Join this session for a journey through the lifecycle of a Microsoft Application Virtualization (App-V) 5.0 package. From the birth of a sequenced package through deployment, streaming, configuration, updates, connection groups, user customization and eventual termination. This session is based solely on stand-alone mode, demo-driven, behind-the-scenes views of how each part of the application lifecycle is handled by the App-V Client. No ties to Configuration Manager or Full Infrastructure, just an under the hood insight into how App-V applications are handled regardless of delivery mechanisms.
This session provides an overview of the new Dynamic Access Control capabilities built into Windows Server 8 and examples of how it is used for Compliance and Data Leakage Prevention. Administrators now have greater control over file server data by leveraging Active Directory claims, a more robust ACL model, Active Directory centralized authorization/auditing policy, and data classification.
Publishing Exchange used to be easy. You installed Microsoft Security and Acceleration (ISA) Server or Forefront Threat Management Gateway (TMG) and considered your work done. But with the changes in roadmap of Microsoft security products such as TMG and UAG, and the addition of features like ARR and WAP, the sea of TLAs has become more complex than ever. Come and learn what the real risks are when publishing Exchange to the Internet, what your choices are, which you should choose, and how to deploy them. There's a TLA for everyone when it comes to publishing Exchange, but make sure you know which is which and which one you need, if at all. The Windows team have added an additional component called Application Request Routing 3.0 to the Internet Information Service (IIS) role, which enables IIS to handle reverse proxy requests and also perform layer seven Load Balancing of these requests.