SlideShare una empresa de Scribd logo
1 de 46
Denis Gundarev
Entisys Solutions
Application Streaming is
dead, what are the options?
Agenda
• What is Application Streaming (Virtualization)?
• Application Virtualization internals
• Overview of available solutions
Application Isolation Environments
• Was introduced in MetaFrame Presentation Server 4.0 (2005)
• Virtualization layer that redirects system resources
• Virtualizes:
– File system
– Registry
– Named objects (events, semaphores, etc)
• Transparent to the application
• Was a great compatibility aid for:
– Applications which are not multi user friendly
– Applications which have problems coexisting on the same server
– Applications that cannot have multiple instances running simultaneously
Launching initial process into AIE
File System Isolation
Isolation Environment
Launcher (aierun.exe)
Registry and
Object Isolation
Application
(eg winword.exe)
IMA
2. Launch application
suspended
4. Resume process
File System Object
Manager
Registry
5. Read rules
from driver
and start
isolating
6. Application
execution
continues
3. Tell driver
about AIE
being
launched.
Pass down
rules
File System redirection
Registry
redirection
Named Object
redirection
File System calls
1.Retrieve
AIE data
from IMA
Isolation Environment Roots
• Specifies directories and registry locations
• User Profile Root
– Changes made by the user reside here
– Suitable for Multi-user
incompatible applications
• Installation Root
– Per Isolation environment location
– Enables conflicting applications to
coexist
Isolation Environment Rules
•Three types of Rules:
• Ignore
• Redirect
• Isolate
Isolation Environment: IGNORE Rule
• Used to create “holes” in an isolation environment
• Virtual address is not modified by the virtualization
system
• Used to allow access outside of the isolation
environment
Isolation Environment: REDIRECT Rule
• Redirects an application request for a file or registry
key to a specified location
– If an application creates the file, c:tempdata.txt, regardless
of the user, then it might be sensible to redirect those files
to c:aietemp%USERNAME%
– This means, if UserA ran the application isolated, then
c:tempdata.txt is created in c:aietempUserAdata.txt
Isolation Environment: ISOLATE Rule
• Per User:
– Ensure that each user gets his own copy of the
requested resource
• Per Isolation Environment:
– A single copy of the required system resource is
created in the installation root location and shared by
all users
Application Streaming
• Codenamed Project Tarpon
• Introduced in Citrix Presentation Server 4.5 (2007)
• Had 6 major releases before being deprecated
• Still available with XenApp 6.5 and XenDesktop 5.6
• Completely removed in XenDesktop 7
1
Tarpon Client
Extension of CPS Foundation
remote
users
firewall
firewall
local
users
Access
Gateway Advanced
Access
Control
Web Servers Application
Servers
IMA Service
PN Agent
Persistent
Store
AIE
PN Agent
Access
Management
Console
Tarpon App
Subsystem
Tarpon Session
Subsystem
Tarpon Client
Tarpon Profiler
License
Server
Web
Interface
AIE
AIE
Tarpon Client
AIE
Presentation
Servers
DatabasesFile Servers
New Apps
License
Presentation Server
Data
Collector
1
Project Tarpon Infrastructure
Profiling Station
File Share / NAS
Project Tarpon
Server Farm
Web Interface
Clients
SMB
SMB
HTTP/
HTTPS
XML
SMB
License Server
27000
Application Virtualization
Internals
How it works
• Two main components of Application Virtualization:
– Isolation/Redirection
– Delivery mechanism
• Optional features:
– File type associations and OS integration
– Rights Management and usage tracking
– Packaging
– Shareable sandboxes
File I/O Redirection options
• API Hooking
– at USER or Kernel Level
• Hooking CreateFile, OpenFile, DeleteFile, NtCreateFile, NtOpenFile, NtDeleteFile
etc
• Hooking into System Service Descriptor Table (SSDT)
–
• File System Filter Driver or Mini-Filter
– Write file system driver to redirect virtualized file requests.
Registry Redirection Options
• API Hooking at USER Level
– Hooking advapi32.dll - RegCreateKeyEx, RegDeleteKeyEx etc
– Hooking Ntdll.dll – NtCreateKey, NtDeleteKey etc
• API Hooking at Kernel Level
– Hooking SSDT – NtCreateKey, NtDeleteKey etc
Players in App Virtualization
• Microsoft App-V
• VMware ThinApp
• CloudVolumes
• Symantec/Altiris SVS
• Spoon (Novell ZENworks)
• Numecent Jukebox
• FSLogix
• Sandboxie
• Microsoft Windows
Microsoft App-V
• Version 2.0 was released in 2002 by Softricity
• ~8 major and ~50 minor releases before App-V 5.0
• App-V 5.0 is completely rewritten and released in 2012
• Available as a part of MDOP under SA
• App-V 5.0 is only supported version for XenDesktop 7
App-V 5.0 Cons
• Requires SA
• Requires management servers
• Requires SQL
• User-level apps only
• Cannot virtualize drivers
• Cannot isolate applications that are a part of the OS
App-V Pros
• Tons of information on Internet
• Huge user community
• Integration with System Center
• Integration with XenDesktop
• Managed by PowerShell
VMware ThinApp
• Uses user-mode hooks
• Application packaging solution, just like PortableApps.com
• emulates the Windows COM and DCOM
• Supports Streaming Execution (SMB/CIFS) and Deployed Execution
(i.e. USB)
• Does not support installed Apps
• No centralized management
• End of availability (“EOA”) of VMware ThinApp, effective on December
15, 2013. After that will be available only as a part of View or Horizon
CloudVolumes
• AppStack – basically a VHD or VMDK attached to a VM
• Web-based management console that communicates with hypervisor
• Full support for server software
• Available Now: VMware ESX 5.0, 5.1, Coming soon…
HyperV, Azure, Amazon EC2
CloudVolumes
CloudVolumes
CloudVolumes pros
• Server software support
• No streaming or any other delivery mechanism
• Combination of file system minifilters and a service
• Text file-driven configuration
• Storage segregation on the hypervisor layer
• Per-machine or per-user assignments
• No packaging
CloudVolumes cons
• Works with virtual workloads only
• Came out of stealth mode in 2013
• Text file-driven configuration
• No integration with VDI brokers
Symantec/Altiris SVS
• Now called Symantec Workspace Virtualization
• Kernel-level hooks
• Umanaged computers support
• Application license management
• Best in class integration with OS
Spoon
• Formerly Xenocode
• Web portal for app access
• Desktop integration
• Works over HTTP/HTTPS
• License management
• Available as SaaS offering
• Server software support
• Auditing
• Support for installed applications
• Application snapshots
Numecent Jukebox
• HTTP-based streaming
• Encrypted cache
• Virtualized File System
• DRM and license control
• OPSWAT integration
• Kernel-level file system driver
• Web portal for user access
• Currently targeted for ISVs and MSP
• No publicly available demos or code
Numecent Jukebox
• Patents:
• Software streaming system and method
• Intelligent Network Streaming and Execution System for
Conventionally Coded Applications
• Rule-based application access management
• Opportunistic block transmission with time constraints
• Deriving component statistics for a stream enabled application
FSLogix
• AIE:Ressurection
• Came out of stealth mode about in July 2013
• First release planned in Q3 2013
• No streaming, no packaging
• Combination of file system minifilter and user-level hooks
• Support changes in realtime
• Text-file based configs with a GUI editor
FSLogix
FSLogix
FSLogix
Sandboxie
• Isolated sandboxes for applications
• Virtualizes Files, Disk Devices, Registry Keys, Process and Thread
objects, Driver objects, and objects used for Inter-process
communication: Named Pipes and Mailbox Objects, Events, Mutexs
(Mutants in NT speak), Semaphores, Sections and LPC Ports
• Not designed for VDI
• Not designed for Enterprise
• Developed by one person
Microsoft Windows
• UAC Virtualization is available out of the box
• Application compatibility toolkit can be used to manage folder and
registry redirection
• No additional software needed
What Are Shims?
• Applied to specific apps
– Configured with Compatibility Administrator in the App Compat Toolkit
– Deployable to enterprise
• Changes what the app thinks it sees
• Does not change what app is allowed to do
What Are Shims Good For?
• Great for many kinds of bugs:
– Bad Windows version checks
– Writing to HKCR at runtime
– Unnecessary checks for “am I admin?”
– Writing to WRP-protected keys and files
– Windows thinks your app is an installer
– File/Registry redirections
Version Lie Shims
• Win95VersionLie
• WinNT4SP5VersionLie
• Win98VersionLie
• Win2000VersionLie
• Win2000SP1VersionLie
• Win2000SP2VersionLie
• Win2000SP3VersionLie
• WinXPVersionLie
• WinXPSP1VersionLie
• WinXPSP2VersionLie
• Win2K3RTMVersionLie
• Win2K3SP1VersionLie
• VistaRTMVersionLie
• VistaSP1VersionLie
• VistaSP2VersionLie
• Win7RTMVersionLie
Most Used Shims
• VirtualRegistry
– Fixes the problem with reading/writing
registry value
– AddRedirect ( HKLMKey ^ HKCUKey
^ HKLMKey2 ^ HKCUKey2)
• CorrectFilePaths
– Fixes the problem with reading/writing
a file
– c:Program.ini=
%AppData%Program.ini
• WRPRegDeleteKey
– Lie when app tries to delete protected
OS registry key
• ForceAdminAccess
– Spoofs queries of administrator group
membership
• VirtualizeDeleteFile
– Spoofs deletion of global file
• LocalMappedObject
– Forces global section objects into
user’s namespace
• VirtualizeHKCRLite, VirtualizeRegist
erTypeLib
– Redirects global registration of COM
objects
Conclusion
• There are many vendors on the market
• If you care about App compatibility, take a look at simple solutions
• Consider using SaaS-based services
• Check the Application Virtualization Smackdown from Ruben Spruijt
– http://www.pqr.com
– 61 pages cover major vendors on the market
Conclusion
Contacts
• @fdwl
• meetup.com/BayCUG
• denisg@entisys.com

Más contenido relacionado

La actualidad más candente

App v overview
App v overviewApp v overview
App v overview
Edmund Lim
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep dive
Murugesan Arumugam
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
eG Innovations
 

La actualidad más candente (20)

F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
MDOP 2011
MDOP 2011MDOP 2011
MDOP 2011
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012
 
App v overview
App v overviewApp v overview
App v overview
 
Forrester On Using Subversion to Optimize Globally Distributed Development
Forrester On Using Subversion to Optimize Globally Distributed DevelopmentForrester On Using Subversion to Optimize Globally Distributed Development
Forrester On Using Subversion to Optimize Globally Distributed Development
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
Application Virtualization in Citrix XenApp
Application Virtualization in Citrix XenAppApplication Virtualization in Citrix XenApp
Application Virtualization in Citrix XenApp
 
uberSVN introduction by WANdisco
uberSVN introduction by WANdiscouberSVN introduction by WANdisco
uberSVN introduction by WANdisco
 
Virtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit PerspectivesVirtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit Perspectives
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5
 
Virtualization impact in software testing
Virtualization impact in software testingVirtualization impact in software testing
Virtualization impact in software testing
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep dive
 
VMware Horizon - news
VMware Horizon - newsVMware Horizon - news
VMware Horizon - news
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoring
 
Virtualization today
Virtualization todayVirtualization today
Virtualization today
 
Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1
 
Installation
InstallationInstallation
Installation
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual env
 

Destacado

Sys01 creare applicazioni virtuali con microsoft application virtualization...
Sys01   creare applicazioni virtuali con microsoft application virtualization...Sys01   creare applicazioni virtuali con microsoft application virtualization...
Sys01 creare applicazioni virtuali con microsoft application virtualization...
DotNetCampus
 
MAV-Vis: A Notation for Model Uncertainty
MAV-Vis: A Notation for Model UncertaintyMAV-Vis: A Notation for Model Uncertainty
MAV-Vis: A Notation for Model Uncertainty
Michalis Famelis
 

Destacado (20)

VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes Troubleshooting
 
Application Virtualization, University of New Hampshire
Application Virtualization, University of New HampshireApplication Virtualization, University of New Hampshire
Application Virtualization, University of New Hampshire
 
WCSR VDI @ Varrow Madness 2012
WCSR VDI @ Varrow Madness 2012 WCSR VDI @ Varrow Madness 2012
WCSR VDI @ Varrow Madness 2012
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
No BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering SolutionsNo BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering Solutions
 
Sys01 creare applicazioni virtuali con microsoft application virtualization...
Sys01   creare applicazioni virtuali con microsoft application virtualization...Sys01   creare applicazioni virtuali con microsoft application virtualization...
Sys01 creare applicazioni virtuali con microsoft application virtualization...
 
(111217) #fitalk windows system structure
(111217) #fitalk   windows system structure(111217) #fitalk   windows system structure
(111217) #fitalk windows system structure
 
Liquit
LiquitLiquit
Liquit
 
Application Virtualization Smackdown
Application Virtualization SmackdownApplication Virtualization Smackdown
Application Virtualization Smackdown
 
VMworld 2014 Announcements
VMworld 2014 AnnouncementsVMworld 2014 Announcements
VMworld 2014 Announcements
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
VMware ThinApp 4.5
VMware ThinApp 4.5VMware ThinApp 4.5
VMware ThinApp 4.5
 
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...
VMworld 2013: The Top Four Technical Issues with XenApp Solved with VMware Ho...
 
MAV-Vis: A Notation for Model Uncertainty
MAV-Vis: A Notation for Model UncertaintyMAV-Vis: A Notation for Model Uncertainty
MAV-Vis: A Notation for Model Uncertainty
 
VMworld 2013: EUC Application Strategy Best Practices
VMworld 2013: EUC Application Strategy Best Practices VMworld 2013: EUC Application Strategy Best Practices
VMworld 2013: EUC Application Strategy Best Practices
 
V mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationV mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentation
 
VMworld 2014: Virtual Volumes Technical Deep Dive
VMworld 2014: Virtual Volumes Technical Deep DiveVMworld 2014: Virtual Volumes Technical Deep Dive
VMworld 2014: Virtual Volumes Technical Deep Dive
 

Similar a Application Virtualization overview - BayCUG

Windows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 AppsWindows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 Apps
Jorge Orchilles
 
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris NormanDeveloping Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
Ryo Jin
 
Cf summit2014 roadmap
Cf summit2014 roadmapCf summit2014 roadmap
Cf summit2014 roadmap
James Bayer
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
RES Software Nederland
 
Application hardening
Application hardeningApplication hardening
Application hardening
Jayesh Naik
 

Similar a Application Virtualization overview - BayCUG (20)

Deploying PHP apps on the cloud
Deploying PHP apps on the cloudDeploying PHP apps on the cloud
Deploying PHP apps on the cloud
 
Application layering vs Application Isolation
Application layering vs Application IsolationApplication layering vs Application Isolation
Application layering vs Application Isolation
 
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
 
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep DiveVMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
 
12 Factor App Methodology
12 Factor App Methodology12 Factor App Methodology
12 Factor App Methodology
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
 
Presentation design - key concepts and approaches for designing your deskto...
Presentation   design - key concepts and approaches for designing your deskto...Presentation   design - key concepts and approaches for designing your deskto...
Presentation design - key concepts and approaches for designing your deskto...
 
Migrate from WS2003 to WS2008 or WS2012 in One Step
Migrate from WS2003 to WS2008 or WS2012 in One Step Migrate from WS2003 to WS2008 or WS2012 in One Step
Migrate from WS2003 to WS2008 or WS2012 in One Step
 
SCaLE 15x - How Container Schedulers and Software-Defined Storage will Change...
SCaLE 15x - How Container Schedulers and Software-Defined Storage will Change...SCaLE 15x - How Container Schedulers and Software-Defined Storage will Change...
SCaLE 15x - How Container Schedulers and Software-Defined Storage will Change...
 
IBM InterConnect 2015 - IIB in the Cloud
IBM InterConnect 2015 - IIB in the CloudIBM InterConnect 2015 - IIB in the Cloud
IBM InterConnect 2015 - IIB in the Cloud
 
Windows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 AppsWindows Phone 8 Security and Testing WP8 Apps
Windows Phone 8 Security and Testing WP8 Apps
 
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris NormanDeveloping Tizen OS Based Solutions (IDF13) - Chris Norman
Developing Tizen OS Based Solutions (IDF13) - Chris Norman
 
Cloud Foundry Roadmap (Cloud Foundry Summit 2014)
Cloud Foundry Roadmap (Cloud Foundry Summit 2014)Cloud Foundry Roadmap (Cloud Foundry Summit 2014)
Cloud Foundry Roadmap (Cloud Foundry Summit 2014)
 
Cf summit2014 roadmap
Cf summit2014 roadmapCf summit2014 roadmap
Cf summit2014 roadmap
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
How Container Schedulers and Software-based Storage will Change the Cloud
How Container Schedulers and Software-based Storage will Change the CloudHow Container Schedulers and Software-based Storage will Change the Cloud
How Container Schedulers and Software-based Storage will Change the Cloud
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
15-factor-apps.pdf
15-factor-apps.pdf15-factor-apps.pdf
15-factor-apps.pdf
 

Más de Denis Gundarev

How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobility
Denis Gundarev
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
Denis Gundarev
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
Denis Gundarev
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
Denis Gundarev
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
Denis Gundarev
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick Dehlinger
Denis Gundarev
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
Denis Gundarev
 

Más de Denis Gundarev (20)

How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
 
Citrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & TroubleshootingCitrix Internals: Tracing, Debugging & Troubleshooting
Citrix Internals: Tracing, Debugging & Troubleshooting
 
Citrix Internals: ICA Connectivity
Citrix Internals: ICA ConnectivityCitrix Internals: ICA Connectivity
Citrix Internals: ICA Connectivity
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
How to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWSHow to build a Citrix infrastructure on AWS
How to build a Citrix infrastructure on AWS
 
How to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobilityHow to fail or succeed with desktop virtualization and workspace mobility
How to fail or succeed with desktop virtualization and workspace mobility
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
 
Deep dive in Citrix Troubleshooting
Deep dive in Citrix TroubleshootingDeep dive in Citrix Troubleshooting
Deep dive in Citrix Troubleshooting
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick DehlingerDaaS/IaaS Forum Moscow - Rick Dehlinger
DaaS/IaaS Forum Moscow - Rick Dehlinger
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
 
Anton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloudAnton Zhbankov: 7. Back side of the cloud
Anton Zhbankov: 7. Back side of the cloud
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the PerimeterRUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Application Virtualization overview - BayCUG

  • 1. Denis Gundarev Entisys Solutions Application Streaming is dead, what are the options?
  • 2. Agenda • What is Application Streaming (Virtualization)? • Application Virtualization internals • Overview of available solutions
  • 3. Application Isolation Environments • Was introduced in MetaFrame Presentation Server 4.0 (2005) • Virtualization layer that redirects system resources • Virtualizes: – File system – Registry – Named objects (events, semaphores, etc) • Transparent to the application • Was a great compatibility aid for: – Applications which are not multi user friendly – Applications which have problems coexisting on the same server – Applications that cannot have multiple instances running simultaneously
  • 4. Launching initial process into AIE File System Isolation Isolation Environment Launcher (aierun.exe) Registry and Object Isolation Application (eg winword.exe) IMA 2. Launch application suspended 4. Resume process File System Object Manager Registry 5. Read rules from driver and start isolating 6. Application execution continues 3. Tell driver about AIE being launched. Pass down rules File System redirection Registry redirection Named Object redirection File System calls 1.Retrieve AIE data from IMA
  • 5. Isolation Environment Roots • Specifies directories and registry locations • User Profile Root – Changes made by the user reside here – Suitable for Multi-user incompatible applications • Installation Root – Per Isolation environment location – Enables conflicting applications to coexist
  • 6. Isolation Environment Rules •Three types of Rules: • Ignore • Redirect • Isolate
  • 7. Isolation Environment: IGNORE Rule • Used to create “holes” in an isolation environment • Virtual address is not modified by the virtualization system • Used to allow access outside of the isolation environment
  • 8. Isolation Environment: REDIRECT Rule • Redirects an application request for a file or registry key to a specified location – If an application creates the file, c:tempdata.txt, regardless of the user, then it might be sensible to redirect those files to c:aietemp%USERNAME% – This means, if UserA ran the application isolated, then c:tempdata.txt is created in c:aietempUserAdata.txt
  • 9. Isolation Environment: ISOLATE Rule • Per User: – Ensure that each user gets his own copy of the requested resource • Per Isolation Environment: – A single copy of the required system resource is created in the installation root location and shared by all users
  • 10. Application Streaming • Codenamed Project Tarpon • Introduced in Citrix Presentation Server 4.5 (2007) • Had 6 major releases before being deprecated • Still available with XenApp 6.5 and XenDesktop 5.6 • Completely removed in XenDesktop 7
  • 11. 1 Tarpon Client Extension of CPS Foundation remote users firewall firewall local users Access Gateway Advanced Access Control Web Servers Application Servers IMA Service PN Agent Persistent Store AIE PN Agent Access Management Console Tarpon App Subsystem Tarpon Session Subsystem Tarpon Client Tarpon Profiler License Server Web Interface AIE AIE Tarpon Client AIE Presentation Servers DatabasesFile Servers New Apps License Presentation Server Data Collector
  • 12. 1 Project Tarpon Infrastructure Profiling Station File Share / NAS Project Tarpon Server Farm Web Interface Clients SMB SMB HTTP/ HTTPS XML SMB License Server 27000
  • 14. How it works • Two main components of Application Virtualization: – Isolation/Redirection – Delivery mechanism • Optional features: – File type associations and OS integration – Rights Management and usage tracking – Packaging – Shareable sandboxes
  • 15. File I/O Redirection options • API Hooking – at USER or Kernel Level • Hooking CreateFile, OpenFile, DeleteFile, NtCreateFile, NtOpenFile, NtDeleteFile etc • Hooking into System Service Descriptor Table (SSDT) – • File System Filter Driver or Mini-Filter – Write file system driver to redirect virtualized file requests.
  • 16. Registry Redirection Options • API Hooking at USER Level – Hooking advapi32.dll - RegCreateKeyEx, RegDeleteKeyEx etc – Hooking Ntdll.dll – NtCreateKey, NtDeleteKey etc • API Hooking at Kernel Level – Hooking SSDT – NtCreateKey, NtDeleteKey etc
  • 17. Players in App Virtualization
  • 18. • Microsoft App-V • VMware ThinApp • CloudVolumes • Symantec/Altiris SVS • Spoon (Novell ZENworks) • Numecent Jukebox • FSLogix • Sandboxie • Microsoft Windows
  • 19. Microsoft App-V • Version 2.0 was released in 2002 by Softricity • ~8 major and ~50 minor releases before App-V 5.0 • App-V 5.0 is completely rewritten and released in 2012 • Available as a part of MDOP under SA • App-V 5.0 is only supported version for XenDesktop 7
  • 20. App-V 5.0 Cons • Requires SA • Requires management servers • Requires SQL • User-level apps only • Cannot virtualize drivers • Cannot isolate applications that are a part of the OS
  • 21. App-V Pros • Tons of information on Internet • Huge user community • Integration with System Center • Integration with XenDesktop • Managed by PowerShell
  • 22. VMware ThinApp • Uses user-mode hooks • Application packaging solution, just like PortableApps.com • emulates the Windows COM and DCOM • Supports Streaming Execution (SMB/CIFS) and Deployed Execution (i.e. USB) • Does not support installed Apps • No centralized management • End of availability (“EOA”) of VMware ThinApp, effective on December 15, 2013. After that will be available only as a part of View or Horizon
  • 23. CloudVolumes • AppStack – basically a VHD or VMDK attached to a VM • Web-based management console that communicates with hypervisor • Full support for server software • Available Now: VMware ESX 5.0, 5.1, Coming soon… HyperV, Azure, Amazon EC2
  • 26. CloudVolumes pros • Server software support • No streaming or any other delivery mechanism • Combination of file system minifilters and a service • Text file-driven configuration • Storage segregation on the hypervisor layer • Per-machine or per-user assignments • No packaging
  • 27. CloudVolumes cons • Works with virtual workloads only • Came out of stealth mode in 2013 • Text file-driven configuration • No integration with VDI brokers
  • 28. Symantec/Altiris SVS • Now called Symantec Workspace Virtualization • Kernel-level hooks • Umanaged computers support • Application license management • Best in class integration with OS
  • 29. Spoon • Formerly Xenocode • Web portal for app access • Desktop integration • Works over HTTP/HTTPS • License management • Available as SaaS offering • Server software support • Auditing • Support for installed applications • Application snapshots
  • 30. Numecent Jukebox • HTTP-based streaming • Encrypted cache • Virtualized File System • DRM and license control • OPSWAT integration • Kernel-level file system driver • Web portal for user access • Currently targeted for ISVs and MSP • No publicly available demos or code
  • 31. Numecent Jukebox • Patents: • Software streaming system and method • Intelligent Network Streaming and Execution System for Conventionally Coded Applications • Rule-based application access management • Opportunistic block transmission with time constraints • Deriving component statistics for a stream enabled application
  • 32.
  • 33.
  • 34. FSLogix • AIE:Ressurection • Came out of stealth mode about in July 2013 • First release planned in Q3 2013 • No streaming, no packaging • Combination of file system minifilter and user-level hooks • Support changes in realtime • Text-file based configs with a GUI editor
  • 38. Sandboxie • Isolated sandboxes for applications • Virtualizes Files, Disk Devices, Registry Keys, Process and Thread objects, Driver objects, and objects used for Inter-process communication: Named Pipes and Mailbox Objects, Events, Mutexs (Mutants in NT speak), Semaphores, Sections and LPC Ports • Not designed for VDI • Not designed for Enterprise • Developed by one person
  • 39. Microsoft Windows • UAC Virtualization is available out of the box • Application compatibility toolkit can be used to manage folder and registry redirection • No additional software needed
  • 40. What Are Shims? • Applied to specific apps – Configured with Compatibility Administrator in the App Compat Toolkit – Deployable to enterprise • Changes what the app thinks it sees • Does not change what app is allowed to do
  • 41. What Are Shims Good For? • Great for many kinds of bugs: – Bad Windows version checks – Writing to HKCR at runtime – Unnecessary checks for “am I admin?” – Writing to WRP-protected keys and files – Windows thinks your app is an installer – File/Registry redirections
  • 42. Version Lie Shims • Win95VersionLie • WinNT4SP5VersionLie • Win98VersionLie • Win2000VersionLie • Win2000SP1VersionLie • Win2000SP2VersionLie • Win2000SP3VersionLie • WinXPVersionLie • WinXPSP1VersionLie • WinXPSP2VersionLie • Win2K3RTMVersionLie • Win2K3SP1VersionLie • VistaRTMVersionLie • VistaSP1VersionLie • VistaSP2VersionLie • Win7RTMVersionLie
  • 43. Most Used Shims • VirtualRegistry – Fixes the problem with reading/writing registry value – AddRedirect ( HKLMKey ^ HKCUKey ^ HKLMKey2 ^ HKCUKey2) • CorrectFilePaths – Fixes the problem with reading/writing a file – c:Program.ini= %AppData%Program.ini • WRPRegDeleteKey – Lie when app tries to delete protected OS registry key • ForceAdminAccess – Spoofs queries of administrator group membership • VirtualizeDeleteFile – Spoofs deletion of global file • LocalMappedObject – Forces global section objects into user’s namespace • VirtualizeHKCRLite, VirtualizeRegist erTypeLib – Redirects global registration of COM objects
  • 44. Conclusion • There are many vendors on the market • If you care about App compatibility, take a look at simple solutions • Consider using SaaS-based services • Check the Application Virtualization Smackdown from Ruben Spruijt – http://www.pqr.com – 61 pages cover major vendors on the market