Windows 10 enterprise e3 vda назначение

Подписка (электронно) Microsoft Windows 10 Enterprise E3 VDA

Если вам нужна помощь в подборе похожего товара, вы можете написать нам в чат или заказать звонок.

Основные характеристики

Windows 10 Enterprise E3 — предложение, которое позволяет по подписке пользоваться эксклюзивными возможностями, зарезервированными для операционной системы Windows 10 Enterprise. Без права локальной установки (только VDA).

Характеристики Microsoft Windows 10 Enterprise E3 VDA

Основные характеристики

Особенности

Допускается установка на тонкие клиенты и обновление устройств с ОС отличной от Windows Pro. Возможно использование только для VDA.

Системные требования

Отзывы 0

Ваш отзыв о Подписка (электронно) Microsoft Windows 10 Enterprise E3 VDA

  • Описание
  • Характеристики
  • Отзывы

Microsoft Windows 10 Enterprise E3 VDA сертифицирован для продажи в России.

Подписка (электронно) Microsoft Windows 10 Enterprise E3 VDA – фото, технические характеристики, условия доставки по Москве и России. Для того, чтобы купить подписка (электронно) Microsoft Windows 10 Enterprise E3 VDA в интернет-магазине Xcom-shop.ru, достаточно заполнить форму онлайн заказа или позвонить по телефонам: +7 (495) 799-96-69, +7 (800) 200-00-69.

Изображения товара, включая цвет, могут отличаться от реального внешнего вида. Комплектация также может быть изменена производителем без предварительного уведомления. Данное описание и количество товара не является публичной офертой.

Доступ к услуге цифрового сервиса Windows 10 Enterprise E3 VDA (corporate)

Нужна помощь в выборе программы?

Характеристики:

Артикул: MSSERV4B6-A8CE1-YNR
Вид поставки: Электронная
Базовая единица: шт

Описание товара:

Разработчик: Microsoft
Тип поставки: Электронно
Тип лицензии: Лицензия на 1 пользователя
Тип организации: Коммерческая
Срок действия лицензии: 1 год
Наличие технической поддержки: да
Язык интерфейса продукта: Мультиязычный

Windows 10 Enterprise E3 — это идеальное решение для компаний, у которых нет больших ИТ-бюджетов и целого штата ИТ-специалистов и которые хотят, чтобы их потребности в лицензионном ПО и сервисах были удовлетворены компетентной и надёжной компанией-поставщиком.

VDA разрешает запустить до четырех экземпляров настольной Windows в виртуальных операционных средах и осуществлять к ним удаленный доступ с лицензированного устройства для одновременного использования одним пользователем. Основной пользователь устройства, которому назначена лицензия VDA, имеет право подключаться к разрешенным виртуальным экземплярам Windows с помощью любых устройств в организации и за ее пределами.

Основные функции Windows 10 Enterprise E3:

Устройства, которые в настоящее время работают под управлением Windows 10 Pro версии 1607, могут получить Windows 10 Корпоративная с Current/ Branch (CB) или Current Branch for Business (CBB). Выпуск с долгосрочным обслуживанием (Long Term Service Branch, LTSB) сюда не входит.

Поддержка любого количества пользователей, от одного до нескольких сотен

Хотя программа «Windows 10 Корпоративная E3 в CSP» не предусматривает ограничений по количеству лицензий, которые может приобрести организация, эта программа ориентирована на малые и средние организации.

Развертывание до пяти устройств

Для каждого пользователя, на которого распространяется лицензия, вы можете развернуть Windows 10 Корпоративная на пяти устройствах.

Возможность отката до Windows 10 Pro в любой момент

После истечения срока действия подписки или в случае ее передачи другому пользователю устройство с Windows 10 Корпоративная автоматически возвращается к Windows 10 Pro (по истечении льготного периода, составляющего 90 дней).

Помесячная оплата за каждого пользователя

Благодаря этому Windows 10 Корпоративная E3 будет доступна любой организации.

Возможность перераспределения лицензий между пользователями

Лицензии можно легко и быстро передавать от одного пользователя к другому, что позволяет оптимально использовать приобретенные лицензии в условиях изменения потребностей.

Усовершенствованные характеристики безопасности Windows 10, которые помогут компаниям защитить конфиденциальные данные и персональную информацию, обеспечить защиту всех устройств от угроз кибербезопасности, предоставить сотрудникам свободу и гибкость доступа к конфиденциальным данным на различных устройствах, а также контролировать доступ к строго секретным данным.

Упрощённое лицензирование и использование

Эти возможности помогут компаниям снизить капитальные расходы, исключив необходимость инвентаризации и аудита устройств, и позволят легко управлять лицензиями при использовании модели лицензирования по подписке в расчёте на одного пользователя. Это новое предложение позволит компаниям перейти от Windows 10 Pro к Windows 10 Enterprise E3 без перезапуска систем.

Управление IT через партнера

Настраивать ваше оборудование и управлять им может ваш партнёр, обладающий экспертными знаниями в использовании Windows 10 и развёртывании облачных сервисов. Партнёр может также помогать клиентам формировать стратегию обеспечения безопасности и стратегию управления устройствами, с помощью уникальных особенностей Windows 10. Компании-клиенты смогут проверять данные об использовании подписок на Windows 10 Enterprise и другие приобретённые облачные сервисы Microsoft с помощью веб-интерфейса на портале своего поставщика. Упрощённое управление будет осуществляться по одному контракту, через одну пользовательскую учётную запись, один контакт для взаимодействия с технической поддержкой и с одним упрощённым счётом для оплаты услуг.

Windows 10 Enterprise E3 in CSP

Windows 10 Enterprise E3 launched in the Cloud Solution Provider (CSP) channel on September 1, 2016. Windows 10 Enterprise E3 in CSP is a new offering that delivers, by subscription, exclusive features reserved for Windows 10 Enterprise edition. This offering is available through the Cloud Solution Provider (CSP) channel via the Partner Center as an online service. WindowsВ 10 EnterpriseВ E3 in CSP provides a flexible, per-user subscription for small- and medium-sized organizations (from one to hundreds of users). To take advantage of this offering, you must have the following:

  • WindowsВ 10 Pro, version 1607 (Windows 10 Anniversary Update) or later, installed and activated, on the devices to be upgraded
  • Azure Active Directory (Azure AD) available for identity management
Читайте также:  Активировать сетевой интерфейс linux

Starting with Windows 10, version 1607 (Windows 10 Anniversary Update), you can move from Windows 10 Pro to Windows 10 Enterprise more easily than ever before—no keys and no reboots. After one of your users enters the Azure AD credentials associated with a Windows 10 Enterprise E3 license, the operating system turns from Windows 10 Pro to Windows 10 Enterprise and all the appropriate Windows 10 Enterprise features are unlocked. When a subscription license expires or is transferred to another user, the Windows 10 Enterprise device seamlessly steps back down to Windows 10 Pro.

Previously, only organizations with a Microsoft Volume Licensing Agreement could deploy WindowsВ 10 Enterprise to their users. Now, with WindowsВ 10 EnterpriseВ E3 in CSP, small- and medium-sized organizations can more easily take advantage of WindowsВ 10 Enterprise features.

When you purchase WindowsВ 10 EnterpriseВ E3 via a partner, you get the following benefits:

WindowsВ 10 Enterprise edition. Devices currently running WindowsВ 10 Pro, version 1607 can get WindowsВ 10 Enterprise Current Branch (CB) or Current Branch for Business (CBB). This benefit does not include Long Term Service Branch (LTSB).

Support from one to hundreds of users. Although the WindowsВ 10 Enterprise E3 in CSP program does not have a limitation on the number of licenses an organization can have, the program is designed for small- and medium-sized organizations.

Deploy on up to five devices. For each user covered by the license, you can deploy Windows 10 Enterprise edition on up to five devices.

Roll back to Windows 10 Pro at any time. When a user’s subscription expires or is transferred to another user, the Windows 10 Enterprise device reverts seamlessly to Windows 10 Pro edition (after a grace period of up to 90 days).

Monthly, per-user pricing model. This makes WindowsВ 10 Enterprise E3 affordable for any organization.

Move licenses between users. Licenses can be quickly and easily reallocated from one user to another user, allowing you to optimize your licensing investment against changing needs.

How does the WindowsВ 10 EnterpriseВ E3 in CSP program compare with Microsoft Volume Licensing Agreements and Software Assurance?

Microsoft Volume Licensing programs are broader in scope, providing organizations with access to licensing for all Microsoft products.

Software Assurance provides organizations with the following categories of benefits:

Deployment and management. These benefits include planning services, Microsoft Desktop Optimization (MDOP), Windows Virtual Desktop Access Rights, Windows-To-Go Rights, Windows Roaming Use Rights, Windows Thin PC, Windows RT Companion VDA Rights, and other benefits.

Training. These benefits include training vouchers, online e-learning, and a home use program.

Support. These benefits include 24×7 problem resolution support, backup capabilities for disaster recovery, System Center Global Service Monitor, and a passive secondary instance of SQL Server.

Specialized. These benefits include step-up licensing availability (which enables you to migrate software from an earlier edition to a higher-level edition) and to spread license and Software Assurance payments across three equal, annual sums.

In addition, in WindowsВ 10 EnterpriseВ E3 in CSP, a partner can manage your licenses for you. With Software Assurance, you, the customer, manage your own licenses.

In summary, the WindowsВ 10 Enterprise E3 in CSP program is an upgrade offering that provides small- and medium-sized organizations easier, more flexible access to the benefits of WindowsВ 10 Enterprise edition, whereas Microsoft Volume Licensing programs and Software Assurance are broader in scope and provide benefits beyond access to WindowsВ 10 Enterprise edition.

Compare WindowsВ 10 Pro and Enterprise editions

WindowsВ 10 Enterprise edition has a number of features that are unavailable in WindowsВ 10 Pro. TableВ 1 lists the WindowsВ 10 Enterprise features not found in WindowsВ 10 Pro. Many of these features are security-related, whereas others enable finer-grained device management.

TableВ 1. WindowsВ 10 Enterprise features not found in WindowsВ 10 Pro

This feature uses virtualization-based security to help protect security secrets (for example, NTLM password hashes, Kerberos Ticket Granting Tickets) so that only privileged system software can access them. This helps prevent Pass-the-Hash or Pass-the-Ticket attacks.

Credential Guard has the following features:

Hardware-level security. Credential Guard uses hardware platform security features (such as Secure Boot and virtualization) to help protect derived domain credentials and other secrets.

Virtualization-based security. Windows services that access derived domain credentials and other secrets run in a virtualized, protected environment that is isolated.

Improved protection against persistent threats. Credential Guard works with other technologies (e.g., Device Guard) to help provide further protection against attacks, no matter how persistent.

Improved manageability. Credential Guard can be managed through Group Policy, Windows Management Instrumentation (WMI), or Windows PowerShell.

Credential Guard requires UEFI 2.3.1 or greater with Trusted Boot; Virtualization Extensions such as Intel VT-x, AMD-V, and SLAT must be enabled; x64 version of Windows; IOMMU, such as Intel VT-d, AMD-Vi; BIOS Lockdown; TPM 2.0 recommended for device health attestation (will use software if TPM 2.0 not present)

This feature is a combination of hardware and software security features that allows only trusted applications to run on a device. Even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to run executable code. Device Guard can use virtualization-based security (VBS) in WindowsВ 10 Enterprise edition to isolate the Code Integrity service from the Windows kernel itself. With VBS, even if malware gains access to the kernel, the effects can be severely limited, because the hypervisor can prevent the malware from executing code.

Device Guard does the following:

Helps protect against malware

Helps protect the Windows system core from vulnerability and zero-day exploits

Allows only trusted apps to run

This feature helps IT pros determine which applications and files users can run on a device. The applications and files that can be managed include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers.

For more information, see AppLocker.

Application Virtualization (App-V)

This feature makes applications available to end users without installing the applications directly on users’ devices. App-V transforms applications into centrally managed services that are never installed and don’t conflict with other applications. This feature also helps ensure that applications are kept current with the latest security updates.

User Experience Virtualization (UE-V)

With this feature, you can capture user-customized Windows and application settings and store them on a centrally managed network file share. When users log on, their personalized settings are applied to their work session, regardless of which device or virtual desktop infrastructure (VDI) sessions they log on to.

UE-V provides the ability to do the following:

Specify which application and Windows settings synchronize across user devices

Deliver the settings anytime and anywhere users work throughout the enterprise

Create custom templates for your third-party or line-of-business applications

Recover settings after hardware replacement or upgrade, or after re-imaging a virtual machine to its initial state

Managed User Experience

This feature helps customize and lock down a Windows device’s user interface to restrict it to a specific task. For example, you can configure a device for a controlled scenario such as a kiosk or classroom device. The user experience would be automatically reset once a user signs off. You can also restrict access to services including Cortana or the Windows Store, and manage Start layout options, such as:

Removing and preventing access to the Shut Down, Restart, Sleep, and Hibernate commands

Removing Log Off (the User tile) from the Start menu

Removing frequent programs from the Start menu

Removing the All Programs list from the Start menu

Preventing users from customizing their Start screen

Forcing Start menu to be either full-screen size or menu size

Preventing changes to Taskbar and Start menu settings

Deployment of Windows 10 Enterprise E3 licenses

Deploy WindowsВ 10 Enterprise features

Now that you have Windows 10 Enterprise edition running on devices, how do you take advantage of the Enterprise edition features and capabilities? What are the next steps that need to be taken for each of the features discussed in Table 1?

The following sections provide you with the high-level tasks that need to be performed in your environment to help users take advantage of the WindowsВ 10 Enterprise edition features.

Credential Guard*

You can implement Credential Guard on WindowsВ 10 Enterprise devices by turning on Credential Guard on these devices. Credential Guard uses WindowsВ 10 virtualization-based security features (Hyper-V features) that must be enabled on each device before you can turn on Credential Guard. You can turn on Credential Guard by using one of the following methods:

Automated. You can automatically turn on Credential Guard for one or more devices by using Group Policy. The Group Policy settings automatically add the virtualization-based security features and configure the Credential Guard registry settings on managed devices.

Manual. You can manually turn on Credential Guard by doing the following:

Add the virtualization-based security features by using Programs and Features or Deployment Image Servicing and Management (DISM).

Configure Credential Guard registry settings by using the Registry Editor or the Device Guard and Credential Guard hardware readiness tool.

You can automate these manual steps by using a management tool such as Microsoft Endpoint Configuration Manager.

For more information about implementing Credential Guard, see the following resources:

* Requires UEFI 2.3.1 or greater with Trusted Boot; Virtualization Extensions such as Intel VT-x, AMD-V, and SLAT must be enabled; x64 version of Windows; IOMMU, such as Intel VT-d, AMD-Vi; BIOS Lockdown; TPM 2.0 recommended for device health attestation (will use software if TPM 2.0 not present)

Device Guard

Now that the devices have WindowsВ 10 Enterprise, you can implement Device Guard on the WindowsВ 10 Enterprise devices by performing the following steps:

Optionally, create a signing certificate for code integrity policies. As you deploy code integrity policies, you might need to sign catalog files or code integrity policies internally. To do this, you will either need a publicly issued code signing certificate (that you purchase) or an internal certificate authority (CA). If you choose to use an internal CA, you will need to create a code signing certificate.

Create code integrity policies from “golden” computers. When you have identified departments or roles that use distinctive or partly distinctive sets of hardware and software, you can set up “golden” computers containing that software and hardware. In this respect, creating and managing code integrity policies to align with the needs of roles or departments can be similar to managing corporate images. From each “golden” computer, you can create a code integrity policy and decide how to manage that policy. You can merge code integrity policies to create a broader policy or a master policy, or you can manage and deploy each policy individually.

Audit the code integrity policy and capture information about applications that are outside the policy. We recommend that you use “audit mode” to carefully test each code integrity policy before you enforce it. With audit mode, no application is blocked—the policy just logs an event whenever an application outside the policy is started. Later, you can expand the policy to allow these applications, as needed.

Create a “catalog file” for unsigned line-of-business (LOB) applications. Use the Package Inspector tool to create and sign a catalog file for your unsigned LOB applications. In later steps, you can merge the catalog file’s signature into your code integrity policy so that applications in the catalog will be allowed by the policy.

Capture needed policy information from the event log, and merge information into the existing policy as needed. After a code integrity policy has been running for a time in audit mode, the event log will contain information about applications that are outside the policy. To expand the policy so that it allows for these applications, use Windows PowerShell commands to capture the needed policy information from the event log, and then merge that information into the existing policy. You can merge code integrity policies from other sources also, for flexibility in how you create your final code integrity policies.

Deploy code integrity policies and catalog files. After you confirm that you have completed all the preceding steps, you can begin deploying catalog files and taking code integrity policies out of audit mode. We strongly recommend that you begin this process with a test group of users. This provides a final quality-control validation before you deploy the catalog files and code integrity policies more broadly.

Enable desired hardware security features. Hardware-based security features—also called virtualization-based security (VBS) features—strengthen the protections offered by code integrity policies.

For more information about implementing Device Guard, see:

AppLocker management

You can manage AppLocker in WindowsВ 10 Enterprise by using Group Policy. Group Policy requires that the you have AD DS and that the WindowsВ 10 Enterprise devices are joined to the your AD DS domain. You can create AppLocker rules by using Group Policy, and then target those rules to the appropriate devices.

For more information about AppLocker management by using Group Policy, see AppLocker deployment guide.

App-V requires an App-V server infrastructure to support App-V clients. The primary App-V components that the you must have are as follows:

App-V server. The App-V server provides App-V management, virtualized app publishing, app streaming, and reporting services. Each of these services can be run on one server or can be run individually on multiple servers. For example, you could have multiple streaming servers. App-V clients contact App-V servers to determine which apps are published to the user or device, and then run the virtualized app from the server.

App-V sequencer. The App-V sequencer is a typical client device that is used to sequence (capture) apps and prepare them for hosting from the App-V server. You install apps on the App-V sequencer, and the App-V sequencer software determines the files and registry settings that are changed during app installation. Then the sequencer captures these settings to create a virtualized app.

App-V client. The App-V client must be enabled on any client device on which apps will be run from the App-V server. These will be the WindowsВ 10 Enterprise E3 devices.

For more information about implementing the App-V server, App-V sequencer, and App-V client, see the following resources:

UE-V requires server- and client-side components that you you’ll need to download, activate, and install. These components include:

UE-V service. The UE-V service (when enabled on devices) monitors registered applications and Windows for any settings changes, then synchronizes those settings between devices.

Settings packages. Settings packages created by the UE-V service store application settings and Windows settings. Settings packages are built, locally stored, and copied to the settings storage location.

Settings storage location. This location is a standard network share that your users can access. The UE-V service verifies the location and creates a hidden system folder in which to store and retrieve user settings.

Settings location templates. Settings location templates are XML files that UE-V uses to monitor and synchronize desktop application settings and Windows desktop settings between user computers. By default, some settings location templates are included in UE-V. You can also create, edit, or validate custom settings location templates by using the UE-V template generator. Settings location templates are not required for Windows applications.

Universal Windows applications list. UE-V determines which Windows applications are enabled for settings synchronization using a managed list of applications. By default, this list includes most Windows applications.

For more information about deploying UE-V, see the following resources:

Managed User Experience

The Managed User Experience feature is a set of WindowsВ 10 Enterprise edition features and corresponding settings that you can use to manage user experience. Table 2 describes the Managed User Experience settings (by category), which are only available in WindowsВ 10 Enterprise edition. The management methods used to configure each feature depend on the feature. Some features are configured by using Group Policy, while others are configured by using Windows PowerShell, Deployment Image Servicing and Management (DISM), or other command-line tools. For the Group Policy settings, you must have AD DS with the WindowsВ 10 Enterprise devices joined to your AD DS domain.

TableВ 2. Managed User Experience features

Оцените статью
Feature Description