100 episodes

Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.

Microsoft Mechanics Podcast Microsoft Mechanics

    • News

Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.

    • video
    Is Azure the right place to run Red Hat Enterprise Linux workloads?

    Is Azure the right place to run Red Hat Enterprise Linux workloads?

    Ensure peak performance, security and compatibility with Azure for Red Hat Enterprise Linux. Leverage Azure Migrate to transition on-prem Linux VMs to Azure, for cloud-native or hybrid deployment. Deploy and orchestrate infrastructure with Azure Resource Manager templates, Terraform, and Ansible playbooks. Uncover cost-saving opportunities and performance optimization tools, and benefit from license portability, commitment-based discounts, and diverse compute options, including Azure Confidential Computing VMs, for enhanced scalability and efficiency. Experience flexibility with Azure, enabling RHEL workloads to run across global regions and edge locations, with Azure Arc providing centralized management and security for hybrid environments.
    Join Azure expert, Matt McSpirit, as he shares why Azure is the right place to run your Red Hat Enterprise Linux workloads.
     
    ► QUICK LINKS:
    00:00 - Why run Red Hat Enterprise Linux workloads on Azure? 
    01:10 - Integration
    01:41 - Automated scripting or code-based options
    02:09 - Beyond provisioning
    02:31 - Customer support
    03:07 - Efficiency- optimize your spend
    04:28 - Increase performance and scalability
    05:41 - Flexibility
    06:26 - Update management
    06:40 - Wrap Up
     
    ► Link References:
    See the Forrester Consulting study at https://aka.ms/RHELTEI
    For additional information check out https://aka.ms/RedHatAzure   
     
    ► Unfamiliar with Microsoft Mechanics? 
    As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.
    • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries
    • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
    • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast
     
    ► Keep getting this insider knowledge, join us on social:
    • Follow us on Twitter: https://twitter.com/MSFTMechanics 
    • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/
    • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/
    • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

    • 7 min
    • video
    Extend your data security to Microsoft Fabric

    Extend your data security to Microsoft Fabric

    A unified solution for comprehensive data protection with Microsoft Fabric and Microsoft Purview. Extend the security measures of Microsoft 365 to your schematized data, ensuring consistent protection across your entire data estate. From detecting insider risks to mitigating data loss and unauthorized sharing, leverage advanced visibility and control to safeguard sensitive information effectively.
    Daniel Hidalgo, Microsoft Purview Product Manager, shares how to simplify your security strategy and gain deeper insights into data risks.
     
    ► QUICK LINKS: 
    00:00 - Unified solution to prevent data loss and detect data risk
    01:36 - Microsoft Fabric experience
    02:53 - Confidential labels are automatically inherited
    03:16 - Detect sensitive information with DLP policies
    04:03 - Create and publish a label
    04:59 - Define protections
    05:50 - Data Loss Prevention experience in Microsoft Purview
    06:57 - Insider Risk Management with Microsoft Fabric
    07:39 - Visibility of sensitive data with Microsoft Purview
    08:19 - Wrap Up
     
    ► Link References:
    Check out https://aka.ms/PurviewforFabric
    Watch our shows on Insider Risk Management, check out https://aka.ms/IRMMechanics 
     
    ► Unfamiliar with Microsoft Mechanics? 
    As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.
    • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries
    • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
    • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast
     
    ► Keep getting this insider knowledge, join us on social:
    • Follow us on Twitter: https://twitter.com/MSFTMechanics 
    • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/
    • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/
    • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

    • 8 min
    • video
    Introducing Microsoft Surface Pro 10 and Surface Laptop 6 for Business

    Introducing Microsoft Surface Pro 10 and Surface Laptop 6 for Business

    The new Microsoft Surface Pro 10 and the latest Surface Laptop 6 are versatile AI PCs built for business. With the new Microsoft Copilot key built-in, you get quick access to Copilot AI experiences, so you can work smarter, be more productive, and boost creativity. Both are powered by the latest Intel Core Ultra processors, with integrated CPU and GPU, as well as a neural processing unit (NPU) for powering new AI experiences without affecting the CPU.
    Both devices feature Windows Hello Enhanced Sign-in Security, perfect for multi-factor authentication; and Surface Pro 10 now has a built-in NFC card reader in Wi-Fi models, plus select Surface Laptop 6 15" models have a built-in smart card reader for more authentication options. The Surface Laptop 6 has options for powerful Intel Core Ultra H-Series processors with integrated Intel Arc graphics.
    ► QUICK LINKS:
    00:00 - What's new for Surface Pro 10 and Surface Laptop 6 
    00:10 - Microsoft Copilot key built-in
    00:33 - Security updates in Surface Pro 10 and Surface Laptop 6
    01:09 - Versatility updates with Surface Pro 10 and Surface Laptop 6
    01:52 - Performance updates with Surface Pro 10 and Surface Laptop 6
    02:15 - Cloud PC experiences built in to Surface Pro 10 and Surface Laptop 6
    02:46 - Management controls updated for Surface Pro 10 and Surface Laptop 6
    04:04 - Repairability updates with Surface Pro 10 and Surface Laptop 6
    04:26 - Surface Pro 10 and Surface Laptop 6 are built for business and AI
    04:40 - Wrap Up
     
    ► Link References:
    Check out https://surface.com/business
     
    ► Unfamiliar with Microsoft Mechanics? 
    As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.
    • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries
    • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
    • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast
     
    ► Keep getting this insider knowledge, join us on social:
    • Follow us on Twitter: https://twitter.com/MSFTMechanics 
    • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/
    • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/
    • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

     

    • 4 min
    • video
    Insider Risk in Conditional Access | Microsoft Entra + Microsoft Purview Adaptive Protection

    Insider Risk in Conditional Access | Microsoft Entra + Microsoft Purview Adaptive Protection

    Protect your organization from insider threats with Microsoft Entra's Conditional Access and Adaptive Protection in Microsoft Purview. Automatically block access to critical assets when insider risk levels elevate, ensuring data security and compliance seamlessly. Set up custom policies based on risk levels and enforce strong authentication measures, safeguarding against data breaches. Gain control and visibility over insider activities without manual intervention, empowering proactive security measures.
    Erin Miyake, Microsoft Purview’s Principal Product Manager shares how to enhance your data protection strategy.
     
    ► QUICK LINKS: 
    00:00 - Insider Risk in Conditional Access
    00:41 - Extend Conditional Access
    01:20 - Privacy-first approach
    01:56 - Configure policy indicators
    03:21 - Adapt protections based on changing risk
    04:13 - Set custom policies
    05:27 - Set a Conditional Access policy for moderate risk users
    06:12 - Insider risk level changing over time
    07:04 - Wrap Up
     
    ► Link References:
    For more about the policies you can set up go to https://aka.ms/IRM Mechanics
    Get started today at https://aka.ms/adaptiveprotection 
    Watch our series on Insider Risk Management at https://aka.ms/IRMMechanics
     
    ► Unfamiliar with Microsoft Mechanics? 
    As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.
    • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries
    • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
    • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast
     
    ► Keep getting this insider knowledge, join us on social:
    • Follow us on Twitter: https://twitter.com/MSFTMechanics 
    • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/
    • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/
    • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

    • 7 min
    • video
    Protect data used in prompts with common AI apps | Microsoft Purview

    Protect data used in prompts with common AI apps | Microsoft Purview

    Protect data while getting the benefits of generative AI with Microsoft Defender for Cloud Apps and Microsoft Purview. Safeguard against shadow IT risks with Microsoft Defender for Cloud Apps, unveiling hidden generative AI applications. Leverage Microsoft Purview to evaluate data exposure, automating policy enforcement for enhanced security. Ensure compliance with built-in data protections in Copilot for Microsoft 365, aligned with organizational policies set in Microsoft Purview, while maintaining trust and mitigating risks seamlessly across existing and future cloud applications.
    Erin Miyake, Microsoft Purview's Principal Product Manager, shares how to take a unified approach to protecting your data.
    ► QUICK LINKS: 
    00:00 - Secure your data for generative AI
    01:16 - App level experiences
    01:46 - Block based on data sensitivity
    02:45 - Admin experience
    03:57 - Microsoft Purview AI Hub
    05:08 - Set up policies
    05:53 - Tailor policies to your needs
    06:35 - Set up AI Hub in Microsoft Purview
    07:09 - Wrap Up
     
    ► Link References:

    For information on Microsoft Defender for Cloud Apps go to https://aka.ms/MDA
    Check out Microsoft Purview capabilities for AI go to https://aka.ms/PurviewAI/docs
    Watch our episode on Copilot for Microsoft 365 data protections at https://aka.ms/CopilotAdminMechanics
    Watch our episode about Data Loss Prevention policy options at https://aka.ms/DLPMechanics
     
    ► Unfamiliar with Microsoft Mechanics? 
    As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.
    • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries
    • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
    • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast
     
    ► Keep getting this insider knowledge, join us on social:
    • Follow us on Twitter: https://twitter.com/MSFTMechanics 
    • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/
    • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/
    • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

    • 7 min
    • video
    Security Exposure Management

    Security Exposure Management

    Transform your security posture to stop attacks before they happen using Microsoft's Security Exposure Management in Microsoft Defender. Identify and mitigate potential threats with a comprehensive view of your organization's attack surface, critical assets, and security events. Prioritize security efforts effectively with curated initiatives, automated alerts, and actionable insights, so you can close down vulnerabilities before they're exploited.
    Brjann Brekkan, Microsoft’s Exposure Management Director, shows how to gain control over your security landscape and stay ahead of emerging threats.
     
    ► QUICK LINKS:
    00:00 - Prevent incidents before they happen 
    00:39 - Unify data and signals with Security Exposure Management
    02:07 - See the experience in the Microsoft Defender portal
    02:56 - Identify business critical data and sensitive information
    03:33 - Key initiatives
    04:17 - Assign an initiative owner
    05:07 - Visual mapping of potential attack paths 
    07:05 - Wrap Up
     
    ► Link References: 
    Sign up for the preview at https://aka.ms/ExposureManagementpreview 
    Check out https://aka.ms/ExposureManagementdocs
     
    ► Unfamiliar with Microsoft Mechanics? 
    As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.
    • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries
    • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog
    • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast
     
    ► Keep getting this insider knowledge, join us on social:
    • Follow us on Twitter: https://twitter.com/MSFTMechanics 
    • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/
    • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/
    • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

    • 7 min

Top Podcasts In News

Genstart
DR
Tiden
DR
DET BILLIGE SKIDT MED HOLM OG KLEIN
Radio4
Serial
Serial Productions & The New York Times
Borgerlig Tabloid
B.T.
Stjerner og striber
DR

You Might Also Like

Windows Weekly (Audio)
TWiT
Microsoft Cloud IT Pro Podcast
Ben Stegink, Scott Hoag
TechCrunch Daily Crunch
TechCrunch
This Week in Tech (Audio)
TWiT
The AI Podcast
NVIDIA
a16z Podcast
Andreessen Horowitz