Category: Microsoft
Category Archives: Microsoft
New Blog | Secure your data to confidently take advantage of Generative AI with Microsoft Purview
By Liz Willets
Security teams often find themselves in the dark when it comes to data security risks associated with AI usage. An alarming 80% of leaders cite the leakage of sensitive data as their primary concern [1]. And more than 30% of decision makers say they don’t know where or what their sensitive business critical data is [2], and with generative AI generating more data, getting that visibility into how sensitive data is flowing through AI and how your users are interacting with generative AI applications is essential. Without proper visibility, organizations struggle to safeguard their assets effectively. Organizations want to get ahead of and minimize the inherent risks of data being shared with generative AI applications, such as data oversharing, data leakage and non-compliant use of GenAI apps. Instead of restricting AI use to avoid these outcomes, security teams can mitigate and manage risks more effectively by proactively gaining visibility into AI usage within the organization and implementing corresponding protection and governance controls.
On top of that, evolving regulatory environments and rapid technological advancements create complex challenges for customers. Adhering to new regulations, particularly those pertaining to cutting-edge technologies like GenAI, is essential for devising an effective security and compliance strategy. In this era where AI regulations and standards, such as the EU AI Act and NIST AI RMF, are taking shape, it is imperative for organizations to develop and use AI applications in a manner that is safe, transparent and responsible. According to Gartner®, “by 2027 at least one global company will see its AI deployment banned by a regulator for noncompliance with data protection or AI governance legislation.” [3] AI will be a catalyst for regulatory changes, and having secure and compliant AI will become fundamental.
At Microsoft Ignite 23’ and Microsoft Secure 24’, we introduced new capabilities to help organizations discover, protect and govern data in an AI-first world with Microsoft Purview.
Today, we are excited to announce new innovations from Microsoft Purview to help you secure and govern AI:
Microsoft Purview AI Hub, which helps organizations discover how AI applications such as Copilot for M365 and third-party AI apps are being used in their organization and provides ready-to-use policies to protect data, is now available in public preview.
New insights into unlabeled files and SharePoint sites referenced by Microsoft Copilot for Microsoft 365 will also be included in the public preview release of the AI Hub. This helps organizations prioritize the most critical data risks and put in place protection policies to prevent potential oversharing of sensitive data.
New insights into non-compliant and unethical use of AI interactions will also be included in the public preview release of the AI Hub. This helps organizations quickly gain insight into unethical use such as regulatory collusion, money laundering, targeted harassment and more.
New Compliance Manager assessment templates for EU AI Act, NIST AI RMF, ISO/IEC 23894:2023 and ISO/IEC 42001 to help assess, implement and strengthen compliance controls to meet AI regulatory requirements and standards. These insights will also be surfaced in the AI Hub and available in public preview.
Discover how AI applications are being used
To help customers gain a better understanding of which AI applications are being used and how – we are announcing the public preview of Microsoft Purview AI Hub – which includes insights like sensitive data shared with AI apps (whether Copilot for M365 or third-party AI apps), total number of users interacting with AI apps and their associated risk level, pulled from Microsoft Purview Insider Risk Management, and more.
As organizations adopt Copilot for Microsoft 365, data security controls become paramount to avoid potential overexposure of sensitive data or SharePoint sites. And we know that it is challenging to manage and label vast amounts of information, often leaving sensitive data vulnerable to data oversharing. Microsoft Purview AI Hub addresses this challenge by surfacing unlabeled files and SharePoint sites referenced by Copilot, helping you prioritize your most critical data risks and prevent potential oversharing of sensitive data.
Read the full post here: Secure your data to confidently take advantage of Generative AI with Microsoft Purview
By Liz Willets
Security teams often find themselves in the dark when it comes to data security risks associated with AI usage. An alarming 80% of leaders cite the leakage of sensitive data as their primary concern [1]. And more than 30% of decision makers say they don’t know where or what their sensitive business critical data is [2], and with generative AI generating more data, getting that visibility into how sensitive data is flowing through AI and how your users are interacting with generative AI applications is essential. Without proper visibility, organizations struggle to safeguard their assets effectively. Organizations want to get ahead of and minimize the inherent risks of data being shared with generative AI applications, such as data oversharing, data leakage and non-compliant use of GenAI apps. Instead of restricting AI use to avoid these outcomes, security teams can mitigate and manage risks more effectively by proactively gaining visibility into AI usage within the organization and implementing corresponding protection and governance controls.
On top of that, evolving regulatory environments and rapid technological advancements create complex challenges for customers. Adhering to new regulations, particularly those pertaining to cutting-edge technologies like GenAI, is essential for devising an effective security and compliance strategy. In this era where AI regulations and standards, such as the EU AI Act and NIST AI RMF, are taking shape, it is imperative for organizations to develop and use AI applications in a manner that is safe, transparent and responsible. According to Gartner®, “by 2027 at least one global company will see its AI deployment banned by a regulator for noncompliance with data protection or AI governance legislation.” [3] AI will be a catalyst for regulatory changes, and having secure and compliant AI will become fundamental.
At Microsoft Ignite 23’ and Microsoft Secure 24’, we introduced new capabilities to help organizations discover, protect and govern data in an AI-first world with Microsoft Purview.
Today, we are excited to announce new innovations from Microsoft Purview to help you secure and govern AI:
Microsoft Purview AI Hub, which helps organizations discover how AI applications such as Copilot for M365 and third-party AI apps are being used in their organization and provides ready-to-use policies to protect data, is now available in public preview.
New insights into unlabeled files and SharePoint sites referenced by Microsoft Copilot for Microsoft 365 will also be included in the public preview release of the AI Hub. This helps organizations prioritize the most critical data risks and put in place protection policies to prevent potential oversharing of sensitive data.
New insights into non-compliant and unethical use of AI interactions will also be included in the public preview release of the AI Hub. This helps organizations quickly gain insight into unethical use such as regulatory collusion, money laundering, targeted harassment and more.
New Compliance Manager assessment templates for EU AI Act, NIST AI RMF, ISO/IEC 23894:2023 and ISO/IEC 42001 to help assess, implement and strengthen compliance controls to meet AI regulatory requirements and standards. These insights will also be surfaced in the AI Hub and available in public preview.
Discover how AI applications are being used
To help customers gain a better understanding of which AI applications are being used and how – we are announcing the public preview of Microsoft Purview AI Hub – which includes insights like sensitive data shared with AI apps (whether Copilot for M365 or third-party AI apps), total number of users interacting with AI apps and their associated risk level, pulled from Microsoft Purview Insider Risk Management, and more.
As organizations adopt Copilot for Microsoft 365, data security controls become paramount to avoid potential overexposure of sensitive data or SharePoint sites. And we know that it is challenging to manage and label vast amounts of information, often leaving sensitive data vulnerable to data oversharing. Microsoft Purview AI Hub addresses this challenge by surfacing unlabeled files and SharePoint sites referenced by Copilot, helping you prioritize your most critical data risks and prevent potential oversharing of sensitive data.
Read the full post here: Secure your data to confidently take advantage of Generative AI with Microsoft Purview Read More
Time is almost up! Upgrade your Azure Logic Apps Integration Service Environment workloads
Calling all Azure Logic Apps Integration Service Environment users! As we near the August 31, 2024, deadline, it has become imperative for you to complete your upgrade from Integration Service Environments (ISE) to Logic Apps Standard. After that date, your currently deployed ISE instances will no longer be supported, and service will be disrupted. We understand, however, that this migration may cause some disruption to your existing systems—that’s why we’re committed to making this transition as smooth and secure as possible for our valued customers.
Find more about the many benefits of upgrading to Logic Apps Standard and explore the tools and resources available from Microsoft to help you expedite your upgrade. Our commitment goes beyond providing these resources – our support team is here to assist you throughout the migration process. Let’s work together to ensure your workloads continue to run flawlessly on Azure Logic Apps Standard.
Experience the power of Logic Apps Standard
After August 31st, 2024, access to deployed Azure Logic Apps Integration Service Environments will be terminated, meaning any workflows currently running on these ISEs will cease execution, all historical data associated with these workflows will be permanently deleted, and any integration accounts linked to the retired ISEs will be removed.
To ensure your integration solutions continue to function smoothly, we strongly encourage you to prioritize migrating to Logic Apps Standard before the deadline. Logic Apps Standard is more than just an upgrade — it’s a leap forward. By upgrading your workloads from Integration Service Environment you’ll enjoy these exciting new features:
Align enterprise-level workflows with the broader application PaaS ecosystem, leveraging improvements in the ecosystem.
Cost optimizations get a timely remedy – the granular and elastic scaling, both help in dynamically adapting cost with load changes.
Cloud-native development advancements – local development, debugging, enhanced support for source controls – helping you achieve better ROI.
Seamless extensibility, with support for code extensions to be executed natively within logic apps workflows – minimizing your footprint and taking the most out of your compute.
Automated deployment and code logic decoupled from infra deployment are instrumental in accelerating value to customers, including support for mission critical applications with zero-downtime deployment options.
Support for network isolation and access to on-premises resources is available natively in Logic Apps Standard.
With Logic Apps Standard, you get all this and more with built-in connectors for connector execution isolation, like ISE connectors.
Start your upgrade today with our migration tool
We’ve worked hard to make migrating your workflows to Logic Apps Standard as worry free as possible. The “Export to Logic Apps Standard” tool, now generally available in the Visual Studio Code extension, simplifies exporting and organizing workflows into a Logic Apps Standard project. You can then leverage the power of Visual Studio Code for local updates, testing, and debugging before redeploying directly or integrating seamlessly into your DevOps processes.
Migrating unlocks valuable features like native networking, enterprise connectors, improved performance, and freedom from throttling limits. Learn more with these detailed instructions and empower your workflows with the full potential of Logic Apps Standard!
Need extra support? Azure experts are here to help
We understand that migration can seem daunting, but we’re here to help! Other users have found useful our recent Learn Live session, hosted by Azure experts, for demystifying the process of migrating an Integration Service Environment to Logic Apps Standard. The session provides an overview of the process, the recommended migration tools, how to organize and export logic apps, and insights into running, testing, and debugging locally.
For any questions you might have during your migration, we have an FAQ page and a dedicated thread you can reference. You can also reach out to Azure support for assistance or solutions. Let’s work together to ensure a seamless transition and keep your integration solutions running flawlessly.
Microsoft Tech Community – Latest Blogs –Read More
Custom Rule to qurantine emails in M365 based on total Number of Recipients
Lately we have been getting thousands of emails from Gmail which have pdfs and links. Last week we were hit with around 1.5 million emails which the ATP could not stop( we have A5 license). We created rules which says if attachment has specific name example Oddname.pdf then delete the email.
We are not in position to block gmail domain or block all emails which has pdf attachments.
Can we have a custom rule which based on number of recipients. Example —>if email has more then 100 recipients and gmail.com domain then quarantine the email or delete them.
Lately we have been getting thousands of emails from Gmail which have pdfs and links. Last week we were hit with around 1.5 million emails which the ATP could not stop( we have A5 license). We created rules which says if attachment has specific name example Oddname.pdf then delete the email. We are not in position to block gmail domain or block all emails which has pdf attachments. Can we have a custom rule which based on number of recipients. Example —>if email has more then 100 recipients and gmail.com domain then quarantine the email or delete them. Read More
On the SharePoint Start Page is there any way to moderate the news that shows there?
On SharePoint.com (start page) news items from various sites that you may have access to shows up. Is there any way to modify/configure what news is visible on this page? Thanks,
On SharePoint.com (start page) news items from various sites that you may have access to shows up. Is there any way to modify/configure what news is visible on this page? Thanks, Read More
File Transfer for Entra ID Join Devices
Hello,
We recently moved to Intune Suite Licenses to give us better control and analytics of our endpoints. One feature requested now is the ability to file transfer to endpoints. We are strictly an Entra ID/Azure organization, so the normal \endpointname/c$ doesn’t work.
Any suggestions?
Hello, We recently moved to Intune Suite Licenses to give us better control and analytics of our endpoints. One feature requested now is the ability to file transfer to endpoints. We are strictly an Entra ID/Azure organization, so the normal \endpointname/c$ doesn’t work. Any suggestions? Read More
How Do I Fix QuickBooks Error 15241 When Payroll Update Failed Error
QuickBooks, the renowned accounting software, serves as a lifeline for countless businesses, aiding in financial management with efficiency and precision. However, like any software, it isn’t immune to errors. One such common hiccup is QuickBooks Error 15241, which can disrupt your workflow if left unresolved. In this article, we’ll delve into the depths of this error, exploring its origins, reasons behind its occurrence, and offering comprehensive solutions to tackle it effectively.
What is QuickBooks Error 15241?
QuickBooks Error 15241 manifests as an issue related to the QuickBooks payroll function, primarily impacting the update process. Typically, users encounter this error when attempting to update their QuickBooks Desktop or payroll software. The error message usually reads: “Error 15241: The payroll update did not complete successfully. A file cannot be validated.” This error impedes the smooth functioning of the software, causing frustration and hampering productivity.
Reasons Behind QuickBooks Error 15241:
Incomplete Installation: One of the primary culprits behind Error 15241 is an incomplete installation of QuickBooks Desktop software or a corrupted download. If any files related to the software are missing or damaged, it can trigger this error during the update process.
Insufficient User Permissions: Limited user permissions or restrictions can also lead to Error 15241. QuickBooks requires adequate permissions to perform various tasks, including updates. If the user account lacks the necessary permissions, it can result in this error.
Damaged Windows Registry: Issues within the Windows registry, such as corrupt entries related to QuickBooks or payroll, can contribute to Error 15241. Registry errors often occur due to improper uninstallation of software or malware infections.
Conflicting Third-Party Applications: Sometimes, conflicts with other third-party applications installed on the system can interfere with QuickBooks updates, triggering Error 15241. Antivirus programs, firewall settings, or anti-malware software may mistakenly flag QuickBooks processes as potential threats, causing update failures.
Solutions to QuickBooks Payroll Update Failed Error 15241
Solution 1: Re-enable QuickBooks FCS
Close QuickBooks and ensure no QuickBooks processes are running in the background.Press Windows + R to open the Run dialog, then type “services.msc” and hit Enter.In the Services window, locate “Intuit QuickBooks FCS” and double-click on it.In the Properties window, set the Startup type to “Manual” and click Apply.Click on Start to initiate the service and then click OK.Restart QuickBooks and check if the issue persists.
Solution 2: Run QuickBooks Desktop as Administrator
Right-click on the QuickBooks Desktop icon.Select “Run as administrator” from the context menu.Try performing the task that triggered Error 15241 again.
Solution 3: Update QuickBooks Desktop
Close QuickBooks Desktop.Download and install the latest updates for QuickBooks Desktop.After the update is complete, restart your computer and reopen QuickBooks.Check if the error has been resolved.
Solution 4: Verify Windows FCS Settings
Press Windows + R to open the Run dialog.Type “services.msc” and hit Enter.In the Services window, locate “Windows File Copy Service (FCS)” and double-click on it.Set the Startup type to “Automatic” and click Apply.If the service is stopped, click on Start, then click OK.Restart your computer and check if the issue persists.
By following these solutions, users can effectively resolve QuickBooks Error 15241 and resume their payroll and other financial activities without interruption.
QuickBooks, the renowned accounting software, serves as a lifeline for countless businesses, aiding in financial management with efficiency and precision. However, like any software, it isn’t immune to errors. One such common hiccup is QuickBooks Error 15241, which can disrupt your workflow if left unresolved. In this article, we’ll delve into the depths of this error, exploring its origins, reasons behind its occurrence, and offering comprehensive solutions to tackle it effectively.What is QuickBooks Error 15241?QuickBooks Error 15241 manifests as an issue related to the QuickBooks payroll function, primarily impacting the update process. Typically, users encounter this error when attempting to update their QuickBooks Desktop or payroll software. The error message usually reads: “Error 15241: The payroll update did not complete successfully. A file cannot be validated.” This error impedes the smooth functioning of the software, causing frustration and hampering productivity.Reasons Behind QuickBooks Error 15241:Incomplete Installation: One of the primary culprits behind Error 15241 is an incomplete installation of QuickBooks Desktop software or a corrupted download. If any files related to the software are missing or damaged, it can trigger this error during the update process.Insufficient User Permissions: Limited user permissions or restrictions can also lead to Error 15241. QuickBooks requires adequate permissions to perform various tasks, including updates. If the user account lacks the necessary permissions, it can result in this error.Damaged Windows Registry: Issues within the Windows registry, such as corrupt entries related to QuickBooks or payroll, can contribute to Error 15241. Registry errors often occur due to improper uninstallation of software or malware infections.Conflicting Third-Party Applications: Sometimes, conflicts with other third-party applications installed on the system can interfere with QuickBooks updates, triggering Error 15241. Antivirus programs, firewall settings, or anti-malware software may mistakenly flag QuickBooks processes as potential threats, causing update failures.Solutions to QuickBooks Payroll Update Failed Error 15241Solution 1: Re-enable QuickBooks FCSClose QuickBooks and ensure no QuickBooks processes are running in the background.Press Windows + R to open the Run dialog, then type “services.msc” and hit Enter.In the Services window, locate “Intuit QuickBooks FCS” and double-click on it.In the Properties window, set the Startup type to “Manual” and click Apply.Click on Start to initiate the service and then click OK.Restart QuickBooks and check if the issue persists.Solution 2: Run QuickBooks Desktop as AdministratorRight-click on the QuickBooks Desktop icon.Select “Run as administrator” from the context menu.Try performing the task that triggered Error 15241 again.Solution 3: Update QuickBooks DesktopClose QuickBooks Desktop.Download and install the latest updates for QuickBooks Desktop.After the update is complete, restart your computer and reopen QuickBooks.Check if the error has been resolved.Solution 4: Verify Windows FCS SettingsPress Windows + R to open the Run dialog.Type “services.msc” and hit Enter.In the Services window, locate “Windows File Copy Service (FCS)” and double-click on it.Set the Startup type to “Automatic” and click Apply.If the service is stopped, click on Start, then click OK.Restart your computer and check if the issue persists.By following these solutions, users can effectively resolve QuickBooks Error 15241 and resume their payroll and other financial activities without interruption. Read More
Removing personal accounts when enrolled
Hello,
My IT manager has enforced conditional access so everyone needs to enrol. My iPhone is enrolled but I can no longer sign in to Outlook or OneDrive with my personal account (this account is a O365 tenant that I made for learning and is used as my personal address).
He is unsure what’s been changed to cause this.
Can someone advise what we need to do to allow more than 1 O365 address to use Outlook & OneDrive, along side the company enrolled details?
Kind regards
Hello, My IT manager has enforced conditional access so everyone needs to enrol. My iPhone is enrolled but I can no longer sign in to Outlook or OneDrive with my personal account (this account is a O365 tenant that I made for learning and is used as my personal address). He is unsure what’s been changed to cause this. Can someone advise what we need to do to allow more than 1 O365 address to use Outlook & OneDrive, along side the company enrolled details? Kind regards Read More
CDC: how to read history records of master->detail tables?
I have 2 tables T1(master), T2(detail). CDC works on these both tables.
I’d like to restore history tables to th new 2 tables T11->T21 using stored procedure.
The question is: how to process the history tables correctly?
If I get and process all T1 history records and after it all T2 there is can be referential integrity conflict.
For example: my SP processes all master rows: D, I, D, I and then details from the start to end of the history.
What is the best way?
I have 2 tables T1(master), T2(detail). CDC works on these both tables.I’d like to restore history tables to th new 2 tables T11->T21 using stored procedure.The question is: how to process the history tables correctly?If I get and process all T1 history records and after it all T2 there is can be referential integrity conflict.For example: my SP processes all master rows: D, I, D, I and then details from the start to end of the history.What is the best way? Read More
New Feedback Opportunity
Hello!
I am pleased to inform you of a new enhancement to your Microsoft E5 license. We have introduced Enterprise IoT, a solution that enables the monitoring and protection of IoT devices within office environments, including printers, cameras, and scanners. By turning on Enterprise IoT apart from getting alerts and recommendations, you will get vulnerability and misconfiguration data, purpose-built for IoT devices.
Activation is a breeze: Getting started is as easy as turning on a toggle in your Defender XDR Portal. Follow this documentation to set it up.
Bonus Protection: For every E5 license you have, we provide complimentary protection for 5 IoT devices. That means if you have 20 E5 licenses, you can secure up to 100 devices at no extra cost! Curious about the details? Our documentation will guide you on how to calculate the number of devices you can protect.
Your Experience Matters: We are dedicated to continuous improvement and your input is invaluable. Please take a moment to share your thoughts through a short survey.
Let’s Connect: Interested in a deeper dive into Enterprise IoT or other Microsoft Security solutions? Simply reply to this email and we’ll arrange a conversation with a product manager from our Microsoft Engineering team.
Thank you!
Hello!
I am pleased to inform you of a new enhancement to your Microsoft E5 license. We have introduced Enterprise IoT, a solution that enables the monitoring and protection of IoT devices within office environments, including printers, cameras, and scanners. By turning on Enterprise IoT apart from getting alerts and recommendations, you will get vulnerability and misconfiguration data, purpose-built for IoT devices.
Activation is a breeze: Getting started is as easy as turning on a toggle in your Defender XDR Portal. Follow this documentation to set it up.
Bonus Protection: For every E5 license you have, we provide complimentary protection for 5 IoT devices. That means if you have 20 E5 licenses, you can secure up to 100 devices at no extra cost! Curious about the details? Our documentation will guide you on how to calculate the number of devices you can protect.
Your Experience Matters: We are dedicated to continuous improvement and your input is invaluable. Please take a moment to share your thoughts through a short survey.
Let’s Connect: Interested in a deeper dive into Enterprise IoT or other Microsoft Security solutions? Simply reply to this email and we’ll arrange a conversation with a product manager from our Microsoft Engineering team.
Thank you! Read More
how to be a Microsoft partner and resell Microsoft licenses
Hi everyone I have many days watching websites that have Microsoft-authorized partners and sell Microsoft licenses like Windows and Office with competitive prices like these sites
https://wholsalekeys.com/
and I want to know how to get the Microsoft partner authorization to sell Microsoft keys
also with this authorization, i can sell online and worldwide ,
how it can cost?
kind regards
Hazem
Hi everyone I have many days watching websites that have Microsoft-authorized partners and sell Microsoft licenses like Windows and Office with competitive prices like these siteshttps://ondapro.me/https://wholsalekeys.com/and I want to know how to get the Microsoft partner authorization to sell Microsoft keys also with this authorization, i can sell online and worldwide , how it can cost?kind regardsHazem Read More
How do I add a name to my drop down list in excel
Hello, I am looking for instructions on how to add a name to a drop down list on my spreadsheet
Hello, I am looking for instructions on how to add a name to a drop down list on my spreadsheet Read More
Difference in Calendars for Flow in Power Automate
Can someone please help me understand the difference between the calendars below that start with “Calendar” and ones that don’t?
The reason I’m asking is because I’m attempting to create a flow in Power Automate and the only calendars that show up are ones that don’t start with “Calendar”. I’ve posted in the Power Automate Community, but no one has offered any input.
Can someone please help me understand the difference between the calendars below that start with “Calendar” and ones that don’t?The reason I’m asking is because I’m attempting to create a flow in Power Automate and the only calendars that show up are ones that don’t start with “Calendar”. I’ve posted in the Power Automate Community, but no one has offered any input. Read More
Enhanced Response Action Experience from Threat Explorer
Empowering SecOps with the ability to submit, block, kick off investigations and delete emails in bulk with a single action form within Explorer. – Rolling out now!
Last semester we published a blog post, where we announced a new Take action feature in the Email Entity and Email Summary panel that lets you take multiple actions at once from a single wizard. This feature makes it easier and faster for SecOps to deal with email threats by giving you logical grouping of actions, contextual availability of actions, and support for tenant level block URLs and files. Overall, we received very positive and encouraging responses on the value it adds for our customers and the ease of use of this flow.
We are very excited to announce that we are now expanding this feature to Threat explorer, where you can apply the same strong and convenient actions to more than one email message at once. Also, Tenant level URL/ file / sender and domain blocks available directly from Threat explorer.
This feature improves Threat explorer’s effectiveness and makes it more powerful tool for security admins to detect, identify, and remediate threats quickly!
Advantages of the new Take action feature
The new Take action feature offers several benefits for security analysts, such as:
It allows you to swiftly and efficiently remove email threats by letting you take multiple actions at once on up to 100 emails. If you need to do bulk email remediation for more than 100 and up to 200,000 emails, this new wizard will help you do that in a structured way.
It reduces the number of clicks and steps required to execute single and bulk email actions from Threat explorer.
It allows you to block malicious URLs or files at the tenant level (Tenant Allow Block List (TABL)) directly from Threat explorer, without having to go to another page (new addition!!).
Some of the actions are not available based on the current location of the message, but if there is a conflict, SecOps can use toggle choices to turn them on/off as desired and take proper action.
How it works
To use the new Take action feature, follow these steps:
Go to Threat explorer and select the emails you would like to take action on.
Up to 100 email selection –
You can select up to 100 emails at a time.
Click on the “Take Action” button. Note that this button has replaced the previous “Message actions” drop-down menu.
More than 100 and up to 200,000 email selection
If the email selection from the previous page has more than 100 entries, you can only activate one action at a time and no additional contextual actions.
A panel will open with the following options: Purge emails, Submit emails, Investigate emails, and Block URL/file. Some options may be grayed out depending on the latest delivery location of the emails. For example, you cannot purge emails that have been deleted or moved to another folder.
By default, some actions are unavailable/grayed out based on the latest delivery location of the message. To show all available response actions, slide the toggle on.
If you select the Submit emails option, you will see a sub-option to confirm the emails as threats. If you select this option, you will see another panel where you can choose to block the URLs or files associated with the emails at the tenant level. You can select multiple entities to block.
If you select the Submit emails option, you will see a sub-option to confirm the emails as threats. By selecting this option, you will see another panel where you can choose to block the URLs or files associated with the emails at the tenant level. You can select multiple entities to block.
Review the actions you are going to take and click on the “Submit” button.
Track the status of the actions in the respective pages. For example, you can see the purged emails in the Action Center page, the submitted emails in the Submissions page, the investigated emails in the Automated investigations page, and the blocked entities in the Tenant allow/block lists page. Also, we have recently done enhancement where SOC teams have direct and in-line visibility into manual remediation, quarantine release etc. and system post-delivery actions like ZAP and reprocessed messages (for FP recovery) etc. in Threat Explorer’s result, read the blog for more.
We are gradually introducing this feature over the next few weeks. It is designed to help you strengthen your security and reduce your workload. We value your feedback and suggestions on how to make the action experience in Microsoft 365 Defender better. Please engage with Defender for Office 365 forum.
Learn more:
To learn more about Threat explorer and the new Take action feature, visit the following links:
Learn more about email remediation here
Check out our documentation for additional information on the Threat explorer threat investigations.
Track email move and delete actions centrally in Action Center.
Microsoft Tech Community – Latest Blogs –Read More
Behind the Scenes: Creating a more accessible future with Peter Wu
Hey Microsoft 365 Insiders,
As we approach Global Accessibility Awareness Day, we’re proud to share a behind-the-scenes look with Peter Wu, Principal Software Engineer at Microsoft. Peter’s tech journey and passion for creating accessible technology are truly inspiring.
Read the full story: Behind the Scenes: Creating a more accessible future with Peter Wu
Social posts:
X: https://twitter.com/Msft365Insider/status/1788237428718727360
LinkedIn: https://www.linkedin.com/feed/update/urn:li:activity:7194003125429571585/
Threads: https://www.threads.net/@msft365insider/post/C6tqGYcBYeL
Thanks!
Perry Sjogren
Microsoft 365 Insider Social Media Manager
Become a Microsoft 365 Insider and gain exclusive access to new features and help shape the future of Microsoft 365. Join Now: Windows | Mac | iOS | Android
Hey Microsoft 365 Insiders,
As we approach Global Accessibility Awareness Day, we’re proud to share a behind-the-scenes look with Peter Wu, Principal Software Engineer at Microsoft. Peter’s tech journey and passion for creating accessible technology are truly inspiring.
Read the full story: Behind the Scenes: Creating a more accessible future with Peter Wu
Social posts:
X: https://twitter.com/Msft365Insider/status/1788237428718727360
LinkedIn: https://www.linkedin.com/feed/update/urn:li:activity:7194003125429571585/
Threads: https://www.threads.net/@msft365insider/post/C6tqGYcBYeL
Thanks!
Perry Sjogren
Microsoft 365 Insider Social Media Manager
Become a Microsoft 365 Insider and gain exclusive access to new features and help shape the future of Microsoft 365. Join Now: Windows | Mac | iOS | Android Read More
Where is the “Save” button/link to periodically save while making a post here?
Hi!
I tried to “label” this post as “Microsoft Forums” but it wouldn’t accept a custom tag. This is a simple question about creating a post here in the forums, as opposed to being about Excel. 🙂
——————-
When creating a post here, I always get a message that says:
“Your content was last saved to auto recover at XX (time). Please save your document, using the save button, regularly to avoid data loss.”
Does anyone know where that “Save” button is? I cannot find it anywhere, lol.
Thank you!!
Hi! I tried to “label” this post as “Microsoft Forums” but it wouldn’t accept a custom tag. This is a simple question about creating a post here in the forums, as opposed to being about Excel. :)——————- When creating a post here, I always get a message that says: “Your content was last saved to auto recover at XX (time). Please save your document, using the save button, regularly to avoid data loss.” Does anyone know where that “Save” button is? I cannot find it anywhere, lol. Thank you!! Read More
New Blog | Export DLP Policies, Rules and Settings using PowerShell
This blog outlines the steps to export the DLP policies, rules and settings in bulk.
Here’s a summary of the items covered:
Exporting DLP policies, rules and settings: The document explains how to use PowerShell cmdlets to export the DLP policies, rules and settings in bulk from the Security and Compliance Center PowerShell.
Viewing the value of switches: The document shows how to view the value of switches that are parsed by the cmdlets, such as the groups or users that are scoped or excluded from a policy.
Exporting as a CSV file: The document provides examples of how to export the policy scoping or exclusion details as a CSV file by using the Select -ExpandProperty parameter.
Exporting as a JSON file: The document demonstrates how to export all the policies and their attributes or sub-attributes as a JSON file by using the ConvertTo-Json cmdlet.
Read the full post here: Export DLP Policies, Rules and Settings using PowerShell
By Priyanka Agarwal
This blog outlines the steps to export the DLP policies, rules and settings in bulk.
Here’s a summary of the items covered:
Exporting DLP policies, rules and settings: The document explains how to use PowerShell cmdlets to export the DLP policies, rules and settings in bulk from the Security and Compliance Center PowerShell.
Viewing the value of switches: The document shows how to view the value of switches that are parsed by the cmdlets, such as the groups or users that are scoped or excluded from a policy.
Exporting as a CSV file: The document provides examples of how to export the policy scoping or exclusion details as a CSV file by using the Select -ExpandProperty parameter.
Exporting as a JSON file: The document demonstrates how to export all the policies and their attributes or sub-attributes as a JSON file by using the ConvertTo-Json cmdlet.
Read the full post here: Export DLP Policies, Rules and Settings using PowerShell
New Blog | Tenant health transparency and observability
By Igor Sakhnov
In previous resilience blog posts, we’ve shared updates about the continuous improvements we’re making to resilience and reliability, including our most recent update on regionally isolated authentication endpoints and an announcement last year of our industry-leading and first of its kind backup authentication service. These and other innovations behind the scenes enable us to deliver consistently very high rates of availability globally each month.
In this post, we’ll outline what we’re doing to help customers see how available and resilient Microsoft Entra really is for them, to not only hold us accountable when issues arise, but also better understand what actions to take within their tenant to improve its health. At the global level, you see it in the form of retrospective SLA reporting, which shows authentication availability exceeding our 4 9s promise (launched in spring 2021) by a wide margin and reaching 5 9s in most months. But it becomes more compelling and actionable at the tenant level: what is the uptime experience of my users on my organization’s apps and devices? Is my tenant handling surges in sign-in demand?
We often hear from customers about the effect on resilience insights when they move to the cloud. In the on-prem world, identity health monitoring occurred onsite and with tight control; operational awareness happened entirely within a company’s first-party IT department. Now, we need to achieve that same transparency or better in an outsourced, cloud-based identity service and with a federated set of dependencies.
Read the full post here: Tenant health transparency and observability
By Igor Sakhnov
In previous resilience blog posts, we’ve shared updates about the continuous improvements we’re making to resilience and reliability, including our most recent update on regionally isolated authentication endpoints and an announcement last year of our industry-leading and first of its kind backup authentication service. These and other innovations behind the scenes enable us to deliver consistently very high rates of availability globally each month.
In this post, we’ll outline what we’re doing to help customers see how available and resilient Microsoft Entra really is for them, to not only hold us accountable when issues arise, but also better understand what actions to take within their tenant to improve its health. At the global level, you see it in the form of retrospective SLA reporting, which shows authentication availability exceeding our 4 9s promise (launched in spring 2021) by a wide margin and reaching 5 9s in most months. But it becomes more compelling and actionable at the tenant level: what is the uptime experience of my users on my organization’s apps and devices? Is my tenant handling surges in sign-in demand?
We often hear from customers about the effect on resilience insights when they move to the cloud. In the on-prem world, identity health monitoring occurred onsite and with tight control; operational awareness happened entirely within a company’s first-party IT department. Now, we need to achieve that same transparency or better in an outsourced, cloud-based identity service and with a federated set of dependencies.
Read the full post here: Tenant health transparency and observability
New Blog | Vulnerability Assessment with Defender for Servers, by Defender Vulnerability Management
By Shahar Bahat
Microsoft Defender for Cloud is a comprehensive multicloud application protection platform (CNAPP) meticulously designed to safeguard your cloud-based applications from every angle, covering the entire journey from code to cloud. A pivotal aspect of cloud security involves the continuous monitoring and management of emerging vulnerabilities across your cloud workloads. By implementing strong vulnerability management practices, organizations can enhance their security posture, minimize the attack surface, and reinforce defenses against potential security breaches.
We’re excited to share that starting May 1st, we are introducing unified vulnerability assessment, and as a part of this Defender for Cloud will now exclusively offer Microsoft Defender Vulnerability Management as its primary scanner across servers and containers, as we shared in our previous recent blogs (1, 2). This strategic transition equips security administrators with access to Microsoft’s unparalleled threat intelligence, advanced breach likelihood predictions. This integration offers security administrators a centralized vulnerability scanner, serving as a unified engine for all workloads spanning cloud, on-premises, and hybrid environments. This enables a seamless and precise risk assessment process. Equipped with these functionalities, security teams can proficiently detect, evaluate, prioritize, and address vulnerabilities, effectively overseeing an extended attack surface and strengthening the overall posture against cloud risks.
Read the full post here: Vulnerability Assessment with Defender for Servers, Powered by Defender Vulnerability Management
By Shahar Bahat
Microsoft Defender for Cloud is a comprehensive multicloud application protection platform (CNAPP) meticulously designed to safeguard your cloud-based applications from every angle, covering the entire journey from code to cloud. A pivotal aspect of cloud security involves the continuous monitoring and management of emerging vulnerabilities across your cloud workloads. By implementing strong vulnerability management practices, organizations can enhance their security posture, minimize the attack surface, and reinforce defenses against potential security breaches.
We’re excited to share that starting May 1st, we are introducing unified vulnerability assessment, and as a part of this Defender for Cloud will now exclusively offer Microsoft Defender Vulnerability Management as its primary scanner across servers and containers, as we shared in our previous recent blogs (1, 2). This strategic transition equips security administrators with access to Microsoft’s unparalleled threat intelligence, advanced breach likelihood predictions. This integration offers security administrators a centralized vulnerability scanner, serving as a unified engine for all workloads spanning cloud, on-premises, and hybrid environments. This enables a seamless and precise risk assessment process. Equipped with these functionalities, security teams can proficiently detect, evaluate, prioritize, and address vulnerabilities, effectively overseeing an extended attack surface and strengthening the overall posture against cloud risks.
Read the full post here: Vulnerability Assessment with Defender for Servers, Powered by Defender Vulnerability Management
Announcing Windows Server Preview Build 26212
Announcing Windows Server Preview Build 26212
Hello Windows Server Insiders!
Today we are pleased to release a new build of the next Windows Server Long-Term Servicing Channel (LTSC) Preview that contains both the Desktop Experience and Server Core installation options for Datacenter and Standard editions, Annual Channel for Container Host and Azure Edition (for VM evaluation only). Branding has been updated for the upcoming release, Windows Server 2025 in this preview – when reporting issues please refer to Windows Server 2025 preview. If you signed up for Server Flighting, you should receive this new build automatically.
What’s New
[NEW] Delegated Managed Service Accounts (dMSA)
A new account type known as delegated Managed Service Account (dMSA) is now available that allows migration from a traditional service account to a machine account with managed and fully randomized keys, while disabling original service account passwords.
Authentication for dMSA is linked to the device identity, which means that only specified machine identities mapped in AD can access the account. Using dMSA helps to prevent harvesting credentials using a compromised account (kerberoasting), which is a common issue with traditional service accounts.
To learn more about dMSA, visit https://learn.microsoft.com/en-us/windows-server/security/delegated-managed-service-accounts/delegated-managed-service-accounts-overview.
[NEW] More Server Message Block (SMB) protocol changes.
Starting with Build 26097 and higher, we are introducing the following Server Message Block (SMB) protocol changes for QUIC, signing, and encryption:
SMB over QUIC client and server disable: Administrators can now disable the SMB over QUIC client and SMB over QUIC server options with Group Policy and PowerShell.
SMB over QUIC client and server connection auditing: Successful SMB over QUIC client and SMB over QUIC server connection events are now written to the event log to include the QUIC transport.
SMB signing and encryption auditing: Administrators can now enable auditing of the SMB server and client for support of SMB signing and encryption. This shows if a third-party client or server doesn’t support SMB encryption or signing. You can configure these settings with PowerShell and Group Policy.
For details on configuring these new settings, review https://aka.ms/SMB74MDNP.
For more information on SMB over QUIC in Windows and Windows Server Insider Preview builds, review https://aka.ms/SMBoverQUICServer and https://aka.ms/SmbOverQuicCAC.
For more information on SMB signing and encryption in Windows and Windows Server Insider Preview builds, review https://aka.ms/SmbSigningRequired and https://aka.ms/SmbClientEncrypt.
Windows Server Flighting is here!!
If you signed up for Server Flighting, you should receive this new build automatically later today.
For more information, see Welcome to Windows Insider flighting on Windows Server – Microsoft Community Hub
The new Feedback Hub app is now available for Server Desktop users!
The app should automatically update with the latest version, but if it does not, simply Check for updates in the app’s settings tab.
Known Issues
Upgrade does not complete: Some users may experience an issue when upgrading where the download process does not progress beyond 0%. If you encounter this issue, please upgrade to this newer build using the ISO media download option. Download Windows Server Insider Preview (microsoft.com)
VMs created using ISO media may not boot: Some users may encounter boot issues when creating Gen 2 VMs using this build (26063) and attempting to set the DVD ISO as boot preference. The new VM is unable to boot through the ISO and skips to subsequent boot options. This will be addressed in a future release.
Access denied error when using Diskpart –> Clean Image on Winpe.vhdx VMs created using WinPE: Create bootable media | Microsoft Learn. We are working to resolve this issue and expect to have it fixed in the next preview release.
Download Windows Server Insider Preview (microsoft.com)
Flighting: The label for this flight may incorrectly reference Windows 11. However, when selected, the package installed is the Windows Server update. Please ignore the label and proceed with installing your flight. This issue will be addressed in a future release.
Setup: Some users may experience overlapping rectangle voids following mouse clicks during “OOBE” setup. This is a graphics rendering issue and will not prevent setup from completing. This issue will be addressed in a future release.
WinPE – Powershell Scripts: Applying the WinPE-Powershell optional component does not properly install Powershell in WinPE. As a result, Powershell cmdlets will fail. Customers who are dependent on Powershell in WinPE should not use this build.
If you are validating upgrades from Windows Server 2019 or 2022, we do not recommend that you use this build as intermittent upgrade failures have been identified for this build.
This build has an issue where archiving eventlogs with “wevetutil al” command causes the Windows Event Log service to crash, and the archive operation to fail. The service must be restarted by executing “Start-Service EventLog” from an administrative command line prompt.
If you have Secure Launch/DRTM code path enabled, we do not recommend that you install this build.
Available Downloads
Downloads to certain countries may not be available. See Microsoft suspends new sales in Russia – Microsoft On the Issues
Windows Server Long-Term Servicing Channel Preview in ISO format in 18 languages, and in VHDX format in English only.
Windows Server Datacenter Azure Edition Preview in ISO and VHDX format, English only.
Microsoft Server Languages and Optional Features Preview
Keys: Keys are valid for preview builds only
Server Standard: MFY9F-XBN2F-TYFMP-CCV49-RMYVH
Datacenter: 2KNJJ-33Y9H-2GXGX-KMQWH-G6H67
Azure Edition does not accept a key
Symbols: available on the public symbol server – see Using the Microsoft Symbol Server.
Expiration: This Windows Server Preview will expire September 15, 2024.
How to Download
Registered Insiders may navigate directly to the Windows Server Insider Preview download page. If you have not yet registered as an Insider, see GETTING STARTED WITH SERVER on the Windows Insiders for Business portal.
We value your feedback!
The most important part of the release cycle is to hear what’s working and what needs to be improved, so your feedback is extremely valued. Beginning with Insider build 26063, please use the new Feedback Hub app for Windows Server if you are running a Desktop version of Server. If you are using a Core edition, or if you are unable to use the Feedback Hub app, you can use your registered Windows 10 or Windows 11 Insider device and use the Feedback Hub application. In the app, choose the Windows Server category and then the appropriate subcategory for your feedback. In the title of the Feedback, please indicate the build number you are providing feedback on as shown below to ensure that your issue is attributed to the right version:
[Server #####] Title of my feedback
See Give Feedback on Windows Server via Feedback Hub for specifics. The Windows Server Insiders space on the Microsoft Tech Communities supports preview builds of the next version of Windows Server. Use the forum to collaborate, share and learn from experts. For versions that have been released to general availability in market, try the Windows Server for IT Pro forum or contact Support for Business.
Diagnostic and Usage Information
Microsoft collects this information over the internet to help keep Windows secure and up to date, troubleshoot problems, and make product improvements. Microsoft server operating systems can be configured to turn diagnostic data off, send Required diagnostic data, or send Optional diagnostic data. During previews, Microsoft asks that you change the default setting to Optional to provide the best automatic feedback and help us improve the final product.
Administrators can change the level of information collection through Settings. For details, see http://aka.ms/winserverdata. Also see the Microsoft Privacy Statement.
Terms of Use
This is pre-release software – it is provided for use “as-is” and is not supported in production environments. Users are responsible for installing any updates that may be made available from Windows Update. All pre-release software made available to you via the Windows Server Insider program is governed by the Insider Terms of Use.
Announcing Windows Server Preview Build 26212
Hello Windows Server Insiders!
Today we are pleased to release a new build of the next Windows Server Long-Term Servicing Channel (LTSC) Preview that contains both the Desktop Experience and Server Core installation options for Datacenter and Standard editions, Annual Channel for Container Host and Azure Edition (for VM evaluation only). Branding has been updated for the upcoming release, Windows Server 2025 in this preview – when reporting issues please refer to Windows Server 2025 preview. If you signed up for Server Flighting, you should receive this new build automatically.
What’s New
[NEW] Delegated Managed Service Accounts (dMSA)
A new account type known as delegated Managed Service Account (dMSA) is now available that allows migration from a traditional service account to a machine account with managed and fully randomized keys, while disabling original service account passwords.
Authentication for dMSA is linked to the device identity, which means that only specified machine identities mapped in AD can access the account. Using dMSA helps to prevent harvesting credentials using a compromised account (kerberoasting), which is a common issue with traditional service accounts.
To learn more about dMSA, visit https://learn.microsoft.com/en-us/windows-server/security/delegated-managed-service-accounts/delegated-managed-service-accounts-overview.
[NEW] More Server Message Block (SMB) protocol changes.
Starting with Build 26097 and higher, we are introducing the following Server Message Block (SMB) protocol changes for QUIC, signing, and encryption:
SMB over QUIC client and server disable: Administrators can now disable the SMB over QUIC client and SMB over QUIC server options with Group Policy and PowerShell.
SMB over QUIC client and server connection auditing: Successful SMB over QUIC client and SMB over QUIC server connection events are now written to the event log to include the QUIC transport.
SMB signing and encryption auditing: Administrators can now enable auditing of the SMB server and client for support of SMB signing and encryption. This shows if a third-party client or server doesn’t support SMB encryption or signing. You can configure these settings with PowerShell and Group Policy.
For details on configuring these new settings, review https://aka.ms/SMB74MDNP.
For more information on SMB over QUIC in Windows and Windows Server Insider Preview builds, review https://aka.ms/SMBoverQUICServer and https://aka.ms/SmbOverQuicCAC.
For more information on SMB signing and encryption in Windows and Windows Server Insider Preview builds, review https://aka.ms/SmbSigningRequired and https://aka.ms/SmbClientEncrypt.
Windows Server Flighting is here!!
If you signed up for Server Flighting, you should receive this new build automatically later today.
For more information, see Welcome to Windows Insider flighting on Windows Server – Microsoft Community Hub
The new Feedback Hub app is now available for Server Desktop users!
The app should automatically update with the latest version, but if it does not, simply Check for updates in the app’s settings tab.
Known Issues
Upgrade does not complete: Some users may experience an issue when upgrading where the download process does not progress beyond 0%. If you encounter this issue, please upgrade to this newer build using the ISO media download option. Download Windows Server Insider Preview (microsoft.com)
VMs created using ISO media may not boot: Some users may encounter boot issues when creating Gen 2 VMs using this build (26063) and attempting to set the DVD ISO as boot preference. The new VM is unable to boot through the ISO and skips to subsequent boot options. This will be addressed in a future release.
Access denied error when using Diskpart –> Clean Image on Winpe.vhdx VMs created using WinPE: Create bootable media | Microsoft Learn. We are working to resolve this issue and expect to have it fixed in the next preview release.
Download Windows Server Insider Preview (microsoft.com)
Flighting: The label for this flight may incorrectly reference Windows 11. However, when selected, the package installed is the Windows Server update. Please ignore the label and proceed with installing your flight. This issue will be addressed in a future release.
Setup: Some users may experience overlapping rectangle voids following mouse clicks during “OOBE” setup. This is a graphics rendering issue and will not prevent setup from completing. This issue will be addressed in a future release.
WinPE – Powershell Scripts: Applying the WinPE-Powershell optional component does not properly install Powershell in WinPE. As a result, Powershell cmdlets will fail. Customers who are dependent on Powershell in WinPE should not use this build.
If you are validating upgrades from Windows Server 2019 or 2022, we do not recommend that you use this build as intermittent upgrade failures have been identified for this build.
This build has an issue where archiving eventlogs with “wevetutil al” command causes the Windows Event Log service to crash, and the archive operation to fail. The service must be restarted by executing “Start-Service EventLog” from an administrative command line prompt.
If you have Secure Launch/DRTM code path enabled, we do not recommend that you install this build.
Available Downloads
Downloads to certain countries may not be available. See Microsoft suspends new sales in Russia – Microsoft On the Issues
Windows Server Long-Term Servicing Channel Preview in ISO format in 18 languages, and in VHDX format in English only.
Windows Server Datacenter Azure Edition Preview in ISO and VHDX format, English only.
Microsoft Server Languages and Optional Features Preview
Keys: Keys are valid for preview builds only
Server Standard: MFY9F-XBN2F-TYFMP-CCV49-RMYVH
Datacenter: 2KNJJ-33Y9H-2GXGX-KMQWH-G6H67
Azure Edition does not accept a key
Symbols: available on the public symbol server – see Using the Microsoft Symbol Server.
Expiration: This Windows Server Preview will expire September 15, 2024.
How to Download
Registered Insiders may navigate directly to the Windows Server Insider Preview download page. If you have not yet registered as an Insider, see GETTING STARTED WITH SERVER on the Windows Insiders for Business portal.
We value your feedback!
The most important part of the release cycle is to hear what’s working and what needs to be improved, so your feedback is extremely valued. Beginning with Insider build 26063, please use the new Feedback Hub app for Windows Server if you are running a Desktop version of Server. If you are using a Core edition, or if you are unable to use the Feedback Hub app, you can use your registered Windows 10 or Windows 11 Insider device and use the Feedback Hub application. In the app, choose the Windows Server category and then the appropriate subcategory for your feedback. In the title of the Feedback, please indicate the build number you are providing feedback on as shown below to ensure that your issue is attributed to the right version:
[Server #####] Title of my feedback
See Give Feedback on Windows Server via Feedback Hub for specifics. The Windows Server Insiders space on the Microsoft Tech Communities supports preview builds of the next version of Windows Server. Use the forum to collaborate, share and learn from experts. For versions that have been released to general availability in market, try the Windows Server for IT Pro forum or contact Support for Business.
Diagnostic and Usage Information
Microsoft collects this information over the internet to help keep Windows secure and up to date, troubleshoot problems, and make product improvements. Microsoft server operating systems can be configured to turn diagnostic data off, send Required diagnostic data, or send Optional diagnostic data. During previews, Microsoft asks that you change the default setting to Optional to provide the best automatic feedback and help us improve the final product.
Administrators can change the level of information collection through Settings. For details, see http://aka.ms/winserverdata. Also see the Microsoft Privacy Statement.
Terms of Use
This is pre-release software – it is provided for use “as-is” and is not supported in production environments. Users are responsible for installing any updates that may be made available from Windows Update. All pre-release software made available to you via the Windows Server Insider program is governed by the Insider Terms of Use. Read More
Goodbye Planner
Just checked out the new Planner, it changed my board categories to something I don’t want, I hate it. No useful features like “@”mentions for the comments, Trello has had that feature for a decade. Why don’t we have the flexibility to use it as we see fit? Leaving this stuff up to developers will never be a good fit.
Just checked out the new Planner, it changed my board categories to something I don’t want, I hate it. No useful features like “@”mentions for the comments, Trello has had that feature for a decade. Why don’t we have the flexibility to use it as we see fit? Leaving this stuff up to developers will never be a good fit. Read More