Hi [[ session.user.profile.firstName ]]
Sort by:
    • Windows 10: How to Protect your Business from Modern Security Threats Windows 10: How to Protect your Business from Modern Security Threats Chris Yeager, Windows Client Technology Specialist, Microsoft; Mike Farnsworth, Technology Strategist, Microsoft Recorded: Jan 15 2016 11:05 pm UTC 28 mins
    • Cyber threats are the new normal. Help protect your identity and data with Windows 10. We take your security seriously.

      The last few years have seen a revolution in enterprise security threats. Windows 10 goes beyond just building bigger walls and delivers entirely new ways to help protect identities, data, and devices.

      With Microsoft Passport and Windows Hello* computing can become more personal and more secure – without the hassles and compromises of passwords. Deploy two-factor password alternatives, breach, theft, and phish resistant credentials – without many of the complexities and cost of the past.

      No matter how or where your data is being accessed, with Windows 10 your employees are secured from power-on to power-off.

      In this webcast, viewers will learn more about:
      •How Windows 10 delivers on protecting identities, data and devices
      •What are Microsoft Passport, Windows Hello, Enterprise Data Protection and Device Guard, and how they protect employee devices and company data
      •Additional resources to learn more about security on Windows 10

      Read more >
    • What’s New in the Windows 10 Security Log What’s New in the Windows 10 Security Log Randy Franklin Smith, Ultimate Windows Security & Erick Ingleby, LogRhythm Recorded: Dec 10 2015 4:00 pm UTC 84 mins
    • Randy Franklin Smith of Ultimate Windows Security has been busy researching the changes to audit policy and the security log in Windows 10. He’ll be updating the Security Log Encyclopedia to reflect these changes and I’m going to show you these changes live in this upcoming real training for free ™ webinar. Here’s what to expect:

      • Microsoft has added a new “Audit Group Membership” subcategory to audit policy that documents all the groups a user belongs to at the moment of logon – whether an interactive logon to a workstation or a remote logon as to a file server. Smith will discuss the interesting ways you can use this information to enhance your monitoring of different types of users.

      • The other new audit policy, “Audit PNP Activity” allows you to audit connection of external devices by the Windows plug and play system.

      • Microsoft has new events and more fields to some existing events so that get additional useful information on activity like: Logons, process creation, enumeration of the local SAM account database and changes to Boot Configuration Database (BCD).

      A lot of these changes are valuable enhancements that will help you catch endpoint security threats more effectively. Furthermore, Smith will show specific examples of these new events and point out the new fields in existing events.

      LogRhythm, has sponsored this real training for free ™ session. LogRhythm has a new version of their cool SIEM out and Erick Ingleby will demo the new version 7.1. This includes the introduction of a new back-end technology for storing all log data that provides greater scalability, search performance, faster indexing rates, and enables new capabilities such as unstructured search against the full log message text.

      Read more >
    • Windows PowerShell Desired State Configuration (DSC) Windows PowerShell Desired State Configuration (DSC) Jeff Wouters - MVP Windows PowerShell Recorded: Jun 12 2014 2:00 pm UTC 44 mins
    • To fix a configuration that drifted from the desired state. This is the description of Windows PowerShell PowerShell Desired State Configuration.
      Who doesn’t know the long search for the cause when something stopped working? Two identical servers, where one works and one does not.
      You can solve this by standardization and compliancy enforcement of that standard. DSC is all about that.
      You define a state you want the configuration to be in and hold this against a server or client. If it isn’t compliant with the desired state, it will get fixed.
      This is the future of management in Windows environments.
      During this webinar, Jeff will show both how DSC can be used for compliancy enforcement, but also as a deployment solution.

      Bio: Jeff Wouters, MVP Windows PowerShell, is a freelance consultant and trainer from The Netherlands with a main focus on automation and virtualization.
      He has a passion for Windows PowerShell, is the founder of the Dutch PowerShell User Group (DuPSUG) and frequent speaker at national and international IT events such as BriForum, E2E Virtualization Conference, Microsoft TechDays and multiple User Groups.
      He blogs on http://www.jeffwouters.nl and the Hey!ScriptingGuy blog. Jeff is one of the contributing authors to the PowerShell Deep Dives book and an active social media user where you can find him under 'JeffWouters'.

      Read more >