Category: Microsoft
Category Archives: Microsoft
Category Color Coding not viewable by Delegate on New Mode
Ran into an issue when helping a user today of not being able to see the color coding of a shared calendar. User is a delegate for someone that has their calendar items color coded. I’ve toggled permissions and we’ve removed/re-added the shared calendar in question. This happens in New Mode. When reverting to Legacy Mode, the colors are viewable on the shared calendar.
I’ve tried most things except for a complete reinstall of Outlook. Any thoughts?
JB
Ran into an issue when helping a user today of not being able to see the color coding of a shared calendar. User is a delegate for someone that has their calendar items color coded. I’ve toggled permissions and we’ve removed/re-added the shared calendar in question. This happens in New Mode. When reverting to Legacy Mode, the colors are viewable on the shared calendar.I’ve tried most things except for a complete reinstall of Outlook. Any thoughts?JB Read More
Disable Copilot Pro ad on Word 365 toolbar
Recently this icon appeared on my toolbar in Word 365 on iPad. It’s an ad for Copilot Pro, and it is in the first position on the top-right toolbar. Not only that but it obscures the center toolbar.
I have less than zero interest in Copilot Pro, and I will never purchase it. How do I remove this intrusive ad that Microsoft is foisting on me?
Recently this icon appeared on my toolbar in Word 365 on iPad. It’s an ad for Copilot Pro, and it is in the first position on the top-right toolbar. Not only that but it obscures the center toolbar. I have less than zero interest in Copilot Pro, and I will never purchase it. How do I remove this intrusive ad that Microsoft is foisting on me? Read More
How can i avoid that Onedrive executes after Pressing ” PrintScreen ” in keyboard in this POST OS?
Please say me how to do that for this Windows OS: Windows 11 Pro Versión 23H2 Compilación 22631.3527
Please say me how to do that for this Windows OS: Windows 11 Pro Versión 23H2 Compilación 22631.3527 Read More
ADO YAML question re: ‘enabled’ and variable
– powershell: |
write-host $(CxDebug)
displayName: Test Debug Var
enabled: true
The above code works.
I’d like to leverage a pipeline variable on the last line. When I add a variable and set it to ‘true’ – I get a YAML error prior to running the pipeline.
– powershell: |
write-host $(CxDebug)
displayName: Test Debug Var
enabled: $(CxDebug)
- powershell: |
write-host $(CxDebug)
displayName: Test Debug Var
enabled: true The above code works. I’d like to leverage a pipeline variable on the last line. When I add a variable and set it to ‘true’ – I get a YAML error prior to running the pipeline. – powershell: |
write-host $(CxDebug)
displayName: Test Debug Var
enabled: $(CxDebug) Read More
Copilot using wrong date
Hi All
I live in New Zealand, so the timezone is UTC+13.
I have noticed that Copilot is using UTC as its standard gauge for time, which is problematic when I query my schedule in the morning as it shows the previous day in the results. When I ask it what the date is, it tells me its the previous day today because it is in UTC. As soon as UTC timezone moves into the next day (my current day), then all is well.
Any ideas as to how I can resolve this?
Hi All I live in New Zealand, so the timezone is UTC+13. I have noticed that Copilot is using UTC as its standard gauge for time, which is problematic when I query my schedule in the morning as it shows the previous day in the results. When I ask it what the date is, it tells me its the previous day today because it is in UTC. As soon as UTC timezone moves into the next day (my current day), then all is well. Any ideas as to how I can resolve this? Read More
Notification when video encoding is done
Is there a way to notify the user(s) when encoding of the video is complete? I’ve uploaded videos and they don’t show up in the Stream Library for quite some time. It would be helpful to see some type of placeholder in the library that provides an update when the video will finish processing OR maybe an email to notify the user that it has started and when it is done.
Is there a way to notify the user(s) when encoding of the video is complete? I’ve uploaded videos and they don’t show up in the Stream Library for quite some time. It would be helpful to see some type of placeholder in the library that provides an update when the video will finish processing OR maybe an email to notify the user that it has started and when it is done. Read More
Add printer twice to Azure
Is it possible to Add a UP ready all in one printer twice in Universal Print? I want to have two options for users to print to the same printer depending on if they want to direct print or use Secure Release when needed.
Is it possible to Add a UP ready all in one printer twice in Universal Print? I want to have two options for users to print to the same printer depending on if they want to direct print or use Secure Release when needed. Read More
Latest updates appear to have broken VB6 Applications / Runtime Error 372
Microsoft updates installed on my system last night. Since that point my VB6 application will not open:
Microsoft updates installed on my system last night. Since that point my VB6 application will not open: Read More
New Blog | Organizing rule collections and rule collection groups in Azure Firewall Policy
Firewall Policy is the recommended method to manage Azure Firewall security and operational configurations. When using Firewall Policy, any rules must be part of a rule collection and rule collection group. Rule collections are sets of rules that share the same priority and action, and can be of type DNAT, Network, or Application. Rule collection groups are containers for rule collections of any type and are processed first by Azure Firewall based on priority. To learn more about rules, rule collections, and rule collections groups, see Azure Firewall Policy rule sets.
This article provides some best practices for configuring and organizing Firewall Policy rules into rule collections and rule collections groups.
Rule processing logic
The first thing to note is that if threat intelligence-based filtering is enabled, those rules are evaluated first and may deny traffic before any configured rules are processed.
For configured rules, the following logic applies:
All DNAT rules are processed first, followed by Network rules, and lastly, by Application rules.
For each rule type stated in 1., the firewall evaluates rules based on priority. It will look at the rule collection group with the highest priority, and within that rule collection group, at the rule collection with the highest priority. Keep in mind that priority is any number between 100 (highest priority) and 65,000 (lowest priority).
If there are rules inherited from a parent policy, these will take precedence over rules configured in the child policy. Thus, the logic described in step 2. will apply to inherited rules first.
For detailed examples of this rule processing logic, see Rule processing using Firewall Policy.
Read the full post here: Organizing rule collections and rule collection groups in Azure Firewall Policy
By BeatrizSilveira
Firewall Policy is the recommended method to manage Azure Firewall security and operational configurations. When using Firewall Policy, any rules must be part of a rule collection and rule collection group. Rule collections are sets of rules that share the same priority and action, and can be of type DNAT, Network, or Application. Rule collection groups are containers for rule collections of any type and are processed first by Azure Firewall based on priority. To learn more about rules, rule collections, and rule collections groups, see Azure Firewall Policy rule sets.
This article provides some best practices for configuring and organizing Firewall Policy rules into rule collections and rule collections groups.
Rule processing logic
The first thing to note is that if threat intelligence-based filtering is enabled, those rules are evaluated first and may deny traffic before any configured rules are processed.
For configured rules, the following logic applies:
All DNAT rules are processed first, followed by Network rules, and lastly, by Application rules.
For each rule type stated in 1., the firewall evaluates rules based on priority. It will look at the rule collection group with the highest priority, and within that rule collection group, at the rule collection with the highest priority. Keep in mind that priority is any number between 100 (highest priority) and 65,000 (lowest priority).
If there are rules inherited from a parent policy, these will take precedence over rules configured in the child policy. Thus, the logic described in step 2. will apply to inherited rules first.
For detailed examples of this rule processing logic, see Rule processing using Firewall Policy.
Read the full post here: Organizing rule collections and rule collection groups in Azure Firewall Policy
New Blog | Securing your API Management service from day one with Defender for APIs
By Walner Dort
Introduction
We are excited to announce that you can now secure your Azure API Management (APIM) managed APIs from day one with Defender for APIs. This allows you to enable security as soon as you create your APIM service within the Azure portal. This means that security for APIs is no longer an afterthought and API management administrators do not need to leave the Azure API Management portal experience to turn on protection for their APIs which is a critical entry point into the API attack surface.
Defender for APIs provides full lifecycle protection, detection, and response coverage. Defender for APIs includes unified visibility across your APIM Services within the Azure subscription, security insights with hardening recommendations, classification of sensitive data exposure, and continuous monitoring of APIs with machine learning and threat intelligence-based detections to alert against top OWASP API risks.
Enabling Defender for APIs from APIM instance creation experience in Azure portal
Step 1 – Create a new API Management Service
From the Azure Portal, select Create a resource. You can also select Create a resource on the Azure Home page.
Read the full post here: Securing your API Management service from day one with Defender for APIs
By Walner Dort
Introduction
We are excited to announce that you can now secure your Azure API Management (APIM) managed APIs from day one with Defender for APIs. This allows you to enable security as soon as you create your APIM service within the Azure portal. This means that security for APIs is no longer an afterthought and API management administrators do not need to leave the Azure API Management portal experience to turn on protection for their APIs which is a critical entry point into the API attack surface.
Defender for APIs provides full lifecycle protection, detection, and response coverage. Defender for APIs includes unified visibility across your APIM Services within the Azure subscription, security insights with hardening recommendations, classification of sensitive data exposure, and continuous monitoring of APIs with machine learning and threat intelligence-based detections to alert against top OWASP API risks.
Enabling Defender for APIs from APIM instance creation experience in Azure portal
Step 1 – Create a new API Management Service
From the Azure Portal, select Create a resource. You can also select Create a resource on the Azure Home page.
Read the full post here: Securing your API Management service from day one with Defender for APIs
365 whitelist from being quarantined as malware
Greetings. I am looking for some assistance with allowing a few specific external senders as their emails keep getting blocked in quarantine as “Malware” and these senders are already allowed in the anti-spam policy.
When I release the email to the intended recipient, I do report the message to MS for a false positive and wait for 30 days, but it is not effective. Just today, I had to send email from one sender three times.
I have tried creating a transport rule, but the only option there is to skip spam filtering, but there is nothing to skip malware detection.
How can I allow a sender so that no emails from them get blocked in quarantine due to malware?
Greetings. I am looking for some assistance with allowing a few specific external senders as their emails keep getting blocked in quarantine as “Malware” and these senders are already allowed in the anti-spam policy. When I release the email to the intended recipient, I do report the message to MS for a false positive and wait for 30 days, but it is not effective. Just today, I had to send email from one sender three times. I have tried creating a transport rule, but the only option there is to skip spam filtering, but there is nothing to skip malware detection. How can I allow a sender so that no emails from them get blocked in quarantine due to malware? Read More
Auto forwarding alternative?
The organisation I work for will not allow auto-forwarding of emails at all. Nor will they let me access the email account from my phone.
Is there any way I can get my work computer to send an alert to my phone even just to let me know there’s an email in my work inbox?
Thanks in anticipation.
Dave
The organisation I work for will not allow auto-forwarding of emails at all. Nor will they let me access the email account from my phone. Is there any way I can get my work computer to send an alert to my phone even just to let me know there’s an email in my work inbox?Thanks in anticipation. Dave Read More
Chart issues
Hello,
My chart is not picking up the correct cell. However, there is data in the cell.
Hello, My chart is not picking up the correct cell. However, there is data in the cell. Read More
Steam features I don’t understand
I’m just starting to use Stream this month. There are some things I don’t understand.
What use is the Recommended bar on the home screen? I don’t need recommendations. I just need a searchable list of my Streams.Why don’t my most recent Streams show up on the home screen? I’ve made a dozen new Steams over the last few days, but they don’t show up under All or Created by me, etc.Why, when I try to add a Stream to my favorites, does it come back with “Something went wrong…”Why is Microsoft spending a zillion dollars on AI to help me plan a dinner party, when I just want to get my work done?
I’m just starting to use Stream this month. There are some things I don’t understand.What use is the Recommended bar on the home screen? I don’t need recommendations. I just need a searchable list of my Streams.Why don’t my most recent Streams show up on the home screen? I’ve made a dozen new Steams over the last few days, but they don’t show up under All or Created by me, etc.Why, when I try to add a Stream to my favorites, does it come back with “Something went wrong…”Why is Microsoft spending a zillion dollars on AI to help me plan a dinner party, when I just want to get my work done? Read More
Can you add attachments in bookings?
Hello,
I need to send a few file attachments to the people either before they book the appointment or after. I am currently doing this manually – is there anywhere I can add this in within bookings?
Thank you
Hello, I need to send a few file attachments to the people either before they book the appointment or after. I am currently doing this manually – is there anywhere I can add this in within bookings? Thank you Read More
Easily detect CVE-2024-21427 with Microsoft Defender for Identity
The recently published CVE-2024-21427 Windows Kerberos Security Feature Bypass Vulnerability fixed the potential bypass of authentication policies configured in Active Directory. We strongly recommend that you deploy the latest security updates, including the most recent patch, to your servers and devices to help ensure you have the latest protections available.
As with every vulnerability or attack surface disclosure, our research teams actively investigate possible exploits, working to patch potential issues and provide out-of-the-box detection methods. Before being made generally available, these detections undergo rigorous testing in our lab environments as well as experimental deployments to ensure they meet our performance and accuracy standards. Additionally in this instance, the Microsoft Defender for Identity team has added a new activity to the Advanced Hunting experience in the Defender portal which can help you spot potential attempts to exploit this vulnerability.
Using the advanced hunting activity:
To help you better identify whether this vulnerability has been exploited in your environment and alert you to future attempts we added a new activity within Advanced Hunting that monitors Kerberos AS authentication. With this data customers can now easily create their own custom detection rules within Microsoft Defender XDR and automatically trigger alerts for this type of activity.
We recommend using the query below to monitor Kerberos AS authentication and use the following custom detection rule to trigger an alert:
Access Defender XDR portal -> Advanced Hunting -> Queries -> Community queries -> Kerberos AS authentication
Now, click on “Create detection rule” and fill in the details.
For example:
The advanced hunting query:
IdentityLogonEvents
| where Application == “Active Directory”
| where Protocol == “Kerberos”
| where LogonType in(“Resource access”, “Failed logon”)
| extend Error = AdditionalFields[“Error”]
| extend KerberosType = AdditionalFields[‘KerberosType’]
| where KerberosType == “KerberosAs”
| extend Spns = AdditionalFields[“Spns”]
| extend DestinationDC = AdditionalFields[“TO.DEVICE”]
| where Spns !contains “krbtgt” and Spns !contains “kadmin”
| project Timestamp, ActionType, LogonType, AccountUpn, AccountSid, IPAddress, DeviceName, KerberosType, Spns, Error, DestinationDC, DestinationIPAddress, ReportId
An example of an alert triggered by this custom detection:
For more information on this vulnerability please check back on the MSRC page and to stay on top of the latest Defender for Identity capabilities follow our What’s New documentation page.
Microsoft Tech Community – Latest Blogs –Read More
Slash Your Azure Bill: Top Tips for Startups
Understanding Azure Reservations and Savings Plans
For bootstrapped startups, every dollar counts. Wasting money on cloud resources can stifle your growth. But fear not, cloud ninjas! This post dives into two powerful tools – Azure Reservations and Savings Plans – that can help you slash your Azure bill and optimize your cloud spending.
Imagine getting a discount on your favorite takeout app… but only if you order the same thing every week from the same location. That’s kind of like Azure Reservations. You commit to using a specific amount of Azure resources for a set period (think virtual machines) and get a sweet discount (up to 72% off!).
Azure Savings Plans are more flexible. It’s like a pre-paid gift card for your cloud resources. You commit to spending a certain amount per hour for one or three years, and you get discounts (up to 65% off!) on eligible compute costs across different regions and instance types.
Choosing the Right Option
Here’s a breakdown of the advantages, drawbacks, ideal use cases, and penalties for each option to help you decide which is best for you:
Azure Reservations (Learn more about Azure Reservations)
Advantages:
Cost Savings: Up to 72% off compared to pay-as-you-go pricing.
Predictable Billing: Provides a predictable expenditure model.
Automatic Application: Discounts automatically apply to matching resources.
Drawbacks:
Limited Flexibility: Best for stable, predictable workloads.
Resource Specificity: Tied to specific regions and instance families.
Penalties: “Use-it-or-lose-it” – unused resources are forfeited. Limited cancellation and exchange options (Azure Reservations Exchange Policy).
Ideal Use Cases:
Consistent, uninterrupted workloads with minimal variation (e.g., core web server).
Azure Savings Plans (Learn more about Azure Savings Plans)
Advantages:
Flexible Savings: Applies across a wide range of compute resources.
Global Application: Works across different regions and instance families.
Drawbacks:
Limited Scope: Discounts only apply to compute costs, not storage, network, or licensing.
Non-Cancellable Commitment: Purchases are final, with no cancellation or exchange options (Canceling Azure Savings Plans).
Ideal Use Cases:
Fluctuating workloads, varied instance families, or workloads spanning multiple regions.
Bonus Tip: Don’t forget the Free Tier!
Azure has a generous free tier with a ton of services that are perfect for getting started. Check it out before you dive into Reservations or Savings Plans.
By leveraging these tools and the free tier, you can build a scalable and cost-efficient cloud infrastructure that fuels your startup’s growth. Ready to explore? Check out Microsoft’s cost calculators to see how much you can save!
Here are some additional resources:
Microsoft Azure Reservations: https://azure.microsoft.com/en-us/pricing/reservations
Microsoft Azure Savings Plans: https://learn.microsoft.com/en-us/azure/cost-management-billing/savings-plan/
Microsoft Azure Pricing Calculator: https://learn.microsoft.com/en-us/azure/cost-management-billing/cost
Microsoft Tech Community – Latest Blogs –Read More
Discover Azure Programmable Connectivity: A developer’s gateway to innovative mobile applications
As the digital world continuously evolves, the convergence of networks and applications is creating unprecedented opportunities for mobile application developers. Microsoft’s Azure Programmable Connectivity (APC) stands at the forefront of this revolution, providing a powerful platform that simplifies the integration of network capabilities into mobile apps.
What is Azure Programmable Connectivity?
APC transforms traditional telecom networks into programmable platforms that are directly accessible through APIs. This innovation allows developers to harness the advanced capabilities of telecom networks, like 5G, to enhance application performance, improve security, and unlock new functionalities. With APC, developers can ensure that applications remain robust and adaptable, even as underlying network technologies evolve.
Figure 1: Azure Programmable Connectivity
Key benefits for developers
Unified API interface: APC offers a standard, simplified interface across multiple operator networks globally. This abstraction layer saves you from the complexities of individual network APIs and ensures code consistency and reliability.
Easy access and integration: Accessible directly within the Azure portal, APC’s gateway manages API calls, credential handling, and proper routing to the appropriate mobile operator. This integration reduces overhead, allowing you to focus more on innovation and less on configuration.
Flexible API consumption methods: APC offers SDKs for .NET/C# and Python, with JavaScript SDKs coming soon, allowing for seamless integration into your applications. For broader compatibility, developers can also access APC APIs as HTTP REST APIs, enabling use across any programming language that supports HTTP service calls.
A rich ecosystem of operators: APC proudly collaborates with an expansive array of global telecom operators, constructing a vast ecosystem of network APIs. This rich network provides access to a wide range of advanced network functionalities.
Support for modern connected applications: Whether it’s enhancing real-time interactions with live-streaming capabilities or improving security measures through SIM swap detection, APC will enable you to build the next generation of connected applications.
APIs available with APC
APC, in its initial phase, offers three anti-fraud APIs that enhance security for mobile applications. These include telephone number verification, SIM swap detection, and device location verification. The following code snippet illustrates the straightforward process of using the APC SDK to validate a device’s location coordinates.
string ApcGatewayId = “/subscriptions/your_subscription_id/resourceGroups/dev-testing-eastus/providers/Microsoft.programmableconnectivity/gateways/apcg-eastus”;
Uri endpoint = new Uri(“https://your-endpoint-here.com“);
TokenCredential credential = new DefaultAzureCredential();
ProgrammableConnectivityClient baseClient = new ProgrammableConnectivityClient(endpoint, credential);
var client = baseClient.GetDeviceLocationClient();
var deviceLocationVerificationContent = new DeviceLocationVerificationContent(
new NetworkIdentifier(“NetworkCode”,
“Your_Telco_Operator_ID”),
latitude:80.0, longitude:85.1,
accuracy:10,
new LocationDevice
{
PhoneNumber = “+349876543210”,
});
Response<DeviceLocationVerificationResult> result =
client.Verify(ApcGatewayId,deviceLocationVerificationContent);
var verificationResult = result.Value.VerificationResult;
Figure 2: SDK code validating device location
Developing code with these APIs is straightforward and secure. Verification is handled by the mobile operator, ensuring that the process is tamper-proof.
Join Us at Microsoft Build
We at Microsoft are excited to invite all developers to join us at the upcoming Microsoft Build 2024. Come and explore how APC is redefining connectivity and opening up new possibilities for mobile application development:
Register for Microsoft Build—in-person or digital options are available.
Visit our booth at the Partner Hub area to get a firsthand look at APC in action and discuss how you can take advantage of this platform to elevate your applications.
Watch* our technical “Build network-aware mobile apps“ on demand session to learn more about APC and how to use anti-fraud APIs. You must be registered to view this link.
Watch* the programmable networks discussion with experts from GSMA, Microsoft, Telefónica and Deutsche Telekom.
*Microsoft Build on demand sessions will be available starting on May 21st, 2024 @ 8:30 AM PST
Join the public preview
APC is available in public preview! We encourage you to sign up and explore its capabilities. Get early access to the latest features and contribute to shaping this cutting-edge technology. Apply for public preview here.
Learn more and start building today
APC is not just a tool; it’s a gateway to the future of mobile applications. With its robust features and growing global network ecosystem, APC enables developers to transcend traditional app-development boundaries and venture into new realms of innovation and functionality. Join us in this journey to unleash the potential of modern connected applications and redefine what your apps can do with APC at Microsoft Build!
Dive deeper into the possibilities with APC and discover comprehensive guides and tutorials to help you start integrating network APIs into your applications smoothly and efficiently. Explore Azure Programmable Connectivity, access technical documentation, and if you haven’t already, sign up for public preview.
Get started developing apps with APC with GitHub. Grab the open-source “APC-Demo-App” for an end-to-end comprehensive example of a mobile app with a complementary, hands-on lab.
Microsoft Tech Community – Latest Blogs –Read More
The enter key on word is acting strange
Hello guys,
I’m writing a report and one of my pages is acting strange. Every time I press enter, it puts it in the middle of the page. Anyone an idea why it puts this so far. This only happens on this page, I have tried everything I know but nothing solves this problem.
Hello guys,I’m writing a report and one of my pages is acting strange. Every time I press enter, it puts it in the middle of the page. Anyone an idea why it puts this so far. This only happens on this page, I have tried everything I know but nothing solves this problem. Read More
Copilot cancels discussion to show add.
I am a newer user to Copilot. I like the concept, but the execution is terrible. I do not like that it will not carry over a discussion from one window to the next. Even worse is that I can be in the middle of a discussion and an add will appear…. Which destroys any dialogue collected to this point.
Any thoughts?
I am a newer user to Copilot. I like the concept, but the execution is terrible. I do not like that it will not carry over a discussion from one window to the next. Even worse is that I can be in the middle of a discussion and an add will appear…. Which destroys any dialogue collected to this point.Any thoughts? Read More