Category: Microsoft
Category Archives: Microsoft
GPO – MSI Application Deployment File Share Permissions
Hello-
How can I configure permissions on my MSI application deployment share so that I can deploy applications via GPO, but also deny users any access to the MFT files (or the entire share). There is sensitive information in these MFT files, and I don’t want end users to access them. I know could hide$ the share, but I’d prefer to lock it down if possible.
Thank you!
Hello- How can I configure permissions on my MSI application deployment share so that I can deploy applications via GPO, but also deny users any access to the MFT files (or the entire share). There is sensitive information in these MFT files, and I don’t want end users to access them. I know could hide$ the share, but I’d prefer to lock it down if possible. Thank you! Read More
Planner: Copy a plan to a premium plan
When you use the trial feature for premium plans you can promote a plan to be a premium plan a.k.a. Project for the web project, to get the additional features of timelines, goals, Copilot and more! This feature will also be coming to new Planner for all basic plans, but probably not until the summer 2024. For now, there is a work around using a specific Url with the Plan ID of the basic plan added – then the magic happens, and you get a premium plan (some limitations apply – see the docs linked below).
A basic Planner plan you a board view and a grid view, and some charts, but if you need more then time to look at making a premium plan from it.
The workaround until the in-app feature becomes available is to craft a Url that starts with your Project for the web Url, including locale and tenant, adds some specific parameters and adds on the plan id. It will look something like this:
https://project.microsoft.com/<your tenant name>.onmicrosoft.com/en-US#/hubnew?importPlanId=<your Plan ID>
Hopefully you know your tenant name, or just navigate to project.microsoft.com and it should complete the Url up to the locale part (en-US in the able example) once you have signed in. To this you add the #/hubnew?importPlanId= part and then the plan id. It isn’t easy to find the plan id in Teams (but if you know your way around F12 Dev Tools you can find it) but easier to just look for your plan at tasks.office.com and open it – then the Url will contain your plan id. In my case the Url in Planner is:
https://tasks.office.com/brismith.onmicrosoft.com/en-US/Home/Planner/#/plantaskboard?groupId=d132c3ce-e77b-7bfc-a703-3aceaed05a37&planId=q_E7IvbSGkCD1f537UPBUGUADys7
and the final part is the plan id – after planId= – so q_E7IvbSGkCD1f537UPBUGUADys7
Adding this to the project Url and the parameter part gives me a full Url of:
https://project.microsoft.com/brismith.onmicrosoft.com/en-US#/hubnew?importPlanId=q_E7IvbSGkCD1f537UPBUGUADys7
Once I have this, I can paste it into my browser, log in if I don’t already have an active session, then the magic starts!
After a short while you will see this screen briefly:
then you will see the background change to your new premium plan and the dialog changes to:
Be sure to review the document – the “Learn more” link goes to this article https://prod.support.services.microsoft.com/en-us/office/import-a-plan-into-a-project-for-the-web-016f9e4d-28c6-4f61-a1b1-82187185977d and probably the most important section relates to the task limits. Only 950 tasks will be imported into your premium plan. See the other sections too to be sure you get what you need:
But that’s it. Hopefully that will help until the UI has an option to import basic Planner plans to the premium experience so you can then use all of the extra features of premium plans:
and use it in new Planner too – under My Plans:
Any questions – add them below and I’ll get back to you.
Microsoft Tech Community – Latest Blogs –Read More
New Blog | Navigating New Application Security Challenges Posed By GenAI
By Asaf Harari
GenAI applications—software powered by large language models (LLMs) are changing the way we interact with digital platforms. These advanced applications are designed to understand, interpret, and generate human-like text, code and various forms of media, making our digital experiences more seamless and personalized than ever before. With the increasing availability of LLMs, we can expect to see even more innovative applications of this technology in the future. However, it is important to carefully consider the potential security challenges related to GenAI applications and the underline LLM.
While security challenges in machine learning models have been studied for some time, such as the potential for adversarial attacks where input data can be manipulated to mislead the model. However, challenges specific to LLMs are still relatively unexplored and pose a blind spot for researchers and practitioners. LLMs are distinct from other software tools and machine learning elements in terms of their functionality, the way GenAI applications employ them, and the way users engage with them. For these reasons, for the development and use of GenAI applications, it’s crucial to implement GenAI security best practices, Zero Trust architecture, posture management solutions, and conduct red team exercises. Microsoft is at the forefront of not only deploying GenAI applications but also ensuring the security of these applications, their related data, and their users.
In this blog post, we will review the unique cybersecurity challenges that GenAI apps and the underline LLMs pose according to their special behavior, their unique use, and their interaction with the users.
Read the full post here: Navigating New Application Security Challenges Posed By GenAI
By Asaf Harari
GenAI applications—software powered by large language models (LLMs) are changing the way we interact with digital platforms. These advanced applications are designed to understand, interpret, and generate human-like text, code and various forms of media, making our digital experiences more seamless and personalized than ever before. With the increasing availability of LLMs, we can expect to see even more innovative applications of this technology in the future. However, it is important to carefully consider the potential security challenges related to GenAI applications and the underline LLM.
While security challenges in machine learning models have been studied for some time, such as the potential for adversarial attacks where input data can be manipulated to mislead the model. However, challenges specific to LLMs are still relatively unexplored and pose a blind spot for researchers and practitioners. LLMs are distinct from other software tools and machine learning elements in terms of their functionality, the way GenAI applications employ them, and the way users engage with them. For these reasons, for the development and use of GenAI applications, it’s crucial to implement GenAI security best practices, Zero Trust architecture, posture management solutions, and conduct red team exercises. Microsoft is at the forefront of not only deploying GenAI applications but also ensuring the security of these applications, their related data, and their users.
In this blog post, we will review the unique cybersecurity challenges that GenAI apps and the underline LLMs pose according to their special behavior, their unique use, and their interaction with the users.
Read the full post here: Navigating New Application Security Challenges Posed By GenAI
Adding a field parameter fields to TopN visual filter pane
I have created a field parameter table as below:
I have used above field parameter in below visual x-axis:
Now its working well! But I want to filter this visual for TopN values as shown below based on parameter table fields column as shown below:
But when i drag this field parameter column in filter this visual pane ‘By value’ it shows First Parameter and it doesn’t aggregate.
I am confused how to filter visual by the top 20 ‘Name’ column by variance Field parameter fields column.
Can you please help us with this?
PFA file here Portfolio Performance – v2.12 – Copy.pbix
Thanks in advance!
Hi @Sergei Baklan I have created a field parameter table as below: I have used above field parameter in below visual x-axis: Now its working well! But I want to filter this visual for TopN values as shown below based on parameter table fields column as shown below: But when i drag this field parameter column in filter this visual pane ‘By value’ it shows First Parameter and it doesn’t aggregate.I am confused how to filter visual by the top 20 ‘Name’ column by variance Field parameter fields column. Can you please help us with this? PFA file here Portfolio Performance – v2.12 – Copy.pbix Thanks in advance! Read More
LSASS Memory Dump Handle Access – poqexec.exe ?
We are seeing SIEM alerts for LSASS Memory Dump Handle Access for the ‘C:WindowsSystem32poqexec.exe’ process (Primitive Operations Queue Executor) on several endpoints with the computer account name.
However, Defender for Endpoint is not picking this up as an alert, nor is the process listed in the device’s timeline.
We are seeing SIEM alerts for LSASS Memory Dump Handle Access for the ‘C:WindowsSystem32poqexec.exe’ process (Primitive Operations Queue Executor) on several endpoints with the computer account name. However, Defender for Endpoint is not picking this up as an alert, nor is the process listed in the device’s timeline.I am not finding much online about poqexec.exe and possible interaction with LSASS and I was hoping to get some insight here.Anyone see this before and can help me validate the behavior? Event/log details:message: “A handle to an object was requested.Subject:Security ID: S-1-5-18Account Name: <computerAccount$>Account Domain: <ourDomain>Object:Object Server: SecurityObject Type: FileObject Name: C:WindowsSystem32lsass.exeHandle ID: 0x70Resource Attributes: -Process Information:Process ID: 0x6fcProcess Name: C:WindowsSystem32poqexec.exeAccess Request Information:Transaction ID: {2801ddbe-0b5e-11ef-9edb-4c3488257915}Accesses: DELETEREAD_CONTROLWRITE_DACWRITE_OWNERSYNCHRONIZEReadData (or ListDirectory)ReadEAReadAttributesWriteAttributesAccess Reasons: -Access Mask: 0x1F0189Privileges Used for Access Check: SeBackupPrivilegeSeRestorePrivilegeRestricted SID Count: 0” Read More
REGISTER TODAY: Monthly Azure Nonprofit Office Hours | May – June
Hello Partners,
If you missed our April Azure Office Hours, view the sessions on-demand:
April 2024 Nonprofit Open Azure Office Hours | Watch Now
Join us for these upcoming sessions!
May 29, 2024
8:00am – 9:00am PST | Register Here
4:00pm – 5:00pm PST | Register Here
June 20, 2024
8:00am – 9:00am PST | Register Here
4:00pm – 5:00pm PST | Register Here
Please come prepared with questions!
Hello Partners,
If you missed our April Azure Office Hours, view the sessions on-demand:
April 2024 Nonprofit Open Azure Office Hours | Watch Now
Join us for these upcoming sessions!
May 29, 2024
8:00am – 9:00am PST | Register Here
4:00pm – 5:00pm PST | Register Here
June 20, 2024
8:00am – 9:00am PST | Register Here
4:00pm – 5:00pm PST | Register Here
Please come prepared with questions! Read More
What did you learn at Impact Summit in NYC? Explore – Adapt – Adopt!
On May 8, nonprofit innovators gathered in NYC to learn about transformation across the nonprofit world – and how tools like AI can support growth and capacity.
If you attended the session “Redefining productivity for nonprofits with AI” with Devi Thomas and Brandonlon Bartlett, tell what you thought! What takeaways and insights did you get from the table discussions based on the Explore-Adapt-Adopt frameworks?
Watch for the virtual Impact Summit coming on May 15 – and keep the conversation going here!
On May 8, nonprofit innovators gathered in NYC to learn about transformation across the nonprofit world – and how tools like AI can support growth and capacity.
If you attended the session “Redefining productivity for nonprofits with AI” with Devi Thomas and Brandonlon Bartlett, tell what you thought! What takeaways and insights did you get from the table discussions based on the Explore-Adapt-Adopt frameworks?
Watch for the virtual Impact Summit coming on May 15 – and keep the conversation going here! Read More
Each desktop needs it’s own taskbar
I am dumbfounded about why you can have multiple desktops but only one taskbar? It makes it pointless in my view.
Please at least ensure that only windows opened from a particular desktop are shown in the taskbar for that desktop. But a completely customized taskbar per desktop would be even better.
I am dumbfounded about why you can have multiple desktops but only one taskbar? It makes it pointless in my view. Please at least ensure that only windows opened from a particular desktop are shown in the taskbar for that desktop. But a completely customized taskbar per desktop would be even better. Read More
Defender Firewall rules – Event ID 2001
In my organization, we’re moving away from Trellix suite to MDE. All of my policies (DLP, AV, Exclusions, etc…) are working, but not the Firewall general settings nor the Firewall Rules. Defender portal indicates that the Firewall settings policy was successful, but the rules are not. Our workstations are hybrid-joined, but managed by SCCM/MDE. When I look at the Event View for SENSE (channel Microsoft-Windows-SENSE/Operational) related events, I get an event ID 2001, and the info is: SenseCM: WRN: FW VA: no rule TESTING POLICY
The rule TESTING POLICY exists in my Defender portal, under Endpoint security policies, so it seems like my test workstation can see that policy, but it doesn’t get applied, and also the Firewall settings don’t get applied, as it doesn’t appear to change the default block/allow for Outbound or Inbound for each of the Firewall profile (Public, Private, Domain).
Anything suggestion will be appreciated.
In my organization, we’re moving away from Trellix suite to MDE. All of my policies (DLP, AV, Exclusions, etc…) are working, but not the Firewall general settings nor the Firewall Rules. Defender portal indicates that the Firewall settings policy was successful, but the rules are not. Our workstations are hybrid-joined, but managed by SCCM/MDE. When I look at the Event View for SENSE (channel Microsoft-Windows-SENSE/Operational) related events, I get an event ID 2001, and the info is: SenseCM: WRN: FW VA: no rule TESTING POLICY The rule TESTING POLICY exists in my Defender portal, under Endpoint security policies, so it seems like my test workstation can see that policy, but it doesn’t get applied, and also the Firewall settings don’t get applied, as it doesn’t appear to change the default block/allow for Outbound or Inbound for each of the Firewall profile (Public, Private, Domain). Anything suggestion will be appreciated. Read More
Partner Blog | How Microsoft Copilot and ServiceNow Now Assist enhance employee & IT admin choice
As Microsoft works to enable AI at the enterprise level, our focus is on building sophisticated productivity tools that integrate with our ecosystem of partners. For example, during last year’s Microsoft Ignite conference, we provided an early preview of how ServiceNow’s integration with Microsoft Copilot would bring generative AI capabilities to IT and employee experiences. I recently had the pleasure of joining ServiceNow’s President and Chief Operating Officer CJ Desai on stage at the company’s marquee event, Knowledge 2024 in Las Vegas, to unveil three compelling scenarios that fulfill the promise of Copilot and Now Assist, ServiceNow’s generative AI experience.
Now Assist AI delivers direct, relevant, and conversational responses to employee requests, and connects exchanges to AI-powered workflows on ServiceNow’s platform to take actions on behalf of the employee. I’ll share more on how we’ve integrated Copilot and Now Assist to supercharge the workforce using the scenarios from Knowledge 2024, but first let’s discuss the extensibility model used by ServiceNow for the integration.
There are various ways to extend Copilot, which provide the starting point for partners looking to harness AI and bring Copilot capabilities to your apps. We are also working on a new approach to extensibility that makes it possible for independent software vendors (ISVs) to bring their own generative AI technologies into Copilot experiences and hand off users to their own third-party copilots, ensuring user experiences and workflows are streamlined. ServiceNow is taking advantage of this new option by allowing users to execute ServiceNow workflows via Now Assist to improve employee productivity and deliver an improved experience.
Continue reading here
Microsoft Tech Community – Latest Blogs –Read More
Single-region deployment using Secure Virtual WAN Hub with Routing-Intent and Global Reach
This article describes the best practices for connectivity, traffic flows, and high availability of single-region Azure VMware Solution when using Azure Secure Virtual WAN with Routing Intent. You will learn the design details of using Secure Virtual WAN with Routing-Intent, when using Global Reach. This article breaks down Virtual WAN with Routing Intent topology from the perspective of an Azure VMware Solution private cloud, on-premises sites, and Azure native. The implementation and configuration of Secure Virtual WAN with Routing Intent are beyond the scope and aren’t discussed in this document.
Secure Virtual WAN with Routing Intent is only supported with Virtual WAN Standard SKU. Secure Virtual WAN with Routing Intent provides the capability to send all Internet traffic and Private network traffic to a security solution like Azure Firewall, a third-party Network Virtual Appliance (NVA), or SaaS solution. In the scenario, we have a single region network. There’s a Virtual WAN with one hub. The hub has an Azure Firewall deployed, essentially making it a Secure Virtual WAN hub. Having a Secure Virtual WAN hub is a technical prerequisite to Routing Intent. The Secure Virtual WAN hub has Routing Intent enabled.
Note
When configuring Azure VMware Solution with Secure Virtual WAN Hubs, ensure optimal routing results on the hub by setting the Hub Routing Preference option to “AS Path.” – see Virtual hub routing preference
The single region consists of its own Azure VMware Solution Private Cloud and an Azure Virtual Network. Additionally, there’s an on-premises site connecting back to the hub. Furthermore, Global Reach connectivity exists within the environment. Global Reach establishes a direct logical link via the Microsoft backbone, connecting Azure VMware Solution to on-premises. As shown in the diagram, Global Reach connections don’t transit the Hub firewall. So, Global Reach traffic between on-premises and Azure VMware Solution, and vice versa, remains uninspected.
Note
When utilizing Global Reach, consider enhancing security between Global Reach sites by inspecting traffic within the Azure VMware Solution environment’s NSX-T or an on-premises firewall.
Understanding Topology Connectivity
Connection
Description
Connections (D)
Azure VMware Solution private cloud managed ExpressRoute connection to the hub.
Connection (A)
Azure VMware Solution Global Reach connection back to on-premises.
Connections (E)
on-premises ExpressRoute connection to the hub.
The following sections cover traffic flows and connectivity for Azure VMware Solution, on-premises, Azure Virtual Networks, and the Internet.
This section focuses only on the Azure VMware Solution Cloud’s perspective. Azure VMware Solution private cloud has an ExpressRoute connection to its hub (connection labeled as “D”).
The Azure VMware Solution Cloud Region establishes a connection to on-premises via ExpressRoute Global Reach, depicted as Global Reach (A) in the diagram. It’s important to note that traffic via Global Reach doesn’t transit the Hub firewall.
Ensure that you explicitly configure Global Reach (A). It’s imperative to do this step to prevent connectivity issues between on-premises and Azure VMware Solution. For more information, see traffic flow section.
The diagram illustrates traffic flows from the perspective of the Azure VMware Solution Private Cloud.
Traffic Flow Chart
Traffic Flow Number
Source
Direction
Destination
Traffic Inspected on Secure Virtual WAN Hub firewall?
1
Azure VMware Solution Cloud
→
Virtual Network
Yes, traffic is inspected at the Hub firewall
2
Azure VMware Solution Cloud
→
on-premises
No, traffic bypasses firewall and transits Global Reach (A)
This section focuses only on the on-premises site. As shown in the diagram, the on-premises site has an ExpressRoute connection to the hub (connections labeled as “E”). On-premises systems can communicate to Azure VMware Solution via connection Global Reach (A).
Ensure that you explicitly configure Global Reach (A). It’s imperative to do this step to prevent connectivity issues between on-premises and Azure VMware Solution. For more information, see traffic flow section.
The diagram illustrates traffic flows from an on-premises perspective.
Traffic Flow Chart
Traffic Flow Number
Source
Direction
Destination
Traffic Inspected on Secure Virtual WAN Hub firewall?
3
on-premises
→
Azure VMware Solution Cloud
No, traffic bypasses firewall and transits Global Reach (A)
4
on-premises
→
Virtual Network
Yes, traffic is inspected at the Hub firewall
This section focuses only on connectivity from the Azure Virtual Network perspective. As depicted in the diagram, the Virtual Network is peering directly to the hub.
A Secure Hub with enabled Routing Intent always sends the default RFC 1918 addresses (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) to peered Virtual Networks, plus any other prefixes that are added as “Private Traffic Prefixes” – see Routing Intent Private Address Prefixes. In our scenario, with Routing Intent enabled, all resources in the Virtual Network currently possess the default RFC 1918 addresses and use the Hub firewall as the next hop. All traffic ingressing and egressing the Virtual Network will always transit the Hub firewall. For more information, see traffic flow section.
Traffic Flow Chart
Traffic Flow Number
Source
Direction
Destination
Traffic Inspected on Secure Virtual WAN hub firewall?
5
Virtual Network
→
Azure VMware Solution Cloud
Yes, traffic is inspected at the Hub firewall
6
Virtual Network
→
Azure VMware Solution Cloud
Yes, traffic is inspected at the Hub firewall
This section focuses only on how internet connectivity is provided for Azure native resources in the Virtual Network and the Azure VMware Solution Private Cloud. There are several options to provide internet connectivity to Azure VMware Solution. – see Internet Access Concepts for Azure VMware Solution
Option 1: Internet Service hosted in Azure
Option 2: VMware Solution Managed SNAT
Option 3: Azure Public IPv4 address to NSX-T Data Center Edge
Although you can use all three options with Single Region Secure Virtual WAN with Routing Intent, “Option 1: Internet Service hosted in Azure” is the best option when using Secure Virtual WAN with Routing Intent and is the option that is used to provide internet connectivity in the scenario. The reason why “Option 1” is considered the best option with Secure Virtual WAN is due to its ease of security inspection, deployment, and manageability.
With Routing Intent, you can choose to generate a default route from the hub firewall. This default route is advertised to your Virtual Network and to Azure VMware Solution. This section is broken into two sections, one that explains internet connectivity from an Azure VMware Solution perspective and another from the Virtual Network perspective.
When Routing Intent is enabled for internet traffic, the default behavior of the Secure Virtual WAN Hub is to not advertise the default route across ExpressRoute circuits. To ensure the default route is propagated to the Azure VMware Solution from the Azure Virtual WAN, you must enable default route propagation on your Azure VMware Solution ExpressRoute circuits – see To advertise default route 0.0.0.0/0 to endpoints. Once changes are complete, the default route 0.0.0.0/0 is then advertised via connection “D” from the hub. It’s important to note that this setting shouldn’t be enabled for on-premises ExpressRoute circuits. Even though connection “D” advertises the default route 0.0.0.0/0 to Azure VMware Solution, the default route is also advertised to on-premises via Global Reach (A). As a result, the recommendation is to implement a BGP Filter on your on-premises equipment to exclude learning the default route. This step ensures that on-premises internet connectivity isn’t impacted.
When Routing Intent for internet access is enabled, the default route generated from the Secure VWAN Hub is automatically advertised to the hub-peered Virtual Network connections. You’ll notice under Effective Routes for the Virtual Machines’ NICs in the Virtual Network that the 0.0.0.0/0 next hop is the hub firewall.
For more information, see the traffic flow section.
Traffic Flow Chart
Traffic Flow Number
Source
Direction
Destination
Traffic Inspected on Secure Virtual WAN hub firewall?
7
Azure VMware Solution Cloud
→
Internet
Yes, traffic is inspected at the Hub firewall
8
Virtual Network
→
Internet
Yes, traffic is inspected at the Hub firewall
For more information on Virtual WAN hub configuration, see About virtual hub settings .
For more information on how to configure Azure Firewall in a Virtual Hub, see Configure Azure Firewall in a Virtual WAN hub.
For more information on how to configure the Palo Alto Next Generation SAAS firewall on Virtual WAN, see Configure Palo Alto Networks Cloud NGFW in Virtual WAN.
For more information on Virtual WAN hub routing intent configuration, see Configure routing intent and policies through Virtual WAN portal.
Microsoft Tech Community – Latest Blogs –Read More
Azure Developers – .NET Day 2024 – Recap
Hi friends!
I’m happy to share the insights from the recent Azure Developers – .NET Day 2024. This event was a treasure full of knowledge for .NET developers looking to harness the power of the cloud. With a focus on AI and .NET, the day was packed with sessions that explored the cutting-edge of cloud-native capabilities, AI advancements, and app development efficiencies .
General Recap
The event kicked off with a warm welcome and quickly moved into practical AI coding sessions, demonstrating how to infuse AI into .NET applications, making them smarter and more intuitive. We also have sessions on how GitHub Copilot for SQL Development is a game-changer, showcasing how AI can streamline database development processes.
Midway through the day, a session on Redis & .NET Apps highlighted the importance of consistency and smart capabilities in applications. A presentation on Change Data Streams with Azure SQL was a hit, offering insights into real-time data manipulation and analysis.
The final sessions of the day focused on developer productivity and cloud-native computing. A talk on Azure API Center unveiled new tools to boost productivity, and a session on VS Code Project Setups provided valuable tips for streamlining development workflows.
Recordings
If you missed the live event or want to revisit the highlights, these videos are your gateway to the wealth of knowledge shared by our experts. You can find the full recordings here:
00:00:00 – Countdown
00:05:00 – Opening – Hailey Huber
00:07:20 – Practical (and fun) AI Coding Session – Bruno Capuano
00:17:40 – GitHub Copilot for SQL Development: Integrating the Power of AI into Database Development – Subhojit Basak
00:49:40 – Making .NET intelligent apps smarter and consistent with Redis – Catherine Wang & Stanley Small
01:19:15 – Event-Driven Architectures with Azure SQL, .NET and Azure Functions – Davide Mauri
01:50:20 – T-SQL for cloud-native developers – Abhiman Tiwari
02:09:20 – Unlocking Scalability: Azure SQL DB Hyperscale and the Power of Named Replicas – Attinder Pal Singh
02:50:00 – MongoDB for .NET and Azure Developers – Luce Carter
03:21:55 – Unlocking Azure API Center: Empowering .NET Developers – Justin Yoo
03:54:20 – Testing web apps with Playwright – Debbie O’Brien & Vansh Singh
04:05:30 – Dev Productivity Dojo: Master Project Setups Using VS Code – Ori Bar-ilan
04:32:20 – Migrating apps to Azure with Code Assessment tooling – McKenna Barlow
04:42:40 – Create a Change Data Stream in Minutes with .NET, Azure SQL, and Azure Functions – Brian Spendolini
04:57:25 – Auto-Generate and Host Data API Builder on Azure Static Web Apps – Frank Boucher & Jerry Nixon
05:08:30 – .NET Extensibility in Azure Logic Apps – Kent Weare
05:38:00 – The most minimal API code of all… none – Frank Boucher & Jerry Nixon
06:11:00 – Host your gRPC workloads on App Service with .NET on Windows – Jeff Martinez & Byron Tardif
06:36:45 – Closing – Hailey Huber
Full Recording
Thank you for joining us on this journey through Azure Developers – .NET Day 2024. We hope these sessions inspire you to build amazing solutions with .NET and Azure.
Best,
Bruno Capuano
Microsoft Tech Community – Latest Blogs –Read More
Building securely: Microsoft Build 2024
This year’s Microsoft Build event is shaping up to be a must-attend event. The high demand for secure software development continues to grow. And with the complexity of today’s digital world, developers are being asked to do even more to keep apps, AI, and code secure—with more focus on built-in security and more integrated security at every phase of design, development, and deployment. Developers who attend Microsoft Build can learn how to manage and govern AI, securely. Our commitment is to provide developers with the knowledge, tools, and practices needed to build safely. It’s a commitment to ensuring security isn’t an afterthought, but a fundamental component of the entire development lifecycle. And Microsoft Build is a great time and place to connect with other developers globally, grow your skills, and learn more about building secure copilots, generative AI, securing applications, and more. Register now for live keynotes, breakout sessions, demos, and social events. Or if you can’t make it in person, access sessions online and on-demand.
Building on a trusted platform
Building on a trusted platform is crucial in today’s digital-first world. At Microsoft, our platforms—from Azure, GitHub, Visual Studio, PowerApps, and more—are designed with security at their core. This provides developers with the tools and integrations they need to innovate securely. And by building on a trusted platform, whether it be with Microsoft or multicloud strategy, developers can focus on innovation and great end-user experiences.
How to build AI securely
AI—the most transformative technology of our era—is rapidly reshaping our world, offering incredible opportunities but also introducing new risks. Microsoft is at the forefront, ensuring our AI is developed securely, by embedding security and safety in all our products and building on pioneering efforts like Microsoft’s Responsible AI Framework. Our goal is to make security a priority in AI development, empowering developers to create exciting and impactful AI tools without compromising safety.
The conference attendee experience
Connect with experts – Meet up with Microsoft security experts who are ready to answer your deep technical questions. Meet-up topics include GitHub advanced security, DevSecOps, Microsoft Entra, Microsoft Purview, Microsoft Defender, Microsoft Intune, and multicloud security. Stop by the expert meet-up area to connect and learn.
Join demonstrations – Stop by The Hub to see live demos of topics including AI, Copilot, and low-code tools. You can learn how to fix security leaks at scale, combat fraud with real-time identity verification, and create secure apps in minutes. We’ll also be demonstrating simple and secure app authentication with authentication brokers, how to create pixel perfect authentication experiences, and more.
AI for good – Connect with experts and peers about social impact and how AI can be utilized to make the world a better place for all. Find us right outside The Hub.
Security-focused sessions – We’re preparing multiple in-depth sessions focused on how to build secure apps using Microsoft platforms. In our Microsoft Build sessions—which you can join in person or online—we aim to help all developers increase the security of their AI development by learning from our experienced engineers sharing real-life examples and first-hand accounts of how we embed security and safety into all our products.
We’re really excited about our content this year. There will be sessions on workflows and API security testing to multiple sessions on LLMs; securing generative AI applications; AI red teaming, AI security; and more. You can find more about them all in the session catalog. Among the sessions you do not want to miss are:
Inside AI Security with Mark Russinovich – Join Mark Russinovich, Chief Technology Officer and Technical Fellow for Microsoft Azure, as he explores the landscape of AI security, focusing on threat modeling, defense tactics, our red teaming approaches, and the path to confidential AI.
How Microsoft approaches AI red teaming – AI Red Team (AIRT) serves as the independent red team for high-risk AI across Microsoft. This session will cover processes, techniques, and tools including PyRIT—AIRT’s open-source automation framework. Presented by Tori Westerhoff, Principal Technical Program Management, Responsible AI Red Teaming, Microsoft and Pete Bryan, AI Security Researcher, Microsoft.
Unwind with Microsoft experts and peers
Develop the vibe. Join us at the Microsoft Security Developer Kickback on May 22 from 6:00pm – 9:00pm at the Seattle Collective. Celebrate the new era of security with Microsoft subject matter experts and peers, all while enjoying heavy appetizers and beverages. You must be registered to attend this event, so be sure to RSVP today.
Please note that transportation to and from the event venue will not be provided. Kindly arrange for your own transportation to ensure a safe return to your hotel or accommodation.
Learn more and register now
Check out the session catalog to start building your own itinerary and maximize your Microsoft Build 2024 attendee experience. With 400+ sessions and 90+ focused on AI, you’re sure to find just the right mix of content tailored to your specific development interests. Register now. We’re excited for you to join us and hope to see you there!
Microsoft Tech Community – Latest Blogs –Read More
Restore a deleted User Account from a server backup to a new HD and get OS and apps included?
Hello,
Apologies in advance if this is in the wrong forum. If so I appreciate a pointer in the right direction. Thanks.
I have arrived in a predicament and would appreciate feedback from the community about the feasibility of my imagined solution.
Description of the situation
A server running Windows Server Essentials 2016. Up to date.A domain connected workstation with Windows 11 Pro. Latest update circa 7 days ago.I mistakenly deleted the User Account used to log into the workstation from the WSE Dashboard. The workstation was regularly backed up so the User Account should have a backup from circa 14 days ago. That would be fine.The most recent attempted back up of the workstation could not be completed because space on the workstation hard drive was too low (M.2 256GB PCIe NVMe Class 40 SSD). I need to add a new hard drive I purchased ((1TB 7200rpm SATA HD).
My summary of the issues I am facing
Need to get the new hard drive into workstationNeed to get Windows 11 Pro onto the new hard driveNeed to restore User Account from server backup
Questions
Is it possible to restore the User Account to the new hard drive and get the Windows OS, apps, and User Account automatically through the restore process?Is there any benefit to keeping the OS on the existing hard drive and having all the apps on the new hard drive?
This is what I can think of now. In case I have missed important aspects around this I appreciate any information that could help me achieve my goal i.e. get the new hard drive installed and operational with the OS, User Account and apps.
Thanks in advance!
Hello, Apologies in advance if this is in the wrong forum. If so I appreciate a pointer in the right direction. Thanks. I have arrived in a predicament and would appreciate feedback from the community about the feasibility of my imagined solution. Description of the situationA server running Windows Server Essentials 2016. Up to date.A domain connected workstation with Windows 11 Pro. Latest update circa 7 days ago.I mistakenly deleted the User Account used to log into the workstation from the WSE Dashboard. The workstation was regularly backed up so the User Account should have a backup from circa 14 days ago. That would be fine.The most recent attempted back up of the workstation could not be completed because space on the workstation hard drive was too low (M.2 256GB PCIe NVMe Class 40 SSD). I need to add a new hard drive I purchased ((1TB 7200rpm SATA HD). My summary of the issues I am facingNeed to get the new hard drive into workstationNeed to get Windows 11 Pro onto the new hard driveNeed to restore User Account from server backup QuestionsIs it possible to restore the User Account to the new hard drive and get the Windows OS, apps, and User Account automatically through the restore process?Is there any benefit to keeping the OS on the existing hard drive and having all the apps on the new hard drive? This is what I can think of now. In case I have missed important aspects around this I appreciate any information that could help me achieve my goal i.e. get the new hard drive installed and operational with the OS, User Account and apps. Thanks in advance! Read More
Maximum file size for Azure BLOB
Hey Azure storage team,
What is the maximum single file size that is allowable inside of an Azure BLOB?
I have a 15TB backup repository that I need to ensure is loaded to BLOB in full.
I know that Wasabi has a limit of 5TB and this has caused a delay in the project.
Any input/confirmation welcome!
Ref: Scalability and performance targets for Blob storage – Azure Storage | Microsoft Learn
Hey Azure storage team, What is the maximum single file size that is allowable inside of an Azure BLOB? I have a 15TB backup repository that I need to ensure is loaded to BLOB in full. I know that Wasabi has a limit of 5TB and this has caused a delay in the project. Any input/confirmation welcome!Ref: Scalability and performance targets for Blob storage – Azure Storage | Microsoft Learn Read More
Is there anyone actually paying attention to the Discussions and Ideas?
I have only been using Microsoft Bookings for about 2 months. I reported an issue to Microsoft, and they suggest that I review the Discussions and the Ideas for the Booking Specific area…
Well, All 94 ideas status is currently “NEW” and, from the couple of discussion posts I have read, I see the community trying to help each other out, but I do not actually see any participation by Microsoft Bookings…
The sad thing is, some of the ideas are really good, and have just been sitting there for 3+ years with no action…
Thanks,
I have only been using Microsoft Bookings for about 2 months. I reported an issue to Microsoft, and they suggest that I review the Discussions and the Ideas for the Booking Specific area… Well, All 94 ideas status is currently “NEW” and, from the couple of discussion posts I have read, I see the community trying to help each other out, but I do not actually see any participation by Microsoft Bookings… The sad thing is, some of the ideas are really good, and have just been sitting there for 3+ years with no action… Thanks, Read More
Option for Transferring Call to Voicemail Using the Consult then Transfer Option
Scenario: A user is on a call with a customer (external number), they would like to speak to a manager or another internal employee (MS Teams user) so they select the Consult then Transfer option. After consulting the manager they decide they don’t want to speak to the customer and would like the call transferred directly to their voicemail without the line ringing.
Is this possible using the Consult then Transfer option?
If not, is there a way to go back a step after consulting select Transfer, and send directly to voicemail?
For context, we use 8X8 as our phone system.
Scenario: A user is on a call with a customer (external number), they would like to speak to a manager or another internal employee (MS Teams user) so they select the Consult then Transfer option. After consulting the manager they decide they don’t want to speak to the customer and would like the call transferred directly to their voicemail without the line ringing. Is this possible using the Consult then Transfer option? If not, is there a way to go back a step after consulting select Transfer, and send directly to voicemail? For context, we use 8X8 as our phone system. Read More
Changing page number coding in mid document
I need some layout help with a WORD document. My document consists of a main document and three appendices The Page numbering will be continuous, but I want to label the pages differently. EG. In the main document the page numbers will be – X – centered on the bottom of the page. But I want the appendices to be identified separately as “Appendix A — [Page #] —” and “Appendix B — [Page #] —” and “Appendix C — [Page #] —. I know I need to separate the last page before each Appendix and the Appendix with some combination of “Page Break” and/or “Section Break (Continuous)” and/or “Section Break (Continuous)” and maybe something else, but I don’t know what. Help Please. Alan W == email address removed for privacy reasons
I need some layout help with a WORD document. My document consists of a main document and three appendices The Page numbering will be continuous, but I want to label the pages differently. EG. In the main document the page numbers will be – X – centered on the bottom of the page. But I want the appendices to be identified separately as “Appendix A — [Page #] —” and “Appendix B — [Page #] —” and “Appendix C — [Page #] —. I know I need to separate the last page before each Appendix and the Appendix with some combination of “Page Break” and/or “Section Break (Continuous)” and/or “Section Break (Continuous)” and maybe something else, but I don’t know what. Help Please. Alan W == email address removed for privacy reasons Read More