Taste of Premier   (MP4) - Channel 9 show

Taste of Premier (MP4) - Channel 9

Summary: Microsoft Services Premier Support gives you direct access to the world's top Microsoft technical experts, pairing you with a dedicated support team providing 24/7 hands-on assistance. "Taste of Premier" is dedicated to helping you maximize your company's IT infrastructure and development investment by showcasing the latest Microsoft products and services and demonstrating how these technologies can positively impact your bottom line. Click here to learn more about Microsoft Service Premier Support

Podcasts:

 Getting Started with Windows Containers | File Type: video/mp4 | Duration: 2099

Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization. [0:52] What are Containers and why would I want to use them?[5:20] DEMO: Running a Container with Windows Nano Server[10:58] What is Docker Compose?[18:52] DEMO: Deploying an Azure Container Service cluster[31:30] Where can people go for more information on Containers? Learn more @ “Getting started with Windows Containers on Windows 10” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 "Great Eight" Windows 10 Tips, Features and Tools | File Type: video/mp4 | Duration: 1044

Join Lex Thomas as he showcases his favorite Windows 10 and Windows 10 Anniversary Edition features. [0:56] Command Cut and Paste[2:30] Find my Device[3:50] Cleaning up Preview OS Installs with Disk Cleanup[5:13] Storage Management[6:45] OneDrive Fetch[8:10] Screen recorder[10:23] Memory Diagnostic Tool[11:42] Capture Network Traffic from a Command Prompt[16:20] Bonus! Snap Four!__________________________ __________________________ Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Windows Server 2016: Credential Theft Mitigation Features | File Type: video/mp4 | Duration: 1082

Lex Thomas welcomes back Brantley Whitley to the show as they discuss the new Credential Theft Mitigation Features found in Windows Server 2016. Learn how you can use the new Active Directory Domain Services features to improve your organization’s ability to secure Active Directory environments. [2:20] Let's talk about the new SmartCard authentication features[7:15] What about NTLM authentication and how does this affect Credential Guard?Looking for more info? Check out this article: “What’s New in Active Directory Domain Services” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Microsoft Apps for iOS and Android Users | File Type: video/mp4 | Duration: 1653

Microsoft apps on platforms other than Windows? Yes, folks its true --- you can run Office, Outlook, Cortana and countless other Microsoft applications on the iOS and Android platform. Check out our favorite apps from Microsoft found in the Apple App Store. Get FREE Office apps on your mobile device hereLearn how to develop Cross-Platform Mobile apps in Visual Studio Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 How to Leverage the Azure Security Center & Microsoft Operations Management Suite for an Incident Response | File Type: video/mp4 | Duration: 1576

Join Lex Thomas and Yuri Diogenes as they discuss how you can leverage both the Azure Security Center and Microsoft Operations Management Suite (OMS) to better manage cybersecurity threats in both the cloud and hybrid cloud environments. [2:10] Why are some organization still avoiding a move to the cloud? Are security concerns a major reason for this hesitation?[3:45] What happens when there's a security incident in the cloud?[5:45] So how can the Azure Security Center be utilized for an incident response?[8:00] DEMO: Azure Security Center[15:53] DEMO: Operations Management Suite (OMS) Security Dashboard[23:24] Where can our viewers go for more information? Looking for more info? Check out the “Azure Security Center Planning and Operations Guide” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityAzure Security CenterOperations Management SuiteAzure Security InformationGet the book! Microsoft Azure Security InfrastructureVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 AppLocker: Another Layer in the Defense in Depth Against Malware | File Type: video/mp4 | Duration: 2085

Ransomware has been getting a lot of attention. There have been several high profile attacks in the press over the past few months and Understanding the Risk is important. If people don't understand the risk, changes won't be made. To protect your enterprise, there are many steps for a Defense in Depth strategy to be taken. One of the recommended steps is to run a Whitelisting tool. Microsoft provides a built-in tool named AppLocker. Join Lex Thomas and Paul Bergson for an in-depth walk-through of AppLocker and learn how you can defend your systems from malware. Click here to learn more! Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 What's New in PowerShell v5 | File Type: video/mp4 | Duration: 1175

Would you like to learn about the latest and greatest features that Microsoft has built into PowerShell Version 5? Join Lex Thomas and Ashely McGlone as they discuss the new features in PowerShell including changes in security, scripting, debugging, and administration role management, along with the PowerShell Gallery, ScriptAnalyzer, DSC and much, much more! Want to learn more about PowerShell Version5? Check out this FREE training course found on Microsoft Virtual Academy Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Windows Performance Toolkit: How to Analyze and Remedy Performance Issues in Your Systems | File Type: video/mp4 | Duration: 2726

Windows Performance Tools are designed for analysis of a wide range of performance problems including application start times, boot issues, deferred procedure calls and interrupt activity (DPCs and ISRs), system responsiveness issues, application resource usage, and interrupt storms. Join Lex Thomas as he welcomes Yong Rhee to show as they discuss some of the various tests you can run on your systems. Have a question? Check out the “Ask Premier Field Engineering Platforms” blog Windows Performance Toolkit Technical Reference Guide Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 The Trusted Cloud: Introduction to Security in a Cloud-Enabled World | File Type: video/mp4 | Duration: 2471

To realize the benefits of the cloud, you must be willing to entrust your cloud provider with one of your most valuable assets — your data. If you invest in a cloud service, you must be able to trust that your customer data is safe, that the privacy of your data is protected, and that you retain ownership of and control over your data. Join Lex Thomas, John Rodriguez and Dmitii Lezine as they have a candid discussion around cloud security and how it can impact your daily operation and overall IT organization. [1:23] How should IT organizations approach cloud security coming from a mostly On-Premise datacenter environment?[6:01] From a customer perspective who's responsible for cloud security? Is it the cloud provider's sole responsibility? [13:49] What additional things does Cloud Security bring to smaller organizations?[15:48] What are some actionable items customers need to do with regards to cloud security?[35:26] Where can people go for Best Practices or new information on Cloud Security?Need more info? Check out http://aka.ms/SecureCustomer or the Azure Security Center Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with

 Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and Tasks | File Type: video/mp4 | Duration: 2036

Privileged Access Workstations (PAWs) provide a dedicated operating system for sensitive tasks that is protected from Internet attacks and threat vectors. Separating these sensitive tasks and accounts from the daily use workstations and devices provides very strong protection from phishing attacks, application and OS vulnerabilities, various impersonation attacks, and credential theft attacks such as keystroke logging, Pass-the-Hash, and Pass-The-Ticket. Join Lex Thomas and John Rodriguez as they provide a detailed overview as well as deployment scenario considerations you should take with PAWs. [1:10] What’s a Privileged Access Workstation and how can it benefit my organization?[17:30] How can users implement this in their org?[27:23] Can you describe some PAW Deployment models?Need more info? Check out http://aka.ms/CyberPAW Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security Progr

 So You Want to Work at Microsoft... | File Type: video/mp4 | Duration: 1321

If you’ve ever wondered how you can work at Microsoft – the greatest company on the planet (no bias here whatsoever) then this the episode for you! If you’re a job hunter or a college student looking for a summer internship, check out these great tips on the application and hiring process. Need more info? Check out Microsoft.com/Careers Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware | File Type: video/mp4 | Duration: 1670

The sun is out (hopefully where you are!) which means it must be time for some spring cleaning (unless you live in the southern hemisphere where’s its actually fall…but I’m sure you get where I’m going here) and there’s no better way for us techies is to do some spring cleaning than digital spring cleaning! Join Lex Thomas as he welcomes back Jessica Payne to the show as they discuss the latest cyber attack techniques and what you can do to protect your digital world. [0:50] What’s the latest trends on cyber attacks and ransomware?[7:52] What is Samas and how is this different than other ransomware attacks?[10:50] How can our audience be better prepared for cyber security attacks?[22:54] Give us your Top 5 tips for protecting yourself against malware.Need more info? Check out Microsoft.com/Security Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityMMPC Blog post on Samas (the targeted ransomware)MMPC Blog post on Locky, which includes how to disable macrosPass the Hash and Stopping Credential Theft WhitepapersPrivileged Admin Workstations guidanceVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicro

 Microsoft’s CTO of Services, Norm Judah Describes How the Future Truly is NOW! | File Type: video/mp4 | Duration: 2496

Industry transformation and disruption are just some of the intriguing topics we cover in this special edition Taste of Premier episode. Join Lex Thomas as he welcomes back Microsoft CTO of Services Norm Judah to the show as he shares stories of how HoloLens will be an amazing game changer as well as how business and consumer experiences are going to rapidly change the way people think about interacting and productivity. Don’t miss this spirited edition which describes what the possible looks like-today! [2:00] Is the Future already here? What's happening now?[2:31] Let's talk about the Developer Kit for HoloLens? What can we do now with HoloLens?[7:15] Will there ever be a time where I can get into a Chevy and have it turn into a Ferrari? :D [8:10] How else is technology transforming our lives today? Let's talk about the automotive industry[11:30] How do these advancements affect other areas --- like privacy and security?[14:24] Let's talk about intelligent agents and machine learning. What are the implications here?[26:02] How about the rise of IoT and the future of connected consumer devices like Wi-Fi coffee makers?[39:18] So how do you see this affecting businesses and business models? Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs:

 How to Get the Most Out of Azure ExpressRoute in Your IT Environment | File Type: video/mp4 | Duration: 2878

Azure ExpressRoute lets you create private connections between Azure datacenters and infrastructure on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet and they offer more reliability, faster speeds, lower latencies, and higher security than typical Internet connections. Join Lex Thomas and Ryan Berry as they continue their ongoing Microsoft Azure series as they discuss various Enterprise scenarios and how you can get the most out of Azure ExpressRoute in your environment Learn more about Premier Support for Microsoft Azure Send your comments or questions to the "Taste of Premier" Podcast show! Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Taste of Premier: How Windows Azure can Benefit Your BusinessTaste of Premier: Building More Secure Applications with the Help of the Microsoft Security Development Lifecycle

 PowerShell Basics: (Part 3) Real Word Script Examples | File Type: video/mp4 | Duration: 1330

Lex Thomas and Stephen Mathews are back for Part 3 in their PowerShell Basics series and in this episode they show us an example of a real world script that was created to help a customer find and check the value of a property and then go through five versions of the script to show you various results. [1:40] DEMO: Real World Script ExamplesNeed more info? Check out The Scripting Guys! Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

Comments

Login or signup comment.