8:30 AM - 9:00 AM
Registration
9:00 AM - 9:30 AM
Make your IT simple, fast, and efficient.
- Overview of ManageEngine.
- Service desk as the control centre of IT.
Rajesh Ganesan,
Director of Product Management.
9:30 AM - 10:15 AM
IT service management.
- Hitting the right balance of process, tools, and people to win business battles.
- Overcoming complex challenges in incident, asset, and change management through ITSM best practices: Lessons from the success stories of other organizations.
Rakesh Reddy,
Technical Consultant.
10:15 AM - 10:45 AM
Analytics for insight and easy decision making.
- Using analytics to identify patterns and use them to make intelligent decisions.
- Correlating data from across multiple sources.
Rakesh Jayaprakash,
Product Management Associate.
10:45 AM - 11:00 AM
Break
11:00 AM - 11:45 AM
Desktop and mobile device management.
- Implementing effective patch management at your company.
- Automating desktop management routines such as OS and software deployment.
- Embracing enterprise mobility practices such as BYOD and heterogeneous OS.
Ananthakrishnan Vaidyanathan,
Product Marketing Manager.
11:45 AM - 12:45 PM
Centralized Active Directory management.
- Investigate nested group memberships and manage inappropriate group permissions.
- Find out shares available on any server, permissions that users have on confidential files or folders, and manage them.
- Learn more about Office 365 license management and reporting — Inactive O365 users, licensed or unlicensed users, etc.
- Learn how to retrieve essential data from AD, Exchange, O365, Google Apps, etc. using the application that offers over 200 reports.
- Effective account provisioning techniques that incorporate AD account, mailbox, profile path, or home folder creation with necessary permissions, o365 mailbox, lync settings, etc.
- Trace, quarantine, and clean up stale accounts from Active Directory in an automated way.
- Create a user management console for HR or branch heads to create and manage their team's accounts.
The rise of cyber crime: Decrypting security mysteries
- Recent trends in security attacks and data breaches
- Sealing security loopholes: Getting to know the vulnerable ports and devices
- Security attacks targeting financial sectors
- Fighting battles: Mitigating internal attacks vs external hacks
Harish sekar,
IT security and AD consultant.
1:45 PM - 2:30 PM
IT operations management.
- Investigating the root causes of poor network performance and preventing downtime.
- Making data cent re management simple with integrated network monitoring.
Kiran Kumar Shinde,
Lead Technical Consultant.
2:30 PM - 3:00 PM
IT security: Privileged account management.
- Tackling the risk of insider threats by controlling access to privileged accounts.
- Implementing privileged account management best practices in your company.
- Staying on top of regulatory and compliance requirements for privileged access.
Rajesh Ganesan,
Director of Product Management.
3:15 PM - 4:15 PM
IT Security: Monitoring, auditing, and alerting.
Security is at the forefront of nearly everything we do. However, there can be configurations that change and attacks that occur which are nearly impossible to see happen. Monitoring for these changes, then reporting and alerting them when they occur, lets you know where your security stands at all times. In this session you will see and learn about:
- Setting up custom reports for security settings.
- Establishing thresholds for security patterns.
- Creating alerts for key security configuration changes.
- Designing security configuration relationships and alerts.
- Generating reports to meet audit compliance.
Derek Melber,
Group policy and AD MVP.
4:15 PM - 5:00 PM
Granular Password Policies for different users in the same AD domain.
The "one size fits all" mentality of passwords for a corporation is not reasonable anymore. The ability for IT, executives, HR, and more to have their own password policy is here. Not only does every part of the organization need a more secure password policy, but additional password controls need to be available. The ability to leverage dictionaries and deny password patterns and consecutive passwords is essential to helping stop weak passwords that are easily hacked. In this session you will see and learn about:
- The Microsoft password policy solutions.
- Overcoming limitations for weak password controls.
- Discover how easy password controls can be implemented.
- Understand the options and features for a true password policy solution.
- Increase security of all of your Active Directory passwords.
Derek Melber,
Group policy and AD MVP.
5:00 PM - 5:30 PM
Q&A Session.