Month: October 2024
Unlocking the Best of Azure with AzureRM and AzAPI Providers
With the recent release of AzAPI 2.0, Azure offers two powerful Terraform providers to meet your infrastructure needs: AzureRM and AzAPI. The key question is, when should you use each one? This article offers a clear guide for Terraform users, particularly those familiar with the AzureRM provider, on some ideal scenarios for each. The recommendations provided within this post are jointly provided between HashiCorp and Microsoft; click here for HashiCorp’s blogpost.
Overview
At a high level, AzureRM provides a stable, well-tested layer on top of Azure APIs. It handles the entire resource lifecycle—creation, updates, and deletion—while managing breaking changes, and ensuring smooth operations. AzureRM is ideal for users looking for stability and simplified configuration management.
On the other hand, AzAPI is a lightweight wrapper around Azure APIs, enabling direct and early access to the latest Azure features. It allows for quicker adoption of new services or workarounds for AzureRM limitations, making it ideal for users who need cutting-edge functionality. Below, we’ll dive into the differences between the two providers and when to use each.
AzureRM: A Proven, Simplified Approach
AzureRM abstracts complexity by managing Azure API versions on your behalf. The provider ensures that resources are fully compatible with one another and that configuration changes don’t introduce breaking issues, thanks to its rigorous testing. If you’re using resources that don’t require constant updates or access to the latest API versions, AzureRM provides a more stable and simplified experience.
Key benefits of AzureRM:
Automatic API Versioning: AzureRM handles API version compatibility, making upgrades seamless.
Simplicity: Resource property names are intuitive (e.g., disk_size_in_gb vs. disk_size), reducing the need to consult Azure API documentation frequently.
Comprehensive Documentation: AzureRM offers extensive resources and examples for each service, making it easier to onboard and use in your projects.
AzureRM is ideal for scenarios where you prioritize stability, want to minimize complexity, and don’t need the very latest features.
AzAPI: Cutting-Edge Features and Access to Azure APIs
AzAPI, by contrast, provides a thinner layer, allowing for direct access to the latest Azure API versions as soon as they’re available. It’s well suited for scenarios where you need quick access to features before they are fully supported in AzureRM.
Key benefits of AzAPI:
Immediate API Access: AzAPI gives users access to the latest API versions forAzure resources, allowing teams to use new Azure services and features sooner.
Targeted Resource Updates: With the azapi_update_resource function, you can modify specific resource properties without upgrading the entire resource or provider.
Fine-Grained Control: AzAPI provides resource versioning to allow for more control over the infrastructure configuration. User defined retryable errors, HTTP headers, URL control and resource replacement definitions are a few other ways AzAPI provides granular control.
AzAPI is recommended for scenarios where early access to new Azure features is crucial, or when you need granular control over your infrastructure.
Documentation and Community Support
AzureRM has a more extensive collection of blog posts, community contributions, and official documentation. This makes it easier for new users to find examples and ramp up quickly.
AzAPI, while newer, follows Azure’s API structures more closely, making it easier for users familiar with Bicep or ARM templates to understand.
Conclusion: When to Use Each Provider
Choose AzureRM if you prioritize stability, simplicity, and automatic versioning. It’s best for teams that want to minimize the complexity of managing infrastructure and don’t need immediate access to new Azure features.
Choose AzAPI if you need cutting-edge access to the latest Azure APIs or need to customize resource configurations without waiting for AzureRM to be updated. It’s ideal for teams that require rapid innovation and fine-grained control over API versions.
Both providers provide a first-class experience, backed by Microsoft and HashiCorp, and can be adapted based on your needs. You can also transition between them seamlessly with tools like the upcoming Azure Terraform Migration tool release (aztfmigrate), making it easy to adjust your approach as your infrastructure evolves.
We hope this guide helps you determine when to use AzureRM or AzAPI, ensuring you get the most out of your Terraform and Azure infrastructure.
Microsoft Tech Community – Latest Blogs –Read More
September 2024 Recap: Azure Postgres Flexible Server
September 2024 Recap: Azure Postgres Flexible Server
This month we’ve introduced:
DiskANN Vector Index – Preview
Postgres 17 – Preview
Fabric Mirroring – Private Preview
Migration Service – Now supports Amazon Aurora, Google Cloud SQL, Burstable SKU, Custom FQDN
Auto Migrations – Single to Flexible server
Python SDK Update
Automation Tasks – Generally Available
Dive into the details and discover how these updates can improve your database management and security. Link – https://techcommunity.microsoft.com/t5/azure-database-for-postgresql/september-2024-recap-azure-postgres-flexible-server/ba-p/4270479
September 2024 Recap: Azure Postgres Flexible ServerThis month we’ve introduced:
DiskANN Vector Index – Preview
Postgres 17 – Preview
Fabric Mirroring – Private Preview
Migration Service – Now supports Amazon Aurora, Google Cloud SQL, Burstable SKU, Custom FQDN
Auto Migrations – Single to Flexible server
Python SDK Update
Automation Tasks – Generally Available
Dive into the details and discover how these updates can improve your database management and security. Link – https://techcommunity.microsoft.com/t5/azure-database-for-postgresql/september-2024-recap-azure-postgres-flexible-server/ba-p/4270479 Read More
formula that multiplies my ingredients up to 32 times?
I learned Excel in high school but that was 20 years ago, and I haven’t used it since. I started entering all my ingredients and then multiplying them on paper and entering it…. then I remembered that excel could do that for me right? But if so, how do I do that? Help.
I learned Excel in high school but that was 20 years ago, and I haven’t used it since. I started entering all my ingredients and then multiplying them on paper and entering it…. then I remembered that excel could do that for me right? But if so, how do I do that? Help. Read More
Track Changes Colors for “By Author” — Feature request
In documents edited by multiple authors, I keep the “By Author” colors on to be aware of which author did what. That is fine. But each time I open the document, the colors change including mine.
My request: Let all others colors change. But I want to have the color of my choosing as “my current color”.
For instance, my favorite color is “classic blue”. So I want that my edits should appear in “classic blue” while all others’ edits could be any color(s).
Is there a way to modify my Word365 to do that? If not, I want to suggest it a feature request.
(PS. This is my first ever post on this forum. Seems like a great place!) 😊
In documents edited by multiple authors, I keep the “By Author” colors on to be aware of which author did what. That is fine. But each time I open the document, the colors change including mine. My request: Let all others colors change. But I want to have the color of my choosing as “my current color”. For instance, my favorite color is “classic blue”. So I want that my edits should appear in “classic blue” while all others’ edits could be any color(s). Is there a way to modify my Word365 to do that? If not, I want to suggest it a feature request. (PS. This is my first ever post on this forum. Seems like a great place!) 😊 Read More
what is the correct process to deploy SQL server developer script as DBA?
I am DBA currently deploying sql scripts from developers but is not clear to me what is the correct way or process to do it, my concern is about how can I reverse the changes or guarantee data integrity before or after deployment in case of something wrong happen. Should I make a backup every time I deploy? (Some times a day) is there any way to lock specific database to avoid deployment in production by mistake? any recomended tool to make it? Should the developers use always rollback in their scripts? as additional information we are implementing GIT, I am not sure if this tool can handle these thasks better and safely than SQL SSMS Can someone provide feedback please? any comment can help. Thank you all
I hope to find the best and safest way to make this task
I am DBA currently deploying sql scripts from developers but is not clear to me what is the correct way or process to do it, my concern is about how can I reverse the changes or guarantee data integrity before or after deployment in case of something wrong happen. Should I make a backup every time I deploy? (Some times a day) is there any way to lock specific database to avoid deployment in production by mistake? any recomended tool to make it? Should the developers use always rollback in their scripts? as additional information we are implementing GIT, I am not sure if this tool can handle these thasks better and safely than SQL SSMS Can someone provide feedback please? any comment can help. Thank you all I hope to find the best and safest way to make this task Read More
Deploying Azure VM via DevOps pipeline and ARM template — how to join to the domain?
Hello,
I am working on a DevOps pipeline that is able to deploy an Azure VM with an ARM template I’ve put together. The server is part of a workgroup when created, and I need to add a task to my pipeline that will join it to the domain. The problem is the VM is on an island — it has a NIC and an IP assigned to it making it accessible via RDP but Windows firewall is on and this prevents any Powershell task in the pipeline from being able to remotely connect to it and run a script to join it to the domain. I would think this is a common issue encountered when setting up deployments in this way — does anyone have a solution for this issue? Or does anyone have a slightly different method for deploying servers in this way and running remote scripts on them? Any help is greatly appreciated!
Hello, I am working on a DevOps pipeline that is able to deploy an Azure VM with an ARM template I’ve put together. The server is part of a workgroup when created, and I need to add a task to my pipeline that will join it to the domain. The problem is the VM is on an island — it has a NIC and an IP assigned to it making it accessible via RDP but Windows firewall is on and this prevents any Powershell task in the pipeline from being able to remotely connect to it and run a script to join it to the domain. I would think this is a common issue encountered when setting up deployments in this way — does anyone have a solution for this issue? Or does anyone have a slightly different method for deploying servers in this way and running remote scripts on them? Any help is greatly appreciated! Read More
ODBC Timeout Problem
Hi,
I am calling a SQL Server stored procedure from my MS Access program and am getting the ODBC timeout error. When I run the stored procedure from SSMS, it executes in less than one second. I am passing no input parameters and the results are not returned from the stored procedure – they are written to a table instead. How can I avoid the timeout error?
Dim cnn As New ADODB.Connection
Dim cmd As New ADODB.Command
connString = <all the usual stuff>
cnn.Open (connString)
With cmd
.ActiveConnection = cnn
.CommandType = adCmdStoredProc
.CommandText = “usp_GetUnbilledItems”
.Execute —Times out here.
End With
Hi, I am calling a SQL Server stored procedure from my MS Access program and am getting the ODBC timeout error. When I run the stored procedure from SSMS, it executes in less than one second. I am passing no input parameters and the results are not returned from the stored procedure – they are written to a table instead. How can I avoid the timeout error? Dim cnn As New ADODB.ConnectionDim cmd As New ADODB.Command connString = <all the usual stuff>cnn.Open (connString) With cmd.ActiveConnection = cnn.CommandType = adCmdStoredProc.CommandText = “usp_GetUnbilledItems”.Execute —Times out here.End With Read More
SPO search results: “Something Went Wrong”…but search previews are working?
We’re experiencing an issue with search in SPO. Searching within any of our modern sites (or Hub sites) results in a blank page that reads “Something went wrong.” However, while typing into the search bar, result previews successfully display below the bar. Is this happening to anyone else?
It doesn’t matter what I type, the result is the same. I’m guessing it’s a bug since the search preview results are working?
We’re experiencing an issue with search in SPO. Searching within any of our modern sites (or Hub sites) results in a blank page that reads “Something went wrong.” However, while typing into the search bar, result previews successfully display below the bar. Is this happening to anyone else? It doesn’t matter what I type, the result is the same. I’m guessing it’s a bug since the search preview results are working? Read More
android app
hi, I just got my hp notebook, how do I install android apps?
hi, I just got my hp notebook, how do I install android apps? Read More
Cant access exportFiles from defender for enpoint API (api/machines/SoftwareVulnerabilitiesExport)
I am using the following API endpoint to extract vulnerabilities from defender for endpoint:
https://api-eu.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilitiesExport (https://learn.microsoft.com/en-us/defender-endpoint/api/get-assessment-software-vulnerabilities#261-request-example ).
The endpoint returns links to the files containing the data. However, when we try to access these links we get this error.
This was working fine for the past weeks and I havent changed anything.
Any ideas what the problem is?
I am using the following API endpoint to extract vulnerabilities from defender for endpoint: https://api-eu.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilitiesExport (https://learn.microsoft.com/en-us/defender-endpoint/api/get-assessment-software-vulnerabilities#261-request-example ). The endpoint returns links to the files containing the data. However, when we try to access these links we get this error. This was working fine for the past weeks and I havent changed anything. Any ideas what the problem is? Read More
Spotlight on Device Fingerprinting in DFP
We’re thrilled to bring you a weekly spotlight on various topics within our Microsoft Fraud Protection Tech Community. This week, we’re diving into the fascinating world of Device Fingerprinting in Microsoft Dynamics 365 Fraud Protection (DFP).
Ever wondered how Device Fingerprinting works and how it can benefit you? Check out our detailed Q&A below where we answer all your burning questions about this innovative feature.
If you have any questions or need further clarification on this topic, don’t hesitate to reply to this thread in the Fraud Protection Tech Community. Your feedback is incredibly valuable to us.
Best regards,
DFP Product Team
——————
1. Do I really need device fingerprinting? Why is it important?
Device fingerprinting is an essential feature in Microsoft Dynamics 365 Fraud Protection. It collects information about a computing device during online actions, which includes hardware, browser, geographic information, and IP address. This data is crucial as it helps the Fraud Protection service to track and link events in the fraud network, identifying patterns of fraud. The device fingerprinting feature uses artificial intelligence (AI) and machine learning to probabilistically identify devices, which can significantly improve the model detection rate for businesses by reducing false negatives. As a result, less fraud is detected on approved transactions after the fact.
It’s important to note that while device fingerprinting has a high accuracy, it is probabilistic and not deterministic, meaning there is a possibility of false positives. However, the benefits it brings to fraud detection and prevention are significant and can help protect businesses from fraudulent activities.
References:
Overview of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Set up device fingerprinting – Dynamics 365 Fraud Protection
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Attributes in device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
2. We don’t use Fingerprinting will DFP still work?
Yes, Dynamics 365 Fraud Protection (DFP) will still function without device fingerprinting. However, its effectiveness in detecting fraud will be reduced. Device fingerprinting is a powerful feature that enhances the ability of DFP to identify and link events in the fraud network, thereby improving the detection of fraudulent patterns. Without it, DFP can still assess risk based on other factors, but the absence of device fingerprinting data means it likely won’t be as accurate in identifying fraud.
3. How to do end to end device fingerprinting integration?
Integrating end-to-end device fingerprinting in Microsoft Dynamics 365 Fraud Protection involves several steps to ensure that device data is accurately collected and assessed for fraud risk. Here’s a high-level overview of the process:
Set up DNS and Generate an SSL Certificate:
Choose a subdomain under your root domain for device fingerprinting, such as fpt.yourcompany.com.
Create a CNAME record that points to fpt.dfp.microsoft.com.
Generate an SSL certificate for the subdomain and upload it to the Fraud Protection portal.
Implement Device Fingerprinting:
Your website or application must initiate device fingerprinting requests before a transaction is sent to Fraud Protection for risk evaluation.
Modify the provided JavaScript code (see documentation) and insert it on the webpage or in the application where you want to collect device fingerprinting information.
Enable Client-Side Integration:
Ensure that the device fingerprinting script is correctly implemented and that the client-side integration is enabled to collect the necessary data.
Test and Validate:
After implementation, thoroughly test the device fingerprinting functionality to confirm that it is working as expected and that Fraud Protection is receiving the required data.
Please follow the best practices and guidelines provided in the Microsoft documentation to ensure a successful integration.
References:
Overview of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for iOS – Dynamics 365 Fraud Protection | Microsoft Learn
4. What do I need to provide in order for Device Fingerprinting to work?
To ensure Device Fingerprinting works effectively in Microsoft Dynamics 365 Fraud Protection, you need to provide the following:
DNS Configuration and SSL Certificate:
Select a subdomain under your root domain for device fingerprinting, such as fpt.yourcompany.com.
Create a CNAME record that points to fpt.dfp.microsoft.com.
Generate an SSL certificate for the subdomain and upload it to the Fraud Protection portal. Only .pfx files are supported, and if your certificate has a password, you’ll need to enter it during the upload process.
Device Fingerprinting Implementation:
Your website or application must initiate device fingerprinting requests a few seconds before a transaction is sent to Fraud Protection for risk evaluation. This ensures that all necessary data is received for an accurate assessment.
Modify the provided JavaScript code and insert it on the webpage or in the application where you want to collect device fingerprinting information.
Client-Side Integration:
Ensure that the device fingerprinting script is correctly implemented and that the client-side integration is enabled to collect the necessary data.
Testing and Validation:
After implementation, thoroughly test the device fingerprinting functionality to confirm that it is working as expected and that Fraud Protection is receiving the required data.
Please follow the best practices and guidelines provided in the Microsoft documentation to ensure a successful integration.
References:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection …
5. Do we need to send IP address if we use Device Fingerprinting?
In Microsoft Dynamics 365 Fraud Protection, the IP address is an optional field when using device fingerprinting. While it is not mandatory to send the IP address, providing it can enhance the accuracy of the fraud protection service. The IP address can be set in the deviceFingerprinting.ipAddress field for assessments, and it helps in identifying the geographic location and network information of the device, which can be valuable in fraud detection scenarios.
References:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection …
6. What is the difference btw ‘device.ipaddress’ and ‘trueIp’?
In Microsoft Dynamics 365 Fraud Protection, ‘device.ipaddress’ refers to the IP address that the merchant’s website receives when a customer uses the site. This is typically the public IP address that the customer’s device is using to access the internet. On the other hand, ‘trueIp’ is the actual IP address of the device as identified by device fingerprinting. It is used to assess the risk of fraud and is part of the device attributes collected during the fraud assessment process
The ‘trueIp’ can be particularly useful in identifying fraud attempts because it can reveal if a customer is using a proxy or VPN to mask their actual IP address. This can be a red flag for fraudulent activity, as fraudsters often use such methods to hide their location and identity.
7. What is TrueIP? What is “IP address (via Merchant)”? Why is TrueIP blank, while “IP address (via Merchant)” is available?
In Microsoft Dynamics 365 Fraud Protection, “TrueIP” refers to the actual IP address of the device identified by device fingerprinting, which is used to assess the risk of fraud. It is part of the device attributes collected during the fraud assessment process. The “IP address (via Merchant)” is the IP address that the merchant provides to Fraud Protection, which may be different from the TrueIP if, for example, the user is connected through a proxy or VPN.
If “TrueIP” is blank, it could be due to several reasons such as the device fingerprinting data not being collected properly, the user using privacy features that prevent the collection of their true IP address, or simply that the TrueIP information was not available or not passed on at the time of the transaction.
However, generally speaking, the true IP address is the one assigned to a device connected to the internet, while the IP address provided by the merchant could be the one they have on record for the transaction, which might be different due to the reasons mentioned above.
References:
View purchase protection schemas – Dynamics 365 Fraud Protection | Microsoft Learn
8. Any information collected beyond IP address?
A detailed summary of what device fingerprinting attributes we attempt to collect for web, iOS, and Android can be found here: Attributes in device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
9. How do I renew the DFP Device Fingerprinting SSL Green ID certificate?
Multiple steps:
Obtain a renewed certificate. These can be provided by whichever team within your organization manages certificates. Typically, these are IT, Security or Engineering. The certificate should be a .pfx file.
Upload your certificate. From the DFP Portal, select “Integration” and “Enable device fingerprinting”.
For the renewal process instructions and further details, please refer to the Microsoft Learn Page: Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
10. Does device fingerprinting work for different browsers and operating systems?
Yes, DFP Device Fingerprinting works for different types of web browsers and operating systems. Below is more information on support and how to integrate:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for iOS – Dynamics 365 Fraud Protection | Microsoft Learn
We’re thrilled to bring you a weekly spotlight on various topics within our Microsoft Fraud Protection Tech Community. This week, we’re diving into the fascinating world of Device Fingerprinting in Microsoft Dynamics 365 Fraud Protection (DFP).
Ever wondered how Device Fingerprinting works and how it can benefit you? Check out our detailed Q&A below where we answer all your burning questions about this innovative feature.
If you have any questions or need further clarification on this topic, don’t hesitate to reply to this thread in the Fraud Protection Tech Community. Your feedback is incredibly valuable to us.
Best regards, DFP Product Team
——————
1. Do I really need device fingerprinting? Why is it important?
Device fingerprinting is an essential feature in Microsoft Dynamics 365 Fraud Protection. It collects information about a computing device during online actions, which includes hardware, browser, geographic information, and IP address. This data is crucial as it helps the Fraud Protection service to track and link events in the fraud network, identifying patterns of fraud. The device fingerprinting feature uses artificial intelligence (AI) and machine learning to probabilistically identify devices, which can significantly improve the model detection rate for businesses by reducing false negatives. As a result, less fraud is detected on approved transactions after the fact.
It’s important to note that while device fingerprinting has a high accuracy, it is probabilistic and not deterministic, meaning there is a possibility of false positives. However, the benefits it brings to fraud detection and prevention are significant and can help protect businesses from fraudulent activities.
References:
Overview of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Set up device fingerprinting – Dynamics 365 Fraud Protection
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Attributes in device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
2. We don’t use Fingerprinting will DFP still work?
Yes, Dynamics 365 Fraud Protection (DFP) will still function without device fingerprinting. However, its effectiveness in detecting fraud will be reduced. Device fingerprinting is a powerful feature that enhances the ability of DFP to identify and link events in the fraud network, thereby improving the detection of fraudulent patterns. Without it, DFP can still assess risk based on other factors, but the absence of device fingerprinting data means it likely won’t be as accurate in identifying fraud.
3. How to do end to end device fingerprinting integration?
Integrating end-to-end device fingerprinting in Microsoft Dynamics 365 Fraud Protection involves several steps to ensure that device data is accurately collected and assessed for fraud risk. Here’s a high-level overview of the process:
Set up DNS and Generate an SSL Certificate:
Choose a subdomain under your root domain for device fingerprinting, such as fpt.yourcompany.com.
Create a CNAME record that points to fpt.dfp.microsoft.com.
Generate an SSL certificate for the subdomain and upload it to the Fraud Protection portal.
Implement Device Fingerprinting:
Your website or application must initiate device fingerprinting requests before a transaction is sent to Fraud Protection for risk evaluation.
Modify the provided JavaScript code (see documentation) and insert it on the webpage or in the application where you want to collect device fingerprinting information.
Enable Client-Side Integration:
Ensure that the device fingerprinting script is correctly implemented and that the client-side integration is enabled to collect the necessary data.
Test and Validate:
After implementation, thoroughly test the device fingerprinting functionality to confirm that it is working as expected and that Fraud Protection is receiving the required data.
Please follow the best practices and guidelines provided in the Microsoft documentation to ensure a successful integration.
References:
Overview of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for iOS – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for Android – Dynamics 365 Fraud Protection | Microsoft Learn
4. What do I need to provide in order for Device Fingerprinting to work?
To ensure Device Fingerprinting works effectively in Microsoft Dynamics 365 Fraud Protection, you need to provide the following:
DNS Configuration and SSL Certificate:
Select a subdomain under your root domain for device fingerprinting, such as fpt.yourcompany.com.
Create a CNAME record that points to fpt.dfp.microsoft.com.
Generate an SSL certificate for the subdomain and upload it to the Fraud Protection portal. Only .pfx files are supported, and if your certificate has a password, you’ll need to enter it during the upload process.
Device Fingerprinting Implementation:
Your website or application must initiate device fingerprinting requests a few seconds before a transaction is sent to Fraud Protection for risk evaluation. This ensures that all necessary data is received for an accurate assessment.
Modify the provided JavaScript code and insert it on the webpage or in the application where you want to collect device fingerprinting information.
Client-Side Integration:
Ensure that the device fingerprinting script is correctly implemented and that the client-side integration is enabled to collect the necessary data.
Testing and Validation:
After implementation, thoroughly test the device fingerprinting functionality to confirm that it is working as expected and that Fraud Protection is receiving the required data.
Please follow the best practices and guidelines provided in the Microsoft documentation to ensure a successful integration.
References:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection …
5. Do we need to send IP address if we use Device Fingerprinting?
In Microsoft Dynamics 365 Fraud Protection, the IP address is an optional field when using device fingerprinting. While it is not mandatory to send the IP address, providing it can enhance the accuracy of the fraud protection service. The IP address can be set in the deviceFingerprinting.ipAddress field for assessments, and it helps in identifying the geographic location and network information of the device, which can be valuable in fraud detection scenarios.
References:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection …
6. What is the difference btw ‘device.ipaddress’ and ‘trueIp’?
In Microsoft Dynamics 365 Fraud Protection, ‘device.ipaddress’ refers to the IP address that the merchant’s website receives when a customer uses the site. This is typically the public IP address that the customer’s device is using to access the internet. On the other hand, ‘trueIp’ is the actual IP address of the device as identified by device fingerprinting. It is used to assess the risk of fraud and is part of the device attributes collected during the fraud assessment process
The ‘trueIp’ can be particularly useful in identifying fraud attempts because it can reveal if a customer is using a proxy or VPN to mask their actual IP address. This can be a red flag for fraudulent activity, as fraudsters often use such methods to hide their location and identity.
7. What is TrueIP? What is “IP address (via Merchant)”? Why is TrueIP blank, while “IP address (via Merchant)” is available?
In Microsoft Dynamics 365 Fraud Protection, “TrueIP” refers to the actual IP address of the device identified by device fingerprinting, which is used to assess the risk of fraud. It is part of the device attributes collected during the fraud assessment process. The “IP address (via Merchant)” is the IP address that the merchant provides to Fraud Protection, which may be different from the TrueIP if, for example, the user is connected through a proxy or VPN.
If “TrueIP” is blank, it could be due to several reasons such as the device fingerprinting data not being collected properly, the user using privacy features that prevent the collection of their true IP address, or simply that the TrueIP information was not available or not passed on at the time of the transaction.
However, generally speaking, the true IP address is the one assigned to a device connected to the internet, while the IP address provided by the merchant could be the one they have on record for the transaction, which might be different due to the reasons mentioned above.
References:
View purchase protection schemas – Dynamics 365 Fraud Protection | Microsoft Learn
8. Any information collected beyond IP address?
A detailed summary of what device fingerprinting attributes we attempt to collect for web, iOS, and Android can be found here: Attributes in device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
9. How do I renew the DFP Device Fingerprinting SSL Green ID certificate?
Multiple steps:
Obtain a renewed certificate. These can be provided by whichever team within your organization manages certificates. Typically, these are IT, Security or Engineering. The certificate should be a .pfx file.
Upload your certificate. From the DFP Portal, select “Integration” and “Enable device fingerprinting”.
For the renewal process instructions and further details, please refer to the Microsoft Learn Page: Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
10. Does device fingerprinting work for different browsers and operating systems?
Yes, DFP Device Fingerprinting works for different types of web browsers and operating systems. Below is more information on support and how to integrate:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for Android – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for iOS – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for React Native – Dynamics 365 Fraud Protection | Microsoft Learn
Supercharge Your Business: Microsoft Teams connects you to customers
Maximizing Customer Engagement with Microsoft Teams
Managing customers and reaching out to prospects are crucial aspects of running a small business. For many owners or operators, it’s common to respond directly to inbound customer calls or support inquiries while juggling day-to-day responsibilities. Being reachable is essential.
Microsoft Teams can help you with this by allowing you to meet, call, chat, share files, or collaborate with customers, partners, suppliers, and anyone else outside your company domain.
Microsoft was named a Leader in the 2024 Gartner® Magic Quadrant™ for Unified Communications as a Service for the sixth year in a row. This recognition, we feel, recognizes Microsoft’s commitment to consistently deliver innovations in Microsoft Teams to help you succeed1.
Queues App for Microsoft Teams is Now Generally Available
Teams supports custom apps and bots that can automate tasks and enhance collaboration. These can be integrated specifically with Teams and appear on the left hand rail, just a click away for anyone to use. One of these apps is a native Microsoft app called Queues and is perfect if you need to better organize and route your customer calls. Queues app is included in Teams Premium and if your organization has both a Teams Premium and Teams Phone license, the app will be available by default.
You’re probably toggling back and forth between many different apps during the day just to get your work done. With Queues app, you can stay right in Teams to manage across apps. It’s like having your personal support hub right within Teams to manage your call queues and ensure that customer calls are resolved.
Check out these included features that can help you manage internal and external collaboration:
Make and receive calls using Teams Phone without leaving Teams.
Agents get a 360-degree view of their call queue performance through real-time statistics.
Agents can opt-in or out of call queues based on availability and business needs.
Copilot3 summarizes call notes, saving time between customer engagements.
To make sure your customer engagement team or colleagues can work on a customer issue together, the Queues app offers collaborative call handling:
Team members and leads can work together on answering calls.
Relevant call controls, such as call transfer, are easily accessible.
Outbound calls can be made on behalf of call queues or auto attendants, showing a unified team front for customers.
Supervisors can jump into customer interactions directly from Teams:
Call queues and auto-attendants can be managed directly from Teams, so no need to context switch.
Comprehensive analytics dashboards provide real-time and historical reporting.
Compliance and governance are built into the app.
How These Features Support Your Business
When you’re juggling inbound and outbound calls while managing your business, you need to concentrate on having effective conversations. So let Teams handle the call queue, and automatically capture notes and actions. Queues app makes this easier.
Queues app is now generally available and requires users to have a Teams Phone and a Teams Premium license. It’s a powerful app for enhancing customer support and engagement within Microsoft Teams. Get more details in this launch blog.
__________________________________________________________________________________
1 Gartner, Magic Quadrant for Unified Communications as a Service, Worldwide, Pankil Sheth, Megan Fernandez, Christopher Trueman, Rafael Benitez, 7 October 2024
Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner is a registered trademark and service mark and Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.
*This graphic was published by Gartner, Inc. as part of a larger research document and should be valuated in the context of the entire document. The Gartner document is available upon request here.
2 Teams Phone license is a required license for call queues and auto-attendants. Teams Premium license provides access to Queues app.
3 Copilot in Teams Phone is part of Microsoft 365 Copilot license.
Microsoft Tech Community – Latest Blogs –Read More
Azure Communication Services Ideas Board: Share your feedback with the product team
Innovation is not a solitary pursuit, and we recognize that some of the best ideas come from you, our Azure Communication Services community. By using our technology and identifying the limitations or feature gaps, you help us understand what we need to enhance to make Azure Communication Services a comprehensive platform for intelligent business to consumer (B2C) communication for you and your team.
Your feedback helps drive our product development and we’d like to highlight the Azure Communication Services – Community Ideas Board. You can post new ideas and also upvote or downvote ideas posted by the community.
We believe that hearing directly from our customers is essential. Like most popular community forums, the Azure Communication Services Community Ideas Board offers several key functions:
Create a new topic that is important to you.
Upvote topics to promote their visibility and prioritization.
Add comments on existing posts to share your thoughts.
Star a topic to follow it and receive notifications on further activity.
Getting involved is simple! Use your (digital) voice to make an impact. If there is a feature you believe is missing, create a topic and we will take notice. Or simply upvote an existing suggestion. Share your ideas and help shape the future of Azure Communication Services.
Thank you for being a part of the Azure Communication Services community. Some of our best ideas have come from conversations with our users, and we are grateful for your participation. See you on the Ideas Board!
Microsoft Tech Community – Latest Blogs –Read More
Recipient suspects your message is spam and rejected it.
When Office 365 tried to send the message to the recipient (outside Office 365), the recipient’s email server (or email filtering service) suspected the sender’s message is spam
When Office 365 tried to send the message to the recipient (outside Office 365), the recipient’s email server (or email filtering service) suspected the sender’s message is spam Read More
Opening Excel from an Access Command Button
I am trying to open the MS Excel Application from a Command Button in Access.
the Code I am using is
Private Sub MicrosoftExcel_Click()
Dim App As Object
Set App = CreateObject(“excel.Application”)
App.Visible = True
End Sub
When clicking on the Command Button, I can see Excel start to run in the taskbar, but it immediately closes. I have no problem starting Word using
Private Sub MicrosoftWord_Click()
Dim App As Object
Set App = CreateObject(“Word.Application”)
App.Visible = True
End Sub
Anyone have any suggestions?
I am trying to open the MS Excel Application from a Command Button in Access. the Code I am using isPrivate Sub MicrosoftExcel_Click() Dim App As Object Set App = CreateObject(“excel.Application”) App.Visible = TrueEnd Sub When clicking on the Command Button, I can see Excel start to run in the taskbar, but it immediately closes. I have no problem starting Word usingPrivate Sub MicrosoftWord_Click() Dim App As Object Set App = CreateObject(“Word.Application”) App.Visible = TrueEnd Sub Anyone have any suggestions? Read More
Tech Talks presents: Harnessing existing Dataverse data for Custom Agents in Copilot
Join us on Thursday, October 31 at 8am PT as Nathan Helgren, Principal Program Manager, Dataverse, and Julie Koesmarno, Principal Program Manager, Dataverse present ‘Harness your existing Dataverse data by using them as a knowledge source for Custom and Declarative Agents for Copilot ‘.
Call to Action:
Click on the link to save the calendar invite: https://aka.ms/TechTalksInvite
View past recordings (sign in required): https://aka.ms/TechTalksRecording
Join us on Thursday, October 31 at 8am PT as Nathan Helgren, Principal Program Manager, Dataverse, and Julie Koesmarno, Principal Program Manager, Dataverse present ‘Harness your existing Dataverse data by using them as a knowledge source for Custom and Declarative Agents for Copilot ’.
Call to Action:
Click on the link to save the calendar invite: https://aka.ms/TechTalksInvite
View past recordings (sign in required): https://aka.ms/TechTalksRecording
Cannot run batch file in Task Scheduler which runs Python program.
I have Windows 10, we have a network and I log into my laptop with a network Active Directory userid.
I have Task Manager v1.0. No idea why the version is so low for Windows 10.
When I run a simple batch file called test.bat:
echo This is a test >> “C:UsersMYUSEROneDrive – COMPDocumentsPythonProjectsCOMPTestProformalogtest.txt”
It runs fine.
But when I run another batch file called godailyauto.bat in the same directory, which calls a Python program, I get this error:
“Task Scheduler failed to start “crProformaTest” task for user “COMPANYMYUSER”. Additional Data: Error Value: 2147942667.”
I have the task:
Set to use my username and only run if I am logged on, to reduce potential problems. It is not set to run with Highest Privileges. I tried that and it didn’t work either. On the Task Settings tab I have checked “Allow task to run on demand”. The task starts but gets an error.
How do I get godailyauto.bat to run properly from Task Scheduler?
Do I need to install updates for Windows Task Scheduler?
Thank you.
I have Windows 10, we have a network and I log into my laptop with a network Active Directory userid.I have Task Manager v1.0. No idea why the version is so low for Windows 10. When I run a simple batch file called test.bat: echo This is a test >> “C:UsersMYUSEROneDrive – COMPDocumentsPythonProjectsCOMPTestProformalogtest.txt” It runs fine. But when I run another batch file called godailyauto.bat in the same directory, which calls a Python program, I get this error: “Task Scheduler failed to start “crProformaTest” task for user “COMPANYMYUSER”. Additional Data: Error Value: 2147942667.” I have the task:Set to use my username and only run if I am logged on, to reduce potential problems. It is not set to run with Highest Privileges. I tried that and it didn’t work either. On the Task Settings tab I have checked “Allow task to run on demand”. The task starts but gets an error. How do I get godailyauto.bat to run properly from Task Scheduler? Do I need to install updates for Windows Task Scheduler? Thank you. Read More
What’s New for Planner in October 2024
New Planner for the web begins roll out to General Availability
We’re bringing the new Planner experience to the web! This month marked the roll out of the new Planner for the web to our Targeted release audience. This feature will roll out to all customers over the coming weeks, starting with a smaller percentage so we can address customer feedback and bugs in the product. With the new Planner, you will be able to manage all your work across Microsoft To Do, Microsoft Planner, and Microsoft Project in one place, infused with the intelligence of Microsoft 365 Copilot for Planner (preview).
Export your plans to Excel
View, analyze, and share your plan data in another format by exporting it to Excel. To leverage this capability, go to the dropdown menu in the header of any plan and select ‘Export to Excel’. Learn more about how to export a plan to Excel and how to use Excel to interact with your plan data.
Copy plans
Got a plan that you find yourself using as a template for other plans? With the new ‘Copy plan’ feature, duplicating your plans is easier than ever! Just select ‘Copy plan’ from the dropdown menu of any plan’s header. All tasks in the plan will be copied over. Basic plans let you choose to include priority, dates, descriptions, checklists, and labels, while premium plans copy these by default and also include attachments.
Access plans created in Teams meetings
You can now view task lists created in Teams Meeting Notes via the Loop task list component in the My Plans view of Planner. Learn how to add a task list to a meeting and then view the task list in Planner.
Edit recipient teams for an upcoming task list in task publishing
Task publishing is a feature for frontline organizations that allows central leaders to create a list of tasks, distribute those tasks to multiple locations, and monitor execution across locations. Learn more about publishing in our blog post earlier this year or at https://aka.ms/taskpublishing.
We have recently released the ability to edit recipient teams for a scheduled task list and for the future occurrences of a recurring task list. You’ll find this action by clicking the … menu next to the name of the list in the lefthand navigation, which will allow you to select an updated set of recipients. This is great for updating recurring lists after new locations are opened, old locations are closed, or organizational changes mean that a different set of locations should be receiving the tasks.
Two new templates with more rolling out soon
We’re excited to be rolling out two new out-of-the-box templates that can help your team with customer relationship management and ticket triaging! To access these templates, select the “+ New Plan” button in the Planner app and then “See all templates”.
Share your feedback
Your feedback helps inform our feature updates and we look forward to hearing from you as you try out Planner’s new and existing capabilities!
Provide feedback on the new Planner for the web to our team by using the Feedback button in the top right corner of the app. We also encourage you to share any features you would like to see in the app by adding it to our Planner Feedback Portal.
Resources
Check out the recently refreshed Planner adoption page.
Sign up to receive future communication about Planner.
Check out the Microsoft 365 roadmap for feature descriptions and estimated release dates for Planner.
Watch Planner demos for inspiration on how to get the most out of the new Planner app in Microsoft Teams.
Watch the recording from September’s What’s New and What’s Coming Next + AMA about the new Planner.
Visit the Planner help page to learn more about the capabilities in the new Planner.
Microsoft Tech Community – Latest Blogs –Read More
Announcing Serverless Support for Socket.IO in Azure Web PubSub service
We are excited to announce the public preview of Socket.IO Serverless Mode in Azure Web PubSub service. This new mode eliminates the need for developers to maintain persistent connections on their application servers, offering a more streamlined and scalable approach. In addition to the existing default mode, developers can now deploy Socket.IO applications in a serverless environment using Azure Functions. This provides a stateless, highly scalable infrastructure, simplifying the development of real-time features while reducing both operational costs and maintenance overhead.
What is Socket.IO Serverless Mode?
In the existing default mode, all Socket.IO clients connect directly to Azure Web PubSub. developers don’t need to worry about if they have 100 or 1 million concurrent users. The service handles scaling up or down to meet the fluctuation of application users. However, the application server, which handles the business logic, must maintain a persistent connection with the service, adding complexity compared to stateless HTTP services.
Persistent connections introduce challenges. Unlike HTTP services, which can quickly recover from downtime, servers with persistent connections require continuous uptime to manage client communication.
Developer familiarity: Teams accustomed to stateless HTTP services may find persistent connections introduce engineering difficulties.
Cost inefficiency: In scenarios with low-frequency real-time messaging, maintaining persistent connections results in unnecessary compute costs, such as managing “ping-pong” heartbeats used by Socket.IO for disconnection detection.
As serverless computing gains popularity, developers are seeking ways to reduce server management burdens while focusing on core business logic. Socket.IO Serverless Mode offers a flexible, serverless deployment model, allowing real-time, bi-directional communication between clients and servers without requiring persistent server connections.
In the new serverless mode, Socket.IO servers become stateless, pushing messages to clients via RESTful APIs and receiving messages via webhooks, all without compromising on real-time communication between clients and server. Socket.IO clients still have persistent connections with the service, but now developers can focus on writing backend logic as stateless Azure Functions, simplifying deployment and scaling.
This capability is not natively supported by Socket.IO library and is made possible by Azure Web PubSub for Socket.IO. It is part of our ongoing commitment to enhancing Socket.IO developers’ experience and simplifying developing real-time applications.
Differences Between Default Mode and Serverless Mode
Here is a common architecture of the default mode and serverless with using Azure Web PubSub for Socket.IO. You can read more about the differences in detail in the feature overview.
Getting Started with Socket.IO Serverless Mode
Socket.IO Serverless Mode is ideal for scenarios that require lightweight, event-driven communication without the need for persistent backend connections. One of the best starting points is broadcasting messages to Socket.IO clients. Applications such as live sports scores, financial tickers, or real-time dashboards can benefit greatly from the scalability and cost effectiveness that serverless architecture offers.
To get started, follow our “publish messages” tutorial and build a real-time stock index application with Python and Azure Functions.
In addition to one-way broadcasting, bi-directional real-time communication between clients and servers remains a key feature of Socket.IO. Check out our “build chat app” tutorial for a step-by-step guide to implementing bi-directional communication using Socket.IO Serverless mode.
For a quick hands-on experience, visit our “quickstart” to see how to build and deploy a chat application with Socket.IO Serverless Mode, featuring identity-based authentication.
Microsoft Tech Community – Latest Blogs –Read More
IPv6 updates for Exchange Online
Microsoft has recently introduced several key updates to IPv6 traffic for Exchange Online. These updates are designed to enhance security, improve performance, and ensure compliance with modern Internet standards. This blog provides a summary of these changes and their implications for customers.
Outbound IPv6 Email
Although IPv6 has been supported for outbound mail for some time, we wanted to officially announce that Microsoft now uses IPv6 for email sent from Exchange Online. Generally, our platform prioritizes IPv6 addresses for outbound email traffic (if the recipient server supports it), favoring IPv6 AAAA records over IPv4 A records.
For instance, when sending messages to LinkedIn.com, the hostnames below are returned as MX records. Each MX record includes a preference value (also known as priority), where lower numbers indicate higher priority. Email servers attempt to deliver messages to the MX host with the lowest preference value first. If multiple MX records share the same preference value, the sending servers may choose among them based on other factors, such as the availability of IPv6 or IPv4 addresses. In this example, we first try all the IPv6 addresses for hosts mail-a, mail-c, and mail-d (since they share a preference value of 10), followed by their IPv4 addresses, before moving on to mail.linkedin.com with a higher preference value of 20. Note that in certain scenarios, IPv4 may still be prioritized; in such cases, we would use IPv4 addresses initially, then IPv6, before resorting to the lower priority option.
Preference
Hostname
IP
10
mail-a.linkedin.com
108.174.0.215
10
mail-a.linkedin.com
2620:119:50c0:207::215
10
mail-c.linkedin.com
108.174.3.215
10
mail-c.linkedin.com
2620:109:c006:104::215
10
mail-d.linkedin.com
108.174.6.215
10
mail-d.linkedin.com
2620:109:c003:104::215
20
mail.linkedin.com
108.174.0.215
Inbound IPv6 email
Starting in mid-October, and rolling out over the next 3-6 months, we will begin gradually allocating IPv6 addresses to all customer Accepted Domains that use Exchange Online for inbound mail, including *.onmicrosoft.com domains. Customers will receive Message Center posts notifying them of the change before it is enabled in their tenant. Once IPv6 is enabled, email senders delivering messages into Exchange Online and querying the MX record hostnames for customer domains will now receive both IPv4 and IPv6 addresses (A and AAAA records). This modernization will help our customers comply with regulations and benefit from the enhanced security and performance offered by IPv6. For most customers, this will be the new default behavior.
In some cases, activating IPv6 will affect the source IP type (IPv4 vs IPv6) used by senders connecting to Exchange Online, as the IP versions must match. Since RFC 5321 doesn’t favor one IP type over another, some senders might switch from IPv4 to IPv6 during this rollout. Note that senders should have a valid reverse DNS lookup (PTR) record and either SPF or DKIM verification are required for seamless mail flow over IPv6
For a small percentage of our customers, IPv6 will not be activated, and they will be automatically opted out of the IPv6 rollout for their Accepted Domain(s). Microsoft is opting out these customers because they have dependencies on IPv4 and introducing IPv6 for these customers might affect their mail flow. Proper configuration when enabling IPv6-readiness is essential, as misconfiguration of specific features may disrupt mail flow. If our telemetry detects any of the specified configurations listed below in a customer tenant, the tenant will be automatically excluded from IPv6 enablement, and the admin will be notified via a Message Center post of their opt-out status. To use IPv6, admins will need to manually enable it and ensure their setup is configured properly for both IPv4 and IPv6.
Customers with the following configurations will be opted-out during this rollout to avoid any disruptions in mail flow. At any time, a tenant admin can also opt out proactively using PowerShell, as detailed below.
Customers using Exchange Transport Rules (ETR) with the SenderIPRanges predicate might experience issues. This could occur when the sender’s IP for traffic to your tenant is IPv6, causing the ETR that relies on the SenderIPRanges predicate to fail in identifying the sender’s IPv4 address, thereby impacting mail flow to your tenant.
Prior to enabling IPv6: Modify your Exchange Transport Rules that use the SenderIPRanges predicate to include the IPv6 ranges of your partners, ensuring comprehensive coverage for email traffic affected by Exchange transport rules.
Customers employing Microsoft Purview Data Loss Prevention (DLP) Policies with the SenderIPRanges predicate may encounter issues. This could occur when the sender’s IP for traffic to your tenant is in IPv6, causing the transport rule that relies on the SenderIPRanges predicate to fail in identifying the sender’s IPv4 address, thereby affecting mail flow to your tenant.
Prior to enabling IPv6: Update your Microsoft Purview Data Loss Prevention (DLP) Policies that use the SenderIPRanges predicate to include the IPv6 ranges of your partners, ensuring comprehensive coverage for the email traffic affected by this transport rule.
Customers using IP Address-based Inbound Connectors in Exchange Online that reference IPv4 addresses might experience issues if the sender switches to IPv6, causing the connector to fail to match the Sender’s IP and affecting mail flow.
Prior to enabling IPv6, customers should:
Coordinate with the sender to ensure they continue connecting via IPv4; or
Convert the IP-based connector to a certificate domain-based connector. This applies to both On-Premises type (From: Your organization’s email server, To: Office 365) and Partner Type connectors (From: Partner organization, To: Office 365).
Enhanced Filtering for Connectors – Customers that have configured Enhanced Filtering for Connectors will need to review their configuration to ensure that both IPv4 and IPv6 addresses for their specific devices are included. Note that IPv6 entries can only be added via PowerShell at this time.
How to opt-in for IPV6 inbound and confirming your status
To manually opt-in or opt-out of IPv6 for your Accepted Domain(s), you can use the Enable/Disable-IPv6ForAcceptedDomain cmdlet with the -Domain parameter. For more details on this cmdlet, refer to this link.
For example:
Enable-IPv6ForAcceptedDomain -Domain contoso.com
Enable-IPv6ForAcceptedDomain -Domain contoso.onmicrosoft.com
Disable-IPv6ForAcceptedDomain -Domain contoso.com
Disable-IPv6ForAcceptedDomain -Domain contoso.onmicrosoft.com
Customers can check the status of their Accepted Domains using the new Get-IPv6StatusForAcceptedDomain command. Note it may take up to an hour for a change to be reflected.
For example:
Get-IPv6StatusForAcceptedDomain -Domain contoso.com
Microsoft Defender for Office 365: IPv6 allow and block support in the Tenant Allow/Block List
Admins can now create allow and block entries for IPv6 directly inside the Tenant Allow/Block List within the Defender portal, or by using the New-TenantAllowBlockListItems cmdlet (ListType parameter with value IP). This change will not affect any current Tenant Allow/Block List entries or IPv4 entries in the hosted connection filter policy or enhanced filtering connection policy. This applies to customers with Exchange Online Protection or Microsoft Defender for Office 365 Plan 1 or Plan 2 service plans. Note that IPv4 entries are not yet allowed (coming soon), and there are some entry limits, please see more detail here.
Customers will be able to add these IPv6 allow and block entries in these formats:
Colon-hexadecimal notation single IPv6 address (for example, 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
Zero compression single IPv6 address (for example, 2001:db8::1)
Classless inter-domain routing (CIDR) IPv6 (for example, 2001:0db8::/32). The range supported is 1-128.
The IPv6 updates for Exchange Online enhance security, performance, and compliance with modern standards. By prioritizing IPv6 for outbound emails and enabling it for inbound mail Microsoft is helping customers stay ahead of regulatory requirements. Customers should review their configurations to fully benefit from these updates.
Microsoft 365 Messaging Team
Microsoft Tech Community – Latest Blogs –Read More