Tag Archives: microsoft
Need to unmerge cell to single cell after pivot
Hi Team,
After pivot, I want to unmerge blank cell and multiple cells to single cell data as attached
Regards,
Sriku
Hi Team,After pivot, I want to unmerge blank cell and multiple cells to single cell data as attachedRegards,Sriku Read More
Windows11 remote desktop does not work with non ascii chars in username
After updating my system from Windows10 to Windows11 I am unable to login via remote desktop into another computer where the login contains a non ascii character. It always displays that provided credentials do not work despite providing the correct ones. That another computer has 2 accounts on it, where one of those contains non ascii character and the other one does not. I am only not able to login on the one with non ascii character. The other one works seamlessly.
Couple years ago on that other computer I changes the username to not contain non ascii character, but unfortunately Windows lies about changing username because it only changes the displayed name. Couple weeks ago I tried to change all the registry keys which contain the username with non ascii char (while being logged on the other account), but after restart Windows always changes them back.
Two questions:
1. What shell I do to be able to use RDP on Windows 11 and be able to login to a computer with non ascii char in a username?
2. Or what shell I do to force Windows10 (the other computer) to change the username to not contain the non-asci char?
After updating my system from Windows10 to Windows11 I am unable to login via remote desktop into another computer where the login contains a non ascii character. It always displays that provided credentials do not work despite providing the correct ones. That another computer has 2 accounts on it, where one of those contains non ascii character and the other one does not. I am only not able to login on the one with non ascii character. The other one works seamlessly.Couple years ago on that other computer I changes the username to not contain non ascii character, but unfortunately Windows lies about changing username because it only changes the displayed name. Couple weeks ago I tried to change all the registry keys which contain the username with non ascii char (while being logged on the other account), but after restart Windows always changes them back.Two questions:1. What shell I do to be able to use RDP on Windows 11 and be able to login to a computer with non ascii char in a username?2. Or what shell I do to force Windows10 (the other computer) to change the username to not contain the non-asci char? Read More
Formatting a Numbr in Forms and Reports
I’ve been trying to find something on this, but I’m continually running into dead ends.
On a form or report, I’d like to format a number so that it shows correctly.
The field is bound to a table, not a text field.
Take the number 1234.56 as entered into a field. I would like for it to display 1,234.56.
If the number is 1234.5, I would like for it to display 1,234.5, not 1,234.50,
If the number is 1234, I would like for it to display 1,234, not 1,234.00.
So the format would need to adjust the decimal places as what is entered into the field.
Thanks in advance
Jeff
I’ve been trying to find something on this, but I’m continually running into dead ends. On a form or report, I’d like to format a number so that it shows correctly. The field is bound to a table, not a text field. Take the number 1234.56 as entered into a field. I would like for it to display 1,234.56. If the number is 1234.5, I would like for it to display 1,234.5, not 1,234.50, If the number is 1234, I would like for it to display 1,234, not 1,234.00. So the format would need to adjust the decimal places as what is entered into the field. Thanks in advance Jeff Read More
Convert SharePoint site Classic to Modern
Hello
Please i need your help on this issue.
Please how can i Convert our SharePoint site Classic to Modern page.
Hello Please i need your help on this issue. Please how can i Convert our SharePoint site Classic to Modern page. Read More
Outlook mail delivery failed on a message I did not send
I am using Outlook 2021 Pro.
The info on the message follows. Note the user is email address removed for privacy reasons. I would never communicate with anyone in Russia, so needless to say, I did not sent the email.
A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:
email address removed for privacy reasons
Unrouteable address
—— This is a copy of the message, including all the headers. ——
Return-path: <email address removed for privacy reasons>
Received: from mail7.efind.ru ([178.250.153.55])
by mail.efind.ru with esmtp (Exim 4.84_2)
(envelope-from <email address removed for privacy reasons>)
id 1sRsIH-0001mO-Et
for email address removed for privacy reasons; Thu, 11 Jul 2024 14:49:01 +0300
Received: from mail7.efind.ru (localhost.localdomain [127.0.0.1])
by mail7.efind.ru (Proxmox) with ESMTP id 5B80640B7F
for <email address removed for privacy reasons>; Thu, 11 Jul 2024 14:49:00 +0300 (MSK)
Received-SPF: none (denneyworld.com: No applicable sender policy available) receiver=mail7.efind.ru; identity=mailfrom; envelope-from=”email address removed for privacy reasons“; helo=”[45.227.109.79]”; client-ip=45.227.109.79
Received: from [45.227.109.79] (unknown [45.227.109.79])
by mail7.efind.ru (Proxmox) with ESMTP id 699E640AE1
for <email address removed for privacy reasons>; Thu, 11 Jul 2024 14:48:55 +0300 (MSK)
From: “tobin isaac” <email address removed for privacy reasons>
To: <email address removed for privacy reasons>
Subject: no subject
Date: 11 Jul 2024 04:40:36 -0400
Message-ID: <001801dad36f$05b20285$67aa8bb4$@denneyworld.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary=”—-=_NextPart_000_0015_01DAD36F.05B10C55″
X-Mailer: Microsoft Outlook 16.0
Thread-Index: Acosc1tb78e2wvukosc1tb78e2wvuk==
Content-Language: en-us
X-SPAM-LEVEL: Spam detection results: 8
BAYES_50 0.8 Bayes spam probability is 40 to 60%
DATE_IN_PAST_03_06 1.592 Date: is 3 to 6 hours before Received: date
DMARC_MISSING 0.1 Missing DMARC policy
DOS_OUTLOOK_TO_MX 2.845 Delivered direct to MX with Outlook headers
HELO_MISC_IP 0.164 Looking for more Dynamic IP Relays
HTML_MESSAGE 0.001 HTML included in message
KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment
KAM_LAZY_DOMAIN_SECURITY 1 Sending domain does not have any anti-forgery methods
NO_FM_NAME_IP_HOSTN 0.001 No From name + hostname using IP address
PDS_BAD_THREAD_QP_64 0.001 Bad thread header – short QP
PDS_BTC_ID 0.001 FP reduced Bitcoin ID
RATWARE_NO_RDNS 0.001 Suspicious MsgID and MIME boundary + no rDNS
RCVD_IN_DNSWL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information.
RCVD_IN_HOSTKARMA_BL 1.5 Sender listed in HOSTKARMA-BLACK
RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information.
RCVD_IN_VALIDITY_SAFE_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information.
RCVD_IN_ZEN_BLOCKED_OPENDNS 0.001 ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked due to usage of an open resolver. See https://www.spamhaus.org/returnc/pub/
RDNS_NONE 0.793 Delivered to internal network by a host with no rDNS
SPF_NONE 0.001 SPF: sender does not publish an SPF Record
I am using Outlook 2021 Pro. The info on the message follows. Note the user is email address removed for privacy reasons. I would never communicate with anyone in Russia, so needless to say, I did not sent the email. A message that you sent could not be delivered to one or more of itsrecipients. This is a permanent error. The following address(es) failed: email address removed for privacy reasons Unrouteable address —— This is a copy of the message, including all the headers. —— Return-path: <email address removed for privacy reasons>Received: from mail7.efind.ru ([178.250.153.55]) by mail.efind.ru with esmtp (Exim 4.84_2) (envelope-from <email address removed for privacy reasons>) id 1sRsIH-0001mO-Et for email address removed for privacy reasons; Thu, 11 Jul 2024 14:49:01 +0300Received: from mail7.efind.ru (localhost.localdomain [127.0.0.1]) by mail7.efind.ru (Proxmox) with ESMTP id 5B80640B7F for <email address removed for privacy reasons>; Thu, 11 Jul 2024 14:49:00 +0300 (MSK)Received-SPF: none (denneyworld.com: No applicable sender policy available) receiver=mail7.efind.ru; identity=mailfrom; envelope-from=”email address removed for privacy reasons”; helo=”[45.227.109.79]”; client-ip=45.227.109.79Received: from [45.227.109.79] (unknown [45.227.109.79]) by mail7.efind.ru (Proxmox) with ESMTP id 699E640AE1 for <email address removed for privacy reasons>; Thu, 11 Jul 2024 14:48:55 +0300 (MSK)From: “tobin isaac” <email address removed for privacy reasons>To: <email address removed for privacy reasons>Subject: no subjectDate: 11 Jul 2024 04:40:36 -0400Message-ID: <001801dad36f$05b20285$67aa8bb4$@denneyworld.com>MIME-Version: 1.0Content-Type: multipart/alternative; boundary=”—-=_NextPart_000_0015_01DAD36F.05B10C55″X-Mailer: Microsoft Outlook 16.0Thread-Index: Acosc1tb78e2wvukosc1tb78e2wvuk==Content-Language: en-usX-SPAM-LEVEL: Spam detection results: 8 BAYES_50 0.8 Bayes spam probability is 40 to 60% DATE_IN_PAST_03_06 1.592 Date: is 3 to 6 hours before Received: date DMARC_MISSING 0.1 Missing DMARC policy DOS_OUTLOOK_TO_MX 2.845 Delivered direct to MX with Outlook headers HELO_MISC_IP 0.164 Looking for more Dynamic IP Relays HTML_MESSAGE 0.001 HTML included in message KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment KAM_LAZY_DOMAIN_SECURITY 1 Sending domain does not have any anti-forgery methods NO_FM_NAME_IP_HOSTN 0.001 No From name + hostname using IP address PDS_BAD_THREAD_QP_64 0.001 Bad thread header – short QP PDS_BTC_ID 0.001 FP reduced Bitcoin ID RATWARE_NO_RDNS 0.001 Suspicious MsgID and MIME boundary + no rDNS RCVD_IN_DNSWL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. RCVD_IN_HOSTKARMA_BL 1.5 Sender listed in HOSTKARMA-BLACK RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_SAFE_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_ZEN_BLOCKED_OPENDNS 0.001 ADMINISTRATOR NOTICE: The query to zen.spamhaus.org was blocked due to usage of an open resolver. See https://www.spamhaus.org/returnc/pub/ RDNS_NONE 0.793 Delivered to internal network by a host with no rDNS SPF_NONE 0.001 SPF: sender does not publish an SPF Record Read More
Skilling snack: Windows Autopilot device preparation
Exciting new things have come to Windows Autopilot. If you’re not already familiar with this technology, Autopilot describes a group of technologies used to preconfigure new devices for productive use. To further simplify this process, Windows Autopilot device preparation became generally available in June.
Time to learn: 112 minutes
READ
Overview of Windows Autopilot device preparation
Start here for a quick overview of what to expect from the Autopilot device preparation experience.
(3 mins)
Autopilot device preparation + Intune + Windows 11
READ
Compare Windows Autopilot device preparation and Windows Autopilot
Explore the differences between Autopilot device preparation and Autopilot, when to use one over the other, and how to use them concurrently.
(3 mins)
Autopilot device preparation + Windows Autopilot
READ
Windows deployment with the next generation of Windows Autopilot
Read the original announcement of device preparation and what to expect from the next generation of Autopilot
(4 mins)
Autopilot device preparation + Intune
READ
Overview of Windows Autopilot device preparation
New to Autopilot device preparation? This article will give you a foundation to start your learning journey.
(6 mins)
Autopilot device preparation + Windows 11 + Entra ID
READ
Autopilot device preparation FAQ
Read up on the most common questions about Autopilot device preparation.
(7 mins)
Autopilot device preparation + Windows 11 + PowerShell + Entra ID
READ
Ready to try it out for yourself? In this seven-step tutorial, you’ll learn how to use Autopilot device preparation to configure an Entra ID joined device.
(30 mins)
Autopilot + Intune + Entra ID + Device groups + User groups
WATCH
This year’s Tech Community Live brought us a wealth of learning. Revisit this recorded “Ask Microsoft Anything” session for news and insights from the minds behind Autopilot.
(58 mins)
Autopilot + Device Preparation + Intune + Cloud + Deployment + Reporting
Still hungry for more Windows Autopilot skills? Be sure to check out our full library of skilling snacks, where you’ll find Autopilot 101, Configure devices with Windows Autopilot, and much more.
New snacks are published every other week, so leave your suggestions below about what you’d like to learn next.
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q&A.
Microsoft Tech Community – Latest Blogs –Read More
Microsoft Bookings Power Automate “Update” trigger not working
I’ve got a Power Automate flow where I’m using the trigger “When an appointment is updated” and my flow doesn’t trigger either when I reschedule/update the booking from the clients side OR from the admin side.
I’ve got a Power Automate flow where I’m using the trigger “When an appointment is updated” and my flow doesn’t trigger either when I reschedule/update the booking from the clients side OR from the admin side. Read More
Recovering bookmarks from OneDrive
My hard drive imploded on my 9 year old computer so now I have a new computer. I used OneDrive so now I’m trying to recover the bookmarks for Firefox. I’m so confused!! Nothing seems to work. Can someone explain in simple terms how to do that?
My hard drive imploded on my 9 year old computer so now I have a new computer. I used OneDrive so now I’m trying to recover the bookmarks for Firefox. I’m so confused!! Nothing seems to work. Can someone explain in simple terms how to do that? Read More
Seeking Advice on generating documentation using LLMs
I’m working on documenting a web application that involves a complex structure with numerous classes. My goal is to use Large Language Models (Azure OpenAI) to generate scenario-based documentation with detailed use cases. However, I’m facing challenges in managing the input for gpt-35-turbo, especially given the large number of classes involved.
Could you share your best practices or strategies for:
Handling large codebases with multiple classes when using LLMs.Efficiently managing context limits in LLMs to maintain relevance.Breaking down complex code structures into manageable chunks for documentation purposes.
Any advice, tools, or resources would be greatly appreciated!
I’m working on documenting a web application that involves a complex structure with numerous classes. My goal is to use Large Language Models (Azure OpenAI) to generate scenario-based documentation with detailed use cases. However, I’m facing challenges in managing the input for gpt-35-turbo, especially given the large number of classes involved. Could you share your best practices or strategies for:Handling large codebases with multiple classes when using LLMs.Efficiently managing context limits in LLMs to maintain relevance.Breaking down complex code structures into manageable chunks for documentation purposes.Any advice, tools, or resources would be greatly appreciated! Read More
wenn Datum vor einem Termin, dann zähle bestimmte Worte in einem anderen Bereich
Ich muss zählen, wie viele Einträge mit bestimmten im Bereich B10:G10 stehen, wenn in Spalte A das Datum vor dem Eintrag in I1 steht. Meine Formel in I2
=WENN(@A:A<I1;ZÄHLENWENN(B2:G10;”*Natz*”)+ZÄHLENWENN(B2:G10;”*Verd*”)+ZÄHLENWENN(B2:G10;”*Stadt*”)+ZÄHLENWENN(B2:G10;”*Hinz*”);”nix”)
stimmt nicht, sie gibt alle Werte aus. Falsch ist auch das Ergebnis in I3, wenn ich mit
=WENN(@A:A>I1;ZÄHLENWENN(B2:G10;”*Natz*”)+ZÄHLENWENN(B2:G10;”*Verd*”)+ZÄHLENWENN(B2:G10;”*Stadt*”)+ZÄHLENWENN(B2:G10;”*Hinz*”);”nix”)
alle Einträge nach dem Termin in I1 suche. Wo ist mein Fehler? Für Hinweise wäre ich sehr dankbar!
Ich muss zählen, wie viele Einträge mit bestimmten im Bereich B10:G10 stehen, wenn in Spalte A das Datum vor dem Eintrag in I1 steht. Meine Formel in I2 =WENN(@A:A<I1;ZÄHLENWENN(B2:G10;”*Natz*”)+ZÄHLENWENN(B2:G10;”*Verd*”)+ZÄHLENWENN(B2:G10;”*Stadt*”)+ZÄHLENWENN(B2:G10;”*Hinz*”);”nix”) stimmt nicht, sie gibt alle Werte aus. Falsch ist auch das Ergebnis in I3, wenn ich mit =WENN(@A:A>I1;ZÄHLENWENN(B2:G10;”*Natz*”)+ZÄHLENWENN(B2:G10;”*Verd*”)+ZÄHLENWENN(B2:G10;”*Stadt*”)+ZÄHLENWENN(B2:G10;”*Hinz*”);”nix”) alle Einträge nach dem Termin in I1 suche. Wo ist mein Fehler? Für Hinweise wäre ich sehr dankbar! Read More
Yealink MP50 phone, NO sign-in option.
Hi All,
2 of our users are experiencing a problem with Yealink phone not picking up Teams profile. I re-seted the phone multiple times, but there is no sign-in option. Only Bluetooth and Settings options are available.
They are able to answer and make calls through teams app on the Windows, but not on the phone itself.
Anyone have a solution for this?
Thank you,
Hi All, 2 of our users are experiencing a problem with Yealink phone not picking up Teams profile. I re-seted the phone multiple times, but there is no sign-in option. Only Bluetooth and Settings options are available. They are able to answer and make calls through teams app on the Windows, but not on the phone itself. Anyone have a solution for this? Thank you, Read More
if a date is before an appointment, then count certain words in a different range
I need to count how many entries with certain words are in the range B1:G10 if the date in column A is before the entry in I1. My formula in I2
=IF(@A:A<I1;COUNTIF(B2:G10,”*Natz*”)+COUNTIF(B2:G10,”*Verd*”)+COUNTIF(B2:G10,”*City*”)+COUNTIF (B2:G10; “*Hint*”); “nothing”)
is wrong, it outputs all values. The result in I3 is also wrong when I want to search with
=IF(@A:A>I1;COUNTIF(B2:G10,”*Natz*”)+COUNTIF(B2:G10,”*Verd*”)+COUNTIF(B2:G10,”*City*”)+COUNTIF (B2:G10; “*Hint*”); “nothing”)
all entries after the appointment in I1. Where is my mistake? For answers, I would be very thankful!
I need to count how many entries with certain words are in the range B1:G10 if the date in column A is before the entry in I1. My formula in I2=IF(@A:A<I1;COUNTIF(B2:G10,”*Natz*”)+COUNTIF(B2:G10,”*Verd*”)+COUNTIF(B2:G10,”*City*”)+COUNTIF (B2:G10; “*Hint*”); “nothing”)is wrong, it outputs all values. The result in I3 is also wrong when I want to search with=IF(@A:A>I1;COUNTIF(B2:G10,”*Natz*”)+COUNTIF(B2:G10,”*Verd*”)+COUNTIF(B2:G10,”*City*”)+COUNTIF (B2:G10; “*Hint*”); “nothing”)all entries after the appointment in I1. Where is my mistake? For answers, I would be very thankful! Read More
Windows Server 2025 LAPS : Update-LapsADSchema error
I set up two new WS2025 server machines and promoted them as DCs. FFL and DFL = 2025.
I tried to follow up the steps for activating LAPS in Active Directory, but I’m stucked on the first step for extending the AD schema.
When I execute the command Update-LapsADSchema I get the following error:
Update-LapsADSchema : An operation error occurred.
At line:1 char:1
+ Update-LapsADSchema
+ ~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : NotSpecified: (:) [Update-LapsADSchema], DirectoryOperationException
+ FullyQualifiedErrorId : System.DirectoryServices.Protocols.DirectoryOperationException,Microsoft.Windows.LAPS.UpdateLapsADSchema
I run this as domain admin on the domain controller in an administrative powershell console, this account is a member of Schema and Enterprise Admins.
Any help appreciated.
Regards
Uwe
I set up two new WS2025 server machines and promoted them as DCs. FFL and DFL = 2025.I tried to follow up the steps for activating LAPS in Active Directory, but I’m stucked on the first step for extending the AD schema. When I execute the command Update-LapsADSchema I get the following error:Update-LapsADSchema : An operation error occurred.At line:1 char:1+ Update-LapsADSchema+ ~~~~~~~~~~~~~~~~~~~+ CategoryInfo : NotSpecified: (:) [Update-LapsADSchema], DirectoryOperationException+ FullyQualifiedErrorId : System.DirectoryServices.Protocols.DirectoryOperationException,Microsoft.Windows.LAPS.UpdateLapsADSchema I run this as domain admin on the domain controller in an administrative powershell console, this account is a member of Schema and Enterprise Admins. Any help appreciated. RegardsUwe Read More
To Do Lists have disappeared and I am desperate
I have been using a To Do list to track my blood pressure since 2018, and this morning it disappeared from my phone! In fact, two different lists are gone. I have followed all of the steps to look for it in recycle bins with no luck. I have been on with MS tech support for hours and can’t even get them to engage with the issue. I have looked into restoring backups (Android phone) but nothing will bring them back. I am hoping that someone has a out-of-the box suggestion as to what could have happened? Could the lists actually be in another app that I deleted, but were being viewed in ToDo? Is there a hidden recover function somewhere? Is there updated info on how to recover? I cant get over the fact that the list was there yesterday at 6pm, and this morning it was gone from phone, desktop, and the cloud without a trace and for no reason.
I have been using a To Do list to track my blood pressure since 2018, and this morning it disappeared from my phone! In fact, two different lists are gone. I have followed all of the steps to look for it in recycle bins with no luck. I have been on with MS tech support for hours and can’t even get them to engage with the issue. I have looked into restoring backups (Android phone) but nothing will bring them back. I am hoping that someone has a out-of-the box suggestion as to what could have happened? Could the lists actually be in another app that I deleted, but were being viewed in ToDo? Is there a hidden recover function somewhere? Is there updated info on how to recover? I cant get over the fact that the list was there yesterday at 6pm, and this morning it was gone from phone, desktop, and the cloud without a trace and for no reason. Read More
delete files in Preservation hold library
Hi All,
To create some free space, i would like to delete files from preservation hold library for all my sites in sharepoint.
I believe all the files in Preservation hold library are user deleted files..is that correct?
Can I delete all the files in Preservation hold Library without asking users or site owner ?
I already deleted GB’s of data but cannot see any free space, I already waited for 48 hours.
Thanks in advance,
Alex
Hi All, To create some free space, i would like to delete files from preservation hold library for all my sites in sharepoint. I believe all the files in Preservation hold library are user deleted files..is that correct?Can I delete all the files in Preservation hold Library without asking users or site owner ? I already deleted GB’s of data but cannot see any free space, I already waited for 48 hours. Thanks in advance,Alex Read More
Summer updates for SharePoint Premium services including Autofill, Graph APIs, promo extensions, and
We’re excited to share what’s new with SharePoint Premium content services this summer! In this round of updates, we’re sharing details on the general availability of autofill columns and the sensitive information prebuilt model, along with Graph API documentation to process models.
Autofill columns in SharePoint libraries
It’s here – the new SharePoint autofill columns feature for document libraries is rolling out now, and it’s a game changer for managing your files and metadata.
Autofill columns use AI to extract, summarize, generate, or evaluate content from the files you upload to a SharePoint library. You just need to write a simple prompt in natural language, and the system will save the answer to the column. You can ask “What is the deadline for this project” or state “Summarize this document in three sentences”, then run the Autofill action, and the column will populate for each file in that library, and all new files added – whether the answer is short text, longform response, numbers, date, choice, hyperlink, or currency.
Here are some examples:
Prompt
Sample Response
[Extract]
What is the end date of the agreement?
August 3, 2024
[Classify]
If this is a legal document, respond with “True” or “False” only. If the document doesn’t provide enough information, leave the response blank.
True
[Generate]
Summarize this document in 30 words or less
Summarize this document in 30 words or less. This document outlines a consulting services agreement between Jon Smith and a company for a home renovation design project, including scope, responsibilities, fees, and completion criteria.
[Evaluate]
Summarize this document in 30 words or less and apply the most relevant Taylor Swift song title based on the sentiment.
This document outlines a consulting services agreement between Jon Smith and a company for a home renovation design project, including scope, responsibilities, fees, and completion criteria.
The sentiment of the document is professional and forward-looking. The most relevant Taylor Swift song title that reflects the sentiment of this document could be “Begin Again”, as it suggests a new start or project, which aligns with the nature of a consulting agreement for home renovation.
[Impersonate]
Imagine you’re a pirate, respond with a short summary like a pirate would write.
Arrr, this document be a contract with Jon Smith and a company to renovate his ship, matey.
Autofill columns work with common file types such as PDF, Word, Excel, PowerPoint, etc. They can also work in conjunction with other SharePoint Premium models, such as prebuilt models, to extract values that the other model may not get.
Getting your autofill columns set up is simple. Once your admin enables it, you’ll add a new column in your SharePoint library, and select the autofill option. Then, write your prompt or use one of the suggested prompts provided. Test your prompt on any file in the library and see the result. When you’re happy with your prompt, save it and apply it to files you select and choose the “Autofill” action.
Autofill columns are rolling out now, and we hope they’ll help you find, sort, filter, and analyze your files more easily and efficiently. Learn more: Overview of autofill columns Microsoft Syntex – Microsoft Syntex | Microsoft Learn
Sensitive information prebuilt models
Document processing models help you automate the classification and extraction of information from documents – such as forms, invoices, contracts, and receipts – with either custom models that you build, or prebuilt models that we provide. Today, we’re excited to roll out a new type of prebuilt model that helps those of you who work with documents containing sensitive information, such as personal or financial data.
With the sensitive information prebuilt model, you can swiftly detect and optionally extract email addresses, phone numbers, and physical addresses from countless documents. In just a few clicks, organize this vital information in your SharePoint library.
No coding or training is needed to use this sensitive information prebuilt model, and you can configure it in a few simple steps. Choose the language and the entities you want to detect and / or extract, and then test the model on some sample files. Once you’re happy with the results, apply the model to any library. The model will then display the detected entities in a column, and if you chose to extract values, those are put in their own columns. You can use these columns to sort, filter, or analyze your files. The sensitive information prebuilt model can even read printed or handwritten text. In the future, we intend to support this model for detection/extraction on encrypted files, and apply sensitivity or retention labels just as you can with other models today.
Speaking of processing models, you can now specify the page range to extract information from when you’re using document processing models. Now you don’t have to extract from an entire file, and can process just the pages you select. This can be a great cost and time savings by reducing the number of pages processed.
Monthly included capacity promo – now extended through June 2025!
You’ll recall that we’ve been running a promotional offer that gives you monthly included capacity for many SharePoint Premium pay-as-you-go services. This offer is now extended through June 2025!
Both autofill columns and the sensitive information prebuilt models are part of the monthly included capacity promotional offer. Autofill columns are under the unstructured documents processing service, and with this promo, you can process up to 100 pages per month with autofill at no cost. Similarly, for the prebuilt models for sensitive information you’ll be able to process up to 100 pages each month at no cost.
We hope you’ll give both autofill columns and sensitive information prebuilt models a try. Let us know in the comments how you’re using these AI-powered content management capabilities.
SharePoint Content AI Model Graph APIs
For customers and partners alike, we’re announcing the launch of SharePoint Content AI Model Graph APIs. These models, which include unstructured, structured, freeform and prebuilt document processing, are now accessible through Graph APIs. These APIs enable developers to list existing models on a library, apply or un-apply a model, and create processing jobs for document metadata extraction from, and labeling of, your content. The launch introduces two new resource types to Microsoft Graph: ‘content model’ and ‘document processing job.’ These additions come with new methods that allow developers to:
Get
Read the properties and relationships of a contentModel object.
Get applied drives
List all the contentModelUsage information related to an applied contentModel.
Get by name
Read the properties and relationships of a contentModel object by its model name.
Add to drive
Automatically process new documents in the library.
Remove from drive
Remove the contentModel from the document library.
Create
Create a new documentProcessingJob object.
Developers can now build sophisticated applications that integrate with SharePoint’s existing Graph APIs. For instance:
• An application for document metadata extraction can work with Exchange and monitor an email inbox, extract email attachments to SharePoint, and use content AI models to extract critical metadata.
• A content migration application can upload documents from a network drive to SharePoint Online, using content AI models to set content type, extract metadata, and apply sensitivity and retention labels.
These new Graph APIs offer unified authorization and SDK experiences, so it’s easier for developers to build more complex apps. Additionally, developers can programmatically manipulate content AI models and process files with or without UI interaction, streamlining the development process. Plus, leverage Graph calls to harness the full potential of Content AI with SharePoint Embedded! Learn more in our Graph API documentation for contentModel and documentProcessingJob.
Content Management Advocates spotlight
Earlier this year, we launched a new initiative to share the great work of the many thought leaders in the content management space. Check out the work of some Content Management Advocates below!
• Read Leon Armston’s timely new blog post on Autofill Columns. Learn how to enable it in your tenant for users, get more prompt ideas, and combine this with other SharePoint Premium document processing models for even better experiences.
• Watch Steve Corey’s video on SharePoint Document Translation which features a tutorial on how to enable and configure the translation feature.
• Learn from Juan Carlos Gonzalez’s video on how to set up Pay-as you-go services in SharePoint Premium.
Try out these capabilities today
Since we’ve extended the promotional offer for free monthly capacity of many SharePoint Premium pay-as-you-go capabilities through June 2025, there’s no better time to get started with SharePoint autofill columns and sensitive information prebuilt models. For our developers in the community, give Graph APIs a try and let us know the types of apps you’re building.
Unsure about how pay-as-you-go pricing works or how to manage costs? The SharePoint Premium pay-as-you-go calculator is a helpful tool for predicting costs associated with using our content management capabilities. This calculator gives you a better understanding of your organization’s usage patterns and estimated costs so you can make more informed decisions with your budget.
Microsoft Tech Community – Latest Blogs –Read More
ON DEMAND | Viva in-depth: Learning content
Microsoft Viva brings together the tools and applications leaders need to engage and empower their workforce. And there’s a lot to plan and consider, in addition to keeping up with the latest updates and innovations.
This article contains 10 in-depth videos about Microsoft Viva – now on demand and embedded below, with five more coming soon. You’ll discover the ins and outs on how Microsoft Viva is THE employee experience platform that empowers organizations to continuously improve employee engagement and business performance with next-generation AI and insights.
OK, on to the show(s) (on demand)!!! All content is as it was presented during the Microsoft 365 Community Conference, presented by top product makers from Microsoft.
Note: Beyond the Viva content below, you can view all recorded sessions on demand now within the full Microsoft 365 Community Conference playlist on the Microsoft Community Learning channel (YouTube). You’ll find keynotes, general sessions, and numerous breakout sessions — in their entirety. We, too, created this unique playlist of all Viva Sessions.
Expand your internal communications strategy
“Transforming Communications with AI” presented by Steve Clayton – VP of communications strategy at Microsoft. Steve is a wonderful storyteller and provides a lot of insight into how he and the team run and manage comms for Microsoft. In this session, you go behind the scenes of how Microsoft approaches the use of AI across the discipline, best practices for applying AI to Comms and a sneak peek at some of the tools Microsoft has built internally to transform the work that over 250 communicators globally carry out for the company. You will walk away with patterns, practices and practical advice on how to apply generative and Microsoft Copilot technology to your business.
The best recent overview of the Viva suite
“What’s new & next for Microsoft Viva & the Employee Experience” presented by Kirk Gregersen, Nick DeFalco, Cassidy Potts (Phillips 66), Kristi Kelly, and Michael Holste. Microsoft Viva brings together the tools and applications your business needs for communication and feedback, analytics, goals, and learning—together in one unified solution that is available to employees in the apps they use every day, like Teams and Outlook. Join Viva executives and product leaders to explore product strategy, upcoming innovations and integrations. The session will showcase AI-powered experiences that can take communications, skilling, goal setting and employee feedback to the next level. Watch below:
Uplevel your corporate comms capabilities
“Planning a Corporate Comms strategy w/SharePoint News & Viva Amplify” with Naomi Moneypenny, Dave Cohen, and Maeneka Grewal. This transformation track session spans strategy, best practices, and product guidance. Learn how to plan a corporate communications strategy leveraging the power of SharePoint News and Viva Amplify.
“Getting started with Viva Amplify” with Michael Holste, Britt Boston, and Naomi Moneypenny. Learn how to save time and deliver more effective communications with Viva Amplify with this introductory session. We’ll cover how to get set up and started with the latest Viva tooling designed for organizational communications, including getting access, creating & managing campaigns, publishing to multiple channels, and measuring impact and reporting.
“How Microsoft is transforming Comms & Employee Engagement” with John Cirone, senior director on the Microsoft global employee and executive communications team. At Microsoft, our communicators lead with a growth mindset, using data to inform strategic and tactical decision making. We have evolved our approach to employee communications and engagement over several years, and our transformation continues to incorporate new tools including Viva and Copilot. John Cirone leads Microsoft’s Global Executive and Employee Communications (GEEC) community of over 1,000 communicators globally and across our diverse businesses. He will share how “Customer Zero” approaches communications, an inside look at best practices, and learnings that can inform your communications and engagement strategies.
Your communities grow and flourish together.
“Leveraging AI for communications” with Erin Rosenthal and Kristi Kelly. Artificial intelligence (AI) is transforming the way we communicate and engage with employees. In this session, you’ll hear from practitioners who have successfully leveraged AI in their communication strategies and campaigns. And you’ll gain practical tips to harness the power of Copilot in your communication work.
“Viva Engage and AI Transform Communications” with Dan Holme and Jason Mayans. Learn how great communicators leverage listening, analytics and AI to measure and scale effectiveness. Push beyond the boundaries of traditional internal communications and apply lessons from external comms to engage your audience with people-centric, personalized storytelling with modern, media-rich content that amplifies messaging.
“Building Communities to connect employees & accelerate knowledge sharing” with Erin Rosenthal, Mike McLean, and Allison Michels. Communities accelerate sharing of knowledge, information and experience within large teams and divisions, and across organizational silos. In this session, we will use Viva Engage to bring strategies and best practices to life. You’ll learn how to create communities that support company initiatives including diversity, onboarding, role-specific, shared services and employee resource groups.
“Driving Rollout and adoption of Copilot with Microsoft Viva” with Chris Bortlik, Britt Boston, Maeneka Grewal, Jeffrey Maning, and Allison Michels. Learn how to use Microsoft Viva to plan, communicate, measure, and support your organization’s rollout of Copilot. See Viva in action in this demo-heavy session. Learn real-world strategies, best practices, templates, and prescriptive guidance for an end-to-end campaign to drive user enablement and share knowledge about Copilot.
Stay up to date
We want to include some great, ongoing resources for you. Starting with the Microsoft Viva adoption site on adoption.microsoft.com. And join our community to catch all news and insights from the Microsoft Viva community blog. And you can find us on Twitter at @MicrosoftViva.
Microsoft Viva helps engage and empower their workforce.
With Viva, leaders can set their company strategy and effectively communicate goals and priorities across the organization, enable employees with the right resources, skills and knowledge, and create a feedback flywheel to continuously assess and improve employee engagement and performance at every level.
Microsoft Viva is built right into Microsoft Teams and experienced across Microsoft 365, so employees can find what they need when they need it. Viva is easily customizable and extensible, accessible from anywhere, and integrates with the tools that organizations already use.
The full Microsoft Viva suite of apps and services – The employee experience: Dynamic, connected, ever changing.
Thank you for your interest in taking your knowledge and depth of Viva to the next level. It warms our employee-engaged hearts!
Cheers, Jack Elmore
Microsoft Tech Community – Latest Blogs –Read More
Microsoft Security Service Edge now generally available
Today, we announced the general availability of the Microsoft Entra Suite which brings together identity and network access controls to secure access to any cloud or on-premises application or resource from any location. It consistently enforces least privilege access to achieve your governance requirements while improving your employee experience.
Companies today have good reason to focus on security. On one hand, we’re reaping the advantages of increased scalability, efficiency, and cost reductions, including all the benefits gained from generative AI’s large language models. However, these advantages also make it possible for malicious actors to exploit advanced technologies to create malware, target network vulnerabilities, and generate phishing attacks that put organizations’ data and reputations at higher risk.
When identity and network access solutions operate in isolation and not in tandem, they can lead to increased complexity, inconsistent policies, and a lack of unified context across standalone solutions. This can unintentionally result in a fragmented security posture and vulnerabilities that malicious actors could exploit, potentially disrupting business continuity and compromising the user experience.
Neither identity nor network security controls alone can protect all your access scenarios, highlighting the need for you to adopt a holistic strategy to counteract evolving threats and protect your critical assets—no matter where the users and resources are located.
The case for unified security: A strategic imperative
Along with the Microsoft Entra Suite general availability, we also announced Microsoft’s Security Service Edge (SSE) solution general availability, Microsoft Entra Private Access and Microsoft Entra Internet Access. These two products coupled with our SaaS security-focused CASB—Microsoft Defender for Cloud apps—comprise Microsoft’s Security Service Edge solution, a cloud-delivered, identity-centric networking model that transforms the way you secure access.
Microsoft’s SSE solution is all about helping you eliminate security gaps in your defenses, extending Conditional Access and continuous access evaluation to all your applications and resources, whether they’re on-premises or in any cloud.
Here, in more detail, are the key advantages of Microsoft’s SSE solution to your organization.
Eliminate security loopholes caused by identity and network access silos
Microsoft’s SSE Solution ensures that your identity and network access solutions work together. By unifying these separate elements, your security teams can bolster your organization’s security stance in the face of emerging threats. No more deciding which tool works for each app or how to bridge the policies your identity and network teams created. Now you can secure access with an easy-to-manage, unified, identity-centric approach to any application, resource, or destination—and not sacrifice user productivity due to complex, disjointed security controls.
Simplify access and improve end user experience at a global scale
Microsoft’s SSE solution is delivered from one of the largest global private networks: Microsoft’s Global Wide Area Network. The network connects Microsoft data centers across 61 Azure regions with more than 185 global network POPs and a vast array of growing SSE edge locations strategically placed around the world. This helps you optimally connect your users and devices to public and private resources seamlessly and securely, improving performance and boosting productivity by offering your people a fast, consistent, hybrid work experience.
Activate side-by-side, flexible deployment options with other SSE and networking solutions
Microsoft Entra Private Access and Microsoft Entra Internet Access can be deployed standalone or side-by-side with other SSE solutions. Global Secure Access client allows control over network traffic at the user endpoint device, giving you the ability to route specific traffic profiles through Microsoft’s SSE solution. The client for Windows and Android operating systems are now in general availability, and for iOS and Mac operating systems, in public preview. With flexible deployment options, the Global Secure Access client could acquire traffic based on the traffic forwarding profiles you configure for Private Access, Internet Access, and Microsoft traffic.
For example, you can configure Private Access profiles anywhere you replace your third-party legacy VPNs—with an identity-centric Zero Trust Network Access (ZTNA) solution. You can also configure your Microsoft profile to enable improved performance for Microsoft applications, while you keep your private and internet traffic protected with the SSE solution of your choice.
A closer look at Microsoft Entra Private Access
Microsoft Entra Private Access is an identity-centric ZTNA solution that helps you secure access to all private apps and resources for your users—located anywhere. Private Access allows you to replace your legacy VPN with ZTNA to securely connect your users to any private resource and application—without providing full network access to all private resources. This solution embraces Zero Trust principles to protect against cyber threats and to mitigate lateral movement, while enforcing advanced app segmentation and adaptive least-privilege access policies. Using Microsoft’s global private network, you can give your users a fast, seamless access experience that balances security with productivity.
Here, in more detail, are the key use cases of Microsoft Entra Private Access.
Replace legacy VPNs with an identity-centric ZTNA solution
With Microsoft Entra Private Access, easily start retiring your legacy VPN and level up to an identity-centric ZTNA solution that helps you reduce your attack surface, mitigate lateral threat movement, and remove unnecessary operational complexity for your IT teams. Unlike traditional VPNs, Microsoft Entra Private Access protects access by granting least privilege access to your network for all your hybrid users— whether they are remote or local—and, accessing any legacy, custom, modern, or private apps that are on-premises or on any cloud.
Enforce Conditional Access across all private resources
To enhance your security posture and minimize the attack surface, it’s crucial to implement robust Conditional Access controls—without making any changes to your private applications and resources such as multifactor authentication (MFA). You can also seamlessly enable single sign-on (SSO) across all private resources and applications, including legacy or proprietary applications that may not support modern authorization.
Deliver fast and easy access at global scale
Enhance your workforce’s productivity by leveraging Microsoft’s vast global edge presence, providing fast and easy access to private apps and resources, whether on-premises or on private data centers, and across any cloud. Users benefit from optimized traffic routing through the closest worldwide points-of-presence (POP), reducing latency for a consistently swift hybrid work experience.
A closer look at Microsoft Entra Internet Access
Microsoft Entra Internet Access is an identity-centric Secure Web Gateway (SWG) for SaaS apps and internet traffic. It’s the industry’s first truly identity-centric SWG solution capable of converging all enterprise access controls in one place. This advantage eliminates the security loopholes created by using multiple security solutions, while it also protects your enterprise from malicious internet traffic, unsafe or non-compliant content, and other threats from the open internet. Working alongside Microsoft Entra Private Access and the rest of the Microsoft Entra identity stack, it unifies your access policies across all internet resources and SaaS apps.
Protect your organization against internet threats
Microsoft Entra Internet Access provides robust web content filtering options to restrict enterprise users from accessing undesirable online content. With web category filtering, you can easily allow or block a vast range of internet destinations based on pre-populated web categories, which include liability, high bandwidth, productivity loss, general browsing, and security threat (malware, compromised websites, spam sites, etc.) sites. For more granular control, you can use fully qualified domain name (FQDN) filtering to establish policies that allow or block specific endpoints or to override general web category policies effortlessly.
Extend Conditional Access context richness to internet security
Modern businesses require versatile filtering policies that adjust to different scenarios. Microsoft Entra Internet Access gives you the ability to apply Conditional Access controls to your SWG policies leveraging the user, device, risk, and location signals to allow or block access to relevant internet destinations. Internet Access consolidates network and identity access controls into one policy engine and allows you to extend Conditional Access (and in future Continuous Access Evaluation) to cover all external destinations and cloud services, even those not federated with Microsoft Entra ID. Additionally, our deep integrations with Entra ID include valuable features like token theft protection, source IP restoration, and data exfiltration safeguards through Universal Tenant Restriction.
Deliver fast and consistent access at global scale
Enhance your users’ productivity by providing swift and smooth access through a global network edge, with POPs located near the user and private WAN. Utilize numerous peering agreements with internet providers to deliver top performance and reliability. Minimize additional hops and streamline traffic routing for all Microsoft services. Implement optimal traffic management for Microsoft applications in conjunction with solutions from third-party SSE providers using side-by-side access models.
Conclusion
Organizations need an easier, more agile approach to protect access to all their applications and resources. This action safeguards your critical assets no matter where they are located. Today’s general availability of our Microsoft Entra Internet and Private Access products—our Microsoft’s SSE solution—does just that. It makes it harder for bad actors to gain access to your sensitive data—even if they successfully infiltrate your network—by extending identity security controls and access governance to your network.
Now, you can benefit from a streamlined security environment where your users have access to only the necessary resources, simplifying their work. With Conditional Access, granular identity and network access policies are now unified, closing critical security gaps and reducing operational complexity. The global, private, wide area network provided by Microsoft ensures a seamless, efficient hybrid work experience. And integration with Microsoft’s extensive security portfolio and partner ecosystem supports the implementation of Zero Trust principles throughout the entire security landscape, enhancing your overall protection.
Be sure to register for the Zero Trust spotlight on July 31, 2024, where Microsoft experts and thought leaders will dive deeper into these announcements. Also, stay tuned for product deep dive blogs and our upcoming Tech Accelerator product deep dive sessions on Aug 14, 2024. We’ll expand on how our SSE solution and its two core products, Microsoft Entra Private Access and Microsoft Entra Internet Access can uniquely and successfully provide a secure approach to access across your organization’s entire digital estate.
To get started, contact a Microsoft sales representative, begin a trial, and explore Microsoft Entra Private Access and Microsoft Entra Internet Access general availability. Share your feedback to help us make this solution even better.
Sinead O’Donovan
Vice President of Product Management, Identity and Network Access at Microsoft
Read more on this topic
Microsoft Entra Internet Access
Microsoft Entra Private Access
Get started and try Entra suite products
Simplify your Zero Trust strategy with the Microsoft Entra Suite and unified security operations platform, now generally available
Learn more about Microsoft Entra
Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.
Microsoft Entra News and Insights | Microsoft Security Blog
Microsoft Entra blog | Tech Community
Microsoft Entra documentation | Microsoft Learn
Microsoft Entra discussions | Microsoft Community
Microsoft Tech Community – Latest Blogs –Read More
Microsoft Entra Suite now generally available
Today we announced the general availability of Microsoft Entra Suite – the industry’s most comprehensive secure access solution for the workforce. The Microsoft Entra Suite delivers the most comprehensive Zero Trust user access solution and enables organizations to converge access policy engine across identities, endpoints, and private and public networks.
What is Microsoft Entra Suite?
The Microsoft Entra Suite delivers a complete cloud-based solution for workforce access. It brings together identity and network access that secures employee access to any cloud or on-premises application and resource from any location, consistently enforces least privilege access, and improves the employee experience.
This new offering advances our vision for the Microsoft Entra product line that can serve as a universal trust fabric for the era of AI, securely connecting any trustworthy identity with anything, from anywhere. In a recent blog post we also shared the four stages of creating such trust fabric for your organization, starting with foundational Zero Trust controls, and extending it to protecting access for your workforce, protecting access for your customers and partners, and protecting access in any cloud. The Microsoft Entra Suite delivers the complete toolset for the second stage of this journey – secure access for your workforce.
The Microsoft Entra Suite includes the following products:
Microsoft Entra Private Access – an identity-centric Zero Trust Network Access that secures access to private apps and resources and reduces operational complexity and cost by replacing legacy VPNs.
Microsoft Entra Internet Access – an identity-centric Secure Web Gateway (SWG) for SaaS apps and internet traffic that protects against malicious internet traffic, unsafe or non-compliant content, and other threats from the open internet.
Microsoft Entra ID Governance – a complete identity governance and administration solution that automates identity and access lifecycle to ensure that the right people have the right access to the right apps and services at the right time.
Microsoft Entra ID Protection – an advanced identity solution that blocks identity compromise in real time using high-assurance authentication methods, automated risk and threat assessment, and adaptive access policies powered by advanced machine learning (also included in Microsoft Entra ID P2).
Microsoft Entra Verified ID – a managed verifiable credentials service based on open standards that enables real-time identity verification in a secure and privacy respecting way. Included in the Microsoft Entra Suite are premium Verified ID capabilities, starting with Face Check.
Microsoft Entra Suite enables you to:
Unify Conditional Access policies for identities and networks.
Ensure least privilege access for all users accessing all resources and apps.
Improve the user experience for both in-office and remote workers.
Reduce the complexity and cost of managing security tools from multiple vendors.
Check out the Microsoft Entra Suite introductory video below:
Unify Conditional Access policies for identities and networks
You only have to manage one set of policies in one portal to configure access controls for both identities and networks. Conditional Access evaluates any access request, no matter where it’s coming from, performing real-time risk assessment to strengthen protection against unauthorized access.
Ensure least privilege access for all users accessing all resources and apps
You can automate the access lifecycle from the day a new employee joins your organization, through all their role changes, until the time of their exit. No matter how long or multifaceted an employee’s journey, Microsoft Entra ID Governance ensures that your employees have the right access to just the applications and resources they need, helping prevent an adversary’s lateral movement in case of a breach.
Improve the user experience for both in-office and remote workers
You can ensure that employees enjoy a faster and easier onboarding experience, faster and more secure sign-in via passwordless authentication, single sign-on for all applications, and superior performance. Using a self-service portal, your employees can request access to relevant packages, manage approvals and access reviews, and view request and approval history. Face Check with Microsoft Entra Verified ID enables real-time verification of your employee’s identity, which streamlines remote onboarding and self-service recovery of passwordless accounts.
Reduce the complexity and cost of managing security tools from multiple vendors
Since traditional on-premises security solutions don’t scale to the needs of modern cloud-first, AI-first environments, organizations are seeking ways to secure and manage their assets from the cloud. With the Microsoft Entra Suite, you can retire multiple on-premises security tools, such as traditional Virtual Private Networks (VPNs), on-premises Secure Web Gateways (SWGs), and on-premises identity governance.
Microsoft Entra Suite is currently priced at $12 per user per month. Microsoft Entra P1 is a licensing and technical prerequisite. Please refer to the Microsoft Entra Suite pricing page for more detail.
Join us for upcoming events!
We encourage you to register for the Zero Trust spotlight on July 31, 2024, when Microsoft experts and thought leaders will dive deeper into these and other announcements, including the general availability of Entra Internet Access and Entra Private Access, which is part of the Microsoft Entra Suite.
Additionally, register for the Tech Accelerator to join us on August 14, 2024, for a deep dive into the Microsoft Entra Suite, and Private Access and Internet Access products.
Learn More
The availability of the Microsoft Entra Suite marks a key milestone in our commitment to continue to provide a more seamless and robust secure access experience that will empower the workforce anywhere and everywhere. Learn more from the official announcement.
Visit the Microsoft Entra Suite trial page to get started.
Irina Nechaeva, General Manager, Identity and Network Access Product Marketing
Read more on this topic
Watch the Microsoft Entra Suite mechanics video
Microsoft Entra product page
Microsoft Entra portal
Learn more about Microsoft Entra
Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.
Microsoft Entra News and Insights | Microsoft Security Blog
Microsoft Entra blog | Tech Community
Microsoft Entra documentation | Microsoft Learn
Microsoft Entra discussions | Microsoft Community
Microsoft Tech Community – Latest Blogs –Read More