Come hear the master of Windows troubleshooting, walk you step-by-step through how he has solved seemingly unsolvable system and application problems on Windows. With all new real case studies, Mark shows how to apply the Microsoft Debugging Tools and his own Sysinternals tools, including Process Explorer, Process Monitor, to solve system crashes, process hangs, security vulnerabilities, DLL conflicts, permissions problems, registry misconfiguration, network hangs, and file system issues. These tools are used on a daily basis by Microsoft Product Support and have been used effectively to solve a wide variety of desktop and server issues, so being familiar with their operation and application will assist you in dealing with different problems on Windows.
In this session, learn how you can size, deploy, and manage Microsoft Storage Spaces in Windows Server 2012 R2 with Dell storage-optimized PowerEdge servers and affordable external PowerVault storage. We present different hardware and configuration deployment scenarios for Storage Spaces. You will learn about how to size your VDI pooled and persistent desktops based on Storage spaces.We present real-world Storage Spaces deployments and demonstrate Tiered Spaces with Write Caching and CSV. Come to this session to learn how to deploy a Windows File Server with exceptional $/IOPS and $/GB cost efficiency and best-in-class application performance. See a live demonstration of Storage Space capabilities on Dell PowerVault MD 12XX and MD3060e. Hear best practice guidelines for Storage Spaces solution sizing and performance for VDI workload on tested and certified Dell infrastructure. Learn about customer experiences and see a live demonstration of JBOD hardware monitoring and management.
Everything in the OWASP TOP 10 is covered in this session, including: Injections, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards.