Reality looks better in post

Proof we're not bluffing

Here’s the evidence. Brand pieces so bold they’ve been asked to tone it down, demos that could teach a goldfish cloud computing, and digital events that made audiences put down their @#$% phones. Every video here was built to grab attention, spark curiosity, and lodge itself in memory like a souvenir you’re strangely attached to. We’re talking craft, care, and the occasional flourish made purely to amuse ourselves. Proof we’re not bluffing—because who has time to fake this many good videos without winning an award or two?

April 2023
Microsoft Security
Microsoft Defender for Office 365: Preset security policies
Animations
Full playlist
Kilronan
Preset security policies in Microsoft Defender for Office 365 apply recommended protections org-wide in a few clicks—and stay updated automatically. Learn more at aka.ms/Presets.

As the threat landscape evolves (and generally refuses to stop evolving), this animation explains how preset security policies in Microsoft Defender for Office 365 help organizations maintain a strong security posture by automatically enabling Microsoft-recommended controls and settings. It contrasts deeply customizable policies—which can drift over time and quietly reduce protection—with presets that apply recommended spam, malware, phishing, Safe Links, and Safe Attachments protections across the entire organization in just a few clicks. It also emphasizes that presets are regularly updated based on Microsoft’s observations and new capabilities—balancing protection and productivity—so you stay current without constant upkeep. The how-to is straightforward: in the Preset security policies page, choose “Manage protection settings” under Standard or Strict (Standard for most users, Strict for priority users), select “All recipients” to automatically include new users and groups, and you’re covered—ending with the CTA aka.ms/Presets.

We produced this as a clarity-first explainer that makes “security policy maintenance” feel less like an endless chores list and more like a smart shortcut. We structured the story around one core relief: stop babysitting individual settings and stay aligned with recommended protections as they evolve. Then we brought it to life with professional voiceover, supportive music, and clean motion that keeps the concepts readable—finishing with sound polish so every product name and key benefit lands crisp. After streamlined review loops, we delivered the full package: closed captions, audio description, and thumbnails.

true
April 2023
Microsoft Security
Microsoft Defender for Office 365: Priority account protection
Animations
Full playlist
Kilronan
A quick overview of priority account protection in Microsoft Defender for Office 365—extra scrutiny for high-value users to catch targeted phishing fast. aka.ms/PriorityAccounts.

Priority accounts are the crown jewels—executives, leaders, and high-impact roles that attackers love because one compromised account can open a lot of doors. This animation introduces priority account protection in Microsoft Defender for Office 365 as a way to automatically identify those key people and give their email extra attention. It highlights how Defender applies heightened scrutiny and reporting to messages involving priority accounts, helping security teams spot targeted phishing, business email compromise attempts, and suspicious communication patterns faster—then points viewers to learn more via aka.ms/PriorityAccounts.

We produced this as a short, executive-aware explainer that keeps the message sharp and the stakes clear. We shaped the story around the “why this matters” moment first, then paced the visuals so the feature feels simple to adopt rather than “another thing to configure.” Professional voiceover, supportive music, and clean animation keep it confident and easy to follow, while sound polish ensures the key phrases land crisp—because priority protection shouldn’t sound optional. After streamlined review loops, we delivered the full package with closed captions, audio description, and thumbnails.

true
April 2023
Microsoft Security
Microsoft Defender for Office 365: Email entity
Animations
Full playlist
Kilronan
A quick tour of the Microsoft Defender for Office 365 email entity page—timelines, actions, and detonation details that speed investigations. Learn more at aka.ms/EmailEntity.

This animation introduces the email entity page in Microsoft Defender for Office 365 as a one-stop, human-readable view of an email’s history and key details—built for faster incident response and threat hunting. It highlights the delivery timeline (user, admin, and system actions), the ability to preview/download/take action right in place (like deleting the email or blocking the sender), and detonation details for zero-day threats in attachments or URLs—complete with forensic info and screenshots. It also notes the page is available across Defender for Office 365 experiences (alerts/incidents, Threat Explorer, and more) and is accessed via “Open email entity,” with a CTA to aka.ms/EmailEntity.

We produced this as a crisp, UI-led explainer that makes a feature feel instantly useful. The structure is intentionally “show, then reassure”: we frame the problem (time-consuming investigations), then walk viewers through the page’s key capabilities in a steady, readable sequence. Pro voiceover keeps the pace confident, animation clarifies where the clicks happen, and sound polish makes the whole piece feel sharp and premium without getting loud about it. Delivered with closed captions, audio description, and thumbnails—ready to deploy wherever your security audience needs a faster path to answers.

true
April 2023
Microsoft Security
Microsoft Defender for Office 365 and Microsoft Teams explainer
Animations
Full playlist
Kilronan
A clear explainer on securing Microsoft Teams with Microsoft 365 Defender—Safe Links, auto-purge, and unified XDR—ending with a CTA to aka.ms/MDO.

Remote and hybrid work are here to stay—and so is Microsoft Teams—which makes it a vital collaboration tool…and a shiny new attack vector. This animation explains how adversaries use phishing in Teams to gain access and move laterally, then introduces collaboration security for Microsoft Teams as part of Microsoft 365 Defender’s industry-leading XDR across endpoints, identities, email, and cloud apps. It highlights Safe Links to verify (and block) malicious URLs before users click, user reporting and tagging of suspicious Teams messages to feed the Microsoft 365 Defender unified investigation experience, and visibility across the full attack chain for faster response. It also calls out zero-hour auto-purge to analyze Teams messages post-delivery and automatically quarantine malicious items, plus simulations that build employee resilience. The close is a clear next step: protect critical collaboration tools with Microsoft Defender for Office 365—aka.ms/MDO.

We produced this as a tight, security-forward animation that keeps complex ideas crisp and watchable—no “wall of acronyms” allowed unless it’s behaving and wearing a badge. We shaped the story into clean beats, planned the pacing so each capability lands without sprinting past comprehension, then recorded professional voiceover and paired it with music that supports the momentum. From there we illustrated and animated each moment with purposeful motion, finishing with sound design tuned for clarity—because if the VO gets muddy, the message does too. After streamlined review loops, we delivered the final with closed captions, audio description, and thumbnails—ready to deploy wherever your audience is clicking links they absolutely shouldn’t.

true
April 2023
Windows
Behind the Screens: Windows Autopatch
Digital events
Full playlist
Linstock
Customer feedback on Windows Autopatch plus Forrester TEI highlights—control without the chaos, Autopatch groups, better reporting, and a security-driven path to 95%+ compliance.

In this episode of Windows Autopatch: Behind the Screens, Lior Bela brings in Mike Hildebrand and Michael Cureton to share customer feedback and break down the newly released Forrester Total Economic Impact study on Windows Autopatch. They talk candidly about the biggest adoption hurdle—fear of losing control—and why that fades once customers see Autopatch isn’t a “big bang” switch: you can onboard gradually, pause when needed, and back out if something isn’t working. They also highlight what customers keep asking for (more control and better reporting), how Autopatch groups help tune feature/quality update cadence, and why the security story matters—faster time to compliance and clearer visibility, with the TEI study noting customers reaching 95%+ patch compliance.

We produced this like a good behind-the-scenes segment should feel: short, human, and grounded in real-world experience, not brochure-speak. We shaped the conversation to move from “here’s what customers worry about” to “here’s what they actually get,” then kept the edit snappy so the key takeaways land without wandering. Finally, we packaged it for streaming and replay—clean graphics, clear audio, and a smooth delivery that makes the message easy to share internally.

false
March 2023
Microsoft Security
Microsoft Sentinel: Monitor health and integrity of analytics
Demo videos
Full playlist
Sandgate
Enable Sentinel analytics rule auditing and health monitoring—use workbooks and SentinelHealth/SentinelAudit queries to spot failures, trace changes, and troubleshoot fast.

This demo shows how to enable auditing and health monitoring for Microsoft Sentinel analytics rules, then use the resulting Log Analytics data to troubleshoot problems fast. It walks through turning the feature on from the Settings page (Auditing and health monitoring), optionally configuring diagnostic settings, and choosing where diagnostics data is sent (Log Analytics by default, with options like Storage, Event Hub, or partner solutions). From there, it tours the built-in Health and audit workbook under Analytics workbooks—using Overview, Health, and Audit tabs to visualize rule status, failures/warnings, and rule create/update/delete activity. Finally, it drops into Logs to show the two key tables—SentinelHealth (rule run status and error messages) and SentinelAudit (who changed what and when)—and demonstrates querying them to pinpoint when a specific rule broke and which edit likely caused it.

We produced this as a practical, follow-along troubleshooting walkthrough: we planned the story around the exact admin path (enable→visualize→query→diagnose), captured clean portal screens so every setting and table name is easy to read, and shaped the edit to highlight the “needle-moving” moments—where you confirm failures, correlate changes, and get to the fix without wandering. The result is a crisp demo that helps SecOps teams maintain rule reliability, spot regressions early, and keep Sentinel detections running with fewer surprises. Final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft Defender for Office 365: Workflow
Animations
Full playlist
Sandgate
A clear walkthrough of Microsoft Defender for Office 365 incident workflow—detect, investigate, remediate, and learn—keeping context unified to speed response.

Microsoft Defender for Office 365 doesn’t just detect threats—it’s built to move them through a full incident response workflow without dropping context along the way. This animation walks through how email-based threats are discovered and handled across Microsoft 365 Defender: attacks are identified through signals like user submissions, automated detections, and investigations, then analyzed to determine the scope and impacted users. From there, the workflow shows response actions (blocking senders, removing messages, updating policies, taking remediation steps), plus continuous learning—where intel from incidents feeds back into improved detections and protection. The goal is simple: reduce time to detect and time to respond by keeping everything connected inside a unified experience.

We produced this as a process-led explainer—because the story here isn’t one feature, it’s the flow. We shaped the narrative then designed visuals that keep the viewer oriented as the workflow moves between stages. Professional voiceover, steady music, and clean animation make the steps easy to follow at a glance, while sound design and timing help the key moments land without getting noisy. After streamlined review loops, we delivered the full package—closed captions, audio description, and thumbnails—ready to help audiences understand not just what the product does, but how it behaves when things go sideways.

false
March 2023
Microsoft Security
Microsoft Defender for Office 365: Using the Microsoft delisting service
Demo videos
Full playlist
Sandgate
Remove a blocked sending IP—verify the server isn’t compromised, submit the IP at sender.office.com, confirm by email, then delist and restore Microsoft 365 delivery.

This video walks through using the Microsoft Delisting Service to remove a mail server IP from Microsoft’s blocked-senders list when messages to Microsoft 365 users fail with an NDR like “Access denied. Banned sending IP.” It explains why an IP gets blocked (signals like high volumes of phishing/spam implying compromise or abuse), and strongly recommends checking the server for indicators of compromise and reviewing other deny lists before requesting delisting—otherwise you’ll boomerang right back onto the block list. The demo then shows the exact steps: open sender.office.com, enter the email address that received the error and the blocked IP, complete the captcha, confirm via the email you receive, and select Delist IP address—allowing up to 24 hours for changes to propagate across Microsoft’s infrastructure.

We produced this as a step-by-step “get unblocked safely” walkthrough—focused on the decision point that matters (verify you’re not compromised) and the few fields that must be correct for delisting to work. The video pacing is tuned for follow-along, with clean callouts around confirmation and expected propagation time, and final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft Defender for Office 365: The unified SecOps experience
Demo videos
Full playlist
Sandgate
Explore Defender for Office 365 in the unified Defender portal—investigate email threats through correlated incidents, richer email details, and faster pivots to containment and remediation.

This demo introduces Microsoft Defender for Office 365 inside the unified Microsoft 365 Defender portal, focusing on what changes when email security stops living on its own little island. It shows how email and collaboration threats now roll up into the same incident-driven workflow used across endpoints and identities—so alerts correlate into a single incident with shared context. The walkthrough highlights the improved investigation experience: richer email entity details (authentication checks, detection methods, policy overrides), easier pivots into mailbox and campaign views, and faster paths from “this looks bad” to “contain, remediate, and confirm.” The emphasis is on fewer disconnected alerts, better story-building across domains, and a simpler operational loop for SecOps teams.

We produced this as a platform shift explained like a workflow, not a press release. We choreographed the portal tour to follow how analysts actually investigate, kept the visuals tight on the new views and pivots that matter, and shaped the edit so the benefits land as practical outcomes—less context switching, clearer incidents, and smoother remediation. Final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft Defender for Office 365: Migration
Animations
Full playlist
Sandgate
A practical migration guide for Microsoft Defender for Office 365—pilot with passive and active protection, ramp SecOps early, and avoid risky MX “big bang” cutovers.

This animation explains a smarter way to migrate to Microsoft Defender for Office 365 without torching user trust on day one. It calls out the common “copy the old rules, flip the MX record, hope for the best” approach—and why it backfires in complex environments: teams carry over allow rules and overrides they don’t fully understand, and SecOps often gets pulled in too late, which slows remediation and raises risk. Instead, it recommends piloting Defender for Office 365 on real traffic using enhanced filtering for connectors plus scoped policies, putting users and groups into passive protection (verdicts only) or active protection (verdicts plus actions). Over time, you can move your legacy filtering system into passive mode, compare misses across both systems, ramp SecOps ahead of the MX change, and migrate at a pace the organization is comfortable with. It closes by pointing to a detailed guide covering three phases: preparing for migration, setting up Defender for Office 365, and onboarding.

We produced this as a clarity-first explainer that turns a high-stakes security change into a calm, repeatable process. We shaped the story around the two pitfalls and the safer alternative, then paced the visuals so each step—pilot, passive vs active, gradual transition, MX switch readiness—lands cleanly without requiring a pause button. Professional voiceover, supportive music, and disciplined motion keep it approachable, while sound polish makes every key term and product name unmistakable. Final delivery included closed captions, audio description, and thumbnails—ready to deploy wherever your audience is planning the migration.

false
March 2023
Microsoft Security
Microsoft Defender for Office 365: Evaluation and trials
Demo videos
Full playlist
Sandgate
Evaluate Defender for Office 365 on production mail flow—enable evaluation mode, choose audit or blocking, review detected threats in reports and Explorer, then convert to standard protection.

This demo shows how to evaluate Microsoft Defender for Office 365 using real production mail flow—with minimal impact on end users. It explains why synthetic testing and journaling fall short, then introduces evaluation mode, which automatically provisions Defender for Office 365 Plan 2 licensing and creates dedicated evaluation policies for anti-phishing, Safe Attachments, and Safe Links. The walkthrough starts from the Microsoft 365 Defender trial banners and the Trials page, then sets up the trial by choosing audit-only mode or active blocking (block is recommended) and selecting which users to include (ideally all users, though you can limit the scope). After setup, it points viewers to the trial user guide and playbook, shows where to view detected threats and manage evaluation settings, and explains how to convert an audit evaluation into standard protection using recommended policy templates. It also demonstrates opening chart details in the Threat protection status report and reinforces that you can use Explorer/Threat Explorer to hunt and investigate real threats during the evaluation, then wraps with the “buy a paid subscription” path in the Microsoft 365 admin center.

We produced this as a practical product trial walkthrough: we organized the story around the few decisions that matter (audit vs block, user scope, where to read results), captured clean portal navigation with precise callouts, and edited for clarity so admins can follow the setup once and replicate it confidently. The payoff is a smooth evaluation experience that shows Defender for Office 365 working on real mail—complete with reports, hunting, and investigation tooling—while keeping your production environment calm and your conclusions defensible. Final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft Defender for Office 365: Attack simulation training
Demo videos
Full playlist
Sandgate
Run Attack simulation training in Defender—launch credential-harvest sims, assign targeted training, review compromised trends, customize payloads and indicators, and automate recurring simulations at scale.

Attack simulation training in the Microsoft 365 Defender portal is a phish risk-reduction tool that helps you run realistic simulations, measure phishing awareness, deliver targeted training, and track behavior change over time. The video walks through the Attack simulation training dashboard (recent simulations, completion rates, compromised rate trends, repeat offenders by attack type), then demos how to launch a simulation using the Credential Harvest technique with the built-in “2 Failed Messages” payload—selecting target users, assigning training, customizing the training experience, and scheduling launch details. It also shows how to create custom payloads by copying an existing one, editing sender info, links, tags, language, and the email body, adding landing-page indicators, and setting up simulation automations (up to 10 payloads) plus payload automations that harvest real-world-style payloads from your mail flow.

We produced this as a streamlined product demo—from preproduction (nailing the goals, writing the script, and mapping every click) to production (clean screen captures, pro voiceover, and music that keeps the pace lively) to post (tight editing, clear callouts, and zero “demo tenant grime”). The result is a demo that’s easy to follow, suspiciously pleasant to watch, and optimized for retention—more key details, less onscreen flailing, and a story that makes your product feel confident, capable, and downright shiny.

true
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.