Reality looks better in post

Proof we're not bluffing

Here’s the evidence. Brand pieces so bold they’ve been asked to tone it down, demos that could teach a goldfish cloud computing, and digital events that made audiences put down their @#$% phones. Every video here was built to grab attention, spark curiosity, and lodge itself in memory like a souvenir you’re strangely attached to. We’re talking craft, care, and the occasional flourish made purely to amuse ourselves. Proof we’re not bluffing—because who has time to fake this many good videos without winning an award or two?

March 2023
Microsoft Security
Microsoft Defender Vulnerability Management
Demo videos
Full playlist
Sandgate
Use Defender Vulnerability Management to reduce exposure—prioritize recommendations, request remediation via Endpoint Manager or ServiceNow, track exceptions, and monitor vulnerable software fast.

Microsoft Defender Vulnerability Management offers intelligent assessments, risk-based prioritization, and built-in mitigation and remediation tools—all from the Microsoft 365 Defender portal. This video stays focused on the dashboard experience: it explains the Exposure score (lower is better) and what goes into it (weaknesses, breach likelihood, device value, and alerts), then shows how to improve that score using top security recommendations sorted by exposure impact. It highlights quick context you get directly in the recommendations list—active alerts and threat insights like publicly available exploit kits—then drills into a recommendation to review impacted devices, addressed vulnerabilities, and the software page (including where an app is installed and the expected user impact based on 30 days of machine analysis). The tour also covers Microsoft Secure Score for Devices (configuration-focused hardening recommendations), requesting remediation tickets in Microsoft Endpoint Manager or ServiceNow, creating scoped time-bound exceptions with justification, tracking remediation progress and exceptions, using Exposure distribution to jump into filtered device inventory, and reviewing Top vulnerable software plus the Inventories page for weaknesses, active threats, and exposed device counts. It closes by calling out an add-on with expanded capabilities like consolidated inventories, blocking vulnerable app versions, and compliance monitoring against benchmarks and custom baselines.

We produced this as a paced, clarity-first demo that turns a dense admin dashboard into a story you can follow—without losing the technical substance. In preproduction we mapped the narrative arc, then in production we captured clean UI with professional voiceover and music that supports momentum. In post, we tightened the flow around the moments that matter—impact, evidence, and next steps—so your audience comes away remembering how to act, not just what they saw. After review rounds, we deliver the finished video with closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft Defender for Cloud Apps: Protecting cloud apps in Microsoft 365 Defender
Demo videos
Full playlist
Sandgate
Meet Microsoft Defender for Cloud Apps—discover shadow IT, monitor SaaS activity, assess risk, and apply controls that improve visibility and reduce cloud-app exposure.

This demo introduces Microsoft Defender for Cloud Apps (often referred to as “MDA”) and how it strengthens visibility and control over SaaS usage in your organization. It highlights discovering cloud apps in use (shadow IT), assessing risk, monitoring activity, and applying governance controls to reduce exposure. The video positions MDA as a way to connect signals across your security stack—so you can detect risky app behavior, investigate incidents with richer app context, and take action through policies that help prevent data loss or unwanted access patterns.

We produced this as a straightforward platform overview—built to make a broad product feel concrete. We shaped the story around real outcomes (visibility, risk reduction, control), used clean UI capture and steady narration to keep it approachable, and edited for momentum so viewers can absorb the “what” and “why” quickly. Final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft 365 Defender: Unpacking JSON in KQL
Demo videos
Full playlist
Sandgate
Unpack JSON in Advanced Hunting—use parse_json/todynamic and bag_unpack to turn fields like AdditionalFields into readable columns, avoid name collisions with prefixes, and hunt faster.

This tutorial shows how to extract useful fields from JSON strings in Advanced Hunting using Kusto Query Language. It explains JSON basics (key-value pairs in quotes, lists in brackets) and points out that most hunting columns are scalar, but some—like AdditionalFields—contain packed JSON that’s hard to work with in a grid. The demo converts the JSON string into a dynamic value using parse_json (also known as todynamic), then uses dotted notation to extend individual members into new columns (for example, pulling out ClassName, ClassId, DeviceId, DeviceDescription, and VendorIds). It also notes an important limitation: you can’t summarize/aggregate on dynamic values, but you can convert back to string with tostring when needed. To make the extraction cleaner, it demonstrates bag_unpack as a simpler way to expand all members into columns, and solves duplicate-column-name errors by using the bag_unpack prefix parameter (adding a prefix like AdditionalFields to each unpacked field).

We produced this as a compact “learn one trick, unlock a lot” tutorial. The visuals are deliberately close on the result grid and query edits so viewers can follow the transformation from unreadable blob to usable columns, and the pacing slows briefly on the two gotchas that actually bite people (dynamic type behavior and name collisions). Final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft 365 Defender: Unified submissions
Demo videos
Full playlist
Sandgate
Manage Defender submissions in one place—enable user reporting, review message details, submit emails/attachments/URLs/files to Microsoft for analysis, and track results end-to-end.

This demo tours the new unified Submissions experience in the Microsoft 365 Defender portal—the single Submissions page where SecOps can manage user-reported messages plus admin submissions for emails, email attachments, URLs, and files. It starts on the User reported messages tab (Explorer-like list view), then shows the required configuration to enable user reporting and decide where reports go (Microsoft, a mailbox you choose, or both—along with the note that submissions sent to Microsoft include the message as-is). From an individual reported message, it reviews the details pane (reported message details, delivery details, threat type, delivery action, plus extracted URLs and attachments) and calls out whether the item has been converted to an admin submission. It then moves into the admin submission tabs—Emails (submit by network message ID or upload an email file, flag false positive/negative, and optionally allow similar emails temporarily), Email attachments (upload the file), URLs (submit and track analysis), and Files (upload up to 500 MB, categorize as malware/unwanted software/clean, choose priority with a limit of three high-priority submissions per day, add notes, and submit).

We produced this as a “one page, all submissions” walkthrough that keeps the interface—and the decision points—easy to absorb. The script is built around the real sequence analysts follow (review, validate, submit, track), the screen capture stays tight on the fields that matter, and the edit trims away navigation drift so viewers come away knowing exactly where to go and what levers to pull. Final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft 365 Defender: Threat analytics
Demo videos
Full playlist
Sandgate
Use Threat analytics in Microsoft 365 Defender to spot active threats, read analyst reports, review incidents and impacted assets, and follow mitigations via Defender Vulnerability Management.

Threat analytics in Microsoft 365 Defender is presented as built-in threat intelligence that helps security teams respond to emerging, high-risk threats without spelunking through five different portals and a haunted spreadsheet. The video shows where to find it (top nav, plus a home-page card that flags threats active on your network) and what you get when you open a threat: a short summary, an Alerts over time view spanning active and resolved alerts, and posture insights that include email detections and mitigations alongside endpoint data. It then walks through the analyst report from the Microsoft Threat Intelligence team—deep-dive analysis that can include attack-chain diagrams, MITRE techniques, recommended mitigations, detection details, and sometimes Advanced Hunting queries—before exploring the threat-specific tabs: Related incidents, Impacted assets (devices and mailboxes with trending charts), Prevented email attempts (delivery actions/locations), and Exposure and mitigations with links into Microsoft Defender Vulnerability Management for secure configuration and vulnerability insights.

We produced this as a “read, assess, act” demo that keeps the workflow crisp: understand the threat, see your exposure, and move straight into remediation. In preproduction we shaped the narrative around what security teams actually need in the moment, in production we captured clean screens with professional voiceover and paced music, and in post we trimmed the noise so the tabs, charts, and next steps land quickly. The result is a walkthrough that helps viewers turn threat intel into action—faster incident handling, clearer asset impact, and a tighter feedback loop on mitigations—delivered with closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft 365 Defender: Using Advanced Hunting
Demo videos
Full playlist
Sandgate
Get started with Advanced hunting in Microsoft 365 Defender—query cross-domain telemetry with KQL, pivot from incidents into hunts, and uncover related activity faster.

This demo introduces Advanced hunting in Microsoft 365 Defender as the place you go when you need answers that dashboards can’t give you yet. It frames hunting as proactive investigation—querying raw telemetry across endpoints, identity, email, cloud apps, and more—then walks through the Advanced hunting experience: choosing from built-in schemas/tables, writing KQL queries, and iterating quickly using the results grid. The video highlights common analyst moves like filtering by time window, pivoting from entities and incident evidence into hunts, and using query results to scope an investigation, validate hypotheses, and uncover related activity that may not have been surfaced as an incident.

We produced this as an on-ramp that makes hunting feel approachable rather than intimidating. Preproduction shaped the story around how analysts actually work (start broad, refine, follow the evidence), production captured clean screens with steady, plain-English narration, and post kept the pace brisk while still letting key concepts land. Final delivery includes closed captions, audio description, and thumbnails.

true
March 2023
Microsoft Security
Microsoft 365 Defender: Optimizing KQL queries
Demo videos
Full playlist
Sandgate
Optimize Advanced Hunting KQL—add early time filters, use efficient string operators, reduce result sets with count, and build smarter joins to avoid slow queries and timeouts.

This tutorial demonstrates how to optimize Kusto Query Language (KQL) for Advanced Hunting in Microsoft 365 Defender so queries run faster and avoid timeouts—especially at enterprise scale. It begins with an intentionally slow join between IdentityLogonEvents and IdentityInfo, then shows how to use the execution-time and resource-usage indicator (low/medium/high) plus count to spot overly broad queries. The core guidance is to filter early—especially with time filters, since KQL is highly optimized for them—using conditions like “greater than 1 hour ago” or a bounded window with between. It then covers practical operator choices: prefer has over contains when you’re matching full tokens, use case-sensitive operators where possible (has_cs, equals vs equals~), and treat joins with care by filtering the left table first, placing the smaller table on the left, and understanding join behavior—default innerunique can de-duplicate and hide useful duplicates, so an inner join may be safer when duplicate join keys matter (like multiple attachments).

We produced this as a performance-minded training clip—designed to teach a repeatable mental model, not just a bag of tricks. The pacing intentionally shows the “before” pain, then the “after” improvement, with clean callouts for what changed and why it helped. The result is a tutorial viewers can apply immediately to their own hunts—faster results, fewer resource spikes, and a smoother path to meaningful findings. Final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft 365 Defender: Unified RBAC
Demo videos
Full playlist
Sandgate
Simplify permissions with Unified RBAC in Microsoft 365 Defender—centralize role assignments, enforce least privilege, and keep access consistent across Defender tools.

This video introduces Unified role-based access control (RBAC) in Microsoft 365 Defender—one permissions model designed to simplify access management across Defender experiences. It explains how unified RBAC helps you centralize role assignments, reduce inconsistent permissions across tools, and apply least-privilege access with clearer governance. The demo shows where unified RBAC lives in the Defender portal, how roles map to security functions, and how admins can assign and manage roles so the right people can see and do the right things—without granting everyone the keys to the entire SOC spaceship.

We produced this as a clarity-first admin explainer: the narrative focuses on the “why” (simpler governance, consistent access) while the visuals show the “where” and “how” in the portal. Postproduction keeps the pacing crisp so the concept lands quickly and viewers leave with a usable mental model. Final delivery includes closed captions, audio description, and thumbnails.

true
March 2023
Microsoft Security
Microsoft 365 Defender: Microsoft Graph security API
Demo videos
Full playlist
Sandgate
Learn how to integrate apps with Microsoft 365 Defender via Microsoft Graph Security API—register an Azure AD app, set permissions, authenticate with OAuth, and query incidents.

This demo explains how Microsoft 365 Defender APIs are moving to the Microsoft Graph Security API—and how you can use Graph to automate workflows and integrate your own apps with Microsoft 365 Defender. It breaks down the mechanics: apps authenticate to Microsoft Graph with OAuth 2.0, receive an access token, then call REST endpoints and exchange data as JSON. The walkthrough shows registering an app in Azure AD (App registrations), choosing delegated vs application permissions (daemon/background service vs signed-in user), and applying least-privilege access—using “Read all incidents” as the example—plus the critical step of granting admin consent. It then creates a client secret, grabs the application (client) ID and directory (tenant) ID, and uses a PowerShell example to query incidents updated in the last 48 hours via the Graph endpoint (security/incidents), noting API versioning (v1.0 for production, beta for prerelease). Finally, it submits the request with headers, parses the JSON response, and exports the incident results to a uniquely named JSON file.

We produced this as a clean, developer-friendly demo built to remove friction from a workflow that’s usually…let’s call it “documentation-adjacent.” In preproduction we mapped the exact setup and the minimum set of steps that actually matter (permissions, consent, secret, IDs), then in production we captured crisp screens and recorded pro voiceover that keeps the pace steady without skipping the gotchas. In post, we shaped it into a tight, follow-along walkthrough—so viewers can implement the integration quickly, avoid common missteps, and walk away with a repeatable pattern they can expand beyond “read incidents” into real automation. Final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft 365 Defender: Microsoft Sentinel integration
Demo videos
Full playlist
Sandgate
Connect Microsoft 365 Defender with Microsoft Sentinel—enable the connector, stream incidents into Sentinel, verify ingestion, and keep status and assignments synchronized across portals.

This demo shows how Microsoft Sentinel and Microsoft 365 Defender work better together—specifically, how Defender incidents can be brought into Sentinel so analysts can investigate and respond from a single SIEM queue. It walks through enabling the Microsoft 365 Defender connector in Sentinel, connecting incidents and alerts, and confirming that the data is flowing correctly. The video also highlights why this integration matters: Sentinel gains richer incident context from Defender (alerts, entities, and timelines), and incident updates stay synchronized across both portals so assignments, status changes, and closures don’t drift out of alignment.

We produced this as an integration walkthrough designed for speed and certainty. The script is built around the critical decisions (what to enable, what to avoid to prevent duplicates, how to verify), the visuals stay tight on the connector configuration, and the edit keeps the flow practical so viewers can replicate it without guesswork. Final delivery includes closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft 365 Defender: Overview
Animations
Full playlist
Sandgate
Meet Microsoft 365 Defender—cross-domain detection and response that correlates signals into incidents, reduces alert fatigue, and automates remediation across identities, endpoints, apps, and email.

This overview introduces Microsoft 365 Defender as an integrated, cross-domain threat detection and response solution built for attacks that move across endpoints, identities, email, apps, and data. It frames the problem as signal overload and siloed tools—alert fatigue, isolated domain views, and slow, fragmented response—then explains how Defender normalizes and correlates raw signals into incidents with full context. The video calls out automated correlation across domains, unified incident timelines and impacted assets (like devices, identities, and mailboxes), and coordinated remediation that tackles both the obvious damage and persistence—plus the option for teams to customize workflows and sensitivity once they’re ready.

We produced this as a narrative-driven platform story: crisp voiceover, clean visuals, and an edit designed to make a big concept feel simple without oversimplifying. The structure is intentional—problem, consequence, solution, outcome—so prospective customers can “get it” quickly and remember the why. Delivered with closed captions, audio description, and thumbnails.

false
March 2023
Microsoft Security
Microsoft 365 Defender: Microsoft Secure Score
Demo videos
Full playlist
Sandgate
Use Microsoft Secure Score to measure posture, prioritize the highest-impact improvement actions, track progress over time, and turn recommendations into concrete risk reduction.

This demo introduces Microsoft Secure Score as a measurable way to understand—and improve—your security posture across Microsoft 365. It shows how your score is calculated from recommended actions, how points are earned as you complete improvements, and how the experience helps you prioritize work by impact. The video highlights browsing improvement actions, reviewing action details (what the control does, how to implement it, what products it touches), and using Secure Score as an ongoing program tool—not a one-time “report card”—so teams can track progress over time, compare posture, and focus on the changes that meaningfully reduce risk.

We produced this as a clear, executive-friendly walkthrough that still gives practitioners enough detail to act. In preproduction we shaped the narrative around “measure→prioritize→improve,” in production we captured clean UI with steady voiceover, and in post we tightened the flow so the takeaways land quickly: what Secure Score is, how to use it, and how to turn recommendations into real security wins. Final delivery includes closed captions, audio description, and thumbnails.

false
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.