Podcast

The Sams Report EP 45: White Bands With Internal Angst, More Ads Maybe

The Sams Report Hero 16x9

The Sams Report is a weekly podcast that dives deep into the world of Microsoft. With the company transforming the way it operates and Nadella putting his own touch on all aspects of the organization, the Sams Report breaks down the news and offers insight from insider sources.

On this episode, I cover all of the Microsoft news this week including some internal musing, the company is trying more ads on the desktop, NYC trip, year end and a lot more.

If you have any questions, you can join the chat room or find me on Twitter @bdsams.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

You can find an audio replay, here.

RSS | SoundCloud | YouTube | iTunes | Google Play

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: