There are many fantastic and useful community tools created to take an already fantastic product in Configuration Manager 2012 to a new level. We showcase many of these community tools during this session. Join us to get inspiration on how to take your implementation to the next level.
While not a tool designed specifically for network or enterprise security, Configuration Manager (ConfigMgr) 2012 can certainly be used as part of an overall strategy in securing an environment (large or small). With the rise of publicly disclosed breaches, "security" should be at the top of every IT engineer's and administrator's list because everyone is either part of the solution or is part of the problem. This session will explore what's built into ConfigMgr to help secure an environment and will also present some semi-custom solutions, ideas, and options (including leveraging other tools) that can make ConfigMgr a valuable tool in the fight to secure an environment against those evil-doers.
Office is one of the top requested applications to be virtualized on Microsoft Application Virtualization (App-V) 5.0, and if you're unfamiliar with it, this can be tricky. In this 300-level session, join the App-V team as they walk you through everything you need to successfully virtualize and deploy Office 2013 in your customer's environments. Learn about supported configurations, creating, deploying, and managing Office in the APP-V environment.