Jump to content

Microsoft Support & Discussions

Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product discussions and help.

  1. Today I am pleased to announce the public preview of a new feature in Azure Virtual Desktop called Custom image templates. Custom image templates allows admins to build a custom “golden image” with the added capability to include Azure Virtual Desktop built-in customizations as well as your own customization scripts to install other applications or set of configurations. This feature is a wrapper for the Azure Image Builder (AIB) service. It takes the elements that you want to include in your build, and ships it to the AIB service which builds the image including any additional customizations you have either selected from the AVD built in customizations or those…

    • 0 replies
    • 151 views
  2. Guest sairashaik
    Started by Guest sairashaik,

    Author introduction Hi, I am Saira Shaik, Working Principal customer success account manager as Microsoft India. Azure Savings Dashboard I have created this dashboard to display the savings made due to the purchase of Reservations or Savings Plans or by signing the agreement with Microsoft to get Azure Commitment Discounts (ACD). This dashboard is helpful for Customers who: Purchased Reservations or Purchased Savings Plan or Signed Monthly Azure Consumption Commitment (MACC) and got a special discounted price. Customers can view their savings by uploading the Amortized files into this Power BI file. You can download .pbit file and setu…

    • 0 replies
    • 1 view
  3. Guest nkondamudi
    Started by Guest nkondamudi,

    We are excited to announce the General Availability of Azure Portal experience for Azure Key Vault Managed HSM that greatly enhances customer experience in provisioning a Managed HSM and to view and manage resources in one unified hub. To create a Managed HSM, Sign in to the Azure portal at https://portal.azure.com, enter Managed HSMs in the search box to find and to create the resource, activate and perform CRUD (create, read, update, delete) operations. Continue reading...

    • 0 replies
    • 2 views
  4. Guest Vinicius Apolinario
    Started by Guest Vinicius Apolinario,

    The other day I posted a blog on how to deploy an AKS cluster that is ready for Windows workloads using Terraform. Today, I wanted to expand that to include gMSA, which is a highly requested feature from Windows customers running containers on AKS. Obviously, the complexity of the Terraform template grows a lot, so this blog post will provide the details on what is needed for that to work. gMSA requirements and items outside of Terraform scope Before diving into the Terraform template, it’s important to review the gMSA pre-requisites and what is not part of the scope of Terraform when deploying the Azure resources: Azure resources: As part of the gMSA enviro…

    • 0 replies
    • 2 views
  5. Guest irina_kostina

    This article covers 3 main concepts related to authentification & authorization, which can be used by SaaS providers. It will cover Application Roles functionality, Delegated & Application permissions, and Scopes functionality. But before we dive into the permissions and roles, it is important to understand the difference between 2 different versions of AAD, both of which can be used by software providers, depending on the scenario. Difference between AAD and AAD B2C AAD (AAD B2B) enables SaaS providers to extend their software to external users without the need to manage separate identity stores for their customers. By using AAD SaaS providers …

    • 0 replies
    • 2 views
  6. Guest carlottacaste
    Started by Guest carlottacaste,

    Did you know that you can learn AI with the help of an AI assistant? Discover how this is possible with GitHub Copilot, by joining Carlotta and Gustavo in the new video series Learning AI with GitHub Copilot. They'll guide you in the AI domain, exploring machine learning fundamentals, demoing how to build a classification model, and then moving to more advanced algorithms - called neural networks - and their application to computer vision. The full series is available on demand on both MS Learn and . 1st episode - Get Started! Join Carlotta and Gustavo as they kick-off the Learning AI with GitHub Copilot series, designed for machine learning beginners…

    • 0 replies
    • 1 view
  7. Guest Anthony Chu
    Started by Guest Anthony Chu,

    Welcome to this month's Azure Container Apps newsletter! We'll share the latest news and community highlights for Container Apps every month here on the Apps on Azure blog. Azure Container Apps monthly community live stream Our next is May 9, 2023 at 10:00AM PDT (17:00 UTC). Join us and our special guests to learn about: Latest Azure Container Apps news and community highlights Deploy container apps with GitHub Actions and Azure Pipelines Architect enterprise-scale solutions with Azure Container Apps landing zone accelerator Subscribe to the Azure Developers YouTube channel! Community highlights Some great content…

    • 0 replies
    • 0 views
  8. Summary Today, Microsoft is releasing CVE-2023-24932, and associated configuration guidance, to address a Secure Boot bypass vulnerability used by the BlackLotus bootkit to exploit CVE-2022-21894. Customers will need to closely follow the configuration guidance to fully protect against this vulnerability. This vulnerability allows an attacker to execute self-signed code at the Unified Extensible Firmware Interface (UEFI) level while Secure Boot is enabled.

    • 0 replies
    • 25 views
  9. Guest JillArmour

    The way we work has changed, requiring a new approach to support evolving employee demands. Microsoft Viva is designed to reimagine the employee experience by providing a digital workplace that helps organizations improve productivity, and drive business growth. And as a Microsoft partner, you are in a unique position help organizations build a culture of innovation, collaboration, and continuous learning. A new Employee Experience campaign is now available in Digital Marketing Content OnDemand (DMC) We are excited to announce that our Reimagine the employee experience digital marketing campaign is now available to you to help generate leads and unlock new pipel…

    • 0 replies
    • 2 views
  10. Guest DivSwa
    Started by Guest DivSwa,

    Custom connector is an extension capability of Logic Apps platform that allows you to build connectors for services or applications for which out of box connectors are not available. This feature is particularly useful for connecting to your in-house services in the same way as other connectors. Logic Apps Standard provides multiple ways to integrate with your custom APIs or backend services. The goal of this document is to explain these options and provide recommendations. Depending on where your service is hosted, different approaches would be recommended. Services hosted publicly on the web If you are an ISE customer with a custom connector for serv…

    • 0 replies
    • 0 views
  11. Guest Intune_Support_Team

    By: Michael Dineen - Sr Product Manager | Microsoft Intune We wanted to provide a comprehensive guide for Microsoft Intune admins on the options available to block and remove specific, non-approved applications on both corporate-owned and personally owned (BYOD) iOS/iPadOS and Android devices. While the examples used in this article will be focused on the Microsoft OneDrive app, you can apply these steps to any app available in either the Apple App Store or Google Play Store. iOS/iPadOS This section covers corporate-owned and personally owned (BYOD) iOS/iPadOS devices. Corporate devices (Supervised) iOS and iPadOS devices that have been enroll…

    • 0 replies
    • 2 views
  12. Guest DivSwa
    Started by Guest DivSwa,

    We are excited to announce the support for built-in APIM connector for Logic Apps Standard !! This allows you to consume your APIs hosted in APIM from Logic Apps workflows. Through APIM connector, you get the same visual and low code experience as with any other connector, thus providing a very powerful way to extend the out of box connectors and consume your backend services and APIs. By bringing the support of APIM connector in Logic Apps Standard, we now support connecting to your services and APIs hosted on-premises or in VNET. The APIM connector is a built-in connector, and therefore runs on the same compute as Logic Apps runtime and hence provides the …

    • 0 replies
    • 2 views
  13. Guest DivSwa

    We are excited to announce the support for Azure managed custom connectors support for Logic Apps Standard !! This allows you to now use your existing custom connectors from Logic Apps Standard along with Logic Apps consumption. If you are starting on Logic Apps Standard, this is a great option if your backend services or APIs are hosted in public. Custom connector is an extension capability of Logic Apps platform that allows you to build connectors for services or applications for which out of box connectors are not available. This feature is particularly useful for connecting to your in-house services in the same way as other connectors. This article has d…

    • 0 replies
    • 1 view
  14. Guest Arpita Duppala
    Started by Guest Arpita Duppala,

    We are happy to let you know that we have improved the registration process for the HCI cluster and the management of Arc extensions. These changes were made based on feedback and survey results we received from our community. Register cluster and associated Arc for server resources in same Resource Group Previously, Azure Stack HCI registration required two Resource Groups, one for the cluster resource and another for Arc for server resources. However, now you can register both the Azure Stack HCI cluster and Arc for Server resources in the same Resource Group by passing the existing Resource Group information. This workflow is supported by both PowerShell and …

    • 0 replies
    • 1 view
  15. Guest Brady-B

    Microsoft partners like Keytos, Cirrus Data Solutions, and CluedIn deliver transact-capable offers, which allow you to purchase directly from Azure Marketplace. Learn about these offers below: [attachment=39630:name] EZSmartCard: Enable passwordless onboarding and set up phishing-resistant credentials with Keytos' EZSmartCard. EZSmartCard uses artificial intelligence to verify a user's identity by scanning their government ID and matching it with their face and against your human resources database. This can remove the need for one-off passwords or a trip to the IT help desk. [attachment=39631:name] Cirrus Migrate Cloud: This solution from Cirrus Data ena…

    • 0 replies
    • 1 view
  16. Guest JillArmour
    Started by Guest JillArmour,

    We are excited to see you here! The previous community is now READ ONLY and will be archived on June 30, 2023. All new comments and discussions will be shared on this site moving forward. Continue reading...

    • 0 replies
    • 1 view
  17. Guest DanyHoter
    Started by Guest DanyHoter,

    Connecting from Power BI to ADX on a private end point Connecting from Power BI desktop The PBI developer creating datasets and reports need to connect to the ADX cluster using Power BI desktop. To establish such a connection, the user’s IP address should be allowed access to the private end point. The access should be tested using Kusto Web explorer (KWE) to make sure that the cluster can be reached. If KWE can connect , Power BI desktop should also connect successfully and a report using the cluster in Direct Query or import can be created. Connecting from the PBI service After the report is published , you need to allow the PBI …

    • 0 replies
    • 2 views
  18. Guest Vinicius Apolinario
    Started by Guest Vinicius Apolinario,

    This blog post has been co-authored by Microsoft and Dhiraj Sehgal, Reza Ramezanpur from Tigera. Container orchestration pushes the boundaries of containerized applications by preparing the necessary foundation to run containers at scale. Today, customers can run Linux and Windows containerized applications in a container orchestration solution, such as Azure Kubernetes Service (AKS). This blog post will examine how to set up a Windows-based Kubernetes environment to run Windows workloads and secure them using Calico Open Source. By the end of this post, you will see how simple it is to apply your current Kubernetes skills and knowledge to rule a hybrid envi…

    • 0 replies
    • 2 views
  19. Guest The_Exchange_Team

    Starting July 15, 2023, we will start deprecating the legacy RPS protocol in the Security and Compliance PowerShell module. RPS is enabled by default for Security and Compliance cmdlets. As part of our modernization efforts, the Security and Compliance admin experience is moving to REST-based cmdlets. The new REST API will have the same cmdlets available and will have feature parity with the RPS v1 cmdlets; thus, existing scripts and processes don’t need to be updated. Simply using the new PowerShell module version 3.2.0-Preview3 will ensure REST is used instead of RPS. You can switch to REST-based cmdlets now by doing the following: Install the Exchange Onli…

    • 0 replies
    • 4 views
  20. Guest MattPhilipenko

    Here at Microsoft, we’re always striving to empower every person on the planet to achieve more. Our latest addition to the Microsoft 365 Apps Admin Center and Cloud Policy is the Accessibility Baseline. It is a set of accessibility policies and or recommend settings for policies to enable Accessible document creation across tour organization. You have the option to target all users on the tenant or select groups. Don’t worry about being a specific build. If you’re using Microsoft 365 Apps, you’re good to go! This feature is embedded in the Cloud Policy toolset in the Microsoft 365 Apps Admin Center and will enable an IT Pro to configure policies which are centered ar…

    • 0 replies
    • 2 views
  21. Guest Gennadyk

    In December 2022, Microsoft Database for PostgreSQL - Flexible Server announced general availability of encryption at rest with Customer Managed Keys (CMK) feature. Data encryption at rest is a very important aspect of database security, as it transforms your data into unreadable code (ciphertext) using a cryptographic algorithm. Encryption encodes data, so only programs that know how to decode it can read it. It uses an algorithm—a set of ordered steps—to alter the information so that the receiving party can't read it without applying a similar algorithm to return it to its original state. In order for unauthorized users to decode and access sensitive information, they n…

    • 0 replies
    • 2 views
  22. Guest lynnletukas
    Started by Guest lynnletukas,

    In the past, technology companies were the primary employers of people with technology skills. Today, nearly every company is a technology company. Organizations in industries such as education, healthcare, finance, and government now leverage all kinds of technology to work smarter, improve productivity, and remain competitive. As technology becomes even more ingrained in our society, demand for technology skills will continue to grow across all industries. For example, digital innovation in the healthcare industry is progressing at an unprecedented scale, according to the World Health Organization, with virtual reality, 3D printing, and artificial intelligence (AI…

    • 0 replies
    • 3 views
  23. Guest sonyabedi

    What’s going on around your people at work to make them feel the way they do? With an ever-changing landscape, it is no longer enough to simply ask employees how they're feeling. To truly understand their sentiment, companies also need to consider how their people work. Viva Glint and Viva Insights have come together to help companies do just that by providing deeper insights that consider both behaviors and sentiment and enable a more holistic approach to improving the employee experience and business outcomes. I recently spoke with @EricKnudsen (Principal Manager at Viva Glint People Science Analytics) and Chris Gideon, (Senior Principal Data Science M…

    • 0 replies
    • 2 views
  24. Guest Claude Lorenson
    Started by Guest Claude Lorenson,

    Sustainability is not just a moral necessity but also a critical strategic imperative for businesses. Accenture reports that sustainability has become a top-10 business priority for the first time ever, while a Forrester Consulting survey shows that 61 percent of Fortune Global 200 companies created senior management and executive positions to lead sustainability programs. Yet the same Accenture study reveals that currently only 18 percent of companies have a sustainability strategy in place or have fully defined sustainable IT targets. Increase efficiency with Azure hybrid solutions Microsoft hybrid solutions powered by Azure Arc can help modernize IT to reach su…

    • 0 replies
    • 3 views
  25. Guest The_Exchange_Team

    Due to user error, the original version of this article published on March 23 was deleted. We are republishing the article below. Please join us for upcoming Ask Me anything (AMA) on this subject, starting on May 10, 2023 at 9am Pacific Time. As we continue to enhance the security of our cloud, we are going to address the problem of email sent to Exchange Online from unsupported and unpatched Exchange servers. There are many risks associated with running unsupported or unpatched software, but by far the biggest risk is security. Once a version of Exchange Server is no longer supported, it no longer receives security updates; thus, any vulnerabilities discovered after s…

    • 0 replies
    • 3 views