Tag Archives: microsoft
Resize my Powerpoint Presentation
I am trying to resize my PPT and I was able to resize it in my previous file. I have a page of text from a book that is the basis of the page but the headings were corrupted so I added text boxes with new headings. I was able to make 3 new sizes of the PPT and it automatically adjusted the text box sizes and the fonts within it to the new size. Now when I try it the text box shrinks but the font stays the same size.
How can I shrink the whole page with multiple text boxes and fonts so that everything adjusts at once? Need assistance on this at the earliest possible!
I am trying to resize my PPT and I was able to resize it in my previous file. I have a page of text from a book that is the basis of the page but the headings were corrupted so I added text boxes with new headings. I was able to make 3 new sizes of the PPT and it automatically adjusted the text box sizes and the fonts within it to the new size. Now when I try it the text box shrinks but the font stays the same size. How can I shrink the whole page with multiple text boxes and fonts so that everything adjusts at once? Need assistance on this at the earliest possible! Read More
Recommendations to set up complex permissions site and library
We have a process in SP2016 where one collection has about 200 subsites and another similar collection about 50 subsites. Each subsite is for 1 user, some profile data, and their documents. A couple times a year a group of subsites need to have read access for three other employees (3 different per subsite, not 3 for the group of subsites). After about a month, these permissions are removed. This is a very manual process. This system needs to be converted to SPO, but subsites are not permitted and since the subsite template may change, does not seem appropriate. My process has been to create a record per user, linked to a folder per user and accessed via a PowerApp. I have some workflows to help manage permissions, but it’s not comprehensive yet. I’m interested in finding out how someone else would tackle this migration, keeping in mind that ultimately it is managed by non-tech HR staff. Thank You!
We have a process in SP2016 where one collection has about 200 subsites and another similar collection about 50 subsites. Each subsite is for 1 user, some profile data, and their documents. A couple times a year a group of subsites need to have read access for three other employees (3 different per subsite, not 3 for the group of subsites). After about a month, these permissions are removed. This is a very manual process. This system needs to be converted to SPO, but subsites are not permitted and since the subsite template may change, does not seem appropriate. My process has been to create a record per user, linked to a folder per user and accessed via a PowerApp. I have some workflows to help manage permissions, but it’s not comprehensive yet. I’m interested in finding out how someone else would tackle this migration, keeping in mind that ultimately it is managed by non-tech HR staff. Thank You! Read More
Exchange Hybrid to Exchange Online – AD Sync enabled
Hi All,
I have a scenario with two redudants exchanges 2019 onprem and Office 365.
All mailboxes are hosted in cloud and we are using no smtp in onprem server.
Is there a known process to proceed with decomm of onprem server? Does the Microsoft cover this process?
Just did some researches and AD Sync could be a issue to proceed with this migration.
Thanks in advance
Hi All,I have a scenario with two redudants exchanges 2019 onprem and Office 365.All mailboxes are hosted in cloud and we are using no smtp in onprem server. Is there a known process to proceed with decomm of onprem server? Does the Microsoft cover this process?Just did some researches and AD Sync could be a issue to proceed with this migration. Thanks in advance Read More
Comment Threshold using Question Responses Filter
Has anybody else run into this? I opened a ticket because comments were being suppressed even if there were 10+ respondents when using ‘Question Response’ filters. Our threshold is 10. The engineering team said that ‘Question Response’ threshold are always 20 for comments regardless thresholds set in configuration. Why would the threshold configuration work for some filters but not others?! I can’t find documentation either. Anyone else?
Has anybody else run into this? I opened a ticket because comments were being suppressed even if there were 10+ respondents when using ‘Question Response’ filters. Our threshold is 10. The engineering team said that ‘Question Response’ threshold are always 20 for comments regardless thresholds set in configuration. Why would the threshold configuration work for some filters but not others?! I can’t find documentation either. Anyone else? Read More
Bridging the On-premises to Cloud Security Gap: Cloud Credentials Detection
Identities lie at the heart of cloud security. One of the most common tactics used to breach cloud environments is Credential Access. User credentials may be obtained using various techniques. Credentials may be cracked through brute force attempts, obtained in social engineering campaigns, or stolen from compromised resources, where they are stored fand used.
In this blog, we demonstrate that properly securing cloud environments requires securing credentials in the organization’s non-cloud environments. To this end, we dive into our innovative capability to detect cloud credentials in on-premises environments and user devices. By integrating it with Microsoft Security Exposure Management, customers are able to identify attack paths starting in non-cloud environments and reaching critical cloud assets using cloud credentials. Customers are then able to effectively prioritize and mitigate those attack paths, thereby improving their enterprise and cloud security posture.
Credentials in On-premises Environments and User Devices: the Achilles Heel of Cloud Security
Awareness of the risk of credential theft in cloud environments is increasing, with security vendors offering secret scanning in various cloud-based resources, such as virtual machines and code repositories. However, cloud-credential theft from on-premises environments and user devices is a substantial blind spot in cloud protection solutions.
Consider the following attack scenario: To work with cloud infrastructures, employees must constantly use credentials on their personal computers. Most predominantly, users access cloud provider services either using the web portal or a CLI tool. Both methods can leave long-term credentials on the employee’s computer, such as authentication cookies and access tokens. A malicious actor who gains access to the user’s computer can easily steal those credentials and breach the customer’s cloud environment. The attacker immediately gains all the current permissions of the compromised user.
This scenario is a reality that we witness over and over with our customers. Our security research team has recently uncovered a crypto mining campaign targeting a large financial organization. The attack began by executing malware on an endpoint machine used by one of the organization’s administrators. The attacker then extracted a browser cookie from the compromised machine, which allowed them to bypass MFA and gain an initial foothold in the cloud environment with global administrator permissions.
The Technical Challenge: Identifying and Mapping Browser Cookies
The most widespread credential type that is used to access the cloud from user devices are authentication cookies. When logging in to a cloud provider’s website, authentication cookies are saved on the user’s browser to enable easy, password-free access in future sessions.
While the exact format varies, these cookies appear as long, randomized strings, and do not contain any identifier of the user that they be used to authenticate as. This poses a significant challenge to the security vendor, who needs to infer this exact connection.
The trivial way to solve the challenge this out would be to collect the authentication cookie from the user’s machine, and actively send it to the relevant website. This solution has several disadvantages which make it complex and unattractive:
Authentication cookies are highly sensitive secrets. Collecting and saving those cookies adds an unwanted risk to the customer.
Actively sending the cookies on a mass scale may look suspicious and cause false alarms on the website’s side.
High operational and engineering costs on the vendor’s side.
The Solution: Smart Analysis of Browser Artifacts
To overcome this challenge, we have come up with an innovative solution that is based on analysis of browser artifacts. The artifacts, saved by the website upon successful user authentication, contain the identifier of the authenticated user. This solution also provides information on the cookie’s validity, as the artifacts also indicate when a user logs out, or when a cookie is expired due to lack of usage.
The analysis runs periodically over Microsoft Defender for Endpoint and supports detection of both Azure Portal and AWS Console authentication cookies. On the first release, all Chromium-based browsers are supported.
In addition, we’re introducing an ability to detect cloud secrets used by the CLI tools of Azure, AWS and GCP. These secrets are stored locally and include refresh tokens, certificates, and access keys. Here, too, we’re able to correlate them to the relevant user that they can be used to authenticate as.
Reducing the Attack Surface and Enhancing Threat Detection
This new ability to detect cloud credentials in on-premises environments and user devices is fully integrated into Microsoft Security Exposure Management. This comes in addition to our existing abilities to detect credentials in cloud and hybrid environments. By ingesting the data to the exposure graph, customers are now able to:
Gain Visibility to the Attack Surface created by Cloud Credentials: Effectively prioritize protection on critical areas of the network which should be better protected.
Reduce the Attack Surface: Identify and mitigate attack paths involving cloud credentials.
Enhance Threat Detection of Hybrid Attacks: Having knowledge of the connection between on-premises and cloud environments provides important context in threat detection, enhancing detection and response of hybrid attack incidents.
Below is a screenshot from the Exposure Management user interface showing an on-premises to cloud attack scenario involving cloud credentials. The scenario begins with a vulnerable on-premises machine, which contains a browser cookie of an Azure user with the global administrator role. The cookie may be used to access a sensitive Azure storage account, which contains customer credit card details. This scenario and many more will soon be available in Microsoft Security Exposure Management.
Learn More
Dive into Exposure Management in our blog series
Announcing new CNAPP capabilities in Defender for Cloud
Contextual Risk Estimation for Effective Prioritization
Start Using Microsoft Security Exposure Management
Microsoft Tech Community – Latest Blogs –Read More
Date Return From Calendar
Hello everyone: new here Thanks in advance
Goal: I need to return the latest date a manager co-travelled with a Sales Rep.
I created a basic calendar, stating in Cell A3 I put all calendar dates running down column A. I then have 13 reps starting in cell B2 – N2 (running across row 2). All of the cells within are drop down menus containing the names of the same 5 managers.
I need to know when the last time a manager co-travelled with a Sales Rep. Knowing that a manager can co-travel with a single rep more then one time through out the year.
Thoughts?
Thanks
Steve
Hello everyone: new here Thanks in advance Goal: I need to return the latest date a manager co-travelled with a Sales Rep. I created a basic calendar, stating in Cell A3 I put all calendar dates running down column A. I then have 13 reps starting in cell B2 – N2 (running across row 2). All of the cells within are drop down menus containing the names of the same 5 managers. I need to know when the last time a manager co-travelled with a Sales Rep. Knowing that a manager can co-travel with a single rep more then one time through out the year. Thoughts? ThanksSteve Read More
Sort feature in Grid View
Hi,
Does someone know how I can submit a request to the developers? I’d like to request for grid view to have a sort option for all fields.
Thanks!
Hi, Does someone know how I can submit a request to the developers? I’d like to request for grid view to have a sort option for all fields. Thanks! Read More
Use sprints to be more Agile in Planner
The Planner team uses the sprints feature in premium plans to schedule tasks, balance our team’s workload, and run team retrospectives. Today, we want to share some of our tips for how sprints planning in the new Planner app in Teams can transform both your individual task management and collaborative team processes.
Why use sprints?
If you find yourself or your team needing to break down a complex project into manageable chunks, sprints are the tool for you. By separating tasks into time-boxed iterations, sprints allow you to focus on a set of tasks within a defined period so that your team can deliver value rapidly and continuously adapt to feedback.
Getting started
To use sprints in the new Planner, you’ll need a premium license. If you don’t have a premium license, you can still try the feature by acquiring a free 30-day trial.
To view and schedule your tasks by sprints, follow these three steps:
Open any premium plan in Planner. Note: To jumpstart the process and see what sprints could look like in a pre-existing plan, you can select our Sprint Planning template. This template can be found when creating a new plan.
Change to the Board view.
Select Group by > Sprint. In this view, you can set dates for each sprint and assign tasks to sprints. These sprints can be viewed in the Grid, Timeline and Charts views by selecting Filters > Sprints.
How should I use sprints?
The following is a list of ways our team uses sprints in our feature development processes. How else do you use sprints on your team? Feel free to drop a comment down below!
Scheduling tasks: Select Group by > Sprint in Board view to add tasks to sprints, create new sprints, or view all sprints and their associated tasks at a glance.
Balancing workloads: Select the Sprints filter in People view to track what each team member is working on for the sprint. You can modify team members’ workloads by dragging and dropping tasks from one person to another in this view.
Sprint retrospectives: Use Filters > Sprints in Board view to reflect on your team’s accomplishments by evaluating task progress and remaining tasks in the sprint. You can also create buckets in the general Board view to track what went well and what could be better.
Share your feedback
Your feedback helps inform our feature updates and we look forward to hearing from you as you try out Planner’s new and existing capabilities! To share your feedback about the new Planner app in Teams, you can navigate to the ? icon in the Planner app and select ‘Feedback’ as seen in the GIF below. We also encourage you to share any features you would like to see in the app by adding it to our Planner Feedback Portal.
Learn more about the new Planner
To get the inside scoop on the new Planner watch the Meet the Makers and our AMA.
Read about our investments for organizations using the new Planner with frontline workers.
Try out the new Copilot in Planner (preview) today in the new Microsoft Planner in Teams
Check out the new Planner adoption website and explore new resources such as Day in the Life Guides to use Planner for task management, collaborative work management and project management.
We’ve got a lot more ‘planned’ for the new Planner this year! Stay tuned to the Planner Blog – Microsoft Community Hub for news.
For future updates coming to the new Planner app, please view the Microsoft 365 roadmap here.
Learn about Planner and Project plans and pricing here.
Read the FAQs here.
Microsoft Tech Community – Latest Blogs –Read More
Script.SQL to .MSF/.LOG
Good afternoon
I’m downgrading a sql 2019 database with 8GB to sql 2014, I’ve already created the script (it ended up with 32GB), now I’m trying to open it in Studio Management to run the script and create the MDF and Log and gives the error in the print, can anyone help
I’m doing this on a machine with a lot of resources 32GB RAM Ryzen7 etc…
Good afternoon
I’m downgrading a sql 2019 database with 8GB to sql 2014, I’ve already created the script (it ended up with 32GB), now I’m trying to open it in Studio Management to run the script and create the MDF and Log and gives the error in the print, can anyone help
I’m doing this on a machine with a lot of resources 32GB RAM Ryzen7 etc… Read More
Trigger to send email if a table has had a INSERT, UPDATE OR DELETE
We need a trigger to be sent out if ProcessSchedule has had an INERT, UPDATE or DELETE
We don’t need details just a heads up type of email.
The send email part is easy.
EXEC msdb.dbo.sp_send_dbmail @profile_name = ‘SQLMail’
,@recipients = ’email address removed for privacy reasons’
,@body = ‘Press Schedule Changed’
,@subject = ‘Press Schedule Changed’
The trigger part I have not done before.
Any help would be greatly appreciated.
We need a trigger to be sent out if ProcessSchedule has had an INERT, UPDATE or DELETE We don’t need details just a heads up type of email.The send email part is easy. EXEC msdb.dbo.sp_send_dbmail @profile_name = ‘SQLMail’,@recipients = ’email address removed for privacy reasons’,@body = ‘Press Schedule Changed’,@subject = ‘Press Schedule Changed’ The trigger part I have not done before.Any help would be greatly appreciated. Read More
Batch file with Defender Deception
Hi all,
Last year when Defender Deception was introduced, we enabled the default rule. By July this year, we started noticing some bat.backup files with these deception users in few computers which are in scope of this deception rule. (Mostly C:usersdefault or C:UsersUsername directory) and file names are usually loginmonitor.bat.backup)
Content of the file sample as below
net user \devicenamemonitor /USER:DECEPTION_USER PASSWORD
ping 8.8.8.8 >> \devicenamemonitor%HOSTNAEM%.txt
date >> \devicenamemonitor%HOSTNAEM%.txt
ipconfig /a >> \devicenamemonitor%HOSTNAEM%.txt
Some devices will have ping 1.1.1.1
Could map those users to deception users created, but wondering what happend in the last month or so that Defender creating these, possibly lure files as mentioned in the setup window (attached)
Anyone else noticed this?
Hi all, Last year when Defender Deception was introduced, we enabled the default rule. By July this year, we started noticing some bat.backup files with these deception users in few computers which are in scope of this deception rule. (Mostly C:usersdefault or C:UsersUsername directory) and file names are usually loginmonitor.bat.backup) Content of the file sample as belownet user \devicenamemonitor /USER:DECEPTION_USER PASSWORDping 8.8.8.8 >> \devicenamemonitor%HOSTNAEM%.txtdate >> \devicenamemonitor%HOSTNAEM%.txtipconfig /a >> \devicenamemonitor%HOSTNAEM%.txtSome devices will have ping 1.1.1.1Could map those users to deception users created, but wondering what happend in the last month or so that Defender creating these, possibly lure files as mentioned in the setup window (attached)Anyone else noticed this? Read More
New Blog | Public preview: Microsoft Entra ID FIDO2 provisioning APIs
By Alex Weinert
Today I’m excited to announce a great new way to onboard employees with admin provisioning of FIDO2 security keys (passkeys) on behalf of users.
Our customers love passkeys as a phishing-resistant method for their users, but some were concerned that registration was limited to users registering their own security keys. Today we’re announcing the new Microsoft Entra ID FIDO2 provisioning APIs that empowers organizations to handle this provisioning for their users, providing secure and seamless authentication from day one.
While customers can still deploy security keys in their default configuration to their users, or allow users to bring their own security keys which requires self-service registration by a user, the APIs allow keys to be pre-provisioned for users, so users have an easier experience on first use.
Adopting phishing-resistant authentication is critical – attackers have increased their use of Adversary-in-the-Middle (AitM) phishing and social engineering attacks to target MFA-enabled users. Phishing-resistant authentication methods, including passkeys, certificate-based authentication (CBA), and Windows Hello for Business, are the best ways to protect from these attacks.
Phishing-resistant authentication is also a key requirement of Executive Order 14028 which requires phishing-resistant authentication for all agency staff, contractors, and partners. While most federal customers use preexisting smartcard systems to achieve compliance, passkeys provide a secure alternative for their users looking for improved ways to securely sign in. With today’s release of admin provisioning, they also have a simplified onboarding process for users.
Read the full post here: Public preview: Microsoft Entra ID FIDO2 provisioning APIs
By Alex Weinert
Today I’m excited to announce a great new way to onboard employees with admin provisioning of FIDO2 security keys (passkeys) on behalf of users.
Our customers love passkeys as a phishing-resistant method for their users, but some were concerned that registration was limited to users registering their own security keys. Today we’re announcing the new Microsoft Entra ID FIDO2 provisioning APIs that empowers organizations to handle this provisioning for their users, providing secure and seamless authentication from day one.
While customers can still deploy security keys in their default configuration to their users, or allow users to bring their own security keys which requires self-service registration by a user, the APIs allow keys to be pre-provisioned for users, so users have an easier experience on first use.
Adopting phishing-resistant authentication is critical – attackers have increased their use of Adversary-in-the-Middle (AitM) phishing and social engineering attacks to target MFA-enabled users. Phishing-resistant authentication methods, including passkeys, certificate-based authentication (CBA), and Windows Hello for Business, are the best ways to protect from these attacks.
Phishing-resistant authentication is also a key requirement of Executive Order 14028 which requires phishing-resistant authentication for all agency staff, contractors, and partners. While most federal customers use preexisting smartcard systems to achieve compliance, passkeys provide a secure alternative for their users looking for improved ways to securely sign in. With today’s release of admin provisioning, they also have a simplified onboarding process for users.
Read the full post here: Public preview: Microsoft Entra ID FIDO2 provisioning APIs
Word 365 for Mac not showing red lines under spelling errors…
I’m not sure what happened, but I think maybe someone sent a document with certain settings on it, and now I don’t see any of the red squiggly lines that highlight spelling and grammar errors on Word.
I’m using Word 365 on Mac.
I’ve already tried uninstalling and reinstalling word to no effect.
Check spelling as you type and Check grammar as you type are turned ON in the settings.
If anyone could help I’d be very grateful, as it’s driving me insane!
I’m not sure what happened, but I think maybe someone sent a document with certain settings on it, and now I don’t see any of the red squiggly lines that highlight spelling and grammar errors on Word. I’m using Word 365 on Mac. I’ve already tried uninstalling and reinstalling word to no effect. Check spelling as you type and Check grammar as you type are turned ON in the settings. If anyone could help I’d be very grateful, as it’s driving me insane! Read More
List users not in distribution lists
I am looking for a way to list all users that are not in 8 specific distribution lists.
I have found an option that gets close but it is not correct.
I only want to display the users that are not in list 1, or list 2, or list 3, or list 4, or list 5 or list 6 or, list 7, or list 8.
The script I found does not appear to apply the “or” to the query.
I also need it to export to a file rather than display on the screen.
Here is a copy of the syntax I found.
$Users = Get-Mailbox | ? {$_.PrimarySmtpAddress -like “*MyDomain.com”} #Enter your domain
$DistributionGroups = @(“List 1″,”List 2″,”List 3″,”List 4″,”List 5″,”List 6″,”List 7″,”List 8”) #Enter names of your distributiongroups
foreach($DistributionGroup in $DistributionGroups)
{
$DistributionGroupMembers = Get-DistributionGroupMember $DistributionGroup
foreach($User in $Users)
{
foreach($DistributionGroupMember in $DistributionGroupMembers)
{
if($DistributionGroupMember.PrimarySmtpAddress -ne $User.PrimarySmtpAddress)
{
Write-Host “$($User.PrimarySmtpAddress) missing in $DistributionGroup” #Export output here fx.
}
}
}
}
I am looking for a way to list all users that are not in 8 specific distribution lists.I have found an option that gets close but it is not correct.I only want to display the users that are not in list 1, or list 2, or list 3, or list 4, or list 5 or list 6 or, list 7, or list 8.The script I found does not appear to apply the “or” to the query.I also need it to export to a file rather than display on the screen.Here is a copy of the syntax I found. $Users = Get-Mailbox | ? {$_.PrimarySmtpAddress -like “*MyDomain.com”} #Enter your domain$DistributionGroups = @(“List 1″,”List 2″,”List 3″,”List 4″,”List 5″,”List 6″,”List 7″,”List 8”) #Enter names of your distributiongroupsforeach($DistributionGroup in $DistributionGroups){$DistributionGroupMembers = Get-DistributionGroupMember $DistributionGroupforeach($User in $Users){foreach($DistributionGroupMember in $DistributionGroupMembers){if($DistributionGroupMember.PrimarySmtpAddress -ne $User.PrimarySmtpAddress){Write-Host “$($User.PrimarySmtpAddress) missing in $DistributionGroup” #Export output here fx.}}}} Read More
Organizer joining a Team and then starting a meeting
I recently tried to go into a meeting using the Join the Meeting link. But I also tried to use the Meeting ID and Passcode. I am the organizer along with one other person. We have many participants that bypass the lobby. Once in, the START MEETING button appears at the top right.
What happened is BEFORE the organizer (me) went in, one of the participants clicked START MEETING. I was not then able to even get in with the Join the Meeting link nor by entering the meeting ID and the passcode. I got a screen that said I had to register but then when I tried to register, the REGISTER button was greyed out. At the end, I (as the trainer/organizer) was not able to get in to deliver my training.
My colleague and I tested this with different meeting links and it seemed the consistent problem was if a participant clicked START MEETING prior to the organizer getting into the meeting.
Is there a way to NOT allow participants to actually click START MEETING?
I recently tried to go into a meeting using the Join the Meeting link. But I also tried to use the Meeting ID and Passcode. I am the organizer along with one other person. We have many participants that bypass the lobby. Once in, the START MEETING button appears at the top right.What happened is BEFORE the organizer (me) went in, one of the participants clicked START MEETING. I was not then able to even get in with the Join the Meeting link nor by entering the meeting ID and the passcode. I got a screen that said I had to register but then when I tried to register, the REGISTER button was greyed out. At the end, I (as the trainer/organizer) was not able to get in to deliver my training.My colleague and I tested this with different meeting links and it seemed the consistent problem was if a participant clicked START MEETING prior to the organizer getting into the meeting. Is there a way to NOT allow participants to actually click START MEETING? Read More
EDATES and SUMIFS Help
Hi All,
I have created a spreadsheet showing all frequent costs of my company which has columns for frequency, date and description.
On my second sheet I have the dates for 6 months across the top row and the frequency and description in the first column.
To populate the data in the first month I have input a simple SUMIF based on the date and the description of my frequent cost sheet.
For the following 11 months, I wanted to do a SUMIF based on the date in the first month.
For example:
SUMIF(AA$2:BE$2,EDATE(BF$2,-1),AA12:BE12),0)
AA$2:BE$2 are my date rows (range)
BF$2 is my current date (criteria)
AA12:BE12 are my costs (sum range) the issue I’m running into is if there is a cost on the 31st August, it will not pick it up on the 30th September.
Any idea how to fix this?
Thanks
Hi All, I have created a spreadsheet showing all frequent costs of my company which has columns for frequency, date and description.On my second sheet I have the dates for 6 months across the top row and the frequency and description in the first column. To populate the data in the first month I have input a simple SUMIF based on the date and the description of my frequent cost sheet. For the following 11 months, I wanted to do a SUMIF based on the date in the first month.For example:SUMIF(AA$2:BE$2,EDATE(BF$2,-1),AA12:BE12),0)AA$2:BE$2 are my date rows (range)BF$2 is my current date (criteria)AA12:BE12 are my costs (sum range) the issue I’m running into is if there is a cost on the 31st August, it will not pick it up on the 30th September. Any idea how to fix this? Thanks Read More
Sharepoint Connector ADF
Hi,
I am analyzing sharepoint connector which is used in ADF. I would like to know the limitations of using sharepoint connector in ADF in terms of
Authentication type supportedSpecific connection configuration neededCopy a whole folder or multiple files from sharepointthe size of the file which can be downloadedSecurity/firewall issuesAny other limitations or issues that we can expect
Hi,I am analyzing sharepoint connector which is used in ADF. I would like to know the limitations of using sharepoint connector in ADF in terms ofAuthentication type supportedSpecific connection configuration neededCopy a whole folder or multiple files from sharepointthe size of the file which can be downloadedSecurity/firewall issuesAny other limitations or issues that we can expect Read More
Toggles for GPT-4 and GPT-4 Turbo in Copilot Pro completely disappeared. Been missing for days.
Current Copilot Pro subscriber and a few days ago my toggles for which GPT-4 to select disappeared.
I’ve checked in Edge, Edge Dev, Edge Canary, and Chrome to make sure it’s not my browser being stupid and it’s gone everywhere. Even checked in the iOS mobile app and not there either.
Not sure if there’s some sort of A/B testing going around or it’s an Insider thing or what, but I can’t find any information suggesting that so not really sure what’s going on.
Is an updated GPT-4o being rolled out to Copilot Pro currently or something that does away with the toggles? Or is my shiz just borked? Am I the only one with this issue?
Any help or input is appreciated, thank you!
Current Copilot Pro subscriber and a few days ago my toggles for which GPT-4 to select disappeared. I’ve checked in Edge, Edge Dev, Edge Canary, and Chrome to make sure it’s not my browser being stupid and it’s gone everywhere. Even checked in the iOS mobile app and not there either. Not sure if there’s some sort of A/B testing going around or it’s an Insider thing or what, but I can’t find any information suggesting that so not really sure what’s going on. Is an updated GPT-4o being rolled out to Copilot Pro currently or something that does away with the toggles? Or is my shiz just borked? Am I the only one with this issue? Any help or input is appreciated, thank you! Read More
SharePoint Lists – Display one Choice selection in a Second Column Also.
I have two columns in a SharePoint List. Let’s call the Column 1 and Column 2. They are both Choice Columns. They also both share two common choices, Completed and Cancelled. If someone selects one of those choices in either column, I would like it to be automatically displayed in the other column also. Meaning, both columns should match if Completed or Cancelled are selected in either column. If another choice is selected in either column, the other column should remain empty, for a manual selection of one of the other choices. What would the JSON code be to do something like this?
I have two columns in a SharePoint List. Let’s call the Column 1 and Column 2. They are both Choice Columns. They also both share two common choices, Completed and Cancelled. If someone selects one of those choices in either column, I would like it to be automatically displayed in the other column also. Meaning, both columns should match if Completed or Cancelled are selected in either column. If another choice is selected in either column, the other column should remain empty, for a manual selection of one of the other choices. What would the JSON code be to do something like this? Read More
Join us for Partner Pre-Day at the European Microsoft Fabric Community Conference!
Join us Tuesday, September 24, 2024 for a full day of partner engagement on all things Microsoft Fabric, from partner-specific opportunities to strategies for landing key workloads with your customers. This learning and networking event is offered for free, exclusively to partners attending the European Microsoft Fabric Community Conference (FabCon Europe).
The conference will explore the limitless possibilities of Microsoft Fabric and the latest developments in analytics and AI. With 130 sessions, four keynotes, Ask the Experts opportunities, and plenty of networking activities, this will be the ultimate European event for Microsoft data, analytics, and AI.
The free Partner Pre-Day will include:
Deep dives into content specifically tailored for Microsoft partners.
A conversational AMA with top Microsoft leadership.
Time to mix and mingle with your peers and Microsoft counterparts.
Purchase your pass* to FabCon Europe and then make plans to join us early for this free day of partner content and networking.
Join us Tuesday, September 24, 2024 for a full day of partner engagement on all things Microsoft Fabric, from partner-specific opportunities to strategies for landing key workloads with your customers. This learning and networking event is offered for free, exclusively to partners attending the European Microsoft Fabric Community Conference (FabCon Europe).
The conference will explore the limitless possibilities of Microsoft Fabric and the latest developments in analytics and AI. With 130 sessions, four keynotes, Ask the Experts opportunities, and plenty of networking activities, this will be the ultimate European event for Microsoft data, analytics, and AI.
The free Partner Pre-Day will include:
Deep dives into content specifically tailored for Microsoft partners.
A conversational AMA with top Microsoft leadership.
Time to mix and mingle with your peers and Microsoft counterparts.
Purchase your pass* to FabCon Europe and then make plans to join us early for this free day of partner content and networking. Read More