Category: News
How to implement modal progress bars and wait bar in MATLAB Simulink
Hello everyone,
I’ve developed a Simulink model where progress bars are displayed on a UI figure within the Simulink environment. While a progress bar is active, users can inadvertently click anywhere within the Simulink interface. However, I want to restrict user interaction with the Simulink interface while a progress bar is active, allowing control only when the progress is completed. How can I implement this restriction effectively?Hello everyone,
I’ve developed a Simulink model where progress bars are displayed on a UI figure within the Simulink environment. While a progress bar is active, users can inadvertently click anywhere within the Simulink interface. However, I want to restrict user interaction with the Simulink interface while a progress bar is active, allowing control only when the progress is completed. How can I implement this restriction effectively? Hello everyone,
I’ve developed a Simulink model where progress bars are displayed on a UI figure within the Simulink environment. While a progress bar is active, users can inadvertently click anywhere within the Simulink interface. However, I want to restrict user interaction with the Simulink interface while a progress bar is active, allowing control only when the progress is completed. How can I implement this restriction effectively? simulink, matlab MATLAB Answers — New Questions
starting condition of feedback scheme in simulink
Hi! How can I set a starting condition as input of my system? The input at t=0 is a constant error vector, but I don’t know how to sum/activate it. Then the error should be csi_desired-csi_attuale for any t different from 0.Hi! How can I set a starting condition as input of my system? The input at t=0 is a constant error vector, but I don’t know how to sum/activate it. Then the error should be csi_desired-csi_attuale for any t different from 0. Hi! How can I set a starting condition as input of my system? The input at t=0 is a constant error vector, but I don’t know how to sum/activate it. Then the error should be csi_desired-csi_attuale for any t different from 0. feedback, robotics MATLAB Answers — New Questions
Outlook (2019 Desktop) with 2 accounts. does not add tasks from 2nd account to todo list
Hi,
I use Outlook 2019 with 2 email accounts from 2 domain (a + b).
My to-do list wast maintained in account a and I used it successfully for number of years to manage tasks for a and b.
Recently, the contents of the to-do list disappeared .. it seems that the todo list is maintained in account b and I can only add tasks from account b to the todo list.
Can anyone advise how to revert to the pervious scenario .. where todo list was maintained in a and I an add tasks from a and b to the to do list?
Thank you
john
Hi,I use Outlook 2019 with 2 email accounts from 2 domain (a + b).My to-do list wast maintained in account a and I used it successfully for number of years to manage tasks for a and b.Recently, the contents of the to-do list disappeared .. it seems that the todo list is maintained in account b and I can only add tasks from account b to the todo list. Can anyone advise how to revert to the pervious scenario .. where todo list was maintained in a and I an add tasks from a and b to the to do list? Thank you john Read More
AI data analysis features is not find in excel
Previously, while using Windows 10 and Excel 2019, I frequently utilized the AI data analysis features in Excel. However, since upgrading to Windows 11, I am no longer able to locate or access these features. Despite contacting Microsoft Customer Support, the issue remains unresolved.
Could you please guide me on how to restore the AI data analysis tools in Excel under the Windows 11 environment? Your assistance in this matter would be greatly appreciated.
Previously, while using Windows 10 and Excel 2019, I frequently utilized the AI data analysis features in Excel. However, since upgrading to Windows 11, I am no longer able to locate or access these features. Despite contacting Microsoft Customer Support, the issue remains unresolved.Could you please guide me on how to restore the AI data analysis tools in Excel under the Windows 11 environment? Your assistance in this matter would be greatly appreciated. Read More
Automated Spreadsheet
Hi people
I need some help!
I need to have a spreadsheet that has a drop down list in A1 so when an item is selected it will auto populate B1 with the corresponding part number and also in C1 the cost of the selected Item.
thanks
Jamie
Hi people I need some help! I need to have a spreadsheet that has a drop down list in A1 so when an item is selected it will auto populate B1 with the corresponding part number and also in C1 the cost of the selected Item. thanks Jamie Read More
lost gmail emails
I have just lost all emails since I switched to gmail about a month ago. This inbox sent even archive .Any help ?
I have just lost all emails since I switched to gmail about a month ago. This inbox sent even archive .Any help ? Read More
Preparing for CMMC 2.0: Build New or Fix Old?
As the Defense Industrial Base (DIB) awaits the finalization and rollout of proposed changes to the Cybersecurity Maturity Model Certification (CMMC) program, there are still plenty of ways to begin preparing for CMMC 2.0 now. Some aspects of the revised model are more streamlined; for instance, CMMC 2.0 will only have three levels of certification, ranging from basic cyber hygiene to advanced practices. However, other proposed changes reflect tighter standards for supply chain cybersecurity. Depending on the type and scope of the contracts they pursue, defense contractors – and even the external service providers in their security stack – will now need to achieve a certain level of CMMC compliance by 2025.
When preparing their IT environments for CMMC compliance, defense contractors have two choices: build a new environment or try to fix their current one. Both options have pros and cons, and the decision will depend on several factors, such as the current state of the environment, the budget, the timeline, and the desired level of CMMC certification.
Build New or Fix Old: A Car Analogy
To illustrate the difference between building new and fixing old, let’s use a car analogy. Imagine you have an old car that has been serving you well for many years, but it has some problems. It consumes a lot of gas, it breaks down frequently, it has outdated features, and it doesn’t meet the latest safety standards. You know it’s time to upgrade your car, but that leaves you with two options: buy a new car or repair the old one.
Buying a new car would give you many benefits. You would get a more efficient, reliable, modern, and safe car that meets your needs and preferences. You would also save money and time in the long run, as you would avoid costly and frequent repairs. However, buying a new car also has some drawbacks. You would have to pay a large upfront cost, you would have to learn how to use the new features, and you would have to deal with the hassle of selling or disposing of the old car.
Repairing the old car would also have some advantages. You would avoid the upfront cost of buying a new car, you would keep the familiarity and comfort of the old car, and you would extend its lifespan. However, repairing the old car also has some disadvantages. You would still have to pay for the repairs, which could be expensive and frequent. You would also have to compromise on the performance, features, and safety of the car, as you would be trying to make it work with older technologies. Moreover, you would risk not meeting the latest standards and regulations, which could affect your eligibility for certain benefits or opportunities.
How Does This Apply to CMMC?
The car analogy can help us understand the trade-offs between building new and fixing old IT environments for CMMC. Building new environments would mean creating a separate and secure network for handling controlled unclassified information (CUI) and other sensitive data. This would allow defense contractors to design and implement the best practices and technologies for CMMC compliance, such as encryption, segmentation, monitoring, and backup. Building new environments would also reduce the risk of cyberattacks, data breaches, and non-compliance penalties. However, building new environments would also require a significant investment of time, money, and resources. Defense contractors would have to plan, procure, deploy, and test the new environments, as well as train their staff and migrate their data and applications.
Fixing old environments would mean trying to retrofit the existing network with the necessary security controls and processes for CMMC compliance. This would allow defense contractors to leverage their current infrastructure and avoid the disruption of building new environments. Fixing old environments would also enable defense contractors to maintain their business continuity and operations. However, fixing old environments would also pose many challenges and risks. Defense contractors would have to identify and remediate the gaps and vulnerabilities in their network, which could be complex and time-consuming. They would also have to deal with the compatibility and integration issues of adding new security solutions to their old systems. Moreover, they would risk not achieving the desired level of CMMC compliance, as they would be trying to make their old environments meet the new standards.
Considering Costs: Build New or Fix Old
The CMMC program is designed to assess an organization’s entire IT environment, and in the case of prime contractors, may soon include flow down requirements to attest to the security posture of their subcontractors’ environments as well. That means that many organizations will need to assess their CMMC readiness against a mix of cloud, hybrid, and on-premise environments.
When considering whether it’s better to build a new or fix an existing environment, the most important factor to consider is cost. The cost of preparing for CMMC will vary depending on the size, complexity, and maturity of the IT environment, as well as the level of CMMC certification required. Here are the typical types of costs contractors should consider when preparing their IT environment for CMMC compliance:
Hardware: Includes the purchase of new servers, switches, routers, firewalls, and other devices for the new environment, or the upgrade of the existing devices for the old environment.
Software: Includes the purchase of new licenses, subscriptions, or updates for the security solutions, such as antivirus, firewall, encryption, backup, and monitoring software.
Services: Includes the fees of external consultants, auditors, or contractors that help with the planning, implementation, testing, and certification of the new or old environment.
Training: Includes the expenses of educating the staff on how to use, manage, and maintain the new or old environment.
Maintenance: Includes the ongoing costs of keeping the new or old environment operational, such as power, cooling, support, and updates.
Repairs: Includes the occasional costs of fixing the problems or issues that arise in the new or old environment, such as hardware failures, software bugs, or security incidents.
While specific costs vary by technology and service provider, most organizations can expect to see a higher upfront cost to build a new environment, but lower ongoing costs for its maintenance and repairs. For organizations that decide to only focus on upgrading or migrating certain parts of their IT environment, it’s also important to consider the potential cost benefits and risks to the environment’s overall performance, reliability, security, and compliance. Here are some questions to help guide that decision-making process:
Do we have the financial and technical staff resources to achieve compliance with our current environment?
Is it more cost-effective to migrate our CUI workloads to a separate government-compliant cloud enclave?
Are we better prepared to meet any other future compliance requirements with our current environment?
Where to Start?
While the path to CMMC compliance may not be simple, there are some scenarios where the decision to build new or fix old becomes quite clear. Organizations that are significantly behind on compliance standards — and lack the internal resources to address those gaps — may opt to build new right away. On the other hand, organizations that are already heavily resourced for compliance management may only need to make small adjustments to ensure new requirements are met.
Still wondering where to begin? BlueVoyant’s CMMC compliance decision tree should help get you started.
Build New or Fix Old: CMMC Compliance Decision Tree
Please keep in mind that GCC and GCCH are Microsoft environment that can meet FedRAMP requirements. For more information on the difference between different O365 environments please visit Richard Wakeman’s article on “Understanding Compliance Between Commercial, Government and DoD Offerings“
No matter which path your organization decides to take, there are several activities that every defense contractor can do now to effectively reduce cybersecurity risk and increase resilience in the long term:
Understand your FCI/CUI dataflow and prepare for CMMC readiness.
Verify compliance of cloud services used to handle CUI.
Gain deeper visibility of your supply chain.
Create scalable risk mitigation plans to address ongoing threats.
Regularly validate technical controls with continuous monitoring tools.
Establish processes to collaborate with subtractors on cyber remediation.
Conclusion
Preparing for CMMC is a critical and urgent task for defense contractors that want to stay competitive and compliant in the defense industry. They have two choices: build new environments for the or try to fix their current environment. Both options have pros and cons, and the decision will depend on several factors, such as the current state of the environment, the budget, the timeline, and the desired level of CMMC certification. Defense contractors need to evaluate their options carefully and choose the one that best meets their needs and expectations.
Interested in learning more about CMMC compliance? Check out BlueVoyant’s recent webinar here.
Appendix
Here are additional blog articles from CMMC Acceleration:
Blog Title
Aka Link
Sharing Lessons Learned from Microsoft’s Joint Surveillance Audit
Get Started with Microsoft Learn for CMMC
New! Microsoft Collaboration Framework
https://aka.ms/ND-ISAC/CollabFramework
New! ND-ISAC MSCloud – Reference Identity Architectures for the US Defense Industrial Base
https://aka.ms/ND-ISAC/IdentityWP
History of Microsoft Cloud Service Offerings leading to the US Sovereign Cloud for Government
https://aka.ms/USSovereignCloud
Gold Standard! Understanding Compliance Between Microsoft 365 Commercial, GCC, GCC-High and DoD Offerings
https://aka.ms/MSGovCompliance
The Microsoft 365 Government (GCC High) Conundrum – DIB Data Enclave vs Going All In
Microsoft US Sovereign Cloud Myth Busters – A Global Address List (GAL) Can Span Multiple Tenants
Microsoft US Sovereign Cloud Myth Busters – A Single Domain Should Not Span Multiple Tenants
Microsoft US Sovereign Cloud Myth Busters – Active Directory Does Not Require Restructuring
Microsoft US Sovereign Cloud Myth Busters – CUI Effectively Requires Data Sovereignty
Microsoft expands qualification of contractors for government cloud offerings
https://aka.ms/GovCloudEligibility
Microsoft Tech Community – Latest Blogs –Read More
An error occurred while Defining Custom Classification Output Layer:Error using ‘backwardLoss’ in Layer sseClassificationLayer. The function threw an error and could not be executed.
Here is my code:
classdef sseClassificationLayer < nnet.layer.ClassificationLayer
% Example custom classification layer with sum of squares error loss.
methods
function layer = sseClassificationLayer(name)
% layer = sseClassificationLayer(name) creates a sum of squares
% error classification layer and specifies the layer name.
% Set layer name.
layer.Name = name;
% Set layer description.
layer.Description = ‘Sum of squares error’;
end
function loss = forwardLoss(~, Y, T)
% loss = forwardLoss(layer, Y, T) returns the SSE loss between
% the predictions Y and the training targets T.
% Calculate sum of squares.
sumSquares = sum((Y-T).^2);
% Take mean over mini-batch.
N = size(Y,4);
loss = sum(sumSquares)/N;
end
function dLdY = backwardLoss(~, ~, ~)
% (Optional) Backward propagate the derivative of the loss
% function.
%
% Inputs:
% layer – Output layer
% Y – Predictions made by network
% T – Training targets
%
% Output:
% dLdY – Derivative of the loss with respect to the
% predictions Y
% Layer backward loss function goes here.
N = size(Y,4);
dLdY = 2*(Y-T)/N;
end
end
endHere is my code:
classdef sseClassificationLayer < nnet.layer.ClassificationLayer
% Example custom classification layer with sum of squares error loss.
methods
function layer = sseClassificationLayer(name)
% layer = sseClassificationLayer(name) creates a sum of squares
% error classification layer and specifies the layer name.
% Set layer name.
layer.Name = name;
% Set layer description.
layer.Description = ‘Sum of squares error’;
end
function loss = forwardLoss(~, Y, T)
% loss = forwardLoss(layer, Y, T) returns the SSE loss between
% the predictions Y and the training targets T.
% Calculate sum of squares.
sumSquares = sum((Y-T).^2);
% Take mean over mini-batch.
N = size(Y,4);
loss = sum(sumSquares)/N;
end
function dLdY = backwardLoss(~, ~, ~)
% (Optional) Backward propagate the derivative of the loss
% function.
%
% Inputs:
% layer – Output layer
% Y – Predictions made by network
% T – Training targets
%
% Output:
% dLdY – Derivative of the loss with respect to the
% predictions Y
% Layer backward loss function goes here.
N = size(Y,4);
dLdY = 2*(Y-T)/N;
end
end
end Here is my code:
classdef sseClassificationLayer < nnet.layer.ClassificationLayer
% Example custom classification layer with sum of squares error loss.
methods
function layer = sseClassificationLayer(name)
% layer = sseClassificationLayer(name) creates a sum of squares
% error classification layer and specifies the layer name.
% Set layer name.
layer.Name = name;
% Set layer description.
layer.Description = ‘Sum of squares error’;
end
function loss = forwardLoss(~, Y, T)
% loss = forwardLoss(layer, Y, T) returns the SSE loss between
% the predictions Y and the training targets T.
% Calculate sum of squares.
sumSquares = sum((Y-T).^2);
% Take mean over mini-batch.
N = size(Y,4);
loss = sum(sumSquares)/N;
end
function dLdY = backwardLoss(~, ~, ~)
% (Optional) Backward propagate the derivative of the loss
% function.
%
% Inputs:
% layer – Output layer
% Y – Predictions made by network
% T – Training targets
%
% Output:
% dLdY – Derivative of the loss with respect to the
% predictions Y
% Layer backward loss function goes here.
N = size(Y,4);
dLdY = 2*(Y-T)/N;
end
end
end define custom classification output layer MATLAB Answers — New Questions
convert simulink model to older version
I have a model developed in matlab ver 2023a I need to convert it into version 2011a.
I ask if it’s possible doing this:
1) convert from 2023a to 2016a
2) then convert the converted model from 2016a to 2011a
Thanks to any answer
Regars
MichelaI have a model developed in matlab ver 2023a I need to convert it into version 2011a.
I ask if it’s possible doing this:
1) convert from 2023a to 2016a
2) then convert the converted model from 2016a to 2011a
Thanks to any answer
Regars
Michela I have a model developed in matlab ver 2023a I need to convert it into version 2011a.
I ask if it’s possible doing this:
1) convert from 2023a to 2016a
2) then convert the converted model from 2016a to 2011a
Thanks to any answer
Regars
Michela model, convert, 2016a, 2011 MATLAB Answers — New Questions
Set up Datastore for S3 Archive, with Role Based credentials
I have an AWS S3 Archive and would like to access data. However, the permissions to access the S3 archive are Role Based, not individual accounts. In that case, how do I set the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY?? Thanks.I have an AWS S3 Archive and would like to access data. However, the permissions to access the S3 archive are Role Based, not individual accounts. In that case, how do I set the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY?? Thanks. I have an AWS S3 Archive and would like to access data. However, the permissions to access the S3 archive are Role Based, not individual accounts. In that case, how do I set the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY?? Thanks. datastore, s3 archive MATLAB Answers — New Questions
Write MATLAB code to perform the following computations:
Consider a set U = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} as the universe of discourse for the two fuzzy sets A˜ and B˜ with the below membership functions. µ˜(A) (x) = x 2 − x 4x 2 µ˜(B) (x) = 4x 2 − 3x 6x 2 Write MATLAB code to perform the following computations:
1. Determine whether A˜ is contained within B˜.
2. A˜ ∪ B˜
3. A˜ ∩ B˜
4. Complement of B˜
5. A˜ * B˜
6. A˜ + B˜
7. A˜ – B˜
8. A˜ L B˜
9. A˜ J B˜
10. Bounded difference of B˜ and A˜
11. Height, Cardinality, Support, and Core of A˜ and B˜
12. Cartesian Product of A˜ and BConsider a set U = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} as the universe of discourse for the two fuzzy sets A˜ and B˜ with the below membership functions. µ˜(A) (x) = x 2 − x 4x 2 µ˜(B) (x) = 4x 2 − 3x 6x 2 Write MATLAB code to perform the following computations:
1. Determine whether A˜ is contained within B˜.
2. A˜ ∪ B˜
3. A˜ ∩ B˜
4. Complement of B˜
5. A˜ * B˜
6. A˜ + B˜
7. A˜ – B˜
8. A˜ L B˜
9. A˜ J B˜
10. Bounded difference of B˜ and A˜
11. Height, Cardinality, Support, and Core of A˜ and B˜
12. Cartesian Product of A˜ and B Consider a set U = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} as the universe of discourse for the two fuzzy sets A˜ and B˜ with the below membership functions. µ˜(A) (x) = x 2 − x 4x 2 µ˜(B) (x) = 4x 2 − 3x 6x 2 Write MATLAB code to perform the following computations:
1. Determine whether A˜ is contained within B˜.
2. A˜ ∪ B˜
3. A˜ ∩ B˜
4. Complement of B˜
5. A˜ * B˜
6. A˜ + B˜
7. A˜ – B˜
8. A˜ L B˜
9. A˜ J B˜
10. Bounded difference of B˜ and A˜
11. Height, Cardinality, Support, and Core of A˜ and B˜
12. Cartesian Product of A˜ and B matlab MATLAB Answers — New Questions
Easily caption videos in PowerPoint for the web
Hi Microsoft 365 Insiders!
:globe_with_meridians:Accessibility is key in today’s diverse environment, and we’re excited to introduce a new feature in PowerPoint for the web that makes it easier than ever to caption your videos. This enhancement not only supports inclusivity but also enriches the viewer’s experience by providing clear, concise captions for all video content.
In our latest blog, Peter Wu, Principal Engineer on the PowerPoint team, delves into the simple steps you can take to add captions to your videos directly from within PowerPoint, ensuring your message is accessible to everyone. Whether for educational purposes, training, or international audiences, this feature is designed to meet the needs of every PowerPoint user.
Blog: Easily caption videos in PowerPoint for the web
This new feature will be coming in June!
Perry Sjogren
Microsoft 365 Insider Social Media Manager
Become a Microsoft 365 Insider and gain exclusive access to new features and help shape the future of Microsoft 365. Join Now: Windows | Mac | iOS | Android
Hi Microsoft 365 Insiders!
:globe_with_meridians:Accessibility is key in today’s diverse environment, and we’re excited to introduce a new feature in PowerPoint for the web that makes it easier than ever to caption your videos. This enhancement not only supports inclusivity but also enriches the viewer’s experience by providing clear, concise captions for all video content.
In our latest blog, Peter Wu, Principal Engineer on the PowerPoint team, delves into the simple steps you can take to add captions to your videos directly from within PowerPoint, ensuring your message is accessible to everyone. Whether for educational purposes, training, or international audiences, this feature is designed to meet the needs of every PowerPoint user.
Blog: Easily caption videos in PowerPoint for the web
This new feature will be coming in June!
Perry Sjogren
Microsoft 365 Insider Social Media Manager
Become a Microsoft 365 Insider and gain exclusive access to new features and help shape the future of Microsoft 365. Join Now: Windows | Mac | iOS | Android Read More
Azure – PowerShell script to change the Table Retention in Azure Log Analytics Workspaces
With large scale implementation of Azure, the Log Analytics Workspace volume could increase and the default value for retention is quite long if you are not changing it.
This PowerShell script will help you to reset the 2 retention values applied in Workspace Tables (Live and Total).
I applied a selection criteria based in name as we are using a naming convention with status (prod, vs nonprod), you can anyway adapt this part with your context.
#Install-Module -Name Az -Repository PSGallery -Force
Import-module Az
Connect-AzAccount
$RetentionDays = 30
$TotalRetentionDays = 30
$AzureRetentionDays = 90
$AzureTotalRetentionDays = 90
$namecriteria = “nonprod”
$All_Az_Subscriptions = Get-AzSubscription
Foreach ($Az_Subscription in $All_Az_Subscriptions)
{
###################################################
#Set the context
Write-Host “Working on subscription “”$($Az_Subscription.Name)”””
Set-AzContext -SubscriptionObject $Az_Subscription | Out-Null
$AllWorkspaces = Get-AzOperationalInsightsWorkspace
foreach ($myWorkspace in $AllWorkspaces)
{
Write-Host ” —————“, $myWorkspace.Name ,”—————- ” -foregroundcolor “gray”
if ($myWorkspace.Name -match $namecriteria)
{
Write-Host ” >>> WORKSPACE TO APPLY RETENTION ADJUSTMENT:”, $myWorkspace.Name -foregroundcolor “green”
if ($myWorkspace.retentionInDays -gt $RetentionDays)
{
Write-Host ” >>> APPLYING DEFAULT RETENTION PERIOD:”, $RetentionDays -foregroundcolor “yellow”
Set-AzOperationalInsightsWorkspace -ResourceGroupName $myWorkspace.ResourceGroupName -Name $myWorkspace.Name -RetentionInDays $RetentionDays
}
$GetAllTables = Get-AzOperationalInsightsTable -ResourceGroupName $myWorkspace.ResourceGroupName -WorkspaceName $myWorkspace.Name
foreach ($MyTable in $GetAllTables)
{
if (($MyTable.Name -eq “AzureActivity”) -or ($MyTable.Name -eq “Usage”))
{
if (($MyTable.RetentionInDays -gt $AzureRetentionDays) -or ($MyTable.TotalRetentionInDays -gt $AzureTotalRetentionDays))
{
Write-Host ” >>> APPLYING SPECIFIC RETENTION PERIOD:”, $AzureRetentionDays, “- TABLE:”, $MyTable.Name -foregroundcolor “yellow”
Update-AzOperationalInsightsTable -ResourceGroupName $MyTable.ResourceGroupName -WorkspaceName $MyTable.WorkspaceName -TableName $MyTable.Name -RetentionInDays $AzureRetentionDays -TotalRetentionInDays $AzureTotalRetentionDays
}
else
{
Write-Host ” >>> NO CHANGE FOR RETENTION PERIOD FOR TABLE:”, $MyTable.Name -foregroundcolor “green”
}
}
else
{
if (($MyTable.RetentionInDays -gt $RetentionDays) -or ($MyTable.TotalRetentionInDays -gt $RetentionDays))
{
Write-Host ” >>> APPLYING NEW RETENTION PERIOD:”, $RetentionDays, “- TABLE:”, $MyTable.Name -foregroundcolor “yellow”
Update-AzOperationalInsightsTable -ResourceGroupName $MyTable.ResourceGroupName -WorkspaceName $MyTable.WorkspaceName -TableName $MyTable.Name -RetentionInDays $RetentionDays -TotalRetentionInDays $TotalRetentionDays
}
else
{
Write-Host ” >>> NO CHANGE FOR RETENTION PERIOD FOR TABLE:”, $MyTable.Name -foregroundcolor “green”
}
}
}
}
else
{
Write-Host ” >>> WORKSPACE NOT CONCERNED BY THIS CHANGE:”, $myWorkspace.Name -foregroundcolor “green”
}
}
}
With this script, we reduced the Workspace cost for non prod drastically maintaining only the last 30 days live without any archive.
The material used for this script is:
https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-retention-archive?tabs=portal-3%2Cportal-1%2Cportal-2https://learn.microsoft.com/en-us/powershell/module/az.operationalinsights/get-azoperationalinsightsworkspace?view=azps-11.6.0https://learn.microsoft.com/en-us/powershell/module/az.operationalinsights/update-azoperationalinsightstable?view=azps-11.6.0
Fabrice Romelard
With large scale implementation of Azure, the Log Analytics Workspace volume could increase and the default value for retention is quite long if you are not changing it.This PowerShell script will help you to reset the 2 retention values applied in Workspace Tables (Live and Total).I applied a selection criteria based in name as we are using a naming convention with status (prod, vs nonprod), you can anyway adapt this part with your context. #Install-Module -Name Az -Repository PSGallery -Force
Import-module Az
Connect-AzAccount
$RetentionDays = 30
$TotalRetentionDays = 30
$AzureRetentionDays = 90
$AzureTotalRetentionDays = 90
$namecriteria = “nonprod”
$All_Az_Subscriptions = Get-AzSubscription
Foreach ($Az_Subscription in $All_Az_Subscriptions)
{
###################################################
#Set the context
Write-Host “Working on subscription “”$($Az_Subscription.Name)”””
Set-AzContext -SubscriptionObject $Az_Subscription | Out-Null
$AllWorkspaces = Get-AzOperationalInsightsWorkspace
foreach ($myWorkspace in $AllWorkspaces)
{
Write-Host ” —————“, $myWorkspace.Name ,”—————- ” -foregroundcolor “gray”
if ($myWorkspace.Name -match $namecriteria)
{
Write-Host ” >>> WORKSPACE TO APPLY RETENTION ADJUSTMENT:”, $myWorkspace.Name -foregroundcolor “green”
if ($myWorkspace.retentionInDays -gt $RetentionDays)
{
Write-Host ” >>> APPLYING DEFAULT RETENTION PERIOD:”, $RetentionDays -foregroundcolor “yellow”
Set-AzOperationalInsightsWorkspace -ResourceGroupName $myWorkspace.ResourceGroupName -Name $myWorkspace.Name -RetentionInDays $RetentionDays
}
$GetAllTables = Get-AzOperationalInsightsTable -ResourceGroupName $myWorkspace.ResourceGroupName -WorkspaceName $myWorkspace.Name
foreach ($MyTable in $GetAllTables)
{
if (($MyTable.Name -eq “AzureActivity”) -or ($MyTable.Name -eq “Usage”))
{
if (($MyTable.RetentionInDays -gt $AzureRetentionDays) -or ($MyTable.TotalRetentionInDays -gt $AzureTotalRetentionDays))
{
Write-Host ” >>> APPLYING SPECIFIC RETENTION PERIOD:”, $AzureRetentionDays, “- TABLE:”, $MyTable.Name -foregroundcolor “yellow”
Update-AzOperationalInsightsTable -ResourceGroupName $MyTable.ResourceGroupName -WorkspaceName $MyTable.WorkspaceName -TableName $MyTable.Name -RetentionInDays $AzureRetentionDays -TotalRetentionInDays $AzureTotalRetentionDays
}
else
{
Write-Host ” >>> NO CHANGE FOR RETENTION PERIOD FOR TABLE:”, $MyTable.Name -foregroundcolor “green”
}
}
else
{
if (($MyTable.RetentionInDays -gt $RetentionDays) -or ($MyTable.TotalRetentionInDays -gt $RetentionDays))
{
Write-Host ” >>> APPLYING NEW RETENTION PERIOD:”, $RetentionDays, “- TABLE:”, $MyTable.Name -foregroundcolor “yellow”
Update-AzOperationalInsightsTable -ResourceGroupName $MyTable.ResourceGroupName -WorkspaceName $MyTable.WorkspaceName -TableName $MyTable.Name -RetentionInDays $RetentionDays -TotalRetentionInDays $TotalRetentionDays
}
else
{
Write-Host ” >>> NO CHANGE FOR RETENTION PERIOD FOR TABLE:”, $MyTable.Name -foregroundcolor “green”
}
}
}
}
else
{
Write-Host ” >>> WORKSPACE NOT CONCERNED BY THIS CHANGE:”, $myWorkspace.Name -foregroundcolor “green”
}
}
} With this script, we reduced the Workspace cost for non prod drastically maintaining only the last 30 days live without any archive. The material used for this script is:https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-retention-archive?tabs=portal-3%2Cportal-1%2Cportal-2https://learn.microsoft.com/en-us/powershell/module/az.operationalinsights/get-azoperationalinsightsworkspace?view=azps-11.6.0https://learn.microsoft.com/en-us/powershell/module/az.operationalinsights/update-azoperationalinsightstable?view=azps-11.6.0Fabrice Romelard Read More
New version of excel is having permission issues with opening some files
Hello
Please i need help on this issue.
The newest version of Excel 16.85 is having permission issues with opening encrypted Excel files. Had to roll back to the older 16.84 version for it to work.
Hello Please i need help on this issue. The newest version of Excel 16.85 is having permission issues with opening encrypted Excel files. Had to roll back to the older 16.84 version for it to work. Read More
Problem with an if formula
Trying to write an If formula. If cell A1 has A then formula A runs is cell C1. If Cell A1 has B then formula B runs in cell C1. This is what I tried but get an
=IF(A1=”UG”,(IF(ISBLANK(B1),””,EDATE(B1,6)),(“”)),IF(A1=”PS”,(IF(ISBLANK(B1),””,EDATE(B1,8)),(“”)))
Trying to write an If formula. If cell A1 has A then formula A runs is cell C1. If Cell A1 has B then formula B runs in cell C1. This is what I tried but get an =IF(A1=”UG”,(IF(ISBLANK(B1),””,EDATE(B1,6)),(“”)),IF(A1=”PS”,(IF(ISBLANK(B1),””,EDATE(B1,8)),(“”))) Read More
Microsoft 365 – Word – Find & Replace Highlighter Colour
In the desktop app of Microsoft Word, is there a way to change the highlight colour from grey to something more easily seen when using Find and Replace?
In the desktop app of Microsoft Word, is there a way to change the highlight colour from grey to something more easily seen when using Find and Replace? Read More
Read conversation threads in Oldest to Newest order
I have held off switching to New Outlook for a long time now because it’s lacking a feature from Old Outlook. Specifically, New Outlook does allow you to sort conversations with either Oldest or Newest first, which is good, but within a conversation, New Outlook seems to always put the newest message at the top. I prefer to read top to bottom and I generally want to read older messages first, so I’m curious if I’m missing something or if the rest of the world reads their emails differently. GMail conversations are sorted with the newest conversation on top, but within a conversation, the oldest messages are at the top. Am I missing the option to configure this?
I have held off switching to New Outlook for a long time now because it’s lacking a feature from Old Outlook. Specifically, New Outlook does allow you to sort conversations with either Oldest or Newest first, which is good, but within a conversation, New Outlook seems to always put the newest message at the top. I prefer to read top to bottom and I generally want to read older messages first, so I’m curious if I’m missing something or if the rest of the world reads their emails differently. GMail conversations are sorted with the newest conversation on top, but within a conversation, the oldest messages are at the top. Am I missing the option to configure this? Read More
Play videos in Outlook with Microsoft Stream
Hi Microsoft 365 Insiders!
Looking to make your internal communications more engaging and effective? Look no further! Embed Stream videos directly into your Outlook emails so that recipients can play back the video inline.
Read our latest blog to learn how: Play videos in Outlook with Microsoft Stream ️
Try it out and let us know what you think!
Thanks,
Perry Sjogren
Microsoft 365 Insider Social Media Manager
Become a Microsoft 365 Insider and gain exclusive access to new features and help shape the future of Microsoft 365.
Join Now: Windows | Mac | iOS | Android
Hi Microsoft 365 Insiders!
Looking to make your internal communications more engaging and effective? Look no further! Embed Stream videos directly into your Outlook emails so that recipients can play back the video inline.
Read our latest blog to learn how: Play videos in Outlook with Microsoft Stream ️
Try it out and let us know what you think!
Thanks,
Perry Sjogren
Microsoft 365 Insider Social Media Manager
Become a Microsoft 365 Insider and gain exclusive access to new features and help shape the future of Microsoft 365.
Join Now: Windows | Mac | iOS | Android Read More
Meeting recordings not available
Hello,
My team has saved the Microsoft Stream (Classic) recordings and I am not able to access them now. I read that the videos should have been migrated to Stream by now. Could you please help in retrieving those videos, since they have many important brownbag sessions. Thank you.
Regards,
Priya.
Hello,
My team has saved the Microsoft Stream (Classic) recordings and I am not able to access them now. I read that the videos should have been migrated to Stream by now. Could you please help in retrieving those videos, since they have many important brownbag sessions. Thank you.
Regards,
Priya. Read More
Phish delivered due to an ETR override
We recently switching from Defender to Proofpoint Essentials for email security. During implementation they had us create a Proofpoint bypass Spam Exchange Transport Rule. The rule marks anything coming from a Proofpoint IP address as Spam confidence level -1 (SCL -1). This rule seems to also be stopping Microsoft from sending phishing emails to quarantine.
Since implementation we’ve been receiving a lot of alerts for “Phish delivered due to an ETR override”. We’ve investigated the emails, and most are indeed phishing emails that Proofpoint has missed. Is it possible to adjust the transport rule to allow Microsoft to still quarantine these phishing emails? If not, what is the impact of disabling the rule? The emails will fail SPF, DKIM, and DMARC because they are delivered by Proofpoint, not the original sender.
Ultimately, I’d like to know if it’s possible to allow Microsoft to quarantine phishing emails that have already been filtered and delivered by a 3rd party cyber security vendor.
We recently switching from Defender to Proofpoint Essentials for email security. During implementation they had us create a Proofpoint bypass Spam Exchange Transport Rule. The rule marks anything coming from a Proofpoint IP address as Spam confidence level -1 (SCL -1). This rule seems to also be stopping Microsoft from sending phishing emails to quarantine. Since implementation we’ve been receiving a lot of alerts for “Phish delivered due to an ETR override”. We’ve investigated the emails, and most are indeed phishing emails that Proofpoint has missed. Is it possible to adjust the transport rule to allow Microsoft to still quarantine these phishing emails? If not, what is the impact of disabling the rule? The emails will fail SPF, DKIM, and DMARC because they are delivered by Proofpoint, not the original sender. Ultimately, I’d like to know if it’s possible to allow Microsoft to quarantine phishing emails that have already been filtered and delivered by a 3rd party cyber security vendor. Read More