Notes from the Microsoft Management Summit 2013

This was another great year at the Microsoft Management Summit (MMS) in Las Vegas. While there were not an major product launches, much focus was given on the enhancements with SP1 for System Center. This news isn’t new since SP1 has officially been out since January but while there has been a lot of discussion about the features, seeing how Microsoft sees them in action and their alignment with the cloud mindset was beneficial. In the ConfigMgr space, there were numerous enhancements that were made with SP1 but my favorite is the hierarchal changes and the expansion of non-windows and non-PC device support.

Down to one

One great feature of the SP1 enhancements for ConfigMgr were the changes made to the architecture permitting a much flatter hierarchy. A very compelling argument was made as to why a CAS is not needed and that a single Primary site is all you need (unless you have over 100K clients or a solid reason to have multiples). Again and again it was stated from MS product team as well as MVPs managing huge deployments that you don’t need the CAS in the design and that a single Primary site server should be good for almost all but the largest deployments. This is backed up by the fact that the design changes in SP1 enable you to add a CAS server at any time later (thank goodness) and that the total number of clients supported at a single primary is 100,000. This is a huge shift for many of us, who based on the RTM specs, had installed CAS servers in solutions just in case a customer would want to expand their hierarchy later.

What was also discussed was the impact of having a CAS that doesn’t do anything, as in the solutions we described above. This impact was defined as the “replication tax” and basically described that since all primary servers in a hierarchy are equal, any change made at one server has to replicate to all the other servers and then up the hierarchy. When all your clients are reporting to a single primary with a CAS, that means that to see changes made at a Primary, you have to wait for it to replicate to see it at the CAS, for no real benefit. Since Primaries can’t be used to separate rights or access, the argument to have multiple primaries and a CAS really become difficult to support.

To example this effect, the product team was performing some “bathtub” testing against a design managing 400,000 clients during a normal Patch Tuesday rollout. With the minimal 4 Primary Site Servers they found it took around 14 hours to process all the backlogs. You would think throwing more servers at the solution would speed things up, however increasing the number of Primaries to 10 increased the backlog to 26 hours! In both scenarios the CAS was running at 100% utilization trying to keep up with the replication needs. This is huge, so make sure you are understanding this when you are designing your solution. If you have multiple Primary Servers now and have under 100,000 clients, I would strongly suggest you review your design and adjust accordingly.

Intune and ConfigMgr – Better together

Another great feature in ConfigMgr SP1 is the expanded support for deploying applications across numerous platforms and devices. Native support for IOS 10.6+, Linux, and Android means that you can have an agent, manage devices, and deploy software all from the same console. The user experience across all devices are similar and can even deeplink into the platform’s store to a specific public software install (App Store, Microsoft Store, Google Play). You can even use SCEP 2012 on your Apple systems.

While using ConfigMgr natively is great to manage on-prem devices, Microsoft expects you to manage cloud devices (mobile devices, disconnected pc’s, windows RT) from the cloud. Sounds obvious, and why not, since that is the easiest way to ensure an internet connected device can be managed without the work of making your management solution public facing. Microsoft has been working hard on their unified device management initiative, and with the latest version of Intune, creates a connection between your ConfigMgr SP1 solution and your Intune subscription service. Now there are ways you can empower users to be able to enroll their own devices and allow you to inventory, manage, deploy applications, and wipe those devices. All while having a single toolset to manage and a consistent experience for the end-user for application delivery. Let’s face it, keeping things simple and having a happy user makes a productive user and a happy you. There is so much to tell about this that I just can’t write it all but if you want more details feel free to reach out to me and I can help you dig in deeper.

As always, the sessions were great, the food was plentiful, the vendor parties were fun, and the socializing with other IT folks that wrestle with the same things I do was priceless. If you didn’t get a chance to go or was able to but missed some sessions in lieu of other ones, Microsoft has the recorded sessions along with slide decks available for download at

Now the only question (beside the obvious one about upgrading to SP1) is whether I will see you at next year’s MMS. However, the decision as to whether Microsoft will have another is still up in the air. We can leave that for another post though 🙂

Jason Condo
Principal Consultant

March 2013 PU for SharePoint 2013 is available (and mandatory)

For those of you on SharePoint 2013, the March 2013 Public Update is now available with 30+ fixes as well as some performance and stability fixes around search . The good news is the SharePoint Server 2013 update contains the SharePoint Foundation 2013 update as well, so you only need to apply the one update. The bad news is that there is a change in the package configuration that requires you to install this update in order to install any future SharePoint updates.

The following are the KB links for the respective updates:

  • KB 2768000 – SharePoint Foundation 2013
  • KB 2767999 – SharePoint Server 2013
  • KB 2768001 – Project Server 2013

The Full Server Packages for March 2013 PU are available through the following links:

After installing the fixes you need to run the SharePoint 2013 Products Configuration Wizard on each machine in the farm. Additionally, if you are running Search Service Application in the farm, you will need to perform the following:


For those of you wondering the difference between and Public Update (PU) and a Cumulative Update (CU), a public update is a monthly release of general fixes and security updates applying to all customers where as a cumulative update is a bi-monthly release of specific hotfixes meant to address a specific customer(s) problem. CUs are often rolled into a PU later, as in this case where the February CU is rolled into this March PU.

Jason Condo, MCITP
Principal Consultant, Systems Management and Operations

Manually Control your ConfigMgr Client Deployment

During a System Center Configuration Manager 2012 (ConfigMgr 2012) implementation, I had a need to install the client to large groups of computers based on subnet in a controlled manner. For a controlled client installation, I think one of the simplest ways is to group the systems together in a collection and then install the client from the console from the actions menu to the whole collection. However, the customer had a requirement that the client push had to be performed on a subnet by subnet basis and the newly discovered computers didn’t have subnet information yet to easily create a query collection based on subnet or IP.

Well, instead of creating a script that would add computers from a list to a collection  (or manually creating collections with direct memberships) and then me doing the client install per collection, I was able to leverage a tool in System Center Configuration Manager 2012  that assists you in creating CCR records for manual deployment of clients. The Generate CCR Tool (ClientPushGenerator.exe) was exactly what I needed for a controlled deployment into the environment.

To start, I was able to create lists of computer names based on subnet and saved each list off to a separate text file. I then launched the ClientPushGenerator.exe from the <configmgr install folder>\AdminConsole\bin on a Configuration Manager site server. It launched a tool that allowed me to choose the text file of computer names (each computer on a separate line) and choose the site they would be assigned to. I also had the option to choose whether I wanted to force the installation (Always install the client). Note that this is not required for upgrading SCCM 2007 clients to 2012.

Generate CCR Tool

I used the tool to generate CCR files to initiate a client push deployment to the computers in the text file. After monitoring for status and having the customer satisfied with the results, we repeated the steps for each subnet over a controlled period, monitoring each deployment set for success and impact. We were able to deploy 100+ subnets quickly this way with great results. Once we reached a majority of installs we were able to enable Client Push for the site and allow the rest of the systems to automatically get installed that we didn’t have in the lists.

While there are many ways to get your client deployed, this was a quick way to process some pre-defined lists of computers to stage the client rollout. If you want to use this tool, you don’t have to do this by subnet. This is just how the customer wanted their deployment groups to be processed in my case. No need to write a custom script now to generate those CCR files.


Jason Condo
Principle Consultant, System Management and Operations

Where did my Recent Items go in Windows 8?

I come across many people that have been asking me where the recent items list has gone in Windows 8. While the recent items list in Windows 7 (and prior) was useful, it is no longer available for Windows 8. There are a couple reasons for this with the most obvious being that we don’t have a Start Menu anymore. Possibly another may be the fact that Windows 8 Modern UI Style applications (formerly known as Metro) are meant to be “isolated” from the rest of the system. All well and good for mobile implications, devices, and Modern UI apps, but it leaves the dedicated desktop/laptop users with legacy applications longing for the old ways.

Not to fret though, there is some of this functionality still available to us, however the focus to use it is a bit different. Primarily you will find that your pinned start menu items are now functionally mimicked in the taskbar pinning. Because of this you most likely will find yourself pinning your most-used apps to the taskbar just as you did with apps to the start menu in Windows 7. I have mixed feelings about this, but irrelevantly, lets show you how to get some of your recent items functionality back.

Application’s recent list (Jump List)

Recent Items for applications (Jump Lists) are located in the application shortcut , just like Windows 7 had from the start menu . The problem though is that the list is not accessible from the start screen, but it is available if you pin it to the taskbar. I will show you how to do this using Microsoft Word 2010 as an example.

  1. Press the Windows Logo key on your keyboard and type “word” (you can stop as soon as you see the application appear). You can also just open the start screen and find Microsoft Word 2010 from the list of shortcuts and tiles.
    Windows 8 Start Menu search
  2. Right-click on the application to make the options appear at the bottom of the Start Panel. Click on “Pin to taskbar” to add the application to the taskbar (Press “Esc” to exit the Start Panel and go back to your desktop). Windows 8 Start Menu shortcut properties
  3. Once the application has been added to the taskbar, you can now see a list of recent files (Jump List) that you opened by right-clicking on it in the taskbar.
    Windos 8 Recent Items or Jump List

Editing setting for the Jump List

OK, now that you have added an application and have access to its recent items, you may want to make some modifications so that you can expand or shrink the number of files listed. This list of files and settings are known as the “Jump List” for the application. The Jump List properties are in the taskbar properties, just like previously in Windows 7. To view or change the settings, right-click on the task bar and select Properties from the options menu. Click on the Jump List tab and adjust your settings according to your preferences

taskbar properties dialog

Recent Items List

Applications and Jump Lists are all fine a good if you remember which app you were using or have it pinned to the taskbar. However, there are times that you just need to find the file you just saved from your seldom used application and locating it in the recently used list would be nice. The great thing is that this still exists, you just have to link to it.

This symbolic link to the recent items folder is similar to the Recent Items in Windows 7, however this list is of everything you have accessed and is not filtered down to a limited number of items. That means that you will have a large number of items to sort through. However, this is still way less than if you were doing a search for a file from the Start Screen. To add the recent items to your start menu  perform the following (this is an object and therefore not pinnable to the taskbar as a menu folder or application):

  1. Open explorer and browse to C:\Users\<your username>
  2. Right-click on “Recent” and select “Pin to Start”
  3. You can then find it in the start menu and rename it to something you find faster to type in Search or leave it as is.

Bonus Tip

Now that you have the recent items folder and see all the shortcuts, how do you identify which file you want? If you hover your mouse over an item, the item’s location is displayed and you can use this information to assist you in determining the file you want.

Recent Items shortcut location


Windows 8 does take a little getting used to. However, after using it since Spring, I have a hard time going back to Windows 7 or previous OS’s. Hopefully these tips will help you better utilize your system and make finding your recent files a little faster process.

Jason Condo
Principal Consultant, Systems Management and Operations

Leveraging SQL Server Profiler to troubleshoot 18456 Events

Many times I am brought in to assist in troubleshooting strange things that the client can’t identify easily on their own. In this particular occasion I was assisting in supporting a SharePoint solution and SQL Server kept generating the following 18456 event: “Login failed for user ‘NT AUTHORITY\NETWORK SERVICE’. Reason: Token-based server access validation failed with an infrastructure error. Check for previous errors. [CLIENT: <local machine>]”  every minute in the event log. The client was not sure why this was occurring and thought it may have been from an outage they had recently.

Event 18456 - Login failed for user\

A quick web search of the event showed people who had problems with applications accessing a database, but none with this specific account. That is because this is a generic message showing that some account is accessing some database from some computer and doesn’t have the appropriate permissions to do so. Some of that information is provided, however it doesn’t tell us why it is happening. So how do we get more information so that we can suggest the correct path to resolve it?

On the surface, my first impression was that a service was trying to access a database within SQL Server running as the Network Service, and was not permitted to access it. I gathered this from the fact the login was listed as ‘NT AUTHORITY\NETWORK SERVICE’ and the client was defined as local machine, CLIENT: <local machine>. Going with my first thoughts, I opened the Services console and sorted by login to determine the services running as Network Service.


This directed me to what I was pretty sure the problem was. If you look, there are two services related to SQL that were configured to run as Network Service. In addition, the client had all of the other SQL services configured to run with a defined service account, so these were anomalies to not also have been configured in the same manner. While confident this was most likely the source of the event generation, I needed to be sure.

SQL Server Profiler to the rescue!

This is where SQL Server Profiler comes in handy. This is a great tool to give you incite into your SQL environment and what is happening on a transactional basis. You can use it to trace events occurring in SQL to find stored procedures that are having problems, or long running queries, or any number of other problems that you just aren’t sure and need additional view of. In this case, we are looking for failed login attempts.

For this troubleshooting session, I knew that the logged event was only once every minute. This meant that if I configured the trace correctly, I would not be scrolling through a lot of event instances looking for my event. As well, I would not need to capture a lot of data, so outputting the profiler to a database or file wasn’t necessary.

Getting Started: Setting up the Trace.

imageTo get started, open the Start Menu and navigate to Microsoft SQL Server 2008 R2 > Performance Tools > SQL Server Profiler (also available from SQL Server Management Studio under the Tools tab). When you first launch SQL Server Profiler, it will prompt you for the trace properties. the first tab (General) defines the initial properties of the trace. The section ‘Use the Template’ is of most interest of us in this troubleshooting. This defines the most probable list of counters and columns that we want to start with for capturing information in the trace. This is because  the actual amount of information we can choose from is vast and can be overwhelming if this is your first look into tracing or if you are not a seasoned SQL admin. The additional fields for saving the output to a file/database and trace stop time are not relevant to our isolated troubleshooting. However they can be handy when you are trying to find an intermittent problem and want to run a trace for a long time or have a lot of events you are capturing. Again, not relevant in this particular instance.

SQL Server Profiler trace properties

For this troubleshooting let’s start with the Standard (default) template. Once selected, go to the Events Selection tab. This will show you all the events and columns that are selected to be captured and displayed in the trace.


As you can see, we are capturing a lot of additional data that is probably not relevant to what we are looking for. Namely, we were looking for something associated with logins (remember: “Login failed for user ‘NT AUTHORITY\NETWORK SERVICE’…). With that, I removed the events that I didn’t think would be required. I also unchecked columns of data that I didn’t think would help me once I found the appropriate event (I don’t care about which CPU is being used, or the duration, etc…)


Now I could run this trace as-is, and you can even do so just to see the amount of data being captured and the information in the trace session. However, this will not give me the event I was looking for. This is because my specific event is a failed login. This trace will only show me successful logins and logoffs. So how do we get the data I really want?

Finding Audit Login Failed

First, I select Show all events to show all the possible events that I can trace. From the selection above, you will see that Security Audit has some events already selected.


I want to be more specific however. I unchecked the Audit Login  and Audit Logoff events and instead chose Audit Login Failed. This chose all the standard columns but won’t give us all the information we need. For that, I selected Show all Columns.


To troubleshoot I then chose NTUserName, SPID (can’t uncheck that one), ApplicationName, DatabaseName, and Error.


I then clicked Run to start tracing the events. Because this event only triggers once a minute, I only had to wait a short time to see the error captured. As you can see, it was the Report Server (Reporting Services Service) accessing the master database. You can also see that we have the matching 18456 event number.

SQL Server Profiler trace output

With that I had the information needed to take back to the client and inquire more as to why this service might have had access removed (not being defined in SQL security), be misconfigured (changed from a specific login to Network Service as in maybe it was recently added as a feature but misconfigured), or if there was some other explanation.

In this case, it turns out that the engineer troubleshooting an earlier problem wasn’t aware as to the state of the services and set SQL Reporting Services and SQL Integration Services from disabled to automatic and started them in an attempt to resolve a SQL problem that they were having. It didn’t solve their problem, but because they didn’t document their troubleshooting (or perform proper analysis as like above) they left those services running and in a state that caused additional work to troubleshoot and resolve.

While this is a very specific incident and resolution, I hope that this quick view into the SQL Server Profiler gives you an additional tool to properly research errors and resolve your problems. For additional information on the tool, please explore this MSDN link :

Jason Condo, MCITP
Principal Consultant, Systems Management and Operations

System Center Roadshow – May 2012

Consumerization of IT and how it affects User Centric Management.

This May, Bennett Adelson went out on a multi city roadshow across the Microsoft Heartland District (of which we are the 2011 Partner of the Year) speaking about how the trends in consumerization forces the need for IT to shift from managing assets (hardware and software) to managing users and empowering them to make decisions. This shift is from asset-centric management to user-centric management (UCM).

Jason Condo opened the roadshow with a presentation on IT trends with some eye-opening results from recent surveys conducted by industry leaders. This showed how the trending of user savvy in devices, technology and solutions is inevitable and will only grow in the years to come. Using the User Experience Equation, he showed the five areas that IT always must think about when managing assets, users, or data.

Keith Mayer, IT Evangelist from Microsoft, spoke on the benefits of the whole System Center 2012 suite of products and how they can be leveraged to provide UCM and manage the whole enterprise.

David Norling-Christensen provided the  first technical session demonstrating how the new application model in System Center Configuration Manager 2012 aids in driving the move towards UCM. Using the application model, the IT Administrator can make different installation types of a software available for the user and allow specific attributes of the users’ experience to dictate how the software is installed or used. He also demonstrated the new self-service model that empowers the user to get what they want or need while freeing up administrators to provide services instead of installing software.

Jason  provided the second technical session around Microsoft’s Virtual Desktop Infrastructure (VDI) implementation and how it can be leveraged for UCM. By leveraging VDI as a tool, IT can empower the user while freeing themselves of trying to manage unmanaged devices. Using System Center Virtual Machine Manager 2012, Jason showed how it can be leveraged to manage VDI implementations and how it can also manage and organizations hypervisors throughout the enterprise, whether they are VMware, Xen, or Hyper-V.

Lastly, David wrapped up our discussion on UCM by showing the previous technologies in action with MDOP’s User Environment Virtualization (UE-V) that allows users’ personalized application settings to be saved and migrated from machine to machine as they need it. David presented on how this works and how to implement it. He then demonstrated it leveraging the System Center Configuration Manager 2012 applications used in his first session along with Personal and Pooled virtual machines from Jason’s session. This was an excellent demo showing a seamless user experience across physical workstations, virtual machines and even Remote Desktop Services (RDS, formerly Terminal Services).

This was a great roadshow and the System Center team is looking forward to the next ones. Please find the PowerPoint decks used in the roadshow available for download from this post.

System Center Roadshow, May 2012 – Introduction – Keith Mayer, Microsoft

System Center Roadshow, May 2012 – 1 – Consumerization of IT and UCM – Jason Condo, BA

System Center Roadshow, May 2012 – 2 – ConfigMgr 2012 UCM – David Norling-Christensen, BA

System Center Roadshow, May 2012 – 3 – VDI and UCM – Jason Condo, BA

System Center Roadshow, May 2012 – 4 – UE-V UCM – David Norling-Christensen, BA

System Center Roadshow


System Center 2012 – Embracing User Centric Management

User Centric Management (UCM) is the delivery of necessary resources for corporate end-users anywhere, on any device, in a safe and compliant manner.  Bennett Adelson will explore how System Center 2012 and UCM is creating a paradigm shift in how enterprises go from supporting devices to supporting their end-users.

Come learn how you can leverage UCM to support your users’ business needs and personal expectations with System Center 2012.



Recognizing IT Trends – User Centric Management (UCM)

Part 1:  System Center Configuration Manager 2012 and UCM

By: David Norling-Christensen

    • Technical Overview
    • The new application model
    • Self-Service Portal

Part 2:  System Center Virtual Machine Manager 2012 and UCM

By: Jason Condo

    • Technical Overview
    • VDI and RDS
    • Personal and Pooled VMs

Part 3:  User Experience Virtualization (UE-V)

By: David Norling-Christensen

    • Technical Overview



Columbus (May 21st)

Time: 8:30am – 12:00pm
8800 Lyra Dr. Suite 400
Columbus Ohio, 42340

Cleveland (May 23rd)

Time: 8:30am – 12:00pm
6050 Oak Tree Blvd, Suite 300
Independence Ohio, 44131

Detroit (May 24th)

Time: 8:30am – 12:00pm
1000 Town Center, Suite 1930
Southfield Michigan, 48075

System Center User Group – Embracing the Consumerization of IT

Presented by Jason Roundy & David Glass – Quest Software
Wednesday April 11th, 2012 from 5:45pm – 7pm

Register Here

The culture of work is changing. Tech-savvy and always-connected people want faster, more intuitive technology, uninterrupted services and freedom to work anywhere, anytime, on a variety of devices. It’s time to give people the freedom to get things done their way. In return, you’ll unleash passion and productivity like never before.
Quest’s User Workspace Management solutions enable the modern business desktop and ‘Flexible Workstyle’ by easing the migration to modern Microsoft platforms such as Windows 7 & 8, SCCM 2012, MDOP, Remote Desktop Services (RDS), VDI and Mobile Device Management.
Jason Roundy is the product manager for Quest’s Management Xtensions (QMX) for System Center and has been in the IT industry for 20 years. During this session Jason will provide an overview of the QMX solution and how you can extend System Center to seamlessly manage your Apple Desktop, iOS & Android Mobile devices along with Windows and your other platforms – under one single pane of glass. Jason will also show us the console integration, HW and SW inventory, reporting and distribution in a small demo environment. Don’t miss this opportunity to learn how to say ‘YES’ to your clients’ enterprise management requirements for Apple and more!

Refreshments and pizza will be provided.

Registration is recommended as seating is limited.

For further information and questions, please contact:
Andrew Thorne

Microsoft Corporation
Park Center III
6050 Oak Tree Blvd, Suite 300
Independence, Ohio 44131

About the Cleveland System Center User Group
This group’s focus is on the Microsoft suite of applications for managing and maintaining the infrastructure environment bundled under the System Center umbrella. This suite includes Configuration Manager (ConfigMgr), Operations Manager (OpsMgr), Virtual Machine Manager, Reporting Services, Mobile Device Manager, and Data Protection Manager. Please join the Cleveland System Center User Group for introductions to Microsoft technology, technical deep dives, as well as advanced topics to extend and support your solutions. This is a great opportunity to join with your peers in the Cleveland area and learn from both the presenter and the group.

© 2010 Bennett Adelson. 6050 Oak Tree Blvd, Cleveland, OH 44131

Windows 8 CP/Beta RSAT

For those of you testing Windows 8 CP and Windows 8 Beta, you will need to install the RSAT tools to leverage the new Server Manager as well as the updated GUI based tools.

You can download the RSAT here:

These are similar to the Win7 RSAT except that instead of all the tools being disabled by default (turning windows feature on or off) in  the RSAT for Win8 CP/Beta, tools are once again all enabled by default (like in XP/2003). You can open Turn Windows on or off to disable tools that you don’t want to use.  In RSAT for Win8, GUI-based tools are accessed from within the Server Manager console, on the Tools menu.

ImportantImportant !!

Remote Server Administration Tools for Windows 8 Consumer Preview should not be installed on a computer that is running administration tools packs for Windows Server 2008 R2, Windows Server 2008, Windows Server 2003 or Windows 2000 Server®. Remove all older versions of Administration Tools Pack or Remote Server Administration Tools—including earlier prerelease versions, and releases of the tools for different languages or locales—from the computer before you install Remote Server Administration Tools for Windows 8 Consumer Preview.

Some System Requirements for Servers to be managed:

To use this release of Server Manager to access and manage remote servers that are running Windows Server 2008 or Windows Server 2008 R2, you must install the Windows Management Framework Targeted Release (WTR) package on those servers. Server Manager in Windows Server “8” Beta or Windows 8 Consumer Preview cannot manage down-level Windows operating systems until updated Windows Management Instrumentation (WMI) providers are installed on those systems. For more information, see Windows Management Framework 3.0 on the Microsoft Download Center.

Windows PowerShell and Server Manager remote management must be enabled on remote servers to manage them by using tools that are part of Remote Server Administration Tools for Windows 8 Consumer Preview. Remote management is enabled by default on servers that are running Windows Server “8” Beta. For more information about how to enable remote management, see Manage multiple, remote servers with Server Manager.

Additional Notes:

If running the tools from Windows 8 CP/Beta, you will notice the inability to launch as a different user from the start screen. This is a definite problem if you are in an organization the abides to good security standards and enforces a different account be used to access server resources than that of your desktop.


However, don’t give up hope, you can still create a shortcut on the desktop and then launch as a different user form the options menu by holding the shift key while right clicking the shortcut (just like in Windows 7). Hopefully this will be fixed in the production ready release.


Hope you enjoy the new single pane of glass as much as I do.


Jason Condo, MCITP
Principal Consultant, Systems Management and Operations

Windows 8 Road Show!


Windows 8 Server Road Show

Do Way More with Way Less (Money, Effort & Time)

Description: C:\Users\bwittig\Desktop\images\spacer.gif

You’re hearing about Windows 8 Server, but why should you care?
IT continues to feel budget pressure as businesses try to increase efficiency and resource utilization. In today’s Technology Roadmap, you saw some of how current technology can help with that goal. But what about tomorrow? Bennett Adelson and our partner Veeam can help. Come see us present new and important features in Windows 8 Server including demos on the Consumer Preview release. Let us show you how this new server release will help you do way more with way less!


Technical Decision Makers
Team Leads
Server Administrators

Description: C:\Users\bwittig\Desktop\images\HR2.gif


(location/date are registration links)

Cleveland (April 2nd)

6050 Oak Tree Blvd, Lower Level
Independence Ohio, 44131

Columbus (April 3)

8800 Lyra Dr. Suite 400

Columbus Ohio, 42340

Detroit (April 4)

1000 Town Center, Suite 1930

Southfield Michigan, 48075

Cincinnati (April 6)

4605 Duke Dr. Suite 800

Mason Ohio, 45040


Keynote: “Do Way More with Way Less (Money, Effort, and Time)”

Breakout 1: Windows Server  8 Overview

Improvements to the Shell, GUI, and Tools

Server Manager

Improvements to Storage

Files System
Storage Spaces
Data De-duplication
Windows Storage API
Offloaded Data Transfer

Breakout 2: Hyper-V Deeper Dive

Management Improvements

PowerShell support
Resource Metering and Chargeback
Hyper-V Replication

Scalability and Reliability Improvements

SMB 2.2 for VM hosting
Concurrent Live Migration
SMB Live Migration
Live Storage Migration
Shared-Nothing Live Migration
Virtual Fibre Channel
Network Virtualization

Breakout 3: Veeam – Top Hyper-V Data Protection Challenges Dissolved