BOIS Base Client Services Guide
BOIS Base Client Services Guide
Solutions
Base Client Services Guide
Version 3.0
If you are using this documentation solely for non-commercial purposes internally within YOUR company or
organization, then this documentation is licensed to you under the Creative Commons Attribution-
NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or
send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.
This documentation is provided to you for informational purposes only, and is provided to you entirely "AS IS".
Your use of the documentation cannot be understood as substituting for customized service and information
that might be developed by Microsoft Corporation for a particular user based upon that user’s particular
environment. To the extent permitted by law, MICROSOFT MAKES NO WARRANTY OF ANY KIND, DISCLAIMS
ALL EXPRESS, IMPLIED AND STATUTORY WARRANTIES, AND ASSUMES NO LIABILITY TO YOU FOR ANY
DAMAGES OF ANY TYPE IN CONNECTION WITH THESE MATERIALS OR ANY INTELLECTUAL PROPERTY IN THEM.
Microsoft may have patents, patent applications, trademarks, or other intellectual property rights covering
subject matter within this documentation. Except as provided in a separate agreement from Microsoft, your
use of this document does not give you any license to these patents, trademarks or other intellectual property.
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places and events depicted herein are fictitious.
Microsoft, AcitveX, ForeFront Client Security 2007, System Center Configuration Manager 2007, Windows 2000,
Windows Server 2003, Windows Server 2008, Windows XP, and Windows Vista are either registered trademarks
or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
You have no obligation to give Microsoft any suggestions, comments or other feedback ("Feedback") relating to
the documentation. However, if you do provide any Feedback to Microsoft then you provide to Microsoft,
without charge, the right to use, share and commercialize your Feedback in any way and for any purpose. You
also give to third parties, without charge, any patent rights needed for their products, technologies and services
to use or interface with any specific parts of a Microsoft software or service that includes the Feedback. You will
not give Feedback that is subject to a license that requires Microsoft to license its software or documentation to
third parties because we include your Feedback in them.
Audience
The primary audience for this guide is the experienced IT professional who is responsible
for designing the base client functionality for a branch site infrastructure. Additionally, IT
professional’s responsible support and operations of systems within the branch
infrastructure may also benefit from this guidance.
After these mapping standards have been applied, you should use them as the
default configuration for all of the users; this improves the user experience and eases
future support. Windows is not limited to using letters of the alphabet to provide drive
mappings, so additional drives can be provided directly as required. However, users
typically find it easier to work with drive mappings that use letters.
• Data protection. User files stored on client workstations are at higher risk than those
stored on servers that are backed up. By using Windows Vista Folder Redirection
and Offline Files features, it is possible to redirect user data to the shared drive on a
file server and still maintain a local, synchronized, file cache that can be used when
the computer is unable to connect to the local file server. For more information about
configuring these features, see the “Managing Roaming User Data Deployment
Guide” at http://go.microsoft.com/fwlink/?LinkId=73760.
• Mobile users. If users access different computers and want to maintain common
sets of configuration settings for their desktop environment, you should consider
using Windows Roaming Profiles. This feature enables you to manage a profile that
users are able to access from any client computer on the organization's network.
Windows Roaming Profiles can also have a significant impact on network traffic, so
you should carry out testing before you implement it in the environment. For more
information about Windows Vista features for mobile user data, see the “Managing
Roaming User Data Deployment Guide” at
http://go.microsoft.com/fwlink/?LinkId=73760.
You should consider the following issues related to the optimization of printers for client
connections:
• Printing requirements. Each client at a branch site may have specific printing
requirements. Examples include special security requirements, specific format
printing, offsite printing, and high volume printing.
• Physical printer location. Printers can be located both onsite and offsite. The printer
location tracking feature of Windows Server 2008 can help users locate printers that
are nearest to them. For more information about this feature, see "Enable printer
location tracking," at http://go.microsoft.com/fwlink/?LinkId=57499
• Physical printer connection. How clients will connect to the printer. This could
include the following connections: Universal Serial Bus (USB), network, parallel, and
wireless (802.11, IrDA, and Bluetooth).
• Printer driver optimization. Network traffic generated by printing can be significant,
especially if print jobs cross a WAN. Understanding the print process and resulting
network loads is an important part of the print service design (see the “BOIS Print
Services Guide” for more information).
versions of Windows Firewall that were included with Windows XP did not prevent
infected hosts from transmitting malicious packets, Windows Firewall with Advanced
Security supports inbound and outbound filtering based on port, service, and several
other filter types. This version also has integrated support for IPSec and Network
Access Protection, which can help to isolate internal network attached devices from
devices that do not meet security policies or comply with health check processes.
• Malware scanners. This scanner should provide checks on all files being moved
from, or to, the client computer in real time. You should also consider a more system-
intensive, on-demand scanner to ensure that the system has not been attacked.
Historically, two basic categories of scanners have been provided. These are:
• Antivirus scanners. These scanners focus on protection from malicious software
that infects files on a computer and then tries to replicate copies of itself to other
computers on the network.
• Anti-spyware scanners. These scanners provide defense against applications
that try to steal information from a computer by using a number of hidden
techniques such as keyboard monitoring or browser hijacking.
Many of these scanners are now being upgraded to prevent both types of attacks.
For example, the Microsoft Forefront Client Security service helps to protect business
desktops, mobile computers, and file servers from threats such as spyware and
rootkits, as well as viruses and other traditional attacks. For more information about
this service, see "Microsoft Forefront Client Security" at
http://www.microsoft.com/forefront/clientsecurity.
Note Microsoft also provides Windows OneCare™ computer protection and maintenance
software and services and Windows Defender services to protect client workstations.
However, these services are generally provided for the home environment, so they are not
considered to be part of the business solution discussed in this guide.
• Least user privileges. You should configure the local users’ account to have the
least amount of privileges that enable them to perform their normal job functions. If
necessary, you can consider providing local users with access to a second
administrator account for the occasions when more access is required, however, they
should not use this account for normal daily activities.
• User guidelines. You should provide users with a short and concise set of guidelines
so that they can understand how they can limit their own vulnerability to attacks by
being aware of unusual system behavior, file downloads, Internet scams, and so on.
For more information about designing an effective malware protection system, see the
“Microsoft Antivirus Defense-in-Depth Guide”, at
www.microsoft.com/technet/security/topics/serversecurity/avdind_0.mspx
Summary
Branch clients can require varying levels of support compared to hub site clients, but all
clients share the need for basic services that give access to resources, protect from
malicious users, and allow effective client management and support. These base client
services can be achieved cost-effectively by using a combination of homogenous
technologies and built-in core client services, which enables you to use your existing
software. However, the requirements for each site should be carefully examined to
determine which approach to supplying these core services best meets your existing and
future needs.
Additional Resources
For more information about base client services for Windows Vista and Windows Server
2008, please refer to the following resources:
For more information and guidance related to BOIS, see the Branch Office home page at:
http://www.microsoft.com/branchoffice
For more information about the features available in Windows Server 2008, see the
Windows Server 2008 TechCenter at:
http://technet.microsoft.com/en-us/windowsserver/2008
For more information about reduced profile server core installations, see the “Server Core
Installation Option for Windows Server 2008 Step-by-Step Guide” at
http://go.microsoft.com/fwlink/?LinkID=105293
For more information about server virtualization in Windows Server 2008, see the
Windows Server 2008 Hyper-V TechCenter at
http://go.microsoft.com/fwlink/?LinkId=101268
For more information about Windows Vista management capabilities, see the Windows
Vista Management Features page at
http://technet.microsoft.com/en-us/windowsvista/aa905069.aspx
For information about Microsoft client security using ForeFront 2007, see "Microsoft
Forefront Client Security" at http://www.microsoft.com/forefront/clientsecurity
Feedback
Please direct questions and comments about this guide to satfdbk@microsoft.com.