Category: Microsoft
Category Archives: Microsoft
Sync button on specific folder is gone.
Hi,
I received complaint from users that the sync button when selecting specific folder is gone. I’ve tried it on my end and confirmed that there are some changes in the UI of onedrive.
Is there something we can do to set it back where the sync button for specific folder is appearing?
I’m aware that there’s a sync button on the gear icon(settings).
Thank you.
Hi, I received complaint from users that the sync button when selecting specific folder is gone. I’ve tried it on my end and confirmed that there are some changes in the UI of onedrive. Is there something we can do to set it back where the sync button for specific folder is appearing? I’m aware that there’s a sync button on the gear icon(settings). Thank you. Read More
Copilot unable to change word document content?
I just purchased the first license for my organisation and am trialing it after reviewing the Microsoft promo material. The promo material had it writing copy, formating and inserting images and all sorts of stuff.
I purchased a license mainly because we burn a lot of time in my company doing something I would thought would be simple for Copilot, fixing document styles and formatting. We write a lot of documents for clients using their templates and this often means we’re merging content from our own internal records into client templates. So I was planning on using Copilot to fix styles after inserting content instead of a person spending hours making sure everything in perfect.
The very first document I try this on, I get the following message when I asked it to “Apply consistent styles and formatting to the entire document” (and this came up as pre-filled selection option after copying and pasting suggesting it’s capable of this):
“As Microsoft 365 Copilot, my role is to assist you within the chat interface by providing information, guidance, and support. I’m here to help you with tasks such as summarizing documents, generating content, and answering questions based on the information available to me. However, I don’t have the capability to directly edit or change documents. If you need assistance with formatting or editing your document, I can guide you through the steps or provide tips on how to achieve your desired outcome. Feel free to ask for any help you need with your document!”
What on earth?? Is this for real, it’s the whole reason that I forked out for this overpriced chatbot.
Please tell me i’ve done something wrong with the configuration?
I just purchased the first license for my organisation and am trialing it after reviewing the Microsoft promo material. The promo material had it writing copy, formating and inserting images and all sorts of stuff.I purchased a license mainly because we burn a lot of time in my company doing something I would thought would be simple for Copilot, fixing document styles and formatting. We write a lot of documents for clients using their templates and this often means we’re merging content from our own internal records into client templates. So I was planning on using Copilot to fix styles after inserting content instead of a person spending hours making sure everything in perfect.The very first document I try this on, I get the following message when I asked it to “Apply consistent styles and formatting to the entire document” (and this came up as pre-filled selection option after copying and pasting suggesting it’s capable of this): “As Microsoft 365 Copilot, my role is to assist you within the chat interface by providing information, guidance, and support. I’m here to help you with tasks such as summarizing documents, generating content, and answering questions based on the information available to me. However, I don’t have the capability to directly edit or change documents. If you need assistance with formatting or editing your document, I can guide you through the steps or provide tips on how to achieve your desired outcome. Feel free to ask for any help you need with your document!” What on earth?? Is this for real, it’s the whole reason that I forked out for this overpriced chatbot. Please tell me i’ve done something wrong with the configuration? Read More
Excel Formula References Changing When I Insert a Row
Hello,
I have multiple excel workbooks, where if I insert a row, it stuffs up my formula references (i.e. formulas start referencing the wrong cells) even though I haven’t changed the formula. The rows are not even referenced by the formula indirectly (i.e. it is not part of an array in a SUMPRODUCT).
This never used to happen, and has only started occurring in the past week or so.
Any help would be much appreciated.
Hello, I have multiple excel workbooks, where if I insert a row, it stuffs up my formula references (i.e. formulas start referencing the wrong cells) even though I haven’t changed the formula. The rows are not even referenced by the formula indirectly (i.e. it is not part of an array in a SUMPRODUCT). This never used to happen, and has only started occurring in the past week or so. Any help would be much appreciated. Read More
Update Cover Photo missing for storylines
Has anyone encountered a client environment where they cannot see the “Update Cover Photo” button when each individual visits their personal storyline (but community admins do see it for their respective communities)
See screenshot below. Is this setting controllable from somewhere in Viva Engage Admin area or are their impacts from settings chosen elsewhere in the M365 tenant that flow through to Viva Engage?
I’d like to know: 1. If anyone else has encountered this 2. If anyone knows what the fix is
Has anyone encountered a client environment where they cannot see the “Update Cover Photo” button when each individual visits their personal storyline (but community admins do see it for their respective communities) See screenshot below. Is this setting controllable from somewhere in Viva Engage Admin area or are their impacts from settings chosen elsewhere in the M365 tenant that flow through to Viva Engage? I’d like to know: 1. If anyone else has encountered this 2. If anyone knows what the fix is Read More
Microsoft Defender for Endpoint features
Hi,
I’d like to know if Microsoft Defender for Endpoint has the following capabilities?
Features:
Anti-malware
MITRE Ingenuity ATT&CK Evaluation
Ransomware Protection and Rollback
Behavior Monitoring and Machine Learning
Single management console
Incident response automation
Targeted attack detection
Enhanced Tamper Protection
Suspicious Behavior Detection
Advanced Deep Learning mechanism
Threat Hunting
Endpoint Isolation
Malicious Traffic Detection
Threat Protection:
Mitigate exploits in vulnerable applications
Application hijacking
Real-time scanning of internet resources
Real-time scanning of local files and network shares
Atomically submit malware samples
If you could share a documentation where I can see these features, I will truly appreciate it.
Thank you,
Vsp
Hi, I’d like to know if Microsoft Defender for Endpoint has the following capabilities? Features:Anti-malwareMITRE Ingenuity ATT&CK EvaluationRansomware Protection and RollbackBehavior Monitoring and Machine LearningSingle management consoleIncident response automationTargeted attack detectionEnhanced Tamper ProtectionSuspicious Behavior DetectionAdvanced Deep Learning mechanismThreat HuntingEndpoint IsolationMalicious Traffic Detection Threat Protection:Mitigate exploits in vulnerable applicationsApplication hijackingReal-time scanning of internet resourcesReal-time scanning of local files and network sharesAtomically submit malware samples If you could share a documentation where I can see these features, I will truly appreciate it. Thank you,Vsp Read More
Threat analytics reports from Microsoft 365 Defender
Did anyone else get bombarded by 30+ threat analytics report emails from Microsoft 365 Defender just last night? I’m seeing some as old as October 2023.
Did anyone else get bombarded by 30+ threat analytics report emails from Microsoft 365 Defender just last night? I’m seeing some as old as October 2023. Read More
Need to use SPO Service Online Powershell Module without credentials-based login for an Automation
I need to access the Sharepoint Admin Center via a Powershell Runbook through a Power Automate flow in order to perform hourly checks on Site Storage Usage in Sharepoint. I have a runbook that currently gets this data on a folder-basis with the PnP Module, but i’m unsure if this will work for this issue. My assumption is that i’ll need to use the SPO Service module, but it requires credentials-based login with administrative access. Is there a way to circumvent this?
I need to access the Sharepoint Admin Center via a Powershell Runbook through a Power Automate flow in order to perform hourly checks on Site Storage Usage in Sharepoint. I have a runbook that currently gets this data on a folder-basis with the PnP Module, but i’m unsure if this will work for this issue. My assumption is that i’ll need to use the SPO Service module, but it requires credentials-based login with administrative access. Is there a way to circumvent this? Read More
Unable to set up Webinar invite from a Group Team calendar
Hi all,
Hoping you can help. We have a Team site and calendar set up for our WIT (Women in Tech) in our organisation. We want to set up 3 webinars in July for people to register for but have noticed that the only option to set up a webinar has to come from the Calendar icon in Teams which automatically reverts to the personal calendar of the person sending the invite and not the WIT calendar as the sender.
This would look odd when recieving the registration from a person and not WIT. It also would make editing the invite hard as even the co-organisers are limited as they are not the person sending the invite so making co-organizers ability void then. Anyone have a solution so the invite sender can be the WIT calendar. I know it can be done for Teams meetings, but we want to have it as a webinar though. Thanks in advance for any help you can give on this query.
Hi all, Hoping you can help. We have a Team site and calendar set up for our WIT (Women in Tech) in our organisation. We want to set up 3 webinars in July for people to register for but have noticed that the only option to set up a webinar has to come from the Calendar icon in Teams which automatically reverts to the personal calendar of the person sending the invite and not the WIT calendar as the sender. This would look odd when recieving the registration from a person and not WIT. It also would make editing the invite hard as even the co-organisers are limited as they are not the person sending the invite so making co-organizers ability void then. Anyone have a solution so the invite sender can be the WIT calendar. I know it can be done for Teams meetings, but we want to have it as a webinar though. Thanks in advance for any help you can give on this query. Read More
Training Materials (Microsoft Learn courses) Missing for MB500
It seems like something removed the Microsoft Learn videos associated with the MB-500 exam: https://learn.microsoft.com/en-us/credentials/certifications/d365-finance-and-operations-apps-developer-associate/?practice-assessment-type=certification#certification-prepare-for-the-exam
The Learn courses are still visible through an internet archive, albeit have a year out of date, but I was wondering whether this removal was accidental or an indication that the training material has been deprecated and new Learn courses will be added.
It seems like something removed the Microsoft Learn videos associated with the MB-500 exam: https://learn.microsoft.com/en-us/credentials/certifications/d365-finance-and-operations-apps-developer-associate/?practice-assessment-type=certification#certification-prepare-for-the-exam The Learn courses are still visible through an internet archive, albeit have a year out of date, but I was wondering whether this removal was accidental or an indication that the training material has been deprecated and new Learn courses will be added. Read More
Cumulative Update #27 for SQL Server 2019 RTM
The 27th cumulative update release for SQL Server 2019 RTM is now available for download at the Microsoft Downloads site. Please note that registration is no longer required to download Cumulative updates.
To learn more about the release or servicing model, please visit:
CU27 KB Article: https://learn.microsoft.com/troubleshoot/sql/releases/sqlserver-2019/cumulativeupdate27
Starting with SQL Server 2017, we adopted a new modern servicing model. Please refer to our blog for more details on Modern Servicing Model for SQL Server
Microsoft® SQL Server® 2019 RTM Latest Cumulative Update: https://www.microsoft.com/download/details.aspx?id=100809
Update Center for Microsoft SQL Server: https://learn.microsoft.com/en-us/troubleshoot/sql/releases/download-and-install-latest-updates
Microsoft Tech Community – Latest Blogs –Read More
New Blog | Detect suspicious processes running on hidden desktops
By Saar Cohen
With ransomware campaigns continuing to grow, they remain top of mind for security leaders. Across these sophisticated cyberattacks, the use of remote desktop protocol (RDP) compromise has reached record levels, making it even more critical to provide analysts with full visibility into potentially malicious RDP session use.
That’s why today we are excited to announce a new way to identify potentially compromised devices in your organization via the new ‘DesktopName’ field in Defender for Endpoint, which enables analysts to easily detect, investigate, and hunt for suspicious interactive process executed on so called ‘hidden desktops’.
The importance to RDP
A remote desktop session over RDP (Remote Desktop Protocol) provides users with access to connect remotely to endpoints and is often leveraged as the entry point for attackers to access a target machine. RDP however, introduces some undesirable disadvantages for the attacker.
For example, Windows by default only allows for a single remote RDP session which can cause detectable friction as both the legitimate user and the attacker begin vying for interactivity on the same device. To mitigate this, attackers may opt for other Remote Monitoring and Management (RMM) approaches as described in the examples below.
Read the full post here: Detect suspicious processes running on hidden desktops
By Saar Cohen
With ransomware campaigns continuing to grow, they remain top of mind for security leaders. Across these sophisticated cyberattacks, the use of remote desktop protocol (RDP) compromise has reached record levels, making it even more critical to provide analysts with full visibility into potentially malicious RDP session use.
That’s why today we are excited to announce a new way to identify potentially compromised devices in your organization via the new ‘DesktopName’ field in Defender for Endpoint, which enables analysts to easily detect, investigate, and hunt for suspicious interactive process executed on so called ‘hidden desktops’.
The importance to RDP A remote desktop session over RDP (Remote Desktop Protocol) provides users with access to connect remotely to endpoints and is often leveraged as the entry point for attackers to access a target machine. RDP however, introduces some undesirable disadvantages for the attacker. For example, Windows by default only allows for a single remote RDP session which can cause detectable friction as both the legitimate user and the attacker begin vying for interactivity on the same device. To mitigate this, attackers may opt for other Remote Monitoring and Management (RMM) approaches as described in the examples below.
Read the full post here: Detect suspicious processes running on hidden desktops Read More
Flattening nested JSON values in a dataflow with varying keys.
We are using Azrue DevOps REST API calls to return JSON files and storing them in blob. Then we perform a dataflow to transform the data. The issue is a portion of the JSON being stored in blob has varying keys.
When we specify the columns to map in a Select action, we are selecting specifically one of the varying keys from a list of options. But need to map ALL of these – we cannot manually specify these because the data source is so large.
We cannot implement a standard name for this section of the JSON. A wildcard for { } would work ideally but is not supported. We do not care what the keys are, just the contents (id, name).
Select Action:
Source Column:
resources.pipelines.{src-release}.pipeline.id
resources.pipelines.{src-release}.pipeline.name
resources.pipelines.{build }.pipeline.id
resources.pipelines.{build }.pipeline.name
Mapping Name as:
‘pipelineID’
‘pipelineName’
Below is a JSON snippet which highlights the key from the source JSON
Example of Select action mapping – each key shows as its own dropdown:
We are using Azrue DevOps REST API calls to return JSON files and storing them in blob. Then we perform a dataflow to transform the data. The issue is a portion of the JSON being stored in blob has varying keys. When we specify the columns to map in a Select action, we are selecting specifically one of the varying keys from a list of options. But need to map ALL of these – we cannot manually specify these because the data source is so large. We cannot implement a standard name for this section of the JSON. A wildcard for { } would work ideally but is not supported. We do not care what the keys are, just the contents (id, name). Select Action:Source Column:resources.pipelines.{src-release}.pipeline.idresources.pipelines.{src-release}.pipeline.nameresources.pipelines.{build }.pipeline.idresources.pipelines.{build }.pipeline.name Mapping Name as:‘pipelineID’‘pipelineName’Below is a JSON snippet which highlights the key from the source JSON Example of Select action mapping – each key shows as its own dropdown: Read More
Can’t upload excel file
I created a portfolio project through excel (the big picture). I have a google site as my portfolio website. my issue is I can’t upload the excel file I had to convert it into google sheets (the small picture at the bottom). The middle picture is google sheets which doesn’t display my dashboard. If anyone can assist me with this issue I’ll be more than grateful for the help. I have 2 more projects I want to add but
I created a portfolio project through excel (the big picture). I have a google site as my portfolio website. my issue is I can’t upload the excel file I had to convert it into google sheets (the small picture at the bottom). The middle picture is google sheets which doesn’t display my dashboard. If anyone can assist me with this issue I’ll be more than grateful for the help. I have 2 more projects I want to add but Read More
Windows 22631.3737 or 22631.3807 Block file protection when copying/pasting files on a network drive
It works normally in 22631.3672
but after updating Windows 22631.3737 or 22631.3807, if you copy a file from a network drive and paste it to a local drive, an issue occurs where file protection is blocked.
It works normally in 22631.3672but after updating Windows 22631.3737 or 22631.3807, if you copy a file from a network drive and paste it to a local drive, an issue occurs where file protection is blocked. Read More
Count across other files
Member IDActive1Y2N3Y4N
N6N
Member IDActive1N2N3Y4Y
Y6N
I have 12 spreadsheets for gym membership, one for each month and each one contains a table showing whether a member is active or not in that month. Example below for September. Member IDActive1Y2N3Y4N5N6N The next month, October the table might look like this: Member IDActive1N2N3Y4Y5Y6N That would mean that MemberID 1,3,4 and 5 would have been active, ie a count of 4. What’s the best way of creating a count for “The number of members active in the last 6 months”? So in October I would need to find this count using data from the Oct, Sep, Aug, Jul, Jun and May files. Thanks Read More
New Blog | A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door
By David Frazee
The Azure Web Application Firewall (WAF) on Azure Front Door offers centralized protection for your web applications against vulnerabilities and threats. The effectiveness of your Azure WAF in managing traffic can be assessed through WAF logs stored in specified locations such as a Log Analytics Workspace or Storage Accounts. These logs document requests that have been either matched or blocked by WAF rules. This data is crucial for monitoring, auditing, and resolving issues. By default, WAF logs are maintained in a plain text format for user convenience and analysis. However, these client requests might include sensitive personal data, like personally identifiable information (PII), which can include names, addresses, contact details, and financial information. Without proper sanitization, logs containing such PII could be exposed to unauthorized access. To address this, Azure Front Door WAF now offers sensitive data protection through log scrubbing. WAF log scrubbing employs a customizable rules engine to pinpoint and redact sensitive portions within the requests, replacing them with a series of asterisks (******) to prevent data exposure. This blog will explains the log scrubbing process and provides practical examples for a more comprehensive understanding.
Log Scrubbing
The Azure Front Door WAF’s sensitive data protection feature using log scrubbing is compatible with all WAF policy rule sets including Default Rule Set (DRS), Bot Manager Ruleset, and any Custom rules. It utilizes a range of match variables, such as client IP, headers, cookies, and request arguments, to identify data for scrubbing. Rule creation involves selecting a match variable, an operator, and defining a selector, which determines the specific key to be cleansed from the logs. Take a simple login process, which generally involves username and password fields; these are two distinct keys that can be targeted as selectors. Should a dubious login attempt activate the WAF, it records the username and password if they contain the suspect string or code injection. The log scrubber then anonymizes these details, obscuring the malicious content while preserving the attack’s characteristics and significantly reducing the risk of personal data exposure.
See below for the full list of Match Variables:
Match Variable
Operator
Selector
Request IP Address
Equals any
<None>
Request URI
Equals any
<None>
Request Header Names
Equals/Equals any
<Custom>
Request Cookie Names
Equals/Equals any
<Custom>
Request Body Post Arg Names
Equals/Equals any
<Custom>
Request Body Json Arg Names
Equals/Equals any
<Custom>
Query String Arg Names
Equals/Equals any
<Custom>
Request IP, Request URI & Request Header
In our initial scenario, we examine the log scrubbing engine’s capability to conceal the requester’s IP address, the request URI, and the User-Agent that activated the WAF rule. In this example, the User-Agent is a carrier for a SQL injection string within the User-Agent key’s value. The log scrubbing rules are configured so that the selector targets User-Agent within the Request Header Names, ensuring every User-Agent occurrence, including the embedded SQL injection string, is cleansed from the WAF logs. This scenario serves as an example on how to write log scrubbing rules to cleanse potentially sensitive values. It is best practice to specify only those values that contain potential personally identifiable information (PII) or other sensitive data, rather than generic request headers like User-Agent.
Read the full post here: A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door
By David Frazee
The Azure Web Application Firewall (WAF) on Azure Front Door offers centralized protection for your web applications against vulnerabilities and threats. The effectiveness of your Azure WAF in managing traffic can be assessed through WAF logs stored in specified locations such as a Log Analytics Workspace or Storage Accounts. These logs document requests that have been either matched or blocked by WAF rules. This data is crucial for monitoring, auditing, and resolving issues. By default, WAF logs are maintained in a plain text format for user convenience and analysis. However, these client requests might include sensitive personal data, like personally identifiable information (PII), which can include names, addresses, contact details, and financial information. Without proper sanitization, logs containing such PII could be exposed to unauthorized access. To address this, Azure Front Door WAF now offers sensitive data protection through log scrubbing. WAF log scrubbing employs a customizable rules engine to pinpoint and redact sensitive portions within the requests, replacing them with a series of asterisks (******) to prevent data exposure. This blog will explains the log scrubbing process and provides practical examples for a more comprehensive understanding.
Log Scrubbing
The Azure Front Door WAF’s sensitive data protection feature using log scrubbing is compatible with all WAF policy rule sets including Default Rule Set (DRS), Bot Manager Ruleset, and any Custom rules. It utilizes a range of match variables, such as client IP, headers, cookies, and request arguments, to identify data for scrubbing. Rule creation involves selecting a match variable, an operator, and defining a selector, which determines the specific key to be cleansed from the logs. Take a simple login process, which generally involves username and password fields; these are two distinct keys that can be targeted as selectors. Should a dubious login attempt activate the WAF, it records the username and password if they contain the suspect string or code injection. The log scrubber then anonymizes these details, obscuring the malicious content while preserving the attack’s characteristics and significantly reducing the risk of personal data exposure.
See below for the full list of Match Variables:
Match Variable
Operator
Selector
Request IP Address
Equals any
<None>
Request URI
Equals any
<None>
Request Header Names
Equals/Equals any
<Custom>
Request Cookie Names
Equals/Equals any
<Custom>
Request Body Post Arg Names
Equals/Equals any
<Custom>
Request Body Json Arg Names
Equals/Equals any
<Custom>
Query String Arg Names
Equals/Equals any
<Custom>
Request IP, Request URI & Request Header
In our initial scenario, we examine the log scrubbing engine’s capability to conceal the requester’s IP address, the request URI, and the User-Agent that activated the WAF rule. In this example, the User-Agent is a carrier for a SQL injection string within the User-Agent key’s value. The log scrubbing rules are configured so that the selector targets User-Agent within the Request Header Names, ensuring every User-Agent occurrence, including the embedded SQL injection string, is cleansed from the WAF logs. This scenario serves as an example on how to write log scrubbing rules to cleanse potentially sensitive values. It is best practice to specify only those values that contain potential personally identifiable information (PII) or other sensitive data, rather than generic request headers like User-Agent.
Read the full post here: A Closer Look at Azure WAF’s Data Masking Capabilities for Azure Front Door Read More
Technical Pattern: Build Your Own AI Assistant
Microsoft Tech Community – Latest Blogs –Read More
Error with Get Data from web function in Excel
Hello Microsoft Community,
I am having an issue with the get data from web function in excel. I am trying to pull data from webpages, it is this one (https://u.gg/lol/champions/ezreal/duos) if that helps. When I attempt to pull data from this website, it returns the error at the navigator page that “The current preview value is too complex to display.” and does not allow me to continue with pulling the data. Is there some way to bypass this or a setting I can change to decrease the chance this appears? I am relatively new to using Excel for processes such as these.
Thank you and all the best.
Hello Microsoft Community,I am having an issue with the get data from web function in excel. I am trying to pull data from webpages, it is this one (https://u.gg/lol/champions/ezreal/duos) if that helps. When I attempt to pull data from this website, it returns the error at the navigator page that “The current preview value is too complex to display.” and does not allow me to continue with pulling the data. Is there some way to bypass this or a setting I can change to decrease the chance this appears? I am relatively new to using Excel for processes such as these. Thank you and all the best. Read More
Customize the sharepoint pages to radio-type buttons and add user name
Hey everyone!
I am currently working on our SharePoint communication site to have a series of landing pages and display the name of the user on the page like show in the screenshot below. However, i am struggling to get the same outcome and all solutions that i see use third-party apps. I hope someone here with the expertise can help in this crucial work. I will appreciate any help and suggestions. Thank you.
Hey everyone!I am currently working on our SharePoint communication site to have a series of landing pages and display the name of the user on the page like show in the screenshot below. However, i am struggling to get the same outcome and all solutions that i see use third-party apps. I hope someone here with the expertise can help in this crucial work. I will appreciate any help and suggestions. Thank you. Read More
Print formulas in spreadsheet
Is there any way to print a spreadsheet showing only the formulas?
Thanks,
NYCowgirl
Is there any way to print a spreadsheet showing only the formulas? Thanks,NYCowgirl Read More