E2EVC 2016 Rome Day 2
- Published: Sunday, 20 November 2016
Already day two of E2EVC after a nice night out. Most of the people are still recovering, but many were available in the first sessions. I blogged my two day experiences in this blog.
I started with the session of Rasmus Raun-Nielsen about GPU acceleration for the Office users. He started why you should use GPU and the benefits (more apps on virtualization, more users on the same hardware). He continued with the use cases, where “normal” users can become a use case and which graphic card should be used (application set, use case, numver of users or VMs, delivery platform, vGPU/GPU passthrough. He discussed the configuration vGPU (timesliced) and Framebuffer (reserved) including sizing the hardware. Rasmus also discussed a customer case where they would like to use GPU with Office 2013, Skype for Business 2015 and in the second phase GIS applications. Usefull insights using the standard VDA /w H264 + lossless text and the policy settings used, they left the GPU configuration of issues with showing text clear. He ended the session with describing his performance test using PCMark 8 and sharing the results.
The second session I attended was XenCars; Anatomy of a hack by Remko Weijnen and Geert Braakhekke. They started the session with some numbers about cybercrime and some wonderful humor. Remko started showing the tool mimikatz (which also can be used within PowerShell), which can capture account including NTML and hashes. Geert showed the possibilities with software on a USB stick that acts as a keyboard. Next Remko showed next how smartcards can be altered and Geert showed how altered software can do anything on a machine. Remko ended the session showing how he entered the OS of a navigation system.
Next session I attended was James O’Regan on the topic Windows 10 Uncovered. James kicked off with the project overview (XenDesktop 7.8 VDI, Workspace One 2016, Windows 10 Enterprise). James touches the different Branches of Windows 10. James continued with the locations which are used for creating the Start Menu, followed by the Windows App folder (do not take ownership, kills all Modern Apps). Modern App can be removed via PowerShell (script by James Rankin). Other topics James discussed were telemetery (disabling services), can be done via VMware OS Optimization Tools (just look at all the settings before apply them all).
As James ended early I also jumped into the session of Kristin Montag about Enterprise Mobility from Different Angles. When I jumped in she was discussing an Enterprise App Store, followed by security and isolation (containerization). She continued with Mobile App Management approaches: Native (MDM agent, not really suitable for BYOD); Wrapping (Agent or Enterprise Store, with MAM suits BYOD); Native App which includes other apps in the back-end (native App, no MDM, suits BYOD and hybrid). Next Kirsten discussed use cases: Office worker on the GO (native MAM, user focused, App Store, Apps Transformation) and Mobile devices as a tool (device focused, native MAM, App Development). The session ended with one more thing, the content was about internal mobility, there is also a much bigger part external mobility). Personally I really like the way she presented the content, with writing and sketching in the presentation.
The session RDS from Zero to Hero by Claudio Rodriguez and Christian Troll. They started with building a RDS environment, according to them PowerShell is key. Claudio build RDS-O-Matic for automation this building process. On the Management site Claudio and Christian created OneGlass, Claudio explained why they created the tool, how it connects and which information is shown. They also shown several examples of activities in OneGlass both on video and as live demo.
Next session was Kent Skovgaard Building blocks of SAML authentication. Kent started explaining why SAML is there (1 user database trusted by cloud provider through federation). He continued explaining the SAML roles and components: SAML IdP (Identity Provider – token sent on three ways http redirect binding, http post binding, http artifact binding), SAML SP (Service Provider, also support 3 bindings, trusts the ldP), SAML Proxy (reverse proxy of a SAML webservice, SSO possbilties). Active (Windows program) or passive (browser based) applications are possible, Kent is focusing in this session on passive applications. Kent continued with the login process, where there are two scenarions (Idp iiniated or SP initiated). Next topic were the implementation scenarios based on Citrix NetScaler, followed by real world examples where Kent shares his experience setting up SAML with Citrix Netscaler and MS ADFS. Kent documented the set-up pretty good, get the slides for the exact configuration settings for several SAML setups. The session ended with some tips and tricks for troubleshooting.
Last session I attended was POSH GUI by Jim Moyle. Jim started with some tips: use a good monitor with a high res resolution, have a goal and break your goal into small and simple tasks. Snapins are PowerShell version 1, modules are the new way. WPF is mosted used, Jim strongly recommend to use Visual Studio community edition. For PowerShell you have much lots of choices for tools (Visual Studio Code [Free], Sapien PowerShell Studio [Paid], Idera PowerShell Plus [Free], Native PowerShell ISE[Free]). Jim is pointing us to the PSGallery where lots of good resources can be found (and imported into PowerShell). Iim showed in a live demo to build a GUI for a PowerShell script, recommend to watch the recording when Alex have put those online (for everyone). After the demo Jim shared the options to run the GUI and actual code in a different thread to the GUI remains responsive (start-job, runspace, runspace pool). The session ended with the option to convert PowerShell scripts to exe files.