Episode
Windows Server 2016: (Part 1) Getting Started with Shielded VMs
One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new features and functions found in “Shielded VMs” for Windows Server 2016.
- [1:19] What is a "Shielded VM"?
- [4:17] What do I need to get started with Shielded VMs?
- [8:20] What are the benefits to Shielded VMs?
- [10:00] How does this work?
- [16:34] What are the different modes of shielding?
Learn more about Shielded VMs here
Send your comments or questions to the "Taste of Premier" Podcast show!
Follow the conversation @TasteofPremier
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________
Websites & Blogs:
Videos:
- Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and Tasks
- Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware
- How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
- Securing your Desktop: How a Threat Becomes a Security Patch
- Microsoft Security Risk Assessment - How to Optimize Your IT Security Program
- Microsoft Threat Detection Service Overview
- Cybersecurity Incident Response
- Securing Your Active Directory Environment
- Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
- Proactively Secure your IT Environment from Credential Theft with POP-SLAM
- Ransomware 101: How to Protect and Mitigate your environment from Malware
One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new features and functions found in “Shielded VMs” for Windows Server 2016.
- [1:19] What is a "Shielded VM"?
- [4:17] What do I need to get started with Shielded VMs?
- [8:20] What are the benefits to Shielded VMs?
- [10:00] How does this work?
- [16:34] What are the different modes of shielding?
Learn more about Shielded VMs here
Send your comments or questions to the "Taste of Premier" Podcast show!
Follow the conversation @TasteofPremier
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________
Websites & Blogs:
Videos:
- Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and Tasks
- Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware
- How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
- Securing your Desktop: How a Threat Becomes a Security Patch
- Microsoft Security Risk Assessment - How to Optimize Your IT Security Program
- Microsoft Threat Detection Service Overview
- Cybersecurity Incident Response
- Securing Your Active Directory Environment
- Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
- Proactively Secure your IT Environment from Credential Theft with POP-SLAM
- Ransomware 101: How to Protect and Mitigate your environment from Malware
Have feedback? Submit an issue here.