Tag Archives: microsoft
Is 24H2 available now?
Hi just wandering if the 24h2 update has started rolling out yet? I don’t see the update on my laptop.
Hi just wandering if the 24h2 update has started rolling out yet? I don’t see the update on my laptop. Read More
Microsoft Defender for Cloud PoC Series – Microsoft Defender for APIs
Introduction
This Microsoft Defender for Cloud PoC Series provides guidelines on how to perform a proof of concept for specific Microsoft Defender plans. For a more holistic approach where you need to validate Microsoft Defender for Cloud and Microsoft Defender plans, please read How to Effectively Perform an Microsoft Defender for Cloud PoC article.
Defender for APIs provides full lifecycle protection, detection, and response coverage of your APIs published within Azure API Management Platform. Defender for APIs includes unified visibility across your Azure API Management services within your Azure subscriptions, security insights with hardening recommendations, sensitive data classification integrated with Microsoft Purview supporting sensitive information types and labels, and continuous monitoring of APIs with machine learning and threat intelligence-based detections to alert against top OWASP API risks.
Preparation
Every customer is entitled to a 30-day free trial of Defender for APIs when enabling for the first time. This provides a great opportunity to evaluate the functionality of Defender for APIs and its benefits.
To enable Defender for APIs you must have the proper level of privilege within Microsoft Defender for Cloud (Pre-requisites are listed below).
1 – Azure account
You need an Azure account to sign in to the Azure portal.
2 – Azure API Management Service instance
At least one with at least one or more supported APIs in an Azure subscription. Currently Defeder for APIs only supports REST APIs. Defender for APIs is enabled at the level of a subscription
3 – Onboarding permissions
To enable and onboard Defender for APIs, you will need API Management Service Contributor role access, along with the permissions outlined in the User roles and permissions for enabling Microsoft Defender plans.
4 – Onboarding location
You can enable Defender for APIs in the Microsoft Defender for Cloud portal, or in the Azure API Management portal. Onboarding can also be completed via API and via onboarding scripts for enablement at scale.
Planning
As a part of your Defender for APIs PoC you will need to identify use case scenarios that you want to validate. Some of these scenarios include demonstrating secure posture available in Defender for APIs via the API inventory dashboard, recommendation remediation, integrations with cloud security explorer, and attack path analysis for risk prioritization. You will also want to demonstrate the value of alerts sent by Defender for APIs.
Implementation and Validation
Now that you have Defender for APIs enabled in your environment, you must onboard your API resources to Defender for APIs before you can validate. Next, we can validate specific scenarios for demonstrating the value of Defender for APIs.
A. Validate inventory of APIs across onboarded subscriptions and APIM services
After onboarding the API resources, you can track their status in the Defender for Cloud portal > Workload protections > API security:
You can also navigate to other collections to learn about what types of insights or risks might exist in the inventory:
B. Assess security posture of the APIs to drive risk-based prioritization
Once your APIs are onboarded, Defender for APIs starts monitoring your APIs for sensitive data exposure. APIs are classified with both built-in and custom sensitive information types and labels as defined by your organization’s Microsoft Information Protection (MIP) Purview governance rules. If you do not have MIP Purview configured, APIs are classified with the Microsoft Defender for Cloud default classification rule set with the following features.
Within Defender for APIs inventory experience, you can search for sensitivity labels or sensitive information types by adding a filter to identify APIs with custom classifications and information types.
C. Review API hardening recommendations for best practice policies and protections against OWASP Top 10 API risks
In the Defender for Cloud portal, select Workload protections.
Select API security.
In the API Security dashboard, select an API collection.
4. In the API collection page, to drill down into an API endpoint, select the ellipses (…) > View resource.
5. In the Resource health page, review the endpoint settings.
6. In the Recommendations tab, review recommendation details and status.
D. Runtime monitoring and threat detections via alerts
Within the API’s Resource Health page, select the Alerts tab to review security alerts for the endpoint. Defender for APIs monitors API traffic to and from endpoints, to provide runtime protection against suspicious behavior and malicious attacks.
With Defender for APIs and data sensitivity integration into API security alerts, you can prioritize API security incidents involving sensitive data exposure.
In the alert’s extended properties, you can find sensitivity scanning findings for the sensitivity context:
Sensitivity scanning time UTC: when the last scan was performed.
Top sensitivity label: the most sensitive label found in the API endpoint.
Sensitive information types: information types that were found, and whether they are based on custom rules.
Sensitive file types: the file types of the sensitive data.
Defender for API sample alerts
In Defender for Cloud you can use sample alerts to evaluate your Defender for Cloud plans, and validate your security configuration. Follow these instructions to set up sample alerts and select the relevant APIs within your subscriptions. To see the alert process in action, you can simulate an action that triggers a Defender for APIs alert. Follow the instructions in our Tech Community blog to do that. To simulate alerts in your own environment, you can follow exercise 6 here.
E. Perform proactive threat hunting in Cloud Security Explorer and Attack paths
Integration with Cloud Security Explorer
In Defender CSPM, Cloud Security Graph collects data to provide a map of assets and connections across organization, to expose security risks, vulnerabilities, and possible lateral movement paths.
When the Defender CSPM plan is enabled together with Defender for APIs, you can use Cloud Security Explorer to identify, review and analyze API security risks across your organization.
In the Defender for Cloud portal, select Cloud Security Explorer.
In What would you like to search? select the APIs category.
Review the search results so that you can review, prioritize, and fix any API issues.
Alternatively, you can select one of the templated API queries to see high risk issues like Internet exposed API endpoints with sensitive data or APIs communicating over unencrypted protocols with unauthenticated API endpoints
Attack Paths
When the Defender Cloud Security Posture Management (CSPM) plan is enabled, API attack paths let you discover and remediate the risk of API data exposure.
Select the API attack path Internet exposed APIs that are unauthenticated carry sensitive data and review the data path:
View the attack path details by selecting the attack path published.
Select the Insights resource.
Expand the insight to analyze further details about this attack path:
5. For risk mitigation steps, open Active Recommendations and resolve unhealthy recommendations for the API endpoint in scope.
Explore API data exposure through Cloud Security Graph
When the Defender Cloud Security Posture Management CSPM plan is enabled, you can view sensitive APIs data exposure and identify the APIs labels according to your sensitivity settings by adding the following filter:
Conclusion
By the end of this PoC you should be able to determine the value proposition of Microsoft Defender for APIs and the importance to proactively mitigate risks in your environment.
P.S. Subscribe to our Microsoft Defender for Cloud and Microsoft Defender plans Newsletter to stay up to date on helpful tips and new releases and join our Tech Community where you can be one of the first to hear the latest Microsoft Defender for Cloud news, announcements and get your questions answered by Azure Security experts.
Additional Resources
Pricing – Customers may be interested to understand the potential cost of enabling Defender for APIs in their environment. For this refer to our cost estimation workbook – Microsoft Defender for API Security – Estimate Your Plan Cost Easily – Microsoft Community Hub.
Prerequisites – For more information about roles and privileges, visit
Alerts – For more information, see Defender for APIs alerts.
Attack paths – For more information, see Data security posture management in Defender CSPM.
Reviewers
Ajinkya Gore, Senior Product Manager – Defender for APIs
Haris Sohail, Product Manager 2 – Defender for APIs
Preetham Anand Naik, Senior Product Manager – Defender for APIs
Yuri Diogenes, Principal PM Manager – CxE Defender for Cloud
Microsoft Tech Community – Latest Blogs –Read More
Pre-Job Health Checks on AKS: A Guide to Stable AI Workloads
Pre-Job Health Checks on AKS: A Guide to Stable AI Workloads
Introduction
In the realm of AI workloads, ensuring the health and stability of compute nodes is critical. Training large AI models often spans months and relies on advanced AI supercomputers equipped with high-end GPUs like NVIDIA A100 or H100, interconnected via InfiniBand for efficient communication. These models’ training workloads are complex and interdependent, with frequent updates and communications facilitated by NCCL collective communication. However, the inherent complexity also brings challenges, as any failure in GPUs or InfiniBand links—such as dropped GPUs or InfiniBand link flaps—can lead to job termination, necessitating restarts from the last checkpoint.
In traditional HPC schedulers such as SLURM, job prologs are employed to execute scripts before the main job begins. These scripts are often used by customers to perform health checks before launching their workloads. Similarly, in Kubernetes, init containers serve as an effective mechanism for conducting pre-job checks. Init containers execute before the main application container within a pod, enabling the execution of health checks.
Ensuring healthy nodes has been a challenge on Azure for both traditional HPC and AI workloads. Due to their necessity, we have a standard set of tests for GPU/IB VMs on Azure that is published in the azurehpc-health-checks repository on GitHub. These health checks are now included on our Azure HPC images, and they are integrated and can automatically run on node startup for CycleCloud with SLURM or as a pre-job health check on Azure Machine Learning. The health checks are also distributed as a container, aznhc-nv, available on the Microsoft Artifact Registry.
Despite these advancements, we do not yet have a published solution for running these health checks on Azure Kubernetes Service (AKS). This blog post remedies that gap by providing a step-by-step guide on how to run pre-job health checks on AKS, ensuring your AI/HPC workloads run smoothly and efficiently from the start.
Prerequisites
AKS Cluster: You should have an AKS cluster set up.
kubectl: Ensure kubectl is installed and configured to interact with your AKS cluster.
Docker: Have Docker installed to build the Docker image.
Azure Container Registry (ACR): Set up an ACR to store the Docker image.
Note: this guide is specifically targeting the H100 GPU VMs on Azure (Standard_ND96isr_H100_v5). The healthcheck config file will need adaptation for other VM types.
Step 1: Build the Docker Image
First, create the necessary files for your Docker image.
Dockerfile
FROM mcr.microsoft.com/aznhc/aznhc-nv:latest
RUN cd /usr/local/bin
&& curl -LO “https://dl.k8s.io/release/$(curl -L -s https://dl.k8s.io/release/stable.txt)/bin/linux/amd64/kubectl”
&& chmod +x kubectl
COPY ndv5.conf /azure-nhc/conf/aznhc.conf
COPY run-healthcheck.sh /azure-nhc/run-healthcheck.sh
RUN chmod +x /azure-nhc/run-healthcheck.sh
ENTRYPOINT [“/azure-nhc/run-healthcheck.sh”]
ndv5.conf
#######################################################################
###
### Hardware checks
###
* || check_hw_cpuinfo 2 96 96
* || check_hw_physmem 1915071MB 1915071MB 5%
* || check_hw_swap 0kB 0kB 3%
* || check_hw_ib 400 mlx5_0:1
* || check_hw_ib 400 mlx5_1:1
* || check_hw_ib 400 mlx5_2:1
* || check_hw_ib 400 mlx5_3:1
* || check_hw_ib 400 mlx5_4:1
* || check_hw_ib 400 mlx5_5:1
* || check_hw_ib 400 mlx5_6:1
* || check_hw_ib 400 mlx5_7:1
* || check_hw_eth lo
* || check_hw_eth eth0
* || check_hw_topology
#######################################################################
####
#### GPU checks
####
* || check_gpu_count 8
* || check_nvsmi_healthmon
* || check_gpu_xid
* || check_gpu_bw 52 350
* || check_gpu_ecc 20000000 10000
* || check_gpu_clock_throttling
* || check_nccl_allreduce 460.0 1 /azure-nhc/topofiles/ndv5-topo.xml 16G
* || check_nvlink_status
#######################################################################
####
#### Additional IB checks
####
* || check_ib_bw_gdr 380
* || check_ib_link_flapping 6
run-healthcheck.sh
#!/bin/bash
CONF_FILE=/azure-nhc/conf/aznhc.conf
LOG_FILE=/azure-nhc/aznhc.log
nhc DETACHED_MODE=0 CONFFILE=$CONF_FILE LOGFILE=$LOG_FILE TIMEOUT=300
# Annotate node with test results
kubectl annotate node $NODE_NAME aznhc-results=”$(<$LOG_FILE)” –overwrite
if grep -q “ERROR: nhc: Health check failed:” $LOG_FILE; then
kubectl taint nodes “$NODE_NAME” aznhc=failed:NoExecute
exit 1
fi
Build and push your Docker image:
export ACR_NAME=<your-acr-name>
docker build -t $ACR_NAME.azurecr.io/aks-healthcheck:latest .
docker push $ACR_NAME.azurecr.io/aks-healthcheck:latest
Step 2: Create Service Account and Role Bindings
Create a serviceaccount.yaml file to define the necessary Kubernetes service account and role bindings.
serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: aksnhc-sa
namespace: default
—
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: aksnhc-role
rules:
– apiGroups: [“”]
resources: [“nodes”]
verbs: [“get”, “patch”]
—
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: aksnhc-rolebinding
subjects:
– kind: ServiceAccount
name: aksnhc-sa
namespace: default
roleRef:
kind: ClusterRole
name: aksnhc-role
apiGroup: rbac.authorization.k8s.io
Apply the configuration:
kubectl apply -f serviceaccount.yaml
Step 3: Running the Job
Create a healthcheck-job.yaml file to define a Kubernetes Job that executes health checks as an init container. This approach can be applied to both standard and Volcano-scheduled Jobs. If the init container fails its health checks, the node will be tainted with the aznhc=failed:NoExecute taint. This prevents new workloads from being scheduled on the node and triggers the eviction of the current Job, forcing it to restart on a healthy node.
healthcheck-job.yaml
apiVersion: batch/v1
kind: Job
metadata:
name: aks-healthcheck-job
spec:
completions: $NUM_NODES
parallelism: $NUM_NODES
completionMode: Indexed
ttlSecondsAfterFinished: 300
template:
spec:
serviceAccountName: aksnhc-sa
initContainers:
– name: healthcheck
image: $ACR_NAME.azurecr.io/aks-healthcheck:latest
imagePullPolicy: Always
securityContext:
capabilities:
add: [“IPC_LOCK”]
env:
– name: NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
volumeMounts:
– mountPath: /dev/shm
name: shmem
– mountPath: /azure-nhc/syslog
name: syslog-volume
readOnly: true
resources:
requests:
nvidia.com/gpu: 8
nvidia.com/mlnxnics: 8
limits:
nvidia.com/gpu: 8
nvidia.com/mlnxnics: 8
containers:
– name: main
image: busybox
command: [‘sh’, ‘-c’, ‘echo “run torchrun or workload here…”‘]
securityContext:
capabilities:
add: [“IPC_LOCK”]
volumeMounts:
– mountPath: /dev/shm
name: shmem
resources:
requests:
nvidia.com/gpu: 8
nvidia.com/mlnxnics: 8
limits:
nvidia.com/gpu: 8
nvidia.com/mlnxnics: 8
restartPolicy: Never
volumes:
– name: shmem
emptyDir:
medium: Memory
sizeLimit: 128Gi
– name: syslog-volume
hostPath:
path: /var/log/syslog
type: File
Apply the job configuration:
export ACR_NAME=<your-acr-name>
export NUM_NODES=<number-of-nodes>
envsubst < healthcheck-job.yaml | kubectl apply -f –
Step 4: Cleaning Up
To clean up the resources created for the health checks, you can delete the job and the service account resources:
export ACR_NAME=<your-acr-name>
export NUM_NODES=<number-of-nodes>
envsubst < healthcheck-job.yaml | kubectl delete -f –
kubectl delete -f serviceaccount.yaml
Conclusion
By following these steps, you can effectively run health checks as an init container on your AKS nodes. This ensures your nodes meet the required health standards before your application pods are scheduled, improving the reliability and performance of your applications.
Further Reading
Deployment scripts for AKS with AI examples
GPU node health checks integrated into Azure Kubernetes service via node problem detector
Microsoft Tech Community – Latest Blogs –Read More
Hybrid AAD – Intune feature upgrade – security gap before GPO will be applied when no AD connectivit
Hello,
I am looking for a way to be sure that there will be no security gapbridge in the following scenario: there are windows 10 machines which are hybrid domain join – both AD and Azure connected managed by Intune and GPO. There is still a lot of security settings configured by GPO (not configured in Intune at all). We plan to use Intune feature upgrade to perform upgrade to Windows 11. It can happen for users which are working from home that they will receive Intune feature upgrade and will be upgraded to windows 11. After this as they are working from home if no VPN is established there is no AD connectivity so GPO will not be applied. This can lead to missing security configuration (which is done via GPO) and security bridge. Is there any way to handle it (except creating all GPO settings in Intune)?
Hello,I am looking for a way to be sure that there will be no security gapbridge in the following scenario: there are windows 10 machines which are hybrid domain join – both AD and Azure connected managed by Intune and GPO. There is still a lot of security settings configured by GPO (not configured in Intune at all). We plan to use Intune feature upgrade to perform upgrade to Windows 11. It can happen for users which are working from home that they will receive Intune feature upgrade and will be upgraded to windows 11. After this as they are working from home if no VPN is established there is no AD connectivity so GPO will not be applied. This can lead to missing security configuration (which is done via GPO) and security bridge. Is there any way to handle it (except creating all GPO settings in Intune)? Read More
FileHandler in OneDrive availibleOn.allowMultiSelect does not seem to work
Hello,
I am trying to develop a plugin for OneDrive and for it to work properly it needs to be able to be called with multiple files selected.
My addIn section of the Application registration manifest
“addIns”: [
{
“id”: “d0af6c7f-1cd0-4843-93fe-578801c56db5”,
“type”: “FileHandler”,
“properties”: [
{
“key”: “version”,
“value”: “2”
},
{
“key”: “fileTypeDisplayName”,
“value”: “digidoc”
},
{
“key”: “appIcon”,
“value”: “{“svg”:null,”png1x”:”<censored>”,”png1.5x”:”<censored>”,”png2x”:”<censored>”}”
},
{
“key”: “fileTypeIcon”,
“value”: “{“svg”:null,”png1x”:”<censored>”,”png1.5x”:”<censored>”,”png2x”:”<censored>”}”
},
{
“key”: “actions”,
“value”: “[{“type”:”custom”,”url”:”<censored>”,”availableOn”:{“file”:{“extensions”:[“*”]},”web”:{},”allowMultiSelect”:true},”displayName”:”Sign file(s)”,”shortDisplayName”:”Sign”,”icon”:{“png1x”:”<censored>”}},{“type”:”custom”,”url”:”<censored>”,”availableOn”:{“file”:{“extensions”:[“*”]},”web”:{},”allowMultiSelect”:true},”displayName”:”Send file(s) for signing”,”shortDisplayName”:”Send for signing”,”icon”:{“png1x”:”<censored>”}},{“type”:”open”,”url”:”<censored>”,”availableOn”:{“file”:{“extensions”:[“.asice”]},”web”:{}}}]”
}
]
}
]
My problem is that while custom actions have allowMultiSelect set to true in OneDrive environment I can not select more than 1 file and call my plugin out.
One file selected custom FileHandler actions are present
Multiple files selected custom FileHandler actions are nowhere to be found
With that I have a question, how can I select multiple files and call out my plugin?
I am facing also a problem where custom actions appear with plugin name, but as this already was reported (
) I will not talk a lot about that in this post.
Hello, I am trying to develop a plugin for OneDrive and for it to work properly it needs to be able to be called with multiple files selected. My addIn section of the Application registration manifest “addIns”: [
{
“id”: “d0af6c7f-1cd0-4843-93fe-578801c56db5”,
“type”: “FileHandler”,
“properties”: [
{
“key”: “version”,
“value”: “2”
},
{
“key”: “fileTypeDisplayName”,
“value”: “digidoc”
},
{
“key”: “appIcon”,
“value”: “{“svg”:null,”png1x”:”<censored>”,”png1.5x”:”<censored>”,”png2x”:”<censored>”}”
},
{
“key”: “fileTypeIcon”,
“value”: “{“svg”:null,”png1x”:”<censored>”,”png1.5x”:”<censored>”,”png2x”:”<censored>”}”
},
{
“key”: “actions”,
“value”: “[{“type”:”custom”,”url”:”<censored>”,”availableOn”:{“file”:{“extensions”:[“*”]},”web”:{},”allowMultiSelect”:true},”displayName”:”Sign file(s)”,”shortDisplayName”:”Sign”,”icon”:{“png1x”:”<censored>”}},{“type”:”custom”,”url”:”<censored>”,”availableOn”:{“file”:{“extensions”:[“*”]},”web”:{},”allowMultiSelect”:true},”displayName”:”Send file(s) for signing”,”shortDisplayName”:”Send for signing”,”icon”:{“png1x”:”<censored>”}},{“type”:”open”,”url”:”<censored>”,”availableOn”:{“file”:{“extensions”:[“.asice”]},”web”:{}}}]”
}
]
}
] My problem is that while custom actions have allowMultiSelect set to true in OneDrive environment I can not select more than 1 file and call my plugin out. One file selected custom FileHandler actions are present Multiple files selected custom FileHandler actions are nowhere to be found With that I have a question, how can I select multiple files and call out my plugin? I am facing also a problem where custom actions appear with plugin name, but as this already was reported (https://techcommunity.microsoft.com/t5/onedrive-developer/filehandler-in-the-onedrive-context-menu-in-quot-my-files-quot/m-p/4169500) I will not talk a lot about that in this post. Read More
Azure Maps Route Matrix – Order of results
I’m working with the Route Matrix in Azure Maps, passing in multiple origins and multiple destinations.
I have a foreach loop getting the summary for each leg. The problem I think I have is I can’t tell what the points in the leg were. Are results always returned in the same order starting with the first origin and looping through the destinations then going to the second origin and so on?
For example (origin ordinal on left, destination ordinal on right)
[0][0]
[0][1]
[0][2]
[1][0]
[1][1]
[1][2]
[2][0]
[2][1]
[2][2]
Is there a way in the code below to programmatically get the origin and destination for each route summary?
MapsRoutingClient client = new MapsRoutingClient(credential);
RouteMatrixQuery routeMatrixQuery = new RouteMatrixQuery
{
Origins = new List<GeoPosition>()
{
new GeoPosition(42.3400064,-83.0481779),
new GeoPosition(46.4962385,-84.3575817),
new GeoPosition(45.0270536,-84.6891603)
},
Destinations = new List<GeoPosition>()
{
new GeoPosition(45.3760861, -84.9653651),
new GeoPosition(45.4297623,-84.9904332),
new GeoPosition(45.6426144,-85.0420799)
},
};
RouteMatrixOptions options = new RouteMatrixOptions(routeMatrixQuery)
{
// ignore current traffic issues
UseTrafficData = false
};
// Get results
Response<RouteMatrixResult> result = client.GetImmediateRouteMatrix(options);
// Route matrix result
foreach (IList<RouteMatrix> routeResult in result.Value.Matrix)
{
Console.WriteLine(“Route result:”);
foreach (RouteMatrix route in routeResult)
{
RouteLegSummary summary = route.Summary;
Console.WriteLine($”No traffic: {summary.NoTrafficTravelTimeInSeconds} seconds”);
Console.WriteLine($”Travel time: {summary.TravelTimeInSeconds} seconds”);
Console.WriteLine($”Travel length: {summary.LengthInMeters} meters”);
Console.WriteLine($”Departure at: {summary.DepartureTime.ToString()} meters”);
Console.WriteLine($”Arrive at: {summary.ArrivalTime.ToString()} meters”);
}
}
I’m working with the Route Matrix in Azure Maps, passing in multiple origins and multiple destinations. I have a foreach loop getting the summary for each leg. The problem I think I have is I can’t tell what the points in the leg were. Are results always returned in the same order starting with the first origin and looping through the destinations then going to the second origin and so on? For example (origin ordinal on left, destination ordinal on right)[0][0][0][1][0][2][1][0][1][1][1][2][2][0][2][1][2][2] Is there a way in the code below to programmatically get the origin and destination for each route summary?MapsRoutingClient client = new MapsRoutingClient(credential);
RouteMatrixQuery routeMatrixQuery = new RouteMatrixQuery
{
Origins = new List<GeoPosition>()
{
new GeoPosition(42.3400064,-83.0481779),
new GeoPosition(46.4962385,-84.3575817),
new GeoPosition(45.0270536,-84.6891603)
},
Destinations = new List<GeoPosition>()
{
new GeoPosition(45.3760861, -84.9653651),
new GeoPosition(45.4297623,-84.9904332),
new GeoPosition(45.6426144,-85.0420799)
},
};
RouteMatrixOptions options = new RouteMatrixOptions(routeMatrixQuery)
{
// ignore current traffic issues
UseTrafficData = false
};
// Get results
Response<RouteMatrixResult> result = client.GetImmediateRouteMatrix(options);
// Route matrix result
foreach (IList<RouteMatrix> routeResult in result.Value.Matrix)
{
Console.WriteLine(“Route result:”);
foreach (RouteMatrix route in routeResult)
{
RouteLegSummary summary = route.Summary;
Console.WriteLine($”No traffic: {summary.NoTrafficTravelTimeInSeconds} seconds”);
Console.WriteLine($”Travel time: {summary.TravelTimeInSeconds} seconds”);
Console.WriteLine($”Travel length: {summary.LengthInMeters} meters”);
Console.WriteLine($”Departure at: {summary.DepartureTime.ToString()} meters”);
Console.WriteLine($”Arrive at: {summary.ArrivalTime.ToString()} meters”);
}
} Read More
Work Email
I keep getting error codes when attempting to sign into my new work email with outlook. I can get into Microsoft 365 but have no options to get into my outlook email from there. I cannot sign in on any device.
I keep getting error codes when attempting to sign into my new work email with outlook. I can get into Microsoft 365 but have no options to get into my outlook email from there. I cannot sign in on any device. Read More
Issue map prompts to properties
Hi,
I am trying to create a new user account runbook so it can be used in the Self Service Portal. I start my runbook with an initialization of data and the following details:
I have created my Service Request template and my Runbook automation activity template. In my Request Offering, I can map LastName, FirstName, etc., but I am not able to map Branch. What could be the issue? I need to know in which branch they work and I want it to be a simple list so they can choose from it.
Please let me know if more information is required.
Thanks for the help 🙂
Hi,I am trying to create a new user account runbook so it can be used in the Self Service Portal. I start my runbook with an initialization of data and the following details: I have created my Service Request template and my Runbook automation activity template. In my Request Offering, I can map LastName, FirstName, etc., but I am not able to map Branch. What could be the issue? I need to know in which branch they work and I want it to be a simple list so they can choose from it. Please let me know if more information is required.Thanks for the help 🙂 Read More
New on Microsoft AppSource: May 12-15, 2024
We continue to expand the Microsoft AppSource ecosystem. For this volume, 12 new offers successfully met the onboarding criteria and went live. See details of the new offers below:
Get it now in our marketplace
Consultancy for Marketing and Customer Insights (Ignite Plus): Imperium Dynamics offers a guided methodology for training, basic journeys, configuring brand templates, and quick deployment of Microsoft Dynamics 365 Marketing and Customer Insights. The app features AI-generated insights, automated workflows, and personalized recommendations to optimize customer journeys and maximize customer lifetime value.
Consultancy for Marketing and Customer Insights (Ignite): Imperium Dynamics offers a guided methodology for training, basic journeys, configuring brand templates, and quick deployment of Microsoft Dynamics 365 Marketing and Customer Insights. The app features AI-generated insights, automated workflows, and personalized recommendations to optimize customer journeys and maximize customer lifetime value.
Consultancy for Marketing and Customer Insights (Transform): Imperium Dynamics offers a guided methodology for training, basic journeys, configuring brand templates, and quick deployment of Microsoft Dynamics 365 Marketing and Customer Insights. The app features AI-generated insights, automated workflows, and personalized recommendations to optimize customer journeys and maximize customer lifetime value.
Consultancy for Microsoft Teams: Imperium Dynamics offers specialized consulting services to help businesses unlock the full value of Microsoft Teams. Expert consultants streamline the deployment process, offer ongoing support and training, and facilitate seamless integration with existing systems. They also invest time in understanding unique data management needs and develop customized solutions aligned with organizational requirements.
Jurisprudencia GPT LATAM: Available in Spanish, Jurisprudencia GPT is an AI pre-trained with judicial jurisprudence publications, specializing in legal knowledge and law application. With generative AI like ChatGPT, you can talk to an expert assistant (ChatBot) about various areas of law and their application. The AI is trained only with public information from the judiciary, ensuring ethical and responsible use.
Jurisprudencia GPT: Available in Portuguese for Brazil, Jurisprudencia GPT is an AI pre-trained with judicial jurisprudence publications, specializing in legal knowledge and law application. With generative AI like ChatGPT, you can talk to an expert assistant (ChatBot) about various areas of law and their application. The AI is trained only with public information from the judiciary, ensuring ethical and responsible use.
Go further with workshops, proofs of concept, and implementations
NNIT – Power Platform – Batch Management: NNIT Batch Management offers an automated workflow that streamlines batch release processes across different products, providing a single process overview of each batch’s current quality release status. This enables a faster and stronger QA process, cost optimization, and real-time releases based on rules-based automated batch release processes. The system also allows for significant product-specific batch release-related tailoring of the automated process.
Rebel Approach: The Rebel Approach is a low-code technology solution using Microsoft Power Platform that maximizes operational efficiency, reduces costs, and achieves strategic goals. Consultants work closely with clients throughout the development process, from analysis and design to implementation and training. The approach includes a scrum methodology and testing of solutions across the entire Microsoft Power Platform stack. Training and technical documentation are provided to end-users before organization-wide rollout. This offer is available in The Netherlands.
SharePoint Training: This intensive course covers all aspects of Microsoft SharePoint, from basic to advanced skills. Learn how to create and customize SharePoint sites, manage libraries and lists, design pages, and configure permissions. Suitable for beginners and advanced users, the course includes practical demonstrations, interactive exercises, and real-world case studies.
Talan – Copilot for Microsoft 365: 1-Day Workshop: Talan offers a workshop to help businesses implement Copilot for Microsoft 365. The workshop includes technical and functional analysis, demonstrating the value of Copilot, and change management strategies to encourage adoption. This workshop is available in France.
Contact our partners
Axians Calling with Teams Phone and Azure
This content was generated by Microsoft Azure OpenAI and then revised by human editors.
Microsoft Tech Community – Latest Blogs –Read More
Custom URL handler with MSIX package
I have packaged my classic Win32 application as an MSIX package to be distributed on the Microsoft Store.
Now, I want to register it as a handler for a custom URL protocol. With the classic Win32 installation, it was just a matter of creating some registry entries. However, I couldn’t find a way to do that with the AppxManifest.xml file.
Ideas?
I have packaged my classic Win32 application as an MSIX package to be distributed on the Microsoft Store. Now, I want to register it as a handler for a custom URL protocol. With the classic Win32 installation, it was just a matter of creating some registry entries. However, I couldn’t find a way to do that with the AppxManifest.xml file.Ideas? Read More
What causes Update Error 15270 in QuickBook and How can it be resolved?
I’m encountering Update Error 15270 in QuickBook. Every time I try to update the software, I receive this error message. What does it mean, and how can I fix it?
I’m encountering Update Error 15270 in QuickBook. Every time I try to update the software, I receive this error message. What does it mean, and how can I fix it? Read More
Next-generation SMB file services
Windows Server 2025 is the most secure and performant release yet! Download the evaluation now!
Looking to migrate from VMware to Windows Server 2025? Contact your Microsoft account team!
Looking to migrate from VMware to Windows Server 2025? Contact your Microsoft account team!
The 2024 Windows Server Summit was held in March and brought three days of demos, technical sessions, and Q&A, led by Microsoft engineers, guest experts from Intel®, and our MVP community. For more videos from this year’s Windows Server Summit, please find the full session list here.
This article focuses on improvements in SMB file services coming in Windows Server 2025.
Next-generation SMB file services
Radical changes are coming to the Server Message Block (SMB) and file services in Windows Server 2025 and Windows 11. Learn about new security behaviors, new functionality, and new scenarios available to your organization.
Microsoft Tech Community – Latest Blogs –Read More
Windows 11 Power Mode Question/Help
I have a Dell XPS 15 9510 w/ i9-11900H that I’ve done a thermal paste and pad replacement on a few months ago. Setting the Windows mode to “Power efficiency” reduces power and a modest turbo boost drop (but still some)…performance and temperatures are still good. However, I’ve noticed that when I plug the machine in, the Power efficiency is not in effect, machine runs at full power/speed, and machine still bounces off of 100C threshold even when doing simple productivity apps. I don’t notice throttling but it still bothers me. Disabling turbo boost works and temperatures drop significantly, but there is also a performance hit. How come the “power efficiency” mode doesn’t apply when plugged in and is there a way to enable it (or set maximum boost frequency) when both on battery or AC power? Thanks.
I have a Dell XPS 15 9510 w/ i9-11900H that I’ve done a thermal paste and pad replacement on a few months ago. Setting the Windows mode to “Power efficiency” reduces power and a modest turbo boost drop (but still some)…performance and temperatures are still good. However, I’ve noticed that when I plug the machine in, the Power efficiency is not in effect, machine runs at full power/speed, and machine still bounces off of 100C threshold even when doing simple productivity apps. I don’t notice throttling but it still bothers me. Disabling turbo boost works and temperatures drop significantly, but there is also a performance hit. How come the “power efficiency” mode doesn’t apply when plugged in and is there a way to enable it (or set maximum boost frequency) when both on battery or AC power? Thanks. Read More
Notification partage fichier dans un repertoire
Bonjour a tous, j’ai des dossier partagés a partir de mon serveur, j’aimerais que les utilisateurs reçoivent des notifications windows dès que un fichier est balancé dans un de leur répertoire partagé; Merci d’avance a tous, c’est un peu urgent !
Bonjour a tous, j’ai des dossier partagés a partir de mon serveur, j’aimerais que les utilisateurs reçoivent des notifications windows dès que un fichier est balancé dans un de leur répertoire partagé; Merci d’avance a tous, c’est un peu urgent ! Read More
How do I fix error code 12029 in QuickBook after update?
I keep encountering Quick-Books Error 12029 whenever I try to update my QuickBook software or pay-roll services. The error message says there’s a network timeout. I’ve tried restarting my computer and router, but the issue persists. What could be causing this error, and how can I resolve it?
I keep encountering Quick-Books Error 12029 whenever I try to update my QuickBook software or pay-roll services. The error message says there’s a network timeout. I’ve tried restarting my computer and router, but the issue persists. What could be causing this error, and how can I resolve it? Read More
How to fix QuickBook error 12031 after update?
Quick-Books error 12031 usually appears while updating Quick-Books Desktop and its added features. There are several update errors that a user might encounter while running Quick-Books update, where 120XX series of error appears as a result of internet connectivity issues.
Quick-Books error 12031 usually appears while updating Quick-Books Desktop and its added features. There are several update errors that a user might encounter while running Quick-Books update, where 120XX series of error appears as a result of internet connectivity issues. Read More
ERRO #VALOR! ao utilizar a função CONT.SES
Estou utilizando um banco de dados da ANVISA para um projeto de mestrado. O banco apresentava varias informações em uma mesma coluna e tive que fazer a separação dessas informações em inúmeras colunas para poder analisar. Tenho informações se a reação adversa ao medicamento são graves (sim= codifiquei igual a 1) ou não graves (não= codifiquei igual a 2). Essas informações ocupam as colunas EG:HG.
Depois tenho colunas relacionadas a gravidade da reação adversa ao medicamento (tenho 7 possíveis respostas), essas informações ocupam as colunas HH:QQ.
Gostaria de contar entre as reações adversas graves (EG:HG =1) quantas vezes aparece a gravidade de ameaça a vida, por exemplo (HH:QQ = 1 – ameaça a vida está codificada como 1)
Apliquei a fórmula =CONT.SES(EG:HG;1;HH:QQ;1) porém está dando erro #VALOR! e já tentei ver se está com algum vinculo e o erro continua aparecendo.
Alguem pode me ajudar como resolver?
Estou utilizando um banco de dados da ANVISA para um projeto de mestrado. O banco apresentava varias informações em uma mesma coluna e tive que fazer a separação dessas informações em inúmeras colunas para poder analisar. Tenho informações se a reação adversa ao medicamento são graves (sim= codifiquei igual a 1) ou não graves (não= codifiquei igual a 2). Essas informações ocupam as colunas EG:HG.Depois tenho colunas relacionadas a gravidade da reação adversa ao medicamento (tenho 7 possíveis respostas), essas informações ocupam as colunas HH:QQ.Gostaria de contar entre as reações adversas graves (EG:HG =1) quantas vezes aparece a gravidade de ameaça a vida, por exemplo (HH:QQ = 1 – ameaça a vida está codificada como 1)Apliquei a fórmula =CONT.SES(EG:HG;1;HH:QQ;1) porém está dando erro #VALOR! e já tentei ver se está com algum vinculo e o erro continua aparecendo.Alguem pode me ajudar como resolver? Read More
What is error code 15225 in Q.B Desktop after update?
I’m encountering Quick-Books Error 15225 when trying to update my Quick-Books software. The error message appears, preventing me from completing the update process. What could be causing this error, and how can I resolve it?
I’m encountering Quick-Books Error 15225 when trying to update my Quick-Books software. The error message appears, preventing me from completing the update process. What could be causing this error, and how can I resolve it? Read More
Different ways to repair Outlook PST files?
The Aryson PST Recovery program is the most dependable and well-known technique to repair Outlook PST files, which include emails, calendars, contacts, tables, tasks, and more. This utility can recover damaged PST files of any size. It keeps the folder hierarchy and contents intact during the conversion procedure. It also has an easy-to-use interface and is compatible with all versions of Windows and MS Outlook.
The Aryson PST Recovery program is the most dependable and well-known technique to repair Outlook PST files, which include emails, calendars, contacts, tables, tasks, and more. This utility can recover damaged PST files of any size. It keeps the folder hierarchy and contents intact during the conversion procedure. It also has an easy-to-use interface and is compatible with all versions of Windows and MS Outlook. Read More