Tag Archives: microsoft
Cant access exportFiles from defender for enpoint API (api/machines/SoftwareVulnerabilitiesExport)
I am using the following API endpoint to extract vulnerabilities from defender for endpoint:
https://api-eu.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilitiesExport (https://learn.microsoft.com/en-us/defender-endpoint/api/get-assessment-software-vulnerabilities#261-request-example ).
The endpoint returns links to the files containing the data. However, when we try to access these links we get this error.
This was working fine for the past weeks and I havent changed anything.
Any ideas what the problem is?
I am using the following API endpoint to extract vulnerabilities from defender for endpoint: https://api-eu.securitycenter.microsoft.com/api/machines/SoftwareVulnerabilitiesExport (https://learn.microsoft.com/en-us/defender-endpoint/api/get-assessment-software-vulnerabilities#261-request-example ). The endpoint returns links to the files containing the data. However, when we try to access these links we get this error. This was working fine for the past weeks and I havent changed anything. Any ideas what the problem is? Read More
Spotlight on Device Fingerprinting in DFP
We’re thrilled to bring you a weekly spotlight on various topics within our Microsoft Fraud Protection Tech Community. This week, we’re diving into the fascinating world of Device Fingerprinting in Microsoft Dynamics 365 Fraud Protection (DFP).
Ever wondered how Device Fingerprinting works and how it can benefit you? Check out our detailed Q&A below where we answer all your burning questions about this innovative feature.
If you have any questions or need further clarification on this topic, don’t hesitate to reply to this thread in the Fraud Protection Tech Community. Your feedback is incredibly valuable to us.
Best regards,
DFP Product Team
——————
1. Do I really need device fingerprinting? Why is it important?
Device fingerprinting is an essential feature in Microsoft Dynamics 365 Fraud Protection. It collects information about a computing device during online actions, which includes hardware, browser, geographic information, and IP address. This data is crucial as it helps the Fraud Protection service to track and link events in the fraud network, identifying patterns of fraud. The device fingerprinting feature uses artificial intelligence (AI) and machine learning to probabilistically identify devices, which can significantly improve the model detection rate for businesses by reducing false negatives. As a result, less fraud is detected on approved transactions after the fact.
It’s important to note that while device fingerprinting has a high accuracy, it is probabilistic and not deterministic, meaning there is a possibility of false positives. However, the benefits it brings to fraud detection and prevention are significant and can help protect businesses from fraudulent activities.
References:
Overview of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Set up device fingerprinting – Dynamics 365 Fraud Protection
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Attributes in device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
2. We don’t use Fingerprinting will DFP still work?
Yes, Dynamics 365 Fraud Protection (DFP) will still function without device fingerprinting. However, its effectiveness in detecting fraud will be reduced. Device fingerprinting is a powerful feature that enhances the ability of DFP to identify and link events in the fraud network, thereby improving the detection of fraudulent patterns. Without it, DFP can still assess risk based on other factors, but the absence of device fingerprinting data means it likely won’t be as accurate in identifying fraud.
3. How to do end to end device fingerprinting integration?
Integrating end-to-end device fingerprinting in Microsoft Dynamics 365 Fraud Protection involves several steps to ensure that device data is accurately collected and assessed for fraud risk. Here’s a high-level overview of the process:
Set up DNS and Generate an SSL Certificate:
Choose a subdomain under your root domain for device fingerprinting, such as fpt.yourcompany.com.
Create a CNAME record that points to fpt.dfp.microsoft.com.
Generate an SSL certificate for the subdomain and upload it to the Fraud Protection portal.
Implement Device Fingerprinting:
Your website or application must initiate device fingerprinting requests before a transaction is sent to Fraud Protection for risk evaluation.
Modify the provided JavaScript code (see documentation) and insert it on the webpage or in the application where you want to collect device fingerprinting information.
Enable Client-Side Integration:
Ensure that the device fingerprinting script is correctly implemented and that the client-side integration is enabled to collect the necessary data.
Test and Validate:
After implementation, thoroughly test the device fingerprinting functionality to confirm that it is working as expected and that Fraud Protection is receiving the required data.
Please follow the best practices and guidelines provided in the Microsoft documentation to ensure a successful integration.
References:
Overview of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for iOS – Dynamics 365 Fraud Protection | Microsoft Learn
4. What do I need to provide in order for Device Fingerprinting to work?
To ensure Device Fingerprinting works effectively in Microsoft Dynamics 365 Fraud Protection, you need to provide the following:
DNS Configuration and SSL Certificate:
Select a subdomain under your root domain for device fingerprinting, such as fpt.yourcompany.com.
Create a CNAME record that points to fpt.dfp.microsoft.com.
Generate an SSL certificate for the subdomain and upload it to the Fraud Protection portal. Only .pfx files are supported, and if your certificate has a password, you’ll need to enter it during the upload process.
Device Fingerprinting Implementation:
Your website or application must initiate device fingerprinting requests a few seconds before a transaction is sent to Fraud Protection for risk evaluation. This ensures that all necessary data is received for an accurate assessment.
Modify the provided JavaScript code and insert it on the webpage or in the application where you want to collect device fingerprinting information.
Client-Side Integration:
Ensure that the device fingerprinting script is correctly implemented and that the client-side integration is enabled to collect the necessary data.
Testing and Validation:
After implementation, thoroughly test the device fingerprinting functionality to confirm that it is working as expected and that Fraud Protection is receiving the required data.
Please follow the best practices and guidelines provided in the Microsoft documentation to ensure a successful integration.
References:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection …
5. Do we need to send IP address if we use Device Fingerprinting?
In Microsoft Dynamics 365 Fraud Protection, the IP address is an optional field when using device fingerprinting. While it is not mandatory to send the IP address, providing it can enhance the accuracy of the fraud protection service. The IP address can be set in the deviceFingerprinting.ipAddress field for assessments, and it helps in identifying the geographic location and network information of the device, which can be valuable in fraud detection scenarios.
References:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection …
6. What is the difference btw ‘device.ipaddress’ and ‘trueIp’?
In Microsoft Dynamics 365 Fraud Protection, ‘device.ipaddress’ refers to the IP address that the merchant’s website receives when a customer uses the site. This is typically the public IP address that the customer’s device is using to access the internet. On the other hand, ‘trueIp’ is the actual IP address of the device as identified by device fingerprinting. It is used to assess the risk of fraud and is part of the device attributes collected during the fraud assessment process
The ‘trueIp’ can be particularly useful in identifying fraud attempts because it can reveal if a customer is using a proxy or VPN to mask their actual IP address. This can be a red flag for fraudulent activity, as fraudsters often use such methods to hide their location and identity.
7. What is TrueIP? What is “IP address (via Merchant)”? Why is TrueIP blank, while “IP address (via Merchant)” is available?
In Microsoft Dynamics 365 Fraud Protection, “TrueIP” refers to the actual IP address of the device identified by device fingerprinting, which is used to assess the risk of fraud. It is part of the device attributes collected during the fraud assessment process. The “IP address (via Merchant)” is the IP address that the merchant provides to Fraud Protection, which may be different from the TrueIP if, for example, the user is connected through a proxy or VPN.
If “TrueIP” is blank, it could be due to several reasons such as the device fingerprinting data not being collected properly, the user using privacy features that prevent the collection of their true IP address, or simply that the TrueIP information was not available or not passed on at the time of the transaction.
However, generally speaking, the true IP address is the one assigned to a device connected to the internet, while the IP address provided by the merchant could be the one they have on record for the transaction, which might be different due to the reasons mentioned above.
References:
View purchase protection schemas – Dynamics 365 Fraud Protection | Microsoft Learn
8. Any information collected beyond IP address?
A detailed summary of what device fingerprinting attributes we attempt to collect for web, iOS, and Android can be found here: Attributes in device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
9. How do I renew the DFP Device Fingerprinting SSL Green ID certificate?
Multiple steps:
Obtain a renewed certificate. These can be provided by whichever team within your organization manages certificates. Typically, these are IT, Security or Engineering. The certificate should be a .pfx file.
Upload your certificate. From the DFP Portal, select “Integration” and “Enable device fingerprinting”.
For the renewal process instructions and further details, please refer to the Microsoft Learn Page: Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
10. Does device fingerprinting work for different browsers and operating systems?
Yes, DFP Device Fingerprinting works for different types of web browsers and operating systems. Below is more information on support and how to integrate:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for iOS – Dynamics 365 Fraud Protection | Microsoft Learn
We’re thrilled to bring you a weekly spotlight on various topics within our Microsoft Fraud Protection Tech Community. This week, we’re diving into the fascinating world of Device Fingerprinting in Microsoft Dynamics 365 Fraud Protection (DFP).
Ever wondered how Device Fingerprinting works and how it can benefit you? Check out our detailed Q&A below where we answer all your burning questions about this innovative feature.
If you have any questions or need further clarification on this topic, don’t hesitate to reply to this thread in the Fraud Protection Tech Community. Your feedback is incredibly valuable to us.
Best regards, DFP Product Team
——————
1. Do I really need device fingerprinting? Why is it important?
Device fingerprinting is an essential feature in Microsoft Dynamics 365 Fraud Protection. It collects information about a computing device during online actions, which includes hardware, browser, geographic information, and IP address. This data is crucial as it helps the Fraud Protection service to track and link events in the fraud network, identifying patterns of fraud. The device fingerprinting feature uses artificial intelligence (AI) and machine learning to probabilistically identify devices, which can significantly improve the model detection rate for businesses by reducing false negatives. As a result, less fraud is detected on approved transactions after the fact.
It’s important to note that while device fingerprinting has a high accuracy, it is probabilistic and not deterministic, meaning there is a possibility of false positives. However, the benefits it brings to fraud detection and prevention are significant and can help protect businesses from fraudulent activities.
References:
Overview of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Set up device fingerprinting – Dynamics 365 Fraud Protection
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Attributes in device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
2. We don’t use Fingerprinting will DFP still work?
Yes, Dynamics 365 Fraud Protection (DFP) will still function without device fingerprinting. However, its effectiveness in detecting fraud will be reduced. Device fingerprinting is a powerful feature that enhances the ability of DFP to identify and link events in the fraud network, thereby improving the detection of fraudulent patterns. Without it, DFP can still assess risk based on other factors, but the absence of device fingerprinting data means it likely won’t be as accurate in identifying fraud.
3. How to do end to end device fingerprinting integration?
Integrating end-to-end device fingerprinting in Microsoft Dynamics 365 Fraud Protection involves several steps to ensure that device data is accurately collected and assessed for fraud risk. Here’s a high-level overview of the process:
Set up DNS and Generate an SSL Certificate:
Choose a subdomain under your root domain for device fingerprinting, such as fpt.yourcompany.com.
Create a CNAME record that points to fpt.dfp.microsoft.com.
Generate an SSL certificate for the subdomain and upload it to the Fraud Protection portal.
Implement Device Fingerprinting:
Your website or application must initiate device fingerprinting requests before a transaction is sent to Fraud Protection for risk evaluation.
Modify the provided JavaScript code (see documentation) and insert it on the webpage or in the application where you want to collect device fingerprinting information.
Enable Client-Side Integration:
Ensure that the device fingerprinting script is correctly implemented and that the client-side integration is enabled to collect the necessary data.
Test and Validate:
After implementation, thoroughly test the device fingerprinting functionality to confirm that it is working as expected and that Fraud Protection is receiving the required data.
Please follow the best practices and guidelines provided in the Microsoft documentation to ensure a successful integration.
References:
Overview of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for iOS – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for Android – Dynamics 365 Fraud Protection | Microsoft Learn
4. What do I need to provide in order for Device Fingerprinting to work?
To ensure Device Fingerprinting works effectively in Microsoft Dynamics 365 Fraud Protection, you need to provide the following:
DNS Configuration and SSL Certificate:
Select a subdomain under your root domain for device fingerprinting, such as fpt.yourcompany.com.
Create a CNAME record that points to fpt.dfp.microsoft.com.
Generate an SSL certificate for the subdomain and upload it to the Fraud Protection portal. Only .pfx files are supported, and if your certificate has a password, you’ll need to enter it during the upload process.
Device Fingerprinting Implementation:
Your website or application must initiate device fingerprinting requests a few seconds before a transaction is sent to Fraud Protection for risk evaluation. This ensures that all necessary data is received for an accurate assessment.
Modify the provided JavaScript code and insert it on the webpage or in the application where you want to collect device fingerprinting information.
Client-Side Integration:
Ensure that the device fingerprinting script is correctly implemented and that the client-side integration is enabled to collect the necessary data.
Testing and Validation:
After implementation, thoroughly test the device fingerprinting functionality to confirm that it is working as expected and that Fraud Protection is receiving the required data.
Please follow the best practices and guidelines provided in the Microsoft documentation to ensure a successful integration.
References:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection …
5. Do we need to send IP address if we use Device Fingerprinting?
In Microsoft Dynamics 365 Fraud Protection, the IP address is an optional field when using device fingerprinting. While it is not mandatory to send the IP address, providing it can enhance the accuracy of the fraud protection service. The IP address can be set in the deviceFingerprinting.ipAddress field for assessments, and it helps in identifying the geographic location and network information of the device, which can be valuable in fraud detection scenarios.
References:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection …
6. What is the difference btw ‘device.ipaddress’ and ‘trueIp’?
In Microsoft Dynamics 365 Fraud Protection, ‘device.ipaddress’ refers to the IP address that the merchant’s website receives when a customer uses the site. This is typically the public IP address that the customer’s device is using to access the internet. On the other hand, ‘trueIp’ is the actual IP address of the device as identified by device fingerprinting. It is used to assess the risk of fraud and is part of the device attributes collected during the fraud assessment process
The ‘trueIp’ can be particularly useful in identifying fraud attempts because it can reveal if a customer is using a proxy or VPN to mask their actual IP address. This can be a red flag for fraudulent activity, as fraudsters often use such methods to hide their location and identity.
7. What is TrueIP? What is “IP address (via Merchant)”? Why is TrueIP blank, while “IP address (via Merchant)” is available?
In Microsoft Dynamics 365 Fraud Protection, “TrueIP” refers to the actual IP address of the device identified by device fingerprinting, which is used to assess the risk of fraud. It is part of the device attributes collected during the fraud assessment process. The “IP address (via Merchant)” is the IP address that the merchant provides to Fraud Protection, which may be different from the TrueIP if, for example, the user is connected through a proxy or VPN.
If “TrueIP” is blank, it could be due to several reasons such as the device fingerprinting data not being collected properly, the user using privacy features that prevent the collection of their true IP address, or simply that the TrueIP information was not available or not passed on at the time of the transaction.
However, generally speaking, the true IP address is the one assigned to a device connected to the internet, while the IP address provided by the merchant could be the one they have on record for the transaction, which might be different due to the reasons mentioned above.
References:
View purchase protection schemas – Dynamics 365 Fraud Protection | Microsoft Learn
8. Any information collected beyond IP address?
A detailed summary of what device fingerprinting attributes we attempt to collect for web, iOS, and Android can be found here: Attributes in device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
9. How do I renew the DFP Device Fingerprinting SSL Green ID certificate?
Multiple steps:
Obtain a renewed certificate. These can be provided by whichever team within your organization manages certificates. Typically, these are IT, Security or Engineering. The certificate should be a .pfx file.
Upload your certificate. From the DFP Portal, select “Integration” and “Enable device fingerprinting”.
For the renewal process instructions and further details, please refer to the Microsoft Learn Page: Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
10. Does device fingerprinting work for different browsers and operating systems?
Yes, DFP Device Fingerprinting works for different types of web browsers and operating systems. Below is more information on support and how to integrate:
Web setup of device fingerprinting – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for Android – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for iOS – Dynamics 365 Fraud Protection | Microsoft Learn
Dynamics 365 Fraud Protection mobile SDK for React Native – Dynamics 365 Fraud Protection | Microsoft Learn
Supercharge Your Business: Microsoft Teams connects you to customers
Maximizing Customer Engagement with Microsoft Teams
Managing customers and reaching out to prospects are crucial aspects of running a small business. For many owners or operators, it’s common to respond directly to inbound customer calls or support inquiries while juggling day-to-day responsibilities. Being reachable is essential.
Microsoft Teams can help you with this by allowing you to meet, call, chat, share files, or collaborate with customers, partners, suppliers, and anyone else outside your company domain.
Microsoft was named a Leader in the 2024 Gartner® Magic Quadrant™ for Unified Communications as a Service for the sixth year in a row. This recognition, we feel, recognizes Microsoft’s commitment to consistently deliver innovations in Microsoft Teams to help you succeed1.
Queues App for Microsoft Teams is Now Generally Available
Teams supports custom apps and bots that can automate tasks and enhance collaboration. These can be integrated specifically with Teams and appear on the left hand rail, just a click away for anyone to use. One of these apps is a native Microsoft app called Queues and is perfect if you need to better organize and route your customer calls. Queues app is included in Teams Premium and if your organization has both a Teams Premium and Teams Phone license, the app will be available by default.
You’re probably toggling back and forth between many different apps during the day just to get your work done. With Queues app, you can stay right in Teams to manage across apps. It’s like having your personal support hub right within Teams to manage your call queues and ensure that customer calls are resolved.
Check out these included features that can help you manage internal and external collaboration:
Make and receive calls using Teams Phone without leaving Teams.
Agents get a 360-degree view of their call queue performance through real-time statistics.
Agents can opt-in or out of call queues based on availability and business needs.
Copilot3 summarizes call notes, saving time between customer engagements.
To make sure your customer engagement team or colleagues can work on a customer issue together, the Queues app offers collaborative call handling:
Team members and leads can work together on answering calls.
Relevant call controls, such as call transfer, are easily accessible.
Outbound calls can be made on behalf of call queues or auto attendants, showing a unified team front for customers.
Supervisors can jump into customer interactions directly from Teams:
Call queues and auto-attendants can be managed directly from Teams, so no need to context switch.
Comprehensive analytics dashboards provide real-time and historical reporting.
Compliance and governance are built into the app.
How These Features Support Your Business
When you’re juggling inbound and outbound calls while managing your business, you need to concentrate on having effective conversations. So let Teams handle the call queue, and automatically capture notes and actions. Queues app makes this easier.
Queues app is now generally available and requires users to have a Teams Phone and a Teams Premium license. It’s a powerful app for enhancing customer support and engagement within Microsoft Teams. Get more details in this launch blog.
__________________________________________________________________________________
1 Gartner, Magic Quadrant for Unified Communications as a Service, Worldwide, Pankil Sheth, Megan Fernandez, Christopher Trueman, Rafael Benitez, 7 October 2024
Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner is a registered trademark and service mark and Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.
*This graphic was published by Gartner, Inc. as part of a larger research document and should be valuated in the context of the entire document. The Gartner document is available upon request here.
2 Teams Phone license is a required license for call queues and auto-attendants. Teams Premium license provides access to Queues app.
3 Copilot in Teams Phone is part of Microsoft 365 Copilot license.
Microsoft Tech Community – Latest Blogs –Read More
Azure Communication Services Ideas Board: Share your feedback with the product team
Innovation is not a solitary pursuit, and we recognize that some of the best ideas come from you, our Azure Communication Services community. By using our technology and identifying the limitations or feature gaps, you help us understand what we need to enhance to make Azure Communication Services a comprehensive platform for intelligent business to consumer (B2C) communication for you and your team.
Your feedback helps drive our product development and we’d like to highlight the Azure Communication Services – Community Ideas Board. You can post new ideas and also upvote or downvote ideas posted by the community.
We believe that hearing directly from our customers is essential. Like most popular community forums, the Azure Communication Services Community Ideas Board offers several key functions:
Create a new topic that is important to you.
Upvote topics to promote their visibility and prioritization.
Add comments on existing posts to share your thoughts.
Star a topic to follow it and receive notifications on further activity.
Getting involved is simple! Use your (digital) voice to make an impact. If there is a feature you believe is missing, create a topic and we will take notice. Or simply upvote an existing suggestion. Share your ideas and help shape the future of Azure Communication Services.
Thank you for being a part of the Azure Communication Services community. Some of our best ideas have come from conversations with our users, and we are grateful for your participation. See you on the Ideas Board!
Microsoft Tech Community – Latest Blogs –Read More
Recipient suspects your message is spam and rejected it.
When Office 365 tried to send the message to the recipient (outside Office 365), the recipient’s email server (or email filtering service) suspected the sender’s message is spam
When Office 365 tried to send the message to the recipient (outside Office 365), the recipient’s email server (or email filtering service) suspected the sender’s message is spam Read More
Opening Excel from an Access Command Button
I am trying to open the MS Excel Application from a Command Button in Access.
the Code I am using is
Private Sub MicrosoftExcel_Click()
Dim App As Object
Set App = CreateObject(“excel.Application”)
App.Visible = True
End Sub
When clicking on the Command Button, I can see Excel start to run in the taskbar, but it immediately closes. I have no problem starting Word using
Private Sub MicrosoftWord_Click()
Dim App As Object
Set App = CreateObject(“Word.Application”)
App.Visible = True
End Sub
Anyone have any suggestions?
I am trying to open the MS Excel Application from a Command Button in Access. the Code I am using isPrivate Sub MicrosoftExcel_Click() Dim App As Object Set App = CreateObject(“excel.Application”) App.Visible = TrueEnd Sub When clicking on the Command Button, I can see Excel start to run in the taskbar, but it immediately closes. I have no problem starting Word usingPrivate Sub MicrosoftWord_Click() Dim App As Object Set App = CreateObject(“Word.Application”) App.Visible = TrueEnd Sub Anyone have any suggestions? Read More
Tech Talks presents: Harnessing existing Dataverse data for Custom Agents in Copilot
Join us on Thursday, October 31 at 8am PT as Nathan Helgren, Principal Program Manager, Dataverse, and Julie Koesmarno, Principal Program Manager, Dataverse present ‘Harness your existing Dataverse data by using them as a knowledge source for Custom and Declarative Agents for Copilot ‘.
Call to Action:
Click on the link to save the calendar invite: https://aka.ms/TechTalksInvite
View past recordings (sign in required): https://aka.ms/TechTalksRecording
Join us on Thursday, October 31 at 8am PT as Nathan Helgren, Principal Program Manager, Dataverse, and Julie Koesmarno, Principal Program Manager, Dataverse present ‘Harness your existing Dataverse data by using them as a knowledge source for Custom and Declarative Agents for Copilot ’.
Call to Action:
Click on the link to save the calendar invite: https://aka.ms/TechTalksInvite
View past recordings (sign in required): https://aka.ms/TechTalksRecording
Cannot run batch file in Task Scheduler which runs Python program.
I have Windows 10, we have a network and I log into my laptop with a network Active Directory userid.
I have Task Manager v1.0. No idea why the version is so low for Windows 10.
When I run a simple batch file called test.bat:
echo This is a test >> “C:UsersMYUSEROneDrive – COMPDocumentsPythonProjectsCOMPTestProformalogtest.txt”
It runs fine.
But when I run another batch file called godailyauto.bat in the same directory, which calls a Python program, I get this error:
“Task Scheduler failed to start “crProformaTest” task for user “COMPANYMYUSER”. Additional Data: Error Value: 2147942667.”
I have the task:
Set to use my username and only run if I am logged on, to reduce potential problems. It is not set to run with Highest Privileges. I tried that and it didn’t work either. On the Task Settings tab I have checked “Allow task to run on demand”. The task starts but gets an error.
How do I get godailyauto.bat to run properly from Task Scheduler?
Do I need to install updates for Windows Task Scheduler?
Thank you.
I have Windows 10, we have a network and I log into my laptop with a network Active Directory userid.I have Task Manager v1.0. No idea why the version is so low for Windows 10. When I run a simple batch file called test.bat: echo This is a test >> “C:UsersMYUSEROneDrive – COMPDocumentsPythonProjectsCOMPTestProformalogtest.txt” It runs fine. But when I run another batch file called godailyauto.bat in the same directory, which calls a Python program, I get this error: “Task Scheduler failed to start “crProformaTest” task for user “COMPANYMYUSER”. Additional Data: Error Value: 2147942667.” I have the task:Set to use my username and only run if I am logged on, to reduce potential problems. It is not set to run with Highest Privileges. I tried that and it didn’t work either. On the Task Settings tab I have checked “Allow task to run on demand”. The task starts but gets an error. How do I get godailyauto.bat to run properly from Task Scheduler? Do I need to install updates for Windows Task Scheduler? Thank you. Read More
What’s New for Planner in October 2024
New Planner for the web begins roll out to General Availability
We’re bringing the new Planner experience to the web! This month marked the roll out of the new Planner for the web to our Targeted release audience. This feature will roll out to all customers over the coming weeks, starting with a smaller percentage so we can address customer feedback and bugs in the product. With the new Planner, you will be able to manage all your work across Microsoft To Do, Microsoft Planner, and Microsoft Project in one place, infused with the intelligence of Microsoft 365 Copilot for Planner (preview).
Export your plans to Excel
View, analyze, and share your plan data in another format by exporting it to Excel. To leverage this capability, go to the dropdown menu in the header of any plan and select ‘Export to Excel’. Learn more about how to export a plan to Excel and how to use Excel to interact with your plan data.
Copy plans
Got a plan that you find yourself using as a template for other plans? With the new ‘Copy plan’ feature, duplicating your plans is easier than ever! Just select ‘Copy plan’ from the dropdown menu of any plan’s header. All tasks in the plan will be copied over. Basic plans let you choose to include priority, dates, descriptions, checklists, and labels, while premium plans copy these by default and also include attachments.
Access plans created in Teams meetings
You can now view task lists created in Teams Meeting Notes via the Loop task list component in the My Plans view of Planner. Learn how to add a task list to a meeting and then view the task list in Planner.
Edit recipient teams for an upcoming task list in task publishing
Task publishing is a feature for frontline organizations that allows central leaders to create a list of tasks, distribute those tasks to multiple locations, and monitor execution across locations. Learn more about publishing in our blog post earlier this year or at https://aka.ms/taskpublishing.
We have recently released the ability to edit recipient teams for a scheduled task list and for the future occurrences of a recurring task list. You’ll find this action by clicking the … menu next to the name of the list in the lefthand navigation, which will allow you to select an updated set of recipients. This is great for updating recurring lists after new locations are opened, old locations are closed, or organizational changes mean that a different set of locations should be receiving the tasks.
Two new templates with more rolling out soon
We’re excited to be rolling out two new out-of-the-box templates that can help your team with customer relationship management and ticket triaging! To access these templates, select the “+ New Plan” button in the Planner app and then “See all templates”.
Share your feedback
Your feedback helps inform our feature updates and we look forward to hearing from you as you try out Planner’s new and existing capabilities!
Provide feedback on the new Planner for the web to our team by using the Feedback button in the top right corner of the app. We also encourage you to share any features you would like to see in the app by adding it to our Planner Feedback Portal.
Resources
Check out the recently refreshed Planner adoption page.
Sign up to receive future communication about Planner.
Check out the Microsoft 365 roadmap for feature descriptions and estimated release dates for Planner.
Watch Planner demos for inspiration on how to get the most out of the new Planner app in Microsoft Teams.
Watch the recording from September’s What’s New and What’s Coming Next + AMA about the new Planner.
Visit the Planner help page to learn more about the capabilities in the new Planner.
Microsoft Tech Community – Latest Blogs –Read More
Announcing Serverless Support for Socket.IO in Azure Web PubSub service
We are excited to announce the public preview of Socket.IO Serverless Mode in Azure Web PubSub service. This new mode eliminates the need for developers to maintain persistent connections on their application servers, offering a more streamlined and scalable approach. In addition to the existing default mode, developers can now deploy Socket.IO applications in a serverless environment using Azure Functions. This provides a stateless, highly scalable infrastructure, simplifying the development of real-time features while reducing both operational costs and maintenance overhead.
What is Socket.IO Serverless Mode?
In the existing default mode, all Socket.IO clients connect directly to Azure Web PubSub. developers don’t need to worry about if they have 100 or 1 million concurrent users. The service handles scaling up or down to meet the fluctuation of application users. However, the application server, which handles the business logic, must maintain a persistent connection with the service, adding complexity compared to stateless HTTP services.
Persistent connections introduce challenges. Unlike HTTP services, which can quickly recover from downtime, servers with persistent connections require continuous uptime to manage client communication.
Developer familiarity: Teams accustomed to stateless HTTP services may find persistent connections introduce engineering difficulties.
Cost inefficiency: In scenarios with low-frequency real-time messaging, maintaining persistent connections results in unnecessary compute costs, such as managing “ping-pong” heartbeats used by Socket.IO for disconnection detection.
As serverless computing gains popularity, developers are seeking ways to reduce server management burdens while focusing on core business logic. Socket.IO Serverless Mode offers a flexible, serverless deployment model, allowing real-time, bi-directional communication between clients and servers without requiring persistent server connections.
In the new serverless mode, Socket.IO servers become stateless, pushing messages to clients via RESTful APIs and receiving messages via webhooks, all without compromising on real-time communication between clients and server. Socket.IO clients still have persistent connections with the service, but now developers can focus on writing backend logic as stateless Azure Functions, simplifying deployment and scaling.
This capability is not natively supported by Socket.IO library and is made possible by Azure Web PubSub for Socket.IO. It is part of our ongoing commitment to enhancing Socket.IO developers’ experience and simplifying developing real-time applications.
Differences Between Default Mode and Serverless Mode
Here is a common architecture of the default mode and serverless with using Azure Web PubSub for Socket.IO. You can read more about the differences in detail in the feature overview.
Getting Started with Socket.IO Serverless Mode
Socket.IO Serverless Mode is ideal for scenarios that require lightweight, event-driven communication without the need for persistent backend connections. One of the best starting points is broadcasting messages to Socket.IO clients. Applications such as live sports scores, financial tickers, or real-time dashboards can benefit greatly from the scalability and cost effectiveness that serverless architecture offers.
To get started, follow our “publish messages” tutorial and build a real-time stock index application with Python and Azure Functions.
In addition to one-way broadcasting, bi-directional real-time communication between clients and servers remains a key feature of Socket.IO. Check out our “build chat app” tutorial for a step-by-step guide to implementing bi-directional communication using Socket.IO Serverless mode.
For a quick hands-on experience, visit our “quickstart” to see how to build and deploy a chat application with Socket.IO Serverless Mode, featuring identity-based authentication.
Microsoft Tech Community – Latest Blogs –Read More
IPv6 updates for Exchange Online
Microsoft has recently introduced several key updates to IPv6 traffic for Exchange Online. These updates are designed to enhance security, improve performance, and ensure compliance with modern Internet standards. This blog provides a summary of these changes and their implications for customers.
Outbound IPv6 Email
Although IPv6 has been supported for outbound mail for some time, we wanted to officially announce that Microsoft now uses IPv6 for email sent from Exchange Online. Generally, our platform prioritizes IPv6 addresses for outbound email traffic (if the recipient server supports it), favoring IPv6 AAAA records over IPv4 A records.
For instance, when sending messages to LinkedIn.com, the hostnames below are returned as MX records. Each MX record includes a preference value (also known as priority), where lower numbers indicate higher priority. Email servers attempt to deliver messages to the MX host with the lowest preference value first. If multiple MX records share the same preference value, the sending servers may choose among them based on other factors, such as the availability of IPv6 or IPv4 addresses. In this example, we first try all the IPv6 addresses for hosts mail-a, mail-c, and mail-d (since they share a preference value of 10), followed by their IPv4 addresses, before moving on to mail.linkedin.com with a higher preference value of 20. Note that in certain scenarios, IPv4 may still be prioritized; in such cases, we would use IPv4 addresses initially, then IPv6, before resorting to the lower priority option.
Preference
Hostname
IP
10
mail-a.linkedin.com
108.174.0.215
10
mail-a.linkedin.com
2620:119:50c0:207::215
10
mail-c.linkedin.com
108.174.3.215
10
mail-c.linkedin.com
2620:109:c006:104::215
10
mail-d.linkedin.com
108.174.6.215
10
mail-d.linkedin.com
2620:109:c003:104::215
20
mail.linkedin.com
108.174.0.215
Inbound IPv6 email
Starting in mid-October, and rolling out over the next 3-6 months, we will begin gradually allocating IPv6 addresses to all customer Accepted Domains that use Exchange Online for inbound mail, including *.onmicrosoft.com domains. Customers will receive Message Center posts notifying them of the change before it is enabled in their tenant. Once IPv6 is enabled, email senders delivering messages into Exchange Online and querying the MX record hostnames for customer domains will now receive both IPv4 and IPv6 addresses (A and AAAA records). This modernization will help our customers comply with regulations and benefit from the enhanced security and performance offered by IPv6. For most customers, this will be the new default behavior.
In some cases, activating IPv6 will affect the source IP type (IPv4 vs IPv6) used by senders connecting to Exchange Online, as the IP versions must match. Since RFC 5321 doesn’t favor one IP type over another, some senders might switch from IPv4 to IPv6 during this rollout. Note that senders should have a valid reverse DNS lookup (PTR) record and either SPF or DKIM verification are required for seamless mail flow over IPv6
For a small percentage of our customers, IPv6 will not be activated, and they will be automatically opted out of the IPv6 rollout for their Accepted Domain(s). Microsoft is opting out these customers because they have dependencies on IPv4 and introducing IPv6 for these customers might affect their mail flow. Proper configuration when enabling IPv6-readiness is essential, as misconfiguration of specific features may disrupt mail flow. If our telemetry detects any of the specified configurations listed below in a customer tenant, the tenant will be automatically excluded from IPv6 enablement, and the admin will be notified via a Message Center post of their opt-out status. To use IPv6, admins will need to manually enable it and ensure their setup is configured properly for both IPv4 and IPv6.
Customers with the following configurations will be opted-out during this rollout to avoid any disruptions in mail flow. At any time, a tenant admin can also opt out proactively using PowerShell, as detailed below.
Customers using Exchange Transport Rules (ETR) with the SenderIPRanges predicate might experience issues. This could occur when the sender’s IP for traffic to your tenant is IPv6, causing the ETR that relies on the SenderIPRanges predicate to fail in identifying the sender’s IPv4 address, thereby impacting mail flow to your tenant.
Prior to enabling IPv6: Modify your Exchange Transport Rules that use the SenderIPRanges predicate to include the IPv6 ranges of your partners, ensuring comprehensive coverage for email traffic affected by Exchange transport rules.
Customers employing Microsoft Purview Data Loss Prevention (DLP) Policies with the SenderIPRanges predicate may encounter issues. This could occur when the sender’s IP for traffic to your tenant is in IPv6, causing the transport rule that relies on the SenderIPRanges predicate to fail in identifying the sender’s IPv4 address, thereby affecting mail flow to your tenant.
Prior to enabling IPv6: Update your Microsoft Purview Data Loss Prevention (DLP) Policies that use the SenderIPRanges predicate to include the IPv6 ranges of your partners, ensuring comprehensive coverage for the email traffic affected by this transport rule.
Customers using IP Address-based Inbound Connectors in Exchange Online that reference IPv4 addresses might experience issues if the sender switches to IPv6, causing the connector to fail to match the Sender’s IP and affecting mail flow.
Prior to enabling IPv6, customers should:
Coordinate with the sender to ensure they continue connecting via IPv4; or
Convert the IP-based connector to a certificate domain-based connector. This applies to both On-Premises type (From: Your organization’s email server, To: Office 365) and Partner Type connectors (From: Partner organization, To: Office 365).
Enhanced Filtering for Connectors – Customers that have configured Enhanced Filtering for Connectors will need to review their configuration to ensure that both IPv4 and IPv6 addresses for their specific devices are included. Note that IPv6 entries can only be added via PowerShell at this time.
How to opt-in for IPV6 inbound and confirming your status
To manually opt-in or opt-out of IPv6 for your Accepted Domain(s), you can use the Enable/Disable-IPv6ForAcceptedDomain cmdlet with the -Domain parameter. For more details on this cmdlet, refer to this link.
For example:
Enable-IPv6ForAcceptedDomain -Domain contoso.com
Enable-IPv6ForAcceptedDomain -Domain contoso.onmicrosoft.com
Disable-IPv6ForAcceptedDomain -Domain contoso.com
Disable-IPv6ForAcceptedDomain -Domain contoso.onmicrosoft.com
Customers can check the status of their Accepted Domains using the new Get-IPv6StatusForAcceptedDomain command. Note it may take up to an hour for a change to be reflected.
For example:
Get-IPv6StatusForAcceptedDomain -Domain contoso.com
Microsoft Defender for Office 365: IPv6 allow and block support in the Tenant Allow/Block List
Admins can now create allow and block entries for IPv6 directly inside the Tenant Allow/Block List within the Defender portal, or by using the New-TenantAllowBlockListItems cmdlet (ListType parameter with value IP). This change will not affect any current Tenant Allow/Block List entries or IPv4 entries in the hosted connection filter policy or enhanced filtering connection policy. This applies to customers with Exchange Online Protection or Microsoft Defender for Office 365 Plan 1 or Plan 2 service plans. Note that IPv4 entries are not yet allowed (coming soon), and there are some entry limits, please see more detail here.
Customers will be able to add these IPv6 allow and block entries in these formats:
Colon-hexadecimal notation single IPv6 address (for example, 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
Zero compression single IPv6 address (for example, 2001:db8::1)
Classless inter-domain routing (CIDR) IPv6 (for example, 2001:0db8::/32). The range supported is 1-128.
The IPv6 updates for Exchange Online enhance security, performance, and compliance with modern standards. By prioritizing IPv6 for outbound emails and enabling it for inbound mail Microsoft is helping customers stay ahead of regulatory requirements. Customers should review their configurations to fully benefit from these updates.
Microsoft 365 Messaging Team
Microsoft Tech Community – Latest Blogs –Read More
Lesson Learned #511: Timeout Attempting to Open the Connection in High-Thread Applications
Recently, I worked on a service request that a customer application reported the following error connecting to the database: “Timeout attempting to open the connection. The time period elapsed prior to attempting to open the connection has been exceeded. This may have occurred because of too many simultaneous non-pooled connection attempts.“.
Following, I would like to share the experience learned here.
Working on our customer we identified that this application is under a high workload and multiple threads making numerous simultaneous database requests at the same time.
In this situation, we observed that the application was not using connection pooling, meaning each new request was opening a new connection to the database. The application’s multi-threaded design, combined with the volume of requests, quickly exceeded the customer machine’s capacity to handle these non-pooled connections, causing connection attempts to time out.
After a recomendation to use the connection pooling we were able to resolve this issue because connection pooling active database connections rather than establishing new ones with each request. This can dramatically improve performance and reduce latency. Without pooling, every thread must individually establish a connection, which increases overhead and risks timeout errors when requests are frequent.
For this special situation, after enabling connection pooling we suggested to review several application’s database connection settings.
Adjust Max Pool Size
Define an appropriate Max Pool Size to suit the application’s load. This parameter sets the maximum number of connections in the pool, helping control the number of active connections and prevent excessive resource consumption.
Monitor and Adjust Timeout Settings
Evaluate and adjust Connection Timeout values as needed. Setting timeouts too low can trigger unnecessary failures under minor delays, while a very high timeout could mask connection problems that should be addressed directly.
Audit the Connection Lifecycle
Ensure that connections are properly closed or returned to the pool once they are no longer needed. Open connections that are not closed can quickly exhaust the pool, leading to similar timeout issues.
Microsoft Tech Community – Latest Blogs –Read More
Update to security defaults
As part of the Secure Future Initiative, we’ve evolved our security approach to align with three security principles: secure by design, secure by default, and secure operations. Secure by default means security protections are enabled and enforced by default. In Microsoft Entra, security defaults are an example demonstrating our secure by default approach. Security defaults are enabled for every new tenant. This provides a baseline level of protection for your Entra identities and resources. To make sure that organizations relying on security defaults are well protected, we’re updating a requirement for authentication method to help improve your security posture.
We’re removing the option to skip multifactor authentication (MFA) registration for 14 days when security defaults are enabled. This means all users will be required to register for MFA on their first login after security defaults are turned on. This will help reduce the risk of account compromise during the 14-day window, as MFA can block over 99.2% of identity-based attacks. This change affects newly created tenants starting on December 2nd, 2024 and will be rolled out to existing tenants starting in January 2025.
This update is part of our ongoing effort to provide you with a secure and reliable identity service. We recommend that you enable security defaults for your organization if you’ are not using Conditional Access, as security defaults offer a simple and effective way to protect your users and resources from common threats.
To learn more about these upcoming updates and how you can best prepare your user, please review our documentation.
Nitika Gupta
Group Product Manager, Identity
Learn more about Microsoft Entra
Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.
Microsoft Entra News and Insights | Microsoft Security Blog
Microsoft Entra blog | Tech Community
Microsoft Entra documentation | Microsoft Learn
Microsoft Entra discussions | Microsoft Community
Microsoft Tech Community – Latest Blogs –Read More
Engage with the Azure Community Services Ideas Board: Your Voice Matters
Innovation is not a solitary pursuit, and we recognize that some of the best ideas come from you, our Azure Communication Services community. By using our technology and identifying the limitations or feature gaps, you help us understand what we need to enhance to make Azure Communication Services a comprehensive platform for intelligent B2C communication for you and your team.
In short, your feedback helps drive our product development. To encourage ongoing feedback, we’re excited to highlight the Azure Communication Services – Community Ideas Board. This platform enables you to share insights and suggestions, which are invaluable in helping us prioritize new features.
We believe that hearing directly from our customers is essential. Like most popular community forums, the Azure Communication Services Community Ideas Board offers several key functions:
Create a new topic that is important to you.
Upvote topics to promote their visibility and prioritization.
Add comments on existing posts to share your thoughts.
Star a topic to follow it and receive notifications on further activity.
Although this Community Ideas board isn’t new to Azure Communication Services, we’re now committing to using it as a primary source of customer feedback to guide our prioritization and roadmap. The board is actively monitored by the Azure Communication Services team, and suggestions are communicated to the appropriate internal team members. Ideas with significant upvotes indicate crucial feature gaps that we’re eager to learn more about and address.
Getting involved is simple! Use your (digital) voice to make an impact. If there is a feature you believe is missing, create a topic and we will take notice. Or simply upvote an existing suggestion. Share your ideas and help shape the future of Azure Communication Services.
Thank you for being a part of the Azure Communication Services community. Some of our best ideas have come from conversations with our users, and we are grateful for your participation. See you on the Ideas Board!
Microsoft Tech Community – Latest Blogs –Read More
Skill up to strengthen your organizations cybersecurity posture
Today, cybersecurity is everyone’s job. Although specialized engineers are vital, the best defense is from the ground up and from end to end.
You’re not imagining it—the number of major cybersecurity incidents is increasing. And according to Forbes Advisor Cybersecurity Stats: Facts And Figures You Should Know, “The repercussions of cyberattacks are far-reaching and costly. A data breach costs $4.88 million on average in 2024. In 2023, compromised business emails accounted for more than $2.9 billion in losses. These alarming figures emphasize the danger of cyber vulnerabilities and highlight the need for skilled cybersecurity professionals.”
Even small and medium-sized organizations can inadvertently provide cybercriminals with a pathway to bigger targets, which means that every organization needs to skill up its teams to protect against ransomware, data breaches, and other security incidents.
National Cybersecurity Awareness Month is an ideal time for organizations of all sizes to refocus and make a plan to build strong, year-round defenses. Microsoft Learn for Organizations can help your teams build skills to protect and secure your data, information, and systems.
Apply security first, across the board
Even the most sophisticated cyber defense is built on the basics. The US Federal Trade Commission’s (FTC’s) Cybersecurity Basics include using strong passwords and multifactor authentication, keeping all software and systems updated, securing backups, and of course, remaining on the alert against phishing.
Another good start is Microsoft Security 101, which explains security-related vocabulary, core concepts, and best practices. Or check out the Security hub on Microsoft Learn, which offers technical guidance and resources for aspiring and experienced cybersecurity professionals.
Beyond these foundations, organizations should cultivate a true security-first culture, as embodied by the Microsoft Security First Initiative (SFI). Upskilling across all roles and teams can minimize weak links in the protective chain, empowering your entire organization to prevent, detect, and mitigate issues.
Microsoft Learn for Organizations includes Plans on Microsoft Learn that cover security training for various job roles, such as:
Learning for Microsoft cybersecurity architects
Learning for Microsoft data security administrators
Learning for Microsoft identity and access administrators
Learning for Microsoft security operations analysts
Microsoft Security for business leaders and chief information security officers
Build skills with cybersecurity training from Microsoft Learn
Microsoft Learn offers self-paced, on-demand security training for many roles, skill levels, and products, and Microsoft Learn for Organizations curates this content for you and your teams to make it easier to reach your goals. The new Microsoft Security Technical Training poster highlights key offerings—whether you’re just starting out or you want to earn an expert Certification.
Get started with cybersecurity basics
Begin your learning journey with self-paced training on the essentials:
Describe the basic concepts of cybersecurity examines how you and your team can protect your organization from cyberattacks.
Implement information protection and data loss prevention by using Microsoft Purview explores how to govern and protect your organization’s sensitive information.
Course SC-900: Microsoft Security, Compliance, and Identity Fundamentals covers foundational knowledge, along with the capabilities of the cloud-based identity and access management solution Microsoft Entra. It can also help you prepare to earn the Microsoft Certified: Security, Compliance, and Identity Fundamentals Certification.
Build core skills
The core security training on the new poster dives deeper with self-paced offerings that help you skill up to earn Microsoft Certifications:
Course SC-200: Microsoft Security Operations Analyst teaches you to investigate, search for, and mitigate threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender.
Course SC-300: Microsoft Identity and Access Administrator covers configuring and managing identities for users, devices, Azure resources, and applications. Use Microsoft Entra to design, implement, and operate your organization’s identity and access management.
Course SC-400: Administering Information Protection and Compliance in Microsoft 365 teaches the skills needed to fill the role of information protection and compliance administrator.
Course AZ-500: Microsoft Azure Security Technologies prepares you to fill the role of Azure security engineer, as you implement security controls, maintain your organization’s security posture, and identify and remediate security vulnerabilities.
Learning path SC-100: Design solutions that align with security best practices and priorities offers expert training for real-world cybersecurity skills to protect your organization’s assets, business, and operations.
Earn scenario-based credentials
Microsoft Applied Skills credentials focus on validating in-demand technical skills in specific scenarios, proving your readiness to take on new tasks and projects for your team. Security-focused Applied Skills scenarios include:
Configure SIEM security operations using Microsoft Sentinel. Demonstrate your ability to create and configure a workspace, deploy a content hub solution, configure analytics rules, and configure automation in Microsoft Sentinel.
Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls. Show that you can mitigate risks in network security, data protection, endpoint security, and posture and vulnerability management.
Implement information protection and data loss prevention by using Microsoft Purview. Validate your ability to discover, classify, and protect sensitive data in Microsoft 365, effectively implementing data security by using Microsoft Purview.
Be cybersmart—always vigilant and always learning
Technology is ever evolving, and so is cybercrime. And building a strong cybersecurity defense is a journey. You and your teams can build your skills anytime—not just during National Cybersecurity Awareness Month! The resources, offerings, and opportunities on Microsoft Learn—curated for teams on Microsoft Learn for Organizations—can help you and your organization build the skills needed to address today’s security requirements and empower your teams to better meet tomorrow’s cybersecurity challenges.
Microsoft Tech Community – Latest Blogs –Read More
Not so Dark theme
Is there something that can be edited or is an option coming to enable a more contrasting but less harsh theme to MS365 apps and Windows? As I’ve got older I need to turn down brightness because the extremes in the current themes, White, Black, Dark Grey, are too harsh, but that doesn’t quite achieve what I need. A light grey, giving better contrast than white for those that need it but not so harsh and depressing as the dark versions, would be ideal. We’re lacking options at the light end of the spectrum
Is there something that can be edited or is an option coming to enable a more contrasting but less harsh theme to MS365 apps and Windows? As I’ve got older I need to turn down brightness because the extremes in the current themes, White, Black, Dark Grey, are too harsh, but that doesn’t quite achieve what I need. A light grey, giving better contrast than white for those that need it but not so harsh and depressing as the dark versions, would be ideal. We’re lacking options at the light end of the spectrum Read More
Document Mailbox permissions
We are preparing to start a Microsoft Exchange hybrid migration. I am looking for a tool that documents mailbox/resources permissions. I know I can use the get-mailboxpermissions, but that does not show permissions assigned by a user to another user. Anyone have any suggestions?
We are preparing to start a Microsoft Exchange hybrid migration. I am looking for a tool that documents mailbox/resources permissions. I know I can use the get-mailboxpermissions, but that does not show permissions assigned by a user to another user. Anyone have any suggestions? Read More
STOCKHISTORY skipping days in a macro
I have an excel file that uses the STOCKHISTORY function for FOREX rates needed on a report. However some tabs are #N/A since some of the days are missing
For example, it would start on September 2 (09/02/2024) and not on September 1 (09/01/2024)
Anyone knows a solution pls?
I have an excel file that uses the STOCKHISTORY function for FOREX rates needed on a report. However some tabs are #N/A since some of the days are missing For example, it would start on September 2 (09/02/2024) and not on September 1 (09/01/2024)Anyone knows a solution pls? Read More
Customize the results for the People card
Is there a way to add or remove fields on the People card results in Microsoft search?
Is there a way to add or remove fields on the People card results in Microsoft search? Read More
Can’t create folders or files in a new sharepoint site after it is created in Power Automate
I’m encountering issues when creating Team sites via Power Automate. Specifically, the “General” folder and private channel folders are not being generated as expected.
I’ve attempted using the _api/web/lists/ensureSiteAssetsLibrary endpoint, but the issue persists.
Please refer to the attached image to see the specific error.
The warning message within the red circle reads: “A mistake occurred while retrieving the channel’s SharePoint URL.”
I’m encountering issues when creating Team sites via Power Automate. Specifically, the “General” folder and private channel folders are not being generated as expected.I’ve attempted using the _api/web/lists/ensureSiteAssetsLibrary endpoint, but the issue persists.Please refer to the attached image to see the specific error. The warning message within the red circle reads: “A mistake occurred while retrieving the channel’s SharePoint URL.” Read More