Donnerstag 2. April 2020, Online #WFH
Code um in Euren Teams, unser Teams zu finden und joinen: lse03b7
Oder hier der Kalender Eintrag zum Herunterladen: http://configmgr.ch/wp-content/uploads/2020/03/CMCE-2004-Virtual-1.ics
start 8.30 – 9.00 | Willkommen und Geräte test, bis alle soweit sind 🙂 | |
9.00-9.45 | Protect your Identity – it’s like your wallet (or other secrets)! | |
| Azure Active Directory (Azure AD) brings you several options to achieve the goal: a secure Identity! First of all you should enable Azure MFA for all users. But hey: What about enrollment, all the Admin Accounts and what in case of Azure MFA fails. We will show how to enable Azure MFA in a right way and make sure you have a protected identity. What else: Using Identity Governance and Access reviews you have a tool on board which helps you to review access to your Office platform such as Microsoft Teams. If you have never heard about, join this session to get detailed info’s about. | |
| Alain Schneiter | |
9.45 – 10.00 | Pause | |
10.00 – 10.45 | Hitchhiker’s guide with 10 practical examples to use CMPivot for the ITPRO to help audit and control | |
| Description:Configuration Manager has always provided a large centralized store of device data, which customers use for reporting and query purposes. The site typically collects this data on a weekly basis. Starting in version 1806, CMPivot is a new in-console utility that now provides access to real-time state of devices in your environment. It immediately runs a query on all currently connected devices in the target collection and returns the results. By providing real-time data from online clients, you can more quickly answer business questions, troubleshoot issues, and respond to security incidents. We will show you our 10 most used CMPivot Queries and how this will simplify your life as an SCCM administrator. What you will learn: How to use CMPivot in practice – our top 10 most used CMPivot real-world examples , for example, in mitigating speculative execution side channel vulnerabilities. Replace Software inventory | |
| Kenny Buntinx | |
10.45 – 11.00 | Pause | |
11.00 – 11.45 | Desktop Analytics and now | |
| What is DA, how it works and what benefit can I get out if it, see how we can use it and why we don’t need it in Intune | |
| Mirko Colemberg | |
11.45 – 13.00 | Patch My PC sponsoring session during Lunch (45min) will start at 12:00! | |
13.00 – 13.45 | 5 rules to mitigate Office Macro risks | |
| In every company there is always the fight against macros which are normally a high security risk, but already resigned during implementation also a big business accelerator. This session will demonstrate how you can configure your modern workplace to mitigate risks through the defense in depth concept and how you can monitor usage of Macros on a modern managed workplace including MEMCM, Intune, MDATP and DesktopAnalytics. You will learn how you can improve the overall security in your company without restricting your end-users productivity. Possible solution • Configure Macro Security with MEMCM and Intune • Attack Surface Reduction in Action • Windows Defender AMSI in Action | |
| Thomas Kurth | |
13.45 – 14.00 | Pause | |
14.00 – 14.45 | RuckZuck for ConfigMgr/Intune deep dive | |
| Automatisches erstellen und aktualisieren von Applications in ConfigMgr und Intune. | |
| Roger Zander | |
14.45 – 15.00 | Pause | |
16.00 – 16.45 | Coronavirus (COVID-19) Global Pandemic Launches Cyber Attack Surge | |
| Since at least January 2020, threat actors have seized on the media attention surrounding the 2019 Novel Coronavirus (COVID-19) global pandemic to launch phishing campaigns designed to distribute malware to unsuspecting users. As of the date researches have yielded over 6,000 Indicators of Compromise (IOCs) and at least 15 distinct campaigns associated with 11 threat actors or groups distributing 39 different malware families and employing 80 various MITRE ATT&CK techniques. In this session we will talk about what we have seen and how Microsoft security technology can help you protect even in challenging times like this. | |
| Alexander Benoit | |
17:00-…. Uhr | Apero (zuhause mit einem Bier, wir werden online bleiben und die Webcams einschlaten 🙂 | |
Login