Hybrid Exchange: Making it easier and faster to move to the cloud – BRK3143


RIGHT. I DETECT THE FAINT SMELL OF WICKS VAPOR RUB AND COUGH SYRUP IN THE AIR AND IT’S WEDNESDAY AT IGNITE. I WANT TO GO ON RECORD AND SAY I HAVE NEVER THREATENED BRET WITH ANYTHING. I’M SURE WE CAN AGREE HE PROBABLY GETS A LOT OF THREATS ELSE. LET’S GET INTO IT. G FOLKS SAID HOW ABOUT A SESSION AT IGNITE. I THOUGHT IT WAS A GREAT OPPORTUNITY TO GET IN FRONT OF A CROWD OF IT PROS LOOKING AT ADOPTING EXCHANGE AND OFFICE 365 EXCHANGE ONLINE AND OFFICE 365. I THOUGHT I COULD PROMOTE SOME OF THE WORK MY TEAM HAD BEEN DOING. WE HAD A SESSION. IT WAS 9:00 ON DAY FOUR OF IGNITE AND GOT ABOUT 300 PEOPLE IN THE ROOM. IT WAS WELL RECEIVED. WE COVERED A WIDE RANGE OF WORK. MY TEAM WAS IN TO CONDITIONAL ACCESS, EXSENSIBILITY APIS. PLANNING SOME IN THE HYBRID SPACE AND TALKING ABOUT SPECKTIVE IDEAS. THINGS TO KICK START A CONVERSATION THAT WOULD CONTINUE OVER THIS PAST YEAR AND SEE IF WE WERE ON THE RIGHT TRACK WITH OUR THINKING. AND THE SESSION WAS PRETTY WELL RECEIVED. WE GOT A LOT OF GREAT FEEDBACK WHICH WAS GOOD VALIDATION THAT WE WERE THINKING ABOUT THE RIGHT THINGS ESPECIALLY IN THE HYBRID SPACE. THE LAST THING I DID FOR THAT TITLE. AND I WAS TALKING ABOUT SO MANY DIFFERENT THINGS. I WAS TRYING TO COME UP WITH A TITLE THAT ENCAPSULATED ALL OF THEM AND MARK ING SAID MAKE IT START WITH A VERB. WE STARTED WITH THE IDEA OF EXCHANGE ON LINE. WE WENT THEW A LIFE CYCLE OF FEATURES. STILL PRETTY WELL RECEIVED. I THINK A LOT OF PEOPLE ENDED UP IN THE ROOM THROUGH WORD OF MOUTH TALKING ABOUT HYBRID STUFF. THERE WERE A COUPLE OF PEOPLE THAT DIDN’T LIKE THAT AND GAVE ONE STAR REVIEWS AND MISSED THE SESSION ENTIRELY BECAUSE OF THE TITLE. MARKETING CAME, DARKENED MY DOOR AGAIN AND SAID HOW ABOUT A SESSION. HYBRID, HYBRID, HID BRIE. MY TITLE. HYBRID. AND THEY SAID, THAT’S PRETTY GOOD. MAYBE LET’S TWEAK IT A LITTLE BIT TO BE SLIGHTLY LESS PASSIVE AGGRESSIVE. SO HYBRID EXCHANGE. MAKING IT EASIER AND FASTER TO MOVE TO THE CLOUD. MY NAME IS JEFF KIZNER I’M A PROGRAM MANAGER WITH TECHES CHANGE ONLINE AND WITH MARCIO GONCALVES CESARIOS OFFICE 365>>>>TODAY WE OWN HYBRID. AND TODAY IS REALLY ABOUT MAKING IT EASIER. MAKING IT FASTER TO MOVE TO THE CLOUD. I TALKED TO LOTS OF CUSTOMERS WORLDWIDE. I REALLY THIS AFLIES ANYBODY. — APPLIES TO ANYBODY. THE IDEA OF GETTING TO THE CLOUD HAS TO BE EASY AND FAST. IF YOU THINK ABOUT ALL THE GREAT THINGS THAT PEOPLE LIKE WERE DEMOED IN THE CO-NOTE. IF YOU SEE OUR ANNOUNCEMENTS ON TEAM WORK APPS. NONE OF THIS STUFF TO THE USER UNTIL YOU GET THEM IN THE CLOUD. EXCHANGE IS ONE OF THE FIRST WORKLOADS THAT GETS YOU THERE. IF WE CAN’T GET YOU THERE FASTER WE CAN’T GET YOU ADOPTING ALL THE OTHER GREAT STUFF FASTER. I WANTED TO FOCUS TODAY, JUST ON THAT. K0U7AL OF — COUPLE OF FEATURES. KICK START A CONVERSATION FOR THE NEXT YEAR ABOUT WHAT IT TAKES TO GET YOU OVER THE HUMP AND MOVING INTO THE CLOUD. FOR SOME OF YOU IT’S JUST GOING TO BE MOVING FASTER MAKING IT EASIER AND SOME OF YOU WILL BE ABOUT UNBLOCKING ISSUES. I WENT TO A SESSION YESTERDAY BY MICHAEL ANDER RICK AND THAT I CAN THEY TALKED ABOUT MOVING INGBACK TO THE CLOUD. THE PERFECT TEE UP FOR THE SESSION. THEY TALKED ABOUT HOW NECESSARY IT WAS TO GET HYBRID RIGHT. IT’S NECESSARY. IT’S HARD. THIS LITTLE QUOTE COMES FROM OUR DOCS. MY FAVORITE QUOTE WHEN WE TALK ABOUT HYBRID. THIS STARTS AT A SECTION. THIS SECTION WILL TAKE ABOUT 20 MINUTES TO GO THROUGH. IT’S ALL ABOUT SETTING UP HYBRID AND RUNNING THE HYBRID CONFIGURATION. SO 20 MINUTES. AND THEN WE’LL PROVIDE THIS DISCLAIMER. YOU PROBABLY HAVE A PLAN A LOT MORE TIME THAN THAT. BECAUSE YOU HAVE TO TALK TO A WHOLE BUNCH OF PEOPLE. IT’S GOING TO TAKE. IF YOU ON THERE MICHAEL AND ERIK YESTERDAY. IT’S PAINFUL. THEY HAD TO GO THROUGH THE REGULATORS. SECURITY SEPTEMBER NETWORKING GUYS. IT’S NECESSARY BUT HARD. ONCE YOU GET PAST ALL OF THAT, WE STILL DON’T MAKE IT EASIER FOR YOU. YOU’VE GOT YOUR ADMINS GOING OVER HERE FOR ONE THING. YOUR ADMINS FOR ANOTHER THING. THIS IDEA OF HYBRID JUST ISN’T A REALITY. WHAT WE HAVE IS TWO SEPARATE ORGANIZATIONS THAT YOU’VE GOT TO MANAGE SEPARATELY. SEPARATELY. YOU’VE FE GOT TO WORK WERE W THERE ARE DIFFERENT ISSUES ACROSS ALL OF THEM. REALLY WHEN I THINK ABOUT IT, WHEN I THINK ABOUT WHAT HYBRID IS, OR WHAT HYBRID SHOULD BE. IS THIS IDEA OF A VIRTUAL ORGANIZATION THAT BRINGS ALL OF YOUR USERS AND ALL OF YOUR DATA UNDER ONE VIEW. UNDER ONE PURVIEW INSTEAD OF WHICH TOOLS GO HERE, THERE, WHAT TO DO, IT SHOULD BE MOVING FROM THIS IDEA OF TWO SEPARATE ORGANIZATIONS TO ONE SIMPLE VIRTUAL ORGANIZATION. AND ALL YOU NEED TO WORRY ABOUT , IF YOU NEED TO WORRY ABOUT THIS, IS WHERE YOU’RE PUTTING DATA FOR SPECIFIC USERS, SPECIFIC OBJECTS. THAT SHOULD BE THE VALUE OF HYBRID. WE SHOULD MAKE EVERYTHING ELSE SEAMLESS, TRANSPARENT FOR YOU. WE’RE LONG AWAY FROM THAT. . THAT IS THE VISION. THAT’S WHAT WE’RE TRYING TO GET TO. S TO GET THERE. THAT’S WHAT I WANTED TO FOCUS ON TODAY. SO THE FIRST THING THAT REALLY COMES TO MIND. AGAIN IT WAS CALLED OUT YESTERDAY, THIS IDEA OF ADMINISTRATION. ONCE YOU ADOPT EXCHANGE ON LINE, YOU’VE GOT SEPARATE ADMINISTRATION. IT’S NOT THIS VIRTUAL ORGANIZATION THAT WE THINK IT SHOULD BE. SO BRING OUT MY BLOCK FRIENDS TO ILLUSTRATE THE PROBLEM. EXCHANGE ON LINE. HE’S GETTING READY TO MOVE MAILBOXES. GREAT. DONE A GOOD JOB. AND REALIZESES ALL THE CONFIGURATION HE’S DONE OVER THE 12, 15 YEARS OF RUNNING EXCHANGE ON-PREM IS NOT THERE. WE DIDN’T BRING IT ACROSS. HE DOESN’T KNOW WHAT IS GOING TO HAPPEN. WE DON’T KNOW WHAT HAPPENED TO THE OLD MAILBOX POLICIES. WHAT IS GOING TO HAPPEN TO RECORDS RETENTIONS IF WE DON’T HAVE THE RETENTION POLICIES ACROSS. HE DOESN’T KNOW WHAT’S GOING TO HAPPEN TO HIS DATA, USERS, PUTS THE MAILBOXES ON HOLD AND THE BUSINESS GETS UPSET BECAUSE THEY CAN’T ADOPT ALL OF THE NEW FEATURES AND SERVICES AS FAST AS THEY WANT. IF YOU’RE AN IT PRO AND I WAS AT ONE POINT IN MY CAREER. WEEKENDS WORKING AND MIKE DOES THIS AND BRINGS THE POLICIES ACROSS TO MATCH THE EXCHANGE ON-PREM POLICIES AND BEGINS TO MIGRATE. AFTER THAT HE’S IN THIS DUAL ADMINISTRATION PHASE. GO HERE FOR THIS. GO THERE FOR THAT. TRY TO KEEP IT ALL TOGETHER. SO I TEASE THIS IDEA OUT ABOUT A YEAR AGO. IT SEEMED TO REUSS NAILS NATE WELL. WE — RESONATE WELL. WE BUILT THIS FEATURE. OCT AS WE CALL IT. WE RELEASED V1 A COUPLE OF MONTHS AGO. THE IDEA HERE IS SIMPLE. CREATE D ON-PREM AND TRANSFER THEM TO THE ONLINE ENVIRONMENT. AND INTEGRATED IT INTO THE HYBRID INFORMATION WIZARD. THAT’S WHERE YOU’RE GOING TO START BY ACCOMPLISHING — ESTABLISHING HYBRID. WHERE QUESTION STARTED AND WE WANTED TO KEEP IT SIMPLE TO START TO MAKE SURE WE WERE ON THE RIGHT TRACK AND BUILDING THE RIGHT FEATURES YOU WANTED. OBJECTS. SO YOU RUN THE HCW AND TAKES THE OBJECTS AND BRINGS THEM TO THE CLOUD. AND WE STARTED WITH A SUBSET OF THE POLICIES AND OBJECTS YOU COULD POSSIBLY CONFIGURE. IN TALKING WITH CUSTOMERS AND DOING RESEARCH, THESE ARE THE FIRST FIVE OR SIX THAT WE THOUGHT WERE MOST IMPORTANT IN TALKING TO CUSTOMERS. ALL WE DID IN THAT FIRST VERSION WERE NEW ACTIONS. SO IF YOU HAD AN MAILBOX POLICY THAT DIDN’T EXIST IN THE CLOUD DOING A COMPARISON BY NAME, WELD DO AN NEW MAILBOX POLICY IN THE CLOUD AS PART OF THE HCW RUN. IF WE SAW A NAME MATCH BY NAME WE SKIP OVER THE OBJECT. IT WAS A START OF BOOT STRAPPING THE IDEA. BOOT STRAPPING THE ONLINE ENVIRONMENT TO MATCH YOUR ON-PREM ENVIRONMENT AT THE TIME YOU START ADOPTING. SO TODAY WHAT I WOULD LIKE TO DO IS SHOW YOU ORG CONFIG TRANSFER V2. ENVIRONMENT. LY CLICK NEXT. THE FIRST THING YOU’LL SEE IS WE’LL LOOK AT A SERVER. ALL YOU KNOW YOU HAVE TO LICENSE YOUR HYBRID SERVERS. SO YOU USED TO GO TO A WEB PAGE OR CALL SUPPORT AND LOG IN. IN THE LAST TWO MONTHS WE’VE INTEGRATED THAT LICENSE FOR THE EXCHANGE HYBRID SERVER INTO THE HCW. YOU CAN CLICK THIS LINK IN FRONT. TO LICENSE NOW. IT WILL GIVE A POP UP, LOG IN AND GO OUT. GIVE YOU A LICENSE AND AUTOMATICALLY LICENSE THIS SERVER FOR YOU. SO YOU’LL SEE THAT. WE’RE GOING TO SKIP THROUGH THAT FOR TODAY.>>LY ENTER SOME — I WILL ENTER SOME CREDENTIALS HERE.>>MY TEAM LIKES TO MESS WITH ME WE THEY CREATE ACADEMY MOS — DEMOS AND THEY MAKE THE TENANT NAMES. I USED PASSWORD SAFE. OFF WE GO. SO WE’LL DO A BUNCH OF THINGS. I WILL BRING UP POWERSHELL WINDOWS. DOES EVERYBODY KNOW THIS TRICK? F12 IN THE HCW THAT BRINGS UP THIS DIALOGUE. THIS IS A GOOD TRICK. AND YOU CAN OPEN YOUR POWERSHELL SESSIONS. HYBRID AND CHOOSE TO RUN ORG CONFIG TRANSFER. LET’S LOOK AT THE ENVIRONMENT. TAKE A LOOK AT THE ON-PREM ENVIRONMENT. YOU’LL SEE HERE WE’VE GOT A OEM MAILBOX POLICY. SUPER SIMPLE. DO THE SAME ON THE CLOUD SIDE. AND YOU’LL SEE THAT ONE IS NOT THERE. THAT’S ONE WE SHOULD BRING ACROSS. THAT’S A NEW OBJECT. LET’S TAKE A LOOK AT ONE OF OUR POTENTIAL CONFLICTS. THAT’S REALLY WHAT I WANT TO SHOW YOU TODAY. LET ME DO, GET DLP. POLICY. AND WE’RE GOING TO DO FT NAME.>>FORGOT A COMMA. LET’S MAKE THAT EASIER TO READ.>>SO WE HAVE A DLP POLICY ON-PREM AND IT’S GOT A COUPLE OF PROPERTIES HERE. LET’S LOOK AT THE SAME ONE.>>WE HAVE A MISMATCH HERE. SIDES. IN OCTV1 THIS IS AN OBJECT WE WOULD HAVE SKIPPED. AND YOU WOULD HAVE BEEN IN THAT DUAL ADMINISTRATION STAGE. MAKE CHANGES ON BOTH SIDES TO KEEP IN SYNC. LET’S RUN OTC AND NOW IT WILL START LOOKING AT THE POLICIES STORING IN MEMORY AND FIGURING OUT WHAT TO DO WITH THEM. OCTV2 ADDS A NEW PAGE HERE. ONCE IT GETS THROUGH THE THAT PROCESSING, WHAT IT FINDS HERE IS THAT WE’VE GOT OBJECTS IN CONFLICT. AND SO IN OCTV1 WE WOULD HAVE SKIPPED OVER THE DLP POLICY AND IGNORED IT AND MOVED ON. NOW YOU CAN HAVE AN OPTION. THERE ARE OBJECTS IN CONFLICT, IF YOU DON’T WANT TO OVERWRITE ANYTHING IN THE CLOUD, HIT THE SECOND BUTTON SAY DON’T TRANSFER ANYTHING. IF YOU THINK YOU MIGHT WANT TO DO IT, GO WITH THE FIRST ONE. REVIEW THE OBJECTS. WE BRING UP A NEW PAGE THAT SHOWS THE OBJECTS THAT WE FOUND THAT HAVE CONFLICTS THAT MATCH, BY NAME, ON-PREM IN THE CLOUD, REVIEW THEM. THE WAY THIS MATCH WORKS. THE FIRST THING WE DO IS FIND THE OBJECT MATCH BY NAME AND WE GO PROPERTY BY PROPERTY TO FIND OUT IF THERE’S A CONFLICT ON ANY ONE OF THOSE PROPERTIES. REVIEW. IF THERE ARE NO MATCHES, I’M SORRY IF THERE ARE NO CONFLICTS PROPERTY BY PROPERTY AND THEY’RE IN SYNC WE IGNORE AND MOVE ON. THERE’SNOLOGY NOG TO REVIEW AT THAT POINT. WE LOOK AT THE SECOND DLP POLICY. YOU CAN SEE THAT WE’LL SHOW YOU THE VALUE OF EACH OF THOSE PROPERTIES DESCRIPTION AND MODE. ON-PREMISES HAS ONE VALUE AND THE — HAS A DIFFERENT. WE HAVE THE SAME FOR THE MALWARE POLICY. THE DEFAULT OEM POLICY. YOU CAN CHOOSE WHAT TO DO. IN ORG CONFIG WE HAD A CONFLICT HERE AS WELL IN TERMS OF THE DEFAULT PUBLIC FOLDER WARNING QUOTED TAE. YOU CAN CHOOSE TO BRING THESE ACROSS OR NOT. YOU CAN GET DOWN GRANULAR TO THE OBJECTS YOU WANT. IF YOU DON’T WANT TO MESS WITH THE ORGANIZATION CONFIG, DON’T SELECT. GO FARED WITH DLP POLICIES, SPECIFIC POLICY AND THE MALWARE POLICY. AND THEN YOU CLICK NEXT. TELL YOUS IT’S ABOUT TO GO DO IT. GIVES ONE LAST CHANCE TO BACK OUT. AND OFF IT GOES. AND THEN IT JUST STARTS WRITING THE COMMANDS. WE’RE DOING SETS NOW. YOU CAN TAKE A LOOK AT THE LOGS. WE’LL GO TO THE LOG IN FOLDER. I’LL SHOW TWO MORE THINGS HERE. THE FIRST THING WE DID IS ADD A ROLLBACK SCRIPT. AS YOU GO THROUGH. YOU GO. JUST IN CASE YOU CLICKED THROUGH THIS AND YOU DIDN’T INTEND TO OVER WRITE SOMETHING IN THE CLOUD WE ADDED A ROLLBACK SCRIPT. NAMED BY TIME STAMP AND ALL IT DOES IS GIVE YOU THE COMMANDS. RUN THESE, COPY THESE INTO YOUR ONLINE POWERSHELL WINDOW AND ROLL THOSE OBJECTS BACK TO THE STATE THEY WERE BEFORE YOU STARTED THE HYBRID CONFIGURATION WIZARD. IF YOU WANT TO WE’VE ADDED A LOG FILE FOR OCT. SO YOU CAN SEE EXACTLY WHAT WE’RE DOING HERE. NO SECRETS. THIS IS SUMP. ONE OF — SIMPLE. ONE OF THOSE THINGS WE THOUGHT WAS GOING TO MAKE IT SEIZE WE TO BE CLEAR WE DID NOT BUILD RAND NOT BUILDING A SYNCHRONIZATION ENGINE. THIS IS A ONE TIME TRANSFER HERE. SO EVERY TIME YOU RUN THE HCW IT’S DOING A TRANSFER. AND YOU CAN RUN THAT AS MANY TIMES AS YOU WANT. ANY TIME YOU WANT TO MAKE A CHANGE ON-PREM YOU COULD RUN THE HCW, GET TO THE OCT PHASES AND CANCEL OUT. YOU DON’T HAVE TO GO THROUGH THE END IF YOU DON’T WANT TO. IT’S A ONE-TIME TRANSFER. THIS IS NOT A DUAL RIGHT SCENARIO. THIS IS NOT A SEVENING NIGH STATION — SYNCHRONIZATION SCENARIOS. I AM NOT SURE OF GETTING IN THE BUSINESS OF META DIRECTED RIESE AND THIS IS OUR START TRYING TO MAKE IT EASIER FOR YOU. TO ESTABLISH THAT ONLINE ENVIRONMENT KEEP IT IN SYNC, GET TO THAT IDEA OF A VIRTUAL ORGANIZATION. SO WE ADDED, AS YOU SAW THOSE SET ACTIONS. AND WE ADDED A SUBSET OF POLICIES AND OBJECTS. SO WE LOOKED AT DLP POLICY AND THE MALWARE FILTER POLICY SHOWED UP IN OUR DEMO. ORGANIZATION CONFIG. AND WE’VE ADDED A FEW OTHERS. WE’RE CONTINUING TO ADD ON TO THIS. WE’LL GET TO SOME QA LATER TODAY. THINK ABOUT WHAT OBJECTS ARE MOST INTERESTING TO YOU. I WOULD LIKE TO HEAR WHAT YOU WANT TO SEE US ADD TO OCT. AS WE CONTINUE TO DEVELOP THIS ONE. YOU HAVE TOE GET PASS — YOU HAVE TO GET PASSED THE HYBRID SET UP TO GET THERE. AN ADMINISTRATION ISSUE. JUST TO GET TO THAT POINT TENDS TO BE HARD. THAT’S WHAT MIC WAS TALKING ABOUT YESTERDAY AND HERE IS MY FAVORITE QUOTE. IT’S SUPER HARD, IS IT GOING TO TAKE YOU 20 ANYONE ISES NOPE. LIT TAKE A LOT LONGER THAN THAT. HOW LONG? WE HAVE ABSOLUTELY NO IDEA. YOU’VE DEFINITELY GOT TO TALK TO A LOT OF PEOPLE THAT YOU REALLY DON’T LIKE TALKING TO. ESPECIALLY YOUR SECURITY FOLKS. ALL RIGHT. LET’S LOOK AT IT. HOW FAMILIAR IS THIS SCENARIO TO YOU? YOU GO BUY EXCHANGE ONLINE. YOU GET READY TO GO. YOU READ 20 DIFFERENT PAGES AROUND HYBRID ON DOCKS. YOU CREATE A DATA FLOW DIAGRAM THAWS YOUR NETWORK TEAM AND YOU REVIEW WITH THEM. THEY ASK FOR CHANGES. YOU CHANGE THEM. WE CHANGE IP ADDRESSES IN THE CLOUD. YOU UPDATE THE DIAGRAMS AGAIN. YOU REREVIEW WITH NEXTING. YOU ARGUE WITH SECURITY ABOUT STALLING — INSTALLING EXCHANGE IN THE DNZ. YOU CREATE INBOUND FIREWALL FLOWS. RUN THE HCW, RUN THE — TEST THE FLOWS AND GO BACK TO NETWORK TEAM AND ASK THEM TO FIX THE MISTAKES THEY MADE AND THEN YOU’RE READY TO GO. AND THEN THE SECURITY TEAM SHUTS DOWN THE WHOLE PROJECT. HOW MANY PEOPLE HAS THAT HAPPENED TO? RIGHT? SUPER COMMON. AND YOU GO THROUGH THE — THROUGH THAT AND YOU CAN’T GET TO THE CLOUD. ONLINE. YOU CAN’T GET THE RICH GOODNESS AND IT DOESN’T MEET MY VISION. MY VISION. SIGN UP, RUN THE HCW AND MOVE MAILBOXES. THAT’S IT. NOW GROSS EXAGGERATION. I KNOW THERE’S A LOT MORE TO DO. THIS IS A NICE SOUND BYTE, RIGHT? E SHOULD BE AIMING FOR. SIGN UP, RUN THE HCW. BOOT STRAP THE ENVIRONMENT. RUN IT WITH AN OCT AND JUST MOVE MAILBOXES AND EVERYTHING SHOULD JUST WORK. IF YOU’VE BEEN WATCHING OUR BLOGS, YOU’VE BEEN WATCHING THE FEATURES, YOU KNOW ONE OF THE THINGS WE’RE WORK SONG HYBRID DELEGATION. THAT’S BEEN A PAIN FOR ALL OF YOU. THOSE SEMINAR JOES SO — SCENARIOS SO YOU CAN MOVE MAILBOXES AND THE SCENARIOS WOULD JUST WORK. YOU WOULDN’T HAVE TO THINK ABOUT GETHER. IT WASN’T — WE DON’T WANT IT TO BE A COMPLEX PROBLEM. SIGN UP, HCW, MOVE MAILBOXES. WE STARTED TO THINK ABOUT HOW TO FIX THIS PROBLEM. STARTED TEASING OUT AT IGNITE LAST YEAR TO SEE IF IT RESONATED WITH ANYBODY. WE STARTED A CONVERSATION WITH A WHOLE BUNCH OF CUSTOMERS. AND THIS APPLIES ACROSS THE BOARD. WE TALKED TO LARGE CUSTOMERS. FINANCIAL SERVICES CUSTOMERS THAT SAID, WE CAN’T GO. OUR SECURITY TEAM WON’T LET US PUBLISH OUR ON-PREM ENVIRONMENT TO THE INTERNET EVEN IF WE LOCK IT DOWN TO EXCHANGE ONLINE. WE CANNOT CREATE THOSE INBOUND FIREWALL FLOWS. CUSTOMERS. THE SMALL CUSTOMERS SAID IT’S TOO HARD FOR ME. I DON’T KNOW HOW TO CREATE A DNS ENTRY I HAVE OUT SOURCED. I HAVE TO ASK THEM AND WAIT TWO WEEKS AND PAY THEM MORE. CERTIFICATES. I DON’T KNOW HOW TO CREATE FIREWALL FLOWS. WE STARTED TO THINK ABOUT HOW TO FIX THIS PROBLEM. AND WE HAD A FEW SIMPLE PRINCIPLES THAT WE WANTED TO ADHERE TO. PHASE OF THIS. THE FIRST THING, KEEP IT SIMPLE. IT HAS TO BE INTEGRATED WITH TECHES EXPERIENCES THAT YOU KNOW. EXPERIENCES THAT YOU KNOW. DIDN’T WANT TO BUILD A BOLT ON. A DELUSION ACCELERATOR. GO BUY ANOTHER PRODUCT. BUY SOME OTHER PROXY THAT WILL DO SOME WORK FOR YOU. IT HAD TO BE INTEGRATED WITH THE EXPERIENCE THAT YOU AS THE EXCHANGE ADMIN HAD CONTROL OVER. THEN WE WANTED TO START SIMPLE. JUST LIKE OCT. WE WANTED TO START SIMPLE AND PROVE WHAT WE WERE DOING WAS POSSIBLE. PROVE WHAT WE WERE DOING WAS RIGHT. BUT CREATE A PLATFORM THAT WE COULD CONTINUE TO EXTEND ON. BECAUSE WE’RE NOT NEAR THAT END GAME YET. THAT UTOPIA OF THAT SINGLE VIRTUAL ORGANIZATION. THAT — THAT HYBRIDS SHOULD BE. IT WILL TAKE A WHILE TO GET THERE. WE HAD TO BE ABLE TO START SOMEWHERE NOW AND CONTINUE TO EVOLVE THIS AND GET TO THAT END GAME LATER.>>WE DIDN’T WANT TO CHANGE ANYTHING PRETTY DRAMATIC ABOUT EXCHANGE. ESPECIALLY IN THE AUTHENTICATION YOU ARE ALL AWARE OF HOW MAILBOX MOVE WORK. YOU’RE ALL AWARE OF WHAT COULD BE THROTTLED. AUTHORIZATION AUTHENTICATION IS COMPLEX. WE WANTED TO MOVE WITHIN THE FRAME WORK THAT EXCHANGE HAS TODAY. SOME OF THAT CODE IS 10 YEARS OLE APPROXIMATELIED — OLD. TRYING TO CHANGE IT IS SCARY. WE WANTED TO MAKE AS FEW CHANGES TO EXCHANGE AS POSSIBLE. WE WANTED TO FIX OR ELIMINATE THE MOST COMMON PROBLEMS WE SAW ENGAGING WITH ALL THE CUSTOMERS. SMALL AND BIG ACROSS THE WEIRD. — BOARD. NO FIREWALL OR NETWORK CHANGES. MORE IMPORTANTLY PROTECT THOSE ON-PREM SYSTEMS. WE HAD ALL OF THESE CUSTOMERS SAY, ALL RIGHT. WE COULD PUBLISH EXCHANGE TO THE INTERNET. BUT WE DON’T REALLY WANT TO ALLOW THOSE CONNECTIONS DOWN TO THE TECHES CHANGE SIR — TO THE EXCHANGE SERVER TO THE END. AS ESPECIALLY NOT PREAUTHENTICATED. WE COULD IF WE HAD — YOU COULD DO PREAUTHENTICATION WITH –>>WHAT IS HYBRID WITHOUT FREE BUSY. THAT’S IMPORTANT. WE WANTED TO SOLVE ALL OF THESE PROBLEMS. LET ME SHOW YOU THE HYBRID AGENT.>>FIRST THING. I HAVE ON-PREM — THE BOX RUNS IN A VM. I’M GOING TO CONNECT TO IT. GOT AN GET THERE. THIS IS MY ON-PREM ENVIRONMENT. I SAID, NO INBOUND FLOWS. SO LET’S GO TAKE A LOOK AT CE39 HERE. THE FIRST THING WE’RE GOING TO DO IS FIX THAT INBOUND FLOW PROBLEM. IF NOTHING ELSE, NOTHING ELSE WORKS, I’VE GOT TO GET SOME POINTS FOR MESSING WITH WINDOWS DEMO. ALL RIGHT? SO LET’S BLOCK THOSE INBOUND HTTPS CONNECTIONS. LET’S GO BACK. HIT REFRESH. CONNECTIONS. AND THAT’S WHAT WE NEED FOR HYBRID. FREE BUSY RUNS OVER 443 ON MRS. RUNS OVER 443 ON EWS. NO MORE INBOUND HYBRID CONNECTIONS. FOR GOOD MEASURE, LET’S TAKE A LOOK.>>SO LET’S GO OVER TO MY ADMIN MY MAILBOX IN THE CLOUD. THE FIRST THING WE NEED IS FREE BUSY HAS GOT TO WORK. SO LET’S CREATE A NEW CALENDAR EVENT. LET’S ADD SOME PEOPLE. LET’S ADD OP1. THIS IS MY TEAM AGAIN. THEY THINK I CAN’T REMEMBER NAMES SO THEY SAY OP IS ON-PREM. WE ADD THAT. AND NOW WE FIND THIS PERSON IS FREE. WE CAN SEE THE FREE BUSY. SUPER FREE. LET’S GO BACK AND LOOK AT ON-PREM. YOU’LL SEE I HAVE — RUNNING IN THE BACKGROUND. THERE WAS A BLIP AND WE’LL GET TO THAT IN A SECOND. SO LET’S GO BACK. LET’S START SOME MOVES I CREATED BATCH EARLY THIS MORNING AND I STOPPED IT. LET’S KICK THIS OFF. THAT WILL DO ITS THING. IT WILL TAKE A WHILE FOR MRS TO PICK THIS UP. MEANWHILE LET’S ADD MORE PEOPLE TO THIS INVITE. LET’S ADD TWO. LET’S ADD THREE. ALL FREE. BUT WE’RE GETTING THAT FREE BUSY BACK AND WE HAVE NO INBOUND HTTP TO THAT SERVER. ADD OP4. ALL RIGHT.>>ALL FREE. BUT WE’RE GETTING THE FREE BUSY BACK. GO BACK TO ON-PREM EVERY TIME I ADDED A USER WE TICKED UP PERMON HERE. WE ARE AT 28 CONNECTIONS. I WILL SCROLL UP. I HID THIS INTENTIONALLY. YOU LOOK AT THE OBJECT NAME YOU WILL SEE WHAT’S HAPPENING UNDER THE COVERS HERE. THIS IS THE IDEA WE’VE TEASED OUT. WE DIDN’T WANT TO DO ANYTHING NEW. WE DIDN’T WANT TO BUILD ANYTHING NEW. WE LOOKED AROUND THE COMPANY AND SAID WHAT CAN WE REUSE TO BUILD THIS? AZURE HAS A SERVICE AZURE APP PROXY YOU CAN USE TO PUBLISH STUFF ON-PREM. IT’S AN AGENT. THE SAME TECH USED FOR PASSED THROUGH AUTHENTICATION. WHICH IS ALSO AN AGENT. I STARTED THIS DEMO SAYING I WILL SHOW YOU THE HYBRID AGENT. THE AGENT ITSELF IS WHAT DOES THE MAGIC. BUT SHARING THE SAME TECH. WE BUILT OUR OWN AGENT TO DO WHAT WE NEEDED TO DO. IT BECOMES THIS PLATFORM THAT WE CAN EXTEND ON OVER — INTO THE FUTURE HERE. WE DIDN’T WANT TO DO A LOT OF WORK THAT WAS TRULY UNNECESSARY AT THIS POINT. WE DIDN’T RENAME THEIR PERFMON COUNTERS. THAT’S WHAT YOU SEE UNDER THE COVERS HERE. ONCE MRS FIGURES OUT WHAT IS GOING ON AND STARTS TO ACTUALLY MOVE DATA, LET’S SEE IF WE CAN GET A REFRESH ON WHAT’S GOING ON THERE. EVENTUALLY WE’RE GOING TO SEE THIS GRAPH GO CRAZY. WE WILL THROW A LOT OF CONNECTIONS THROUGH THIS AND THE CONNECTIONS PER REQUESTS PER SECOND IS GOING TO START TO GO UP. MAYBE WE’LL TAKE A LOOK AT THAT. THAT’S WHAT WE’RE BUILDING HERE. THE HYBRID AGENT THAT ALLOWS YOU Y THE CLOUD. NO FIREWALL CHANGES. [ APPLAUSE ]. LET’S TAKE A LOOK AT WHAT IS COVERS HERE. LY USE THE HCW HERE. ESTABLISH A CONNECTION TO THE CLOUD.>>THERE WE GO. NOW WE’RE MOVING MAILBOXES. YOU CAN SEE WHAT’S GOING ON THROUGH THIS AGENT. ALL RIGHT. SO LET’S GET THIS SESSION GOING ON. AND MOST OF YOU KNOW HOW FREE BUSY WORKS. WE PUBLISH AUTODISCOVER. I DIDN’T GO THROUGH DMS — DNS. THERE WERE NONE. ISN’T PUBLISHED TO THE INTERNET. THE HOST NAME IS PUBLISHED BUT WE CLOSED THAT DOWN. NO CHANGES. CONNECTION, THE CERTIFICATE HAD A NAME MISMATCH I DIDN’T PUBLISH ANY NEW CERTS EXCHANGE ON LINE HAS TO TRUST. WHAT ARE WE DOING UNDER THE COVERS? AS I SHOWED YOU WE’RE STARTING TO USE TECH FROM AZURE AND AZURE APP PROXY. SO LET’S TAKE A LOOK AT OUR ORG RELATIONSHIP. ONLY GOT ONE. YOU’LL SEE HERE IN THE MIDDLE. ALL RIGHT. WE’VE GOT THIS LONG AS OUR HOST NAME. FOLLOWED BY RESOURCE, MAILBOX MY GRADUATION. WE OWN. NO DNS CHANGES FOR YOU WE’LL MAKE THE CHANGES FOR YOU. THESE ARE IN ZONES WE OWN. THIS POINT THES A PROXY END POINT TO THE CLOUD WE’VE ESTABLISHED FOR YOU. WE OVER RIDE AUTODISCOVER BECAUSE YOU DIDN’T PUBLISH IT. NOW FOR THOSE OF YOU THAT GO, THAT’S GREAT. WHAT ABOUT O-OFF EXCHANGE — WITH THE INTERORG CONNECTOR. SHARING EPR, IF YOU’VE GOT DEEP INTO THIS. IT ISN’T A PROPERTY ON THAT ONE. YOU NEED AUTODISCOVER FOR THE OS. WE WORKED WITH THE — TEAM AND I DON’T HAVE ONE. THIS IS AN OLDER. ONE OF MY NEW PROPERTIES ON THE INTERORG CONNECTOR IS TARGET SO THAT WAS THE ONE CHANGE WE S ADD THAT AS A PROPERTY. MAKE IT AKIN TO THE ORG RELATIONSHIPS AND ALLOW US TO OVER RIDE AUTODISCOVER FOR THE INTERORG CONNECTOR SCENARIOS. AND OVER RIDE WITH THIS FUNNY URL THAT WE OWN. LIKE WISE, IF WE LOOK AT THE MIGRATION END POINT IT’S EXACTLY THE SAME. ALL WE’VE DONE IS OVERRIDE THAT REMOTE SERVER ADDRESS WITH OUR ENDPOINT WE’VE CREATED. THIS IS HOW IT WORKS. WE SEND THE CONNECTIONS FROM EXCHANGE ONLINE, OVERRIDING THE AUTOLOGIC AND DISCOVER TO AN END POINT WE’VE CREATED FOR YOU.>>THAT’S WHAT ARCHITECTURE LOOK LIKE? IT’S SIMPLE. YOU’VE GOT EXCHANGE SERVERS ON-PREM WE INSTALL A HYBRID AGENT. AND ALL YOU NEED ARE OUTBOUND CONNECTIONS FROM THAT AGENT TO THE INTERNET. OUTBOUND 443 FOR THE DATA MOVES. OUTBOUND 80 FOR A CRL CHECK ON OCCASION. WHAT THAT DOES IS THE AGENT TALKS TO OUR HYBRID PROXY SERVICE THAT RUNNING IN THE CLOUD. WE RUN IT ON AZURE INFRASTRUCTURE HERE. AND WE CREATE A TENANT SPECIFIC ENDPOINT. NOT ONLY THAT, WE CREATE DIFFERENT URLS FOR THE FLOWS THAT WE WANT. SO YOU’LL SEE THAT GID IS A HOST NAME. WE CREATE A UNIQUE ONE FOR YOU. THIS IS NOTHING TO DO WITH THE GID TO IDENTIFY YOUR TENANT. ONE CONVERSATION WE HAD WITH CUSTOMERS WE DON’T WANT TO BE DISCOVERABLE. ONCE YOU HAVE THAT IT’S SUPER TRIVIAL TO FIGURE OUT WHERE YOUR ENDPOINTS ARE. THEY DIDN’T WANT TO SEE ANYTHING ASSOCIATED WITH THEIR ON-PREM ENVIRONMENT. SO THAT GID IS A RANDOM GUID. IT HAS NOTHING TO DO WITH YOUR TENANT. YOU’LL USE IT FOR YOU AND NEVER FOR ANYBODY ELSE. THE ONLY PLACE YOU CAN FIND THAT IS THE LOGS KNOWN THE MY GRADUATION END POINT IN YOUR TENANT ANT THE ORGANIZATION RELATIONSHIPS IN YOUR TENANT. IT’S NOT DISCOVERABLE ANYWHERE. HOW MANY POSSIBLE GID FOUR COMBINATIONS ARE THERE? TWO TO THE 122. SOMETHING RANDOM LIKE THAT. THE IDEA OF A BRUTE FORCE ATTACK SEEMS UNLIKELY. THAT IS GOOD. IT’S A LITTLE SECURITY BY ABSECURITITY. I ADMIT THAT. CUSTOMERS SAID THAT’S GREAT IT’S STILL A PUBLIC ENDPOINT. IF YOU COULD POEBL POSSIBLY FIND IT, GRAB THAT URL COULD THEY SEND REQUESTS DOWN TO OUR ON-PREM ENVIRONMENT? YEAH. IT COULD HAPPEN. WE ADDED AN IP WHITE LIST AND THAT’S ONE WE CONTROL. AND IT’S LOCKED DOWN TO THE EXCHANGE ONLINE IP ADDRESSES. THIS WOULD EM LATE WHAT YOU MIGHT HAVE DONE ON — ON-PREM WITH THE NETWORKING AND SECURITY TEAM. YOU WOULD HAVE OPENED THE FLOW TO THE FIREWALL TO YOUR ON-PREM ENVIRONMENT AND LOCKED THAT DOWN TO THE TECHES CHANGE ONLINE IP ADDRESSES. WHEN WE CHANGE THE IP ADDRESSES EVERYTHING WOULD HAVE BROKEN BECAUSE THEY DIDN’T CATCH THE CHANGE. WE’VE ANNOUNCED SOME NEW APIS AND HOPEFULLY THAT WON’T HAPPEN AS MUCH ANYWHERE BUT IT’S STILL A CHALLENGE. WE MANAGE THE WHITE LIST FOR YOU. WE USE THE SAME API BUT MAKE SURE IT GETS UP TO DATE. WE TOOK THIS IDEA TO CUSTOMERS. THEY SAID THAT’S IT. THAT’S WHAT WE NEED. THAT’S GOOD ENOUGH. SO WE’VE GOT THIS, I WILL TELL YOU TODAY THIS IS IN PUBLIC PREVIEW. WE HAVE THIS LIVE WITH CUSTOMERS TODAY USING IT TO ON BOARED TO EXCHANGE ON LINE. REAL. SO A COUPLE OF THINGS HERE. UNAVAILABILITY. WE DIDN’T MAKE ANY CHANGE TO FREE BUSIER REQUESTS FROM ON-PREM TO THE CLOUD. THAT STILL FOLLOWS YOUR NETWORK PATH THAT YOU HAVE TODAY. WE ABSOLUTELY DID NOT WANT TO GET INTO THE BUSINESS OF BEING A PROXY FOR ALL CONNECTIONS TO EXCHANGE ONLINE. SO YOUR ON-PREM SERVERS STILL NEED TO GO OUTFOUND EXCHANGE ONLINE. THAT’S WHY I SAID AN — SUM CUSTOMERS ALLOW ANY OUTBOUND HTTP TO THEIR ON-PREM SERVERS. IF YOU’RE LOCKED DOWN YOU HAVE TO DA TO NO — GO TO YOUR NETWORK TEAM ALLOW MY — TO TALK TO EXCHANGE ONLINE ON 443. TO MAKE THOSE AVAILABILITY REQUESTS. WHAT WE DID IS THE OTHER DIRECTION. WE SEND THOSE TO OUR PROXY SERVERS AS WE’VE BEEN TALKING ABOUT AND WE SIMPLY OVER RIDE THAT WITH TARGET SHARING APR. FOR MIGRATION THAT’S ALWAYS A REM. THAT GOES FROM OUR PROXY ENDPOINT. THAT WILL CONTINUE TO FLOW THAT DIRECTION AND NO OTHER CHANGES NECESSARY.>>SO LET’S TAKE A LOOK AT WHAT SETUP LOOKS LIKE HERE.>>WE WANTED TO KEEP THIS SUPER SIMPLE. WE INTEGRATED INTO THE HYBRID CONFIGURATION WIZARD. O BE PART OF THE EXPERIENCES YOU’RE FAMILIAR WITH TODAY.>>LET’S GO THROUGH. LET’S AUTHENTICATE ON THIS ENVIRONMENT.>>WE’RE GOING TO GO DO THE REGULAR HYBRID CONFIG WORK HERE. CHECK YOUR TOP OLEGY AND PULL A BUNCH OF INFORMATION. WE’LL GET THROUGH THIS IN A SECOND.>>ALL RIGHT. THEN WE’RE GOING TO GO THROUGH THE SAME QUESTIONS. FULL HYBRID CONFIG. NO NEED FOR OTC AT THIS POINT. THE NEXT THING WE DO IS WHAT VERSION OF HYBRID DO YOU WANT? CLASSIC HYBRID. EVERYTHING YOU KNOW AND LOVE TODAY OR EXCHANGE MODERN HYBRID AND THAT’S WHAT WE’VE BEEN TALKING ABOUT. SO YOU SELECT EXCHANGE MODERN HYBRID. YOU CLICK NEXT. WE’LL DOWNLOAD THE AGENT. WE’LL GO TO TIN STALL PHASE. WE’LL TALK ABOUT WHAT’S HAPPENING IN EACH ONE OF THESE. E. THERE IT IS. SO THIS IS A BIT OF AN ANNOY YENS. WE LIKE TO FIX THIS ONE BUT WE’RE DEPENDENT ON THE TEAM TO HELP US USE CREDENTIALS. THIS IS ONE ANNOYANCE TODAY IN THE INSTALL. AT THIS STAGE IT ASKS FOR CREEDS AGAIN. WE WILL DO THAT ONE MORE TIME.>>NOW WE’RE GOING TO DO INSTALL STUFF. WE’LL COME BACK AND TAKE A LOOK AT THIS. LET’S GO BACK AND TALK ABOUT WHAT’S ACTUALLY HAPPENING. DURING AN INSTALL. LET’S START WITH THE HCW, EXCHANGE SERVER ON-PREM AND KICK IT OFF IN TECHES CHANGE MODERN HYBRID. WE DOWNLOAD THE AGENT MSI. WE PULL THAT FROM THE CLOUD. YOU GET THAT LATEST BITS. INSTALLER. WE DO SOME BASIC INSTALL STUFF. COPY BITS TO THE MACHINE YOU’RE INSTALLING ON. YOU REGISTER SOME PERMON. REGISTER WINDOWS SERVICE. YOU CAN TAKE A LOOK AT IT IF YOU GO ON TO THE BOX THERE’S A NEW SERVICE CALLED THE MICROSOFT HYBRID AGENT. THAT’S WHAT DOES THE MAGIC. THEN WE GO OUT AND MAKE A CALL TO AZURE AND REGISTER THE AGENT. WHAT’S HAPPENING HERE IS WE’LL CREATE A UNIQUE IDENTIFIER FOR YOU, FOR YOUR TENANT AND ON YOUR MACHINE WE’LL GENERATE A CERTIFICATE REQUEST. A CSR. TO VALIDATE IT’S YOU AND TENANT AND WE TAKE THAT INFORMATION, CSR AND STAMP A COUPLE OF OTHER PROPERTIES ON THIS. TO MAKE SURE THIS CERTIFICATE CAN ONLY BE USED FOR YOU INSIDE YOUR TENANT AND HAND IT BACK TO YOU. AND YOU GO INSTALL IT ON THE BOX. IS VALID FOR 180 DAY. S THE PRIVATE KEY IS MARKED AS NONEXPORTABLE AND WE WILL ROLL THAT CERTIFICATE 30 DAYS BEFORE IT EXPIRES. WE DO THAT AUTOMATICALLY. THIS HAS TO BE SIMPLE. WE DO NOT WANT TO ADD MORE ADMINISTRATIVE BURDEN TO YOU. THOSE CERT ROLLS ARE AUTOMATIC. THE FLENTS AZURE ALREADY DID THAT FOR US. WE TAKE ADVANTAGE OF IT. WE CONFIGURE THE AGENT. WE STORE YOUR BACKEND URL. THIS IS WHERE THE AGENT ITSELF ON-PREM TALKS TO EXCHANGE ON-PREM. WHAT URL IS IT USING? DID YOU GIVE IT A HOST NAME? A VIP? WE STORE THAT. WE WANT TO MATCH THE INBOUND REQUEST TO WHERE IT HAS TO HIT. ON THE EXCHANGE SERVERS ON-PREM. THEN WE GO OUT AND REGISTER THAT AGENT WITH AZURE. WE MAKE A CALL AND SAY, REGISTER THE FRONTEND URLS. THEN WHAT WE DO IS VALIDATE THAT AGENT FOR EXCHANGE. WE CAN DO ALL THIS CONFIG, BUT IF WE DON’T KNOW IF IT ACTUALLY WORKS, WE DON’T WANT TO GO FURTHER. OUR VALIDATION IS SIMPLE. VEERER AVAILABILITY AND SEND TO — ONCE WE VALIDATE WE COMPLETE THE CONFIG. AND ALL WE DO IS CREATE THOSE ORG RELATIONSHIPS WITH THE TARGET SHARING APR AND SET THE MIGRATION END POINT AND OFF AND RUNNING. THAT’S THE WHOLE THING. SO THAT’S IT. AND IF YOU CLICK NEXT AFTER HERE, EVERYTHING AFTER THAT IS THE HCW THAT YOU KNOW TODAY. THAT IS THE ENTIRE INSTALLING CONFIGURATION FOR THE HYBRID AGENT. YOU HAVE TO DO ALMOST NOTHING. [ APPLAUSE ]>>WHAT IS VERSION ONE? THIS IS WHERE WE’RE AT TODAY. AS I SAID WE’RE IN PRIVATE PREVIEW TODAY. SO SOME OF THIS MAY CHANGE AS WE GO FORWARD. WE’RE SUPPORTING HYBRID FREE BUSY AND MAILBOX MOVES ONLY. THIS IS ABOUT GETTING YOU TO THE CLOUD. THOSE BASIC EXPERIENCES. THERE’S LOTS OF GREAT OTHER EXPERIENCES FOR HYBRID. YOU’LL GO SEE ROSS SMITH TALKING ABOUT HOW TO PUBLISH EXCHANGE ON-PREM FOR OUTLOOK MOBILE WITH INTUNE. THAT’S SUPER AWESOME. THAT RELIES ON CLASSIC HYBRID TODAY. WE HAVEN’T INTEGRATED THEM INTO THE HYBRID AGENT. IF YOU’RE RUNNING TEAMS IN THE CLOUD AND EXCHANGE ON-PREM 23 YOU WANT YOUR — IF YOU WANT YOUR TEAM’S CLIENT TO CONSUME CALENDARS ON-PREM YOU NEED CLASSIC HYBRID. BUT WE WANTED TO START SMALL. WE WANTED TO MAKE SURE THAT WORKS FIRST, GET YOU TO THE CLOUD. IF YOU’RE THINKING A TBT OTHER SCENARIOS. YOU HAVE OPTIONS. THE BEST OPTION IS DO THIS, MOVE FAST AND CONSUME EVERYTHING IN THE CLOUD AND YOU DON’T HAVE TO WORRY ABOUT PUBLISHING STUFF ON-PREM. IF YOU WANT TO THINK ABOUT THE OTHER SCENARIOS. IF YOU’RE GOING TO HAVE CORE FEATURES AND CORE DATA ON-PREM USERS. THEN LET’S TALK ABOUT WHAT THIS PLATFORM MIGHT BE IN THE FUTURE. WE’VE BEEN CHOPPING THIS AROUND. WE’VE BEEN TALKING TO OTHER TEAMS IN MICROSOFT AND THEY’RE LOOKING AT IT GOING, THAT’S INTERESTING. -PREM IF YOU SAW ANY OF THE ANNOUNCEMENTING ON SEARCH. WE TALKED AN SEARCH CONNECTORS YESTERDAY. THE IDEA OF GETTING DATA FROM ON-PREM SUPER INTERESTING FOR HOW ARE THEY GOING TO GET THERE? RIGHT? THIS MIGHT BE A WAY.>>SO V1 TODAY WILL SPORT NEW HYBRID SET UPS ONLY. I RAN IN TOPOLOGY WHERE WE HAD NEVER RUN CLASSIC. THAT’S OUR STORY FOR V1. BY THE TIME WE GET TO GA MAYBE WE’LL ALLOW YOU TO SWITCH OTHER. IF YARE RUNNING CLASSIC HYBRID TODAY YOU’VE GONE THROUGH THE COMPLEXITIES. THERE ISN’T MAYBE A GREAT REASON TO FLIP OVER TO MODERN UNLESS DOWN YOUR NECK TO CLOSE THE FIREWALL. WE WANT TO STAIR WITH — START WITH NEW HYBRID SET UPS ONLY. INSTALL THREE OR MORE OF THE AGENTS. THIS IS RECOMMENDATIONS FROM FRIENDS AT AZURE. INSTALL THREE OR MORE. ALLOWS YOU TO HAVE ONE GO DOWN FOR SOME REASON. TAKE ONE DOWN FOR MAINTENANCE AND HAVE ONE CONTINUE TO FUNCTION. IF YOU WANT TON STALL TWO THAT’S IT WORKS. NO PROBLEM. LITTLE OVER HEAD. WE RAN MAILBOX MOVES RUNNING AT A GIG PER MINUTE. THAT’S GID GOOD. LITTLE OVER HEAD. IT’S A PROXY THERE WOULD BE SOMETHING SOMEWHERE WE HAVEN’T FOUND IT YET. WE’RE STILL WORKING ON SCALE TESTING THAT’S PART OF THE PRIVATE PREVIEW. ONE THING I DIDN’T MENTION EARLIER IS, THE AGENT WILL AUTOUPDATE. SO PART OF OUR INSTALL PROCESS REGISTER WITH OUR AUTO UPDATE SERVICES. IF WE EXEND THIS AGENT IN THE UPDATE FOR YOU AND YOU H GET THE NEW FEATURES AS WE BUILD THEM. THERE’S NO CON BY THEING IF ANYTHING. YOU DON’T HAVE TO GO DOWNLOAD SOMETHING ELSE. YOU DON’T HAVE TO FIND A CU. INSTALL THIS ONCE AND IT WILL TAKE CARE OF ITSELF. YOU HAVE TO KEEP THE MACHINES ONLINE BUT THE AGENT WILL TAKE CARE OF ITSELF. INSTILL ON YOUR EXISTING EXCHANGE SERVERS. IF YOU’RE SUPER LARGE, IF YOU’RE GOING TO PUMPTONS OF DATA THROUGH IT YOU MIGHT THINK ABOUT INSTALLING ON DEDICATED SERVERS. BUT YOU DON’T HAVE TO. TUT IT ON YOUR — PUT IT ON YOUR EXCHANGE SERVERS. IF YOU WANT TO PUT IN THE DMZ URITY TEAMS AND THEY SAY — PUT IN IT THE DMZ. IT WILL WORK. YOU JUST NEED 443 BACK TO YOUR EXCHANGE SERVERS ON-PREM. PUT IT WHERE YOU WANT. WHY BY NEW SERVERS IF YOU DON’T HAVE TO.>>SO I WANT TO END THE TALKING PART. MY TALKING PART WITH SPECULATIVE PORTION. THIS KICKS OFF THE CONSIDERATION FOR THE FUTURE. I SAID WHAT WE WANTED TO DO WAS BUILD A PLATFORM. IF YOU LOOK AT THIS, THIS IS SUPER SIMPLE. WE’VE CREATED THIS PIPE TO GET FROM THE CLOUD TO ON-PREM. WITHOUT HAVING TO CHANGE THE NETWORK. I SAID, WE’RE TALKING TO OTHER TEAMS. THERE’S A LOT OF INTEREST HERE. WE HAD TO CREATE A PLATFORM. AND YOU CAN SEE WE PREPARED FOR THIS. WE PLANNED FOR THIS IN THE ENDPOINT GAMES. THERE ARE TWO THINGS VARIABLE HERE. ONE IS THE GID VARIABLE PER CUSTODY CUSTOMER AND THE SECOND IS THE THIRD PIECE. THE FLOW. THAT’S WHAT WE WILL CHANGE. TODAY YOU WILL SEE TWO FLOWS IF YOU INSTALL THIS. ONE WILL SAY FREE BUSY AND ONE WILL SAY MIGRATION OR MAILBOX MOVES. AS WE ADD SOMETHING ELSE, WE ADD ANOTHER FLOW. ALL WE HAVE TO DO IS WRITE THE LOGIC INTO THAT AGENT TO SAY WHEN THIS REQUEST COMES THROUGH AND HITS THE AGENT FOR SOMETHING ELSE, WE KNOW WHAT TO DO WITH IT. IMAGINE WE CAN MAKE AN L DOPP CALL. WE COULD THROW A SEARCH CONNECTOR THROUGH THIS. AND FIND CONTENT ON-PREM. WE COULD GRAPE GRAN PICTURES. — GRAB PICTURES. WE COULD DO SOMETHING. QUESTION IS, WHAT’S INTERESTING? THAT’S CONVERSATION I WANT TO HAVE OVER THE NEXT YEAR.>>I WANT TO COME BACK TO A WELL KNOWN PROBLEM. ONE WE’VE TALKED ABOUT AS A GROUP BEFORE. THE END AS PROBLEM IN HYBRID. EVERYTHING — EVERYONE THE FAMILIAR. EXCHANGE ON-PREM, YOU’RE GOING TO EXCHANGE ONLINE AND YOU USE SEND AS. YOU GRANT SEND AS PERMISSIONS AND MOVE SOMEBODY TO THE CLOUD AND THAT WORKS. YOU KEEP TRYING TO GRANT SOMEBODY ELSE PERMISSION TO THAT MAILBOX CROSS AND IT DOESN’T WORK. AND YOU MOVE PEOPLE AND SOME WORKS AND SOME DOESN’T. THE REAL PROBLEM IS THESE PERMISSIONS DON’T ALWAYS RELIABLY WORK ACROSS PREMISES BECAUSE OF THE WAY END AS WORKS. WE MAKE A CHECK. TRANSPORT CHECKS THE MAILBOX. DO YOU HAVE SEND AS PERMISSIONS. THE OBJECT AQAL. NOT EVEN IN THE MAILBOX. DO YOU HAVE SEND AS PERMISSIONS. YOU DO THAT IN THE CLOUD OR ON-PREM. THE PROBLEM IS IN THIS HYBRID SPACE YOU MAKE THE CHECK WHERE THE SENDER IS. AND WE HAVE NO WAY TO KEEP THIS IN SYNC. SOME OF THE OTHER HYBRID DELEGATION FEATURES WE HAVE BEEN WORKING ON WE FIX THROUGH DIRECTORY SEVENING NIGH STATION. ALL ARE WRITTEN TO ATTRIBUTES. ALL WHERE SHE TO DO IS WORKS — IS WORKS WAD –>>WE CAN’T FIX THIS ONE WITH DIRECTORY — SYNC NIGH STATION. I WILL SHOW A DEMO.>>I’VE GOT AN ON-PREM ENVIRONMENT HERE. I HAVE EXCHANGE ADMIN CENTER. YOU HAVE MY PERFMON OPEN. I HAVE AN EXCHANGE ONLINE. THIS IS REAL CODE. THIS ISN’T RUNNING AN EXCHANGE ONLINE TODAY. WHY THE NAMES ARE FUNNY. YOU WILL SEE I HAVE A TENENT MAILBOXES. WE DIDN’T DO FULL DIRECTORY FOR WE CREATED STUFF BY HAND THIS IS FOR ALL INTENTS AND PURPOSES A HYBRID SET UP. I HAVE THE AGENT RUNNING BECAUSE I HAVE PERFMON RUNNING IN THE BACKGROUND AND EMULATION OF EXCHANGE ON LINE. I HAVE THIS MAILBOX CALLED SHARED. LY OPEN THAT UP.>>MAILBOX DELEGATION. YOU’LL SEE SEND AS HERE. THAT SHOULD BE BLANK. SO LET’S CANCEL THAT OUT. LET’S GO BACK TO THE CLOUD SIDE. LET’S OPEN THAT SAME MAILBOX.>>HEAD TO DELEGATION AND ADD SEND AS PERMISSIONS HERE IN THE CLOUD. I’M GOING TO PICK THE SENDER. NAMING SCHEMES. I WILL CLICK SAVE. THIS IS GOING TO START DOING ITS THING. LY GO BACK TO — I WILL GO BACK TO ON-PREM AND THERE WAS A TICK IN MY AGENT HERE. SO WE DID SOMETHING OR AT LEAST JAMMED A REQUEST THROUGH THAT AGENT. SO LET’S OPEN THAT SHARED MAILBOX. YOU’LL NOW SEE THAT WE’VE TRAIN SAME — I PICKED THE WRONG ONE? THAT SHOULD BE THE SHARED — DID I PICK THE WRONG ONE ON THE CLOUD SIDE? STILL WORKING. ALL RIGHT. SO WE’RE SENDING A REQUEST THERE. TAKES A WHILE. I JUMPED THE GUN ON THAT ONE. OH WELL.>>THERE WE EGO. ALL RIGHT. [ APPLAUSE ]>>SO JUST FOR GOOD MEASURE LET’S GO BACK TO THE CLOUD AND TAKE THE PERMISSIONS AWAY. MAKE SURE THIS WORKS BOTH DIRECTION NOT ONE WAY RIGHTS. THIS AN EXAMPLE OF A PLATFORM. THIS IS SOMETHING WE COULD DO. THE IDEA HERE IS WE’VE MADE A CHANGE IN THE CLOUD. ADMINISTRATIVE CHANGE IN THE CLOUD AND MADE THAT EXACT SAME ADMINISTRATIVE CHANGE ON-PREM. AND IN ORDER TO SOLVE THIS SCENARIO TODAY, WHAT YOU WOULD HAVE TO DO IS TWO STEPS. GO MAKE THE CHANGE IN THE CLOUD. GO MAKE THIS CHANGE ON-PREM. GO HERE FOR ONE THING AND HERE FOR ANOTHER THING. THAT DOESN’T GET US ANY CLOSER TO THIS IDEA THAT END GAME OF A SINGLE VIRTUAL ORGANIZATION JUST MAKE THOSE CHANGES AND ITTED WORKS — AND IT WORKS FOR YOUR ORGANIZATION. WE TICKED UP AGAIN AND THE PERMISSIONS SHOULD BE GONE AT THIS THERE WE GO. POINT. ALL RIGHT. SO THAT’S THE CONVERSATION THAT I WANT TO HAVE OVER THE NEXT YEAR. THAT’S HOW I END MY SESSIONS WHICH IS STARTING A CONVERSATION FOR THE NEXT YEAR OF WHAT’S IMPORTANT. WHAT SHOULD WE DO NEXT? HOW DO WE GET FROM WHERE WE’RE AME. COUPLE OF TAKEAWAYS. HYBRID SET UP NEVER BEEN EASIER. RUN THE HCW AND MOVE SOME MAILBOXES AND YOUR NETWORK AND SECURITY TEAMS, FORGET THEM. THEY CAN GO BOTHER OTHER PEOPLE. I KNOW YOU HAVE QUESTIONS. WE’RE GOING TO DO QUESTIONS. WE WILL SPEND A LOT OF TIME FOR QUESTIONS. I WANT TO DO A LITTLE HOUSEKEEPING FIRST. FIRST OFF I DON’T GET TO EVERYBODY FOR QUESTIONS. TODAY FROM 2:00 TO 4:00. JASON IS DOWN HERE IN THE FRONT ROW. HE’LL BE HERE AND ANSWER QUESTIONS AS WELL. ONE OF THE PRIMARY DEVS ON THE HYBRID AGENTS. SECOND, GO HERE IF YOU WANT A FREE BOOK ABOUT LIZARDS. FIRST PEOPLE TO GET THIS FIRST URL WILL — AS YOU MAKE YOUR WAY TO THE MICROPHONE. YOU IS ASK YOUR QUESTIONS, TELL ME WHO YOU ARE, WHERE YOU’RE SHOULD SEE IN OCT NEXT.>>WHAT CAN I ANSWER FIR YOU TODAY?>>I’M A CONSULTANT THAT AT THIS POINT IN TIME ENGAGED WITH A MUNICIPALITY WHICH MEANS IT’S A GOVERNMENT-BASED ORGANIZATION AND BUREAU ROCKCY, OF COURSE IS DEVASTATING. THANK YOU FOR THIS FABULOUS AGENT. BUT THE QUESTION COMES TO MIND UPDATE OF THE AGENT IS AUTOMATIC. AND THEN ONCE AGAIN, SECURITY PEOPLE AND ON-PREMISES POLICIES DICTATE ANY MAJOR CHANGE NEEDS TO BE PREAPPROVED. DO WE HAVE ANY FORM OF CONTROL WHEN IT COMES TO THE UPGRADE.>>IT’S SOMETHING THAT WE CAN THINK THROUGH. WE ZROINT TODAY. WE’LL GIVE THE LATEST VERSIONS BUT SOMETHING WE CAN THINK THROUGH.>>AND REGARDING THE OCT, WOULD ERSHELL VERSION TO KICK START AND AUTOMATED.>>THAT IS ALSO A POSSIBILITY ANYTHING IS A POSSIBILITY WE’LL KEEP IT IN MIND.>>HI. I’M KAI. EXCHANGE MASTER WITH SOME STUFF I HAVEN’T SEEN HOW SCALABLE IS THE AGENT? IF WEAVE GOT 100 THOUSAND MAILBOXES CAN WE DO THE FREE BUSY REQUESTS FOR THOSE OVER IT?>>FRE BUSY LIGHT. WE DON’T HAVE A LOT OF — ONE AGENT WE COULD PUSH 20 GIGS PER OVER 20 MINUTES. SO RIGHT NOW WE’RE NOT SEEING A LOT OF LATENCY AND YOU SHOULDN’T SEE ANY EXTRA OVER HEAD FOR THOSE. WE DON’T HAVE A ON THE OF DATA YET –TON OF DATA WHOA WE’RE NOT TERRIBLY IF YOU ARE WE CAN SOLVE MORE OF THEM. WE WILL SCALE OUT IF WE NEED TO.>>CAN I ASK ANOTHER QUESTION?>>LET ME GET EVERYBODY ELSE.>>OCT ACTUALLY AND MAYBE THE AGENT. ONE PHRASE. ARE BACK. IS THAT IN THE –>>WE HAVEN’T DONE ANYTHING UNIQUE HERE. USING YOUR CREDENTIALS.>>I MEAN CONSIDERING IT IN THE FUTURE.>>I SEE.>>SHOULD WE BRING R BACK INTO OCT. YES. WE’VE HAD THAT REQUEST. SO VERY GOOD, YES. THANK YOU.>>NEXT ONE.>>LET ME GO DOWN HERE. YES. I’M TROY FROM — WE’RE BASICALLY MANAGEMENT OF DISTRIBUTION BOXES HOW CAN WE TOTALLY GET RID OF THAT?>>HOW CAN WE GET RID OF EXCHANGE ON-PREM? YOU WANT TO ASK A QUESTION WE DIDN’T TALK ABOUT. I WILL IGNORE THAT QUESTION. COME SEE ME AT THE BOOTH THIS AFTERNOON. WE’LL TALK ABOUT THE OCT.>>I HAD THE SAME QUESTION.>>BRYAN IS ALSO GOING TO TALK ABOUT GET GETTING RID OF THE LAST EXCHANGE SERVER THURSDAY AT 4:00. WHAT OTHER QUESTIONS>>MY NAME IS MARIANNE. VY A QUICK QUESTION. ENDPOINTS FOR OFFICE 365 IN A BIG CUJ CHUNK OF IT EXCHANGE ONLINE. WITH THIS NEW DEMO, WOULD THAT GET RID OF THE NEED FOR AND FIREWALL AND PROXY.>>THE QUESTION IS DO WE ELIMINATE THE NEED TO MANAGE THE EXCHANGE ONLINE? IT FENDS ON WHAT YOU’RE LOOKING AT. ALL WE’VE DONE WITH THE AGENT HERE IS CHANGE INBOUND CONNECTIONS. SO WHAT YOU’RE TALKING ABOUT IS TYPICALLY OUT BOUND CONNECTIONS THAT YOU MANAGE THROUGH YOUR PROXY AND PACK FILES SAYING THIS IS WHERE MY USERS HAVE TO GO. LIKE THE FREE — WE’RE NOT CHANGING THE OUTBOUND FLOWS. WORKING NONE THE FUTURE?>>MAYBE. I>>THANK YOU.>>JASON FROM CARNIVAL. IS THERE MULTI FOREST SINGLE TENANT SUPPORT.>>MULTIPLE FORESTS ON-PREM. NOT TODAY BUT WE HAVE A CUSTOMER IN PRIVATE PREVIEW THAT HAS THAT EXACT SCENARIO AND WE WILL GIVE IT TO THEM. BY THE TIME WE HIT GI, YES.>>JOHN LEA. MY QUESTION IS FOR THE OPERATION 3BG SHARED IF TWO OPERATION THEY ARE ON HYBRID. AND FROM ONE — THEY WILL SEE ANOTHER — WE HAVE CREATED TOOL –>>YEAH. SO THE IMPORTANT THING TO REMEMBER HERE IS THAT WHAT WE’VE DONE IS ABOUT HYBRID FOR SINGLE ORGANIZATION. THAT’S WHAT HYBRID IS. BETWEEN AN ON-PREM TO TOPOLOGY FOR A SINGLE ORGANIZATION. IF YOU’VE GOT THE LAST QUESTION HERE IS WHAT HAPPENS IF I HAVE TWO ON-PREM FOREST TALKING TO THE SAME TENANT. THAT WE CAN DO. YOU ALSO OWN ALL THE URLS. IF YOU REALLY WANTED TO, YOU CAN TAKE THAT URL AND GIVE TO ANOTHER CUSTOMER. YOU COULD ALLOW THEM TO DO FREE BUSY ACROSS YOUR PROXY. G MECHANISM FOR ON-PREM. BUT I’M NOT GOING TO STOP YOU FROM TAKING THAT URL AND GIVING TO IT ANOTHER ORGANIZATION AND SAY, HERE. SET THIS AS YOUR TARGET SHARING APR IN THE ORG RELATIONSHIP. WE CAN DO FREE BUSY IF YOU REALLY WANT TO. SO IT’S POSSIBLE.>>YOU MENTIONED ONE — AS AN AGENT NEEDS TO — EXCHANGE SERVERS. SO IS IT LIKE A BUY ORDINARY THEY NEED TO INSTALL AND RUN THE HCW?>>ALL OF THE SET UP IS DONE THROUGH THE HCW. LIT GO AUTOAND — OUT AND DOWNLOAD AN MSI AND INSTALL THE BITS. IT WILL COPY THE FILES AND RENTALSTER A SERVICE. YOU DON’T HAVE TO DO ANYTHING SEPARATE JUST RUN THE HCW. THE — THE YOU CAN RUN THAT ON THE EXCHANGE SERVER. THAT WAS MY RECOMMENDATION KEEP IT SIMPLE RUN ON THE EXCHANGE SERVER IF YOU WANT IT ON A STAND ALONE BOX ON THE DMZ THAT IS FIND.>>TODAY WE CAN — THIS CAN BE DPRON A STAND ALONE BUT YOU RECOMMEND AN EXCHANGE SERVER.>>YEAH.>>WHEN DO YOU FORESEE GA ON THIS?>>AS FAST AS WE CAN. SO EVERYBODY LEFT THE ROOM OR MANY LEFT THE ROOM. LY TELL YOU WE’RE IN PRIVATE PREVIEW. WE WILL GET TO PUBLIC PREVIEW AS FAST AS WE CAN. IF YOU’RE INTERESTED IN PRIVATE PREVIEW, I HAVE SOME OPENINGS. WE COULD DO IT. COME SEE ME AT THE BOOTH OR AFTER THE SESSION AND WE’LL SAY BEFORE EVERYBODY COMES FOR THAT. I WANT CUSTOMERS READY TO RUN THIS IN PRODUCTION. IF YOU’RE READY TO INSTALL THIS AND WE’LL TALK ABOUT PRIVATE PREVIEW.>>AND HOW WOULD WE KNOW IT IS GA?>>WATCH THE EXCHANGE TEAM BLOG. WATCH THE OFFICE ROAD MA’AM SITE AND — ROAD MAP SITE AND ANNOUNCE IN BOTH PLAYS.>>S CHRIS FROM THE CITY OF ARLINGTON. WE ARE IN A MIGRATION STATE. WE’RE SET TO COMPLETE NEXT WEEK OR SO. DO WE NEED TO CONTINUE HAVING THE SSL CERT ON THE ON-PREM SINCE EVERYTHING WILL CONTINUE — SINCE WE’RE GOING TO MOVE — TO THE CLOUD.>>IF YOU’RE GOING TO FINISH YOUR MIGRATION AND TEARING DOWN YOUR THE HYBRID. YOU NEED TO>>YOU NEED TO CONTINUE TO PUBLISH YOUR CERT. IF WE NEED YOU TO DMRAJ CLASSIC TO MODERN HYBRID, THEN YOU CAN USE INTERNAL CERTS BECAUSE THAT ITSELF ON-PREM TALKING TO YOUR OWN CA BUT DEPENDS ON TIMING THERE.>>THANK YOU.>>JAKE FROM PIER ONE. PAINFUL HYBRID. WILL THERE BE A PATH I GUESS TO GO TO THE NICE NEW ONE OR ARE WE STUCK IS IT RECOMMENDED TO UPGRADE>>THERE WILL BE A PATH. T NOW WE’RE THINKING ONLY FOR NEW DEPLOYMENTS ONLY. BUT WE WILL CREATE A PATH TO CUT OVER FROM CLASSIC TO MODERN. WE DON’T KNOW IF THAT WILL BE GA OR GA PLUS YET. WE’VE GOT TO WAIT AND SEE WHERE WE GET ON THAT ONE. LUE IF THERE’S LONG TERM USAGE PEL IF YOU’VE GONE THROUGH THE WORK TO SET UP CLASSIC HYBRID AND ALMOST DONE MAYBE THE BENEFITS AREN’T QUITE THERE YET.>>I AM LOCATED IN GERMANY BUT WORKING FOR A HUGE U.S. COMPANY. QUESTION WOULD BE DO YOU HAVE PLANS TO SUPPORT GEOGRAPHICALLY DISTRIBUTED EXCHANGE ORGANIZATIONS HERE AS WELL WHERE YOU CAN USE DIFFERENT END POINTS FOR THE COMPLETE MY GRADUATION STRATEGY — MY GRADUATIONEN STRATEGY.>>WE HAVE DUATION>>FREE AND BUSY IS NOT WORKING FOR US AND YOU TALKED ABOUT THAT IN THE AGENT. I DON’T BELIEVEVY TO GET BACK TO THE — I DON’T THINK WE INSTALLED THE AGENT. IT SOUNDS LIKE IT’S OPTAL. WONDERING — OPTIONAL. WE’RE THINKING NEED TO ROLL BACK OUR USERS BECAUSE FREE BUSY IS NOT WORKING FOR US NOW.>>YOU HAVEN’T INSTALLED THE AGENT BECAUSE WE’RE IN PRIVATE PREVIEW AND WE’VE GIVEN THOSE TO A COUPLE OF CUSTOMERS. YOU WOULD BE IN CLASSIC HYBRID MODE AND HAVE TO HAVE DONE ALL THE WORK. A FREE BUSY IS NOT WORKING THERE COULD BE SOMETHING ELSE GOING ON. SO COME DOWN TO THE BOOTH. WE’VE GOT — I’LL BE THERE THIS AFTERNOON BUT WE HAVE A LOT OF SUPPORT FOLKS DOWN THERE ALL THE TIME. THEY CAN HELP TROUBLESHOOT.>>WILL THEY ALSO — I SAW SOME BOOTHS DOWN THERE. CAN THEY GO INTO A ROOM AND MAKE SOME PHONE CALLS TO OTHER PEOPLE WITH ME? IS THAT AN OPTION?>>I DON’T KNOW COME DOWN AND TALK TO US.>>I HAVEN’T STAFFED THE BOOTH YET THIS WEEK. I DON’T KNOW WHAT WE’RE DOING>> I’M GEORGE MY ORGANIZATION DID THE HARD WORK A FEW YEARS AGO. PUT TMG IN FRONT AND DOING HARD WORK WITH F5 WITH APM IN FRONT. OWNER THIS BEING SO MUCH EASIER IS THERE ANY OTHER ADVANTAGES, DISADVANTAGES, SHOULD WE SWITCH COURSE? IF R>>IF YOU’VE DONE THAT WORK I DON’T KNOW WHEN WE’LL OFFER THE PATH FROM CLASSIC TO MODERN. HOPEFULLY SOON. IF YOU’VE DONE THE WORK — IT’S HARD TO SAY HOW MUCH BENEFIT. THIS IS ABOUT MAKING IT FASTER TO GET THERE AND THERE ARE TONS OF CUSTOMERS THAT HAVEN’T. I HAD A DINNER WITH A COUPLE LAST NIGHT WHO ARE ABOUT TO — I SAID SEE ME TOMORROW MORNING IF YOU’RE ALREADY PAST THAT I DON’T KNOW. SOMETHING TO THINK THROUGH. PLANNING TO DO WITH THE F5 BUT GOOD LUCK WITH IT.>>THANK YOU.>>YES.>>WE ARE CRUCIAL JUNCTION WHERE WORE PLANNING TO MOVE — WE’RE PLANNING TO MOVE ABOUT 80 THOUSAND MAILBOXES TO THE CLOUD. FIGHTING WITH THE SECURITY. WE DON’T KNOW WHO IS GOING TO WIN. BUT WE’RE IN QA. WE’RE JUST PUSHED — PUNCHED THE HOLES IN THE FIREWALLS. I CALL THEM HOLES TO GIVE THEM — RIGHT NOW WITH THE AGENT AND THE PRIVATE PREVIEW, IS IT FULLY SUPPORTED IN PRIVATE PREVIEW? SO IF WE DECIDED TO TAKE THAT ROUTE, SECURITY WOULD LOVE TO HEAR ABOUT IT. I’M GOING TO TALK TO YOU>>FULLY IT.>>MY NAME IS AMIT WITH THE BBC. DOES THIS REMOVE THE REQUIREMENT TO HAVE — PUBLISHED ON-PREM?>>IT DOESN’T REMOVE THE REQUIREMENT TO HAVE AUTODISCOVER ON-PREM. WE WON’T USE IT FOR OUR SCENARIOS FOR HYBRID BUT YOUR UP OUTLOOK AND ALL THAT. YOU INSTALLED EXCHANGE AND CREATED SEP RECORD SO YOU HAVE PUBLISHED ON-PREM ANYWAY. TYPICALLY CUSTOMERS ARE NOT WANT TO PUBLISH ANYTHING ON THE INTERNET BUT IT DOESN’T CHANGE ANY OF YOUR ON-PREM REQUIREMENTS JUST TO MAKE YOUR USERS FUNCTIONAL. HI. IS THERE ANY UPDATE ON HYBRID IDENTITY SCENARIOS? SO WHEN ALL YOUR MAILBOXES ARE MOVED OVER TO EXCHANGE ONLINE, IS THERE ANY UPDATE ON ELIMINATING THE NEED TO HAVE EXCHANGE ON-PREM JUST TO MANAGE THOSE USERS.>>I THINK WE GOT THAT QUESTION EARLIER.>>COME SEE ME AT THE BOOTH THIS AFTERNOON. I DIDN’T ANNOUNCE ANYTHING ABOUT THIS. I KNOW IT’S A TOP OF MIND SCENARIO FAR LOT OF CUSTOMERS. WE HAVE GONE ALL THE WAY TO THE CLOUD. HOW DO WE GET RID OF THE LAST EXCHANGE SERVER ON PREMEDITATE. SOMETHING WE’RE THINKING ABOUT BUT I DIDN’T TALK ABOUT IT.>>VY A QUESTION — IS THAT WORKING IN MULTI DOMAIN FOREST SCENARIOS WHERE WE HAVE EBBING CHANGE RE –>>SO THE SEND AS FLOW WAS MOSTLY SPECK LAW TOUGH. THAT — SPECULATIVE. SHOULD WE DO SOME IDEA OF HYBRID ADMINISTRATION SOLVE THE STICKY PROBLEMS. THAT’S EARLY IN OUR THINKING AND DEVELOPMENT. I DON’T HAVE A SPECIFIC ANSWER AS TO WHETHER OR NOT IT WILL WORK IN YOUR 40 TO 50 MULTI FOREST ON-PREM.>>IT’S SOMETHING, CERTAINLY A SCENARIO AND — MORE THAN ONE ON-PREM APOLOGY WE NEED TO CONSIDER GOING FORWARD.>>ONE OF THE THINGS YOU TALKED ABOUT LAST YEAR WAS HYBRID MANAGEMENT AND BEING ABLE TO MODIFY SINGLE LOCATION. IS INTEREST ANY UPDATE?>>AH NO BUT THAT’S ONE OF THE IDEAS BEHIND SEND AS. BASICALLY THE SAME CONCEPT WHICH THAT BY MAKING THAT CHANGE IN THE CLOUD. WORKING THROUGH ACROSS MULTIPLE TEAMS. IT’S CERTAINLY ONE OF THE POSSIBILITIES ON HOW WE EXTEND THE AGENT AS A PLATFORM GOING FORWARD.>>THANK YOU. PRESENTED ABOUT THE SEND AS, CONFIGURATION CHANGES IS THAT USING THE HYBRID AGENT? CLASSIC MODE?>>IT WAS ALL THROUGH THE HYBRID AGENT. SO AS WE WERE TALKING ABOUT EARLIER. THE BENEFIT OF THE AGENT, NOT ONLY IS IT FOR THE PUBLISHING PERSPECTIVE BUT A PLATFORM TO BE ABLE TO DO OTHER STUFF ON TOP OF. SO WE CAN SEND A REQUEST DOWN THROUGH THAT AGENT AND WHAT IT HITS THE BOX IT’S NOT NECESSARILY A SIMPLE PASS THROUGH. GO SEND TO EXCHANGE. THAT’S WHAT WE ARE DOING WITH SOMETHING LIKE FREE BUSY AND MAILBOX MOVES BECAUSE EXCHANGE HAS ALL OF THAT LOGIC. WE CAN BUILD MORE INTELLIGENCE. WE CAN BUILD MORE FUNCTIONALITY SO WHEN IT GETS A PARTICULARLY SOMETHING ELSE LIKE MAKE AN LDAP RIGHT. SO IT WILL RUN WHATEVER WE DO THERE, AGAIN, THE SEND AS DEMO WAS AN IDEA. SOMETHING TO GET THE CONVERSATION STARTED. AND ANYTHING WE DO ON THAT FRONT WILL BE AS PART OF THE AGENT AND FOR MANY CUSTOMERS THAT TO MODERN. WE WILL GET THERE JUST A R GA PLUS.>>BUT YOU ONLY GET IT WHEN YOU SWITCH FROM CLASSIC TO MODERN.>>CORRECT.>>YES.>>YOU MENTIONED THAT THERE’S NO DNS CHANGES. SO AROUND 500 E-MAIL DOMAINS, SO TION THE LAST VALIDATION.>>SO EVERYTHING SHOULD COME WITH AN ASTERISK. WHAT I WAS TALKING ABOUT WAS STRICTLY PUBLISHING EXCHANGE. HYBRID MAKE SURE AUTODISCOVER IS FUNCTIONAL ON THE INTERNET. YOU’RE –>>SO YOU DON’T HAVE TO DO THAT. HAVE TO DO TO TRANSFER YOUR DOMAINS OR — IN EXCHANGE ONLINE AND VALIDATE THAT YOU OWN IT. . THAT YOU STILL HAVE TO DO TEXT RECORDS AND THAT. THE WORK AND PUBLISHING EXCHANGE TO THE INTERNET WITH AUTODISCOVER END POINT DNS RECORDS THOSE YOU NO LONGER HAVE TO DO. WE DON’T CARE ABOUT AUTODISCOVER . WE OVER RIDE THAT WITH TARGET FREE BUSY AND THE END POINT IS A DNS RECORD WE CREATE IN THE MS APP PROXY.NET ZONE. WE EXTEND THAT OUT.>>THANK YOU VERY MUCH.

Shared Responsibility: What This Means for You as a CISO (Cloud Next ’19)


[MUSIC PLAYING] ANDY CHANG: Hi, everybody. I’m Andy Chang, Product Manager
at Google’s Cloud Security team, and I’m
joined here by Dan. DANIEL HYMEL: I’m Dan Hymel. I’m with Capital One and I
perform in our cloud governance and compliance space for our
multi-cloud environments. ANDY CHANG: And Dan and I will
be splitting the presentation duties. I’ll do the beginning part, Dan
will talk about Capital One’s experience living this in the
cloud, and then we’ll wrap up. DANIEL HYMEL: Sure. When I start, I’m going to
maybe ask you a question. Heck, I’ll ask
that question now. What’s in your wallet? [LAUGHTER] So I’ll start with,
actually, a cautionary tale. So stay tuned for that. And you’re going to see a
slide that you’re probably not used to at Google
presentations of this type. Thank you for coming. ANDY CHANG: Thank you, Dan. Cool. So you’re in SEC209,
“Shared Responsibility, What This Means for You as a CISO.” And I think, hopefully,
you’re benefiting from some of the comfiest
chairs for any of the talks, much better than the ones
in the large stage area. So as you’ve
probably– since you’ve been through a few
of these sessions, we’re also taking
questions in the Dory. And so go to your app. If you have questions that
come up as we’re talking, please enter those in and we’ll
handle them towards the end. We’ll be covering a few things. Overall, one of the questions
that I get talking to customers is what is the exact split
on the shared responsibility model? How do I understand it? How do I leverage it? How do I make sure
that the cloud provider is doing what they’re
supposed to do and that my own company is
doing what we’re supposed to do? So we’re going to talk a little
bit about the perceptions of what customers care
about in security, the understanding that
shared responsibility division, focusing on
visibility and control. And then, ultimately, focusing
on a quick architecture example. Then I’ll turn it over
to Dan to talk you through the lived
experience at Capital One, how they’ve been successful
on multiple public clouds. And then we’ll wrap up
with questions and answers. So when customers
talk to me, the things I hear that folks
care about are really that the right data is
delivered to the right customer at the right point in time
for the right purpose each and every time. And that’s some of
the core of security. The right thing and
only the right thing happens when it’s
supposed to happen. In addition, given as we all see
the current threat environment and the activity of
threat actors increasing, it’s important not just to
react to [AUDIO OUT] situations, but also to be able to
anticipate and innovate ahead of some of these threats. In addition, many of you are
in regulated environments, so it’s important
[AUDIO OUT] partner to be able to essentially
enable you to deliver on your responsibilities
while running your businesses in the public cloud. And lastly, and really
the focus of this, is understanding and having
a clear understanding of responsibility model. I think we’re going to
switch over to [AUDIO OUT].. OK. So now we’re– [AUDIO OUT]. I think this is [AUDIO OUT]. SPEAKER 1: Sorry, folks. Give us one second to get
this straightened out. [SIDE CONVERSATION] ANDY CHANG: OK. All right, so this is better. Cool. All right, so we’re
going to talk about– oh, I think it’s still
cutting in and out. Technical difficulties. Cool. All right, can you
guys hear me OK? All right, we’re going
to go with the hand mic and see how this goes. Thank you. So we’re going to– the
focus of this talk is really on the understanding. Enabling you guys
to understand where that split is from a shared
responsibility standpoint. And really, ultimately,
for you as CISOs, you as folks part
of the security part of your organization, enabling
you to actually accelerate your company’s business velocity
with enabling your stakeholders to have and
understand really what is the controllable and
acceptable amount of risk. So really focusing on this area. At Google, the way we think
about the shared responsibility model is really around two key
items, security of the cloud and security in the cloud. And we’ll talk about how
we divvy those things up in a moment. From a core principle
standpoint, security at Google is done defense in depth. We have at least two layers
of protections that are independent from each other
between anything of interest– anything you want to protect
and any kind of bad activity or threat actor– at scale. So, as you can imagine, Google– I think other folks
have said we’re 25% plus of the internet
from a traffic standpoint. Things done at Google for
security or for other things have to be done fully
at scale and work at scale, and by default. How
do we enable our developers, how do we enable the system
so that the controls that are necessary and required
are enabled by default so that folks can run? At the core underlying
this is really the use of strong cryptographic
credentials and identity. And what that means
is that whether it’s a machine, whether it’s
a human, whether it’s the data, whether it’s
the code, whether it’s the underlying
service, they all have unique cryptographic
identities that we can compare against what
should be happening. And provenance, the ability to
establish, through a hardware root of trust, that the
underlying hardware, the low-level software, the OS
software, the applications that are running are all fully
attested to at each stage and that we’re running the
right code at the right time. The other part of this
is that, at Google, we think trust isn’t gained just
through technology, but also through transparency. And really, what that means to
you and to customers in general is thinking about reducing what
we call the unverifiable trust surface. What that means is minimizing
the amount you actually have to trust us as
a cloud provider. Having you being provided
enough information so you can make a
decision of your own to verify the claims
that we’re making. And that’s a core part of
what we’re trying to do. Ultimately, we’re interested
in providing customers the capabilities to help you
build secure applications and fulfill your part of the
shared responsibility model. When we think about the
controls that are in place, we really think about
them in three areas. Underlying control,
things that really help you protect the data;
visibility, the ability to classify the data and monitor
the actions on that data; and then detection
response, the ability to actually validate
the controls running and detect essentially things
that are non-compliant, activities that could be
threats, or from bad actors. And for each of these
areas, we have technology that we provide to enable that. When we think about the
shared responsibility model, it’s important to understand
that the boundaries of that shared
responsibility vary based on which types of
services you’re using. And for many of our
customers, they’re using a spectrum
of services, which is why it’s not
surprising that, as a CISO or as part of the security team,
the details for what service and which part can add
to additional complexity. And so it’s important
to understand where those divisions are. When you’re running on premise– everything in the blue
represents the customer. So when you’re
running on premise, you own all of your
hardware stack, your relationships, the
underlying software running. So not surprisingly,
the full responsibility is really on you
as the customer. When you’re running as an
infrastructure as a service, which is essentially running
your own virtual machines on our platform, but
installing your own images, setting up your own
network architectures, the responsibility for us is
to provide you the ability to log and audit the things
that are running on the system– the network, the underlying
hardware and infrastructure, the pieces that you’re
building on top of. So the services we
provide to you are secure, and then you’re responsible for
putting those things together in secure architectures. When you’re running a
platform as a service– like BigQuery or App Engine,
one of those things– now, really, you’re providing
as code that you’re running. And we’re responsible for
delivering the underlying services that execute that
code in a safe and secure way. And when you’re using
software that we’ve provided, now we’re responsible,
as well, for the code. So, if you’re using
Gmail or Drive or Docs, that code has then become
part of our responsibility. And then the thing
that you focus on is access to those
applications, access to the data that you provide,
and then the data that you’re loading
into those applications. That’s a quick summary
of the different levels, and we’ll go into some
of this in more detail. So, as we talked about
from a Google perspective, we think about security of
the cloud and in the cloud. Of the cloud is about
the core infrastructure that you’re then
using, and the core services to build your
products and applications for your consumers. For Google, we’re responsible
for security of the cloud, and we think about it as, again,
defense, in depth, at scale, by default. We model the
underlying architecture that you’re running on
top of in nine layers. Everything from the
hardware all the way through the underlying low-level
software, the applications, and ultimately to usage. And everything that
we do at Google is rooted in a hardware root
of trust, which is the Titan chip that you’ve heard of
through the last couple of Next conferences. It’s a purpose-built
chip that we’ve built and it sits on our compute
cards, our processor cards. And establishes, on boot,
a cryptographic identity for that piece of
hardware and verifies that all the underlying
pieces of software that are meant to boot are
doing so in the right way, that the hardware
components are correct and configured the right way. And, if any of
those things fail, that card or that
compute instance does not actually boot and
be entered into the fleet. And that allows us to
make sure, once something goes through that, that
it’s in a known good state and it can be put into
the rest of the fleet and start serving customers. That becomes the
underlying piece that drives our servers,
our storage, our network, and then ultimately
our data centers. And what that allows
us to do, then, is reduce the threat
for folks injecting either malicious hardware
or malicious software into our systems. In combination with that, as we
talked about in the beginning, it’s important for
us at Google that we have the ability for
the code that we write to define that the
right identity accesses the right machine, is authorized
by the right code accessing the right data, and it’s in
the right time and context. And that’s done through
cryptographically secure identities. So not only users
have identities. Machines and services
have identities, devices have
identities, and then code and data have identities. And checking all of those things
when we run a Google service is a core part of our
underlying platform. Here’s a stack with
a little more detail of the different
pieces within Google that come into play
to secure each layer. You’ll see that there’s at least
two items at each layer that are put together to provide
redundancy and really defense in depth. Whether it’s the purpose-built
underlying infrastructure or the fact that we,
from a boot standpoint, cryptographically sign all the
pieces of our boot software, from an operating system
and hypervisor standpoint, we use our own version of
KVM where we stripped out a lot of parts of
the virtual machine monitor, reduced its attack
surface and its risk surface. We’ve also then added
sandboxing in so that further creates a level of isolation. From an OS standpoint, we
use our own curated operating system for our host side. We also make that available
as the container-optimized OS for you, as a customer, to use. If you’re using our
container-optimized OS, you can also enable
automatic updates, which will patch the
container-optimized OS so you can leverage and benefit from
the same type of security controls we run
on our host side. From a storage and
network standpoint, unique to cloud providers,
all services, all data, is encrypted at rest and
in transit at Google. The logging of both internal
Googler access, as well as providing audit logs for
your users and your systems and what they do
in your systems. An identity access
management system that allows us to do
fine-grain permissions, and then really
managing those keys that are core part of
encryption at scale. From a networking side, we
have one of the world’s largest private networks. What that means is that from
when your data or your service is touched by a customer
from outside our network, it basically travels wholly
on Google-owned private networking, private fiber,
to the server in our systems. And that gives you not only
performance advantages, but gives you a single threat
to choke from a network security standpoint. There are no additional
actors in the underlying hops. From an application standpoint,
both from the whole software lifecycle, from static analysis
to the patching and checking of the packages that are loaded
in, we have control over that. We also cryptographically
sign each piece of software as it goes through
the development stage, and then check before it’s
deployed that the manifest has all the right policies applied. That’s something
we’ve externalized to customers as a part
of binary authorization. So, if you want to adopt
that same model that you can run vulnerability
checks, various types of patching checks, static
code analysis, and then as long as code passes that
created cryptographic signature and have that checked
before the code is deployed, you’re able to do that through
our binary authorization product. Once the applications
are up and running, they’re protected by
our own global front end and the WAF capabilities and
DDoS capabilities around that. And then we provide, as well,
our own security scanning for L7 web application
vulnerabilities that we use inside of Google as
a product called Cloud Security Scanner for you to
use as a customer. When things are
deployed at scale, we’re very fond of saying that
your first users are typically abusers. So whenever we deploy a service,
we see a lot of attack traffic. Therefore, the built-in
DDoS for our own services, the ability to be our own CA. So it’s very hard for folks
to forge anything related to connecting to Google. And that all services provided
at Google are at full TLS. Finally, from an
operations standpoint, not just trusting us,
but having third parties do compliance checking. The ability to do
live migration, which enables us to do patching
of live running VMs without taking your
services down, allows us to, on a continuous
basis, do that level of patching and keeping
things up to the highest level of security. Then we have full SOC threat
analysis and the ability, from a user standpoint,
to connect to our services through beyond corporate
digital trust type network, as well as for them to do
hardware-based second factor for security key. And that is the structure for
every service created at Google and used at Google. And the tools in
which you would then build on top of when you
use one of our services. When we think about
enabling customers, we do this providing
the same type of services either in the
dark green as products you can consume, in the light
green as either products that you can use from Google or
that you can get from partners, or in the case of the dark
blue, core things we still do by default for you when
you’re running on Google Cloud Platform. We’re going to
talk and highlight some of the key differentiators
on Google Cloud Platform that will help you do your
job better and fulfill your part of the
shared responsibility from a visibility
and control side. So one of the core
things which we announced to general availability
this morning is the Cloud Security
Command Center. That’s that central
pane of glass that you can bring in detections
from Google native products, third-party products, or
ones you’ve written yourself for vulnerabilities and
threats all in one place, and see those in
context with your assets and the business context
of those services and the sensitivity of the data. Gives you one place to look for
visibility, one thing for you to then query, understand your
data, and then the ability to trigger prevention,
detection, and action. In addition, what we feel is
a key part of understanding the attack surface
is understanding where your data is and what
sensitivity level [INAUDIBLE].. What we provide is the same
service we used within Google for data classification,
our cloud DLP API, which is designed to work at data at
exabyte and petabyte scales, which allows you then
to, number one, for data sitting in Google Cloud Storage
or data sitting in Bigtable– BigQuery tables– to
classify, at scale, sensitive data either through
our built-in classifiers, the ability to use
regular expressions, or to express this
in terms of data sets that we can
train our models on. Once you’ve
identified that data, you then have the choice of
multiple de-identification options. Simple things like
substitution encryption, more intricate things like
format preserving encryption, or transformations that
allow the data still to be usable in analytics, but
still parallel serve privacy. In addition, unique to Google is
we provide Access Transparency, which means that we
provide you, in our audit logs, a notice every time a
Googler accesses your data and for what reason. What region that
Googler was from and the case number, in the case
of customer-initiated support events that triggered
that access. This is across a wide
range of Google services, and unlike some of the other
providers, not just restricted to a small set of the
provided services. Also, at Next, we’re
very excited to announce access approvals, which now
allows you to prevent Googlers from accessing data in real
time for a subset of the data. So not only will we notify
you if a Googler is trying to access data, you can
actually get the ability to say you will not allow
that and grant that access, and the Googler will no longer
have access to that data and will not start having
access to that data. The results of these are
surfaced in the Cloud Security Command Center. Also through the
audit logging APIs. One of the key parts
we talked about earlier was trust through transparency. And so part of that is
there’s a lot of things that we’ve told you
about our technology and how we do things. But you don’t have
to just trust us. We go through, twice a year,
a set of certifications. You’ll see some of these here. And those certifications
go on an ongoing basis. Working with your sales teams
and with your account teams, you can get access to some of
the reports of these things. So you can see for
yourself, whether it’s overall global standards or
country-specific standards, how we do against
the requirements and certifications you need
to run your businesses. When we move to control, one
of the key things that’s unique to Google is an emphasis on
providing out-of-the-box, top-down, logically central, but
globally distributed controls. We were the first of
the cloud providers to provide organization level
viewpoint, a top-down resource hierarchy that also
is an IAM boundary and also is a network boundary
so that you have the ability to start your systems and
your developers in a safe mode where they have, by
design, restricted access that you then can
explicitly only grant through the IAM roles. From an IAM standpoint, we have
over 300 curated roles so out of the box, the
separation of duties are built in by those
products requiring explicitly grants for folks to use that. We have hierarchy
and inheritance in our resource hierarchy. So if you’re given
something at a folder level, that person then can have
the underlying roles in each of the projects below that. But if you’re at
a project level, you can’t go up the chain
unless you’re explicitly granted that type of access. In addition, we
have org policies that you can define
at the top level that can be enforced across
all your organization, regardless of the
underlying pieces. And then we’re going to talk
about two other things that affect your
communication pattern. VPC Service Controls,
which provide you the ability to define
service perimeters. So unlike the traditional
L3, L4 networks, which are based
on routes and IPs, and restrictions based on IPs,
as you move to microservices, services then have
unique identities and you have the ability
to block services access to particular types of
sensitive data or projects. And those can be applied
to Google services as well so that you can block,
for example, Google Cloud Storage rights or reads from
a particular set of resources only unless those
services either belong to a particular access level
or have a particular set of permission groups. In addition, we also
provide a similar set of capabilities around your
L3, L4 level networking. So we have the ability
for you to create what’s called a shared VPC
and, in that shared VPC, define all the
firewall rules that apply to all the tenant VPCs. So you have, again,
one logical choke point where you can provide
the administration of your overall network,
separate and independent from the underlying
administrators of the underlying projects. Both of these
concepts are designed to provide you
logical bottlenecks and choke points for
control, but not cost you anything on the performance
side because they’re implemented in globally distributed ways. And those are unique to Google. VPC Service Controls,
as I talked about, is really defining
service-level perimeters, which allow you to put that
around specific sets of sensitive data, allow
you to define access levels. And those access
levels allow you to put policy
requirements, for example, of what kind of geographies that
the data can be accessed from, what kind of restricted
IPs, what potential device characteristics are needed
to access that data. Those access context
levels apply not only to infrastructure
controls like this, but also back into your G
Suite access to Docs and Gmail. So in one construct,
access levels, you can define a set
of controls that apply across both G Suite and GCP. Similarly, from a key
management standpoint, as I talked about,
by default, your data is encrypted at
rest and in transit. But we know for some
of our customers, they have additional either
regular requirements or views of their threat
model or risk that require greater
control of their keys, so we provide a full spectrum. From the left,
default encryption, you don’t have to do anything. Your data is encrypted at rest. Cloud key management
system, which allows you full control
of creation of keys, destruction of keys,
rotation, times, and periods. Full logging. IAM roles on those keys
so you can demonstrate to your regulators
and auditors that you have full control of the keys. Cloud HSM, which is a
hardware-backed solution so that you can have a root
of trust for those KMS keys be in hardware. And it’s a Phipps Level 3
hardware, globally distributed Cloud HCM system. You can also, if you need
to have the root keys be sourced within
your own org, you can use cloud’s essentially
customer-supplied encryption keys, which allows you to push
the encryption keys to us when you need something decrypted. We do not store that key. It stays only in memory
for the live operation and, therefore, you
have not only the root of trust in your
own hardware system, we have no access to
those underlying keys. You can also have, essentially,
the ability to stack your own HSMs in our Colos if
you want that further level, additional control on
essentially customer-supplied encryption keys. So depending on the risk
parameters of your business, you have a full
spectrum of capabilities available to support
data encryption. And before I turn
it over to Dan, I’m going to talk through now
how the various controls get put together when you think
about a secure architecture. So first, most customers
start with a clean slate. They have an existing on premise
or other cloud installation. They have identities set up,
typically not a Google identity out of the box, from an
enterprise standpoint, local compute,
gateways, and then data. So the first thing to do
is to essentially connect to cloud identity, which lets us
federate your existing identity service. And now brings those
identities to be used in Google Cloud Platform. Then, through the groups and
the underlying individuals, assign out the IAM
roles and policies which you want so that folks
have the correct separation of duties. The ability to establish
upfront org-level policies that apply, regardless
of the underlying pieces, across your whole organization. For example, that VMs cannot
have publicly-facing internet addresses. Then the ability
to define, again, from a L3, L4 level, and
overall control of your firewall rules and networking
through shared VPCs. Breaking out from an HA
standpoint and a disaster recovery standpoint, the
various regional pieces that you want to allocate within
each of the regions, the zones, the resource allocation, and
then the underlying subnet connections. By default, and
unique to Google, our networks are global. So you’re able to make
those connections very straightforward. You don’t have to pair
between the different regions. Our VPCs are global by
nature, and you’re able to, therefore, set up HA and DR
in a very straightforward way. Next thing you want
to do ultimately is you have data
sitting near on prem, and you want to bring
it securely into GCP or take the data that we compute
and bring it back to your on prem. So combining Cloud
Router, firewall rules, dedicated secure interconnect,
either through our own peering or through partner
peering, allows you to bring the data in and
out of your area securely. Also, we have VPNs to allow
you to do that as well. Next piece, then, is from
an application standpoint. Protect your application
once you serve it from the typical
attacks like DDoS. So you can either
use our default global load balancer,
which as long as you put that in front of one
of your GCE services, will take advantage of
our global front end. You can use one of our
managed services, which has DDoS built in, or you
can use the Cloud Armor product, which gives you
additional availability and the ability to write
your own rules to fine-grain manage your DDoS and WAF. Next piece, then, is you
want to turn on logging so that you have the monitoring
and evidence of things that might happen to
allow us to do detections. And audit logs are
turned on by default. You can then also look at
VPC Flow Logs, firewall logs, and then general logging. Then you want to turn on
the monitoring, learning, and detection pieces, which
include the Cloud Security Command Center, security
health analytics, the ability to look at stackdriver
monitoring, running security scanner
on your, essentially, web applications. And then if you want to
dump the data into BigQuery for additional processing. You then create a
service project, which allows you
to kind of create that boundary of control for
the services you want to run. And then create kind of a secure
perimeter using VP service controls around that so that you
can restrict which services can access that underlying data. And then, ultimately, bring
those data back into GCP through either private access,
Cloud DNS, and cloud natting. So you can either place
your subnets into GCP or push our subnet pieces out. So, in summary,
those are the steps that you take to pull things
in and are the building blocks of you building
a secure service on GCP, and some of the
pieces we give you to fulfill your part of the
shared responsibility model. So with that, I’m
going to turn it over to Dan to talk to you about
Capital One’s journey. DANIEL HYMEL: Great. Thank you. Are we using this mic? ANDY CHANG: No, we can
use your mic for this. DANIEL HYMEL: OK, great. Andy, thank you for
opening the stage and allowing me to
present and open the windows on what’s actually
going on inside of Capital One. So I promised you
a cautionary tale. And this little
creature’s name is Altria. Altria is a rescue dog that my
12-year-old daughter picked up from the Richmond Animal
League in Richmond, Virginia. What does this dog
have anything to do with the topic of shared
responsibilities, compliance, and controls? On the cover, probably
absolutely nothing. But take a closer look. Take a look at what’s
around her neck. So here’s the tale. It happened shortly
after Google ’18. About a week after Google
’18, this little dog, Altria– love her to death. She has no malicious
intent whatsoever. But she’s a runner. She was trained
as a hunting dog. She’s an American hound. So on one particular night, this
was probably after the fifth escape from the homestead–
we live on a parcel out in the country– we kept talking
about, let’s put it in a security fence,
an invisible fence. And we kept holding off
because the price was too high. So on one particular event,
she left around 8:00 PM. She has free run of
the neighborhood. We live in this river
canyon on the James River, where about a mile on either
side, there are no fences. And you can run from
the Chesapeake Bay all the way to the mountains. On this particular day, it
was about 11:00 PM at night. We were exhausted. We couldn’t find her. We came home. And as I was planning
to go around the house to check things out, I felt
this immense pain in my leg and I jumped and wondered
what the heck happened. So I looked down and on
the corner of the eye, there was a copperhead snake. Unfortunately, that snake took
advantage of the opportunity. And as you know, later that day,
I was in the paramedics box. I was at the hospital. I was being treated for
a copperhead snake bite. So as you know,
in everyday life, there are risk
scenarios everywhere. This is a very good example. Had we actually put
in the security fence, we would’ve avoided
Altria from escaping from our private domain
out into the public. So as a result, we
implemented this control. It’s a shock caller. So as you approach
the fence, she gets a really
enlightening experience. If she’s able to go beyond that
barrier into the public domain, there are some other controls
that we’ve implemented. So what you might not
know about the rescue dogs is that when
you receive them, you receive them with a chip. So if they are
captured in public, there is a way to
identify those. We also added a collar or a tag. The tag used to have only
our home phone number, but she runs so much
that we actually had to put a cell phone number
because we would get phone calls at home when we’re
actually out in the field looking for her. So, as you see now, it has a
lot to do with cloud controls– I’m sorry– with controls,
with shared responsibilities. It’s the whole community. So let me take you into
the Capital One journey. I’m going to open the
window for you for a moment. You won’t see this often. And I’m going to tell
you and share with you a few nuggets on how
we made our journey into the cloud successful. So Capital One, today, has
a significant need for cloud because it enables us to
operate with the speed and agility required to
succeed in the digital age. Our agile sprint teams
work in two-week cycles, and according to
them, infrastructure must not be an impediment. As a result of moving to the
cloud, there are some stats, and these are real numbers. We’ve moved from a
development environment build time of three
months down to 30 minutes. New product features
which used to take a month now take two days. With unparalleled visibility
into our environments, we have an overall
improved security posture. I’m going to talk back on
security in just a moment. Our current cloud
status is this. We have over 8,000 production
applications and services. 6,000 additional
services and applications are in non-production. And nearly 100%
of our production in development and test
servers are in the cloud. Additionally,
moving to the cloud has increased our ability
to secure and manage massive volumes of
high-quality data, operating at a higher speed
with greater resiliency, faster recovery, and at an
extraordinarily lower cost. With Cloud, our
technology organization is free to do what we do best,
build digital breakthrough experiences for our customer. If you are a customer
of Capital One, feel comfortable in knowing
that we have your back and we are doing our very
best using state of the art technologies and best practices
to protect your sensitive data. To make this happen, to make
this security posture happen, we’ve implemented a methodology
around controls and compliance. A lot of organizations might
call this cloud governance or a governance function. So essentially,
that’s what it is. It’s an enterprise
function at Capital One that balances the
need of compliance of cloud controls,
objectives, and the needs of various stakeholders,
from our board of directors to executive management, to
the enterprise communities, like operations, engineering,
info security, and cyber– all of the communities
that come together to help enable our security
capabilities in the cloud. And most importantly,
our divisional customers. These are our
lines of business– our banking community, our
auto finance community, our card community. These are the application
builders and consumers of cloud services. Another way to look at
cloud control and compliance is it’s the totality set
of policies and procedures that help an enterprise
move towards its goals while minimizing
risk and conflicts. So for us, our journey here,
our goal is all in on the cloud, and that’s just
about where we are. So let’s go back to, then,
what is this cloud compliance function? What I’m going to share with
you is a best practice example that is aligned very closely
with the Cloud Security Alliance methodology. So think of this as
a box of cake mix, where you flip that
box on the backside and it gives you
all the ingredients. These are all the ingredients
to make it happen. These are the best practices. You have to include all
of these, in my opinion, in your program for
cloud compliance to have the maximum benefit
to ensure that you’re doing the appropriate
level of due diligence for your environment. I’ll go by these one
by one, and then I’ll give you some more detail
on what they actually mean. So first off, you must
document and maintain a catalog of control objectives. These objectives are partially
derived from Nest 800-53, or FedRAMP Moderate. They are also a
compilation or a derivative of your internal security
policies and procedures. Secondly, for every
single service that our cloud
providers offer, we perform a security
control assessment using a selected set
of security control objectives in that catalog. And, for now, our current
status for our catalog of about 300 control
objectives, we use about 50 of those that are directly
applicable to cloud as it relates to our
shared responsibilities. And, of those 50, 15 of
the control objectives are mandatory
requirements, meaning that, if the service provider– Google– provides
a service to us and it doesn’t meet any of
the 15, that’s a showstopper. So we’ll just tell Google,
we’re not ready yet. We need some more features
before it’s safe for us to consume that service. Next, once you’ve done
the security assessments, you move into the phase of
performing the risk analysis on the gaps that you’ve
identified relative to your control objectives. So depending on which
industry that you’re in, you may have a different
set of objectives than what Capital One has as
a financial service provider. Today, we’re using a composition
of qualitative and quantitative methodologies. We’re looking very closely at
probabilistic risk analysis, which means that there is
a probability in a risk scenario of an event happening
over an annualized time period causing a loss of
money in a particular range. So now that you’ve
identified your gaps, now comes the tough part. This is a continuous process
on risk management, control implementation, control
compliance, control exception processing. You have to implement
your controls. You have to monitor your
controls for compliance. And you have to allow
application owners to make exceptions against using
the services that might not have all the controls
or for which you’re not able to meet all of those. Not a requirement,
but the next one is the divisional
governance advisor. And what we’ve done
is we’ve assigned a technical subject
matter expert like myself to support a particular line
of business that translates everything that we’ve
talked about into terms that they consume. And most importantly,
as well, training. The associates that
perform in this function need to have background
as a subject matter expert in the cloud
provided environment. Back to shared responsibilities
component of this. Andy talked ad nauseam about
this– this is really great– so I won’t go into
any detail here. But I wanted to share with you
that we understand this well, and I’ll just move on
to the next one, which is a payout slide. This slide basically
says, for Capital One, we look at shared
responsibilities from both a platform perspective
and an application perspective. Let’s take the application
perspective first. I’m sorry, the
platform perspective. So my team working
in cloud governance, we do everything that
we talked about before. We assess the services. We ensure that they meet
our security requirements. We work with cloud
engineering teams and we provision the
services and make those available to our
consumers that leverage those services by
way of applications. So we’re accountable
for then assuring that we implement platform
identity and access management, that we
deploy the operating systems appropriately, meaning
that we provision system images. Rather than using the
cloud provider images, we provision our own so
that we appropriately harden them to meet
our internal standards. We’re accountable for what
we put into the cloud, so we take full
responsibility for that. One particular example of
a control related to this is a notion of rehydration. So, as a virtual machine ages,
it takes on vulnerabilities because the vulnerability
aging process, and so we have a requirement
to rehydrate every 60 days. If you go beyond that,
bells and whistles go off. If you go past 90,
bigger whistles go off. If you go to 120, the
canons go off and so forth. So I think you get that. So our cloud
governance function, from a centralized
perspective, is we make controls and scripts
available that either we can run on behalf of the
development community, or that we can give it to them
and they can actually run it. For example, there
might be a requirement to apply labels or tags
to all of your resources. If the development community
forgets to do that, they can run a
script to make sure that they’re compliant to that. Let’s move on then
to the application. If you build it, you own it. That’s the mantra
at Capital One. So if we offer a service
to you, you’re golden. You can use that. It’s been whitelisted. The controls are in place, but
you have some accountability. I’ll talk a bit more
about that accountability. So why are cloud
controls important? I wanted to make sure that you
had full visibility to that. For Capital One,
it’s our mission and our fiduciary
responsibility. If you take a standard document
classification or information handling matrix,
you will find that your proprietary or
confidential data is probably your most important asset and
requires a level of protection beyond those that are
company or public. So what we do and
how we’ve bifurcated this is we look at the controls
in the cloud control catalog in three particular areas. There’s technical,
operational, and management. And I’ll show you, on the next
slide, how we codify those. But most importantly, the
controls have to always be on. The windows have to
always be locked. So that means
security protocols, public accessibility, data
encryption, identity access, and PCI. There is no opportunity. There is no tolerance
for control being off. So where do cloud
controls originate? I mentioned to you a
bit earlier that they might originate from
cybersecurity frameworks, Nest, FedRAMP, and so forth. Here’s a particular small matrix
of the 14 control categories in the Nest
framework, where I’ve bifurcated those by technical,
operational, and management. So we take our Cloud
Control catalogs. We look at a service
that Google has provided. We perform that
security assessment. The diagram below, or the
colorful green, red, blue chart, is the actual
detail of the questions that we might ask. And, incidentally, I
have to say that Google has been an extraordinary
partner in this. Google has our scripts. They know what we require. They know when a service
is ready to meet the higher bar for financial
services industry, and so they are embracing that. They’re working very diligently
to say, hey, Capital One, we’ve got this new service. And they know what
our requirements are. So they know when to
actually make the ask. And finally, we complete
the service assessment. We deliver the package. Now, it’s important to
note here, under Item C, that it’s a
cross-functional team. We include governance, we
include engineering resources, cyber resources, architecture,
IAM architecture and, also, our information assurance
third-party management function, where
we fully validate. We have an auditable
trail that our regulators and our internal auditors
can go back and say, did you ask that question? Google tells a lot of good
things about their services, but we firmly believe
in trust, but verify. So this is the final slide. I’ve got about 15
seconds or so, and then we’ll save time for Q&A.
But here’s the payout, and this is what
resonates with shared responsibilities from an
application owner perspective. Here’s what it means. If you have an application– let’s take a basic, multi-tier
architecture application– where you’re going to
need a load balancer, a web server, application
server, database and file storage, that application
or the type of application may require that you adhere
to an enterprise architecture standard. There may be a defined
architecture already. The architecture might
even say, in order to meet the requirements
for the architecture, there are certain
cloud services that you are mandated to follow. So the application owner
defines the application. They choose the architecture. They select the cloud
services that are approved. This is by no
means the only list of what’s approved
at Capital One, so we could put dot dot dot. After you select the
approved services, then you become more
aware of an application owner of what your actual
requirements for controls are. So if you pick a Compute
Engine, if you pick Storage, you will have some requirements
for identity access, data encryption, and so forth. So this is really
the whole story. There’s so much detail here. Feel free to reach
out to me on LinkedIn if you have some
follow-up questions. And we’ll actually go back to
Andy to close it out for us. ANDY CHANG: Thank you, Dan. So in summary, though
one last slide. [APPLAUSE] So security of the
cloud is something the cloud provider secures. Security in the
cloud is something that the cloud customer
secures for their data and their content. At Google Cloud, we look to
empower you as a customer with the visibility to
control and secure the things that you’re responsible for. And as Dan talked
about, customers can be successful in cloud
using a very thoughtful process, structure, and clean
separations of responsibility within their own org. [MUSIC PLAYING]

Connecting Microsoft Teams to third-party meeting room devices with Cloud Video – BRK3122


>>HEIDI GLOUDEMANS: HELLO EVERYONE. THANK YOU FOR MAKING THE INVESTMENT OF BEING HERE THIS WEEK. I WILL DO A SHORT INTRO. YOU HEARD YESTERDAY ABOUT OUR VISION FOR MEETINGS AND PART OF WHAT WE ANNOUNCED WAS THE GENERAL AVAILABILITY OF THREE CLOUD VIDEO OP PARTNERS. I’M PLEASED TO INTRODUCE TO YOU TODAY MY COLLEAGUE, SRI WHO IS GOING TO TALK THROUGH OFFERINGS, SHOW YOU COOL STUFF END-TO-END AND WITH THAT I WILL HAND THINGS OVER TO SVI, SHOW US HOW IT’S DONE.>>SRIVIDHYA CHANDRASEKARAN: THANK YOU, HEIDI. [APPLAUSE] HI, EVERYBODY. I’M SRIVIDHYA, AND I AM WITH THE MICROSOFT PRODUCTS GROUP, I AM HERE TO TALK TO YOU ABOUT HOW DO YOU CONNECT THIRD-PARTY MEETING DEVICES INTO THE MICROSOFT TEAM MEETINGS AND ECOSYSTEM. ALL RIGHT, SO LET’S START WITH WHAT IS IT THAT I BELIEVE YOU COULD GET OUT OF THIS SESSION? OVERVIEW OF WHAT IS VIDEO INTERRUPT, WHY DO YOU CARE ABOUT IT? IS IT GOING TO BE VALUABLE IN YOUR ENTERPRISE? IF IT IS, THE NEXT STEP HP HOW ARE WE DOING IT, WHO ARE OUR PARTNERS AND HOW ARE WE EXECUTING THIS SOLUTION WITH THEM. ARCHITECTS THIS WILL BE USEFUL FOR YOU GUYS AS YOU OR YOUR CUSTOMERS START DEPLOYING IT. SOME OF THE KEY THINGS TO KEEP IN MIND, BECAUSE YOU DO HAVE OPTIONS, IF YOU CHOOSE TO DO THE INTERRUPT ROUTE YOU HAVE THREE DIFFERENT PARTNERS PROVIDING DIFFERENT MODELS AND ALL OF THAT DEPENDS ON THE BUSINESS REQUIREMENTS THAT YOU CUSTOMERS HAVE. ONCE ALL THAT IS DONE, HOW DO YOU GET STARTED FOR YOUR ORGANIZATION. SO LET’S TALK ABOUT THE FUNDAMENTAL PROBLEM WE ARE TRYING TO SOLVE. WHY DO YOU CARE ABOUT VIDEO INTERRUPT? EFFECTIVELY YOU HAVE THIRD-PARTY MEETING ROOM DEVICES, VARIOUS CUSTOMERS HAVE DEPLOYED THIRD-PARTY MEETING ROOM DEVICES EITHER BECAUSE THEY ARE — ONE SECOND. . OKAY, VARIOUS CUSTOMERS HAVE DEPLOYED DEPLOYED THIRD-PARTY MEETING ROOM DEVICEs AND WE HAVE HAD CUSTOMERS THAT HAVE HAD DIFFERENT TYPES OF GEAR IN THEIR DEPLOYMENT. AS THEY START MOVING INTO OTHER WORKLOADS IN MICROSOFT OFFICE 365 THESE ARE EXPENSIVE AND THEY ARE HARD TO REPLACE. IT’S A BIG INVESTMENT FOR THE CUSTOMERS TO NOT ONLY MOVE THE WORKLOADS INTO TEAMS, BUT THIS ALLOWS YOU TO CONNECT YOUR THIRD-PARTY DEVICES WITH YOUR TEAMS MEETINGS MEANING YOU CAN KEEP YOUR DEVICES. YOU DON’T HAVE TO RSH TO MAKE THAT CHANGE IN YOUR DEVICE AREA HOWEVER YOU CAN GET THEM TO CONNECT NATIVELY INTO THE TEAM TEAMS CONFERENCE ROOM AND IN THE ECOSYSTEM. THERE ARE INTERRUPT SOLUTIONS AVAILABLE FOR THE EXISTING SKYPE FOR BUSINESS, AS WELL AS FOR NOT MICROSOFT PRODUCTS IN GENERAL HOWEVER IT IS IMPORTANT TO CALL OUT THE INTERRUPT ABILITY CHALLENGES PEOPLE FACE IN GENERAL AND WHAT WE HAVE DONE IN ORDER TO ELIMINATE THEM. FOR EXAMPLE, IF YOU ARE TRYING TO GET TWO DIFFERENT SYSTEMS INTERCONNECTED GENERALLY THERE IS A PLUG-IN OR SOME KIND OF THIRD-PARTY ADDITION THAT IS REQUIRED IN EITHER THE CLIENT THAT IS TRYING TO CONNECTOR IN THE DEVICE IN ORDER TO MAKE THIS WORK. WHAT WE HAVE DONE IS BASICALLY — THE END USER DOESN’T REALLY NEED TO KNOW WHAT IS THE DEVICE, WHAT IS THE MAKE AND MODEL, BASICALLY HOW CAN WE INTEGRATE IT NATIVELY INTO OUTLOOK AS WELL AS TEAM SCHEDULING SO THAT FOR THE END USER THEY DON’T HAVE TO THINK ABOUT WHO ARE MY EMPLOYEES THAT ARE JOINING, MY DEVICES THAT ARE JOINING, IT HAS TO BE A SEAMLESS, CLEAN EXPERIENCE FOR THE END USER BECAUSE THEY SHOULD NOT CARE WHO IS JOINING INTO THE MEETINGS. MEETING JOIN AS WELL AS THE CLIENT SIDE PLUG-IN AS WELL. SO WHAT WE HAVE DONE IN ORDER TO ELIMINATE THE HARDNESS OF THIS IS ACTUALLY HAVE ONE-TOUCH DIAL SOLUTIONS WITH ALL OF OUR PARTNERS AVAILABLE. MEANING THAT IF YOUR THIRD-PARTY ROOM SYSTEM IS INTEGRATED WITH EXCHANGE, DIAL JOIN WILL SHOW UP ON THE DEVICE AND FOR THE END USER IT’S GOING TO BE A SIMPLE EXPERIENCE. THE OTHER ONE THAT I WANTED TO CALL OUT IS ALSO, WHETHER IT’S A GATEWAY SOLUTION VERSUS VMR IS IMPORTANT FOR US, BECAUSE AS A VMR SOLUTION WE HAVE INDIVIDUAL CONTROL FOR EACH OF THE PARTICIPANTS IN A MEETING DEVICE OR IN A MEETING ROOM, MEANING THAT YOU CAN ACTUALLY SEE THE VTCs INDIVIDUALLY AS INDIVIDUAL ENTRIES. YOU CAN SEE EACH OF THEIR VIDEOS AND SEE THEM IN THE ROSTER. SIMILARLY WHEN IT COMES TO BUDGETING AND ADMINISTRATION WE ARE TRYING TO MAKE THIS EASIER AND WE DON’T EXPECT YOU TO HAVE COMPLICATED INTERRUPT, UN, PLANNING AND DEPLOYMENT PURCHASES IT’S SEAMLESS WITH THE MICROSOFT STORY THERE. SO WHAT DO WE HAVE AVAILABLE FOR CLOUD VIDEO INTERRUPT? SO WE HAVE ENABLED CLOUD VIDEO INTERRUPT WITH THREE OF OUR PARTNERS. THESE ARE ALL SOLUTIONS THAT ARE CERTIFIED FOR MICROSOFT TEAMS. THEY ARE CO-ENGINEERED WITH MICROSOFT AND WE HAVE DONE THE USUALLY ENTERPRISE GRADE TESTING FOR ALL PRODUCTS BEFORE GENERAL AVAILABILITY. THE NEXT THING IS THAT THESE PRODUCTS ARE ENTERPRISE READY. THEY SUPPORT HD VIDEO, CONTENT SHARING AND PRETTY MUCH MOST OF THE OTHER DEVICES THAT ARE AVAILABLE AND AS I JUST MENTIONED SUPPORT NATIVE SCHEDULING FOR TEAMS AS WELL AS OUTLOOK. HERE IS THE EXAMPLE I WANTED TO CALL OUT FOR THE GATEWAY DESIGN. SO WHEN I SAY GATEWAY DESIGN, IN YOUR TEAMS CLIENT ONE OF THIS IS A MEETING ROOM DEVICE. AS THE END USER THAT IS PARTICIPATING IN A TEAMS MEETING YOU ACTUALLY DO NOT KNOW WHICH IS AN INTERRUPT PARTICIPANT OR WHICH IS COMING THROUGH THE SERVICES. YOU CAN EFFECTIVELY LOOK AT THE PARTICULAR VTC IN THE ROSTER AS WELL AS IF YOU WANT YOU CAN ELIMINATE THAT VTC BY JUST HOW YOU WOULD REMOVE A TEAMS PARTICIPANT YOU SHOULD BE ABLE TO DO THAT AS WELL SO IT’S A SEAMLESS EXPERIENCE AND YOU GET THE SAME ON THE VTC FOR ALL THE TEAMS CLIENTS THERE. LAST BUT NOT THE LEAST, WHAT WE HAVE DONE IS ALL OF THESE SOLUTIONS ARE AZURE BASED. MICROSOFT TEAMS, IT RUNS ON THE BACK END OF AS SECURE. OUR PARTNERS HAVE TAKEN FULL ADVANTAGE OF THE CAPABILITIES THAT AS AZURE PROVIDES AND TAKEN ADVANTAGE OF THE OPTIMIZATIONS WE HAVE DONE AS PART OF MICROSOFT TEAMS OPERATING ON AS AZURE. ALL RIGHT. SO, ONE OF OUR PARTNERS IS POLYCOM, AND THEY HAVE — THEY ARE AVAILABLE THEY ANNOUNCED YESTERDAY SO I AM ACTUALLY HERE TO SHOW A QUICK DEMO OF HOW THAT EXPERIENCE LOOKS. CAN ANYONE TELL ME WHICH IS COMING FROM ANY OF THE DEVICES? I’M GIVING YOU A HABITUE NOW [LAUGHTER] . YOU AS AN END USER WILL HAVE NO IDEA WHETHER IT CAME FROM A DEVICE OR A NATIVE TEAM ROOM OR THAT IT HAS COME FROM AN INTERRUPT SERVICE. LIKE THIS. SO THAT’S SORT OF THE EXPERIENCE THAT I’VE BEEN TALKING ABOUT WHEN I SAY GATEWAY SERVICE SO THAT’S HEALTHY AS WE WANT IT TO BE. NOW I’M GOING BACK TO THE — OKAY. GOT THAT WORKING! ALL RIGHT, SO I SPOKE ABOUT THREE PARTNERS. THESE ARE OUR THREE PARTNERS. THEY MADE AN ANNOUNCEMENT A WHILE AGO LAST YEAR AND HERE IS THE AVAILABILITY. WE’VE BEEN WORKING VERY, VERY HARD WITH OUR PARTNERS AND POLYCOM WAS AVAILABLE YESTERDAY, I HAVE — THAT’S GOING OUT IN TWO, THREE WEEKS AND BLUE JEANS BY END OF THE YEAR. I HAVE ALL THREE PARTNERS IN THE ROOM AND FOR LIVE DEMOS AS WELL AS DETAILED Q AND As ON THE NETWORK CONSIDERATIONS PLEASE GO AHEAD AND TALK TO OUR PARTNERS, I HAVE MARKED THE NUMBERS OVER HERE AS WELL. OKAY. ONE CRITICAL THING I WANTED TO CALL OUT HERE IS BASICALLY — I’M GOING TO CUT THIS CALL. ONE CRITICAL THING THAT I WANTED TO CALL OUT IN THIS ONE IS BASICALLY THAT WE HAVE HAD CUSTOMERS FOR ALL THREE PARTNERS AND THESE ARE CODES GIVEN DIRECTLY BY OUR CUSTOMERS. EFFECTIVELY WHAT IT TELLS US IS THAT THIS PRODUCT IS IMMENSELY VALUABLE. IT GIVES THE CHOICE TO THE CUSTOMER FOR THEM TO DETERMINE WHEN THEY WANT TO DO THE BRIDGE AND HOW THEY WANT TO DO THE UP GRADES OR CHANGES INTO THEIR DEPLOYMENT AND IT’S A VERY SIMPLE WAY TO INTEGRATE, AND IT JUST MEETS THE CUSTOMER’S DEMANDS. THAT’S SORT OF THE FEEDBACK THAT WE HAVE GOTTEN. WE’VE ALSO GOTTEN GREAT FEEDBACK ABOUT THE OVERALL QUALITY OF HOW THE MEDIA STREAM HAS BEEN AS WE START INTEGRATING WITH TEAMS AND AS WE START LOOKING AT IT, LIKE IN THE PREVIOUS EXAMPLE, YOU DIDN’T SIGN ANY DIFFERENCE BETWEEN WHETHER IT IS A MEDIA COMING FROM THE TEAMS CLIENT OR FROM AN INTERRUPT SERVICE SO WE HAVE LITERALLY MADE IT THAT SEAMLESS THERE. ALL RIGHT, SO ONE THING I WANT TO PLAY OUT HERE IS ONE OF OUR CUSTOMER TESTIMONIALS.>>. [INAUDIBLE]>>SRIVIDHYA CHANDRASEKARAN: ARE YOU GETTING AUDIO?>>IT’S VERY, VERY LOW. LET’S GIVE IT A MINUTE OTHERWISE I WILL WAIT UNTIL THE END FOR HIM TO RESOLVE THAT. (VIDEO PLAYING.) >>SRIVIDHYA CHANDRASEKARAN: ALL RIGHT. THERE WE GO.>>WHAT WE SEE WITH OUR CUSTOMERS IS THAT A LOT OF THEM HAVE INVESTED A LOT OF MONEY IN TRADITIONAL SYSTEMS. THEY BUY A NEW PRODUCT THEY WILL TEST THAT NEW PRODUCT BUT DURING THE PERIOD THAT SAME PRODUCT NEEDS TO CONNECT WITH THE OLD ENVIRONMENT. A LOT OF CUSTOMERS DON’T EVEN KNOW THEY ARE HAVING — THEY ARE HAVING DIFFERENT SEAMLESS CONVERSATIONS BETWEEN SYSTEMS WITHOUT KNOWING THAT THEY ARE HAVING DIFFERENT SYSTEMS. THE AMAZE YOUR DATA IN YOUR CONFERENCE IS IN YOUR PRIVATE ENVIRONMENT VIA THE CLOUD.>>SRIVIDHYA CHANDRASEKARAN: SO THERE IS YOUR CUSTOMER TESTIMONIAL, COMPLETELY DEPENDS ON YOUR DEPLOYMENT AND WHAT YOU WANT, WHETHER YOU WANT IT LOCALLY OR SOMEONE HOSTED FOR YOU WE PROVIDE OPTIONS AND CUSTOMERS ARE FREE TO PICK AND CHOOSE WHAT THEY WANT OVER HERE. OKAY. ARCHITECTURE, HOW DID WE MAKE THIS HAPPEN? YOU HAVE THE MICROSOFT TEAMS INFRASTRUCTURE AND THIRD-PARTY DEVICES ON THE OTHER END. IN THE SKYPE FOR BUSINESS WE HAVE DONE AN INTERRUPT, AND TEAMS TALK SO WHAT WE HAVE PROVIDED IS THAT BLUE BOX THAT YOU SEE UP HERE. THE COMMUNICATION SERVICES, SDK. THIS IS SERVICES BASED SDK THAT’S FOR CALLING ASK MEETING AND WHAT IT DOES IS IT PROVIDES NOT JUST VIDEO INTERRUPT CAPABILITIES, YOU CAN USE SDK TO DO A BUNCH OF SCENARIOS, IVR SKE NARES USE AND OTHERS, IT TALKS TO THE GRAPH API ON THE SERVICE SIDE WHICH ACTS AS A FACADE FOR OUR TEAMS SERVICES. WHAT OUR PARTNERS HAVE DONE IS USED THE FRAMEWORK INFRASTRUCTURE AND CREATED A TEAMS INTERRUPT BOT. THIS IS THE BACK-TO-BACK AGENT IF I CAN PUT IT THAT WAY THAT ACTUALLY CONNECTS THE NATIVE INSTALLING AND CAPABILITIES INTO THE TEAMS REQUIRED AND UNDERSTANDABLE MEDIA TRANSLATION OVER THERE. ALSO WHAT IS IMPORTANT IS AS I MENTIONED, THIS IS DEPLOYED IN AZURE AND THIS IS SCALED FOR SCORE, TEAMS AS A SERVICE USES AZURE FOR IT’S BACK-END STRUCTURE AND WE HAVE DONE A LOT OF OPTIMIZATION FOR TEAMS TO WORK ON AZURE AND THAT’S TRON LATED INTO THE COMMUNICATION SERVICES SDK. OUR PARTNERS ARE HOSTING THE TEAMS INTERRUPT BOT IN AZURE ON WINDOWS MACHINES AS REQUIRED AND AS THE REST OF THE TEAMS INFRASTRUCTURE AS WELL. FOR THE REST OF THE CAPABILITIES, THERE YOU GO BY MANAGED SOLUTION OR CUSTOMER SOLUTION, IF IT IS MANAGED HOSTED IN AZURE VERSUS YOUR OWN CUSTOMER’S DEPLOYMENT AS WELL. THAT’S SORT OF THE HIGH-LEVEL ARCHITECTURE THERE. ALL RIGHT, NEXT COMES THE QUESTION IS CLOUD VIDEO INTERRUPT RIGHT FOR YOUR AIRINGS. WE SPOKE ABOUT WHAT IT IS AND WHAT DOES IT DO IN THE GENERAL PURPOSE AND WHY IT IS IMPORTANT, BUT WHAT DOES THIS MEAN FOR YOU? ALL RIGHT. SO-SO BASICALLY WHAT IS THE WORK FLOW THAT YOU ARE TRYING TO DO? THERE ARE MIGRATION PARTS AND SERVICES FOR YOU TO GET INTO TEAMS AND START USING IT. PERHAPS YOU ARE AN EXISTING TEAMS USER THAT’S USING TEAMS FOR CHAT AND COLLABORATION BUT NOT FOR THE UC SPACE AND YOU HAVE THESE INVESTMENTS IN THIRD-PARTY SYSTEMS AND YOU WANT TO BRING THEM ALONG. ANOTHER ITEM IS SKYPE FOR BUSINESS COMMERCE, YOU HAVE EXISTING INTERRUPT, WE HAVE OUR EXISTING PARTNERS THAT PROVIDE INTERRUPT FOR SKYPE FOR BUSINESS SERVICES AS WELL AND YOU WANT TO INTEGRATE AND START USING MICROSOFT TEAMS. SO TWO OF OUR PARTNERS ARE COMING ALONG IN THIS TEAMS JOURNEY SO THAT IS A POTENTIAL OPTION IF YOU STILL DON’T WANT TO REPLACE YOUR THIRD-PARTY DEVICES. SKYPE FOR BUSINESS ONLINE. TODAY WE HAVE POLYCOM THAT WORKS FOR SKYPE FOR BUSINESSES ONLINE AND WORKS FOR MICROSOFT TEAMS. WE HAVE ALL THREE PARTNERS THAT YOU CAN EVALUATE AND LOOK AT AS YOU START THINKING ABOUT THAT WORKFLOW. PERHAPS YOU ARE COMPLETELY SYS CO DEPLOYMENT YOU USE OTHER THINGS OTHER THAN MICROSOFT OFFICE 365 BUT THIS IS THE FIRST TIME THAT YOU ARE DABBING INTO THE TEAMS UC SPACE SO THAT’S A POTENTIAL THAT YOU COULD LOOK AT. FOR CUSTOMERS SPECIFICALLY THEY HAVE A LOT OF INVESTMENT NOT JUST IN CISCO AND FOR THOSE GUYS WE SEE THIS AS A POTENTIAL COST SAVER IN ORDER TO DO THAT MIGRATION. THE OTHER WAYS MIGHT BE YOU HAVE A COMBINATION OF — WE SEE A LOT OF CUSTOMERS IN THIS SCENARIO, YOU HAVE HYBRID SKYPE FOR BUSINESS, SKYPE FOR BUSINESS ONLINE, CISCO AND A BUNCH OF COMBINATIONS AND YOU ARE SLOWLY MAKING YOUR JOURNEY INTO TEAMS. MAYBE YOU ARE A ZOOM CUSTOMER OR WEB EX CUSTOMER AND YOU WANT TO COMPLETELY MIGRATE INTO TEAMS SO THAT IS A COUPLE OF POSSIBLE WORKFLOWS YOU COULD LOOK AT. KEEP BUSINESS CONSIDERATIONS HERE, SO LIKE I SAID, A FEW HIGHLIGHTS, THIS IS NOT A COMPREHENSIVE LIST BUT SOME OF THE QUESTIONS I WANT YOU GUYS TO ASK YOURSELVES. IF YOU ARE A CISCO ENVIRONMENT ALREADY DID YOU HAVE A LOT OF THOUSANDS OF GEAR OR CAN YOU LOOK AT REPLACING THEM WITH TEAMS NATIVE DEVICES? THAT’S AN OPTION. IF YOU ARE A CISCO SHOP IT’S GOING TO BE HARD FOR YOU TO MAKE A CHANGE OVERNIGHT, THEN ASK YOURSELF, DID YOU WANT TO RUN YOUR OWN VIDEO STRUCTURE, CISCO FALLS INTO THAT ENVIRONMENT. IF YOU WANT TO HOST YOUR OWN STRUCTURE, COMBINATION OF BOTH ON-PREM SERVICES AS WELL AS YOUR OWN AZURE CLOUD THAT’S AN OPTION OR YOU COULD GO WITH HOSTED SOLUTIONS WITH ANY OF OUR THREE PARTNERS THERE, SO THAT’S AN OPTION YOU CAN PICK AND CHOOSE. LIKE I SAID, IT ALL DEPENDS ON WHAT IS IT THAT YOU WANT TO ACHIEVE FOR YOUR BUSINESS. WE HAVE TWO THAT ARE EXISTING PROVIDERS THAT ARE MIGRATING, COMING ALONG WITH US INTO THE TEAMS JOURNEY. IF YOU ARE EXISTING INTERRUPT PROVIDER FOR SKYPE FOR BUSINESS, FOR EXAMPLE, AT 35 YOU COULD STICK WITH THE SAME INTERRUPT PROVIDER. THOSE ARE THE OPTIONS YOU CAN LOOK AT, AGAIN, NATIVE INTEGRATED ROOMS, ONE TOUCH DIAL OR DID YOU WANT TO DO DIRECT DIAL, OTHER OPTIONS THAT ARE AVAILABLE OVER THERE. ANOTHER CRITICAL CONSIDERATION WOULD BE FOR YOUR VIDEO AND INFRASTRUCTURE, DID YOU WANT REALTIME MONITORING REPORTING AND THOSE CAPABILITIES AS WELL? GOVERNMENT AND SOLVING IN CLOUDS IF ANYONE IS A GOVERNMENT CUSTOMER THAT WILL BE A DEFINITE REQUIREMENT THAT YOU HAVE A SEPARATE DEPLOT DEPENDING ON WHICH GCC YOU ARE IN AND LAST BUT NOT LEAST IF YOU ARE A LARGE MULTINATIONAL COMPANY AND YOU HAVE THIRD-PARTY COMPANIES, OTHER COMPANIES THAT ARE JOINING IN THE VTC DEVICES YOU MAY BE A TEAMS ECOSYSTEM BUT YOU DO HAVE SOME OF THEM JOINING INTO YOUR MEETINGS YOU WOULD NEED TO BE ABLE TO SUPPORT THOSE AS WELL. CLASSIC EXAMPLE HERE IS MICROSOFT. MICROSOFT DOES LINKEDIN, WE ARE RUNNING INTO THIS SCENARIO WHERE MICROSOFT HAS FULL-ON TEAMS UC GEAR AND LINKEDIN HAS A LOT OF GEAR AND THEY JOINED INTO MICROSOFT MEETINGS USING VIDEO INTERRUPT. THAT’S A SUCCESS STORY FOR YOU THERE. ONCE YOU HAVE YOUR CONSIDERATIONS AND WHETHER THIS IS THE RIGHT THING FOR YOU OR NOT, HOW DO YOU GET STARTED DEPLOYING VIDEO INTERRUPT IN YOUR ORGANIZATION? I SPOKE ABOUT THE FIRST ONE AT LENGTH WHICH IS HOW DO YOU PLAN FOR IT? LIKE I SAID, WE HAVE THREE PARTNERS, GO TO THE BOOTH AND TALK TO THEM AND SEE WHAT IS THE RIGHT OPTION FOR YOU. ONCE YOU HAVE IDENTIFIED THE PARTNER THERE IS A SET OF KEY ASPECTS YOU WOULD NEED TO DISCUSS WITH THEM. WHICH IS WHAT KIND OF LICENSING DID YOU WANT? DO YOU HAVE, LIKE, TEN DEVICES THAT YOU JUST WANT TO, YOU KNOW, MAKE THEM USABLE? VERSUS DO YOU HAVE 500 DEVICES. DO YOU HAVE A FEW SET OF USERS THAT ALWAYS GENERATE OR THAT ALWAYS CREATE MEETINGS THAT YOU HAVE YOUR THIRD PARTY, YOUR OTHER COMPANIES ARE JOINING? FOR EXAMPLE, IF YOU ARE AN EXEC AND YOU ARE TRYING TOP INVITE EXECS FROM OTHER COMPANIES IT IS LIKELY THAT THEY WILL END UP JOINING WITH OTHER THIRD-PARTY DEVICES. FOR THOSE SCENARIOS, IT TENDS ON YOUR USER BASE. YOU HAVE OPTIONS HERE. USER BASE, OR YOUR ENTIRE COMPANY, DEPENDING ON WHAT YOU WANT FOR YOUR ORGANIZATION. ONCE YOU PLAN — LET ME GO TO THE NEXT SLIDE OVER HERE. THE OTHER THING FOR PLAN AS WELL AS IF YOU WANT TO HOST YOUR OWN VIDEO INFRASTRUCTURE, WHAT IS THE CAPACITY? HOW MANY CONCURRENT CALLS DID YOU WANT TO MAKE WITH THE SERVICE THAT YOU ARE HOSTING? THEN ASK IS YOUR ENVIRONMENT, YOUR CUSTOMER ENVIRONMENT READY FOR TEAMS FOR UC? ON TOP OF THAT, IS IT READY FOR PARTNER REQUIREMENTS FOR INTERRUPT? THOSE ARE THE CONSIDERATIONS THAT YOU WOULD NEED. SO ONCE ALL THAT PLANNING WORK IS DONE, NEXT STEP WOULD BE TO CONFIGURE. SO THERE ARE A FEW PIECES OF INFORMATION NEEDED FOR CONFIGURATION AND I WILL GO INTO A LITTLE BIT OF DETAIL MRFRP FEW THINGS THAT YOU WOULD NEED IS WHAT WE CALL A TENANT KEY. A TENANT KEY IS NOTHING BUT A SHORT REPRESENTATION OF YOUR OFFICE 365 VIEW. WITHOUT USING DIRECT DIAL THEY WOULD NEED TO TYPE IN YOUR TENANT KEY AND THE FLOW IS YOU GET TO THE PARTNER SERVICE OR THE INTERRUPT PART AND THEN YOU GIVE THE CONFERENCE NUMBER WHICH IS THE SAME FLOW WE HAVE FOR OUR CONFERENCING AS WELL. YOU DO THE 1-800 NUMBER AND YOU GIVE YOUR CONFERENCE SITE THE EXACT MODEL WE ARE FOLLOWING FOR INTERRUPT. ONCE YOU DECIDE ON THE PARTNER, THE PARTNER WILL PROVIDE YOU WITH A TENANT KEY AND THE APP ID FOR CERTAIN SCENARIOS, LIKE IF YOU WANT TO BY-PASS THE LOBBY OR FOLLOWING MEETING ENVIRONMENTS SET UP IN YOUR ENVIRONMENT. THERE ARE A FEW CONFIGURATION STEPS DONE. YOU NEED TO HAVE A CERTAIN SET OF PORTS OPEN, MAKE SURE YOUR FIREWALLS ARE SET CORRECT AND THOSE ARE CONFIGURATION DETAILS. AGAIN YOU WILL NEED TO WORK WITH YOUR PARTNER TO SPECIFICALLY GO WITH WHAT ARE THE REQUIREMENTS IN YOUR ORGANIZATION. UM, LAST BUT NOT THE LEAST, IF YOU DO WANT — STYLE CAPABILITIES, YOU WOULD NEED TO HAVE YOUR DEVICES IN IAD AND AED AND NEEDS A BACKING EXCHANGE BEHIND IT. IF YOU WANT TO GO WITH INTERRUPTION THAT’S SOMETHING YOU COULD LOOK AT. PROVISIONING AND CONSENT. YOUR PLAN YOU HAVE CONFIGURED, HOW DO YOU PROVISION IT? PROVISIONING CVI IS IS VERY SIMPLE. AS A TENANT ADMIN YOU NEED TO RUN THROUGH A HANDFUL OF COMMANDS AND I WILL WALK YOU THROUGH THEM IN A MINUTE. RUN THROUGH THE COMMANDS, PUT IN THE CONFIGURATIONS THAT YOUR PARTNER GIVE ONCE YOU DO THAT, TEAMS RECOGNIZES THAT YOU HAVE ENABLED AAN END USER FOR VIDEO DROP AND ADDS THOSE ADDITIONAL COORDINATES. THE END USER HAS TO DO NOTHING SPECIAL, NEITHER DOES THE ADMIN EXCEPT FOR PROVISIONING CERTAIN USERS. THE FIRST PART TAKES ACTION BASED ON THE CONFIGURATION INSIDE OF THE TEAMS ECOSYSTEM. ONE MORE THING TO TALK ABOUT IS CONSENT. SO ONCE YOU HAVE DONE ALL THE PROVISIONING, THE MOST IMPORTANT STEP IS THAT YOU ACTUALLY ARE CONSENTING FOR THE TEAMS INTERRUPT FOR THE VIDEO INTERRUPT BOT IN ORDER TO JOIN TEAMS MEETINGS. BASICALLY THAT’S THE PERMISSION YOU ARE GIVING AND THOSE ARE THE FOUR PERMISSION SETS THAT YOU ARE GIVING PERMISSION TO. IF YOU REWARD THESE PERMISSION SETS, AZURE GIVES YOU CAPABILITY TO REVOKE PERMISSION BUT IF YOU DO END-TO-END PERMISSION WILL NOT WORK. I WANT TO BE CLEAR THESE CON CENTS ARE NECESSARY AND YOU WILL HAVE TO PROVIDE THEM IN YOUR ORGANIZATION AS A GLOBAL ADMINISTRATOR. SCHEDULING MEETING NATIVELY, AFTER ALL THE STEPS NOW I AM THE END USER. WHAT DO I HAVE TO DO IN ORDER TO MAKE THIS JUST SHOW UP IN MY OUTLOOK CLIENT? BASICALLY ALL I DO IS GO TO MY OUTLOOK TEAMS ADD-IN, AND I CAN SAY SCHEDULE. I CAN DO IT ON MY DESKTOP OR MY MOBILE TODAY. WHAT I HAVE HERE IS TEAMS COORDINATES AND THE PORTION YOU SEE AT THE BOTTOM IS WHAT TEAMS SCHEDULING SERVER ACTUALLY ADDS TO YOUR MEETING INVITE JUST LIKE HOW IT ADDS PTSN COORDINATES. AS SOON AS YOUR UNIT IS ENABLED YOU WILL SEE THE COORDINATES OVER THERE. NOW I SPOKE ABOUT A TENANT KEY AND THAT’S BASICALLY NOTHING ABOUT HOW DO YOU ACTUALLY REACH THE PARTNER SERVICE. EFFECTIVELY WHAT YOU ARE DOING WHEN YOU TYPE IN A TENANT KEY IN A VTC DEVICE IS ACTUALLY REACHING THE PARTNER’S SERVICE WHICH IS AN IVR IF YOU GO THROUGH THE FULL PROCESS AND THEN YOU ARE GIVEN THE CONFERENCE ID. THAT CONFERENCE ID OVER HERE IS GENERATED NATIVELY BY THE TEAMS SERVICE, NOT PROVIDED TO YOU BY THE PARTNER. SO THAT’S SIMILARLY GENERATED AS THE CONFERENCE ID SO THAT’S OUT OF THE PROCESS THERE. ULTIMATELY WE DO SEE DIAL IN INFORMATION AGAIN AND WE WERE PLAYING AROUND WITH THIS DEVICE IN ORDER TO DO DIRECT DIAL. DEPENDING ON THE DEVICE, AGAIN, THE WAY YOU DIAL IS SORT OF DIFFERENT AND CUSTOMIZABLE, SOMETIMES YOU NEED A DOT, SOMETIMES A STAR, SOMETIMES A FORM OF DIRECT DIAL, SO THIS GIVES YOU ALL OF THE ADDITIONAL INFORMATION AND, YEAH. NOW, HOW DO YOU JOIN TEAMS MEETINGS? THERE ARE POTENTIALLY THREE WAYS YOU COULD JOIN TEAMS MEETINGS WITH AN IVR DEVICE. EITHER YOU COULD JUST GIVE THE TENANT KEY AND YOU CAN HIT OUR PARTNER SERVICE WHICH IS THE FIRST IMAGE THAT I HAVE PUT OVER THERE, OR YOU COULD JUST USE DIRECT DIAL WHICH IS ONE OF THE DIRECT DIAL EXAMPLES. THE EASIEST ONE FOR YOU TO DO IS HAVE INTEGRATED ROOM SYSTEMS WHICH IS HAVE THEM HAVE THE SCHEDULE VIA EXCHANGE AND YOU WOULD BASICALLY JUST SEE A “JOIN” BUTTON AND THAT WOULD IMMEDIATELY JOIN YOU INTO THE TEAMS MEETINGS AND YOU CAN ENGAGE WITH USERS. BASICALLY HOW? I GAVE A DEMO OF AUDIO AND VIDEO AND WE HAVE SCREEN SHARING THAT YOU CAN DO FROM YOUR VTC DEVICE OR FROM YOUR TEAMS CLIENT. SO BASICALLY YOU HAVE A FULL-FLEDGED ABILITIES AND YOU CAN DO IT WITH ALL OF YOUR DEVICES. ALL RIGHT, ONE MORE DEMO. SO, FOR THIS DEMO, INSTEAD OF TYPING IN ALL OF THE COMMANDS I’M GOING TO USE MY CHEAT SHEET. I HAVE SET THE FIRST THREE UP. SO THIS IS BASICALLY IN THE SAME MODULE THAT YOU HAVE FOR ALL OF THE OTHER TEAMS COMMANDS AS WELL. AND THIS IS AVAILABLE TODAY PUBLICLY IF YOU GUYS WANTING TO AND TRY THIS. SAVING SOME TIME. MY PUBLISHER HAS FROZEN UP HERE. I’M GOING TO TRY AGAIN. FOR SOME REASON I’M NOT ABLE TO CONNECT TO MY REMOTE PUBLISHER MODULE OVER HERE SO I’M GOING TO SWITCH BACK FOR NOW. I THINK THAT’S ABOUT WHAT I HAVE FOR THE ACTUAL PRESENTATION. I CAN TAKE Q AND A IF YOU GUYS HAVE IT. AND I DO HAVE OUR PARTNERS AVAILABLE HERE AS WELL FOR QUESTION AND ANSWER.>>AUDIENCE MEMBER: SO THE QUESTION IS YOU SHOWED THE SCREEN SHOT OF HOW IT LOOKS LIKE ON A TEAM SLIDE, BUT THE QUESTION IS ON OTHER END, ON THE VTC SIDE WHAT’S THE RESOLUTION WHEN YOU HAVE THE PARTY PUTS IN THE PICTURE PLUS THE CONTENT. WHAT DOES THE RESOLUTION LOOK LIKE AND WHAT’S TEMPLATE?>>SRIVIDHYA CHANDRASEKARAN: WE GIVE UP TO 1080 RESOLUTION BACK TO THE DEVICE. IF YOUR SCREEN SIZE IS CAPABLE OF HANDLING IT, JUST AS IN TEAMS IF YOU ARE DIVIDING IT INTO HALF OR HAVE A FULL VIEW WE ADJUST RESOLUTION ACCORDINGLY. SPECIFICALLY FOR YOUR — AND IT DEPENDS ON THE SIZE YOU HAVE ON THE TEAMS CLIENT SIDE AS WELL. SO SPECIFICALLY FOR YOUR PARTICULAR DEVICE, HOW THE RESOLUTION WILL FLOW THROUGH THAT’S A DYNAMIC CHANGE BUT WE GIVE THE 1080 RESOLUTION.>>AUDIENCE MEMBER: THE REASON I’M ASKING IS SAY IF THERE IS CONTENT AND FOUR OR FIVE PEOPLE VIDEO STREAMS GOING INTO ONE SO NOW YOU HAVE A VIDEO OF FOUR OR FIVE PEOPLE, AND A CONTENT ALL COMING INTO ONE PICTURE.>>SRIVIDHYA CHANDRASEKARAN: CORRECT.>>AUDIENCE MEMBER: IS IT GOING TO BE — DUMB IT DOWN A LITTLE BIT OR IT’S FULL 1080P?>>SRIVIDHYA CHANDRASEKARAN: WE DO NOT DEGRADE THE VIDEO QUALITY WHEN YOU HAVE CONTENT SHOWING UP, HOWEVER, FROM AN END USER EXPERIENCE PERSPECTIVE YOU ARE LITERALLY LOOKING AT A PICTURE THAT’S ABOUT THAT SMALL SO THAT’S SORT OF HOW IT’S GOING TO LOOK FOR YOU UNLESS YOU HAVE A DIFFERENT CONFIGURATION WHERE YOU ARE SEEING BOTH.>>AUDIENCE MEMBER: I WANTED TO CLARIFY THE DIFFERENCE IN THE ARCHITECTURE BETWEEN THE THREE OPTIONS. SO POLYCOM REAL CONNECT THAT’S A CSP-TYPE MODEL AND THEY DO THE CONFIGURATION AND THE LICENSE IS INJECTED NATIVELY INTO THE PORTAL?>>SRIVIDHYA CHANDRASEKARAN: WE ARE NOT USING ANY CSP MODEL AT ALL FROM A LICENSING PERSPECTIVE FOR TEAMS. WE DID THAT FOR SKYPE FOR BUSINESS ONLINE. WE HAD A BUNCH OF ISSUES AND CUSTOMER COMPLAINTS FOR HAVING USED THE CSP MODEL SO FOR TEAMS FOR ALL THREE PARTNERS, IT’S PURELY PROVISIONING BASED ON POWERSHELL.>>AUDIENCE MEMBER: SO ALL THREE HAVE THE SAME OPTION WITH PIX IP, I CAN INSTALL IT WHEN I WANT TO USE T RIGHT?>>SRIVIDHYA CHANDRASEKARAN: CORRECT, THE DIFFERENCE BETWEEN IS POLYCOM AND BLUE JEANS ARE CAN COMPLETELY HOSTED SERVICES AND FOR PIX IP YOU HAVE AN OPTION OF HOSTING YOUR TEAM’S BOT IN AZURE AND THE REST OF THE INFRASTRUCTURE EITHER ON YOUR OWN SERVERS OR YOU CAN PUT THE ENTIRE THING IN THE — IN YOUR OWN AZURE AS WELL. SO YOU HAVE A FEW OPTIONS.>>AUDIENCE MEMBER: I TALKED TO THE PIX IP AND BLUE JEANS SEPARATELY AND SEEMS LIKE THEY HAVE A DIFFERENT LICENSING MODEL FOR EXAMPLE PIX IP THEY COUNT ON CONCURRENT ACTIVE CALL BUT WHEN WE TALK TO BLUE JEANS THEY COUNT ON THE KNOWLEDGE WORKERS, HOW MANY HOSTS YOU ENABLE. SO WHEN WE WANT TO INTERCONNECT OUR OLD CISCO SYSTEM, YOU KNOW, THE VIDEO SYSTEM WITH MICROSOFT TEAMS DO WE NEGOTIATE THE PLAN WITH THE PLANNER SEPARATELY OR JUST MICROSOFT?>>SRIVIDHYA CHANDRASEKARAN: THE WAY IT OPERATES IS WE HAVE ENABLED ENGINEERING ADVICE WITH OUR PARTNERS AND THE SOLUTION IS VALUABLE FOR US AND WE CONSIDER IT LIKE A CORE VALUE PROVIDED FOR CUSTOMERS HOWEVER AS IT COMES TO LICENSING AND THE PRICING, THAT’S SOMETHING YOU PROVIDE WITH THE PARTNER AND YOU DISCUSS WITH THEM. LIKE I SAID, WE HAVE SEVERAL OPTIONS AVAILABLE, ACROSS ALL THREE PARTNERS WE HAVE CONFERENCE, SITE WIDE AS WELL AS USER BASE BUT DEPENDING ON YOUR REQUIREMENT A FEW PARTNERS SUPPORT ONE AND A FEW PARTNERS SUPPORT THE OTHER AND IT’S ONE OF THE BUSINESS CONSIDERATIONS YOU NEED TO KEEP IN MIND >>AUDIENCE MEMBER: IF I CHOOSE PIX IP IS THAT MICROSOFT SIDE THEY CHARGE LICENSING FEES OTHER THAN THE E3?>>SRIVIDHYA CHANDRASEKARAN: NO WHAT YOU ARE GETTING IS ANY BASIC TEAMS SKILL, BECAUSE YOU JUST NEED THE END USER TO USE TEAMS, RIGHT?>>AUDIENCE MEMBER: RIGHT.>>SRIVIDHYA CHANDRASEKARAN: IN ORDER TO CREATE THOSE MEETINGS. ALL WE REQUIRE IS ANY BASIC TEAMS TEAMS SKU FOR ANY TEAM, WE ARE NOT INVOLVED IN THE BACK-END SITE.>>AUDIENCE MEMBER: SO WHAT ABOUT WHERE WE HAVE CISCO, TRYING TO SHOVE THEM OUT THE DOOR BECAUSE THE STUFF IS AGING BUT WE HAVE PARTNER ORGANIZATIONS THAT ARE NOT MOVING TO TEAMS, SO IF WE GET RID OF CONFERENCING ROOM EQUIPMENT THAT’S NONTEAMS SO NONSURFACE HUB, HOW ARE WE — EVEN IF WE DEPLOY ANY OF THESE THREE DO WE HAVE OUTBOUND STANDARD IDENTIFY BASED CONNECTION INTO OUR PARTNERS SO CAN I CONDUCT A CISCO HOST CALL WITH THE A PARTNER.>>SRIVIDHYA CHANDRASEKARAN: SO I’M GLAD YOU ASKED THE QUESTION. OUR GOAL IS TO ENABLE THIRD-PARTY DEVICES CONNECT INTO TEAMS MEETINGS. OUR GOAL IS NOT TO ENABLE TEAMS CLIENT TO JOIN THIRD-PARTY MEETINGS. [CHUCKLES]>>AUDIENCE MEMBER: YOU SHOWED ONE SLIDE WHERE YOU COULD DIAL INTO TEAMS MEETINGS ALSO, WAS THAT THE PARTNER PROVIDED OR IS THAT PROVIDED BY MICROSOFT AS YOU BUY ITS SERVICE OR IS IT SOMETHING THAT YOU DO BY DIRECT ROUTING?>>SRIVIDHYA CHANDRASEKARAN: NO, YOU DON’T NEED TO SET IT UP BY DIRECT ROUTING THE IVR IS ADDRESSING THE PARTNER SERVICE SO WHEN YOU DIAL ALL SAYS IS “WELCOME TO POLYCOM” OR SOMETHING LIKE THAT, BASICALLY YOU ARE ENCOUNTERING THE THIRD-PARTY SERVICE AND ONCE YOU DO THAT YOU ARE CONNECTED INTO THE MEETING.>>AUDIENCE MEMBER: DO YOU HAVE ANY PLAN TO ENABLE DIRECT OUTBOUND CALL FROM TEAM TO A CISCO DEVICE?>>SRIVIDHYA CHANDRASEKARAN: WE HAVE A BUNCH OF THOSE SCENARIOS THAT WE ARE CONSIDERING FOR THE CURRENT RELEASE WE HAVE MEETING JOIN CAPABILITIES.>>AUDIENCE MEMBER: IS IT POSSIBLE TO TAYLOR THE INVITE? WE FOUND IS IMPORTANT TO TAILOR THE INVITE SO WHEN THE EMAIL IS DELIVERED TO SOMEONE WHO IS USED TO USING A VC UNIT THEY KNOW WHAT TO DO WHICH IS SLIGHTLY DIFFERENT THAN WHAT THEY WOULD NORMALLY DO. FIRST THING. SECOND THING IS DO YOU HAVE MECHANISMS TO CONNECTOR HAVE ANY OF THE PARTNERS DEVELOPED MECHANISMS TO CONNECT TO ANY OF THE HISTORICAL VIDEO CONFERENCING SERVICES SO YOU CAN BOOK IT AND MAKE IT A PRE-LIVE JOIN IN CONFERENCE? IF YOU GO AND LOOK AT THE CISCO WORLD’S WHERE THEY USE TMS THEY HAVE SERVICES THAT LIGHT UP AND YOU JOIN THEM ALL TOGETHER AUTOMATICALLY AS A SERVICE AND EXECUTIVES ARE NOT USED TO WALKING INTO CONFERENCE ROOMS AND HAVING TO START DIALING NUMBERS, IT’S NOT A GOOD USE EXPERIENCE.>>SRIVIDHYA CHANDRASEKARAN: GOT IT. FOR THE FIRST QUESTION YOU ASKED, WHETHER YOU CAN CUSTOMIZE THE MEETING INVITE, THAT TODAY YOU ARE NOT ABLE TO CUSTOMIZE THE MEETING INVITE FOR THE REASON THAT WE WANT FROM AN END USER PERSPECTIVE IT NEEDS TO LOOK LIKE TEAMS MEETING. AT THE MOMENT WE DON’T WANT IT TO LOOK LIKE ANOTHER THING — >>AUDIENCE MEMBER: IT’S NICE TO BRAND IT AND PUT ALL YOUR OWN STUFF IN THERE AND GIVE INSTRUCTION. >>SRIVIDHYA CHANDRASEKARAN: CORRECT AND ACTUALLY I HAVE GOTTEN THAT FEEDBACK SO THAT’S GREAT TO HEAR THAT THERE ARE MORE PEOPLE INTERESTED IN IT. AS OF TODAY YOU CANNOT CUSTOMIZE THE MEETING INVITE THERE. YOUR SECOND QUESTION OF WHETHER YOU CAN HAVE OTHER CONFERENCING SYSTEMS, IF I UNDERSTOOD YOUR QUESTION — >>AUDIENCE MEMBER: THE QUESTION IS TYPICALLY WITH ONE OF THESE TEAMS, EVENT SOURCE OR SOMETHING LIKE THAT IT DIALS THE NUMBER AUTOMATICALLY AND THEN YOU PUT A PING CODE OR SOMETHING LIKE THAT IN TO IDENTIFY THE CONFERENCE YOU’RE GOING INTO. AND AN COMPAQ IS NOT GOING — AN EXEC IS NOT GOING TO WALK INTO A CONFERENCE ROOM AND DO THAT. THEY HATE THAT STUFF >>SRIVIDHYA CHANDRASEKARAN: THAT’S THE REASON YOU CAN USE ONE TOUCH DIAL. YOU CAN DIRECTLY HAVE A JOIN POTENTIAL. LIKE IF YOU JOIN NATIVE TEAMS ROOMS SYSTEMS NOW YOU DON’T HAVE TO JOIN A URL OR ANYTHING, IT SHOWS UP AS A “JOIN” BUTTON AND THAT DEMO IS IN OUR PARTNERS’ BOOTHS FOR ONE-TOUCH DIAL SO TAKE A LOOK AT THAT.>>AUDIENCE MEMBER: CVI ADD-ON WHICH IS REQUIRED FOR SKYPE FOR BUSINESS ONLINE IT’S NOT REQUIRED FOR TEAMS?>>SRIVIDHYA CHANDRASEKARAN: NO LICENSE AT ALL, YOU NEED TO GO INTO THE ADMIN PORTAL AND SET UP, IT’S PURELY POWERSHELL. NO CVI REQUIREMENT FROM THE ADMIN PORTAL SITE >>AUDIENCE MEMBER: DOES THAT LICENSE REQUIRE OR NOT — IT IS REQUIRED IN SKYPE FOR BUSINESS — >>SRIVIDHYA CHANDRASEKARAN: LET ME CLARIFY. FROM A LICENSING PERSPECTIVE, LIKE I SAID YOU WOULD HAVE TO TALK TO PARTNERS DIRECTLY TO SEE WHAT LICENSING WILL WORK FOR YOU. ENABLEMENT IS THROUGH POWERSHELL AND THERE IS NO OTHER ADDITIONAL LICENSING OR ANYTHING YOU NEED TO SET UP FROM THE ADMIN PORTAL.>>AUDIENCE MEMBER: FROM WHAT I UNDERSTOOD FOR THE BLUE JEANS SPECIFICALLY THEY HAD TO HAVE PERMISSION TO — FOR THE LICENSE MANAGEMENT — >>SRIVIDHYA CHANDRASEKARAN: THEY DON’T NEED — AND BY THE WAY I THINK FOR SKYPE FOR BUSINESS ONLINE TODAY WE HAVE POLYCOM. TODAY WHAT WE HAVE FOR SKYPE FOR BUSINESS ONLINE IS THAT TENANT KEY IS PUT IN YOUR AZURE AD DIRECTORY. YOU ARE GIVING PERMISSION TODAY IN SKYPE FOR BUSINESS ONLINE JUST FOR THAT PURPOSE WHICH CAN BE REWORKED AFTER IT IS DONE. FOR TEAMS, THOUGH, THE PROVISIONING FOR THE TENANT KEY YOU ARE DOING THROUGH POWERSHELL SO YOU ARE RUNNING IT IN YOUR OWN SCOPE SO YOU DON’T NEED TO GIVE PERMISSION TO POLYCOM FOR YOUR DIRECTORY OR ANYTHING. WHAT YOU ARE GIVING IS CONSENT FOR THE BOT TO JOIN THE MEETING SO EFFECTIVELY AM YOU ARE SAYING I’M OKAY WITH MY CVA BOT TO JOIN THE MEETINGS >>AUDIENCE MEMBER: SO NOTHING LIKE A GLOBAL — >>SRIVIDHYA CHANDRASEKARAN: NO, YOU DON’T NEED GLOBAL ADMIN PERMISSION. THOSE ARE WHAT WE GOT FROM THE PREVIOUS ONE SO WE TOOK CARE OF THOSE REQUIREMENTS IN THIS ONE.>>AUDIENCE MEMBER: DOES ANY OF THE SOLUTIONS DELEGATE ACCESS?>>SRIVIDHYA CHANDRASEKARAN: DELEGATE ACCESS IS THROUGH OUR SCHEDULING SERVICE AND ALL THREE OF THEM SUPPORT DELEGATED ACCESS.>>AUDIENCE MEMBER: IF I’M A USER LICENSED FOR THE INTEROP AND I SCHEDULE A TEAM MEETING AND I GET THE OUTLOOK GENERATED CONFERENCE I DER FOR TEAMS AND IT LOOKS LIKE I GET ANOTHER VTC CONFERENCE ID ARE THOSE GOING TO MATCH OR BE DIFFERENT?>>SRIVIDHYA CHANDRASEKARAN: TODAY THEY ARE DIFFERENT. BECAUSE WE HAVE TWO DIFFERENT SERVICES THAT ARE GENERATING THOSE CONFERENCE IDs AND WE HAVE DIFFERENT REQUIREMENTS LIKE BASED ON WHETHER — SO ONE IS A TENANT-BASED SCOPE FOR OUR WEEKLY CONFERENCE ID. FOR OUR PSTN CONFERENCE ID IT’S THE BRIDGE NUMBER-BASED SCOPE AND A TENANT CAN HAVE DIFFERENT BRIDGE NOBODY’S IT’S A DIFFERENT LOGIC AND TODAY THEY ARE NOT THE SAME BUT IT AHAS TO COME TO US FOR A FEATURE ASK TO SEE IF THEY ARE DEFINITELY THE SAME AND WE WILL LOOK AT IT >>AUDIENCE MEMBER: THAT WILL DEFINITELY DEPEND ON WHICH ONE I USE IF I HAVE TO TYPE IN A CONFERENCE ID.>>SRIVIDHYA CHANDRASEKARAN: YEP.>>AUDIENCE MEMBER: SO IF I UNDERSTAND CORRECTLY YOU ARE SAYING THAT YOU PREFER — THE MODEL IS THAT THE MEETING ARE HOSTED ON TEAMS SO YOU WANT THE PARTY TO JOIN IN TEAMS.>>SRIVIDHYA CHANDRASEKARAN: CORRECT. >>AUDIENCE MEMBER: SO WANT TO MAKE SURE THEN WHATEVER END POINT WE ARE JOINING IN AND WHATEVER THE PARTNER WE ARE CHOOSING, ALL OF THE SUDDEN THE TEAMS FEATURES ANNOUNCED AROUND STREAMING AND RECORDING THERE IS NO THEN LIMITATION ON THOSE FEATURES?>>SRIVIDHYA CHANDRASEKARAN: ON THE TEAM SITE YOU SHOULD STILL BE ABLE TO RECORD THOSE MEETINGS AND ALL OF THAT. AS WE START ADDING MORE TAILORED FEATURES INTO TEAMS THEN THERE MAY BE A FEW UPDATES WE NEED TO MAKE TO THE SERVICE BECAUSE IT’S FUTURE ISTIC WE DON’T KNOW WHAT THEY WILL BE ABLE TO BE YET. OKAY, THANK YOU GUYS. [APPLAUSE]

Managing devices with Microsoft Intune: What’s new and what’s next – BRK3036


>>GOOD MORNING.9:00 A.M.>>PRETTY EARLYIN THE WEEK TO
BE ASLEEP.I AM PAUL MAYFIELD AND I LEAD ATEAM FOR MICROSOFT INTUNE.>>I AMTERRELL COX.THE NUMBER OF TIMES THAT PEOPLE CALL ME PAUL MAYFIELD YOU WOULD NOT BELIEVE.>>WE HAVE BEEN TOGETHER SINCE
2013 ON THE PROJECT.IFYOU WILL REMEMBER BACK TO
201,THAT WAS A TIME WHEN AN
ASPIRING ARTISTFROM SOUTH KOREA
HAD JUST GIVEN US GA NGHAM STYLE.DO FOLKS REMEMBER WHAT THE FIRST
PROGRAMSTATEMENT SATYA MADE?A LESSER KNOWNFACT HE ALSO ANNOUNCEDTHE ENTERPRISEMOBILITY SUITE WHICH HADN’T
EXISTED TO THAT POINT.THE IDEA BEHIND THAT WAS IT WOULD BRING ASSURE DIRECTORYAND MICROSOFT INTUNE TOGETHER AND
PROVIDE THE MANAGEMENT AND
PROTECTIONFOR MICROSOFT OFFICE365 WHICH WAS AVAILABLE AND
WOULD PROVIDE THE PRODUCTIVITY EXPERIENCE FOR THE END USERS.AT THE TIME WHEN WE WERE LAUNCHING EMMS AND LAUNCHING IOS OFFICE,INTUNE WAS A BIT OF
ATOUGH CELL BECAUSE IT WAS ACLOUD PERFORM.WHEN WE WOULD TALK TO
CUSTOMERS IN2013/2014,WE WOULD
HEAR WE LOVE YOUR VISION AND WE
DON’T KNOW THAT WE ARE
COMFORTABLE GOING INTO THE CLOUD
YET,ANDYOU FAST FORWARD TO
2018,IT’S A COMPLETELY DIFFERENT STORY.THINGSLIKE GDPR HADN’T
BEEN ON THE RADAR FOR CUSTOMERS OR VENDORS AT THAT TIME.IT’S TO THINK THAT SUCH
A TRANSFORMATION HAS HAPPENED IN
THE COURSE OF THE FIVE YEARS AND
WE HAVE HAD TO ADAPT OUR PRODUCT
S TO DEAL WITH THAT REALITY.THANKFULLY WE PLANNED FOR A
CLOUD PLAY FROM THE BEGINNING AND THAT’S REALLY PAID OFF.WE HAVE LEDGERED MERGED TO
WHERE WE HAVE INTUNE AND
MICROSOFT365 FLEXIBLE MANAGEMENT.WE HAVE ONE OFFERING WE CELL FOR
USERS,WHICH IS FOR PEOPLE’S LAPTOPSAND PHONESTHE
BREADAND BUTTER OFWHATHAS
BEEN –WE HAVE AN OFFERING IS SMV,SO FOR SMALLERCUSTOMERS THAT HAVETHE MICROSOFT365 BUSINESS
SUBSCRIPTION THATHAVE OFFICE
USE ON MOBILE AND WINDOWS
AS WELL AS MANAGE THE DEVICE AND
CONFIGURE THEM.FINALLY WE HAVE LAUNCHED A
VERSION FOR EDUCATION WHERE A
TEACHER IN A K12 ENVIRONMENT CANPROVISION WINDOWS,ANDROID
DEVICES AND USE THEM IN THE
CLASSROOM.SOON WE HAVE ANINCOMINGINTUNEUSER LICENSES EVERYTHING THAT I
JUST TOLD YOU THAT COVER
EVERYTHING AN END USER MIGHT USE.WE HAVE85,000 CUSTOMERS AND WE
ARE EXCITED ABOUT THE MOMENTUM AND WE SEE THIS TRANSFORMATIONFROM 2013 THEN CLOUD WAS
SOMETHING THAT WAS MAYBE GOING
TO BE ACCOMMODATED TO2018 WHERE
EVERYBODY HAS THIS AS PART OF
THEIR CORE VALUE AND WHEN YOU
SEE WHAT WE ARE DOING,IT’S MORE
AND MORE ABOUT THE CLOUD ALL THE
TIME.WE ALSO HAVE A NUMBER OF PARTNER
S IN THE ECOSYSTEM AND HERE IS A
FEW CATEGORIES.THIS IS NOT A COMPREHENSIVE LIST
BUT ACROSSMOBILE DEFENSE THREAT
TELLING US THAT WE HAVE A DEVICE
SHOWING A RISK SIGNAL ,SECURE
RESOURCES ACCESS,AND THEN MANAGEMENT PARTNERS WHERE WE CAN DO THINGS.WE WILL TALK ABOUT OUR PARTNERSHIPWITH GM A LITTLE BIT LATER.WE HAVE SEVERAL PARTNERS BUILDING INTUNE AND EMS
TECHNOLOGY DIRECTLY INTO THEIR
MOBILE APPLICATIONS SO, THESE
THINGS WILL LET YOU TAKE YOUR OFFICE365 DATA WHICH HAS BEEN
PROTECT ED AND SECUREBYINTUNE
SO YOU ARE ABLE TO MAINTAIN
CONTROL OF YOUR DATA.A LOT OFMARKET MOMENTUMAND WE
ARE REALLYTO SHARE
WITH YOU ABOUT THE UPCOMINGHERE.INTUNE AND WE WILL FOCUS MOREONINTUNE IN THIS SESSION. I WANTTO MENTIONTHAT WE ARE–
LET ME WALK YOU THROUGH THIS.WHAT CON FIG MANAGER DID A GREAT
JOB FOR WAS OS DEPLOYMENTDEPLOYMENT,132 APP MANAGEMENT,CONFIGURATION MANAGEMENT AND THE
THINGS YOU SEE LISTED HERE. IF YOU TAKE YOUR CON FIG
MANAGER DEPLOYMENT AND ATTACH IT
TOMICROSOFT 365 CLOUD.WE WILL SHOW YOU HOW WITH FOUR
CLICKS OF MOUSE YOU CAN ENABLE CO-MANAGEMENT ACROSSYOUR
ENVIRONMENT FOR YOUR EXISTINGCONCONFIG DEVICES. YOU GO TO CONFIG AND SAY YOU
WANT TO MANAGE YOUR DEVICESAND
THAT ATTACHES THAT TO CLOUD AND
GIVES YOU A WHOLE SET OF
SCENARIOS.YOU CAN BRING WINDOW S AND IOS
MAC TOGETHER.YOU CAN SET UP A FIRST BOOT
EXPERIENCE FOR YOUR WINDOWS
DEVICE WHERE IT PROMPTS THE USER
AND PROMPTS FOR YOUR
CREDENTIAL AND GETS IT ALL READY
TO GO.YOU GET A WHOLE SET OF MODERN
SECURITY TECHNOLOGIES A SECURE SCORE,WHICH YOU WILL
HEAR ALL ABOUT ATIGNITE .YOU HAVEEL POLICY OPTIONS AND WE WILL TALK ABOUT OUR SECURITY
BASELINE FUNCTIONALITIESAND
SOME OPTIONS THAT WE ARE GIVING
YOU TOMIGRATE AGAINST GP OR
ACCOMMODATE GP IF YOU WANT TO.YOU WILL HAVE ACCESS TO MODERNVPP SCENARIOS,ACCESSING APPS
FROM THE SCORES AND THE WHOLE INTEGRATIONFROMTHE MICROSOFT365 STACK.YOU KNOW THERE IS A WHOLE SET OF
WORK FLOWS USING DESKTOPANALYTICS WHERETHE FLOWS YOU CAN DETERMINE AND
AUTOMATICALLY CREATE GROUPS AND
UPGRADE TO THE DEVICES THAT ARE
KNOWN TO BE SAFE TO UPGRADE. IF YOU ARE A CUSTOMERS USING CON FIG MANAGERAND MAYBE NOT READYTO MAKE THE BREAK ANDGO TO
CLOUD DEPLOYMENT, ALL OF THE
OPTIONS ARE AVAILABLE TO YOU.YOU WILL PROVISION THINGS IN IN THE MODERN WAY IF COMING
FROM THE CLOUD BUT WE HAVE A
WHOLE SET OFRICHTECHNOLOGY OF
INTUNE COMING THAT WE WILL TALK
ABOUT IN THE PRESENTATION. WE FEEL LIKE WE HAVE A PLACENOW WHERE INTUNE ISA VIABLE
ENTERPRISE SOLUTION.WE WILL TALK ABOUT THAT IN THE
SHOW.LET’S SHOW YOU AN EXAMPLE OFHOW
WE BROUGHT THE VALUE TOGETHER. I WILLWELCOMESHIM PA PATTL.THIS VIDEO THAT SHE IS PLAYING ISSHOWING YOU A DETONATION OF
WHAT WE HAVE DONE INSIDE THE
LAB.THIS IS AN END USER WITH AN
UNPATCHED MACHINE THAT WAS
DOWNLOADING A MALICIOUS ATTACHMENT AND IT GOES THROUGH A
OF ATTACKS THAT
RESULTS IN AN ESCALATION OF PRIVILEGE.THE TEXT ON THE LEFT IS THE
ATTACKER’SCONSOLETHIS IS STARTED TO BE BOT NETTED.IF YOU GO TO THE ATPSECURITY
CONSOLE,WE HAVE A SET OF
EXPERIENCES THAT WEDEVELOP FOR SEC,C OPS.YOU CAN SEE THAT THE SIGNALS IN
THE CLOUD AND AI HAS IDENTIFIED A SERIES OF EVENTSTHAT ARE
SUSPICIOUS OF THAT DETONATION
AND THERE IS A RED ONE HIGHLIGHTED
AS A HIGH IMPACT INCIDENT.THIS IS THE POINT AT WHICH THE
PROCESS WAS ABLETO ELEVATEITS
PRIVILEGE ON THE DEVICE. YOU COULD SAY IT’S PRETTY GREAT THAT WE ARE ABLE TO SHOW A
DEVICE GETTING COMPROMISE AND BE
ABLE TO DETECT IN THE CLOUD THAT
A HIGH SECURITY INCIDENT WAS
HAPPENING. WE ARE ABLE TO DO MORE BECAUSE
WE HAVE ADDITIONAL ASSETSIN THE
MICROSOFT 365 CLOUD.IF WE GO TOINTUNE OF THE MICROSOFT365.SHIV WILL GIVE THIS A NAME AND
WE WILL PICKTHE WINDOWS 10
PLATFORM.WE WILL DEFINE WHAT DOES IT MEANTO BE COMPATIBLEWITH WINDOWS
STANDARDS.HE WILL SELECT WINDOWS ATP AND
HERE WE HAVE THE DROP-DOWN THAT
SAYS WHAT IF DEFENDER TELLS US
WENOTICED A LOW,MEDIUMOR HIGH RISK,THAT WILL CREATE THIS POLICY THAT HAS THIS DEFAULT
ACTION IN PLACE THAT WE WON’T
CUSTOMIZE IN THE INTEREST OF
TIME THAT MARK IT IS DEVOICE
NONCLIENT.NONCOMPLIANT .DEFENDER WILL SIGNAL THERE IS A RISK AND INTUNE WILL MARKIT —
THERE IS A POLICY THAT SAYS WHEN
THE DEVICE IS NONCOMPLIANT WILL
NOT GET ACCESS TO RESOURCES AND
WILL SHUT OFF AUTOMATICALLY .WE HAVE PULLEDTHE INTELLIGENCE TOGETHER ACROSSMICROSOFT CLOUD
TO BRING VALUETO WHAT WAS
TRADITIONALLY ON PREMOLAR ILLS
ASSET.IFON — PREMOLAR ILLS
ASSET.IN THIS CASE DEFENDER AT MIGHT
NOT BE RUNNING ON THAT MOBILE
DEVICE,BUT OTHER PARTNERS WOULD
BE AND THEY CAN SEND A SIMILAR SIGNAL,ACROSS IOS,WINDOWS,MAC,WE CAN TAKE SIGNALSANDAUTOMATE THE WINDOWS
CONTROLS TO YOUR ENVIRONMENT. THAT SHOWS YOU HOW WE HAVEBROUGHT TOGETHERTHE.WE ARE TALKING ABOUT THE
MICROSOFT365 ADMIN CENTER.IT WILL HAVE SEVEN NAVIGATION
POINTS ON IT.YOU SEE THEM LIST THERE HAD BUT
ONE IS LISTED FOR SECURITY AND THAT IS WHERE YOU SEE YOUR
SECURITY CENTER ATP THAT YOU
SHOWED.YOU DON’T HAVE TO KNOW ABOUT
SEVERAL DIFFERENT PORTALS TO GO
TO IF YOUR JOBIS THE ENDPOINT
USER COMPUTERRING,SO JUST TO
GIVE YOU THE IDEA,HERE IS WHAT YOU SEE AT ADMIN.MICROSOFT.COM,THIS IS THE CENTRAL HUBFORTHE
MICROSOFT ADMIN CENTER AND THE
LEFT IS HIGHLIGHTED FOR DEVICE
MANAGEMENT AND THAT CLICKS YOU
INTO A DASHBOARD YOU WOULD SEE THAT BRINGS TOGETHER ALL THE
DEVICE MANAGEMENT OFFERINGSIN
MICROSOFT 365.WHEN YOU ATTACH YOURCONFIG
MANAGER TO MICROSOFT 365 CLOUD,ALL OF THESE SHOW UP IN THIS
EXPERIENCE AND YOU START TO
OPERATOR ON THEM.FOR THE REST OF THIS SESSION WE
WILL DRILL INTO THE SPECIFIC
TECHNOLOGIES AND WORK FLOWS WE
HAVE BROUGHT INTO THIS
EXPERIENCE.TO START WITH THAT, TERRELL WILL
WALK US THROUGHTHE IOS.THERE ISBYOD DEPLOYMENT
SCENARIOS WHICH IS ABOUT AN END
USER BRINGING THEIR PERSONAL
DEVICE TO DO SOME LEVEL OF WORK,CORPORATELEVEL TASKS, OR
THERE IS THE CORPORATE-OWNED SCENARIO WHICH MEANS YOUR IT
ORGANIZATION IS PROVISIONING AND DEPLOYING
DEVICES TO YOUR END USERS SO
THAT THEY CAN WORK A
CORPORATE-OWNED DEVICE.FOR IOS THREE DIFFERENT SCENARIOS.FOR YOD,TWO SCENARIOS.WE WILL START WITH SIMPLEST
VERSION WHICH IS WHERE WELEVERAGE OR APP PROTECTIONPOLICIES THIS ALLOWS YOU TO THE
PROTECT YOUR CORPORATE DATA
WITHOUT NEEDING TO ENROLLTO ENTIRE DEVICE.IN A BYOD SITUATION YOU DON’T
NEED TO DO COMPLEX CONFIGURATION
,YOU WANT TO MAKE SURE THAT
YOUR CORPORATE DATA IS PROTECTED.THIS WORKS FOR ALLMICROSOFT APPLES ANYTHING TO THIRD PARTYAPPS AND LOBSTHAT HAVE LEVERAGE EDTHE SDK AND YOU CAN ENROLL THIS
DEVICE FOR MANAGEMENTUSING–
YOU CAN GREAT IF YOU WANT TO DO
ADDITIONALCONFIGURATIONS IF
YOU WANT TO PUBLISH APPS,PUSH A
WI-FI PROFILE,YOU NEED TO DO
SOME ADDITIONAL LEVEL OFCONTROL
AND CONFIGURATION OF THESE
DEVICES.THE THIRD OPTION IS FOR MORE
LOCKED DOWN SITUATIONS WHEN YOU
NEED MORE COMMAND AND CONTROL OF
THESE DEVICES.I’LL BE HONEST WHEN THIS MAY BE
THE WAY THAT APPLE TALKS ABOUT
THESEVERSUS — AND WHAT THEY
DESIGNED THIS TECHNOLOGY FOR BUT
IN THE REAL WORLD WE SEE
CUSTOMERS PICKING BETWEEN THESE
TO MEET THEIR NEEDS,SO DO WHAT
WORKS BEST FOR YOU.IN THE CORPORATEOWNED WHERE YOU
ARE USING SUPERVISORMODE YOU CAN TACK ADVANTAGE OF DPP,DEV.,APPLE SCHOOL BUSINESS MANAGER.YOU SHOULD LOOK AT THIS IF
DEPLOYING KIOSK DEVICES OR IF
YOU ARE DEPLOYING DEVICES FOR A
CLASSROOM,FOR EXAMPLE, AND YOU
WANT TO MAKE SURE THAT DEVICE IS
LOCKEDDOWN AND THE STUDENTS
AREN’T GOING TO BE CHANGING THE
DIFFERENT SETTINGS ONIT.SPEAKING OF ENROLLMENT, ONE OF
THE PIECESOF FEEDBACK THAT WE
HAVE HEARD IS THIS IS GREAT AND I CAN GET EVERYTHING DEPLOYED
AND IT’S SIMPLE FOR MY END USERS TO GET THEIR DEVICE UP AND
RUNNING BUTI HAVE ADDITIONAL
SECURITY NEEDS ,PARTICULARLY WE
HERE THIS FROM CUSTOMERS IN THE
FINANCIAL SEGMENT AND ONE OF THE
CHALLENGES WITH THE FLOW THAT WE
HAVE WITH APPAPPLE WHEN YOU
FIRST LOGGED ON WE COULDN’T DO
— AS PART OF THE FIRST LOG ON, BUT NOW WE CAN.YOU GET THE DEVICE SET UP,THE
FIRST TIME THAT YOUR END USER
STARTS THE DEVICE UP,THE COMPANY PORTALWILL BE DOWNLOADED AND THE USER WILL
AUTHENTICATE,LOG ON USING THE
COMPANY PORTAL ANDAT THATPOINTTHE USER DEFINES KICK IN .WHATEVER THE POLICY THAT YOU PUT INTO PLACE WILL BE REQUIRED
BEFORE THEY CAN EVER ACCESS THE
DEVICE. IF YOU WENT TO THE KEYNOTES
YESTERDAY, YOU KNOW THAT ONE OF
THE PRIMARY VALUABLES THAT WE
ARE DELIVERING WITH M365 IS TO
EMPOWER OTHER END USERS,TO GIVE
THEM THE BEST POSSIBLE EXPERIENCE TO BRING OUT THEIRCREATIVITY. ALSO PART OF INTUNE WE DON’T
THINK THAT APPLIES TO
PRODUCTIVITY APPS. I LOVE THE OFFICE APPS BUT I
THINK THAT MANAGEMENT APPS NEED
TO LOOK GOOD TOO,SO I AM PROUD
OF THE WORK THAT OUR TEAM HAS
DONE TOGIVE A FACELIFTTO THE
PORTAL.OUR APP STORE RATINGS ARETHROUGH THE ROOF COMPARED TO
OTHER OPTIONS THAT YOU MAY BE CONSIDERING AND WE FEEL THAT THE FACELIFT THAT WE ARE GIVING IT
PUTS IT MORE MANY LINE WITHTHE
OTHERS THAT MICROSOFT IS
DELIVERING.WE NOW HAVESUPPORTFOR
MULTITOKEN ENROLLMENT AND YOUCAN MANAGEMENT ANDDELAYSAND MAKE SURE THATCOMPAT IS
READY.YOU CAN LEVERAGE OUT LOOK FOR
THIS AS WELL.I LOVE TO MANAGE BROWSER DON’T YOU?IT GETS THE JOB DONE.THIS IS PART OF THEOFFERING
THAT INTUNE HAS TO MAKESURE
THAT IT’S PART OF OUR DATA
PROTECTION SOLUTION.YOU EMPLOY IT WHERE YOU WANT TO
PROTECT CORPORATE DATA AND USER
WANTS TO CLICK ON URL IN
CORPORATEE-MAIL OR DOCUMENT AND
THEY WANT TO LAUNCH OUT AND YOU
WANT TO MAKE SURE THAT YOU CANAPPLYCUT,COPY,PASTE AND THAT IS MANAGEABLE BUT WHEN IT COMES TOBROWSING IT LEAVES MORE TO BEDESIRED. I DON’T THINKANYBODYMANAGES AS
THEIR BROWSER.BY MICROSOFT EDGEIS AVAILABLE .WE HAVECOMPATIBILITY WITH THE
BROWSER. YOU CAN DO APP PROTECTION
POLICIES, SINGLESIGN ON,SEPARATION OF P CORPORATE IDENTITIES,YOU CAN BLOCK SITES
AND MANAGE THE FAVORITES AND
YOUR USERS ARE GOING TO BE SO
MUCHHAPPIER WITH THE BROWSING
EXPERIENCE AND WE WILL CONTINUE
TO SUPPORT THE — FROM A USERSTANDPOINT,MICROSOFT EDGE IS
THE WAY TO GO.LET ME SHOW YOU HOW THISWORKS.THESE ARE THE TWO SETTINGS I
WILL SHARE FOR MY DEMO. YOU CREATE APP PROTECTION POLICY AND I HAVE CONFIGURED THAT ITWILL RESTRICT CUT,COPY,PASTE
ACCESS,AND THEN THE SECOND LINE
THAT ISHIGHLIGHTED IS
RESTRICTING WEBCONTENTTO
POLICY MANAGED BROWSERS AND NOW
WE HAVE OPENED IT UP TO INCLUDE
EDGE ASWELL. I AMUSING OUTLOOK.AS YOU KNOW,ONE OFBENEFITS OF
OUTLOOK IS I CAN VIEW MY
PERSONAL AND CORPORATE E-MAIL ALL IN THE SAME APP.RIGHT NOW I HAVE THISOPEN TOMYPERSONAL E-MAIL SO YOU SEEOUTLOOK.COM AND I AM SOMETHING OF RED SOXFAN,SO FOLLOWING
THAT, BUT WE ARE HERE TO DO WORK
SO I WILL OPEN UP AN E-MAIL FROM
A COLLEAGUE OF MINE WHO SENT ME
A URL TO LEARN MORE ABOUT
IGNITE.I AM INMY PERSONAL CONTEXT
RIGHT NOW.WHEN I CLICK THAT LINK IT IS
OPENING UP SAFARI AS YOUCAN
SEE.THAT IS A LITTLE SLOW. LET ME SWITCH BACK TO OUTLOOK
AND TO MY CORPORATECONTACTS.THIS IS MY WORK ACCOUNT.I HAVE A VERY SIMILAR E-MAIL
FROM MY COLLEAGUE PETER AND I’M
GOING TO CLICK THAT LINK AND NOTICE IT IS OPENING UP
AUTOMATICALLY INEDGE.I WILL SWITCH TO NOTES APP WHICH
IS NOT A MANAGED APP AND NOT PROTECTED UNDER POLICY.IT SAYS YOUR ORGANIZATION’S DATA
CANNOT BE PASTED HERE.IF I WERE TO DO THAT FROMSAFARI, IT WOULD PASTE THEINFORMATION INTO THE NOTESAPP.[APPLAUSE]
EXCELLENT, WOW,WE ARE OFF TO A
GOOD START.LET’S GO FROM IOS TO ANDROID AND
I WAS USING THE EDGE APP AS A
BRIDGE THERE BECAUSE IT’S
SUPPORTED ON BOTHPLATFORMS. ON THE ANDROID ASPECT OF INTUNE, LET’S TALK ABOUT ANDROID
ENTERPRISE. THOSE OF YOU WHO HAVE BEEN
MANAGING ANDROID DEVICES FOR A
WHILE HAVE BEEN ON THIS JOURNEY
WITH US AS WELL.PRELOLLIPOP,SO PRIOR TO ANDROID 5,THE MAIN WAY OFMANAGINGANDROID DEVISE WAS VIADEVICE TO
ADD MINUTE NOW CALLED LEGACY
MANAGEMENT.IT LEFT MANAGE TO BEDESIRED
FROM THE MANAGEMENT CAPABILITY
AND THE END USER EXPERIENCE WAS
JARRING.THEY GOT A REALLY SCARY POPUPS
THAT WE HEARD COMPLAINTS ABOUT,AND THERE WERE SOME REAL GAPS IN
TERMS OF SECURITY,SO YOU WERE
OPEN TOATTACK FROMMALWARE
BECAUSEAPPLESWERE INSTALLED FROM UNKNOWNSOURS AND THERE
WERE ISSUES FROM DIFFERENT
FRAGMENTATIONS. STARTING WITHLOLLIPOP,ANDROID
HAS BEEN INVESTING IN THEIR
ENTERPRISE SOLUTIONS TO MAKEIT
MORE MANAGEABLE AND SECURE.THEYINTRODUCEDWORK PROFILES WITHANDROID BOT AND HAVE BEEN
INVESTING EVERSINCE AND THIS
ALLOWS YOU TO CREATE APROTECTIVE BEHAVIOR AND WITH
ANDROID 9 OR ANDROID P COMING OUT MOSTRECENTLY,THEY HAVE
BEENPROGRESSING TOWARDDEPRECATING THE DEVICEELING MANAGEMENT.ANYDEVICES THAT ARE UPGRADED TO
ANDROID Q YOU CAN NO LONGER
MANAGE THE LEGACY DEVICE ADMIN
ASPECT.THE THING I WANT YOU TO HEAR AND
TAKE AWAY IS DON’T FREAK OUT,WE
ARE COMMIT AND SUPPORTING ACROSS
ALL OF THE DIFFERENT SCENARIOS,SO LET ME DRILL INTOTHEM.YOU DON’T HAVE TO ENROLL THEDEVICEAND IT’S CROSS PLATFORM. THE OPTION PROVIDED IS THE WORK PROFILE AND THIS IS WHERE YOU
CAN CREATE A CONTAINER ONEND-USER’S DEVICE THAT YOU
CONTROL AND YOU PROTECT THE DATA
IN THAT CONTAINER AND YOU CAN
DEEMPLOY APPS TO IT AND DO
LIGHTWEIGHT CONFIGURATION OF
THAT CONTAINER.AS WE WERETHINKING ABOUTWHICH
IS RIGHT FOR YOU,THE POLICY IS
GREAT IF ALL YOU NEED TO DO IS
PROTECT YOUR DATA ON A SET OF
APPS,LOBS THIRDPARTIES WITH SDQ.K.IF YOU NEED TO PUSH APPS TO THE
DEVICE OR DO WI-FI SETTINGS WORKPROFILES ARE A GOOD CHOICE FOR YOU.IN P CORPORATE OWNED SCENARIO, WE HAVEDEVELOPED ANDROIDENTERPRISE DEDICATEDDEVICE ORKIOSK MODE.THOSE OF YOU WHO AREGOOGLE FANS
THEY WERE CALLED THIS CORPORATE
OWNED SINGLE USE,BUT THAT
WASN’T DESCRIBING THE FULL RANGE
OF CAPABILITIES FOR THIS SCENARIO BECAUSEYOU CONDITION
LOCK THE DEVICEDOWN TO MULTIPLE
USERS BUT YOU DECIDE THAT AND
THE END USER CAN’T CHANGE THAT.PREVIEWLATER THIS YEAR,WE WILL
HAVE SUPPORT FOR FULLYMANAGED.IT’S CORPORATE OWNED DEVICE AND
YOU HAVE COMPLETE CONTROL AND
THEUSER CAN’T CHANGE SETTINGS UNLESS YOU WANT TO LET THEM.LET ME GIVE YOU A QUICK DEMO OF
THE SIMPLICITY OFENROLLING A
DEVICE AND DEEMPLOYINGADEDICATED ANDROID DEVICE.ONE OF THE OPTIONS IN ALL THE
DIFFERENT ENROLLMENT OPTIONS THAT WE HAVE FOR INTUNE,YOU CAN CREATE ATOKEN,A QR CODE.THIS IS A GREAT OPTION FOR YOURESPECIALLY IF YOU HAVE BRANCHOFFICES OR SOMEONE NOT IN YOUR
IT ORGANIZATION AND THEY NEED TO
FINISH THE DEVICES AND SET UP
THEENROLLMENT BUT YOU DON’T
WANT THEM TO HAVE ACCESS.YOU WILL CREATEENROLLMENT
PROFILE FOR KIOSK AND TASK
DEVICE AND SAY YOU WANT TO
LEVERAGE QR CODE OR TOKEN. THIS IS WHAT IT LOOKSLIKE.I WILL SHOW YOUA DEVICE IN
LOCKDOWN MODE. HERE IS A DEVICE THAT I HAVE
ALREADY CONFIGURED AS DEDICATED
DEVICE.IT’S LOCKED DOWN TO ONLYHAVE
EXCEL AND WORD ON IT.I CAN’T GET TO ANYSETTINGS OR
ANYTHING ELSE.IT WILL LET ME GET TO THE APPS
THAT I HAVE ACCESS TO.THISDEVICELOVELYSAMSUNG
GALAXY NOTE DEVICEIWILL GO
THROUGH THE CONFIGURATION OF
IT.THE BEGINNING OF IT IS I BOOSTED
IT UP AND ATTACHED IT TO WI-FI
AND IT GOES THROUGH A SERIES OF
CHECKING FOROS UPDATES WHICH
TAKES ABOUT TWOMINUTES.I TIMED IT LAST NIGHT BUT I
THOUGHT YOU DON’T WANT TOWATCH
THAT SO I SKIPPED THIS PART.I WILL SCAN A QR CODE WHICH I
HAVE RIGHT HERE.TA-DA.I WILL HITNEXT.I WILL SEE IF CECI IF THIS
WORKS.IT’S UPDATING THE DEVICE ANDREGISTERING THE DEVICE. INA FEW SECONDS IT ISDONE.[APPLAUSE] FOR THE NEXT FEW MINUTES IT WILL DOWNLOAD THE APPS THAT I HAVE
PROVISIONED TO THIS DEVICE AND
THEN THE USER CAN STARTUSING
IT.THANKS.ALL RIGHT WE HAVE DONEIOSAND
ANDROID ENTERPRISE, BUT THERE IS
MORE STUFF FOR THE ANDROIDENTERPRISE.WE NOW SUPPORT GOOGLE PLAY
PROTECT.I SHOWED YOU SOME OF THE QUICK
AND EASY WAYS, WE DO ENROLLMENT
AND HAVE SUPPORT FOR ZERO TOUCHENROLLMENTANDSAMSUNG NOXENROLLMENT WHICH IS A GREAT
SOLUTION FORTHOSEUSINGSAMSUNG NOX DEVICES. AS I MENTIONED EARLIER ONE OF
THE GREATTHINGS ABOUT OFFICE
APPS IS TO SWITCH BETWEEN
PERSONAL AND CORPORATE IDENTITIES BUT WHEN THE APPS ARE INSTALLED THE USER EXPERIENCE
CAN BE CAN A LITTLE BITCONFUSING FOR PEOPLE.ALTHOUGH WHEN YOU ARE USING APP
PROTECTION POLICIES WEDO THE RIGHT THING IN TERMS OF DATAPROTECTION ON THE PERSONAL
IDENTITY WITHIN THE WORK
PROFILE,IT’S A LITTLE
UNEXPECTED FOR A USER TO SEE A
PERSONAL IDENTITY WHEN IN A
CORPORATE CONTEXT.YOU CAN NOWUSE APPCONFIG TO
LOCK DOWN THE APPS SO THEY CAN
ONLY BE USED WITH A SINGLE
CORPORATEIDENTITY AND THIS WILL
BE AN IMPROVEMENT TO YOUR
CORPORATE EXPERIENCE.LET’S MOVE TO MAC OS.WHEN ITCOMES TO MAC MANAGEMENTINTUNE OFFERS FORYOU,IF YOU WANT TO DO PART OF AMODERN,MANAGEMENT STYLELEVERAGING THE PLATFORM THIS IS
A GREAT SOLUTION FOR YOU.THIS WOULD BE IF YOU NEEDTO
DEEMPLOY CERTS AND APPS WE HAVE
SUPPORT FOR THAT TOO,AND WE
HAVESUPPORTFOR D, PDEPENROLLMENT FORAPP.IF YOU NEED THE CAPABILITY THAT
IT OFFERS FOR THINGS LIKESCRIPTING OR INVENTORY OR DEEP
TISSUECONFIGURATION,YOUCAN GET THE BEST OFJAMPINTEGRATED
WITH THE BEST OF GMS.I WILL BUILD THIS SLIDE OUT I
DON’TWANT TO LEAVE YOU HANGING
ON THE REVEALHERE.YOUR MAC DEVICES WILL BE MANAGED
BYJAMP BUT REGISTERED WITH
INTUNE.YOU ARE GOING TO LEVERAGEINTUNE
FOR CLIENT THEN USER LOGS ON TO
THAT DEVICE IT IS GOING TO BE
MANAGING IT AND ENSURE THAT THECONFIGURATION IS RIGHT ON AND
CHECK IN WITH THE INTUNE SERVICE TOCHECK WHETHER OR NOT THE
DEVICE IS CLIENT.INTUNE CHECK IT IS COMPLIANCE POLICY ANDREGISTERSINWITH
AZURE DIRECTORY AND DETERMINES
IF THE DEVICE IS HEALTHY AND
WILL GRANT ACCESS TO THE
RESOURCES.IF THEDEVICE ISHEALTHY THE
USER GETS PUSHED THROUGH AND GET
STARTED WORKING.IFTHE DEVICE IS NOT HEALTHY,THEN THE EXPERIENCE THAT YOU
HAVE SEEN ON THE OTHERPLATFORMS, WE WESEE THERE ISISSUES,THEUSER WILL BE POTTLES
REMEDIATION STEPS AND ONCE THE
DEVICE IS HEALTHY THEY CAN UP TO
STEP.A QUICK ANNOUNCEMENTS ON THINGS
THAT WE HAVE RELEASED AROUND
MAC.YOU CAN NOW DO APPDEPLOYMENTS FORPKGFILES,THIS WOULD BEOFFICE 365 AS WELL AS LOBS AND
WEARE ALWAYS ADDING IN
PAYLOADS,SO DEVICE POLICY PAYLOAD IS AN EXAMPLE.ANOTHER INVESTMENT IS AROUND
REMOTE ACTIONS,SO YOU CAN DOREMOTE WIPE AND LOCK OF YOUR DEVICES.I WILL HAND IT BACK TO PAUL AND
YOU WILL LEARN MORE ABOUT WHAT IS HAPPENING ON WINDOWS.>>GREAT, SO WE HAVECOVERSIOS,ANDROID,MAC. WE WILLHIGHLIGHT WINDOWS 10
MANAGEMENT THAT ARE SHOWING UP
FOR INTUNE.WE WILL START BY USING YOUWIN
32 FEATURE. WE HAVEHERE THE SECTION OF THEMICROSOFT 365 THAT IS THE APP
CATALOG WHERE YOU CAN ENTER THE
APPS THAT YOU WANT TO DEEMPLOY
TO YOUR USERS.LET’S ADD AN APP TYPE HERE AND
FROM THE DROP-DOWN WEWILL
SELECT THIS NEW WINDOWSAPP 32
FEATURE.FIRST WE WILL SELECT A FILE AND
THEY WILL CREATE A PACKAGE THAT
WE HAVE CREATED FOR AN ADOBE
READER.WE SUPPORT MULTI-FILE INSTALLATION,MSI,EXE CAB
FILES,SO WE HAVE ATOOL THAT
WILL PACKAGE THAT SO YOU CAN
UPLOAD TO THE CLOUD. ONCE YOUHAVE THAT,YOU CAN
CONFIGURE INFORMATION AND GIVE
IT A NAME FOR YOUR DEPLOYMENT
AND DESCRIPTION AND THIS IS WHAT
YOUR USERS CAN SEE IN THE
COMPANY PORTAL.ONCE THAT’S BEENSAVED,WE CANCONFIGURE THE PROGRAM SETTINGS,THIS IS WHERE YOU PUT IN CUSTOM
SCRIPTS HOW TO INSTALLAND UNINSTALL THE APP.WE WILL LEAVE THE DEFAULTS AND
YOU CAN THENSAY WHAT DEVICES
ARE SUPPORTED TORECEIVE THE
APP.IF YOU WANT TO SAY IT’S ONLY
GOING TOGO TO A 32 BUILT OR A
64 BITMACHINE AND YOU CAN PUTAPPLICABILITY RULES AND GO INTO
YOUR DETECTION RULES.THEY ARE FOR BEING MOREKNOWING HOWTO CONFIGURE THAT APP HAS
BEEN INSTALLED.WE ARE GOING TO ENTER IN,GO
AHEADSHIV THE SETTINGS TO DETERMINETHATTHE APP HAS BEENINSTALLED IN THEPRESENCE OF
OSI.WE KNOW THAT CUSTOMERS HAVE A
LOT OFCOMPLEXITY IN THESE ROLES
SO WE SUPPORT THOSE. HOW DO YOU KNOW IF THE APP
NEEDED A REBOOT OR ATTEMPTED TO
INSTALL, THOSE ARE THE SORTS OF
THINGS THAT YOU HAVE AVAILABLE
HERE ASWELL.YOU CAN GET A SENSE OF THE
RICHNESS OF THE APPS BECAUSE YOU
HAVE ALL THESE OPTIONS THAT YOU
CAN CONFIGURE. ONCE THE APP HAS BEEN ADDED,YOU CAN ASSIGN IT TO GROUPS OF USERS ACROSS THE ENVIRONMENT.YOU CAN SAY YOU WANT IT TO BE
REQUIRED OR OPTIONAL INSTALLATION THAT THAT USERCAN
DOWNLOAD FROM THE COMPANYPORTAL.WE HAVE BREAKOUT SESSIONS LATER
THAT WILL GO INTO GORYDETAILS.WE HAVE FIRST CLASS EXPERIENCES
FOR OFFICE PROPLUS WITH INTUNE.I WANT TO HIGHLIGHT THOSE. YESTERDAY WITH THEKEYNOTE YOU
SAW ALL THE GREAT TECHNOLOGY
COMING, THINGS LIKE BEING ABLE
TO ROAM THE CLIPBOARD,SO WHEN
WE GO TO ADD AN APP,THE
DROP-DOWNGIVES A SPECIFIC OPTION TODEEMPLOY WINDOWS 10
PROPLUS. IF WE SELECT THAT,WE CANCONFIGURE, WE CAN SAY LET’S NOT
DEEMPLOY SKYPE FOR BUSINESS IN
THIS INSTANCE AND LET’S NAME THESUITE.,THIS IS THE DESCRIPTION THAT
DOESN’TINCLUDE SKYPE FORBUSINESS,THEN WE CAN CONFIGURE SETTINGS ABOUT IT LIKE HOW IS IT GOWNING TO GETUPDATED SO WE
COULD PICK WE WANT TO USE THE
SEMIANNUAL CHANNEL,AND THAT
WILL CAUSE US TO GET UPDATED ON
THAT CADENCE AND YOU CAN DECIDE
DO YOU WANT TOUNINSTALL THE MSI
VERSION IF IT WAS PRESENT, DO
YOUWANT 32 OR 64 BUILTS.ONCE YOU HAVE KIND OF SELECTED
THESE OPTIONS,YOU ARE GOOD TO
GO AND YOU HIT OKAY,HERE AND
YOU HAVE NOW CREATED THAT
INSTANCE OFOFFICE 365 PROPLUS IN YOUR CATALOG AND IT’S READY
TO GO OUT AND BE ASSIGNED TO ALL
OF YOURUSER ASWELL.ELLET’S TALK ABOUT CONFIGURATIONMANAGEMENT.SOME OF THECONCERNS THAT WE
HAVE HEARD ABOUT USING THE MDM
STACK FORCONFIGURING WINDOWS IS
THAT IT HAD IMPORTANT SETTINGS
BUT NOT STUFF,SO I WANT TO SHOW
YOU A FEW THINGS.IF WE WERE TO CREATE A
CONFIGURATIONPROFILE HERE FOR,LET’SGIVE IT A NAME AND DESCRIPTION AND WE WILL PICK
WINDOWS 10 FOR OURPLATFORM.THINGSPREVIOUSLY UNAVAILABLE
LIKE CONCONFIGURING FIREWALL
RULES AND BIT LOCKER.SOME COMPLICATED APPS MAY NOW
HAVE THOUSANDS OF SETTINGS THIS
THEY ARE SUPPORTING TODAY AND
FOR EXAMPLE,THE OFFICE DESKTOPAPPS SUPPORT MANY WRITINGS IN
THEREGISTRY,SO WE HAVEINTRODUCED THISTEMPLATE PROFILE
TYPE.THIS IS TAKINGADMX ANDMAKING
IT POSSIBLE TO EMPLOY THROUGH
MDM.WE HAVE PUT IN HEREEL SEVERALHERE SEVERAL THINGS FOR OFFICE.WE CAN SEARCH FOR SOMETHING LIKE
OUTLOOK AND PICK ANY ONE OF THOSE SETTINGS.PICK ONESHIV,SO THIS IS THEPERMANENTLY REMOVEALL DELETED CONTENT.YOU SEE DESCRIPTION AND YOU CAN
CONFIGURE IT.THIS IS THE WAY YOU WILL GET THEAPPLICATION TO BE ABLE TODEPLOYED ASCONFIGURATION PROFILE TO BE ABLETOCOMPLEMENT
THE MDM STACK.WAIT,THERE IS MORE.WE NOW GIVE YOU SECURITY
BASELINES. THE IDEA BEHIND THESE IS FOR A
NUMBER OF THOSESETTINGS
MICROSOFT THAT IS
RECOMMENDATIONS FOR WHAT THEY OUGHT TO BE BECAUSE WORKING WITH SOME OF OURLARGESTCUSTOMERS WE
HAVE IDENTIFIED THINGS THAT ARE
GOOD TO HAVE SECURE DEPLOYMENT
OFWINDOWS AND WE ARE MAKING
THEM AVAILABLE. THE FIRST ONE WE WILL CLICK ON
IT AND IT GIVES YOU ABILITY TO
CREATE DEVICECONFIGURATION
PROFILE JUST LIKE WE WERE BEFORE
BUT THIS IS A LITTLE BIT
DIFFERENT.LET’S NAME THIS BASELINEFOR THE
U.S.OR SOMETHING LIKETHAT.THE SETTINGSBREAKS OUT INTO ALL
THESE CATEGORIES AND UNDER THIS
ARE THE HUNDREDS THAT WE HAVE MADE.PICK ONE OF THOSE.HERE IS WINDOWS DEFENDER.YOU CAN SEE SOME THAT WE RECOMMEND.YOU COULD GO IN AND CHANGE ONE
OF THESE.WE ARE CHANGING HERE THE SCANREMOVABLE DRIVE DURING A FULL
SCAN.NORMALLY WE WOULDRECOMMEND THATYOUSCAN USB CONTENT ANDIF THAT WAS NOT APPROPRIATE YOU CAN
CHANGE IT IN YOUR ENVIRONMENT
AND THEN SAY CREATE AND WHAT WE
ARE DOING ISCREATINGTHE
CONFIGURATIONPROFILE THAT
INCLUDES ALL THE SETTINGS PLUS THE ONE YOU JUST CHANGEDIN YOUR ENVIRONMENT,AND WHEN YOU OPEN
UP THE SECURITY BASEBASELINE IN
THE FUTURE,YOU WILL SEE THAT
DIFFERENCE. WE FEEL THAT HAVING THESETTINGS AVAILABLE IN ADMALLOWS YOU TO
CORRESPOND THE LONG TELL AND
BRING THESETTINGS INTOYOUR —
WHEN YOU ARE USING THE SYSTEM TO
DOCONFIGURATION MANAGEMENT IT’S
DIFFERENT FROM GP WHEN YOU SET
THE VALUE AND DEEMPLOY IT OUT, YOU WILL BE ABLE TO REPORT OUT
WHICH SETTINGS WENT TO WHICH
DEVICES AND MONITOR THE DRIFT
ANDCOMPLIANCE. THAT GIVESYOU A SENSE OF WHAT
WE ARE DOING ON THECONFIGURATION MANAGEMENT SIDE.I WANT TO GIVE A QUICK SHOUT-OUT TO ONE THING.IF WE GO TODEVICES TAB AND SEE
THE DEVICES IN THISTENANT WECAN SEARCH FORHOLO LENS DEVICE ANDSENDING THEAR MR APESTO
IT.APPS TO IT.IN CASE YOU ARE NOTFAMILIAR WITH AUTOPILOT SERVICE.THIS IS WHERE YOU CAN HAVE A
DEVICE THATCOMESUP ON ITS
FIRST BOOT ANDGETS CON– YOU CAN WORK WITH OUR PROCUREDEVICES THAT GET REGISTERED TO
YOUR ORGANIZATION OR YOUCAN USE
THE PRODUCT TO HARNESS THE
DEVICE IDS THAT ARE INYOUR
COMPANY AND REGISTER THESERVICE.WHEN THAT DEVICE IS BOOTED UP IT
WILL TALK TO OUR CLOUD AND WILL
GETCONFIGURED THROUGH AD ANINTUNE.FLIPPING BACK THROUGH THE
CONSOLE,HERE IS AN EXAMPLE OFUSING INTUNECONSOLE,UNDER
WINDOWS ENROLLMENT WE HAVE
EMPLOYMENTPROFILES. WE WILL GIVE IT A NAME THAT WE
HAVE. THESCENARIO IS SUPPOSE YOU HAVEA NEW INTUNE LICENSE AND YOUWANT IT TO POWER THE DEVICEAND
GET CONFIGURED AND PROVISIONED
FOR YOUR ENVIRONMENT AND WE
WOULD SAY THE SETTINGSFOR THIS
ONE,CONFIGURE THEM SO THERE IS
NO USER INTERACTION WHATSOEVER AND EVERYTHING IS HIDDEN AND WE HAVE CHOSEN THE LANGUAGE FOR YOU AND WE GIVE THENAME OF THE
DEVICE A SPECIFIC THING
AND SAVE THEENROLLMENT PROFILE
TO A GROUP OFDEVICES THAT HASN’T JOINED THE SERVICE YET,THEY ARE IN THE AUTOPILOT
SERVICE AND BY DOING SO THAT IS
WHATCONNECTS THE WORK FLOW SO
THAT THEDEVICE COMES UP AND
TALKING TO THEAUTOPILOT SERVICE
ANDCONFIGURESITSELF.WE HAVE A CUSTOMER WHO HAS BEEN
WORKING CLOSELY WITH USTO
DEEMPLOY AUTOPILOT FUNCTIONALITY
AND MODERNPROVISION IN THEIR
ENVIRONMENT.WE ARE EXCITED TOWELCOME JAMESDOW OF ROYAL BANK OF CANADA TO
THE STAGE.[APPLAUSE]>>THANK YOU VERYMUCH.APPRECIATE IT.LET’S GET SOME ENERGY IN THE ROOM AND WAKE THIS UP A LITTLE
BIT. WE HAVE SEENA LOT OF
INTERESTING THINGS.USER EXPERIENCE IS CHANGING WHETHER WE START LOOKING AT WHAT WE ARE SEEING ON THEDESKTOP,THE DRIVE TO MOBILITY,THEUSERS
NOW WANT SOMETHING THAT WILL
LOOK AND FEEL QUANTITATIVELY
DIFFERENT FROM WHAT THEY ARE
DOING.HOWEVER,WE LIVE ON TOP OF A
GIANT GIANT BANK RIGHT NOW.85,000EMPLOYEESAND 140,000ENDPOINTS IT’S A BIG MACHINE AND
IT TAKES A LOT TO MAKE A CHANGE
IN OUR ENVIRONMENT SO WE SIT
BACK AND WEHAVE THE STANDARD SUITE THAT WE WORK THROUGH EVERY DAY.ONE OF THEONES THAT I
ABSOLUTELY LOVEIS THE
PROCESS BY WHICH WE ON BOARD
PEOPLE.WE ORDER THEMAMACHINE THROUGH
A VALUE ADDRESALER ANDTHEN THE
SERVICEPROVIDERTAKESOUT THE OPERATOR SYSTEM AND PUTSDOWN
THE BRANDEDRBC,THEN THEY
CONFIGURE IT, PUT IT BACK IN A
BOX AND SHIP IT BACK TO MY WHY
WHITE GLOVE BOX AND PUT IT
IN MY USER HAND.THERE IS A LOT OFTOUCHING IN
ALL THAT.THE MISSION THAT WE WERE GOING
AFTER, THE THING THAT WE WANTED
TO SEE WAS THEQUICKLITTLE ONE
PAUL SHOWED YOU.IWANT TO SHIFT DIRECTLY TO THE USER’S HOME.WELCOME TO THE TEAM AND HERE IS
YOUR NEWLAPTOP,MOBILE DEVICE.LOG IN WITH YOUR RBCPROVIDED CREDENTIALS AND YOU ARE 15
MINUTES TO PRODUCTIVITY AND THAT
IS WHAT HAVE BEEN ABLE TO DO AT
THISPOINT. WE HAVE REPLACED THIS ENTIRE
VALUE CHAIN THATHAD 17
DIFFERENTPLAYERS INVOLVED AND
WE ARE STREAMLINED ITDOWN TO
TWO STEPS.WE HAVE DONE THEWIN 7 TO WIN 10
CONVERSION AND WE ARE MOVING
DEVICE MANAGEMENTGPOS OUT AD
AND OVER TO MDM AND STARTING TO
MOVETO 0365,JOURNEY IS NOT YET COMPLETE AND NOWLOOKING– THIS
IS JUST THE SIMPLE STRAIGHTTECHNICAL DETAIL THAT WE WERE
AFTER,BUT IT TAKE AS FAIRBIT
OF INTERNAL SOUL SEARCHING WHEN
YOU THINK ABOUT WHAT WE ARE
DOING HERE.ALSO WEREMARKED, THE ENDUSER
EXPERIENCE IS CHANGING AND WHAT
THE ENDUSERS WANT IS GOING TO
BE DIFFERENT AND WE AS AN
CENTRAL IT SHOP SPENT A LOT OF
TIME AND MONEY MAKINGTHAT
EXPERIENCE CORRECT. ICHALLENGE YOU TO THINK ABOUT
WHAT WOULD IT TAKE FOR YOU TODO
IN YOUR ENVIRONMENT TO DELIVER
WHAT WE ARE TALKING ABOUT,SEAMLESS AS YOU MOVE FROM THE
MOBILE ENVIRONMENT BACK TO THE
DESKTOP ENVIRONMENT.LET ME GIVE YOU FULL DEVICE ARE
CONTROL, LET ME PROTECT YOUR
DATA AND GIVE YOU SIMPLE
STREAMLINE MANAGEMENT INTERFACES
TOIT,WE AREALL GOOD AT MANAGING OUR ENVIRONMENTS BUT
THERE IS A VALUE CHANGE INVOLVED
IN DELIVERING THE EXPERIENCE
BACKTO THEUSER.WHEN YOU SPEND ALL OF THE TIME
BELOW THE WATER LEVEL,THE
THINGS THAT THE USER CAN’T SEE,YOU ARE NOT SPENDING THETIME
CHANGING USER EXPERIENCE. ATRBC WEPARTNERED WITH
MICROSOFT TO STREAMLINE THAT
VALUECHANGE AND INVEST IN
THINGS THAT THE USER NEVER SAW,STREAMLINE,MAKE THAT SIMPLE. MOVE UP THE CHAIN AND MOVE ALL
OF OUR KNOWLEDGEWORKERS AND
VALUE WORKERS CLOSER TO THEUSER
TO DRIVE THAT USER EXPERIENCE.WHAT WEDISCOVERED QUICKLY THAT
WE ARE NOT AS GOOD AS IT AS WE
CAN RENT THIS SERVICE FROM
MICROSOFT.AT THIS POINT YOU STARTREALIZING THAT MUCHIN THE SAME WAY IN THEPRESENTATION FROM
IDEA WHERE STEAMENGINES GAVE
WAY TO ELECTRICITY, AT SOME
POINT YOU HAVE TO LOOK AT YOUR
ENVIRONMENT ANDCANNIBALIZE YOUR
OWN BUSINESS.THAT IS WHAT WE HAVE DONE.WE SAID WE HAVE A TREMENDOUS NUMBER OFPEOPLE LINED UP TO
DELIVER A WHOLE BUNCH OF STUFF
AND WE DON’T NEED TODOTHAT
ANYMORE AND MOVE YOUR VALUE
PRODUCT UPSTREAM,AND THAT IS
WHAT WE HAVE MANAGED TO DO.THE THING THAT TO I WOULDENCOURAGE YOU TO THINK ABOUT NOW
IS WE ALL KNOW THAT THEENTERPRISE VIEW OF THE
ENVIRONMENT, THE WORLD IS LIKE A
TOOTSIEPOP,HARD AND CRUNCHY ON
THEOUTSIDE AND SOFT AND CHEWY
IN THE MIDDLE,THAT IS GONE.THERE IS NODMZ,USERS WANT TO WORK ANYWHERE AND EVERYWHERE AND THEY WANT THAT DATAOMNIPRESENT
AND PROTECTED.WE AREDISSOLVING THEWALLS OF
THEENTERPRISE WHETHER WHATEVER EXPERIENCE YOU HAVE,I DON’T
CARE, WE HAVE A MANAGEMENT
PLATFORM THAT ALLOWS USTO
OPERATOR OUTSIDE THE WALLS OF
THE ENTERPRISE IN A SECURE AND
PROTECTED MANNER AND EMPLOY THAT
IN A SEAMLESS WAY.DISSOLVE THE WALLS OF THEENTERPRISE,DRIVE THE USER
EXPERIENCE AND CONCENTRATE ON
WHAT MAKES A DIFFERENCE FOR YOUR USER COMMUNITY.FOR US THAT BECAME WEARE NOT
WORRIEDABOUT THE INTERNAL COMPONENT ANYMORE,WE CAN NOW
DEEMPLOY AND GO.THAT IS WHAT WE ARE DOING AND I
WANT TO COMMEND THE MICROSOFT TEAM THAT WE HAVE BEEN WORKING
WITH BECAUSE ABOUT 18 MONTHS AGO
WHEN WE CAME TO THEM AND SAID
THIS IS OUR VISION AND WHAT WE
WANT TODO, WE FELT THAT WE WERE
LEADING THEM A BIT.WE WERE SAYING THIS IS THE VISION AND THIS WORKS AND THAT
DOESN’T AND WEWORKEDTHROUGH
THAT.EIGHTEEN MONTHS LATER WE HAVE
HAVING A GREAT EXPERIENCE AND WE
HAD A HUMBLING MOMENT WHERE WE
REALIZE THAT THE PACE AND SPEED
OF DEVELOPMENT AND ACCELERATION
OFDELIVERING NEW CUSTOMER EXPERIENCES IS GETTING FARTHER
AHEAD THAN WE COULD HAVE
IMAGINED.INSTEAD OF US DRAGGING OUR
PARTNER ALONG, OUR PARTNER IS
DRAGGING US ALONG SAYING WE HAVE
A NEW THING FOR YOU TOMORROW AND
THE NEXT DAY.IT IS NO LONGER ASIX MONTH OR
ONE YEAR RELEASECYCLE,EVERY
MONTH WE ARE SEEING THINGS
HAPPEN.THE WOLVING THAT WE STARTED
HEARING WHEN SATYA FIRST TOOK
OVER IT’S GETTING REAL AND WE
THANK YOU.THANK YOU PAUL AND THETEAM.>>WANTTO WRAP THISUP?>>YES,SO INSPIRINGJAMES.JAMES TELLS THE STORY SO WELL.SO AS YOU ARE THINKING ABOUT
WALKING OUT THE DOOR, THESE ARE
THE THINGS WE WANT YOU TO TAKE
WITHYOU.OUR MANAGEMENT IS POWERED BY THEM365 CLOUD AND WE HAVE CREATED
ADMINISTRATIVEEXPERIENCES CUSTOM TO IT ROLES WE SEE IN
YOUR IT ORGANIZATIONS.WEDELIVER THE BEST UNIFIED
MANAGEMENT SOLUTIONACROSS IOS,ANDROID,MAC,ANDIOT.FOR THOSE WHO ARE CONFIGMANAGERS TODAY YOU CAN GET
IMMEDIATE VALUE BY ATTACHING TO
INTUNEAND THEM365 CLOUD AND
LASTLY INTUNE OFFER AS NUMBER OF
DIFFERENT SOLUTIONSFOR
DIFFERENT MARKET SEGMENTS WHETHER YOU BE AN ENTERPRISE,SMALL, MEDIUM BUSINESS,DEPLOYING TO FIRST LINEWORKERS,OR IF YOU ARE WORKING IN
EDUCATIONALINSTITUTION.THIS SESSION HAS JUST GIVEN YOU
A TASTE OF ALL OF THE POWER AND
CAPABILITIES OF INTUNE.THERE ARE OVER 40SESSIONS OVERS
INTUNE ANDSCCM THIS WEEK.I ENCOURAGE YOU TO ATTEND THOSE
SESSIONS TO DOUBLE CLICK AND
PERHAPS YOU WANT TOKNOW MOREABOUTANDROID AND AUTOPILOT,MAYBE YOUWANT TO KNOWABOUT IOS
AND MAC.THESE ARE JUST A FEW THAT WE AREHIGHLIGHTING,USE YOUR IGNITE
APP TO LOOK UP THE OTHERS AS
WELL.LAST BUT NOT LEAST,WE LOVE FEEDBACK,WE ARE SO HAPPY TO
HAVE YOU HERE AT IGNITE,WE WANT
TOMAKE SURE THAT EVERY YEAR THECONTENT IS WHAT YOULIKE AND
PLEASE LET US KNOW AND PLEASE
COMPLETELY HONEST. THANK YOU SO MUCH FOR COMING.>>

Understanding calling usage and diagnosing call failures in Microsoft Teams – BRK3169


>>GOOD AFTERNOON, EVERYBODY. I’M HERE, UNDERSTANDING CALL USAGE IN MICROSOFT TEAMS. I GUESS I OUR CLICKER DOESN’T WORK. SO IF YOU ARE NOT HERE FOR MICROSOFT TEAMS, THEN YOU ARE PROBABLY IN THE WRONG PLACE. YOU CAN STICK AROUND AND HEAR ABOUT ALL THE COOL STUFF IN MICROSOFT TEAMS. OUR AUDIENCE IS I.T. PROS WHO ARE HALF ALREADY DEPLOYED THE MEDIA FUNCTIONALITIES FOR MICROSOFT TEAMS AND LOOKING FORWARD TO MONITOR AND TAKE CARE OF OUR USER.>>SO RECENTLY, MY FATHER JUST PASSED AWAY. AND MY MOM AND MY DAD LIVE WITH ME. WHEN I TOLD MY MOM, HEY, I HAVE TO GO TO ORLANDO FOR A CONFERENCE. MY MOM IS “ARE YOU SURE YOU’RE GOING TO ORLANDO FOR A CONFERENCE AND NOT FOR HAVING FUN THERE?” SO I SAID, NO, MOM, I AM GOING THERE FOR WORK. I WANT TO TAKE A VIDEO. I WOULD LIKE TO SHOW IT TO MY MOM THIS IS REALLY — I’M SO SHE CAN BE HOME AWAY BUT I HAD TO GO SO I HAD TO WORK. WOULD YOU MIND SAYING HELLO SIUNIE’S MOM. DO A PRACTICE ONE. NOW I’M GOING TO TAKE THE VIDEO FOR IT. ONE, TWO, THREE. THANK YOU, GUYS. THAT’S A LITTLE BIT ABOUT MYSELF. I’M FROM INDONESIA. AS BACKGROUND, I JOINED MICROSOFT IN 1998. I JOINED RESOURCE AND THEN FINALLY IN 2005, I JOINED THE REAL-TIME COMMUNICATIONS TEAM AND I FIND MY PASSION. THAT’S MY HOME. I FEATURE PRODUCTS FOR MICROSOFT AND DESKTOP SHARING, APPLICATION SHARING, AS ALSO THE JOIN TO THE WEB SO YOU CAN ACTUALLY DO ANONYMOUS JOIN AND EVERYTHING. SO THAT HAS BEEN MY PASSION. UP UNTIL NOW I’M WORKING IN MICROSOFT. WHAT DO I DO OUTSIDE MICROSOFT? I LIKE TO BE OUTSIDE BECAUSE IN MICROSOFT YOU WORK INSIDE ALL THE TIME. SO I DO A LOST HIKING AND BIKING. SO THAT’S A LITTLE BIT ABOUT MYSELF. WITH THAT, I WOULD LIKE YOU TO MEET SHARANYA VEMU.>>HELLO, EVERYONE. AM I AUDIBLE? SOMETIMES YOU CAN’T HEAR THIS. I TAKE A SECOND OR TWO TO CALM DOWN. ACTUALLY THE CLICKER WORKS. MY NAME IS SHARANYA VEMU, I WORK WITH THE I.T. PRO TEAM. I WORK ON THE I.T. PRO TEAL. A LITTLE ABOUT MYSELF. I’VE BEEN AT WORK 12 YEARS IN MICROSOFT, SINCE 2006. THE LAST TWO YEARS HAVE BEEN OFFICE 365 AND MICROSOFT TEAMS. BEFORE THAT, I WAS WORKING WITH CONSULTING. I WAS WORKING OUTSIDE EVER THE MICROSOFT CONSULTING GROUP AND SERVICES. HAD A GREAT OPPORTUNITY WITH A BUNCH OF CUSTOMERS THAT WAS WELL-DEFINED. THAT MADE ME SAY, HEY, CAN I GO BACK AND DO SOMETHING DIFFERENT. IN MY CURRENT ROLE, ONE OF MY JOBS IS TO UNDERTAKE SURE — MAKE SURE THAT I.T. FOLKS HAVE DATA THAT MATTERS AND INSIGHTS THEY CAN ACT UPON. REALLY SIMPLE, RIGHT? SE THAT TO BETTER OUR PRODUCT. WE ALSO WANTS TO MAKE SURE WE ARE TAKING THAT DATA AND GIVING IT BACK IN A SHAPE THEY CAN MAKE SENSE OF FOR PEOPLE’S EXPERIENCE. THAT SAID — I HAVE BEEN BACK IN MY FINAL, I LIKE TO MAKE SPORTS, THE INDIAN ART FORM, THAT’S WHAT I LIKE TO DO. I LIKE RIDING MY MOTORCYCLE IN THE MOUNTAINS. THAT’S WHAT I DO IN MY SPARE TIME. SO WITH THAT, LET ME JUST GO AHEAD AND TALK ABOUT THIS SESSION. ON BEHALF OF MICROSOFT TEAMS IT BOILS DOWN THIS IS A GREAT COMMUNICATION AND COLLABORATION TOOL. START USING TEAMS AND GETTING BENEFIT OF IT, YOU HAVE TO MAKE SURE YOU HAVE CALL QUALITY. THERE HAVE BEEN A FEW THINGS WE WANT TO YOU TAKE AWAY FROM THE SESSION. THE FIRST IS REGARDING TOOLS. WE GET THIS IS NOT EASY. THE WHOLE MEDIA NETWORK IS NOT AN EASY SUN IT’S COMPLEX — NOT AN EASY SUBJECT. IT’S COMPLEX. WE WANT TO MAKE SURE THAT YOU HAVE THE RIGHT RESOURCES TO BETTER THE EXPERIENCE. ONE OF THE OTHER THINGS WE HAVE HEARD, WHERE DO WE SEE THE CALL USAGE DATA? RIGHT NOW WE WILL WALK THROUGH IT IN A LITTLE MORE DETAIL. WE ALSO WANT TO GIVE YOU AN UNDERSTANDING OF WHERE CAN YOU SEE THE CALL USAGE. WE WILL TALK ABOUT HOW MANY OF YOU HERE HAVE HEARD OF — I’M SURE WHAT WE WILL SHOW WHAT IS NEW IN SECURITY. THESE ARE THE THREE THINGS THAT WE WANT TOY TAKE AWAY FROM TODAY’S SESSION. THE FIRST TOPIC, WHAT HAPPENS WHEN I START A CALL. YOU HAVE A DEPLOYMENT. YOU HAVE PEOPLE STARTING TO USE IT. HOW ARE ARE THEY REALLY USING IT. WHERE DO I GO TO CHECK CALL CASUALTY. AT THIS POINT, CHECKING CALL USAGE, WE HAVE A COUPLE OF PLACES, WHILE THIS IS IN DIFFERENT PLACES. WE MAKE SURE THAT WE ARE GETTING ALL THE INVESTMENT TO GET ALL OF THIS DATA IN A FORM TO YOU. SO THE CALL USAGE CAN BE SEEN IN THE ENTITY SUPPORT CENTER. YOU HAVE USAGE REPORTING. THAT IS WHERE YOU SEE THE VIEW. WHAT ARE YOU RESPONDING TIME ON. GIVEN A SPECIFIC TIME RANGE, IT COULD BE — WHATEVER NUMBER OF CALLS YOU HAVE MADE. HOW MANY CALLS DID THE USER MAKE. HOW MANY MEETINGS THEY ARE A PART OF. THESE ARE SOME OF THE DATA YOU CAN GET STRAIGHT OFF THE USAGE REPORT. THAT IS CURRENTLY WHAT WE HAVE. WE ARE MAKING A LOT OF INVESTMENTS AND SPENDING A LOT OF TIME ON INSURING WE GET THESE INSIGHTS AS PART OF YOUR NEWLY ADMIN PORTAL. HOW MANY OF YOU HAVE SEEN THE NEW MICROSOFT SKYPE FOR BUSINESS ADMIN CENTER? THAT’S A LOT OF YOU. WHAT I AM GOING TO SHOW YOU OUTSIDE OF CALL ANALYTICS IS THE NEW ADMIN CENTER. OTHER VENDORS CONTINUE TO HAVE USAGE REPORTS IN DETAIL. YOU WANT TO MAKE SURE WE BRING THOSE OVER, START GETTING, HOW PEOPLE HAVE MADE THE CALLS, AS PART OF TEAMS, AS PART OF SKYPE. THESE ARE THINGS WE WANT TO DO. HOWEVER, THESE ARE SOME OF THE AREAS WHERE YOU CAN GET USAGE REPORTS. ONE SPECIFIC THING I WANT TO CALL OUT IS THE CONTENT PACK. INTERRUPTION CONTENT PACK IS A GREAT RESOURCE. YOU CAN PULL DATA OUT. THINK ABOUT THIS, THE APIS THAT WE WANT TO PROVIDE, THE CANNED REPORTS THAT WE HAVE. IT’S A GREAT RESOURCE TO PULL DATA OUT. START SLICING AND DICING WITH THE GOOD INFORMATION THAT YOU HAVE. IT’S A GREAT TOOL. IT NOT ONLY GIVES YOU INFORMATION ABOUT CALLS OR HOW AUTHORITY IS BEING USED BUT IT IT GIVES YOU AN OVERVIEW HOW IS THESE BEING USED. I HAVE SEEN CUSTOMERS GET GREAT VALUE OUT OF THIS. CALL ANALYTICS GIVES YOU A LIST — LESS ON INDIVIDUAL CALLS BUT GIVES YOU TROUBLE SHOOTING. IF YOU WANT TO FIGURE OUT HOW MANY CALLS ARE BEING MADE. WE WANT TO BURN AND EXPORT THE CAPABILITIES. THAT IS ONE OF THE AREAS YOU CAN GET CALL USAGE. AT A HIGH LEVEL, THIS IS ANALYTICS DEPLOYED, ONCE YOU DEPLOY TEAMS AND YOU WANT TO LOOK AT USAGE THIS IS WHERE YOU START. AFTER YOU START MONITORING, THE NEXT PART IS HOW DO YOU GET PEOPLE STARTED USING THIS. HOW DO YOU DIAGNOSE CALL FAILURES. TWO WAYS TO DO THIS. COMMON SENSE, YOU HAVE — LET ME TELL YOU ABOUT PROACTIVE. WE HAVE TOOLS IN TERMS — WHEN YOU ARE UNDERTAKING SOMETHING AS HUGE AS A MEDIA DEMOIMENT, YOU WANT TO MAKE SURE YOU HAVE ALL EVER THESE GUIDANCE. WHILE YOU START ROLLING OUT THESE EXPERIENCES, THERE IS ALSO A LOT OF THINGS THAT HAPPEN. YOUR NETWORK KEEPS EVOLVING. IT’S NOT LIKE YOU DO IT AND IT’S DONE. ANYTHING CAN UPSET THE APPLE CART IN TERMS OF MEDIA. YOUR MEDIA EXPERIENCE, RIGHT? WHILE YOU ARE DOING THAT PRO ACTIVELY, THERE IS ALSO THE ASPECT OF — YOUR NETWORK IS A CONSTANT EVOLVING THING. YOU WANT TO MAKE SURE YOU ARE SENDING THE RIGHT SIGNALS. LET’S SAY IF YOU WANT TO MAKE SURE YOU HAVE INSTALLED SOMETHING NEW AND YOU WANT TO MAKE SURE THE COMMUNICATION. THESE ARE THE THINGS YOU WANT TO DO EARLY ON. GIVE UCH THE TOOLSET SO YOU KNOW EXACTLY WHERE THINGS ARE GOING NOW. THAT SAID, THIS VALUE, ALL OF THIS GOOD STUFF. YOU CAN’T PLAN FOR EVERYTHING. THINGS ARE GOING TO BE REACTIVE. WHEN IT COMES TO IT REACTIVE. OUTSIDE OF THIS PERSONA HERE, I WANT TO TAKE THE V.M. BECAUSE — FOR THE SAKE OF THIS SCENARIO, THIS IS NOT REALLY GOOD AND THIS IS THIS IS HAPPENING AND THE FIRST THING THAT HE WANTS TO DO, HE WANTS TO UNDERSTAND WHAT IS GOING ON. ANY TIME YOU SEE A USER IS HAVING AN ISSUE, THE FIRST THING THEY DO IS MAKE SURE — AND THEN THE CALL UP THE HELP DESK, WILLIAM DOESN’T WANT SPECIFICALLY — WILLIAM DOESN’T REALLY WANT TO GET OFF THE CALL AND THEN COME BACK AFTER TWO DAYS AND THREE DAYS AND WANT TO KNOW WHAT IS HAPPENING. WE HAVE A GREAT DEAL OF RESPONSIBILITY TO MAKE SURE THAT WILLIAM IS HAVING A GREAT EXPERIENCE. WHAT WE DO, WE NEED TO MAKE SURE WE HELP DESK AND GIVE THEM THE INFORMATION SO THAT WILLIAM CAN GET THE NECESSARY TROUBLESHOOTING STEPS OR GET THE NECESSARY INPUT THAT VERY DAY, HIS CALL CAN BE USEFUL. IT IS SOMETHING THAT WE WANT TO MAKE SURE. IT COULD BE A HEADSET OR HE NEEDS ADVICE. WE WANT TO MAKE SURE HE IS ACTUALLY HAVING — HE HAS ALL THE NECESSARY INFORMATION TO MAKE HIS EXPERIENCE WORTHWHILE THAT DAY. THIS IS WHERE WE START USING QUALITY — CALL ANALYTICS IS A TOOL WE CAN USE — WHEN WE ANNOUNCED THAT IN IGNITE T WAS GENERALLY AVAILABLE OUTSIDE OF THE NEW ADMIN CENTER. NOW IT’S DEEPLY INTEGRATED WHAT DOES CALL ANALYTICS HAVE? WHAT KIND OF DATA — WHAT IS THE DATA, JUST DIVE MORE INTO WHAT CAN CALL ANALYTICS DO FOR YOU. LIKE I SAID, IT’S INTEGRATED RIGHT NOW AS PART OF YOUR CALL HISTORY IN THE ADMIN CENTER. YOU DON’T HAVE TO GO TO A SEPARATE TOOL THIS WHICH WAS THE CASE LAST YEAR. IT’S NOW GENERALLY AVAILABLE. THERE RESPECT A LOT OF IMPLEMENTS TO MAKE SURE THE CALL IS PRESENTED IN A FORM THAT’S USEFUL FOR YOU. SO YOU HAVE THE ABILITY TO SEARCH FOR A USER’S CALL. ONE OF THE THINGS I WANT TO CALL OUT IS THIS TOOL IS NOT FOR SKYPE ALONE. THIS TOOL IS FOR TEAMS. WHEN I SAY USERS CALLS — SO THE LAST 30 DAYS OF CALLS AND MEETINGS, WHATEVER THE USER HAS STORED, YOU GET PRETTY MUCH — IT’S NOT LIKE A 24 HOUR LATENCY, YOU GET THE DATA ALMOST WITHIN MINUTES. I HAVE SEEN ON MY CALL ANALYTICS WHEN I WANT TO CHECK IF SOMETHING WENT WRONG, I SEE IT IN 95 TO SEVEN MINUTES. THE UNDERLYING DATA WE COLLECT, IT’S ALL THE SAME METRICS THAT IT USES. ALMOST THE MEDIA TELEMETRY, WE WILL BASE ON THAT. AUDIO STREAMS ARE CLASSIFIED AND WE TALK ABOUT THAT MORE IN THE NEXT SLIDE. I WANT TO SPEND TIME BREAKING DOWN ON HOW CAN YOU USE THIS. WHEN YOU THINK ABOUT A CALL. THINK IT CAN FAIL AT MULTIPLE POINTS. RIGHT FROM THE DEVICE THAT YOU USE. IT COULD BE IN THE SPEAKERS NORTH KOREA THE HEADPHONES OR THE HEADSET THAT YOU ARE USING. TO THE DEVICE ITSELF. SOMETIMES YOU DO HAVE THE DEVICE ITSELF. THE NEXT POINTS IS THE KIND OF CONNECTION YOU ARE HAVING. FROM THERE YOU HAVE THE NETWORK. IT GOES ALL OVER THE PLACE. WE HAVE SEEN IN THE PAST THAT WHEN IT COMES TO DEVICES, THERE ARE CERTAIN DEVICES WHICH MIGHT NOT REALLY WORK WELL. SOMETIMES YOU USE — HEADPHONES AND SPEAKERS. SOMETIMES YOU MIGHT HAVE THEM PLACED RIGHT NEXT TO EACH OTHER, WHICH WOULD CAUSE A LITTLE ISSUE. THE DEVICES DO HAVE A LITTLE BIT OF HISTORY IN TERMS OF NOT BEING THE MOST OPTIMAL ONES. WE WANT TO MAKE SURE WE HAVE CAPTURING ALL THE DATA FOR DEVICES. WE ARE ABLE TO CLEARLY CALL OUT WHERE THE ISSUE IS. DID IT HAPPEN BECAUSE IT’S A SUPPORTED DEVICE. DID IT HAPPEN BECAUSE OF A NETWORK. THE SECOND THING THAT WE HAVE IS THE SYSTEM. AGAIN, IN CASE OF SKYPE FOR BUSINESS, SOME OF THE CLIENTS ARE KNOWN FOR FAILURES. WHILE YOU HAVE A GREAT STORY IN PLACE, THERE ARE ALSO — ALSO THE SOMEBODY HAVING AN EXTREMELY OLD CLIENT OR A DRIVER NOT KNOWN TO WORK WELL. THAT IS INFORMATION, AGAIN, WE CLASSIFY THAT DATA ALSO. THE THIRD ONE, WHICH IS ON THE CONNECTION, RIGHT? SOMETIMES YOU DON’T EXPECT IT TO PERFORM, IF YOU ARE ACTUALLY TAKING A CALL ON A CONNECTION IN A MOVING CAR. MORE OFTEN THAN NOT THAT’S A RECIPE FOR FAILURE. YOU CAN HAVE A GREAT CALLING EXPERIENCE EVERYWHERE BUT THESE ARE THINGS THAT MAY NOT WORK. YOU CLOSE THE HUB AND ACCESS. ONE OF THE DATA POINTS YOU COLLECT IS SIGNAL STRENGTH. YOU CAN HAVE A FAULTY ON THE AXIS POINT BUT SOMETHING IS NOT WORKING WELL. YOU COULD HAVE A SIGNAL WHICH IS NOT REALLY WORKING WELL. THAT IS FROM A CONNECTION STANDPOINT. ALL OF THIS IS FINE. LET’S SAY YOU ARE ACTUALLY HAVING THIS EXPERIENCE ON A NETWORK IN YOUR ORGANIZATION. HE DIRECTS THIS, COLLECT A LOT OF INFORMATION ON THE NETWORK, FROM YOU TO THE SERVICE, FROM THE USER TO THE SERVICE. SO IT’S BACK TO THE USER. IN CASE OF A PEER-TO-PEER CALL WHAT ARE THE DIFFERENT DATA THAT WE HAVE. WE COLLECT THE INFORMATION AND MAKE SURE WE HAVE INFORMATION THAT IS CONSUMABLE. WHILE THIS IS A DATA PIECE, THEN WHAT I’M SEEING WE DO CLASSIFY THE CALLS. THE CALL CLASSIFICATION, FALL INTO THREE CATEGORIES. UP HAVE THE GOOD CALLS WHERE EVERYTHING IS GOOD. WE WON’T SPEND A LOT OF TIME ON GOOD CALLS. THEN POOR CALLS. SUPPORT CALLS WOULD BE CLASSIFY AS POOR BASED ON RULES THAT WE HAVE. TOWARDS THE END OF THE PRESENTATION, ONCE YOU APPLAUD THIS, THERE IS A UNIVERSAL LINK THAT TELLS ME ABOUT WHAT A KHAL IS. I HAVE TAKEN THE SCREENSHOT, YOU HAVE — THAT’S CLEARLY OFF. YOUR PACKETS ARE NOT GOING THROUGH. IT COULD BE A BLOCK, SOMETHING IS HAPPEN HERE. YOUR PACKET SLOSS ONE THING. THEN YOU HAVE JITTER. JITTER IS GREATER THAN THE PARAMETER YOU ARE EXPERIENCING. THAT’S ANOTHER THING, ANOTHER PARAMETER WE LOOK AT AND SAY, HEY, THAT A CAUSING A BAD CALL. SOMETIMES YOUR CALL WILL JUST NOT GO THROUGH. ONE OF THE THINGS — ONE OF THE REASONS THIS COULD HAPPEN IS THAT YOUR SERVICE IS NOT REACHING THE ENDPOINT. AGAIN, IT’S NOT OPTIMAL. THEN THE OTHER THING IS A DEVICE NOT FUNCTIONING. SOMETIMES YOU GET ECHO OR SOMETHING. WHILE WE HAVE DATA COLLECTED, WE ALSO MAKE SURE THAT WHEN SOMEBODY IS LOOKING AT THAT PARTICULAR SCREEN WHEN A USER CALLS, THEY GET TO SEE WHY THE CALL IS OUTGOING. THEN WE DO OUR CLASSIFICATION AND MORE OFTEN THAN NOT WE ENDS UP SEEING “UNKNOWN.” IN THIS CASE, THE CLIENT CRASHED. THE CALL DROPS BEFORE THE DATA CAN COME IN. WE COULDN’T GET THE DATA. WE CLASSIFY THAT AS UNKNOWN. IN THE DEMO I WILL SHOW YOU, WE DO HAVE A LITTLE SIGNAL THING. HEY, THIS CALL DOES NOT HAVE ALL THE DATA, BUT THIS DATA THAT EXISTS HERE AND BASED ON THIS CALL, IT IS CLASSIFIED AS POOR OR UNKNOWN. RIGHT? YOU HAVE A TON OF DATA THAT WE HAVE CAPTURED. WE ARE DOING A LITTLE BIT OF WORK IN TERMS OF THE ANALYTIC WORK OF ACTUALLY CLASSIFYING THAT AS POOR. WE WANT TO MAKE SURE THAT WE ACTUALLY LEVERAGING WHAT WE HAVE. HOW MANY OF YOU ARE FAMILIAR WITH MAPPING AND HAVE DONE THAT? THAT’S GOOD. SITE MAPPING, YOU DON’T HAVE TO DO ANYTHING SPECIFICALLY DIFFERENT. YOU EUTHE SAME MAPPING — YOU TAKE THE SAME MAPPING, YOU SEE A DIFFERENT CALL. IN THIS PARTICULAR CASE, WILLIAM’S EARLY LOCATION IS LINCOLN SQUARE. HE HAS PROBABLY A BAD CALL. SO THAT ALSO DIFFERS. AGAIN, WHEN YOU LOOK AT THAT, THAT IS WHEN THE DISCONNECTION, YOU GO BACK, NOW THIS MAY BE BAD ALL THE WAY FROM THERE. ZOOM IN, ZOOM OUT. WE ARE TRYING TO GIVE YOU THE COMPLETE PICTURE RIGHT NOW. AT THIS POINT OF TIME, THE USER ACTUALLY HAVE THE INFORMATION THAT THEY CAN GO BACK AND GET THE INFORMATION THAT SOMEBODY REPORTED AN ISSUE IN THIS SUBNET. IS IT ISOLATED TO WILLIAM ALONE BECAUSE OF HIS DEVICE OR ANYTHING ON THE CLIENT, OR IS THAT WIDESPREAD? IS THIS TO DO WITH THE SUBNET AND THE PARAMETERS THERE. THAT IS SOME OF THE INFORMATION THAT YOU WILL BE ABLE TO SEE, THE TOOLS THAT WE ARE GIVEN. THE ADVANTAGE OF THE SUBNET MAPPING IS ONE I WANTED TO CALL OUT IS THAT YOUR WILL KNOW EXACTLY WHERE THE USER IS MAYING THE CALL. THAT IS THE ADVANTAGE WHEN YOU HAVE SUBNET MAPPING IN PLACE. THE BLUE BAR IS NOT A DESIGN, WE CAN DRAG THAT OUT. SPECIFICALLY THE SPEAKER PRI. I WANT TO SEGUE FOR THE NEXT SLIDE. YOU CAN SEE WHO IS CALLING WHOM. WHO SPENT WHAT KIND OF TIME WITH WHO. PEOPLE WHO HAVE ACCESS TO THIS DATA CAN ACTUALLY SEE WHO IS TALKING TO WHOM. THE LAST 30 DAYS, YOU GET PRETTY MUCH EVERY CALL. YOU WANT TO MAKE SURE THAT YOU ARE — SO AS OF TODAY, AD HAS FOUR TEAM GOALS WHICH IS — THE TEAM ADMINISTRATOR, MANAGE EVERYTHING TO DO WITH TEAMS, RIGHT? HOWEVER LEVEL, THAT IS CURRENTLY AVAILABLE. THEN UP HAVE THE COMMUNICATION ADMINISTRATOR. COMMUNICATIONS ADMINISTRATOR LOOKS AT THE QUALITY FOR MEETINGS, CALLS, AND ALL OF THAT STUFF. THE OTHER TWO RULES, IN THE PREVIOUS — YOU’VE USED IN THE PREVIEW MODE BEFORE THIS CAME UP? YOU WOULD HAVE KNOWN ABOUT THE FIELD 1, FIELD 2. WHEN YOU LOOK AT THE FIELD GROUPS, WHEN YOU TAKE A HELP DESK YOU HAVE POTENTIALLY 2. A SUPPORT SPECIALIST TAKES YOUR CALL, THEY CAN DO THE BASIC TROUBLE SHOOTING. THERE IS MORE THAN NEEDS TO BE DONE THEN IT GOES TO TIER 2. THINK OF THE SUPPORT AS A SPECIALIST WHO IS MUCH MORE TECHNICAL. YOU WANT TO MAKE SURE THAT ENGINEER HAS ACCESS TO ALL THE DETAILS IN TERMS OF THE DATA YOU ARE PROVIDING AND THE SUPPORT SPECIALIST HAS THE BASIC ANALYTICS TOOLS. AT THAT POINT SOME OF THE DATA IS OBFUSCATED. THEY DON’T SEE THE EXACT NAMES OR HAVE ALL THE DETAILS. THAT IS A PERSONA YOU CAN SET UP THE RULES FOR. YOU DON’T HAVE TO SET UP GROUPS. YOU DON’T HAVE TO SET UP ANYTHING SPECIFIC. THEY WERE STRAIGHT AWAY AVAILABLE OUT OF THE BOX RIGHT NOW. YOU HAVE THESE PERMISSIONS YOU CAN USE. WE SPOKE ABOUT THE DATA. WE SPOKE ABOUT THE DIFFERENT COMPONENTS. I WOULD LIKE TO SHOW A QUICK DEMO OF HOW THIS CURRENTLY WORKS. THEN WE CAN TAKE ANY QUESTIONS UNTIL THE END OF THE SESSION. WHILE I DO THE DEMO. LET ME QUICKLY SWITCH THIS. THAT’S WHAT HAPPENS. WHEN YOU TRY TO KEEP THINGS READY. LET ME TRY THIS AGAIN. AWESOME. TWO MORE CLICKS. I GO TO THE MAIN ADMIN CENTER. AND FROM HERE I GO TO THE NEW ADMIN CENTER, WHICH IS THE TEAMS ON SKYPE. I’M SURE YOU HAVE SEEN SESSIONS ON THE ADMIN CENTER. OTHERWISE, WE DO HAVE A SLIDE AT THE END. WE HAVE ANOTHER SESSION BUT IT’S LINKS ON ANALYTICS. WE DO HAVE THE LINKS. YOU CAN PICK UP THE RECORDING. THERE IS A LOT OF INVESTMENT WE DID IN THIS AREA SPECIFICALLY AROUND WHAT USED TO BE A — YOU CAN DO A LOT MORE TODAY. YOU CAN DO MORE ON THE NEW ADD MIRN CENTER. BEST PRACTICES, POLICY, SET UP TEAMS. A LOT OF STUFF HERE I WOULD SINCERELY ATTEND THOSE SESSIONS, IF THE INTERFACE OF THIS LOOKS NEW TO YOU. WE DO SEPARATE THE LISTING. I TRY TO FINDS A VERTICAL USER THAT MAY OR MAY NOT HAVE HAD BAD CARDS. THIS IS TYPICAL THE QUALITIES, THE DIFFERENT INFORMATION THAT YOU HAVE. YOU GET ALL OF IT WITH A GLANCE. LET’S CLICK ON THE CALL HISTORY TAB. I CLICK ON THE CALL HISTORY TAB, YOU SEE THREE CALLS. THIS GETS DISPLAYED IN A TABLE. YOU KNOW WHAT ACTIVITY THIS IS. AND IT’S A DIFFERENT CLIENT USED, IT COULD BE MICROSOFT TEAMS CLIENT USED FOR THAT PARTICULAR CALL. YOU KNOW WHEN THAT CALL HAPPENED. WHEN YOU HAVE THIS, LET’S SEE WHAT WENT WRONG THERE. WE COULDN’T CAPTURE ALL THE DATA BUT SOMETHING IS OFF HERE. HE HAD NOT SUCH GREAT EXPERIENCE. LET ME CLICK ON THIS ONE TO SEE. THIS IS WHAT YOUR HELP DESK PERSON IS DOING WHEN THEY CLICK ON THE CALL. YOU LOOK AT THIS. THAT INFORMATION IS AVAILABLE FOR YOU. THIS IS NOT A GOOD CALL BECAUSE HAVING ISSUES. YOU LOOK AT THIS AT A GLANCE AND IMMEDIATELY YOU CAN SEE THE SYNTAX. I CAN SEE THE AVERAGE — SOMETHING IS DEFINITELY OFF. THAT INFORMATION I CAN GET STRAIGHT AWAY. OKAY WHAT HAPPENED IN THE NETWORK. YOU UNDERSTAND THEY ARE PUTTING A LOT OF DATA THERE. YOU WANT TO MAKE SURE YOUR VERSION A STRAIGHT. WHETHER THERE IS AN ISSUE IN TERMS OF — THE ROUNDS TRIP IS DIFFERENT FROM WHAT IT SHOULD BE. THAT IS NOT A GOOD EXPERIENCE. NOW YOU HAVE A CLEAR IDEA, HEY, SOMEBODY HAD A BAD NETWORK. LET’S QUICKLY LOOK AT ANOTHER CALL WHILE WE ARE HERE. LET’S LOOK AT A DIFFERENT USER. LET’S LOOK AT HEIDI’S CALLS AND SEEP WHAT WE HAVE HERE. HEIDI HAD BEEN IN A LOT OF CALLS. SHE HAS BEEN BUSY AT IGNITE. I WILL CHECK ONE OF THE OTHER CALLS. AGAIN, THE ADVANTAGE WITH THE NEW INTERFACES YOU GET TO — YOU CAN CHOOSE THE CALL LENGTHS. YOU CAN SLICE AND DICE IN TERMS OF WHAT YOU WANT TO SHOW HERE. WHAT YOU SEE IS WHAT YOU GET. WHAT IS THE ACTIVITY TYPE. THE RESPECTIVE CLIENT ISSUES. AGAIN, THAT IS DATA. THIS IS WHAT YOU GET WITH EVERY TABLE AND EVERY DATA DISPLAY. YOU WANT TO MAKE SURE WE ARE MODELING ACROSS. THERE IS NO LEARNING WHEN YOU MOVE FROM ONE TO THE OTHER. USED TO DO, YOU WOULD DO THAT. LET’S LOOK AT ONE OF THE CALLS HERE. I CAN SEARCH BY AUDIO QUALITY. LET ME TAKE THIS CONFERENCE WHERE THERE IS FOUR PEOPLE. I SEE AGAIN. LET ME CLICK AND CHECK EXACT EXACTLY HAPPENED. YOU SEE THIS POOR QUALITY WAS CAUSED BY AN AUDIO DEVICE. THIS IS THE NETWORK AND THIS IS THE AUDIO DEVICE THAT WE HAVE. ONCE YOU LOOK AT THE ADIOS DEVICE, YOU GO TO ADVANCED. YOU CAN SEE THIS RIGHT AWAY. WE CAPTURED THE FUNCTIONING. THESE ARE THE METRICS THAT WE USE. WE USE THE SAME METRICS. WHILE IT SOUNDS — IT’S ESSENTIALLY CAPTURING FUNCTIONING. WHAT IS THE ISSUE. TO KIND OF KEEP IT SIMPLE, NINE OUT OF TEN TIMES THE SERVICE SHOWS THIS HERE. IT SHOULD BE AUDIO DEVICE. THAT’S AN EXAMPLE OF AUDIO DEVICE. WHAT YOU CAN DO IN TERMS OF THE CALL ANALYTICS. THEN, OF COURSE, WE DO HAVE — THIS IS A QUICK AND EASY REACTIVE WAY OF CALL ANALYTICS. SWITCH THIS BACK TO FIVE.>>HELLO, IT’S ME AGAIN. I HOPE YOU ARE EXCITED ABOUT ALL THE NEW THINGS WE HAVE SHOWN TO ALL OF YOU. I WOULD LIKE MENTION, ENGLISH IS NOT MY FIRST LANGUAGE. SO I ACTUALLY CREATED SOME CHEAT SHEETS JUST TO MAKE SURE I’M SAYING THE RIGHT THING. WHEN I’M NERVOUS, I HAVE A TENDENCY TO HAVE EVERYTHING IN MY MOTHER LANGUAGE. THAT IS DEFINITELY NOT WHAT YOU WANT BECAUSE YOU DON’T WANT ME TO PRESENT IN INDONESIAN. UNLESS THERE IS INDONESIAN HERE, RIGHT? HE SAID HERE THAT HELP DESK WILL PROBABLY GET THE CALL. THERE IS A USER HAVING A PROBLEM, RIGHT? I HAVE A BAD CALL. I HAD A BAD MEETING. IN GENERAL, I FIND IT VERY DIFFICULT THAT IT’S ONLY ONE USER PROBLEM. IT’S USUALLY AN INDICATOR THAT IS SYSTEMIC ISSUE. THERE IS A GREATER PROBLEM. I DON’T KNOW IF IT’S THE Wi-Fi IS DOWN, SOMEBODY CHANGED THE CONFIGURATION. A NEW PHONE OR A DEVICE HAS BEEN DOWNLOADED AND IS BEING INSTALLED AFFECTING SOMETHING. ESPECIALLY IF IT IS SUDDENLY THE TREND WAS GOOD AND THEN SUDDENLY THERE IS A SPIKE. SUDDENLY TODAY YOU GET A LOT OF BAD CALLS. WHAT IS THE TOOL THAT GIVES YOU THE ABILITY TO SEE THE TREND? THE CALL QUALITY DASHBOARD. I’M EXCITED TO TALK ABOUT THIS TODAY. FIRST I WOULD LIKE TO TALK ABOUT THE OVERVIEW FOR SOME OF YOU WHO HAVE USED IT. FIRST-TIME USER OR HASN’T IEWLINGSED IT EVER BEFORE. I WILL GO THROUGH IT QUICKLY ABOUT THE TOOL, THE DATA, THE DATA MODEL ITSELF. AFTER THAT I WOULD LIKE TO SHARE THE IMPROVEMENT THAT WE HAVE MADE THIS YEAR AND THE ROADMAP FOR THE FUTURE. I HOPE ALL OF THESE THINGS LIKE WE ARE PLANNING TO DO IN THE FUTURE WILL EXCITE YOU. OKAY? HERE IT IS. CQD. I PUT THIS HERE. IT HELPS YOU ANSWER THE SYSTEM IRK QUESTION. I JUST MENTIONED ABOUT THAT, ABOUT THE QUALITY AND RELIABILITY. WHICH OF MY BRANCH OFFICE ARE HAVING NETWORK ISSUE AND HOW DO THEY EXAIRP TORE THE MAIN OFFICE? CQD COMES FIRST. THE CALL RECORD INTO A TRENDING AND AND ACTIONABLE INSIGHT. THAT IS THE MODEL AND THAT’S AN ACCESS TOOL. THE RAW DATA, I WOULD LIKE TO MENTION HERE, RAW DATA CAN BE EXTREMELY HARD TO CONSUME. IF YOU ARE LOOKING TOO DEEP, YOU CAN MISS THE TREND OF INFORMATION. BUT IF YOU LOOK BROADLY ENOUGH, THEN YOU ACTUALLY MIGHT MISS SOME IMPORTANT SIGNALS. CQD ALLOWS ADMIN TO SLICE THE DATA HOW MUCH YOU WOULD LIKE. TO STEP IN PERFORMANCE, THE CQD ITSELF. LIKE RIGHT NOW WE ARE UPDATING THE DATA WITHIN 24 HOURS. WAIT FOR THE NEW ROADMAP THAT WILL BE TAKEN CARE OF VERY SOON. A CUSTOMER USING CQD TO GET THE TREND OF INFORMATION OF THE NETWORK QUALITY, FAILURES LOCATION, THE Wi-Fi AND USER RATINGS FOR YEARS. LET’S LOOK AT CQD MORE DEEPLY. I FORGOT THE CLICKER DOESN’T WORK. THE KEY CONCEPT OF CQD IS DIMENSION, MEASURES. IN HERE I WILL SAY SOMETHING THAT’S REALLY AN EARFUL. I HAVE AN ANALOGY WILL DIMENSION FOR THE ADMIN TO SLICE THE DATA. MEASURES, THE ACCOUNTS, RATES, AND FILTERS AND DIMENSION ALLOW DRILLING DEEPER TO A PARTICULAR SLICE OF THE DATA. THAT IS WHAT IT IS. SHOW ME NUMBER OF POOR CALLS BY BUILDING FOR THE PAST MONTH. THIS IS WHERE THE EXAMPLE THAT I PUT IT IN THIS SLICE. ALMOST ANY MEASURES DIMENSION UNIFILTER CAN BE PLACED IN THIS STRUCTURE AND THIS QUERY WILL REVEAL AN INTERESTING RESULT. WE GIVE YOU THE TOOL TO GIVE YOU THE ABILITY TO SLICE AND DICE AND FIGURE OUT WHAT IS THE PROBLEM WITHIN YOUR — BE YOUR OWN SHERLOCK HOLMES. THAT’S WHAT I SAID. IF YOU ARE LOOKING — LOOKING AT THE AVERAGE BY USER LOCATION YOU WILL EITHER SEE THE CALL LEAKAGE ARE THE SAME EVERYWHERE AND YOU CANNOT REALLY DRAW A CONCLUSION THERE, RIGHT? THE LOCATION GENERALLY AFFECTS NETWORK QUALITY, BUT NOT DEVICE QUALITY. ON THE OTHER HAND IF THE AVERAGE ECHO IS DIFFERENT BY LOCATION, IT MOST LIKELY DUE TO THE DEVICE. ECHO LEAK VALUE COMPARED TO USER IN ANOTHER LOCATION CAN BE DIFFERENCE, TOO. THERE ARE MUCH BETTER SLICES TO USE WITH ECHO LEAKAGE HABITS SUCH AS DEVICE, MAKE, AND MODEL. THAT IS AN EXAMPLE ABOUT THIS. SO THE NEXT SLICE HERE, IT’S GIVING A REABOUT WHAT HAVE WE DONE IN THE PAST AND WHAT WE HAVE DONE NOW, 2018. CQD IS BASED ON SINGLE PAGE DASHBOARD OR SPD. IT PROVIDES YOU THE TREND. IT GIVES YOU A CANNED REPORT. WE KNOW YOU LOVE TO BUILD YOUR OWN REPORT. SO THE EXPHIBELZ REPORT IS — THE CUSTOMIZABLE REPORT IS GIVEN TOWM SO CAN YOU EDIT, CREATE AND BUILD AS MANY REPORTS AS YOU WANT. THE NEXT IMPROVEMENT THAT WE DO. THIS IS ON OUR TIMELINE. WE INTEGRATE THE LOCATION, DATE, AND I TALK ABOUT THE DIMENSION AND MEASURES. LOOK AT THE NUMBER. IT KEEPS ON INCREASING, THE DIMENSION AND THE MEASURE. AND WHY? TO MAKE SURE CONTAIN YOUR DATA PROPERLY FOR REGION, WE HAVE EACH LOCATION, EACH REGION CQD. WE HAVE A CQD IN INDIA AND AMERICA AS WELL. NOT ONLY THAT WE SUPPORT — OKAY, WE DON’T WANT TO GIVE SOMEBODY AN ADMIN TO LOOK AT YOUR REPORT. IT’S AN O 365. IF YOU WANT TO GIVE IT TO THAT PERSON IN A READER ROLL, THAT PERSON CAN SIGN IN, EDIT AND WHETHER IT’S A SKYPE FOR BUSINESS, WHETHER IT’S TEAMS, THAT PARTICULAR PERSON OR USER IT IS CAPABLE OF DOING THAT. AS OF 2018 WE ACTUALLY INCLUDE QUALITY EXPERIENCE. HOW MANY OF YOU HAD USED — HAVE HEARD ABOUT QER? DO YOU LIKE THEM? YES, IT’S ACTUALLY GREAT. ESPECIALLY FOR A CUSTOMER WHO NEVER HAS CQD BEFORE. YOU DON’T KNOW WHERE TO START. QER REPORT IS A GOOD STARTING POINT. WE GIVE YOU THE 80 PAGE, 70 CANNED REPORTS FOR YOU TO GET STARTED IN WORKING ON IT. WHY I’M EXCITED ABOUT IT IS BECAUSE WE ALSO HAVE A NEW NAVIGATION SYSTEM. SO THE QER ITSELF WHEN YOU GUYS IN THE PAST, YOU HAVE TO GO TO A PLACE, YOU DOWNLOAD ALL OF THIS QER CONTENT, RIGHT? YOU HAVE TO GO THROUGH ALL THE REPORTS ONE BY ONE. BUT HERE, YOU CAN ACTUALLY CLICK IN THE AREA THAT YOU WANT. IT IS ACTUALLY ALREADY BEING CREATED IN THREE FORMS FOR THE USER. QUALITY, AUDIO QUALITY, AUDIO REALITY, CONFERENCING, DTP. WE HAVE ALSO THE BREAKDOWN OF CALLING AND WE ALSO PROVIDE THE AT THE BOTTOM. IF YOU HAVEN’T, CHECK IT OUT. CHECK IT OUT. IT’S AVAILABLE STARTING ON AZURE IN CQD. LOOK IT UP FROM THE DROPDOWN MENU AND GO TO YOUR QER. FROM QER, I FORGOT TO MENTION ONE THING THAT CQD HAS TEAMS AND DATA, IF YOU DON’T SELECT AT THE TOP IT WILL BE AN OVERALL. BUT IF YOU PICK ONE OVER THE OTHER, YOU CAN ACTUALLY TAKE A LOOK AT THE DATA AND TAKE A LOOK AT THE TEAMS. WHY IS IT IMPORTANT? BECAUSE YOU SOMETIMES WONDER, WHY IS THERE A HIGH PIQUE PCR? IF IT’S AFFECTING, IT MIGHT NOT — IT MIGHT BE SOMETHING THAT IS AFFECTING BOTH OF THEM. IT CAN BE, LIKE, OH, THE NEW DEVICE DRIVER UPDATES THAT JUST GOT RECENTLY UPDATED AND INSTALLED EVERYTHING BECAUSE IT’S AFFECTING EVERYBODY. OR SOMETHING THAT IS AFFECTING THE NETWORK, THE NEW I.S.P. THAT WE JUST CHANGED. NOW I AM GIVING — I’M SHOWING THE SLIDE ABOUT THE EVALUATION OF QED. HOW MANY HAVE USED CQD ON-PREM. DO YOU LIKE THE CQD ON-PREM? OKAY. I LOVE THE ON-PREM BECAUSE THE LATENCY IS QUICK. SO I CAN ACTUALLY GO ZOOM IN AND ZOOM OUT REALLY TO FIND OUT THE PROBLEM. SO IF I HAVE THIS, I CAN FIGURE OUT IF THIS IS A PROBLEM OF FIVE USERS, 5,000 USER OR 500 USERRER. OR ON THE OTHER SIDE, I CAN SEE IF THIS IS AN INDICATION OF THE OTHER SIDE. THIS IS THE ISSUE THAT I MENTIONED EARLIER. LOOKING INTO THIS. CQD ON-PREM HAS LOW LATENCY. WHEN THE TIME IS COMING. THE DATA IS ALWAYS AVAILABLE BECAUSE IT’S A SECURE BOUNDARY. WHAT YOU HAVE SEEN IN ONLINE IS ACTUALLY CQD.com. BECAUSE OF THE WAY THAT OUR CQD IN THE CLOUD WAS BUILT, WE HAVE THE CONSTRAINT ON HOW THE DATA ARRIVES. SO WE HAVE LATENCY OF 24 HOURS. BECAUSE OF THE WAY THAT, LIKE, ONLINE COMPLIANCE ABOUT THE DATA AND GDP, THERE — WE MAKE DECISION NOT TO INCLUDE THE PI DATA INSIDE THE CQD. WE HAVE TO DETAIL ALL THE DATA WITHIN TWO DAYS. THE DIFFERENCE WITH CQD ON-PREM AND ONLINE, IS WE START HAVING RELIABILITY DATA. NOT JUST THE QED. THE FUTURE, THE INTERESTING PART THAT I WOULD LIKE TO SHARE WITH YOU, WE ARE GOING TO HAVE LOWER LATENCY. CLOSER TO 30 MINUTES. CID IS BACK. WE HAVE QUALITY AND RELIABILITY UPDATES INCLUDING TEAMS. WE HAVE SSD AND PEEK. YOU ACTUALLY ALREADY CAN SEE WE HAVE SOME OF THE ON-PREM CALLING AVAILABLE ALREADY. BUT WITH THE SSD ON-PREM CONNECTOR, YOU WILL GET BOTH. SO NOW, NOT ONLY THAT, WE ARE AWARE. YOU GUYS LIKE TO CUSTOMIZE ALL THIS REPORT. YOU LIKE TO BE A GEEK. ME, TOO. SO WE ARE GOING TO PROVIDE A POWER BI CONNECTOR. AND MAYBE MORE. SO COME AND TALK TO ME ABOUT YOUR IDEAS. SO HERE IS BASICALLY THE MORE DETAIL OF WHAT IS IN CQD ROADMAP. UP TO 12 MONTHS, HISTORIC DATA. I ALMOST FORGET ABOUT THAT. THE DRILL-DOWN INCLUDES — SSID. ALL OF THIS INTERESTING. DATE RANGES, DRILL-DOWN CAPABILITY. IT’S A VERY LONG LIST. BUT I HOPE THIS ACTUALLY MAKES YOU HAPPY. [APPLAUSE] THIS CLAP WILL MAKE MINE DAD VERY HAPPY, BY THE WAY. THEY WORKED REALLY HARD. WE JUST ENABLED A COUPLE OF OUR TOP CUSTOMER ON THIS CQD. THIS IS NOT JUST I GO TO PowerPoint AND CREATE SOMETHING. IT’S A SCREEN CAPTURE OF OUR REAL-TIME DATA. IN CQD, YOU CAN PICK THE MONTH. IN HERE YOU CAN PICK THE DAY OF THE MONTH. THEN YOU CAN SEE THE HOURS. AT THIS TIME IT’S BASED ON THE UCC. E-MAIL, Wi-Fi, THE ID WILL BE IN CQD ONLINE. WHY? YOU KNOW WHY. BECAUSE WHEN YOU ARE TROUBLESHOOTING YOU NEED THIS INFORMATION. I SEE THE HEADS SHAKING. AGREEING. THAT’S TRUE. WHEN YOU ARE TROUBLESHOOTING YOU WANT TO DRILL DOWN INTO THE CALL DIMENSION. THE DATA IS ONLY AVAILABLE FOR 30 DAYS. LISH IT QUICKLY. YOU CAN ONLY PULL UP ON A CITY LIMITED NUMBER OF CALLS TO INCLUDE THE P.I. FIELD. THE P.I. INFORMATION IS OPT MILESSED FOR THE HELP DESK. THERE IS THE PREM, BUT YOU CAN SEE ALL THE PEOPLE, LIKE IN THIS CASE, THE DATES. THEN THE AGENT, O.C., IF YOU DON’T KNOW WHAT O.C. IS. THAT IS OUR OLD CLIENT LINK SYSTEM. YOU CAN TAKE A LOOK. NOW YOU CAN DRILL DOWN TO THE BUILDING AND THE USER, WHICH GET AFFECTED BY THE CYCLE. SO HOW COOL IS THAT?>>WHEN IT GOING TO BE AVAILABLE? WE’LL TALK ABOUT THAT LATER. SO THE DRILL-DOWN CAPABILITY. THERE IS NOTHING ABOUT TROUBLESHOOTING THAT HINDERS US TO TROUBLE SHOOT FASTER WITHOUT THE CAPABILITY OF DRILL DOWN. SO HERE, WHAT WE ARE GOING TO EMPOWER YOU AGAIN IS IN THE — WE GIVE YOU THE ABILITY TO DRILL DOWN. BECAUSE IT WILL NOT BE ENOUGH FOR US. WOULD YOU LIKE TO DRILL DOWN ON THIS? WE DON’T WANT TO CONDITION FINE YOU. CONFINE YOU. WE WILL PROVIDE YOU WITH A SAMPLE LIKE A CANNED REPORT. BUT AFTER THAT, YOU ARE WELCOME TO DO YOUR OWN DRILL-DOWN. SO IN THIS CASE, YOU CAN DO A DRILL DOWN BASE ON TIMES, BY DATES TODAY, THEN YOU CAN PICK. I WOULD LIKE TO DRILL DOWN ON THIS. SO YOU CREATE A DRILL DOWN BASED ON THE VIDEO AND THEN YOU CAN SELECT AGAIN BY THE DATE. LATER ON, YOU REQUEST SAVE THIS FOR WHEN YOU ACTUALLY THAT PARTICULAR REPORT, YOU CAN DO THE DRILL DOWN. WAIT UNTIL I SHOW YOU THE DEMO. I WILL ACTUALLY GO THROUGH IT. THE LAST BUT NOT LEAST. THIS IS IT. WE ARE GOING TO ALLOW UP TO CUSTOMIZE YOUR CQD REPORT USING POWER BI. [APPLAUSE]>>THANK YOU.>>AGAIN, NO MATTER HOW WE ARE WORKING SO HARD TO PLEASE YOU, YOU GUYS WANT TO DIFFERENT COLOR, TYPE OF TYPE OF CHART, PUT THIS ON THE RIGHT SIDE, PUT THIS ON THE LEFT. I CAN’T KEEP UP WITH THIS. SO GO FOR IT. WE WILL PROPRIETORSHIP THE CONNECTOR AND YOU GUYS CAN DO IT. BY THE WAY, THIS IS REAL. THIS IS BASED ON REAL DATA. YOU CAN CLICK UNDER THE MONTH, YEAR, THEN YOU CAN SEE THE SUM. THIS IS JULY 2018. AND YOU HAVE THIS MANY STRINGS. SO YOU CAN CLICK ON THAT PARTICULAR MONTH. SO WITH THAT I WOULD LIKE TO DO A DEMO. THIS IS THE FIRST THAT I WAS TRYING TO SHOW. THIS IS ALREADY AVAILABLE SO YOU CAN TAKE A LOOK BASED ON THE LINK ITSELF. IT INCLUDES THIS PARTICULAR CER DATA. SO YOU CAN QUICKLY CLICK. YOU CAN TAKE A LOOK AT THE POOR AUDIO STREAM. THERE IS NO INFORMATION. YOU CAN CLICK ON THE TWO PARTIES. I’M OFFERING TO THE DEMO GOD. ANYWAY, YOU GUYS HAVE THIS IN YOUR CQD ONLINE. GO TRY. CHECK IT OUT. GIVE US FEEDBACK. THIS IS AN SPD. SO IT’S NOT — IF YOU WOULD LIKE TO MAKE IT EDITABLE AND CREATE A DIFFERENT ONE, THEN YOU HAVE TO GO TO AGAIN. THIS IS FOR SOMETHING FOR YOU TO OPEN UP ON YOUR IMAGINATION. THE NEXT ONE I WOULD LIKE TO SHOW, THIS IS OUR REAL-TIME REPORT. DON’T YELL AT ME. “THAT’S NOT THE DEFAULT I WANT.” THIS IS BASICALLY TO SHOW YOU HERE THAT WELL HAVE IT BY MINUTE. BY HOUR. BY DATE. THIS IS AVAILABLE AS WELL. THIS IS JUST FOR OUR TESTING PURPOSES TO MAKE SURE THAT THE DATA COMES ON TIME. WE HAVE AT THE TOP HERE SEPTEMBER. HERE YOU CAN PICK THE DATA OF THE DATE AND THEN THE HOUR OF WHEN THE DATA HAS ARRIVED. I DON’T LIKE, MY DEMO GOD WAS KINDS TO ME OR NOT. BUT I WILL SAY SKIP TO THE NEXT DEMO HERE. THIS IS THE DRILLDOWN. I WAS TALKING ABOUT YOU CAN CREATE THE DRILL DOWN AND IN HERE, MAKE BELIEVE THAT I ALREADY DO D THAT, CREATE THE DEFAULT REPORT AND I HAVE THE CQD REPORTING HERE. IT WAS THE DATE AND THE NUMBER OF CALLS. EARLIER I SAW THE SPIKE. SO BASED ON THAT, I WOULD LIKE TO TAKE A LOOK. HEY, ON SEPTEMBER 10, WHY IS THIS SPIKE? SO THIS IS THE DRILL DOWN. IT PICK UP BASED ON USER AGENT CATEGORY. WE TALK ABOUT O.C. EARLIER. YOU CAN SEE IT HAS A HIGH FAILURE ON O.C. TO SHOW YOU HOW TO DO THAT, IT IS BASICALLY ADDING THE DATE AND THE USER AGENT I CREATED OVER THERE. THEN IT WILL SHOW WHO ARE THE USERS WHO GET IMPACTED. THERE THEY ARE. SO WITH THAT, I AM CONCLUDING MY DEMO. S THE KEY TAKEAWAY I WOULD LIKE TO SEND YOU WITH. NO LATENCY. NEW MODEL WITH DRILL-DOWN CAPABILITY WITH UPPED TEAMS QUALITY AND RELIABILITY. CLASSIFICATION. SAME TOOLS. TEAMS ONLINE AND ALSO SSDM. WE ARE WORKING ON TRYING TO PROVIDE A SUPPORT FOR FLEXIBILITY TO CUSTOMIZE YOUR REPORT. AND THE SCENARIO THAT WE WOULD LIKE TO GIVE SUPPORT WITH THIS NEW FUNCTIONALITY IS FOR YOU TO BE ABLE TO IDENTIFY WHO ARE THE IMPACTED USERS SO YOU CAN DRILL DOWN FROM THE TREND WE SAW IN CQD. ON THE OTHER HAND BASED ON ONE CALL OF THAT FAILURE, YOU CAN SEE IF IT’S A MASSIVE SYSTEM ISSUE THAT IS HAPPENING WITHIN YOUR ORGANIZATION. WITH THAT I WOULD LIKE TO OPEN UP FOR QUESTIONING. THANK YOU SO MUCH. BEFORE YOU LEAVE, PLEASE FILL OUT YOUR EVAL. OKAY? [APPLAUSE]>>WHAT I’M MISSING IS CONNECTION, THE DASHBOARD IS OKAY FOR THE OTHER VIEW AND WITH DRILL DOWN. BUT I MISS THE CONNECTION TO THE USER EXPERIENCE WHICH EVERY USER HAS AT THE END, TO THIS OBJECTIVE.>>THE RATING?>>YES.>>WE ACTUALLY HAVE THE RATING INFORMATION AS WELL. BUT HOW IS IT DISPLAYED IN THE FIGURES?>>WHAT DO YOU MEANWHILE, CONFIGURED?>>THE AMOUNT OF CALLS BASED ON THE OBJECTIVE INFORMATION. BUT I DON’T SEE THE INFORMATION — THE USER QUALITY.>>THE USER RATING QUALITY DEPENDS ON WHEN YOU HAVE AT THE END OF THE CALL.>>YES.>>IT’S FIVE OR FOUR OR –>>YES. THIS INFORMATION, ADDITIONAL OBJECTIVE INFORMATION IS GOOD FOR OTHER REASONS. BECAUSE PERHAPS EVERYTHING IS OKAY BUT THE USER SAY IT’S WORSE. WHEN IT’S ALREADY IMPORTANT TO ANALYZE WHY THE USER HAS SUCH A BAD EXPERIENCE.>>CORRECT. SO RIGHT NOW TWO WAYS TO DO THAT, RIGHT? SO IF YOU KNOW YOU HAPPEN TO KNOW WHO IS THAT USER. YOU CAN USE CALL ANALYTICS AND CHECK THE PERSON’S INFORMATION. AS AN I.T. ADMIN YOU CAN CONNECT WITH THEM. BUT IN THE TREND DATA, YOU CAN SEE HOW MANY IS GIVING FIVE STARS, FOUR, THREE. IF YOU PICK THE ONE STAR WITH THE P.I.I. DATA, YOU CAN SEE WHO ARE THOSE UNHAPPY USERS. THEN YOU CAN TRULY INTERPRET THEM. IN MICROSOFT ITSELF WE ACTUALLY DO REACH OUT TO THAT PERSON. HEY, YOU GIVE US ONE STAR, WHY IS THAT? IT COULD BE ONE STAR FOR — IT CAN BE CAN BE LIKE BECAUSE THE NUMBERS. YOU CAN REACH OUT AND ASK. SOMETIMES YOU ARE RIGHT. THE METRICS LOOKS GOOD BUT IT MIGHT BE — THE REASON IS, LIKE ONE THING THAT HAPPENS TO OUR END USER, IT’S NOT BECAUSE OF HIS DEVICE. HE HAS ONE OF THE BEST ENTITIES. BUT IT’S BECAUSE TO JOIN THE MEETING. YOU CAN TAKE A LOOK AT THAT PARTICULAR USER EXPERIENCE. AND CAN YOU TAKE A LOOK AT THE AND WHO ARE OVER THERE AND THEN TAKE A LOOK AT WHO CONTRIBUTED. WE CAN SHOW SOME MORE. SORRY, THERE ARE TWO MICS.>>YOU MENTIONED YOU WILL SHARE WITH US WHEN THE NEW CQD IS READY FOR US TO USE. I DIDN’T HEAR THAT.>>SO YOU WANT TO KNOW THE ROADMAP. HOPEFULLY SOON. HERE IS THE THINGS HOW THE CQD WILL ROLL OUT. FIRST WE ENABLE IT FOR TEAMS. THEN WE ENABLE THE O. DATA. YOU ARE IN INDIA, THAT WILL BE LATER. THEN WE ENABLE IT FOR THE WORLD. AND THEN WE HAVE — ON-PREM. I SKIPPED, SORRY. GO BACK. THEN WE ENABLE P.I.I. AND THEN ENABLE FOR OTHER REGION. THAT IS NOW WE TRY TO MAKE SURE. SO DEPENDING ON HOW THE GOTCHA WE GET AS WE ROLL OUT, I REALLY COULDN’T SAY WHEN. TRUST ME, RIGHT NOW, WE ALREADY HAVE 25 CUSTOMERS. THREE IS ACTIVELY USING. SO IT’S COMING SOON. BEFORE YOU KNOW IT, IT WILL BE YOUR 2019 PRESENT. THAT’S Q1 OR Q2.>>A COUPLE OF QUESTIONS ABOUT THE METRICS. I LOVE HOWE YOU HAVE THE OKAY AND POOR. IT WILL BE GREAT TO SEE KIND OF A YELLOW RANGE IN THERE. THEN BEING ABLE TO GIVE THAT TO OUR SERVICE DESK PEOPLE. HEY, WE HAVE FOUR THINGS GOING ON. IF THERE IS A FOUR CALL, THERE ARE FOUR THINGS THAT LOOK BAD.>>AS AN EXAMPLE, THERE IS RED, YELLOW, AND PINK.>>I HAVEN’T SEEN YELLOW YET BEFORE. SO IF THERE IS YELLOW, THAT’S GREAT.>>THERE IS.>>THE OTHER THING THAT I WOULD LOOK FOR TO SEE, THE 30 MINUTE TIME, IS THERE ANY ALERTING FUNCTIONALITY? LET’S SAY A WHOLE BUNCH OF CALLS COME BACK AS POOR, YOU CAN ALERT THE SERVICE DESK, HEY, THERE IS A PROBLEM.>>WHILE WE ARE LAYING OUT THE FRAMEWORK, MAKING SURE THAT THEY HAVE THE INFORMATION, WE DO HAVE THIS. WE ARE MAKING SURE THAT — YOU WANT TO MAKE THAT INSIGHT. SOMEBODY GETS A CALL. YOU WANT TO KNOW IF SOMETHING IS GOING TO HAPPEN. YOU WANT TO MAKE SURE UP HAVE THE RIGHT — HEY, SOMETHING IS OFF HERE. WE ARE CURRENTLY — IT’S ACTIVELY ON THE BACKLOG. THAT IS ONE OF THE MAJOR ASKS. IT’S ON THE ROADMAP FOR SURE.>>THANK YOU.>>JUST TO BE SURE I’M READING THIS SLIDE CORRECTLY. YOU’RE COMMITTING TO REPORTING CQD? JUST TO BE SURE I’M READING CORRECTLY YOU’RE COMMITTING TO IMPORTING THESE TO ON-PREM CQD?>>ON-PREM CQD ALREADY HAS THE LOW LATENCY.>>YES, BUT ON-PREM CQD IS HAS NOT SEEN AN UPDATE IN AT LEAST TWO AND A HALF YEARS.>>RIGHT, BUT WE ARE TALKING ABOUT 2019 ON-PREM. SO WE CAN USE 2019 ON-PREM WITH THE EXISTING CQDIN PREM. YOU WERE NOT BRINGING THE NEW REPORTS AND THINGS, POWER BI TO ON-PREM.>>NO, NO. WHAT I’M SAYING IN HERE IS CQD IS GOING TO BE ON-PREM WILL BE ABLE TO PULL THE DATA SO THE ONLINE AND TAKE ADVANTAGE OF AM THE ONLINE REPORTING CAPABILITIES THAT WE TALKED EARLIER.>>OKAY. THEN THE FOLLOWUP QUESTION, WHEN WILL THAT NEW FUNCTIONALITY BE ABLE IN THE GCC AND OTHER GOVERNMENT CLOUDS 1234.>>OH, I SEE. OKAY. THAT PART — LET ME GET INTO A LITTLE MORE DETAIL. GCCI AND GCC, DOD.>>LEVEL 5, YES.>>ENVIRONMENT IS ACTUALLY BASED ON THE NEW REAL-TIME DATA PIPELINE ALREADY. HOWEVER, THEY HAVE DIFFERENT INGESTION — BASED UNDER OUR PREESTLES TECHNOLOGY. SO IT STILL HAS A LITTLE BIT LIMITATION. IT DOESN’T HAVE — THAT CQD DOESN’T HAVE POWER BI DATA. THAT IS WHAT WILL NAP G.C.C. ONE MAYBE IN THE FUTURE WE ARE GOING TO UPDATE THE G.C.C. WITH THE CQD, BUT WE DON’T HAVE THAT ON THE ROADMAP YET. AS FAR AS I KNOW. WE ARE JUST TRYING TO COMPLETE THE G.C.C. HIGH DEPLOYMENT AS SOON AS POSSIBLE. WE ARE NOT TRYING TO ADD NEW FEATURES YET.>>I KNOW THIS IN THE CALL ANALYTICS, A SIGNIFICANT AMOUNT OF –>>DON’T FORGET TO FILL OUT YOUR EVAL. OKAY.>>CALL ANALYTICS I NOTICE A SOMETHING AMOUNT OF “UNKNOWN.” I SEEM TO SEAL A CORRELATION BETWEEN THE UNKNOWN CALLS AND POOR QUALITY. DO YOU SEE THAT? I NOTICE IT’S A FAILED UPLOALD CAN BE ONE POSSIBILITY. SHOULD I TREAT THOSE UNKNOWN EVENTS AS POOR QUALITY?>>NOT NECESSARILY. LET’S PUT THAT INTO TWO THINGS. YES, WE DIDN’T GET A LOT OF DATA BUT THAT COULD HAPPEN BECAUSE OF — THE CORRELATION ASPECTS OF IT. TO YOUR POINT, IF YOU SEE A LOT OF UNKNOWNS, DEFINITELY CALL UP AND SAY, WHY THAT IS HAPPENING. BUT TO YOUR POINT, A LOT OF UNKNOWNS EQUALING POOR CALLS, I WOULD HAVE TO SEE THE DATA. TRYING TO SEE WHY YOU’RE GETTING UNKNOWNS. IS THAT BECAUSE — THAT IS SOMETHING YOU WANT TO LOOK AT.>>WHAT PERCENTAGE WOULD YOU SAY IS TOLERABLE AS UNKNOWN? WHAT WOULD YOU SAY?>>IT REALLY DEPENDS. WHAT IS “A LOT” AND WHAT IS “A LITTLE”?>>WE HAVEN’T DONE THAT ANALYSIS. FOR A TENANT, THIS IS 5, VERSUS 70. TO BE HONEST WE HAVEN’T DONE AN ANALYSIS TO SAY — THAT IS GOOD FEEDBACK. GO BACK AND FIGURE OUT IF THERE ARE PEOPLE SEEING UNKNOWNS, MAKING SURE BACKGROUND, NUMBER ONE. NUMBER TWO, WHAT CAN WE PROVIDE GUIDANCE, HEY, THIS SEEMS TO BE THE THRESHOLD THAT EVERYBODY IS GETTING ON ONLINE CALLS. IF YOU ARE HIGHER THAN THAT, MAYBE THERE IS SOMETHING YOU NEED TO DO. REST ASSURED, THAT IS GOOD TAKEBACK. THAT’S A GOOD POINT.>>I HAVE SOMETHING THAT I CAN ADD. FOR EXAMPLE, IN MICROSOFT, I SEE HIGH UNKNOWN, MOSTLY IT’S BECAUSE OF THE HABIT OF THE USER HABIT. IT LOOKS LIKE A POOR COOLER MAP. WE ARE HAVING MEETING BACK AND BACK AND THEY JUST SLAP THEIR LAPTOP AND GO TO THE NEXT ONE. THOSE MEETINGS THAT YOU JUST CLOSE THE LAPTOP — AND YOU DON’T KNOW. YOU HAVE TO FIGURE OUT THAT IS ONE OF THE MAIN REASONS YOU SEE A HIGH NUMBER IN MICROSOFT. BUT THAT’S BECAUSE WE INVESTIGATE. IN MICROSOFT, PEOPLE HAVE THAT KIND OF BEHAVIOR. MAYBE IT’S A DIFFERENT THING, A DIFFERENT AREA.>>NOTICED IN ABOUT A WEEK OR SO, THE CALL QUALITY TESTING HIGH OR POOR. IS THERE A WAY TO DRILL DOWN THERE IS PROBABLY SOMETHING IN THE NETWORK? IS THERE IS GUIDELINE TO SAY IF YOU HAVE ONE PSDN CALL DEVICES, MAYBE THE NETWORK SHOULD HAVE A BANDWIDTH OF THIS AMOUNT, OF THAT AMOUNT. IS THERE ANY SUGGESTION ABOUT THAT?>>THE VIDEO CALLS, IT IS DIFFERENT. SDNs, YES, THOSE KIND OF CALLS. THE CALL QUALITY IS BAD, YOU LIKE TO HAVE A SUGGESTION TO SAY, IF YOU ARE HAVING TEN DEVICES OR FOUR DEVICES, WE RECOMMEND THIS.>>THAT’S THE BANDWIDTH THING YOU ARE TALKING ABOUT. I WOULD SAY LOOK INTO THAT. IT IS ONE THING THAT YOU CAN USE FOR GUIDANCE. ANOTHER THING YOU COULD TAKE A LOOK, THE PSTN EQUALIZED COMPRESSION ON CONFERENCING. THAT IS PROBABLY ELIMINATE SOME OF YOUR PAIN. HOW YOU SET IT UP. SINCE YOU OWN YOUR OWN, YOU CAN ACTUALLY WATCH CAREFULLY THE QUALITY AND THE RELIABILITY OF YOUR 31:10 CALLS. WE EDIT ALL OF THOSE LINK AT THE BOTTOM OF THE DECK. IT WILL BE AVAILABLE TOMORROW IF YOU WANT TO CHECK IT OUT.>>I WANT TO SAY THANKS FOR ALL OF THAT WORK. IT’S REALLY, REALLY USEFUL. AND QUITE HELPFUL.>>AW, THANK YOU.>>I HAVE TWO THINGS. ONE IS A PIECE OF FEEDBACK, THE OTHER IS A QUESTION. THE FIRST ONE, FEEDBACK. IN THE CALL QUALITY IN ANALYTICS UNDER THE ADVANCED TAB, IT WOULD BE USEFUL IF THERE WAS PERIMETER DESCRIPTIONS OF EACH OF THE FIELDS. IT NEEDS TO BE ENGLISH. FOR EXPLAINING THAT, WHAT WOULD ALSO BE UNIVERSAL IS SCENARIOS THAT APPLY TO NOT JUST THE DESCRIPTION. I UNDERSTAND WHY IT IS THAT WAY. BUT YOU HAVE TO EXPLAIN THAT FURTHER AS WELL. IT WOULD BE USEFUL.>>THE QUESTION AND IT WAS MOSTLY BECAUSE I WAS IN A SESSION FOR THE LIVE EVENTS AND HIP THE QUESTION AROUND ANALYTICS AND QUALITY AROUND LIVE EVENTS. IS THAT SOMETHING ON YOUR RADAR DOWN THE LINE FOR YOU?>>THE FIRST, YOUR FEEDBACK. IT’SES WELL TAKEN. ONE OF THE THINGS ON OUR ROADMAP, YOU KNOW, IT IS ON THE LIST. I THINK WE WANTED TO SAY, HERE IS ALL THE INFORMATION, TAKE IT. AT SOME POINT IN TIME, LIKE EVERY OTHER TOOL YOU NEED TO SAY, HOW IS IT — AND THEN SECOND IS, IT’S GOOD, I SHOULD BE DOING THE SEARCH MYSELF. IT SHOULD BE IN A WAY THAT I’M LOOKING ALTER THOSE THINGS. I’M IMPATIENT SAYING THIS IS BAD, THIS IS GOOD. YOU LOOK AT YOUR HEALTH REPORT, HMM, THERE IS A POINT — IT HAS TO BE THAT CLEAR.>>THAT’S THE NEXT STEP, THE OPTIMIZATION. AS ONE OF MY FRIENDS LIKE TO SAY, IT’S AN OBSERVATION, NOT A CRITICISM.>>ABSOLUTELY. THAT’S ONE THING — PLOORLT BACKLOG. WE WANT TO MAKE SURE WEAPON GET THE INSIGHT. SHE WAS ASKING, HEY, A BUNCH OF CALLS GOING ON, HOW DO YOU SET THIS? THAT WILL COME UP SLIGHTLY HIGHER IN THE PRIORITY. IT’S SOMETHING THAT NEEDS TO BE DONE, YET AT THE SAME TIME, WE NEED TO MAKE SURE WE ARE DOING THE RIGHT THING. THE SECOND POINT ON LIVE EVENTS, YES WE ARE IN THE PROCESS OF BUILDING USAGE FOR LIVE EVENTS. ALSO LIVE EVENTS BASED ON — ONE OF THE THINGS, LIVE EVENTS DO TEND TO HAVE — YOU HAVE Q&A COMING UP, YOU WANT TO MAKE SURE IT LINES UP. THE WAY TO DO THAT INFORMATION, THAT IS COMING, TOO. WE WANT TO MAKE SURE YOU GET A SIMILAR FOR THE LIVE EVENT. WHAT IS THE ISSUE OF HOW MANY PEOPLE JOIN. AT THE END OF THE DAY, IT’S A MEETING. THESE THE TWO WE ARE WORKING ON.>>THANK YOU, EVERYBODY.>>THANK YOU SO MUCH.>>FOR SAYING TO THE END AND EVEN OVER ON THE LAST DAY OF THE EVENT. THANK YOU SO MUCH, GUYS.>>SAFE TRAVELS.>>LOOK AT THE NOTES. THERE IS SOME STUFF THAT I MIGHT HAVE FORGOT TO MENTION. THE DETAIL IS PRETTY

Understanding Media Flows in Microsoft Teams – BRK4016


RIGHT ON THE DOT AT 9:00. THANK YOU FOR MAKING IT THIS MORNING. I’VE SEEN JUNE VERSAL. VERYBODY IS HERE. I’M A SENIOR [ INDISCERNIBLE ] OLD HABITS DIE HARD. SO THE FIRST AND FOREMOST QUESTION HIS SESSION. HE’S BLESSED TO HAVE A SECOND CHANCE. HE IS AT HOME ENJOYING HIS SECOND DAUGHTER WITH HIS WIFE AND SUPER HAPPY. HE’S GIVEN ME THE DAUNTING TASK TO TALK ABOUT MEDIA FLOWS. IT WILL BE IN DUTCH, ACCENT, GERMAN AND WE WILL GET THROUGH. I WILL TALK ABOUT THE CHALLENGE WITH MEDIA FLOWS. WE’RE GOING TO TALK ABOUT OUR SOLUTION TO DEALING WITH THAT. I WILL SHOW A BIT OF THAT AND SHOW YOU SOME COLD FLOWS. OUR FIRST OBJECTIVE AND TAKE AWAY. I TALKED ABOUT THE MEDIA CONNECTIVITY. WE SHOW HOW OR END POINTS [ INDISCERNIBLE ] Y AND ISSUES AND THE THREE THINGS THAT I WANT YOU TO TAKE AWAY BACK HOME IS SAHH CLOUD-BASED SERVICE WILL MOSTLY TRAVERSE BETWEEN TWO PEERS. YOU SHOULD LEVERAGE BREAK OUTS. WE’LL TALK ABOUT THAT. PLEASE CENTRALIZE BREAK OUTS ARE [ INDISCERNIBLE ] FOR A GOOD TEAM’S EXPERIENCE AND PLEASE OPEN YOUR FILE. IF YOU DO THOSE THREE THINGS AND PROMISE ME YOU GET 45 MINUTES [ INDISCERNIBLE ] YOU CAN SKIP THIS SESSION. SO A LITTLE BIT ABOUT ME. I’M COWBOY FROM THE NEATH — I’M>>I’M KORNEEL BULLENS. I LIVE IN DARN MY GIRLFRIEND AND TWO CATS. SHE DOESN’T LIKE ME PUTTING PICTURES OF HER EVERYWHERE SO I PUT THE CATS IN THEIR NATURAL HABITAT WHICH IS SLEEPING. I OWN A BOAR BREWERY. [ INDISCERNIBLE ] AND UNIVERSAL STUDIOS. I WORKED AT MICROSOFT SINCE 2012 AND I’M A MEMBER OF THE TEAM’S PG. WITH THAT, FOR TODAY I DO WANT Y SCENARIOS. CONNECTIVITY. NOT GOING TO TALK ABOUT [ INDISCERNIBLE ] WE DID ON WEDNESDAY AND TALK ABOUT MARCH OF TEAMS.>>AN MY COLLEAGUE HAS BEEN OCS AND CONNECTIVITY. IF YOU LIKE TO KNOW MORE ABOUT THAT GO TO CHANNEL 9. SEARCH FOR HIM AND HE WILL DO THESE KINDS OF SESSIONS AIMED AT PRIOR TECHNOLOGIES. THE FIVE ACRONYMS WE WILL DISCUSS. A CANDIDATE WHEN WE TALK ABOUT A CANDIDATE THAT IS THE CULMINATION OF IP ADDRESS, THE [ INDISCERNIBLE ] TCP OR UDP. THAT’S TO CONNECT THE CONNECTION TARGETS OR THE SOURCE OR TARGET. WE TALK ABOUT ICE WHICH IS INTERACTIVE CONNECTIVITY ESTABLISHMENT. PROTOCOL. THAT [ INDISCERNIBLE ] PART OF ICE. STUNT IS SIMPLE UNIVERSAL UDP NET. HOW WE GET OUR CANDIDATES AND WE HAVE TURN WHICH IS A TECHNOLOGY THAT OUR SERVICE USE TO GET AND WE HAVE A RELAY. THOSE CAN BE MEDIA RELAYS OR TRANSPORT RELAYS. NOW THAT WE’RE ALL INTO TEAMS WE RELAYS. RELACE. I WILL TALK ABOUT THE DIFFERENCES LATER ON. FOR SO FAR THE TWO FURTHER NOTES I WANT TO MAKE BEFORE WE CONTINUE. YES THIS IS LEVEL 400. SO WE HAVE 38 MINUTES LEFT AND I’LL GO THROUGH A LOT OF STUFF. I SUFFER FROM THE FACT I’M NOT A NATIVE ENGLISH SPEAKER. I DO MAKE UP WORDS AND I’M A QUICK TALKER. IF YOU MISS SOMETHING OR IF SOMETHING SUN CLEAR, COME UP — IS UNCLEAR, COME UP AFTER THE SESSION I’LL BE HAPPY TO GO THROUGH THE TERMS OVER — OR WHATEVER WE DISCUSSED ONE ON ONE.>>WHAT IS OUR CHALLENGE? WHY ARE WE TALKING ABOUT MEDIA SO THE CHALLENGE IS WHEN WE HAVE [ INDISCERNIBLE ] AND THEY REALLY WANT TO MAKE A PHONE CALL, THEY USE TEAMS. BECAUSE THAT’S THE COOLIST TECHNOLOGY. SIGNALLING THROUGHOUT THE CLOUD THROUGH THE OFFICE 365 AND YOU GET THE NICE GREEN BAR WHICH IS SIGNALLING. SO FAR SO GOOD. EVERYBODY IS HAPPY. NOW WE NEED TO DO MEDIA. STILL EVERYTHING IS HAPPY BECAUSE AL LIST CAN SEE BOLT. THEY HAVE LINE OF SIGHT IN MY PICTURE. THEY CAN DO A MEDIA CHANNEL. IT’S EASY. NOW WE ARE WILL COMPLICATE STUFF. WE ADDED NET, A SIMPLE ROUTER. ROUTERS IN BETWEEN. DEVICES THAT CAN TRANSLATE MULTIPLE IP TO ONE. [ INDISCERNIBLE ] OBSCURED. NOW I KNOW LONGER GET A DIRECT THAT’S A PROBLEM. COMPLICATED BECAUSE CHARLIE IS GOING TO JOIN THE PARTY. CHARLIE IS IN HIS NICE COMPANY AND HE HAS A CORPORATE FILE. ALL IS WELL. HE CAN DO MEDIA TO ALICE BECAUSE THE SILLY FIREWALL IN THE WAY AND WE’VE GOT NET. THEY STILL WANT TO TALK TO EACH OTHER. WE’VE GOT GONE — GOT DAN HE IS IN THE SAME BUILDING AS CHARLIE. SIGNALLING NOT A PROBLEM, TALKING TO CHARLIE, NOT A PROBLEM. HIM TALKING TO BOTH, TO ALICE, NEW PROBLEM. HOW WITH R WE GOING TO SOLVE FOR THIS? THE THREE KEY CHALLENGES WE HAVE WAS GNAT — NAT WE HAVE TO TRANSLATE THE INTERNAL IP TO K IN NETS ARE USUALLY NOT ONE ON ONE. SO I GET TRANSLATED TO A PORT AND IP COMBINATION ON MY NET ROUTER. THAT’S USUALLY NOT TRANSPARENT. WHEN I GO OUT AND US A AUGHT IT SAYS IT’S UNSECURE AND WE DON’T WANT THAT. IT WILL DROP THE PACKET. I CAN’T GET BACK OUTSIDE TO INSIDE. THAT’S A CHALLENGE. WHAT IT DOES DO NICELY IS ENSURE I DON’T NEED 10,000 PUBLIC IP ADDRESSES FOR 10,000 INTERNAL CLIENTS. THERE’S SOME ADVANTAGES. THERE ARE SOME DISADVANTAGES BECAUSE ALICE WOULD REALLY LIKE TO MAKE A CALL. CHARLIE’S TWO CORPORATE FIREWALLS IF YOU OPEN ALL THE PORTS ON THE FIREWALL TO GET NINETY FIREWALL — NOT MUCH POINT IN A FIRE WALL ANYMORE. WHAT DO WE DO WITH THAT? THEY HAVE THE SAME EFFECT AS NAT BUT MORE AIMED — ONLY THE SPECIFIC TRAFFIC TO THE SPECIFIC BOARDS GETS OUT OR IN. SO HOW DO WE DEAL WITH THE CORPORATE FIREWALLS? FINAL CHALLENGE PROXY SERVICE. KEEP SAYING IT. PROXY SERVE ARE BAD. WE DON’T LIKE THEM FROM [ INDISCERNIBLE ] THE OFFICE 365 SAYS DON’T DO IT. BYPASS PROXY SERVICE FOR ALL TEAMS TRAFFIC THAT’S GOING TO OFFICE 365 . YOU GO TO A PROXY SERVER OR UDP FORCED INTO TCP WHICH IS NOT GOOD FOR YOUR — THERE’S ADDITIONAL SECURITY FILTERING OF TRAFFIC. FILTERING OF REQUESTS. YOU CAN ZHAN OUT. WHICH WOULD BE AWESOME IF TEAMS TRAFFIC WOULDN’T BE ALL SECURED BY DEFAULT. N THE MIDDLE ATTACK AND IT BREAKS STUFF. IT BREAKS THE OUTER PLUG? N. AND IF IT’S UDP USUALLY IT WILL BLOCK IT. IT WILL BECOME TCP. SO PROXY SERVICE ONE OF THE CHALLENGES, WE WANT TO BY PASS THAT. NOW WE KNOW THAT’S NOT ALWAYS POSSIBLE. WE THOUGHT OF SOME SOLUTIONS. AND WHAT WE’VE DONE IS WE’VE — ESTABLISHED G CALLED ICE STONE AND TURN. N AND RETURN THE PART OF ARTS. SO WHAT HAPPENS. WE’VE GOT A CLIENT, THE CLIENT CONNECTS TO OFFICE 365 USING SIGNALLING. THE GREEN BAR IS HERE. WE USE THE REST API TO HTPS WEB SOCKET TO OUR ONLINE SERVICES. NOW MEDIA, THAT’S A SEPARATE CHANNEL. WE HAVE AUDIO, VIDEO. THEY ALL USE SEPARATE CHANNELS FROM SIGNALLING. WE CAN ADD A RELAY THERE BECAUSE AS WE TALKED ABOUT ALICE AND BOB AND THEY CAN’T TALK DIRECTLY TO EACH OTHER. WHAT DOES THE RELAY DO? WHAT THE RELAY DOES THAT IS THE TURN SERVER, IT REFLECTS THE NET ADDRESS. SAYS BME. WHY TWO NET ADDRESSES? BECAUSE WE HAVE UDP AND TCP. WE HAVE TWO REFLECTIVE ADDRESSES TY TO RELAY THOSE PACKETS ON THE STUN AND TURN SERVER. LY GO MORE IN DEPARTMENT ON — DEPTH ON HOW THAT WORKS. TO GO OUT THE FACT WE CAN GO DIRECTLY TO ALICE AND BOB WE ADD A RELAY SERVER ON THE OTHER END. ON THE PLACE WE KNOW YOU CAN REACH. WE PUT IN OUR DATA CENTERS AND TELL YOU TO OPEN UP THOSE FORTS US, AND WE KNOW YOU CAN REACH AT LEAST THAT SERVER. SO THE ICE PROTOCOLS, THE ICE MEMBERING MECHANISM — WHAT IT DOES IS HELPS WITH THAT CURRENT EXCHANGE. HELPS DETERMINE ULTIMATE MALL — OPTIMAL MEDIA PATH. WHICH COMPONENTS USE ICE. ALL THE CLIENTS, THE TEAM’S CLIENTS THE NEW MOBILE, PC, MAC, YOU WILL USE ICE AND THE SERVERS AND COMPONENTS USE ICE. WE CAN USE THAT FOR AUDIO VIDEO SIGNALLING. WE DON’T NEED RELAYS FOR THAT. WE CAN GO TO DIRECTORY. THEN WE HAVE THE RELAY WHICH IS OUR SPECIAL LITTLE SERVICE IN THE CLOUD. IT PROVIDES STUN AND TURN AND ONE THING THAT IS IMPORTANT HERE, IT DOESN’T TERMINATE MEDIA. SO YOUR MEDIA WILL ONLY FLOW THROUGH A RELAY. IT WILL NEVER STOP AT RELAY. ESPECIALLY WHEN YOU HAVE SOME OF THE SECURITY DISCUSSIONS THAT — THEY MIGHT SAY, YOU CAN TAP TO RELAY. THERE’S NO MEDIA FLOWING. THERE’S NO MEDIA STOPPING THERE. ANYTHING THAT IS STOPPING THE MEDIA AT THE RELAY WILL BREAK THE MEDIA PATH. SO THERE’S NO MEDIA STOPPING THERE. IT’S JUST A RELAY. ALSO BECAUSE IT’S JUST A RELAY WE CAN HANDLE THOUSANDS AND THOUSANDS OF CALLS BECAUSE IT DOESN’T NEED TO WORK REALLY HARD. IT JUST NEEDS A LOT OF BANDWIDTH. ON THE AZURE NETWORK BANDWIDTH WE HAVE. SFRAJLY ENOUGH — STRANGELY POINT. AS ONE OF THOMAS’S JOKES IT’S NOT EVEN A SOFT END POINT. HE CALLS ALL SEMI COMPONENTS SOFT ICE. IT’S NOT EVEN A SOFT ICE ANYTHING. IT DOESN’T TERMINATE ANY MEDIA. IT’S NOT ANY PART OF ICE. THE ONLY THING IT DOES, IT HOSTS COMPONENTS FOR THE ICE NOTIONS. IT HOSTS THE COMPONENTS OF STUN AND TURN. SO WHETHER WE START OFF WITH THIS RELAYS. SO WE USED TO HAVE MEDIA RELAYS IN OUR LCS, OCS SKYPE FOR BUSINESS. THEY WERE LIVING ON OUR, FOR SERVICE. AUDIO RELAY. SO WHAT’S THE PROGRESSION THERE? WHY DID WE GO TO TRANSPORT RELAYS? WE BUILT THOSE MEDIA RELAYS FOR ON-PREMISES. SO THERE WERE SOME CAVEATS WITH BUILDING THAT THEY NEED TO BE CLOSE TO THE POOL FOR EXAMPLE. SO IF YOU WERE HOSTING IN THE JURPEN — EUROPEAN DATA CENTER THE RELAY HAD TO BE IN EUROPE WHICH IS KIND OF ANNOYING IF YOU’RE IN THE U.S. AND YOUR CAUSE YOU’RE VISITING IGNITE AND YOU WANT TO DO A CALL AND NEED RELY AND THE TRAFFIC GOES EUROPE TO HERE BECAUSE YOU’RE IN A EUROPEAN POOL. DOESN’T WORK IN A CLOUD. WE GO TO TRANSPORT RELAYS WHICH IS INDEPENDENT OF OUR POOLS. YOU ALWAYS GET TO THE CLOSEST TRANSPORT RELAY. CAVEAT, THIS IS ONLY WORKS IF OUTS. AS SOON AS YOU USE CENTRALIZED ANTI BREAKOUTS THIS IS BROKEN. YOU NO LONGER GET ANY ADVANTAGE OF THIS AND YOU MIGHT GET A DISADVANTAGE. BREAKOUTS. ALL [ INDISCERNIBLE ] FOR TRANSPORT WE HAVE SEPARATE UDP PORTS PER WORKLOAD AND THE NICE THING DOING IT THAT WAY, IN THIS CLOUD CENTRIC WORLD, IF YOU WANT TO DO ANY [ INDISCERNIBLE ] QS ON BASED ON TARGET PORTS. YOU KNOW THAT AUDIO WILL FLOW THROUGH 347ADP AND YOU KNOW THE RANGE BECAUSE WE TOLD YOU. MEDIA RELAY NO LONGER USED BY TEAMS. THEY WERE NEVER USED BY TEAMS. RELAYS. SO THE PROPERTIES OF TRANSPORT RELAY, IT’S AN NE CAST IP ADDRESS. THEORETICALLY ALL OF OURS HAVE THE SAME IP ADDRESS. AS SOON AS THE CLIENT CONNECTED AUTOMATICALLY CONNECTS TO THE CLOSEST ONE TO THEM. THERE ARE SOME PRIVACY BOUNDARIES. SO WE HAVE THE CONCEPT OF SOVEREIGN TENANTS. IN CERTAIN COUNTRIES THERE’S A SPECIAL VERSION OF OFFICE 365 FOR THAT SPECIFIC COUNTRY DUE TO REGULATIONS. THOSE PEOPLE WILL NEVER USE A TRANSPORT RELAY IN A DIFFERENT COUNTRY. IT’S THE LAW THEY SASS YOU’RE — SAYS YOU’RE ALLOWED TO. SO WE’RE FULLY COME BLENT THE LAWS. ANY EU TENANTS THEY WILL ONLY TRANSPORT WITHIN THE US OR EU. THE OTHER TENANTS CAN USE ANY TRANSPORT RELAY THAT’S CLOSE TO THEM. ONE CAVEAT. AND BY NOW YOU SHOULD HAVE GOTTEN THE GIST OF THE CAVEAT. THIS IS — THIS WILL ONLY WORK INTERNET BREAK JOTS. — BREAKOUTS. WON OF THE OTHER. I THOUGHT TO MAKE A PICTURE AND S WORKS. SO WE HAVE OUR AZURE NETWORK. THE GRAY THAT IS OUR AZURE NETWORK. THE SECOND LARGEST IN THAT NETWORK IN THE WORLD. BECAUSE WE’RE NUMBER TWO. THE IS ACTUALLY A GLOBE — A GLOBE ENCOMPASSING NETWORK. WHAT THIS MEANS IS THAT WE ESSENTIALLY HAVE OUR OWN PRIVATE DOC FIBERS BETWEEN ANY DATA CENTER THAT WE OWN IN THE WORLD AND WE HAVE A — PEERING TO ANY SERVICE PROVIDER UNLESS THEY HAVE LIKE THREE COMPUTERS. SO WHAT IT DOES IS AS SOON AS YOU LEAVE YOUR OWN PRIVATE NETWORK, AND YOU GO ON TO THE PUBLIC INTERNET IT TAKES ABOUT TWO HOPS BEFORE YOU GO ON TO THE AZURE NETWORK. THE NICE THING ABOUT THAT IS THAT AS SOON AS YOU WANT TO GO, LET’S SAY YOU HAVE A MAILBOX IN THE EU AND YOU NEED TO GET SOME STUFF FROM THE EU AND YOU’RE CURRENTLY IN THE U.S. YOU DON’T HAVE TO RELY ON HOW YOUR PROVIDER IS GETTING TO THE EU. IT’S GOING TO BE US. NETWORK VERY QUICKLY. ONE OTHER MAJOR ADVANTAGE THAT HAS, BECAUSE WE OWN THAT NETWORK AND ESSENTIALLY PUT STUFF WHERE EVERY WE LIKE, WE’VE PLACED A BUNCH OF TRANSPORT RELAYS THROUGHOUT THE WORLD. SO IN THE EXAMPLE I HAVE HERE WE HAVE TRANSPORT RELAY AND THE AZURE NETWORK. SO WE HAVE THEM IN THE EUI U.S., GERMANY, NEW ZEALAND. THEY’RE ALL OVER THE WORLD. SO WHEN THAT CLIENT, THE EU CLIENT ONE AND TWO, EVEN HOSTED IN THAT U.S. DATA CENTER, OR MAYBE HOSTED IN THE APECK DATA CENTER. DOESN’T MATTER WHEN THEY WANT A CONVERSATION AND THEY NEED A TRANSPORT RELAY THEY WILL USE THE ONE CLOSEST TO THEM. THAT’S THE BEAUTY OF TRANSPORT RELAYS. ALL RIGHT. REALLY TRYING TO MAKE THIS AS SIMPLE AS POSSIBLE. DISCOVERY LOAD DISTRIBUTION. WHEN YOU TRY TO DISCOVER WHICH TRANSPORT RELAY IS CLOSEST TO YOU. YOU WILL DO THE ONE TO NEAREST ASSOCIATION. ESSENTIALLY THERE’S A MECHANISM BEHIND AS SOON AS YOU TRY TO REACH THAT IP ADDRESS THAT PROVIDER WILL ROUTE IT TO THE SHORTEST PATH TO GET TO THE CLOSEST TRANSPORT RELAY. EACH TRANSPORT RELAY HAS THE SAME APPEARANCE. AND THE IP ADDRESS THE CLOSEST LOCAL TRANSPORT RELAY. THAT’S EQUAL COST MULTIPATH ROUTING. A BIG WORD. WE USE THAT WITHIN THE GROUP OF LOCATION TO ENSURE SENTENCE YOU’RE CONNECT — AS SOON AS YOUR CONNECTING TO ONE THEY CAN TAKE LOADS AND LOADS OF DATA AND HANDLE LOADS OF SESSIONS THEY WILL NEVER GET OVER LOADED BECAUSE THEY INFORM EACH OTHER HOW BUSY THEY ARE AND IF ONE IS REALLY BUSY, THE NEXT WILL PICK UP AND TAKE THEMSELVES OUT OF THE EQUATION SO THEY WILL NO LONGER GET NEW CALLS UNTIL THEY’RE FREED UP.>>HOW DOES THIS LOOK LIKE IN ACTION? WE HAVE FIVE PHASES. THE FIRST, WHEN WE SIGN IN, WE ESSENTIALLY REQUEST CREDENTIALS. I’M GOING TO SHOW YOU THE M REST AND MEDIA AWE THEN OCCASION SERVICE. THE TRANSPORT AUTHENTICATION PROVIDER. THE MEDIA RELAY AUTHENTICATION SERVICE NO LONGER BEING USED BY TEAMS. I PUT IN IT HERE BECAUSE WE USUALLY TALK ABOUT — CREDENTIALS, THEY DON’T EXIST ANYMORE BECAUSE THERE’S NO MEDIA RELAY. NOW THEY’RE CALLED TRACK. FOR ALL THE TRANSPORT RE LAY — WE NEED KRE DECISIONALS, WHY? RELAY WE NEED TO MAKE SURE THAT THE TRANSPORT RELAY KNOWS WHO WE ARE. THAT THING IS ONE WHEN YOU BOUGHT OFFICE 365 YOU’RE PAYING FOR A SERVICE. SO WE’RE NOT GOING TO GIVE OUT MEDIA CANDIDATES WILLY-NILLY ONLY TO PEOPLE WHO PAID FOR OUR SERVICE. WE NEED A KRE DENS TOLL AUTHENTICATE. WHEN ESTABLISHING A CALL THIS HAPPENS FOR EACH AND EVERY CALL. A CANDIDATE DISCOVERY AND EXCHANGE, CONNECT TIFFTY CHECKS AND A CANDIDATE PROMOTION BASED ON THE MOST LIKELY CANDIDATE WE SO ONCE WE DO THE CREDENTIAL EXCHANGE AND FOR EVERY CALL IT’S AND PROMOTION. SO AS FAR AS RELAY CREDENTIALS, AS SOON AS WE SIGN IN WE TELL YOU, HEY, YOU’RE GOING TO NEED KRE DECISIONALS. THE SERVICE HELPS YOU TO GET THEM. THEY WILL BE CREATED AND SIGNALING YOU GET THOSE CREDENTIALS. THIS IS IMPORTANT BECAUSE THIS IS OFTEN CONFUSED WITH ENCRYPTION. IT’S NOT ENCRYPTION. IT’S JUST AUTHENTICATION. I’LL SHOW THE DIFFERENCE IN THE UPCOMING SLIDES. SO FOR TEAMS IS VERY SIMPLE. THE SERVICE WILL PROVIDE CREDENTIALS YOU’LL NEVER TALK DIRECTLY TO THE TRACK. AS FAR AS ALL OUR CUSTOMERS ARE CONCERNED THE TRACK DOESN’T EXIST. THE CLIENT NEVER TALKS TO IT IT’S JUST A SERVICE. SO WHAT HAPPENS? WHEN WE SIGN IN WE TELL THE SERVICE HEY, WE’RE HERE. THE SERVICE SAYS THAT’S FANTASTIC LET ME GET YOU SOME CREDENTIALS. THE TRACK GENERATES CREDENTIALS AND THE SERVICE TELLS US. THAT’S HOW IT WORKS. WHEN YOU CONNECT TO — YOU CONNECT TO EITHER 347 OR 443 AND REDIRECTED TO THE ACTUAL IP AND CONNECTIVITY. YOU WILL KEEP A CONNECTION OVER 3478. AND DURING THE SET UP OF CALLS YOU MIGHT GET ADDITIONAL PORTS FOR ADDITIONAL MEDIA. THE CANDIDATE LIST WILL ONLY HAVE UDP CANDIDATE IN THE LIST AND WE KNOW THAT IF THERE’S A UDP CANDIDATE THERE’S A CORRESPONDING TCP. WE’RE SMART WE DON’T NEED TO SAY HEY, IF WE CAN GO TO 3479 ON THIS SPECIFIC IP ADDRESS ON UDP SE TCP. EVERY WORKLOAD HAS ITS OWN SPECIFIC PORT ON THE RELAY FROM 3478 UP TO 3481. SO HOW DOES THIS DISCOVERY WORK? FIRST OF ALL WE HAVE AN IP ADDRESS. WE KNOW THIS. SO OUR CLIENT STARTS UP AND KNOWS, THIS — MY IP ADDRESS I’LL ADD THAT TO MY LIST. WE THEN TALK TO THE MEDIA RELAY OVER 3478 AND THE MEDIA RELAYS SAYS THIS EXTERNAL, WE CALL THIS THE REFLEXIVE IP. THE EXTERNAL IP ADDRESS WITH THE CORRESPONDING PORT, THAT’S WHERE YOU CAN FIND ME. YOU CAN TELL THE OTHER PARTY THIS IS WHERE THEY CAN CONNECT TO. SO THAT’S NUMBER C. WHILE DOING THAT WE SAY, BY THE WAY, I HAVE SEEN THAT YOUR SPECIFIC EXTERNAL IP ADDRESS IS B. SO NOW WE KNOW THE INTERNAL IP ADDRESS, WE KNOW THE EXTERN IP ADDRESS AND THE EXTERNAL REFLECTIVE IP ADDRESS. SO WE’RE ALREADY ON OUR WAY. WE ALSO WANT TO KNOW THE TCP ADDRESSES. THAT’S EASY. WE GO THROUGH THE SAME TO KNOW THAT THE PORTS ARE OPEN. IT IS AN — THE RELAY IS TELLING US SURE. YOU CAN DO TCP. AND YOUR EXTERNAL IP ADDRESS IS D. IT’S IMPORTANT TO UNDERSTAND HERE WE’RE GETTING ALL THESE CANDIDATES AND GETTING ALL THESE PORTS BUT WE DON’T KNOW IF WE CAN CONNECT THAT YET. LEARNING ABOUT THEM. THE FIRST STEP. WE’RE JUST LEARNING ABOUT THIS. WE NOW KNOW, WE KNOW WHICH ONES ARE AVAILABLETOUS. WE DON’T KNOW IF WORK. SO NOW WE WANT TO CONNECT. SO WE’RE PLACING A CALL. WE’RE DOING THIS IN PART — CHECKS WE KNOW OUR INTERNAL IP ADDRESS, THE EXTERNAL, WE KNOW ALL OF THIS. WE HAVE ALSO FIGURE OUT WE’RE BEHIND THE NET. A BUNCH OF DIFFERENT IP ADDRESSES. WE GET A PREFERENCE FOR A WE KNOW THAT WE’RE BOTH NOT ON THE SAME NETWORK. SO WE’RE SAYING IF WE’RE NOT ON THE SAME NETWORK, BY DEFAULT WE USE THE REFLECTIVE UDP ADDRESS OF THE RELAY. THAT’S A DEFAULT BECAUSE WE KNOW THAT WILL HAVE THE MOST CHANCE OF SUCCESS. AS YOU CAN SEE THE OTHER PARTY HAS DONE THE SAME THING. USED V TO Z. SIGNALLING WE TELL THEM HEY, THIS IS OUR PREFERRED CANDIDATE. THESE ARE ALL THE OTHER CANDIDATES THAT YOU CAN CONNECT TO US. THE OTHER PARTY IS VERY GRACIOUS AND THEY SAY, WE ALSO HAVE SOME CANDIDATES. LOOK WE’VE GOT V TORQUES Z. — TO Z. AND Y IS OUR PREFERRED CANDIDATE. DURING THIS PROCESS WE IMMEDIATELY TRY TO CONNECT TO Y. AND WE DO THAT TO ESTABLISH EARLY MEDIA. AND WE WANT TO HAVE EARLY MEDIA. SO EARLY MEDIA IS THE PART BEFORE YOU PICK UP. WE TRY TO ESTABLISH AN AUDIO CHANNEL AND THE REASON BEHIND THAT IS, IS THAT, LET’S SAY YOU’RE PLAYING WITH YOUR PHONE. HEY IT’S RINGING I PICK UP AND SAY HELLO. BECAUSE WE’RE STILL NEGOTIATING, YOU WOULDN’T HEAR THE HELLO. HE FIRST PORTION. SO WE NEED TO HAVE AUDIO BEFORE WE ACTUALLY HAVE AUDIO. SO DURING THE SESSION PROGRESS WE’RE ESTABLISHING EARLY MEDIA. I GET AN OKAY BACK THAT I’VE RECEIVED THAT THING. I’M HAPPY THAT THE EARLY MEDIA IS ESTABLISHED. I’M SAYING I STILL LIKE THIS Y. SORRY. AT THIS POINT — ONE PORTION MISSING. AT THIS POINT WE SEND BACK — WE AGREE WITH WHAT YOU’VE DONE. WE AGREE WITH THE CANDIDATES, WE CAN CONNECT TO THE OTHER CANDIDATES, WE CAN SET UP AN AUDIO CHANNEL. SO EVERYBODY IS HAPPY. WITH THIS CHECK. SO WHAT WEAVER DONE HERE — WE’VE DONE I USE STUN TURN TO — SO MY CANDIDATES THE OTHER PARTY HAS DONE THAT TOO AND THROUGHOUT SIGNALLING WE’VE EXCHANGED THAT INFORMATION. WE CAN SEE IF WE CONNECT. IF WE CONNECT, WE TELL THEM OKAY. THIS SEEMS TO BE WORKING AND WE’RE HAVING THE CONVERSATION ON THESE SPECIFIC PORTS. SO WHAT ABOUT MEDIA ENCRYPTION? BECAUSE WE HAVEN’T DONE THAT. BUT WE HAVE. SO DURING THE INITIAL AUTHENTICATION TO OUR TRANSPORT RELAY. WE’VE GOTTEN M REST CREDENTIALS FROM THE TRAP. REALLY QUICK? . SO THE TRAP HAS GIVEN US M REST CREDENTIALS THROUGHOUT OUR INITIAL SIGN IN. THE ONLY THING THAT DOES IS WHEN WE TALK TO THE TRANSPORT RELAY IT ALLOWSTOUS REQUEST — TO TALK TO IT. DOESN’T DECRYPT ANYTHING. AS SOON AS WE SET TIP CALL IN OUR INVITES, WE ALSO EXCHANGE AN ENCRYPTION KEY. SO THAT’S HOW BOTH PARTIES KNOW ABOUT THE ENCRYPTION KEY. THEY KNOW HOW TO ENCRYPT THE DATA. THEY DON’T USE M REST CREDENTIALS FOR THAT. SO WHAT DO WE DO DURING THE PAIRS. WE KNOW HOW WE WOULD LIKE TO CONNECT. WE DON’T KNOW IF IT WILL WORK. SO DURING THE CONNECTIVE CHECKS WE CHECK IF THE UDP AND TCP PORT BEARINGS IF WE CAN CONNECT TO THEM. MOST LIKELY THE LOCAL IP ADDRESS OF THE LOCAL PARTY WE CAN’T CONNECT TO THEM. USUALLY NET, FIREWALL, STUFF LIKE THAT. WE KNOW OUR RELAY CAN BRIDGE BETWEEN IPV4 AND IPV6. THE NICE THING ABOUT A TRANSPORT I CANNOT USE UDP AND I GO TO TCP TO MY TRANSPORT RELAY AND THE RELAY IS SMART ENOUGH TO BRIDGE BETWEEN TCP AND UDP. SO ONLY A PART OF THE WAY WILL BE IMPACTED. THE STUN PACKETS ARE BETWEEN THE PORT PAIRS IN ORDERS TO ENSURE THAT IT’S ALWAYS THE SAME ORDER OF CHECKS. WE DO INTERNAL, EXTERNAL UDP, EXTERNAL TCP. THE PACT ETS RESPOND THE CONNECTIVITY. STUN. HOW WE FIND OUT IF WE CAN CONNECT TO THE PORTS BECAUSE UDP IS CONNECTIONLESS. WE NEED A BACK AND FORTH REPLY TO KNOW IF WE CAN CONNECT. AND WE STOP CHECK WHEN A CANDIDATE PAIR HAS BY AND THE REASON WE STOP CHECKS IS BECAUSE BY DIRECTIONAL CONNECT CONNECTION. SUPER HAPPY. WE DON’T NEED TO RELAY. LIFE IS GREAT.>>SO HOW DO YOU PROMOTE THEM? WE KNOW — WE KNOW WHICH WHICH WILL WORK. WE’LL USE IPV4 BEFORE IPV6. UDP BEFORE TCP AND DIRECT BEFORE RELAY. THAT’S THE LOGIC HARD CODE IN OUR CLIENTS. YOU CAN’T INFLUENCE THAT. WE WILL DO A REINVITE WITH ONE DEMAND THE SESSION DESCRIPTION PROTOCOL SO WE BOTH AGREE ON THIS IS THE IP ADDRESS YOU NEED TO CONNECT ON THIS IS THE PORT. THE CONFIRMATION FOR THAT FROM THE OTHER SIDE ALSO SAYS, YAY. I AGREE. AND AT THAT POINT THE MEDIA IS ON THE — SO WHILE THIS THAT HAS OPTIONAL VALIDATED PATH IT’S THE BEST PATH POSSIBLE BETWEEN THOSE TWO CLIENTS. IF YOU HAVE BLOCKED EVERYTHING AND WE NOW DO TCP BETWEEN MEDIA RELAYS AND TCP BETWEEN THE MEDIA CLIENT AND THE RELAY IS NOT OPTIMAL BUT THE BEST WE CAN GET. SO TCP VERSUS UDP. WE’VE TALKED ABOUT THIS. WHY DON’T WE RE — TCP IS FANTASTIC WHEN I’M TRYING TO SURF THE WEB. IF I’M MISSING SOMETHING IT WILL AUTOMATICALLY RETRY AND GET IT — THE PACKET AGAIN. EACH PACKET NEEDS TO BE ACKNOWLEDGED THAT I HAVE IT OR PACKAGE. AND ANY LOST PACKETS ARE RESENT. FOR AUDIO OR VIDEO, I DON’T CARE I JUST WANT ALL THE STUFF AS QUICKLY AS POSSIBLE. IF I LOSE SOMETHING ALONG THE WAY, I HAVE SOME MECHANISMS TO COPE WITH THAT. YOU’VE PROBABLY HEARD THAT WHEN YOU WERE TALKING TO SOMEONE AND THEY WERE SOUNDING LIKE A ROBOT THAT’S A CODE TRYING TO REPAIR FOR LOST PACKETS. WE WOULD RATHER DO A ROBO VOICE THAN DELAY A CONVERSATION BECAUSE WE ARE WAITING FOR A T, CP RETRANSMITS. COMMUNICATION WE WANT PACKETS QUICKLY. IF WE LOSE THEM, WE DON’T CARE WE CAN COPE WITH THAT. SO TAKE A LOOK AT SOME OF THE CONFLICTS. SO FOR ONE ON ONE CALLS WITH TEAMS. WHAT YOU HAVE, SO WE VIAE OUR — HAVE OUR RELAY SERVICE. CAN BE THE SAME. DOESN’T MATTER THE MECHANISM IS THE SAME. TWO TEAM CLIENTS THEY ESTABLISH 3478UDP TO THEIR RELAY SERVER. NOW IF WE CAN MAKE THE CALL DIRECTLY, THAT’S AWESOME. LET’S DO THAT. IF THAT DOESN’T WORK WHAT WE CAN DO, THE TEAMS CLIENT WILL USE THE OTHER PARTIES RELAY — TRANSPORT RELAY BECAUSE THAT’S WHAT IN THE OTHER PARTY’S SESSION DESCRIPTION PROTOCOL YOUS THEIR OWN TRANSPORT RELAY. WE USE THEIR TRANSPORT RELAY ON PORT 4378 UP TO 4 — AND MAYBE THAT BIDIRECTIONAL. MAYBE CAN I SEND AUDIO BACK AND FORTH. MAYBE I CAN SEND AUDIO DIRECT IN FROM B TO A HAS TO GO TO MEDIA RELAY. THIS ALL WORKS. PERHAPS WE BOTH NEED TO USE A MEDIA RELAY. AND WE CAN’T DO BIDIRECTIONAL. STILL WORKS. WORST CASE SCENARIO WE CAN’T TALK TO EACH OTHER AT ALL AND WE CAN’T EVEN DO ANY BIDIRECTIONAL IN THAT CASE, THE TWO TRANSPORT RELAYS WILL TALK TO EACH OTHER OVER PORT 3478. AND THE — IT DOESN’T — WE JUST PIGGY BACK OVER THE EXISTING CONNECTION. WE DON’T NEED TO SET UP NEW CONNECTIONS INTO THE NETWORK. TRANSPORT RELAYS CAN TALK TO EACH OTHER AS WELL. WHAT IF THEY TALK TO THE SERVICE? SIMPLER. WHY ONLY ONE TRANSPORT RELAY? BECAUSE WE KNOW THE SERVES CAN RELAY. WE DON’T NEED TO DO ANY PIGGY BACKING OR GOING BACK AND FORTH BETWEEN SERVICE. WE KNOW THAT OUR SERVICE CAN TALK TO OUR TRANSPORT RELAYS BECAUSE THOSE PORTS ARE OPENED. WE THIN NETWORK SO WE TOOK CARE OF THAT. SO THE TEAMS CLIENT ONCE AGAIN CONNECTS TO 3478UDP. THE SERVICE CONNECTS DIRECTLY TO THE AUDIO PORTS. 3479 TO 3481 AND EVERYTHING IS FINE. IF THE TEAMS CLIENT CAN CONNECT DIRECTLY TO THE SERVICE? WHY NOT. LET’S TALK DIRECTLY TO THE SERVICE. ON RELAY ALWAYS 3478. SO SOME OF THE PORTS THAT WE’RE SOME HIGH PORTS FOR INCOMING AUDIO ON THE TEAMS CLIENT ITSELF. WE’VE BEEN TALKING ABOUT 3478 TO 3481 ON THE RELAY AND SERVICE. THE TEAMS CLIENTS WE CALL THIS THE HIGH PORT RANGE 50,000 UP TO 80 FROM THE TOP OF MY MIND. THIS IS WELL DOCUMENTS IN OUR OFFICE 365IP ADDRESS RANGE. SO YOU CAN LOOK THAT UP. AS FAR AS THE SERVICE PORTION IT’S ALWAYS 443TCP AND 3478UDP UP TO 3481UDP. SO WHEN OPENING UP YOUR FIREWALL FOR TEAMS. 3478 UP TO 3481 UDP. I KNOW IT’S SUPER ANNOYING I KEEP REMINDING YOU OF THOSE PORTS. THE AVERAGE CUSTOMER RIGHT NOW, IF YOU GO TO CQD THERE’S A SPECIAL REPORT ON TCP CALLS. IT WILL BE — IT’S SCAREY HOW MANY CUSTOMERS DON’T OPEN THESE PORTS AND HAVE ALL THEIR CALL THES CALLS ON TCP AND THE QUALITY IS BAD. YEAH. QUALITY IS GOING TO BE BAD. DOS AND DON’TS. YES. DON’T PUT STUFF IN BETWEEN. WE HAVE A VERY CONCRETE AND DIRECT GUIDANCE. IF YOU’RE GOING TO CONNECT TO OFFICE 365 DON’T PUT STUFF IN BETWEEN. PROXIES, LET THEM CONNECT CORRECTLY. USE BY PASS ON THE FIREWALLS ON APPROXIMATE YEAS. USE LOCAL BREAK OUTS. USE UDP IT WILL IMPROVE YOUR IMMEDIATE YEA YEAH — MEDIA QUALITY. TCP MIGHT BE REQUIRED FOR WHATEVER REASON YOU HAVE IN YOUR COMPANY. TRY TO GET EXCEPTIONS BECAUSE IT WILL MAKE IT WORSE. WE HAVE THE OFFICE 365URLS I IP ADDRESS RANGES. WE TRY NOT TO CHANGE THEM. BUT THERE WILL BE UPDATES. RIGHT NOW WE ARE MOVING INTO IPV6. THIS HAS IMPLICATIONST. WHAT WE’RE TRYING TO DONED — DO AND WHEN I TALK ABOUT CHANGES. THE CHANGES WE’RE MAKING IS USUALLY REDUCING THE IP RANGES. TRYING TO USELESS AND LESS PUBLIC IPS BECAUSE NO ONE LIKES TO CONFIGURE 10,000 IP ADDRESS TO OPEN AN BUNCH OF PORTS. WE ARE TRYING TO SHRINK THIS DOWN. AND THERE WE GO AGAIN. VERIFY THE UDP PORTS ARE OPEN. SOME TROUBLESHOOTING. BAD NEWS FOR THOSE THAT LIKE LOCKS AND STUFF LIKE THAT. THEY DON’T EXIST WITH TEAMS. I HAVE — HAD ABOUT 15 SLIDE ABOUT HOW WE COULD TROUBLESHOOT TEAMS AND HOW YOU COULD GET LOCKS AND I TALKED TO THOMAS AND SHE HE SAID YOU CAN’T — HE SAID YOU CAN’T TALK ABOUT THAT BECAUSE IT’S NOT SUPPORTED. THAT’S ESSENTIALLY RIGHT NOW THE MESSAGE. WE ARE WORKING ON MAKING THAT MORE ACCESSIBLE TO GET SOME LOCKS. IT’S DIFFICULT RIGHT NOW. SO FOR NOW NO LOCKS FOR TEAMS. THERE ARE SOME AUTOTOOLS. WE HAVE TO QUALITY DASHBOARDS. TALKED ABOUT THIS ON WEDNESDAY. THIS NOW HAS A WAY TO DO CALL TO EXPERIENCE AND THINGS LIKE SHOW ME ALL THE TCP CALLS. YOU CAN VERIFY WHICH NETWORK GUIDANCE. SO GO QUICKLY THROUGH THE MY ADVISOR ONE. SORRY. THE CQD ONE. YOU GET WITH THREE PORTS IN CQD ON MEDIA TRANSPORTS YOU CAN SEE A LOT OF THE CALLS GOING — GOING OUT ON TCP OR UDP. WE SHOW YOU THE REPORT SHOWING HOW MANY CALLS YOU HAD. YOU CAN DO SUB REPORTS TO LOOK AT THE QUALITY. SO FOR EXAMPLE, IN AUDIO YOU CAN SEE I HAD ABOUT A — 400 THOUSAND CALLS ON THRIX CP. 300,000 ON UDP. THIS WOULD BE AN EXCELLENT DORM TALK TO AND INVESTIGATE. WHY YOU HAVE MORE CALLS ON TCP THAN UDP. THAT’S A TOOL HERE. IT DOESN’T ACTUALLY SAY SUBNET ONE, TWO AND THREE. THAT’S [ INDISCERNIBLE ] BUT YOU CAN SEE WHICH SEGMENTS ARE USING A LOT OF TCP OR UDP. AS YOU CAN SEE THIS WILL HELP YOU DRILL DOWN INTO NETWORKS THAT MIGHT BE IMPROPERLY CONFIGURED. THERE ARE — THERE IS A SKYPE FOR BUSINESS NETWORK ASSESSMENT TOOL IT APPLIES TO TEAM AND TEST NETWORK QUALITY. SO WHAT I CAN SHOW YOU — SO WHO IS USED THE NETWORK ASSESSMENT TOOL? KEEP YOUR HAND HIGH? N YOU — IF YOU — OKAY. SO I BUILT SOMETHING AND WE’LL TALK ABOUT THAT IN OUR — IN THE UPCOMING SESSION. I’VE BUILT THIS TO — WITH JASON OUR MAGICIANEN AND I HOPE I CAN RELEASE THIS IN A WEEK. IT’S A POWERSHELL GUI AND IT’S A SINGLE LINE POWERSHELL CODE TO RUN ON YOUR CLIENTS. THEN YOU GET THIS. IT AUTOINSTALLS NETWORK ASSESSMENT TOOL. CHECKS IF EVERYONE ISSING RIGHT CONNECTIVITY IF EVERYTHING IS CHECKS AND AS SOON AS YOU CLICK THE BIG GREEN START BUTTON, WHAT CHECKS IN THE BACK. RUNS THE MEDIA QUALITY TESTS, PASSES RESULTS AND GIVES THE RESULTS IMMEDIATELY.>>BECAUSE I HAVE TWO MINUTES LEFT I’LL GO BACK TO THE PRESENTATION AND LOOK AT THE RESULTS. YOU HAVE TO TRUST ME THIS RUNS NOTHING IN MY SLEEVES. THIS IS RUNNING FOR A LITTLE BIT. I’LL SHOW YOU THAT — SO WE HAVE THE NETWORKING TOOL. IT WILL BE AVAILABLE SOON VIA BLOG POST. I’LL SHOW THE RESULTS IN 30 SECONDS. IF IF — IT WILL CHECK IF THE STYES DEVICE CONNECTION TO THE PCS CERTIFIED DEVICE. A GREAT TOOL TO HAVE YOUR END USERS RUN TO SEE IF THE PC NEATS REQUIREMENTS AND THE NETWORK WORKS. JUST THE POWERSHELL GUI OVER THE EXISTING TOOL. RESOURCE AND SUMMARY. WE HAVE LAVE ET LETS IN HERE. THERE ARE PLACES TO GO TO GET THESE — THE TRAINING ON THIS, TO GET THE TOOL, TO GET SOME HELP ON THIS. WE TALKED ABOUT TODAY CHALLENGES HOW WE FIND THE OPTIMAL MEDIA THE TAKE WAYS. TRAFFIC PEER-TO-PEER. BREAK OUTS AND OPEN THOSE UDP PORTS. AND WHILE WE GO BACK TO THE PRESENTATION. S. ALL PRESENTERS GET THEM AND WE READ EVERY SINGLE COMMENT AND IF DO IT AGAIN. SIMPLE AS THAT. I THIS IS HAPPY. QUALITY ISN’T GREAT FOR THIS NETWORK. WHO WOULD HAVE THOUGHT. AND IF I GO TO VIEW RESULT IT WILL GIVE ME THE RESULTS HERE. IT WILL TELL ME THAT MY PACKET JITTER IS OVER 06 MILLISECONDS WHICH IS OUTSIDE OUR SPECK AND WORK REQUIREMENTS. NOW YOUR END USER WILL SAY THAT WAS A BUNCH OF RED STUFF. WHAT DO I DO WITH THIS? YOU CAN CLICK TO REPORT BUTTON AND GET SOMETHING YOU CAN E-MAIL TO YOUR NETWORK ADMIN. NOW THEY KNOW WHEN YOU RUN THE TEST AND WHAT TO — WHAT THE RESULTS WERE. AND WITH THAT WAS EXACTLY ZERO SECONDS. THEY SAIDFY WENT OVER I WOULD GET IN TROUBLE. IF YOU HAVE MORE QUESTIONS, COME UP TO ME. NO MORE SLIDES. NEXT YEAR THOMAS WILL BE BACK. THAT’S IT.

How Microsoft does IT: Best practices for your Champion program – THR2041


>>>GOOD MORNING, EVERYBODY. HAPPY FRIDAY. ARE YOU GUYS HAPPY IT’S FRIDAY? IS EVERYBODY LEAVING TODAY? >>I’M HAPPY. I’M EXHAUSTED. WE HAVE DONE 12 SESSIONS TODAY EXPECT THIS WEEK. >> IT ALL FEELS LIKE TODAY.>>MY ENERGY IS A LITTLE BIT LOW. WE ARE HERE TO TELL YOU GUYS, I’M SURE YOU GUYS HAVE ALL SEEN HOW IMPORTANT TEAMS IS TO MICROSOFT. >> WE SHOULD PROBABLY INTRODUCE OURSELVES . >>THAT’S RIGHT. YOU SEE? I WORK IN CORE SERVICES ENGINEERING. I’M RESPONSIBLE FOR OUR MIGRATION FROM SKYPE FOR BUSINESS TO TEAMS. CORE SERVICES ENGINEERING, QUICKLY, IS FORMALLY MS IT. I’M SARAH BUSH AND I ALSO WORK IN CORE SERVICES ENGINEERING AND OPERATIONS. I’M RESPONSIBLE FOR THE READINESS FOR OUR SOME 240,000 USERS TO ADOPT TEAMS. I’M GLAD TO BE HERE WITH YOU TODAY. >>THANK YOU FOR COMING IN. WE WANT TO GIVE YOU A STORY ABOUT OUR TEAMS AND LET YOU KNOW HOW WE ARE MOVING FORWARD. WE HAVE BEEN TALKING ABOUT THE UPGRADE STRATEGY ALL WEEK. IT’S REALLY GOES DOWN TO OUR CORE PRINCIPLES FOR WHY WE ARE USING TEAMS TO ENSURE THERE IS A VALUE PROPOSITION FOR OUR USERS. SO THAT THEY CAN ALSO BE USING THE PRODUCT. AS YOU CAN A COMMAND SUCH AS YOU CAN IMAGINE, AT MICROSOFT THEY HAVE CHOICES TO USE ANYTHING. FOR US TO DEPLOY TEAMS WAS ANOTHER PRODUCT, HOW DO I USE THIS? WHEN DO I USE THIS? EVERYBODY THINKS IT’S REALLY EASY AT MICROSOFT TO ADOPT, ON THE CONTRARY, IT IS ACTUALLY MORE DIFFICULT. >> ADOPTION FATIGUE. >> EXACTLY. >> A COUPLE OF THINGS OBVIOUSLY, TEAMS, YOU GUYS HAVE BEEN HEARING ALLOWS YOU TO WORK PHYSICALLY IN REMOTE LOCATIONS. EVERYBODY CAN JOIN. IT IS PERSISTENT THREADING. YOU CAN GET THAT INFORMATION WHENEVER YOU NEED IT WE ALSO HAVE THE ABILITY THAT IS CUSTOMIZABLE FOR TEAM WORKS . THE IS A HELP FOR TEAMWORK WHERE YOU CAN ADD CONNECTORS, ADD TEXT TENDONS — EXTENSIONS. IT IS ONE PLACE TO GO THAT MAKES IT REALLY GREAT. NOW IT IS LIKE THE CALLING AND MEETING EXPERIENCE THAT REALLY SIMPLIFIES THE WHOLE PROCESS FOR YOU. YOU GO TO ONE PLACE AND EVERYTHING IS THERE AND YOU CAN ACCESS IT. OUR INTERNAL ADOPTION PROGRAM, WE TALK ABOUT THESE FOUR GUIDING PRINCIPLES. AWARENESS, ENGAGEMENT, MEASUREMENT, MANAGEMENT. THESE ARE REALLY IMPORTANT TO US. YOU HAVE BEEN HEARING ME SAY THIS A LOT THIS WEEK, WE HAD SOME CORE PILLARS . AWARENESS IS AROUND THE ART OF TEAMWORK TRAINING. WE DID A LOT OF TRAINING WITH OUR USERS. THAT IS ONGOING THROUGH THE ROLLOUT. WE ALSO HAVE WHITE GLOVE ENGAGEMENTS. BASED ON OUR USERS AS THEY ARE LEARNING MORE, AS THEY GET THROUGH THE 100, L200, THEY ARE COMING BACK TO US AND ASSAYING WE NEED SOME SUPPORT HOW DO WE RESTRUCTURE THIS? WHAT IS THE BEST WAY TO REDO THIS? ORGANIZATIONS ARE COMING TO US AND WE’RE HAVING TO PROVIDE THE WHITE GLOVE SERVICE TO SUPPORT THESE CHANGES THAT ARE HAPPENING . MOST IMPORTANT MEASUREMENT, I DON’T KNOW IF YOU SAW SARAH’S SESSION ON METRICS, IT WAS INCREDIBLE. FOR US TO BE ABLE TO MOVE FORWARD WITH OUR WAVES AND IN OUR ROLLOUT WE HAVE TO UNDERSTAND ARE WE ACTUALLY DOING THIS CORRECTLY? WHAT ARE THE MEASUREMENTS? WHO IS USING IT? ARE WE RETAINING THESE USERS? IS THIS VALUABLE? SARAH WILL TALK ABOUT THAT. LASTLY, MANAGEMENT. GETTING THE FEEDBACK FROM USERS TO IMPROVE THE PRODUCT ONE OF THE THINGS WE ALWAYS TALK ABOUT IS BUILDING THAT TRUST WITH OUR USERS . WE NEED TO GET THAT FEEDBACK. WE DO A LOT OF IMPROMPTU SURVEYS . WE DO GLOBAL SATISFACTION SURVEYS AND POLLS TO FIND OUT WHAT’S GOING ON AS WELL AS THE USER VOICE. ONE OF THE THINGS I HIGHLY RECOMMEND FOR YOU AND YOUR USERS , IN THE TEAMS APP THERE IS AN ICON WITH A LIGHTBULB. YOU CAN ACTUALLY SUBMIT YOUR IDEAS IN THERE. THEY GET RANKED. JUST AS MUCH AS YOU WANT FEATURES IT IS THE SAME FOR US. WE DO THE SAME THING. IT IS REALLY IMPORTANT TO BE ABLE TO IMPROVE, MONITOR, AND GET THE FEATURES THAT YOUR USERS WANT. I’M GOING TO HAND IT OVER TO SARAH SO SHE CAN TALK TO YOU MORE. >> THANK YOU. >>>JUST TO GET A LEVEL SET ON THE PEOPLE HERE HOW MANY ARE USING TEAMS DAILY FOR YOUR WORK TODAY? WE HAVE SOME USERS. HOW MANY OF YOU CONSIDER YOURSELVES RESPONSIBLE , EITHER THE PEOPLE YOU WORK FOR OR WITH, ARE YOU RESPONSIBLE? EXACTLY. NOT AN EASY TASK. ESPECIALLY WHEN THEY ARE BUSY AND USED TO KNOWING ALREADY HOW TO DO SOMETHING TO MOVE THE NEEDLE ON THAT BUT WHEN WE FOUND , WE KIND OF DID THIS FOUNDATIONAL HE AND WE SAID HOW ARE WE GOING TO MOVE OVER 200,000 USERS ONTO TEAMS? ONE, WHEN THEY STILL HAVE THE OPTION TO USE OF SKYPE FOR BUSINESS. WE HAVE BEEN USING THIS SO LONG. ALONG WITH OTHER THINGS LIKE THE ART OF TEAMWORK TO HER AND OUR STACKABLE VIDEOS AND DIFFERENT WAYS TO GET CONTENT BECAUSE PEOPLE LIKE TO LEARN IN DIFFERENT WAYS WE SEND ONE OF THE THINGS WE WOULD LIKE TO TRY IS A CHAMPIONS PROGRAM. WE ARE GOING TO DO A PILOT FOR THE FIRST THING THAT WE TALKED ABOUT WAS THAT SOUNDS GOOD, BUT THERE’S A DIFFERENCE BETWEEN VOLUNTEER AND FALLEN TOLD. TOLD IT DOESN’T ALWAYS WORK AS WELL AS VOLUNTEER. WE WERE TRYING TO BE THOUGHTFUL ABOUT WHERE ARE WE HEARING PEOPLE ENGAGE IN? WHO ARE THE EVANGELISTS THAT HAVE ADOPTED THIS AND BROUGHT THIS INTO THEIR LIVES BECAUSE THEY LOVE THE PRODUCT AND ARE PASSIONATE ABOUT IT? ONE PLACE WAS OUR TEAMS YAMMER FEED. ORGANICALLY CERTAIN AMOUNT OF OUR USERS HAD STARTED ANSWERING OTHERS QUESTIONS ON THAT YAMMER FEED. WE USE THAT A LOT INTERNALLY TO CROWD SOURCE INFORMATION OR GET INFORMATION OUT THERE THE PEOPLE ANSWERING WERE FROM ALL OVER ACROSS THE COUNTRY — COMPANY. WE ARE IN MANY COUNTRIES AND BUILDINGS AND THAT WAS OUR FIRST RECRUITING TOOL. THEN WE ACTUALLY KNEW THAT IT HAD TO BE GLOBAL. THERE ARE DIFFERENT INFRASTRUCTURAL THINGS, DIFFERENT JOBS, DIFFERENT WAYS OF WORKING IN DIFFERENT PLACES IN THE WORLD SO WE KNEW WE HAD TO GET OUT THERE AND REACH OUT TO OUR TIME — OUR IT MANAGERS AND DIFFERENT FIELD ENGAGEMENT DELIVERY MANAGERS AND AREA CAPABILITY LEADS. WHICH MIGHT HOLD YOU — HOLDING YOUR QUESTION UNTIL THE END? BACK [ INAUDIBLE QUESTION ]>>RIGHT. YEAH. >>[ INAUDIBLE QUESTION ]>>YEAH. SHE IS ASKING ABOUT HOW DO I IDENTIFY DIFFERENT ROLES SO THAT DIFFERENT PEOPLE CAN COME ON BOARD? THE FACT IS, WE DIDN’T. THIS IS COMPLETELY VOLUNTEER. WE HAVE ALL OF THESE ROLES THAT ARE REPRESENTED. HOPEFULLY, THE MAGIC HAPPENED AND IT WAS TOTALLY LUCKY . HOPEFULLY, WE GAVE THEM SOME GOOD VALUE PROP WHICH BROUGHT THEM ON BOARD. TO YOUR POINT, A CHAMPION WHO UNDERSTANDS WHAT YOU DO IS GOING TO BE MORE EFFECTIVE FOR YOU OR WHAT I DO FOR ME THAN JUST A GENERAL FALLEN TOLD CHAMPION. I WANT TO TALK QUICKLY ABOUT THE LEAD PROGRAM, THE EARLY ADOPTER PROGRAM WHICH WAS ANOTHER WHEN WE REACHED OUT TO. THESE ARE PEOPLE THAT ARE INTERESTED IN THE PRODUCT AND HAVING THAT EARLY FEATURE RELEASE BUT THERE ALSO TYPICALLY THE PEOPLE WHO WANT TO BE THE ONES IN THE KNOW. I KNOW WHAT’S COMING.’S COME SEE ME ABOUT THAT. PART OF TEAMWORK ATTENDEES WE TALKED A LITTLE BIT ABOUT THIS . THE IS EXTRAORDINARILY SUCCESSFUL AND ALSO AVAILABLE TO OUR CUSTOMERS AND PARTNERS THROUGH THE TOOLKIT FOR TEAMWORK . THE IS THE LEVEL C TRAINING, WHICH IS LANDING ON HOW DO I ORIENT IN TEAMS? HOW DO I SET TEAMS UP SO IT IS PRODUCTIVE FOR ME RIGHT AWAY AND NOT TOO NOISY OR TOO OVERWHELMING? THE SECOND ONE IS ABOUT HOW DO I AS A TEAM OWNER SET IT UP FOR YOU? THE PEOPLE I’M WORKING WITH SO WE CAN ALL UNDERSTAND WHERE TO FIND THINGS AND WHERE TO OPERATE AND BECOME A PRODUCTIVE TOGETHER? WE DO 21 HOUR SESSIONS , WEBINARS TODAY IN THREE TIME ZONES SEVERAL TIMES A WEEK THAT CONSIST OF LANDING THE MESSAGING ABOUT WHAT TEAMS IS AND WHY AND THE BETTER VOICE AND VIDEO EXPERIENCE. IT IS A LIVE DEMO AND A Q&A. WE FOUND IT TO BE EXTRAORDINARILY EFFECTIVE. I CAN TALK A LITTLE MORE ABOUT THAT LATER. AND THEN WE FOUND OVER TIME THAT OTHER CHAMPIONS ARE BRINGING IN OTHER CHAMPIONS. IT IS LIKE HAPPENING IN ALL THESE DIFFERENT ORGANIZATIONS. WE HAVE REPRESENTATION FROM DIFFERENT ROLES AND ALL OVER THE GLOBE. RESET HERE ARE OUR RECRUITING TOOLS. I WANT TO REITERATE THAT IS THE NUMBER ONE , THERE ARE THREE KEY THINGS, THAT’S THE NUMBER ONE THING TO DO, GET THE RIGHT PEOPLE TO VOLUNTEER. THEY ARE GOING TO PRESS THIS FORWARD FOR YOU. SECONDLY, WE HAVE THESE KEY FUNDAMENTALS. WE NEEDED TO MAKE ITS GLOBAL WE ARE A GLOBAL DOSE A GLOBAL COMPANY AND WE NEED REPRESENTATION. WE WANTED TO, THIS IS .2, MAKE THE CHAMPIONS VISIBLE. MAKE THEM VISIBLE TO THE END- USERS. I WILL GO MORE DEEPLY INTO HOW WE DID THAT. IT IN AND OF ITSELF DREW INTEREST BECAUSE PEOPLE DIDN’T KNOW WHAT IT MEANT AND IT STARTED A CONVERSATION. WE DID DIGITAL CAMPAIGNS AROUND HOW YOU FIND A CHAMPION. THEN THERE IS A SET OF GIVE THIS. THERE ARE EXPECTATIONS FOR BEING A CHAMPION. IF YOU’RE GOING TO BE IDENTIFIED AS A CHAMPION AND WE ARE GOING TO SEND PEOPLE TO YOU YOU NEED TO KNOW WHAT WE ARE DELIVERING. FINALLY, THOSE GETS. WHAT IS IN IT FOR THEM? THIS IS IN ADDITION TO THEIR DAY JOBS SO IT NEEDS TO BE REWARDING ENOUGH FOR THEM TO PARTICIPATE . THE GIFTS . THE FIRST, WHAT WE NEED FROM THEM. THE ART OF TEAMWORK TRAINING I JUST DESCRIBED, WE HAVE WHAT WE CALL T3 SESSIONS, TRAIN THE TRAINER SESSIONS. WE HAVE THESE MULTIPLE TIMES A WEEK. ANYBODY CAN JOIN. THEY ARE SPECIFICALLY FOR THE CHAMPIONS TO LEARN HOW WE DELIVER THE L100 AND L200 TRAINING. WE ALSO GIVE THEM A TOOLKIT THAT SAYS HERE IS YOUR DIGITAL SIGNAGE, HERE IS HOW YOU PROMOTE IT IN YOUR BUILDING, HERE IS A SCRIPT OR A WALK- THROUGH AS AN OUTLINE FOR WHAT YOU DELIVER IN THE DECK THAT WE GIVE YOU AND HOW YOU MIGHT WANT TO WALK THROUGH THE DEMO AND HOW YOU CAN GET HELP WITH Q&A IF YOU DON’T HAVE , NOBODY HAS ALL THE ANSWERS, SO HERE’S HOW WE SUPPORT YOU. FINALLY, WE TEMPLATE TIES AN EMAIL FOR ATTENDING WITH ALL OF THE RESOURCES AVAILABLE FOR PEOPLE TO LEARN ABOUT TEAMS. WE SEND HERE IS HOW YOU DO THE TRAINING, HERE IS A KIT TO MAKE IT EASY ON YOU. WE KNOW YOU HAVE A DAY JOB, AND THANK YOU FOR GIVING UP YOUR TIME TO DO THIS. AND THEN THEY ARE OFF AND RUNNING. ALSO WE HAVE THEM LISTED AS AN OPT IN. THEY HAVE TO AGREE TO LET US PUT THEM ON A LIST IN OUR INTRANET FOR CORE SERVICES ENGINEERING. IT INTRANET HAS A LIST OF THE CHAMPIONS IN THE ORGANIZATION AND THEIR ROLE SO IF I WANT TO KNOW MORE ABOUT TEAMS, AND THEN WE DO THESE MARKETING CAMPAIGNS AROUND IT, IF I WANT TO KNOW MORE I KNOW WHO TO TALK TO AND I CAN MAKE AN APPOINTMENT WITH THEM OR SAY WE ARE HAVING A BIG MEETING, CAN YOU PLEASE COME TRAIN US? AND THEN WE USE THEM ALSO TO PROMOTE ONGOING READINESS. WHEN WE COME UP WITH OUR LEVEL CCC TRAINING WE WILL DO THE SAME THING. WE WILL PUT THAT TOGETHER AND TRAIN THEM AND ROLL IT OUT. WE HAVE RECENTLY DONE THE SNAP OF THE VIDEO WHICH IS FIVE MINUTES OR LESS OF A SCENARIO- BASED TRAINING. HOW TO HAVE A PRIVATE MEETING IN TEAMS. THIS IS A VERY DIFFERENT EXPERIENCE THAN SKYPE FOR BUSINESS. OR HOW DO I NAVIGATE IN A TEAMS MEETING? WE HAVE ONE ON THE TOP THEN JUST THE TOP FIVE THINGS YOU WANT TO DO IN TEAMS WHEN YOU START. ANOTHER ONE REALLY IMPORTANT TO US, WE HAVE ONE THAT IS TEAMS ONLY MODE. AS AN ORGANIZATION, BECAUSE WE ARE SO HUGE, WE ARE ROLLING OUT EBP LEVEL WORKS TOGETHER ONTO TEAMS ONLY. AS WE GO THROUGH THOSE WAVES THERE WILL BE SOME PEOPLE WHO STILL HAVE TEAMS AND A SKYPE WHILE OTHERS HAVE ONLY TEAMS UNTIL WE GET EVERYBODY MOVED ACROSS. WE DID A QUICK SAMPLE THAT SAYS IT IS GOING TO BE OKAY, YOU ARE STILL GOING TO BE ABLE TO DO ALL OF YOUR WORK, JUST — HERE’S HOW YOU CAN GET HELP. WE USE CHAMPIONS TO PROMOTE THESE THINGS AS WELL. THIS IS ONE OF MY FAVORITE THINGS TO TALK ABOUT, THIS DIGITAL BADGE. WE HAVE THIS LADY WHO HAVE THIS AWESOME IDEA THAT WE MADE REAL. IT IS SOMETHING THAT YOU PUT ON YOUR PROFILE. ONLY IF YOU ARE A CHAMPION AND HAVE AGREED TO ALL THE THINGS I JUST TALKED ABOUT YOU GET THIS BADGE FOR YOUR PROFILE. I KEEP PUTTING IT THIS WAY, BUT PEOPLE ARE LIKE WHAT IS THAT THING ON YOUR FACE? THAT STARTS THE CONVERSATION ABOUT TEAMS IT WAS BRILLIANT. THERE LIKE HOW CAN I GET THAT THING ON MY FACE? HERE’S WHAT YOU DO. IT HAS GONE VIRAL. IT HAS BEEN REALLY FUN. OTHER THING I THINK IS IMPORTANT, THAT’S WHEN I SAY MAKING THEM RECOGNIZABLE IN A BIG WAY. THERE REALLY RECOGNIZABLE. DOWN — THE OTHER THING WE DO IS SEND EVERYBODY THAT SIGNS UP A PHYSICAL KIT. IT IS JUST A WINDOW CLEANING AND A STICKER AND A WELCOME LETTER IT DOESN’T SEEM LIKE MUCH, BUT IT’S A LOT. IT IS ICU AND I THANK YOU, YOU ARE A PART OF SOMETHING AND WE NEED YOU TO HELP US. I MENTIONED IT . WE HAVE HAD MULTIPLE PEOPLE, MULTIPLE CHAMPS SAY THIS IS AWESOME. THIS CLING IS AWESOME AND I PUT IT UP IN MY OFFICE WINDOW OR THEY TAKE SELFIES AND POST THEM ON THE TEAM FOR THEIR STUFF. THEY ARE GREAT. GOING BACK TO GET THE RIGHT PEOPLE, THESE ARE THE KIND OF PEOPLE WHO ARE JAZZED ABOUT TEAMS. THEY HAVE MORE OF THEIR KIDS WITH ACCESS TO US. THIS MEANS THEY HAVE ACCESS TO WHAT IS GOING ON WITH ROLLOUT AND WHERE WE ARE AT. THERE THE POINT OF CONTACT FOR THEIR ORGANIZATION TO KEEP THEM UP TO SPEED THEY ARE ALSO INVITED TO A MONTHLY CALL THAT WE HAVE WITH THE PRODUCT GROUP WE TALKED LIVE ABOUT WHAT’S COMING IN THE PRODUCT, WHAT IS IN THE INNER RINGS, THE TIMING, AND THEN THEY GIVE FEEDBACK TO THE PRODUCT GROUP LIVE AND SAY THIS IS NOT WORKING OR ALL OF MY CUSTOMERS AND PARTNERS ABSOLUTELY NEED THIS. IT IS KIND OF A GIVE AND GET. IT IS VERY PRODUCTIVE. DOES IT WORK? THIS IS THE MOST IMPORTANT PART. IT CAN BE FUN AND GREAT, BUT DOES IT REALLY WORK? IT DOES. IT IS FABULOUS. WE SET UP METRICS TO FIGURE THIS OUT. WE SET OUT TO HAVE A PILOT OF A 50 OR 75, I DON’T KNOW, WHOEVER WOULD VOLUNTEER. TODAY WE HAVE MORE THAN 650 CHAMPIONS. MORE THAN 45 COUNTRIES . I THINK WE ARE ALMOST 100 BUILDINGS NOW. IT HAS TAKEN OFF AND PEOPLE ARE BRINGING IN OTHER PEOPLE. WHAT’S IMPORTANT HERE IS THAT WITHIN BUILDINGS WITH CHAMPIONS YOU CAN SEE THAT THE NUMBERS GO UP. THEY ARE MOVING THE NEEDLE. ONE OF THE THINGS THAT WE TALK ABOUT IN ADOPTION FOR TEAMS IS THAT TOE IN THE WATER. I’M GOING TO TAKE THAT FIRST STEP IN AND IT’S AROUND CHAT . THE IS THE EASIEST PIECE AND ALSO A SUPER COLLIDER. IF YOU KNOW HOW TO USE ONE TO MANY AND ADD HISTORY OR ONE TO ONE WITH A TAB TO A PDI OR WORK ON FILES TOGETHER IT IS A VERY RICH CHAT EXPERIENCE. WE JOKE THAT WE ACTUALLY TALK IN GIFT THE AND HAVE CONVERSATIONS. IT IS SUPER FUN. YOU CAN SEE THE CHAMPIONS HAVE COMPLETELY PIVOTED THAT. UP UNTIL THIS POINT EVERYBODY HAS HAD BOTH SKYPE AND TEAMS AND A BUILDINGS WHERE THERE ARE CHAMPIONS THEY HAVE DECIDED TO DEFAULT TO TEAMS THAT BLOWS MY MIND. ANOTHER THING ABOUT MEETINGS HERE, WE HAVE NOT HAD THE FULL ROLLOUT OF THE OUTLOOK PLUG-IN. DO YOU GUYS KNOW WHAT THE PLUG- IN IS? YOU HAVE A SKYPE IN YOUR OUTLOOK CALENDAR FOR RIBBON. A LOT OF PEOPLE DON’T HAVE THAT YET. THIS MEANS THEY ARE DOING MEETINGS THROUGH THE TEAMS APP. DO YOU GUYS KNOW WHAT THE MEETING EXPERIENCE TO THE TEAM APP IS? IT IS A LITTLE BIT DIFFERENT IN THE APP. TO HAVE THAT KIND OF ADOPTION THROUGH THE APP IS PRETTY GOOD. THE MOST IMPORTANT THING IS ALL THE NUMBERS ARE MOVING UP. AGAIN, WHEN THEY STILL HAVE OPTIONS EXPECT AS SARAH SAID, WE JUST ROLLED OUT THE TEAMS ADD AND WE ARE STILL ROLLING OUT TO THE WHOLE ORGANIZATION. WE STARTED SOME COMPETITIONS TO SEE WHO COULD CREATE, GET SOME EXCITEMENT, AND CREATE SOME COMPETITION BETWEEN LEADERS TO SEE IN YOUR ORGANIZATION WHO CAN CREATE THE MOST MEETINGS IN A TIMEFRAME? WE HAD EVERYONE THIS SUMMER PARTICIPATE AND WE GOT THEM IN EARLIER AND WE ANNOUNCED THE WINNERS. IT WAS AMAZING THE NUMBER OF MEETINGS THEY HAD WORKED THERE WERE ALSO SUPER EXCITED. THEY BECAME A PART OF IT AND AUTOMATICALLY BECAME A CHAMPION. IT IS REALLY TRYING TO GET THAT EXCITEMENT INTO THE PROGRAM AND CREATING THAT VISIBILITY FOR PEOPLE. >> AND IT MAKES IT SO EASY TO DO WHEN YOU HAVE THE OUTLOOK PLUG-IN. IT IS REALLY A KEY ENABLER IF YOU ARE AN ADOPTION DRIVER. >>ABSOLUTELY. SO, THAT’S ABOUT WHAT THEY ARE DOING FOR US. I LIKE TO TALK ABOUT WHAT WE ARE DOING FOR THEM AND IF IT’S WORKING FOR THEM. I WANT TO KNOW HOW THEY ARE FEELING ABOUT IT. WE HAVE A 98 SATISFACTION LEVEL. I WILL TAKE IT. I’M REALLY GLAD. FOR LIKE THE THIRD TIME IT GOES BACK TO PICKING THE RIGHT PEOPLE. THEY ARE ALMOST 90 SATISFACTION WITH THE TRAINING SUPPORT. THAT’S A LOT OF WORK FOR THEM TO DO IN ADDITION TO THEIR DAY JOB. WE HAVE 83 SATISFACTION WITH THE MONTHLY CALLS WITH THE PEG THAT I MENTIONED. I WANT TO DIG IN THERE AND SEE HOW I CAN IMPROVE THAT. IT IS STILL PRETTY DECENT . TO HAVE ABOUT 40 TURNOUT BETWEEN OUR TWO MEETINGS IS PRETTY GOOD FOR US. THAT’S THE MOST I’VE HAD ON MEETINGS LIKE THAT. 82 SATISFACTION WITH THE DIGITAL BAG AND A SWAG. THAT DIGITAL BADGE WAS A BUMPY RIDE. WE ARE RIGHT NOW READY TO DO V2 OF THAT, WHICH IS LITERALLY AN APP IN THE TEAM . WELCOME TO THE TEAM, PRESS A BUTTON, DOWNLOAD YOUR CURRENT PROFILE IF YOU WANT BECAUSE WE ARE ABOUT TO PUT SOMETHING ON YOUR FACE. HIT A BUTTON AND YOU ARE DONE AND THEN IT REPLICATES THROUGH ALL OF THE OFFICE 365 PRODUCTS. IT IS PRETTY SMOOTH. >> NO ONE AT MICROSOFT HAS BUILT BIG PROGRAMS LIKE THIS. WE ARE REALLY EXCITED ABOUT THIS. IT SHOWS HOW MUCH INVESTMENT MICROSOFT IS MAKING AND HOW IMPORTANT TEAMS IS TO US . WE HAVE REALLY BUILT THIS PROGRAM AROUND MAKING USERS EXCITED ABOUT IT AND DELIGHTING THEM. WE WORK IN END OF SERVICES ENGINEERING AND IT’S NOT ABOUT YOU HAVE TO USE THIS PRODUCT, YOU WANT TO USE THIS PRODUCT. UNDERSTAND THE PRODUCTIVITY AND THE VALUE PROP ON IT AND GET PEOPLE EXCITED. THAT’S WHAT WE ARE TRYING TO CHANGE WITH WHEN WE ROLL OUT. WE ARE LOOKING AT FEEDBACK CONSTANTLY TO IMPROVE IT FOR WE WANT TO LEVERAGE THESE PROGRAMS THROUGH OTHER PROGRAM DEPLOYMENTS THAT WE HAVE, APPLICATION DEPLOYMENTS. >> IT IS TRUE. THERE ARE SO MANY DIVIDERS AND TEAMS ONCE YOU KNOW ARE BOTH IN THE ART OF TEAMWORK AND THROUGH THE CHAMPIONS AND WHEN WE ENGAGE IN THE WHITE GLOVE ENGAGEMENTS WE SHOW THEM THESE THINGS. YOU SEE THEM SAID, OH MY GOSH, I CAN DO THAT? WHATEVER APPLICATION THEY ARE USING IT FOR. IT IS CRITICAL. I HAD SOME OF THEIR VERBATIMS, WHICH I JUST WANT TO POINT OUT THAT ALL OF THEIR VERBATIMS REVOLVE AROUND ONE THING AND IT’S THE COMMUNITY. THERE NUMBER ONE THING ABOUT THE PROGRAM IS EACH OTHER. I WAS LIKE, THAT IS THE COOLEST THING EVER. THEY HAVE THEIR OWN TEAM WITH FOUR CHANNELS ABOUT THE GENERAL CHANNEL, THE TRAINING CHANNEL, THE FEEDBACK CHANNEL, AND A BADGE AND LEADERBOARD — LEADERBOARD CHANNEL. THEY ARE REALLY ACTIVE IN THAT TEAM. THEY HELP ONE ANOTHER ONE OF THE VERBATIMS SHOWS THEY ARE TAKING THIS CHAMPIONS PROGRAM TO THEIR CUSTOMERS AND SAYING THIS IS WHAT WE RECOMMEND YOU DO AND THESE ARE THE RESULTS WE ARE GETTING. GET THE RIGHT PEOPLE AND MAKE THEM RECOGNIZABLE. THIS IS SUPER IMPORTANT BOTH FOR THEM AND OTHER PEOPLE TO KNOW WHO THEY ARE. GIVE THEM THE SPACE TO HAVE THAT RICH COMMUNITY. FEED THEM THE INFORMATION AND GIVE THEM THE STUFF SO THEY CAN BE “THIS IS ME” FOR THEIR ORG AND HELP THEM CONNECT TO EACH OTHER. IT IS REALLY A CRITICAL ENABLER. THEN WHAT’S NEXT? >>WE ARE REALLY EXCITED ABOUT THIS WE ARE HOPING TO ACTUALLY DEMO IT FOR EVERYONE THIS YEAR AT IGNITE, BUT WE HAD SOME TECHNICAL CHALLENGES. OUR NEXT PHASE OF THIS, SARAH AND I BOTH CAME FROM THE GAMING INDUSTRY SO WE WANTED TO TAKE THIS TO THE NEXT LEVEL TO CREATE MORE EXCITEMENT. YOU GUYS WILL NOTICE IT IS A TEAMWORK CHAMPION. NOT TEAM SPECIFICALLY, BECAUSE WE WANT TO LEVERAGE THIS ON OTHER PROGRAMS THAT WE HAVE. WE FEEL SO STRONGLY. THIS WAY WE ARE STARTING TO GET VISIBILITY TO WHO ARE CHAMPIONS ARE. WE WILL GIVE THEM VISIBILITY BY THEIR ORG LEADERS, REGIONS. THEY GET BADGES. EVERY TIME THEY RESPOND TO QUESTIONS WE HAVE ANALYSIS THAT WE ARE MONITORING. WHEN THEY ARE TRAINING THEY GET POINTS. WHEN THEY MEET WITH USERS THEY GET POINTS. WE HAVE THIS WHOLE POINT SYSTEM WE HAVE DEVELOPED FOR OUR USERS SO THEY CAN GET THESE CHAMPION BADGES AND NEW BADGES. WE WILL HAVE THEM GET NEW BADGES AS THEY REACH CERTAIN LEVELS. ONE OF THE NEXT THINGS WE’RE TALKING WITH OUR HR IS TO REALLY BUILD THIS INTO THE PERFORMANCE REVIEWS. HOW DO YOU IMPACT THE COMMUNITY? MICROSOFT IS ALL ABOUT COMMUNITY AND HELPING ONE ANOTHER. IT IS NOT ABOUT JUST INDIVIDUAL CONTRIBUTIONS, IT IS ABOUT HELPING EVERYONE. THAT’S A BIG PART OF OUR JOB AND HOW TO RECOGNIZE PEOPLE DOING THIS GREAT WORK WE FELT THIS WAS AN OPPORTUNITY FOR THE VPS, OR LEADERS, EVERYONE TO SEE WHO ARE THESE PEOPLE THAT ARE REALLY EXCITED AND WORKING SO HARD AND REALLY WANT TO MAKE MICROSOFT BETTER? LET’S DO THIS. WE ARE LOOKING AT PUTTING THIS INTO A PROGRAM WITH THEIR PERFORMANCE FEEDBACK SO THEIR MANAGERS GET IT . HOPEFULLY, AT THE NEXT INSPIRE OR IGNITE WE WILL SHOW YOU THIS BUT WE’RE ALSO WORKING ON A COUPLE OF NEW REALLY COOL EXPERIENCE THINGS FOR OUR USERS THAT WE WILL SHARE IN THE FUTURE. THIS IS WHAT WE HAVE GOING NEXT TO TRY TO GET MORE RECOGNITION . AT THANK YOU FOR BEING HERE. WE WILL ANSWER SOME QUESTIONS FOR YOU WE ARE SO GLAD YOU ARE HERE. WE WERE LIKE, WE WONDER IF ANYBODY WILL BE THERE ON FRIDAY? >>WE DIDN’T THINK ANYBODY WOULD BE HERE.>>CAN WE ANSWER SOME QUESTIONS? >>[ INAUDIBLE QUESTION ]>>YEAH. BACK [ INAUDIBLE QUESTION ] >>OH, YES. GO AHEAD. >>LEAVE ME, I’M TELLING YOU, I CAME FROM INDUSTRY. I HAVE ONLY BEEN AT MICROSOFT ONE YEAR AND I WALKED IN AND I THOUGHT EVERYBODY IS GOING TO LOVE AND USE EVERY SINGLE PRODUCT HERE. I WAS IN SHOCK, WHAT YOU MEAN YOU DON’T USE THIS PRODUCT? THIS IS AMAZING HOW DO YOU NOT USE IT? THEY WERE LIKE, THIS IS JUST TOO MUCH. YOU GIVE US PRODUCT AFTER PRODUCT AFTER PRODUCT. WE HAVE A LOT OF ISSUES WITH RESISTANCE. DIFFERENT GENERATIONS COMFORTABLE WITH USING SKYPE . THE MINUTE EVERYBODY FOUND OUT WE ARE GOING TO MOVE AWAY FROM SKYPE ALL THE SUDDEN THE RESISTANCE BEGAN. NO. YOU CAN’T TAKE IT. YOU HAVE TO GIVE ME EVERY FEATURE. EVERYTHING WE HAD BEEN ASKING FOR TO CREATE THIS MINIMUM VIABLE PRODUCT TO SAY WE NEED THIS CRITERIA FOR OUR USERS ESCALATED 200 BECAUSE THEY ARE LIKE, WHAT YOU MEAN WE CAN’T HAVE THIS FEATURE? WE HAD A LOT OF RESISTANCE. WE STILL DO. IT IS A CONSTANT ONGOING CHANGE MANAGEMENT PROCESS. WE TALK ABOUT HAVING A GLOBAL CHANGE MANAGEMENT , INCLUDING THE ITM >>IT IS REALLY ABOUT INCLUSIVE VISITING — BEING INCLUSIVE AND BRINGING EVERYONE TOGETHER. >> YOU NEED TO HAVE A PLACE FOR THEM TO CAPTURE IT AND TALK ABOUT IT AND YOU NEED TO USE IT TO THE PRODUCT INTO. THAT’S USER VOICE AND ALSO THROUGH OUR VERBATIMS THAT WE GET. >> AND YAMMER. WE HAVE COMMUNITIES AND PEOPLE EVENT ON YAMMER FOR US. WE HAVE TO RESPOND.>>YEAH. >>[ INAUDIBLE QUESTION ]>>ABSOLUTELY. THE QUESTION IS, WHERE ARE THE COLUMNS GOING? WHO IS MANAGING THAT PROJECT? THE ANSWER IS THERE ARE MULTIPLE CHANNELS. WE ARE MANAGING FEEDBACK FROM MULTIPLE CHANNELS FROM OUR OWN USERS THROUGH SURVEYS, YAMMER, INTERNAL USER VOICE THROUGH THE APP. ALL OF THOSE THINGS ARE AGGREGATED AND MANAGED BY OUR SMALL TEAM AT OUR PARTNERS IN MARKETING AND COMMS THAT WE WERE CAN’T IN GLOVE WITH . THE IS A GREAT QUESTION. >> I THINK WE CAN TAKE SOME QUESTIONS. ONE LAST QUESTION. >>[ INAUDIBLE QUESTION ]>>YEAH >>[ INAUDIBLE QUESTION ]>>SOMETHING TO PUSH AGAINST. YEAH. >>THE GENERAL CHANNEL, TRAINING CHANNEL, FEEDBACK CHANNEL, AND DIGITAL BADGE AND LEADERBOARD. >>ALL OF YOU GUYS SHOULD ALSO KNOW IN TEAMS, I DON’T KNOW IF YOU HAVE SEEN THIS, BUT THERE IS A BOT. IF YOU CLIP ON& THAT BOT OPENS UP A TEAM WITH MULTIPLE CHANNELS FOR YOUR FAQS, TRAINING VIDEOS TUTORIALS, RELEASE NOTES . THE IS A REALLY VALUABLE TOOL WITHIN THE PRODUCT ITSELF. THERE IS ALSO SUCCESS WITH TEAMS THAT YOU CAN GO AND GET MORE INFORMATION FOR ADOPTION AND CREATING THAT. >> WE HAVE PIECES OF DETRACTION EMBEDDED IN THIS COMMUNITY BUT THEY ARE VERY HONEST AND VERY FORTHRIGHT. PICKING THE RIGHT PEOPLE. >>THANK YOU GUYS. >> WE WILL BE TO THE SIDE

Deep dive into the Modern Administration Portal for Microsoft Teams and Skype for – BRK3113


>>EXCELLENT.IT IS FINALLY 4:00 ON THURSDAY.I HAVE BEEN WAITING FOR THIS FOR
QUITE A LITTLE WHILE. THANK YOU ALL SO MUCH FOR COMING OUT.IT IS AWESOME TO SEE THISFIGHTANT CONFERENCE ROOM
SPARSELY POPULATED WITH FOLKS.I’M JAMIE SPARK.I’M A PROGRAM MANAGER THIS IS
YOURBRK 3113.THE DOPE DIVE DEEP TYPEINTO SKYPE FOR
BUSINESS.MY NAME ISJAMIE .FOURTHS THAT HAVEN’T SEEN ME
AROUND AND YOU THINK THIS ISAN
INTERESTING SESSION THERE IS A
DISTURBING AMOUNT OF DATA THAT
ISUNFORTUNATELYCARRYING SUCHWONDERFULTHINGS FROM MYASSORTED MARKETING PAST.VOICE FEATURES FOR 2010.I SAY THIS IS YOURBRK 3113. IT IS YOURS.YOU HAVE THE OPPORTUNITY TO GIVE
US FEEDBACK NOT JUST ON THIS
SESSION NOT JUST ON THIS SESSION THAT YOU GO TO AT IGNITE ABOUT
THE WHOLE CONFERENCE.UNFORTUNATELY SPEAKERS WE DON’T
HAVE THE FACILITY TO CONTROL THINGS LIKE THE COMFORT OF THE
CHAIRS, THE VOLUME OF THEMUSIC
BEFOREHAND OR THE TEMPERATURE OF
THE ROOM.BUT ESPECIALLY WHEN IT COMES TO
YOUR SPEAKERS,PLEASE DON’T
HESITATE,FILL OUT ALL OF THEEVALS.AS A SPEAKER I READ THEM AN I
REALLY DO THINK THROUGH THE
MANNER IN WHICH I CAN MAKE MY
PRESENTATIONS MORE INTERESTING ESPECIALLY AT 4:00 ON THE SECOND TO THE LAST DAY OF A CONFERENCE WHEN WE ARE ALL TIRED AND MY
GOODNESS THE PARTY IS COMING UP
SOON.>>WHAT WE ARE GOING TO DOIS GO
THROUGH LOTS OF FUN STUFF WITH
RESPECT TO THE NEW ADMIN CENTER.FUN ANCIENT HISTORY WE HAVE TO
TALK TO.WE HAVE AN OPPORTUNITY TOLOOK
THROUGH THE GOALS THAT WE HAVE
UP TO GIVE YOU A SENSE WHERE WE
ARE GOING WITH THIS.WHAT WE ARE TRYING TO ACCOMPLISH AND WE ARE GOING TO TALK ABOUT
THE INFRASTRUCTURE HOWWEBUILT
IT,IT IS A LOT ABOUT FEET YOUARES THE DIFFERENT CAPABILITIES
THAT WE HAVE LIT UP.FIRST STARTING POLICIES AND SETTINGS AND HOW THOSE APPLY TOUSERS AND TEAMS.WE’RE GOING TO TALK ABOUT SOME
OF THEREPORTINGCAPABILITIES, RBAC IS A THING THE ROLEBASED
ADMIN CONTROL.THIS ISSO COOL.IT HAS TAKEN A LITTLE WHILE.IT IS AWESOME.WE WILL TALK ABOUT THAT.THEN SOME NEW STUFF THAT IS IFNOTONCOMING OUTTEAM’S LIFE
CYCLE MANAGEMENT THINGS THAT ARE
IN OUR SHORT TERM PLANNINGHORIZON [email protected] WE HAVE TIME I WILL GET INTO
THE ROADMAP.I WILL SHOW YOU WHAT OUR NORTH
STAR ARCHITECTURE LOCKS LIKE.ONE OF THE THINGS THAT I WANTED
TO START OFF WAS THIS TWEET. I WILL PAUSE AND LET YOU READ
IT. IT IS FROM MATTLANDES.HE IS ONE OF OUR MVPS.I REMEMBER READINGTHIS TWEET
AND HAVING RECENTLY ASSUMED THE
RESPONSIBILITY OF A WEBSITE THAT
DEALS A LOT WITH THEUSER
INTERFACE. I WAS READING THIS AND GOINGTUT, T TUT.THOSE ENGINEERS WHAT ARE THEY DOING WITH THOSERANDOM USEOF
STOLES. I SAW THE PICTURE WITH THAT
TWEET AND SAID GOODNESS I AM
RESPONSIBLE FOR THOSE THINGS.THE ONE IN THE CENTER IS THE
LEGACY ADMIN PORTAL. THE ONE ON THE RIGHT IS THEPREVIEW VERSION OF CALLANALYTICS.YEAH,ACTUALLY THAT IS MY BAD.WE HAVE TO TAKE CARE OF THAT.I AM KIND OF RESPONSIBLE FOR
THAT.IN FACT,THAT IS THE GOAL THAT
WE HAVE FOR THE NEW ADMIN
CENTER. IN THEANCIENT HISTORY WE GOT
INTO A HABIT AS APRODUCT
ORGANIZATION OF HAVING A
REQUIREMENT FOR SOME NEW SET OF
SERVICES OR REPORTS OR CAPABILITIES THAT REQUIRED SOMEWEB INTERFACE.AND SO WEMADE ONE BECAUSE THAT
IS THEMOST X PEED INTEREST WAY
EXPEDEDIENT.AND ANOTHER AND ANOTHER.AND THEN TEAMS OF COURSE WHEN
TEAMS FIRST CAME OUT IT DIDN’T HAVE ITS OWN MANAGEMENT
EXPERIENCE. ITS MANAGEMENT EXPERIENCE WAS
INTEGRATED NO THEOFFICE 365ADMIN CENTERWHICH OPERABLE.DIDN’T PROVIDE THECAPABILITY TO
HAVE FOR EXAMPLE USER LEVEL
POLICY. ALL OF THE SWITCHES THERE YOU
CAN IMAGINE IT HAS A BIG FISHER
LEVEL SWITCHES WHERE YOU CAN
TURN ON AND TURN OFF STUFF.I DIDN’T HAVE THE OPPORTUNITY TO
SAY LAWYERS YOU ARE GOING TO
HAVE A MEETING EXPERIENCE LIKE X
AND DEVS YOU AREGOING TOHAVE A
MEANING EXPERIENCE BY Y.LOTS AND LOTS OF ENTER PRIZES
THINK THIS IS PRETTYCRITICAL TO
CUSTOMIZE THE EXPERIENCE OFMICROSOFT TEAMS AND SKYPE FOR
BUSINESS APPROPRIATE TO THEIR
ORGANIZATION.SO OUR GOAL IS TO BRING ALL OF
THESE PROPERTIES TOGETHER AND
NOT JUST TO HAVE THEM AS LINKS
ON A WEB PAGE BUTTO REALLY RETHINK THEFUNDAMENTAL WAY THAT YOU WANT TO COMPLETE ENTIRE
SCENARIOS USING THE ADMIN
CENTER.REALLY,BEING THOUGHTFUL ABOUT
IF I’M THINKING ABOUT A USER,MAYBE I WANT TO LOOK AT THEIR
QUALITY.MAYBE I WANT TO SEE WHAT IS
GOING ON WITH THEIR MEETING
SETTINGS AND THEN I AM GOING TO
WANT TO TRANSITION INTO THINKING ABOUT USERS IN THAT ENTIRE
LOCATION AND LOOKING AT QUALITY
AT THAT LEVEL. SO IT WAS REALLY IMPORTANT FOR
US NOT JUST TOGLOB THIS STUFF
TOGETHER BUT TO REALLY RETHINK
THE MANNER IN WHICH FOLKS
TRANSITTED THROUGH THE WEBSITE
AND TO MAKE SURE OUR SCENARIOS
ARE THOUGHTFULLY LIT UP END TO
END.SO THAT’S WHAT WEHAVE DONE WHEN
WE WERE OUT HERE LAST YEAR WE
DIDN’T HAVE A THING.WE HAD A VISION.WE HAD SOME GREAT DESIGN MOCKS
AND IDEAS.NOW THE THING IS LIVE.THE MICROSOFT TOMORROW SUPER EASY ADMIN TEAMS MICROSOFT.COM.WE ARE CONSOLIDATING ALL OF
THESE VARIOUS ADMINISTRATION
SCENARIOS DOWN INTO THIS SINGLELOCATION.AND,AGAIN,IT IS OUR PASSION
AROUND MAKING SURE THAT THIS IS
INCREDIBLY USABLE,INCREDIBLY FAMILIAR ANDINCREDIBLY POWERFUL FOR IT PROS ACROSSORGANIZATIONAL BOUNDARY AND
SIZES AND TYPES AND EVERYTHING
ELSE.ONE OF THE KEYPRE-SEPTEMBERS WE
HAVE AS WELL IS WE’RE NOT GOING TO FORCE YOU TOWN THE PATH OF
USING THE WEBSITE.WE REALLY DO THINK ABOUT HAVING
A RECIPROCAL CAPABILITY THAT THE
WEBSITE IS ONE TOOL THAT ALLOWS YOU TO DO STUFF.YOU CAN ALSO DO THE SAME STUFF
IN POWER SHELL.YOU CAN TO THE SAME STUFF IN
GRAPH.YOU CAN DO THE SAME STUFFPROGRAMATICALLY. WE ARE ALWAYS THINKING ABOUTENSURING, OH,IF WE DO THIS WORK
ON THE WEBSITE, HOW IS THAT
GOING TO AFFECTTHE POWER SHELL
EXPERIENCE?IF WE TO IT IN PHOTOGRAPH HOW
WILL IT AFFECT THE WEBSITE WITH
A GOAL HAVING THATRECEPTACLE FUNCTIONALITY.WE CONSTANTLY WANT TO ADD NEW
STUFF.SO I WANTED TO SPEND A LITTLEBIT OF TIME HOWWE BUILT BUILT
THE THING AND WHAT IT LOOKS
LIKE.THIS IS AS MUCH AS I CAN ATRIBUTE TO THE AWESOME SET OFTEVS THAT ARE STILLGRINDING
AWAY FOR THE RELEASE DUE OUT IN
OCTOBER. WE SHIP EVERY MONTH.IT IS A SING EXAMINE PAGEAPPLICATION.WE HAVE SPENT A BUNCH OF TIME TO
MAKE SURE THAT OUR CODE PIPELINE
IS SUPER FAST AND SUPERRELIABLE.SO WE HAVE THE OPPORTUNITY TO
SHIPUPDATES TO THIS PRODUCT
VERY,VERY QUICKLY.SOMETHING GOES SIDEWAYS F WE
NEED TO ADDRESS A BUG REALLY
QUICK OR WHATEVER,WE HAVE THE
OPPORTUNITY TO ITER ATE ON THIS
NOT ONLY FAST BUT IN A WAY THAT
IS SAFE AND WE FEEL COMFORTABLE ABOUT EXERCISING THATMUSCLE.AUTOMATICALLY THERE IS A BUNCH
OF TESTING THAT HAPPENS.END TO END TESTING WE CODE SPECIFIC UNIT TEST.THERE ARE CONSTANT HEALTH CHECKS
THAT ARE HAPPENING TO MAKE SURE
A LOT OF THEFUNDAMENTAL SERVICE
THAT’S WERELY ON ARE UP AND
HAPPY.ONE OF THE THINGS THAT MAY BESLIGHTLY DISCONCERT FROM AN END
USER PERSPECTIVE A LOT OF THE STUFF THAT I AM GOING TO SHOW
MAY NOT LOOK THE SAME AS THE
EXPERIENCE THAT YOU HAVE SHOULD
YOU PRE-UP THE PORTAL ON YOUR
PHONE OR BROWSER WHILE YOU ARE
SITTING HERE.AND THE REASON THAT THAT IS THE
CASE IS THAT EVERYELEMENT
WITHIN THEWEBSITE IS
CUSTOMIZABLE.WE CALL IT FLIGHTING. SO WE WILLSPECIFICALLY FLIGHT
VARIOUS FEATURES AT VARIOUS
TIMES APPROPRIATE TO FOR EXAMPLE
IF WE WANT TO HAVE FOLKS GO ANDTEST OUT THE TEAMS LIVE CYCLECAPABILITY,WE CAN FLIGHT JUST THAT SET OF FUNCTIONALITY FOR A SPECIFIC GROUP OFCUSTOMERS.SO YOU WILL SEE IN MYDEMOS WILL
LOOK DIFFERENT. THAT ISINTENTIONAL.RESPONSIVE.I WILL SHOW THIS IN A LITTLE
BIT.BUT THE WAY THE WEBSITE IS BUILT
IS THAT IT WILL WORK ACROSS ALL
DIFFERENT KINDSOF BROWSERS AND
FORM FACTORS REGARDLESS IF YOU
ARE LOCKING ON YOUR PHONE OR
TABLETS OR NICE BIG FANCY PC
LIKE I HAVE GOT.THEN NEARLY EVERYTRANSACTION
AND CLICK THATHAPPENS WITHIN
THE SITE WE INSTRUMENT TO TRY TO
UNDERSTAND HOW FOLKS ARE USING
IT AND TO TRY TO MAKE IT BETTER TO TRY TO STAY ON TOP OF THING
RESPONSE TIME ISSUES AND GO OWE
GRAPHIC BASED ISSUES.FINALLY THERE ARE 40 SUPPORTED LANGUAGES.I KNOW THIS IS ONE OF THOSE
THINGS ABOUT PRESENTING AT IGNITE AND PRIOR TO THAT TECH ED THAT FOLKS ARE INTERESTED IN
WHAT LAPPINGS ARE INTERESTED.THOSE ARE THE LANGUAGES THAT ARE
SUPPORTED BECAUSE I PULLED THEM
FROM THE CODE. AND WE ARE PRETTY PROUD OF THIS. I BRIEFLY CONSIDERED DOING ONE
OF MY DEMOS IN ARABIC.BUT THE WHOLE THING WAS A LITTLE
ROUGH GOT TO BEHONEST.WE ARE DOING A LOT HERE TO MAKE
SURE THIS PRODUCT IS CONSUMABLE BY EVERYBODY IN THEIRNATIVE
LANGUAGE. SO IF YOU ARE TASKED AS THE ITPROFESSIONAL FORDESCRIBING THE
CAPABILITY AND DESCRIBING THE
ARCHITECTURE THETEAM’S ADMIN
CENTER HERE IS ALEVEL 100 VERSION BEING KIND OF BASIC.200 BEING ABOUTFEATURES 300ARCHITECTURE. 400 COLD THIS IS YOUR LEVEL 100 VERSION.TEAM ADMIN CENTER YOU HAVE YOUR
FANCY WORK STATION ON YOUR DESK
THAT GOES ANDTALKS TO MICROSOFT TEAMS AND OFFICE 365.AS A RESULT OF YOURCONFIGURATION,AS A RESULT OFYOU DOING THE CHANGES WITHIN THE WEBSITE TO HAVE A DIFFERENT
MESSAGING POLICY OR MEETING
POLICY OR TEAMS UPGRADEPOLICY,THEN YOUR USERS WILL GET A
DIFFERENT EXPERIENCE AS SHOWN BY
THE VERYFANCY DIFFERENT COLORS ON YOUR USER’S SCREENS.THE ARCHITECTURE LOCKS LIKE
THIS.SO WE OWN EVERYTHING IN THATCENTER DARKBLUE BOX.WHEN YOU FIRST COME NO THE
WEBSITE YOU ARE GOING TO HIT THE
AZUREFRONTDOOR. THAT DETERMINES WHERE PHYSICALLY YOU ARE LOCATED INTHE WORLD.IT WILL MOVE YOU TO ONE OF 3
DIFFERENT DATA CENTERS.EUROPE,ASIA,NORTH AMERICA. WITHIN THOSE DATACENTERS WE
HAVE REDUNDANT DEPLOYMENT.SHOULD ONE OF THOSE DEPLOYMENT
GO DOWN AND SIDEWAYS THE OTHER
CAN STAND UP FOR IT.THEY AREGEO REDUNDANT.ONE IN NEVER LANDSNEVER LANDS AND IRELAND. THAT IS OUR BOUGHT STRAP
SERVICE. THAT SERVICE IS DESIGNED TO COME UP AND GETOPERATIONAL SUPER
QUICK. THEN IT WILL GOODOUT TO THE
AZURE CONTENT DELIVERY NETWORKTO GRAB THE WEBSITE ITSELF TO
ACTUALLY GRAB THE SINGLE PAGE
APPLICATION.SHOULD THECDN GO SIDEWAYS WE
HAVE A STATIC BLOG STORE.IT IS SLOW ARE.THE CDN IS HANDY IT IS EVERY
WHERE.THAT COMPONENT THATCOMPONENT
NOT ONLY FEEDS ITUP TO THE BOOT
STRAP SERVICE IT GOES TO THE
VARIETY OF BACK ENDS THAT ARE
ACTUALLY SETTING THECONFIGURATION ELEMENTS AND
PROVIDING GETTING INFORMATION THAT YOU AREINTERESTED IN.SO THIS IS A SHORT LIST.WE GO AND WE ACTUALLY DO SIT ON
TOP OF POWER SHELL SO THEPOWER
SHELL WEB SERVICE WE SIT ON TOP
OF IT.THE POWER SHELL THAT YOU WOULD
RUN IN THE ADMIN PORTAL IS
RUNNING A VERSION OF THAT AS IT
IS WRAPPED IN A WEB CALL.WE HAVE AN API TO GET ALL OF OUR
REPORTING DATA INCLUDING CALLANALYTICS INFORMATION. WE ARE TALKING AZURE ACTIVE
DIRECTORY TO GET INFORMATION
ABOUT USERS.THEN MOREAND MORE WE HIT GRAPH
IN THE CASES AROUND SPECIFIC
TEAMS,TYPE FUNCTIONALITY OUR
TEAM LIFE CYCLE STUFF IS
COMPLETELY BASED ONGRANT THEN
IN ADDITION TO THAT ALL OF THOSE
TRANSACTIONS AND ALL OF THAT STUFF THAT THE ADMIN PORTAL IS
DOING WE DUMP INTO DATA STORE AN
THEN WE CAN GET A SENSE OF WHAT
IS GOING ON BYPEOPLE’S ACTUAL
USAGE OF THE SITE.SO EXACTLY 15 MINUTES IN YOU HAVE BEEN VERY PATIENT SO FAR.SO WE WILL TAKE A QUICK LOOK AT
WHAT THE PRODUCTLOOKS LIKE.I’VE GOT 2 DIFFERENT TENANTS.3 DIFFERENTTOPOLOGIES AND 3
DINNER END POINTS.I WILL DO MY BEST NOT TO GET
THEM MIXED UP. IVE A I HAVE A CHEAT SHEET.ON THE LEFT IS THE NAVIGATION.SO THIS IS OUR LEFT NAV THAT HAS
THE TOP LEVEL ELEMENTS OF ALL OF
THE DIFFERENT PIECES OF THEPRODUCT.SO THERE ARE SOME ELEMENTS IN
HERE THAT ARE NOT STOOD UP TODAY
THAT WILL BE IN THE FUTURE.UNDER DEVICES IN THE FUTURE WE
WILL HAVE DEVICE MANAGEMENT.VOICE DOING YOUR PORTING
REQUESTS OR BEING ABLE TO
ACQUIRE PHONE NUMBERS.IN THE CENTERIS KINDOF — IN
THE INITIAL LOAD IS OUR
DASHBOARD.EACH ONE OF THOSECARDS PROVIDES
SOME INFORMATION ABOUT WHAT ISGOING ON WITHIN YOUR ORGANIZATION.WE SHOW A LITTLE BUILT OFINFORMATION ABOUT THE PENDING TEAM’S UPGRADEAND PROVIDE
INFORMATION OUT FOR ADMINS TO
TAKE ADVANTAGE OF THAT AND PUT
THAT RIGHT FRONT AND CENTER.HAVE A USER SEARCH CAPABILITY. WAY UP AT THE DONE IS THESTANDARD OFFICE 365 BAR AND
WAFFLE THAT EVERYONE IS FAMILIAR
WITH.THE THING I WANT TO SHOW YOU
WHEN I GO ANDMINIMIZE THAT,ITLOOKSSIGNIFICANTLY DIFFERENT. THIS IS APPROXIMATELY WHAT THIS SITE WOULD LOOK LIKE ON YOUR
MOBILE BROWSER.YOU NOTICE THERE IS A BUNCH OF
THOUGHTFUL STUFF WE HAVE DONE. INSTEAD OF THATWAFFLE GOING
AWAY. NOW THAT NAV IS RIGHT THERE.BUT IT IS HIDDEN.SO IT IS EASY FOR ME TO BE ABLE
TO USE THAT ON MY MOBILE DEVICE.WHEN I GO AND WHEN I GO OVER TO — CLICKON USERS.WHEN I GO OVER TO USERS LIKE
THIS IS NORMALLY WHAT THE PAGE
LOCKS LIKE.I HAVE A DESCRIPTION. I HAVE GOT A TITLE.I HAVE SOME NAVIGATION. UP HERE AT THE TOP THIS ISDASHBOARD/USERS. THAT IS KIND OF A BREAD CRUMB
TRAIL THAT I COULD FOLLOW TO THE
SITE. WHICH I GO AND I DRINK THAT
DOWN, YOU CAN SEE,OH,THE
DESCRIPTION IS HIDDEN WHICH
MAKES SENSE.I WANT TO SCROLL THROUGH SOME
DESCRIPTION. I KNOW WHAT THIS IS.IF I NEEDIT, NO BIG DEAL.I HAVE GOT ITRIGHT THERE. FOR SEARCH WE TAKE OVER THAT
WHOLE TOP PART.SO I CAN CLICK ON THAT SEARCH
BUTTON.I CAN BANG IN SOMEBODY’S NAME
AND I CAN EXECUTE.I CAN EXECUTE THAT QUERY.JUST AS IUNFURL — AS IUNFURLTTT IT MAKES SENSE TO HAVE THAT
LEFTNAV SHOW UP.IT WILL BE HIDDEN IF I WANT.I CAN OPEN THAT UP FULLY.WHEN I GO AND I BRING IT OUTEVEN MORE SO INTO ITS FULL SIZE. OH,YEAH,OF COURSE WHEN I’VE
GOT THISMINIMIZED THEN I CAN
JUST USE THE MOUSE OVER TO GOAND HIT WHATEVER PARTICULARAREA
OF THE SITE THAT I NEED.SO THIS IS WHAT WE MEAN BY RESPONSIVE.IT ISRESPONSIVE TO THE RESOLUTION SIZE THAT’S BEING
REPORTED BACK TO THE BROWSER.SO NOMATTER HOW YOU’RE
ACCESSING THE SITE YOU ARE
GETTING A REALLY GREAT
EXPERIENCE BY IT.I THINK THAT IS A FANTASTIC SET
OF WORK WE HAVE DONE WITHIN OUR
ENGINEERING ORGANIZATION TO MAKE
SURE NO MATTER HOW YOU AREACCESSING THE ADMIN CENTER YOU
ARE GETTING A GREATEXPERIENCE
AS A RESULT.SO ONE THING ABOUT MYDEMOS IS
THAT IN OLDER TO PREVENT THE
DEMOS FROM FAILING I TOOK SCREEN
SHOTS OF ALL OF THEM AND THEY
ARE IN THE DECK. I TOLD THE SILVER FOX FOLKS TO
KEEP THEM IN THE DECK SHOULD YOU
WANT TO REFERENCE THEM FOR
LATER.I JUST WANTED TO SHARE THIS
LITTLE BIT OF INFORMATION.MAYBE YOU ALREADY KNOW THIS.BUT WE HAD A FUN CONVERSATION WITH MYCOLLEAGUES.THERE WAS ONLY A SINGLE PROPER
WAY TO TAKE SCREEN SHOTS ANDOTHER OTHER WAY IS FUNDAMENTALLY FLAWED.WHAT IS THE BEST WAY TO TAKE SCREEN SHOTS?NO,NO.IT IS TO USE ONE NOTES.WITH ONE NOTE I HAVEONE KEYBOARD COMMAND.IT BRINGS UP A SELECTION.I SELECT THE AREA ANDBAM, IT IS
IN MY CLIP BOARD.I WOULD NOT HAVE HAD THE ABILITY
TO VERY CLICK QUESTION CRANK
THROUGH ALL OFTHE SCREEN SHOTS
WITHOUT THIS WONDERFUL FACILITY
IN ONE NOTE.IF YOU HAVEN’T HAD THE
OPPORTUNITY TO DO IT AND YOU
HAVE BEENWALLOWING AWAYUSING SNIPPET TOOL AND PRINT SCREEN
FROM THAT HELPFUL COMMENT FROM
THEAUDIENCE I SUGGEST YOU TRY
ONE NOTE BECAUSE IT ISAWESOME.SO A LITTLE BIT ABOUT THEFEATURES.THISIS KIND OF FOR LACK OF ABETTER TERM THE SINGLE SLIDE THAT GOES THROUGH ALL OF THE
DIFFERENT STUFFWE HAVE GOING ON
THE MODERN PORTAL.THE DASHBOARD IS FUNDAMENTALLY A
FRAMEWORK.SO THAT DASHBOARD IS GOING TO AS
WE HAVE MORE AND MORE WIDGETS OR
CARDS ON THATDASHBOARD SCREEN,IT WILL ALLOW THE ABILITY FOR
FOLKS TO CUSTOMIZE THAT.TODAY IT IS A STATIC REPRESENT
ACCEPTTATION WE ONLY HAVE A
HANDFUL ON THERE. THE ONES WE HAVE GREAT LINKS TODOCUMENTATION. THEN USERSEARCH CAPABILITY THAT IS RIGHT IN FRONT.SO IF YOU NEED TOGO AND SEE
WHAT IS GOING ON YOU CAN DO SO
VERY QUICKLY.A USERMANAGEMENT FACILITY AN
AWESOME SET OF CAPABILITIES THERE THATALLOWS ME TO SEARCH,FILTER AND CUSTOMIZE THE LOOK OF
MY USER TABLE.WE KNOW FROM RESEARCH THIS IS A
PLACE WHERE A LOT OF ADMINS END
UP SPENDING A BUNCH OF TIME. I MENTIONED THIS PERFECT THAT
BACK INTHE DAY WITH MICROSOFT
TOMORROWS WE DIDN’T HAVE THE
FACILITY FOR A REALLY MODERNROBUST POLICY MANAGEMENT. INSTEAD OF HAVING A POLICY KIND OF FRAMEWORK,WE HAD THE ABILITY TO TURN ON AND OFF FEATURES AT A TENANT LEVEL.SO THIS POLICY MANAGEMENT ALLOWSUS TO NOT HAVE OPERATIONS AT A
TENANT LEVEL BUT OPERATIONS ATANATOMIC USER LEVEL WE HAVE THAT FOR MESSAGING,MEETINGS AND LIVEEVENTS. ROLE BASED COMES BUILT IN WITH 4 DIFFERENT USER PROFILE.WE WILL TALK ABOUT THAT IN A
LITTLE BIT ON HOW THOSE PROFILE
ARE DIFFERENT.WHERE THE DIFFERENT PLACES YOU
WILL USE THEM AND I WILL GET A
CHANCE TO DEMONSTRATE THOSE.WHEN YOU ARE READY TO MOVE YOURSKYPE FOR BUSINESS ORGANIZATION AND UPGRADETHEM TO TEAMS WE
HAVE ALL OF THE CONTROLS FOR YOU
TO TAKE ADVANTAGE OF THAT
DIRECTLY FROM WITHIN THE PORTAL.YOU CAN DO THAT ON POWER SHELL
OR YOU CAN DO THAT WITHIN THE
ADMIN PORTAL.THERE ARE SOMEFEATURES THAT WE
HAVE THAT ARE CONFIGURED AT A
DIFFERENT LEVEL THEY ARE ORG
WIDESETTINGS THERE AREORG WIDESETTINGS.AUDIO CONFERENCING HAS BEEN A
SET OF CAPABILITIES THAT WE HAVE
HAD OUT FOR A WHILE.THAT HAS USER AND TENANT LEVELCONFIGURATION FOR AUDIO
CONFERENCING.WE ARESUPPORTING ONLYTHE AUDIO
CONFERENCING NOT THE THIRD PARTY
ACP ATTHIS TIME.WE ARE AVAILABLE ON ALL SORTS OFOFFICE 365 EN VIE ON THEMENT THEASTERISK THERE ARE SOME
ENVIRONMENT WE ARE NOT AVAILABLE
IN.THE OFFICE 365 SET UPS THE GCC
WE ARE ALL DEPLOYED IN.FINALLY P THE REASON TEAMS LIFE CYCLE AT THEBOTTOM WHILE WE
HAVE TALKED ABOUT TEAM LIFE
CYCLE AND THE FACILITY TOMANAGE
TOMORROWS AND CHANNELS AND
OWNERS THAT ISN’T SOMETHING THAT
IS GENERALLYAVAILABLE TODAY.WE EXPECT FOR THAT TO BE
RELEASED VERY SHORTLY AS I SAID
PROBABLY IN EARLY OCTOBER.SO I WANTED TO SPEND A LITTLE
BIT OF TIME TALKING THROUGH
POLICIES ANDSETTINGS PAUSE I
FIND IN WORKING WITH CUSTOMERS THIS CAN BE A LITTLECONFUSINGAND A LITTLECAPRECIOUS.IT SEEMS RANDOM WHY MICROSOFT
SAYS THIS SET OF CONTROLS WE
EMBED A IN A POLICY AND THIS WEEMBED INACONTROLS.SO WHEN I THINK ABOUT MEETING
POLICY,MEETING POLICY DEALS
WITH THE WAY THAT FOLKS ENGAGE IN MEETINGS AND THECAPABILITIESTHAT ARE OFFERED IN MICROSOFT
TEAMS.AGAIN WEGENERALLY GROUP THOSE
WITH MODALITY. THERE IS A
MESSAGING POLICY AND VOICE
POLICY.POLICIES CAN OPERATE ON A
PERUSER BASIS.I CAN ASSIGN A USER A SPECIFICPOLICY INSTANCE OR I CAN HAVE
THAT BE PER TERRIBLANT. IF A USER IS NOTASSIGNED A
PARTICULAR TENANT THEY WILL BE
HELD TO THE STABBED AND ARD AND
POLICY THAT OPERATES AT A TENANT
LEVEL.WEDEFINITELY KNOW THAT HAVING
PER GROUPPOLICY MAKES SENSE
THAT IT ISDEFINITELY ON OUR
BACKLOG AND THERE ARE FUN ISSUES
TO FIGURE OUT THERE.FOR EXAMPLE I COULD BE A MEMBER
OF THE GROUP THAT IS ENGINEERING
I COULD BE THE MEMBER OF THE
GROUP PEOPLE WHO WORK IN THE
BUILDING CALLED LINCOLN SQUARE. IF WE HAVE A MEETING POLICY TO
THE PEOPLE WHO WORK IN LINCOLN
SQUARE AND WE ASSIGN A DIFFERENT
POLICY TO PEOPLE THAT ARE IN
ENGINEERING WHAT SHOULD WE DO?SO THOSE TYPES OF THINGS ARE
WHAT WE ARE THINKING AROUND
THOSE TYPES OFSCENARIOS HOW WE
RESOLVE THOSE IS WHAT IS GOING NO OUR WORK AROUND PER GROUPPOLICY. TODAY YOU CAN HAVE IT BE ON APERUSER BASIS OR PER TENANT
BASIS.WE NEED IT SET TO USERS.YOU CAN WRITE IN POWER SHELL DO
A LOOP AND GET IT ALL DONE.FOR SETTINGS,SETTINGSSIMILARLY ARE A COLLECTION OF
CONFIGURATION ELEMENTS.SIMILARLY THEY ARE GROUPED TOGETHER BY MODALITY.WE TRY TO MAKE THIS AS LOGICAL
AS POSSIBLE.SO STUFF THAT DEALS WITH GUESTS
ENDS UP IN THE GUESTBUCKET.STUFF THAT DEALS WITH UPGRADE
ENDS UP IN THE TOMORROW UPGRADE
BUCKET.THIS INCLUDE CASES WHERE YOU
HAVE MULTIPLE INSTANCES OF
SOMETHING.SO I COULD HAVE MULTIPLE INSTANCES OF A CONFERENCE BRIDGE AND I HAVESETTINGS ON THOSE
INSTANCES OF CONFERENCE BRIDGE
OR I COULD HAVE SETTLINGS ON
MULTIPLEINSTANCES OF MY TEAM OR
I COULD HAVESETTINGS ON
MULTIPLE INSTANCES OF VOICEAPPLICATIONS. SO SO THE REASONING BEHIND WHY
WE CHOOSE POLICIES VERSUSSETTLINGS REALLY IS A FUNCTION
OF THE FEATURE. AND THAT IS THE PLACE WHERE WE
IN THE IT PRO TEAM WE WORK
CLOSELY WITH OUR COLLEAGUES WHO
ARE THINKING VERY DEEPLY ABOUT
THE FEATURE KIND OF END TO END.AND WE WORK WITH THEM AND THINK
ABOUT OKAY,WHAT SORT OF IT
CONTROLS ARE YOU CONSIDERING FOR
THIS?THERE ARE A FEW FACTORS THAT GO
INTO THIS DECISION.THERE ARE TECHNICALFACTORS LIKE
MAYBE THERE IS A FUNDAMENTAL
PROTOCOL LIMITATION IN THE WAY
THAT WE CAN CONTROL SOME OF THISCAPABILITY.MAYBE THERE IS A PRACTICAL
CONSIDERATION FOR US TO BUILD
OUT A POLICY MODEL FOR A
PARTICULAR SET OFFUNCTIONALITY WOULD BE CRAZY HARD TO DO AND
CRAZY EXPENSIVE.MAYBE THERE IS BUSINESS REASON
THAT HAVING THAT POLICY MODEL FOR A PARTICULARSET OF
CAPABILITIES ACTUALLY ENDS UP
BEING A MORE COMPLEX USER
EXPERIENCE.WE’RE TRYING TO THINK ABOUT THIS
PRODUCT SPANNING NOT JUST THE
ENTERPRISE CLASS BUT ALSO DOWNINTO S&B AS WELL SO WE WANT TO
ENSURE THAT YOU DON’T HAVE TO BE
SOME CRAZY DEEPPRACTITIONER TO
GET VALUE OUT OF THE ADMIN
PORTAL. FINALLY IT COULD BETEMPORAL FOR PRIORITIZATION PERSPECTIVE OR TO WORK ON X OR WORK ON Y AND THEN Z.MAYBE Z IS PEACE.WE WANT TO START OFF WITH DOINGSETTINGS TO SEE WHERE CUSTOMERS
ARE GOING TO FIT IN THIS AND IF
IT MAKES SENSE.REGARDLESS, THEFEEDBACK FROM
YOU THAT WE HEAR AT SHOWS LIKE
THAT THAT WE GET ON USER VOICE,THAT WE SEE ON TWITTER IS KEY
FOR US TO HELP ADJUDICAT SOME OF
THESE DIFFERENT FACTORS. SO DON’T EVER HESITATE TO GIVE
US THAT FEEDBACK.IT IS REALLY VALUABLE P AND IT
IS SOMETHING THAT WE CARE VERY
DEEPLY ABOUTRECEIVING.SO I’M GOING TO TALKQUICK
THROUGHTHE MIX HERE ACROSS
SETTINGS ANDPOLICIES FOR 3
DIFFERENT TYPESOFELEMENTS. SO THESE CONFIGURED ENTITIES ARE TENANTS,ARE USERS AND THEN OUR
TEAMS. IN THE FUTURE MAYBE WE WILL
INCLUDE GROUPS INTO THIS MIX AS
WELL AS WE GET THAT
FUNCTIONALITY BUILT OUT.IT IS THECOMBINATION OF EITHER SETTINGS OR POLICIES AND THEN
EITHER HE WERE THETENANT THE
USER OR TOMORROW THAT REALLY
DEFINES THE SCOPE OF CAPABILITY
THAT USESIT PRO CAN PERFORM WITH RESPECT TO THE PRODUCT.SO WHEN I LOOK AT TENANTSETTINGS AGAIN THESE ARE
CONFIGURATION ELEMENTS THAT IMPACT THE ENTIRE ORGANIZATION
BECAUSE IT ISIMPACTING MY
ENTIRETENANT.MY DIAL IN CONFERENCING
TELEPHONE NUMBER IS A GREAT
EXAMPLE.YOU DON’T HAVE A CASE WHERE EACHHUMAN WITHIN YOUR ORGANIZATION
HAS A DIFFERENT SET OF DIAL IN
CONFERENCE NUMBERS.WE PROBABLYDON’T HAVE THAT MANY
NUMBERS BROADRY IN THE WORLD TO
BE ABLE TO SUPPORT THAT.AUTOCONFERENCING IS SHARED.GUEST ACCESS SAME SORT OFTHING.NO INDIVIDUAL POLICY INDIVIDUAL GUEST USERS THAT COME INTO YOUR TENANT INSTEAD WE SAY ALL GUESTS ARE GOING TO OPERATE BLAKE BLAH WHEN IT COMES TO WORKING INYOUR ORGANIZATION.WITH RESPECT TO USING SETTING
THOSE ARE ELEMENTS THAT IMPACT A
PARTICULAR USER.WHAT IS THE USER DEFAULT AUTOCONFERENCING NUMBER?I’M BASED OUT OF BELLEVUE I
SHOULD HAVE A NUMBER IN THE 425 AREA CODE.MY COLLEAGUE BASED IN DUEDUBI THAT
WOULD BE SILLY.THAT IS A SETTING THAT IS
APPROPRIATE FOR ME AS AUSER.SETTINGS FOR TEAMS THIS IS
SOMETHING THAT WE HAVE JUST NOW
BROUGHT IN IN THE NEW TEAMS LIFE
CYCLE.THESE ARE CONFIGURATION ELEMENTS.THAT CAN IMPACT A TEAM. THE CAPABILITY TO ADD CHANNELS.USER CAPABILITIES TOALLOWUSERS
WITHIN THE TEAM TO BE ABLE TO
ADD CHANNELS. TO ADD APPS AND TABS.WE WILL DEFINITELY SPEND TIME ON
THIS AND LOOK THROUGH IT.WHEN I SWITCH OVER TOPOLICIES, AGAIN,POLICIES CAN OPERATE AT A TENANT LEVEL AND USER LEVEL.NO HE IS ARE CONFIGURATION
ELEMENTS THEY IMPACT THEENTIRE
ORGANIZE.ORG.WHEN THEYDON’T HAVE A POLICY
ASSIGNED WE WILL USE THAT TENANT
LEVEL POLICY. THE TENANT FOR MESSAGING,MEETING AND LIVE EVENTS THAT ARE
BUILT NO THE PRODUCT TODAY.MANY,MANY MORE POLICIES AS WE
CONTINUE ON IN THE LIFE CYCLE OF
THIS PRODUCT.SIMILARLY, IF I WANT TOAPPLY A
USE FOR,MESSAGINGING, MEETING,LIVE EVENT I CAN GRANT THAT POLICY TO THAT PARTICULARUSER
OR I CAN TAKE A WHOLE ARRAY OF
USERS THROW THEM INTO 4 OR 5
LINES OF CAREFULLY POWER SHELL
AND GRANT THOSE PARTICULAR
PERUSERPOLICIES TO THOSEUSERS.FINALLY ONE OF THE AREAS THAT WE
ARE LOOKING INTO IS POLICIES AND
TEAMS.WE HAVE SETTINGS FOR TEAMS.BUT IS THERE A NEED FOR US TO BE
ABLE TO CREATE A POLICY MODEL
FOR EYE TEAM?THIS IS ONE OF THE THINGS THAT
IS ON THE BACKLOG THAT WE ARE
LOOKING INTO.WE WILL GROW TO A PLACE WHERE
THERE ARE SO MANY POTENTIAL
SETTINGS FOR A TEAM THAT I WOULD
WANT TO ABSTRACT THAT OUT INTO A
POLICY AND BE ABLE TO SAY YOU
KNOW WHAT ACTUALLY I WANT TO
HAVE ALL OF THE TEAMS THAT THIS
SIDE OF THE COMPANY OPERATES WITH TO HAVE A FIGURATION LIKE
THIS. ALL OF THE TEAMS THAT OPERATE ON THAT SIDE OF THE COMPANY THAT
HAVE A DIFFERENT MODEL.INSTEAD OF MANAGING THAT ON A
SET OFSETTINGS I CAN CREATE A
POLICY FOR THAT.THIS IS SOMETHING WE ARELOOKING
INTO.SO WITH THAT WHAT WEHAVE WITHIN
THE PRODUCT FOR USERS I CAN
ASSIGN THESEPOLICIES, I CAN
LOOK AT INFORMATION ON THEIR CALLS AND THEIRMEETINGS BECAUSE WE INTEGRATED IN THECAPABILITIES FOR CALL ANALYTICS.WHEN I AM LOOKING AT A USER
OBJECT.I CAN SEE NOT ONLY THATUSERS
STATIC INFORMATION I CAN SEE
THEIR CONFIGURE AND I CAN SEE THE ACTIONS THAT THEY HAVE DONE THE MEDIA EVENTS THEY HAVE DONE WITHIN THE PRODUCT.I HAVE MENTIONED THE DIFFERENT
POLICY OPTIONS THERE. MENTIONED A FEW OF THE DIFFERENT SETTINGS AROUND AUDIO
CONFERENCING HAVING PER TENANT
LEVELSETTINGS. SO LET’S CHECKIT OUT.AWESOME.HERE ON MYUSER’S PAGE.ONE OF THE REALLY FUN THINGS
THAT WE HAVE DONE WITHIN THIS IS
YOU WILL NOTICE THERE ARE 3
COLUMNS THAT I HAVE GOT
CONFIGURED RIGHT HERE DISPLAY
NAME,LOCATION AND WHATPOLICIES
THESE PARTICULAR USERS HAVE BEEN
ASSIGNED.BUT I DO HAVE THE ABILITY TO SEE
A LOT MORE INFORMATION.SO THIS ISTHE SET OF CUSSYUMIZATION FORCOLUMNS WITHIN THAT TABLE.AS A GENERAL DESIGN PRE-ACCEPT WE ARE LOOKING TO DOTHIS FORYOU SEE.WHAT INFORMATION YOU WANT TO SEE
AND KEEP THAT INFORMATION
RESIDENCE WHEN YOU LOG BACK INTO
THE PORTAL YOU WILL HAVE THE
ABILITY — YOU WILL SEE THE SAME
CONFIGURATION. SO HERE MAYBE I WANT TO SEE
THEIR USER NAME AND WHETHER OR
NOT THEY HAVE AUDIO
CONFERENCING.SO WHEN I HAVE DONE THAT WE HAVE
ALL OF THAT INFORMATION.NOW IT IS JUST A DIFFERENT VIEW
OF THE USER EXPERIENCE TOBE
ABLE TO BE ABLE TO TAKE
ADVANTAGE OF THAT.OF COURSE YOU CAN SEARCH. SEE IF I CAN FIND MY BUDDY PAUL HERE.WHENNER DOING THESEARCHES WE ARE EXCITING A BACK END QUERY TO BE ABLE TO DETERMINE IS THIS
USER LOCATED WITHIN THIS TENANT
OR NOT? YEP,PAUL IS LOCATED WITHIN THIS TENANT HE IS BASED IN THE U.S.DOESN’T HAVE HAVE ANY POLICIES
ASSIGNED TO HIM.HE IS SUBJECT TO TENANT LEVEL POLICY.ONE OF THE REALLY COOL,POWERFUL THINGS WE HAVE BUILT INTO THIS
PRODUCT IS THE ABILITY TO DOROBUST FILTERING. I CAN FILTER ON THE MEETING
POLICY AND THESE ARE ALL OF THE
DIFFERENT MEETINGPOLICIES THAT
WE HAVE CREATED WITHIN THISTENANT.SO THIS IS THE MARKETING DEMO
TENANT THAT THEY USEFOR THE
KEYNOTE.THE PORTLAND HOSPITAL ANDSEATTLE POLICY.LET’S SEE WHO IS ASSIGNED THE
TEAM’S MEETING POLICY FOR —
HEY,IT IS ME.PERFECT. THEN OF COURSE I CAN IF I WANT I CAN STACKUP EVEN MORE –I CAN
STACK UP MORE FEATURES ON THAT
AS WELL. SO LET’S SEE IFPORTLAND — DOES PORTLAND HAVE A FEW MORE PEOPLE? JUST EMILY.I CAN STACK UP MOREAND MORE —
GOD DARN IT,I KEEP MISSING THAT.I CAN STACK UP MORE AND MORE REQUIREMENTS ON TO HERE.IF I WANT I CAN MAKE A VERY
COMPLEX CONSTRUCTION HERE TO BE
ABLE TO GET THE USERS BACK THAT
I NEED THAT I WANT TO BE ABLE TO
DO TO DO OPERATIONS ON. SO THISFILTERING CAPABILITY IS
EXTREMELY POWERFUL.THEN WHEN YOU GET INTO A
PARTICULAR USER,LET’S GO AHEAD AND TRY AND SEE WHAT EMILY IS UP TO.EMILY EVEN HAS CALLS SWEET.THIS IS THEUSER DETAILS PAGE.I SEE THE USER INFORMATION HERE.I HAVE GOT THE ABILITY TO SEND
THEM A CALL ORIM OR A MAILDIRECTLY FROM WITHIN THIS
EXPERIENCE.I GET A QUICK VIEW OF THEIR
QUALITY ANDACTIVITY
INFORMATION. THIS IS ALSODATA THAT WE ARE
PAWING FROM THE CALL ANALYTICS
API.SO THE CALL ANALYTICS IN PREVIEWIS DIRECTLY INTEGRATED.SO I GET THIS QUICK VIEW OF
WHAT’S THEIR CALL QUALITY LIKE WHAT IS THEIR ACTIVITY LIKE.DOWN AT THE BOTTOM I HAVE GOT
LOTS OF INFORMATION ABOUT HOW
THIS PARTICULAR USER IS
CONFIGURED.SO I SEE THEIR AUDIOCONFERENCING INFORMATION HERE ON
THE UPPER RIGHT.SEE THAT THEY ARECONFIGURED FOR
AUDIO CONFERENCING. THEY ARE USING A DYNAMIC
CONFERENCE ID.I CAN STARTCHANGING THEIR AUDIO CONFERENCING INFORMATION.THEY WILL MOVE TO SYDNEY
TOMORROW.GO ANDBLOW UPTHEIR — BLOW UP
THEIR CONFIGURATION AND MAYBE
THEY CAN’T DODIALOUT.POOF, NOW I HAVE GOT THEMCONFIGURED FOR THEIRDEFAULT
INFORMATION FOR CONFERENCING NOW
GOING OFF TO SYDNEY.SUPER STRAIGHTFORWARD. SUPER EASY TO BE ABLE TO EXECUTE THIS STUFF.SAME THING FOR ASSIGNED POLICIES
DOWN HERE.YOU SEE THE PERUSER POLICIES
THAT THIS USER HAS BEEN ASSIGNED.THIS IS PERFECT.I RANDOMLY GRABBED THIS USER.LOOK AT THESE WONDERFUL PERUSER
POLICIES THEY HAVE ASSIGNED.THEY ARE NOT ALLOWED TO USE LIVE
EVENT.THEY HAVE THE NO LIVE EVENTPOLICY FOR THE MEETINGS ANDMESSAGE.PORTLAND RESPECTIVELY. YOU WILL SEE DOWNBELOW.TEAMS APP POLICY.I WILL TALK ABOUT THOSE.THAT IS A FEATURE THAT WE WILL
HAVE COMING OUT A LITTLE BIT
LATER INTHEYEAR. THEY SNUCK IN A LITTLEBIT IN
THE CONFIGURATION OF MY DEMO
TENANT HERE.HAPPY TO HAVE THEM ON BOARD. ONE OF THE THINGS YOU WILL
NOTICE IS THAT THESE ARE
ACTUALLY LINKS. SO WE ALWAYS WANT TO HAVE ASCENARIO WHERE THERE IS NO PLACE
WHERE I GETSTUCK IN THE
EXPERIENCE.SO I DON’T — IF I AM IN THE
USER’S PAGE I DON’T HAVE TO DO A
THING WHERE I’M LIKE OKAY,I
WANT TO GO SEE MORE ABOUT THEIR
MESSAGING POLICY AND GO TO
MESSAGING POLICY AND SEARCH FOR
THIS PARTICULAR ONE AND OPEN IT.I CAN GO AND CLICK RIGHT INTO CHECKING OUT WHAT ISUP WITH
THIS PARTICULAR MESSAGINGPOLICY.THEN HERE IS WHAT IS UP WITH
MESSAGING POLICY.THESE ARE ALL OF THE DIFFERENT SETS OF CAPABILITIES THAT THE
MESSAGING TEAM WANTED TO BE
AVAILABLE AND THAT WE AS THEIT
PRO TEAMADVOCATED TO BE
AVAILABLE WITH RESPECT TO CONTROLLINGMESSAGING.SO MAYBE THEIR USE OFJIFFIES
HAS BEEN A LITTLE INAPPROPRIATE
SO WE MAYBE WANT TO MOVE THEM
FROM THE MODERATEJIFFY CONTENT
TO THE STRICTJIFFY CONTENT. I GO AND EXECUTE THAT.IT BROUGHT ME BACK TO MYUSER’S
PAGE.WE KNOW THE PATH THAT YOU TOOK
TOGET TO THAT PLACE.SO INSTEAD OF POPPING YOU BACK
SOMEWHERE RANDOM LIKE THE LIST
OF THE POLICIES IN THE TENANT WE
WANTED TO POP YOU BACK TO WHERE YOU WERE WHICH MAKES SENSE.OF COURSE IF I WANT,I CAN GO
AND I CAN CHECK OUT THESE ARE
ALL OF THE MESSAGING POLICIES
THAT ARE CONFIGURED IN THIS
TENANT.AND IF I WANT AS WELL I CAN
CUSTOMIZE THIS YEAR.WITH THIS YEAR IT IS MUCH MORESTREAM LINED. ALL OF THESETABLES OF COURSE
WILL HAVE THE ABILITY FOR US TO
SORT IN DIFFERENT WAYS.THE ONE THAT IS MARKED SUPER
SPECIAL HERE THIS GLOBAL ORG
WIDE DEFAULT DOES WHAT IT SAYS IT DOES.THIS IS THE DEFAULT THAT COVERSTHE ENTIREORGANIZATION SHOULD YOUR USER NOT HAVE A PERUSER
POLICY ASSIGNED.MAYBE THIS IS THE VERYRESTRICTIVE POLICY THAT YOU WANT
TO PUT NO PLACE AND YOU ADD MORE
PER MISSIVE POLICIES ON TOP OF
THAT.MAYBE YOU WANT TO DO SOMETHING
OPPOSITE.REGARDLESS THIS CHOICE IS YOURS
YOU HAVE THE ABILITY TO OPERATE
AT BOTH LEVELS. COUPLE OF OTHER THINGSFOR US TO DO ON THIS QUICK LITTLE WALK
THROUGH HERE IN THIS OVERVIEW.I MENTIONED GUEST SETTINGS A
COUPLE OF TIMES. SO FOR CONFIGURING GUEST ACCESS YOU WANT TO THROTTLE DIFFERENT
CAPABILITIES THAT FOLKS HAVE
WITH GUESTS.MAYBE YOU DON’T WANT TO ALLOW
THEM TO USE VIDEO.YOU CAN TURN THAT OFF. MAYBE YOU DON’T WANT THEM TO
EDIT MESSAGES THEY SEND.I DON’T REALLY THINK THIS ONE IS
PARTICULARLY FAIR. I’M SURE THERE IS A USE CASE FOR IT.TAKE ADVANTAGE OF THE DELETE MESSAGEWITHIN TEAMS.I WOULD BE HORRIFIED TO NOT HAVETHAT FACILITY.THEN TEAMS UPGRADE.THERE ARE4 DIFFERENT SESSIONS THAT ARE SET UP HERE AT IGNITE
THAT TALK ABOUT DIFFERENTASPECTS OF TEAMS UPGRADE.SO THERE IS A LOT MORE TO LEARN
THERE.THE ONE THING I WILL CALL OUT IS
THAT THESE ARE THE DIFFERENT —
THOSE ARE THE DIFFERENT MODES OR
COEXIST ANSWER MODES THAT ARE CURRENTLY SET UP WITHIN THEPRODUCT. THE TEAM’S ONLY ONE IS ON THEPRECIPICE OF BEINGRELEASED.WE STILL NEED TO FIGURE OUT.WE THOUGHT IT WAS GOING TO BE
ABLE TO COME OUT THIS WOKE. WE THINK IT WILL BE A LITTLE
WHILE LONGER.YOU WILL NOT SEE TEAMS ONLY IN
YOUR TENANT.AS WE COME OUT WITH MORE AND
MORE OF THESE COULD I EXISTENCE MODES TO SUPPORT TEAM UPGRADE
YOU WILL SEE THEM IN HERE.THIS WON’T BE THEFINAL LIST
THERE IS LAB WITH MEETINGS AND
LAB WITHOUTMEETINGS THAT WEWILL EXPOSE.THIS IS THE FACILITY TO BE ABLE
TO HAVE THAT OPERATE AT A TENANT
LEVEL AND THEN OF COURSE IF I
WANT TO GO TOA USER,LESS GO BACK TO EMILY.WE WANT TO MAKE — EMILY IS
ALREADY TEAMS ONLY.IF WE WANTED TO DO THIS
PARTICULARLY FOR A SINGLE USER
YOU WOULD SET THIS HERE.THAT SETTING IS EITHER USE THEORG WIDE DEFAULT OR HAVE THIS USER OPERATE IN ONE OF THESE
PARTICULAR MODES.SO WOULD YOU BE INTERESTED IN
TRYING OUT TIMES ONLY THIS IS SOMETHING YOU CAN DOFOR YOUR
OWN USER OR FOR YOUR TEAM WHEN
YOU GET BACK INTO THE OFFICE
AFTER IGNITE. COOL.ALL RIGHT.WE WILL SEE A LITTLE BIT MORE OF
THE PORTAL HERE IN A LITTLE BIT.I WANTED TO TALK THROUGH A
COUPLE OF THINGS.REPORTING.SO THERE ARE 2 DIFFERENT KIND OF
PIECES OF REPORTING THAT WE’RE
GOING TO TALK THROUGH.THE FIRST ONE IS HISTORICAL REPORTING.TODAY WE HAVE THEFACILITY TO
DRIVE USER LEVEL REPORTS.THOSE ARE COMING FROM THE OFFICE
365 ADMIN CENTER TODAY AND THE
ADOPTION CONTENT PACK.SO THAT’S WHAT IS AVAILABLE AT
THE MOMENT.WHAT WE’RE ACTIVELY WORKING ON
ARE TO BE ABLE TO HAVE REPORTING
ON TEAMS ANDCHANNELS.SO WHO ISUSING WHAT TEAMS,HOW
MUCH ARE THEY USING THEM IN
TERMS OF CHATS VERSUS CHANNELMESSAGES,WHAT TYPES OFDEVICES
FOLKS ARE TAKING ADVANTAGE OF.WHEN ARE THEY LOGGING IN AND
WHAT WAS THEIR LASTOUS AGE TEAM.THOSE ARE COMING TO THE NEW ADMIN CENTER.I WILL SHOW YOU AN EARLY VIEW OF
WHAT THAT LOOKS LIKE IN A
SECOND.USAGE REPORTS.WE HAVE THOSE AVAILABLE STILL IN
THE LEGACY ADMIN PORTAL.THE SKYPE FOR ADMIN CENTER.THAT AS WELL WILL BE COMING IN
TO THE NEW ADMINPORTAL AS WELL WITHIN THE NEXTLITTLEBIT.SO I THINK IT IS TIME.LET’S CHECK OUT WHAT THOSE LOOK
LIKE.BECAUSE WE ARE STILL WORKING ON
THIS I AM GOING TO FLOP OVER TO
OUR DIFFERENTENVIRONMENT. OUR DIFFERENT ENVIRONMENT HAS A FANCY NEW LOADING GRAPHIC.WE ARE VERYEXCITED ABOUT.RIGHT,RIGHT?IT IS VERY SCHOOL.IKNOWIT IS PUNITIVE GIF THAT
IS THETHING I WILL GET RIDICULED ON TWITTER FOR SURE.THE REASON I FLIPPED OVER TO
THIS ENVIRONMENT WE HAVETHE UX
ALL STOOD UPFOR THIS PARTICULAR
FEATURE.BUT THE BACK END ISONLY
AVAILABLE FROM OUR TESTING ENVIRONMENT.SO 3 DIFFERENT REPORTS WE HAVE
AVAILABLE HERE.USER ACTIVITY, DEVICEUSAGE AND
TEAM’S USAGE.ULTIMATELY LONG TERM YOU ARE
GOING TO SEE LOCATION BE LIT UP.YOU WILLSEE SPECIFIC LEVEL REPORTS LIT UP.LET’S SEE WHO HAS BEEN USING THE
PRODUCT HERE INA SECOND.SWEET.THIS IS A BUNCH OF FOLKS FROMMARKETING CRANKING AWAY ONTHE
24TH.THEN I GET THISNICE GRAPH THESE
NICE HOOVER STATES SO I CAN SEE
WHAT IS GOING ON.I GOT ONE CALL. 41 CHANNEL MESSAGES NO CHAT
MESSAGES. I GET A TABLE HERE THAT HAVE THE ABILITY TO SORT THAT GIVES ME
KIND OF INFORMATION ABOUTWHAT
IS HAPPENING AGAIN JUST LIKE
WITHIN THE REST OF THE PRODUCT.I DON’T HAVE ANY ROADBLOCKS.I CAN GO AND I CAN CLICK ON
EMILY FROM THE REPORT.I AM INTO EMILY’S USER OBJECT.WE ALWAYS WANT TO HAVE A
THOUGHTFULPATH THROUGH THE
PRODUCT.I CAN GO IN AND CHECK OUT DEVICE
USAGE THAT IS NOT GOING TO BE A
SURPRISE IT WILL BE ALL WINDOWBOXES OF COURSE.TEAM’S USAGE LET’S SEE WHAT THAT
LOOKS LIKE IN THE LAST COUPLE OFDAYS.OH,YEAH.SO YOU CAN TELL THIS IS VERY
EARLY WITHRESPECT TO WHAT A
REPORTING CAPABILITY IS.YOU GET A SENSE WHAT OUR GOALS
ARE WITH THIS.WE WANT IT TOBE PERFORMANCE,ATTRACTIVE AND USEFUL TO BE ABLE
TO TRACK WHAT IS GOINGON WITHIN
YOUR ENVIRONMENT AND THEN OVER
TIME WE WILL BE ABLE TO ALLOW
YOU TO PRINT,TO BE ABLE TODOWNLOAD THE JUST THE IMAGE.YOU DON’T HAVE TOTAKE A SCREEN
SHOT OR HAVE THEABILITY TO
EXPORT THAT OFF TOEXCEL AS
WELL.SO YEAH REPORTING WORKED.GOOD STUFF.I GOT TO FLIP BACK AND GET OFF
OF MY TEST ENVIRONMENT AND ON TO
MY PROPERENVIRONMENT BECAUSE I
GOT 2 SETS OF FEATURES I WANT TO
TALK ABOUT NEXT.FIRST IS CALL ANALYTICS IT IS
SOMETHING WE HAVE HAD IN APREVIEW STATE IN SKYPE FOR BUSINESS AND MICROSOFT TEAMS FOR QUITE A WHILE NOW.WE HAVE JUST BEEN ABLE TO BRING
OVERALL OF THAT CAPABILITY AND
INTERESTING GREATTHAT INTO THE NEW ADMIN PORTAL.FUNDAMENTALLY WHAT IT IS ABOUT
UNDERSTANDING MEDIA EVENTS,UNDERSTANDING WHAT IS GOING ON
WHEN FOLKS ARE MAKING CALLS AND THEY ARE DOING MEETINGS.BOTH FROM A SIGNALINGPERSPECTIVE AND FROM A MEDIA
TACK PERSPECTIVE.THERE ARE DOZENS AND DOZENS OF
DATA POINTS THAT WE CAPTURE WITH
EVERY CALL. SO WE PACKAGE ALL OF THAT UP AN WE SEND IT OFF TO A DATA
PIPELINE. IN THAT PROCESS WE WANT IT TO BE AVAILABLE NOT JUST FOR TENANTADMINS BUT HELP DESK SCENARIOS
AS WELL. PRIMARY USE CASE SOMEBODY HAS A BAD CALL THEY CALL YOUUP AND GO HEY I HAD A BAD CALL.YOU HAVE THE OPPORTUNITY TO GO
INTO THE PRODUCT AND GO AND SEE,IS THIS A NETWORK THING OR
DEVICE THING,IS THERE SOMETHING GOING ON WITH THE SERVICE?ALL OF THESE CORE CAPABILITIES
AGAIN CAME FROM THE CALLANALYTICS PREVIEW OF THE
PRODUCT.I WOULD SHOW IT TO YOU NOW BUT I
WANT TOFIRST TALK ABOUT ROLEBASED ADMIN CONTROL.ONE OF THE COOL FEATURES OF CALLANALYTICS WAS THAT IT WASCONFIGURABLE TO WHERE IF YOU HAD
HELP DESK USERS THEY WOULD GET A
DIFFERENT EXPERIENCE THAN ATENANT ADMIN WITH RESPECT TO
GOING TO THIS PRODUCT.SO THE WAY THAT THAT WASIMPLEMENTED WASN’T A PROPER
OFFICE 365 AADADMIN ROLE IT WASIMPLEMENTED WITHIN THE AN LIT
TICK PRODUCTS ITSELF.SO WE WANTED TO STEP BACK FROM
THIS AND HAVE THIS BE PROPERLY,THOUGHTFULLY IMPLEMENTED AS A
PART OF THE STANDARD OFFICE 365
ADMIN ROLES.SO THIS ISFUNDAMENTALLY A
FUNCTION OF THEDIRECTORY.SO WHEN YOU GO AND CHECK OUT THE
DIFFERENT ADMIN ROLES YOU SEE
THAT ALL UP ACROSSOFFICE 365,THE ONE FOR TEAMS ARE SPECIFIC
AROUND TEAM FACILITY. SO IF YOU HAVE SOMEBODY ON YOUR STAFF THAT THEY NEED TO GO AND
ADMINISTER TOMORROWS AND
SHAREPOINT,ALL GOOD. YOU ASSIGN THEM THE SHAREPOINT
ROLE AND YOU ASSIGN THEM THE
APPROPRIATE TEAM ROLE AN THEY
ARE GOOD TO GO AND THEY HAVE
BOTH SETS OFCAPABILITIES. WE ARE REALLY INTENT ONBALANCING THE EASE OF USE,THECONSUME ABILITY OF THIS FEATURE
ALONG WITH THE REQUIREMENTS OF
MANAGEMENT.SO YOU CAN MANAGE A FOURTHDIMENSIONAL HYPER CUBE SET OFUSERANDCAPABILITY AND
PARTICULAR IMPACT AND IT IS THE
UNION OF ALL OF THOSE THINGS
THAT YOU WOULD ASSIGN AS A SET
OF CAPABILITIES OR RIGHTS TO A
PARTICULAR ADMIN.THAT FEELS REALLY DIFFICULT.SO WE ARE STARTING WITH THIS.WE WOULD LOVE TO TAKE FEEDBACK
ON THIS.YOU CAN ASSIGN THIS TO YOUR
USERS WITHIN THE AZURE USER
DIRECTORY ADMINCENTER.THINKING ABOUT THING LIKE THETELEFANY ADMIN WILL HAVE SCOPE
OVER STUFF IN GERMANY BECAUSE
THEY ARELOOKING OVERTHE GERMANY VERSUS THE FOLKS
OPERATING OUT OF THE U.S.THEY
ARE GOING TO HAVECAPABILITIES
AROUND THE U.S. THAT ISABSOLUTELY SOMETHING THAT WE’RE
LOOKING AT.THAT IS ON THE BACKLOG.IN ADDITION TO BEING ABLE TO
CREATE CUSTOM ROLE AND ROLL THAT YOURSELF.AGAIN WE WANT TO MAKE SURE THAT
THE BALANCE BETWEENUTILITY ANDCAPABILITY IS CORRECTIN THIS. SO HERE ARE THE 4 NEW ROLES.TEAM SERVICE ADMIN YOU GET TO DO
EVERYTHING. COMING IN OCTOBER YOU WILL HAVE THEABILITY TO MANAGE AND CREATEOFFICE 365 GROUPS BECAUSE
MANAGING TEAMS AND MANAGING
GROUPS GO HAND IN HAND. THE TEAM’SCOMMUNICATION ADMIN
MANAGE CALLING AND MEETING
FUNCTIONALITY IN TEAMS.WE ARE SLOWLYBUILDINGOUT THAT
FACILITY.THEN THE 2 SUPPORT ROLES.TEAM SUPPORTENGINEER.TEAM SUPPORT AND TEAM SUPPORT
SPECIALIST. THE SPECIALIST GETS BASIC TOOLS, THE SUPPORT ENGINEERS GETS SOME ADVANCEDTOOLS.FOR YOUR REFERENCE I HAVE A
SLIDE COMING UP.I DON’T EXPECT YOU TO LOOK AT
THIS.YOU ARE WELCOME TO TAKE APICTURE.IT IS AN EYE CHART.IT IS NOT INTENDED FOR TO YOU
TAKE ON IMMEDIATELY.IT IS INTENDED FOR TO YOU TAKE
HOME AND HAVE AS A REFERENCE.IT IS THIS YOU WILL WANT TO
KNOW.SO HERE YOU GO. SO CROSS ALL OF THE DIFFERENT
PATHS. AGAIN,YOU ARE WELCOME TO TAKE A PICTURE.IT IN THE DECK.YOU AREWELCOME TO THE DECK.ALL OF THE DIFFERENT PATHS ON
THE LEFT.IN ADDITION TO THOSE 4 ROLES
WHAT DOESGLOBAL ADMIN GET.THE SKYPE FOR BUSINESSCAN STILL OPERATE WITHIN THE ADMIN CENTER. BUT THEY ARE NOT GOING TO GET
THE FACILITY TO DO THE STUFF
AROUND TEAMS.THEY ARE NOT GOING TO GET THE
TEAM’S MANAGEMENTCAPABILITIES AS WELL.SO COOL.LET’S CHECKTHISOUT. SOI HAVE AUSER.STAY.LET ME GO OVER TO MY OTHER ONE
THERE AND MAKE SURE THAT ONE IS
HAPPY.SO WHEN I LOG IN.I AM LOGGEDIN NOWASPOLARAKERMAN. SET UP AS ADMIN WITH THESUPPORT ENGINEERING ROLE.I GETTHE ADVANCED TOOLS.WITHRESPECT TO THE LEFT NAV IT
ISSIGNIFICANTLY DIFFERENT.SIGNIFICANTLY DIFFERENT
DASHBOARD THIS ISTHENRY POINT
INTO THE BASE CALL ANALYTICS A
SEARCH FACILITY THERE AND THEN I
HAVE GOT THEABILITY TO CLICK
INTO USERS.THE DEVICES PIECE THAT IS JUST AFUNCTION OF OUROOPS WHEN IT COMES TOFLOODING FOR NORMAL
TENANTS YOU ARE NOT GOING TO SEE
THE DEVICES PIECE UP THERE.WHAT IS A GOOD USE I REMEMBER
FOR USTOUSE?DOES PAUL HAVEANYCALLS?BRINGING UPPAUL’SINFORMATION. SO YOU WILLNOTICE THIS IS THE
SAME USER DETAIL PAGE.BUT IT DOESN’THAVE THE
INFORMATION ABOUT THE USER.IT JUST HAS THEIR CALLHISTORY
INFORMATION. SO WE HAVE TAKEN — WE HAVE
TAKEN THAT SAME PAGE AND WE HAVE
JUST PULLED OUT THOSE PIECE
THAT’S THIS ROLE IT DOESN’T HAVE
ACCESS TO.SAME CONCEPT WITHRESPECTTO
TEAMS CALL ADMIN AND SKYPE FOR
BUSINESS ADMIN. SO LET’S SEE IF WE CAN SEE SOME COOL STUFF.THIS IS A GREAT ONE.EXCELLENT. SO WE HAVE GOT THIS MEETING.MEETING AUDIO QUALITY LOOKS
PRETTY GOOD. THERE ARE 4 DIFFERENT
PARTICIPANTS. DOWN HERE YOU CAN SEE ALL OF THE DIFFERENT SECTIONS THAT WEREREPORTED FOR THIS PARTICULAR
CALL.SO EACH ONE OFTHE INDIVIDUAL
MEDIA STREAMS IS REPRESENTED
HERE AND THEN THE SPECIFIC
SESSION TYPE.SO WHAT WERE THE MEDIA TYPES
THAT WERE USED FOR THIS
PARTICULAR CALL.THE VIEW THAT I ALWAYS REALLY
LIKE IS THIS ONE. SOTHIS ACTUALLY SHOWS OVER THE
TIME FRAME OFTHE CALL WHO WAS
ENGAGED IN THE CALL WHO WAS ON
THE CALL AND THEN SPECIFICALLYWHAT MEDIA TYPES WERE THERE.SO YOU CAN SEE THAT THIS
PARTICULAR — I KNOW,RIGHT. IT IS COOL.YOU CAN CLAP.IT ISALL GOOD.SO YOU CAN REALLY SEE WHAT IS
GOING ON.THEN IF I JUSTHOOVER OVER THAT
I GET THIS NICE LITTLE POP UP
WHAT IS GOING ON WITH THIS PARTICULAR SESSION?HERE ARE THE MODALITIES.HERE IS THE DURATION. HERE IS THE QUALITY.OH,YEAH,LET’S DROP IN AND
CHECK OUT SOMEDETAILS. SO WHEN I GO AND CLICK NO THE
DETAILS OF THIS PARTICULARSESSION,THE DIFFERENCE BETWEEN
THE2 DIFFERENT HELP ADDICTION ROLES REALLY BOIL DOWN TO THESE 2 TABS OF ADVANCES ANDDEBUG
THAT FOR THE KIND OF TR ONE HELP
DESK ROLE YOU HAVE THIS
OVERVIEW.AND THEN FOR THETIER2 HELPDESK I CAN GETINTO THE — IF
YOU ARE INTERESTED INWONDERFUL
GORY INFORMATION WHATEVER THAT
IS SUPPOSETODAY MEAN YOU HAVE IT AVAILABLE IN THEPORTAL.AS TIME GOES ON ONE OF THE AREAS
THAT WE WANT TOENHANCE WITHIN
THIS VIEW IS TO MAKE IT REALLY
EASY FOR FOLKS TO DUMP OUT ALL
OF THE INFORMATION CONTAINED IN
HERE AND HAVE THAT BEAVAILABLELIKE EXCEL DOCUMENT OR SOMETHING
YOU CAN GO AN SEND AROUND TO
COLLEAGUES AS YOU NEED.BUT THERE IS A BUNCH OF
INFORMATION THAT’S PROVIDED
AROUND THIS.SO FOR EXAMPLE AT THE HIGHLEVELI SEE THE CONNECTION WAS WI-FI.THE WI-FI SIGNAL WAS DESCENT. LET’S LOOK AT MYNETWORK.IT LOOKS LIKEMR.SCAY HAD SOMEPRETTYDESCENT NETWORK TIMES FOR
THIS PARTICULAR CALL.YOU CAN TELL FROM A HELP DESK PERSPECTIVE HAVING THIS DATA ISINCREDIBLY VALUABLE TO
UNDERSTAND WHAT WAS GOING ON
WITH YOUR DEVICE.OH,DUDE. HE WASUSING AN ON BOARD,BAD
NEWS. MOST OF THE TIME WHEN YOU SEE
THAT THE AUDIO CAPTURE DEVICE IS
SOMETHING LIKE THIS,IT MEANS
THEY ARE USING THEIR LAPTOP.AUDIO IS GOING TO SOUND CRAPPY
IF YOU ARE JUST USING YOUR LAPTOP.ANYWAY,THAT’S WHAT THE R BACK
CAPABILITY LOOKS LIKE.THAT IS WHAT CALL AN HAT TICKS
LOOKSLIKE WHEN I LOGGED IN AS
ONE OF THOSE NEW HELP DESK
SUPPORT USERS.IN THIS CASE LOGGED INTO ONE
THAT SHOWS ME ALL OF THE FUN
ADVANCED TOOLS TO BE ABLE TO GETALL SORTS OF COOL DATA OUT OF
THETENANT.ALL RIGHT. TEAMS LIVECYCLE WE ARE SO
EXCITED ABOUT THIS.THIS IS SO COOL.THIS IS ONE OFTHE AREAS YOU
HAVE SEEN. WE HAVE THIS ON THE MECHANIC.WE HAD THIS IN LORI’S KEYNOTE.WE HAVE THE ABILITY TO LOOK AT
ALL OF THE TEAMS THAT ARE GOING
ON WITHIN MY TENANT.HAVE THEFACILITY MANAGE THE USER WITHIN THE TEAM.BE ABLE TO CHANGE THE OWNERSHIP
TO PROMOTE FOLKS TOOWNER OF
TEAMS.THIS IS ONE OF THE BIG THINGS
THAT FOLKS ARE GET BEING STUCK
ON IN A LOT OF CASES WE ARE
HAVING CUSTOMERS SAY WE HAD A
TEAM THAT HAD ONE OWNER THEN
THAT OWNER LEFT.NOW THE TEAM IS OWNERLESS AND WE
ARE IN THIS WEIRD STATE.NOW YOU CAN GO IN AND GET THAT
ADDRESSED. I CAN GO AND PLAY WITH AROUND
VIEW AND ADD AND MOVE AND REMOVE
CHANNELS WITHIN THE TEAM.THEN I HAVE GOT A SET OF
SETTLINGS THAT MANAGE THE OPERATIONS OF THAT TEAM.SO IT IS VERY SIMILAR TO THE
SETTINGS THAT YOU WOULD SEE
WITHIN THE RICH CLIENT WE JUST
BUBBLE THOSEUPWITHIN THE WEB
AS WELL.WE HAVE A BUNCH OF GREAT FOLKS
FROM OUR EARLY ADOPTERS WHO ARE
LOOKING AT THIS.UNFORTUNATELY THAT PROGRAM IS
AWFUL.FULL.WE EXPECT TO GET IT ALL THE DOOR
IN OCTOBER. LET’S GO CHECK IT OUT.AWESOME.WHHOPS, WRONG ONE.I AM ONPROD AGAIN.LET’S CHECK OUTMY TEAMS.I WANT TO MAKE SURE HERE IS MY
TENANT.HERE AREALL OF THE TEAMS THAT I
HAVE GOT SET UP IN MY TENANT FOR
MARKETING AND ENGINEERING.I SEE THE CHANNELS THAT I HAVE
GOT CONFIGURED.I SEE THE NUMBER OF TEAM MEMBERS
AND OWNERS AND GUESTS THAT ARE A
PART OF THAT. WHETHER OR NOT THIS PARTICULAR
TEAM IS EITHER PUBLIC OR
PRIVATE.IF I WANTED TO I COULD GO RIGHT
HERE AND I COULD CREATEA BRANDNEW TEAM. I COULD ADD OWNERS TO THIS.I COULD CHANGE THE PRIVACY FROM
DIRECTLY FROM WITHINTHIS
INTERFACE.IF I CLICK INTO A PARTICULARTIME I SEE THE COOL,FUN,IMAGE
THAT OURMARKETING COLLEAGUES
HAVE INCLUDED IN THIS. THIS IS ACTUALLY THE FIRST
INSTANCE OF US GETTINGPICTURESASSOCIATED WITH THE USER
OBJECTS.YOU MAY REMEMBER FROM THE USER
DETAIL PAGE WE DIDN’T HAVE THEUSER’S PHOTO IN THERE.THIS IS THE FIRST INSTANCE THAT
WE HAVE BEEN ABLE TO BRING THAT
IN.WE WILL REVAMP IT TO SHOW PHOTOS
AS WELL. IT IS A MUCHMORE HUMANVIEW OF
THE EXPERIENCE.I REALLY LIKE.I GET A VIEW OF THE DIFFERENT
CHANNELS THAT ARE SETUP.SO LET’S — I GOT A LITTLE BIT
OF TIME.LET’S EXERCISE THIS. I HAVE THAT ASA TEAM.I AM A MEMBER OF THAT TEAM BUT
I’M NOT AN OWNER. IT JUSTSO HAPPENS I HAVE TEAMS
UP AN RUNNING.I HAVE THEENTERPRISE CONNECT
2019 TEAM.I HAVE THE GENERAL AND THE BOOTH
CHANNELS.SO THIS IS ALWAYS A LITTLE
DANGEROUS.WE DON’T KNOW QUITEHOW FUN THIS
PIPELINE IS GOING TO BE.LET’S GIVE IT A SHOT. YOU ARE AN AWESOMEAUDIENCE.WE WILL TALK ABOUT THE BOOTH.WE SHOULD ALSO TALK ABOUT THE
KEYNOTE.KEYNOTEPLANNING GOES HERE.I HAVE CREATED A NEW CHAN EXAMINE.THE NEW CHANNEL WAS ADDED. AND THEN KEYNOTE,BRAND NEW.I KNOW, IT WORKS.OF COURSEIT WORKS.LIKE I SAID THERE IS STILL A
LITTLE BIT OF PIPELINE STUFF
THAT WE ARE WORKING THROUGH.FIT AND FINISH THAT WE HAVE TODO ON THIS FEATURE.WE ARE SUPER PROUD OF THE
FACILITY THAT WE ARE ABLE TO
BRING INHERE.WHAT’S MORE HERE ARE THE
DIFFERENT SETTINGSTHAT AREAPPROPRIATE FOR MY TEAM.SO WHETHER OR NOT I ALLOW FOLKS
FROM WITHIN THIS TEAM EDITINGMESSAGES,WHETHER OR NOT I AM
GOING TO ALLOW — DON’T TOUCH
THAT WIRE.WHETHER OR NOT I AM GOING TO
ALLOW TEAM MEMBERS TO BE ABLE TO
ADD NEWCHANNELS TO MANAGE TABS.ALL OF THIS YOU ASTENANT ADMIN YOU HAVETHE FACILITY OR TEAM
SERVICE ADMIN YOU HAVE THE
ABILITY TO GO AND MANAGE THIS
AND CONFIGURE IT AS YOU NEED.SO IT ISGOOD STUFF.LET’S HEADBACK.LAST TOPIC AND THEN I MAY HAVE A
COUPLE OF MINUTES FOR QUESTIONS. WE WILL SEE.APP POLICY.THIS IS PROBABLY SECOND TOMANAGING THE LIFE CYCLE OF THE
TEAM AND BEING ABLE TO AS AN
ADMIN PLUNK AROUND AND SEE WHAT IS GOING ON IN TEAMS.IT IS PROBABLY THE SECOND MOST
REQUESTED SET OF WORK THAT WE
HAVE HAD.SO EFFECTIVELY APP POLICY EXISTS
TODAY WITHIN THE OFFICE 365
ADMIN CENTER FOR TEAMS. AGAIN IT OPERATES AT A TENANT
LEVEL. SO YOU HAVE THE ABILITY TO KIND OF TURN ON AND TURN OFF WHETHER OR NOT PARTICULAR APPS ARE GOING TO OPERATE WITHIN YOUR TENANT.OF COURSE WE WANT TO HAVE THAT
NOW IN A POLICY MODEL AS WELL.WEHAVE BROKEN THAT UP INTO 2
DIFFERENT BUCKETS.FIRST IS A PERMISSION POLICY. SO WHETHER OR NOT YOUR USERS WHO ARE ASSIGNED TO THIS POLICY HAVE THE RIGHTS TO BE ABLE TO USE
THIS PARTICULAR APPOR NOT.WE MANAGE THAT ACROSS 3
DIFFERENT BUCKETS.MICROSOFT BUCKET,THIRD PARTY
BUCKET AND LINE OF BUSINESS OR
SIDE LOADINGBUCKET. THEN IN ADDITION TO THAT WE WANT TO BE ABLE TO CON FIGURING THE
MANNER IN WHICH THE APPISACTUALLY — SHOWS UP WITHIN THE
CLIENT.SO IS IT NAILED TO THAT LEFT
RAIL WITHIN THETEAM’S EXPERIENCE?IS IT VISIBLE?IS IT ALLOWED FOR SOMEBODYTO
CHANGE THAT AS A RESULT OF BEING
APPLIED TO THIS POLICY?ALL OF THOSE TYPES OF
CONSIDERATIONS ARE FOUND
UNDERNEATH THE APP SET UPPOLICY.THIS IS ACTIVE WORK THAT WE ARE
DOING RIGHT NOW.WE ARE GOING TO BE ROLLINGTHIS
OUT OVER STAGES STARTING IN Q 4
STARTING IN OUR NEXT QUARTER.SO WHAT YOU ARE GOING TO SEE IS
ELEMENTS OF THESE 2 POLICIES SLOWLY SHOWING UP TO THE MODERN PORTAL AND BECOMING LIVE AND
BECOMING WIRED UP END TOEND
WITHIN THE PRODUCT. SO BECAUSE THIS IS ACTIVE WORK
THIS IS MY MOSTDANGEROUSDEMO
BECAUSE I WILL PLAYING WITH FIRE
WITH MY DEV TEAM WHO IS
CURRENTLY PROBABLY UPDATING THIS
VERSION OF THE WEBSITE RIGHT
NOW.ADMIN DEV.SO YOU CAN SEE WE HAVE THE TEAMSAPP HERE.WHAT I AM GOING TO SEE APP
PERMISSIONPOLICIES ISHOPEFULLY,THERE WE GO.I HAVE GOT THE SAME SORT OF
MODEL HERE WHERE I SHOW MY
POLICIES IN A TABLE.IF I GO INTO THE BLOCK
EVERYTHING POLICY YOU WILL SEETHOSE 3 SEPARATE SECTIONS. FOR MICROSOFT THIRD PARTY APPS
AND TENANT APPS.INSTEAD I DON’T WANT TO BLOCK
EVERYTHING.MAYBE IWANTED TO FOLLOW ONE OF
THESE DIFFERENT MODELS.I COULD BLOCK EVERYTHING FROM
FROM MICROSOFT.I COULD ALLOW EVERYTHING FROM
MICROSOFT OR I COULD HAVE THE
WHITE LIST BE A BLACK LIST ESSENTIALLY.I COULD SAY ALLOW ONLY THESE
HANDFUL OF APPS AND STOPEVERYTHING ELSE OR ALLOW
EVERYTHING AND STOP THESE
PARTICULAR SPECIFICAPPS WITHIN THIS POLICY.SO I HAVE GOT SOME DESCRIPTION THERE OF THE MANNER IN WHICH
THAT SHOULD WORK.LET’S SAY I WANT TO GO AND BLOCK
SOME APPS.THEN I CAN DO AND ICAN OPEN
UP — LET’S ADD SOME MICROSOFT
APPS TO BLOCK.I WANT TO ADD ONE NOTE TO THAT.NOWCLEARLY SHOWN HERE THAT MY
BLOCKED APPS I AM BLOCKING
SPECIFIC APPS MY BLOCKED APPS
WILL BE ONE NOTE.TERRIBLE TRAGEDY I DON’T KNOW
WHY YOU WOULD DO THAT. MAYBE I WANT TO ALLOW THIRD
PARTLY APPSRANDOMLY TOUCHING A
TREE.NOTHING AGAINSTTRELLOW.IT WILL BE THE APP TO ALLOW.YOU CAN SEE HOW I CAN KIND OF
BUILD THIS OUT.I CAN’T SAVE THIS BECAUSE IT
WILL BLOW UP BECAUSE WE ARE
STILL WORKING ON THIS FEATURE. THAT IS A SENSE WHAT THIS
CAPABILITY IS GOING TO LOOK
LIKE.FROM APP SET UP POLICYPERSPECTIVE I CAN LOOK AT MY
MARKETING APP SET UP POLICY WE
HAVE STARTED TO DO THE WORK IN THE PRODUCT FOR THIS FIRST UP
STANCE THIS FIRST RELEASE IS
JUST GOING TO BE AROUND PINNED
AND UNPINNED APPS.SO IF I GOAND I WANT TO ADD IN
WHAT APPS I WANT TO HAVE PINNED. LET’S DO ONE NOTE AGAIN AND
LET’S DOTRELLOW AGAIN.ONE OF THE COOL THINGS WE HAVE
GOT HERE IS OBVIOUSLY IF I AM
PINNING THIS WITHIN MYAPP BAR
THEN ORDER MATTERS I HAVE THE ABILITY TOREGIGGLE THIS AS
NEEDED. WHEN THIS POLICY ISCONSUMED
THEN THESE PARTICULAR APPS WILL
BE RENDERED WITHIN THE CLIENT IN
THIS PARTICULAR FASHION.THIS IS ALSO YOU WILL BE ABLE TO
CONFIGURE THINGS LIKE I WANT TO
HAVE MEETINGS IN THIS PARTICULAR GROUP OF USERS OR MAYBE I DON’T WANT TO HAVE THE MEETING CAPE
WILT FOR THIS MEETINGS.THE ENTIRE VIEW THIS IS FROM OUR
DESIGN SPECIFICATION. SO A COUPLE OF CONTROLS UP AT
THE TOP AND THEN YOU SEE THE
APPS THAT END UP BEING
PRE-INSTALLED THE APPS THAT ARE
PINNED AND THEN ANY EXTENSIONS TO THE MESSAGINGBAR,THOSE ARE
ADD ONES FOR THE SPOT WITHIN
TEAMS THAT YOU ACTUALLY DO YOUR
TYPING IN.MY PERSONAL FAVORITE EXTENSION
THERE IS THEVISUAL STUDIO.ED ADD ON CALLED AZUREDEVO
OPPS.TAKE A BUG AND DROP A CARD INTHE APP.MICROSOFT IT DOES NOT TAKE THAT
AWAY FROM ME BECAUSE IT ISCRITICAL.SHALLYOU ARE AWESOME HANGING OUT FOR
THE BALANCE OF THIS. I WANT TO TALK ABOUT WHAT WE ARE DOING IN THE FUTURE.LOTS MORE POLICIES. NO SURPRISE.THINGS LIKE VOICE POLICY MAKESSENSE FOR US TO BE ABLE TO ADD
ON HERE AS WELL.BE ABLE TO HAVE MORESETTINGS,MORECONFIGUREABILITY AND THE
REPORTING STUFF IT WILL BE A SET
OF WORK THAT WE WILL BE PROSECUTING HEAVILY.BULK OPERATION AROUND POLICYASSIGNMENT.THE IDEA I WILL BE ABLE TO GRAB
A CHUNK OF USERS AND SAY I WANT
TO HAVE ALL OF THESE USERSASSIGNED A PARTICULAR MEETING
POLICY OR A PARTICULAR MESSAGING POLICY.THAT’S ACTIVE WORK THAT WE HAVE
GOT UNGOING AS IS VOICE
APPLICATIONS WORK.SO IF YOU AREFAMILIAR WITH THE
SKYPE FORBUSINESS2019 ROADMAP THE ATTENDANT WILL BE OPERATE
OUT OF THE CLOUD.COOL.SO WE DEFINITELY WANT TO MAKE
SURE THAT THAT’S GOING TO BE
DONE AT THE SAME TIME AS THE AVAILABILITY OF SKYPE FOR
BUSINESS SERVER IN ADDITION TO
THE FACILITY TO DO — THEFACILITY TO DO CALLQUEUES. BUNCH MORE FEATURES ON THE VOICE SIDE INCLUDING DIAL PLANS SO WEDEFINITELY WANT TO BE ABLE TO
EDIT AND CREATE DIAL PLANS FOR
ON LINE VOICE AS WELL.DEVICE MANAGEMENT IS COMING IN.THERE IS A SESSION ABOUT DEVICE MANAGEMENT HAPPENING TOMORROW.TELEPHONE MANAGEMENT IS OUR
BIGGEST SET OF WORK.THERE IS A TREMENDOUS AMOUNT OF
CAPABILITY THAT WE HAVE IN THE LEGACY PORTAL AROUNDASSIGNMENT,AROUND ACQUISITION OF NEW PHONE
NUMBERS FOR MICROSOFT AND
REPORTING OF THOSE PHONE NUMBERS
FROM YOUREXISTING CARRIER INTO
MICROSOFT.SO WE WANT TO BE ABLE TO SUPPORT
ALL OF THOSE DIFFERENTSCENARIOS
WITHIN THE ADMIN PORTAL.INSIGHT AROUND CALL QUALITY THIS
ISTHE EVOLUTION OF THE CALL QUALITY DASHBOARD FANTASTIC TOUNDERSTAND, HEY,YOU HAVE GOTA
LOT OFGUNKYWIRELESS PERHAPS
THAT’S WHY YOUR CALLING IS POOR.A BUNCH MORE WORK ON THE INFRASTRUCTURE SIDE.FRONT PAGE,THE ABILITY FOR
FOLKS TO BE ABLE TO GIVE US
FEEDBACK DIRECTLY FROM WITHIN THE PORTAL AND I’M INTERESTED IN DOING SOMEFUN EXPERIMENTTATION
ON THE UI SIDE TO GET MORE DATA
AROUND FOLKS AND HOW THEY
CONSUME THE PRODUCT. UNFORTUNATELY I DON’T HAVE TIME TO DOWNLOAD THE NORTH STAR AT
THIS POINT BECAUSE THERE IS 53
SECONDS LEFT.I WILL THROW UPTHIS RESOURCE CHEAT SHEET THERE IS A TON OF
GREAT INFORMATIONAROUND TEAMS
TOMORROWS AT IGNITE.I HOPE YOU HAVE HAD AN AWESOME
SHOW.SHOCKINGLY ENOUGH THERE IS A ONE
MORE TOMORROW AND MY COLLEAGUES HAVE SESSIONS IF YOU FOUND THIS INTERESTING ANDYOUWANT TO HAVE
FIND OUT MORE CHECK OUT THOSE
SESSIONS UNTIL I AM KICKED OFF
THISSTAGE I WOULDLOVETAKE
QUESTIONS.HOPE YOU COME OUT TO THE PARTY.IT WILL BE A GOOD TIME TONIGHT.THANKS FORHANGING.>>ONE QUICK QUESTION YES WE CAN EXPORT THE CALL ANALYTICS TOEXCEL WILL IT BE AVAILABLETOCALLER BI.>>WHICH WOULD YOU PREFER?>>CALL BE.>>WE HAVE THE COMPONENTS AS PART OF THE REPORTING WORK TO DO EXCEL.WE HAVE POWER BI ON OUR BACKLOG. RIGHT NOW THAT IS A SECONDARYPRIORITY. WE HAVE REALLY FOCUSED ON THEEXCEL POSE FIRST.POWER BI ISSOMETHING WE HAVE
LOOKED AT.>>CAN I ASK ABOUT THE POLICIES
THEY ARE A GREAT STEP FORWARD.ONE OF THE THINGS THAT I THINK A
LOT OF PEOPLE HAVEBEEN LOOK AT
FOR A WHILEDIFFERENTIATE
BETWEEN WHETHER YOUR
COMMUNICATION WITH A FEDDERRATED
ICE ERROR COMMUNICATING WITH A
USER ON THE SAME TENANT.THE SPECIFIC USE CASESURROUNDING TRANSFER FILES,SCREEN RECORDING OF MEETINGS AND
OTHER THINGS THAT YOU MIGHT NOT
WANT A FEDDERRATED USER TO SEE THAT BUT INTERNAL USER YOU WANT THEM TO SEE THAT.>>WITH THE REQUEST, WITH THE
POLICY CONTROL BE TO ALERT YOUR
USER TOTHE FACT THAT THERE ARE
GUESTS THAT AREFEDDERRATED
USERS OR WOULD IT BE TO BLOCK
THAT CONTENT FROM EGRESSING
THROUGH YOUR BOUNDARY.>>THE COMPONENT GUYS WOULD LIKE TO BLOCK IT.IT IS SOMETHING THAT WAS IN
SKYPE FOR BUSINESS AND SKYPE FOR
BUSINESS ON LINE WAS STARTING TO
GET THAT FUNCTIONALITY BECAUSE OF THE TRANSITION IT GOT
DROPPED. THE EVOLUTION OF THOSEPOLICIES
INTO MORE GRANULARSETTINGS
WOULD BE GREAT. APPRECIATE THAT’S GOING TO TAKE TIME.IT IS SOMETHING THAT REALLY NEEDSTO HAPPEN.IN THE UK INREGULATED INDUSTRIES ARE TURNING AROUND
SAYING NO TEAMS EVER BECAUSE YOU
CAN’T BLOCK THE SETTINGS.>>MY COLLEAGUE LOOKS AFTER THE
DEEP COMPLIANCESCENARIOS I AM
HAPPEN TO FOLLOW UP WITH HIM AND
SEE WHERE IT IS ON THE ROAD MAP.APPRECIATE THAT FEEDBACK.THANK YOU.>>WHAT ABOUTDELETING TEAMS? CLEANING UP.I DON’T THINK YOU SHOWED ANYTHING ABOUT THAT.>>YOU ARE RIGHT I DIDN’T.I WANT TO SAY WE DON’T HAVE
DELETE IN THERE YET.DELETE AND ARCHIVE ARE TWO OF
THE VERBS THATWE THINK ABOUTFOR MANAGINGTEAMS. SO — ARE YOU SEEING THIS YET?COOL. I HAVE GOT THIS HIGHLIGHTED.SO THE EDIT OPENS UP.BECAUSE NORMALLY WHEN WE
HIGHLIGHT AROUND THE TABLE I GET
THE VERBS AT THE TOP FOR THE ITEMS WITHIN THAT TABLE.GENERALLY I DON’T THINK OF
DELETE MORE I THINK OFARCHIVE
JUST BECAUSE DELETE FEELS LIKE A
PRETTY DRAMATIC STEP CONSIDERING ALL OF THE GOODNESS THAT IS IN
THAT PARTICULAR DATA STRUCTURE
ANDI WOULD HATEFOR THAT TO BE
ACCIDENTALLY HAPPENED AND THEN
FOLKS PANIC CALLING OUR SUPPORT.THAT ISDEFINITELY — ARCHIVING
IS ONE OF THE THINGS WE ARE
LOOKING OUGHT FOR THE SUCCESS ITERATION OF THE TEAM LIFE CYCLE STUFF.WE WANTED TO GET THIS OUT HERE
SO WE KNOW IT IS THINNED
FUNCTION ALLEY IN TERMS OF THE
RICHNESS.WE WANTED TO GET IT OUT THERE
AND FEEDBACK ON IT.I APPRECIATE YOU BRINGING IT UP.>>NOT A QUESTION BUT COMMENT.>>I TOTALLY DIDN’T SEE YOU
GUYS.>>YOUR ONE NOTE SCREENCAPTURETHING SNIP ANDSKETCH.>>WE CAN TALK ABOUT IT AT THE
PARTY.>>YOU ARE DONE WITH THEOTHER
ONE.>>FOR CREATION OF TEAMS I WAS
WONDERING IF THERE IS A WAYTO
LIMIT THE WAY TEAMS ARE BEINGCREATED AS IN LIKE I DON’T WANT
TO COME ACROSS THE CREATION OF A
TEAM AND THEN SOMEONE CREATES THE SAME TEAM WITHOUT KNOWING
THAT THE TEAM EXISTS.IS THAT A FEATURE THAT’S COMING
OUT?>>FUNDAMENTALLY CONTROLS ATTHE
365 LEVEL IN ADDITION BEING ABLETO NAME THE NAMING OF TEAMS.ONEWOULDN’TWANT TO HAVE TO BE
CREATED BY AN EMPLOYEE.THERE IS ALSO POLICY AT THEOFFICE 365 GROUP LEVEL OF
CONTROLLING THAT.>>OKAY,GREAT.THANKS.>>ABSOLUTELY. EMPTY,EMPTY.>>DO YOU YOU HAVE ANY PLAN
UNIVERSITY IN THAT ADMIN PORTAL. THEY JUSTANNOUNCED THEY WILL
BRING BACKPIAA DATA TODRY DOWNTO THE DATA USERLEVEL.>>>>IT IS ABSOLUTELY ONE OF THE
KIND OFKEY SETS OF CAPABILITY THAT WE WANT TO INTEGRATE INTO
THE ADMIN EXPERIENCE.THIS SHOULD BE ONLY INCREDIBLY
GOOD REASONS TO MAKE ADMINS GO
OFF TO USEA SEPARATE TOOL
BECAUSE ONE IT IS SUPER A NOISE TO GO DOTO A SEPARATOR TOOL
THIS IS MORE POWER TO HAVE IT
INTEGRATED TOGETHER WHENI CAN
GO BETWEEN CALL ANALYTICS AND
POLICY.WEWANT TO HAVE THAT 360-DEGREE
USE.I CAN IMAGINE GOING FROM CALL AN
LIT TICK WHAT’S IS GOING ON WITH
THIS PARTICULAR CALL.LET ME LOOK AT THIS LOCATION. THEN THATPOPS MEINTO CQD.>>THAT’S EXACTLY WHAT WE HAVE
TO DO TODAY WHICH IS HARD.>>EXCELLENT.I WANT TO FIX THAT FOR YOU.>>THANK YOU.>>ABSOLUTELY.THANKS FOR COMING OUT.ARE WEGOOD.>>IT IS HARD.>> ARE THEREANY PLANS TO BEABLE TO CONTROL WHICH TEAMSARE
OUT OF FALL OUT.>>BY GROUPS OR USERS THEMSELVES?>>THAT ONE I AM NOTFAMILIAR
WITH. DROP ME A MAIL –THE ANSWER IS
IT IS ON THE BACKLOG.NORMALLY SOMETIMES YOU MAY HEAR
FOLKS SAY IT IS ON THE BACKLOG
IT MEANS THEY ARE JUST PUTTING
IT THERE.NO,THAT IS SOMETHING WE SAY IT
IS ON THE BACKLOG WEPROSECUTE AND WORK ONIT.THE QUESTION BECOMES DOES THAT
FALL INTO OUR NEXT SET OF WORK
AROUND TEAMS LIFE CYCLE OR
SUBSEQUENT WORK AROUND THE LIFE CYCLE CAPABILITY.>>THE REASON WHY I AM ASKING
JUST BECAUSE I WANT TO BE ABLE
TO MAKE SUREUSERS CAN OPEN
FILES DIRECTLY FROM THEIR OFFICE SUITE.WHEN YOUFOLLOW THEMIT IS NICE. IF IT IS NOT FOLLOWED YOU ARE
NOT ABLE TO OPEN FILESIN A NICE
WAY.>>COOL,APPRECIATE THEFEED
THANK YOU.THANKS EVERYBODY FOR HANGING

Best Practices in Developing G Suite Business Apps (Cloud Next ’19)


[MUSIC PLAYING] SATHEESH NANNIYUR:
In this session, we are going to talk about
developing applications on G Suite, and some of dos
and don’ts of developing applications and how to set
up organizations in this particular session. So my name is Satheesh. I am your host for
the session today. Along with me, my co-presenters
are Monica from Genentech, and we are going to have
Sambit from Google Cloud talk in this session as well. So we will start with
giving an overview of what kind of challenges
our enterprise customers face when it comes to developing
applications on G Suite, and how we are driving certain
industry trends with some of our product lines,
followed by talking about our specific products. And then we’ll have Monica
present how they’re organized, and what are some of the best
practices in their organization with respect to app
development on G Suite. Then we’ll talk about, what
is the future looking like, what are the key trends that we
are seeing in the industry when it comes to developing apps
in the productivity space generally, and within G Suite
as well more specifically. And then we’ll wrap
up this session with an overview of some
of the exciting features that we are announcing today
with respect to G Suite development platforms. So before we get
started, a quick note on how to submit questions. So all of you must
have the mobile app. So you will be able
to submit questions through your mobile
app on this Dory. So you can go to this
particular session details, and then submit
[INAUDIBLE] there. Towards the end, we will try
to address your questions. We’ll also be able
to– hopefully we’ll have time to take some
live questions from this room as well. Sounds good? Perfect. So, without further
delay, let’s get started. So imagine yourself to
be a salesperson, an HR professional,
financial analyst– many different roles
in an enterprise. Your key responsibility
is in driving the business with
respect to your role, with respect to your
area of expertise. When you do this,
you’re obviously using many different
applications. You’re using G Suite, plus
you’re using other enterprise applications as part of this. That means you need some
customizations in order to run your business process. You need all those apps. When it comes to
getting those apps, there are some key
challenges that the business users in an organization face. Number one challenge is
what we call the skills gap. As the business
process owner, you are the expert in
your business process. You know how your
process should run. You know how your
business is run. You know your role
better than anybody else in your organization. When you want to
get those apps, you need to go to your IT
developers, and talk to them, and educate them about
the business process. And then they have the
technical expertise to develop those applications. Do you see the problem there? So on one hand,
the business users are really proficient
with their processes. They have the right
skills for that, but they lack the
technical expertise. On the other hand, the
technical developers have the right
technical knowledge, but they don’t know all
the business processes. This is what we refer
to as a skills gap. This requires communication
back and forth in order to get the right
application that you need. This is the number
one challenge. The second challenge
is, the IT developers, now they have to work with
many different business users in the organization,
across the enterprise, understand those
business processes, and then develop the
applications for them. That leads to scaling challenges
for the IT developers. The resources become
limited as a result of that. Any organization, this
is a very common problem. The third challenge
that we see is that technology keeps evolving. Business processes
also keep evolving. And as a result of that,
it’s hard to keep pace with those changes. Everybody’s always
playing catch-up in order to stay in tune
with these changes that are happening. That leads to delays in
getting the apps that you need. That leads to getting
the updates to the apps that you’re using. That’s the number
three challenge. The net result of all
of these challenges is that the involved
stakeholders get frustrated. There are many
different stakeholders. I have identified three
stakeholders here. Number one is the business user
who needs these applications. Number two is IT developer,
the technically proficient developers. Our number three
is somebody who is tracking the cost,
and the schedules, and managing all these
programs and costs, what I call the IT director here. The business users are
frustrated because they are not able to get the
right apps that they need on time or the updates
that they need on time. The IT developers are frustrated
because their project backlog just keeps growing
as they try to work with many different
organizations in enterprise. The net result of
the IT director is that now they
are facing the cost and the scheduled [INAUDIBLE]. Those are the challenges
that everybody faces– all the stakeholders face. How are enterprises
addressing this? What are the shifts that are
happening in the industry to address this? So number one shift
that is happening is that the application
development itself is being moved to
the business users– closer to the
business users– where they have the right expertise
on the business process and they are in
the best position to find out what
is the application that they need, and
better still, actually develop these applications. This is happening on no-code
tools for the business users to develop those applications. The second shift that is
happening in this industry is that there are lot
of SaaS applications that are coming up– Software as a
Service applications. When there is a
need, it’s probably most efficient to go
and buy an application, as long as there is one
that meets the need. That has led to the growth of
the enterprise marketplaces and the growth of
the ecosystems, where ISVs and third-party
developers develop these apps and make them available to
the different businesses. The third shift is
within the enterprise IT. IT’s role itself is evolving. It’s evolving from one of being
an app developer and an app development
organization to being an enabler for development of
applications, by the businesses and by the business users. The business users in
this slide are also called the knowledge workers. So the knowledge workers
are now developing the apps, and the IT organizations are
became becoming the enablers. They’re providing
the right tools, they are providing
the right data access. They’re providing the right
guardrails– security, et cetera– to make sure
that those applications meet the organization’s needs and
comply with the organization’s policies. In Google and in G Suite,
we are at the forefront of driving these shifts. Number one, with respect
to the first shift, we are providing the
low-code and no-code tools to enable the business users
to develop these applications. Number two, we are
building this ecosystem and we are building
this marketplace where business users in
an organization can go and find
applications that they need and start deploying and
using those applications. With respect to
the third shift, we are also providing the
right tools and technologies that data administrators
need in order to ensure that all these
apps that are being built by the knowledge workers
across an organization remain secure, the enterprise’s
data remains secure, and that the IT administrators
can go on and monitor the application usage and
make sure that they’re able to whitelist the apps
that they allow the enterprise users and the business users
to install and use that. That’s how we are driving these
shifts in the G Suite Developer platform. Getting into the
specifics, I want to talk about the five products
in G Suite Developer platform, give an overview, so
that you can go out and explore further
details on this. So the number one developer tool
that we provide is Apps Script. Apps Script is a
low-code platform. How many of you here
have already heard about Apps Script. That kind of shows how
popular Apps Script is. You can actually
see that there are over three billion weekly
executions on Apps Script. So it’s a low-code
developer platform, and it enables the business
users to quickly build apps. How so? Because it provides
an integrated document environment. It provides APIs for
all the G Suite apps. It also provides security,
in terms of OAuth, et cetera. And it provides an integrated
runtime environment, so that when you’re
building the app, you don’t have to look
elsewhere to think about where you’re going to run that app. So it has that integrated
runtime serverless environment that you can use to go ahead
and run the application. From a best practices
perspective, if you have an
application that is going to be used by, let’s
say, a few hundred users, Apps Script provides the
perfect platform to get started. Apps Script still
requires some coding and some proficiency in coding. This is for what we call
the advanced knowledge workers, or citizen developers. Let’s say you build an
app and it becomes very popular in your organization. Now it needs to be used by,
let’s say, a few thousand users as opposed to a
few hundred users. That’s the time when,
as a business user, you talk to the IT
organization and IT developers, figure out how to
scale up application. And also, potentially, you need
new features– maybe some email or AI capabilities, maybe some
data analytics capabilities. That’s when you can use
Google Cloud Platform, and scale that application,
and build the new features. The second tool that I want
to talk about is App Maker. App Maker is intended to
be a no-code platform, a no-code application
development tool. This is for pure business users,
knowledge workers who cannot code. At this point in
time, App Maker is great for building simple cloud
applications with the data that you are already using
for your business users. If you want something that
is a bit more advanced– if you want more
advanced customization– you can use Apps Script
to customize your app that is built using Apps Maker. So from a best
practices perspective, if you are a business user, you
will start building the app– as long as it’s a simple
cloud application, you should be able
to build with all the visual drag-and-drop tools,
as is illustrated on the slide here. If you want more
customizations, you would go to the IT
department and try to seek some of
their help in order to customize the application. The third tool that
I’m going to talk about is the G Suite Add-Ons. I literally know of
nobody who is just using one or two applications
in their business, right? They’re always using a
suite of applications. For example, if
you’re a salesperson, you’re using G Suite, Gmail,
Events, Calendar, et cetera. But chances are very
high that you are also using a Salesforce or a dynamic
CRM along with this G Suite. So Add-Ons provides the right
tools and the framework for you to get an integrated experience
with third-party apps. That’s what Add-Ons
is intended to do. It provides an
integrated experience. It also provides a
development environment in order to build those
Add-Ons so that they we use multiple applications along
with G Suite, in conjunction with G Suite, in an
integrated experience. So from a best
practices perspective, you’d look for these add-ons– to start with, on the G
Suite marketplace, where the chances are that you’ll
be able to find the right add-on that you need. Otherwise, this is not a
development tool intended for the knowledge workers. Rather it is a framework
intended for use by the knowledge workers. So from a development point
of view, you have to go to IT and ask them to
develop an add-on and make it available
to you, and potentially many of your colleagues
in the organization. The next one is the
G Suite Marketplace. There are over 6,000
ISV applications– both web applications,
productivity tools, add-ons, that are available on
G Suite Marketplace. So if you’re looking to
solve a particular problem, this is probably the
best place to start with. Look to see whether
there is already an application that’s available,
and use that application. And if not, then
you’ll have to look at how to build something in
collaboration with your IT. So if you are in
the IT organization, from a best practice
perspective, you should talk to
them about the app that you need so that, in IT,
you can actually make sure that the application
that you want to make available to the rest
of your organization is secure, it meets all your needs. And then that application can
be whitelisted, and make sure that all the other business
users can use that. The last tool that
I’m led to talk about is the Admin Console. So the Admin Console provides
a number of different tools and techniques to make sure that
the apps in your organization remains secure and the
data in your organization remains secure. With the shifts that
we talked about, now a lot of different
knowledge workers will be building
applications through their entire organization. The role of the IT
now is to become an enabler, a facilitator
for this kind of application development. As a result of that,
it’s very important that IT’s role is to keep the
security of the applications and the security of
the data, and make sure that these apps and data meet
the compliance requirements of the organization. In order to do this,
we are providing a number of different tools,
including whitelisting of the applications. Only the whitelisted
applications can be installed by the
users in your organization. Providing data access
controls via whitelisting APIs and enabling APIs, providing
some data guardrails, as well as monitoring
the app usage and ensuring that the resources
that are allocated from the app are maintained. So those are some
of the ways how we are enabling
the IT to go and be an enabler in your
organization in turn, for knowledge worker
apps to be built. This is an important area
of investment for us. We know that there is a lot
more work to be done here, and we are working on
bringing more capabilities to ensure that, as
IT organizations, you can empower your
business users to build apps and maintain the
security of those apps. So, so far, I gave
you an overview of the different
discrete developer tools and an overview of
what are the industry shifts. I want to take a moment to
summarize some of the best practices that we have learned
from many of the customers that we have spoken to. These best practices, I have
divided them by two personas. One is a knowledge worker, and
the other is IT administrator. So if you’re a
knowledge worker and you are looking to build
an app, your first step should be to identify
what kind of experience your app needs to deliver. Is it a web app that users
are going to access via URL? Is it an add-on that will
be available along with G Suite in the side panel? Or is it an automation–
automation meaning and event-drive app
that automatically does some task for
you in response to some kind of a system event? That would be the first step. The second step is to
lay out the resources that your application needs. These resources could
be, for example, certain compute resources or
certain storage resources. Or maybe you want some
access to resources such as ML models, et cetera. Depending on the
resources that you need, you can think about
what kind of platform that you want to build
your application on. The third is the data
sources and the retrieval. The data sources could
be– for instance, it could be some on-prem system
that you’re already using. If you are in IT, you
have to think about, how will I make this data
available to the knowledge workers so that they
can build our apps? The data sources could also
be some other third-party SaaS services that you
are looking at. And maybe what you want to
access is just a few data items, potentially using APIs. In some cases, you may
want a large amount of data that needs
to be analyzed by the application itself
using some kind of pretty analytics tools. So the fourth step is,
using all of these data from the first three
steps to make sure that you’re choosing the
appropriate G Suite developer tool. If you’re looking to
build a simple application with no code, you will
probably start using App Maker. If you want some customizations
that are a bit more advanced, than you would start
looking at Apps Script, and start using that particular
tool for building your app. If you are looking for much
more advanced data analytics– crunching a large amount
of data, using some email, or if you are looking for
advanced storage such as Cloud SQL, then you would be thinking
about building your app on GCP, the Google Cloud Platform. Those are the kind of things
that you should look at. So now, once you
build this app, you should also think
about how to share this app with the other
users in the organization. This could be, for
example, even IT, providing some amount
of pre-built code for the other knowledge
workers to develop apps on. Or it could be IT enabling
all the enterprise users to use this app via a private
listing on the enterprise marketplace– on the
G Suite marketplace. Or if you’re even looking– if you are a third-party
developer or an ISV, you can use the G
Suite Marketplace as your distribution
platform so that you can reach many different
enterprise customers and have them use
your application. Now, looking at it from an IT
administrator’s perspective, the best practices
are– number one is, make sure that your
business users, the knowledge workers in your
organization, are empowered and they’re aware of the tools. Make the right tools available. For example, you
may want to make App Maker available
for all your business users in the organization–
enable it for them. Or you may want to build some
community around the knowledge workers so that they can
collaborate with each other, share information
with each other, and build the
application on their own. This is important for
you as an IT organization because that reduces
the load on your– and the stress on
your organization, by moving the applications
closer to the business users. The second best practice
is to establish data access and connectivity. If you want your
knowledge workers to be able to build apps
around on-prem data, make sure that
data is available. And the third best
practices is to enforce security and governance. Now when you’re looking
at enabling your business users to install applications
from the marketplace, make sure that they’re secure. If you are enabling
your knowledge workers to build those
applications, then make sure that
those apps are also secured before they are widely
used in your organization. Or you may want to establish
some data guardrails or some quartiles in
the compute to make sure that those apps comply
with those limitations that you enforce. So those are some of the best
practices that we have learned from many different customers. So at this point, I would
like to invite Monica onstage to talk about application
development, and Genentech, and how they’re organized. MONICA KUMAR: Thanks, Satheesh. Hi, everyone, welcome
to the session, and it’s great to be here. Thanks to Sambit and Satheesh
for inviting us here. I have a couple of my colleagues
from Roche and Genentech. So– glad we could
get a team together. So I want to start off with
talking about who we are. So maybe some of the US-based
folks may know Genentech, but Roche is basically a global
pharma company based in Basel, Switzerland, with around– you can see we have
over 100 locations worldwide, with around
95,000 employees. And Genentech, which is a
US-based biotech company, was acquired by Roche in 2009. And ever since, we have been
a member of the Roche group. Another fun fact–
I mean, it’s really a huge number– the 11 billion
Swiss francs in R&D investment. So we basically are focused
on four therapeutic areas– oncology, immunology,
neuroscience, and infectious diseases. And really, we have both
the diagnostics and pharma divisions under one roof. And this gives us the
unique opportunity to actually look at
the patient health care across the whole
spectrum, so right from prevention, diagnosis,
treatment, and then monitoring. And our mission
is really to find those unique and best solutions
to improve our patients’ lives. To really support our business
and to fulfill the mission to have the best solutions
for our patients, we are looking at,
from an IT perspective, how can we actually
simplify the landscape, empower teams with
the right tools, and also support these
new ways of working. Our business is going through
a major transformation today. And what you see on
the left hand side– and just to give
you a background, Roche migrated to
G Suite in 2013. And prior to that, because the
company had been in business for more than 20, 30
years, as some of you know, you tend to build
up on legacy applications, legacy platforms. And lots of custom solutions on
those platforms had been built. So we had sort of a messy
application landscape. And we also have– ever since we’ve
moved to the cloud, we also got these
third-party apps that were sort of
confusing our end users– when do I use this versus that? Microsoft was embedded
in the organization before we moved to G Suite. So a lot of the
questions is, when do I use SharePoint versus
Team Drive or Sites? And so our leadership looked
at this last year, and we said, there is a certain power
in offering our end users a default. And that
default is actually G Suite. So we believe G Suite offers
the right capabilities to make our end users as
productive as possible. But along with G Suite– So the G Suite ++, is really
about these third-party apps that we have also. So we use Smartsheet,
Box, Trello. All of these apps actually
add to that experience, they enhance, and
they meet the gaps that we have just in the
basic Collaboration Suite. So how are we organized to
support this very large, very complex organization? We have a global
IT team oversees that looks at where
is the business going, and what are the enterprise
solutions we need to provide our customers so that they
are not waiting for this and having to do all
this work on themselves. So for example, we are focused
on personalized health care, in the Roche science
infrastructure, ERP, and many cloud capabilities,
even around automation. So that’s something
that global IT provides, those platforms and tools. The functional IT is basically
embedded in the business. They actually have
the closest proximity to what’s going on in
each business division. So for example, our
business functions can be from research,
manufacturing, diagnostics, commercial. So each of these businesses have
their own individual demands, and they have their own
business-critical applications that they work with. And that team actually
sits, and delivers, and drive that global
IT strategy forward. And then, of course,
we wouldn’t be here and be able to do what
we do without hundreds of these knowledge workers
who are both developing, but they’re also
consuming these services. But they are the ones
that are actually building these solutions,
using some of the development platforms we have. And we have a wide spectrum. Given the application
landscape that we have and the complexity of
the business demand, too, we have every– low-code, to medium, to the very
complex apps, a wide spectrum there. And so in the low-code,
we have seen a lot of– because we’ve been on
G Suite for a while. We’ve seen lots and lots
of knowledge workers build app scripts for many,
many different solutions that they want. So for example, Apps Script
comes embedded within G Suite. It gives you the ability to
connect with the G Suite API. So anyone who has
curiosity to solve a problem within their
own group can just pick it up and get started. It offers the integrated
serverless runtime, and it’s no additional cost. So I think this is
something that we have seen grown very organically. We didn’t have to do a whole
lot to support the organization. This is something
people just ran with. In the medium complexity,
we have Apps Script or other web apps
that have evolved to a higher complexity,
where we are seeing the use of GCP and APIs. In fact, we
ourselves, in IT, have built lots of global solutions,
including our employee directory, which
is called Peeps. We have built that
on GCP, leveraging our identity management
systems, HR systems, bringing together the
data so that that Peeps app can be available
both on Chrome as well as on a mobile device. But I think in the last sort
year and a half, two years, we’ve seen a demand for more
intelligent, contextual apps that will reduce the friction
or the barrier of entry to use them. And these apps could be using
some of the cloud technologies like the natural language
processing, machine learning, and AI. We are actually signed
up with Dialogflow, which is part of the
Cloud AI stack on GCP. And we have about 70 digital
assistants and chatbots, either in a PoC or development stage. So there’s huge
interest and a demand from the business in this area. And again, we are
integrating with some of our big third-party systems,
like ServiceNow, Workday, and SAP as well. So today, I actually want to
talk about two use cases, both built with Apps Scripts. And both of these
actually come from our pharma technical business
operations team, which is basically manufacturing. So this team actually has two
manufacturing pilot plants here in South San Francisco. And they really
wanted to have a tool that enabled to do some
sort of workforce planning– so for both technicians
to be able to plan, like, the next weeks and what’s in
the pipeline, and for management to have oversight over
the activities happening in these plants. And so they looked
at– obviously, there are third-party
tools available. There’s a cost associated
with that as well. But given that our
Genentech processes are so customized to the molecules
and the experiments that are being run
in these plants. Just to buy an off-the-shelf
product wouldn’t work. And they could also
have gone to IT. But IT also adds to the
overhead in the sense they need to explain– firstly, get the resource,
explain all their business processes, the roles. And it takes time to
actually deliver it to the pilot plant workers. And so Scott Linnell, who’s
here with us today, the author and the person responsible
for this app script, actually is very much
like some of the knowledge workers in our organization. He saw this problem. And he’s not a
computer science major. He comes from the life
sciences background. He was an intern at
Genentech in 2017, and just dabbled in Apps Script. And along with another
intern, and then later on, as a full-time employee, took
this on and built the app script to address this need. And I think it’s a great
example of what’s possible. You don’t need to wait to
solve a business problem just because you don’t
have IT resources. And again, there’s another
example from the same team, but for a different use case. So there are these
different equipments. There are five different labs
within our manufacturing team. And they have different
equipment based on the roles that the people have. And earlier, it used to be a
very tedious manual process. People would go to the
equipment, sign up on a sheet, like, hey, I want to use
the equipment from 10 to 11 tomorrow– really manual process. And they actually–
this equipment can’t be booked by just anyone. So they’re booked by the role
that you have on the team. And so again, Apps
Script came super handy. Because they could
actually not only see the availability of the
equipment, book the equipment, it’ll show up on
their calendar, there would be an email
sent to remind them, hey, your equipment
is due for return now, and they could also say the
equipment is broken– they’ve used it and it’s not working. They could just schedule
a maintenance right there, through this tool. They have colleagues now,
in Germany, the same team. And they said, we would
like to use this tool, too. And so they’ve localized
that same app script and used it for their German
colleagues and counterparts. Again, a great example
of how empowering your organization and your
knowledge workers to use what’s at their fingertips today. And we’re really proud of
the work that Scott is doing. He even, in fact, ran Apps
Script training for his team there, to help them build more. I want to leave you with
some best practices. Obviously, we’re
not a small company. So some of our best practices
are really centered around how we can scale and support
a very large organization. And the first one is
the enterprise strategy. And this is not just
about seeing technology for technology’s sake. It’s about how can we deliver
platforms and services that actually meet our
business demand. So we look at a
two- to three-year and see how are we positioning
ourselves with the cloud capabilities, with
infrastructure services, application
development services, to enable and
drive that forward? Because the business is
relying on us to do that. And the second thing we
actually really value a lot is this customer experience. So when we think of IT
services, most people just don’t like going to IT. It takes long. You have to open 10 tickets. You have to go here, go there. We try to bundle these services. So we look at what does
an application developer need when they come to us? What does a DevOps person need? What do these
researchers need when they want to quickly
spin up applications? And so we look at how people
are consuming our service, what are they telling about it,
what is their feedback, where can we do better, and
continuously have this cycle with them to improve it. And then the third thing
that we have to drive is the compliance within
all the products, platforms, and services we provide. And this is a proactive, close
collaboration with security, with legal, with
COREMAP, to make sure that anything we
recommend and anything we say, this is
supported by IT, it’s actually complying with Roche
data and privacy standards. So essentially we
are making sure that the heavy lifting
is already done, so that when end users go into
the application landscape, they can actually pick a product
knowing that IT has vetted it, it’s safe to use. The second piece is around
empowering the organization. And this, the first part,
business partnership is essential for us because of
how diverse and geographically dispersed we are. It’s very important to have– we call them IT
business partners. They’re basically
embedded in the business, but they understand
the IT landscape. They can connect the
dots for the business. They can point them
to the right people. They can point them, hey,
you don’t need to build this; there’s already a solution
available for this. So there is this
cross-sharing of ideas, but also solutions
on how business can solve their problem. We also make a very
concerted effort to make sure that
anything that we introduce into the organization,
there’s full transparency on the roadmap, so there
is nothing unexpected or a surprise. So we make sure that we
have our sounding boards, with our stakeholders
and customers internally. We also have user adoption
services regionally, spread across, who are
actually our channels. And they are
communicating new changes that are coming in our
pipeline to all of the users. We also run a lot of pilots. So we’re very– because we want
the organization to be prepared for change, we make
sure that, for example, whether it’s Team Drive,
or it was Hangouts Meet, or they’re a new
docs API, things like that, that are coming. If we open this, run
pilots in our test domain, give early access to developers
so that they are prepared for changes that they need
to make in their applications or in the way they work. And this actually gives us the
early access to their feedback. And we’ve been actually lucky
to have really great partnership with Google to funnel that
feedback back into the product teams so that this feedback
goes there early and often, and they actually know
what doesn’t work for us and what works for us. And the last thing
is around learning. So I think this is also
very critical, especially as technology is changing. There are new
emerging technologies coming, where our business and
our IT is actually ramping up. So we run hackathons. In fact, procurement just had a
Procure-a-thon two weeks back. This is really to say,
let’s bring our top two, three business problems here. Let’s get a team of developers,
UX, business analysts, all of us come together,
and let’s try and solve this in maybe one or two days. And this is a great
way to understand that you’re pushing the
limits of the APIs available, you’re pushing the
limits of how can we address this problem, can
we address this problem, are we too early,
should we then request more feature updates
from the product teams and come back to this later? This really gives us this cycle
of understanding and learning to be prepared to
do it in production. Part about learning is
definitely knowledge sharing. Again, we are huge or heavy
users of Google+ communities. I can tell you that a lot
of our Google+ users rely– in fact, I met Scott through
one of these communities. I just posted something on Apps
Script, and Scott responded. So there are lots
and lots of people that are connecting
with each other, sharing learnings, sharing even
their failures, like, hey, this didn’t work for me, has
anyone else tried this? And so these network communities
are ones where a lot of folks rely on them for learning
and understanding what’s going on in
the organization for specific subjects. And then centers of excellence– we have Roche experts
in specific domains. So for example G Suite app
development, API integration, we now have one on
conversational platforms. So what we do is we
look at the emerging technologies and the
business demand and say, hey, we need a set of
experts on these technologies that are ready to
jump into projects and to help the
business when they need. And so they are at hand to
advise and guide our business as need be. So we’re still
learning, obviously. This is not set in stone. We are learning and
adapting, and we are continuing to do this
to fulfill the need that– basically address what
our patients need next. And with that, I want to
hand it off to Sambit. Thank you. [APPLAUSE] SAMBIT SAMAL: All right. Thank you, Monica. What I’m going to
do is I’m going to talk about the future
of app development, some of the key trends that
at least we see and we hope that you see the same way. So a few things– so if you look at any
productivity platform, everybody provides the
standard mechanism, the same way of sending mail,
calendar, chats, writing docs, receipts, and things like that. But fundamentally, we see three
different market trends or tech trends which is going to
impact this productivity space in next five to 10 years. So what are those three? The first thing that we see
is we have, now, capability to understand the user context. What do I mean by that? So everybody has
a mobile device. So at any point in time,
systems know where you are. And depending on where
you are, the experience can be customized. So that is the context– an example of the context. The second thing that the
systems are good at today is capturing the usage pattern. So what I mean by that
is how you do your work, the systems nor how you
are doing that work. So things can be
customized as per that. For example, if you’re
always offlining something, the systems can know. And based on how and
when you are doing it, we can take actions on that. And the third thing
that happens is, when you go to a
new organization, the way to learn about that
particular organization is you go and ask people. The knowledge in
the organization is there in people’s heads. It’s sort of the
tribal knowledge. Wouldn’t it be better for you
to know in a systemic way? There are some people who
have tried this using sort of structured data analysis. But given the fact that
today we have this knowledge scattered across different
chat exchanges, different email exchanges, different docs, a
way to synthesize that knowledge will become important. And that’s what we’re
calling enterprise knowledge. Using these three,
you can potentially categorize the experiences
that are going to come into three broad categories. I’ve called this as
assistive experience, knowledge visibility,
and process automation. Let’s look at each of these. So this will give you an idea
of what I’m talking about. So if you drive any new
car today, what you can see is there is blind spot
detection in most of the cars. What is that doing? It’s helping you drive better. It’s providing an assistive
capability on driving. You can see the same pattern
emerging in software. So if you look at a chat, and
the moment some chat comes in, it suggests to you some
option based on the context. And why does that help you? Especially on a
mobile device, it helps you give a response
which is relevant. So that is assisting
you in responding. You can see that
if you have used Gmail auto-compose– the
same kind of mechanism. The opportunity here is bring
that to the developer platform so that you can use that
or the knowledge workers can use that to build
assistive experiences. The next thing I’m
going to talk about is this whole idea of
enterprise knowledge. Now, with the
structured data, you can go to your analytics
system and know, for example, who the best customer
is, and is he being spoken to by the best
customer service representative in your organization. Who is the expert in
a particular area? But with enterprise knowledge,
it will be possible for you to, without having any
structured analysis, know who is the expert
and who do we reach out to if we need some help, be
it usual things like 401(k) or anything of that sort. So think about it. When an average worker
spends 20% of the time– if you say that instead
of working for five days, you’re walking for
four days, that’s 20%. Or you can use that day
to do your 20% project. Whichever way you look at
it, that’ll help you do that. The third thing I’m going
to talk about is automation. This use case, all
of us go through. We want to have a discussion,
and we want to have a chat. And what happens
is, before we know, five or 10 email
chats gets exchanged before we set up a meeting. The system recognizes that. So let’s do some
time slots by looking at your calendar
and your ability. And you click– just one click–
and the meeting is set up. Not only that, based
on conversation, maybe it can set up
the agenda, figure out which are there the
documents that are important, and attaches that to
the Calendar invite. All those things will be
possible by automating processes and tasks. So that is the third
big trend you will see. Most of the productivity
improvement and the ensuing developer tools will
capture these three trends. Now to the final section. So what’s new in G Suite? I’m going to talk
about three things. So we are launching a
new Add-Ons platform. Add-Ons has been
there for a long time. But we are going to do
a new Add-Ons platform. What that will help you do is,
instead of driving an add-on for each of the G Suite
apps, you write it once, and it works across all
the different G Suite apps. It will have the user
context, and you can have that customized user context. It will make the
development easier, it will make the
management easier. It’s that uniform experience
across G Suite instead of per host app. The second thing that
we are announcing today is Alpha for data connectors. So what this means
is most of you, as you tried to move
your workload to cloud, you have this hybrid
scenario where you wanted the cloud to work
with your on-prem system. So with this Alpha,
what we are doing is we are integrating Sheets
with the on-prem relational Datastore you have on
your on-prem data center. This could be SQL Server,
this could Oracle, this could be MySQL. So you can have all that
data come in to Sheets and be used in
Sheets, and you can have that hybrid experience. The Third thing that I’m going to
talk about an announce today is what we’re calling G Suite
Marketplace Security Assessment Program. The GSM Marketplace, it
has more than 6,000 apps, as was talked about. It becomes very,
very challenging for people to know
which apps to rely on, which apps not rely on, and
it’s a big challenge for admin. We have partnered with some of
the industry-leading security analysts. And the publisher
of these apps, they can go and have their
apps security assessed. And if they pass the test,
we’ll send them a badge. Then that becomes easy
for the administrator to facilitate an
[INAUDIBLE] buying process. So those are the
three announcements. With that, I’ll
end this session. But your feedback
is super important. It’s a gift for us. So please provide the
feedback, and that will help us improve the system. [MUSIC PLAYING]