Taste of Premier   (MP4) - Channel 9 show

Taste of Premier (MP4) - Channel 9

Summary: Microsoft Services Premier Support gives you direct access to the world's top Microsoft technical experts, pairing you with a dedicated support team providing 24/7 hands-on assistance. "Taste of Premier" is dedicated to helping you maximize your company's IT infrastructure and development investment by showcasing the latest Microsoft products and services and demonstrating how these technologies can positively impact your bottom line. Click here to learn more about Microsoft Service Premier Support

Podcasts:

 Credential Theft: How the Attack Landscape has changed and What You can do about it | File Type: video/mp4 | Duration: 2121

The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using constantly evolving and advanced forms of credential theft attacks. Join Lex Thomas, Chris Ayres and Jonathon Shectman to the show as they discuss how the attack landscape has changed as well as what you can do about it. [1:41] How has the attack landscape changed recently?[10:28] How can organizations defend against the rising number of cyber attacks?[18:30] How can Microsoft Premier Support help specifically?[19:56] DEMO – Using PowerShell to enforce Credential Theft MitigationsLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World | File Type: video/mp4 | Duration: 1237

Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity. Join Lex Thomas as he welcomes Jeremy Rule to the show, as they give us a high level overview of this new frontier many refer to as the “Fourth User Interface” and learn how you can be a part of it. [1:15] What's the fourth user interface? How does VR, AR and MR fit into this equation?[2:20] How does VR affect the various industries you're working with?[10:20] What role does Microsoft play with this?[14:29] What's the biggest roadblock you see with VR?“How to Build Your Own Holodeck at Home” --- click here! Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 How to Navigate through the new Windows Update Model | File Type: video/mp4 | Duration: 2435

Windows as a service provides a new way to think about building, deploying, and servicing the Windows operating system. The Windows as a service model is focused on continually providing new capabilities and updates while maintaining a high level of hardware and software compatibility. Join Lex Thomas and Matt Camussi as they take us through a step-by-step walk through of the new Windows update model. [1:40] Why did Microsoft decide to change the update model?[7:14] What are the different service models available?[12:12] Whiteboard session: Windows as a Service Overview for Windows 10__________________________ __________________________ Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Building Microservices on Azure: How to Get Started with the Application Revolution Powered by the Cloud | File Type: video/mp4 | Duration: 3010

Software Methodologies, process, patterns, platform, and devices are constantly evolving. Fast, agile, inexpensive, and massively scalable infrastructure, is improving operational efficiency and enabling faster-time-to-value across industries. However, many companies are finding that making their applications highly available, scalable and agile is still challenging. Join Lex Thomas and Razi Rais as they cover the Microservices landscape - from what it is to how your organization and customers can benefit from it. They’ll discuss how Azure Container Service and Azure Service Fabric are two major services that provide easy options to deploy large scale microservices on Azure as well as show us how to build a simple fully functional microservice in a cross-platform manner. [0:40] What is a Microservice and how can organizations benefit from them?[5:58] What are the basic principles of Microservices?[10:15] How are these principles implemented?[11:28] What hosting options are available in Azure for Microservices?[17:17] Let's chat about the Azure Service Fabric and Azure Container Service --- how does this fit into microservices?[27:45] DEMO: How to get started on Microservices on AzureWant to learn more about Microservices on Azure? Click here Join our workshop today! If you're interested in learning more about the products or solutions discussed in this episode, click on any of the below links for free, in-depth information: Websites & Blogs: Microsoft Services Premier Support__________________________ Send your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

 First Look Into Blockchain: How to Develop, Test, and Deploy Blockchain Applications | File Type: video/mp4 | Duration: 2999

Blockchain is an emerging way for businesses, industries, and public organizations to almost instantaneously make and verify transactions — streamlining business processes, saving money, and reducing the potential for fraud. At its core, a blockchain is a data structure that’s used to create a digital transaction ledger that, instead of resting with a single provider, is shared among a distributed network of computers. Join Lex Thomas and Razi Rais as they break down some blockchain concepts and then show us how to develop a simple hello world style blockchain solution and deploy it using Azure Blockchain as a Service (BaaS). [0:57] What is Blockchain?[2:14] How is this different than a standard distributed database?[5:16] DEMO: Introduction and Overview of Blockchain in a Dev/Test lab on Azure[30:40] DEMO: Blockchain and .NETLearn more about Blockchain as a ServiceIf you're interested in learning more about the products or solutions discussed in this episode, click on any of the below links for free, in-depth information: Websites & Blogs: Microsoft Services Premier SupportProject BletchleyDevTest Labs (Quick Deploy Blockchain)Azure Marketplace Blockchain OfferingsAzure Quickstart TemplatesCreate your own Custom Private/Consortium Blockchain Network__________________________ Send your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

 Enterprise Threat Detection Service: An In-Depth Overview of Microsoft's Latest Cybersecurity Solution | File Type: video/mp4 | Duration: 976

Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system. Join Lex Thomas as he welcomes Andrei Saygo to the show as they give us a quick overview of Microsoft’s latest cybersecurity solution. [0:49] What is Enterprise Threat Detection Service?[3:02] Who can benefit from this type of service?[3:44] Is this is a standalone service or can it be added on[4:10] How does this work? [5:30] What can customers expect from ETD?· Learn more about Microsoft Secure · Explore Microsoft Services’ Cybersecurity Solutions Send your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Windows Server 2016: (Part 1) Getting Started with Shielded VMs | File Type: video/mp4 | Duration: 1389

One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new features and functions found in “Shielded VMs” for Windows Server 2016. [1:19] What is a "Shielded VM"?[4:17] What do I need to get started with Shielded VMs?[8:20] What are the benefits to Shielded VMs?[10:00] How does this work?[16:34] What are the different modes of shielding?Learn more about Shielded VMs here Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Added Security for Your Data and Applications: A Guided Tour of Azure Multi-Factor Authentication | File Type: video/mp4 | Duration: 2484

Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification. Join Lex Thomas as he welcomes Chris Ayres to the show, as they give us an in-depth overview of what Azure MFA is, how it works, how it benefits your organization as well as how to set it up. [1:54] What is Azure Multi-Factor Authentication (MFA)?[5:26] Overview Azure MFA[9:40] How does Azure MFA work on Mobile Devices?[12:05] Why would organizations want to implement Azure MFA?[20:01] How does it all work?What are the different types of authentication methods?[28:25] What versions of Azure MFA are available?[34:07] DEMO: How to Get Started with Azure MFA for a cloud enabled user[40:04] Can Microsoft help customers set this up?Learn more @ www.microsoft.com/azure Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment fr

 How to Simplify Device & Apps Management using Microsoft Intune | File Type: video/mp4 | Duration: 2857

Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s device and app management practice as well as show how easy it is for IT to provide employees with access to corporate applications, data and resources from virtually anywhere while helping keep their corporate information secure. [1:03] What does Microsoft Intune do exactly?[1:57] What platforms or devices does Intune support?[6:58] How are policies administered across devices?[12:59] What tools are available to help manage user identity, apps, devices and data?[18:20] How does Data Protection work within Microsoft's Enterprise, Mobility & Security suite?[21:20] How do I integrate Intune into my organization's platform? Does it only work in the cloud? And can it play with System Center?[27:30] How does Mobile Application Management work?[30:09] DEMO: How to configure User Policies in Intune so that an employee can access Corporate Info on their personal iPad device.Learn more @ www.Microsoft.com/Intune Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecur

 Getting Started with Windows Containers | File Type: video/mp4 | Duration: 2099

Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization. [0:52] What are Containers and why would I want to use them?[5:20] DEMO: Running a Container with Windows Nano Server[10:58] What is Docker Compose?[18:52] DEMO: Deploying an Azure Container Service cluster[31:30] Where can people go for more information on Containers? Learn more @ “Getting started with Windows Containers on Windows 10” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 "Great Eight" Windows 10 Tips, Features and Tools | File Type: video/mp4 | Duration: 1044

Join Lex Thomas as he showcases his favorite Windows 10 and Windows 10 Anniversary Edition features. [0:56] Command Cut and Paste[2:30] Find my Device[3:50] Cleaning up Preview OS Installs with Disk Cleanup[5:13] Storage Management[6:45] OneDrive Fetch[8:10] Screen recorder[10:23] Memory Diagnostic Tool[11:42] Capture Network Traffic from a Command Prompt[16:20] Bonus! Snap Four!__________________________ __________________________ Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Windows Server 2016: Credential Theft Mitigation Features | File Type: video/mp4 | Duration: 1082

Lex Thomas welcomes back Brantley Whitley to the show as they discuss the new Credential Theft Mitigation Features found in Windows Server 2016. Learn how you can use the new Active Directory Domain Services features to improve your organization’s ability to secure Active Directory environments. [2:20] Let's talk about the new SmartCard authentication features[7:15] What about NTLM authentication and how does this affect Credential Guard?Looking for more info? Check out this article: “What’s New in Active Directory Domain Services” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Microsoft Apps for iOS and Android Users | File Type: video/mp4 | Duration: 1653

Microsoft apps on platforms other than Windows? Yes, folks its true --- you can run Office, Outlook, Cortana and countless other Microsoft applications on the iOS and Android platform. Check out our favorite apps from Microsoft found in the Apple App Store. Get FREE Office apps on your mobile device hereLearn how to develop Cross-Platform Mobile apps in Visual Studio Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 How to Leverage the Azure Security Center & Microsoft Operations Management Suite for an Incident Response | File Type: video/mp4 | Duration: 1576

Join Lex Thomas and Yuri Diogenes as they discuss how you can leverage both the Azure Security Center and Microsoft Operations Management Suite (OMS) to better manage cybersecurity threats in both the cloud and hybrid cloud environments. [2:10] Why are some organization still avoiding a move to the cloud? Are security concerns a major reason for this hesitation?[3:45] What happens when there's a security incident in the cloud?[5:45] So how can the Azure Security Center be utilized for an incident response?[8:00] DEMO: Azure Security Center[15:53] DEMO: Operations Management Suite (OMS) Security Dashboard[23:24] Where can our viewers go for more information? Looking for more info? Check out the “Azure Security Center Planning and Operations Guide” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityAzure Security CenterOperations Management SuiteAzure Security InformationGet the book! Microsoft Azure Security InfrastructureVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 AppLocker: Another Layer in the Defense in Depth Against Malware | File Type: video/mp4 | Duration: 2085

Ransomware has been getting a lot of attention. There have been several high profile attacks in the press over the past few months and Understanding the Risk is important. If people don't understand the risk, changes won't be made. To protect your enterprise, there are many steps for a Defense in Depth strategy to be taken. One of the recommended steps is to run a Whitelisting tool. Microsoft provides a built-in tool named AppLocker. Join Lex Thomas and Paul Bergson for an in-depth walk-through of AppLocker and learn how you can defend your systems from malware. Click here to learn more! Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

Comments

Login or signup comment.