Tag Archives: microsoft
Schedule Alerts in Microsoft Sentinel
Hello all,
I have some Playbooks in azure that were created using the Logic App Designer to send me an email alert whenever the incident is created / triggered. I want to have these to go off or be active only during specific hours, for example 10am – 3pm.
Is this possible and how would I achieve this?
Thanks for any help in advance
Hello all,I have some Playbooks in azure that were created using the Logic App Designer to send me an email alert whenever the incident is created / triggered. I want to have these to go off or be active only during specific hours, for example 10am – 3pm.Is this possible and how would I achieve this?Thanks for any help in advanceAlertsPlaybooks Read More
Show changes in version history
Hi,
I have an excel document in onedrive. I shared with my friend who has changed the document with me at the same time online one month ago. In the version history, I can see which cells were edited. How can I found out which cells were edited by me and which cells were edited by my friend?
Thanks in advance!
Hi, I have an excel document in onedrive. I shared with my friend who has changed the document with me at the same time online one month ago. In the version history, I can see which cells were edited. How can I found out which cells were edited by me and which cells were edited by my friend? Thanks in advance! Read More
Approximate Vector Search with KMeans and Azure SQL | Data Exposed
In this episode, we’ll see how to calculate KMeans clusters for vector data which will then be used to perform an Approximate Similarity Search. We’ll offload resource intensive processing to calculate KMeans using SciKit-Learn to a container and then do cell probing in pure T-SQL.
Resources:
Intelligent applications with Azure SQL Database: https://aka.ms/sqlai
Azure SQL Devs’ Corner: https://devblogs.microsoft.com/azure-sql/
Vector Search Optimization via KMeans, Voronoi Cells and Inverted File Index (aka “Cell-Probing”): https://devblogs.microsoft.com/azure-sql/vector-search-optimization-via-kmeans-voronoi-cells-and-inverted-file-index-aka-cell-probing/
View/share our latest episodes on Microsoft Learn and YouTube!
Microsoft Tech Community – Latest Blogs –Read More
Sorry, something went wrong
Is there any way that someone at Microsoft can pull the data from my form? It still works on the front end, and I have already created a new form to replace it, I really need the data that has been entered so far though?
Session id: ab0b573d-3718-4993-a2d7-13dcb5a0af78, Correlation id: 3ead44fc-482b-4165-a407-f2ca2f8ebf87
Any ideas???
Is there any way that someone at Microsoft can pull the data from my form? It still works on the front end, and I have already created a new form to replace it, I really need the data that has been entered so far though? Session id: ab0b573d-3718-4993-a2d7-13dcb5a0af78, Correlation id: 3ead44fc-482b-4165-a407-f2ca2f8ebf87 Any ideas??? Read More
dividing survey results
I am creating a Forms survey that will be sent out at one time to a large group. I want to divide the results for all the questions based on the answer to one question. How can I do this?
I am creating a Forms survey that will be sent out at one time to a large group. I want to divide the results for all the questions based on the answer to one question. How can I do this? Read More
AI and Copilot – how can I get started?
Are your customers asking about AI and Copilot? There are some fantastic resources available to better understand how you can better deploy Copilot and increase your time to value for your customers: Your path to value with Copilot for Microsoft 365 – Microsoft Community Hub
These resources include a technical readiness guide, user enablement guide, top things to try etc. It covers both technical and business audiences.
Let us know what your experience is like!
Are your customers asking about AI and Copilot? There are some fantastic resources available to better understand how you can better deploy Copilot and increase your time to value for your customers: Your path to value with Copilot for Microsoft 365 – Microsoft Community Hub
These resources include a technical readiness guide, user enablement guide, top things to try etc. It covers both technical and business audiences.
Let us know what your experience is like! Read More
Bulk update Azure AD from Powershell – FAILED to update
Trying to run script to bulk update users attributes in AAD.
getting error (tried with multiple users)
what am I doing wrong here?
see below the script, the csv and the error
$CSVrecords = Import-Csv C:TempTest.csv -Delimiter “,”
$SkippedUsers = @()
$FailedUsers = @()
foreach ($CSVrecord in $CSVrecords) {
$upn = $CSVrecord.UserPrincipalName
$user = Get-AzureADUser -Filter “userPrincipalName eq ‘$upn'”
if ($user) {
try{
$user | Set-AzureADUser -jobTitle $CSVrecord.jobTitle -department $CSVrecord.department -officeLocation $CSVrecord.officeLocation -streetAddress $CSVrecord.streetAddress -city $CSVrecord.city -state $CSVrecord.state -postalCode $CSVrecord.postalCode -telephoneNumber $CSVrecord.telephoneNumber -mobile $CSVrecord.mobile
} catch {
$FailedUsers += $upn
Write-Warning “$upn user found, but FAILED to update.”
}
}
else {
Write-Warning “$upn not found, skipped”
$SkippedUsers += $upn
}
}userPrincipalName,jobTitle,department,officeLocation,streetAddress,city,state,postalCode,telephoneNumber,mobile
email address removed for privacy reasons,Title Test,Dept Test,Office Test,Street Test,City Test,State Test,Postcode Test,0111 1111111,07111 111111WARNING: email address removed for privacy reasons user found, but FAILED to update.
Trying to run script to bulk update users attributes in AAD. getting error (tried with multiple users)what am I doing wrong here? see below the script, the csv and the error $CSVrecords = Import-Csv C:TempTest.csv -Delimiter “,”
$SkippedUsers = @()
$FailedUsers = @()
foreach ($CSVrecord in $CSVrecords) {
$upn = $CSVrecord.UserPrincipalName
$user = Get-AzureADUser -Filter “userPrincipalName eq ‘$upn'”
if ($user) {
try{
$user | Set-AzureADUser -jobTitle $CSVrecord.jobTitle -department $CSVrecord.department -officeLocation $CSVrecord.officeLocation -streetAddress $CSVrecord.streetAddress -city $CSVrecord.city -state $CSVrecord.state -postalCode $CSVrecord.postalCode -telephoneNumber $CSVrecord.telephoneNumber -mobile $CSVrecord.mobile
} catch {
$FailedUsers += $upn
Write-Warning “$upn user found, but FAILED to update.”
}
}
else {
Write-Warning “$upn not found, skipped”
$SkippedUsers += $upn
}
}userPrincipalName,jobTitle,department,officeLocation,streetAddress,city,state,postalCode,telephoneNumber,mobile
email address removed for privacy reasons,Title Test,Dept Test,Office Test,Street Test,City Test,State Test,Postcode Test,0111 1111111,07111 111111WARNING: email address removed for privacy reasons user found, but FAILED to update. Read More
Need help to understand express route provisioning.
We’ve successfully configured the Express Route in Azure and obtained the service key (S-key) for connectivity. However, I’m seeking clarification on whom I should provide the S-key to for further configuration.
Should the S-key be provided to the internet provider responsible for the on-site connection, or should it be handed over to the individual managing the on-site Meraki MX75 firewall? Additionally, I’d like guidance on the specific configurations required on the on-site Meraki firewall to ensure seamless integration with the Express Route.
We’ve successfully configured the Express Route in Azure and obtained the service key (S-key) for connectivity. However, I’m seeking clarification on whom I should provide the S-key to for further configuration.Should the S-key be provided to the internet provider responsible for the on-site connection, or should it be handed over to the individual managing the on-site Meraki MX75 firewall? Additionally, I’d like guidance on the specific configurations required on the on-site Meraki firewall to ensure seamless integration with the Express Route. Read More
macOS Scheduled Scan XML profile will remove DLP key and value from managed preferences
Refer to the MS support article for setting Scheduled Scans for Defender EP on macOS:
“How to schedule scans with Microsoft Defender for Endpoint on macOS – Microsoft Defender for Endpoint | Microsoft Learn”
When implementing the XML via Jamf Pro MDM via a configuration profile targeting com.microsoft.wdav, the result removes the Data Loss Prevention key and value from Managed Preferences as set via the JSON schema configuration profile, thus rendering it as disabled. Once the scan settings are removed, DLP is enabled again. This is repeatable.
Deploying an XML, like the one below for Scheduled Scans, will override DLP settings made with another config profile:
This needs reviewing by Microsoft as soon as possible.
Refer to the MS support article for setting Scheduled Scans for Defender EP on macOS:”How to schedule scans with Microsoft Defender for Endpoint on macOS – Microsoft Defender for Endpoint | Microsoft Learn” When implementing the XML via Jamf Pro MDM via a configuration profile targeting com.microsoft.wdav, the result removes the Data Loss Prevention key and value from Managed Preferences as set via the JSON schema configuration profile, thus rendering it as disabled. Once the scan settings are removed, DLP is enabled again. This is repeatable. Deploying an XML, like the one below for Scheduled Scans, will override DLP settings made with another config profile: <?xml version=”1.0″ encoding=”UTF-8″?> <!DOCTYPE plist PUBLIC “-//Apple//DTD PLIST 1.0//EN” “http://www.apple.com/DTDs/PropertyList-1.0.dtd”> <plist version=”1.0″> <dict> <key>features</key> <dict> <key>scheduledScan</key> <string>enabled</string> </dict> <key>scheduledScan</key> <dict> <key>ignoreExclusions</key> <true/> <key>lowPriorityScheduledScan</key> <true/> <key>dailyConfiguration</key> <dict> <key>timeOfDay</key> <integer>720</integer> </dict> <key>weeklyConfiguration</key> <dict> <key>dayOfWeek</key> <integer>5</integer> <key>timeOfDay</key> <integer>840</integer> <key>scanType</key> <string>full</string> </dict> </dict> </dict> </plist> This needs reviewing by Microsoft as soon as possible. Read More
El desafío de la innovación Hackathon del 28 de mayo al 10 de junio
(El post fue traducido usando Copilot. Por favor, siéntase libre de ofrecer correcciones y mejoras en los comentarios.)
Durante las últimas semanas, 3.000 desarrolladores se han estado preparando para los exámenes de certificación de Azure con el fin de ser invitados a competir en el Hackathon de IA del desafío de la innovación. Estamos patrocinando organizaciones que trabajan para abordar la diversidad en la tecnología. Buscamos dar más oportunidades a las personas para construir en Azure y abrir nuevas puertas para sus carreras. La culminación de su trabajo para obtener las credenciales de Azure es obtener la experiencia de resolver problemas empresariales de una manera empresarial: trabajar en equipo para resolver problemas reales.
Organizaciones participantes
Hemos patrocinado eventos y actividades de capacitación impartidos por BITE-CON, Black Women In Artificial Intelligence, Blacks in Technology, Código Facilito, GenSpark y Women in Cloud. Para calificar para el hackathon, los alumnos obtienen credenciales de Azure que validan sus conocimientos técnicos. Los alumnos eligieron obtener una certificación (AI 102, AZ 204 o DP 203) o ganar tres de las credenciales de habilidades aplicadas de IA.
Equipos que se unen para resolver casos de uso del mundo real
Los alumnos con una credencial que califique recibirán un correo electrónico de la organización que les ayudó con su formación. La invitación por correo electrónico tendrá el enlace para registrarse, crear un perfil de hacker e instrucciones para conectarse con un equipo en torno a un proyecto. Cada equipo elegirá uno de nuestros “Desafíos ejecutivos” para resolver. Los desafíos ejecutivos se seleccionan en función de los comentarios de nuestros clientes empresariales sobre los escenarios que ven que ayudan a sus negocios, resuelven problemas o habilitan nuevas posibilidades. Esperamos abrir el período de registro el 20 de mayo para que los equipos estén listos para hackear a partir del 28 de mayo. Las presentaciones finales deben completarse antes del 10 de junio.
La plataforma HackBox
Este programa se basa en la cultura de Microsoft: nuestra responsabilidad por la inclusión, el amor por construir cosas, aprender unos de otros y compartir nuestra pasión y optimismo por la tecnología. El hackeo es una forma clave de impulsar la colaboración, la creatividad y la experimentación. Estamos entusiasmados de usar la misma plataforma para el desafío de innovación que Microsoft usa para One Week, el hackathon privado más grande del mundo. Gracias a nuestros colegas de The Garage por abrir HackBox para apoyar este evento. Los hackers usarán HackBox para reunirse como equipos de proyectos de hasta 5 miembros para construir una solución funcional a uno de los desafíos ejecutivos. La plataforma también permite a las personas registrarse como asesores que se ponen a disposición para entrenar y brindar orientación. Esto les da a los entrenadores y mentores de nuestras organizaciones patrocinadas la capacidad de continuar apoyando a sus alumnos. Lo más importante es que HackBox permite que todos se unan para apoyarse mutuamente como comunidad. Podrá explorar proyectos, perfiles de otros hackers, descubrir eventos relacionados, acceder a recursos y obtener ideas.
Colabora con tu equipo en GitHub
Los equipos construirán sus proyectos colaborando en GitHub, donde los desarrolladores de software almacenan, comparten y trabajan juntos con otros para escribir código. Tener un proyecto en un repositorio de código en GitHub también lo hace disponible para la comunidad más amplia, por lo que el trabajo de un equipo puede contribuir a crear capacidades para los desarrolladores más allá del hackathon.
Construyendo en Azure
Los equipos podrán elegir las herramientas y tecnologías que crean más adecuadas para resolver su caso de uso objetivo. Si bien las soluciones no tienen que estar construidas al 100% con Azure, para calificar para los premios deben depender de al menos uno de estos servicios de Azure para resolver su caso de uso. (Estos son los servicios de inteligencia artificial y análisis disponibles a través de la prueba gratuita de Azure)
Azure AI Anomaly Detector
Azure AI Bot Service
Azure AI Content Safety
Azure AI Customer Vision
Azure AI Document Intelligence
Azure AI Immersive Reader
Azure AI Language
Azure AI Metrics Advisor
Azure AI Personalizer
Azure AI Translator
Cognitive Search
Data Catalog
Data Factory
Health Bot
Language Understanding (LUIS)
Machine Learning
Open Datasets
Speaker Recognition
Speech to Text
Speech Translation
Text to Speech
Presentar una entrada
Los equipos usan su página de proyecto HackBox para mostrar su trabajo y enviar un proyecto para su evaluación. Cada página de proyecto debe incluir
Una breve descripción de su proyecto
El desafío ejecutivo que resuelve
Enlace a un video que muestra una demostración de su proyecto, incluyendo una presentación que describa los objetivos de su proyecto, los componentes y la arquitectura de su solución, cómo pensó en su enfoque y cualquier aprendizaje clave
La presentación de PowerPoint de su video
Un enlace a su repositorio de código
Premios
Las entradas serán juzgadas por Microsoft y expertos externos en la materia.
Las mejores entradas recibirán premios que se dividirán equitativamente entre todos los miembros.
Un premio principal de $10,000
Dos premios de segundo lugar de $5,000
Tres premios de tercer lugar de $2,500
La evaluación se realizará la semana del 10 al 14 de junio, según los siguientes criterios y ponderaciones
Rendimiento 35%
Innovación 35%
Amplitud de los servicios de Azure utilizados 15%
IA responsable 15%
Una vez que se notifique a los ganadores, destacaremos sus proyectos y sus historias para celebrar sus logros.
Responsabilidad por la diversidad y la inclusión
En Microsoft, la diversidad y la inclusión son fundamentales para nuestra misión de empoderar a todas las personas y organizaciones del planeta para lograr más. Empoderar a las personas subrepresentadas a través de la actualización de habilidades es una parte clave de este enfoque. Para garantizar que los sistemas de IA fomenten la equidad y el empoderamiento para todos, el Estándar de IA Responsable de Microsoft es el manual que usamos para construir sistemas de IA. El Desafío de Innovación une estos hilos de una manera significativa para generar impacto en nuestras comunidades.
Diversidad e inclusión global de Microsoft | Microsoft
Liderazgo de opinión sobre la inclusión en un mundo en evolución | Viaje de inclusión de Microsoft
Principios y enfoque de la IA responsable | Microsoft AI
(El post fue traducido usando Copilot. Por favor, siéntase libre de ofrecer correcciones y mejoras en los comentarios.)
Durante las últimas semanas, 3.000 desarrolladores se han estado preparando para los exámenes de certificación de Azure con el fin de ser invitados a competir en el Hackathon de IA del desafío de la innovación. Estamos patrocinando organizaciones que trabajan para abordar la diversidad en la tecnología. Buscamos dar más oportunidades a las personas para construir en Azure y abrir nuevas puertas para sus carreras. La culminación de su trabajo para obtener las credenciales de Azure es obtener la experiencia de resolver problemas empresariales de una manera empresarial: trabajar en equipo para resolver problemas reales.
Organizaciones participantes
Hemos patrocinado eventos y actividades de capacitación impartidos por BITE-CON, Black Women In Artificial Intelligence, Blacks in Technology, Código Facilito, GenSpark y Women in Cloud. Para calificar para el hackathon, los alumnos obtienen credenciales de Azure que validan sus conocimientos técnicos. Los alumnos eligieron obtener una certificación (AI 102, AZ 204 o DP 203) o ganar tres de las credenciales de habilidades aplicadas de IA.
Equipos que se unen para resolver casos de uso del mundo real
Los alumnos con una credencial que califique recibirán un correo electrónico de la organización que les ayudó con su formación. La invitación por correo electrónico tendrá el enlace para registrarse, crear un perfil de hacker e instrucciones para conectarse con un equipo en torno a un proyecto. Cada equipo elegirá uno de nuestros “Desafíos ejecutivos” para resolver. Los desafíos ejecutivos se seleccionan en función de los comentarios de nuestros clientes empresariales sobre los escenarios que ven que ayudan a sus negocios, resuelven problemas o habilitan nuevas posibilidades. Esperamos abrir el período de registro el 20 de mayo para que los equipos estén listos para hackear a partir del 28 de mayo. Las presentaciones finales deben completarse antes del 10 de junio.
La plataforma HackBox
Este programa se basa en la cultura de Microsoft: nuestra responsabilidad por la inclusión, el amor por construir cosas, aprender unos de otros y compartir nuestra pasión y optimismo por la tecnología. El hackeo es una forma clave de impulsar la colaboración, la creatividad y la experimentación. Estamos entusiasmados de usar la misma plataforma para el desafío de innovación que Microsoft usa para One Week, el hackathon privado más grande del mundo. Gracias a nuestros colegas de The Garage por abrir HackBox para apoyar este evento. Los hackers usarán HackBox para reunirse como equipos de proyectos de hasta 5 miembros para construir una solución funcional a uno de los desafíos ejecutivos. La plataforma también permite a las personas registrarse como asesores que se ponen a disposición para entrenar y brindar orientación. Esto les da a los entrenadores y mentores de nuestras organizaciones patrocinadas la capacidad de continuar apoyando a sus alumnos. Lo más importante es que HackBox permite que todos se unan para apoyarse mutuamente como comunidad. Podrá explorar proyectos, perfiles de otros hackers, descubrir eventos relacionados, acceder a recursos y obtener ideas.
Colabora con tu equipo en GitHub
Los equipos construirán sus proyectos colaborando en GitHub, donde los desarrolladores de software almacenan, comparten y trabajan juntos con otros para escribir código. Tener un proyecto en un repositorio de código en GitHub también lo hace disponible para la comunidad más amplia, por lo que el trabajo de un equipo puede contribuir a crear capacidades para los desarrolladores más allá del hackathon.
Construyendo en Azure
Los equipos podrán elegir las herramientas y tecnologías que crean más adecuadas para resolver su caso de uso objetivo. Si bien las soluciones no tienen que estar construidas al 100% con Azure, para calificar para los premios deben depender de al menos uno de estos servicios de Azure para resolver su caso de uso. (Estos son los servicios de inteligencia artificial y análisis disponibles a través de la prueba gratuita de Azure)
Azure AI Anomaly Detector
Azure AI Bot Service
Azure AI Content Safety
Azure AI Customer Vision
Azure AI Document Intelligence
Azure AI Immersive Reader
Azure AI Language
Azure AI Metrics Advisor
Azure AI Personalizer
Azure AI Translator
Cognitive Search
Data Catalog
Data Factory
Health Bot
Language Understanding (LUIS)
Machine Learning
Open Datasets
Speaker Recognition
Speech to Text
Speech Translation
Text to Speech
Presentar una entrada
Los equipos usan su página de proyecto HackBox para mostrar su trabajo y enviar un proyecto para su evaluación. Cada página de proyecto debe incluir
Una breve descripción de su proyecto
El desafío ejecutivo que resuelve
Enlace a un video que muestra una demostración de su proyecto, incluyendo una presentación que describa los objetivos de su proyecto, los componentes y la arquitectura de su solución, cómo pensó en su enfoque y cualquier aprendizaje clave
La presentación de PowerPoint de su video
Un enlace a su repositorio de código
Premios
Las entradas serán juzgadas por Microsoft y expertos externos en la materia.
Las mejores entradas recibirán premios que se dividirán equitativamente entre todos los miembros.
Un premio principal de $10,000
Dos premios de segundo lugar de $5,000
Tres premios de tercer lugar de $2,500
La evaluación se realizará la semana del 10 al 14 de junio, según los siguientes criterios y ponderaciones
Rendimiento 35%
Innovación 35%
Amplitud de los servicios de Azure utilizados 15%
IA responsable 15%
Una vez que se notifique a los ganadores, destacaremos sus proyectos y sus historias para celebrar sus logros.
Responsabilidad por la diversidad y la inclusión
En Microsoft, la diversidad y la inclusión son fundamentales para nuestra misión de empoderar a todas las personas y organizaciones del planeta para lograr más. Empoderar a las personas subrepresentadas a través de la actualización de habilidades es una parte clave de este enfoque. Para garantizar que los sistemas de IA fomenten la equidad y el empoderamiento para todos, el Estándar de IA Responsable de Microsoft es el manual que usamos para construir sistemas de IA. El Desafío de Innovación une estos hilos de una manera significativa para generar impacto en nuestras comunidades.
Diversidad e inclusión global de Microsoft | Microsoft
Liderazgo de opinión sobre la inclusión en un mundo en evolución | Viaje de inclusión de Microsoft
Principios y enfoque de la IA responsable | Microsoft AI Read More
Collaborate across M365 tenants with Entra ID multi-tenant organization
Hi everyone,
I’m excited to announce the general availability of Microsoft Entra ID multi-tenant organization platform capabilities!
As your organization evolves, you may need to integrate multiple tenants to facilitate collaboration; for example, your organization may have recently acquired a new company, merged with another company, or restructured with newly formed business units. With disparate identity management systems, it can be costly and complex for admins to manage multiple tenants while ensuring users across tenants have access to resources to collaborate.
To enable application sharing across tenants, many of you have already deployed features like B2B collaboration to grant application access across tenants in your organization, cross-tenant access settings to allow for granular access controls, and cross-tenant synchronization to manage the lifecycle of users across tenants.
To further improve employee collaboration across your tenants, many of you have asked for unified chat across tenants in Microsoft Teams and seamless cross-tenant employee engagement and community experiences in Viva Engage.
You can now use Entra ID multi-tenant organizations to improve the cross-tenant collaboration experience in Microsoft Teams and Viva Engage. The capabilities are now generally available with Microsoft Entra ID P1 in the M365 commercial cloud.
Multi-tenant organization capabilities:
Get started with Entra ID multi-tenant organizations:
In this example, we’ll follow Contoso EMEA and Contoso APAC, two divisions of Contoso Conglomerate. Employees from Contoso EMEA and APAC are already using Microsoft Entra to share apps across tenants. Now they need to communicate across tenants using Microsoft Teams and Viva Engage. Leaders in the organization need to share announcements and storylines across the organization and employees need to chat using Teams. Let’s look at how the admins at Contoso configure their multi-tenant organization to meet these needs.
Step 1 – Form a multi-tenant organization
The tenant administrators of Contoso EMEA and Contoso APAC agree to form an Entra ID multi-tenant organization, facilitated by an invite-and-accept flow between them. The Contoso EMEA admin navigates to the M365 admin center and initiates the process, while the Contoso APAC admin confirms. This results in a mutually agreed upon multi-tenant organization of two tenants in both directories.
Microsoft Teams and Viva Engage applications in Contoso EMEA (APAC) will now interpret any external member users of identity provider Contoso APAC (EMEA) as employees of the multi-tenant organization with corresponding improved collaboration experience.
Step 2 – Provision external member users at scale
Microsoft Teams improved collaboration experience relies on reciprocal provisioning of collaborating users. So, Alice of Contoso EMEA should be provisioned as an external member user into Contoso APAC, while Bob of Contoso APAC should be provisioned as external member user into Contoso EMEA.
Viva Engage improved employee engagement experiences rely on centralized provisioning of employees into a central tenant, say Contoso EMEA. As such, Bob of Contoso APAC should be provisioned as an external member user into Contoso EMEA.
Cross-tenant synchronization is the ideal tool to accomplish this at scale, via the Entra admin center for complex identity landscapes, or via the M365 admin center for simplified setups. If you already have your own at scale user provisioning engine, you can continue using it.
Step 3 – Complete requirements by Microsoft Teams or Viva Engage
Any Microsoft Teams requirements such as using the new Teams clients can be found under M365 multi-tenant collaboration, while any Viva Engage configuration requirements can be found under Viva Engage for multi-tenant organizations.
Once your requirements for Microsoft Teams and/or Viva Engage have been completed, your employees will be able to collaborate seamlessly across your organization of multiple tenants, with unified chat experiences in Microsoft Teams and seamless conversations in Viva Engage communities.
How does multi-tenant organization licensing work?
Entra ID multi-tenant organization license requirement – Your employees can enjoy the new multi-tenant organization platform benefits with Microsoft Entra ID P1 licenses. Only one Microsoft Entra ID P1 license is required per employee per multi-tenant organization. For Microsoft Teams and Viva Engage license requirements, please review the M365 multi-tenant organization announcement.
I’m very excited for this milestone which helps your multi-tenant organization achieve better collaboration and communication experiences for your employees! Go and plan your multi-tenant organization rollout today. We love hearing from you and look forward to your feedback on Azure forum.
Joseph Dadzie, Partner Director of Product Management
Linkedin: @joedadzie
Twitter: @joe_dadzie
Learn more about Microsoft Entra:
Related Articles:
What is a multi-tenant organization in Microsoft Entra ID?
What is a cross-tenant synchronization in Microsoft Entra ID?
Properties of a B2B guest user – Microsoft Entra External ID
See recent Microsoft Entra blogs
Dive into Microsoft Entra technical documentation
Join the conversation on the Microsoft Entra discussion space and Twitter
Learn more about Microsoft Security
Microsoft Tech Community – Latest Blogs –Read More
Investigating Industrial Control Systems using Microsoft’s ICSpector open-source framework
Industrial Control Systems (ICS) security has been a subject of research for many years, spurred, in part, by recent state-sponsored ICS-targeting malware and supply-chain attacks like the ZPMC cranes spying concerns that threaten critical infrastructure. Given the potential harm to thousands of people if water treatment facilities, power plants and nuclear reactors or other systems are breached, the stakes are high. Unfortunately, forensics for ICS devices is not as advanced as in IT environments like Windows and Linux. This can stall forensics investigation when incidents occur.
To overcome this challenge, Microsoft released ICSpector, an open-source framework that facilitates the examination of the information and configurations of industrial programmable logic controllers (PLCs). This framework simplifies the process of locating PLCs and detecting any anomalous indicators that are compromised or manipulated. This can assist you in safeguarding the PLCs from adversaries who intend to harm or disrupt their operations.
Many operational technology (OT) security tools based on network layer monitoring, such as Microsoft Defender for IoT, provide network protection for OT/IoT environments, allowing analysts to discover their devices and respond to alerts on vulnerabilities and anomalous behavior. However, one of the biggest challenges is retrieving the code running on the PLC and scanning it as part of an incident response to understand if it was tampered with. This act requires caution, because the PLCs are actively operating vital industrial process. This is where ICSpector can help individuals or facilities perform this task with best practices.
Industrial control systems in brief
Industrial Control Systems (ICS) and Operational Technology (OT) are critical to modern society, powering everything from power grids and water treatment plants to manufacturing facilities and transportation systems. These systems typically rely on a combination of hardware and software components to perform their functions. Programmable logic controllers (PLCs) are used to manage and control the various processes within an industrial environment. As these systems become increasingly digitized and interconnected, they are also becoming more vulnerable to cyberattacks.
Due to their critical role in ensuring the smooth operation of industrial processes, and the physical danger or extreme financial losses that could result if attacked, ICS devices are prime targets of cyberattacks, making ICS security an increasingly critical issue in today’s digital landscape.
With ICS cyberattacks on the rise, facilities require a holistic solution to address the unique nature of critical infrastructure environments. A common threat involves ICS malware attempting to modify the controller program logic to disrupt operations and cause physical harm.
Extracting data from a controller can be challenging, as it requires specialized expertise in communicating with the device and understanding the specific, and at many times proprietary, protocols used to transmit and store data. This expertise is critical for conducting forensic operations because investigators must be able to extract specific data from a controller to identify security risks and determine the root cause of issues. The challenges around securing OT and the potentially large impact from even one controller being infected in a critical environment, highlight the need for effective security measures and forensic tools to investigate and remediate incidents.
Challenges in ICS forensics
ICS forensics differs from standard IT forensics, because ICS environments possess distinctive features that distinguish them.
Cybersecurity forensics in IT environments involves the collection, analysis, and preservation of digital evidence to identify the cause and extent of a security breach or cyberattack. This includes analyzing network traffic, logs, and system data to identify the source of the attack and to patch vulnerabilities. In contrast, forensics in OT environments involves analyzing ICS data, including data from sensors and controllers used in manufacturing and industrial settings.
While OT communication protocols and execution methods are based on general principles, each vendor can implement its own protocol for data exchange and management. As a result, there is no universal protocol that applies to all controllers, and researchers must investigate each device separately, from its communication patterns to its internal data structure.
Another challenge has to do with talent and tools. Because OT and IT environments were historically isolated and had distinct security operations center teams with different tools, most incident response specialists lack the expertise to analyze OT. And while the IT domain has a variety of forensics tools, such as Autopsy, The Sleuth Kit and FTK, the OT forensics domain is still emerging, lacks a common methodology, and requires OT experts to develop their own solutions.
Specialized tools and techniques have started to emerge to address the unique challenges of conducting investigations in ICS environments. These include the Top 20 Secure PLC Coding Practices, specific OT protocols implementations available on GitHub, and paid tools for an overview of controller programs for a specific set of protocols. Notably missing from these options has been an open-source solution that provides a comprehensive implementation of OT protocols and gives forensics investigators the ability to analyze extracted data and drill down into informative and suspicious areas within the controller loaded project.
ICSpector for industrial engineers and cybersecurity analysts
Microsoft aspired to fill the gap in the market by creating the ICSpector framework. Written in Python and available on GitHub, ICSpector is a framework with tools that enable investigators to:
Scan their network for programmable logic controllers.
Extract project configuration and code from controllers.
Detect any anomalous components within ICS environments.
Security experts can use these forensic artifacts to identify compromised devices as part of manual verification, automated monitoring of tasks, or during incident response. The framework’s modular, flexible design makes it convenient for investigators to customize it to their specific needs.
The framework is composed of several components that can be developed and executed separately. The overall architecture is as follows:
The network scanner identifies devices that communicate in the supported OT protocol and ensures they are responsive, based on a provided IP subnet. Alternatively, a user can provide a specific IP list that was exported from OT security products such as MDIoT, and the network scanner will only verify these devices are connected before beginning data extraction. After feeding the plugin the list of available devices, it extracts the PLC project metadata and logic. Then, the analyzer converts the raw data into a human-readable form and extracts different logic to highlight areas of the project artifacts that usually indicate malicious activity. The framework lets each component run independently with the required input. You can easily modify each component, adapting the operation to current needs, such as introducing protocol changes and analysis methods or altering the output. With the framework, users gain an inventory of assets based on the protocol scanning ability. In the data extraction phase, you can create snapshots of the controller projects and then compare changes over time.
Note: while the framework is not designed to disrupt the production process, due to the sensitive nature of ICS environments, we advise executing the data extracting component in a monitored environment.
The forensic analysis component of ICSpector allows to dive deep into malicious modifications of controller code. With the ICSpector framework, you can extract timestamp outliers indicating that someone changed the controller code at an unexpected time. Author information is provided as well to help detect suspicious code writers. You can extract network capabilities to surface unexpected communication ports and network libraries. Tasks are the code components responsible for the entire code execution, and the framework gives you an overview of the execution flow Tasks are data structures that trigger the execution of the PLC project, and the framework gives you an overview of existing tasks and their configuration. Additionally, the entire call graph is exported to obtain a clear view of the execution flow. Stuxnet, a sophisticated computer worm that was responsible for causing significant damage to Iran’s nuclear program in 2010, altered a cyclic task to monitor its malicious activities and added malicious logic to the main block of the program. Since the code running on the controller may differ from an engineer’s hard copy, the framework lets you compare the differences between the online and the offline code to catch malicious changes. All of these analysis capabilities could have helped detect the presence of Stuxnet in the network.
Get started with ICSpector
ICSpector is a novel solution that enables OT experts and cybersecurity analysts to enhance their reactive and proactive incident response capabilities in ICS environments. The OT cybersecurity community can participate in and benefit from security efforts in OT forensics, advancing our vision of better security practices in the OT field.
ICSpector can be used in conjunction with Microsoft Defender for IoT, Microsoft Security’s solution for defending IoT and ICS/OT devices that maps out your OT network and alerts you of malicious activity. Defender for IoT, or any other OT security solution, can help with both proactive and reactive OT incident response. Try ICSpector to see how it could benefit your organization. Our how-to guide will walk you through the installation of the framework and explain the components and how to use them in your environment.
Currently, the system supports three OT protocols: Siemens S7Comm, which is compatible with the S7-300/400 series, Rockwell RSLogix, using the Common Industrial Protocol, and Codesys V3, which is a widely used SDK for industrial control devices and is implemented by different vendors.
We encourage you to contribute to the tool by adding new OT protocols and forensic logic.
Learning about ICS basics, PLC programming and investigation methodologies can be done through the webinar, hosted by Microsoft Defender for IoT Research team.
To get started with OT security, watch the “Introduction to ICS/OT Security” webinar series, hosted by Microsoft Security Community.
Microsoft Tech Community – Latest Blogs –Read More
Multi-tenant organization capabilities now available in Microsoft 365
Today we’re thrilled to announce a robust set of multi-tenant organization (MTO) capabilities within Microsoft 365, now generally available to enhance your organization’s collaboration, communication, and administration across multiple tenants. These capabilities span Microsoft 365 People Search, Microsoft Teams, Viva Engage and Microsoft Defender XDR, which can be enabled via the Microsoft 365 admin center or Microsoft Entra admin center.
A tenant is a digital representation of your organization, which provides a reliable architectural foundation that allows for security, reliability, productivity, collaboration, and compliance at scale, that protects data by default. While many organizations start their journey with a single tenant, factors including organic growth, regulatory compliance, mergers, acquisitions, and divestitures can all contribute to how many tenants an organization will own and manage, and how users are segmented in those tenants. This segmentation can cause frustration when users need to communicate and collaborate across tenant boundaries, whilst IT admins need to perform the same set of administrative tasks per tenant to maintain their organization.
The capabilities we discuss below help multi-tenant organizations address these complexities, while staying compliant and secure:
Find people across organizations easily: Search for and communicate with colleagues in a unified manner with improved people search. Every search now returns a single, accurate result, simplifying how you connect with the right colleague.
Streamlined workforce collaboration: Engage in calls, chats, and meetings across tenants without the barriers of meeting lobbies. Enjoy immediate access to meeting content and collaborative tools in real time.
Unlock new ways for employees and leaders to connect: We’ve broadened the capabilities in Viva Engage, facilitating cross-tenant announcements and enabling community interaction and campaign participation that extend beyond tenant boundaries.
Manage incidents across tenants: Microsoft Defender XDR provides a single, unified view of all tenants your organization manages, allowing for swift incident investigation and advanced threat hunting without the need to switch between tenant views.
Simplify multi-tenant management: The newly defined multi-tenant organization boundary in Microsoft Entra ID P1 simplifies the enablement, configuration and management of the capabilities above. Whether through Microsoft Graph APIs or the Microsoft 365 Admin Center, setting up is intuitive and straightforward.
Let’s look at these capabilities in a bit more detail.
Find people across organizations easily with People Search
The multi-tenant organization (MTO) People Search is a collaboration feature that enables search and discovery of people across multiple tenants. A tenant admin can enable cross-tenant synchronization that allows users to be synced to another tenant and be discoverable in its global address list. Once enabled, users can search and discover synced user profiles from the other tenant and view their corresponding people cards.
To learn more, visit Microsoft 365 multi-tenant Organization People Search.
Streamline workforce collaboration with Microsoft Teams
Once administrators form a multi-tenant organization in the Entra ID platform (generally available today), organizations with the new Teams desktop client will automatically receive the Teams MTO features with no additional configuration.
Users can now join a meeting, chat, call, or collaborate in a channel hosted in another tenant, and simultaneously compose chat messages in their own tenant. Users can receive cross-tenant notifications for all accounts and tenants added to the Teams client, no matter which one is currently in focus.
People search is also improved. Searches for coworkers in a multi-tenant organization could often return multiple results for the same person. With the new MTO capabilities in the new Teams client, searching for a coworker in an MTO will return a single result, helping you to identify the correct colleague and keep your conversations in one place.
Users that join a meeting in another tenant can now bypass the meeting lobby, have access to all in-meeting content and resources and can collaborate in real time. Learn more about Teams multi-tenant capabilities here.
Unlock new ways for employees and leaders to connect using Viva Engage
Last year, Viva Engage introduced the ability to send announcements and storyline posts across tenants, and now we’re excited to expand the multitenant (MTO) capabilities within Engage to unlock new ways for employees and leaders to connect, share, and measure participation beyond their tenant boundaries. Learn more about how Viva Engage uses the hub & spoke model for MTO.
MTO Communities – Now communities can include employees from other tenants to view content, post, reply, and participate within that community. This is in preview now and will be fully available in June.
MTO Campaigns – Create official campaigns that are available for all employees to join in. This new feature allows employees to follow and take part in the conversations and help drive the campaign forward, regardless of their tenant. This is in preview now and will be available in June.
MTO AMAs & Events – Bring all employees together to participate in Ask Me Anything (AMAs) across tenant boundaries with leaders. This feature will be available in preview in June. Later this year, employees will also be to join live events via communities or Viva Engage events so leaders can host townhalls and company-wide meetings beyond their own tenant to include all stakeholders.
MTO Analytics – Get a horizontal view of engagement across all workloads and tenants so you can understand the reach and engagement of employees. Once available, this provides detailed metrics for communities, campaigns, events, and AMAs. MTO Analytics are already available for announcements and storyline posts.
Please note: MTO capabilities in Viva Engage require a Viva suite license or an Employee Communications & Communities (C&C) license.
Manage incidents across tenants with Microsoft Defender XDR
Security operations teams that work with multiple tenants need a reliable and comprehensive security solution that can keep up with modern threats and provide unified and connected experience to enhance their security operations. Microsoft Defender XDR now delivers unified investigation and response experience for multi-tenant organizations alongside native protection across endpoints, identities, email, collaboration tools, cloud apps, and data.
With multi-tenant management in Microsoft Defender XDR, security operations teams can quickly investigate incidents and perform advanced hunting across data from multiple tenants, removing the need for administrators to log in and out of each individual tenant. Learn more about Microsoft Defender XDR and multi-tenant capabilities here.
Enable Microsoft 365 multi-tenant capabilities with Microsoft Entra ID
Multi-tenant organization platform capabilities are now rolling out to standard production tenants in Microsoft 365. To deliver the above capabilities, administrators can enable multi-tenant capabilities in the Microsoft 365 admin center and configure which users in the organization can take advantage of multi-tenant capabilities using either Microsoft 365 admin center or Microsoft Entra admin center.
This approach allows you to define a boundary around the Entra ID tenants that your organization owns, facilitated by an invite-and-accept flow between tenant administrators. Learn more about the process in the Microsoft 365 admin center here and using Microsoft Graph API’s here. We recommend the use of the Microsoft 365 admin center to simplify the setup experience and to view your newly created MTO:
Following the formation of the multi-tenant organization, Microsoft offers two methods to provision employees into neighboring multi-tenant organization tenants at scale.
For a simplified experience, stay in the Microsoft 365 admin center to sync users into multiple tenants in your multi-tenant organization. We recommend this method for smaller multi-tenant organizations who plan on all employees receiving access to all multi-tenant organization tenants.
For a customizable sync experience, head over to Entra ID cross-tenant synchronization. Cross-tenant synchronization is highly configurable and allows the provisioning of any multi-hub multi-spoke identity landscape. We recommend this method for enterprise organizations of complex identity landscapes. Either method works. Choose the one that works best for your specific organization!
If you already have your own at-scale user provisioning engine, you can enjoy the new multi-tenant organization benefits while continuing to use your own engine to manage the lifecycle of your employees. Learn more about the optional use of cross-tenant synchronization here.
Conclusion
Multi-tenant capabilities simplify the process for organizations to arrange their tenants as secure, autonomous entities connected by common policies and foundational services to move their collective mission forward. With the release of multi-tenant capabilities for Microsoft 365, administrators can now connect people and organizations without impacting collaboration whilst respecting security & compliance boundaries.
Get started with multi-tenant organization by using the links above, and don’t forget to review the Entra ID multi-tenant documentation and list of limitations. Provide us with feedback about your MTO experience here, and look out for more announcements in the coming months as we continue to invest in product and capability enhancements across Microsoft 365 that make these changes easier for all customers, regardless of size and complexity.
Microsoft Tech Community – Latest Blogs –Read More
Deep dive into the Surface IT Toolkit
If you’re an IT administrator who manages a fleet of devices, you know how important it is to have the right tools for deployment and management. You also know how challenging it can be to find and use those tools, especially when they are scattered across different locations and versions. That’s why we are excited to announce the Surface IT Toolkit, a modern desktop application that compiles essential commercial tools and streamlines the Surface device management experience for IT admins – all in a single application.
Surface IT Toolkit is designed to provide simplified access to important tools that complement cloud and traditional management. You can follow step-by-step instructions to configure, update, or troubleshoot your devices. Not only does it provide a centralized location, the Surface IT Toolkit also ensures you are using the latest versions of our tools and installers. You don’t need to worry about outdated or incompatible versions, the app utilizes MSIX which automatically checks for updates and downloads them for you.
In this blog post, we’ll take a closer look at what’s included and what’s new with the Surface IT Toolkit.
Home
After your initial configuration, the first screen you’ll see when you open the toolkit is the home screen where you’ll find quick tasks and choose the managed devices in your fleet which helps optimize the UI of the app. You can also see the status of your tools and installers, and access the settings and feedback options.
Data Eraser
Data Eraser removes data from a Surface device using a NIST [Special Publication 800-88 Revision 1 NVM Express] format command. Additionally, it allows for the creation of certificates of sanitization for record keeping and auditing purposes. This is useful when you need to repurpose, recycle, or retire a device and ensure that no sensitive data remains on it.
What’s new with Data Eraser:
You can easily generate a certificate of sanitization after the wiping of an SSD.
The tool now provides the ability to complete a disk verification post wipe.
UEFI Configurator
UEFI Configurator lets organizations apply Surface Enterprise Management Mode (SEMM) UEFI configurations on supported devices and docks so IT staff can effectively control and deactivate components at the firmware level. This can help enhance security and compliance by preventing unauthorized changes to the device settings.
What’s new with UEFI Configurator:
In a single pass of the tool, you can create all packages needed for devices and docks (both configuration and reset).
We’re building parity between app UI and configurations historically only available to PowerShell, for example you now control USB-C ports through the UI, including USB-C Dynamic & Granular disablement.
For those utilizing PowerShell for SEMM deployment, sample PowerShell scripts are now built right into toolkit, so you quickly copy the samples into your script editor of choice and build a solution for your environment.
Recovery Tool
Recovery Tool provides the ability to perform a device reset to revert a device back to a factory state for troubleshooting scenarios. It will also help manage previously downloaded factory images to assist in re-use. This can help you resolve common issues and restore the device to its original performance.
What’s new with Recovery Tool:
Guided processes that no longer require serial numbers and simplifies the steps for building a Bare Metal Recovery (BMR) USB.
The tool provides the ability to build new and build from an existing image that you’ve already downloaded so you don’t have to fuss with version control.
We’re also providing more insight into what’s included in the image itself like what version of Windows and Microsoft 365 Apps are included.
Tool Library
Tool Library stores the latest versions of additional tools and installers that can be deployed to end users and provides IT a description of their purpose and links to supporting documentation. These include Surface Asset Tag Tool, Surface Diagnostic Toolkit for Business, Surface Brightness Control Tool, and more.
What’s new with Tool Library:
Centralized location for our other installers and tools.
Installers and tools are always up-to-date.
You can download the IT Toolkit as an MSIX package which is available from IT Pro Download Center here. You’ll also find the download link in the Surface Management and Support Suite under the Surface IT Tools section. You’ll also find the download link in the Surface Management and Support Suite under the Surface IT Tools section.
As always, be sure to check back here for more updates on managing and securing your Surface devices.
Microsoft Tech Community – Latest Blogs –Read More
data validation allowing invalid values (list, source list have blank cells)
Hello!
I am trying to use data validation using a named range (list validation).
The source range is a large range (5000 rows) and most of those rows are blank.
But, the validation is allowing invalid values (values outside the list). If I force a value on the whole range (like a – instead of empty cells) it will work as it should and block invalid values, so I know for sure it’s related to the empty cells.
I tried to turn off ignore blank, but the issue persists.
I need the list with the empty cells because this is a list that will increase with time, so I can’t fix the list size.
Hello!I am trying to use data validation using a named range (list validation).The source range is a large range (5000 rows) and most of those rows are blank.But, the validation is allowing invalid values (values outside the list). If I force a value on the whole range (like a – instead of empty cells) it will work as it should and block invalid values, so I know for sure it’s related to the empty cells.I tried to turn off ignore blank, but the issue persists.I need the list with the empty cells because this is a list that will increase with time, so I can’t fix the list size. Read More
Azure Synapse Store Procedure Error while updating
Hello,
I am new to Azure Synapse Analytics. I have an XLS file containing data and I want to upsert that data into an Azure Synapse dedicated SQL table.
I have created a stored procedure to upsert the data into the table.
I have used a lookup activity to load the XLS file and pass the JSON data to the stored procedure via a stored procedure activity.
It is working for inserting the data, but while updating, it is giving me the following error:
{
“errorCode”: “2402”,
“message”: “Execution failed against SQL Server. Please contact the SQL Server team if you need further support. SQL error number: 468. Error Message: Cannot resolve the collation conflict between “SQL_Latin1_General_CP1_CI_AS” and “Latin1_General_BIN2″ in the equal to operation.”,
“failureType”: “UserError”,
“target”: “Stored procedure for Insert Email”,
“details”: []
}
Hello,I am new to Azure Synapse Analytics. I have an XLS file containing data and I want to upsert that data into an Azure Synapse dedicated SQL table.I have created a stored procedure to upsert the data into the table.I have used a lookup activity to load the XLS file and pass the JSON data to the stored procedure via a stored procedure activity.It is working for inserting the data, but while updating, it is giving me the following error:{“errorCode”: “2402”,”message”: “Execution failed against SQL Server. Please contact the SQL Server team if you need further support. SQL error number: 468. Error Message: Cannot resolve the collation conflict between “SQL_Latin1_General_CP1_CI_AS” and “Latin1_General_BIN2″ in the equal to operation.”,”failureType”: “UserError”,”target”: “Stored procedure for Insert Email”,”details”: []} Read More
Retrieve the same list of “Active”Risky users (as in portal) using KQL with Log Analytics Workspace
We have enabled the Diagnostic Settings to capture Risky users in our Azure Entra ID.
I want to automate a daily Risky Users report using Logic Apps for the support teams. For this I need a query to show me the list of Risky Users as they are Azure Portal (Please refer attached Image). If someone has already a query for this can you please share which captures all Risky users with Risky Signins.
Overall I want to capture all Risky Users with Risky SignIns.
So far I am working on this query , but this is not showing every user as in the report.
AADRiskyUsers
| where RiskLastUpdatedDateTime > ago(1d)
| where RiskLevel in ( “high” , “medium” )
| where RiskState == “atRisk”
| take 100
We have enabled the Diagnostic Settings to capture Risky users in our Azure Entra ID.I want to automate a daily Risky Users report using Logic Apps for the support teams. For this I need a query to show me the list of Risky Users as they are Azure Portal (Please refer attached Image). If someone has already a query for this can you please share which captures all Risky users with Risky Signins. Overall I want to capture all Risky Users with Risky SignIns. So far I am working on this query , but this is not showing every user as in the report. AADRiskyUsers
| where RiskLastUpdatedDateTime > ago(1d)
| where RiskLevel in ( “high” , “medium” )
| where RiskState == “atRisk”
| take 100 Read More
Get rid of new section background options on modern pages
Hi,
on modern SharePoint-Online pages, does anybody know how to remove unwanted background options from the layout section?
We have a strict CI and custom themes and we don’t want the new backgrounds. Does anybody know a Power-Shell Cmdlet to do so?
Hi,on modern SharePoint-Online pages, does anybody know how to remove unwanted background options from the layout section? We have a strict CI and custom themes and we don’t want the new backgrounds. Does anybody know a Power-Shell Cmdlet to do so? Read More
The Innovation Challenge Hackathon May 28 – June 10
For the past few weeks 3,000 developers have been preparing for Azure certification exams in order to get invited to compete in the Innovation Challenge AI Hackathon. We are sponsoring organizations who work to address diversity in technology. We’re looking to give more people an opportunity to build on Azure and to open new doors for their careers. The capstone of their work towards getting Azure credentials is to get the experience of solving enterprise problems in an enterprise way—working as a team to solve real problems.
Participating organizations
We’ve sponsored training events and activities delivered by BITE-CON, Black Women In Artificial Intelligence, Blacks in Technology, Código Facilito, GenSpark, and Women in Cloud. In order to qualify for the hackathon, learners earn Azure credentials that validate their technical knowledge. Learners chose to either get a certification (AI 102, AZ 204, or DP 203) or to earn three of the AI Applied Skills credentials.
Teams coming tougher to solve for real world use cases
Learners with a qualifying credential will get an email from the organization that helped with their skilling. The email invitation will have the link to register, to create a hacker profile, and instructions for how to connect with a team around a project. Each team will choose one of our “Executive Challenges” to solve for. The Executive Challenges are selected based on input from our enterprise customers about the scenarios they see helping their businesses, solving problems or enabling new possibilities. We’re looking to open up the registration period on May 20 so that teams are ready to hack starting May 28. Final submissions are to be completed by June 10.
The HackBox Platform
This program is grounded in Microsoft’s culture—our accountability for inclusion, love of building things, learning from each other, and sharing our passion and optimism about technology. Hacking is a key way that we drive collaboration, creativity, and experimentation. We’re excited to be using the same platform for the Innovation Challenge that Microsoft uses for One Week, the world’s largest private hackathon. Thank you to our colleagues at The Garage for opening up HackBox to support this event. Hackers will use HackBox to come together as project teams of up to 5 members to build a working solution to one of the Executive Challenges. The platform also enables people to register as Advisors who make themselves available to coach and provide guidance. This gives the trainers and mentors from our sponsored organizations the ability to continue supporting their learners. Most importantly, HackBox enables everyone to come together to support each other as a community. You’ll be able to browse projects, other hacker’s profiles, discover related events, access resources, and get ideas.
Collaborate with your team on GitHub
Teams will build their projects by collaborating on GitHub, where software developers store, share, and work together with others to write code. Having a project in a code repository on GitHub also makes it available to the broader community so a team’s work can contribute to building capabilities for developers beyond the hackathon.
Building on Azure
Teams will be able to choose the tools and technologies they think are best suited to solve for their target use case. While solutions don’t have to be 100% built with Azure, in order to qualify for prizes they must depend on at least one of these Azure services in order to solve for their use case. (These are the AI and analytics services available through the free Azure trial)
Azure AI Anomaly Detector
Azure AI Bot Service
Azure AI Content Safety
Azure AI Customer Vision
Azure AI Document Intelligence
Azure AI Immersive Reader
Azure AI Language
Azure AI Metrics Advisor
Azure AI Personalizer
Azure AI Translator
Cognitive Search
Data Catalog
Data Factory
Health Bot
Language Understanding (LUIS)
Machine Learning
Open Datasets
Speaker Recognition
Speech to Text
Speech Translation
Text to Speech
Submitting an entry
Teams use their HackBox Project page to showcase their work and submit a project for judging. Each project page must include
A short description of your project
The Executive Challenge you solve for
Link to a video featuring a demo of your project, including a presentation describing your project goals, your solution components and architecture, how you thought through your approach, and any key learnings
The PowerPoint presentation from your video
A link to your code repository
Prizes
Entries will be judged by Microsoft and 3rd party subject matter experts.
The best entries will be awarded prizes to be divided equally among all members.
One $10,000 top prize
Two $5,000 second place prizes
Three $2,500 third place prizes
Judging will happen the week of June 10 – 14, based on the following criteria and weighting
Performance 35%
Innovation 35%
Breadth of Azure services used 15%
Responsible AI 15%
Once winners are notified, we’ll highlight their projects and their stories to celebrate their achievements.
Accountability for Diversity and Inclusion
At Microsoft, diversity and inclusion is central to our mission to empower every person and every organization on the planet to achieve more. Empowering underrepresented people through upskilling is a key part of this focus. To ensure that AI systems foster equity and empowerment for everyone, the Microsoft Responsible AI Standard is the playbook we use for building AI systems. The Innovation Challenge brings these threads together in a meaningful way to deliver impact for our communities.
Microsoft Global Diversity and Inclusion | Microsoft
Thought leadership on Inclusion in an evolving world | Microsoft Inclusion Journey
Responsible AI Principles and Approach | Microsoft AI
For the past few weeks 3,000 developers have been preparing for Azure certification exams in order to get invited to compete in the Innovation Challenge AI Hackathon. We are sponsoring organizations who work to address diversity in technology. We’re looking to give more people an opportunity to build on Azure and to open new doors for their careers. The capstone of their work towards getting Azure credentials is to get the experience of solving enterprise problems in an enterprise way—working as a team to solve real problems.
Participating organizations
We’ve sponsored training events and activities delivered by BITE-CON, Black Women In Artificial Intelligence, Blacks in Technology, Código Facilito, GenSpark, and Women in Cloud. In order to qualify for the hackathon, learners earn Azure credentials that validate their technical knowledge. Learners chose to either get a certification (AI 102, AZ 204, or DP 203) or to earn three of the AI Applied Skills credentials.
Teams coming tougher to solve for real world use cases
Learners with a qualifying credential will get an email from the organization that helped with their skilling. The email invitation will have the link to register, to create a hacker profile, and instructions for how to connect with a team around a project. Each team will choose one of our “Executive Challenges” to solve for. The Executive Challenges are selected based on input from our enterprise customers about the scenarios they see helping their businesses, solving problems or enabling new possibilities. We’re looking to open up the registration period on May 20 so that teams are ready to hack starting May 28. Final submissions are to be completed by June 10.
The HackBox Platform
This program is grounded in Microsoft’s culture—our accountability for inclusion, love of building things, learning from each other, and sharing our passion and optimism about technology. Hacking is a key way that we drive collaboration, creativity, and experimentation. We’re excited to be using the same platform for the Innovation Challenge that Microsoft uses for One Week, the world’s largest private hackathon. Thank you to our colleagues at The Garage for opening up HackBox to support this event. Hackers will use HackBox to come together as project teams of up to 5 members to build a working solution to one of the Executive Challenges. The platform also enables people to register as Advisors who make themselves available to coach and provide guidance. This gives the trainers and mentors from our sponsored organizations the ability to continue supporting their learners. Most importantly, HackBox enables everyone to come together to support each other as a community. You’ll be able to browse projects, other hacker’s profiles, discover related events, access resources, and get ideas.
Collaborate with your team on GitHub
Teams will build their projects by collaborating on GitHub, where software developers store, share, and work together with others to write code. Having a project in a code repository on GitHub also makes it available to the broader community so a team’s work can contribute to building capabilities for developers beyond the hackathon.
Building on Azure
Teams will be able to choose the tools and technologies they think are best suited to solve for their target use case. While solutions don’t have to be 100% built with Azure, in order to qualify for prizes they must depend on at least one of these Azure services in order to solve for their use case. (These are the AI and analytics services available through the free Azure trial)
Azure AI Anomaly Detector
Azure AI Bot Service
Azure AI Content Safety
Azure AI Customer Vision
Azure AI Document Intelligence
Azure AI Immersive Reader
Azure AI Language
Azure AI Metrics Advisor
Azure AI Personalizer
Azure AI Translator
Cognitive Search
Data Catalog
Data Factory
Health Bot
Language Understanding (LUIS)
Machine Learning
Open Datasets
Speaker Recognition
Speech to Text
Speech Translation
Text to Speech
Submitting an entry
Teams use their HackBox Project page to showcase their work and submit a project for judging. Each project page must include
A short description of your project
The Executive Challenge you solve for
Link to a video featuring a demo of your project, including a presentation describing your project goals, your solution components and architecture, how you thought through your approach, and any key learnings
The PowerPoint presentation from your video
A link to your code repository
Prizes
Entries will be judged by Microsoft and 3rd party subject matter experts.
The best entries will be awarded prizes to be divided equally among all members.
One $10,000 top prize
Two $5,000 second place prizes
Three $2,500 third place prizes
Judging will happen the week of June 10 – 14, based on the following criteria and weighting
Performance 35%
Innovation 35%
Breadth of Azure services used 15%
Responsible AI 15%
Once winners are notified, we’ll highlight their projects and their stories to celebrate their achievements.
Accountability for Diversity and Inclusion
At Microsoft, diversity and inclusion is central to our mission to empower every person and every organization on the planet to achieve more. Empowering underrepresented people through upskilling is a key part of this focus. To ensure that AI systems foster equity and empowerment for everyone, the Microsoft Responsible AI Standard is the playbook we use for building AI systems. The Innovation Challenge brings these threads together in a meaningful way to deliver impact for our communities.
Microsoft Global Diversity and Inclusion | Microsoft
Thought leadership on Inclusion in an evolving world | Microsoft Inclusion Journey
Responsible AI Principles and Approach | Microsoft AI Read More
How can I prevent window titles from overlapping in a Maui app with shell navigation and modals?
I’m developing a Maui app with shell navigation and modals, and I’m encountering an issue with overlapping window titles. When navigating from the main page to another page using shell navigation, a back button appears, causing the window title to shift slightly to the right. However, when I push a modal on that page, the window title on the modal page remains in its original position. This results in both window titles overlapping and creating a visually awkward effect.
I’ve attached images for reference
Any insights, code snippets, or suggestions would be immensely helpful. Thank you!
I’m developing a Maui app with shell navigation and modals, and I’m encountering an issue with overlapping window titles. When navigating from the main page to another page using shell navigation, a back button appears, causing the window title to shift slightly to the right. However, when I push a modal on that page, the window title on the modal page remains in its original position. This results in both window titles overlapping and creating a visually awkward effect.I’ve attached images for reference Any insights, code snippets, or suggestions would be immensely helpful. Thank you! Read More