Para tener la mejor experiencia web, use IE11+, Chrome, Firefox o Safari.

EQ for the IT Pro: Gender Pronouns in IT

EQ for the IT Pro: Gender Pronouns in IT 13:41
As we continue our hybrid working world, inclusivity takes on additional meaning and importance. Continuing the discussion from TEC 2021, we will review the top tips from the participants in last year’s debate on inclusive meetings, and then we’ll build on this to share new methods that have come out since then. Once again, we’ll open it up for audience participation to share their top inclusive meetings tips!

Related videos

What is Microsoft Teams?
What is Microsoft Teams?

Join Microsoft experts as they explain how Microsoft Teams can take your organization’s collaboration to the next level.

Tips for improving Office 365 security
Tips for improving Office 365 security

Join Susan Bradley, Microsoft Security MVP, as she discusses best practices to improve your O365 security.

Throttling Stinks (And What You Can Do About It)
Throttling Stinks (And What You Can Do About It)

Microsoft uses a variety of techniques to control the load that customers put on their services. Most of these techniques are painful and/or annoying to end users and tenant administrators. Come to this session to learn about MS' throttling mechanisms, what behaviors are likely to trigger them, and practical approaches to lessen the damage they do to your tenant performance during migration, backup, and other common scenarios. Caution: may include spicy language.

The Impact of Microsoft Teams Growth
The Impact of Microsoft Teams Growth

Join Chris McNulty, Sr. Product Manager at Microsoft, and learn how Teams impacts your IT strategy.

The Experts Conference Virtual. December 6-7, 2022
The Experts Conference Virtual. December 6-7, 2022

Access all of the amazing content from THE Microsoft training event of the year – The Experts Conference – in a virtual format. Like all TEC events, our 2022 virtual conference was filled to the brim with practical Active Directory and Office 365 education straight from renowned Microsoft MVPs and industry experts. The live conference has ended, but you can still access any of the sessions from the live event. If there’s anything you missed, or want to watch again, it’s all available now on demand. That’s right, every session – from the in-depth Microsoft 365, Microsoft Infrastructure Security, and On-Premises & Hybrid Management and Migration tracks – is available to watch from the comfort of your home at any time. And as always, this event was brought to you by the leaders who have helped move, manage and secure more than 336 million Active Directory users: Quest Software.

The Experts Conference 2023 Keynote: Alex Crowther
The Experts Conference 2023 Keynote: Alex Crowther

What are the most serious security risks facing your organization? Dr. Alex Crowther, Military and Cyber Strategist & International Affairs Specialist, shares his vision at TEC, Sept 19-20, 2023.

TEC 2022 is returning in person to Atlanta, September 20-21, 2022
TEC 2022 is returning in person to Atlanta, September 20-21, 2022

THE Microsoft training event of the year – The Experts Conference (TEC) – is back in 2022 as an in-person event in Atlanta, September 20-21, 2022. If you’ve been craving face-to-face Microsoft training, TEC 2022 is the answer. Like previous TEC events, our 2022 conference will be filled to the brim with practical Active Directory and Office 365 education straight from renowned Microsoft MVPs, industry experts, and of course, your IT peers. You’ll be able to join in-depth training tracks on Hybrid Active Directory Security, Office 365 and/or Migration & Modernization. And as always, the event is brought to you by the leaders who have helped move, manage and secure more than 336 million Active Directory users: Quest Software.

Supercharge Your Security Operations with Microsoft Defender for Endpoint
Supercharge Your Security Operations with Microsoft Defender for Endpoint

In this challenging cyberthreat landscape, it’s important to keep control over what's happening in your environment, provide sufficient protection and gain visibility in what's happening across your digital estate. A balanced security approach considers many elements; not in the least your devices and endpoints! In this session, Michael Van Horenbeeck will show how Microsoft Defender for Endpoint is the catalyst for successful security operations. Based on real-world experience and examples, we will walk through the platform, how to best deploy and manage it, and how you can leverage its features to increase identification, protection, detection and response capabilities.

Successfully Manage Microsoft Teams
Successfully Manage Microsoft Teams

Join Tony Redmond, Microsoft Office Apps & Services MVP, as he shares tips on managing Teams.

Security After Dark: What makes a secure life after you leave the office?
Security After Dark: What makes a secure life after you leave the office?

Our families, friends and neighbors are all refining their hacking skills. But what is this doing to the idea of identity? What is an identity for you and your family in the 2020s? How is identity devolving and creating itself with each new service we sign up for? What about things we use that aren’t tied to our personal identity? What happens when your IOT house plants, lights or home has a service account? Managing identity is more than MFA and complex pass phrases for today’s individuals. In this session, Chris Dancy explains why we must go back and look at the tentacles of personal identity stretching through our devices, apps, services and sensors.

Secure that Active Directory Migration
Secure that Active Directory Migration

Opportunity makes a cybercriminal, and this is truer than ever during a critical and time-sensitive Active Directory migration when a lot of doors are swinging open. Personnel attrition due to an M&A, integrating with legacy systems, and rushed timelines create ample opportunities for attackers to target your organization. Legacy migration methodologies have historically required opening up the environment to significant security risks, including ransomware attacks, SIDHistory injection, elevated permissions, Group policy hijacking and more. This session will focus on the security missteps to avoid before, during, and even after an AD migration project so that it doesn’t become a resume updating project. We’ll look at real-world examples and give helpful advice to: • Avoid M&A IT integration missteps • Protect yourself from security breaches • Achieve data security • Reap the benefits you expect from your M&A • Ransomware attacks • SIDHistory Injection • Elevated permissions • Group Policy hijacking • And more.

Notes from the Field: Microsoft Sentinel in real-life
Notes from the Field: Microsoft Sentinel in real-life

While there is an abundance amount of information about Microsoft Sentinel, it takes time to find out what is marketing speak and how the product actually behaves. With his experience implementing Microsoft Sentinel in multiple organizations, This will walk through real-life scenarios and provide tips and tricks on how to set up your environment. These tips will range from thoughts about the machine learning algorithms, the built-in rule templates and integrations into your day-to-day operations.

Microsoft Teams Shared Channels: Know your Options
Microsoft Teams Shared Channels: Know your Options

Shared Channels is a new and powerful collaboration feature for Microsoft Teams. It has the ability to unlock many existing barriers to collaboration inside and outside your organization. But with great power comes great responsibility. We'll discuss three key areas that could pose challenges to your administration of Shared Channels: 1) Confusion over when to use a Standard Channel vs Private Channel vs Shared Channel – because once you choose a channel type there is no switching it! 2) Recognition and concern that data in Shared Channels can be exposed to outside people and entities. 3) Confusion about how to govern Shared Channels – all the knobs and controls for enabling/disabling specific users, and how to govern outside access. Come learn what Shared Channels can do for end-users, when they should be used, and options for governing access to the data so that you can reap the collaboration benefits without incurring undo risk.

Mastering Microsoft 365
Mastering Microsoft 365

Microsoft 365 is huge. No one can know every detail about every product within the suite. In this session, MVP Tony Redmond presents a personal view of Microsoft 365 and Office 365. He discusses how the architecture has evolved from a loose collection of “cloudified” on-premises applications to a unified service based around the Microsoft 365 substrate. He explains how the major workloads function, explores solutions like information governance and information protection, and dives into the growing influence of the Microsoft Graph. Due to time constraints, he absolutely won’t cover everything, but everyone who participates in this session will walk away with a deeper understanding of Microsoft 365.

Leveraging SharePoint with Office 365
Leveraging SharePoint with Office 365

Join Mark Rackley, Microsoft MVP, as he explains how you can maximize your productivity with SharePoint.