Category: Microsoft
Category Archives: Microsoft
Network Protection – block country
how can I use Network Protection to block connections to entire countries?
In Entra ID conditional access, I can block access from countries that might
be hostile to a tenanthave no expected authentications
it makes sense, then, that Network Protection should control connections to entire countries, too; this would be an ‘equivalent’ function to that in Entra ID.
How can I do this?
how can I use Network Protection to block connections to entire countries?In Entra ID conditional access, I can block access from countries that mightbe hostile to a tenanthave no expected authenticationsit makes sense, then, that Network Protection should control connections to entire countries, too; this would be an ‘equivalent’ function to that in Entra ID.How can I do this? Read More
Dates of visits from table based on the crtieria
Hello, I have 100 villages on a table, and there is a target of visiting various villages in a month. I have used COUNTIF formula to put on the number of times a village is visited in one month. How to find out dates of each visit for one village. Like Village A is visited twice in May, 5th and 10th of the month. Countif brings 2 for Village A from May, but what formula to use to pull out dates of 5 and 10 may.
Hello, I have 100 villages on a table, and there is a target of visiting various villages in a month. I have used COUNTIF formula to put on the number of times a village is visited in one month. How to find out dates of each visit for one village. Like Village A is visited twice in May, 5th and 10th of the month. Countif brings 2 for Village A from May, but what formula to use to pull out dates of 5 and 10 may. Read More
Email Protection Basics in Microsoft 365 Part Five: Mastering Overrides
Microsoft Support is excited to continue the blog series that will demystify how Microsoft 365 email protection works. In this fifth and final part of the series, we will cover the different overrides, why you may need them, and why it isn’t a good idea to keep them permanently.
Email security is a critical aspect of modern business operations, and Microsoft 365 provides a robust set of tools to keep your communications safe. But what should you do when legitimate emails are blocked? This is where submissions and overrides come into play. As we have covered in part 2 of this series, Submissions help you learn more about why email was junked or quarantined and allow you to notify Microsoft if the filters got it wrong. (It happens.) Overrides are special settings that allow certain emails to bypass the usual security filters, ensuring important communications reach their destination.
A closer look at email overrides
Overrides are not one-size-fits-all; they come in different forms to suit various needs. Use Explorer email summary flyout and email entity pages to learn more about why a message was delivered to a certain location, and if overrides played a role in delivery. Note, since messages can have multiple allow or block overrides as identified in the column Override source, the override that ultimately allowed or blocked the message is identified in Primary override source in Explorer.
Learn more: Understanding overrides within the email entity page in Microsoft Defender for Office 365, Understanding detection technology within the email entity page in Microsoft Defender for Office 365
Tenant Allow Block List (TABL): Ideal for creating temporary and safe exceptions. Based on your submission, Microsoft will analyze the exact part of the email deemed malicious (sender, domain, URL, file hash, spoof, or impersonation). TABL is the preferred choice for maintaining security: “Allows” eventually expire, and until they do, the system learns from your submissions to allow emails with similar elements. Both easy for you to manage, and useful for service filter adjustments. A win-win!
Note: spoof overrides do not expire. Learn more here: Allow or block email using the Tenant Allow/Block List
Exchange Mail Flow Rules (Exchange Transport Rules or ETRs): ETRs provide the most flexibility but come with increased risk. They should be used sparingly and thoughtfully. Safer ETR overrides use conditions for email authentication checks passing before allowing anything (see an example). The Analysis tab of the email entity page in Explorer will help you verify which ETR acted on a message, and the anti-spam message headers will include SFV:SKN if an ETR override is detected.
Figure 1: “Allowed by organization policy: Exchange transport rule” override source on the Email Entity page in Microsoft Defender XDR
Outlook Safe Senders (User Overrides): Users can mark their own trusted senders in Outlook, affecting only their individual mailbox. The screenshot below demonstrates the detailed information from the email entity page in Microsoft Defender XDR, and the anti-spam message headers will include SFV:SFE if a user override is detected.
Figure 2: “Allowed by user policy: Sender address list” override source on the Email Entity page in Microsoft Defender XDR
Certain user allows “win” over tenant configurations and provide the end-users the ability to manage their own exceptions, so make sure to review the “User and tenant settings conflict” section to learn what to expect at Order and precedence of email protection.
Tip: List all overrides for a user or all users in your organization using the PowerShell cmdlet. For full syntax and examples, see Get-MailboxJunkEmailConfiguration.
IP Allow List (Connection Filtering): This allows emails from specified IP addresses to bypass filters as part of connection filtering. One risk here is if an IP you believe is trusted becomes compromised, the entire email filtering stack except Secure by default is bypassed. Another risk is adding IP overrides for shared IP addresses or ranges. If bad actors use the same sender infrastructure for malicious purposes, you will allow bad messages along with good ones. In short: exercise caution, review regularly, keep IP allows to a minimum. The anti-spam message headers will include IPV:CAL if an IP override is detected, and the Explorer email entity page will look like this:
Figure 3: “Allowed by organization policy: Connection policy” override source on the Email Entity page in Microsoft Defender XDR
Anti-Phishing Policy Overrides: Aimed at combating domain, user and mailbox impersonation phishing threats, these overrides will target false positives with UIMP, DIMP, GIMP verdicts only. They are relatively safer as the rest of the protection scans take place, but it’s still a good idea to make sure from time to time any trusted senders and domains are still necessary, as they never expire.
Tip: You can also use Tenant Allow/Block List for impersonation overrides, just note that the allow entry isn’t created in the Tenant Allow/Block List. Instead, the domain or sender is added to the Trusted senders and domains section in the anti-phishing policy that detected the message and it does not expire.
Example
The company CEO, John Smith (johnsmith@contoso.com) is a prime target for impersonation attacks, so your SecOps team adds his address to trusted users to protect in the anti-phishing policy. However, the CEO sometimes sends email to his team from his personal account (johnsmith@outlook.com). After the service flags this correctly as user impersonation, you add the CEO’s personal address to trusted senders, for his emails to get through to recipient inboxes. (Of course, after you educate the CEO about the risks tied to this practice, you remove this entry.)
Figure 4: Add trusted senders part of the anti-phishing policy in Microsoft Defender XDR
Anti-Spam Policy Overrides: used to override spam, bulk, spoofing and low-confidence phishing verdicts (SPM, HSPM, PHISH, SPOOF and BULK), anti-spam policy senders and/or domains allows also override the anti-phishing stack, and they do not expire. Overly broad (domain) allows are particularly risky and known to be a leading cause for letting bad email into your inboxes. Best practice, review your policies periodically and trim/clear these lists. The Analysis tab of the email entity page in Explorer will help you verify if a policy that acted on a message, and the anti-spam message headers will include SFV:SKA if a policy override is detected.
Tip: You can also export an extended report (message trace) for the email in question. The AGENTINFO event in the resulting csv file contains the CustomData field with additional details, such as the GUID of the policy that acted on the message. For example:
S:PCFA=SUM|tact=5|di=SQ|tactcat=SPM|hctfp=191b78dc-9221-4a2c-b51c-208a186e931a;
SQ means the message was routed to Spam Quarantine, and hctfp stands for Hosted Content Filter Policy. Find the policy name by running the cmdlet Get-HostedContentFilteringPolicy in Exchange Online PowerShell.
While most of this article is about allow overrides, you can use Anti-Spam policies to block email, as well. For example, filter messages containing geographies and languages you would not expect to be working with. Learn how to configure spam filter policies.
Secure by Default
Microsoft 365 Secure by Default stance ensures that the system starts with the highest security settings. Notably, verdicts for malware (MALW) and high-confidence phishing (HPHISH) cannot be overridden by ETRs if the MX record points to Office 365. This policy is in place to protect users from the most severe threats automatically.
Why would I ever override Secure by Default?
There are specific instances where an override may be necessary. It is highly recommended to configure the Advanced delivery policy to handle these uses cases securely.
Phishing Simulations: To test their defenses, organizations might run controlled phishing simulations. To ensure these tests reach inboxes when they’re sent over email, overrides are essential.
SecOps Mailboxes: Security teams sometimes need to examine malicious emails for analysis and learning. Access to such emails requires an override to allow them through.
What if the MX record for my domain does not point to Exchange Online Protection?
Secure by default applies only when the MX record for your domain points to Microsoft 365 (contoso-com.mail.protection.outlook.com). If the MX record points to another service or device, it’s possible to override high-confidence phishing verdicts using an Exchange mail flow rule to bypass spam filtering (malware verdicts cannot be overridden). But although it’s technically possible, consider the benefits of defense-in-depth of your filtering solution paired with Microsoft Defender for Office 365. Use Enhanced Filtering for Connectors to skip the last known IP address(es) of your service, and to infer the email authentication information from the original sender IP. In addition, if your filtering solution supports ARC, configure to trust the ARC sealer in Microsoft Defender XDR settings. These configurations will allow you to keep the extra layer of Microsoft protection even when using third party protections.
Learn more about Getting started with defense in-depth configuration for email security, Secure by default in Office 365, Manage mail flow using a third-party cloud service with Exchange Online and Configure trusted ARC sealers.
Messages I send land in spam folders for external recipients. Can I override outbound spam filtering?
No. However, you can take steps to authenticate outbound email to improve deliverability.
Use overrides wisely
While overrides are useful tools, they must be implemented wisely. Incorrect usage can inadvertently open your company to threats. It’s essential to take the following precautions:
Only allow emails from verified and trustworthy sources. And even when you trust the source, consider that it may become compromised, and you would inadvertently allow unwanted phishing or spam.
Use Advanced Hunting in Microsoft Defender XDR to help you discover top overrides sources and remove the unnecessary ones.
Regularly review your overrides to ensure they remain relevant and secure.
Never put domains that you own onto the Allow and blocklists. If you own Contoso, do not add contoso.com to your allow lists.
Never put common domains, such as microsoft.com and office.com, onto the Allow and blocklists.
We hope that by understanding and applying email overrides correctly, you can ensure your organization’s email is both secure and functional, allowing the right messages to get through while keeping the bad ones out.
Do you have questions or feedback about Microsoft Defender for Office 365? Engage with the community and Microsoft experts in the Defender for Office 365 forum.
Click here to view additional posts in this series.
Important resources:
Allow or block email using the Tenant Allow/Block List
Order and precedence of email protection
Understanding overrides within the email entity page in Microsoft Defender for Office 365
Understanding detection technology within the email entity page in Microsoft Defender for Office 365
About Threat Explorer and Real-time detections in Microsoft Defender for Office 365
Getting started with defense in-depth configuration for email security
Review and remove unnecessary allow list entries with Advanced Hunting in Microsoft Defender for Office 365
Create safe sender lists
Create blocked sender lists
Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes
Secure by default in Office 365
Manage mail flow using a third-party cloud service with Exchange Online
Configure trusted ARC sealers
Configure spam filter policies
Configure anti-phishing policies in Microsoft Defender for Office 365
Get-MailboxJunkEmailConfiguration
Authenticate Outbound Email to Improve Deliverability
Microsoft Tech Community – Latest Blogs –Read More
Partner Case Study Series | Azure Rights Management enhances document control at the Navnit Group
Cloud 9 Infosystems digitally transforms businesses to reduce costs by leveraging the extensibility of the cloud
Cloud 9 Infosystems is a Microsoft gold partner and Tier 1 cloud solution provider for data analytics, cloud platform, application development, and application integration. The full-service firm headquartered in Downers Grove, Illinois, helps businesses harness the power of cloud computing to reduce their operational costs. In 2017, Microsoft named Cloud 9 Infosystems the US SMB Rising Star Mid West Partner of the Year.
The Navnit Group is a Mumbai, India-based network of businesses spanning the automotive, infrastructure, marine, adventure sports, aviation, and financial services sectors.
As part of its consulting services, Cloud 9 Infosystems offers a two-week engagement to integrate Office 365, Microsoft Entra ID, Azure Rights Management, and Azure Monitor Log Analytics in clients’ environments.
Continue reading here
**Explore all case studies or submit your own**
Microsoft Tech Community – Latest Blogs –Read More
How to define the Bold style font weight in PowerPoint?
Hey, I have a rather simple but complex issue related with PowerPoint.
In the branding I’ve been handed, I need to use the Medium font weight for headings and strong characters, along with the Regular font weight for the body text. However, as it *should be* in PowerPoint, it chooses the Bold font weight that I have installed for any text selected with the Bold button/shortcut.
I wish to be able to define my Medium font as the preferred Bold shortcut. Not only it helps me be faster by pressing a single button, but because I have all these presentations and they are all desgigned with Regular and Medium font weights in Pitch.com. When I export them, they turn all my Medium weights to Bold.
I have tried uninstalling the Bold font (that from time to time I need to use indeed) and all weights that are not the Regular and Medium fonts, but PowerPoint still doesn’t read the Medium as the ‘bold’ to select. It turns all my ‘bold’ characters to a faux bold.
I have also tried to build a presentation from scratch in PowerPoint but the need to manually select the font-weight for multiple texts in multiple slides is exhausting.
Hey, I have a rather simple but complex issue related with PowerPoint.In the branding I’ve been handed, I need to use the Medium font weight for headings and strong characters, along with the Regular font weight for the body text. However, as it *should be* in PowerPoint, it chooses the Bold font weight that I have installed for any text selected with the Bold button/shortcut. I wish to be able to define my Medium font as the preferred Bold shortcut. Not only it helps me be faster by pressing a single button, but because I have all these presentations and they are all desgigned with Regular and Medium font weights in Pitch.com. When I export them, they turn all my Medium weights to Bold. I have tried uninstalling the Bold font (that from time to time I need to use indeed) and all weights that are not the Regular and Medium fonts, but PowerPoint still doesn’t read the Medium as the ‘bold’ to select. It turns all my ‘bold’ characters to a faux bold. I have also tried to build a presentation from scratch in PowerPoint but the need to manually select the font-weight for multiple texts in multiple slides is exhausting. Read More
Tech Talks Presents: AI Library Creator Kit Module & CoE Starter Kit | May 16th
Join us on Thursday, May 16th at 8am PT as Mehdi Slaoui Andaloussi, Principal Software Engineer Manager and Grant Archibald, Sr Program Manager present a two-part call: AI Library Creator Kit Module & CoE Starter Kit
AI Library Creator Ki Module:
The AI Library Creator Kit Module is an amazing collection of AI builder prompts and low-code plugins for Copilot Studio, Power Automate and Power Apps makers. The library serves as a resource for Power Platform developers looking to familiarize themselves with prompt engineering, featuring a variety of techniques such as zero shot, few-shot, and more.
CoE Starter Kit: From Reactive Data Collection to Proactive Agent and App Experiences
Discover how the impact of improving Power Platform reporting and inventory and usage collection is changing the direction of the CoE Kit. We’ll shift the conversation from collecting data to what the data means to the organization. Learn how to use the data to help move from default/shared environments. We’ll also explore how to make use of generative AI to build a business case for ideas and measure the impact with expected and actual ROI. Additionally, we’ll discuss personalized learning based on user skills and provide gamification while spotlighting people and solutions making an impact.Don’t miss this opportunity to learn about the roadmap and the next set of features for the CoE Starter Kit. Let’s pivot the discussion from reactive data collection to proactive agent and app experiences. See you there!
We hope you’ll join us!
Call to Action:
Click on the link to save the calendar invite: https://aka.ms/TechTalksInvite
View past recordings (sign in required): https://aka.ms/TechTalksRecording
Get started with the adoption tools here
What should I do if QuickBooks Web Connector fails to connect to my web service?
If QuickBooks Web Connector fails to connect to your web service, follow these steps to troubleshoot and resolve the issue:
Verify Web Service URL: Ensure that the URL specified in the Web Connector configuration is correct and accessible. The URL must be reachable from the machine running QuickBooks Web Connector.
Check Network Connectivity: Confirm that there are no network issues blocking the connection between QuickBooks Web Connector and your web service. Ensure that firewalls, proxies, or other network security settings are not impeding the connection.
Validate Web Service Availability: Ensure your web service is up and running. You can test the web service URL in a browser to check if it responds correctly.
Review QBWC Log Files: Check the QuickBooks Web Connector log files for any error messages that could provide insight into why the connection is failing. These logs can be found in the Web Connector application under “View Log.”
Check Certificate Validity: If your web service uses SSL, ensure that the SSL certificate is valid and correctly installed. Expired or improperly configured certificates can prevent the Web Connector from establishing a secure connection.
Confirm Correct Credentials: Ensure that the credentials (username and password) entered in the Web Connector are correct and match those required by your web service.
Update Web Connector: Make sure that you are using the latest version of QuickBooks Web Connector. Sometimes, simply updating to the newest version can resolve connectivity issues.
Configure Firewall and Security Software: Adjust your firewall and security software settings to allow QuickBooks Web Connector to communicate with the web service. You may need to create specific rules to permit this traffic.
Reinstall Web Connector: As a last resort, consider uninstalling and then reinstalling QuickBooks Web Connector. This can help resolve any underlying software corruption issues.
If these steps do not resolve the problem, contacting QuickBooks Support for further assistance is advisable. You can reach QuickBooks Support at +1-800-845-9666. Their support team can provide more detailed troubleshooting and, if necessary, remote assistance to help resolve the connection issues.
If QuickBooks Web Connector fails to connect to your web service, follow these steps to troubleshoot and resolve the issue:Verify Web Service URL: Ensure that the URL specified in the Web Connector configuration is correct and accessible. The URL must be reachable from the machine running QuickBooks Web Connector.Check Network Connectivity: Confirm that there are no network issues blocking the connection between QuickBooks Web Connector and your web service. Ensure that firewalls, proxies, or other network security settings are not impeding the connection.Validate Web Service Availability: Ensure your web service is up and running. You can test the web service URL in a browser to check if it responds correctly.Review QBWC Log Files: Check the QuickBooks Web Connector log files for any error messages that could provide insight into why the connection is failing. These logs can be found in the Web Connector application under “View Log.”Check Certificate Validity: If your web service uses SSL, ensure that the SSL certificate is valid and correctly installed. Expired or improperly configured certificates can prevent the Web Connector from establishing a secure connection.Confirm Correct Credentials: Ensure that the credentials (username and password) entered in the Web Connector are correct and match those required by your web service.Update Web Connector: Make sure that you are using the latest version of QuickBooks Web Connector. Sometimes, simply updating to the newest version can resolve connectivity issues.Configure Firewall and Security Software: Adjust your firewall and security software settings to allow QuickBooks Web Connector to communicate with the web service. You may need to create specific rules to permit this traffic.Reinstall Web Connector: As a last resort, consider uninstalling and then reinstalling QuickBooks Web Connector. This can help resolve any underlying software corruption issues.If these steps do not resolve the problem, contacting QuickBooks Support for further assistance is advisable. You can reach QuickBooks Support at +1-800-845-9666. Their support team can provide more detailed troubleshooting and, if necessary, remote assistance to help resolve the connection issues. Read More
French language collation not working on Synapse Serverless SQL
I’m struggling to get french characters(é, ç, à, ô, etc…) to show up properly in Synapse Serverless SQL. When I created my database, I used the “French_CI_AS” collation. Below is a screenshot of what it looks like on my end.
What can I do to fix this?
I’m struggling to get french characters(é, ç, à, ô, etc…) to show up properly in Synapse Serverless SQL. When I created my database, I used the “French_CI_AS” collation. Below is a screenshot of what it looks like on my end. What can I do to fix this? Read More
Text will not copy from other programs to word
I have recently encountered a problem with copying and pasting to and from Word. Copying text into Word:Text from other programs (including Firefox, Chrome, TextEdit, Notes, and Excel) will not paste into Microsoft Word. Instead, what pastes when I hit Command+v (or right click and select “Paste”) is the last text that I copied from a Microsoft Word document. Interestingly, pasting without formatting works as expected. Copying from Word into other programs:At some point, I copied the following text in a Microsoft Word document: The recent review of Edwards et al., (DOI: …) Now, whenever I try to copy (some other) text from Microsoft Word and paste it into Google Docs or Google Sheets, what pastes is the above text. If I attempt to paste the text into the body of an email in Gmail, the above text (“The recent review…”) is what appears. Interestingly, if I paste the text into the To: or Subject: lines of the email, pasting works as expected. I can also paste into the url bar in browsers without issue. Again, pasting without formatting is working as expected. Text from other programs (TextEdit, Notes) copies and pastes into Google products as expected. This issue began for me about a week ago. Any advice would be helpful. Edit: I am running Mac OS 13.6.6. My computer has an Intel chip. This issue is present in Google Products on both Firefox 125.0.3 and Chrome 124.0.6367.119. My current Microsoft Word is 16.78.3. Read More
How to modify script to export results to CSV:
How to modify script to export results to CSV:
Get-Mailbox | Where {$null -ne $_.ForwardingSmtpAddress} | FT UserPrincipalName,ForwardingSmtpAddress,DeliverToMailboxAndForward
How to modify script to export results to CSV: Get-Mailbox | Where {$null -ne $_.ForwardingSmtpAddress} | FT UserPrincipalName,ForwardingSmtpAddress,DeliverToMailboxAndForward Read More
Private Channels populated by a security group in Teams
Hey all,
I am working on a project that involves moving out a large amount of semi-official collaboration spaces to a centralized official area.
I have about 30 groups that need a centralized place to collaborate but also have their own private spaces not accessible to other groups. Additionally, the group makeup changes often throughout the year.
I built a sharepoint site that has a Microsoft Team. The Microsoft Team has a public general channel accessible to anyone in my org, while there are several private channels, the idea is that each group has their own private channel but can collaborate in the general channel, add their events to the calendar in the general channel, etc.
I created security groups for every single group and I have segmented out the sharepoint site according to the security groups. However, I have hit a roadblock with the private channel permissions.
I seem unable to add a security group to allow access to a private channel in teams and this is a huge deal breaker.
I need some way to dynamically populate a private channel, it is borderline unfeasible for someone to manage the 30 groups manually in teams throughout the year as each group changes nearly constantly.
Is there anyway that I can make this work? I can add security groups for the team itself, but not private channels.
Hey all,I am working on a project that involves moving out a large amount of semi-official collaboration spaces to a centralized official area. I have about 30 groups that need a centralized place to collaborate but also have their own private spaces not accessible to other groups. Additionally, the group makeup changes often throughout the year.I built a sharepoint site that has a Microsoft Team. The Microsoft Team has a public general channel accessible to anyone in my org, while there are several private channels, the idea is that each group has their own private channel but can collaborate in the general channel, add their events to the calendar in the general channel, etc.I created security groups for every single group and I have segmented out the sharepoint site according to the security groups. However, I have hit a roadblock with the private channel permissions.I seem unable to add a security group to allow access to a private channel in teams and this is a huge deal breaker. I need some way to dynamically populate a private channel, it is borderline unfeasible for someone to manage the 30 groups manually in teams throughout the year as each group changes nearly constantly.Is there anyway that I can make this work? I can add security groups for the team itself, but not private channels. Read More
Pasting text into Word from other programs does not work (Mac)
I have recently run into a problem with pasting text from other programs into Word.
Essentially, when I attempt to paste text from other programs (I have tried Excel, Firefox, Chrome, TextEdit, Notes, and Terminal), what pastes into Word is not the desired (copied) text. Instead, the last text that I copied from Microsoft Word is what pastes.
I am able to copy and paste text between other programs without issue. If I copy the text “banana” in any other software, I can paste it into any non-Word software without issues.
This issue persists if I right-click and select “Paste” manually instead of using Command+V
Interestingly, “Paste without formatting” works as expected.
These issues began a few days ago for me. I had previously no problems copying or pasting with Word.
I am running Mac OS 13.6.6. My computer has an Intel chip. My current Microsoft Word is 16.78.3.
I have recently run into a problem with pasting text from other programs into Word. Essentially, when I attempt to paste text from other programs (I have tried Excel, Firefox, Chrome, TextEdit, Notes, and Terminal), what pastes into Word is not the desired (copied) text. Instead, the last text that I copied from Microsoft Word is what pastes. I am able to copy and paste text between other programs without issue. If I copy the text “banana” in any other software, I can paste it into any non-Word software without issues. This issue persists if I right-click and select “Paste” manually instead of using Command+V Interestingly, “Paste without formatting” works as expected. These issues began a few days ago for me. I had previously no problems copying or pasting with Word. I am running Mac OS 13.6.6. My computer has an Intel chip. My current Microsoft Word is 16.78.3. Read More
Viva Amplify
Hello!
We are exploring the option of adding Viva Amplify and using it in our internal/corporate communications strategy. Does anyone know if you have a campaign with several links, can you see what links users are engaging with?
Thank you!
Hello! We are exploring the option of adding Viva Amplify and using it in our internal/corporate communications strategy. Does anyone know if you have a campaign with several links, can you see what links users are engaging with? Thank you! Read More
2 columns of dates. Pivot occassions per month
I have 2 columns of dates of tasks performed.
I need to create a chart preferably pivot to show occurances per month of each. Would I need a 3rd column as it currently just used the first for the X-Axis. Or should I use a countif to create a new table counting how many times the month/year appears in each column? Can I use countif for month/year?
Thanks
I have 2 columns of dates of tasks performed.I need to create a chart preferably pivot to show occurances per month of each. Would I need a 3rd column as it currently just used the first for the X-Axis. Or should I use a countif to create a new table counting how many times the month/year appears in each column? Can I use countif for month/year? Thanks Read More
Microsoft wins Cloud Marketplace Partner of the Year Award from MongoDB
We are thrilled to announce that Microsoft has been recognized as the Cloud Marketplace Partner of the Year by MongoDB Inc., a popular document database and a developer data platform. This award, presented at MongoDB .local NYC on May 2nd, 2024, showcases the strong collaboration and mutual success that we have achieved with MongoDB through the Microsoft commercial marketplace.
The Microsoft commercial marketplace, as an extension of the Microsoft Cloud, makes it easy for customers to discover, try, buy, and deploy certified solutions that work with their existing technology, while benefiting from flexible pricing and deployment models, unified billing, and streamlined procurement.
MongoDB has seen strong success through the marketplace with their MongoDB Atlas on Azure service, which offers customers a fully managed, global, and scalable database service that runs on Azure and is integrated with Azure services. Customers can use MongoDB Atlas to build and run applications that leverage the power of Azure’s intelligent cloud, such as AI, analytics, IoT, and more, Learn how the marketplace helped MongoDB and visual work platform company, Mural, scale and innovate in this video.
We are honored to receive this award from MongoDB, and we look forward to continuing our partnership and delivering more value to our customers and partners through the marketplace.
Microsoft Tech Community – Latest Blogs –Read More
Unlock Your Python Potential with Azure
At Microsoft, we know Python is a developer’s best friend, so in this blog we’re going to not only review what makes it such a versatile tool for coders, but also explore the treasure trove of learning paths and other resources we’ve created to help you conquer it.
Sink your teeth into a Python skilling journey
Snakes may not be welcome guests at a picnic, but they are indispensable to a well-rounded ecosystem. Known for its readability and clear syntax, Python is similarly crucial to the coding world, and it remains as popular as ever with developers and data scientists alike. Python’s importance for development on Azure stems from its unique combination of features that enhance developer productivity and lead to successful outcomes across various scenarios. Here’s a breakdown:
Developer Productivity
Readability and conciseness: Snakes are deceptively powerful creatures, utilizing their sleek, flexible bodies for efficient movement and constriction. Similarly, Python’s clean syntax and readability allow programmers to achieve complex tasks with fewer lines of code.
Efficiency: Snakes strike with lightning speed and precision, coiling for an efficient attack. Python’s efficiency is exemplified in its seamless integration with Azure and Visual Studio Code, enabling a comprehensive DevOps lifecycle for Python applications, including hosting on GitHub, utilizing GitHub Actions for CI/CD, and effortless deployment to Azure services like App Service, Functions, and Kubernetes.
Extensive libraries and frameworks: Did you know there are over 4,000 snake species? Python boasts similar variety, with libraries like NumPy for data analysis, TensorFlow for machine learning, and Django for web development. These pre-built solutions for common tasks help accelerate development and minimize custom code creation.
Cross-platform compatibility: Snakes are remarkably versatile creatures, able to adapt to diverse environments. The same is true of Python code, which runs seamlessly on Windows, Linux, and macOS, allowing developers to choose their preferred environment and deploy applications consistently across different platforms.
Scenario-based Outcomes
Web development: Leverage Python’s prowess for web development by utilizing Azure’s managed application platform, designed to accelerate the creation of superior web applications and seamlessly connect them to data through Azure services supporting both relational and non-relational databases.
Data science and machine learning: Unleash the full potential of Python in AI and machine learning through Azure’s comprehensive platform, allowing swift model development, training, hosting, and deployment directly from any Python environment. Using Python with Azure Cognitive Services opens doors to adding AI capabilities like speech recognition or image analysis to applications, expanding functionality and user experience.
API development: Azure Functions paired with Python allows developers to quickly build and deploy serverless APIs, integrating seamlessly with other Azure services.
Explore self-learning resources and videos
Whether you’re new to the language or an experienced coder looking to learn some new tricks, Azure’s got your back with self-guided learning modules, videos, and challenges to boost your skills. And the best part? Most of these resources are free! So, there’s no excuse not to start upskilling your Python game today.
Training & Learning Modules
Python for beginners: Get started with Python and learn how to create programs and projects in Python, work with strings, lists, loops, dictionaries, and functions in this 4-hour, 39-minute learning path.
Build real world applications with Python: Discover how to build apps in Python by learning language syntax and patterns for how to structure your app in this 2-hour, 38-minute learning path.
Create computer vision solutions with Azure AI Vision: Learn how to leverage Azure AI Vision to produce common computer vision scenarios in this 4-hour learning path.
Introduction to Python: Learn how to write a few lines of Python code, declare variables, and work with console input and output in this 8-part, 16-minute module.
Using GitHub Copilot with Python: Learn how to use Python along with GitHub Copilot, an AI pair programmer that offers autocomplete-style suggestions as you code in this 7-part, 22-minute module.
Count the number of moon rocks by type using Python: Use Python to make a simple program to count the number of space rocks in each category by viewing this 8-part, 32-minute module.
Featured Video Series
Azure Enablement Show: Get technical advice, tips, and best practices to accelerate your cloud journey, build well-architected cloud apps, and optimize your solutions in Azure in this on-going series of videos.
Python for Beginners: This 44-part series provides a foundation on programming in Python, starting with common everyday code and scenarios and progressing to more advanced topics like calling an API, JavaScript Object Notation (JSON), and managing keys.
Azure Developer Python Day 2023: Discover the latest services and features in Azure designed specifically for Python developers. Watch this 12-part series to learn cutting-edge cloud development techniques that can save you time and money, while providing your customers with the best possible experiences.
Start Unlocking your Python potential today with Azure
Python’s simplicity, versatility, and extensive community support make it a valuable asset for developers worldwide. As the programming landscape continues to evolve, Python remains a constant, adapting to new challenges and emerging as a language of choice for innovative projects. Whether you’re a novice or an experienced coder, join us at PyCon (May 15 – May 23) to celebrate Python and explore the vast potential of the language in a journey that promises to enhance your development skills and open doors to a world of possibilities.
Microsoft Tech Community – Latest Blogs –Read More
Meet us at Identiverse: May 28-31 in Las Vegas
The annual Identiverse conference is a great opportunity to meet with our community, immerse in the latest challenges and innovations, and hear from leaders in the identity industry. And it’s happening soon! Identiverse 2024 is taking place from May 28 to 31 in Las Vegas, Nevada at ARIA Resort & Casino.
By attending, you’ll be among the first to hear about what’s new with Microsoft Entra, our work in identity standards, and how it will help you navigate the constantly evolving identity and network access threat landscape.
Plus, you can request a 1:1 meeting with a Microsoft identity expert and drop by Booth #2423 in the expo hall to ask questions and see the latest demos of identity solutions and Microsoft Copilot for Security.
Featured Microsoft sessions at Identiverse
We’ve got a powerhouse lineup of topics showcasing our latest innovations to help you get the most from Microsoft Entra.
During our session, Secure access for any trustworthy identity, anywhere, to anything, on Wednesday, May 29 at 2:00 PM, we’ll update you on Microsoft’s progress to enabling the trust fabric, our vision for how organizations can secure every digital interaction from today into the future. Understanding that a Zero Trust approach to identity security is an ongoing journey, we’ll talk about four focus areas to consider and prioritize, including strengthening your identity foundation, securing access for your workforce and external identities, and securing access in multicloud.
It’s worthwhile to get up early the next morning for the Microsoft Power Breakfast session, Unify your organization’s access controls across identity, endpoint, and network, on Thursday, May 30 from 7:15 AM to 8:15 AM. Nitika Gupta, Principal Manager of Product Management for identity security will discuss how to simplify your Zero Trust architecture with universal policies for any access point, from legacy on-premises resources to cloud apps and web. She’ll demonstrate how unified controls in Microsoft Entra Conditional Access can better protect your organization’s applications, data, and infrastructure from threats inside and outside your organization with fine-tuned policies that examine user, device, and network context.
Also on Thursday, our team of experts Sarah Scott, Principal Manager of Product Management, and Melanie Maynes, Director of Product Marketing, are presenting Secure access with AI: Deep-dive into IAM powered by Microsoft Copilot for Security from 2:35 PM to 3:00 PM. This session delves into the intricate realm of identity protection and AI. We explore the synergies between industry recommended Identity and Access Management (IAM) practices and the advanced security features offered by generative AI tools. Plus, you’ll get to see a demo of Microsoft Copilot for Security as it assists identity admins with existing workflows in Microsoft Entra and provides rapid intelligent recommendations.
Join us at the Microsoft booth for Identiverse Beer Crawl
On Wednesday, May 29th, from 5:00 PM to 6:30 PM, we’ll have craft brews and beverages at our booth on the show floor. It’s a great time to check out our latest demos, chat with our speakers and identity specialists, or just say hello!
Hear from Microsoft experts throughout the conference
Many of our experts have deep expertise in identity security and have earned the opportunity to speak at Identiverse. We hope you’ll attend all the sessions that are relevant to you.
Streamline Collaboration and Govern Guest Users and Partners with Microsoft Entra
Tuesday, May 28 from 7:00 PM to 7:15 PM
Speaker: Laura Viarengo, Product Marketing Manager, External Identities, Microsoft
Learn how Microsoft Entra can help you create smooth sign-in experiences for external users, digitally verify their identities, grant them access to resources they need, and ensure least privilege access to reduce risk of lateral movement.
ACR: The Missing Security Control:
Wednesday, May 29 from 10:30 AM to10:55 AM
Speaker: Pamela Dingle, Director of Identity Standards, Microsoft
Learn about the critical work the industry is doing to get Authentication Context aligned and on track across the federation landscape.
General Motors Road to Modern Consumer Identity:
Wednesday, May 29 from 10:30 AM to10:55 AM
Speakers: Razi Rais, Senior Product Manager, Microsoft and Andrew Cameron, IT Fellow, Identity and Access Management, GM
Learn about the architectural decisions General Motors made to establish its global customer identity platform.
Untangling FIDO and Passkey Concepts:
Thursday, May 30 from 4:00 PM to 4:25 PM | Joshua 10
Speaker: Danny Zollner, Senior Product Manager, Microsoft
Learn how to empower people to make educated policy or product decisions with clear understanding of password-less authentication.
Externalizing Authorization is More than a Technology Problem…
Thursday, May 30 from 5:10 PM to 5:35 PM
Speakers: Pieter Kasselman, Identity Standards Architect, Microsoft and Sarah Cecchetti, Head of Product, Amazon Web Services
With the rise of advanced threat actors, regulation, compliance and pressures for greater business agility, authorization is more relevant than ever. Hear about the learnings and solutions from the experts.
Modern Apple Identity Management Best Practices:
Friday, May 31 from 8:30 AM-8:55 AM
Speakers: Michael Epping, Senior Product Manager, Microsoft and Brian Melton-Grace, Senior Product Manager, Microsoft
Hear about how Microsoft helps organizations to improve their macOS end user experience and security posture by modernizing their Apple device identity strategy. Learn how to modernize Apple identity management at your organization.
Friday, May 31 from 9:40 AM to10:05 AM
Speaker: Tia Louden, Senior Technical Program Manager, Microsoft
Get a peek under the curtain on how Microsoft Identity handles our Security post incident reviews (PIR) process! Tia will share how a high-quality PIR process drives incident response teams to improve, learn from events, and use data-driven analysis to bake the learning into all areas of the organization’s culture and security posture.
From Keynote to Action: Building Workload Identity Foundations with Standards
Friday, May 31 from 9:40 AM to10:05 AM
Speakers: Pieter Kasselman, Identity Standards Architect, Microsoft, Evan Gilman, Co-founder, SPIRL, and George Fletcher, Identity Standards Architect, Capital One
The new IETF working group, Workload Identity for Multi-Service Environments (WIMSE), will discuss the progress and gaps in new draft standards to enable and deploy Zero Trust workload identity architectures.
Lastly, be sure to check out the Closing Keynote, The Future of Authorization, featuring Pieter Kasselman, Identity Standards Architect at Microsoft on Friday, May 31 from 11:00 AM to11:30 AM.
We hope you’ll make it a point to attend these sessions. If you see us, be sure to say hello and let us know that you’re a follower of the Microsoft Entra blog on Tech Community. And when you talk to our Microsoft Entra experts at our booth, be sure to ask for an invitation to our Wednesday evening VIP Mixer. (That’s your reward for reading to the end of this post.)
See you in Las Vegas!
Nichole Peterson
Senior Product Marketing Manager, Microsoft Entra
Recent articles from Microsoft speakers at Identiverse 2024:
Microsoft Entra adds identity skills to Copilot for Security by Sarah Scott
Act now: Turn on or customize Microsoft-managed Conditional Access policies by Nitika Gupta
Auto rollout of Conditional Access policies in Microsoft Entra ID by Nitika Gupta
Microsoft Entra: Top content creators to follow by Nichole Peterson
Learn more about Microsoft Entra
Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.
Microsoft Entra News and Insights | Microsoft Security Blog
Microsoft Entra blog | Tech Community
Microsoft Entra documentation | Microsoft Learn
Microsoft Entra discussions | Microsoft Community
Microsoft Tech Community – Latest Blogs –Read More
AI and .NET: Exploring the AI samples repo and the model evaluation sample
How to work with local models
How to use semantic kernel
How to evaluate different models.
Microsoft Tech Community – Latest Blogs –Read More
What to expect from Microsoft Learn at Microsoft Build
Join us for Microsoft Build May 21-23, 2024, which brings together developers, industry disrupters, and cutting-edge technologists to hear about new technologies, share ideas, and learn new skills to build the future. This year you can expand your knowledge with live keynotes, dive deeper in breakout sessions, work with experts to find solutions, and create lasting connections.
Microsoft Learn will be at Microsoft Build to share news about our expanded AI skill building resources and the latest in Microsoft Credentials. And don’t miss your chance to earn a free Microsoft Certification onsite!
Stay tuned for more updates coming from Microsoft Build, but for now, here are a few things you can do to ensure you don’t miss a thing. We have a few new experiences up our sleeve this year, so be sure to come see us!
Check out our in-person experiences:
Register to take your free onsite Microsoft Certification exam!
Don’t miss your opportunity to advance and validate your skills with an industry-recognized Microsoft Certification by taking a free certification exam onsite. To support your goals, Microsoft is providing each in-person attendee with the opportunity to take one Microsoft Certification exam (fundamentals, role-based, or specialty) free of charge onsite during this year’s Microsoft Build. Explore available exams and find ways to get prepared to take your onsite exam.
Space is limited and registration is required so be sure to register today!
Visit our new On-Demand Labs & Assessments area
Drop in at our new On-Demand Labs & Assessments area at Microsoft Build! Located on the 3rd floor, this space will offer you a place to explore on-demand labs, take a Practice Assessment, earn an Applied Skills credential, or take some time to connect with a member of our team. Devices will be available onsite for you to use. You can also visit this area to get skilled up on areas of interest and speak with community experts. We look forward to seeing you in this new space designed just for you!
Visit us at the Microsoft Learn Experience
Don’t miss your chance to grab a sweet treat and some great giveaways! Make plans to swing by our new retro-themed Microsoft Learn Experience, where you can have some fun with interactive activities showcasing our robust and trusted skilling resources. Connect with our vibrant Microsoft Learn Community of experts at our onsite experience located in room 330 on the 3rd floor. Team members and Learn Experts can help you determine the best learning path for you and your career.
Get ready for live Demo sessions
This lightning talk format is intended for delivering snackable but relevant content. These sessions are exclusive to in-person attendees and will be delivered inside of the Hub area located on the top floor of the Seattle Convention Center. Microsoft Learn has 4 sessions focusing on Applied Skills, Certifications, AI development, and some exciting new curated experiences. Learn more about Demo sessions.
Experiences available to everyone, including digital attendees:
Check out the Microsoft Learn Challenge: Build Edition
Immerse yourself in cutting-edge AI technology, build new skills, and earn a badge by completing one of our unique, AI-focused collections. Each challenge offers a variety of resources to help you succeed, including interactive Microsoft Learn community events, live and recorded learning sessions delivered by experts, and training assets. The challenge kicks off on May 21, preview the challenges and pre-register now.
Access Official Collections on Microsoft Learn
Access the latest topic-specific learning content, all from trusted sources and in one spot with Official Collections on Microsoft Learn. You will find multiple Official Collections from experts across Microsoft, including content related to skilling up in AI and Copilot. These Microsoft Learn Collections are aligned to each of the Microsoft Build sessions delivered at the event and include self-paced training, documentation, credentials, and more. Explore Official Collections on Microsoft Learn today.
Build skills that open doors
Microsoft Learn helps you gain the skills you need to achieve more with technology, through interactive training and resources on Microsoft products and services. As AI and cloud technologies continue to advance and empower skill development journeys, Microsoft Learn is leading the way in bringing the latest skilling and credentials to our community of learners. We look forward to sharing more exciting updates with you in the coming weeks.
Register now for Microsoft Build, and don’t forget to register for your free Certification exam today!
Microsoft Tech Community – Latest Blogs –Read More
Login page of Microsoft blocked in iFrame
I’ve created an Enterprise App and App Registration in Microsoft Entra ID for the authentication of users into a thrid-party web application (Qlik Sense) via OIDC. This works as designed. When I access the website of Qlik Sense directly in my browser, I’m redirected to login.microsoftonline.com, where I can pick an existing account or sign-in with a new account.
Now, I want to create a custom web application where the website of Qlik Sense is embedded on a page with an iFrame. Unfortunately, this doesn’t work, because the login page of Microsoft is blocked by the browser when opened inside an iFrame. The browser console indicates that this is because of a HTTP response header ‘X-Frame-Options’ that is coming from Microsoft Entra ID. Is there a way to prevent this behaviour by changing the configuration in Entra ID?
I’ve created an Enterprise App and App Registration in Microsoft Entra ID for the authentication of users into a thrid-party web application (Qlik Sense) via OIDC. This works as designed. When I access the website of Qlik Sense directly in my browser, I’m redirected to login.microsoftonline.com, where I can pick an existing account or sign-in with a new account. Now, I want to create a custom web application where the website of Qlik Sense is embedded on a page with an iFrame. Unfortunately, this doesn’t work, because the login page of Microsoft is blocked by the browser when opened inside an iFrame. The browser console indicates that this is because of a HTTP response header ‘X-Frame-Options’ that is coming from Microsoft Entra ID. Is there a way to prevent this behaviour by changing the configuration in Entra ID? Read More