Taste of Premier   (MP4) - Channel 9 show

Taste of Premier (MP4) - Channel 9

Summary: Microsoft Services Premier Support gives you direct access to the world's top Microsoft technical experts, pairing you with a dedicated support team providing 24/7 hands-on assistance. "Taste of Premier" is dedicated to helping you maximize your company's IT infrastructure and development investment by showcasing the latest Microsoft products and services and demonstrating how these technologies can positively impact your bottom line. Click here to learn more about Microsoft Service Premier Support

Podcasts:

 PowerShell Basics: (Part 2) Real Word Examples for Our Most Common Cmdlets | File Type: video/mp4 | Duration: 2231

Lex Thomas and Stephen Mathews are back for Part 2 in their PowerShell Basics series and in this episode they show us some of the most command cmdlets used as well as some real world examples of what to use them with. [1:20] DEMO: Common Cmdlets and what to do with themNeed more info? Check out The Scripting Guys! Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 PowerShell Basics: (Part 1) Getting Started with PowerShell | File Type: video/mp4 | Duration: 2268

Lex Thomas welcomes Stephen Mathews to the show as they kick off a new PowerShell Basics series. Tune in for Part 1 where Stephen shows us how to get started with PowerShell from basic cmdlts to using and finding commands and why you should upgrade to the latest version of PowerShell. [1:51] DEMO: PowerShell Basics – Getting StartedNeed more info? Check out The Scripting Guys! Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Message Analyzer: How to Diagnose Network Traces, Log files, and Windows Event Tracing (ETW) Components | File Type: video/mp4 | Duration: 1991

Microsoft Message Analyzer is a powerful tool used for capturing, displaying, and analyzing protocol messaging traffic, events, and other system or application messages in network troubleshooting and other diagnostic scenarios. Join Lex Thomas and Paul Long as they walk us through the new Message Analyzer interface and show us how decryption works. [1:15] What is Message Analyzer and how does it compare to similar tools in the market?[5:15] Is there a performance benefit to using Message Analyzer vs. other tools?[7:42] DEMO: The New Message Analyzer interface and how decryption worksNeed more info? Check out the Message Analyzer Team Blog Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportDownload Message AnalyzerSupport ForumsOperating Guide

 Incident Response 101: What to do if your Security has been Compromised | File Type: video/mp4 | Duration: 1680

Lex Thomas welcomes back Jessica Payne to the show as they discuss the proper way to respond to a cyber security attack in your datacenter. *Hint --- running around, waving your arms and screaming at the top of your lungs will not help. [1:15] What should you do if you find out your datacenter has been compromised?[3:45] What is the Incident response team at Microsoft and how can they help?[11:02] How should our audience be better prepared for cyber security attacks?Need more info? Check out Microsoft.com/Security Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Satya Nadella on Cybersecurity and Microsoft’s new Cyber Defense Operations Center | File Type: video/mp4 | Duration: 3000

In this special Taste of Premier episode we welcome Microsoft CEO Satya Nadella and GM of Microsoft’s Cloud Platform Julia White to discuss Microsoft’s new approach on cyber and operational security in our mobile-first, cloud-first world. [1:48] Microsoft's approach to cybersecurity – Our mission[4:50] Cybersecurity in 2015 and beyond – What does the landscape look like and how can we overcome these challenges?[15:08] Microsoft's new security posture – Platform. Intelligence. Partners.[18:40] DEMO: Microsoft new cybersecurity platform – addressing cybersecurity theftsPasswords and Windows HelloSaaS applications and Azure Active DirectoryProtection from Malware with Office 365Downloading apps from the web and Windows 10 Device GuardPass-the-Hash (PtH) and Windows 10 Credential GuardProtection from Data loss with Windows Intune and Windows 10Monitor and Detect Identity Theft with Microsoft 's Advanced Threat AnalyticsSecuring your entire Infrastructure (on-premise and in the cloud) with Azure Security Center [38:41] Our Security Platform – Windows 10, Microsoft Azure and Office 365[43:40] Microsoft's New Cyber Defense Operations Center[47:01] Microsoft: Empowering every person & every organization on the planet to achieve more.Need more info? Check out Microsoft.com/Security Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, lan

 Surface Book Unboxing | File Type: video/mp4 | Duration: 519

Success! Lex got his hands on the Surface Book and we’re going to go through a quick overview and unboxing of this awesome device! Check out Microsoft’s new Surface Book here! Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 OneDrive for Business: Access files anywhere from any device | File Type: video/mp4 | Duration: 1603

What is OneDrive for Business and how is it different than OneDrive? Lex Thomas welcomes Brian Gregor to the show to answer that very question as they showcase for us the many Enterprise IT features on OneDrive for Business that make cloud storage secure and easy for business and IT professionals [0:50] What is OneDrive for Business and why should Enterprise Businesses use it? [1:41] DEMO: OneDrive for Business[8:40] DEMO: How to share, sync and grant permissions to specific folders and files in OneDrive for BusinessNeed more info? Check out OneDrive for Business Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Ransomware 101: How to Protect and Mitigate your environment from Malware | File Type: video/mp4 | Duration: 2400

Happy Halloween boys and girls! What’s spookier than ghouls and goblins for your PC? Well, that would be Ransomware and various other forms of malware of course! Lex Thomas welcomes back Jessica Payne to the show as they discuss how to protect and fix instances of devilish instances of malware in your environment. [5:20] What is Ransomware and why is it so popular with bad guys?[10:45] How do we prevent ransomware from getting on our machines?[24:52] How do we mitigate the problem if we get it?Need more info? Check out Microsoft.com/Security Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAM

 Enterprise Deployment Scenarios and Tools for Windows 10 | File Type: video/mp4 | Duration: 1940

Lex Thomas welcomes back Scott Ellison to the show as they discuss some of the common Enterprise deployment scenarios and tools you can use to deploy Windows 10 in your environment. Learn about which deployment scenario is right for you and which tools - such as System Center Configuration Manager and the Microsoft Deployment Toolkit – can help with your deployment process. Want to learn more? Visit Microsoft.com/Services Send your comments or questions to the "Taste of Premier" Podcast show! Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory Environment

 Taste of Premier: New Enterprise Features in Windows 10 | File Type: video/mp4 | Duration: 1138

Lex Thomas welcomes back Brantley Whitley to the show as they discuss some of the Top New Enterprise features in Windows 10. If you’re looking for more reasons to upgrade to this awesome OS, tune into this episode and learn more! Want to learn more? Visit Microsoft.com/Services Send your comments or questions to the "Taste of Premier" Podcast show! Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory Environment

Comments

Login or signup comment.