Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Unlock new value from your end-of-life technology Ian Hutchinson – SoftwareONE Alliance Leader for AWS and others With Microsoft’s fast approaching end-of-life (EOL) deadlines for SQL Server 2012 and Windows Server 2012, many organizations find themselves in need ... July 19, 2022 8:00am Cybersecurity Lesson from the Death Star: CIS Control 4 Explained in 45 Minutes Dirk Schrader, VP of Security Research at Netwrix, Mark Kedgley, CTO at Netwrix The Center for Internet Security (CIS) is a top resource for cybersecurity best practices. One of its recommended security controls, Control 4, should... 4 days ago | 59 mins Active Directory Masterclass: AD Configuration Strategies for Stronger Security Sander Berkouwer (Microsoft MVP and MCT), Alex McCoy (PreSales Engineer at Netwrix) Active Directory (AD) is leveraged by over 90% of enterprises worldwide as the authentication and authorization hub of their IT infrastructure— but it... July 6, 2022 5:00pm Automation and Orchestration of Windows with Red Hat’s Ansible Lance Abla, John Ringhof, and Keith Gienty Dell | Red Hat Customer Webinar: Accelerate Your Company’s Infrastructure with the Automation and Orchestration of Windows with Red Hat’s Ansible A ... 6 days ago | 49 mins Azure Virtual Desktop (AVD) Performance with Windows 10 & 11 – Which is Better? Blair Parkhill, Product Manager, Login VSI & Jim Moyle, Sr. Program Manager for AVD, Microsoft If you are evaluating or migrating to Azure Virtual Desktops (AVD), choosing the best Windows operating system for your environment might not be as st... 2 weeks ago | 53 mins Getting Started with Carbonite® Availability Carbonite Demonstration High availability for critical applications Downtime strikes IT organizations from a multitude of sources and IT teams are certain that downtime will... 6 days ago | 7 mins Linux Automation Strategies Applied to Windows Simon Lorentz This webinar will show how orcharhino and the workflows mainly used to automate deployment, configuration and orchestration of Linux servers can also ... 1 month ago | 37 mins LockDown 2022: Ransomware: Before, During, and After an Attack Jeremy Moskowitz, Microsoft MVP Learn strategies and tactics for preventing ransomware attacks and managing attacks "if" they occur. July 20, 2022 5:00pm LockDown 2022: Endpoint Management Lockdown w/ PolicyPak: GPO, Intune, & Cloud Jeremy Moskowitz, Microsoft MVP Learn how to get out of the local admin rights business, stop ransomware and unknown software in its tracks, and handle USB/CD-ROM threats with ease. ... July 27, 2022 5:00pm 10 Work From Home Security Settings You Can Implement Now to Block Attackers Sami Laiho, Microsoft MVP Remote work and work-from-home present new risks as the security perimeter gets harder to manage. Now administrators must manage security for users in... 2 months ago | 60 mins Load more