Select Page
From Expert Service to Free Training Programs and Events...Find out what's next at the Microsoft Store

From Expert Service to Free Training Programs and Events…Find out what’s next at the Microsoft Store

From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone.Join Lex ... continue reading
Securing RDP with IPSec

Securing RDP with IPSec

Hi Everyone, this is Jerry Devore back with a follow-up topic from my previous post on Privileged Administrative Workstations (PAW) which is a hardened device configuration used to protect privileged credentials. In that post, I mentioned that it is possible ... continue reading
Viewing Memory in PowerShell

Viewing Memory in PowerShell

Hello there, this is Benjamin Morgan, and I’m a Premier Field Engineer covering Active Directory and Platforms related topics. This is my first blog post I hope you are all as excited about this as I am! Today I wanted ... continue reading

Connecting Customers with Microsoft Product Teams

The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved ... continue reading
Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services

Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services

Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also ... continue reading

Predictions for 2017 and Beyond: A look into what’s driving the future of technology with Microsoft CTO of Services, Norm Judah

Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review ... continue reading
(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading
(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading
(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait ... continue reading

Credential Theft: How the Attack Landscape has changed and What You can do about it

The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access ... continue reading