It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, much more! [01:30] Tell us about the Harman Kardon Invoke?[03:10] Promo deals for the Surface Laptop and Harmon Kardon[04:16] Additional deals for laptop and mixed reality devices[05:40] Why do we call our headsets mixed reality?[12:47] Let's talk about the new Xbox One X and the Surface Book 2[19:09] What other deals can you tell us about?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Nov 23, 2017
23 min
Video
Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today. Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets. [02:58] What does a Cybersecurity architecture guide look like?[06:31] What does the Cybersecurity landscape look like?[12:57] What does the evolution of IT and Microsoft Security look like?[17:20] What does a platform security approach look like?[21:38] Can you describe the benefits of an Integrated Security Experience?[25:29] How do you measure security success?Learn More about this topic by visiting these sites: Microsoft Virtual Academy: Cybersecurity Reference ArchitectureMicrosoft Virtual Academy: Cybersecurity Reference StrategiesLearn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure you
Nov 21, 2017
33 min
Video
Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections. Join Lex Thomas and Ryan Berry as they give us an in-depth overview of ExpressRoute and learn how it can benefit your day-to-day operations. [02:34] What are some different ways you can connect into Azure?[09:25] What are some of the speeds that are available with ExpressRoute?[11:45] What are some of the different ways you can connect using ExpressRoute?[14:26] How can customers take advantage of peering within Azure ExpressRoute?[19:31] Can VPN connections and ExpressRoute coexist?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual NetworkYour Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure
Nov 7, 2017
25 min
Video
System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and Office 365 Business. Join Lex Thomas and Jamin Almond for this all demo session on how to deploy, manage and update Office 365 with System Center Configuration Manager. [02:11] DEMO – Managing Office 365 with System Center Configuration Manager[06:50] DEMO – How to deploy Office 365 with SCCM[15:21] DEMO – How to create and manage automatic updates for Office 365 with SCCM [19:40] Is there a specific version of SCCM needed to do everything you demoed for us today?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportManage Office 365 ProPlus with System Center Configuration Manager
Oct 18, 2017
20 min
Video
Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats. Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data. [06:40] What are some common ransomware tactics we should be aware of?[17:49] How can Microsoft help against these attacks?[22:20] DEMO: How AppLocker can help against Malware attacks [34:46] How can Microsoft help against email attacks?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Oct 4, 2017
48 min
Video
With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter. Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and how-to tips and tricks on how to create and manage your Azure Virtual Machines. [00:30] Can you give us a quick overview of Virtual Machine Services within Azure?[04:10] What are some of the different ways you can deploy Azure Virtual Machines?[11:25] What are the different ways to create an Azure Virtual Machine?[16:29] What are Managed Disks and how do they relate to Azure Virtual Machines?[17:02] DEMO: Creating a new Azure Virtual Machine[37:52] How do you back up your newly created Virtual Machines?[43:25] DEMO: Back up and Site Recovery in Azure[1:00:25] Most importantly, can I use my Zune to manage my Azure subscription?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network
Sep 15, 2017
1 hr 3 min
Video
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network. Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure. [00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Aug 31, 2017
50 min
Video
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network. Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series. [04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Aug 10, 2017
24 min
Video
From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone. Join Lex Thomas as he welcomes Oscar Lara to the show as they discuss how businesses, educators, students, and everyone else in between can benefit from a trip to your local Microsoft Store. [03:37] Can you describe the layout of the typical Microsoft Store? What is the "Theatre" and what events go on there?[08:23] You mentioned training events earlier. Can you explain this a little more for us?[18:25] The Microsoft Store sells Samsung phones. Really?!? What's the reasoning behind this?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Aug 2, 2017
22 min
Video
The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved with this amazing program for your organization. [00:45] What is the Immerse program?[03:08] What does an Immerse engagement typically entail? [04:50] Who is this program for? What kind of customers can take advantage of this program?[05:53] What can't this program do?[07:09] What technologies does the Immerse program cover?[11:27] How can an organization get started with the Immerse program?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Jul 17, 2017
14 min
Video
Load more