now browsing by tag


Richmond Seminar: Cloud, Security, Storage/Backup, Mobility, Containers

Richmond Seminar: Cloud, Security, Storage/Backup, Mobility, Containers
Event on 2017-03-28 07:30:00
This comprehensive seminar covers the increasingly related topics of IT security/compliance, network infrastructure, storage/backup, mobility, private/public/hybrid cloud, containers, OpenStack and DevOps. Scroll down to see the full agenda and click on links to see company information and speakers' biographies, who deliver concise, technical, educational and non-salesy talks. There are Microsoft and Google keynotes, plus subject matter experts presenting from VMware, Dell EMC, Red Hat, Nutanix, Zerto and IGEL.Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all participants, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc.As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."Join your peers from Genworth, CarMax, NewMarket, Bon Secours, Chesterfield County, Commonwealth of Virginia, Virginia Premier Health, Federal Reserve Bank, Virginia Lottery, Eastern Virginia Bankshares/EVB, Bank of America, City of Richmond, City of Newport News, US Navy, US Coast Guard, University of Richmond, ChildFund International and many more organizations who are confirmed attendees.Every attendee receives meals including breakfast and lunch, free parking, complimentary Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards and other prizes at the end.Agenda7:30 – 8:40: Registration Begins, Breakfast Served, Exhibit Area Open with Product Demonstrations, Time For Peer Networking/Interaction8:40 – 9:00: The Enterprise Immune System – A New Approach to Cyber Defense with DarktraceFast-evolving cyber-threats call for a change in the way we protect our most critical information assets, in a digital world more interconnected than ever. Understand from Darktrace how new self-learning technology, known as the “Enterprise Immune System,” marks a fundamental transition in cyber defense, allowing organizations to gain indispensable visibility into their network, and detect emerging cyber-threats that bypass traditional security controls.Thanks to fundamental advances in mathematics and unsupervised machine learning developed at the University of Cambridge, UK, Darktrace's technology is capable of learning what is normal and abnormal within an organization, detecting genuine behavioral anomalies, without using rules or signatures. More than 250 organizations across the world rely on its Enterprise Immune System to defend against novel cyber-threats, including insider threat, and protect themselves in today’s changing threat landscape.Austin Eppstein, one of Darktrace's top cyber security experts, will cover the following subjects during this session: – Learn why “immune system” technologies represent a fundamental innovation for cyber defense – Discover how to apply machine learning and mathematics to detect advanced, internal threats – Understand how to gain 100% network visibility to investigate emerging anomalies in real time – Hear real-world examples of threats detected by the Enterprise Immune System9:00 – 9:15: Manage risk, not data or systems, with cloud-based automated security from NormShieldCyber threats are unrelenting. Your security team is faced with an overwhelming amount of data as they race to find and fix vulnerabilities. Prioritization is difficult, informed decisions are nearly impossible.Candan Bolukbas, NormShield Co-Founder & CTO, will show you how hackers conduct reconnaissance and discover weaknesses in your security infrastructure without ever touching your network. And, more importantly, how you can stop them cold. A security polymath and certified ethical hacker, Candan will share the tools of trade and you will learn how:- Hackers leverage publicly available information to discover your security weaknesses- you can use the same techniques hackers use to discover your security weaknesses and fix them – before hackers find them- CISOs and other executives can have continuous visibility to the security posture and always make informed decisions- IT security teams can prioritize their tasks and focus on fixing the riskiest vulnerabilities The NormShield cloud platform automates finding vulnerabilities, prioritizes them and provides actionable intelligence. You reduce risk as never before possible, and at an affordable price. With NormShield, CISOs can make informed decisions with continuous visibility and measurable performance. Security teams take swift action with prioritized tasks and auto-assigned tickets. 9:15 – 9:35: From Traditional to Next-Generation: Demystifying Hyperconvergence and Enterprise Clouds with NutanixAs enterprises look beyond traditional IT workloads including cloud-native applications and DevOps, they should consider how technologies such as software-defined infrastructure and cloud can drive real-world benefits.During this informative session featuring Brian Atkinson of Nutanix, learn how IT can move away from traditional environments to hyperconverged infrastructure and onward to Enterprise Clouds. These new platforms can handle all your challenging applications and business needs, with clear agility, productivity and availability/security benefits. At the end of this session, you'll:-  Acquire proven strategies for delivering frictionless IT services while retaining the precise control your business needs- Understand new capabilities that tear down IT silos and unify the technology stack- Learn best practices in virtualization, application design and cloud technologies9:35 – 9:55: All-Flash Primary Storage from Dell EMCNow more than ever, business is all about speed, flexibility and reliability, and Flash is the high-octane storage media behind it.An All-Flash Array, also referred to as a SSA or Solid State Array, is data storage that contains multiple Flash memory drives. All-Flash storage contains no moving parts, which means significantly less heat generated, less power utilized, and less maintenance. From a functional standpoint, All-Flash technology provides vastly superior performance: fewer spikes in latency, better disaster recovery, support of real-time analytics, much faster data transfer rates, and the ability to free IT staff to focus on other tasks.During this informative and technical talk featuring Dell EMC and Mavenspire, you will learn how Flash Storage can be deployed within your existing data center infrastructure.9:55 – 10:15 IT Resilience, Disaster Recovery, Business Continuity, Backup/Archiving with ZertoIn today's hyper-connected, always-on world, it is mandatory your employees and customers have 24/7 access to the applications, data and services they need, without interruption, downtime or delay. But when extreme weather and/or technical problems disrupt operations, it can be extremely challenging to recover, with data at rest, in use and/or in motion, stored onsite or offsite, on private, public and/or hybrid clouds. Fortunately, Zerto has a solution.Zerto is committed to helping enterprises embrace IT Resilience with a simple, scalable solution that future-proofs technology initiatives. Charles Sawyer will discuss how businesses can gain the confidence to withstand any disruption, incorporate new technology and meet changing business priorities with ease.Some of the specific capabilities with Zerto's Virtual Replication that will be covered include:- Seamless application mobility and portability, so organizations can easily leverage resources across public, private and hybrid clouds.- Automated replication and recovery with point-in-time journaling, so businesses can recover from anything, including ransomware, in minutes.- Freedom from hardware and hypervisor lock-in, so enterprises can leverage the best technology at the best prices.10:15 – 10:35: Get Control of your End Points in a Cloud-Driven Virtual World with IGELOrganizations generally have a comprehensive strategy for servers, storage, networking and applications, yet often overlook the endpoint. In this informative session featuring Joshua Robinson, Presales Engineer at IGEL, you will learn why and how to develop your endpoint strategy. Specific topics include: – Gain insight into options available for existing desktop, laptop and thin client assets – Learn what to look for in enterprise device management – Explore the capabilities and limitations of a virtual desktop/application solution- Understand the costs associated with thin client devices Coffee/Snack Break, Exhibit Area Open, Peer Networking, Product Demonstrations11:05 – 11:40: Linux, Windows Server and Hyper-V Containers: What They Are, Which One to Use, Why and How, plus Integration with Azure Private/Public/Hybrid Cloud, with MicrosoftA container is an isolated and portable operating environment. It provides a mechanism for IT to deploy services in a portable, repeatable and predictable manner. Container technology is the next evolution in virtualization, and in addition to Linux, Windows now also offers two different types of containers for addressing various business needs.In this session Dan Stolts, world renown Technical Evangelist at Microsoft and a dynamic/engaging presenter, will examine the similarities and differences between a container and a virtual machine, review the requirements and walk through the processes and essential operations of enabling, creating, deploying and managing Linux and Windows containers and resources. Mr. Chou will also evaluate when to use which containers, why and how? For those who are new to containers, his delivery serves as a jumpstart to accelerate your learning of containers. If you have already had some experience on Linux containers, his session familiarizes you with the specifics on Windows containers and helps bridge and extend your skills for bringing business value to both Linux and Windows communities.Mr. Stolts will conclude this session by highlighting the top five new features in Microsoft's Azure cloud platform for 2017, and how to integrate your organization's public/private/hybrid cloud and container strategies. Lots of valuable content for infrastructure, data center and DevOps professionals.11:40 – 12:15: Google Cloud PlatformThe Google Cloud Platform enables organizations of all sizes to build, test and deploy applications on Google’s highly-scalable and reliable infrastructure, choosing from computing, storage and/or application services for your web, mobile and/or backend solutions. Leo Kahng, a top enterprise and technology strategist at Google, will discuss how and why to use this innovative platform, covering the following items:Run on Google’s infrastructure: Build on the same infrastructure that allows Google to return billions of search results in milliseconds, serve 6 billion hours of YouTube video per month and provide storage for 425 million Gmail users.Mix and match services: Virtual machines. Managed platform. Blob storage. Block storage. NoSQL datastore. MySQL database. Big Data analytics. Google Cloud Platform has all the services your application architecture needs.Performance you can count on: Every millisecond of latency matters. Google’s compute infrastructure gives you consistent CPU, memory and disk performance; its network and edge cache serve responses rapidly to your users across the world.Focus on your product: Rapidly develop, deploy and iterate your applications without worrying about system administration. Google manages your application, database and storage servers so you don’t have to.Scale to millions of users: Applications hosted on Cloud Platform can automatically scale up to handle the most demanding Internet-scale workloads and scale down when traffic subsides. You pay only for what you use.Get the support you need: With our worldwide community of users, partner ecosystem and premium support packages, Google provides a full range of resources to help you get started and grow.12:15 – 12:35: VMware's Networking and Security NSX Platform, for the Software-Defined Data Center (SDDC)VMware NSX is the Network Virtualization and Security Platform for the Software-Defined Data Center (SDDC). By bringing the operational model of a virtual machine to your data center network, you can transform the economics of network and security operations. NSX lets you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach.As organizations go down this path towards a completely Software Defined Enterprise (SDE), VMware and Mavenspire will discuss these main components/features/benefits of NSX:Agility and Streamlined Operations, plus DevOps:As with server virtualization, NSX network virtualization treats your physical network as a pool of transport capacity, with services attached to workloads using a policy-driven approach. Some specific benefits are:- Reduce the time to provision multi-tier networking and security services to minutes, by creating virtual networks, with each network customized for supported workloads and isolated from other virtual networks.- Leverage a new operational approach to networking as you programmatically create, provision, snapshot, delete and restore complex software-based networks.- Develop, test and deploy new applications faster – DevOps functionality – by aligning network, security, compute and storage provisioning.Security and Micro-Segmentation:NSX micro-segmentation provides these security benefits/functionality:- Isolation, with no communication across unrelated networks- Segmentation, offering controlled communication within a network- Fine-grained policies, enabling firewall controls at the level of the virtual NIC.- Automation, as policies are automatically applied when a virtual machine spins up, moved during migration and then removed after deprovisioning, eliminating the problem of stale firewall rules.- Integration with leading third party products through security tags.Platform for Advanced NetworkingChange in traditional networks can be slow and error-prone, making them poorly suited to fluctuating data center demands. By contrast, virtual NSX networks can be configured dynamically and automatically, with new services – virtual or physical – added as needed. Manual reconfiguration of physical network devices is eliminated, plus you can build advanced workflows to automate provisioning of networking and security, including switching, routing, firewalling, and load balancing.Lunch is Served1:20 – 1:40: Optimizing Website Performance and Application Delivery with Microservices Architecture from NGINXAs enterprise architecture transitions from Mode 1/Monolithic into Mode 2/Microservices they realize that software Application Delivery Controllers offer the most flexibility. With this particular application modernization effort there are issues to tackle such as service discovery, load balancing, performance and security.Shaun Empie, a leading NGINX Technical Solutions Architect, will cover how real world enterprises are addressing these challenges, plus review the NGINX Plus powered Microservices Reference Architecture (MRA), a microservices platform with 3 pre-developed models for microservices applications:- The Proxy Model puts a single NGINX Plus server in the reverse proxy position. From there, it can manage client traffic and control microservices.- The Router Mesh Model adds a second NGINX Plus server. The first server proxies traffic and the second server controls microservices functionality. – The Fabric Model is the most innovative. There’s still one NGINX Plus server in front, proxying traffic. But, instead of a second server to control the services, there’s one NGINX Plus instance per service instance. With its own instance of NGINX Plus, each service instance hosts its own service discovery, load balancing, security configuration, and other features. The Fabric Model allows SSL/TLS support for secure microservices communications with high performance, because individual NGINX Plus instances support robust persistent connections.1:40 – 2:00: OpenStack-based Management of Cloud Computing Platforms with Red HatIn 2004, Linux was a lot like OpenStack is today. Developers and technologists around the world now collaborate on OpenStack. to create tools for building and managing public and private clouds.While OpenStack's development, distribution, and adoption are overseen by the OpenStack Foundation, an independent body providing shared resources, this presentation will focus on RDO, a community deploying OpenStack on Red Hat Enterprise Linux, Fedora, and distributions derived from these (CentOS, Scientific Linux, and others).End of Event, Raffle Prize Drawings for gift cards and other great items!FAQsWhat are Angelbeat's privacy and optin/optout policiesEach attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their databaseHowever each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors. If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at is eligible to receive a free passThere is no charge to attend for an end user IT professional who works in the telecom/network/storage/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals/healthcare providers, pharmaceuticals, insurers, manufacturers, retailers, financial services/banks, real estate, legal/accounting/services, transportation/logistic firms, etc. and use, support, approve and/or are involved in or influence the decision to buy the products and services offered by our sponsors.All free attendees must be pre-approved in advance by Angelbeat. Angelbeat reserves the right to accept or reject a free pass request at its sole discretion. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above, who attend our events at no charge. If you fall in this category and would still like to attend then the fee is 0/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. If you are a non-sponsoring vendor/integrator/consultant and would like to attend but avoid paying this 0 fee, then you must be accompanied by one of your clients who has not previously registered, and is a CIO, CISO or IT Director that meets the end user criteria above. Full-time reporters from major newspapers, websites, television and radio stations can attend as our guest, but again must be approved in advance.If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration.What are my transport/parking options getting to the eventDetailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking.What is the dress codeSuggested dress is business casual.What if you have special dietary needs/restrictionsIf you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.What if I am a government employee and cannot accept free meals and/or win raffle prizesIf you are a government employee and cannot accept free meals, then you can pay Angelbeat /person, to cover the cost of breakfast. Please contact the event organizer at to arrange payment.Each sponsoring company/exhibitor handles its own raffle prize drawing; Angelbeat itself has nothing to do with these prizes and attendees are not automatically entered for any raffle prize drawing. Since each attendee must individually signup to win a raffle prize, then government employees (who are not eligible to win these prizes) can simply not signup for the drawing.

at Westin Hotel
6631 West Broad Street
Richmond, United States

Monitoring and Operating a Private Cloud

Monitoring and Operating a Private Cloud
Event on 2015-05-11 08:30:00

Course: MS20246

Length: 5 Days


This course describes how to monitor and operate a private cloud with Microsoft System Center 2012. This course focuses on how to manage and administer the private cloud, and it describes how you can monitor key infrastructure elements and applications that run within the private cloud. It does not discuss planning and implementation, which is covered in 10751A: Configuring and Deploying a Private Cloud with System Center 2012.

Target Students

This course is intended for data center administrators who are responsible for monitoring and protecting the private cloud infrastructure. It is also intended for solution architects who are responsible for designing private cloud architectures and extending existing private cloud solutions. The primary audience for this course is administrators who create service requests. The secondary audience includes data center administrators—who are responsible for providing provisioning for applications including configuring and deploying those applications—application/service business owners, and administrators who implement service requests.

Course Objectives

After completing this course, students will be able to:

  • Describe the private cloud infrastructure.
  • Configure and optimize business unit clouds.
  • Deploy cloud services.
  • Monitor private cloud services.
  • Configure application performance monitoring.
  • Operate and extend service management in the private cloud.
  • Automate incident creation, remediation, and change requests.
  • Implement problem management in the private cloud.
  • Automate Self-Service provisioning.
  • Protect the resources in the private cloud by using Data Protection Manager.
  • Configure compliance in the private cloud.
  • Configure SLAs, dashboards, and widgets.


This course describes how to monitor and operate a private cloud with System Center 2012. Because this is an extensive technical domain that includes several individual products and technologies, it is strongly recommended administrators have prerequisite knowledge in the following areas:

  • Windows Server 2008 R2 experience
  • Active Directory Domain Services (AD DS) knowledge
  • Networking experience
  • Working knowledge of previous versions of System Center products
  • Knowledge of configuration of Microsoft SharePoint
  • Hyper-V knowledge
  • Knowledge of data center management processes
  • Storage Area Network (SAN) Knowledge


Course Content

Module 1: Introduction to the Private Cloud

This module gives students an overview of a private cloud infrastructure, including what it is, the business and technical drivers behind implementing it, and how they can use System Center 2012 to monitor and operate it. Students will understand the key concepts of a private cloud and verify key components of System Center 2012.


  • Overview of the Cloud Computing Model
  • Requirements for the Private Cloud
  • Operating a Private Cloud Infrastructure with System Center
  • Maintaining the Health of the Private Cloud
  • Integrating System Center Components
  • Verifying the Compliance of the Private Cloud Infrastructure

Lab : Verifying the Private Cloud Infrastructure

  • Verifying the Infrastructure
  • Verifying System Center Components

Lab : Verifying the Compliance of the Private Cloud Infrastructure

  • Exercise: Checking Compliance

After completing this module, students will be able to:

  • Describe the features of a cloud computing model.
  • Describe the requirements for the private cloud.
  • Describe how you can use System Center to monitor and manage the private cloud.
  • Describe how to maintain the health of the private cloud infrastructure.
  • Describe how to integrate System Center components.
  • Verify the compliance of the private cloud infrastructure.

Module 2: Configuring and Optimizing Business Unit Clouds

This module explains how to configure a new business unit cloud within Virtual Machine Manager.


  • Overview of System Center Virtual Machine Manager
  • Managing a Virtual Environment with Virtual Machine Manager
  • Creating Business Unit Clouds

Lab : Configuring and Optimizing Business Unit Clouds

  • Configuring Network Resources
  • Creating the Business Unit Cloud
  • Configuring Security

After completing this module, students will be able to:

  • Describe the core components, key features, architecture, and security features of Virtual Machine Manager, and the role it plays in the private cloud.
  • Use Virtual Machine Manager to manage private cloud infrastructure.
  • Describe how to build and configure resources and security for a business unit cloud.

Module 3: Deploying Cloud Services

This module explains how to deploy pre-packaged applications and create a new service template to deploy a service into the cloud.


  • Overview of Service Templates
  • VMM Profiles
  • Web Deploy Packages
  • Overview of Server App-V
  • Data-Tier Application Packages

Lab : Importing and Deploying the Stock Trader Application

  • Deploying a Single Tier Service
  • Configuring Prerequisites
  • Preparing the Stock Trader Service Template
  • Deploying the Service Template

After completing this module, students will be able to:

  • Create service templates in VMM by using the Service Template Designer.
  • Describe the process of creating VMM profiles.
  • Describe the process of creating Web Deploy packages.
  • Describe the process of sequencing by using Server App-V.
  • Describe the process of creating data-tier application packages.

Module 4: Monitoring Private Cloud Services

This module provides an overview of System Center Operations Manager. The students are shown how Operations Manager is used to monitor the various services that underpin the private cloud. The students are then shown how to deploy agents to key service components running within the private cloud. Custom monitoring is then applied to these components which include the creation of a distributed application model to give a holistic view of the health of the private cloud infrastructure.


  • Overview of System Center Operations Manager
  • Agent Deployment in Operations Manager
  • Configuring Custom Monitoring
  • Monitoring the Network Infrastructure
  • Monitoring Distributed Applications

Lab : Monitoring Private Cloud Services

  • Deploying an Agent
  • Configuring Custom Monitoring
  • Creating a Distributed Application Model
  • Detecting and Recovering from a Failure

After completing this module, students will be able to:

  • Describe the key features of Operations Manager.
  • Describe the architecture of Operations Manager, including databases, management servers, management server pools, consoles, gateways, and reporting.
  • Describe how to secure access to Operations Manager by using User Roles.

Module 5: Configuring Application Performance Monitoring

This module gives students a deep insight into the Application Performance Monitoring (APM) feature of Operations Manager. A .NET application has been installed into the lab environment that will be used for this module. Students will learn to configure APM to monitor the performance and availability of this application. A break in the application is then instigated where students will see how Operations Manager detects and reports this with the Alerting and Diagnostics tools that are built into Operations Manager.


  • Application Performance Monitoring
  • Advanced Monitoring in Application Performance Monitoring
  • Viewing Application Performance in Operations Manager

Lab : Configuring Application Performance Monitoring

  • Configuring Basic Monitoring in Application Performance Monitoring
  • Customizing the Performance Thresholds
  • Validating Monitoring
  • Creating a Distributed Application Model for the DinnerNow Application

After completing this module, students will be able to:

  • Describe the core components in APM and the best practices when implementing them.
  • Describe how to implement advanced monitoring features that are available in APM.
  • Describe how to view application performance in Operations Manager.

Module 6: Operating and Extending Service Management in the Private Cloud

This module explains the core functionality of Service Manager and the steps to create and manage change requests, incidents, and release records. The module also describes about the security model behind Service Manager so that students can customize and extend the integral functionality of the service.


  • Overview of Service Manager
  • Configuring Security and User Roles
  • Configuring Work Items
  • Configuring Incident Queues
  • Configuring Service Offerings

Lab : Operating and Extending Service Management in the Cloud

  • Configuring Security Roles
  • Configuring Notifications
  • Publishing an Incident Service Offering
  • Raising an Incident
  • Creating an Approving a Change Request
  • Creating an Assigning a Release Record

After completing this module, students will be able to:

  • Describe Service Manager.
  • Describe configuring security and user roles.
  • Describe configuring work items.
  • Describe configuring incident queues.
  • Describe configuring service offerings.

Module 7: Automatic Incident Creation, Remediation, and Change Requests

This module provides an overview of Orchestrator and explains how Orchestrator integrates with Operations Manager and Service Manager.


  • Overview of System Center Orchestrator 2012
  • Integrating Orchestrator with Operations Manager and Service Manager

Lab : Automating Incident Creation, Remediation, and Change Requests

  • Configuring the Incident Template
  • Configuring Incidents That Affect the StockTrader Service
  • Automating Incident Remediation and Change Requests

After completing this module, students will be able to:

  • Describe the Orchestrator components and the available Integration Packs.
  • Integrate Orchestrator with Operations Manager and Service Manager.

Module 8: Problem Management in the Private Cloud

This module provides an overview of problem management and explains how students can use it within a service management framework. Additionally, this module explains its implementation as a manual feature of Service Manager. Finally, this module describes how to create a custom event monitor in Operations Manager and then use it to identify and route incidents and problems to Service Manager.


  • Overview of Problem Management
  • Creating Custom Rules

Lab : Automating Problem Management in the Private Cloud

  • Manually Creating a Problem Record
  • Creating a Custom Event Rule in Operations Manager
  • Configuring Automated Problem Record Creation

After completing this module, students will be able to:

  • Describe problem management.
  • Create custom rules.

Module 9: Automating Self-Service Provisioning

This module explains about automating self-service provisioning by using the System Center Cloud Service Process Pack, including the configuration items that are created and the request items that are contained in the System Center Cloud Service Process Pack.


  • Installing and Configuring the System Center Cloud Services Process Pack
  • Cloud Services Configuration Items
  • Cloud Services Request Items

Lab : Automating Self-Service Provisioning

  • Completing the Prerequisites for the System Center Cloud Services Process Pack
  • Installing the System Center Cloud Services Process Pack
  • Configuring the System Center Cloud Services Process Pack
  • Deploying a Virtual Machine for StockTrader by using the Cloud Services Process Pack

After completing this module, students will be able to:

  • Describe how to install and configure the System Center Cloud Services Process Pack.
  • Describe the various Cloud Services configuration items that make up the System Center Cloud Service Process Pack.
  • Describe the various Cloud Services request items that are included in the System Center Cloud Services Process Pack.

Module 10: Private Cloud Protection and Recovery

This module explains how to protect the resources in the private cloud by using Data Protection Manager. It also explains how to implement a recovery action by using Orchestrator to recover a database.


  • Protecting Data in the Private Cloud
  • Recovering Data in the Private Cloud

Lab : Private Cloud Protection and Recovery

  • Configuring Manual Protection and Recovery of Key Service Data
  • Configuring Automatic Protection and Recovery of Key Service Data
  • Monitoring Protection Status

After completing this module, students will be able to:

  • Configure data protection in the private cloud.
  • Configure data recovery in the private cloud.

Module 11: Configuring Compliance in the Private Cloud

This module explains how to implement IT Governance, Risk Management, and Compliance (GRC) in a private cloud environment by using System Center 2012. It also explains how to implement Software Update Compliance in Virtual Machine Manager to verify whether key private cloud infrastructure is correctly updated with the latest software updates. The module also describes how to implement the IT GRC Management Pack in Service Manager to check for compliance across key Service Components and remediate non-compliant items.


  • Overview of the Process Pack for IT GRC
  • Installing and Configuring the Process Pack for IT GRC
  • Implementing an IT GRC Control Management Program
  • Maintaining Compliance through VMM Security Baselines and System Center Advisor

Lab : Configuring Compliance in the Private Cloud

  • Creating an IT GRC Control Management Program
  • Adding Test Results to a Manual Control Activity and View Compliance Reports
  • Assigning a Baseline

After completing this module, students will be able to:

  • Describe the System Center 2012 Process Pack for IT GRC.
  • Describe installing and configuring the Process Pack for IT GRC.
  • Describe implementing an IT GRC Control Management Program.
  • Describe maintaining compliance by using VMM Security Baselines and System Center Advisor.

Module 12: Configuring SLAs, Dashboards, and Widgets

This module describes the various methods for surfacing service and performance-related data from Operations Manager and Service Manager to SharePoint and Microsoft Excel.


  • Service Level Tracking
  • Configuring and Deploying Widgets and Dashboards
  • Publishing Real-Time State with Microsoft Visio Snap-in
  • System Center Analytics
  • Using Excel and SSRS to View Data
  • Overview of PerformancePoint

Lab : Configuring SLAs, Dashboards, and Widgets

  • Configuring Service Level Tracking
  • Configuring Service Level Management
  • Configuring Microsoft Excel Analytics
  • Configuring PerformancePoint Analytics

After completing this module, students will be able to:

  • Describe Service Level Tracking in Microsoft System Center 2012 Operations Manager.
  • Configure and deploy widgets and dashboards.
  • Describe publishing in real time state with Microsoft Visio.
  • Describe using System Center analytics.
  • View data with Microsoft Office Excel and Microsoft SQL Server Reporting Services.
  • Describe using Microsoft PerformancePoint.

at Discover ITT Riverchase Training Center
3 Riverchase Office Plaza
Birmingham, United States