Videos

Deploying Windows 10: Back to Basics

3 years ago
Are you new to Windows deployment, or maybe just rusty? In this session, we review the tools that are available, explain all the acronyms, and explore best practices for deploying Windows 10. During the process, we show all the key tools that we recommend for building and customizing Windows 10 images, deploying Windows 10 images, […]

Getting Started with Windows XAML

3 years ago
In 2012, Windows 8 introduced Windows XAML, a forward-looking variant of XAML that would slowly become the go-to presentation framework for apps, Office, and Windows. Windows 8.1 and Windows 10 continue to advance XAML new capabilities, new features, and new paradigms. But, it can be difficult to know where you should begin. In this session, […]

Windows 10 Management Scenarios: Mark Minasi Helps You Have Total Control for Every Budget

3 years ago
There’s a lot to like about Windows 10, but for those who have to keep data moving in organizations, the best reason might be, "Windows 10 listens better." We love mobility. Mobility requires the cloud. Devices in the cloud need to be managed and protected. We’ve got lots tools for managing Windows devices on-premises, but […]

Managing Windows 10: Back to Basics

3 years ago
Are you new to managing Windows devices (desktops, laptops, tablets, phones), or maybe just rusty? In this session, we review the management capabilities built into Windows 10; capabilities offered by Windows Server to complement the built-in capabilities; additional products like Microsoft System Center and Intune that provide the ability to manage large numbers of devices; […]

Detecting the Undetectable

3 years ago
It is impossible to prevent a determined adversary from breaking into a company. Therefore, the next best thing is early detection of a malicious invasion that allows defenders to minimize the damage. According to highly respected computer security reports, over 80% of data breaches would have been detected if the victims has just been looking […]

Recalling Windows Memories: A Useful Guide to Retrieving and Analyzing Memory Content

3 years ago
Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security […]

Dropping the Hammer Down on Malware Threats with Windows 10’s Device Guard

3 years ago
With over 300 thousand new malicious files created per day the fight against malware using traditional techniques (i.e.: signature based detection) is never-ending game of whack-a-mole. Windows 10 fundamentally changes the game for enterprise security with Device Guard which can be used to put devices into a configuration state where their incapable of running untrusted […]

Zero Admins – Zero Problems

3 years ago
Do your users get admin access to their computers? What about laptop users? Do you use an admin account on your own computer? What about home computers? Do you need to take time to give permissions to files or registry keys to make software work without admin rights? Still want to plug USB keys to […]

Barbarians Inside the Gates: Protecting against Credential Theft and Pass the Hash Today

3 years ago
Pass the Hash (PtH) is one of the most widespread & damaging attack techniques affecting our customers. Microsoft Pass the Hash workgroup has continued to work on mitigations in many forms; technical guidance & platform modifications. This session covers the new Pass the Hash whitepaper with guidance on mitigation strategies that integrate the new features […]

The End Game for Passwords and Credential Theft?

3 years ago
Credential theft has become a crisis for organizations worldwide and so far the industry has really just been “talking” about moving to better solutions. The “talk” ends with Windows 10, which delivers the end game solution—one that is easy to deploy, always multi-factor, theft and phish proof, and provides true single sign-on even as you […]

Hacker Tools for Ethical Hackers to Protect Windows Clients

3 years ago
If you want to really protect your Windows environment, then you should know what is used by the cyber criminals. This session shows you the hacking tools of today, the damage they can inflict, and how you can be aware of those tools before they hit your network. Also, learn how Windows Clients are ready […]

BitLocker Deployment Using MBAM Is a Snap!

3 years ago
Are you frustrated about the hoops you have to jump through to get BitLocker enabled on your devices? Come learn about how new enhancements to MBAM can help you easily enable BitLocker during imaging. MBAM can also increase your success rate while deploying BitLocker to existing machines in your fleet. The session walks you through […]