Category: Microsoft
Category Archives: Microsoft
delete files in Preservation hold library
Hi All,
To create some free space, i would like to delete files from preservation hold library for all my sites in sharepoint.
I believe all the files in Preservation hold library are user deleted files..is that correct?
Can I delete all the files in Preservation hold Library without asking users or site owner ?
I already deleted GB’s of data but cannot see any free space, I already waited for 48 hours.
Thanks in advance,
Alex
Hi All, To create some free space, i would like to delete files from preservation hold library for all my sites in sharepoint. I believe all the files in Preservation hold library are user deleted files..is that correct?Can I delete all the files in Preservation hold Library without asking users or site owner ? I already deleted GB’s of data but cannot see any free space, I already waited for 48 hours. Thanks in advance,Alex Read More
Summer updates for SharePoint Premium services including Autofill, Graph APIs, promo extensions, and
We’re excited to share what’s new with SharePoint Premium content services this summer! In this round of updates, we’re sharing details on the general availability of autofill columns and the sensitive information prebuilt model, along with Graph API documentation to process models.
Autofill columns in SharePoint libraries
It’s here – the new SharePoint autofill columns feature for document libraries is rolling out now, and it’s a game changer for managing your files and metadata.
Autofill columns use AI to extract, summarize, generate, or evaluate content from the files you upload to a SharePoint library. You just need to write a simple prompt in natural language, and the system will save the answer to the column. You can ask “What is the deadline for this project” or state “Summarize this document in three sentences”, then run the Autofill action, and the column will populate for each file in that library, and all new files added – whether the answer is short text, longform response, numbers, date, choice, hyperlink, or currency.
Here are some examples:
Prompt
Sample Response
[Extract]
What is the end date of the agreement?
August 3, 2024
[Classify]
If this is a legal document, respond with “True” or “False” only. If the document doesn’t provide enough information, leave the response blank.
True
[Generate]
Summarize this document in 30 words or less
Summarize this document in 30 words or less. This document outlines a consulting services agreement between Jon Smith and a company for a home renovation design project, including scope, responsibilities, fees, and completion criteria.
[Evaluate]
Summarize this document in 30 words or less and apply the most relevant Taylor Swift song title based on the sentiment.
This document outlines a consulting services agreement between Jon Smith and a company for a home renovation design project, including scope, responsibilities, fees, and completion criteria.
The sentiment of the document is professional and forward-looking. The most relevant Taylor Swift song title that reflects the sentiment of this document could be “Begin Again”, as it suggests a new start or project, which aligns with the nature of a consulting agreement for home renovation.
[Impersonate]
Imagine you’re a pirate, respond with a short summary like a pirate would write.
Arrr, this document be a contract with Jon Smith and a company to renovate his ship, matey.
Autofill columns work with common file types such as PDF, Word, Excel, PowerPoint, etc. They can also work in conjunction with other SharePoint Premium models, such as prebuilt models, to extract values that the other model may not get.
Getting your autofill columns set up is simple. Once your admin enables it, you’ll add a new column in your SharePoint library, and select the autofill option. Then, write your prompt or use one of the suggested prompts provided. Test your prompt on any file in the library and see the result. When you’re happy with your prompt, save it and apply it to files you select and choose the “Autofill” action.
Autofill columns are rolling out now, and we hope they’ll help you find, sort, filter, and analyze your files more easily and efficiently. Learn more: Overview of autofill columns Microsoft Syntex – Microsoft Syntex | Microsoft Learn
Sensitive information prebuilt models
Document processing models help you automate the classification and extraction of information from documents – such as forms, invoices, contracts, and receipts – with either custom models that you build, or prebuilt models that we provide. Today, we’re excited to roll out a new type of prebuilt model that helps those of you who work with documents containing sensitive information, such as personal or financial data.
With the sensitive information prebuilt model, you can swiftly detect and optionally extract email addresses, phone numbers, and physical addresses from countless documents. In just a few clicks, organize this vital information in your SharePoint library.
No coding or training is needed to use this sensitive information prebuilt model, and you can configure it in a few simple steps. Choose the language and the entities you want to detect and / or extract, and then test the model on some sample files. Once you’re happy with the results, apply the model to any library. The model will then display the detected entities in a column, and if you chose to extract values, those are put in their own columns. You can use these columns to sort, filter, or analyze your files. The sensitive information prebuilt model can even read printed or handwritten text. In the future, we intend to support this model for detection/extraction on encrypted files, and apply sensitivity or retention labels just as you can with other models today.
Speaking of processing models, you can now specify the page range to extract information from when you’re using document processing models. Now you don’t have to extract from an entire file, and can process just the pages you select. This can be a great cost and time savings by reducing the number of pages processed.
Monthly included capacity promo – now extended through June 2025!
You’ll recall that we’ve been running a promotional offer that gives you monthly included capacity for many SharePoint Premium pay-as-you-go services. This offer is now extended through June 2025!
Both autofill columns and the sensitive information prebuilt models are part of the monthly included capacity promotional offer. Autofill columns are under the unstructured documents processing service, and with this promo, you can process up to 100 pages per month with autofill at no cost. Similarly, for the prebuilt models for sensitive information you’ll be able to process up to 100 pages each month at no cost.
We hope you’ll give both autofill columns and sensitive information prebuilt models a try. Let us know in the comments how you’re using these AI-powered content management capabilities.
SharePoint Content AI Model Graph APIs
For customers and partners alike, we’re announcing the launch of SharePoint Content AI Model Graph APIs. These models, which include unstructured, structured, freeform and prebuilt document processing, are now accessible through Graph APIs. These APIs enable developers to list existing models on a library, apply or un-apply a model, and create processing jobs for document metadata extraction from, and labeling of, your content. The launch introduces two new resource types to Microsoft Graph: ‘content model’ and ‘document processing job.’ These additions come with new methods that allow developers to:
Get
Read the properties and relationships of a contentModel object.
Get applied drives
List all the contentModelUsage information related to an applied contentModel.
Get by name
Read the properties and relationships of a contentModel object by its model name.
Add to drive
Automatically process new documents in the library.
Remove from drive
Remove the contentModel from the document library.
Create
Create a new documentProcessingJob object.
Developers can now build sophisticated applications that integrate with SharePoint’s existing Graph APIs. For instance:
• An application for document metadata extraction can work with Exchange and monitor an email inbox, extract email attachments to SharePoint, and use content AI models to extract critical metadata.
• A content migration application can upload documents from a network drive to SharePoint Online, using content AI models to set content type, extract metadata, and apply sensitivity and retention labels.
These new Graph APIs offer unified authorization and SDK experiences, so it’s easier for developers to build more complex apps. Additionally, developers can programmatically manipulate content AI models and process files with or without UI interaction, streamlining the development process. Plus, leverage Graph calls to harness the full potential of Content AI with SharePoint Embedded! Learn more in our Graph API documentation for contentModel and documentProcessingJob.
Content Management Advocates spotlight
Earlier this year, we launched a new initiative to share the great work of the many thought leaders in the content management space. Check out the work of some Content Management Advocates below!
• Read Leon Armston’s timely new blog post on Autofill Columns. Learn how to enable it in your tenant for users, get more prompt ideas, and combine this with other SharePoint Premium document processing models for even better experiences.
• Watch Steve Corey’s video on SharePoint Document Translation which features a tutorial on how to enable and configure the translation feature.
• Learn from Juan Carlos Gonzalez’s video on how to set up Pay-as you-go services in SharePoint Premium.
Try out these capabilities today
Since we’ve extended the promotional offer for free monthly capacity of many SharePoint Premium pay-as-you-go capabilities through June 2025, there’s no better time to get started with SharePoint autofill columns and sensitive information prebuilt models. For our developers in the community, give Graph APIs a try and let us know the types of apps you’re building.
Unsure about how pay-as-you-go pricing works or how to manage costs? The SharePoint Premium pay-as-you-go calculator is a helpful tool for predicting costs associated with using our content management capabilities. This calculator gives you a better understanding of your organization’s usage patterns and estimated costs so you can make more informed decisions with your budget.
Microsoft Tech Community – Latest Blogs –Read More
ON DEMAND | Viva in-depth: Learning content
Microsoft Viva brings together the tools and applications leaders need to engage and empower their workforce. And there’s a lot to plan and consider, in addition to keeping up with the latest updates and innovations.
This article contains 10 in-depth videos about Microsoft Viva – now on demand and embedded below, with five more coming soon. You’ll discover the ins and outs on how Microsoft Viva is THE employee experience platform that empowers organizations to continuously improve employee engagement and business performance with next-generation AI and insights.
OK, on to the show(s) (on demand)!!! All content is as it was presented during the Microsoft 365 Community Conference, presented by top product makers from Microsoft.
Note: Beyond the Viva content below, you can view all recorded sessions on demand now within the full Microsoft 365 Community Conference playlist on the Microsoft Community Learning channel (YouTube). You’ll find keynotes, general sessions, and numerous breakout sessions — in their entirety. We, too, created this unique playlist of all Viva Sessions.
Expand your internal communications strategy
“Transforming Communications with AI” presented by Steve Clayton – VP of communications strategy at Microsoft. Steve is a wonderful storyteller and provides a lot of insight into how he and the team run and manage comms for Microsoft. In this session, you go behind the scenes of how Microsoft approaches the use of AI across the discipline, best practices for applying AI to Comms and a sneak peek at some of the tools Microsoft has built internally to transform the work that over 250 communicators globally carry out for the company. You will walk away with patterns, practices and practical advice on how to apply generative and Microsoft Copilot technology to your business.
The best recent overview of the Viva suite
“What’s new & next for Microsoft Viva & the Employee Experience” presented by Kirk Gregersen, Nick DeFalco, Cassidy Potts (Phillips 66), Kristi Kelly, and Michael Holste. Microsoft Viva brings together the tools and applications your business needs for communication and feedback, analytics, goals, and learning—together in one unified solution that is available to employees in the apps they use every day, like Teams and Outlook. Join Viva executives and product leaders to explore product strategy, upcoming innovations and integrations. The session will showcase AI-powered experiences that can take communications, skilling, goal setting and employee feedback to the next level. Watch below:
Uplevel your corporate comms capabilities
“Planning a Corporate Comms strategy w/SharePoint News & Viva Amplify” with Naomi Moneypenny, Dave Cohen, and Maeneka Grewal. This transformation track session spans strategy, best practices, and product guidance. Learn how to plan a corporate communications strategy leveraging the power of SharePoint News and Viva Amplify.
“Getting started with Viva Amplify” with Michael Holste, Britt Boston, and Naomi Moneypenny. Learn how to save time and deliver more effective communications with Viva Amplify with this introductory session. We’ll cover how to get set up and started with the latest Viva tooling designed for organizational communications, including getting access, creating & managing campaigns, publishing to multiple channels, and measuring impact and reporting.
“How Microsoft is transforming Comms & Employee Engagement” with John Cirone, senior director on the Microsoft global employee and executive communications team. At Microsoft, our communicators lead with a growth mindset, using data to inform strategic and tactical decision making. We have evolved our approach to employee communications and engagement over several years, and our transformation continues to incorporate new tools including Viva and Copilot. John Cirone leads Microsoft’s Global Executive and Employee Communications (GEEC) community of over 1,000 communicators globally and across our diverse businesses. He will share how “Customer Zero” approaches communications, an inside look at best practices, and learnings that can inform your communications and engagement strategies.
Your communities grow and flourish together.
“Leveraging AI for communications” with Erin Rosenthal and Kristi Kelly. Artificial intelligence (AI) is transforming the way we communicate and engage with employees. In this session, you’ll hear from practitioners who have successfully leveraged AI in their communication strategies and campaigns. And you’ll gain practical tips to harness the power of Copilot in your communication work.
“Viva Engage and AI Transform Communications” with Dan Holme and Jason Mayans. Learn how great communicators leverage listening, analytics and AI to measure and scale effectiveness. Push beyond the boundaries of traditional internal communications and apply lessons from external comms to engage your audience with people-centric, personalized storytelling with modern, media-rich content that amplifies messaging.
“Building Communities to connect employees & accelerate knowledge sharing” with Erin Rosenthal, Mike McLean, and Allison Michels. Communities accelerate sharing of knowledge, information and experience within large teams and divisions, and across organizational silos. In this session, we will use Viva Engage to bring strategies and best practices to life. You’ll learn how to create communities that support company initiatives including diversity, onboarding, role-specific, shared services and employee resource groups.
“Driving Rollout and adoption of Copilot with Microsoft Viva” with Chris Bortlik, Britt Boston, Maeneka Grewal, Jeffrey Maning, and Allison Michels. Learn how to use Microsoft Viva to plan, communicate, measure, and support your organization’s rollout of Copilot. See Viva in action in this demo-heavy session. Learn real-world strategies, best practices, templates, and prescriptive guidance for an end-to-end campaign to drive user enablement and share knowledge about Copilot.
Stay up to date
We want to include some great, ongoing resources for you. Starting with the Microsoft Viva adoption site on adoption.microsoft.com. And join our community to catch all news and insights from the Microsoft Viva community blog. And you can find us on Twitter at @MicrosoftViva.
Microsoft Viva helps engage and empower their workforce.
With Viva, leaders can set their company strategy and effectively communicate goals and priorities across the organization, enable employees with the right resources, skills and knowledge, and create a feedback flywheel to continuously assess and improve employee engagement and performance at every level.
Microsoft Viva is built right into Microsoft Teams and experienced across Microsoft 365, so employees can find what they need when they need it. Viva is easily customizable and extensible, accessible from anywhere, and integrates with the tools that organizations already use.
The full Microsoft Viva suite of apps and services – The employee experience: Dynamic, connected, ever changing.
Thank you for your interest in taking your knowledge and depth of Viva to the next level. It warms our employee-engaged hearts!
Cheers, Jack Elmore
Microsoft Tech Community – Latest Blogs –Read More
Microsoft Security Service Edge now generally available
Today, we announced the general availability of the Microsoft Entra Suite which brings together identity and network access controls to secure access to any cloud or on-premises application or resource from any location. It consistently enforces least privilege access to achieve your governance requirements while improving your employee experience.
Companies today have good reason to focus on security. On one hand, we’re reaping the advantages of increased scalability, efficiency, and cost reductions, including all the benefits gained from generative AI’s large language models. However, these advantages also make it possible for malicious actors to exploit advanced technologies to create malware, target network vulnerabilities, and generate phishing attacks that put organizations’ data and reputations at higher risk.
When identity and network access solutions operate in isolation and not in tandem, they can lead to increased complexity, inconsistent policies, and a lack of unified context across standalone solutions. This can unintentionally result in a fragmented security posture and vulnerabilities that malicious actors could exploit, potentially disrupting business continuity and compromising the user experience.
Neither identity nor network security controls alone can protect all your access scenarios, highlighting the need for you to adopt a holistic strategy to counteract evolving threats and protect your critical assets—no matter where the users and resources are located.
The case for unified security: A strategic imperative
Along with the Microsoft Entra Suite general availability, we also announced Microsoft’s Security Service Edge (SSE) solution general availability, Microsoft Entra Private Access and Microsoft Entra Internet Access. These two products coupled with our SaaS security-focused CASB—Microsoft Defender for Cloud apps—comprise Microsoft’s Security Service Edge solution, a cloud-delivered, identity-centric networking model that transforms the way you secure access.
Microsoft’s SSE solution is all about helping you eliminate security gaps in your defenses, extending Conditional Access and continuous access evaluation to all your applications and resources, whether they’re on-premises or in any cloud.
Here, in more detail, are the key advantages of Microsoft’s SSE solution to your organization.
Eliminate security loopholes caused by identity and network access silos
Microsoft’s SSE Solution ensures that your identity and network access solutions work together. By unifying these separate elements, your security teams can bolster your organization’s security stance in the face of emerging threats. No more deciding which tool works for each app or how to bridge the policies your identity and network teams created. Now you can secure access with an easy-to-manage, unified, identity-centric approach to any application, resource, or destination—and not sacrifice user productivity due to complex, disjointed security controls.
Simplify access and improve end user experience at a global scale
Microsoft’s SSE solution is delivered from one of the largest global private networks: Microsoft’s Global Wide Area Network. The network connects Microsoft data centers across 61 Azure regions with more than 185 global network POPs and a vast array of growing SSE edge locations strategically placed around the world. This helps you optimally connect your users and devices to public and private resources seamlessly and securely, improving performance and boosting productivity by offering your people a fast, consistent, hybrid work experience.
Activate side-by-side, flexible deployment options with other SSE and networking solutions
Microsoft Entra Private Access and Microsoft Entra Internet Access can be deployed standalone or side-by-side with other SSE solutions. Global Secure Access client allows control over network traffic at the user endpoint device, giving you the ability to route specific traffic profiles through Microsoft’s SSE solution. The client for Windows and Android operating systems are now in general availability, and for iOS and Mac operating systems, in public preview. With flexible deployment options, the Global Secure Access client could acquire traffic based on the traffic forwarding profiles you configure for Private Access, Internet Access, and Microsoft traffic.
For example, you can configure Private Access profiles anywhere you replace your third-party legacy VPNs—with an identity-centric Zero Trust Network Access (ZTNA) solution. You can also configure your Microsoft profile to enable improved performance for Microsoft applications, while you keep your private and internet traffic protected with the SSE solution of your choice.
A closer look at Microsoft Entra Private Access
Microsoft Entra Private Access is an identity-centric ZTNA solution that helps you secure access to all private apps and resources for your users—located anywhere. Private Access allows you to replace your legacy VPN with ZTNA to securely connect your users to any private resource and application—without providing full network access to all private resources. This solution embraces Zero Trust principles to protect against cyber threats and to mitigate lateral movement, while enforcing advanced app segmentation and adaptive least-privilege access policies. Using Microsoft’s global private network, you can give your users a fast, seamless access experience that balances security with productivity.
Here, in more detail, are the key use cases of Microsoft Entra Private Access.
Replace legacy VPNs with an identity-centric ZTNA solution
With Microsoft Entra Private Access, easily start retiring your legacy VPN and level up to an identity-centric ZTNA solution that helps you reduce your attack surface, mitigate lateral threat movement, and remove unnecessary operational complexity for your IT teams. Unlike traditional VPNs, Microsoft Entra Private Access protects access by granting least privilege access to your network for all your hybrid users— whether they are remote or local—and, accessing any legacy, custom, modern, or private apps that are on-premises or on any cloud.
Enforce Conditional Access across all private resources
To enhance your security posture and minimize the attack surface, it’s crucial to implement robust Conditional Access controls—without making any changes to your private applications and resources such as multifactor authentication (MFA). You can also seamlessly enable single sign-on (SSO) across all private resources and applications, including legacy or proprietary applications that may not support modern authorization.
Deliver fast and easy access at global scale
Enhance your workforce’s productivity by leveraging Microsoft’s vast global edge presence, providing fast and easy access to private apps and resources, whether on-premises or on private data centers, and across any cloud. Users benefit from optimized traffic routing through the closest worldwide points-of-presence (POP), reducing latency for a consistently swift hybrid work experience.
A closer look at Microsoft Entra Internet Access
Microsoft Entra Internet Access is an identity-centric Secure Web Gateway (SWG) for SaaS apps and internet traffic. It’s the industry’s first truly identity-centric SWG solution capable of converging all enterprise access controls in one place. This advantage eliminates the security loopholes created by using multiple security solutions, while it also protects your enterprise from malicious internet traffic, unsafe or non-compliant content, and other threats from the open internet. Working alongside Microsoft Entra Private Access and the rest of the Microsoft Entra identity stack, it unifies your access policies across all internet resources and SaaS apps.
Protect your organization against internet threats
Microsoft Entra Internet Access provides robust web content filtering options to restrict enterprise users from accessing undesirable online content. With web category filtering, you can easily allow or block a vast range of internet destinations based on pre-populated web categories, which include liability, high bandwidth, productivity loss, general browsing, and security threat (malware, compromised websites, spam sites, etc.) sites. For more granular control, you can use fully qualified domain name (FQDN) filtering to establish policies that allow or block specific endpoints or to override general web category policies effortlessly.
Extend Conditional Access context richness to internet security
Modern businesses require versatile filtering policies that adjust to different scenarios. Microsoft Entra Internet Access gives you the ability to apply Conditional Access controls to your SWG policies leveraging the user, device, risk, and location signals to allow or block access to relevant internet destinations. Internet Access consolidates network and identity access controls into one policy engine and allows you to extend Conditional Access (and in future Continuous Access Evaluation) to cover all external destinations and cloud services, even those not federated with Microsoft Entra ID. Additionally, our deep integrations with Entra ID include valuable features like token theft protection, source IP restoration, and data exfiltration safeguards through Universal Tenant Restriction.
Deliver fast and consistent access at global scale
Enhance your users’ productivity by providing swift and smooth access through a global network edge, with POPs located near the user and private WAN. Utilize numerous peering agreements with internet providers to deliver top performance and reliability. Minimize additional hops and streamline traffic routing for all Microsoft services. Implement optimal traffic management for Microsoft applications in conjunction with solutions from third-party SSE providers using side-by-side access models.
Conclusion
Organizations need an easier, more agile approach to protect access to all their applications and resources. This action safeguards your critical assets no matter where they are located. Today’s general availability of our Microsoft Entra Internet and Private Access products—our Microsoft’s SSE solution—does just that. It makes it harder for bad actors to gain access to your sensitive data—even if they successfully infiltrate your network—by extending identity security controls and access governance to your network.
Now, you can benefit from a streamlined security environment where your users have access to only the necessary resources, simplifying their work. With Conditional Access, granular identity and network access policies are now unified, closing critical security gaps and reducing operational complexity. The global, private, wide area network provided by Microsoft ensures a seamless, efficient hybrid work experience. And integration with Microsoft’s extensive security portfolio and partner ecosystem supports the implementation of Zero Trust principles throughout the entire security landscape, enhancing your overall protection.
Be sure to register for the Zero Trust spotlight on July 31, 2024, where Microsoft experts and thought leaders will dive deeper into these announcements. Also, stay tuned for product deep dive blogs and our upcoming Tech Accelerator product deep dive sessions on Aug 14, 2024. We’ll expand on how our SSE solution and its two core products, Microsoft Entra Private Access and Microsoft Entra Internet Access can uniquely and successfully provide a secure approach to access across your organization’s entire digital estate.
To get started, contact a Microsoft sales representative, begin a trial, and explore Microsoft Entra Private Access and Microsoft Entra Internet Access general availability. Share your feedback to help us make this solution even better.
Sinead O’Donovan
Vice President of Product Management, Identity and Network Access at Microsoft
Read more on this topic
Microsoft Entra Internet Access
Microsoft Entra Private Access
Get started and try Entra suite products
Simplify your Zero Trust strategy with the Microsoft Entra Suite and unified security operations platform, now generally available
Learn more about Microsoft Entra
Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.
Microsoft Entra News and Insights | Microsoft Security Blog
Microsoft Entra blog | Tech Community
Microsoft Entra documentation | Microsoft Learn
Microsoft Entra discussions | Microsoft Community
Microsoft Tech Community – Latest Blogs –Read More
Dynamic watermarking hits the mark in protecting highly sensitive data
In most organizations teams collaborate and handle sensitive and business critical information, such as documents that contain blueprints, entertainment artwork, classified government secrets or strategic alliances. It’s important to protect this high-business value corporate intellectual property at all times to deter data exfiltration. Clear labeling and protection (encryption) of confidential files helps communicate the importance and sensitivity of an item and protects against exfiltration to unauthorized users, as well as can prevent copy and paste, forward or print actions.
However, there is a situation where labels and protections aren’t enough. It’s still possible for users to take screenshots or pictures with a camera of confidential files. These pictures can end up in the wrong hands of competitors or the public via website posts.
With Microsoft Purview Information Protection, we provide an integrated solution that is built-in, intelligent, unified, and extensible. It identifies and protects sensitive data across your digital estate, which includes Microsoft clouds such as Microsoft 365 and Azure, as well as on-premises, hybrid and third-party clouds, and SaaS applications.
Today at Inspire, we are excited to announce the public preview of a new Information Protection capability for Microsoft 365 Office Word, Excel, and PowerPoint files called dynamic watermarking. This highly requested capability enables system admins to configure Purview sensitivity labels that visually displays the reader’s email address and date/timestamp information over the file content to attribute and deter leaks. This is now available to any customers who need to protect high-value Intellectual Property (IP) in various industries.
Extending comprehensive protection with differentiated capabilities
Dynamic watermarking is already supported in Teams meetings (), and each participant will see their own email address overlaid on the meeting video or shared content. This deters participants from taking unauthorized screenshots or pictures of the meeting content.
The application files that are shared in Teams meetings often consist of Word, Excel, or PowerPoint files which can be shared directly with others outside of meetings. There are existing ways to share highly sensitive information accessible only by a list of specific team members, for example using SharePoint user-defined-permissions. Dynamic watermarking extends protection of sensitive data by enabling an extra deterrent to oversharing by attributing the source of any potential leaks to specific people via their email address, as shown in the image below.
Although there are existing security solutions that may offer different aspects of dynamic watermarking, Microsoft provides the most comprehensive offering with the following differentiators:
Broad support in many views (e.g., slide view, notes view, etc.) so it’s not the only the primary application view that’s protected for more comprehensive coverage.
Ability to set dynamic watermarking for a sensitivity label and have it apply to all Office files with that sensitivity label (rather than a separate setting), making it easier for admins to apply labels across application types and files all at once.
Cross-platform support: Web, Windows, and Mac
Ability to edit (and coauthor) a watermarked file. Coauthoring enables users to collaborate on Word, Excel, and PowerPoint files that are labeled with sensitivity labels across Web, Windows and Mac.
For dynamic watermarking for Word, Excel, and PowerPoint, this will require a Microsoft 365 E5, Microsoft 365 E5 Compliance, Microsoft Information Protection and Governance E5, Microsoft Enterprise Mobiity and Security E5, or Microsoft Security and Compliance for Frontline Workers F5 license. E3 customers can still participate in the public preview.
For additional technical information on dynamic watermarking, read this Tech Community blog.
Call to Action
Participate in the public preview (E3 or E5 license required). At GA, dynamic watermarking is included for those customers who have an E5 license.
How to Get Started
Learn more about Information Protection here. Try Microsoft Purview Information Protection and other Microsoft Purview solutions directly in the Microsoft Purview compliance portal with a free trial.
Additional resources
Interactive guide: aka.ms/InfoProtectionInteractiveGuide
Mechanics video on how to automatically classify and protect documents and data
Mechanics video on AI-powered data classification
Blogs: https://aka.ms/ipgblog
Join the Data Security and Privacy Customer Connection Program (CCP) to get information and access to upcoming capabilities in private previews in Microsoft Purview Information Protection and other Purview solutions. An active NDA is required. Click here to join
Microsoft Tech Community – Latest Blogs –Read More
Microsoft Entra Suite now generally available
Today we announced the general availability of Microsoft Entra Suite – the industry’s most comprehensive secure access solution for the workforce. The Microsoft Entra Suite delivers the most comprehensive Zero Trust user access solution and enables organizations to converge access policy engine across identities, endpoints, and private and public networks.
What is Microsoft Entra Suite?
The Microsoft Entra Suite delivers a complete cloud-based solution for workforce access. It brings together identity and network access that secures employee access to any cloud or on-premises application and resource from any location, consistently enforces least privilege access, and improves the employee experience.
This new offering advances our vision for the Microsoft Entra product line that can serve as a universal trust fabric for the era of AI, securely connecting any trustworthy identity with anything, from anywhere. In a recent blog post we also shared the four stages of creating such trust fabric for your organization, starting with foundational Zero Trust controls, and extending it to protecting access for your workforce, protecting access for your customers and partners, and protecting access in any cloud. The Microsoft Entra Suite delivers the complete toolset for the second stage of this journey – secure access for your workforce.
The Microsoft Entra Suite includes the following products:
Microsoft Entra Private Access – an identity-centric Zero Trust Network Access that secures access to private apps and resources and reduces operational complexity and cost by replacing legacy VPNs.
Microsoft Entra Internet Access – an identity-centric Secure Web Gateway (SWG) for SaaS apps and internet traffic that protects against malicious internet traffic, unsafe or non-compliant content, and other threats from the open internet.
Microsoft Entra ID Governance – a complete identity governance and administration solution that automates identity and access lifecycle to ensure that the right people have the right access to the right apps and services at the right time.
Microsoft Entra ID Protection – an advanced identity solution that blocks identity compromise in real time using high-assurance authentication methods, automated risk and threat assessment, and adaptive access policies powered by advanced machine learning (also included in Microsoft Entra ID P2).
Microsoft Entra Verified ID – a managed verifiable credentials service based on open standards that enables real-time identity verification in a secure and privacy respecting way. Included in the Microsoft Entra Suite are premium Verified ID capabilities, starting with Face Check.
Microsoft Entra Suite enables you to:
Unify Conditional Access policies for identities and networks.
Ensure least privilege access for all users accessing all resources and apps.
Improve the user experience for both in-office and remote workers.
Reduce the complexity and cost of managing security tools from multiple vendors.
Check out the Microsoft Entra Suite introductory video below:
Unify Conditional Access policies for identities and networks
You only have to manage one set of policies in one portal to configure access controls for both identities and networks. Conditional Access evaluates any access request, no matter where it’s coming from, performing real-time risk assessment to strengthen protection against unauthorized access.
Ensure least privilege access for all users accessing all resources and apps
You can automate the access lifecycle from the day a new employee joins your organization, through all their role changes, until the time of their exit. No matter how long or multifaceted an employee’s journey, Microsoft Entra ID Governance ensures that your employees have the right access to just the applications and resources they need, helping prevent an adversary’s lateral movement in case of a breach.
Improve the user experience for both in-office and remote workers
You can ensure that employees enjoy a faster and easier onboarding experience, faster and more secure sign-in via passwordless authentication, single sign-on for all applications, and superior performance. Using a self-service portal, your employees can request access to relevant packages, manage approvals and access reviews, and view request and approval history. Face Check with Microsoft Entra Verified ID enables real-time verification of your employee’s identity, which streamlines remote onboarding and self-service recovery of passwordless accounts.
Reduce the complexity and cost of managing security tools from multiple vendors
Since traditional on-premises security solutions don’t scale to the needs of modern cloud-first, AI-first environments, organizations are seeking ways to secure and manage their assets from the cloud. With the Microsoft Entra Suite, you can retire multiple on-premises security tools, such as traditional Virtual Private Networks (VPNs), on-premises Secure Web Gateways (SWGs), and on-premises identity governance.
Microsoft Entra Suite is currently priced at $12 per user per month. Microsoft Entra P1 is a licensing and technical prerequisite. Please refer to the Microsoft Entra Suite pricing page for more detail.
Join us for upcoming events!
We encourage you to register for the Zero Trust spotlight on July 31, 2024, when Microsoft experts and thought leaders will dive deeper into these and other announcements, including the general availability of Entra Internet Access and Entra Private Access, which is part of the Microsoft Entra Suite.
Additionally, register for the Tech Accelerator to join us on August 14, 2024, for a deep dive into the Microsoft Entra Suite, and Private Access and Internet Access products.
Learn More
The availability of the Microsoft Entra Suite marks a key milestone in our commitment to continue to provide a more seamless and robust secure access experience that will empower the workforce anywhere and everywhere. Learn more from the official announcement.
Visit the Microsoft Entra Suite trial page to get started.
Irina Nechaeva, General Manager, Identity and Network Access Product Marketing
Read more on this topic
Watch the Microsoft Entra Suite mechanics video
Microsoft Entra product page
Microsoft Entra portal
Learn more about Microsoft Entra
Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.
Microsoft Entra News and Insights | Microsoft Security Blog
Microsoft Entra blog | Tech Community
Microsoft Entra documentation | Microsoft Learn
Microsoft Entra discussions | Microsoft Community
Microsoft Tech Community – Latest Blogs –Read More
Four steps to expanding your AI skills with Python and Microsoft Learn
Python is not just a programming language—it’s also a gateway to the vast and exciting world of AI for beginners and experts alike. Known for its wide range of applications and versatility, Python is an essential tool for anyone looking to dive into the cutting-edge field of AI. Plus, the readability and simplicity of Python make it a popular choice for learners starting their AI programming journey.
As a Microsoft Learn expert, I’ve created this four-step guide to mastering Python using Microsoft Learn, where you’ll find comprehensive resources and step-by-step explanations to help you understand the complexities of the language and its applications in AI. By highlighting the unique benefits that Python offers to AI learners at all levels, this guide aims to equip you with the skills you need to achieve outstanding results in your AI coding journey.
Starting with the foundation: Comprehensive basics
Your journey to learn Python for AI begins with the basics. Microsoft Learn learning paths and modules cover fundamental concepts, such as variables, loops, and functions, providing a comprehensive understanding of Python. These training resources are designed to equip you with the skills needed to confidently tackle AI programming challenges.
Python’s syntax is not only simple but also highly intuitive. Its readability and simplicity allow you to quickly grasp programming basics and start coding AI applications. And the interactive experiences on Microsoft Learn reinforce your understanding, to help you build a solid foundation for advanced AI learning.
Module: Introduction to Python
Learning path: Python for beginners
Bridging theory and real AI projects
Although theory is a crucial starting point, the true essence of learning emerges when you apply your knowledge to real AI projects. Microsoft Learn offers a project-based learning approach, providing you with opportunities to engage in practical AI projects and effectively apply your Python skills across various AI scenarios.
Module: Install and configure Visual Studio Code for Python development
Module: Automate Python deployments with Azure Pipelines
Specializing in AI: Microsoft Credentials
Training for the Microsoft Applied Skills credential “Develop generative AI solutions with Azure OpenAI Service” includes a learning path that covers this critical topic. It offers an opportunity to learn practical skills and knowledge to create and deploy advanced AI models, further enhancing your AI expertise. After you follow the learning path, you can take and pass a free, online, lab-based assessment to earn the credential.
In addition to the Applied Skills credential, you can earn the Microsoft Certified: Azure AI Engineer Associate Certification. The associated training, Course AI-102: Designing and Implementing a Microsoft Azure AI Solution, available through a Microsoft Training Services Provider or via self-paced online study, provides an excellent opportunity to put Python to work as you build your AI and app development skills. Diving into advanced topics, Course AI-102 offers comprehensive knowledge and practical experience in Python and AI. After you complete the course, you can take a free Practice Assessment on Microsoft Learn (from the link on the Certification and exam details page) to gauge your skills and preparedness to take the Certification exam. When you’re ready, pass the exam to earn the Azure AI Engineer Associate Certification.
Applied Skills: Develop generative AI solutions with Azure OpenAI Service
Course AI-102: Designing and Implementing a Microsoft Azure AI Solution
Certification and exam: Azure AI Engineer Associate
Developing advanced AI skills: Practical exercises and labs
Although theory provides a solid foundation, true skill development—especially in AI—requires practice. Microsoft Learn resources and opportunities offer immersive and engaging experiences, including learning paths with interactive labs where you can apply Python in real-world AI scenarios. These labs cover a range of AI exercises and topics, from working on simple AI script tasks to developing complex, scalable AI applications.
Learning path: Build real world applications with Python
Learning path: Create data-driven websites by using the Python framework Django
Conclusion
Making the most of the skill-building resources available through Microsoft Learn, particularly courses, learning paths, and modules that lead to Microsoft Credentials, can structure and streamline your journey to master Python for AI. Starting with foundational concepts, progressing through project-based AI learning, delving into specialized AI fields, working with practical exercises and labs, and then earning Microsoft Credentials, this journey can equip you with a comprehensive skill set for AI development with Python.
My experience attests to the effectiveness of this approach. With these four steps, you can embark on the adventure of learning Python for the exciting field of AI, with enthusiasm and an open mind.
Meet Masato Kikukawa, Microsoft Learn expert
I started my career 20 years ago as an application developer at a Japanese multifunction printer manufacturer, where I successfully delivered major projects. I now work as a technical trainer, providing corporate training to develop engineers. My passion for programming remains unchanged, and I use generative AI to learn new technologies and incorporate them into my training. I hope to continue supporting technological advancements and the growth of engineers.
Learn more about Masato Kikukawa.
Microsoft Tech Community – Latest Blogs –Read More
(Preview) Dynamic watermarking for sensitivity labels in Word, Excel, and PowerPoint
Sensitivity labels from Microsoft Purview Information Protection offer highly effective controls to limit access to sensitive files and to prevent users from taking inappropriate actions such as printing a document, while still allowing unhindered collaboration. However, it’s still possible for users to take pictures of sensitive information on their screen or of a presentation being shared either online or in-person, and some forms of screen-shotting cannot be blocked with existing technology. This loophole presents an easy way to bypass protections that sensitivity labels enforce on a document.
We’re excited to announce dynamic watermarking, a new feature for sensitivity labels in Word, Excel, and PowerPoint, which will both deter users from leaking sensitive information and attribute leaks if they do occur. This feature is rolling out to a public preview, with full general availability planned for later in 2024.
When an admin enables the dynamic watermarking setting for a protected sensitivity label, files with that sensitivity label will render with dynamic watermarks when opened in Word, Excel, and PowerPoint.
These dynamic watermarks contain the UPN (email address) associated with the account being used to open the file, allowing for leaks to be tracked back to specific users. Users will be able to view, edit, and collaborate on their files as usual, but the watermarks will always be visible on top of their file content.
All users, except for the file’s owner, will only be able to open the file on Office clients that support dynamic watermarking. When a user attempts to open a file with dynamic watermarks on a version of Office that doesn’t support the feature, they will see an access denied message. Users who don’t have an Office client installed that is capable of dynamic watermarking should use Office for the web to work with watermarked files.
Visit the Microsoft 365 Insiders blog to learn more about the end-user experience.
When setting up a label in the Purview compliance portal, you can select “Use Dynamic Watermarking” when configuring encryption.
You can also configure dynamic watermarking on a sensitivity label using the Set-Label cmdlet in PowerShell, which includes additional options for configuring the watermarks to contain an admin-defined string. Learn more about configuring sensitivity labels for dynamic watermarking here.
Microsoft Tech Community – Latest Blogs –Read More
Microsoft recognized as a Leader in UEM Software 2024 IDC MarketScape reports
Microsoft has recently been named a Leader in IDC MarketScape: Worldwide Unified Endpoint Management Software 2024 Vendor Assessment (doc #US51234224, April 2024). Microsoft was also recognized as a Leader in related UEM Software reports for small and medium-sized businesses, for frontline worker/IoT devices, and for Client Endpoint Management Software for Windows Devices.[1]
This recognition builds upon Microsoft’s recognition as a Leader in UEM by Gartner and Forrester. The IDC MarketScape for UEM Software notes Microsoft’s strengths in the report. We are delving into those strengths and why we believe we were recognized in the report.
AI and automation
The IDC MarketScape for UEM Software notes, “By integrating advanced analytics, AI, and automation into Intune, Microsoft is not just simplifying IT operations but fundamentally transforming how devices are managed in the UEM market.”
Intune has been extending its core UEM functionality with the launch of the Microsoft Intune Suite in March 2023, and subsequent update in February 2024. These launches delivered AI-driven capabilities with Intune Advanced Analytics such as anomaly detection and device query.
As AI and automation have progressed further, we are adding the generative AI capabilities of Microsoft Copilot for Security into endpoint management. One milestone on this journey was the public preview of Copilot in Intune in April. The IDC MarketScape for UEM Software notes, “device error remediation, end-user experience monitoring, and threat detection and evaluation are primary AI/automation use cases for Intune and Microsoft overall.”
Zero Trust is underlined by the launch of capabilities for the highly security minded
The IDC MarketScape for UEM Software notes, “Intune supports conditional access, advanced threat protection, and strong compliance policies in providing robust security measures to protect corporate data across all managed devices.”
Today, we are pleased to announce that we are extending this security further by offering three of the Intune Suite solutions to our most security-conscious customers (like the Department of Defense and Government Community Cloud High customers). Intune Advanced Analytics, Intune Endpoint Privilege Management, Microsoft Intune Tunnel for Mobile Application Management and other mobile device management functionality will be extended to GCC High and the DoD starting August 1, 2024. This means better device status visibility, the ability for organizations to elevate only approved apps, and the ability for mobile workers to securely access organizational data on their personal device.
These new capabilities build on top of Intune’s existing security features and contribute to your ability to attain a Zero trust model. For example, Intune offers enrollment and hardware-backed attestation to prevent supply-chain attacks. In the coming weeks, Intune will roll out the ability to revoke or delete a cloud Certificate Authority with Microsoft Intune Cloud PKI. Last, building on our Remote Help for Windows and Android, customers of the government community cloud (GCC) will be able to use Remote Help for Mac to better support and resolve technical issues from anywhere, on virtually any device.
Whether you work in the public or private sector, the sheer volume of devices means device management is foundational to your Zero Trust security architecture.
Cross-platform across Windows and frontline worker devices
While Intune is historically known for its leadership in managing Windows devices, it has expanded its coverage and solution set to be a true cross-platform management solution for Mac, iOS, Android and Linux devices. Together, these capabilities provide centralized management for any enterprise and BYOD device, irrespective of operating system.
The IDC MarketScape report named Microsoft a Leader not just in Client Endpoint Management Software for Windows Devices, but also for Frontline Worker Devices and IoT Devices. Intune recently introduced greater management capability for shared devices, as well as a managed home screen for frontline worker devices. Cross-platform Intune investments such as Mac endpoint management and platform single sign-on are just a few recent examples that support Apple devices. Microsoft was named a Major Player for UEM Software for Apple Devices. [2]
Intune is also suitable for organizations of all sizes. The IDC MarketScape names Microsoft as a Leader for UEM for Small and Medium Businesses. Intune integration with Microsoft 365 streamlines endpoint management capabilities, making it easier for smaller IT teams.
No matter how large or small your organization or how heterogeneous your device fleet, Intune can deliver a cloud native, cross-platform solution for your organization’s needs.
Cloud-native Microsoft integration
One of Intune’s strengths is being an integral part of Microsoft’s broader, cloud-based security and productivity platform. Microsoft’s platform philosophy helps reduce points of weakness compared to multiple third-party solutions, as well as offering better TCO through competitive overall pricing and streamlined management overhead. The IDC MarketScape for UEM Software notes, “Intune’s integration with other Microsoft products enhances security and productivity and can offer a comprehensive and cohesive management and security solution.”
One example of this is Kantar, the global marketing agency, who adopted Intune, Windows 11 Enterprise, and Microsoft Entra ID to prepare for the next wave of AI. The strength of the integrated, cloud native approach that Kantar implemented is underlined by the launch this week of the Microsoft Entra Suite unifies identity and network access security (foundational for Zero Trust), and provides the ability to verify users, prevent overprivileged permissions, improve detections, and enforce granular access controls for all users and resources.
Combining Intune’s device management with Microsoft Entra Suite provides a seamless Zero Trust solution with industry leading identity, network access and device security.
IDC MarketScape: Worldwide Unified Endpoint Management Software 2024 Vendor Assessment
We invite you to read the IDC MarketScape excerpt here, or contact us to discuss how Intune’s latest security enhancements for GCC High customers combined with the new Microsoft Entra Suite can help your organization deliver a Zero Trust model.
Learn more
IDC MarketScape: Worldwide Unified Endpoint Management Software 2024 Vendor Assessment excerpt
Learn more about the Microsoft Intune Suite
[1 and 2] IDC MarketScape: Worldwide Unified Endpoint Management Software for Small and Medium-Sized Businesses 2024 Vendor Assessment (doc #US51779424, April 2024); IDC MarketScape: Worldwide Unified Endpoint Management Software for Frontline/IoT Devices 2024 Vendor Assessment (doc #US51779324, April 2024); and IDC MarketScape: Worldwide Client Endpoint Management Software for Windows Devices 2024 Vendor Assessment (doc #US51234324, April 2024). Microsoft was named a Major Player in the IDC MarketScape: Worldwide Unified Endpoint Management Software for Apple Devices 2024 Vendor Assessment (doc #US51779224, April 2024).
Stay up to date! Bookmark the Microsoft Intune Blog and follow us on LinkedIn or @MSIntune on X to continue the conversation.
Microsoft Tech Community – Latest Blogs –Read More
Unified Security Operations Platform – Technical FAQ!
Introduction
If you are a security practitioner who uses Microsoft Sentinel and Microsoft Defender XDR in your daily workflows, and you have tried or are evaluating the unified security operations platform for your SOC – this blog is for you. With Microsoft Sentinel now Generally Available in the Microsoft Defender portal, as part of our unified security operations platform, it’s a great time to try and get started with a streamlined experience for the two products.
In this blog, we dive into some of the most common questions and share best practices to expedite resolution, bring more clarity, and save valuable troubleshooting time.
First, a brief overview if you are new to the unified security operations platform. Our vision of the platform is a solution that makes your job as a security practitioner easier, keeping you and your organizations safer. It is single pane of glass for all security operations – here you can seamlessly integrate SIEM, XDR, exposure management, and Copilot for Security. It’s your comprehensive hub for preventing, detecting, investigating, and responding to incidents across your digital estate—all from one centralized location.
Here are some of the most common questions and guidance when working with the unified platform.
Onboarding
What role/permissions are required to connect a Microsoft Sentinel workspace to the unified platform?
To connect or disconnect a Microsoft Sentinel workspace to the unified platform, you will need one of the following permissions and scopes:
a. Owner rights for the Subscription AND Microsoft Sentinel Contributor rights for the Subscription or Resource Group or Log Analytics workspace. OR
b. User Access Administrator for the Subscription AND Microsoft Sentinel Contributor for the Subscription or Resource Group or Log Analytics workspace.
2. I see the following error message when trying to connect my Microsoft Sentinel workspace with the unified platform “couldn’t connect the workspace. Turn on the Defender XDR connector for incidents in Microsoft Sentinel first”. What to do?
a. Microsoft Defender XDR (formerly named Microsoft 365 Defender) connector is one of the prerequisites for the onboarding, so if it hasn’t been configured, you will most likely see this message. The good thing is configuring the connector is a rather straightforward process. Follow these steps to configure the connector.
b. When configuring the connector, make sure to click on “Connect incidents & alerts” button. While Microsoft incident creation rules for the Microsoft Defender products will be turned off by default, if for some reason you don’t see them disabled, make sure to check this box “Turn off all Microsoft creation rules for these products. Recommended”.
What happens when I enable the Microsoft Defender XDR connector in Microsoft Sentinel?
a. The Security incident creation rules are disabled by default. Incidents are created first in the unified portal, then synced back to Microsoft Sentinel.
b. You may notice a delay of up to 10 minutes for incidents to show up in Microsoft Sentinel. We are working on reducing this latency.
4. Why don’t I see all my Microsoft Sentinel workspaces in the unified portal?
You can only see Microsoft Sentinel workspaces that you have permission to onboard. Refer to question 1 for the specific permissions.
Alerts, Incidents, and Correlation
1. I noticed Microsoft Defender XDR incidents are delayed in Microsoft Sentinel. What is the expected delay for incidents to show up in Microsoft Sentinel?
It may take up to 10 minutes for Microsoft Defender incidents to show in Microsoft Sentinel. We are working on reducing this latency. Stay tuned through our customer connection program for the latest updates.
2. Does that delay in incidents also delay Automatic Attack Disruption?
No, it will not. The delay for incidents is from Microsoft Defender to Microsoft Sentinel. Attack Disruption occurs within the unified platform.
3. Could that be up to 10 minutes delayed in the Microsoft Sentinel to trigger playbooks too?
Yes. Currently this delay affects both scenarios for playbooks – whether a playbook is automatically invoked from an automation rule or manually invoked. As mentioned, we are working on reducing the latency.
4. I am seeing duplication of incidents and alerts in Microsoft Sentinel and Microsoft Defender XDR. How to avoid this?
The duplication is likely due to the misconfiguration of the Microsoft Defender XDR connector. Please check the Microsoft Defender XDR connector configuration first to make sure the Microsoft incident creation rules are turned off for the Microsoft Defender products.
5. What are synced bi-directional for incidents?
Incident status, tags, resolution, closing reasons, closing comments are bi-directionally synced.
6. Microsoft Defender has 14 Incident Classifications; Microsoft Sentinel has 5. How are they mapped?
We are working on aligning the classifications. Stay tuned through our customer connection program for the latest updates.
Why and when does the incident auto-merging happen?
a. Microsoft Defender XDR’s correlation activities don’t stop when incidents are created. Microsoft Defender XDR continues to detect commonalities and relationships between incidents, and between alerts across incidents. When two or more incidents are determined to be sufficiently alike, Microsoft Defender XDR merges the incidents into a single incident.
b. The correlation engine merges the incident when common elements are detected, like:
– Entities – like users, devices, mailboxes, and others
– Artifacts – like files, processes, email senders, and others
– Time frames
– Sequence of events: For example, a malicious email click event that follows closely on a phishing email detection
c. Refer to the documentation for more details on incident merging and correlation.
How does incident and alert correlation work in the unified platform?
a. When the alert is sufficiently unique across all alert sources within a particular time frame, Microsoft Defender XDR creates a new incident and adds the alert to it.
b. When the alert is sufficiently related to other alerts from the same source or across sources within a particular time frame, Microsoft Defender XDR adds the alert to an existing incident.
9. What happens when incidents are merged?
– Alerts contained in the abandoned incident are moved to the consolidated incident
– Entities (assets etc.) follow the alerts they’re linked to
– Tags are aggregated into the consolidated incident
– Analytics rules recorded as involved in the creation of the abandoned incident are added to the rules recorded in the consolidated incident
– Currently, comments and activity log entries in the abandoned incident are not moved to the consolidated incident and remain in the abandoned incident.
10. When is incident correlation not happening?
– One of the incidents has the status of “Closed”. Incidents that are resolved will not be reopened.
– The two incidents eligible for merging are assigned to two different people.
– Merging the two incidents would raise the number of entities in the merged incident above the maximum allowed.
– The two incidents contain devices in different device groups as defined by the organization.
(Note: this condition is not in effect by default; it must be enabled.)
When should I unlink an alert?
When you decide that the alert does not belong to the correlated incident, link the alert to another incident or create a new one. This will also help improve the correlation engine (in case of unexpected correlations).
Analytics/Custom Detections
Does custom detection support entity mappings like in Analytics rules in Microsoft Sentinel?
Currently no, but we are adding the features of analytic rules from Microsoft Sentinel such as more flexible entity mappings. Stay tuned through our customer connection program for the latest updates.
Does the unified platform support Fusion rules?
The Fusion analytics rule, which creates incidents based on alert correlations made by the Fusion correlation engine, is disabled when you onboard Microsoft Sentinel to the unified security operations platform.
The unified security operations platform uses Microsoft Defender XDR’s incident-creation and correlation functionalities to replace those of the Fusion engine.
How can I create detection rules across Microsoft Sentinel and Defender XDR data?
a. You can now create Custom Detection rules across the two datasets without having to ingest Microsoft Defender data into Sentinel, unless you need longer data retention. Advanced hunting in Microsoft Defender – Microsoft Defender XDR | Microsoft Learn.
b. If your Defender XDR data is ingested into Microsoft Sentinel, you have the option to choose between Create custom detection and Create analytics rule.
Automation and Playbooks
Will Automation rules work as normal?
Automation rules will continue to work in the unified experience. However, there are some differences in the way automation functions work in the new experience. Please refer to the documentation for more information on the differences and changes.
What are some best practices for using automation rules in the unified platform?
a. Use the condition “Analytic rule name” instead of the incident title or use the condition on a Tag.
b. In both the Azure portal and the unified security operations platform, for automation rule condition, use Alert product names instead of Incident provider. The reason is that in Sentinel standalone experience, all incidents have Microsoft XDR as the incident provider (the value in the providerName field).
Will we be able to run a playbook as part of the actions of a custom detection rule?
Yes, incidents created by custom detection rules are part of the Microsoft Defender XDR incidents which is supported by the “When incident is created” trigger in Automation. Please take note of some of the best practices documented when configuring the trigger condition.
APIs
Can I still use the Microsoft Sentinel REST APIs with the unified platform?
You can use most of the existing Microsoft Sentinel REST APIs; however, you should use the Microsoft Graph REST API queries for alerts and incidents
List alerts_v2 – Microsoft Graph v1.0 | Microsoft Learn
List incidents – Microsoft Graph v1.0 | Microsoft Learn
Advanced hunting
How do I bookmark a query in Advanced Hunting?
There will be a new capability which is similar to bookmarks coming soon in the unified experience. Stay tuned through our customer connection program for the latest updates.
Can we query ADX data (with KQL adx() function) in Advanced Hunting?
You can run a query that correlates Microsoft Sentinel data with ADX data using adx() in Advanced Hunting. Please note that the query of adx() needs to be correlated with tables from Microsoft Sentinel. This is in parity with what customers could run in Microsoft Sentinel today.
Data Retention
Do I need to do anything additional with Retention in either Microsoft Sentinel or Microsoft Defender?
The existing Sentinel data retention configurations remain unchanged.
Do I still need to ingest my Microsoft Defender XDR tables into Microsoft Sentinel?
With the unified experience, you can query and correlate your Defender XDR logs with third-party logs from Microsoft Sentinel without ingesting the Microsoft Defender XDR logs into Microsoft Sentinel. Additionally, the same query of Microsoft Defender XDR and Microsoft Sentinel tables can be used in Microsoft Defender’s custom detection. Therefore, the primary reason for ingesting Microsoft Defender XDR data into Sentinel would be for data retention needs beyond 30 days.
Would there be any changes in the Microsoft Sentinel E5 benefit?
There is no change in the existing Microsoft Sentinel E5 benefit.
Are there any changes in the default retention?
No change in the default retention in the unified SOC platform. You will still be getting the 30 days of default retention for XDR data and 90 days for Microsoft Sentinel data at no additional retention cost.
Role Based Access Control (RBAC)
What happens if the analyst has RBAC in place which filters Microsoft Defender XDR alerts, but has read access to the Microsoft Sentinel workspace? Will they see all the alerts, or the Microsoft Defender ones they have access to and all the Microsoft Sentinel ones? Or will they see all alerts regardless of the source?
Since we unify two RBAC models: Azure/Sentinel RBAC and Defender RBAC, we apply a consolidated RBAC view to the unified portal incident queue, filtering out the service source(s) that they analyst is not allowed to see.
However, if the analyst has Sentinel reader permissions, they still can access the SecurityIncident and SecurityAlert tables directly through Advanced Hunting or in Sentinel’s log search which contains the data that is filtered out in the unified portal.
For example, let’s say a user has RBAC configured to view everything except for MDC alerts. The user won’t be able to see the MDC alerts/incidents in the unified portal Also, if there is a multi-stage incident involving Sentinel, MDE, MDI and MDC alerts, the user can still see the incidents but not the individual MDC alerts that got correlated. However, take note that the user will be able to see the MDC alerts in Microsoft Sentinel portal since the user has read access to the workspace.
Copilot for Security in embedded experience
1. Do I need to purchase Microsoft Defender for Threat Intelligence (MDTI) license if I want to use the Copilot for Security embedded experience?
No, if you have a Copilot for Security license, that should automatically include MDTI license.
2. Do I need another license for Copilot for Security?
Yes, Copilot for Security is sold separately from SIEM and XDR. Find out more here Microsoft Copilot for Security – Pricing | Microsoft Azure.
Threat Intelligence
With the unification, how should we be handling threat intel? Before we’d ingest it via the Security API for Microsoft Sentinel and Microsoft Defender, and then Microsoft Sentinel branched off into its own ingestion API. Are these being consolidated? (E.g. If you ingest threat intel into Microsoft Sentinel, can Microsoft Defender use it?)
The Threat Intelligence experience remains the same and separated in the unified experience. However, we are considering making the experience more seamless. Stay tuned through our customer connection program for the latest updates.
UEBA
Are there plans to consolidate UEBA components with unified platform?
Entity pages for devices, users, IP addresses, and Azure resources in the Microsoft Defender portal display information from Microsoft Sentinel and Microsoft Defender data sources. These entity pages give you an expanded context for your investigations of incidents and alerts in the Defender portal.
Additional Resources
Onboard Microsoft Sentinel to Microsoft Defender XDR
Alerts, incidents, and correlation in Microsoft Defender XDR
Advanced Hunting in Microsoft Defender XDR
Automation in the unified security operation platform
The unified security operations platform GA announcement
Many thanks to my colleagues for reviewing and contributing to this article @Tiander Turpijn
@AlexKlaus @GBushey @Jeremy Tan @Sreedhar Ande
Microsoft Tech Community – Latest Blogs –Read More
2024 MVP Annual Review – A Year of Excellence and New Beginnings
Congratulations to all the Microsoft Most Valuable Professionals (MVPs) who have been recognized once again this year for your remarkable contributions to the community. Thank you to the MVPs who have chosen to retire from the program or were not renewed this year. We recognize that as a community leader your passion for supporting others will continue and we look forward to staying connected through our Microsoft communities, including our LinkedIn Group and on X/Twitter at @MVPAward.
Your Technical Contributions Matter
For over 30 years, Microsoft MVPs have been pivotal in sharing feedback and advocating for Microsoft technologies in your communities. Over 3,500 MVPs globally contribute across so many platforms, devices, and technologies including open source. The MVP Technology Structure recognizes the expertise and diverse contributions that MVPs make.
What our MVPs are saying?
“Excited and honored to receive the Microsoft MVP award for the 13th year! Thank you to everyone who has supported me on this journey—your encouragement means everything. Let’s continue to innovate and make a difference together!”
谢谢霸姐,有意义的七年之旅,MVP 这个大家庭给我赋能很多。下个年度,继续努力,[加油]
Happy and Honored to share with you all that I have been recognized as a Microsoft MVP for another year for my contributions in Azure SQL and SQL Server technology areas. Thank you to each one of you for your incredible support at every step on my Journey!
Really excited to be renewed as a #MicrosoftMVP for another year! Thanks to the amazing community, all the #AI product groups, fellow MVPs and the best CPMs @RochelleSonny and @betsyweber ! My 6th year, let’s go!
Received Microsoft MVP Award for the 5 consecutive year! You have no idea how much this means to me. @Microsoft recognizes me and that makes me understand how valuable I am to you all, all community and all my pears. I specially congratulate @GastonFCruz and all Argentina MVPs! You guys rock! Thanks to @betsyweber and @crisgherrero for being the queens of this program!
Microsoft MVPの更新ができました。Azureに加えAI Platformでも受賞することができました。これで「AzureでAIをやる人」というラベルが付いた感じです。これも皆様のおかげです。ありがとうございます! #MVPBuzz
Extremely humbled and honoured to be renewed as a Microsoft MVP in the Cloud Native and .Net technology areas!
A huge thank you to the incredible tech community. This recognition fuels my passion to continue learning, innovating and sharing with the community!
2024년 Microsoft M365와 엑셀 분야 MVP 어워드를 수상하게 되었습니다.
부족한 점이 많지만, 앞으로도 겸손한 자세로 꾸준히 배우고 노력하며 커뮤니티 발전에 기여할 수 있도록 최선을 다해 노력하겠습니다.
MVP 활동을 이어갈 수 있도록 도움을 주신 많은 분들께 진심으로 감사드립니다.
올 한해도 열심히 활동하겠습니다. 감사합니다!
– MVP JinKwon Jeon
Happy to step into the 26th year as MVP now for Microsoft Stream and Microsoft 365 Copilot – what a community!
Incredibly happy to be in the Microsoft MVP program for the next year! Thank you @MVPAward ! I have been in the program 10 years and things in the Microsoft Data have never been as exciting as it is nowadays. So many things to learn and create value from! #MVPBuzz
Be a part of the MVP Community
MVPs play a crucial role in helping us shape a diverse and inclusive community. Here’s how you can help –
Spread the word
Talk about the Microsoft MVP Program with your customers, during local community gatherings and meetups. You understand the local community better than anyone else and know where to find talented individuals. Remember to use #MVPBuzz if posting online.
Nominate candidates
MVPs and Microsoft FTEs may identify and nominate candidates with robust technical expertise and a profound commitment to community engagement.
Nurture our candidates
If you are an MVP, please reach out to your local Community Program Manager (CPM) to support and nurture these candidates, helping them successfully navigate the application process.
Once again, thank you to all our MVPs for your contributions to the community. We look forward to continuing our collaboration with you this year!
Microsoft Tech Community – Latest Blogs –Read More
Conditional Picture Insert
I am trying to find a way to automate a procedure for a client review at work.
I would have a cell that contains the clients attitude to investment risk – e.g. “Cautious”, “Balanced” or “Adventurous”.
Depending which of the 3 options is selected, I would like a cell next to it to pre-populate with a picture/icon that contains the numbers “3”, “4” or “5”. In this case – Cautious = 4, Balanced = 5 and Adventurous = 6.
Would anyone be able to advise please?
I am trying to find a way to automate a procedure for a client review at work. I would have a cell that contains the clients attitude to investment risk – e.g. “Cautious”, “Balanced” or “Adventurous”. Depending which of the 3 options is selected, I would like a cell next to it to pre-populate with a picture/icon that contains the numbers “3”, “4” or “5”. In this case – Cautious = 4, Balanced = 5 and Adventurous = 6. Would anyone be able to advise please? Read More
Sharing a file with multiples shared channels
We’re looking toward shared channels as a way to make everyone’s life easier: no more tenant switching and no more guest accounts management.
I’m wondering if there is a way to allow collaboration between multiple shared channels For example, Team A and Team B would both have a shared channel with their own files, but would sometimes need to work together.
With O365 groups, we could grant access to a folder for a whole team. For example, we would host a folder in Team A SharePoint and gives access to Team B using the O365 group. We could also create a calendar event in Outlook and invite both team A and B for a joint meeting. But I’ve read that shared channels don’t come with O365 group so I’m wondering how we would do something similar with shared channels.
Is it possible for different teams using shared channels to collaborate together or are teams using shared channels doomed to work in silo? What would be the best (safest and easiest) way to make two teams using shared channels collaborate together on files and create joint calendar meetings?
We’re looking toward shared channels as a way to make everyone’s life easier: no more tenant switching and no more guest accounts management. I’m wondering if there is a way to allow collaboration between multiple shared channels For example, Team A and Team B would both have a shared channel with their own files, but would sometimes need to work together. With O365 groups, we could grant access to a folder for a whole team. For example, we would host a folder in Team A SharePoint and gives access to Team B using the O365 group. We could also create a calendar event in Outlook and invite both team A and B for a joint meeting. But I’ve read that shared channels don’t come with O365 group so I’m wondering how we would do something similar with shared channels. Is it possible for different teams using shared channels to collaborate together or are teams using shared channels doomed to work in silo? What would be the best (safest and easiest) way to make two teams using shared channels collaborate together on files and create joint calendar meetings? Read More
Retrieve Teams Rooms (MTRoA) device “Pairing status” via Graph API
We have an issue where the main MTRoA device and the touch console (peripheral device) become disconnected. Then after a while they sometimes reconnect. In the admin portal a “Pairing status” is reported on the touch panel devices. When they disconnect this is reflected in the portal via this status message. What I want to do is get this information out of the Graph API so we can report on it. I just don‘t know how this is represented in the API, if at all. I don’t see it in the PowerShell module Microsoft.Graph.Beta.Teams.
Does anyone know if this data is exposed anywhere in the “teamwork” API?
We have an issue where the main MTRoA device and the touch console (peripheral device) become disconnected. Then after a while they sometimes reconnect. In the admin portal a “Pairing status” is reported on the touch panel devices. When they disconnect this is reflected in the portal via this status message. What I want to do is get this information out of the Graph API so we can report on it. I just don’t know how this is represented in the API, if at all. I don’t see it in the PowerShell module Microsoft.Graph.Beta.Teams.Does anyone know if this data is exposed anywhere in the “teamwork” API? Read More
Livpure Smart Referral Code O4SMRK Get Free Discount & Trial
Livpure Smart Referral Code O4SMRK Get Free Discount & Trial. In today’s fast-paced world, access to clean and pure drinking water is essential for a healthy lifestyle. Livpure Smart, a subscription-based service, understands this need and offers a technologically advanced water purifier system to provide consumers with pure and clean water. One of the exciting aspects of Livpure Smart is its referral program, which allows users to enjoy additional benefits through the Livpure Smart Referral Code (O4SMRK). In this blog, we’ll delve into the details of Livpure Smart, how the referral program works, and the advantages it brings to both referrers and referees.
Livpure Smart Referral Code:
Getting your Livpure Smart water purifier is as easy as 1-2-3! Here’s how it works:
Choose Your Model and Plan: Visit our user-friendly Livpure Smart website or download the app. Browse through the various RO models and subscription plans available and choose the one that suits your needs.
Make Payment Online: Once you’ve selected your preferred RO model and plan, make a hassle-free payment through our secure online gateway.
Delivery within 72 Hours: After confirming your order, sit back and relax. Within 72 hours, your chosen Livpure Smart water purifier will be delivered right to your
What is Livpure Smart?
Livpure Smart is a revolutionary subscription-based service that brings advanced water purification technology to your doorstep. It’s the perfect solution for today’s savvy consumers who want hassle-free access to clean and pure drinking water. Livpure Smart is powered by Livpure’s superior engineering and cutting-edge technology, ensuring that you get the best water purification experience. And the best part? You can subscribe to Livpure Smart in just five easy steps.
How does Livpure Smart Subscription work?
The subscription process is straightforward and user-friendly:
Step 1: Fill in your details and choose a plan that suits your needs.
Step 2: Add your installation address for convenience.
Step 3: Complete the payment process securely.
Step 4: Upload your KYC documents for verification.
Step 5: Expect delivery and installation within 72 hours.
Livpure Smart Refer and Earn Program
Now, let’s dive into the exciting world of the Livpure Smart Refer and Earn program. This program allows users to refer friends and family, earning rewards in the process.
How does the Livpure Smart Refer and Earn program work?
To participate, you can refer a friend by providing their details along with your referral code, or you can invite them directly via WhatsApp. When your friends sign up and purchase the Livpure Smart RO Subscription using your referral code (O4SMRK), you earn a ₹500 Amazon voucher, while your friend gets ₹100 off on their subscription. It’s a win-win situation for everyone involved.
Eligibility and Terms
To be eligible for the referral reward, the referee must complete the payment and installation process. However, there are certain terms and conditions that both referrers and referees need to keep in mind:
Prospective customers (referees) must register with accurate personal details.Referrers should not solicit participation for personal gains.Livpure reserves the right to reject referrals and modify terms and conditions without prior notice.Referrers do not become employees or representatives of Livpure.Referrers are responsible for indemnifying Livpure for any breach of terms and conditions.All Livpure trademarks, copyrights, and intellectual property remain the property of Livpure and may not be used without written approval.
When will I receive the referral reward?
The referral reward, in the form of a ₹500 Amazon voucher, will be credited to your account within 2 days after the payment date of the referee. Once you receive the voucher, you’ll also receive an SMS with instructions on how to share feedback and update the status of your voucher.
Becoming the Top Referrer
For those looking to maximize their rewards, Livpure Smart offers an additional incentive. The top referrer of the month, who successfully refers the most friends and followers to sign up and purchase the RO subscription, will win an Amazon voucher worth ₹2500.
Why Choose Livpure Smart Subscription?
Livpure Smart offers numerous benefits, making it an attractive option for those seeking clean drinking water:
Access to advanced water purifiers without the commitment of buying.Ideal for individuals on the move or those in multiple locations.No relocation charges, ensuring flexibility.Annual maintenance is covered by the company.Ability to track water consumption, providing valuable insights.
Conclusion
Livpure Smart is changing the way we access clean and pure drinking water. With its subscription-based model and exciting referral program, it not only provides convenience but also rewards users for spreading the word. By using the Livpure Smart Referral Code (O4SMRK) , you can enjoy the benefits of clean water and share these advantages with your friends and family. So, why wait? Join the Livpure Smart community today and make clean water a part of your daily life.
Livpure Smart Referral Code O4SMRK Get Free Discount & Trial. In today’s fast-paced world, access to clean and pure drinking water is essential for a healthy lifestyle. Livpure Smart, a subscription-based service, understands this need and offers a technologically advanced water purifier system to provide consumers with pure and clean water. One of the exciting aspects of Livpure Smart is its referral program, which allows users to enjoy additional benefits through the Livpure Smart Referral Code (O4SMRK). In this blog, we’ll delve into the details of Livpure Smart, how the referral program works, and the advantages it brings to both referrers and referees. Livpure Smart Referral Code:Getting your Livpure Smart water purifier is as easy as 1-2-3! Here’s how it works:Click Here & Visit Livpure Smart WebsiteSignup New Account: Register With New Account During Register Apply Livpure Smart Referral Code: O4SMRKChoose Your Model and Plan: Visit our user-friendly Livpure Smart website or download the app. Browse through the various RO models and subscription plans available and choose the one that suits your needs.Make Payment Online: Once you’ve selected your preferred RO model and plan, make a hassle-free payment through our secure online gateway.Delivery within 72 Hours: After confirming your order, sit back and relax. Within 72 hours, your chosen Livpure Smart water purifier will be delivered right to your What is Livpure Smart?Livpure Smart is a revolutionary subscription-based service that brings advanced water purification technology to your doorstep. It’s the perfect solution for today’s savvy consumers who want hassle-free access to clean and pure drinking water. Livpure Smart is powered by Livpure’s superior engineering and cutting-edge technology, ensuring that you get the best water purification experience. And the best part? You can subscribe to Livpure Smart in just five easy steps.How does Livpure Smart Subscription work?The subscription process is straightforward and user-friendly:Step 1: Fill in your details and choose a plan that suits your needs.Step 2: Add your installation address for convenience.Step 3: Complete the payment process securely.Step 4: Upload your KYC documents for verification.Step 5: Expect delivery and installation within 72 hours.Livpure Smart Refer and Earn ProgramNow, let’s dive into the exciting world of the Livpure Smart Refer and Earn program. This program allows users to refer friends and family, earning rewards in the process.How does the Livpure Smart Refer and Earn program work?To participate, you can refer a friend by providing their details along with your referral code, or you can invite them directly via WhatsApp. When your friends sign up and purchase the Livpure Smart RO Subscription using your referral code (O4SMRK), you earn a ₹500 Amazon voucher, while your friend gets ₹100 off on their subscription. It’s a win-win situation for everyone involved. Eligibility and TermsTo be eligible for the referral reward, the referee must complete the payment and installation process. However, there are certain terms and conditions that both referrers and referees need to keep in mind: Prospective customers (referees) must register with accurate personal details.Referrers should not solicit participation for personal gains.Livpure reserves the right to reject referrals and modify terms and conditions without prior notice.Referrers do not become employees or representatives of Livpure.Referrers are responsible for indemnifying Livpure for any breach of terms and conditions.All Livpure trademarks, copyrights, and intellectual property remain the property of Livpure and may not be used without written approval. When will I receive the referral reward?The referral reward, in the form of a ₹500 Amazon voucher, will be credited to your account within 2 days after the payment date of the referee. Once you receive the voucher, you’ll also receive an SMS with instructions on how to share feedback and update the status of your voucher.Becoming the Top ReferrerFor those looking to maximize their rewards, Livpure Smart offers an additional incentive. The top referrer of the month, who successfully refers the most friends and followers to sign up and purchase the RO subscription, will win an Amazon voucher worth ₹2500.Why Choose Livpure Smart Subscription?Livpure Smart offers numerous benefits, making it an attractive option for those seeking clean drinking water: Access to advanced water purifiers without the commitment of buying.Ideal for individuals on the move or those in multiple locations.No relocation charges, ensuring flexibility.Annual maintenance is covered by the company.Ability to track water consumption, providing valuable insights.ConclusionLivpure Smart is changing the way we access clean and pure drinking water. With its subscription-based model and exciting referral program, it not only provides convenience but also rewards users for spreading the word. By using the Livpure Smart Referral Code (O4SMRK) , you can enjoy the benefits of clean water and share these advantages with your friends and family. So, why wait? Join the Livpure Smart community today and make clean water a part of your daily life. Read More
The Right Way to Replace the Remove-SPOExternalUser Cmdlet
Microsoft says they will remove the Remove-SPOExternalUser cmdlet starting July 29. They recommend using Remove-AzureADUser as a replacement. It’s a bad call because that cmdlet is part of a now-retired and soon to be deprecated module. Overall, recommendations like this make you think that Microsoft doesn’t know what’s happening across the whole of Microsoft 365. And you might be right.
https://office365itpros.com/2024/07/11/remove-spoexternaluser-cmdlet/
Microsoft says they will remove the Remove-SPOExternalUser cmdlet starting July 29. They recommend using Remove-AzureADUser as a replacement. It’s a bad call because that cmdlet is part of a now-retired and soon to be deprecated module. Overall, recommendations like this make you think that Microsoft doesn’t know what’s happening across the whole of Microsoft 365. And you might be right.
https://office365itpros.com/2024/07/11/remove-spoexternaluser-cmdlet/ Read More
Help using a file for input
Hello everybody, I am currently using this script to automate a process, the problem, is it only processes one user at a time.
Add-MailboxPermission -Identity “USERNAME” -User “sa_sourceone” -AccessRights FullAccess -InheritanceType All -AutoMapping $false
I would like to pull in entries from a text file for the USERNAME field so I can process more than one at a time.
Any help would be appreciated,
Thanks.
Hello everybody, I am currently using this script to automate a process, the problem, is it only processes one user at a time. Add-MailboxPermission -Identity “USERNAME” -User “sa_sourceone” -AccessRights FullAccess -InheritanceType All -AutoMapping $false I would like to pull in entries from a text file for the USERNAME field so I can process more than one at a time. Any help would be appreciated,Thanks. Read More
Copilot for M365 Outlook – 2 Questions (Schedule Meeting & Japanese Answer)
Hello everyone,
I’ve been using Copilot for about three months now and have noticed two strange issues that I can’t explain. Does anyone have any insights on this?
1. I asked Copilot in Outlook to schedule a meeting with a colleague from my department. The first time, it said the meeting was scheduled, but nothing happened. Twice, it responded that it wasn’t possible, and the last time, I received the message, “I’m sorry, but I was unable to schedule the meeting due to an unexpected error.” Even though I have full access to my colleague’s calendar, Copilot can’t schedule a meeting for me. How is this possible? – See the screenshot
2. I prompted once again, but in German to schedule a meeting at 11 o’clock. I received the message
“It appears that there is no specific information regarding ******* availability for July 8, 2024, at 11:00 AM. I recommend sending a meeting request to confirm his availability. Would you like me to prepare an invitation for you?”
I replied “YES” and got a Japanese answer! Even though there are no Japanese language packs installed or anything like that. See the screenshot. This happend like twice already.
Hello everyone,I’ve been using Copilot for about three months now and have noticed two strange issues that I can’t explain. Does anyone have any insights on this?1. I asked Copilot in Outlook to schedule a meeting with a colleague from my department. The first time, it said the meeting was scheduled, but nothing happened. Twice, it responded that it wasn’t possible, and the last time, I received the message, “I’m sorry, but I was unable to schedule the meeting due to an unexpected error.” Even though I have full access to my colleague’s calendar, Copilot can’t schedule a meeting for me. How is this possible? – See the screenshot2. I prompted once again, but in German to schedule a meeting at 11 o’clock. I received the message”It appears that there is no specific information regarding ******* availability for July 8, 2024, at 11:00 AM. I recommend sending a meeting request to confirm his availability. Would you like me to prepare an invitation for you?”I replied “YES” and got a Japanese answer! Even though there are no Japanese language packs installed or anything like that. See the screenshot. This happend like twice already. Read More
How to add new fields to Events UI
I’m trying to get new fields, Region, Country, Virtual/In-person, and Topic added to the events UI:
If I go to the list directly, for example: https://xxxxx/sites/xxxxx/Lists/Events/calendar.aspx, then add an event from there I can see the new fields. However, is there a way to add the new fields to the UI when someone uses the events web part to create an event?
I found a similar question, though it was posted 4 years ago, so I’m not sure if anything has changed since then: https://answers.microsoft.com/en-us/msoffice/forum/all/add-fields-to-sp-365-modern-site-event-new-item/3b2b72a6-209b-4a0b-95bf-3e94b63b5d9d
I’m trying to get new fields, Region, Country, Virtual/In-person, and Topic added to the events UI:If I go to the list directly, for example: https://xxxxx/sites/xxxxx/Lists/Events/calendar.aspx, then add an event from there I can see the new fields. However, is there a way to add the new fields to the UI when someone uses the events web part to create an event? I found a similar question, though it was posted 4 years ago, so I’m not sure if anything has changed since then: https://answers.microsoft.com/en-us/msoffice/forum/all/add-fields-to-sp-365-modern-site-event-new-item/3b2b72a6-209b-4a0b-95bf-3e94b63b5d9d Read More