Even though the cloud provides elastic scale and seemingly infinite resources, you still have to design, monitor and tune performance. Microsoft Azure SQL Database has architectural differences from SQL Server and understanding how these can impact performance is critical. In this session, Microsoft Azure MVP, Eric D. Boyd, will show you how you can identify bottlenecks and the cause of performance problems in SQL Database. This session will introduce you to the tools you can use to investigate throttling, connection events and resources, and poorly performing queries such as dynamic management objects (DMVs and DMFs) and cloud-based tools in Microsoft Azure. You will also learn how to appropriately handle throttling in your applications and scale by partitioning databases.
Security and Compliance are two of the biggest concerns for businesses who are looking to migrate workloads to the public cloud. Businesses can take advantage of Configuration Manager 2012 R2 (ConfigMgr) and Security Compliance Manager (SCM) to keep their Azure VMs in 'green' state while reducing the attack surface and security risks of their VMs. In this session we'll take a look at how to secure your Azure VMs using Endpoint Protection, maintain patch level using ConfigMgr 2012 R2 and how to meet your security compliance requirements using SCM and ConfigMgr Compliance Settings. Presenter: Andreas Wasita (Kloud)_x000D_
The increasingly popular trends of 'BYOD (bring your own device) to work' and 'work from anywhere' expose corporate IT resources to greater risk. Active Directory Federation Services (AD FS) technology on Windows Server is designed to enable end-users to securely access corporate resources from devices of their choice whilst connected from inside or outside your corporate network. Learn how to configure conditional access policies that leverage new AD FS capabilities such as network location awareness, device authentication and multiple-factor authentication in a flexible and intuitive manner. Learn how you can be in control of what authentication methods are made available to end-users, how to plug-in additional authentication providers and how to configure distinct policies governing extranet access. This session explores how AD FS technology helps you avoid 'bring your own disaster' scenarios by confidently securing your corporate resources.