Did you know that Microsoft 365 Nation contributor Ken Dwight is a published author? Dwight wrote a book (“Bug-Free Computing”) a decade ago that still has legs. Dwight shares for the first time that he wasn’t thrilled by the title (he wanted to have “safety” in the title). Back in the day, it was a best-selling book before the term malware was coined and widely used.
While this book reflects the world from a user point of view. Dwight goes deep in KLEZ, the first virus to extract money from afflicted parties. Dwight and myself (Harry) talk about what’s its like to self-publish a book.
Long-time managed services provider (MSP) Karl Palachuk discovers the three workloads of Microsoft 365. Interviewed at the recent ChannelPro SMB Forum in Chicago, Palachuk offers ways he can help MSPs figure out how to tweak the Microsoft 365 experience.
This contribution from Michael (MickyJ) Jenkin is very special. It’s a case of while the cat is away; the mice will play! Jenny and MickyJ filmed the rogue conversation while harry was gone. The content is a solid and the new format is worth the view alone!
The always engaging Microsoft 365 Nation contributor Joshua Liberman is back with a view of the next security frontier(s) you’ll encounter in 2019. First up is internal vulnerability scanning. Second is device alerting. When Liberman speaks, people listen! In this interview he walks the viewer through the “processes” surrounding the above messages such as vulnerability scanning.
Because Microsoft 365 Nation is an independent community separate from Microsoft, Liberman takes advantage of the opportunity to recommend third-party solutions. Just after minute three, Liberman talks about outsourced firewall log reading.
This segment is a doozie – and there’s a free Microsoft 365 book on the other end of this video. Author Alex Fields, Success Computer Consulting, has written an amazingly technical book titled “Microsoft 365 Business Admin Guide” that we quickly do an overview of parts of the book (with this month’s contribution – future months will be a deep dive).
The parts of the book that we discuss are:
1. Identity Management (e.g. Azure Active Directory)
2. Device Management (e.g. Intune)
3. Apps and Data Protection (this is the combo section that brings together the three legs of Microsoft 365). Spoiler alert – we discuss HIPAA
The proverbial lost opportunity appears to have been found. Forever and a day, smart minds have struggled with how to right size Azure consumption for small businesses. Michael and Zack have done exactly that an a SMB Azure solution that is purpose built and already in production and deployed. Amongst all of our content, this is a top five interview and a must view.