Jump to content
Microsoft Windows Bulletin Board

Windows Server

Active Members
  • Posts

    5807
  • Joined

  • Last visited

Everything posted by Windows Server

  1. Overview The Course Blueprint is a comprehensive visual guide to the Azure ecosystem, integrating all the resources, tools, structures, and connections covered in the course into one inclusive diagram. It enables students to map out and understand the elements they've studied, providing a clear picture of their place within the larger Azure ecosystem. It serves as a 1:1 representation of all the topics officially covered in the instructor-led training. Links: Each icon in the blueprint has a hyperlink to the pertinent document in the learning path on Learn. Layers: You have the capability to filter layers to concentrate on segments of the course by modules. I.E.: Just day 1 of AZ-104, using filters in Visio and selecting modules 1-3 Enhanced Integration: The Visio Template+ for expert courses such as SC-100 and AZ-305 now features an additional layer that allows you to compare SC-100, AZ-500, and SC-300 within the same diagram. Similarly, you can compare AZ-305, AZ-204, and AZ-104 to identify differences and study gaps. Since SC-300 and AZ-500 are potential prerequisites for SC-100, and AZ-204 or AZ-104 for AZ-305, this comparison is particularly useful for understanding the extra knowledge or skills required to advance to the next level. Advantages for Students Defined Goals: The blueprint presents learners with a clear vision of what they are expected to master and achieve by the course’s end. Focused Learning: By spotlighting the course content and learning targets, it steers learners’ efforts towards essential areas, leading to more productive learning. Progress Tracking: The blueprint allows learners to track their advancement and assess their command of the course material. New Feature: A comprehensive list of topics for each slide deck is now available in a downloadable .xlsx file. Each entry includes a link to Learn and its dependencies. Download links Associate Level PDF Visio Released Updated Contents! AZ-104 Azure Administrator Associate Blueprint [PDF] Template 12/14/2023 10/28/2024 Contents AZ-204 Azure Developer Associate Blueprint [PDF] Template 11/05/2024 11/11/2024 Contents AZ-500 Azure Security Engineer Associate Blueprint [PDF] Template+ 01/09/2024 10/10/2024 Contents AZ-700 Azure Network Engineer Associate Blueprint [PDF] Template 01/25/2024 11/04/2024 Contents SC-300 Identity and Access Administrator Associate Blueprint [PDF] Template 10/10/2024 Contents Specialty PDF Visio Released Updated AZ-140 Azure Virtual Desktop Specialty Blueprint [PDF] Template 01/03/2024 02/05/2024 Expert level PDF Visio Released Updated AZ-305 Designing Microsoft Azure Infrastructure Solutions Blueprint [PDF] Template+ AZ-104 AZ-204 AZ-700 05/07/2024 11/18/2024 Contents SC-100 Microsoft Cybersecurity Architect Blueprint [PDF] Template+ AZ-500 SC-300 10/10/2024 Contents Skill based Credentialing PDF Visio Released Updated AZ-1002 Configure secure access to your workloads using Azure virtual networking Blueprint [PDF] Template 05/27/2024 Contents AZ-1003 Secure storage for Azure Files and Azure Blob Storage Blueprint [PDF] Template 02/07/2024 02/05/2024 Contents Benefits for Trainers: Trainers can follow this plan to design a tailored diagram for their course, filled with notes. They can construct this comprehensive diagram during class on a whiteboard and continuously add to it in each session. This evolving visual aid can be shared with students to enhance their grasp of the subject matter. Introduction to Course Blueprint for Trainers [10 minutes + comments] Real life demo AZ-104 Advanced Networking section [3 minutes] Visio stencils Azure icons - Azure Architecture Center | Microsoft Learn Subscribe if you want to get notified of any update like new releases or updates. My email ilan.nyska@microsoft.com LinkedIn https://www.linkedin.com/in/ilan-nyska/ Celebrating 30,000 Downloads! Please consider sharing your anonymous feedback <-- View the full article
  2. Hi,I am trying to extend X: with 100GB unallocated space.The Extend volume is greyed out.looking for diskpart command to achieve this.ThanksView the full article
  3. Microsoft is pleased to announce the release of the recommended security configuration baseline settings for Microsoft 365 Apps for enterprise, version 2412. Please download the content from the Microsoft Security Compliance Toolkit, test the recommended configurations, and implement as appropriate. This baseline builds on the previous Office baseline we released June 2023. The highlights of this baseline include: Added a new setting to Microsoft Project around blocking macros from the internet The recommended settings in this security baseline correspond with the administrative templates version 5473, released on 10/10/2024. Deployment options for the baseline IT Admins can apply baseline settings in different ways. Depending on the method(s) chosen different registry keys will be written and they will be observed in order of precedence: Office cloud policies will override ADMX/Group Policies which will override end user settings in the Trust Center. Cloud policies may be deployed with the Office cloud policy service for policies in HKCU. Cloud policies apply to a user on any device accessing files in Office apps with their AAD account. In Office cloud policy service, you can create a filter for the Area column to display the current Security Baselines, and within each policy's context pane the recommended baseline setting is set by default. Learn more about Office cloud policy service. ADMX policies may be deployed with Microsoft Endpoint Manager (MEM) for both HKCU and HKLM policies. These settings are written to the same place as Group Policy, but managed from the cloud in MEM. There are two methods to create and deploy policy configurations: Administrative templates or the settings catalog. Group Policy may be deployed with on premise AD DS to deploy Group Policy Objects (GPO) to users and computers. The downloadable baseline package includes importable GPOs, a script to apply the GPOs to local policy, a script to import the GPOs into Active Directory Group Policy, updated custom administrative template (SecGuide.ADMX/L) file, all the recommended settings in spreadsheet form and a Policy Analyzer rules file. GPOs included in the baseline Most organizations can implement the baseline’s recommended settings without any problems. However, there are a few settings that will cause operational issues for some organizations. We've broken out related groups of such settings into their own GPOs to make it easier for organizations to add or remove these restrictions as a set. The local-policy script (Baseline-LocalInstall.ps1) offers command-line options to control whether these GPOs are installed. "MSFT Microsoft 365 Apps v2412" GPO set includes “Computer” and “User” GPOs that represent the “core” settings that should be trouble free, and each of these potentially challenging GPOs: “DDE Block - User” is a User Configuration GPO that blocks using DDE to search for existing DDE server processes or to start new ones. “Legacy File Block - User” is a User Configuration GPO that prevents Office applications from opening or saving legacy file formats. "Legacy JScript Block - Computer" disables the legacy JScript execution for websites in the Internet Zone and Restricted Sites Zone. “Require Macro Signing - User” is a User Configuration GPO that disables unsigned macros in each of the Office applications. Block macros from running in Office files from the internet Microsoft Project now supports a configurable setting to block macros from running in Office files from the internet. To maintain consistency across applications the security baseline will enforce the default of Enabled. If you have questions or issues, please let us know via the Security Baseline Community or this post. View the full article
  4. I am trying link my Microsoft Learn Profile into my work Partner Account. Just did this, How to link Microsoft Learn: To link your Microsoft Learn profile: Sign up:VisitMicrosoft Learn and sign in with your Microsoft account (MSA). Learn more Pre-requisite:Complete at least one certification.Link accounts:Click "Link Microsoft Learn profile" to connect it with your Partner Center account.As mentioned here, https://partner.microsoft.com/dashboard/v2/membership/workspace However, after clicking "Link Microsoft Learn profile" nothing happens. When I check "Developer tools" for errors, I notice 401 responses. View the full article
  5. Hello, I'm trying to set it up so that a user can open a form in MS Access, click a control button, and it will run two queries automatically and export the two query results into new Excel workbooks in a specific location. I've been looking at doing an Event Procedure and using VBA to do this, but not having any luck. Can someone please help. I tried doing the following for the EventProcedure: Private Sub ExportToExcel_Click() DoCmd.TransferSpreadsheet acExport, , "Qry Confirmations Match", "I:\Customer Operations-Core\Operational QA\Dispute Services Verification\2025 DPP Verification\Correspondence Verification", True DoCmd.TransferSpreadsheet acExport, , "Qry Confirmations No Match", "I:\Customer Operations-Core\Operational QA\Dispute Services Verification\2025 DPP Verification\Correspondence Verification", True End Sub Thanks you! View the full article
  6. In today’s dynamic digital environment, cloud security is not just about building robust security posture; it’s about ensuring an adaptive environment with forward-looking strategies that align with your organization’s goals. Threat actors – ranging from individual hackers to organized criminal networks and state-sponsored groups – continuously develop new strategies to exploit vulnerabilities. Their motivations are diverse: financial gain, competitive intelligence, or pure disruption. Moreover, the greatest risks often emerge from within organizations, where human error or intentional misconduct can compromise even the most robust security frameworks. As the threat landscape grows increasingly complex, organizations must evolve beyond reactive responses to embrace proactive and holistic cybersecurity frameworks. This shift demands long-term strategic planning coupled with hands-on operationalization, ensuring that security measures are not only defined on paper but also seamlessly integrated into day-to-day workflows. Microsoft Defender for Cloud’s Cloud Security Posture Management (CSPM) solution embodies this comprehensive approach. It empowers organizations to maintain continuous visibility across multicloud environments, enabling informed decision-making and effective allocation of resources. By aligning security initiatives with business objectives, integrating compliance seamlessly, incorporating DevSecOps principles, and preparing for incidents proactively, Defender CSPM helps organizations build a security posture that evolves in tandem with their growth and innovation. This guide explores both the strategic imperatives and the practical steps necessary to operationalize Defender CSPM. From setting long-term security goals to automating compliance checks and embedding security into DevOps, we’ll walk through how to move from strategic vision to actionable practices that yield sustainable and measurable improvements in your organization’s cloud security posture. Why Strategic Planning Matters in Cloud Security Modern cloud architectures span multiple platforms - Azure, AWS, GCP, and beyond - each posing unique security challenges. Without a unified strategic framework, teams risk creating visibility gaps that malicious actors can exploit. Coupled with the evolving threat landscape, where adversaries leverage sophisticated tactics and target APIs, applications, and data stores, organizations must continuously refine their security strategies to stay ahead. Comprehensive strategic planning ensures that: Complexity is Managed Proactively: By defining a consistent security strategy across all cloud environments, organizations avoid piecemeal protection and siloed controls. Continuous Adaptation to Emerging Threats: The rapid evolution of technologies like AI and APIs requires forward-looking strategies that anticipate and mitigate new attack vectors. Strategic planning enables continuous improvement rather than ad-hoc, reactive fixes. Regulatory Compliance is Embedded: With regulations like GDPR, HIPAA, and PCI-DSS growing more stringent, organizations must weave compliance into their broader strategy. Automated governance and compliance checks ensure rules are followed without stifling innovation. Alignment with Business Goals: Effective cloud security isn’t a cost center - it’s a strategic asset. Integrating security into the broader business roadmap ensures that risk management supports growth, innovation, and operational excellence. Defender CSPM’s Role in Strategic Cloud Security Management Microsoft Defender CSPM is designed to provide the foundational capabilities required for a strategic security posture, offering: Continuous Visibility Across Multicloud Environments: Gain a unified view of security posture across Azure, AWS, and GCP. This holistic perspective allows teams to identify misconfigurations and vulnerabilities quickly - no matter where they lurk. Risk-Based Prioritization: Not all risks are equal. Defender CSPM contextualizes vulnerabilities based on potential impact and exploitability, guiding teams to focus on the most critical threats. Automated Compliance and Governance: By continuously auditing cloud environments against industry benchmarks, Defender CSPM helps maintain adherence to complex standards without manual overhead. DevSecOps Integration: Security needs to be “shifted left,” integrated into the earliest stages of software development. Defender CSPM aligns with DevOps workflows, catching vulnerabilities before they reach production. Proactive Incident Preparedness: By highlighting potential attack paths and offering forensic insights, Defender CSPM equips organizations to handle incidents swiftly and learn from them to prevent future occurrences. Resource Optimization: With finite budgets and staff, organizations must allocate resources where they matter most. Defender CSPM’s data-driven insights help direct investments to the highest-impact areas, improving ROI. From Strategy to Operationalization: Bringing Defender CSPM into Day-to-Day Work Developing a strategic security framework is the first step; operationalizing it ensures those strategies have a tangible impact. Operationalization bridges the gap between intention and execution, allowing your security posture to evolve continuously in response to new threats and requirements. Why Operationalization is Crucial: Proactive Risk Remediation: Knowing where your risks lie isn’t enough. Operationalizing CSPM means establishing workflows that ensure vulnerabilities and misconfigurations are promptly addressed, reducing dwell time and exposure. Automated Compliance and Governance Enforcement: Manual compliance checks are slow and error prone. Operationalizing CSPM involves automating these checks and embedding policies to ensure continuous adherence to standards. Seamless DevSecOps Integration: By incorporating security gates and assessments into CI/CD pipelines, security is no longer a bottleneck but a catalyst for building more resilient applications from the outset. Effective Incident Response: Operationalization ensures that incident response teams have playbooks, tooling, and integrations - such as with SIEM and XDR solutions like Microsoft Defender XDR and Sentinel - ready to go, minimizing downtime and damage. Data-Driven Resource Allocation: Turn insights into action by regularly evaluating risk data and using it to guide budget decisions, ensuring your team’s efforts yield maximum security value. Key Steps to Operationalizing Defender CSPM Set Clear Objectives and Assess Your Environment: Begin by evaluating your multicloud footprint and defining what success looks like. Are you striving for reduced mean time to remediate (MTTR), consistent compliance, or earlier vulnerability detection in the development cycle? Develop a Cloud Security Roadmap: A roadmap outlines how you will implement CSPM’s capabilities - continuous scanning, automated compliance checks, DevSecOps integration - and sets milestones to measure progress. Automate Vulnerability Scanning and Remediation: Configure continuous scanning to identify new vulnerabilities as they appear. Integrate remediation steps into predefined workflows so that issues are not just found, but rapidly fixed. Enforce Compliance Through Policies and RBAC: Implement Role-Based access controls and automated policy enforcement to maintain regulatory compliance. Regularly review compliance dashboards to ensure standards remain met over time. Integrate Security into DevOps Workflows: Shift-left security by embedding vulnerability scans and code checks into CI/CD pipelines. Provide developers with immediate feedback on security issues, enabling them to resolve problems early and cheaply. Proactive Forensics and Incident Preparedness: Develop incident response playbooks that detail how to use Defender CSPM insights to contain, investigate, and remediate breaches. Integrate with SIEM tools like Microsoft Sentinel for real-time alerting and streamlined investigations. Continuously Optimize Resource Allocation: Use Defender CSPM’s risk-based insights to refine where you spend your time and money. Track key metrics - like reduction in exposed vulnerabilities or faster remediation times - to prove ROI and make informed budgeting decisions. Measuring Success and Continuous Improvement Operationalizing your CSPM strategy isn’t a one-and-done effort. It’s a continuous improvement cycle that relies on monitoring key performance indicators (KPIs) and adjusting tactics as needed. Consider metrics like: Vulnerability Detection and Remediation Rates: How quickly are identified risks fixed? Compliance Audit Outcomes: Are you passing regulatory checks consistently? Mean Time to Remediate (MTTR): How quickly can your team address new threats? Reduction in High-Severity Exposures: Is your environment becoming progressively harder to penetrate? Regularly reviewing these metrics ensures that your CSPM program remains aligned with business goals, adapts to emerging threats, and continually improves. Conclusion The future of cloud security depends on uniting strategic vision with practical execution. Microsoft Defender CSPM provides the visibility, intelligence, and automation necessary to strengthen your security posture continuously. By integrating Defender CSPM into both long-term planning and day-to-day operations, organizations can proactively manage risks, maintain compliance, streamline DevSecOps, and prepare effectively for incidents, ensuring that security initiatives not only protect today’s assets but also pave the way for a more resilient future. Looking Ahead: Deep Dives into Strategic and Operational Scenarios In the following five articles, we’ll translate these principles into actionable guidance for real-world contexts. Each piece will focus on a specific scenario - proactive risk identification, compliance automation, DevSecOps integration, proactive forensics and incident response, and resource optimization - offering hands-on insights and tools. Stay tuned to learn how to turn vision into measurable, lasting improvements in your cloud security posture. Microsoft Defender for Cloud Additional Resources Download the new Microsoft CNAPP eBook at aka.ms/MSCNAPP Become a Defender for Cloud Ninja by taking the assessment at aka.ms/MDCNinja Reviewers Yuri Diogenes, Principal PM Manager, CxE Defender for Cloud View the full article
  7. Over the past three years, Microsoft and VMware have worked together to deliver Azure VMware Solution (AVS) to customers in more than 30 Azure regions around the globe. AVS offers a VMware environment within Microsoft Azure that’s fully managed by Microsoft, making it easier for customers to seamlessly migrate or extend VMware workloads to the cloud. For decades, customers have been running their on-premises servers and building their businesses on VMware virtualization technologies. But due to Broadcom’s recent changes to VMware Cloud Foundation (VCF) licensing, customers who depend on VMware for their mission-critical workloads and applications are reevaluating their options. And according to Microsoft internal data, 75% of on-premises Windows Servers and SQL Servers are running on VMware. Now, Microsoft partners have a significant opportunity to help customers optimize their VMware environments, migrate to the cloud, and set their businesses up for long-term success and innovation—starting with AVS. The AVS difference By choosing AVS, organizations can migrate their VMware workloads with little or no refactoring required and build upon their existing VMware skills—all while freeing up their teams to modernize on their terms and explore new ways to innovate with over 200 Azure services. This offers customers one of the fastest and most efficient paths to the cloud, combining the familiarity of the VMware environment and tech stack they already know with the scalability, security, and global reach of Azure. Read on to learn how you can drive more cloud migrations and innovation for VMware customers with offers, resources, and support from Microsoft at every stage of the sales process. Start the conversation First, connect with your customers about their plans for their VMware workloads. With ready-to-go pitch decks and sales resources from our AVS Go Big initiative, you can highlight the key benefits of migrating to AVS. That includes price protection: customers can lock in pricing for one, three, or five years and get a 20% AVS discount when they purchase a new one-year Reserved Instance before June 30, 2025. Continue reading hereView the full article
  8. Story Background Large healthcare payers have a complex contact center where their agents need to know lots of detailed information about claims, cases and medical policies. Helping these agents with an AI assistant that is knowledgeable about medical policies will help them assist providers and members as they call in with medical policy questions. Business Challenge Healthcare payors are hiring and training new agents on a regular basis due to turn over or growth. These agents need to assist members and providers which is difficult and time-consuming. The amount of information that they need to know is spread out across disparate systems and much of it is tribal knowledge, which is hard to train on. It is difficult for these agents to find the correct answer and respond to member in a timely fashion. These create poor customer service experience for the member & providers who are calling in, and extreme frustration for the agent as they want to do their job well but do not have the proper training or tools to do it quickly and accurately. Business Outcomes Using a medical policy AI chat bot will: Help the agents provide faster response times, First time call resolution Better member satisfaction Reduce the time for prior authorizations for providers Help process claims faster Help payors get paid quicker Lower call center expenses. Solution Overview This solution starts with using Azure AI studio to implement Azure OpenAI models and embedding, uses as your blob storage to upload documents, uses API‘s to connect to data sources, Azure API management to secure and store API information, uses Azure App services to configure and publish the to a web app for user consumption. https://youtu.be/Z7PsA6_mj4k Thanks for reading, Shelly Avery |Email, LinkedIn If you are interested in more content like this, then follow https://aka.ms/HealthcareShorts Please follow aka.ms/HLSBlog for all this great content. View the full article
  9. I have to run a SQL query running in SSMS that will take a VERY long time to complete, however the SQL server is in an enclave where RDP sessions have a short time out, meaning that the RDP session gets logged off before the SQL query completes. Is there a way to kick this query off so that it will complete whether or not the RDP session is still logged on/active? Maybe create an SP and start it via SP?PS: I chose "Windows Server" for the product since SQL server isn't a listed product.View the full article
  10. Authored by Richa, Product Manager II on Viva Engage Auditing and monitoring are critical components of security and compliance strategies for many organizations. As the technology landscape expands with a growing number of systems, endpoints, operations, and regulations, admins need a comprehensive logging and reporting solution. Viva Engage now offers enhanced audit logs, including Entra IDs of users involved in each operation and detailed information on specific modified properties during actions. This helps organizations effectively monitor key administrative activities, such as role management and network configurations, and provides valuable operational insights that help organizations proactively identify and respond to potential issues. Key Benefits of Audit Logs Audit logs deliver two primary benefits: Security: Audit logs help detect security breaches or violations. They can also be used to identify misuse of systems. In cases of recovery from incidents or technical issues, logs offer valuable insights about which actions were taken. Compliance: Many sectors, such as finance, healthcare, and government, mandate audit logs to meet regulatory standards. These logs provide proof of compliance, ensuring that organizations meet industry-specific regulatory requirements. Viva Engage Auditing Solutions The auditing solutions in Viva Engage offer a streamlined way to manage security events, conduct forensic investigations, and meet compliance obligations. Every user and admin operation within Viva Engage is logged and accessible in your organization’s unified audit log. These records are searchable by security and compliance teams, providing essential visibility into activities across Viva Engage and the Microsoft 365 environment. The Viva Engage auditing solutions address several key customer needs: Visibility into who accessed what, when, and how within Viva Engage. Clear tracking of role assignments, policy and configuration changes. Tools to investigate potential risks, or compliance violations. How to Access Viva Engage Audit Logs There are two primary ways to access these audit logs in your tenant: 1. Microsoft 365 Security & Compliance Portal: The Microsoft Purview Compliance portal is the main hub for audit logs. You can search for and export logs via the graphical interface or PowerShell (as explained here in detail). Steps to view logs: Log into the Microsoft Purview compliance portal. Navigate to "Audit" in the left-hand pane. Follow the instructions for searching the audit logs in the Follow the instructions for searching the audit logs in the Purview Portal using the filters explained in the "Get started with search" section of Search the audit log. Make sure to select the ‘Yammer’ workload for searching Viva Engage audit logs. The reference to ‘Yammer” workload will be updated to reference Viva Engage once final branding changes are complete. 2. Office 365 Management Activity API: The Office 365 Management Activity API enables you to retrieve Viva Engage audit log data programmatically. This API organizes actions and events into tenant-specific data, classified by content type. For Viva Engage, this data falls under the "Audit.General" category. Refer to Office 365 Management Activity API reference | Microsoft Learn for further details. Viva Engage Audit Log Schema Each captured Viva Engage audit log includes specific schema parameters detailing the activities, sources, and actions associated with each logged event. The audit logs utilize both the Common schema, and the Viva Engage schema. While the Common schema provide comprehensive property details used across all products and services, additional property details specific to Viva Engage can be found in the Yammer schema. The reference to the "Yammer schema” will be revised to "Viva Engage" upon the completion of the final branding updates. Below is a sample event of a corporate communicator role assignment in Viva Engage: { "UserId": "admin@nodomain.com", "ActorYammerUserId": 123456789, "ActorUserId": "admin@nodomain.com", "YammerNetworkId": 987654321, "Version": 1,"Id": "68478c34-e1bd-49ec-9e14-8c0b21937f44", "RecordType": 22, "CreationTime": "2024-11-5T19:13:49", "Operation": "AddUserRole", "OrganizationId": "6dt6h36d-498f-4b31", "UserType": 0, "UserKey": "hdcsssc3-800a-46d2-a48e-f6ddf786fde1", "Workload": "Yammer", "ResultStatus": "TRUE", "ObjectId": "", "ClientIP": "", "ModifiedProperties": [ {"Name": "UserRoles", "OldValue": "", "NewValue": "Corporate Communicator"} ], "TargetUserId": "janedoe@nodomain.com", "TargetYammerUserId": 78654329612, "TargetObjectId": "rwt528ch-a1f3-475b-a6a0-d5323ab743fb", "TargetUserRole": "corporate_communicator" } Viva Engage Audit Log Enhancements We have recently added and updated key admin audit logs in Viva Engage to capture actions such as promoting and demoting admin roles, changing custom usage policies, and enabling Leadership Corner, aimed at improving audit and compliance. For a complete list of Viva Engage audit log activities, refer to the Viva Engage activities section. Additional Resources Get started with auditing solutions | Microsoft Learn Search the audit log | Microsoft Learn Audit log activities | Microsoft Learn Office 365 Management Activity API reference | Microsoft Learn Track Viva Engage events in the Microsoft 365 audit log and with the Management Activity API | Microsoft Learn These resources offer further guidance on leveraging audit logs to monitor Viva Engage activities effectively. Thanks for reading! View the full article
  11. I have been attempting to open a support ticket with Microsoft. During this process, I have repeatedly received the error "Tax calculation was unsuccessful. Please try again later" numerous times and have received the error "An unspecified error occurred. Please try again later and avoid using incognito mode." I have used four separate email accounts and created a completely new outlook.com account to see if that would work. It did not. I also have attempted to call the Global Customer Service number as well. It sends me back to the Microsoft Service hub. I am unable to talk with a livView the full article
  12. Join us for our offer overview call! Office hours meeting link This is an opportunity to learn more about the offer and what is included for you. PMaaS (Partner Marketing as a Service) is the ticket to growing your pipeline efficiently. It's quick-turn, high-quality, co-branded marketing that amplifies your Microsoft alliance. For nominated Microsoft partners, PMaaS will deliver marketing advisory, content and execution services that drive joint business goals. "When you join this event, your name, email address and/or phone number may be viewable by other session participants in the attendee list. By joining, you’re agreeing to this experience." View the full article
  13. For me i want to set up Failover cluster, for fale-safe file server. I hope to us windows server and failover cluster. But before that i want to see documantation and understand how is failover cluster is working. For Example:I set up Failover cluster with 2 nodes.Questions. 1) How i can resolve problem with cluster after enabled only 1 node. 2) If 2nd node is disabled after that 1st node disabling, and after that enabling only 2nd node. CLuster that moment can work or no?View the full article
  14. In this blog series dedicated to Microsoft's technical articles, we'll highlight our MVPs' favorite article along with their personal insights. Jonah Andersson, Microsoft Azure MVP, Sweden Azure Developer CLI (azd) | Microsoft Learn “Because Azure Developer CLI (azd) is my personal favorite cloud development CLI tool for developer productivity, collaboration, and development with any programming languages to deploy and build on Microsoft Azure.” *Relevant Blog: Cloud Development with Azure Developer CLI (azd) - Jonah Andersson Eduardo Amaral, Business Applications MVP, Brazil Solution Architect series: Implement project governance for Power Platform and Dynamics 365 - Training | Microsoft Learn “Governance is key to a successful implementation of the Power Platform.” Juan Bravo Vargas, Business Applications MVP, Spain Demand Driven Material Requirements Planning (DDMRP) overview - Supply Chain Management | Dynamics 365 | Microsoft Learn “DDMPR is a fantastic feature in Dynamics 365 Supply chain management, allows lot of flexibility for complex planning item, optimize the inventory consumption and optimize the supply chain times in Purchase and production, allowing customers to deliver on time and quality with less stress." *Relevant Blog: - Planificación de requisitos de materiales basada en la demanda (DDMRP) – Parte 1 – Dynamics Republic - Planificación de requisitos de materiales basada en la demanda (DDMRP) – Parte 2 – Dynamics Republic Mohamed El-Qassas, Business Applications MVP, Saudi Arabia Managing Attention for Employee Wellness & Productivity | Microsoft Community Hub "As Microsoft CEO Satya Nadella famously said, ‘What is scarce in all of the abundance is human attention.’ So, we really need to prioritize strategies for effectively managing attention to boost employee productivity in today's workplace." *Relevant Blog: Attention Management In Microsoft 365 View the full article
  15. Please can you tell me the official guide to downgrade Windows Server DC 2025 to WS DC 2022 versionView the full article
  16. A converter VBA to Office Script is a challenging task, but with VBA and regular expressions, many common VBA constructs can be converted to Office Scripts. This converter is intended to create an approach in Office Script and then the user can extend it with his knowledge. Since VBA and Office Scripts have different syntax and APIs, this converter will convert simple elements such as loops, conditions, and cell operations. A more complex VBA to Office Scripts converter requires advanced logic to analyze and convert the different syntax and commands of the two languages. The attached file tries to convert the VBA code into Office Script in a simple way. A lot of things are not taken into account, but it can be a useful tool to get started. I hope it works for you too and if you discover any problems or errors, I would be happy to hear your feedback. View the full article
  17. Bd mai kya kr rhi hu to me and I have to me that he was a good time for you and I View the full article
  18. Currently, my virtualization environment includes virtual machines running Windows Server 2008 and Windows Server 2012, which are essential for maintaining the operation of critical legacy applications. I am in the process of migrating these VMs to a new cluster located at another site, where the host operating system will be Windows Server 2025 DataCenter (the current version). I understand that during the migration, each of these VMs will need to be reactivated. My question is: will the Windows Server 2025 DataCenter licensing allow the activation of VMs running Windows Server 2008 and View the full article
  19. Greetings, I am a 4th year student majoring in Integrated Information Protection. I am writing a final qualification work on the topic “Application of vulnerability graph analysis for testing the security of corporate networks based on Active Directory using BloodHound”. I have such a question - Is there in the public domain anonymized statistics of the occurrence of compromise of systems based on AD. Thank you very much for your reply, if you can help me I will be very glad. View the full article
  20. What is Azure Managed HSM Azure Key Vault Managed HSM (Hardware Security Module) is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated HSMs. It is one of several key management solutions in Azure. What is Security Domain To operate, a managed HSM must have a security domain. The security domain is an encrypted blob file that contains artifacts like the HSM backup, user credentials, the signing key, and the data encryption key that's unique to the managed HSM Without the security domain, disaster recovery isn't possible. Microsoft has no way to recover the security domain, and Microsoft can't access your keys without the security domain. Protecting the security domain is therefore of the utmost importance for your business continuity, and to ensure that you aren't cryptographically locked out. The managed HSM initializes the security domain and encrypts it with the public keys that you provide by using Shamir's Secret Sharing Algorithm After the security domain is downloaded, the managed HSM moves into an activated state and is ready for consumption. Managed HSM Deployment workflow Deployment options: CLI, PowerShell, ARM template Deployment workflow Optional deployments Plan What is the Motive? There are Three use cases can be considered while using managed HSM Encryption at rest for Azure Managed Services Storing keys that used to encrypt/ decrypt the parameters/object in self-developed application (SDKs are available) TLS offload for F5 and nginx (TLS offload libraries are available) Which is the Primary Region Whether Secondary Region is required Plan for secondary region if Multi region Replication is required. Managed HSM will be deployed in three physically separated racks and azure is providing 99.9% SLA. Please consider Multi region replication if you are planning for zero down time. Plan for RSA key pair to secure HSM Security Domain (Max 3, Min 10) Plan methods to secure Security Domain downloaded and Private Keys Follow best practices such as offline encrypted storage/offline HSM, multi-person control, and geo-separation, Internet isolation while safeguarding the private key. Microsoft cannot assist in the event of key loss as Microsoft doesn’t have access to private keys. Plan for Backup and restore You can store back to Azure blob storage; with the help of security domain and private keys you can restore it. Plan for disaster recovery Which users, groups or service principal need to be assigned for azure RBAC and local RBAC Whether Purge protection is Required Logging is required or not? Needed to be integrated with Azure policy or not? Private connectivity is required or not? Do you need to use SSL off load feature for F5 and nginx? Do you need to configure Key rotation? Pricing Aspects Managed HSM pool cost per hourOptional Back up storage cost Log storage cost Multi Region Replication costs View the full article
  21. So I've been trying to play marvel rivals, and I can't launch the game because every time I open the launcher and hit launch, i get the "your computer doesn't support directx 12. Try running without -dx12 or -d3dx12 command line." , but my computer does run directx 12. I already tried updating everything and downloading all available drivers but it still doesn't run. I went into dxdiag and I saw that directx 12 ultimate was currently disabled, but I'm not sure if that means my computer can't run ultimate, or if it's just currently disabled. please helpView the full article
  22. Hello, I am trying to get one of our servers to back up. This is proving difficult as I can't figure out what is wrong with my Shadow Copies so I can't really do much. I have tried adding more storage (only about 30GB but it was a 60GB disk so its a x1.5 incresess.) I have set the Shadow copies to unlimited. I have done everything in hear from Quest VSS Troubleshooting Guide – Failed VSS Writers (4034380)It is also a Virtual Machine on HyperV. The other VMs running on the same server are fine. I would like to avoid rebuilding it as it hasn't backed up since 26/03/2024It says to go to MircosoftView the full article
  23. Microsoft AI Cloud Partner Program -ohjelma tarjoaa kumppaneille uusia etuja ja lisenssejä, jotka tulevat saataville 22. tammikuuta 2025. Uudet etupaketit sisältävät muun muassa Microsoft Copilot -tuotteet, Microsoft Defender for Endpointin ja Microsoft GitHubin. Uudet kumppanit voivat valita kolmesta eri etupaketista: Partner Launch Benefits, Partner Success Core Benefits ja Partner Success Expanded Benefits, jotka on suunniteltu tukemaan kumppaneiden kasvua ja liiketoiminnan kehitystä. Partner Success -etupaketit mahdollistavat etujen hyödyntämisen ennen saavutettua nimikettä. Uudet edut tulevat automaattisesti myös kaikille Solutions Partner -nimityksen omaaville kumppaneille Partner Centeriin. Alla on listaus uusista tuote-eduista. Partner Centeriin tulee 22.1.2025 paljon uusia tuote-etuja Solutions Partner -nimityksen omaaville kumppaneille. Microsoft lopettaa vanhojen etupakettien, kuten Microsoft Action Packin ja legacy silver/gold -etujen, myynnin 22. tammikuuta 2025 alkaen. Kumppanit, jotka ostavat tai uusivat nämä paketit ennen tätä päivämäärää, voivat käyttää etujaan 12 kuukautta osto- tai uusimispäivästä lähtien. Uudet etupaketit tarjoavat enemmän valinnanvaraa ja arvoa, ja ne sisältävät modernisoituja ohjelmistolisenssejä ja henkilökohtaista tukea. Tutustu siihen, miten voit edistää liiketoimintasi kasvua hyödyntäen MAICPP-kumppaniohjelmaa esimerkiksi partner benefits packages, Solutions Partner designations for solutions areas, Solutions Partner* with certified software** designations, and ISV Success. Huom! Kumppanit, joilla on kelvollinen aktiivinen Silver/Gold Legacyn ostostatus 21.1.2025, ovat oikeutettuja kannustimiin tilikauden FY25 CSP incentive -kauden loppuun (22.1.2025 - 30.9.2025). Lue lisää muutoksista ja varaudu siihen. Blogikirjoitus tulevista muutoksista: Announcement Blog Laajempi esitys muutoksista kumppaneille MAICPP-ohjelman laaja FAQ Kumppaneiden päivitetty Benefits Guide Vertaile eri kumppanietupaketteja ISV Success -ohjelman edut Solutions Partner Designation -vaatimukset View the full article
  24. Hello all, Since Microsoft ended the MS-203 certification and courses, there is no training available anymore. On the Micorosft Learn website there aren't courses about Exchange 365; only the 'manage complaince in Exchange 365'. Does any of you know if there will be a new training for Exchange 365 soon? Where do you find courses for Exchange 365 (and Defender for Office/Exchange). Kind regards, Arjan View the full article
  25. Kevään 2025 Kumppanitunnit alkavat taas 17.1.2025 Microsoftin tekniset Kumppanitunnit järjestetään Cloud Champion -sivustolla, josta ne ovat kätevästi saatavilla tallenteina materiaaleineen pari tuntia live-lähetyksen jälkeen. Muistathan rekisteröityä Cloud Champion -alustalle ensimmäisellä kerralla, jonka jälkeen pääset aina koulutussisältöön sekä tallenteisiin käsiksi. Voit rekisteröityä "Register now"-kohdasta. Täytä tietosi ja valitse Distributor kohtaan - Other, mikäli et tiedä tukkurianne. Kumppanitunti on joka toinen perjantai klo 10–11 järjestettävä Microsoftin tekninen kumppaniwebinaari, joka on tarkoitettu Microsoftin kumppaneille. Webinaarissa keskitymme Microsoftin ratkaisualueiden teknologioiden mielenkiintoisiin uutuuksiin. Microsoftin suomalaiset arkkitehdit, tuotepäälliköt ja teknologiastrategit ovat poimineet kiinnostavia ja hyödyllisiä aiheita, joita he vuorollaan esittelevät. Lisäksi alussa luodaan lyhyt katsaus MAICPP-kumppaniohjelman uutisiin sekä kiinnostaviin koulutuksiin ja tapahtumiin. Webinaarissa on mahdollisuus myös esittää kysymyksiä aiheesta. Tee itsellesi toistuva kalenterivaraus ja muista ilmoittautua alla olevista linkeistä. Tervetuloa! Alla on suunnitellut teemat keväälle 2025, joiden tarkka aihe päivitetään aina lähempänä esityspäivää. 17.1.2025 Avustajasta agenteiksi: Copilot-agentit ja niiden luominen uusilla työkaluilla Rekisteröintisivun linkki tulee tähän myöhemmin. Kevään kuumin puheenaihe on erilaiset tekoälypohjaiset agentit. Tule kuulemaan, miten Microsoft 365 Copilotin laajentaminen voi luoda entistä henkilökohtaisempia käyttökokemuksia, mahdollistaa yhteistyön ihmisten ja agenttien välillä sekä ulkoistaa tiettyjä tehtäviä kokonaan autonomisille agenteille. Tässä teknisessä webinaarissa tutustutaan eri agenttityyppeihin ja niiden hyödyntämiseen organisaation eri osa-alueilla. Näet käytännössä, miten agentteja luodaan uusien työkalujen avulla. Webinaarin alussa käydään hyvin lyhyesti läpi Microsoftin MAICPP-kumppaniohjelman uutisia ja tulevia kumppanikoulutuksia. Huomaa, että esityksen sisältöön saattaa tulla muutoksia ja näet viimeisimmät sisältökuvaukset osoitteessa https://aka.ms/kumppanitunti Puhuja: Martin Lagus, ratkaisuarkkitehti, Microsoft 31.1.2025 Kattavaa tietoturvaa Copilotien käyttöön Rekisteröintisivun linkki tulee tähän myöhemmin. Generatiivisen tekoälyn hyödyntäminen tuo valtavasti arvoa organisaatioille lisäämällä tuottavuutta ja luovuutta. Kun tekoälyä integroidaan liiketoiminnan toimintoihin, organisaatiot kamppailevat uusien tietoturvaan ja tietosuojaan liittyvien huolien kanssa. Tässä teknisessä kumppaniwebinaarissa tutustumme Copilotien turvallisen käytön ja tietosuojan mahdollistaviin ratkaisuihin Purviewistä Defenderiin. Esittelemme konkreettisia esimerkkejä siitä, miten organisaatiot voivat hyödyntää generatiivista tekoälyä turvallisesti ja tehokkaasti. Tule mukaan oppimaan, millaisella tietoturvatarjoamalla kumppanit voivat auttaa asiakkaita hyödyntämään Microsoftin Copiloteja turvallisesti ja navigoimaan tietoturvaan ja tietosuojaan liittyvien haasteiden kanssa. Webinaarin alussa käydään hyvin lyhyesti läpi Microsoftin MAICPP-kumppaniohjelman uutisia ja tulevia kumppanikoulutuksia. Huomaa, että esityksen sisältöön saattaa tulla muutoksia ja näet viimeisimmät sisältökuvaukset osoitteessa https://aka.ms/kumppanitunti Puhuja: Heta Kuosa, ratkaisuarkkitehti, Microsoft 14.2.2025 Copilotien low-code-laajentaminen, agentit ja kustomointi Copilot Studiolla Rekisteröintisivun linkki tulee tähän myöhemmin. Microsoft 365 Copilotista on tullut vuoden aikana käyttöliittymä Microsoftin tekoälypalveluihin. Organisaatiot ovat ottaneet sitä jo käyttöön laajasti. Nyt on aika laajentaa sen kyvykkyyksiä käyttäjä- ja organisaatiokohtaisesti sekä luoda itsenäisiä uusia räätälöityjä Copiloteja. Siksi Microsoft on kehittänyt uusia yksinkertaisia tapoja rakentaa omia tekoälyratkaisuja, jotka hyödyntävät organisaation olemassa olevia informaatiolähteitä ilman, että käyttäjän täytyy osata koodata. Tässä teknisessä kumppaniwebinaarissa perehdymme näihin low-code-työkaluihin, joista ehdottomasti tärkein on Copilot Studio. Näet miten Studion avulla luodaan organisaation prosesseihin ja tietovarastoihin kiinteästi integroituvia itsenäisiä tekoälypohjaisia ratkaisuja, jotka voidat hakea tietoa, tehdä toimenpiteitä tai jopa täysin automatisoida prosesseja. Webinaarin alussa käydään hyvin lyhyesti läpi Microsoftin MAICPP-kumppaniohjelman uutisia ja tulevia kumppanikoulutuksia. Huomaa, että esityksen sisältöön saattaa tulla muutoksia ja näet viimeisimmät sisältökuvaukset osoitteessa https://aka.ms/kumppanitunti Puhuja: Pasi Halme, tekninen spesialisti, Microsoft 28.2.2025 Azure AI Foundry tekoälyratkaisujen kehittäjän kotina Rekisteröintisivun linkki tulee tähän myöhemmin. Ignitessä julkistettu Microsoft Azure AI Foundry on uusi yhtenäinen alusta, joka on suunniteltu helpottamaan tekoälysovellusten kehittämistä ja hallintaa. Se yhdistää kehittyneet tekoälyteknologiat ja käytännön liiketoimintasovellukset, mikä mahdollistaa organisaatioille tekoälyn hyödyntämisen ratkaisuissa tehokkaasti ja turvallisesti. Se myös auttaa kehittäjiä vähentämään tekoälyratkaisujen kehittämiseen kuluvaa aikaa ja kustannuksia, samalla kun se tarjoaa työkaluja sekä suorituskyvyn että ROI:n seurantaan ja arviointiin. Tässä teknisessä kumppaniwebinaarissa käydään läpi millaisia työkaluja ja ominaisuuksia Azure AI Foundry tarjoaa kehittäjille ja sovellusarkkitehdeille. Kuulet mm. miten Azure AI Foundry SDK:n avulla voidaan helposti integroida Azure AI -ominaisuuksia sovelluksiin tai miten Azure AI Foundry -portaali (entinen Azure AI Studio) toimii yritystason hallintakonsolina, joka mahdollistaa tekoälyratkaisujen mukauttamisen, ajamisen ja hallinnan. Tai miten kehittäjät voivat käyttää suosikkityötilojaan, kuten GitHubia ja Visual Studiota, luodakseen mukautettuja toimintoja, käyttää lähdekoodin hallintaa ja integroida olemassa olevaa koodia eri kielistä. Tämä webinaari soveltuu niin sovellusarkkitehdeille, ohjelmistokonsulteille ja kehittäjillekin sekä näiden praktiikoiden vetäjille. Webinaarin alussa käydään hyvin lyhyesti läpi Microsoftin MAICPP-kumppaniohjelman uutisia ja tulevia kumppanikoulutuksia. Huomaa, että esityksen sisältöön saattaa tulla muutoksia ja näet viimeisimmät sisältökuvaukset osoitteessa https://aka.ms/kumppanitunti Puhuja: Juha Karvonen, ratkaisuarkkitehti, Microsoft 14.3.2025 Microsoft Fabric AI:n ja analytiikan modernina data-alustana (Vlad/Anna Ranta) Rekisteröintisivun linkki tulee tähän myöhemmin. 28.3.2025 Työkaluja tukemaan AI-skenaarioiden onnistunutta vientiä tuotantoon Rekisteröintisivun linkki tulee tähän myöhemmin. 11.4.2025 Azuren tietoturvaoperointi AI:n avulla ja Security Copilot Rekisteröintisivun linkki tulee tähän myöhemmin. 25.4.2025 Modernit Windows 365 -pilvityöasemat turvallisesti Azuresta Rekisteröintisivun linkki tulee tähän myöhemmin. 9.5.2025 Copilot agenttien tietosuoja ja tietoturva Microsoft Purviewiellä Rekisteröintisivun linkki tulee tähän myöhemmin. 23.5.2025 Uusia AI-työkaluja kehittäjän pakkiin Buildistä Rekisteröintisivun linkki tulee tähän myöhemmin. 6.6.2025 AI ja CRM - todistetusti voittava parivaljakko Rekisteröintisivun linkki tulee tähän myöhemmin. Löydät syksyn 2024 Kumppanituntien tallenteet ja materiaalit tästä. View the full article
×
×
  • Create New...