Microsoft Support & Discussions
Free PC Help Forum microsoft products support and discussions. If you need help with Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product you can post here. If you want to discuss Microsoft and their line of products you can do that here also.
84,740 topics in this forum
-
Disaster protection for JFrog Artifactory in AKS with Astra Control Service and Azure NetApp Files
by Guest GeertVanTeylingen- 0 replies
- 0 views
Table of Contents Abstract Introduction Scenario Installing Artifactory Protecting Artifactory with Astra Control Service Execution hooks for PostgreSQL database Protecting the application Simulating disaster and recover the application to another cluster in a different region Summary Additional information Abstract We describe how to protect a multi-tier application with multiple components (like JFrog Artifactory) on Azure Kubernetes Service against disasters like the complete loss of a region with NetApp® Astra™ Control Service and Azure NetApp Files. We demonstrate how the use of pre- and post-snapshot execution hooks i…
-
Designing and Implementing Modern Data Architecture on Azure Cloud.
by Guest Charles_Chukwudozie- 0 replies
- 0 views
I just completed work on the digital transformation, design, development, and delivery of a cloud native data solution for one of the biggest professional sports organizations in north America. In this post, I want to share some thoughts on the selected architecture and why we settled on it. This Architecture was chosen to meet the following requirements gathered through a very involved and collaborative process with the customer: It should be open and flexible. Allowing for the ability to build and deliver solutions using the best services and cloud native products available. The architecture should enable secure integration between products/tools/…
-
Protect your storage resources against blob-hunting
by Guest Eitan_Shteinberg- 0 replies
- 0 views
How to detect, investigate and prevent blob-hunting Why is it important to understand blob-hunting? 1. Exfiltrating sensitive information from misconfigured resources is one of the top 3 cloud storage services* threats, and threat actors are continuously hunting storage objects because it’s easy, cheap, and there’s much to find. In some cases, they target your storage accounts. 2. Most people think they don’t have misconfigured storage resources. Most people do. Misconfiguration by end-users is a common problem; if you are safe today, there might still be a mistake tomorrow. 3. There are quick and effective ways to harden your s…
-
Azure Database creation using T-SQL or SSMS currently allows Unsupported characters in it's name.
by Guest NithyaBon- 0 replies
- 0 views
Issue: ARM (Azure Resource Manager) API does not support specific T-SQL resource naming formats and that's why when Databases are created using T-SQL/SSMS, unsupported characters could get allowed into the names. Azure Portal UI does not have this issue, because when you use Portal UI for creating a Database, the creation goes through ARM, and hence when unsupported characters are entered in the Name field, it immediately throws error, as shown in the below image. Therefore, this issue of allowing unsupported characters in the DB name is present in one specific create scenario: i.e., when customer creates database using SSMS/T-SQL command. As this create does n…
-
Deploying Microsoft Azure internally at Microsoft
by Guest Lukas_Velush- 0 replies
- 0 views
How Microsoft keeps its Microsoft Azure costs down as the company’s ‘customer zero’ Microsoft kept its Microsoft Azure costs flat while its workload footprint grew by 20 percent. Here at Microsoft, we’re a customer of Microsoft Azure, and just like our external customers, we’re trying to keep our cloud costs down. “When I talk to customers, they're always a little bit surprised to hear that we pay the same rates for Azure that they do,” says Heather Pfluger, the general manager of Infrastructure and Engineering Services in Microsoft Digital Employee Experience, Microsoft’s internal IT organization. “We operate with the same licensing, the same pric…
-
Data Loss Prevention across endpoints, apps, & services | Microsoft Purview
by Guest Zachary Cavanell- 0 replies
- 0 views
Protect sensitive data everywhere you create, view, and access information with one Data Loss Prevention policy in Microsoft Purview. From email, SharePoint and OneDrive accounts, to Microsoft 365 apps including Microsoft Teams, files managed on device endpoints for both Windows and macOS, as well as non-Microsoft cloud apps and services, and file share servers running on-premises or in the cloud. One policy protects data across all these locations and services. Cloud-native protection is built into apps, services, and devices, eliminating the need to add solutions, deploy agents, or configure policies in multiple locations. Shilpa Bothra, Product Ma…
-
Remediating Security Issues in Code with Pull Request Annotations
by Guest Lara_Goldstein- 0 replies
- 0 views
**We want to hear from you! If you have tested Microsoft Defender for DevOps, please fill out this survey to provide feedback on the Pull Request Annotations feature.** Written by: Lara Goldstein, Safeena Begum Lepakshi, Charles Oxyer Introduction: It is no secret that security and development teams operate in silos. Security administrators often struggle with getting developers to remediate vulnerabilities in code because they are not able to provide remediation guidance and feedback directly within the tools are most familiar with (e.g., GitHub and Azure DevOps). Additionally, for developers that embrace the practice of DevOps, they are used to movi…
-
Learn about an Azure Marketplace offer from MISA partner 42Crunch
by Guest Brady-B- 0 replies
- 0 views
The Microsoft Intelligent Security Association (MISA) is an ecosystem of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats. Learn more about an offer from MISA partner 42Crunch in the Azure Marketplace: [attachment=31869:name] 42Crunch Developer-First API Security Platform: Enjoy of a shared view of API security and enable a collaborative DevSecOps approach with 42Crunch Developer-First API Security Platform. It implements security as code, automates manual tasks, and eliminates false positives while scaling API delivery. Continue reading...
-
Entenda o que é e como evitar exaustão de portas TCP utilizando a classe HttpClient no .NET Core
by Guest ClaudioGodoy- 0 replies
- 0 views
No último trimestre realizei algumas análises de performance em Web API'S desenvolvidas utilizando o ASP.NET Core, e a maioria estava com o mesmo problema: O uso incorreto dos objetos de tipo HttpClient. Percebi então que havia um padrão problemático na sua utilização. Portanto resolvi escrever este artigo, com o intuito de ajudar os desenvolvedores a utilizarem corretamente esse tipo de objeto. O problema Realizar chamadas HTTP é uma tarefa simples, você só precisa criar instanciar de um objeto do tipo HttpClient, configurar algumas propriedades e pronto, você está apto a realizar sua chamada HTTP. A classe HttpClient implementa a interface IDisposable, o…
-
Azure Communication Services Calling Features Update
by Guest dayshacarter- 0 replies
- 0 views
Over the past few months, we’ve been working hard to expand and improve the features and usability of the Azure Communication Services calling tools. This blog provides a quick summary of the key calling features released recently. We will focus on: Raw media access Additional browser support for JS Calling SDK Call readiness tools, and Simulcast Raw Media Access Public preview of audio media access is now complemented by the availability of video media access in public preview. Developers can now access the full raw media stream for incoming and outgoing audio and video media content during a call. The video media access API provides…
-
How to Enable Azure Virtual Machine Encryption
by Guest rtripurani- 0 replies
- 0 views
This article is brought to you by the Nonprofit Tech Acceleration (NTA) for Black and African American Communities Program Technical Team. For information on how to take advantage of the granted offerings or free technical consultation, please visit: Supporting Black Community Nonprofits | Microsoft Nonprofits In this article you'll use the Azure portal to create a key vault for the storage of encryption keys and encrypt an existing virtual machine (VM). To create a new virtual machine, you can refer to my last blog How to Create Azure VM (Virtual Machine). Once you create an Azure VM (Virtual Machine), you can follow the below steps to use the encryption option…
-
Deploy confidently with simulation mode for retention label policies
by Guest EricaToelle- 0 replies
- 0 views
One of the key benefits of Microsoft Purview is the ability to classify and govern data in Microsoft 365 automatically. One way we can do this is by auto-applying retention labels in Microsoft Purview Data Lifecycle and Records Management. Auto-applying retention labels is powerful because: You don't need to train your users or rely on them to classify data manually. The lifecycle of your data, including retention and deletion, is automatically governed without manual work from admins. It helps you to comply with data regulations and company policies efficiently and at scale. You can automatically classify and manage data in Data Lifecycle and Records Ma…
-
Common questions on Microsoft Purview Data Loss Prevention for endpoints
by Guest ErikaAcon- 0 replies
- 0 views
This guide covers the top-of-mind FAQs on Microsoft Purview Data Loss Prevention for endpoints (referred to as Endpoint DLP in this post). We have collaborated with engineers, designers, and Endpoint DLP experts to increase your confidence in the Endpoint DLP capabilities, and to help you learn more about your setup. We hope you enjoy these guidelines to troubleshoot your most common issues with deployment, if any! Licensing and supported platforms What are the license requirements and supported OS? Endpoint DLP is supported on Windows 10 1809 or higher and Windows 11 and the three latest released versions of MacOS. Endpoint DLP is included with the fo…
-
Learn how to investigate Microsoft Purview Data Loss Prevention alerts in Microsoft 365 Defender
by Guest Shekhar_Palta- 0 replies
- 0 views
This is step-by-step guided walkthrough of the Microsoft 365 Defender Analyst experience for Microsoft Purview Data Loss Prevention (DLP) incident management. This is the Microsoft-recommended experience for investigation and remediation of Data Loss Prevention incidents. Prerequisites Licensing Requirements To investigate Microsoft Purview DLP incidents in the Microsoft 365 Defender portal, you need a license from one of the following subscriptions mentioned here: Microsoft Office 365 E5/A5 Microsoft 365 E5/A5 Microsoft 365 E5/A5 Compliance Microsoft 365 E5/A5 Security Microsoft 365 E5/A5 Information Protection and Governance [*]Note: When you are licens…
-
Uncover hidden risks and accelerate time to action with new features in Insider Risk Management
by Guest Erin_Miyake- 0 replies
- 0 views
Over the past few years, hybrid workspaces with information workers collaborating across various environments have become more common than ever. And with this comes the likelihood of data security incidents – such as data exposure, leak, or theft – that can happen anytime, anywhere. According to recent research, 20% of data breaches are due to internal actors*, and costs businesses an average of $7.5 million annually**. Because not all the potential insider risks become incidents or breaches, quickly identifying the most critical insider risks and prioritizing resources to investigate and mitigate them is crucial to reducing impact from incidents. We are excited…
-
Public preview of new trainable classifiers and general availability of 23 trainable classifiers
by Guest Anna_Chiang- 0 replies
- 0 views
Today, organizations across various industries are generating massive amounts of data, and its volume grows exponentially every year. According to Statista, by 2025 the volume of data/information created, captured, copied, and consumed will reach 191 zettabytes, a 186% increase from 91 zettabytes in 2022. Leveraging machine learning-enabled out-of-the-box trainable classifiers can greatly improve the speed, accuracy, and coverage in identifying sensitive data at enterprise scale. At Microsoft, our goal is to provide a built-in, intelligent, unified, and extensible solution to protect sensitive data across your entire digital estate including multi-cloud (hybrid, Mi…
-
SQL Server on Azure VMs - the best price-performance gets even better!
by Guest Pam Lahoud- 0 replies
- 0 views
I know it’s February, but it’s our first blog post of the year and we’re still feeling festive so Happy New Year from the SQL Server on Azure VM team!!! As we reflect on the past year and look toward what’s to come in 2023, we thought it would be a great time to call attention to all the innovations in the price-performance area for SQL Server on Azure Virtual Machines that came out this past year, and to announce we are starting the new year with a bang in the form of an all-new price-performance study from GigaOm! We’ve hit several milestones in our price-performance journey over the past year or so: If you want to look back on any of the past announcement…
-
Stay ahead of the data protection curve with new enhancements to Compliance Manager
by Guest Daniel_Hidalgo- 0 replies
- 0 views
The regulatory landscape is constantly changing, and organizations are often challenged to meet the requirements of a multitude of standards and frameworks. Keeping up with often overlapping requirements creates a significant burden for most organizations. Additionally, a substantial increase in hybrid work models means an organization’s data now lives outside of the traditional boundaries, making it harder to mitigate risks. Organizations face the difficult task of maintaining their own house in order while trying to meet an ever-changing list of compliance requirements. According to a 2022 KPMG study, over 60% of respondents stated they experienced increasing losses fro…
-
Enable Adaptive Protection with Microsoft Purview
by Guest TalhahMir- 0 replies
- 0 views
Data security risk is dynamic in today's modern workplace with various constantly changing factors, including types of content, people who interact with data, and the activities around the data*, all of which make it more complex to manage. As 83% of organizations have had more than one data breach, the recurrence of data security incidents is rising and has become a critical vulnerability that organizations must prioritize. Meanwhile, a recent Microsoft study shows that 2 in 5 security leaders feel at extreme risk due to cybersecurity staff shortage**. Often, attempting to find the sweet spot between data protection and productivity takes much of the security team's…
-
Effectively protect sensitive data in cloud and devices using Microsoft Purview Data Loss Prevention
by Guest Shilpa_Bothra- 0 replies
- 0 views
Today, working together means working in the cloud where many employees are empowered to collaborate across time zones, devices, platforms, and networks without having to step outside their homes. This flexibility generates more messaging, file sharing, and document uploading and downloading across the digital estate — making it imperative for organizations to adapt their data protection strategies withe the changing landscape. Organizations today face multiple challenges with traditional DLP solutions as these solutions were adapted to support digital transformation rather than being cloud first, where a majority of the work happens today. A recent research [1] found tha…
-
Security and Compliance Easter Eggs in Microsoft's NEW Teams Premium
by Guest shawnrosco- 0 replies
- 0 views
Back in October, Microsoft introduced Microsoft Teams Premium (Premium) during Ignite, later announced Premium preview as a limited trial for commercial customers in December, and now generally available February 1. These updates likely went under the radar for many security and compliance professionals, as the solution's safeguards are buried within the valuable efficiency and collaboration enhancements. Admittedly there are some interesting meeting and webinar branding features, and I'm personally excited about the new note taking functionality (powered by OpenAI's ChatGPT) to generate tasks and flag moments in the recording where you're mentioned. However, the purpose …
-
Guidance for investigating Microsoft Purview Data Loss Prevention incidents
by Guest Shekhar_Palta- 0 replies
- 0 views
Organizations across the world want to efficiently investigate and remediate data loss prevention incidents across all locations in their digital estate. This blog provides guidance for choosing the best investigation experience suited for your organization when using Microsoft Purview Data Loss Prevention. Recommended guidance Microsoft Purview Data Loss Prevention (DLP) team recommends using the Microsoft 365 Defender experience for DLP alert investigations. You can learn more here: Investigate data loss incidents with Microsoft 365 Defender | Microsoft Docs If you are currently using the Microsoft Purview compliance portal for DLP investigations, we recomme…
-
ConfigMgr Collection Evaluation Analysis The Easy Way
by Guest jonasoh- 0 replies
- 0 views
Hi, Jonas here! Or as we say in the north of Germany: "Moin Moin!" I’m a Microsoft Senior Cloud Solution Architect – Engineering (or short Sr. CSA-E) and in this article I want to talk about ConfigMgr Collection Evaluation. About a year ago multiple customers asked me to analyze their collection evaluation process. Mostly to see if there is anything we could optimize and to speed up the evaluation process overall. In the past I used CEViewer, some SQL queries and the total evaluation time as my tools to analyze the process. But since CEViewer was and is no longer supported, I was looking for a different approach. While the individual evaluation times an…
-
Protect your storage resources against blob-hunting
by Guest danielavillarreal- 0 replies
- 0 views
How to detect, investigate and prevent blob-hunting Why is it important to understand blob-hunting? 1. Exfiltrating sensitive information from misconfigured resources is one of the top 3 cloud storage services* threats, and threat actors are continuously hunting storage objects because it’s easy, cheap, and there’s much to find. In some cases, they target your storage accounts. 2. Most people think they don’t have misconfigured storage resources. Most people do. Misconfiguration by end-users is a common problem; if you are safe today, there might still be a mistake tomorrow. 3. There are quick and effective ways to harden your s…
-
-
- FPCH Admin
- 0 replies
- 163 views
Microsoft 365 Defender Monthly news February 2023 Edition [attachment=31752:name] This is our monthly "What's new" blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from January 2023. NEW: At the end we now include a list of the latest threat analytics reports, as well as other Microsoft security blogs for you. Legend: [attachment=31753:name] Product videos [attachment=31754:name] Webcast (recordings) [attachment=31755:name] Docs on Microsoft [attachment=31756:name] Blogs on Microsoft [attachment=…
Last reply by AWS, -