BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook 16.0 MIMEDIR//EN VERSION:2.0 METHOD:REQUEST X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VTIMEZONE TZID:W. Europe Standard Time BEGIN:STANDARD DTSTART:16011028T030000 RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10 TZOFFSETFROM:+0200 TZOFFSETTO:+0100 END:STANDARD BEGIN:DAYLIGHT DTSTART:16010325T020000 RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3 TZOFFSETFROM:+0100 TZOFFSETTO:+0200 END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT ATTENDEE;CN="Mirko Colemberg";RSVP=TRUE:mailto:mirko@colemberg.ch CLASS:PUBLIC CREATED:20200325T093127Z DESCRIPTION:Agenda\n \n \n \n \n \nstart\n8.30 - 9.00 Willkommen und Ger äte test\, bis alle soweit sind :-) \n9.00-9.45 Protect your Identity - it’s like your wallet (or other secrets)! \n \n\n Azure Active Dire ctory (Azure AD) brings you several options to achieve the goal: a secure Identity!\nFirst of all you should enable Azure MFA for all users. But hey : What about enrollment\, all the Admin Accounts and what in case of Azure MFA fails. We will show how to enable Azure MFA in a right way and make s ure you have a protected identity.\nWhat else: Using Identity Governance a nd Access reviews you have a tool on board which helps you to review acces s to your Office platform such as Microsoft Teams. If you have never heard about\, join this session to get detailed info's about. \n \n\n Alain Schneiter \n \n9.45 - 10.00 Pause \n \n10.00 - 10.45 Hitchhiker's gu ide with 10 practical examples to use CMPivot for the ITPRO to help audit and control \n\n Description:Configuration Manager has always provided a large centralized store of device data\, which customers use for report ing and query purposes. The site typically collects this data on a weekly basis. Starting in version 1806\, CMPivot is a new in-console utility that now provides access to real-time state of devices in your environment. It immediately runs a query on all currently connected devices in the target collection and returns the results. By providing real-time data from onli ne clients\, you can more quickly answer business questions\, troubleshoot issues\, and respond to security incidents. We will show you our 10 most used CMPivot Queries and how this will simplify your life as an SCCM admin istrator.\nWhat you will learn:\nHow to use CMPivot in practice\n- our top 10 most used CMPivot real-world examples \, for example\, in mitigating s peculative execution side channel vulnerabilities.\nReplace Software inven tory \n \n\n Kenny Buntinx \n \n10.45 - 11.00 Pause \n \n11.00 - 1 1.45 Desktop Analytics and now \n\n What is DA\, how it works and wha t benefit can I get out if it\, see how we can use it and why we don't nee d it in Intune \n \n\n Mirko Colemberg \n \n11.45 - 13.00 Lunch Zuha use :-) \n \n13.00 - 13.45 5 rules to mitigate Office Macro risks \n \n In every company there is always the fight against macros which are no rmally a high security risk\, but already resigned during implementation a lso a big business accelerator. This session will demonstrate how you can configure your modern workplace to mitigate risks through the defense in d epth concept and how you can monitor usage of Macros on a modern managed w orkplace including MEMCM\, Intune\, MDATP and DesktopAnalytics. You will l earn how you can improve the overall security in your company without rest ricting your end-users productivity.\nPossible solution\n• Configure Mac ro Security with MEMCM and Intune\n• Attack Surface Reduction in Action\ n• Windows Defender AMSI in Action \n \n\n Thomas Kurth \n \n13.45 - 14.00 Pause \n \n14.00 - 14.45 RuckZuck for ConfigMgr/Intune deep di ve \n\n Automatisches erstellen und aktualisieren von Applications in ConfigMgr und Intune. \n \n\n Roger Zander \n \n14.45 - 15.00 Pause \n \n16.00 - 16.45 Something Security \n\n \n \n\n Alexander Be noit \n \n17:00-…. Uhr Apero (zuhause mit einem Bier\, wir werden onl ine bleiben und die Webcams einschlaten :-) \n \n\n\n\n_________________ _______________________________________________________________ \nJoin Mic rosoft Teams Meeting \nLearn more about Teams | Meeting options \n \n______________________ __________________________________________________________ \n DTEND;TZID="W. Europe Standard Time":20200402T180000 DTSTAMP:20200325T093028Z DTSTART;TZID="W. Europe Standard Time":20200402T083000 LAST-MODIFIED:20200325T093127Z LOCATION:Online ORGANIZER;CN="CMCE 2004":invalid:nomail PRIORITY:5 SEQUENCE:0 SUMMARY:CMCE 2004 Virtual TRANSP:OPAQUE UID:040000008200E00074C5B7101A82E008000000009DBD2B058802D601000000000000000 0100000007720798FA146C445BDF5D07F63E0D3B1 X-ALT-DESC;FMTTYPE=text/html:\n\n\n\n
Agenda\n
 \;\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
 \;
\n
 \;
\n
 \;
\n< div>
\n
\n
\n
\n
\n
 \;
\n
\n
\n
\n
\n\n\n< tr>\n\n\n\n\n\n\n< td>
\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\ n\n\n\n\ n\n\n\n\n\n\n< /tr>\n\n\n\n\n\n\n\n\n\n\n< tr>\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
start
\n8.30 - 9.00
Willkommen und Geräte test\, bi s alle soweit sind :-)
9.00-9.45Protect your Identity  \;- it’s like your wallet (or other secrets)!

\n
Azure Active Directory ( Azure AD) brings you several options to achieve the goal: a secure Identit y!
\nFirst of all you should enable Azure MFA for all users. But hey: W hat about enrollment\, all the Admin Accounts and what in case of Azure MF A fails. We will show how to enable Azure MFA in a right way and make sure you have a protected identity.
\nWhat else: Using Identity Governance and Access reviews you have a tool on board which helps you to review acce ss to your Office platform such as Microsoft Teams. If you have never hear d about\, join this session to get detailed info's about.

\n

\n
Alain Schneiter
\n< /td>\n
9.45 - 10.00Pause
\n
10.00 - 10.45Hitchhiker's guide with 10 pract ical examples to use CMPivot for the ITPRO to help audit and control

\n
Description:Configuration Ma nager has always provided a large centralized store of device data\, which customers use for reporting and query purposes. The site typically collec ts this data on a weekly basis. Starting in version 1806\, CMPivot is a ne w in-console\n utility that now provides access to real-time state of devi ces in your environment. It immediately runs a query on all currently conn ected devices in the target collection and returns the results. By providi ng real-time data from online clients\, you can more\n quickly answer busi ness questions\, troubleshoot issues\, and respond to security incidents. We will show you our 10 most used CMPivot Queries and how this will simpli fy your life as an SCCM administrator.
\nWhat you will learn:
\nHow to use CMPivot in practice
\n- our top 10 most used CMPivot real-world examples \, for example\, in mitigating speculative execution side channel vulnerabilities.
\nReplace Software inventory

\n

\n
Kenny Buntinx
\n
10.45 - 11.00Pause
\n
11.00 - 11.45Desktop Analytics and now

\n
What is DA\, how it works and what ben efit can I get out if it\, see how we can use it and why we don't need it in Intune
\n

\n
Mirko C olemberg
\n
11.45 - 13.00L unch Zuhause :-)
\n
13.00 - 13.455 rules to mitigate Office Macro risks

\n
In every company there is always the fight against macros which are normally a high security risk\, but already resigned duri ng implementation also a big business accelerator. This session will demon strate how you can configure your modern workplace to mitigate\n risks thr ough the defense in depth concept and how you can monitor usage of Macros on a modern managed workplace including MEMCM\, Intune\, MDATP and Desktop Analytics. You will learn how you can improve the overall security in your company without restricting\n your end-users productivity.
\nPossible solution
\n• Configure Macro Security with MEMCM and Intune
\n• Attack Surface Reduction in Action
\n• Windows Defender AMSI in Actio n

\n

\n
Thomas Kurth\n
\n
13.45 - 14.00Pause
\n
14.00 - 14.45RuckZuck for Con figMgr/Intune deep dive

\n
Automatisches erstellen und aktualisieren von Applications in ConfigMgr u nd Intune.
\n

\n
Roger Zander
\n
14.45 - 15.00Pau se
\n
16.00 - 16.45Somethi ng Security

\n

\n

\n
Alexander Benoit
\n
17:00-…. UhrApero (zuhause mit einem Bier\, wir werden online bleiben und die Webcams einschlaten :-)
\n
\n
\n
\n\n
\n

\n
\n
\n
___________ _____________________________________________________________________\n
\n\n
\n
\n
____ __________________________________________________________________________ __\n
\n\n\n\n X-MICROSOFT-CDO-BUSYSTATUS:BUSY X-MICROSOFT-CDO-IMPORTANCE:1 X-MICROSOFT-CDO-INTENDEDSTATUS:BUSY X-MS-OLK-APPTSEQTIME:20200325T093028Z BEGIN:VALARM TRIGGER:-PT15M ACTION:DISPLAY DESCRIPTION:Reminder END:VALARM END:VEVENT END:VCALENDAR