed with a simple reboot, without having to reimage the desktop or lose all user customizations. IT Benefits Minimize complexity. Unidesk's interface, "layer cake" approach to creating desktops and full feature set means fewer point tools to learn. Simplify application packaging and delivery. Traditional application virtualization requires time and business knowledge to deal with the compatibility issues caused by process isolation, and there are many applications that cannot be virtualized. Unidesk can package any application in a fraction of the time. Just install the app the way you would on a physical PC, and it can be immediately assigned to any number of desktops. Reduce patching time and costs. With only 1 gold image layer as the basis for all desktops, Unidesk can deliver a virtually unlimited number of Windows hot fixes and updates to all desktops in 1 day, without the patch failure rates typical of agent-based PC management approaches. End User Benefits Full, rich desktop. Unidesk provides a consistently personal desktop experience that ensures virtual desktop acceptance and enhances job satisfaction by making sure user data, profile settings, and user-installed applications survive logouts, reboots, patches, and upgrades. Quickly receive new applications, updates, and patches from IT. Unidesk accelerates delivery of new revenue-generating applications and patches needed for security and compliance without time-consuming install procedures, scripting, or risk of patch failure. Repair "broken" desktops instantly. End users don’t have to deal with lengthy desktop downtime, or worry that personal settings and data will survive an attempted repair. Unidesk can roll back user-installed applications or surgically repair specific applications, leaving all user data intact. Functionality Simpler, More Powerful Application Delivery Unidesk can package and deliver applications in a fraction of the time required to virtualize the same applications. Unidesk can also deliver antivirus, printer/scanner drivers, Office plug-ins, and the many other applications that traditional application virtualization cannot. With Unidesk layers, IT administrators can package or patch apps once, then assign them to any or Version 16.03 6 juni 2016 Page 76 User Environment Management Comparison Whitepaper all desktops. If a mistake is made, they can simply roll the layer back to a previous version to undo the problem. Single Image OS Management With all applications layered separately, all desktops can be created from a single, pristine Microsoft Windows gold OS layer. Administrators can patch the gold once, and all desktops get updated. End users won't lose user customizations like they will with cloning solutions. Also, the patch failures common with agent-based PC configuration tools are no longer an issue because of how Unidesk composites the new OS layer into every desktop using file system and Registry virtualization. 100% Persistent Personalization Profile management only captures user customizations that can be stored in a profile. Unidesk’s storage-efficient persistent desktops capture everything - including profile settings, data, and user-installed applications – and eliminate the need for profile management in most cases. 85% Less Storage By sharing the same OS and application layers across many desktops and thin provisioning user layers, Unidesk cuts the VDI storage footprint up to 85% for both persistent and non-persistent desktops. Broker Integration Unidesk brokering connectors for VMware View and Citrix XenDesktop enable Unidesk desktops to be provisioned directly into View and XenDesktop pools and catalogs.Web-Based Management Interface Unidesk’s elegant management interface makes it easy for administrators to provision, update, manage, and report on their entire VDI estate. The web-based management console enables administrators to dynamically assemble desktops from a pick list of independently packaged and versioned Microsoft Windows OS and application layers. Version 16.03 6 juni 2016 Page 77 User Environment Management Comparison Whitepaper Figure 12: Unidesk web-based management Architecture Unidesk is implemented as a system of “scale-out” virtual appliances that run on existing VMware infrastructure. The Unidesk Management Appliance hosts the Web-based management application that is used by administrators to provision, patch, assign and report on virtual desktops. Only one Management Appliance is typically needed for a VDI environment. The Management Appliance also manages Unidesk policy and configuration, including information about Unidesk layers, desktops and users. The Management Appliance can be deployed on any host in the virtual infrastructure as long as it can communicate over TCP/IP with Unidesk CachePoint appliances and VMware vCenter Server. The first Unidesk CachePoint appliance deployed takes on the special role of Master CachePoint, storing all Operating System (OS) and Application layers. In production VDI environments, a dediFigure 13: Unidesk architecture cated Master CachePoint appliance should be deployed on a Version 16.03 6 juni 2016 Page 78 User Environment Management Comparison Whitepaper separate host server to maximize virtual desktop performance. The Master CachePoint automatically replicates OS and Application layers to other secondary CachePoints, where the layers are cached as VMDKs. Layers are replicated only if they are needed by at least one of the desktops associated with a CachePoint. Each secondary CachePoint caches the OS, Application and Personalization layers for the desktops it hosts. The desktops are created with a small boot image in a VMDK file. At boot, this disk supplies enough of the desktop operating system to load any drivers or early start services required prior to the Unidesk filesystem drivers loading. Once the Unidesk drivers are loaded, the desktop establishes connectivity to the correct OS, Application and Personalization layers, stored as VMDKs in a directory structure under the CachePoint. All desktops assigned to a CachePoint share the same OS and Application layers for dramatic storage savings. The Personalization layer for each desktop is then combined on top of the IT-controlled OS and App layers. The virtual infrastructure and connection broker see Unidesk desktops as standard virtual machines. Licensing Unidesk is based on a perpetual licensing model, with annual Complete Care service (support and maintenance) mandatory for all purchases. The licensing unit is a Managed Desktop, defined as the number of virtual desktops created, updated, and managed by Unidesk. This may include persistent desktops (assigned to specific users, retain state, and used only by those users), non-persistent (don’t retain state, shared by many users e.g. labs), and non-concurrent (may or may not retain state, shared by multiple users, but not at same time, e.g. shift workers). Customers may purchase 3 years of Complete Care Service upfront in return for a discounted price. Unidesk also plans to add term/subscription licensing options for service providers and site/enterprise licensing options for large opportunities. Version 16.03 6 juni 2016 Page 79 User Environment Management Comparison Whitepaper 7.13 VMWARE USER ENVIRONMENT MANAGER Introduction VMware User Environment Manager™ offers personalization and dynamic policy configuration across any virtual, physical and cloud-based Windows desktop environment. User Environment Manager simplifies end-user profile management by providing organizations with a single, light-weight and scalable solution that leverages existing infrastructure. It accelerates time-todesktop and time-to-application by replacing bloated roaming profiles and unmaintainable, complex logon scripts. It maps environmental settings (such as networks and printers), and dynamically applies end-user security policies and personalizations. Utilizing the Horizon Cloud Manager, this focused, powerful and scalable solution is engineered to deliver workplace productivity while driving down the cost of day-to-day desktop support and operations. VMware User Environment Manager is the successor of Immidio Flex Profiles – the most successful Windows profile management solution, with more than 2 million users worldwide. Immidio developed VMware User Environment Manager in close collaboration with its large installed base. VMware User Environment Manager offers a desktop that adjusts to the actual situation of the end user, providing access to the IT resources that are required, based on a user’s role, device and location. VMware User Environment Manager consists of five functional areas: Application Configuration Management, User Environment settings, Personalization, Application Migration and Dynamic Configuration. VMware differentiates its UEM solution from those from other vendors by focusing on the core requirements needed to deliver a positive user experience, in a light-weight, simple to administer package. VMware User Environment Manager positively impacts end-user experience and productivity, while leveraging existing IT infrastructure, resulting in a very attractive ROI. Benefits IT benefits: “Centralized and simplified user environment management” Engineered to be simple yet powerful, scalable and fast; User Environment Manager demonstrates value almost immediately Accelerates upgrades, migrations, and on-boarding with easy to maintain policies and tools. Replaces unmaintainable, complex GPO and Logon Scripts with dynamic policy Reduces helpdesk incidents by replacing bloated, corruptible Roaming Profiles with a more efficient and scalable solution End-User benefits: “Consistent and personalized experience across devices and locations” Version 16.03 Maintain personalized settings across multiple devices, even non-persistent VDI sessions 6 juni 2016 Page 80 User Environment Management Comparison Whitepaper Experience auto-mapping printers and networks as you roam between locations Enjoy speedy logon times and faster time-to- application, with minimal downtime Business benefits: “Enterprise-grade user management with low up-front investment” Scale out services with a single solution that supports virtual, physical, and cloudhosted environments Drive down user management costs without adding additional infrastructure Respond to changing business dynamics with the ability to quickly add/remove profile and personalization services Architecture In order to control costs, VMware User Environment Manager leverages a company’s existing Windows infrastructure. Unlike other solutions, it does not require additional components, such as a databases or web servers. VMware User Environment Manager also uses commonly used mechanisms for deployment (MSI) and configuration (Active Directory Group Policy) of the client agent. This strategy makes it possible to scale up alongside the scaling of the Windows infrastructure and also, to support off-line usage of managed Windows devices. Figure 14: Architecture Version 16.03 6 juni 2016 Page 81 User Environment Management Comparison Whitepaper If a customer has deployed the optional Horizon Cloud Manager, then daily maintenance tasks can performed using this unified single console. Functionality Application Configuration Management Application Configuration Management enables you to configure the initial settings of an application without having to rely on the defaults of the application. "Predefined Settings" can be used as one-time defaults or can be set each time the application starts (guaranteeing that application settings are always in the exact same state). A hybrid approach is also possible: define which application settings can be personalized and which should always remain at their initial values, allowing partial personalization. Using Application Profiler, you can capture predefined settings for an application by simple running the application on a reference system (monitored by Application Profiler) and then configuring as desired. VMware User Environment Manager also provides the capability to manage certain User Environment settings when an application is launched, like mapping drives and printers, applying custom files, folders and registry settings, and running custom tasks. Additionally, central policy controlled black and whitelists govern which applications a user has access to at any given time. Application Configuration benefits: • • • • • • Decouple user settings from native and virtual applications Maintain a single application package while deploying it in multiple configurations Ensure compliance with company standards Prevent users from misconfiguring error-prone applications Only consume network resources (e.g. printers or network drives) when necessary Manage all application configuration elements on the application level User Environment settings VMware User Environment Manager enables you to centrally manage a variety of User Environment settings which users need to perform their daily tasks. The following User Environment settings are supported: • • • • • • • Version 16.03 Drive and printer mappings Environment variables Application shortcuts and file type associations Custom files, folders and registry settings Logon and logoff tasks Display language Hide drives 6 juni 2016 Page 82 User Environment Management Comparison Whitepaper • • Triggered tasks Policy settings User Environment settings benefits: • • • • Reduce complex scripting and prevent configuration errors Reduce use of dispersed Group Policy preferences Manage application shortcuts and file type associations for applications virtualized with Microsoft App-V (MDOP), Novell ZAV and VMware ThinApp Centrally managed from a single management console Personalization VMware User Environment Manager Personalization decouples and segments user-specific desktop and application settings from the Windows operating system, making them available across multiple devices, Windows versions and application instances. Decoupled personalization is independent from the traditional Windows user profiles and allows for easy introduction and management of virtualization technologies and application delivery mechanisms. Personalization integrates seamlessly with natively installed and virtualized applications, providing users with a consistent user experience across any Windows platform – physical, virtual or remote. Additionally, it enables painless upgrades, like migrating from Windows XP to Windows 7 or Windows 10, or migrating from App-V 4 to App-V 5. Additionally, VMware User Environment Manager makes it easier for admins to make a users’ personal data available on multiple devices. Personalization benefits: Much shorter logon and logoff times Reset user settings per application rather than deleting the complete user profile Unique cleanup mechanism for existing roaming and local user profiles Manage personalization of applications virtualized with Microsoft App-V (MDOP) A single "user profile" per user across multiple Windows platforms Application Migration VMware User Environment Manager can "roam" personal application settings of users from one operating system to another (e.g. from Windows XP to Windows 7), as long as the application is storing its configuration in the same location of the user profile (i.e. uses the same registry and AppData locations). In any application version upgrade (e.g. Office 2007 to Office 2016), either as part of an operating system migration or as part of the application’s lifecycle management, VMware personalization can manage the personal application settings. Application Migration benefits: • • Version 16.03 Migrate application settings to increase end-user productivity Increase user acceptance for application or operating system upgrades 6 juni 2016 Page 83 User Environment Management Comparison Whitepaper • Avoid helpdesk overload during migrations. Smart Policy Condition Sets allow you to combine conditions based on user, location and device characteristics, enabling dynamic adaptation of content and appearance of the end-user desktop. For example, you can provide access to a network printer based on the user’s current location or create an application shortcut on the desktop based on the user’s identity. Conditions can be evaluated again when users unlock their workstation or reconnect to a remote session. Smart Policy is deeply integrated in to Horizon 7 with conditional support for poolnames, tags, endpoint location and View name and IP information. Using these conditions, you can dynamically control the system clipboard, client drive, USB access, printing capabilities and bandwidth profile. Condition sets are managed centrally from the Management Console and can be applied to all configurable items within VMware User Environment Manager. Dynamic Configuration benefits: • • • • • • • • Reduce complex scripting and prevent configuration errors Reduce use of dispersed Group Policy preferences Centrally managed from a single management console Manage globally instead of per configured item Globally enforce compliance to company standards Increase end-user productivity by providing the relevant desktop Reduce helpdesk calls by anticipating on dynamic desktop usage scenarios Run built-in or custom tasks at logon and logoff, application launch and exit, lock and unlock workstation, and disconnect and reconnect to a remote session Licensing and pricing VMware User Environment Manager is available stand-alone or as part of Workspace ONE, Horizon 7, Horizon Air, and VMware AppVolumes. Version 16.03 6 juni 2016 Page 84 User Environment Management Comparison Whitepaper 7.14 VMWARE VIEW PERSONA MANAGEMENT Introduction Early 2010 VMware acquired certain assets from RTO Software, a provider of user profile management for Windows desktops and application/performance monitoring tools for desktop virtualization, to enable effective persona management for VMware View. With VMware View 5, VMware introduced View Persona Management. View Persona Management preserves user profiles and dynamically synchronizes them with a remote profile repository. View Persona Management does not require the configuration of Windows roaming profiles, and you can bypass Windows Active Directory in the management of View user profiles. If you already use roaming profiles, Persona Management enhances their functionality. Persona Management downloads only the files that Windows requires at login, such as user registry files. When the user or application opens other files from the desktop profile folder, these files are copied from the stored user persona to the View desktop. This algorithm provides performance beyond that achieved with Windows roaming profiles. In addition, View copies recent user profile changes to the desktop profile up to the remote repository every few minutes. Benefits View Persona Management minimizes the amount of time necessary for login and logout by: Downloading at login time only the files that Windows requires for login, such as user registry files. Downloading other user profile data only as needed, when the user or application opens a profile folder on the View desktop. The profile folders appear to contain upto-date files, but the data is not downloaded until it is accessed. Periodically uploading to the remote repository any changes made to the user profile. The default time between automatic periodic uploads is ten minutes, and this time can be configured. Uploading at logout only the user profile changes since the last periodic upload. Because of the frequent automatic upload of changed user data during the user session, this final upload does not take a long time. By minimizing the amount of data uploaded or downloaded at any one time, Persona Management provides a performance improvement over Windows roaming profiles. A roaming profile system managed by Windows copies the entire user profile to the local desktop at login and copies all user profile changes up to the remote repository at logout. View Persona Management is an alternative to Windows roaming profiles and allows you to manage user profiles without relying on Active Directory for configuration. Instead, you configure and manage user profiles entirely within the View environment. Any changes you make to test View Persona Management have an effect only on View desktops and do not have a global Version 16.03 6 juni 2016 Page 85 User Environment Management Comparison Whitepaper effect on other desktops, such as physical desktops. You can easily reconfigure View to refine your implementation. VMware View Persona Management is an integral part of the VMware View solution, which also includes other features such as application provisioning. While other profile management vendors rely on best practices and “good user behavior” to ensure that data and settings are included in the Windows profile, the VMware approach is to manage a user’s “personality”. The user personality encompasses the unique user experience including user data, user settings, and application access, which is more than a Windows profile covers. By integrating personality management with other components, such as View Manager and View Composer, VMware View delivers a complete solution to solve our customer’s problems holistically. Licensing; Persona Management is free as part of VMware Horizon View 7.x Version 16.03 6 juni 2016 Page 86 User Environment Management Comparison Whitepaper 8. UEM FEATURES COMPARISON 8.1 INTRODUCTION It’s important to understand that comparing features is the last step in the decision tree. Vision, Strategy and Technology are the first steps to take. Each User Environment Management product has its own functionality and feature-set. It’s key to have an overview of the vendors, solutions and their functionality. Some vendors offer complete and comprehensive sets of functionality while others are focused to deliver a smaller solution set with specific functionality. Both scenarios are valid, it all depends what kind of functionality you’re looking for. Keep the strategic questions mentioned in chapter 3.8 in mind! Below you will find an overview of the various vendors, their solutions and the functionality they are offering on a very high level. As mentioned in chapter 5 it’s key to understand that different vendors have different focus, approach and solutions to fill in the UEM space. The different focus areas used in the diagram are: Version 16.03 User Profile Management; Manage Windows User profiles; local, roaming, hybrid, mandatory; User Personalization, or Application and Desktop Management; Application icons, settings and configuration preferences; Application Access Control, with User Rights Management or Security Management; enforce access to applications, persona and context aware. Resource Management; Application performance optimization and management; License Management; insights, reporting and enforcing the use of licenses; Application Delivery: User centric Application Installation with Dynamic Privileges, User Installed Applications, Streamed and Virtualized applications; Monitoring, Auditing and Reporting facilities on various levels with focus on the user environment. 6 juni 2016 Page 87 User Environment Management Comparison Whitepaper Scense AppSense DesktopNow Citrix User Profile Management Liquidware Labs ProfileUnity + suite Microsoft GPO, GPPrefs, USV, UE-v Norskale VUEM PolicyPak PolicyPak Suite RES ONE Workspace Tricerat Simplify Suite VMware Persona Management VMware User environment Management Application Delivery License Management Resource Management User Rights Management In this version of the whitepaper I added more bullets to some of the vendors, I included bullets to vendors that offer functionality in a suite instead of the core product. All of these vendors offer the functionality that help you manage your UEM environment. Version 16.03 6 juni 2016 Page 88 Monitor, Audit and Report Product Application Access Control Vendor Appixoft User Personalisation User Profile Mgmt There are a lot of vendors in the User Environment Management space. The diagram below gives an overview of the focus of the various User Environment Management (UEM) software vendors. This diagram has nothing to do with the (possible) discussion which vendor provides the most and the best functionality and features. A complete overview of the features and functionality is available in this chapter. User Environment Management Comparison Whitepaper Product Version We did our best to be truthful and accurate in investigating and writing-down the different features. When you see improvements please let us know. This detailed feature compare matrix is developed with the following products and versions: Product AppiXoft Scense AppSense Environment Manager AppSense Performance Manager AppSense Application Manager Citrix User Profile Manager Citrix XenApp / XenDesktop FSLogix Liquidware Labs ProfileUnity Liquidware Labs Flex-io Liquidware Labs Stratusphere Microsoft Windows Server and Client Microsoft User Experience Virtualization Norskale VUEM PolicyPak Suite RES ONE Workspace RES ONE Automation Tricerat Simplify Suite Unidesk VMware User Environment Management VMware Persona Management VMware vROps VMware App volumes 8.2 Version 10 10.0 10.0 10.0 3.1 7.8 2.1 6.5 1.5 5.8.1 2012R2 and 10 2.0 4.0 Build 901 2015 SR2 2015 5.5 2.5 9.0 7 6.2 2.11 ROADMAP AND FUTURE ADDITIONS This document is just the beginning and will be developed and developed in the near future. We plan to add more feature details of the currently named vendor solutions and want to add new solutions where applicable. If you have any comments, corrections, or suggestions for improvements of this document, we want to hear from you! Please send e-mail to Rob Beekmans Version 16.03 6 juni 2016 Page 89 User Environment Management Comparison Whitepaper 8.3 FEATURE COMPARE MATRIX Goal: Requirements: Result: Method of Execution: UEM solutions and features Detailed description of features Hands-on-experience, vendor involvement Whitepaper Hands-on experience, read articles, communicate with vendors and discuss with colleagues Legend: √ = Applicable; X = Not applicable; --- Not needed ~= It depends; # =under investigation by PQR A green √ or red X has nothing to do with advantage or disadvantage of a solution. It just presents the availability of the functionality. Note: It’s out of scope for this whitepaper to explain the ‘It depends’ remarks’. # are under investigation and will be changed to other symbols as soon as we get confirmation on the functionality or support. A next version of the whitepaper will reflect the changes. Version 16.03 6 juni 2016 Page 90 User Environment Management Comparison Whitepaper VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow GENERIC FEATURES AND FUNCTIONALITY AppiXoft Scense 8.4 Management Server / UEM solution Server instance officially supports 1K concurrent connections √ √ --- √ √ --- √ √ --- --- Server instance officially supports 2.000 concurrent connections √ √ --- √ √ --- √ √ --- --- Server instance officially supports 5.000 concurrent connections √ √ --- √ √ --- √ √ --- --- Server instance officially supports 10.000 concurrent connections √ √ --- # √ --- √ √ --- --- Server instance officially supports 20.000 concurrent connections √ √ --- # √ --- √ √ --- --- Database instance officially support 20.000 concurrent connections √ √ --- # √ --- --- √ --- --- Total supported managed clients per ‘farm≤ 10.000 CCU √ √ √ √ √ √ √ √ √ # Total supported managed clients per ‘farm’ 10K – 25K CCU √ √ √ √ √ # √ √ √ # Total supported managed clients per ‘farm’ ≥ 25.000 CCU √ √ √ √ √ # √ √ √ # Integration with 3rd party systems management solutions X √ X √ √ √ X √ X X Version 16.03 may 2016 Page 91 User Environment Management VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow AppiXoft Scense Comparison Whitepaper Centralized management console √ √ X √ √ √ √ √ √ X Web-based management interface X √ X X X X √ X X X Single centralized management console for support and admin √ X X √ √ √ √ √ ~ X Windows GUI for Management (includes MMC) √ √ ~ √ √ √ √ X ~ X Delegation of control √ √ X X √ √ √ √ X X Delegation of control, granular delegated administration roles √ √ X √ √ √ X √ √ X Console supports multiple concurrent administrators √ √ ~ √ √ √ √ √ √ --- Multi user operations - quick tasks Admin access console with different credentials other than current account details # √ √ √ # --- # --- # √ # --- # √ # √ # ~ # --- Console supports Single-Sign-On √ √ --- --- √ --- √ √ √ --- Console supports SQL Authentication √ √ --- --- # --- --- √ --- --- Configuration check in/out process for multiple administrators X √ --- --- √ --- X X X --- Version 16.03 may 2016 Page 92 User Environment Management VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow AppiXoft Scense Comparison Whitepaper Single management console supports 5000+ managed clients √ √ √ √ √ √ √ √ √ √ client endpoint search capabilities across management console √ √ --- --- # X √ √ X --- Support for (wildcard) searching across management console √ √ --- X √ --- √ √ X --- Client – Server traffic is secure by design √ √ √ √ √ √ √ √ √ √ Management traffic is secure by design √ √ √ √ √ √ √ √ √ √ Management traffic can be Network Load Balanced √ √ --- --- √ # --- √ ~ --- Auditing and security logging of admin actions √ √ X √ √ √ √ √ X √ Event and error reporting √ √ √ √ √ √ √ √ √ √ Security hardening guidelines public available X X X X X X X X X X Support low bandwidth/high latency WAN connections √ √ √ √ √ √ √ √ √ PowerShell SDK X √ X X X X X X X Scripting (not including PowerShell) support and command-line interface √ √ X √ X X √ √ √ Version 16.03 may 2016 X Page 93 User Environment Management VMware Persona Management RES ONE Workspace Liquidware Labs ProfileUnity √ √ √ √ X √ √ API Interface (public) and documented X √ X ~ X X √ X X X Support for Branch/Relay-servers for scalability/minimizing site-2-site traffic √ √ --- --- √ --- --- √ ~ --- Client end point merging of multiple separate configurations # √ X # √ √ √ X √ X Configuration layering within the console # √ X ~ # √ √ √ # X Configuration Change Tracking √ √ X X √ X X √ X X Product Patching via MSPs X √ X √ √ X --- X √ X Microsoft System Center Integration X √ X X X √ X √ ~ X Schedule Agent Installation for immediate install Schedule Agent Installation at next computer start up prior to logon Schedule Agent Installation for any given time Enable user to postpone agent installation (within predefined timeframe) Agent Installation Notification available in multiple languages Synchronized Agents & Configuration Deployment and Installation Force Agent to Poll Now to pull latest Configuration √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X X X ------- ------------√ X X X X X √ √ --------X --√ ------------X X X X X √ √ √ --------------- ------------X Version 16.03 may 2016 VMware UEM √ PolicyPak Suire √ Norskale VUEM X Microsoft Microsoft Group Policy-based management for agent/client settings Citix UPM Functionality AppiXoft Scense AppSense DesktopNow Comparison Whitepaper Page 94 User Environment Management Force agent to restart internal controller (not the service) – for e.g. debugging Force agent to clear some cache to reinforce some settings Force agent to do an administrative refresh Variable Poll Periods Failover support via multiple Management Servers Workspace Model to enable/disable UEM features Update of UEM Configuration: User Self-Initiated refresh Update of UEM configuration (no need to logoff/logon) Update of UEM configuration at User Logon Update of UEM of configuration at computer Startup Management Server / UEM solution: Built-in PowerShell Cmdlets for scripted configuration Licenses No external license server required First year support and maintenance included in license 24 x 7 support included in base license 24 x 7 support, additional pricing Built into Operating System Version 16.03 may 2016 VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow AppiXoft Scense Comparison Whitepaper # # # √ √ √ X √ √ # # √ ~ # √ √ √ X √ √ √ √ --# # ------X X √ # --- X X X √ --√ X √ √ √ √ √ √ √ √ √ √ X √ √ # X # ----√ --------√ # # ------√ --X X √ √ √ X # √ X √ √ √ √ √ √ # # √ √ √ ----√ √ √ √ # # X X X X ----X X √ # X √ √ X X X √ X √ --X # # # X X √ √ # # √ √ √ √ --X √ √ X X X √ √ X √ X √ √ X √ X √ √ X √ X √ # √ X X Page 95 User Environment Management Physical endpoint use license included with VDI/RDS license Concurrent user/desktop licenses Per device licenses Per named user licenses Per server licenses Enterprise/site license program Academic/Education license program Government license program Service Provider license program Free for personal usage (FFPU) Support and Community Public and active community Official training classes available Official certification program, VUE or Prometric UEM technology is proven; the solution is being used for 1+ year in enterprise production environments. 10K+ endpoint, various deployment scenarios. 10+ of public available enterprise (10K CCU) references in EU using UEM solution 10+ of public available enterprise (10K CCU) references in US using UEM solution Version 16.03 may 2016 VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow AppiXoft Scense Comparison Whitepaper --√ √ √ X √ √ √ √ √ --√ X √ √ √ √ √ √ X √ √ √ √ X X √ √ X X # √ X √ X √ √ √ # X --√ √ √ X √ √ √ √ √ --√ √ X --√ √ √ √ X --√ X √ X √ √ √ √ √ --√ X √ X √ √ √ √ √ # √ √ √ X √ √ √ √ X X ----------------X √ √ X √ √ √ √ √ √ X X √ √ X X √ √ √ X √ √ √ X √ √ √ X √ √ √ √ √ √ √ X √ √ X X √ X X √ √ √ √ √ √ √ # X X X X √ √ √ X X X Page 96 User Environment Management 10+ of public available enterprise (50K CCU) references in EU using UEM solution 10+ of public available enterprise (50K CCU) references in US using UEM solution Enterprise Reference Architecture, public available Professional Services Organization – Business hours multi-lingual support Professional Services Organization - 24h multi-lingual support (possible additional contract) Technical Account Manager (TAM) available Management Platform Management through Active Directory Management through file share Datastore transfer Protocol - SMB Datastore transfer Protocol - HTTP(s) Datastore transfer Protocol – SMB Datastore transfer Protocol - TCP / configurable and supported Datastore transfer Protocol - Database specific (protocol differs per DB type) Datastore transfer Protocol – Windows Communication Foundation VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow AppiXoft Scense Comparison Whitepaper X X X √ X X X √ √ √ X X √ √ √ X X # √ √ X # √ √ √ X X X X X X X X √ √ X X √ √ √ X X X √ √ X X X √ √ √ √ √ √ √ X √ √ √ √ X X √ √ X X √ √ ~ X √ √ √ √ √ X √ X √ X √ X X X √ X √ X X X ----- √ X X X X √ X √ √ √ √ X --------- √ √ √ X √ X --X X X √ √ √ √ √ X √ √ √ --√ ------- √ √ √ X √ X X X Datastore / database OS support Version 16.03 may 2016 Page 97 User Environment Management VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow AppiXoft Scense Comparison Whitepaper Management through database engine Microsoft SQL Server 2005 Express Edition Microsoft SQL Server 2008 SP1 Express Edition Microsoft SQL Server 2008 R2 Express Edition Microsoft SQL Server 2005 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2008/SP2 Microsoft SQL Server 2012 Microsoft SQL server 2014 Microsoft SQL Azure Microsoft SQL Server 2008 R2, built-in support for native SQL Mirroring Oracle Enterprise MySQL Enterprise Server IBM DB2 PostgreSQL √ √ √ √ √ √ √ √ √ X √ √ X X X √ X √ √ X X X √ √ X √ X X X X X ----------------------------- ------------------------------- √ X √ √ X √ √ √ √ √ √ X X X X ------------------------------- √ ----------------------------- √ √ √ √ √ √ √ √ √ √ √ √ √ √ X ------------------------------- ------------------------------- Management Server OS support Microsoft Windows Server 2003 R2 Microsoft Windows Server 2003 R2-64-bit √ √ X X ----- √ √ √ √ √ √ X X ----- X X ----- Version 16.03 may 2016 Page 98 User Environment Management VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow AppiXoft Scense Comparison Whitepaper Microsoft Windows Server 2008 Microsoft Windows Server 2008 64-bit Microsoft Windows Server 2008 R2 64-bit Microsoft Windows Server 2012 64-bit Microsoft Windows Server 2012R2 64-bit Microsoft Windows Server 2016 (tech preview) Virtual (Linux) appliance √ √ √ √ √ X X X √ √ √ √ X X ------# # X --- √ √ √ √ √ X X √ √ √ √ √ √ X √ √ √ # # X X √ √ √ √ √ X √ ------# √ X --- √ √ √ √ √ √ --- --------------- Supported Directory Services OpenLDAP support Novell eDirectory official support Novell Domain Services for Windows official support Microsoft Directory Services support; ADS 2003+ Microsoft Read Only Domain Controllers (RODC) X X X √ √ X X X √ √ X X X √ √ X X X √ √ X X X √ √ X X X √ # X X X √ √ X √ √ √ √ X X X √ √ X X X √ # Supported Protocols for all UEM related components TCP/IP v4 TCP/IP v6 √ ~ √ √ √ √ √ √ √ √ √ √ √ √ √ ~ √ √ √ # Version 16.03 may 2016 Page 99 User Environment Management UEM Software Architecture Software and Agents available as 32bits component Software and Agents available as 64bits component, native 64 bits components VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow AppiXoft Scense Comparison Whitepaper √ √ √ √ √ √ √ √ √ √ √ √ √ X √ √ √ √ √ √ √ √ X √ √ √ √ √ √ √ √ √ X √ √ X √ X X X X √ √ X √ X √ √ X √ √ √ √ √ √ √ √ √ X √ √ X √ √ √ √ √ √ √ √ √ X √ √ X √ √ √ √ √ √ √ √ √ X √ √ X √ √ √ √ √ √ √ √ √ X √ √ X √ √ √ √ √ √ √ √ √ X √ √ X √ X √ X √ √ √ √ √ ~ √ √ X √ √ √ √ √ √ √ √ √ X √ √ X √ X X X X √ √ X X X Client Operating System support Microsoft Windows 10 (x86/x64) Microsoft Windows 8.0 / 8.1 (x86/x64) Microsoft Windows 8 RT Microsoft Windows 7 Professional Microsoft Windows Vista Professional Microsoft Windows XP Professional Microsoft Windows Server 2003 R2 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 R2 Windows XPe Windows Embedded Standard 7+ Mac OS X Version 16.03 may 2016 Page 100 User Environment Management Microsoft Norskale VUEM PolicyPak Suire Liquidware Labs ProfileUnity X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X ~ X X X X X X X X X X X X X X X X X X X X X X X X X X X X Client/User Session Environment Agent technology, Helper Agent technology, AppInitDLL Agent technology, Service Agent technology, Service (hooks WinLogon) Agent technology, Service (parent process) Agent technology, Kernel mode filter driver Agent technology, Executable X X √ X X √ √ √ X √ √ √ √ X X X √ X X √ X X X √ X √ X X X X √ X √ X √ X √ √ X √ X X X X X √ √ √ √ √ X √ X √ √ X X X √ X X X √ X X √ X X # X Version 16.03 may 2016 VMware Persona Management Citix UPM X X X X X X X X X X VMware UEM AppSense DesktopNow Unix flavours Linux flavours EPOC / Symbian Wyse Thin OS (WTOS) Apple iPhone/iPod IOS v6.x Apple iPad IOS v6.x Google Android v2.x RIM BlackBerry Windows Phone 7/8 Windows Phone 10 RES ONE Workspace Functionality AppiXoft Scense Comparison Whitepaper Page 101 User Environment Management VMware Persona Management VMware UEM RES ONE Workspace Liquidware Labs ProfileUnity PolicyPak Suire Norskale VUEM Microsoft Citix UPM Functionality AppSense DesktopNow AppiXoft Scense Comparison Whitepaper Option to run agent-free (no installation on Client system) Command-line parameters Uses file system driver No kernel-mode component required Component with elevated user rights User self-service component X √ √ √ √ √ X √ √ √ √ √ X X √ √ √ X X √ X √ X X X √ X √ ~ √ X √ --√ X X √ X X √ √ ~ X √ √ X √ √ √ √ X X --√ X X # # X X Application Delivery integration Citrix XenApp: Ability to Publish Citrix applications Microsoft RDSH: RemoteApp (native or MSI) Microsoft Application Virtualization, App-V (native or MSI) Symantec Workspace Virtualization (native or MSI) VMware ThinApp (native or MSI) Citrix XenApp Streaming Microsoft MSI Windows Store apps # √ √ √ √ X √ # X X √ X X X # √ X X X X X X X # X √ √ # X X √ # √ √ # X √ X √ # X √ √ √ √ √ √ # √ √ X X √ X √ # √ √ √ √ √ √ √ # X √ √ √ √ √ √ X X X X X X X X X User Experience Reverse seamless functionality: Windows- and Web application integration X X ~ X √ X X √ X X Version 16.03 may 2016 Page 102 User Environment Management Comparison Whitepaper Version 16.03 VMware Persona Management VMware UEM RES ONE Workspace Mgr Liquidware Labs ProfileUnity PolicyPak Suite Microsoft Citix User Profile Manager AppSense DesktopNow USER PROFILE MANAGEMENT AppiXoft Scense 8.5 Functionality Methodology Profile segmentation / partitioning / separation / decoupling Profile redirection/ streaming / virtualization Granularity and decoupling apps Templates and / or wizards available to capture user settings √ √ √ # √ √ ~ √ X √ √ X --√ √ X ----√ X √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X Migration Replaces Windows Roaming Profiles Migrate from local or roaming profiles Migrate from competing products Migrate v1 to v2 profiles (automatically) Migrate from v2 to v5 profiles (automatically) Migrate from vx to v6 profiles (automatically Migrate individual apps across versions Migrate for managed (UEM) profile back to Windows native profile √ √ √ √ √ # √ √ √ √ √ √ √ √ √ √ √ √ √ X X # √ √ √ X X X X X X --- ------X X X √ --- √ √ √ √ √ √ √ √ √ √ √ √ # # √ √ √ √ √ √ √ √ √ √ √ √ √ ~ ~ # X √ may 2016 Page 103 User Environment Management Version 16.03 VMware Persona Management VMware UEM RES ONE Workspace Mgr Liquidware Labs ProfileUnity PolicyPak Suite Microsoft Citix User Profile Manager AppSense DesktopNow AppiXoft Scense Comparison Whitepaper Functionality Base Profile support Local Profiles Roaming Profiles Mandatory Profiles Streamed Profiles Works independent of Roaming Profiles √ √ √ X √ √ √ √ --√ √ X √ √ √ X X X √ √ --------√ √ √ √ --√ √ √ √ X √ √ √ √ √ √ √ √ # # √ User Profile Data Store Windows File share Management through database engine Datastore transfer Protocol - SMB Datastore transfer Protocol - HTTP(s) Datastore transfer Protocol - CIFS Datastore transfer Protocol - TCP / configurable supported Datastore transfer Protocol - Database specific Datastore transfer Protocol - DCOM Built-in replication/synchronization Data compression before transfer Synchronization of data is based on delta’s Data streaming during profile transfer √ √ X X X √ X X √ √ √ X √ √ √ √ √ √ X X √ √ √ --- √ --√ X √ X X X √ X √ √ √ --√ X X X X X √ √ --# X --√ X X X X X --√ # --- √ --√ --√ ------√ √ √ --- √ √ √ X √ X √ X √ √ √ X √ --√ --√ ------√ √ √ √ √ --√ X √ X X X √ X X X may 2016 Page 104 User Environment Management Version 16.03 VMware Persona Management VMware UEM RES ONE Workspace Mgr Liquidware Labs ProfileUnity PolicyPak Suite Microsoft Citix User Profile Manager AppSense DesktopNow AppiXoft Scense Comparison Whitepaper Functionality Parallel processing of logon actions Support for Client Side Extensions √ X √ √ ----- √ √ √ # √ --- √ X √ √ X # Profile Management Personalization loaded on demand (at app launch) for locally installed applications Personalization loaded on demand (at app launch) for virtualized applications Personalization templates 1st Line support - Personalization Support Web Console Automatically capture application personalization Automatically translate OS version properties Built-in user profile snapshots Automatic user personalization removal User self-service and profile management Cross-application delivery mechanism support (v-apps etc) Cross-architecture support (32-bit & 64-bit) Cross-operating system support for desktop settings Discovery mode Builtin Reporting Isolation/Virtualization/Redirection of application settings Last write wins - Per Application √ √ X X √ √ √ # √ √ √ √ √ X X √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ ~ ~ √ X X X X # X X X X X X X X √ √ X X √ X X # X √ √ √ √ X # √ √ √ # # X X X # # √ √ √ X X √ X √ √ √ X √ √ √ # ~ √ √ √ X √ √ √ √ √ √ X √ √ √ # √ √ √ √ √ √ √ √ √ √ √ # √ √ √ # √ √ √ √ √ X X √ X X X X X X X # X X # # X X X # may 2016 Page 105 User Environment Management VMware Persona Management VMware UEM RES ONE Workspace Mgr Liquidware Labs ProfileUnity PolicyPak Suite Microsoft Citix User Profile Manager AppSense DesktopNow AppiXoft Scense Comparison Whitepaper Functionality Last write wins - Per Session Migrate from local or roaming profiles Offline (Cached) Mode Pre-cache personalisation on new machines Support for Terminal Server /desktop silos Supports user certificates Return to local or roaming profiles √ √ √ X √ √ √ √ √ √ √ √ √ √ √ √ √ X √ √ √ √ √ √ √ √ √ X √ X √ √ √ ----- √ √ √ √ √ √ √ √ √ √ X √ √ √ √ √ √ √ √ √ √ # √ X X # # √ Application Virtualization support Microsoft Application Virtualization, App-V Symantec Workspace Virtualization VMware ThinApp Novell ZENWorks / Turbo.net √ √ √ X √ √ √ X X X X X √ X X X √ √ √ √ √ √ √ √ √ √ √ √ √ X √ √ X X √ X √ √ # √ √ √ # # # ------- ------- √ √ √ √ √ X √ # # X X X Application Layering support VMware Appvolumes Citrix AppDisk Unidesk Version 16.03 may 2016 Page 106 User Environment Management Version 16.03 may 2016 √ √ √ √ √ √ X X X √ √ √ X √ √ √ √ √ ------- √ √ √ VMware Persona Management VMware UEM RES ONE Workspace Mgr Liquidware Labs ProfileUnity PolicyPak Suite Microsoft Citix User Profile Manager AppSense DesktopNow Functionality Cross Platform Personalization support Cross-application delivery mechanism support (native, virtual, hosted apps etc.) Cross-architecture support (32-bit & 64-bit) Cross-operating system support for desktop settings AppiXoft Scense Comparison Whitepaper X X X Page 107 User Environment Management Comparison Whitepaper Version 16.03 VMware UEM VMware PM √ X √ √ √ √ √ √ √ √ X √ X √ √ X √ √ √ √ √ √ X √ √ √ √ √ ~ √ √ √ √ √ √ X X X # X X X X X X Native Action triggers User Logon User Logoff Group Policy Refresh Delayed Event Application Start √ √ X √ √ √ √ X √ √ √ √ X X X √ √ √ √ √ √ √ √ X X √ X √ X X √ X √ X √ √ √ X √ √ √ √ √ X √ √ √ X √ X may 2016 PolicyPak Suite √ √ √ X √ √ √ ~ X Norskale VUEM √ X √ √ X √ √ √ X Microsoft X X # # # √ # X X LiquidwareLabs ProfileUnity √ √ √ √ √ √ √ √ √ Citrix UPM √ √ √ √ √ √ √ √ X AppSense DesktopNow Functionality Policy configuration component Extendable with 3rd party tools Processing of configuration during Windows Logon Parallel processing of logon actions Multithreading of logon actions Policy component supports granular configuration Can execute custom code (scripts, external EXE) Lockdown and removal of OS and 3rd party application UI/content Healing of processes, registry keys, services and files RES One Workspace USER PERSONALIZATION, APPLICATION AND DESKTOP MANAGEMENT AppiXoft Scense 8.6 Page 108 User Environment Management Version 16.03 VMware UEM VMware PM X √ X X X X X X X X X √ X X √ √ √ √ √ X X X √ √ X X X X X √ √ X X √ √ √ √ √ √ X X X X √ √ X X X X X X X X X X X X X X √ Native policy actions Copy files and/or folders √ √ X √ √ √ X √ √ X may 2016 PolicyPak Suite X √ √ √ X X √ X X √ # √ X X √ Norskale VUEM X √ X X X X X X X X X √ √ X √ Microsoft √ √ √ √ √ √ √ √ √ X X √ √ √ √ LiquidwareLabs ProfileUnity X X X X X X X X X X X X X X X Citrix UPM √ √ √ √ √ √ √ √ √ X √ √ √ √ √ AppSense DesktopNow √ X X X X X X X X X X √ √ X √ AppiXoft Scense Functionality Application Stop Network Connect Network Disconnect Session Reconnect Session Disconnect Session Lock Session Unlock Process Start Process Stop Application Install On Error Computer Startup Computer Shutdown Process Start – From UNC Path Manual / Scripted / On Schedule RES One Workspace Comparison Whitepaper Page 109 User Environment Management Version 16.03 may 2016 √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X √ √ √ √ √ ~ ~ X √ √ √ √ √ X PolicyPak Suite Norskale VUEM Microsoft LiquidwareLabs ProfileUnity √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X X X √ X X X √ √ √ X X X X X X √ VMware PM X X X X X X X X X X X X X X X X X X VMware UEM √ √ X √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ RES One Workspace √ X X X √ √ √ X √ X X √ √ √ X X √ X Citrix UPM Functionality Desktop background / wallpaper Devices E-mail profiles Outlook setup Environment variables File-type associations File and Folder actions Folder Redirection INI files Internet Settings Internet Explorer settings Local users and groups Network Drives Shortcuts ODBC data sources Power options Printers Regional options AppSense DesktopNow AppiXoft Scense Comparison Whitepaper √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X ~ ~ √ √ √ √ √ √ √ X √ √ √ X √ √ X X X X X X X X X X X X X X X X X X Page 110 User Environment Management Version 16.03 may 2016 √ √ √ √ √ √ √ √ √ √ √ √ √ √ # √ √ X PolicyPak Suite Norskale VUEM √ X √ √ X √ X √ X X X X X X # √ X # √ X √ √ X X --X X √ √ √ √ √ X √ X X VMware PM √ X √ √ √ √ √ √ √ √ √ √ √ √ # √ √ # Microsoft LiquidwareLabs ProfileUnity Citrix UPM X X X X X X X X X X X X X X # X X # VMware UEM √ X √ √ √ √ √ √ X √ √ √ √ X √ √ √ √ RES One Workspace √ √ X X X X X √ X X X X X X # √ √ # AppSense DesktopNow Functionality Registry keys and values Scheduled tasks Screen saver Start Menu options VPN and dial-up connections Windows Explorer folder option ADM / ADMX templates Message Boxes Configure Microsoft Fax client Microsoft Office File locations Microsoft Office preferences Microsoft Outlook preferences Outlook Express Remote Desktop Connection client settings Pinned items Windows options Windows services Tekst file Create AppiXoft Scense Comparison Whitepaper √ √ √ √ √ √ √ √ X √ √ √ √ X √ √ X # √ X √ √ X √ √ √ X √ √ √ √ √ # √ X # X X X X X X X X X X X X X X X X X X Page 111 User Environment Management Version 16.03 VMware UEM VMware PM √ X X X X X X X X X X X # √ X √ √ √ √ √ X √ √ √ √ √ X X √ √ # # √ # √ √ √ X X X X X X X X X X X X X X # Built-in rules / native conditions Active Directory Site Client Computer Domain Client Computer Group √ √ √ √ √ √ X X X √ √ √ √ √ √ √ # # √ √ ~ √ √ √ √ √ X X X X may 2016 PolicyPak Suite √ √ √ X X X X X X √ X X # Norskale VUEM X X √ X √ √ X X X X X X # Microsoft √ X √ √ √ √ X X X √ √ X # LiquidwareLabs ProfileUnity X X X X X X X X X X X X # Citrix UPM √ √ √ √ √ √ √ √ √ √ √ √ X AppSense DesktopNow √ X √ √ X X √ √ ~ √ X X X AppiXoft Scense Functionality Text File Update Text File Search File & Folder Copy Ability to write your own Custom Policy Actions Folder mirroring Folder Synchronization Custom VBScript queries for Actions Custom JScript queries for Actions Custom PowerShell queries for Actions Only Copy ‘New’ or ‘Changed’ items, files or folders Ability to Mirror Folder to mirror source if files are removed Synchronize Folder, unlike Mirror this is a two way process Windows 10 tiles RES One Workspace Comparison Whitepaper Page 112 User Environment Management Version 16.03 may 2016 √ X √ √ # √ X # √ √ √ √ √ √ √ √ √ √ PolicyPak Suite Norskale VUEM # # √ √ X X X √ # √ X √ X √ √ √ √ √ √ √ √ √ √ X # √ √ √ √ √ √ √ √ √ √ √ VMware PM √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ Microsoft LiquidwareLabs ProfileUnity Citrix UPM X X X X X X X X X X X X X X X X X X VMware UEM √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ RES One Workspace √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X √ AppSense DesktopNow Functionality Client Computer Organisational Unit Client Connection Protocol Client IP Address / Address Range Client NetBIOS Name Client Screen Colour Depth Client Screen Resolution Computer Chassic Type (device detection) Computer Domain Computer Group Computer IP Address / Range Computer MAC Address / Range Computer Name (DNS / NetBIOS) Computer Organizational Unit Operating System Service Pack Operating System version Operating System bit level (x86/x64) Published Application Name User Group AppiXoft Scense Comparison Whitepaper √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X √ √ √ √ √ X X # √ X √ X √ √ √ √ √ X √ X X X X X X X X X X X X X X X X X X Page 113 User Environment Management Version 16.03 may 2016 √ √ √ √ √ X X √ √ √ √ √ √ √ X X √ √ PolicyPak Suite Norskale VUEM √ √ √ √ √ √ X √ √ √ X X √ X X X √ X √ √ √ √ √ X X X √ √ √ √ √ √ X X √ √ VMware PM √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X Microsoft LiquidwareLabs ProfileUnity Citrix UPM X X X X X X X X X X X X X X X X X X VMware UEM √ √ √ √ √ X X ~ X √ √ X √ X X X √ X RES One Workspace √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X √ √ AppSense DesktopNow Functionality User Is Administrator User Name User Organizational Unit User Primary Domain Group User Domain Initial Program Working Directory Session Name WMI Query File / Folder match (exists, version) Battery is present CPU speed CPU Architecture (x86/x64) Number of CPU’s Wireless Connected network (SSID) Wireless Nearest access point (BSSID) Date/time match Disk space AppiXoft Scense Comparison Whitepaper √ √ √ √ √ X X √ √ √ √ √ √ √ √ √ X X X √ √ X √ X X X X √ √ X X X X X X X X X X X X X X X X X X X X X X X X X Page 114 User Environment Management Version 16.03 may 2016 √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X X PolicyPak Suite Norskale VUEM √ √ √ X X X X √ √ X √ √ X X √ X X X √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X X X VMware PM √ √ √ X √ X √ √ √ X √ √ X √ √ X X X Microsoft LiquidwareLabs ProfileUnity Citrix UPM X X X X X X X X X X X X X X X X X X VMware UEM √ X √ X X X √ √ √ X √ √ √ X √ √ √ √ RES One Workspace √ √ √ √ X X √ √ √ √ √ √ X √ √ √ √ √ AppSense DesktopNow Functionality Environment variables Language (user / system) Custom LDAP query MSI query Network connection type (VPN, Dailup etc.) PCMCIA slot is present Portable computer (Laptop) Terminal Server Domain Controller RAM size Registry match Time range GP Processing Mode Connection type (LAN/dialup) VMware View client name User interaction - Yes/No response Custom VBScript queries Custom Jscript queries AppiXoft Scense Comparison Whitepaper √ √ X X √ X √ √ √ √ √ √ X √ √ √ X X √ X X X X X √ √ X X √ X X X √ X ~ ~ X X X X X X X X X X X X X X X X X X Page 115 User Environment Management Version 16.03 may 2016 √ X X X X X √ X √ X √ √ X X X X X PolicyPak Suite Norskale VUEM √ √ X X X X X X √ X √ # X # # # # √ X # # # # √ # √ X √ # X # # # # VMware PM √ √ √ √ √ X √ √ √ √ √ √ X X X X X Microsoft LiquidwareLabs ProfileUnity Citrix UPM X X X X X X X X X X X # X # # # # VMware UEM √ √ √ √ √ √ √ X √ X X √ X √ √ √ √ RES One Workspace √ √ √ √ ~ ~ √ √ √ X √ # X # # # # AppSense DesktopNow Functionality Counter Condition – Run Once >>Run many Ability to write your own Custom Policy Conditions Custom VBScript queries for Conditions Custom Jscript queries for Conditions Custom PowerShell queries for Conditions Custom PowerShell queries If .. else condition Remote Host/URL Session Type USB storage device, serial and vendor/product Any AD User Property (User settings from the user account) Is VDI (detect Citrix or VMware software) WiFi AccessPoint connectivity (BSSID) Citrix PVS vDisk present and vDisk mode Citrix Netscaler session policies and hostname VMware Horizon view Broker VMware Horizon View tunneled connection AppiXoft Scense Comparison Whitepaper √ X X X X X X √ √ √ √ # √ # # # # ~ √ √ √ √ ~ √ X X X X √ X X X √ √ X X X X X X X X X X X # X # # # # Page 116 User Environment Management Comparison Whitepaper Version 16.03 may 2016 √ √ √ √ X X X X X √ X X X X √ X X X X X √ X X X X X X X X X X X X X X X √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X √ √ VMware UEM √ √ √ √ X X X X X √ X √ X X √ X X √ RES One Workspace √ √ √ √ X X √ √ √ √ √ √ √ √ √ √ √ √ Norskale VUEM Liquidware Labs ProfileUnity Functionality Logging (product specific) Application access based on Active Directory User identity Application access based on Active Directory Group membership Application access based on Active Directory OU membership Application access based on Novell User identity Application access based on Novell Directory Group membership Application access based on UEM Administrative Roles (RBAC) Alerting (action send mail) Alerting (SNMP) Event triggering (run scripts or custom action) Number of Application Instance limits Application Termination Terminate Application based on change to client name or IP address Application Clean Closure Display warning / Dialog box Blocked file archiving (move rule-blocked file to archive) Application level Network Access Control Permit access to authorized IP addresses AppSense DesktopNow APPLICATION ACCESS CONTROL, SECURITY MANAGEMENT Appixoft Scense 8.7 √ √ √ √ X X X X X √ X X X X √ X X X Page 117 User Environment Management Version 16.03 may 2016 √ X X X X X X X X X √ √ √ √ √ X √ √ X X X X X X X X √ X X √ X X √ √ √ √ √ √ √ √ √ √ √ √ X X X X X X √ √ X √ √ X X X X X X X X X X X X X √ √ √ √ √ X √ √ √ √ √ # X X X X X X X X X X X X VMware UEM Liquidware Labs ProfileUnity √ √ √ √ √ Norskale VUEM AppSense DesktopNow Permit access to authorized TCP/UDP ports Deny access to prohibited ports End Point Analysis Scan Application Usage scan User Rights / Privilege discovery mode / reporting Auditing and reporting of self-elevation Elevate/Reduce user right for Applications Elevation/Reduce user rights to Control Panel Applets Elevate user rights on the internet for ActiveX / Web Installations Elevate user rights for Application Installations Self-Elevation of user rights on demand with white & blacklist options If application is Elevated, option to not elevate Child Processes spawned from the raised Application X X X X X Appixoft Scense Functionality Deny access to prohibited IP addresses Permit access to authorized UNC paths Deny access to prohibited UNC paths Permit access to authorized host server names Deny access to prohibited host server names RES One Workspace Comparison Whitepaper Page 118 User Environment Management Version 16.03 may 2016 X X # X √ √ √ X √ X X X X X X √ √ √ √ √ √ √ √ X X X X √ X X X X X X X X X X X √ X X X X X X √ X X √ X X # # √ √ √ √ √ √ √ √ √ √ √ √ X √ # # √ √ X X X X X X √ √ X √ X √ √ √ √ √ X X X X X X VMware UEM Liquidware Labs ProfileUnity √ Norskale VUEM AppSense DesktopNow Security/blocking approach Whitelisting Blacklisting (Certificate based) vendor trusting User specific rights Trusted Ownership / Owner of file SHA#1 Digital Signature of file SHA-256 Digital Signature of file MD5 Digital Signature of file X Appixoft Scense Functionality If application is Elevated, option to not elevate Secure Dialog Boxes within the raised Application Does not create and depend on a Local Adminstrator account on the machine for Elevation of User Rights Redirect a requested URL to a specified safe URL Redirect an already open URL when context/condition changes Redirect URL based on full URL address Redirect URL based on Sub-Directory of address Redirect URL based on use of Wild Cards Time Based Application Access RES One Workspace Comparison Whitepaper Page 119 User Environment Management Version 16.03 # # X X X X X X Contextual nodes/levels (block based on …) Active Directory Site Any Active Directory User property User Group Organizational Unit (OU) Device (detail; IP, computer name etc. ?) Computer Chassis type CPU speed CPU architecture (x86/x64) CPU Number of processors Memory (minimum installed) Screen resolution Screen color depth CD/DVD (present/not present) Client IP Address/Address range (local device) Client name (local device) √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X √ √ √ √ X X X X X √ √ X √ √ √ √ √ √ √ √ √ X √ X X √ √ X √ √ X X X √ X X X X X X X X X X X X √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ # √ √ √ √ X X X X X X X X √ √ may 2016 VMware UEM √ √ Norskale VUEM Liquidware Labs ProfileUnity # # Appixoft Scense Functionality ADLER32 Metadata / file properties AppSense DesktopNow RES One Workspace Comparison Whitepaper Page 120 User Environment Management Version 16.03 may 2016 X X X X X X X X X X X X X X X X X X X X √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X X VMware UEM √ √ √ √ X √ √ √ √ X X X √ √ √ √ X X X X RES One Workspace √ √ √ √ X √ √ √ √ X X X √ √ √ √ √ √ √ √ Norskale VUEM Liquidware Labs ProfileUnity √ √ √ √ X √ √ √ √ X X X √ √ √ √ X √ √ √ AppSense DesktopNow Functionality Environment variables File File version Folder USB Storage Device (Serial number/ Vendor & Product ID) Operating System bit level (x86/x64) Operating System Version Registry Setting & Value Remote Host (Ping/Port/HTTP/HTTPS) Listener Name Wireless Connected network (SSID) Wireless Nearest access point (BSSID) Session Type (Local Desktop/Remote Desktop/Remote Application) Process Access Time Connection Type (e.g. RDP, ICA etc..) Port Number Output of VBScript Output of PowerShell script Output of jScript Appixoft Scense Comparison Whitepaper √ √ √ √ √ √ √ √ X X X X X X X √ X √ √ √ Page 121 User Environment Management Version 16.03 √ √ √ √ √ √ X X X X X X X X X X √ √ X X X X X √ Block/filter types/details (what to block) Filename Filename Extension Folder Drive Removable Drive Signature Network Connection URL Filtering Software Installation Sessions Registry keys Scripts X X X X X X X X X X X X √ √ √ √ √ √ √ √ √ X √ √ √ √ √ √ X √ X X √ X √ X √ X X X X X X X X X X X √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X X X X X X X X X may 2016 VMware UEM √ √ √ √ √ √ Norskale VUEM Liquidware Labs ProfileUnity X X X X √ √ Appixoft Scense Functionality Application / File vendor Application / File product name Application / File company name Application / File description Application / File product version (minimum and maximum) Product version (maximum and minimum AppSense DesktopNow RES One Workspace Comparison Whitepaper Page 122 User Environment Management X X X X √ X X √ √ √ X √ X X X X Other Ability to prevent malicious changes to alter file integrity Limit # of user-application sessions X X √ √ X X X X √ √ X X may 2016 VMware UEM Liquidware Labs ProfileUnity √ √ √ √ Norskale VUEM AppSense DesktopNow X X X X Appixoft Scense Security levels Security disabled (Unrestricted) Learning mode (Audit only) Self-Authorize Security enabled (Restricted) Functionality Version 16.03 RES One Workspace Comparison Whitepaper Page 123 User Environment Management Comparison Whitepaper RESOURCE MANAGEMENT Version 16.03 RES ONE Workspace √ √ √ √ √ √ X X X X X X √ X X √ √ √ √ √ √ √ √ √ Throttling options Share based CPU throttling Share based Memory throttling Share based Disk throttling Limit based CPU throttling Limit based Memory throttling per user Limit based Memory throttling per application/process Limit based Memory throttling per session CPU reservations √ √ √ √ √ √ √ √ X X X X X X X X # # # # # # # # X X X X √ X √ X may 2016 Liquidware Labs Profile Unity Functionality Logging (product specific) Alerting (action send mail) Event triggering (run scripts or custom action) Reporting / trending Fast Session Logoff (background logoff processing) Timed statistics collection Norskale VUEM AppSense Desktop Now 8.8 Page 124 User Environment Management Version 16.03 RES ONE Workspace √ √ √ X X X # # # X √ √ Optimization conditions Window state (minimized, foreground background etc.) Session state (idle, disconnected, locked etc.) Detailed reporting on resource usage √ √ √ X X X # # # √ X X Other Memory optimization CPU/thread optimization IOPS optimization √ √ X X X √ # # X √ √ X may 2016 Liquidware Labs Profile Unity Functionality CPU affinity Set CPU conditions/thresholds Set application specific CPU conditions/thresholds Norskale VUEM AppSense Desktop Now Comparison Whitepaper Page 125 User Environment Management Comparison Whitepaper 8.9 LICENSE MANAGEMENT Version 16.03 may 2016 RES ONE Workspace Functionality Assign license costs per app License types Companywide license Server license Per seat license Per named user license Per concurrent user license Per device license Recognized by Gartner AppSense DesktopNow AppiXoft Scense There is a lot to write about License Management in the context of User Environment Management. In forthcoming versions of the \paper more features will be analyzed and described. X X √ X X √ √ √ √ X √ √ √ √ √ √ √ √ √ √ √ √ √ √ Page 126 User Environment Management Comparison Whitepaper 8.10 MONITORING, AUDITING AND REPORTING There is a lot to write about Monitoring, Auditing and Reporting in the context of User Environment Management. In forthcoming versions of the whitepaper more features will be analyzed and described. Version 16.03 may 2016 Liquidware Labs Suite Norskale VUEM RES ONE Workspace VMware vROps X X X # √ # X AppSense Desktop Now Functionality Monitoring Session processes Session CPU usage Session Memory usage Average disk queue length User logon/logoff process User Logon time (average/per user) User Experience AppiXoft Scense A number of vendors listed in this document are also offering monitoring solutions. I’ve included the products of those vendors also, not all features of the monitoring products are highlighted of course. This document is about User Environment Management and only the features I find relevant are here. If you are looking for a monitoring product you contact the vendor of that product for more information or if you are located in the Netherlands contact us. √ √ √ # √ # X √ √ √ √ √ √ # √ √ √ √ √ √ √ √ √ X # √ # X √ √ √ √ √ √ X Page 127 User Environment Management Version 16.03 Liquidware Labs Suite Norskale VUEM RES ONE Workspace VMware vROps X X # √ X # Auditing End-point audit information available (allow/deny access) Audit change log (generic) Audit change log (detailed per object) Review user logon and logoff process with history X X X X √ √ √ √ √ √ √ √ X √ √ √ X √ √ √ # # # # Reporting End-point software inventory End-point software usage inventory Resultant set of user specific applied UEM settings (logging) Resultant set of user specific applied UEM settings (planning) Export configuration / settings for documentation purposes Report application usage Report sessions usage Report application/license use per user Report application/license use per OU Report application/license use per device X X X X X √ X √ X X √ √ √ √ √ √ √ √ X √ √ √ √ √ √ √ √ √ √ √ √ X √ √ X √ √ √ X X √ √ √ √ √ √ √ √ √ √ # # # # # √ # # # # AppiXoft Scense Functionality Content switching AppSense Desktop Now Comparison Whitepaper may 2016 Page 128 User Environment Management Version 16.03 Liquidware Labs Suite Norskale VUEM RES ONE Workspace VMware vROps √ X √ X # # X √ # # √ X √ √ # # √ √ # # √ √ √ √ # # √ √ # # X X X √ √ √ X X # # √ √ √ √ # # √ √ √ √ # # # # # # # # # # User Analysis by IT support Location and Devices (contextual user information) Account Properties (UEM/Active Directory/IT Store Services) Application Access File Types associations E-mail Settings Data Sources Environment Variables X X X X X X X X X X X X X X X X √ X √ X X X √ √ √ X √ √ √ √ √ √ √ √ √ X X X X X X X may 2016 AppiXoft Scense Functionality Report application/license use during a specific time frame Report application/license use by session state. Report users per application Report application CPU usage per user/computer/OU/Top10 Report application RAM usage per user/computer/OU/Top10 Report application I/O usages per user/computer/OU/Top10 Report website usage Report license usage Export Application security log for use with external products Export Removalbe disk security log for use with external products AppSense Desktop Now Comparison Whitepaper Page 129 User Environment Management Version 16.03 may 2016 Liquidware Labs Suite Norskale VUEM RES ONE Workspace VMware vROps X X X X X X X X X X X X X X X X X X X AppSense Desktop Now Functionality Commands (VBscript/PowerShell) Drive and Port Mappings Drive Substitutes Folder Redirection Folder Synchronization User Home Directory User Profile Microsoft Configuration Manager tasks Printers User Registry/Policy User Settings (view actual configuration) User Settings (export configuration including registry and file/folders) User Settings restore Application Security log User Installed Applications log Website security log Removable Disks log File and Folder log Network Connections log AppiXoft Scense Comparison Whitepaper X X X X X X X X X X X X X X X X X X X √ √ X √ √ X X X X X X X X # # # # # # √ √ √ √ X √ √ X √ √ √ X √ X X X X X X √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ X X X X X X X X X X X X X # # # # # # Page 130 User Environment Management Version 16.03 Liquidware Labs Suite Norskale VUEM RES ONE Workspace VMware vROps X X X X X X X X # # # # X X X X √ √ √ √ # # # # UEM Self-Service in a controlled User Environment Restore profile data Application start-up Application desktop short-cuts Application pin to task bar Desktop background picture Screensaver Swap mouse buttons Usage statistics Set default printer based on location (including local printers) View context information Language Configuration refresh X X X X X X X X X X X X √ X X X X X X X X X X X # # # # # # # # # # # # X √ √ √ √ X X √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ # X X X X X X X X X X X may 2016 AppiXoft Scense Functionality User Sessions UEM Event Log Performance events Microsoft Remote Assistance Integration AppSense Desktop Now Comparison Whitepaper Page 131 User Environment Management Comparison Whitepaper 9. CONCLUSION UEM is a key part in our environment these days, more then ever it is a component that you can’t do without. With so many players on the market it’s hard to find the one that you need. In this whitepaper we tried to help you understand what UEM stands for, what you already got when you are a Microsoft customer, where to think about when looking for UEM and what the differences are between the products. Which User Environment Management solution is THE best?!; Good Question! As said before, we don’t judge we compare. Which solution is the best? The best solution is the one that fits your use case, your environment, your users and your app strategy. Together with your IT partner you now have the ability to go deeper in your UEM selection process, the pieces are on the table and they just need to know your requirements. Key areas for your User Environment Management strategy are: Version 16.03 Are you investigating a tactical (point)-or strategic solution? What do you want to solve? What’s your desktop delivery and migration strategy for Windows 7? How do you take care of profile changes during a migration (v1 and v2)? What is your roleback strategy when all the user and application settings are migrated to Windows 7? Is work shifting a key driver for the Optimized Desktop? How are the roaming/flexible and mobile users within the organization facilitated? How do you achieve consistent and uniform user environment across Desktop, Laptop, VDI, Terminal Services in managed and un-managed scenarios?! How do you design, control and maintain logon scripts and user profiles? Are you facing long logon times to your environment and applications? Would your end-users benefit from a Profile clean-up? Are you facing profile corruption? How do you handle all the application and user preferences such as printers, file-types, drive mappings, access to applications, data, and network resources and application settings? How many people really understand the complex and often legacy internal scripts? How agile are these scripts and settings? Is Application Virtualization in scope, how do you handle application preferences in a mixed OS and Application, and Desktop Delivery infrastructure? Do you need context awareness? Based on user/role, device, location and various settings access to application resources is controlled and enforced when needed. What is your Application and Desktop Delivery solution in BYOC scenarios? How do you deliver applications to these (un-managed) devices? What is the role of UEM? Does the end-user need the ability to install and update applications? Is User Installed Applications functionality needed? Does the user have the correct privileges to install, or update software? may 2016 Page 132 User Environment Management Comparison Whitepaper Version 16.03 How do you control, administer, audit and report which user has access to which application from specific devices or locations? How do you control application usage, user rights management? What solutions do you use to make sure you’re compliant? Can you measure, track and enforce licensing? How do you currently license per device applications such as Microsoft Project and Microsoft Visio? Are billing, license-management, reporting and/or charge-back of the delivered applications needed? Do you want to offer a Self-Support tool to your users to reduce the amount of Helpdesk calls? Does the User Environment Management solution need to be proven and mature? What is your definition of proven? Is “Layering the cake” / separation of Operating System - Application - and User Preferences part of the overall desktop strategy? Bottom Line: Does IT have focus on your end-user?! may 2016 Page 133 User Environment Management Comparison Whitepaper 10. CHANGE LOG Date June 2011 v1.0 - Initial Release Date June 2011 v1.0.3 – Minor layout fixes + minor RES fixes in tables. Date June 2011 v1.0.4 – Minor layout fixes Date November 2011 v1.1 – Community and vendor feedback Version 16.03 Re-read and reviewed the complete document Removed some typographical errors Added information in chapter 1 to highlight objectives, suggestions and improvements Introduced the term business-consumer besides of end-user Added chapter 3.3, ‘Layering the cake and Application Delivery’ Added information in chapter 3.4, ‘User Centric Computing’ Updated chapter 3.7, ‘Why UEM’ Updated chapter 3.8, ‘UEM Functionality’; different naming to stretch the functionality and Desktop Transformation Updated Chapter 3.9, ‘UEM Strategy’ and added new strategic questions. Updated chapter 3.11, ‘What’s a name’ and added table ‘Overall terms and definitions’ Updated chapter 3.12, ‘FAQ’ Updated chapter 4.2, ‘User Personalization’ header and small items in text Updated chapter 4.3, ‘Application Access Control’ header and small topics in text Updated chapter 4.5, ‘Licensing’ - small topics in text Updated chapter 4.6, ’Monitoring, Auditing and Reporting’ small topics in text Updated chapter 4.7, ‘Application Delivery’ in context of UEM; Updated chapter 5.1 and 5.2 to highlight the goal and focus of the vendor solution matric Updated chapter 5.2, ‘vendor solutions matrix’ Updated chapter 5.3.2, AppSense functionality - License Control Updated chapter 5.5, ‘Immidio’, introduction, functionality and pricing Updated chapter 5.9, ‘RES Software’ Updated chapter 5.9.6, ‘RES Dynamic Desktop Studio’ Updated chapter 6.1, ‘Introduction’ and ‘vendor solutions matrix’ Updated chapter 6.2, ‘Product version’ New features added: may 2016 Page 134 User Environment Management Comparison Whitepaper o Version 16.03 Management Server / UEM solution, Database instance officially support 20K concurrent connections Features updated, Generic Features and Functionality o Management Server / UEM solution. Server instance officially supports X.XXX concurrent connections o Licenses, Education license program o Support and Community; 10+ of public available enterprise (50K CCU) references in EU using UEM solution o Support and Community; Professional Services Organization o Client (endpoint) Operating System support; Windows 8 Features updated, User Profile Management o Action triggers, Process Start – From UNC Path o Native policy actions, Text File Update o Native policy actions, Text File Search o Native policy actions, File & Folder Copy o Built-in rules / native conditions, Counter Condition – Run Once >>Run many Features updated, Application Access Control o Display warning / Dialog box o Auditing and reporting of self-elevation o Elevate/Reduce user right for Applications o Elevation/Reduce user rights to Control Panel Applets o Elevate user rights on the internet for ActiveX / Web Installations o Elevate user rights for Application Installations o Self-Elevation of user rights on demand with white & blacklist options Features updated, License Management o Per device license (recognized and approved by ISV /Microsoft) Features changes: AppSense o Concurrent user/desktop licenses o Per device licenses o Enterprise/site license program o Academic/Education license program o Service Provider license program o Integration with 3rd party systems management solutions o Scripting (none PowerShell) support and command-line interface o Datastore transfer Protocol - TCP / configurable and supported o Client/User Session EnvironmentAgent technology, Service (hooks WinLogon) o Lockdown and removal of OS and 3rd party application UI/content o Built-in rules / native conditions, Operating System Service Pack may 2016 Page 135 User Environment Management Comparison Whitepaper Version 16.03 o Built-in rules / native conditions, Operating System version o Built-in rules / native conditions, User Domain o Built-in rules / native conditions, File / Folder match (exists, version) o Built-in rules / native conditions, Date/time match o Built-in rules / native conditions, Environment variables o Built-in rules / native conditions, Terminal Server o Built-in rules / native conditions, Registry match o Built-in rules / native conditions, Time range o Built-in rules / native conditions, User interaction - Yes/No response o Block/filter types/details (what to block), URL Filtering o Block/filter types/details (what to block), Software Installation o Block/filter types/details (what to block), Sessions o Block/filter types/details (what to block), Registry keys o Block/filter types/details (what to block), Scripts o Throttling options, Share based Memory throttling o Throttling options, Limit based Memory throttling per user o Monitoring, Session processes o Monitoring, Session CPU usage o Monitoring, Session Memory usage o Reporting, Resultant set of user specific applied UEM settings (planning) o Reporting, Report sessions usage o Reporting, Report application/license use per user o Reporting, Report application/license use per OU o Reporting, Report application/license use per device o Reporting, Report application/license use during a specific time frame o Reporting, Report application/license use by session state o Reporting, Report users per application o Reporting, Reporting application CPU usage per user/computer/OU o Reporting, Report website usage o Client/User Session Environment o Agent technology, Service o Agent technology, Service (parent process) o Agent technology, Kernel mode filter driver o Command-line parameters o UPM, Migrate from competing products o UPM, Migrate individual apps across versions o Built-in rules / native conditions, Domain Controller o Block/filter types/details (what to block), Scripts RES Software Features updated o Management Platform, Datastore transfer Protocol – SMB may 2016 Page 136 User Environment Management Comparison Whitepaper o Management Platform, Datastore transfer Protocol – CIFS o Agent technology, Service o Agent technology, Kernel mode filter driver o User Profile Datastore, Datastore transfer Protocol - SMB o User Profile Datastore, Datastore transfer Protocol - CIFS o User Profile Datastore, Built-in replication/synchronization o User Profile Datastore, Parallel processing of logon actions Immidio FlexProfiles Fetures update o Personalisation loaded on demand (at app launch) Added information in chapter 7, ‘conclusion’ Added chapter 8, ‘change log’ Date November 2011 v1.11 Added VMware Persona Management vendor information in Chapter 5.14 Date January 2012 v1.2 Review and editing of this document has also been performed by Jeremy Moskowitz, Group Policy MVP. Version 16.03 Grammar and spelling check of complete document Updated chapter 3.9, UEM Strategy Updated chapter 3.12, FAQ Updated chapter 4.1.1, ‘User Profiles 101’ Updated chapter 4.1.4, ‘Where does Group Policy and GPPrefs fit in with UEM’ Updated chapter 5.2, ‘Vendor matrix‘ with Policy Pak Software and updated Triceat and Scense Updated chapter 5.7, ‘Microsoft’ Added chapter 5.8, ‘PolicyPak Software’ Updated chapter 5.10.3 and 5.10.6, ‘RES Software’ Updated 5.12, ‘Tricerat’ Updated chapter 6.1, ‘Introduction’ and ‘vendor solutions matrix’ with Policy Pak Software and Tricerat Simply Suite Updated chapter 6.2, ‘Product versions’ Updated chapter 6.5, ‘Generic Features and Functionality with Policy Pak Software Updated chapter 6.6, ‘User Profile Management’with Policy Pak Software Updated chapter 6.7, ‘User Personalization’ with Policy Pak Software Updated chapter 6.5, New features o API Interface (public) and documented o 24 x 7 support, additional pricing o 24 x 7 support included in base license may 2016 Page 137 User Environment Management Comparison Whitepaper o o o Version 16.03 Microsoft SQL Server 2008R2, built-in support for native SQL Mirroring Software and Agents available as 32bits component Software and Agents available as 64bits component, native 64 bits components Updated chapter 6.7, New features o Native policy actions, Ability to write your own Custom Policy Actions o Native policy actions, Custom VBScript queries for Actions o Native policy actions, Custom PowerShell queries for Actions o Native policy actions, Only Copy ‘New’ or ‘Changed’ items, files or folders o Native policy actions, Ability to Mirror Folder to mirror source if files are removed o Native policy actions, Syncronize Folder, unlike Mirror this is a two way process o Built-in rules / native conditions, Ability to write your own Custom Policy Conditions o Built-in rules / native conditions, Custom VBScript queries for Conditions o Built-in rules / native conditions, Custom Jscript queries for Conditions o Built-in rules / native conditions, Custom PowerShell queries for Conditions o Built-in rules / native conditions, Custom PowerShell queries o Built-in rules / native conditions, If .. else condition o Built-in rules / native conditions, Remote Host/URL o Built-in rules / native conditions, Session Type o Built-in rules / native conditions, USB storage device, serial and vendor/product o Built-in rules / native conditions, Any AD User Property Updated chapter 6.7, New features o If application is Elevated, option to not elevate Child Processes spawned from the raised Application o If application is Elevated, option to not elevate Secure Dialog Boxes within the raised Application o Does not create and depend on a Local Adminstrator account on the machine for Elevation of User Rights o Redirect a requested URL to a specified safe URL o Redirect an already open URL when context/condition changes o Redirect URL based on full URL address o Redirect URL based on Sub-Directory of address o Redirect URL based on use of Wild Cards o Time Based Application Access o Contextual nodes/levels (block based on …) Connection Type (e.g. RDP, ICA etc..) may 2016 Page 138 User Environment Management Comparison Whitepaper o Contextual nodes/levels (block based on …) Port Number o Features updated 6.5, Generic Features and Functionality: RES Software o Database instance officially support 20.000 concurrent connections o Integration with 3rd party PC-lifeCycle management solutions o Scripting (not including PowerShell) support and command-line interface o Professional Services Organization - 24h multi-lingual support Features updated 6.5, Generic Features and Functionality: Appsense o Web-based management interface o Delegation of control, granular delegated administration roles o 24 x 7 support included in base license Features updated 6.6, User Profile Management: RES Software o Last write wins - Per Application Features updated 6.6, User Profile Management: Tricerat o Datastore transfer Protocol – SMB o Datastore transfer Protocol - DCOM o Offline (Cached) Mode Features updated 6.6, User Profile Management: AppSense o Application Virtualization support, VMware ThinApp Features updated 6.7, User Personalization, Application and Desktop Management, RES Software o Parallel processing of logon actions o Native Action triggers, Process Start o Native policy actions, File & Folder Copy Features updated 6.7, User Personalization, Application and Desktop Management, Tricerat o Can define an application as a global object o Built-in rules / native conditions, Published Application Name Features updated 6.7, User Personalization, Application and Desktop Management, Appsense o Extendable with 3rd party tools o Built-in rules / native conditions, Vmware View client name Tricerat added to chapter6.8 ,Application Access Control, Security Management Tricerat added to chapter6.10, License Management Date October 2013 v2.0 Review and editing of this document has also been performed by Jeremy Moskowitz, Group Policy MVP. Version 16.03 Added whole chapter (5.8) on UE-V may 2016 Page 139 User Environment Management Comparison Whitepaper Version 16.03 Updated chapter 5.2, ‘Vendor matrix‘ Updated chapter 5.5 and 6.4 (Generic Features and Functionality) for ‘Immidio’ Updated chapter 5.7 on Group Policy, Group Policy Preferences and AGPM o Added AGPM update for clairty o Expanded upon Group Policy Preferences’s Item Level Targeting Updated chapter 5.10 on PolicyPak Application Manager Updated chapter 6.1, ‘vendor solutions matrix’ Features updated 6.4, Generic Features and Functionality: Immidio Flex+ o Microsoft Management Console Interface o Support low bandwidth/high latency WAN connections o Scripting (not including PowerShell) support and command-line interface o Microsoft Group Policy-based management for agent/client settings o API Interface (public) and documented o First year support and maintenance included in license o 24 x 7 support, additional pricing o Service Provider license program o Official training classes available o UEM technology is proven; the solution is being used for 1+ year in enterprise production environments. 10K+ endpoint, various deployment scenarios. o 10+ of public available enterprise (10K CCU) references in EU using UEM solution o Professional Services Organization – Business hours (CET) multi-lingual support o Technical Account Manager (TAM) available o Datastore transfer Protocol - TCP / configurable and supported o Datastore transfer Protocol - Database specific o Datastore transfer Protocol – DCOM o Management through database engine o TCP/IP v6 o Software and Agents available as 32bits component o Software and Agents available as 64bits component, native 64 bits components o Microsoft Windows 8 (x86) o Component with elevated user rights o Citrix XenApp o Microsoft RDSH – RemoteApp (native or MSI) o Microsoft Application Virtualization, App-V (native or MSI) o Symantec Workspace Virtualization (native or MSI) o VMware ThinApp (native or MSI) o Citrix XenApp Streaming o Microsoft MSI may 2016 Page 140 User Environment Management Comparison Whitepaper Features updated 6.5, User Profile Management: Immidio Flex+ o Profile redirection/ streaming / virtualization o Migrate individual apps across versions o Streamed Profiles o Management through database engine o Automatically capture application personalization o Last write wins - Per Session o Pre-cache personalisation on new machines o Symantec Workspace Virtualization o Novell ZENWorks / Spoon.Net Features updated 6.6, User Personalization, Application and Desktop Management: added Immidio Flex+ Vendor Solution Description added/updated : 5.8 VUEM -> Norskale V-UEM Product added/updated 5.2 : VUEM -> Norskale V-UEM Removed Tricerat from detailed feature matrix Added tons of new features and updated the text overall Date February 2013 v2.1 Updated LiquidWare Labs Solution description and mapped the features with latest ProfileUnity version Updated Microsoft UE-V 2.0 Updated PolicyPak Application Manager January – April 2016 – version 16.01 Too many changes in the document after two year, so only highlights of changes will be listed here for the moment, for the next version a more detailed change log will be available. Naming Scense renamed to Appixoft Immidio renamed to VMware UEM VMware PM added to tables RES Software workspace renamed to RES ONE workspace Microsoft has been combined in one column for readability. General Moved all vendors in alphabetic order Generic features and functionality Version 16.03 may 2016 Page 141 User Environment Management Comparison Whitepaper VMware PM added o the table Renamed Quest to DELL Wyse Features of products have been added or changed. User Profile Management Features of products have been added or changed. User Personalization, application and Desktop management Features of products have been added or changed. Application Access Control, security management VMware UEM added in the matrix Liquidware labs added in the matrix Norksale added in the matrix Features of products have been added or changed. Resource Management Features of products have been added or changed. Norskale added to the matrix Liquidware labs added to the matrix License Management Features of products have been added or changed Monitoring, auditing and reporting Features of products have been added or changed. 12th of April 2016 Changed Richard kuipers to Kuiper Changed Geoffrey to Geoffrey Changed Sense to Scense in four occasions. Generic Features and Functionality Changed Windows 201264 and Windows 2012R2 64 at Profile unity to Green May 2016 – 16.03 Removed DELL vWorkspace from the document Generic features and functionality Version 16.03 may 2016 Page 142 User Environment Management Comparison Whitepaper Renamed Windows 2016 to windows 2016 tech preview Changed support for Windows 2016 tech preview to green for RES Change 20000 connections to green for RES Support for Windows 10 tiles for RES turned to green VUEM: force agent to poll NOW for update to green Multi user operations New lines: Appsense: Is VDI (detect Citrix or VMware software) Appsense: WiFi AccessPoint connectivity (BSSID) Appsense: Citrix PVS vDisk present and vDisk mode Appsense: Citrix Netscaler session policies and hostname Appsense: VMware Horizon view Broker Appsense: VMware Horizon View tunneled connection VUEM: Force agent to restart internal controller (not the service) – for e.g. debugging VUEM: Force agent to clear some cache to reinforce some settings VUEM: Force agent to do an administrative refresh User profile management Changed support for Appvolumes and Appdisk to green for RES (SR2) Migrate from v2 to v5 profiles (automatically) Appsense: Automaticall remove personalization data New line: Appsense : Migrate from vx to v6 profiles (automatically Application control and security Change SHA1, SHA256 and MD5 to green for RES Integration Windows Store apps Windows 10 tiles Policy Pinned items Outlook setup Text file create Monitoring, auditing and reporting Version 16.03 may 2016 Page 143 User Environment Management Comparison Whitepaper VUEM: session processes, cpu and memory usage VUEM: report application cpu usage Added line: report user logon time. VUEM: user logon time to green, the rest to # VUEM: Average disk queue length VUEM: User logon time, average and per user Chapter 7 Added new text for FSLogix Chapter 8 Version 16.03 Added VMware vRops to monitoring as it is offered in the Horizon Suite Added Liquidware Lbas Stratusphere UX as it is offered in the suite. Version of AppSense to 10 may 2016 Page 144 User Environment Management Comparison Whitepaper PQR B.V. Rijnzathe 7 3454 PV De Meern The Netherlands Tel: +31 (0)30 6629729 @pqrNL www.PQR.com [email protected] Version 16.03 may 2016 Page 145 as as