Category: Microsoft
Category Archives: Microsoft
Cumulative Update #27 for SQL Server 2019 RTM
The 27th cumulative update release for SQL Server 2019 RTM is now available for download at the Microsoft Downloads site. Please note that registration is no longer required to download Cumulative updates.
To learn more about the release or servicing model, please visit:
CU27 KB Article: https://learn.microsoft.com/troubleshoot/sql/releases/sqlserver-2019/cumulativeupdate27
Starting with SQL Server 2017, we adopted a new modern servicing model. Please refer to our blog for more details on Modern Servicing Model for SQL Server
Microsoft® SQL Server® 2019 RTM Latest Cumulative Update: https://www.microsoft.com/download/details.aspx?id=100809
Update Center for Microsoft SQL Server: https://learn.microsoft.com/en-us/troubleshoot/sql/releases/download-and-install-latest-updates
Microsoft Tech Community – Latest Blogs –Read More
New Blog | Detect suspicious processes running on hidden desktops
By Saar Cohen
With ransomware campaigns continuing to grow, they remain top of mind for security leaders. Across these sophisticated cyberattacks, the use of remote desktop protocol (RDP) compromise has reached record levels, making it even more critical to provide analysts with full visibility into potentially malicious RDP session use.
That’s why today we are excited to announce a new way to identify potentially compromised devices in your organization via the new ‘DesktopName’ field in Defender for Endpoint, which enables analysts to easily detect, investigate, and hunt for suspicious interactive process executed on so called ‘hidden desktops’.
The importance to RDP
A remote desktop session over RDP (Remote Desktop Protocol) provides users with access to connect remotely to endpoints and is often leveraged as the entry point for attackers to access a target machine. RDP however, introduces some undesirable disadvantages for the attacker.
For example, Windows by default only allows for a single remote RDP session which can cause detectable friction as both the legitimate user and the attacker begin vying for interactivity on the same device. To mitigate this, attackers may opt for other Remote Monitoring and Management (RMM) approaches as described in the examples below.
Read the full post here: Detect suspicious processes running on hidden desktops
By Saar Cohen
With ransomware campaigns continuing to grow, they remain top of mind for security leaders. Across these sophisticated cyberattacks, the use of remote desktop protocol (RDP) compromise has reached record levels, making it even more critical to provide analysts with full visibility into potentially malicious RDP session use.
That’s why today we are excited to announce a new way to identify potentially compromised devices in your organization via the new ‘DesktopName’ field in Defender for Endpoint, which enables analysts to easily detect, investigate, and hunt for suspicious interactive process executed on so called ‘hidden desktops’.
The importance to RDP A remote desktop session over RDP (Remote Desktop Protocol) provides users with access to connect remotely to endpoints and is often leveraged as the entry point for attackers to access a target machine. RDP however, introduces some undesirable disadvantages for the attacker. For example, Windows by default only allows for a single remote RDP session which can cause detectable friction as both the legitimate user and the attacker begin vying for interactivity on the same device. To mitigate this, attackers may opt for other Remote Monitoring and Management (RMM) approaches as described in the examples below.
Read the full post here: Detect suspicious processes running on hidden desktops Read More
Flattening nested JSON values in a dataflow with varying keys.
We are using Azrue DevOps REST API calls to return JSON files and storing them in blob. Then we perform a dataflow to transform the data. The issue is a portion of the JSON being stored in blob has varying keys.
When we specify the columns to map in a Select action, we are selecting specifically one of the varying keys from a list of options. But need to map ALL of these – we cannot manually specify these because the data source is so large.
We cannot implement a standard name for this section of the JSON. A wildcard for { } would work ideally but is not supported. We do not care what the keys are, just the contents (id, name).
Select Action:
Source Column:
resources.pipelines.{src-release}.pipeline.id
resources.pipelines.{src-release}.pipeline.name
resources.pipelines.{build }.pipeline.id
resources.pipelines.{build }.pipeline.name
Mapping Name as:
‘pipelineID’
‘pipelineName’
Below is a JSON snippet which highlights the key from the source JSON
Example of Select action mapping – each key shows as its own dropdown:
We are using Azrue DevOps REST API calls to return JSON files and storing them in blob. Then we perform a dataflow to transform the data. The issue is a portion of the JSON being stored in blob has varying keys. When we specify the columns to map in a Select action, we are selecting specifically one of the varying keys from a list of options. But need to map ALL of these – we cannot manually specify these because the data source is so large. We cannot implement a standard name for this section of the JSON. A wildcard for { } would work ideally but is not supported. We do not care what the keys are, just the contents (id, name). Select Action:Source Column:resources.pipelines.{src-release}.pipeline.idresources.pipelines.{src-release}.pipeline.nameresources.pipelines.{build }.pipeline.idresources.pipelines.{build }.pipeline.name Mapping Name as:‘pipelineID’‘pipelineName’Below is a JSON snippet which highlights the key from the source JSON Example of Select action mapping – each key shows as its own dropdown: Read More
Can’t upload excel file
I created a portfolio project through excel (the big picture). I have a google site as my portfolio website. my issue is I can’t upload the excel file I had to convert it into google sheets (the small picture at the bottom). The middle picture is google sheets which doesn’t display my dashboard. If anyone can assist me with this issue I’ll be more than grateful for the help. I have 2 more projects I want to add but
I created a portfolio project through excel (the big picture). I have a google site as my portfolio website. my issue is I can’t upload the excel file I had to convert it into google sheets (the small picture at the bottom). The middle picture is google sheets which doesn’t display my dashboard. If anyone can assist me with this issue I’ll be more than grateful for the help. I have 2 more projects I want to add but Read More
Windows 22631.3737 or 22631.3807 Block file protection when copying/pasting files on a network drive
It works normally in 22631.3672
but after updating Windows 22631.3737 or 22631.3807, if you copy a file from a network drive and paste it to a local drive, an issue occurs where file protection is blocked.
It works normally in 22631.3672but after updating Windows 22631.3737 or 22631.3807, if you copy a file from a network drive and paste it to a local drive, an issue occurs where file protection is blocked. Read More
Count across other files
Member IDActive1Y2N3Y4N
N6N
Member IDActive1N2N3Y4Y
Y6N
I have 12 spreadsheets for gym membership, one for each month and each one contains a table showing whether a member is active or not in that month. Example below for September. Member IDActive1Y2N3Y4N5N6N The next month, October the table might look like this: Member IDActive1N2N3Y4Y5Y6N That would mean that MemberID 1,3,4 and 5 would have been active, ie a count of 4. What’s the best way of creating a count for “The number of members active in the last 6 months”? So in October I would need to find this count using data from the Oct, Sep, Aug, Jul, Jun and May files. Thanks Read More
New Blog | A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door
By David Frazee
The Azure Web Application Firewall (WAF) on Azure Front Door offers centralized protection for your web applications against vulnerabilities and threats. The effectiveness of your Azure WAF in managing traffic can be assessed through WAF logs stored in specified locations such as a Log Analytics Workspace or Storage Accounts. These logs document requests that have been either matched or blocked by WAF rules. This data is crucial for monitoring, auditing, and resolving issues. By default, WAF logs are maintained in a plain text format for user convenience and analysis. However, these client requests might include sensitive personal data, like personally identifiable information (PII), which can include names, addresses, contact details, and financial information. Without proper sanitization, logs containing such PII could be exposed to unauthorized access. To address this, Azure Front Door WAF now offers sensitive data protection through log scrubbing. WAF log scrubbing employs a customizable rules engine to pinpoint and redact sensitive portions within the requests, replacing them with a series of asterisks (******) to prevent data exposure. This blog will explains the log scrubbing process and provides practical examples for a more comprehensive understanding.
Log Scrubbing
The Azure Front Door WAF’s sensitive data protection feature using log scrubbing is compatible with all WAF policy rule sets including Default Rule Set (DRS), Bot Manager Ruleset, and any Custom rules. It utilizes a range of match variables, such as client IP, headers, cookies, and request arguments, to identify data for scrubbing. Rule creation involves selecting a match variable, an operator, and defining a selector, which determines the specific key to be cleansed from the logs. Take a simple login process, which generally involves username and password fields; these are two distinct keys that can be targeted as selectors. Should a dubious login attempt activate the WAF, it records the username and password if they contain the suspect string or code injection. The log scrubber then anonymizes these details, obscuring the malicious content while preserving the attack’s characteristics and significantly reducing the risk of personal data exposure.
See below for the full list of Match Variables:
Match Variable
Operator
Selector
Request IP Address
Equals any
<None>
Request URI
Equals any
<None>
Request Header Names
Equals/Equals any
<Custom>
Request Cookie Names
Equals/Equals any
<Custom>
Request Body Post Arg Names
Equals/Equals any
<Custom>
Request Body Json Arg Names
Equals/Equals any
<Custom>
Query String Arg Names
Equals/Equals any
<Custom>
Request IP, Request URI & Request Header
In our initial scenario, we examine the log scrubbing engine’s capability to conceal the requester’s IP address, the request URI, and the User-Agent that activated the WAF rule. In this example, the User-Agent is a carrier for a SQL injection string within the User-Agent key’s value. The log scrubbing rules are configured so that the selector targets User-Agent within the Request Header Names, ensuring every User-Agent occurrence, including the embedded SQL injection string, is cleansed from the WAF logs. This scenario serves as an example on how to write log scrubbing rules to cleanse potentially sensitive values. It is best practice to specify only those values that contain potential personally identifiable information (PII) or other sensitive data, rather than generic request headers like User-Agent.
Read the full post here: A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door
By David Frazee
The Azure Web Application Firewall (WAF) on Azure Front Door offers centralized protection for your web applications against vulnerabilities and threats. The effectiveness of your Azure WAF in managing traffic can be assessed through WAF logs stored in specified locations such as a Log Analytics Workspace or Storage Accounts. These logs document requests that have been either matched or blocked by WAF rules. This data is crucial for monitoring, auditing, and resolving issues. By default, WAF logs are maintained in a plain text format for user convenience and analysis. However, these client requests might include sensitive personal data, like personally identifiable information (PII), which can include names, addresses, contact details, and financial information. Without proper sanitization, logs containing such PII could be exposed to unauthorized access. To address this, Azure Front Door WAF now offers sensitive data protection through log scrubbing. WAF log scrubbing employs a customizable rules engine to pinpoint and redact sensitive portions within the requests, replacing them with a series of asterisks (******) to prevent data exposure. This blog will explains the log scrubbing process and provides practical examples for a more comprehensive understanding.
Log Scrubbing
The Azure Front Door WAF’s sensitive data protection feature using log scrubbing is compatible with all WAF policy rule sets including Default Rule Set (DRS), Bot Manager Ruleset, and any Custom rules. It utilizes a range of match variables, such as client IP, headers, cookies, and request arguments, to identify data for scrubbing. Rule creation involves selecting a match variable, an operator, and defining a selector, which determines the specific key to be cleansed from the logs. Take a simple login process, which generally involves username and password fields; these are two distinct keys that can be targeted as selectors. Should a dubious login attempt activate the WAF, it records the username and password if they contain the suspect string or code injection. The log scrubber then anonymizes these details, obscuring the malicious content while preserving the attack’s characteristics and significantly reducing the risk of personal data exposure.
See below for the full list of Match Variables:
Match Variable
Operator
Selector
Request IP Address
Equals any
<None>
Request URI
Equals any
<None>
Request Header Names
Equals/Equals any
<Custom>
Request Cookie Names
Equals/Equals any
<Custom>
Request Body Post Arg Names
Equals/Equals any
<Custom>
Request Body Json Arg Names
Equals/Equals any
<Custom>
Query String Arg Names
Equals/Equals any
<Custom>
Request IP, Request URI & Request Header
In our initial scenario, we examine the log scrubbing engine’s capability to conceal the requester’s IP address, the request URI, and the User-Agent that activated the WAF rule. In this example, the User-Agent is a carrier for a SQL injection string within the User-Agent key’s value. The log scrubbing rules are configured so that the selector targets User-Agent within the Request Header Names, ensuring every User-Agent occurrence, including the embedded SQL injection string, is cleansed from the WAF logs. This scenario serves as an example on how to write log scrubbing rules to cleanse potentially sensitive values. It is best practice to specify only those values that contain potential personally identifiable information (PII) or other sensitive data, rather than generic request headers like User-Agent.
Read the full post here: A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door Read More
Technical Pattern: Build Your Own AI Assistant
Microsoft Tech Community – Latest Blogs –Read More
Error with Get Data from web function in Excel
Hello Microsoft Community,
I am having an issue with the get data from web function in excel. I am trying to pull data from webpages, it is this one (https://u.gg/lol/champions/ezreal/duos) if that helps. When I attempt to pull data from this website, it returns the error at the navigator page that “The current preview value is too complex to display.” and does not allow me to continue with pulling the data. Is there some way to bypass this or a setting I can change to decrease the chance this appears? I am relatively new to using Excel for processes such as these.
Thank you and all the best.
Hello Microsoft Community,I am having an issue with the get data from web function in excel. I am trying to pull data from webpages, it is this one (https://u.gg/lol/champions/ezreal/duos) if that helps. When I attempt to pull data from this website, it returns the error at the navigator page that “The current preview value is too complex to display.” and does not allow me to continue with pulling the data. Is there some way to bypass this or a setting I can change to decrease the chance this appears? I am relatively new to using Excel for processes such as these. Thank you and all the best. Read More
Customize the sharepoint pages to radio-type buttons and add user name
Hey everyone!
I am currently working on our SharePoint communication site to have a series of landing pages and display the name of the user on the page like show in the screenshot below. However, i am struggling to get the same outcome and all solutions that i see use third-party apps. I hope someone here with the expertise can help in this crucial work. I will appreciate any help and suggestions. Thank you.
Hey everyone!I am currently working on our SharePoint communication site to have a series of landing pages and display the name of the user on the page like show in the screenshot below. However, i am struggling to get the same outcome and all solutions that i see use third-party apps. I hope someone here with the expertise can help in this crucial work. I will appreciate any help and suggestions. Thank you. Read More
Print formulas in spreadsheet
Is there any way to print a spreadsheet showing only the formulas?
Thanks,
NYCowgirl
Is there any way to print a spreadsheet showing only the formulas? Thanks,NYCowgirl Read More
Upload a document to Assistant Vector Store
Hello,
I am new to Azure Open AI and looking for a way to upload document to Assistant Vector Store using REST API (HTTPs). I have a limitation and cannot use AzureOpenAI API as I would need to install DLLs in my system. The code should be something like below but I get “Resource not found” in response. Something is off. Please help. Thanks.
Hello,I am new to Azure Open AI and looking for a way to upload document to Assistant Vector Store using REST API (HTTPs). I have a limitation and cannot use AzureOpenAI API as I would need to install DLLs in my system. The code should be something like below but I get “Resource not found” in response. Something is off. Please help. Thanks. Dim apiKey As String = “myapikeyhere”Dim endpoint As String = “https://myresource.openai.azure.com” Using client As New HttpClient() client.DefaultRequestHeaders.Authorization = New AuthenticationHeaderValue(“Bearer”, apiKey) Dim url As String = $”{endpoint}/openai/vectorstores?api-version=2024-05-01-preview” Dim response As HttpResponseMessage = client.GetAsync(url).Result Console.WriteLine(response)End Using Read More
MGDC for SharePoint FAQ: How to restrict public access to storage accounts?
In this post, I’ll cover some details on how to configure the network access for the storage account used by the Microsoft Graph Data Connect (MGDC). If you’re not familiar with the MGDC for SharePoint scenarios, start at https://aka.ms/SharePointData.
Is public access required?
In the basic instructions for setting up MGDC in general (see guide) and in the specific instructions for MGDC for SharePoint step-by-step (see guide), you see the recommendation to set the network access setting for storage accounts to “Enable public access from all networks”. This is part of the configuration of the Azure storage account you need to use to sink the data coming from MGDC.
Using the “Enable public access from all networks” option is fine for many tenants, particular for Dev, Test and QA environments. To be clear, even with “public access from all networks”, you still need credentials and proper permissions to access the storage account.
However, several customers ask questions about further securing network access for MGDC storage accounts. That is possible, but you will need to a few additional configuration steps. This is something that might be required by your tenant, given the sensitive nature of this data.
Instructions for configuring restricted public access
While it is not possible to completely “disable public access” (third option under network access), there is guidance on how to “Enable public access from selected Microsoft networks and IP addresses” (second option in in network access). You can find it in the page for Troubleshoot Microsoft Graph Data Connect, in the topic for “Issues adding network IP address to allow list with Azure integration runtime”.
The document linked above explains that if the destination storage account needs further security, you can allow access only from a particular set of Azure service IP addresses.
In that article, note that some of the Azure regions cannot be used for hosting the storage account if you plan to use private access. Those Azure regions are marked with a “*” on the table mapping Office regions to Azure regions. For instance, that includes the “East US” Azure region for the “North America” office region, or the “West Europe” Azure region for the “Europe” office region.
Conclusion
I hope this clarifies that you can use the option to “Enable public access from selected virtual networks and IP Addresses” for your storage account networking when using the Microsoft Graph Data Connect. Be sure to read the detailed instructions and proceed with care. If you bump into any issues, do not hesitate to contact Microsoft Support.
Microsoft Tech Community – Latest Blogs –Read More
WORD in Dark Mode — some changes needed
I have become a massive fan of Dark Mode in recent months and never want to go back to glare-y white screens with black text. I had NO IDEA how much squinting I had been doing all those years of white backgrounds with black text.
I have a couple of problems with Dark Mode in Microsoft Word, however and could use some help… if there are ways to fix these problems.
Using:
Windows 11 Home
Desktop computer less than 1 year old with modest-performance RTX graphics
Intel 10-core i5 processor
32-inch Samsung Monitor with 3840×2160 resolution.
Problem #1… the squiggly red line that appears under misspelled words… it’s way too dark in color and intensity/luminance to be able to see easily in Dark Mode. Can I change the color assigned to the squiggly line in Dark Mode to a brighter color of red and perhaps make it 2-pixels wide instead of leaving it as 1-pixel wide? A side note… as I type this message in the MS Word User Forum, the squiggly red line HERE under a misspelled word is much easier to see than the squiggly red line in Word’s Dark Mode, which is much dimmer/darker and hard to see against the black background. I would be FINE with the squiggly line in Word, if it was as bright and visible as it is here in this forum (also displaying in Dark Mode with black background and white text). The squiggly line here in this forum is still 1-pixel wide, but easy to see.
Problem #2… during editing, for place-keeping, I will often change the font color once I have what I think is the final version of a paragraph. However, in Dark Mode (black background with white text), when I change the font color to, for example, red, the font on-screen remains white. How do I get the fonts in Word Dark Mode to change color correctly on-screen? These are all temporary font-color changes… once editing is complete, I change back to white text for screen display and black text/white background when anybody opens the document elsewhere. So this is a local viewing-on-the-monitor issue.
I have become a massive fan of Dark Mode in recent months and never want to go back to glare-y white screens with black text. I had NO IDEA how much squinting I had been doing all those years of white backgrounds with black text. I have a couple of problems with Dark Mode in Microsoft Word, however and could use some help… if there are ways to fix these problems. Using:Windows 11 HomeDesktop computer less than 1 year old with modest-performance RTX graphicsIntel 10-core i5 processor32-inch Samsung Monitor with 3840×2160 resolution. Problem #1… the squiggly red line that appears under misspelled words… it’s way too dark in color and intensity/luminance to be able to see easily in Dark Mode. Can I change the color assigned to the squiggly line in Dark Mode to a brighter color of red and perhaps make it 2-pixels wide instead of leaving it as 1-pixel wide? A side note… as I type this message in the MS Word User Forum, the squiggly red line HERE under a misspelled word is much easier to see than the squiggly red line in Word’s Dark Mode, which is much dimmer/darker and hard to see against the black background. I would be FINE with the squiggly line in Word, if it was as bright and visible as it is here in this forum (also displaying in Dark Mode with black background and white text). The squiggly line here in this forum is still 1-pixel wide, but easy to see. Problem #2… during editing, for place-keeping, I will often change the font color once I have what I think is the final version of a paragraph. However, in Dark Mode (black background with white text), when I change the font color to, for example, red, the font on-screen remains white. How do I get the fonts in Word Dark Mode to change color correctly on-screen? These are all temporary font-color changes… once editing is complete, I change back to white text for screen display and black text/white background when anybody opens the document elsewhere. So this is a local viewing-on-the-monitor issue. Read More
Apply one formula across multiple columns in one cell
I have a workbook with Titles, Tests, and Results across columns. I need cell T3 to return the Title if the result is Yes. Each Title should be on a new line. Right now I’m using 6 separate If functions, but in my real scenario, there are many more columns. Is there a way to simplify my formula so that one function can apply to many columns, but keep the results in the same cell?
I have a workbook with Titles, Tests, and Results across columns. I need cell T3 to return the Title if the result is Yes. Each Title should be on a new line. Right now I’m using 6 separate If functions, but in my real scenario, there are many more columns. Is there a way to simplify my formula so that one function can apply to many columns, but keep the results in the same cell? Read More
Microsoft free courses
Hi, Microsoft Team, please let me know, are Microsoft free courses available in Pakistan?? I am trying to click the link which is given for each free course, but unable to open that link. Please guide me and provide me with free courses. Regards
Hi, Microsoft Team, please let me know, are Microsoft free courses available in Pakistan?? I am trying to click the link which is given for each free course, but unable to open that link. Please guide me and provide me with free courses. Regards Read More
Exchange 2019/outlook 2016
Hello all. We have three exchange servers in different domains but they all fall under the same site(AD site and services) Our DC’s for the three domains also follow that topology. I think this impossible but I would like to ask the room. How do i get a outlook client in domain 1 to use the exchange in domain 1 and sof forth. When I open up outlook and show connection status I see connections from exchange servers in the different domains. like the SMTP is the correct domain but the in the server name column I have a few connections like https://mail.domain1.com https://mail.domain2.com and mail.domain3.com all established and connected. Without managing sites and services is there another way match the connection from client in outlook to the domain? I read about send and receive connectors but not sure if this would alleviate the problem. All ideas are welcome as i have been trying to figure this out
Hello all. We have three exchange servers in different domains but they all fall under the same site(AD site and services) Our DC’s for the three domains also follow that topology. I think this impossible but I would like to ask the room. How do i get a outlook client in domain 1 to use the exchange in domain 1 and sof forth. When I open up outlook and show connection status I see connections from exchange servers in the different domains. like the SMTP is the correct domain but the in the server name column I have a few connections like https://mail.domain1.com https://mail.domain2.com and mail.domain3.com all established and connected. Without managing sites and services is there another way match the connection from client in outlook to the domain? I read about send and receive connectors but not sure if this would alleviate the problem. All ideas are welcome as i have been trying to figure this out Read More
ADF Pipeline run parameters value pop-up
Hi
When i click debug in ADF pipeline, Pipeline run parameters pop-up. I put in parameter values but pipeline only sends the TableName i put in as value.
FYI – my pipeline has a control table with about 29 tables.
How do i fix this pipeline run parameter value issue?
Thanks,
Ken
Hi When i click debug in ADF pipeline, Pipeline run parameters pop-up. I put in parameter values but pipeline only sends the TableName i put in as value. FYI – my pipeline has a control table with about 29 tables. How do i fix this pipeline run parameter value issue? Thanks,Ken Read More
What is the best process in Outlook for follow-up with a client?
I have used Outlook for years and I know it has several reminder/tasks/to do features. I’m wondering what the best way would be for me.
I have clients where I get an email and I need to follow up, but a longer time period. This could be anywhere from 6 months to 2 years away, depending on the client.
The easiest for me is to right click the email, select follow-up, and then select my date. However, I would prefer to then delete the email but my understanding is that when I delete the email, I will be removing the reminder.
Any suggestions on the fastest and easiest way to set these reminders? I would like for them to be in my tasks/to do rather than just a pop up on the screen reminder.
Thank you.
I have used Outlook for years and I know it has several reminder/tasks/to do features. I’m wondering what the best way would be for me. I have clients where I get an email and I need to follow up, but a longer time period. This could be anywhere from 6 months to 2 years away, depending on the client. The easiest for me is to right click the email, select follow-up, and then select my date. However, I would prefer to then delete the email but my understanding is that when I delete the email, I will be removing the reminder. Any suggestions on the fastest and easiest way to set these reminders? I would like for them to be in my tasks/to do rather than just a pop up on the screen reminder. Thank you. Read More
App attach for Azure Virtual Desktop now generally available
App attach for Azure Virtual Desktop allows IT admins to dynamically attach applications from an application package to a user session in Azure Virtual Desktop.
In December 2023, we announced a public preview for some exciting new app attach features. App attach is now generally available and here is a summary of the new capabilities:
Applications can now be assigned to any host pool or session host. You can assign application packages to multiple host pools in your environment.
Applications can now be assigned per user, both within a desktop session and remote app sessions. This means that in any host pool in any session, users can be assigned different application combinations. This should reduce the number of host pools and images you require.
Application groups are no longer required to assign users to app attach apps, significantly simplifying assignment and reducing the number of application groups needed.
Application assignment, removal, and upgrades can be performed without needing a maintenance window and without interrupting a user’s workflow.
Microsoft Entra ID support for app attach has been introduced. Microsoft Entra hybrid join will work as it did before.
Dependency support has improved, including modification packages for remote apps.
A migration script is available to move existing MSIX app attach application packages to the new architecture.
We’re excited about these new features and recommend that any new app attach object be created using the new flow.
Now let’s look at these new capabilities:
Learn more and share your thoughts
You can learn more about the new app attach features and Azure Virtual Desktop by visiting our Azure Virtual Desktop documentation pages. We’d love to hear your thoughts. Please leave a comment below!
Continue the conversation. Find best practices. Bookmark the Azure Virtual Desktop Tech Community, then follow us @MSWindowsITPro on X/Twitter. Looking for support? Visit Windows on Microsoft Q&A.
Microsoft Tech Community – Latest Blogs –Read More