Skip to main content

Security Videos

Managing security and privacy can be daunting, so where do you begin? Watch these videos to learn from top security subject matter experts as they cover the latest security features, prescriptive guidelines, and relevant tips.

Featured Video

Advanced Persistent Threats

Tim Rains from Microsoft Trustworthy Computing outlines Advanced Persistent Threats in this installment of the Targeted Attacks video series.

Presented by Trustworthy Computing
Thursday, June 21, 2012

Length: 4:34

 

Rate This Video 

Topics

Targeted Attacks
Cloud Computing
Internet Explorer
Privacy
Security Development Lifecycle
Security Intelligence Report
SQL Server
Tools
Windows 7
Windows 8
TechNet Security Videos
 

Anatomy of a Cyber Attack, Part I Anatomy of a Cyber Attack, Part I
Length:
5:39 minutes
Publish Date: Thursday, June 6, 2013
Sean Finnegan, Chief Technology Officer from the Microsoft Cybersecurity practice, takes you inside the early stages of a cyber attack in this installment of the Targeted Attacks Video Series.

Anatomy of a Cyber Attack: Part II Anatomy of a Cyber Attack: Part II
Length:
5:28 minutes
Publish Date: Thursday, June 6, 2013
Sean Finnegan, Chief Technology Officer from the Microsoft Cybersecurity practice, shows you what happens as an attacker gains access to your network in this installment of the Targeted Attacks Video Series.

Pass The Hash
Length:
4:01 minutes
Publish Date: Wednesday, June 5, 2013
Tim Rains and Patrick Jungles from Microsoft Trustworthy Computing discuss "Pass The Hash" and the recently-released whitepaper Microsoft published on the subject in this installment of the Targeted Attacks video series.

Securing Your Active Directory
Length:
1:45 minutes
Publish Date: Thursday, June 6, 2013
Bret Arsenault, Chief Information Security Officer from Microsoft, discusses the importance of securing your Active Directory environment in this installment of the Targeted Attacks Video Series.

Related Links

Forums: Windows Azure Platform
Ask a question or find answers written by Windows Azure experts at Microsoft and in the community.

Security Intelligence Report (SIR)
SIR is a comprehensive study of the evolving threat landscape based on data input from over 600 million computers worldwide.

Microsoft Baseline Security Analyzer (MBSA)
MBSA scans for missing security updates and common security misconfigurations. It can be used in conjunction with Microsoft Update and Windows Server Update Services.