Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

Successfully Manage Microsoft Teams

Successfully Manage Microsoft Teams 01:00:32
Join Tony Redmond, Microsoft Office Apps & Services MVP, as he shares tips on managing Teams.

Related videos

Building Approval Processes in Power Apps
Building Approval Processes in Power Apps

Forms and documents are everywhere in your organization, and a lot of them must go through an approval process. Power Apps is such a flexible platform, it provides us with a blank canvas that can be used to build forms and an approval interface. In this session, you’ll learn how you can build these business processes directly into each Power App, so that the user interface for request submission and approval is seamless. Laura Rogers will teach you how to use logic and Microsoft/SharePoint lists, and present forms and approval buttons in an app, so that approvals and tasks aren’t located in disparate systems. You can use this method across each request form and approval process in your organization! The concepts in this session are applicable to SharePoint Online with Microsoft 365, and Power Apps canvas apps.

Best Practices for Microsoft 365 Domain Moves
Best Practices for Microsoft 365 Domain Moves

Transferring a domain from one Microsoft 365 tenant to another is a monolithic, multi-step and intensive procedure. It’s critical to employ a well-orchestrated standard practice that must be carefully planned and executed at the proper time to ensure a seamless user transition. This session will help you prepare for it.

Best Practices for Azure AD Hybrid Organizations
Best Practices for Azure AD Hybrid Organizations

In times of rapid change, most organizations have dramatically accelerated digital transformation. In addition, many organizations took advantage of many Azure AD capabilities already available in the cloud to provide a secure, optimal and reliable identity framework to support their users and applications. In this session, you will hear directly from the Microsoft Identity engineering team and see the patterns and best practices from some of the largest and most complex enterprise scenarios all over the world using Azure Active Directory. You’ll also see how this has been instrumental in their goal to extend their cloud footprint.

10 Quick Hybrid Identity Wins
10 Quick Hybrid Identity Wins

Join Brian Desmond, Microsoft MVP, as he discusses the benefits and advantages of Hybrid Identity.

The Experts Conference 2023 Keynote: Alex Crowther
The Experts Conference 2023 Keynote: Alex Crowther

What are the most serious security risks facing your organization? Dr. Alex Crowther, Military and Cyber Strategist & International Affairs Specialist, shares his vision at TEC, Sept 19-20, 2023.

TEC: The New Integrated Identity Perimeter and Defenses
TEC: The New Integrated Identity Perimeter and Defenses

Alex will join us to discuss the critical evolution of attacks against hybrid identity infrastructure, the evolving strategies required to counter these threats, and predicts the future of identity security.

Security After Dark: What makes a secure life after you leave the office?
Security After Dark: What makes a secure life after you leave the office?

Our families, friends and neighbors are all refining their hacking skills. But what is this doing to the idea of identity? What is an identity for you and your family in the 2020s? How is identity devolving and creating itself with each new service we sign up for? What about things we use that aren’t tied to our personal identity? What happens when your IOT house plants, lights or home has a service account? Managing identity is more than MFA and complex pass phrases for today’s individuals. In this session, Chris Dancy explains why we must go back and look at the tentacles of personal identity stretching through our devices, apps, services and sensors.

Your Children are Hackers: Why Finstagram is the future of identity for you and your family
Your Children are Hackers: Why Finstagram is the future of identity for you and your family

You’ve heard about the world of hackers and their threats against your business, but what about at home? How is your family’s identity evolving to become more like the hackers we defend against at work? What if the future of cybersecurity was your 11-year-old daughter’s need to get back on TikTok after being kicked off? From throwaway accounts to Finstagram, Chris Dancy reviews the ways we are all hackers now and what this is doing to our identity, secure or not.

The Experts Conference Virtual. December 6-7, 2022
The Experts Conference Virtual. December 6-7, 2022

Access all of the amazing content from THE Microsoft training event of the year – The Experts Conference – in a virtual format. Like all TEC events, our 2022 virtual conference was filled to the brim with practical Active Directory and Office 365 education straight from renowned Microsoft MVPs and industry experts. The live conference has ended, but you can still access any of the sessions from the live event. If there’s anything you missed, or want to watch again, it’s all available now on demand. That’s right, every session – from the in-depth Microsoft 365, Microsoft Infrastructure Security, and On-Premises & Hybrid Management and Migration tracks – is available to watch from the comfort of your home at any time. And as always, this event was brought to you by the leaders who have helped move, manage and secure more than 336 million Active Directory users: Quest Software.

Emerging Threats Against Cloud Application Identities in Azure AD and What You Should do About It
Emerging Threats Against Cloud Application Identities in Azure AD and What You Should do About It

Many organizations have been laser-focused on user account security methods like MFA and passwordless authentication to defend against increases in password spray and phishing attacks. Yet, as security for user accounts continues to improve, recent cyberattacks show that adversaries are turning their attention toward application identities. But do you know what risky behavior to look for and how to protect against identity-based cyberattacks? In this session you will learn about attacks against application identities, how to detect these attacks, and how to recover and defend your application identities going forward against these emerging threats.

Forget About Split Profiles: Turn Any User into Admin Mode and Back Using Azure Privileged Identity
Forget About Split Profiles: Turn Any User into Admin Mode and Back Using Azure Privileged Identity

For years, the best practice to manage administrative rights was providing two user profiles: One to check email, and another one to manage servers. But that's a rather fine line to trust between using or misusing powers. Thanks to Azure PIM, you can govern who's getting admin privileges, for what and how long. On the plus side, users who don't need or want admin privileges can release them using self-service. In this hands-on, demo-based session by Peter De Tender, you’ll learn how you can perform auditing, control and governance of any user, any administrative role and identify what they can do within your hybrid organization.

Hacked and Afraid: dramatic tales from AD disaster recovery scenarios
Hacked and Afraid: dramatic tales from AD disaster recovery scenarios

Our expert panel will reveal personal stories and how they suffered, triaged, survived, and recovered from Active Directory and AAD nightmares. After the panel discussion, your participation in this safe space is encouraged through the “asking for a friend” segment to share “your friend’s” stories and get some remedies – you know, so you can relay it back to them! Please think ahead of time of things you might have been afraid to ask and take advantage of this interactive, shared experience.

Kerberos: Trust Your Delegations, Don’t Just Delegate Your Trusts
Kerberos: Trust Your Delegations, Don’t Just Delegate Your Trusts

Recently, many Active Directory vulnerabilities are being discovered spanning all three types of Kerberos delegations. One growing attack vector is compromising delegations that cross security boundaries (e.g. AD Trusts or in a hybrid AD environment). Microsoft has recently announced Kerberos authentication within Azure AD. While this brings a lot of security benefits around authentication, this also means that existing Kerberos vulnerabilities can extend from an on-premises AD environment to exploit an object in Azure. The opposite is also possible with on-premises objects (such as an application proxy) having the ability to impersonate cloud users. This session helps make sense of these vulnerabilities and provides solid advice on how to mitigate them.

Defending the Identity Nexus
Defending the Identity Nexus

As technology has evolved, so has the use of the different platforms – and inter-connecting these platforms to increase efficiencies. The challenge is that attackers leverage these connection points to gain access to data, escalate privileges, and persist.This session explores a typical corporate environment, its configuration and its weaknesses. The technology platforms explored include Active Directory, VMware vSphere, Azure AD, and Azure (IaaS, aka "cloud datacenter"). We will talk through common integration and configuration components, how attackers take advantage of these connections, and how to mitigate these attack techniques. The scenarios covered during this talk include how an attacker with "user" rights in one platform can leverage connection points and configured access to escalate privileges in another.

5 Trends with M&A Cross-Tenant Coexistence
5 Trends with M&A Cross-Tenant Coexistence

Cross-Tenant coexistence services have been static for a fairly long period, consisting primarily of limited GAL sync and free/busy services and maybe Domain sharing using address rewrite technologies. However, some emerging technologies will soon change much of what tenant administrators normally do to prepare their Microsoft 365 environments for collaboration during an M&A project. This session will help you prepare for them.