Category: Microsoft
Category Archives: Microsoft
New Blog | Best Practices to Manage and Mitigate Security Recommendations
In the fast-evolving landscape of cloud security, Microsoft Defender for Cloud (MDC) stands as a robust Cloud Native Application Protection Platform (CNAPP). One of its standout features is the premium Cloud Security Posture Management (CSPM) solution, known as Defender CSPM. Among the myriads of advanced capabilities offered by Defender CSPM, the “Governance Rule” feature is a game-changer. This empowers security teams to streamline and automate the assignment, management, and tracking of security recommendations.
In this blog, we’ll delve into best practices for leveraging Governance Rule to ensure effective, efficient, and timely remediation actions and explore practical use cases for maximizing its potential.
Understanding Governance Rule
Governance Rule in Defender CSPM is designed to simplify the management of security recommendations by enhancing accountability. You can define rules that assign an owner and a due date for addressing recommendations for specific resources. This provides resource owners with a clear set of tasks and deadlines for remediating recommendations. By making the assignment and tracking of these tasks more visible, Governance Rule ensures that critical security issues are promptly addressed, reducing the risk of breaches and enhancing overall security posture.
Best Practices for Utilizing Governance Rule
Define Clear Remediation Ownership
Assigning remediation tasks to specific owners is crucial for accountability. Governance Rule allows you to specify who is responsible for each security recommendation. Ensure that each task is assigned to the most appropriate individual or team with the necessary expertise and authority to address the issue. Clear ownership helps avoid confusion and ensures that remediation actions are taken seriously.
Set Realistic ETAs and Grace Periods
Establishing realistic Estimated Time of Arrival (ETA) and grace periods for remediation tasks is essential for maintaining a balance between urgency and feasibility. Overly aggressive timelines can lead to rushed and potentially ineffective fixes, while overly lenient deadlines may delay critical security improvements. Analyze the complexity and impact of each security finding to set achievable timelines that encourage timely resolution without compromising quality.
Prioritize Based on Risk
Not all security recommendations are created equal. Use severity-based prioritization to determine which issues need immediate attention and which can be scheduled for later remediation. Defender CSPM’s Governance Rule allows you to categorize tasks based on their severity and potential impact on your organization’s security posture. Focus on high-severity findings first to mitigate the most significant threats promptly.
Automate Workflow Integration
Leverage the automation capabilities of Governance Rule to integrate remediation workflows with your existing security tools and processes. Automated notifications, status updates, and task assignments can significantly reduce manual effort and improve coordination across teams. By integrating these workflows, you ensure that security recommendations are seamlessly managed from detection to resolution.
Regularly Monitor and Adjust Rules
The dynamic nature of cloud environments means that security needs can change rapidly. Regularly review and adjust your Governance Rules to ensure they remain aligned with your organization’s security objectives and compliance requirements. Monitor the performance of these rules and gather feedback from your security teams to identify areas for improvement.
Foster a Culture of Continuous Improvement
Encourage a culture where continuous improvement is the norm. Use insights gained from the Governance Rule feature to identify recurring security issues and root causes. Implement lessons learned to refine your security policies and practices, reducing the likelihood of similar issues arising in the future.
Before you begin
The Defender Cloud Security Posture Management (CSPM) plan must be enabled.
You need Contributor, Security Admin, or Owner permissions on the Azure subscriptions.
For AWS accounts and GCP projects, you need Contributor, Security Admin, or Owner permissions on the Defender for Cloud AWS or GCP connectors.
Read the full post here: Best Practices to Manage and Mitigate Security Recommendations
By Giulio Astori
In the fast-evolving landscape of cloud security, Microsoft Defender for Cloud (MDC) stands as a robust Cloud Native Application Protection Platform (CNAPP). One of its standout features is the premium Cloud Security Posture Management (CSPM) solution, known as Defender CSPM. Among the myriads of advanced capabilities offered by Defender CSPM, the “Governance Rule” feature is a game-changer. This empowers security teams to streamline and automate the assignment, management, and tracking of security recommendations.
In this blog, we’ll delve into best practices for leveraging Governance Rule to ensure effective, efficient, and timely remediation actions and explore practical use cases for maximizing its potential.
Understanding Governance Rule
Governance Rule in Defender CSPM is designed to simplify the management of security recommendations by enhancing accountability. You can define rules that assign an owner and a due date for addressing recommendations for specific resources. This provides resource owners with a clear set of tasks and deadlines for remediating recommendations. By making the assignment and tracking of these tasks more visible, Governance Rule ensures that critical security issues are promptly addressed, reducing the risk of breaches and enhancing overall security posture.
Best Practices for Utilizing Governance Rule
Define Clear Remediation OwnershipAssigning remediation tasks to specific owners is crucial for accountability. Governance Rule allows you to specify who is responsible for each security recommendation. Ensure that each task is assigned to the most appropriate individual or team with the necessary expertise and authority to address the issue. Clear ownership helps avoid confusion and ensures that remediation actions are taken seriously.
Set Realistic ETAs and Grace PeriodsEstablishing realistic Estimated Time of Arrival (ETA) and grace periods for remediation tasks is essential for maintaining a balance between urgency and feasibility. Overly aggressive timelines can lead to rushed and potentially ineffective fixes, while overly lenient deadlines may delay critical security improvements. Analyze the complexity and impact of each security finding to set achievable timelines that encourage timely resolution without compromising quality.
Prioritize Based on RiskNot all security recommendations are created equal. Use severity-based prioritization to determine which issues need immediate attention and which can be scheduled for later remediation. Defender CSPM’s Governance Rule allows you to categorize tasks based on their severity and potential impact on your organization’s security posture. Focus on high-severity findings first to mitigate the most significant threats promptly.
Automate Workflow IntegrationLeverage the automation capabilities of Governance Rule to integrate remediation workflows with your existing security tools and processes. Automated notifications, status updates, and task assignments can significantly reduce manual effort and improve coordination across teams. By integrating these workflows, you ensure that security recommendations are seamlessly managed from detection to resolution.
Regularly Monitor and Adjust Rules
The dynamic nature of cloud environments means that security needs can change rapidly. Regularly review and adjust your Governance Rules to ensure they remain aligned with your organization’s security objectives and compliance requirements. Monitor the performance of these rules and gather feedback from your security teams to identify areas for improvement.
Foster a Culture of Continuous Improvement
Encourage a culture where continuous improvement is the norm. Use insights gained from the Governance Rule feature to identify recurring security issues and root causes. Implement lessons learned to refine your security policies and practices, reducing the likelihood of similar issues arising in the future.
Before you begin
The Defender Cloud Security Posture Management (CSPM) plan must be enabled.
You need Contributor, Security Admin, or Owner permissions on the Azure subscriptions.
For AWS accounts and GCP projects, you need Contributor, Security Admin, or Owner permissions on the Defender for Cloud AWS or GCP connectors.
Read the full post here: Best Practices to Manage and Mitigate Security Recommendations Read More
ProcDump 3.3 for Linux and Process Explorer v17.06
Microsoft Tech Community – Latest Blogs –Read More
VBA to save a xlsm as an xlsx
I have the following macro which I now want to save the file as a .xlsx file type rather than a macro-enabled workbook.
I’ve tried various permutations and nothing has changed the file type!
Is anyone able to help please?
PS It would also be great if it didn’t give the warning that the macros will no longer work!
Sheets(“Control Sheet”).Select
Range(“d5”).Copy
Range(“e5”).PasteSpecial Paste:=xlPasteValues
Dim fPath
Dim fName
With Application.FileDialog(msoFileDialogFolderPicker)
If .Show = True Then
fPath = .SelectedItems(1) & “”
fName = fPath & Range(“e5”).Value & “.xls”
Call MsgBox(fName, vbInformation, “Save Path”)
ThisWorkbook.SaveAs Filename:=fName
Range(“e5”).Select
Selection.ClearContents
Range(“c5”).Select
Sheets(“Preparer”).Select
Range(“c13”).Select
End If
End With
End Sub
I have the following macro which I now want to save the file as a .xlsx file type rather than a macro-enabled workbook.I’ve tried various permutations and nothing has changed the file type!Is anyone able to help please?PS It would also be great if it didn’t give the warning that the macros will no longer work!Sheets(“Control Sheet”).SelectRange(“d5”).CopyRange(“e5”).PasteSpecial Paste:=xlPasteValuesDim fPathDim fNameWith Application.FileDialog(msoFileDialogFolderPicker)If .Show = True ThenfPath = .SelectedItems(1) & “”fName = fPath & Range(“e5”).Value & “.xls”Call MsgBox(fName, vbInformation, “Save Path”)ThisWorkbook.SaveAs Filename:=fNameRange(“e5”).SelectSelection.ClearContentsRange(“c5”).SelectSheets(“Preparer”).SelectRange(“c13”).SelectEnd IfEnd WithEnd Sub Read More
VBA to save a xlsm as an xlsm
I have the following macro which I now want to save the file as a .xlsm file type rather than an xls
I’ve tried various permutations and nothing has changed the file type!
Is anyone able to help please?
Sheets(“Control Sheet”).Select
Range(“d5”).Copy
Range(“e5”).PasteSpecial Paste:=xlPasteValues
Dim fPath
Dim fName
With Application.FileDialog(msoFileDialogFolderPicker)
If .Show = True Then
fPath = .SelectedItems(1) & “”
fName = fPath & Range(“e5”).Value & “.xls”
Call MsgBox(fName, vbInformation, “Save Path”)
ThisWorkbook.SaveAs Filename:=fName
Range(“e5”).Select
Selection.ClearContents
Range(“c5”).Select
Sheets(“Preparer”).Select
Range(“c13”).Select
End If
End With
End Sub
I have the following macro which I now want to save the file as a .xlsm file type rather than an xls I’ve tried various permutations and nothing has changed the file type! Is anyone able to help please? Sheets(“Control Sheet”).SelectRange(“d5”).CopyRange(“e5”).PasteSpecial Paste:=xlPasteValuesDim fPathDim fNameWith Application.FileDialog(msoFileDialogFolderPicker)If .Show = True ThenfPath = .SelectedItems(1) & “”fName = fPath & Range(“e5”).Value & “.xls”Call MsgBox(fName, vbInformation, “Save Path”)ThisWorkbook.SaveAs Filename:=fNameRange(“e5”).SelectSelection.ClearContentsRange(“c5”).SelectSheets(“Preparer”).SelectRange(“c13”).SelectEnd IfEnd WithEnd Sub Read More
Complex (for me!) lookup formula – help please….
I need an Excel formula to return a lookup value based on date. The lookup dates and values (exchange rates for each date) are arranged in two columns per year.
More detail in this sample spreadsheet.
Can anyone help?
Thank you in advance!
I need an Excel formula to return a lookup value based on date. The lookup dates and values (exchange rates for each date) are arranged in two columns per year.More detail in this sample spreadsheet. Can anyone help? Thank you in advance! Read More
Top Stories: May 28, 2024
News and events you don’t want to miss.
English Top Stories: May 28, 2024 | Microsoft
Français À la une : 28 mai 2024 | Microsoft
Español Novedades más relevantes: 28 de mayo de 2024 | Microsoft
Português Notícias principais: 28 de maio de 2024 | Microsoft
News and events you don’t want to miss.
English Top Stories: May 28, 2024 | Microsoft
Français À la une : 28 mai 2024 | Microsoft
Español Novedades más relevantes: 28 de mayo de 2024 | Microsoft
Português Notícias principais: 28 de maio de 2024 | Microsoft Read More
Cannot transfer schema using NTDSUTIL
When trying to transfer operational control to a new A/D server, I tried to use the GUI but it would not show the new A/D. I found a note which indicated to use NTDSUTIL to perform the task. When issueing the commands:
roles
connections
connect to server dc1 – put the target DC server’s name here
quit
transfer infrastructure master
transfer naming master
transfer pdc
transfer rid master
transfer schema master
quit
quit
Everything appears to be fine, however, when I issue the netdom query fsmo, all of the roles refer to the new server, but the Schema Master still points to the existing A/D server. I am part of the schema admin group but I don’t know what else to do except maybe to use the Seize option which appears to be a last resort. What other settings should I look for?
When trying to transfer operational control to a new A/D server, I tried to use the GUI but it would not show the new A/D. I found a note which indicated to use NTDSUTIL to perform the task. When issueing the commands:rolesconnectionsconnect to server dc1 – put the target DC server’s name herequittransfer infrastructure mastertransfer naming mastertransfer pdctransfer rid mastertransfer schema masterquitquit Everything appears to be fine, however, when I issue the netdom query fsmo, all of the roles refer to the new server, but the Schema Master still points to the existing A/D server. I am part of the schema admin group but I don’t know what else to do except maybe to use the Seize option which appears to be a last resort. What other settings should I look for? Read More
PROBLEMAS NA ATUALIZAÇÃO DO WINDOWS INSIDER.
//Toda vez que tento atualizar o windows insider da erro
//Chega a baixar e instalar até 100%, mas quando completa, dá erro
//Vários programas e até mesmo a aba de “segurança do windows” não abrem
//Não obtive sucesso em resolver som o suporte também
//Toda vez que tento atualizar o windows insider da erro//Chega a baixar e instalar até 100%, mas quando completa, dá erro//Vários programas e até mesmo a aba de “segurança do windows” não abrem//Não obtive sucesso em resolver som o suporte também Read More
send an attachement file received in forms
Hey pros !
So i’ve been struggling with this.
I have a form with only 5 questions, one of them would be a file upload that is mandatory.
I was able to get it but only with a link to my onedrive and the original name
But what i need is to :
Receive an email with only the file (might be pdf or jpeg or whatever) they have sent in the form
I need it to be named after question #1 and #2.
Sorry its in french
Hey pros !So i’ve been struggling with this. I have a form with only 5 questions, one of them would be a file upload that is mandatory.I was able to get it but only with a link to my onedrive and the original name But what i need is to :Receive an email with only the file (might be pdf or jpeg or whatever) they have sent in the formI need it to be named after question #1 and #2. Sorry its in french Read More
Migrating Mailbox On-premise to the Cloud
Hello
Please i need your help on this issue.
We have over 150 active mailboxes On-Prem which we would like to migrate to the cloud.
Please how do i go about this. Is there any guidance or steps to go about it.
Hello Please i need your help on this issue. We have over 150 active mailboxes On-Prem which we would like to migrate to the cloud.Please how do i go about this. Is there any guidance or steps to go about it. Read More
ATTENTION: Microsoft Learn Update
(Please note: Clicking on this image will provide you with a standard sized view. This update is also uploaded in a PDF format at the bottom of this post. Thank you!)
(Please note: Clicking on this image will provide you with a standard sized view. This update is also uploaded in a PDF format at the bottom of this post. Thank you!) Read More
Excell formula
It has been awhile since i worked on advanced formulas in excel.
I am working on a budget sheet and am having trouble on a formula to sum numbers in column F based on a range of numbers (a week of rows) in column E that can be extended to other rows (drag fill) to get a dollar amount needed for a specific day. This is what i have as of now;
=IF E3:E40,>=H46-1,and<=H46+5,SUM(F3,F40)
E is the due date column in a table
H is the reference date outside the table with the range (minus a day and plus 5 days)
F is the column of numbers in the table i want summed.
So if i put in 15 in cell H, i would like it to sum the numbers in column F that are in the range of 14-20 in column E.
Is it possible to get it to wrap around back to 1 since there are no more than 31 days in a month, rather then the range increasing to 35?
It has been awhile since i worked on advanced formulas in excel.I am working on a budget sheet and am having trouble on a formula to sum numbers in column F based on a range of numbers (a week of rows) in column E that can be extended to other rows (drag fill) to get a dollar amount needed for a specific day. This is what i have as of now;=IF E3:E40,>=H46-1,and<=H46+5,SUM(F3,F40)E is the due date column in a tableH is the reference date outside the table with the range (minus a day and plus 5 days)F is the column of numbers in the table i want summed. So if i put in 15 in cell H, i would like it to sum the numbers in column F that are in the range of 14-20 in column E.Is it possible to get it to wrap around back to 1 since there are no more than 31 days in a month, rather then the range increasing to 35? Read More
Business Applications Partner News: Week of May 28
Check out this week’s top resources to stay up-to-date on the latest Business Applications Partner News. Remember to sign up for the monthly Dynamics 365 and Power Platform partner pulse newsletters.
What to register for:
THIS WEEK!
May 28 (PDT): Optimizing Business Impact through the Microsoft Commercial Marketplace
May 28-31 (PDT): Accelerate Business Process Automation using Microsoft Power Platform Workshop
May 29: Microsoft AI Training Roadshows (Tokyo, Japan)
May 30: Copilot Studio Partner Opportunity Webinar
Closes May 31: Q4 Microsoft Catalyst Partner Training
Save the date: Join us on July 11 for MCAPS Start for Partners
What to download
Microsoft Build 2024 assets:
What’s new for Copilot Studio – Build 2024
Copilot Studio Agents Vision Deck
ISV Copilot datasheet
Build 2024 ISV quotes
What to review/like/share:
Partner Alert: Microsoft Build
Copilot Studio brings power of generative AI to ISV offerings: LinkedIn post | blog link
Majesco creates AI-driven digital assistant with Copilot Studio: LinkedIn post | blog link
Announcing Partner Center to certify and publish Power Platform Copilot connectors and plugins: LinkedIn | blog link
Directions North America recap: LinkedIn | blog link
Blog: Revolutionize the way you work with automation and AI
What to watch:
Microsoft Build replay
Welcome to the future of automation with AI flows in Power Automate
Automate your desktop with multi-modal AI
Reminders: Register for the upcoming partner events!
Events:
June 4-7 (IST), (BST): Accelerate Business Process Automation using Microsoft Power Platform Workshop
July 22: Microsoft Partner FY25 GTM Launch Event for Business Applications
Trainings:
June 11 (IST) (BST): Dynamics 365 Supply Chain Management – Demand Planning Workshop
Level Up Copilot Sales Champion training course (access code: MOKC-MCJB)
FY24 High Volume Acceleration Program (Advanced)
Check out this week’s top resources to stay up-to-date on the latest Business Applications Partner News. Remember to sign up for the monthly Dynamics 365 and Power Platform partner pulse newsletters.
What to register for:
THIS WEEK!
May 28 (PDT): Optimizing Business Impact through the Microsoft Commercial Marketplace
May 28-31 (PDT): Accelerate Business Process Automation using Microsoft Power Platform Workshop
May 29: Microsoft AI Training Roadshows (Tokyo, Japan)
May 30: Copilot Studio Partner Opportunity Webinar
Closes May 31: Q4 Microsoft Catalyst Partner Training
Save the date: Join us on July 11 for MCAPS Start for Partners
What to download
Microsoft Build 2024 assets:
What’s new for Copilot Studio – Build 2024
Copilot Studio Agents Vision Deck
ISV Copilot datasheet
Build 2024 ISV quotes
What to review/like/share:
Partner Alert: Microsoft Build
Copilot Studio brings power of generative AI to ISV offerings: LinkedIn post | blog link
Majesco creates AI-driven digital assistant with Copilot Studio: LinkedIn post | blog link
Announcing Partner Center to certify and publish Power Platform Copilot connectors and plugins: LinkedIn | blog link
Directions North America recap: LinkedIn | blog link
Blog: Revolutionize the way you work with automation and AI
What to watch:
Microsoft Build replay
Welcome to the future of automation with AI flows in Power Automate
Automate your desktop with multi-modal AI
Reminders: Register for the upcoming partner events!
Events:
June 4-7 (IST), (BST): Accelerate Business Process Automation using Microsoft Power Platform Workshop
July 22: Microsoft Partner FY25 GTM Launch Event for Business Applications
Trainings:
June 11 (IST) (BST): Dynamics 365 Supply Chain Management – Demand Planning Workshop
Level Up Copilot Sales Champion training course (access code: MOKC-MCJB)
FY24 High Volume Acceleration Program (Advanced)
Unable to get cells with % Formulas to add up to100% but yet the Sum Total in the cell shows 100%
Example Column Cell K5=SUM(C5,E5,G5,I5)
Then all of Column K is added up with the following formula K31 =SUM(K5:K30)
Column L, rows 5 thru 30 are a % of the rows Total (Cell K31) or the formula of Cell K31 =SUM(K5:K30)
Cell L5=K5/K31 to get a % or 24% This is duplicated for Cells L6 through L30 for a total of 100% in cell L31 but the actual total of the column is only 99%. How can this be corrected so that the numbers are accurate and don’t need to manually add to see if the total is correct. I have had to do manual adjustments to make the numbers add up to the 100%. Your assistance is greatly appreciated.
Example Column Cell K5=SUM(C5,E5,G5,I5)Then all of Column K is added up with the following formula K31 =SUM(K5:K30) Column L, rows 5 thru 30 are a % of the rows Total (Cell K31) or the formula of Cell K31 =SUM(K5:K30)Cell L5=K5/K31 to get a % or 24% This is duplicated for Cells L6 through L30 for a total of 100% in cell L31 but the actual total of the column is only 99%. How can this be corrected so that the numbers are accurate and don’t need to manually add to see if the total is correct. I have had to do manual adjustments to make the numbers add up to the 100%. Your assistance is greatly appreciated. Read More
Owner of Teams Channel not showing in Teams Channel Distribution List
I requested for a new Team’s Channel be created that includes a distribution list. The distribution list works great – as soon as I add or remove people from the channel, the distribution list is updated. Exactly what I wanted, except for one thing – I’m not included in the distribution list. So if someone else uses the distribution list for communication, I do not receive the email. Is there a way to resolve this?
I requested for a new Team’s Channel be created that includes a distribution list. The distribution list works great – as soon as I add or remove people from the channel, the distribution list is updated. Exactly what I wanted, except for one thing – I’m not included in the distribution list. So if someone else uses the distribution list for communication, I do not receive the email. Is there a way to resolve this? Read More
message available that a new version is available in Windows Update but windows update doesn’t show
On windows 11 I have a message available that a new version is available in Windows Update in Insider menu. When I check for the update, it says that there are no updates.
I have tried most steps shown on online:
1. Rejoining Windows Insider Preview
2.cmd: bcdedit /set flightsigning on
3. Deleting: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsSelfHost
4. Clean Installation of windows 11
Info:
Insider: Release Preview
Current OS build: 22631.3668
Edition: Windows 11 Pro
On windows 11 I have a message available that a new version is available in Windows Update in Insider menu. When I check for the update, it says that there are no updates.I have tried most steps shown on online:1. Rejoining Windows Insider Preview2.cmd: bcdedit /set flightsigning on3. Deleting: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsSelfHost4. Clean Installation of windows 11Info:Insider: Release PreviewCurrent OS build: 22631.3668Edition: Windows 11 Pro Read More
Tenant allow/block list and Exchange rules – order of execution
I’ve just been trying to reduce all the emails from a particularly large global spam bot which hit my tenant daily and aren’t being picked up automatically as SPAM by the service. The bot uses many different individual email mailboxes, on many different (real) domains, registered in many countries (including European countries) – and the domains only seem to make it onto the occasional blacklist. The mail server IPs seem to be Russian ISPs , but several of those too. So it has been difficult to stop but I’m pretty much there as there is only a small variation in the content.
In the process of dealing with it, I have noticed that Exchange rules I have defined appear to take precedence over domain entries in the tenant allow/block list, where I expected it to be the other way around. i.e I expected the TABL would be checked before anything else.
e.g. I have a particular domain listed in the TABL because I want to block anything/everything from it as it is actually the predominant domain spamming us, and an Exchange rule that just looks for content rather than the source to catch all the other domains that are sending out the exact same junk. The other day, my rule caught an email from the domain based on content, and it is clear the TABL had not had an activation against it.
Is my understanding correct, and if so, is there something somewhere that describes how the various components of 365 act on incoming messages and in what order – kinda like a flow chart? I’ve had a look and can’t find anything.
Thanks!
I’ve just been trying to reduce all the emails from a particularly large global spam bot which hit my tenant daily and aren’t being picked up automatically as SPAM by the service. The bot uses many different individual email mailboxes, on many different (real) domains, registered in many countries (including European countries) – and the domains only seem to make it onto the occasional blacklist. The mail server IPs seem to be Russian ISPs , but several of those too. So it has been difficult to stop but I’m pretty much there as there is only a small variation in the content. In the process of dealing with it, I have noticed that Exchange rules I have defined appear to take precedence over domain entries in the tenant allow/block list, where I expected it to be the other way around. i.e I expected the TABL would be checked before anything else. e.g. I have a particular domain listed in the TABL because I want to block anything/everything from it as it is actually the predominant domain spamming us, and an Exchange rule that just looks for content rather than the source to catch all the other domains that are sending out the exact same junk. The other day, my rule caught an email from the domain based on content, and it is clear the TABL had not had an activation against it. Is my understanding correct, and if so, is there something somewhere that describes how the various components of 365 act on incoming messages and in what order – kinda like a flow chart? I’ve had a look and can’t find anything. Thanks! Read More
Formulas and Functions
Hello,
I would like to know if it is possible to create a formula in a spreadsheet based on data from another spreadsheet without having to copy or re-enter the data?
Thank you in advance for your reply,
Maëlle
Hello,I would like to know if it is possible to create a formula in a spreadsheet based on data from another spreadsheet without having to copy or re-enter the data?Thank you in advance for your reply,Maëlle Read More
🌟 Microsoft Partner Community Update: Empowering Your Success 🌟
Dear Partners,
Thank you for joining today’s Partner Townhall, covering a dynamic convergence of insights, collaboration, and strategic vision on Microsoft Build and Partner Enablement.
Mark Your Calendars for the upcoming exciting events:
Digital Kickoff (July 11th): An electrifying start to the new fiscal year. More information is available here.
Partner of the Year Awards (Geneva: July 15th, Zurich: July 18th): Celebrate excellence. Registration details coming soon.
Microsoft Ignite (Nov. 18-22, 2024) in Chicago and online: Our biggest event of the year is getting even bigger.
Recording Available: If you missed today’s Townhall, don’t worry. Catch the recording on our community platform. Dive into the discussions, gain fresh perspectives, and stay informed.
Sign Up for Future Townhalls: The journey continues. Visit the Cloud Champion platform, establish your account, and be part of the next wave of insights. Our next Townhall awaits on June 27th. :spiral_calendar:️
Provide feedback: Your insights matter! We’re conducting a brief survey to enhance our Partner Townhalls. Share your thoughts, ideas, and suggestions—it’s your chance to shape the future of these engaging sessions.
Let’s amplify our collective impact. Share your takeaways, connect with fellow partners, and gear up for what’s next. Together, we thrive!
Microsoft Switzerland Partner Team
Dear Partners,
Thank you for joining today’s Partner Townhall, covering a dynamic convergence of insights, collaboration, and strategic vision on Microsoft Build and Partner Enablement.
Mark Your Calendars for the upcoming exciting events:
Digital Kickoff (July 11th): An electrifying start to the new fiscal year. More information is available here.
Partner of the Year Awards (Geneva: July 15th, Zurich: July 18th): Celebrate excellence. Registration details coming soon.
Microsoft Ignite (Nov. 18-22, 2024) in Chicago and online: Our biggest event of the year is getting even bigger.
Recording Available: If you missed today’s Townhall, don’t worry. Catch the recording on our community platform. Dive into the discussions, gain fresh perspectives, and stay informed.
Sign Up for Future Townhalls: The journey continues. Visit the Cloud Champion platform, establish your account, and be part of the next wave of insights. Our next Townhall awaits on June 27th. :spiral_calendar:️
Provide feedback: Your insights matter! We’re conducting a brief survey to enhance our Partner Townhalls. Share your thoughts, ideas, and suggestions—it’s your chance to shape the future of these engaging sessions.
Let’s amplify our collective impact. Share your takeaways, connect with fellow partners, and gear up for what’s next. Together, we thrive!
Microsoft Switzerland Partner Team Read More
Lesson Learned #496:Verifying Network Route to Azure SQL Database via VPN in Windows
Today, I worked on a service request where our customer was using a VPN, but the network routes seemed to indicate it was not working and was using the ISP IP instead of the VPN IP.
I found that can be challenging to verify whether your connection is indeed passing through the VPN or directly via your ISP. In this article, I would like to share my lessons learned to determine which route your connection to Azure SQL Database is taking using PowerShell in Windows.
First, running in PowerShell ping servername.database.windows.net we are going to have the IP address of gateway. Remember, that Azure gateway might be more than 1 IPs.
ping servername.database.windows.net
The output will display the IP address of your Azure SQL Database (example).
Pinging servername.database.windows.net [1.1.1.0] with 32 bytes of data:
With the IP address in hand, I can now use the Find-NetRoute cmdlet to determine the route the system is using to connect to the Azure SQL Database.
Execute the following command, replacing 1.1.1.0 with the IP address obtained. This command will output details about the route being used, including the interface and the next hop.
The output will include several important fields:
InterfaceIndex: The index of the network interface used for the connection.
DestinationPrefix: The destination prefix for the route.
NextHop: The next hop in the route (which could be the gateway of your VPN or your ISP).
RouteMetric: The metric of the route.
InterfaceAlias: The alias of the interface used.
IPAddress: will be the IP address of ISP or VPN.
Example:
IPAddress : 100.x.x.x
InterfaceIndex : 91
InterfaceAlias : MyVPN
AddressFamily : IPv4
Type : Unicast
PrefixLength : 32
PrefixOrigin : Other
SuffixOrigin : Other
AddressState : Preferred
ValidLifetime :
PreferredLifetime :
Microsoft Tech Community – Latest Blogs –Read More