Taste of Premier (MP4) - Channel 9
Summary: Microsoft Services Premier Support gives you direct access to the world's top Microsoft technical experts, pairing you with a dedicated support team providing 24/7 hands-on assistance. "Taste of Premier" is dedicated to helping you maximize your company's IT infrastructure and development investment by showcasing the latest Microsoft products and services and demonstrating how these technologies can positively impact your bottom line. Click here to learn more about Microsoft Service Premier Support
- Visit Website
- RSS
- Artist: Microsoft
Podcasts:
Lex Thomas and Stephen Mathews are back for Part 2 in their PowerShell Basics series and in this episode they show us some of the most command cmdlets used as well as some real world examples of what to use them with. [1:20] DEMO: Common Cmdlets and what to do with themNeed more info? Check out The Scripting Guys! Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Lex Thomas welcomes Stephen Mathews to the show as they kick off a new PowerShell Basics series. Tune in for Part 1 where Stephen shows us how to get started with PowerShell from basic cmdlts to using and finding commands and why you should upgrade to the latest version of PowerShell. [1:51] DEMO: PowerShell Basics – Getting StartedNeed more info? Check out The Scripting Guys! Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Microsoft Message Analyzer is a powerful tool used for capturing, displaying, and analyzing protocol messaging traffic, events, and other system or application messages in network troubleshooting and other diagnostic scenarios. Join Lex Thomas and Paul Long as they walk us through the new Message Analyzer interface and show us how decryption works. [1:15] What is Message Analyzer and how does it compare to similar tools in the market?[5:15] Is there a performance benefit to using Message Analyzer vs. other tools?[7:42] DEMO: The New Message Analyzer interface and how decryption worksNeed more info? Check out the Message Analyzer Team Blog Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportDownload Message AnalyzerSupport ForumsOperating Guide
Lex Thomas welcomes back Jessica Payne to the show as they discuss the proper way to respond to a cyber security attack in your datacenter. *Hint --- running around, waving your arms and screaming at the top of your lungs will not help. [1:15] What should you do if you find out your datacenter has been compromised?[3:45] What is the Incident response team at Microsoft and how can they help?[11:02] How should our audience be better prepared for cyber security attacks?Need more info? Check out Microsoft.com/Security Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
In this special Taste of Premier episode we welcome Microsoft CEO Satya Nadella and GM of Microsoft’s Cloud Platform Julia White to discuss Microsoft’s new approach on cyber and operational security in our mobile-first, cloud-first world. [1:48] Microsoft's approach to cybersecurity – Our mission[4:50] Cybersecurity in 2015 and beyond – What does the landscape look like and how can we overcome these challenges?[15:08] Microsoft's new security posture – Platform. Intelligence. Partners.[18:40] DEMO: Microsoft new cybersecurity platform – addressing cybersecurity theftsPasswords and Windows HelloSaaS applications and Azure Active DirectoryProtection from Malware with Office 365Downloading apps from the web and Windows 10 Device GuardPass-the-Hash (PtH) and Windows 10 Credential GuardProtection from Data loss with Windows Intune and Windows 10Monitor and Detect Identity Theft with Microsoft 's Advanced Threat AnalyticsSecuring your entire Infrastructure (on-premise and in the cloud) with Azure Security Center [38:41] Our Security Platform – Windows 10, Microsoft Azure and Office 365[43:40] Microsoft's New Cyber Defense Operations Center[47:01] Microsoft: Empowering every person & every organization on the planet to achieve more.Need more info? Check out Microsoft.com/Security Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, lan
Success! Lex got his hands on the Surface Book and we’re going to go through a quick overview and unboxing of this awesome device! Check out Microsoft’s new Surface Book here! Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
What is OneDrive for Business and how is it different than OneDrive? Lex Thomas welcomes Brian Gregor to the show to answer that very question as they showcase for us the many Enterprise IT features on OneDrive for Business that make cloud storage secure and easy for business and IT professionals [0:50] What is OneDrive for Business and why should Enterprise Businesses use it? [1:41] DEMO: OneDrive for Business[8:40] DEMO: How to share, sync and grant permissions to specific folders and files in OneDrive for BusinessNeed more info? Check out OneDrive for Business Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Happy Halloween boys and girls! What’s spookier than ghouls and goblins for your PC? Well, that would be Ransomware and various other forms of malware of course! Lex Thomas welcomes back Jessica Payne to the show as they discuss how to protect and fix instances of devilish instances of malware in your environment. [5:20] What is Ransomware and why is it so popular with bad guys?[10:45] How do we prevent ransomware from getting on our machines?[24:52] How do we mitigate the problem if we get it?Need more info? Check out Microsoft.com/Security Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAM
Lex Thomas welcomes back Scott Ellison to the show as they discuss some of the common Enterprise deployment scenarios and tools you can use to deploy Windows 10 in your environment. Learn about which deployment scenario is right for you and which tools - such as System Center Configuration Manager and the Microsoft Deployment Toolkit – can help with your deployment process. Want to learn more? Visit Microsoft.com/Services Send your comments or questions to the "Taste of Premier" Podcast show! Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory Environment
Lex Thomas welcomes back Brantley Whitley to the show as they discuss some of the Top New Enterprise features in Windows 10. If you’re looking for more reasons to upgrade to this awesome OS, tune into this episode and learn more! Want to learn more? Visit Microsoft.com/Services Send your comments or questions to the "Taste of Premier" Podcast show! Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory Environment