Jean-Sébastien DUCHENE Blog's

Actualité, Tips, Articles sur l'ensemble des Technologies Microsoft (Microsoft Intune, ConfigMgr, Microsoft Defender, Microsoft Purview, Microsoft Azure, Windows...)

Le plus gros événement Microsoft de l’année s’apprête à démarrer et c’est l’occasion de voir un nombre important d’annonces. Je vous propose de lister les conférences sur le thème Environnement Utilisateurs à suivre (ou à revivre) à l’occasion de ce Microsoft Ignite 2018.

Sur la partie Microsoft 365, on retrouve les sessions :

Code

Titre

THR2317

Security and compliance updates across Microsoft 365 - a demo tour

BRK2295

Sprint’s Microsoft 365 deployment acceleration strategies

THR1096

Beware ransomware! How to mitigate risk with Windows 10 and Microsoft 365 security features

BRK2440

Citrix and Microsoft: Driving the future of work in the modern workplace, today!

BRK2144

Hands-on Surface modern management

BRK2468

Security for your digital transformation

GS004

Simplify your IT management and level up with Microsoft 365

THR2180

Empower your Firstline Workers with the modern desktop

THR3093

Introduction to Microsoft Managed Desktop

BRK3320

The value of the Microsoft Managed Desktop

THR2221

What is a modern desktop and why do you need it?

BRK2002

Modern desktop deployment and management with Microsoft 365

THR2346

How to mitigate the new cybersecurity threat

BRK2157

Ensure comprehensive identity protection with Microsoft 365

BRK4000

Leveraging the power of Microsoft threat protection to secure the modern workplace across data, endpoints, identities, and infrastructure

 

 

Sur la partie Windows 10, on retrouve les sessions :

Code

Titre

THR2316

Desktop Virtualization updates with Windows 10 and Microsoft 365

THR2314

How to shift: updates to modern desktop deployment and keeping Windows up to date with Rob York

BRK3185

eSIM for the enterprise

THR2148

Experiences with going password-less

THR3088

How to onboard your clients to Windows Defender Advanced Threat Protection

THR2152

The Windows 10 tips you wished you knew last week

BRK2420

Beat the Windows 10 deployment clock

THR2315

Accelerate device and app readiness in your shift to Windows 10 and Office 365 ProPlus

BRK3018

Deploying Windows 10 in the enterprise using traditional and modern techniques

THR2303

How to Shift: Modern Desktop Deployment with Brad Anderson

BRK3211

Ask the experts: Successfully deploying, servicing, and managing Windows 10

BRK4028

Expert-level Windows 10 deployment

THR2302

Virtualization for modern desktops

BRK2417

What’s new in Windows Analytics: An introduction to Desktop Analytics

BRK2407

Windows 10 and Office 365 ProPlus lifecycle and servicing update

THR2234

Windows servicing & delivery fundamentals

BRK3014

Modern deployment with Windows Autopilot and Microsoft 365 (Part 1 of 2)

BRK3015

Modern deployment with Windows Autopilot and Microsoft 365 (Part 2 of 2)

BRK3038

Windows 10 in S mode: Why you should care and how it works

BRK3311

Managing your deployments with Desktop Analytics

BRK2417

What’s new in Windows Analytics: An introduction to Desktop Analytics

THR3092

Windows 10 compatibility for your LOB apps

BRK3027

Deploying Windows 10: Making the update experience smooth and seamless

BRK3019

Delivery Optimization deep dive: How to reduce internet bandwidth impact on your network

THR3001

Delivering Windows 10 language packs

THR3135

Flash patch to bang: The need for a speedy patching process

BRK3003

Modern app distribution with Microsoft Store for Business

THR2066

How Microsoft can save you X% on your EPP and EDR spend with Windows Defender ATP

THR3040

Dramatically improve your security posture through attack surface area reduction

BRK3116

Insights from the Security Research team: All the cyber threat techniques you never knew about

THR2065

Automate your security incidents with Windows Defender ATP

THR3039

Become the hunter: Advanced hunting in Windows Defender ATP

BRK3011

Deploying and managing Windows Information Protection

THR1095

Malware protection on Windows 10 using Hyper-V

THR3038

Application control made easy with the power of the Intelligent Security Graph

 

Sur Microsoft Intune et System Center Configuration Manager, on retrouve les sessions :

Code

Titre

THR3090

Get started with Intune application protection and conditional access in 20 minutes

BRK3035

What’s new in System Center Configuration Manager

THR4000

Deep insights and custom reports with Microsoft Intune Data Warehouse

BRK3007

Deep dive into Configuration Manager infrastructure simplification with the cloud

BRK2017

Configuration Manager Product Team Chalk Talk

BRK3021

Attach the power of Microsoft 365 cloud management and security to Configuration Manager (SCCM)

BRK2318

Updating your existing Configuration Manager apps to MSIX

BRK3036

Managing devices with Microsoft Intune: What's new and what's next

BRK3016

Shared devices for kiosk and Firstline Workers with Windows 10 and Intune

THR3004

Leveraging the Microsoft Store for Business private store with Intune

BRK3285

Deep dive into evolution of Windows app management with Intune

 

Sur la partie Enterprise Mobility + Security, on retrouve les sessions :

Code

Titre

BRK1086

Transition to cloud-based management of Windows 10 and Microsoft Office 365 ProPlus with EMS

THR2326

Zero Trust Networks: Conditional Access updates everywhere to control risky logins and much more

BRK3401

Azure Active Directory security insights with Conditional Access, Identity Protection, and reporting

THR2312

Trusted Identity Platform: Passwordless Auth using Azure AD

THR3076

Azure Information Protection and Exchange Online - better together

THR3036

Azure Active Directory hybrid identity and banned password detection

THR2214

From the trenches: Hardening your Azure Active Directory tenant

THR3090

Get started with Intune application protection and conditional access in 20 minutes

THR3074

How to get started with Azure MFA the right way

THR2159

How to perform large scale operations efficiently using Microsoft Graph

THR2238

Joining devices to Azure Active Directory in a hybrid world

THR2081

Single sign-on best practices for Azure Active Directory and Microsoft accounts

BRK2006

Use Microsoft Information Protection (MIP) to help protect your sensitive data everywhere, throughout its lifecycle

THR3037

Attack discovery and investigation with Azure Advanced Threat Protection

THR2064

Level up on identity-driven endpoint security with conditional access based on device trust

Facebook Like