Keeping devices secure and productive is a constant challenge. Bad actors are always finding new ways to break into systems, while employees want to use both personal and work devices and so Microsoft Intune helps IT administrators protect data and devices. One common threat is supply-chain attacks, where hackers impersonate authorised devices or install harmful code that security software can't detect. Microsoft Intune now offers hardware-backed device attestation to protect against these threats. In this session, we'll explain how this feature works during device enrolment and how it helps thwart bad actors.
I lead the Windows onboarding and end user experiences team for Intune. I exist to serve by empowering others and enabling them to get where they want to go.
Endpoint analytics is a built-in and free Microsoft Intune feature that provides organizations with meaningful metrics and insights for measuring the quality of the end-user experience from Windows devices. In the session we will cover how easily you can implement it and what information it will provide you. Also, you’ll learn how to use the data in your own solutions.
Advanced Analytics, which requires an additional license, enhances Endpoint analytics by providing the following key features: - Anomaly detection: discovers workstation issues that easily are unnoticed and provides information about the common characteristics from the problem devices. One example would be devices which have bluescreens and what might be the real reason behind the issue (like a specific driver). - Enhanced device timeline provides key information about major operations on a specific device. Especially useful while diagnosing issues when you know what has happened on a device. - Device query allows you to run KQL queries against a device in real time to see what the current state is.
The session covers the latest updates of both services and gives you real-life examples how you can benefit from Endpoint analytics and/or Advanced Analytics.
ProTrainIT Oy, MVP - Enterprise Mobility, ProTrainIT Oy
Panu Saukko is a consultant and trainer at ProTrainIT and is based in Finland. He has over 20 years of experience working with Microsoft technologies and has been MVP for 16 years. Panu has worked with Microsoft’s management products over 20 years. He has created training courseware... Read More →
Join Sami Laiho, Chief Research Officer of Adminize, for a look back in to what 2023 changed in the Security Threat Landscape and to hear his predictions on what will the future have in store for us.
Sami Laiho is one of the world's leading professionals in the Windows OS and Security. Sami has been working with and teaching OS troubleshooting, management, and security since 1995. Sami's session was evaluated as the best session in TechEd North America, Europe and Australia in... Read More →
Windows 11 has been out for 3 years, lets go over the notes from the field in how our customers have successfully moved to Windows 11, to give you insights on how you can be successful in ensuring that you are fully moved before Windows 10 goes end of life next year
Harjit Dhaliwal is a Senior Product Marketing Manager for Cloud Endpoints at Microsoft. Previously, he was a Customer Engineer at Microsoft where he focused on Modern Management solutions in the Microsoft 365 space to advocate and empower every person and company to achieve more... Read More →
Ken is working as a Sr. Product Manager at the Windows Commercial CAT Team. Helping to drive adoption of Microsoft Windows 11, Windows Security, Windows Autopatch and Windows Copilot. Working with customers to remove deployment blockers, capturing insights and evidence to create new... Read More →
AVD is Microsoft's flagship for desktop virtualization, and you can highly secure the user's data and sessions with the Defender suite. Let us dig into the challenge of building, securing, and managing a secure virtual desktop environment based on Microsoft Technologies. After the session, attendees gained deep insights into securing AVD, working with temporary hosts, private endpoints, CIS-images, Azure Disk Encryption, using Microsoft Defender Solutions, and much more.
Marcel Meurer is responsible for the professional IT services business unit at sepago GmbH in Cologne. In this role, he leads a team of consultants who provide their expertise in Microsoft and Citrix Technologies for customers and partners. His technical focuses are Microsoft Azure... Read More →
Elevate your Intune expertise with our upcoming session! Dive deep into 10 indispensable tips designed to enhance your administrative efficiency. Don't miss out on the opportunity to witness real-world demos that will help you in your daily work.
Trusted Security Advisor | Microsoft MVP, Onevinn AB
Jorgen is working as a principal consultant at Onevinn in Sweden. He has been working as a consultant since 1993 with a focus on Enterprise Client Management and System Management. Involved in many projects and also a Microsoft Certified Trainer, Microsoft Security MVP and deliver... Read More →
Ronni is working as a Senior Cloud Architect in Denmark. He has been working as a consultant since 1997 with a primary focus on Enterprise Client Management solutions, based on technologies like Microsoft Intune, Microsoft Configuration Manager, Enterprise Mobility + Security (EMS... Read More →
In this session, we will look at a host of capability that’s available in the Microsoft Intune and Intune Suite product set to secure your organization and limit your reliance on 3 rd party tools. We will take a deep dive into areas like compliance and configuration, and help you identify a strategy to use Intune to up your security game. It’s everyone’s job after all.
Matt is a Principal Product Manager on the Microsoft Security engineering squad responsible for Endpoint Security and other various security integrations. He's spent a majority of his life working/consulting/architecting Windows clients in extremely large enterprises. Because he has... Read More →
The current threat landscape necessitates organizations to proactively detect and remediate vulnerabilities before attackers discover and exploit them. The MITRE ATT&CK framework acts as a repository of tactics, techniques, and procedures that security professionals use to understand the behavior of attackers. Using the MITRE ATT&CK knowledge base that maps external and internal TTP, red teams can develop threat models and methodologies for more effective attacks. Researching the TTP through MITRE ATT&CK will enable analysts and defenders to better understand threats against their organizations or enterprises.
The session aims to better understand the importance of MITRE ATT&CK tactics in a live demo. The session will also demonstrate how Microsoft products use MITRE ATT&CK for SOC operations.
In the session: - An introduction to MITRE ATT&CK tactics and techniques - Designing breach and attack simulations process with the help of MITRE ATT&CK - How Microsoft 365 Defender and Microsoft Sentinel use MITRE ATT&CK
Sergey Chubarov is a Security and Cloud Expert, Instructor with 15+ years' experience on Microsoft technologies.His day-to-day job is to help companies securely embrace cloud technologies.He has certifications and recognitions such as Microsoft MVP: Security, OSCP, OSEP, eCPPT, eCPTX... Read More →
Join Johan Arwidmark for a technical refresher on the Windows Autopilot changes in the last years. You will learn about common gotchas and workarounds, as well as what configuration you can make to improve Windows Autopilot reliability.
Johan Arwidmark is the Technical Fellow with 2Pint Software, specializing in Systems Management and Enterprise Windows Deployment Solutions. Johan also speaks at several conferences each year, including MMS and Ignite events around the world. He is actively involved in the deploymentresearch.com... Read More →
Virtual doesn’t mean secure! In this session we will explain you all concepts around security of Cloud PCs with Windows 365. Learn how to protect this platform with Intune endpoint security.
Unlock the Full Potential of macOS with Intune: From Enrollment to Imagination! Dive into a world where macOS seamlessly integrates with Intune, allowing you to master its management from start to finish. Discover a spectrum of options, from deploying applications to keeping your OS on the cutting edge. Join me in this session as we explore how scripting can turn your imaginative ideas into reality, revolutionizing the way you wield the power of macOS management!
After studies in Paris, and few years to work there I moved to Switzerland for a large enterprise to manage Active Directory and Citrix Severs.In 2009 with the increase of importance of mobile devices, the need to manage them bring me to this new business for the same company.After... Read More →
I've been a product manager on the Apple Intune team for six years. I am based out of Cambridge, Massachusetts, and I mostly focus on iOS/iPadOS and macOS corporate enrollment scenarios (ADE). Super excited for the Ninja conference and to talk all things Apple MDM!
Jessica Yang is a Senior Product Manager at Microsoft, where she has been a part of the Intune team since 2016. Currently specializing in Android and AOSP management, her work is driven by a deep interest in the intersection of technology and user experience. Jessica holds a degree... Read More →
Monday September 16, 2024 15:45 - 16:45 CEST
Auditorium
Join Petri in this dynamic and inspiring session as he explores a plethora of AI tools that are revolutionizing the daily tasks of IT administrators. From Microsoft Copilots and ChatGPT to Azure OpenAI, discover the vast array of AI applications that can enhance your IT operations.
In an array of live demonstrations, Petri will show how AI can not only enhance your coding and PowerShell skills but also streamline various other IT administrative tasks. Whether you’re looking to refine your technical prowess or automate routine processes, this session will provide you with practical insights and tools to elevate your capabilities.
Prepare to be inspired by cutting-edge demos that speak louder than words. This session is designed to transform your understanding of AI’s role in IT administration and leave you with actionable knowledge to implement immediately.
Demos have already begun, as this description text is enhanced with AI, showcasing just a glimpse of what AI can do for you.
Petri is a cloud expert with 24 years of experience in Microsoft environments. He specializes in Windows management with Intune and Autopilot, and creates Powershell scripts for various tasks. He has built tools for Intune admins and deployed thousands of devices in different settings.Petri... Read More →
In this session, we delve into the evolving threats within the SaaS application ecosystem, examining recent trends and the innovative techniques employed by adversaries. We will explore the challenges faced by defenders in securing the SaaS surface against emerging attack techniques. We will discuss the importance of Microsoft Defender for Cloud Apps as part of Microsoft Defender XDR in scoping and containing sophisticated attacks. Additionally, we will address the critical role of SaaS Security Posture Management (SSPM) in early identification of risky configurations and the necessity for a research-led approach to SSPM enhancements. Join us as we share insights on recent product advancement to stay ahead of the adversary pace.
Ran is the group product manager for Microsoft Defender for Cloud Apps, previously to Microsoft Ran was leading security products in different domains such as cloud-native and network security
General Manager, Defender for Cloud Apps, Microsoft
Maayan Bar-Niv serves as the General Manager of Microsoft Defender for Cloud Apps, where she leads the charge in advancing SaaS threat protection in Microsoft Security. With a rich background in cybersecurity and IT solutions, over a decade at Microsoft, and a track record of spearheading... Read More →
Identity is the most critical aspect of security. Ensuring that users are who they claim to be is vital. Today, usernames and passwords alone are insufficient. Although Multifactor Authentication (MFA) mitigates some risks associated with standard credentials, digital certificates are a better choice. Organizations can improve their security posture by adopting strong, phishing-resistant credentials in digital certificates by implementing Microsoft Entra Certificate-Based Authentication (CBA).
Richard Hicks is the founder and principal consultant at Richard M. Hicks Consulting, Inc. A Microsoft Most Valuable Professional (MVP) with more than 25 years of experience implementing secure remote access and public key infrastructure (PKI) solutions, he is a widely recognized... Read More →
When AVD or Windows 365 users complain about insufficient performance, identifying the reason can be challenging. The first step is to replace user anecdotes with reproducible facts and performance tests. When selecting a different Azure VM type, whether or not accelerated by a GPU, as the next step it may have a huge impact on perceived user experience. Join benchmarking expert Benny Tritsch as he shares performance scores and findings he collected across different Azure VM types commonly used in AVD and Windows 365. Learn how to run your own benchmarking tests in a strictly scientific way using community tools. Gain valuable insights on how to select the right workplace specs for different use cases and user personas.
Principal Consultant & Chief Scientist, Dr. Tritsch IT Consulting
Dr. Benny Tritsch is a German Enterprise Mobility MVP and a self-employed end-user computing expert, specializing in modern workplace designs, graphics remoting and end-user experience analysis. In his role as a technical evangelist and principal consultant he works with customers... Read More →
Join Greg for an insightful session on integrating Intune with ServiceNow using Out-of-the-Box connectors. Key Takeaways: Setting Up the Lab Environment: Step-by-step guidance on preparing your lab for Intune and ServiceNow. ServiceNow Connector for Intune: Learn how to configure and utilize this connector to view ServiceNow tickets directly within Intune. Service Graph Connector for Intune: Discover how to set up and use this connector to access Intune data within ServiceNow. Greg's session on Monday will focus on out-of-the-box connectors, while Greg's session on Wednesday will focus on building an integration leveraging Graph and Logic Apps.
Dell Distinguished Engineer and Enterprise Architect, Microsoft MVP, Dell technologies
Greg Ramsey is a Senior Distinguished Engineer at Dell Technologies, and a Microsoft MVP in Enterprise Mobility. He has a B.S. in Computer Sciences and Engineering from The Ohio State University and has co-authored many books over the years. Greg is a co-founder of the Ohio SMS Users... Read More →
In this session, we will guide you through the process of safeguarding your data and applications using Microsoft Edge for Business and App Protection Policies for Windows. Our focus will be on demonstrating how to effectively integrate Conditional Access Policies, App Protection Policies, and App Configuration Profiles to enhance security. By the end of this session, you will be equipped with the knowledge and skills to create a more secure digital environment for your business.
Mike Danoski is a Senior Product Manager at Microsoft on the Intune team. He is responsible for the policy engine as well as the Windows policies and related features. His 12 year career at Microsoft spans across Intune, Active Directory, Group Policy, Windows desktop, and the much... Read More →
Environments with multiple Global Administrators, Intune Administrators and Security Administrators are a nightmare for every Microsoft Security Consultant. Therefore it is important to implement least privilege, protect critical access and apply just in time access.
During this session we will in take a deep dive into the world of Intune Scope Tags, Entra Administrative Units, Defender Device groups and how to leverage access to those objects using Privileged Identity Management.
We provide you valuable insights from our experience deploying these solutions with large enterprise customers.
Building cyber defense with the latest Microsoft technology available today - to defeat tomorrows threats. Passionately curious about all things related to tech, real-world-proven about topics such as identity, endpoint management and security.
Presenting the next generation of SOC platforms - the unified platform bringing the power of out-of-the-box protection value of the XDR suite along with the customizability of SEIM, protecting all org assets.
started my journey as a security researcher in the endpoint world, moved to building defender for endpoint experiences and capabilities as a product manager, and managed several product team focusing in investigation experience and protection toolset.
Monday September 16, 2024 17:00 - 18:00 CEST
Clubraum 1
Windows 365 Frontline is a key feature of Windows 365 to enable use cases where the users might not need or work from their Cloud PC all the time. It introduces the possibility to use pooled licenses and is heavily marketed towards shift users. But what can we do more with the Frontline version of Windows 365? Join Ola as he explores what great things you can do with Windows 365 Frontline and learn how it differs from the regular enterprise version.
Hello! I’m a Chief Technical Architect and Practice Lead within Modern Work at Advania Knowledge Factory and I’ve spent over a decade architecting the future of cloud and device management. My journey has been fueled by a relentless pursuit of simplicity in technology, ensuring... Read More →