Microsoft Teams and SharePoint serve central roles in communication and data-sharing in the Microsoft 365 Cloud. Since both workloads touch on so many technologies in the Cloud, it can benefit from human and automated analysis. This applies to both hunting in logs, and real-time monitoring of meetings. Azure Sentinel offers admins these solutions. Topics: Introduction to Azure Sentinel, Setup and Planning, Collecting Data: Connectors for Office 365, Normalizing, Monitoring and Visualizing Data, Investigate threats and Helpful hunting KQL queries, Auditing external users, Bots and Apps, Automate responses, Roadmap
Duration: 23:00
Microsoft 365 can be a challenging task to enforce configuration management across the multiple workloads, whether administrators are only tasked to focus on one workload or multiple workloads. In this session we will be going over the Microsoft 365 Desired State Configuration module, and explain how to set up the module and deploy an initial configuration to a Microsoft 365 tenant. You’ll also see how to extract a backup of the tenant configuration and show how the module works against updated configuration to detect changes in the environment.
Duration: 28:20
In this challenging cyberthreat landscape, it’s important to keep control over what's happening in your environment, provide sufficient protection and gain visibility in what's happening across your digital estate. A balanced security approach considers many elements; not in the least your devices and endpoints! In this session, Michael Van Horenbeeck will show how Microsoft Defender for Endpoint is the catalyst for successful security operations. Based on real-world experience and examples, we will walk through the platform, how to best deploy and manage it, and how you can leverage its features to increase identification, protection, detection and response capabilities.
Duration: 44:20
Join Microsoft experts as they explain how Microsoft Teams can take your organization’s collaboration to the next level.
Duration: 02:23
Join Susan Bradley, Microsoft Security MVP, as she discusses best practices to improve your O365 security.
Duration: 02:42
Microsoft uses a variety of techniques to control the load that customers put on their services. Most of these techniques are painful and/or annoying to end users and tenant administrators. Come to this session to learn about MS' throttling mechanisms, what behaviors are likely to trigger them, and practical approaches to lessen the damage they do to your tenant performance during migration, backup, and other common scenarios. Caution: may include spicy language.
Duration: 29:29
Join Chris McNulty, Sr. Product Manager at Microsoft, and learn how Teams impacts your IT strategy.
Duration: 41:03
Access all of the amazing content from THE Microsoft training event of the year – The Experts Conference – in a virtual format. Like all TEC events, our 2022 virtual conference was filled to the brim with practical Active Directory and Office 365 education straight from renowned Microsoft MVPs and industry experts. The live conference has ended, but you can still access any of the sessions from the live event. If there’s anything you missed, or want to watch again, it’s all available now on demand. That’s right, every session – from the in-depth Microsoft 365, Microsoft Infrastructure Security, and On-Premises & Hybrid Management and Migration tracks – is available to watch from the comfort of your home at any time. And as always, this event was brought to you by the leaders who have helped move, manage and secure more than 336 million Active Directory users: Quest Software.
Duration: 01:26
What are the most serious security risks facing your organization? Dr. Alex Crowther, Military and Cyber Strategist & International Affairs Specialist, shares his vision at TEC, Sept 19-20, 2023.
Duration: 01:11
THE Microsoft training event of the year – The Experts Conference (TEC) – is back in 2022 as an in-person event in Atlanta, September 20-21, 2022. If you’ve been craving face-to-face Microsoft training, TEC 2022 is the answer. Like previous TEC events, our 2022 conference will be filled to the brim with practical Active Directory and Office 365 education straight from renowned Microsoft MVPs, industry experts, and of course, your IT peers. You’ll be able to join in-depth training tracks on Hybrid Active Directory Security, Office 365 and/or Migration & Modernization. And as always, the event is brought to you by the leaders who have helped move, manage and secure more than 336 million Active Directory users: Quest Software.
Duration: 01:28
Join Tony Redmond, Microsoft Office Apps & Services MVP, as he shares tips on managing Teams.
Duration: 01:00:32
Our families, friends and neighbors are all refining their hacking skills. But what is this doing to the idea of identity? What is an identity for you and your family in the 2020s? How is identity devolving and creating itself with each new service we sign up for? What about things we use that aren’t tied to our personal identity? What happens when your IOT house plants, lights or home has a service account? Managing identity is more than MFA and complex pass phrases for today’s individuals. In this session, Chris Dancy explains why we must go back and look at the tentacles of personal identity stretching through our devices, apps, services and sensors.
Duration: 20:43
Opportunity makes a cybercriminal, and this is truer than ever during a critical and time-sensitive Active Directory migration when a lot of doors are swinging open. Personnel attrition due to an M&A, integrating with legacy systems, and rushed timelines create ample opportunities for attackers to target your organization. Legacy migration methodologies have historically required opening up the environment to significant security risks, including ransomware attacks, SIDHistory injection, elevated permissions, Group policy hijacking and more. This session will focus on the security missteps to avoid before, during, and even after an AD migration project so that it doesn’t become a resume updating project. We’ll look at real-world examples and give helpful advice to: • Avoid M&A IT integration missteps • Protect yourself from security breaches • Achieve data security • Reap the benefits you expect from your M&A • Ransomware attacks • SIDHistory Injection • Elevated permissions • Group Policy hijacking • And more.
Duration: 40:24
While there is an abundance amount of information about Microsoft Sentinel, it takes time to find out what is marketing speak and how the product actually behaves. With his experience implementing Microsoft Sentinel in multiple organizations, This will walk through real-life scenarios and provide tips and tricks on how to set up your environment. These tips will range from thoughts about the machine learning algorithms, the built-in rule templates and integrations into your day-to-day operations.
Duration: 47:51