Category: Microsoft
Category Archives: Microsoft
SharePoint REST API v2 delta nextlink
I’m using the SharePoint REST API v2 with a driveitem delta query and when I add an expand odata query, it returns the expanded information on the first response (200 items), but does not return it on any response using the returned “@nextlink”.
Query:
/drives/{driveId}/root/delta?expand=publication,sharepointIds
also tried:
/drives/{driveId}/root/delta?$expand=publication,sharepointIds
The same query in Graph will return the values correctly.
I’m using the SharePoint REST API v2 with a driveitem delta query and when I add an expand odata query, it returns the expanded information on the first response (200 items), but does not return it on any response using the returned “@nextlink”.Query:/drives/{driveId}/root/delta?expand=publication,sharepointIdsalso tried:/drives/{driveId}/root/delta?$expand=publication,sharepointIds The same query in Graph will return the values correctly. Read More
New Blog | Update on the Deprecation of Admin Audit Log Cmdlets
We wanted to provide you with an important update to the deprecation schedule for the two Admin Audit Log cmdlets, as part of our ongoing commitment to improve security and compliance capabilities within our services. The two Admin Audit Log cmdlets are:
Search-AdminAuditLog
New-AdminAuditLog
As communicated in a previous blog post, the deprecation of Admin Audit Log (AAL) and Mailbox Audit Log (MAL) cmdlets was initially planned to occur simultaneously on April 30th, 2024. However, to ensure a smooth transition and to accommodate the feedback from our community, we have revised the deprecation timeline.
We would like to inform you that the Admin Audit Log cmdlets will now be deprecated separately from the Mailbox Audit Log cmdlets, with the final date set for September 15, 2024.
This change allows for a more phased approach, giving you additional time to adapt your processes to the new Unified Audit Log (UAL) cmdlets, which offer enhanced functionality and a more unified experience.
What This Means for You
The Admin Audit Log cmdlets will be deprecated on September 15, 2024.
The Mailbox Audit Log cmdlets will have a separate deprecation date, which will be announced early next year.
We encourage customers to begin transitioning to the Unified Audit Log (UAL) cmdlet i.e. Search-UnifiedAuditLog as soon as possible. Alternatively, you can explore using the Audit Search Graph API, which is currently in Public Preview and is expected to become Generally Available by early July 2024.
By Angélique Conde
We wanted to provide you with an important update to the deprecation schedule for the two Admin Audit Log cmdlets, as part of our ongoing commitment to improve security and compliance capabilities within our services. The two Admin Audit Log cmdlets are:
Search-AdminAuditLog
New-AdminAuditLog
As communicated in a previous blog post, the deprecation of Admin Audit Log (AAL) and Mailbox Audit Log (MAL) cmdlets was initially planned to occur simultaneously on April 30th, 2024. However, to ensure a smooth transition and to accommodate the feedback from our community, we have revised the deprecation timeline.
We would like to inform you that the Admin Audit Log cmdlets will now be deprecated separately from the Mailbox Audit Log cmdlets, with the final date set for September 15, 2024.
This change allows for a more phased approach, giving you additional time to adapt your processes to the new Unified Audit Log (UAL) cmdlets, which offer enhanced functionality and a more unified experience.
What This Means for You
The Admin Audit Log cmdlets will be deprecated on September 15, 2024.
The Mailbox Audit Log cmdlets will have a separate deprecation date, which will be announced early next year.
We encourage customers to begin transitioning to the Unified Audit Log (UAL) cmdlet i.e. Search-UnifiedAuditLog as soon as possible. Alternatively, you can explore using the Audit Search Graph API, which is currently in Public Preview and is expected to become Generally Available by early July 2024.
Read the full post here: Update on the Deprecation of Admin Audit Log Cmdlets
Windows Admin center V2 Authentication issue
Windows Admin center V2 “Modernized” v2.0.01 will not operate in Windows Authentication mode. If you run the installer in Remote Express mode, it is set to Forms Authentication. This mode will not allow a login with an Active Directory administrator the V2 gateway is joined to, only the local machine administrator.
If you rerun the setup in custom mode and attempt to indicate Kerberos / Windows Authentication the gateway will not run. If you use the powershell admin script to run the command “Set-WACLoginMode -Mode WindowsAuthentication” on a functioning gateway in Forms auth mode, the gateway will crash/not run.
Both methods of setting integrated authentication produce this .NET runtime error below. Running the indicated netsh command produces no change in behavior and no change in future .NET runtime errors. Running a netsh show command clearly displays the indicated urlacl exists. The gateway server OS is Windows 2022 STD Desktop Exp. This is not installed SxS with V1 gateway. V1 gateway operates without issue on this server when installed.
Application: WindowsAdminCenter.exe
CoreCLR Version: 6.0.2523.51912
.NET Version: 6.0.25
Description: The process was terminated due to an unhandled exception.
Exception Info: Microsoft.AspNetCore.Server.HttpSys.HttpSysException (5): The prefix ‘https://+:6600/’ is not registered. Please run the following command as Administrator to register this prefix:
netsh http add urlacl url=https://+:6600/ user=DOMAINHIDDENWAC$
See “Preregister URL prefixes on the server” on https://go.microsoft.com/fwlink/?linkid=2127065 for more information.
at Microsoft.AspNetCore.Server.HttpSys.UrlGroup.RegisterPrefix(String uriPrefix, Int32 contextId)
at Microsoft.AspNetCore.Server.HttpSys.UrlPrefixCollection.RegisterAllPrefixes(UrlGroup urlGroup)
at Microsoft.AspNetCore.Server.HttpSys.HttpSysListener.Start()
at Microsoft.AspNetCore.Server.HttpSys.MessagePump.StartAsync[TContext](IHttpApplication`1 application, CancellationToken cancellationToken)
at Microsoft.AspNetCore.Hosting.GenericWebHostService.StartAsync(CancellationToken cancellationToken)
at Microsoft.Extensions.Hosting.Internal.Host.StartAsync(CancellationToken cancellationToken)
at Microsoft.WindowsAdminCenter.Core.HostingRuntime.StartAsync(CancellationToken cancellationToken)
at Microsoft.WindowsAdminCenter.Executable.WindowsService.OnStart(String[] args)
at System.Threading.Tasks.Task.<>c.<ThrowAsync>b__128_1(Object state)
at System.Threading.QueueUserWorkItemCallbackDefaultContext.Execute()
at System.Threading.ThreadPoolWorkQueue.Dispatch()
at System.Threading.PortableThreadPool.WorkerThread.WorkerThreadStart()
at System.Threading.Thread.StartCallback()
Windows Admin center V2 “Modernized” v2.0.01 will not operate in Windows Authentication mode. If you run the installer in Remote Express mode, it is set to Forms Authentication. This mode will not allow a login with an Active Directory administrator the V2 gateway is joined to, only the local machine administrator. If you rerun the setup in custom mode and attempt to indicate Kerberos / Windows Authentication the gateway will not run. If you use the powershell admin script to run the command “Set-WACLoginMode -Mode WindowsAuthentication” on a functioning gateway in Forms auth mode, the gateway will crash/not run. Both methods of setting integrated authentication produce this .NET runtime error below. Running the indicated netsh command produces no change in behavior and no change in future .NET runtime errors. Running a netsh show command clearly displays the indicated urlacl exists. The gateway server OS is Windows 2022 STD Desktop Exp. This is not installed SxS with V1 gateway. V1 gateway operates without issue on this server when installed. Application: WindowsAdminCenter.exeCoreCLR Version: 6.0.2523.51912.NET Version: 6.0.25Description: The process was terminated due to an unhandled exception.Exception Info: Microsoft.AspNetCore.Server.HttpSys.HttpSysException (5): The prefix ‘https://+:6600/’ is not registered. Please run the following command as Administrator to register this prefix:netsh http add urlacl url=https://+:6600/ user=DOMAINHIDDENWAC$See “Preregister URL prefixes on the server” on https://go.microsoft.com/fwlink/?linkid=2127065 for more information.at Microsoft.AspNetCore.Server.HttpSys.UrlGroup.RegisterPrefix(String uriPrefix, Int32 contextId)at Microsoft.AspNetCore.Server.HttpSys.UrlPrefixCollection.RegisterAllPrefixes(UrlGroup urlGroup)at Microsoft.AspNetCore.Server.HttpSys.HttpSysListener.Start()at Microsoft.AspNetCore.Server.HttpSys.MessagePump.StartAsync[TContext](IHttpApplication`1 application, CancellationToken cancellationToken)at Microsoft.AspNetCore.Hosting.GenericWebHostService.StartAsync(CancellationToken cancellationToken)at Microsoft.Extensions.Hosting.Internal.Host.StartAsync(CancellationToken cancellationToken)at Microsoft.WindowsAdminCenter.Core.HostingRuntime.StartAsync(CancellationToken cancellationToken)at Microsoft.WindowsAdminCenter.Executable.WindowsService.OnStart(String[] args)at System.Threading.Tasks.Task.<>c.<ThrowAsync>b__128_1(Object state)at System.Threading.QueueUserWorkItemCallbackDefaultContext.Execute()at System.Threading.ThreadPoolWorkQueue.Dispatch()at System.Threading.PortableThreadPool.WorkerThread.WorkerThreadStart()at System.Threading.Thread.StartCallback() Read More
New Blog | How to break the token theft cyber-attack chain
By Alex Weinert
We’ve written a lot about how attackers try to break passwords. The solution to password attacks—still the most common attack vector for compromising identities—is to turn on multifactor authentication (MFA).
But as more customers do the right thing with MFA, actors are going beyond password-only attacks. So, we’re going to publish a series of articles on how to defeat more advanced attacks, starting with token theft. In this article, we’ll start with some basics on how tokens work, describe a token theft attack, and then explain what you can do to prevent and mitigate token theft now.
Tokens 101
Before we get too deep into the token theft conversation, let’s quickly review the mechanics of tokens.
A token is an authentication artifact that grants you access to resources. You get a token by signing into an identity provider (IDP), such as Microsoft Entra ID, using a set of credentials. The IDP responds to a successful sign-in by issuing a token that describes who you are and what you have permission to do. When you want to access an application or service (we’ll just say app from here), you get permission to talk to that resource by presenting a token that’s correctly signed by an issuer it trusts. The software on the client device you’re using takes care of all token handling behind the scenes.
Read the full post here: How to break the token theft cyber-attack chain
By Alex Weinert
We’ve written a lot about how attackers try to break passwords. The solution to password attacks—still the most common attack vector for compromising identities—is to turn on multifactor authentication (MFA).
But as more customers do the right thing with MFA, actors are going beyond password-only attacks. So, we’re going to publish a series of articles on how to defeat more advanced attacks, starting with token theft. In this article, we’ll start with some basics on how tokens work, describe a token theft attack, and then explain what you can do to prevent and mitigate token theft now.
Tokens 101
Before we get too deep into the token theft conversation, let’s quickly review the mechanics of tokens.
A token is an authentication artifact that grants you access to resources. You get a token by signing into an identity provider (IDP), such as Microsoft Entra ID, using a set of credentials. The IDP responds to a successful sign-in by issuing a token that describes who you are and what you have permission to do. When you want to access an application or service (we’ll just say app from here), you get permission to talk to that resource by presenting a token that’s correctly signed by an issuer it trusts. The software on the client device you’re using takes care of all token handling behind the scenes.
Read the full post here: How to break the token theft cyber-attack chain Read More
Process Monitor v4.01
Microsoft Tech Community – Latest Blogs –Read More
Granular RBAC permissions for endpoint security workloads
By: Laura Arrizza – Sr Product Manager | Microsoft Intune
The built-in role ‘Endpoint Security Manager’ is used to manage policies and features within the Microsoft Intune admin center Endpoint security blade or, admin actions can be limited by using the custom role with the ‘Security baselines’ permission.
With Intune’s June (2406) release, we’ll begin adding new permissions for each endpoint security workload to allow for additional granularity and control. The ‘Security baselines’ permission previously included all security policies and now, it will only include security workloads that do not have their own permission.
New granular permissions
In the first iteration, granular permissions are now available with 2406 for the following security workloads:
Endpoint detection and response
App Control for Business
Attack surface reduction
The remaining security workloads will continue to be applicable under the existing ‘Security baseline’ permission until they’re made available as granular controls in a future release.
Admins can take advantage of these changes by creating a new Intune role via ‘Tenant administration’ with the appropriate access rights. An example of this can be found below:
The behavior of these rights continues to mirror the same as those within the ‘Security baselines’ permission – the main difference being that it applies to the security policies within the security workload.
Existing RBAC roles
There’s no change in functionality for built-in roles that contain the ‘Security baselines’ permission. This includes ‘Endpoint Security Manager’, ‘Read Only Operator’, and ‘Help Desk Operator’.
If you’re using custom RBAC roles with the ‘Security baseline’ permission, the new permissions will automatically be assigned to ensure your admins continue to have the same access they have today. For example, if an admin has been assigned a custom role with ‘Security baselines/Read’ permission, that role would include the new permissions, such as ‘Attack surface reduction/Read’. The ‘Security baselines/Read’ would still be applicable for viewing Security baselines, Antivirus, Disk encryption, Firewall, and Account protection policies.
Considerations
The granular permissions at the security workload level will continue to have the same permission structure as Security baselines does today. This includes management of the security policies within those workloads, which may contain overlapping settings in other types of policies (like Security baseline policies or settings catalog policies) which are governed by separate RBAC permissions.
Specifically, for the Attack surface reduction security workload, a subset of security policies will continue to be covered by the existing ‘Security baselines’ permission and not the new ‘Attack surface reduction’ permission. The following templates continue to be covered by existing ‘Security baselines’ permission:
Windows App and browser isolation
Windows Web protection
Windows Application control
Windows Exploit protection
The same permission changes will apply to the Microsoft Defender portal for security policy management.
If you have any questions, leave a comment below or reach out to us on X @IntuneSuppTeam. Stay tuned to What’s new in Intune for the release of additional endpoint security permissions.
Microsoft Tech Community – Latest Blogs –Read More
Excel Macro coding help
Im new on this platform and I am trying to set up a new Excel document where I can transfer rows from one table to another table if one column reads a particular word.
Can anyone help me?
Thanks in advance
Im new on this platform and I am trying to set up a new Excel document where I can transfer rows from one table to another table if one column reads a particular word. Can anyone help me? Thanks in advance Read More
How to transcribe a Windows Media Player audio file to text in Word
Hello, I work for a company in which it would be extremely valuable to be able to transcribe voicemail messages from my Avaya IP phone to text. The I.T. department says these phones do not have this ability. However, I know the voicemail messages can be converted to a Windows Media player audio file, and that file can be emailed to an employee. I’m wondering if anyone has step by step instructions for converting a Windows Media Player audio file to transcribed text ???
That would be so helpful! Thank you if you can offer any advice.
Hello, I work for a company in which it would be extremely valuable to be able to transcribe voicemail messages from my Avaya IP phone to text. The I.T. department says these phones do not have this ability. However, I know the voicemail messages can be converted to a Windows Media player audio file, and that file can be emailed to an employee. I’m wondering if anyone has step by step instructions for converting a Windows Media Player audio file to transcribed text ???That would be so helpful! Thank you if you can offer any advice. Read More
Permissions per person in sharepoint
Hello, I hope you are well.
I would like to know if there is a way to see all the permissions a person has on all sites, folders, lists, etc. in sharepoint, without having to go site by site looking at that person’s permissions.
I hope I have explained myself and that you can help me! Thank you so much.
Hello, I hope you are well.I would like to know if there is a way to see all the permissions a person has on all sites, folders, lists, etc. in sharepoint, without having to go site by site looking at that person’s permissions.I hope I have explained myself and that you can help me! Thank you so much. Read More
Accessibility checker doesn’t recognize my custom heading styles
I’ve recently reformatted a large document and applied custom heading styles throughout. I was able to generate a TOC just fine, but the accessibility checker tells me that there are no headings in the document. Any ideas as to why?
I do not want to use the built-in styles for this document. I created new styles because I want a completely different look than the built-in styles. The document also includes a custom multi-level list where each level is already associated with the custom styles I created. Any help would be appreciated!
I’ve recently reformatted a large document and applied custom heading styles throughout. I was able to generate a TOC just fine, but the accessibility checker tells me that there are no headings in the document. Any ideas as to why? I do not want to use the built-in styles for this document. I created new styles because I want a completely different look than the built-in styles. The document also includes a custom multi-level list where each level is already associated with the custom styles I created. Any help would be appreciated! Read More
“None” option missing from Teams background options
Hi,
Our teams “none” background option is missing. Forcing users to use a background or the blur backgrounds.
I have tried to revert back to classic teams to see if that is a fix, but I am unable to toggle it off and it takes me to download the classic teams which is just the new teams download.
We are not disabling this option as an organization.
Hi, Our teams “none” background option is missing. Forcing users to use a background or the blur backgrounds. I have tried to revert back to classic teams to see if that is a fix, but I am unable to toggle it off and it takes me to download the classic teams which is just the new teams download. We are not disabling this option as an organization. Read More
Why are my Adobe preferences saving to my One Drive – Documents folder?
Hey there,
I have a basic one drive account. I don’t really need it but I like having the option of backing certain things up if need be, so don’t want to disable it. You can see in the screenshot below, there’s a bunch of media encoder files in the “Documents” folder of my Personal one drive. Anyone know why this is? It seems like One Drive is hi-jacking my main C: Documents folder for whatever reason. Feel like it’s forcing me to upgrade when I don’t want to.
Hey there,I have a basic one drive account. I don’t really need it but I like having the option of backing certain things up if need be, so don’t want to disable it. You can see in the screenshot below, there’s a bunch of media encoder files in the “Documents” folder of my Personal one drive. Anyone know why this is? It seems like One Drive is hi-jacking my main C: Documents folder for whatever reason. Feel like it’s forcing me to upgrade when I don’t want to. Read More
Find and replace multiple update in same colum
Ho I can find and replace of costallow, Monthly and share of column-Add_code_claculation using SELECT command. I want to update costallow to 10, Monthly to 15 and Share to 30 using find and replace function using SELECT or any other function to get the expected result.
Create table #ABC ( Tid char(10), Add_code_Calculation varchar(255))
insert into #ABC values (’11’,'(A+B+C)/(costallow * Monthly – Share)’
Expected result:
Tid Add_code_Calculation
11 (A+B+C)/(10 * 15 – 30)
Ho I can find and replace of costallow, Monthly and share of column-Add_code_claculation using SELECT command. I want to update costallow to 10, Monthly to 15 and Share to 30 using find and replace function using SELECT or any other function to get the expected result. Create table #ABC ( Tid char(10), Add_code_Calculation varchar(255))insert into #ABC values (’11’,'(A+B+C)/(costallow * Monthly – Share)’ Expected result:Tid Add_code_Calculation11 (A+B+C)/(10 * 15 – 30) Read More
JSON Type & Aggregates Public Preview in Azure SQL Database | Data Exposed
The native JSON type allows JSON documents to be stored in a binary format. This binary format allows for efficient query processing and in-place modifications of JSON documents. The JSON aggregates – JSON_OBJECTAGG & JSON_ARRAYAGG enable easy aggregation of relational data into a JSON document. Learn more in this episode of Data Exposed with Anna Hoffman and Umachandar Jayachandran.
Resources:
JSON data type (preview) – SQL Server | Microsoft Learn
JSON_OBJECTAGG (Transact-SQL) – SQL Server | Microsoft Learn
JSON_ARRAYAGG (Transact-SQL) – SQL Server | Microsoft Learn
View/share our latest episodes on Microsoft Learn and YouTube!
Microsoft Tech Community – Latest Blogs –Read More
Event Planner Template no longer macro enabled
I used this Event Planner template last year to create a custom October to September department calendar. The current version of the template is only for 2024. This template does not have any macros or fields. It no longer allows me to create a custom calendar.
I still have the old calendar and it apparently uses Document Variable Fields but the set start date macro has disappeared. Does anyone know how to turn the calendar update controls back on, or update the document variables manually, or get a macro enabled version of the template?
Template URL: https://create.microsoft.com/en-us/template/event-planner-3b23a074-fdbd-4280-8ebd-852016c1bb60
I used this Event Planner template last year to create a custom October to September department calendar. The current version of the template is only for 2024. This template does not have any macros or fields. It no longer allows me to create a custom calendar. I still have the old calendar and it apparently uses Document Variable Fields but the set start date macro has disappeared. Does anyone know how to turn the calendar update controls back on, or update the document variables manually, or get a macro enabled version of the template? Template URL: https://create.microsoft.com/en-us/template/event-planner-3b23a074-fdbd-4280-8ebd-852016c1bb60 Read More
Excel sharepoint formula
Hi, I need assistance with the “Bandwidth” tab, specifically cells B2
. In the “Raw Data” tab, if an employee’s name appears in column C, the formula for B2 should be 1 minus the sum of values in column D for that employee. For example, if Jeff has values 0.20 and 0.45 in the “Raw Data” tab, then in the “Bandwidth” tab, B2 should be calculated as 1 minus 0.20 plus 0.45.
https://ceridian.sharepoint.com/:x:/r/teams/MAUPayrollProject/_layouts/15/Doc.aspx?sourcedoc=%7B7af44531-abf9-49db-8450-d3b88165af8f%7D&action=edit&wdPreviousSession=47b9aa35-8172-d667-505d-c2e9b89d566d Hi, I need assistance with the “Bandwidth” tab, specifically cells B2. In the “Raw Data” tab, if an employee’s name appears in column C, the formula for B2 should be 1 minus the sum of values in column D for that employee. For example, if Jeff has values 0.20 and 0.45 in the “Raw Data” tab, then in the “Bandwidth” tab, B2 should be calculated as 1 minus 0.20 plus 0.45. Read More
Read only without a password.
Occasionally excel will make my spreadsheet a read-only, but I don’t do that. I have never created a password. How do I correct this issue? I have tried all such as F12, I’ve gone down to Tools to general options {but it prompts me to put in a password, I’ve never created a password.} Excel did this once before, and the same issues. I must edit this sheet. It also says notify the person, the person is me, that is trying to correct it. I had a co-worker go to his laptop, and try to get in that way, same thing. What gets me a password was never created. I need help please.
Occasionally excel will make my spreadsheet a read-only, but I don’t do that. I have never created a password. How do I correct this issue? I have tried all such as F12, I’ve gone down to Tools to general options {but it prompts me to put in a password, I’ve never created a password.} Excel did this once before, and the same issues. I must edit this sheet. It also says notify the person, the person is me, that is trying to correct it. I had a co-worker go to his laptop, and try to get in that way, same thing. What gets me a password was never created. I need help please. Read More
How to create a workbook where the master data filters to a specific worksheet
Hello, can anyone provide guidance on how to set up a housing verification workbook where the master list filters automatically to the specific housing community worksheet when entered?
Hello, can anyone provide guidance on how to set up a housing verification workbook where the master list filters automatically to the specific housing community worksheet when entered? Read More
How to set Different Backgrounds & Desktop icons Between Desktops in Windows 11
Hello,
I am trying to set my PC up so that it is easier to transition between work and personal activities. I read in several places online that this was doable via the Windows 11 task view tool (creating multiple desktops).
I have been able to set up different desktops with different apps running in each, but I cannot find a way to differentiate either the desktop backgrounds or the desktop shortcuts. Help appreciated.
Hello, I am trying to set my PC up so that it is easier to transition between work and personal activities. I read in several places online that this was doable via the Windows 11 task view tool (creating multiple desktops).I have been able to set up different desktops with different apps running in each, but I cannot find a way to differentiate either the desktop backgrounds or the desktop shortcuts. Help appreciated. Read More
Video interactivity gets a boost with new Microsoft Stream features
If videos are a part of your marketing strategy – and they should be – you’ll be happy to know that Microsoft Stream has just rolled out several new features to help you boost your content. We’ve put a summary of Stream’s new capabilities below.
Creating useful and compelling video content is a difficult task if you’re creating from scratch. Fortunately, with Microsoft Clipchamp and Stream, you’ve got an end-to-end video creation ecosystem already baked into your Microsoft 365 business license. Clipchamp became generally available to Microsoft 365 customers in 2023 and has already established itself as one of the most intuitive and powerful video editors on the market. Stream addresses the other half of the video experience: delivery. Stream is a powerful video management service that allows the people in your organization to store, share, and view your videos securely. Because it’s deeply integrated with the Microsoft 365 app portfolio, viewers can consume video content through multiple apps, like Microsoft PowerPoint, SharePoint, or Teams to name a few. And now we’ve added several new features to make the Stream experience even more engaging for users.
Copilot in Microsoft Stream
AI has arrived to make the video engagement experience enhanced for viewers. Copilot in Stream can help you get new insight into your videos. It can quickly summarize videos you’ve got stored on SharePoint so you can get the most out of your content. For example, you can have Copilot summarize a speaker’s comments to create a fast how-to list for an upcoming product demonstration. It’s an easy way to get the most out of every video you make. To use Copilot in Stream, you’ll need to purchase Copilot for Microsoft 365 for your business. Check out the following announcement to dive deep into Copilot in Stream use cases.
Microsoft 365 content callouts and interactivity analytics
Adding things like surveys, quizzes, or other forms of data gathering to your videos has always been difficult. Stream now makes adding such components easier and more effective. You can use Microsoft Forms and other links in callouts directly from your video. This lets your viewers search and find additional content easily from inside the Stream player. You’ll be able to see which callouts were the most effective using Stream’s new interactivity analytics. They let you gather non-personal data on your audience, like their responses to Microsoft Form polls or their average attention time. Metrics like these make it much easier to understand which of your videos and interactive elements landed the best and why.
Video reactions
Video reactions allow your audience to react to your content. You can enable reactions for the video, but you can also turn them into an interactive element that viewers can respond to several times as they go through the content. That gives you immediate feedback on how well your video landed and which parts were most effective. You can see reactions in the video’s Stream timeline, which lets you mark key reaction moments. Then you can use them as a best-practice reference when creating similar content in the future. Reactions can be used for individuals and teams, and viewers can choose to turn the feature off.
Stream video recordings in the new Outlook for Windows and Web
You can now integrate Stream video recording capabilities into Microsoft Outlook on the web and the new version of Outlook for Windows. You’ll be able to record a video message, capture your screen, or both, directly from Outlook. Screen recordings are great to highlight product demos, business reviews or improve your business culture.
These are just some of the new features that make Microsoft Stream an engaging video platform for your viewers. Whether you want to create, share, or interact with video content, Clipchamp and Stream have the features and integrations you need to tell your brand’s story.
Resources
Find the right Microsoft 365 business plan for your business.
Get Copilot for Microsoft 365 – Business Plans | Microsoft 365
Learn more about how to set up and use your Microsoft 365 subscription and find tips and templates to help you accomplish your business tasks.
Join the Microsoft SMB Tech Community to network with other professionals and business’ using Microsoft 365
Get free resources, tech training, and guidance to keep your business thriving and growing.
Partners can access training resources, customer decks and deployment checklists to do more with Microsoft 365.
Microsoft Tech Community – Latest Blogs –Read More