Speaker: Lex Thomas

Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter. Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and […]

Read More
Enterprise Threat Detection Service: An In-Depth Overview of Microsoft’s Latest Cybersecurity Solution

Enterprise Threat Detection Service: An In-Depth Overview of Microsoft’s Latest Cybersecurity Solution

Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system.  Join Lex Thomas as he welcomes Andrei Saygo to the show as they give us a quick overview of Microsoft’s latest cybersecurity […]

Read More
Windows Server 2016: (Part 1) Getting Started with Shielded VMs

Windows Server 2016: (Part 1) Getting Started with Shielded VMs

One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the  new features and functions found in “Shielded VMs” for Windows Server 2016. [1:19] What is a […]

Read More
Added Security for Your Data and Applications: A Guided Tour of Azure Multi-Factor Authentication

Added Security for Your Data and Applications: A Guided Tour of Azure Multi-Factor Authentication

Azure Multi-Factor Authentication (MFA) is Microsoft’s two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification. Join Lex Thomas as he welcomes Chris Ayres to […]

Read More
How to Simplify Device & Apps Management using Microsoft Intune

How to Simplify Device & Apps Management using Microsoft Intune

Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s device and app management practice as well as show how easy it is for IT […]

Read More
Getting Started with Windows Containers

Getting Started with Windows Containers

Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization. [0:52] What are Containers and why would I want to use them? [5:20] DEMO: Running a Container with Windows Nano […]

Read More
“Great Eight” Windows 10 Tips, Features and Tools

“Great Eight” Windows 10 Tips, Features and Tools

Join Lex Thomas as he showcases his favorite Windows 10 and Windows 10 Anniversary Edition features. [0:56] Command Cut and Paste [2:30]  Find my Device [3:50]  Cleaning up Preview OS Installs with Disk Cleanup [5:13]  Storage Management [6:45]  OneDrive Fetch [8:10]  Screen recorder [10:23] Memory Diagnostic Tool [11:42] Capture Network Traffic from a Command Prompt […]

Read More
Windows Server 2016: Credential Theft Mitigation Features

Windows Server 2016: Credential Theft Mitigation Features

Lex Thomas welcomes back Brantley Whitley to the show as they discuss the new Credential Theft Mitigation Features found in Windows Server 2016. Learn how you can use the new Active Directory Domain Services features to improve your organization’s ability to secure Active Directory environments. [2:20] Let’s talk about the new SmartCard authentication features [7:15] […]

Read More
Microsoft Apps for iOS and Android Users

Microsoft Apps for iOS and Android Users

Microsoft apps on platforms other than Windows? Yes, folks its true — you can run Office, Outlook, Cortana and countless other Microsoft applications on the iOS and Android platform. Check out our favorite apps from Microsoft found in the Apple App Store. Get FREE Office apps on your mobile device here Learn how to develop Cross-Platform […]

Read More
How to Leverage the Azure Security Center & Microsoft Operations Management Suite for an Incident Response

How to Leverage the Azure Security Center & Microsoft Operations Management Suite for an Incident Response

Join Lex Thomas and Yuri Diogenes as they discuss how you can leverage both the Azure Security Center and Microsoft Operations Management Suite (OMS) to better manage cybersecurity threats in both the cloud and hybrid cloud environments. [2:10] Why are some organization still avoiding a move to the cloud? Are security concerns a major reason […]

Read More
AppLocker: Another Layer in the Defense in Depth Against Malware

AppLocker: Another Layer in the Defense in Depth Against Malware

Ransomware has been getting a lot of attention. There have been several high profile attacks in the press over the past few months and Understanding the Risk is important. If people don’t understand the risk, changes won’t be made. To protect your enterprise, there are many steps for a Defense in Depth strategy to be […]

Read More
What’s New in PowerShell v5

What’s New in PowerShell v5

Would you like to learn about the latest and greatest features that Microsoft has built into PowerShell Version 5? Join Lex Thomas and Ashely McGlone as they discuss the new features in PowerShell including changes in security, scripting, debugging, and administration role management, along with the PowerShell Gallery, ScriptAnalyzer, DSC and much, much more!   Want […]

Read More