Did you know that Microsoft 365 Nation contributor Ken Dwight is a published author? Dwight wrote a book (“Bug-Free Computing”) a decade ago that still has legs. Dwight shares for the first time that he wasn’t thrilled by the title (he wanted to have “safety” in the title). Back in the day, it was a best-selling book before the term malware was coined and widely used.
While this book reflects the world from a user point of view. Dwight goes deep in KLEZ, the first virus to extract money from afflicted parties. Dwight and myself (Harry) talk about what’s its like to self-publish a book.
Long-time managed services provider (MSP) Karl Palachuk discovers the three workloads of Microsoft 365. Interviewed at the recent ChannelPro SMB Forum in Chicago, Palachuk offers ways he can help MSPs figure out how to tweak the Microsoft 365 experience.
This contribution from Michael (MickyJ) Jenkin is very special. It’s a case of while the cat is away; the mice will play! Jenny and MickyJ filmed the rogue conversation while harry was gone. The content is a solid and the new format is worth the view alone!
The always engaging Microsoft 365 Nation contributor Joshua Liberman is back with a view of the next security frontier(s) you’ll encounter in 2019. First up is internal vulnerability scanning. Second is device alerting. When Liberman speaks, people listen! In this interview he walks the viewer through the “processes” surrounding the above messages such as vulnerability scanning.
Because Microsoft 365 Nation is an independent community separate from Microsoft, Liberman takes advantage of the opportunity to recommend third-party solutions. Just after minute three, Liberman talks about outsourced firewall log reading.
This segment is a doozie – and there’s a free Microsoft 365 book on the other end of this video. Author Alex Fields, Success Computer Consulting, has written an amazingly technical book titled “Microsoft 365 Business Admin Guide” that we quickly do an overview of parts of the book (with this month’s contribution – future months will be a deep dive).
The parts of the book that we discuss are:
1. Identity Management (e.g. Azure Active Directory)
2. Device Management (e.g. Intune)
3. Apps and Data Protection (this is the combo section that brings together the three legs of Microsoft 365). Spoiler alert – we discuss HIPAA
The proverbial lost opportunity appears to have been found. Forever and a day, smart minds have struggled with how to right size Azure consumption for small businesses. Michael and Zack have done exactly that an a SMB Azure solution that is purpose built and already in production and deployed. Amongst all of our content, this is a top five interview and a must view.
Many companies – Windows Autopilot is a modern ways for device deployment…in Andrew’s words “…it’s pretty cool.” In this deep dive, we look at three main stages in the Windows Autopilot Process: (1) Purchase (Vendor), (2) Set-up (Administrator) and (3) User receives devices (End User). There is a brain teaser at the start of the second minute in the interview: how is the device ID created? You’ll just have to watch to gain insights into the and much more.
Contributor Frank Ohlhorst shares his monthly insights including a recent workflow conference (Workfront Leap) in Dallas that embraces the managed services providers (MSP) community. But then we drop into the good stuff!
The good stuff for May 2019 includes a conversation on Microsoft 365 automation. At a basic level, the modern office is evolving with online solutions (Ohlhorst views it as abstracting from the physical solution). He’s optimistic that the complete online office solutions now meet the same synergistic impact the our beloved Windows Small Business Server had a technology generation ago.
Ken Dwight – virus expert and contributor – weighs in on a newly revealed security attack vector: managed services providers (MSPs). He cites a specific attack that exploits the connection between two well-known ISVs in the MSP space. In all fairness – a patch was issued – but many folks haven’t implemented the patch yet. Boo hoo!
The conversation then shifts to discuss how the “bad guys” understand MSPs are a channel – hack just one and you potentially can do bad things to a portfolio of customers!
Learn how customers pushed the MSP into the security realm. “I’m a big believer in getting into whatever your customers want to get you into.” Denis Wilson (California MSP and Microsoft 365 Nation contributor) shares early in the interview. Our security practice started solving one little problem at a time. And as a special treat – Denis is a daily blogger and it’s helped to grow his MSP practice (spoiler alert – how to make sales and marketing work with a one-person marketing department and build an audience).
Long-time MVP and MCT Andrew Bettany has just completed another book: “Exam Ref MD-100 Windows 10.” It’s his sixth book for Microsoft Press and is ready for pre-order on major book seller sites (wink-wink) and scheduled to ship in early June 2019.
It’s a double hitter with contributor Denis Wilson this month. He’s on a tear publishing heaps of articles. Topic one is “Google Ads Now Steal Information” and topic two is “12 Email Clients Found To Have Serious Flaw.”