Info

Microsoft Mechanics Podcast

Why, how & when to use current and upcoming Microsoft tech for IT implementers, developers and tech enthusiasts. Hosted by Microsoft Director Jeremy Chapman and his colleagues. An official Microsoft video series.
RSS Feed
2021
October
September
August
July
June
May
April
March
February
January


2020
December
November
October
September
August
July
June
May
April
March
February
January


2019
December
November
October
September
August
July
June
May
April
March
February
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


2016
December
November
October
September
August


Categories

All Episodes
Archives
Categories
Now displaying: August, 2021
Aug 24, 2021

Watch how Microsoft's cloud-based SIM, Azure Sentinel, along with our XDR technologies, including Microsoft 365 Defender, provide an automated approach to threat detection and response. Rob Lefferts, Microsoft Security CVP, joins Jeremy Chapman to show you the latest integrative defenses and tools to respond quickly in the context of a real attack.

The threat landscape has reached a new level of urgency, whether it's human operated ransomware, or sophisticated command and control attacks, and the techniques being used are getting harder to detect — like supply chain attacks that embed malware in the apps and IoT devices that you trust. Stop these types of attacks with the right measures and preparation.

Put the right defense layers in place with the Zero Trust security model.

Increase your organization's ability to detect and respond before an attack does any damage.

If the damage has already started, contain the blast radius and quickly reverse any damage that has already been done.

Our integrated SIM with Azure Sentinel and Microsoft 365 Defender and Azure Defender for XDR apply Microsoft's unique volume and diversity of threat intelligence for early warning and response to give you visibility and depth of insight across your organization.

► QUICK LINKS:

00:00 - Introduction
01:07 - Preparation to stop attacks
03:02 - Demo of hybrid attack
04:56 - Where to start: Azure Sentinel
08:53 - Stop the spread: Microsoft 365 Defender
10:27 - Alerts
13:10 - Compromised user accounts
15:21 - Users on unmanaged devices
16:59 - Wrap up

► Link References:

Learn more about our integrated SIM and XDR solution with Azure Sentinel and Microsoft's Defender solutions at https://aka.ms/XDR
Watch our series on implementing the Zero Trust security model at https://aka.ms/ZeroTrustMechanics

► Unfamiliar with Microsoft Mechanics? We are Microsoft’s official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.

Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1
Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website

► Keep getting this insider knowledge, join us on social:

Follow us on Twitter: https://twitter.com/MSFTMechanics
Follow us on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/

#Security #Cybersecurity #InfoSec

Aug 16, 2021

Protect data across your files and content, as well as structured and unstructured data wherever it resides, with the Zero Trust security model. As always, the approach applies the principles of verify explicitly, least privileged access, and assume breach. Jeremy Chapman, Director of Microsoft 365, highlights how you can apply Zero Trust security to keep your data protected.

With Zero Trust, protections are designed to follow your data wherever it resides, whether that's in your infrastructure or in the services that you manage. Protections continue as data flows and people work together with sensitive information. Information can also be protected from leaks by people inside of your organization or from people who should not have access. With the right protections in place, you can protect data if your devices are infected with malware, and you can also block and prevent data access in the case of a data breach. The good news is you can extend protections at a granular level, from your databases and individual data fields, to sensitive words within your databases, and trigger words while using apps.

Steps to protect your data:
Identify top sensitive information
Apply labels and classifiers
Apply principle of least privilege and assume breach

► QUICK LINKS:
00:00 - Introduction
01:36 - Identify your sensitive data
03:55 - Data classification
06:51 - Take action: Least privilege and assume breach
07:22 - See an example
07:54 - Insider risk management capabilities
09:20 - Wrap up

► Link References:
Watch our previous deep dive shows across the layers of Zero Trust at https://aka.ms/ZeroTrustMechanics
For more on Zero Trust, go to https://aka.ms/zerotrust

► Unfamiliar with Microsoft Mechanics? We are Microsoft’s official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft.
Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1
Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website

► Keep getting this insider knowledge, join us on social:
Follow us on Twitter: https://twitter.com/MSFTMechanics
Follow us on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ 

Aug 9, 2021

Get an in-depth look at how you can find and keep your customers with Customer Insights in Dynamics 365. Explore the predictive AI and automation that can identify the customers you are most at risk of losing, as well as develop and track the marketing that will earn them back. Thiale Diop, Product Manager for Dynamics 365, joins Jeremy Chapman to walk you through the configuration and setup.

With Dynamics 365 Marketing, you can leverage artificial intelligence to personalize and optimize customer experiences across every channel. Build automated marketing workflows that deliver targeted content based on the individual's unique needs at any point in their buyer journey with built-in tools for event management and insights about all your company’s marketing activities.

► QUICK LINKS:

00:00 - Introduction
02:08 - Requirements to Get Started
05:16 - Review the Results
07:16 - Handover to Marketing Team in Dynamics 365 Marketing
12:37 - Assessment of Campaign Data
14:45 - Wrap up

► Link References:

Find our Customer Insights video with Satish Thomas at https://aka.ms/CIMechanics
For guidance on how to implement personalized customer journeys, check out https://aka.ms/D365MarketingHowTo

► Unfamiliar with Microsoft Mechanics? We are Microsoft’s official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft.

Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1
Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website

► Keep getting this insider knowledge, join us on social:

Follow us on Twitter: https://twitter.com/MSFTMechanics
Follow us on LinkedIn:  https://www.linkedin.com/company/microsoft-mechanics/ 

Aug 2, 2021

Get your Cloud PCs up and running with Windows 365. Explore the prerequisites, what the imaging and provisioning process looks like, as well as ongoing management. Christiaan Brinkhoff, Principal Program Manager for Windows 365, joins Jeremy Chapman to walk you through the administrator setup in Azure and Microsoft Endpoint Manager, as well as the user experience in the browser and the additional functionality you get when you access your Cloud PC with Remote Desktop apps.

If you're new to Windows 365, it's a Cloud PC that lets you securely stream your Windows experience, including your desktop, apps, settings, and content to any device. Everything is kept simple and familiar from a deployment configuration perspective. If you're a device admin, it will be easy to get everything started and running with Windows 365.

► QUICK LINKS:
00:00 - Introduction
00:50 - Setup experience
01:29 - Build and assign Cloud PCs
02:35 - Configure Cloud PC environment in MEM
04:36 - Create provisioning policy in MEM
06:15 - Assign policies to a group
08:22 - User experience in the browser
10:15 - Benefit of Remote Desktop apps
11:58 - Wrap up

► Link References:
Access a trial for Windows 365 at https://aka.ms/CPCTrial
Find our Windows 365 introduction video with Scott Manchester at https://aka.ms/cloudPCMechanics
For guidance on choosing the right Cloud PC for your specific user types, check out https://aka.ms/CPCsizing
Get a detailed step-by-step guide for setting up Windows 365 at https://aka.ms/deploycpc

► Unfamiliar with Microsoft Mechanics? We are Microsoft’s official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft.
Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1
Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website

► Keep getting this insider knowledge, join us on social:
Follow us on Twitter: https://twitter.com/MSFTMechanics
Follow us on LinkedIn:  https://www.linkedin.com/company/microsoft-mechanics/ 

1