Use the controls below to explore the sessions and labs that will be presented at TechEd. Search by keyword or filter the results by Product, Track, Session Level, or Speaker to find sessions that interest you.
NOTE: The content catalog will continue to grow as the event gets closer. To easily find the recently added sessions, select Recently Added in the SORT Field. The recently added sessions will display the word NEW! next to them.
Already registered? LOGIN HERE to access Schedule Builder and create your personalized TechEd Schedule.
You’d be forgiven for thinking that wider adoption of cloud services will mean that Infrastructure specialists will no longer be needed in IT. While it is true that some traditional IT functions are in decline, there are also new roles emerging and so the challenge we face is how to develop our careers and stay relevant in the IT job market.
That’s the question we're trying to answer in this session, and we plan to break the problem down into three parts—what are those Next roles; what are the Next Skills we need; and what you need to do Next to stay current as the IT job market evolves. We do this by working with some of the pioneers in these new areas, specifically some of the Microsoft Valued Professionals who are already here at TechEd, as they have already started on this journey. Please join us for this interactive discussion which we hope will help you to be part of what’s next.
Organizations are realizing that traditional network-based security measures are woefully inadequate to protect corporate data in a world where the workforce likes to work from different locations, on a variety of different devices and targeting a plethora of different applications in cloud. Enterprises are looking to bolster traditional security controls with more adaptive, contextual mechanisms driven by increased analytics. Azure AD has a variety of features that can help IT secure their enterprises using data driven intelligence. In this session we cover how Azure AD can help detect and alert on compromised accounts and malicious access. We also cover Cloud App Discovery in depth and talk about how organizations can get a better handle on ‘ShadowIT’ as employees increasingly adopt cloud applications without IT involvement. Cloud App Discovery can help organizations detect cloud application usage and bring that under IT control.
Topic: Active Directory, Hybrid Identity, Microsoft Azure Active Directory
Azure Active Directory is the cloud identity and access management solution of Microsoft. It consist of various hybrid identity management capabilities for enterprise users, task workers, B2B and B2C scenarios. Single Sign On to thousands SaaS applications, self-service password reset, group management delegation, device registration/conditional access, multi-factor authentication, cloud application discovery, application proxy, advanced sync engines with on-premises directories, advanced security reports, and more.
It’s your data—regardless of whether it’s stored on premises or in Azure. Learn more about how Azure helps enforce data privacy and integrity throughout the information lifecycle. This session details the mechanisms for encryption, secrets administration, and access control that you can leverage for managing sensitive data in Azure. Benefit from detailed guidance on how to use features in the Azure platform to protect critical enterprise data in the cloud, whether structured or unstructured, in-transit, or at-rest.
Topic: Active Directory, Microsoft Azure, System Center, Virtualization, Windows Server Hyper-V
Learn how to improve your data management efficiency by enabling a single, Windows Centric Data Management software solution to give administrators and users better and more knowledgeable access to their data. This session focuses on Microsoft Azure, hybrid and on-premises environments. Learn techniques for data management best practices. Come learn, discuss, and see live demonstrations of Windows Centric Data Management including efficient techniques for E-Discovery, Compliance, and content indexing of many environments including:
Microsoft Exchange and Microsoft Office 365, Microsoft SharePoint, Hyper-V including migration of VMware to Hyper-V, SQL Server, Snapshot management, Deduplication, Encryption, Active Directory, Windows Server, Windows 8 and 8.1, EDGE management, and Windows Mobile and Lync. Integration with Systems Center Operations Manager (SCOM) and using Windows Server to manage heterogeneous data are also covered.
Learn efficient ways to assist and accelerate upgrades and strategic uses for Windows Server and Azure as primary and tiered storage locations. Create a single indexed, searchable set of data across on-premises and Azure (cloud hosted) environments.
This session provides a comprehensive overview of networking enhancements upcoming in the next release of Windows server, targeted towards enterprises, and service providers (including telecom operators). We start by discussing real world challenges motivating technological evolution necessary for data center transformation enabling very large-scale service offerings. A brief look back at in-market solutions leads us to a rich discussion of the upcoming industry-leading networking stack, including working examples of deployable topologies for application delivery.
Join Mark Russinovich and Mark Minasi for a lively discussion as they share their views on the cloud computing disruption and what it means for IT pros and developers. Mark Russinovich brings his perspective from leading Microsoft Azure architecture and Mark Minasi brings his IT expertise and view from outside. The economics of public cloud, future of PaaS and IaaS, how enterprises will bridge their on-premises environments with the cloud, how you should look at security in the public cloud, and what skills are important for IT pros and developers are just some of the areas they explore together.
In today's modern datacenter, heterogeneous environments with Windows Server, Linux and FreeBSD are more common than not. Being able to run all of your virtualized workloads on a single hypervisor simplifies management and optimizes server capacity. In this session, we explore the level of support Hyper-V 2012 R2 has for Linux and FreeBSD-based distributions and how IT admins and architects can ensure top performance and reliability running on Hyper-V.
Microsoft Azure (and its "cousins" in the public cloud) change the way architecture investments and strategies work. This session walks you through the impact of Azure as the new “normal” from an infrastructure design, application, and operations architecture perspective. The session also shows how customers can take advantage of the ability in Azure to move workloads from on-premises or service provider environments to take advantage of its unique scalability and global reach—from virtual machines to web workloads. It also outlines new investments in the developer/operations continuum that shape the future of the application platform and resulting solution architectures.
Topic: Access & Information Protection, Trustworthy Computing
How well designed and implemented is your Public Key Infrastructure? Enterprises around the world use Microsoft Windows based Public Key Infrastructure for digital certificates. However, most environments make the same mistakes. Learn what the most common mistakes are and how you can mitigate them. This session is based on new/exclusive content created for this conference. Borrowing from over 10 years of designing, assessing, and remediating Public Key Infrastructures around the world, a common theme emerges. As the creator of the Microsoft PKI Health Check, it was the presenters job to access and analyze PKI environments around the world. This content is based on the most common mistakes seen in customer after customer. The common threads are amazingly clear and often easy to remediate. This session focuses on providing real-world examples, identifying the risks, and tools and processes to correct these errors. Without these fixes, you could face service disruptions, security compromises, and integrity issues in your authentication systems.