Category: Microsoft
Category Archives: Microsoft
Microsoft Stream Admin Center?
Similar to its previous version, are there a new admin center for Stream so that we (global admins) can manage the recordings that was done within our organization?
An incident recently occurred where we used one of our VC accounts to record a webinar but then the recording was saved in a OneDrive of one of our employees randomly.
As admins previously, we would be able to download the recording directly without having to request access from the user.
I hope this wasn’t how Microsoft intends to move forward with the new stream application.
Similar to its previous version, are there a new admin center for Stream so that we (global admins) can manage the recordings that was done within our organization? An incident recently occurred where we used one of our VC accounts to record a webinar but then the recording was saved in a OneDrive of one of our employees randomly.As admins previously, we would be able to download the recording directly without having to request access from the user.I hope this wasn’t how Microsoft intends to move forward with the new stream application. Read More
How can I appear “busy” to external users during a date range in Bookings?
In my company, we have a monthly collaboration week where employees come into the office. During that week each month, I don’t want external users viewing “Book time with me” to see my availability. I want to block that time to dedicate myself to internal meetings. I want coworkers to be able to see my availability and schedule time with me via Outlook calendar requests. Can I appear “busy” externally only during that week? This is related to both Outlook and Bookings, but I am not finding a tag for Bookings at all.
In my company, we have a monthly collaboration week where employees come into the office. During that week each month, I don’t want external users viewing “Book time with me” to see my availability. I want to block that time to dedicate myself to internal meetings. I want coworkers to be able to see my availability and schedule time with me via Outlook calendar requests. Can I appear “busy” externally only during that week? This is related to both Outlook and Bookings, but I am not finding a tag for Bookings at all. Read More
Are Proxy Servers Supported in the Linux Version of Edge?
I can’t find proxy server settings in edge. Online advice says to go to “Advanced Settings” in “settings” but there is no “Advanced Settings” in the linux version. The search box in Settings returns no info about proxy server settings. This is “Version 126.0.2592.87 (Official build) (64-bit)”.
Any ideas? Is this capability removed from edge?
I can’t find proxy server settings in edge. Online advice says to go to “Advanced Settings” in “settings” but there is no “Advanced Settings” in the linux version. The search box in Settings returns no info about proxy server settings. This is “Version 126.0.2592.87 (Official build) (64-bit)”. Any ideas? Is this capability removed from edge? Read More
Adding multiple external email domains in ms365 business Premium?
I have a ms365 business premium account, and want to add two different external email domains to manage emails within ms365.
How do I do this?
I have a ms365 business premium account, and want to add two different external email domains to manage emails within ms365. How do I do this? Read More
Word templates in SharePoint are now opening as new documents instead of the template itself opening
Up until a couple of weeks ago, if I had a .dotx or .dotm file in SharePoint, clicking on it in the browser would open the template so that I can edit it. Suddenly, I get a “Document 1” as if I’d double clicked it from Explorer. This is fine as a user, as I’ve had times where people have a bunch of documents saved as templates as they’ve opened the template and saved.
However, how am I supposed to edit the templates now? I know I can do it via syncing and opening up via Explorer, however this is not ideal as if a document linked to it is in use, my changed version won’t sync or will be uploaded as a copy with my laptop name appended to it. The version of the template that everyone is linked to will remain unchanged.
Up until a couple of weeks ago, if I had a .dotx or .dotm file in SharePoint, clicking on it in the browser would open the template so that I can edit it. Suddenly, I get a “Document 1” as if I’d double clicked it from Explorer. This is fine as a user, as I’ve had times where people have a bunch of documents saved as templates as they’ve opened the template and saved. However, how am I supposed to edit the templates now? I know I can do it via syncing and opening up via Explorer, however this is not ideal as if a document linked to it is in use, my changed version won’t sync or will be uploaded as a copy with my laptop name appended to it. The version of the template that everyone is linked to will remain unchanged. Read More
Delivery %complete Combo Chart Doughnut Secondary Axis & pointer is Scatter w/ Straight Line
I don’t have access to the “Calculation” Sheet that I pulled the below screenshots to, so I’m unable to figure out how to produce the below delivery dashboard that tells you percent delivered while having the blue line move pointing at the location on the Doughnut chart that represents that % complete. Can someone send an excel sheet that produces this graph that includes the sheet that it pulls the data from so I can see how to create this?
I don’t have access to the “Calculation” Sheet that I pulled the below screenshots to, so I’m unable to figure out how to produce the below delivery dashboard that tells you percent delivered while having the blue line move pointing at the location on the Doughnut chart that represents that % complete. Can someone send an excel sheet that produces this graph that includes the sheet that it pulls the data from so I can see how to create this? Read More
Update on the SharePoint Files dataset
In this blog post, we’ll cover 3 announcements about the upcoming SharePoint Files dataset public availability and pricing. If you’re not familiar with the SharePoint Files dataset (also known as SharePointFiles_v1 or BasicDataSet_v0.SharePointFiles_v1) or the Microsoft Graph Data Connect (MGDC) for SharePoint, start by reading this: https://aka.ms/SharePointData.
1) SharePoint Files dataset public availability – August 20th, 2024
The SharePoint Files dataset will be available publicly starting on August 20th, 2024. Any tenant signed up for the Microsoft Graph Data Connect (MGDC) for SharePoint will be able to access it following the regular steps for MGDC. For details on this and other datasets, see https://aka.ms/SharePointDatasets.
2) SharePoint Files dataset pricing – $0.75 per 50,000 objects
The SharePoint Files dataset will be billed at the reduced rate of $0.75 per 50,000 objects. This differentiated pricing applies only to the SharePoint Files dataset. There is no change to the billing of other MGDC datasets (including other SharePoint datasets), which will continue to be billed at their current rate. Billing for the SharePoint Files dataset will start when it becomes publicly available on August 20th, 2024.
3) SharePoint Files private preview extended to August 19th, 2024
The ongoing SharePoint Files dataset private preview will be extended until August 19th, 2024. For those tenants currently in the free private preview, billing will also start on August 20th, 2024 at the rate of $0.75 per 50,000 objects (as explained in #2 above). We are no longer accepting new tenants into the ongoing private preview.
Microsoft Tech Community – Latest Blogs –Read More
MCT Courseware content unavailable this week. I need current az-500 ppt and any other content.
I was hoping that the MCT courseware download library would be up by now. I have an AZ-500 class coming up and I have only got old PPT slides. If anyone can help me get the current slides and content I would really appreciate it.
Thanks,
Adam
email address removed for privacy reasons
I was hoping that the MCT courseware download library would be up by now. I have an AZ-500 class coming up and I have only got old PPT slides. If anyone can help me get the current slides and content I would really appreciate it. Thanks,Adamemail address removed for privacy reasons Read More
I need help writing code using the IF statement and COS in excel.
This is what I am trying to do: =IF(B5=1,COS(F5)*G5, IF(B5=4,-COS(F5)*G5)). What I get in the cell is just a repeat of the code and not a value.
This is what I am trying to do: =IF(B5=1,COS(F5)*G5, IF(B5=4,-COS(F5)*G5)). What I get in the cell is just a repeat of the code and not a value. Read More
New Blog | (Preview) Dynamic watermarking for sensitivity labels in Word, Excel, and PowerPoint
Sensitivity labels from Microsoft Purview Information Protection offer highly effective controls to limit access to sensitive files and to prevent users from taking inappropriate actions such as printing a document, while still allowing unhindered collaboration. However, it’s still possible for users to take pictures of sensitive information on their screen or of a presentation being shared either online or in-person, and some forms of screen-shotting cannot be blocked with existing technology. This loophole presents an easy way to bypass protections that sensitivity labels enforce on a document.
We’re excited to announce dynamic watermarking, a new feature for sensitivity labels in Word, Excel, and PowerPoint, which will both deter users from leaking sensitive information and attribute leaks if they do occur. This feature is rolling out to a public preview, with full general availability planned for later in 2024.
When an admin enables the dynamic watermarking setting for a protected sensitivity label, files with that sensitivity label will render with dynamic watermarks when opened in Word, Excel, and PowerPoint.
Read the full post here: (Preview) Dynamic watermarking for sensitivity labels in Word, Excel, and PowerPoint
By Camille Birch
Sensitivity labels from Microsoft Purview Information Protection offer highly effective controls to limit access to sensitive files and to prevent users from taking inappropriate actions such as printing a document, while still allowing unhindered collaboration. However, it’s still possible for users to take pictures of sensitive information on their screen or of a presentation being shared either online or in-person, and some forms of screen-shotting cannot be blocked with existing technology. This loophole presents an easy way to bypass protections that sensitivity labels enforce on a document.
We’re excited to announce dynamic watermarking, a new feature for sensitivity labels in Word, Excel, and PowerPoint, which will both deter users from leaking sensitive information and attribute leaks if they do occur. This feature is rolling out to a public preview, with full general availability planned for later in 2024.
When an admin enables the dynamic watermarking setting for a protected sensitivity label, files with that sensitivity label will render with dynamic watermarks when opened in Word, Excel, and PowerPoint.
Figure 1: Example of dynamic watermarking
Read the full post here: (Preview) Dynamic watermarking for sensitivity labels in Word, Excel, and PowerPoint Read More
New Blog | Dynamic watermarking hits the mark in protecting highly sensitive data
By Anna Chiang
In most organizations teams collaborate and handle sensitive and business critical information, such as documents that contain blueprints, entertainment artwork, classified government secrets or strategic alliances. It’s important to protect this high-business value corporate intellectual property at all times to deter data exfiltration. Clear labeling and protection (encryption) of confidential files helps communicate the importance and sensitivity of an item and protects against exfiltration to unauthorized users, as well as can prevent copy and paste, forward or print actions.
However, there is a situation where labels and protections aren’t enough. It’s still possible for users to take screenshots or pictures with a camera of confidential files. These pictures can end up in the wrong hands of competitors or the public via website posts.
With Microsoft Purview Information Protection, we provide an integrated solution that is built-in, intelligent, unified, and extensible. It identifies and protects sensitive data across your digital estate, which includes Microsoft clouds such as Microsoft 365 and Azure, as well as on-premises, hybrid and third-party clouds, and SaaS applications.
Today at Inspire, we are excited to announce the public preview of a new Information Protection capability for Microsoft 365 Office Word, Excel, and PowerPoint files called dynamic watermarking. This highly requested capability enables system admins to configure Purview sensitivity labels that visually displays the reader’s email address and date/timestamp information over the file content to attribute and deter leaks. This is now available to any customers who need to protect high-value Intellectual Property (IP) in various industries.
Extending comprehensive protection with differentiated capabilities
Dynamic watermarking is already supported in Teams meetings (), and each participant will see their own email address overlaid on the meeting video or shared content. This deters participants from taking unauthorized screenshots or pictures of the meeting content.
The application files that are shared in Teams meetings often consist of Word, Excel, or PowerPoint files which can be shared directly with others outside of meetings. There are existing ways to share highly sensitive information accessible only by a list of specific team members, for example using SharePoint user-defined-permissions. Dynamic watermarking extends protection of sensitive data by enabling an extra deterrent to oversharing by attributing the source of any potential leaks to specific people via their email address, as shown in the image below.
Read the full post here: Dynamic watermarking hits the mark in protecting highly sensitive data
By Anna Chiang
In most organizations teams collaborate and handle sensitive and business critical information, such as documents that contain blueprints, entertainment artwork, classified government secrets or strategic alliances. It’s important to protect this high-business value corporate intellectual property at all times to deter data exfiltration. Clear labeling and protection (encryption) of confidential files helps communicate the importance and sensitivity of an item and protects against exfiltration to unauthorized users, as well as can prevent copy and paste, forward or print actions.
However, there is a situation where labels and protections aren’t enough. It’s still possible for users to take screenshots or pictures with a camera of confidential files. These pictures can end up in the wrong hands of competitors or the public via website posts.
With Microsoft Purview Information Protection, we provide an integrated solution that is built-in, intelligent, unified, and extensible. It identifies and protects sensitive data across your digital estate, which includes Microsoft clouds such as Microsoft 365 and Azure, as well as on-premises, hybrid and third-party clouds, and SaaS applications.
Today at Inspire, we are excited to announce the public preview of a new Information Protection capability for Microsoft 365 Office Word, Excel, and PowerPoint files called dynamic watermarking. This highly requested capability enables system admins to configure Purview sensitivity labels that visually displays the reader’s email address and date/timestamp information over the file content to attribute and deter leaks. This is now available to any customers who need to protect high-value Intellectual Property (IP) in various industries.
Extending comprehensive protection with differentiated capabilities
Dynamic watermarking is already supported in Teams meetings (), and each participant will see their own email address overlaid on the meeting video or shared content. This deters participants from taking unauthorized screenshots or pictures of the meeting content.
The application files that are shared in Teams meetings often consist of Word, Excel, or PowerPoint files which can be shared directly with others outside of meetings. There are existing ways to share highly sensitive information accessible only by a list of specific team members, for example using SharePoint user-defined-permissions. Dynamic watermarking extends protection of sensitive data by enabling an extra deterrent to oversharing by attributing the source of any potential leaks to specific people via their email address, as shown in the image below.
Figure 1: PowerPoint file with dynamic watermarking enabled.
Read the full post here: Dynamic watermarking hits the mark in protecting highly sensitive data Read More
New Blog | Microsoft Entra Suite now generally available
Today we announced the general availability of Microsoft Entra Suite – the industry’s most comprehensive secure access solution for the workforce. The Microsoft Entra Suite delivers the most comprehensive Zero Trust user access solution and enables organizations to converge access policy engine across identities, endpoints, and private and public networks.
What is Microsoft Entra Suite?
The Microsoft Entra Suite delivers a complete cloud-based solution for workforce access. It brings together identity and network access that secures employee access to any cloud or on-premises application and resource from any location, consistently enforces least privilege access, and improves the employee experience.
This new offering advances our vision for the Microsoft Entra product line that can serve as a universal trust fabric for the era of AI, securely connecting any trustworthy identity with anything, from anywhere. In a recent blog post we also shared the four stages of creating such trust fabric for your organization, starting with foundational Zero Trust controls, and extending it to protecting access for your workforce, protecting access for your customers and partners, and protecting access in any cloud. The Microsoft Entra Suite delivers the complete toolset for the second stage of this journey – secure access for your workforce.
The Microsoft Entra Suite includes the following products:
Read the full post here: Microsoft Entra Suite now generally available
By Irina Nechaeva
Today we announced the general availability of Microsoft Entra Suite – the industry’s most comprehensive secure access solution for the workforce. The Microsoft Entra Suite delivers the most comprehensive Zero Trust user access solution and enables organizations to converge access policy engine across identities, endpoints, and private and public networks.
What is Microsoft Entra Suite?
The Microsoft Entra Suite delivers a complete cloud-based solution for workforce access. It brings together identity and network access that secures employee access to any cloud or on-premises application and resource from any location, consistently enforces least privilege access, and improves the employee experience.
This new offering advances our vision for the Microsoft Entra product line that can serve as a universal trust fabric for the era of AI, securely connecting any trustworthy identity with anything, from anywhere. In a recent blog post we also shared the four stages of creating such trust fabric for your organization, starting with foundational Zero Trust controls, and extending it to protecting access for your workforce, protecting access for your customers and partners, and protecting access in any cloud. The Microsoft Entra Suite delivers the complete toolset for the second stage of this journey – secure access for your workforce.
The Microsoft Entra Suite includes the following products:
Read the full post here: Microsoft Entra Suite now generally available
New Blog | Microsoft Security Service Edge now generally available
Today, we announced the general availability of the Microsoft Entra Suite which brings together identity and network access controls to secure access to any cloud or on-premises application or resource from any location. It consistently enforces least privilege access to achieve your governance requirements while improving your employee experience.
Companies today have good reason to focus on security. On one hand, we’re reaping the advantages of increased scalability, efficiency, and cost reductions, including all the benefits gained from generative AI’s large language models. However, these advantages also make it possible for malicious actors to exploit advanced technologies to create malware, target network vulnerabilities, and generate phishing attacks that put organizations’ data and reputations at higher risk.
When identity and network access solutions operate in isolation and not in tandem, they can lead to increased complexity, inconsistent policies, and a lack of unified context across standalone solutions. This can unintentionally result in a fragmented security posture and vulnerabilities that malicious actors could exploit, potentially disrupting business continuity and compromising the user experience.
Neither identity nor network security controls alone can protect all your access scenarios, highlighting the need for you to adopt a holistic strategy to counteract evolving threats and protect your critical assets—no matter where the users and resources are located.
The case for unified security: A strategic imperative
Along with the Microsoft Entra Suite general availability, we also announced Microsoft’s Security Service Edge (SSE) solution general availability, Microsoft Entra Private Access and Microsoft Entra Internet Access. These two products coupled with our SaaS security-focused CASB—Microsoft Defender for Cloud apps—comprise Microsoft’s Security Service Edge solution, a cloud-delivered, identity-centric networking model that transforms the way you secure access.
Microsoft’s SSE solution is all about helping you eliminate security gaps in your defenses, extending Conditional Access and continuous access evaluation to all your applications and resources, whether they’re on-premises or in any cloud.
Read the full post here: Microsoft Security Service Edge now generally available
By Sinead O’Donovan
Today, we announced the general availability of the Microsoft Entra Suite which brings together identity and network access controls to secure access to any cloud or on-premises application or resource from any location. It consistently enforces least privilege access to achieve your governance requirements while improving your employee experience.
Companies today have good reason to focus on security. On one hand, we’re reaping the advantages of increased scalability, efficiency, and cost reductions, including all the benefits gained from generative AI’s large language models. However, these advantages also make it possible for malicious actors to exploit advanced technologies to create malware, target network vulnerabilities, and generate phishing attacks that put organizations’ data and reputations at higher risk.
When identity and network access solutions operate in isolation and not in tandem, they can lead to increased complexity, inconsistent policies, and a lack of unified context across standalone solutions. This can unintentionally result in a fragmented security posture and vulnerabilities that malicious actors could exploit, potentially disrupting business continuity and compromising the user experience.
Neither identity nor network security controls alone can protect all your access scenarios, highlighting the need for you to adopt a holistic strategy to counteract evolving threats and protect your critical assets—no matter where the users and resources are located.
The case for unified security: A strategic imperative
Along with the Microsoft Entra Suite general availability, we also announced Microsoft’s Security Service Edge (SSE) solution general availability, Microsoft Entra Private Access and Microsoft Entra Internet Access. These two products coupled with our SaaS security-focused CASB—Microsoft Defender for Cloud apps—comprise Microsoft’s Security Service Edge solution, a cloud-delivered, identity-centric networking model that transforms the way you secure access.
Microsoft’s SSE solution is all about helping you eliminate security gaps in your defenses, extending Conditional Access and continuous access evaluation to all your applications and resources, whether they’re on-premises or in any cloud.
Read the full post here: Microsoft Security Service Edge now generally available Read More
New Blog | Azure WAF Public Preview: JavaScript Challenge
By David Frazee
Microsoft has recently released JavaScript challenge in public preview for Azure WAF on Application Gateway and Azure Front Door.
Approximately 48% of internet traffic is generated by bots, with 30% attributed to malicious bots. These harmful bots are programmed to attack web and mobile applications for fraudulent and malevolent purposes. These bad bots are typically automated test scripts that scrape websites to manipulate SEO rankings or prices, launch denial-of-inventory attacks and commit other malicious activities. Considering the risks associated with internet-exposed web applications, it is necessary for Azure WAF to detect and mitigate the bad bots. The mitigation of these attacks is accomplished by the Azure WAF JavaScript challenge.
The Azure WAF JavaScript (JS) challenge feature is a non-interactive, invisible web challenge used to distinguish legitimate users from bad bots. It is an invisible check issued to legitimate users and attackers as an intermediate page. Bad bots will fail the JS challenge but real users will not. Furthermore, JS challenges eliminate friction for real users since they don’t require any intervention from humans. Hence, Azure WAF JS challenge is an effective method to protect against bot attacks without introducing customer friction.
Key Features
The invisible challenge is presented when a user’s request matches a specific rule, prompting the client’s browser to compute the challenge without user interaction. Successful computation allows the user through, while failed attempts block malicious bots. The challenge is reissued if the user’s IP address changes or if they access the page from a different domain, ensuring continuous protection.
Read the full post here: Azure WAF Public Preview: JavaScript Challenge
By David Frazee
Microsoft has recently released JavaScript challenge in public preview for Azure WAF on Application Gateway and Azure Front Door.
Approximately 48% of internet traffic is generated by bots, with 30% attributed to malicious bots. These harmful bots are programmed to attack web and mobile applications for fraudulent and malevolent purposes. These bad bots are typically automated test scripts that scrape websites to manipulate SEO rankings or prices, launch denial-of-inventory attacks and commit other malicious activities. Considering the risks associated with internet-exposed web applications, it is necessary for Azure WAF to detect and mitigate the bad bots. The mitigation of these attacks is accomplished by the Azure WAF JavaScript challenge.
The Azure WAF JavaScript (JS) challenge feature is a non-interactive, invisible web challenge used to distinguish legitimate users from bad bots. It is an invisible check issued to legitimate users and attackers as an intermediate page. Bad bots will fail the JS challenge but real users will not. Furthermore, JS challenges eliminate friction for real users since they don’t require any intervention from humans. Hence, Azure WAF JS challenge is an effective method to protect against bot attacks without introducing customer friction.
Key Features
The invisible challenge is presented when a user’s request matches a specific rule, prompting the client’s browser to compute the challenge without user interaction. Successful computation allows the user through, while failed attempts block malicious bots. The challenge is reissued if the user’s IP address changes or if they access the page from a different domain, ensuring continuous protection.
Read the full post here: Azure WAF Public Preview: JavaScript Challenge
Change Name of SharePoint List Entry for Search in SharePoint Site
Hello!
Whenever a user searches in a SharePoint site for an item in a list, the right entry appears but the name that pops up is the value that the user entered in the “Quote #” column in the list (480364 in the attached image).
I was wondering if it is possible to change what property appears to make the search process easier for people (quote # is not the most recognizable property). In my SharePoint list, the Quote # column is not ordered to be first so I’m not sure why SharePoint decided to make that the field that identifies the list entry. I do notice that the Quote # column is bolded when I open my SharePoint list – perhaps it is the main/identifying column? Can I change this somehow?
Normally people would be searching for the item using another field called Shipper #. I wish for this value to be the title.
Hello! Whenever a user searches in a SharePoint site for an item in a list, the right entry appears but the name that pops up is the value that the user entered in the “Quote #” column in the list (480364 in the attached image). I was wondering if it is possible to change what property appears to make the search process easier for people (quote # is not the most recognizable property). In my SharePoint list, the Quote # column is not ordered to be first so I’m not sure why SharePoint decided to make that the field that identifies the list entry. I do notice that the Quote # column is bolded when I open my SharePoint list – perhaps it is the main/identifying column? Can I change this somehow? Normally people would be searching for the item using another field called Shipper #. I wish for this value to be the title. Read More
Having an issue accessing Microsoft Teams Admin Center.
Hello
Please i need your help on this issue.
One of my customer is having an issue accessing Microsoft Teams Admin Center.
His email is hosted by GoDaddy. The former employee who was the Global admin has left the company and they have deleted the account of the formal Global admin from the control panel of Godaddy.
But when ever the customer want to access Teams Admin center he gets the error below:”
How possible can the customer get access the Teams admin center
Hello Please i need your help on this issue. One of my customer is having an issue accessing Microsoft Teams Admin Center. His email is hosted by GoDaddy. The former employee who was the Global admin has left the company and they have deleted the account of the formal Global admin from the control panel of Godaddy. But when ever the customer want to access Teams Admin center he gets the error below:” How possible can the customer get access the Teams admin center Read More
How to create & manage a Conceptual Data Model, in Purview?
At my organization, we’re learning to use Purview for data governance. For example, we’ve started to use the Data Map to get assets from our data warehouse, and enrich those assets with additional metadata in Purview. Nice!
Now, I’d also like to create our org’s conceptual data model in Purview, somehow. That is, (a) our real-world objects, independent of any systems/data, each with a name and a definition/description; plus (b) the relationships between these objects, each with the cardinality and description. And I’d like for all our our end users to be able to read the conceptual data model, in Purview.
But how? I am reading lots of Purview documentation in Microsoft Learn, and it seems there could be several possible solutions. But it’s not clear to me that any one of these solutions is the right fit, for this use case. Has anyone done this in Purview? Any recommendations? Should our conceptual data model be created in Purview…
…as Glossary Terms? (Can these have relationships with each other?)…in the Metamodel? (Maybe with custom asset types? I know I can create relationships, here—that’s key.)…as Critical Data Elements? (Can these have relationships with each other? This could be nice because then I could relate objects in the conceptual model to actual data points in the data warehouse.)…as something else?
At my organization, we’re learning to use Purview for data governance. For example, we’ve started to use the Data Map to get assets from our data warehouse, and enrich those assets with additional metadata in Purview. Nice! Now, I’d also like to create our org’s conceptual data model in Purview, somehow. That is, (a) our real-world objects, independent of any systems/data, each with a name and a definition/description; plus (b) the relationships between these objects, each with the cardinality and description. And I’d like for all our our end users to be able to read the conceptual data model, in Purview. But how? I am reading lots of Purview documentation in Microsoft Learn, and it seems there could be several possible solutions. But it’s not clear to me that any one of these solutions is the right fit, for this use case. Has anyone done this in Purview? Any recommendations? Should our conceptual data model be created in Purview… …as Glossary Terms? (Can these have relationships with each other?)…in the Metamodel? (Maybe with custom asset types? I know I can create relationships, here—that’s key.)…as Critical Data Elements? (Can these have relationships with each other? This could be nice because then I could relate objects in the conceptual model to actual data points in the data warehouse.)…as something else? Read More
List Views not showing in Dropdown
Hi all – when I go to one of my lists, the drop down only shows the “All Items” view and not all of the other 12 views. Not sure why? I’ve attached an image of the dropdown, and then an image of the list settings for this view where you can see the other 12 views. I can click on those and eventually open the view, but I need all of them to show in the dropdown…..is there a setting I need to change somewhere?
Hi all – when I go to one of my lists, the drop down only shows the “All Items” view and not all of the other 12 views. Not sure why? I’ve attached an image of the dropdown, and then an image of the list settings for this view where you can see the other 12 views. I can click on those and eventually open the view, but I need all of them to show in the dropdown…..is there a setting I need to change somewhere? Read More
PS Script for SharePoint Online to Pull Filename w Extension, Uploaded during a Time Period
Pretty much what the subject has. I need PS Script for SharePoint Online to Pull Filename with Extension Uploaded during a Designated Time Period on a specific site. I have tried to use Purview and Sentinel. Our Purview does not work at all and Microsoft has been no help. And there is nothing for File Size in Sentinel, otherwise I have what I need, but I definitely need the file sizes of each of the files.
Pretty much what the subject has. I need PS Script for SharePoint Online to Pull Filename with Extension Uploaded during a Designated Time Period on a specific site. I have tried to use Purview and Sentinel. Our Purview does not work at all and Microsoft has been no help. And there is nothing for File Size in Sentinel, otherwise I have what I need, but I definitely need the file sizes of each of the files. Read More
Power Pivot limiting filter options but still allowing filtering
Hi,
I have loaded some data into power pivot that I am using in reports going to different cost centres owners. I have filtered on the cost centres needed for each report but I want to stop the cost centre owners from being able to select cost centres that aren’t theirs, though still be able to use the cost centre field to filter on their own cost centres and move that around as they see fit. Is it possible? How can I do it?
Hi, I have loaded some data into power pivot that I am using in reports going to different cost centres owners. I have filtered on the cost centres needed for each report but I want to stop the cost centre owners from being able to select cost centres that aren’t theirs, though still be able to use the cost centre field to filter on their own cost centres and move that around as they see fit. Is it possible? How can I do it? Read More