TechNet Webcast Series: grow your IT organization into a dynamic infrastructure

TechNet Webcast: Agility Now Series

Tune into a special webcast 10-part series detailing steps on how you can grow your IT organization into a more flexible and integrated system. As IT organizations have become more geographically dispersed and individual roles more specialized, some IT professionals have found it increasingly difficult to collaborate across roles and conduct typical management and maintenance tasks in areas such as deployment, user management, messaging, and security. Hear from subject matter experts as they provide scenario-based solutions for infrastructure management, identity and access management, data protection, and client consistency, and answer your questions about improving your organization’s infrastructure.

TechNet Webcast: Agility Now (Part 02 of 10): Making Identity and Access Management a Reality (Level 200)

Wednesday, September 13, 2006

9:30 A.M.–11:00 A.M. Pacific Time

As network structures expand, IT administrators and managers face an increasing danger of losing control over their IT environments. Each server and resource that appears on the network must be managed by an individual, which can result in many different accounts that follow different password standards. This second webcast in our series looks at an example scenario at a fictional company in which some departments rely upon computers running Linux to provide certain services, and need a central platform for single sign-on to maintain them. Learn how Active Directory can be helpful in addressing these challenges, and see how to design and implement an Active Directory environment that meets the company's needs. We also show how to use a security template and other useful tools to achieve a "Standardized" level of infrastructure optimization

TechNet Webcast: Agility Now (Part 03 of 10): Making Identity and Access Management a Reality with Successful Implementation (Level 200)

Wednesday, September 20, 2006

9:30 A.M.–11:00 A.M. Pacific Time

In part three, we expand on the concepts presented in the previous webcast by showing how to move from a "standardized" to a "dynamic" infrastructure. Continuing with our example scenario, we show how a fictional company, Contoso, achieves the single sign-on (SSO) requirement with minimal complexity and cost. We illustrate several key objectives of the dynamic infrastructure, such as applying Group Policy and enabling enhanced control of desktops. Learn how to implement Microsoft Systems Management Server (SMS) for inventory, security, and patch management, and how to deploy Microsoft Identity Integration Server (MIIS) to integrate computers running the Linux operating system with SSO.

Demorie Crowe

Core Infrastructure Optimization

www.microsoft.com/io