Loading…
This event has ended. Visit the official site or create your own event on Sched.
Repeat [clear filter]
Wednesday, May 17
 

10:00am CDT

Managing BitLocker Using MBAM (Option 2)
Limited Capacity full
Adding this to your schedule will put you on the waitlist.

Session Description:
Everyone knows why it is good practice to encrypt their volumes, but not many think of the management of the recovery keys, and how to enforce company policy. Join Jason Sandys and Henrik Rading as they take you through the benefits and how-tos of implementing Microsoft BitLocker Administration and Monitoring (MBAM) in integration with Configuration Manager.

What you will learn:
  • Gain knowledge of MBAM infrastructure and common implementation scenarios
  • Learn about common implementation pitfalls
  • Be able to implement and use MBAM in your own organization when you get back home
  • Deploy MBAM and BitLocker as part of your OSD Task Sequence

Speakers
avatar for Henrik Rading

Henrik Rading

Senior Consultant, Coretech
Henrik Rading is a senior consultant at Coretech A/S. As a consultant Henrik has helped customers design, develop and implement enterprise management solutions for the last 18 years. After joining Coretech in 2013, his primary role has been deployment of Windows Operating Systems... Read More →
avatar for Jason Sandys

Jason Sandys

Senior Program Manager, Microsoft
Jason is a Senior Program Manager at Microsoft for the Experience & Devices Customer Acceleration Team (CAT). Jason has 25+ years of experience in a wide range of technologies, environments, and industries and extensive knowledge in implementing and supporting all things Windows... Read More →



Wednesday May 17, 2017 10:00am - 11:45am CDT
Harriet B

1:00pm CDT

Secure Your Workstations (Option 2)
Limited Capacity full
Adding this to your schedule will put you on the waitlist.

Session Description:
Mark, Gary, and Troy will show what a desktop administrator can do to keep their workstations secure. Gain the upper hand in the never-ending battle to prevent security breaches. You will see some of the major advantages from a security perspective behind Windows 10.

What you will learn:
  • Implement the newer XTS-AES algorithm when encrypting your systems with BitLocker.
  • Use Credential Guard to protect against Pass-the-Hash attacks.
  • Learn about AppLocker and Device Guard to see how you can secure your systems at the application and kernel levels.
  • Analyze or create group policy settings with the Security Compliance Manager tool. - If there is time . . .

Speakers
avatar for Gary Blok

Gary Blok

Engineer, HP
Working on Intune & ConfigMgr along with Azure to develop improvements in endpoint management and reporting.I've worked in several areas over the past year, hardware OEM, finacial, state government, small startups, K-12, higher ed, and consulting.Best known for blogging on GARYTOWN... Read More →
avatar for Mark Godfrey

Mark Godfrey

Lead Product Manager - WEX Fleet Management - Policy, Remediations, & Tooling, HP
Software Product Manager at HP working on manageability tools (Connect, CMSL, HPIA) and associated services. Former software engineer and systems engineer. Former MNSCUG(TCSMUG) VP and Pres. Passionate about Automation and Security in the Systems Management field.
avatar for Troy L. Martin

Troy L. Martin

Technical Architect, 1E
Troy is a Technical Architect at 1E, which entails providing technical direction for 1E technologies, assuring their qualities in efficiently managing hardware, systems, users and other end points. Troy is well known in the Configuration Manager community as a speaker and subject... Read More →



Wednesday May 17, 2017 1:00pm - 2:45pm CDT
Harriet B
 

Twitter Feed

Filter sessions
Apply filters to sessions.