Episode
What's New in PowerShell v5
Would you like to learn about the latest and greatest features that Microsoft has built into PowerShell Version 5? Join Lex Thomas and Ashely McGlone as they discuss the new features in PowerShell including changes in security, scripting, debugging, and administration role management, along with the PowerShell Gallery, ScriptAnalyzer, DSC and much, much more!
Send your comments or questions to the "Taste of Premier" Podcast show!
Follow the conversation @TasteofPremier
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________
Websites & Blogs:
Videos:
- Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and Tasks
- Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware
- How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
- Securing your Desktop: How a Threat Becomes a Security Patch
- Microsoft Security Risk Assessment - How to Optimize Your IT Security Program
- Microsoft Threat Detection Service Overview
- Cybersecurity Incident Response
- Securing Your Active Directory Environment
- Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
- Proactively Secure your IT Environment from Credential Theft with POP-SLAM
- Ransomware 101: How to Protect and Mitigate your environment from Malware
Would you like to learn about the latest and greatest features that Microsoft has built into PowerShell Version 5? Join Lex Thomas and Ashely McGlone as they discuss the new features in PowerShell including changes in security, scripting, debugging, and administration role management, along with the PowerShell Gallery, ScriptAnalyzer, DSC and much, much more!
Send your comments or questions to the "Taste of Premier" Podcast show!
Follow the conversation @TasteofPremier
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________
Websites & Blogs:
Videos:
- Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and Tasks
- Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware
- How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
- Securing your Desktop: How a Threat Becomes a Security Patch
- Microsoft Security Risk Assessment - How to Optimize Your IT Security Program
- Microsoft Threat Detection Service Overview
- Cybersecurity Incident Response
- Securing Your Active Directory Environment
- Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
- Proactively Secure your IT Environment from Credential Theft with POP-SLAM
- Ransomware 101: How to Protect and Mitigate your environment from Malware
Have feedback? Submit an issue here.