StorageEnterprise Devices Cloud DrivesEnterprise Devices.

Slides:



Advertisements
Similar presentations
Consumer / personal data Individual work data Team / group work data Personal devices Data location SkyDrive Public cloud SkyDrive Pro SharePoint.
Advertisements

Agenda Human Process + System Automation Better together Demos Identify self service opportunities Enable cloud through automation Key Takeaways.
The traditional perimeter is rapidly eroding IT needs continuous data protection that work across ‘classic ‘boundaries’ Consumerization of IT Users.
SQL Server Primary SQL Server Secondary SLA SLA High Availability Hardware and Software Windows and Linux.
Making Entitlements in AD Understandable to the Business Rob de Jong Program Manager Microsoft Corporation SIA314.
Introducing Windows Server 2012 R2 Work Folders:
Microsoft Cloud Microsoft Confidential SaaS Office 365 Azure SQL PaaS Azure Storage Azure HDInsight IaaS SQL Server Apache One common problem: “How.
4 2) Code Repository 1) Developers 3) Build4) Test5) Deploy to Cloud 6) Monitor and Improve Contoso App Azure.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
Chapter 7 WORKING WITH GROUPS.
Alan Burchill Senior Consultant – Avanade
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Microsoft Azure Introduction ISYS 512. Microsoft Azure Microsoft Azure is a cloud.
Module 4: Add Client Computers and Devices to the Network.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Apache + Tomcat. Apache + Tomcat Download mod_webapp.so:
CSCI-A110 Lab Welcome!. Overview: a busy 1 st day Welcome – Introduction Purpose of the lab Course Structure/Grading Online Course Material (Oncourse)
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
Key Considerations in Architecting Active Directory Federation Alexander Yim WSHFC NCSHA, Nashville on Sept 28 th, 2015.
The Distribution Online Vending Pilot Project Demo Testing Certificate Management Kennedy P Subramoney 23 July 2004.
Topic Java EE installation (Eclipse, glassfish, etc.) Eclipse configuration for EE Creating a Java Web Dynamic Project Creating your first servlet.
Matthew Ellis rd January 2006 CM610 Assignment Bsc(Hons) Computing Studies.
The traditional perimeter is rapidly eroding IT needs continuous data protection that work across ‘classic ‘boundaries’ Consumerization of IT Users.
Microsoft Ignite /25/2017 9:57 AM
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
How To Get Started in Analysis with Atlas software FAQ on How to Get account at BNL
Cloud-Ready Data Services. cloud data services.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Sage Franch | Technical Evangelist Susan Ibach | Technical Evangelist.
Windows Azure and iOS Chris Risner Windows Azure Technical Evangelist Microsoft
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
© ABB Entrelec AC 500 Page SD Memory Card Insert image here The Application of the SD Memory Card Advant Controller 500.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
IV&VS Capabilities. 2 L OADRUNNER C ONTROLLER – S CENARIO DESIGN.
C Copyright © 2006, Oracle. All rights reserved. Oracle Secure Backup Additional Installation Topics.
EduGeek Logon Tracker Next generation user tracking.
Productivity Architect Meet Chris Bortlik Author, Blogger, Speaker.
Planning, Implementing and Supporting Office 365
Extending the value of Office 365 with ShareFile
Web Technology Seminar
Solving your printing problems with Windows Server and Azure
Control and Protect Information
Microsoft - Managing Office 365 Identities and Requirements
Ask the Microsoft Infrastructure Team October 2017
TechEd /1/2018 7:01 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Information Protection
Windows 10 Subscription Activation
Unit 27: Network Operating Systems
Azure AD Application Proxy
Ask the Microsoft Infrastructure Team October 2017
Cloudy with a Chance of Data
Hybrid Search Planning Implementation.
Hybrid Search Technical Guidance.
TechEd /21/2018 5:20 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Migrating to Office 365 from Google mail and exchange
Encryption in Office 365 Shobhit Sahay Technical Product Manager
درس تطبيقي مادة التربية الفنية للصف الرابع الابتدائي
AD FS Integration Active Directory Federation Services (AD FS) 7.4
An Inventory That Updates Itself
Licensing Overview January 2019.
Презентация құру тәсілдері
Шаттық шеңбері.
Printing from the Konica after you’ve sent a file down to print
Presentation transcript:

StorageEnterprise Devices

Cloud DrivesEnterprise Devices

Cloud Accepting Cloud Hesitant Cloud Ready PortalsStorageProtection

Cloud Accepting Cloud Hesitant Cloud Ready AD RMS

OUC-B341 – Thursday 2:45- 4:00 Microsoft Office 365 Directory and Access Management with Windows Azure Active Directory

Please enter your connector URL “ Do you want to generate registry[R] files or a GPO script creation script [G] G GPO Generation Script Created: CreateConnectorGPO.ps1 Please run the GPO script and assign the GPO to the desired servers

PS C:\> Set-AadrmUsageLogConfig -StorageAccount contosonalogstore -AccessKey WnTimuvtnjbpiSHYjHJqSysBTPmKIy1UgV+br6nLx1pehLgd/mq6ppVyow+jJ7 1s/yUSz7LtNvSfjo980X8Vng== PS C:\> Get-AadrmUsageLog –Path “C:\temp” –FromCounter ToCounter

C:\> cngimport –import -M --key=contosokey -- appname=simple contosokey (This allow for CNG tools to work with this key)

C:\> mk-reprogram.exe --owner c:\Temp\Destination add c:\Temp\Source (Loads our security world, and your security world into the same HSM and requests Admin cards from both security worlds) C:\> key-xfer-im.exe c:\Temp\Source c:\Temp\Destination -- module c:\Temp\Source\key_caping_machine-- 675e91181ab66e8ff26a48f11b41a9b853a5098b (Transcripts your key from your security world into ours) In your presence we will factory reset the HSM and wipe the machine. Our operators now upload key to the AADRM Service HSM’s