Microsoft Support & Discussions
Free PC Help Forum microsoft products support and discussions. If you need help with Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product you can post here. If you want to discuss Microsoft and their line of products you can do that here also.
84,928 topics in this forum
-
-
- FPCH Admin
- 0 replies
- 142 views
Microsoft Edge is committed to making your browsing experience convenient and secure. The built-in password manager helps you generate strong passwords, provide password health feedback, and warn you if any of your stored passwords are found in a known online leak. Your passwords are securely stored and can be accessed on all platforms – macOS, Linux, and Windows; iOS and Android using Microsoft Authenticator app; even other browsers using Microsoft Autofill extension. Read more about new password manager capabilities here: New ways to manage your passwords in Microsoft Edge - Microsoft Community Hub Here's how you can import your passwords from third-party passwor…
Last reply by AWS, -
-
The new incident experience is here!
by Guest MichalShechter- 0 replies
- 0 views
Analysts need to understand the full scope of the attack as fast as possible to respond effectively. While triaging, investigating, and responding to a security incident, analysts use many pieces of information, actions, and tools. For the process to be seamless and effective, as many of those should be available within the incident to allow quick and optimal triage, without having to pivot to another blade or to another product (for example, to find the geo-location of an IP address or Azure Active Directory (AAD) information, edit bookmark or add an entity to threat intelligence repository). Today we are happy to announce the public preview of the new incident ex…
-
Stream Data to Your Data Lake Using Azure Data Explorer
by Guest sqlzack- 0 replies
- 0 views
Summary Microsoft Azure Data Explorer is a great resource to ingest and process streaming data. Azure Data Lake Storage is a great resource for storing large amounts of data. The end-to-end conceptual architecture contained in the GitHub Repository accompanying this blog focuses on deploying an environment that plays to the strengths of both of these services by using Azure Synapse Analytics to simulate streaming data to them. In this architecture, the core strength of Azure Data Explorer is performant real-time storage and analytics. The core strength of Azure Data Lake Storage is cost-effective and efficient long-term storage. Target Audience Event…
-
Lesson Learned #289: Hands-On-Labs: Understand and reading an execution plan
by Guest Jose_Manuel_Jurado- 0 replies
- 0 views
We used to have cases where our customers reported a performance problem, in the execution of a query, they need to know how to read it an execution plan. In this video we share with you several details about it. A little bit of theory What Happens when a query is submitted? Query Compilation: Checks: Parser: Check the syntax, resolve the schema and permissions. Algebrizer: Bind objects. Optimizer: Optimize the query. [*]Outcome (Execution Plan). Generates an execution plan (series of instrucctions for processing the query). Example: Lesson Learned #286: Compilation vs Execution time running a TSQL query - Microsoft Community Hub …
-
Announcing public preview: Azure Change Tracking & Inventory using Azure Monitor agent (AMA)
by Guest Swatidevgan- 0 replies
- 0 views
What’s New? The Change Tracking and Inventory service tracks changes to Files, Registry, Software, Services and Daemons and uses the MMA (Microsoft Monitoring Agent)/OMS (Operations Management Suite) agent. This preview supports the new AMA agent and enhances the following: Security/Reliability and Scale - The Azure Monitor Agent enhances security, reliability, and facilitates multi-homing experience to store data. Simplified onboarding- You can onboard to Virtual Machines directly to Change Tracking (add link) without needing to configure an Automation account. In new experience, there is Rules management – Uses Data Collection Rules to configure or customize va…
-
Read only replica corrupted statistics
by Guest Laith_Ayesh- 0 replies
- 0 views
We recently came across an issue where a select query against a read-only replica fails with one of the following errors, when the same query can be executed against the primary replica successfully. Typical error messages reported are: Since the error indicates a corruption, please make sure to double check the integrity of all the pages and structures that make up the table of the corrupted statistics: DBCC CHECKTABLE ('Table_name'); Mitigation There are two workarounds; you can go either of them: Drop the corrupted statistics, this can be done through the following steps: Identify the corrupted statistic(s) on …
-
Do I have to write code to be successful in tech?
by Guest japhletnwamu- 0 replies
- 0 views
Must Everyone Write Codes? I am sure you aren’t the only one with this question. I used to ask this question too. Does everything about tech have to do with programming? The short answer is NO! While many tech jobs do require coding skills, there are also many non-technical roles within the tech industry that do not require coding skills. For example, roles in program management, product management, sales, and marketing may not require coding skills, although a basic understanding of technology can be useful. Learn Tech without coding Guess what? Some years back, I discovered that I could build solutions without writing code using low code de…
-
Seeking Out Dead and Dying Servers
by Guest jtwells- 0 replies
- 0 views
Peruse any social media platform where InfoSec practitioners interact and share their findings, and you will likely find a mention of the latest and greatest 0-day exploit making the rounds. Although 0-days represent the cutting edge of threat activity, aside from a specific error of backdoors in easily identifiable software, these are often the result of misconfigurations, poor defense-in-depth design, or lack of regular patching and updating The most sophisticated 0 days, those that don't require some error or neglect by defenders are rare and need specific conditions and a lot of luck to succeed. There are vast numbers of much more common vulnerabilities most pe…
-
Upcoming January 2023 Microsoft 365 Champion Community Call
by Guest Jessie_Hwang- 0 replies
- 0 views
Happy new year, Champions! Join us for our first community call of 2023 on January 25, at either 8:00 AM or 5:00 PM PT. We will be diving into Teams Premium. If you have not yet joined our Champion community, sign up here to get access to the calendar invites, program assets, and previous call recordings. We look forward to seeing you there! Continue reading...
-
Defender for Servers Security Alerts Improvements
by Guest GalFenig- 0 replies
- 0 views
Effective, modern server protection requires sophisticated endpoint threat detection and response with market-leading threat intelligence. With Microsoft Defender for Servers' completed integration with Microsoft Defender for Endpoint, a named market leader in EDR by Gartner and Forrester, you can deploy Defender for Endpoint to protect your Azure, multicloud, and on-premises servers. Defender for Endpoint protections include advanced post-breach detection sensors, behavioral based and cloud-powered protection, and endpoint detection and response (EDR). As part of Defender for Servers’ security alert quality improvement process, in April 2023, some alerts for Wind…
-
Azure Stack HCI: What's new for Software Defined Networking (SDN) with WAC v2211
by Guest Kyle Bisnett- 0 replies
- 0 views
A warm 2023 “Hello” to our Customers and Partners! Today is an exciting day as we share with each of you the extensive new features and improvements for SDN in Windows Admin Center 2211 (WAC)! We cannot thank you enough for the fantastic feedback and requests to help us as a team drive forward. In case you missed it, Windows Admin Center (WAC) 2211 officially announced General Availability in December. You can download it here today! We hope you all are as excited as us, and we cannot wait to hear how you leverage the new features! Default Network Policies - This long-requested feature is finally available! We are bringing Azure parity to our ex…
-
Lesson Learned #288:Server principal 'XXX' is not able to access the database under current security
by Guest Jose_Manuel_Jurado- 0 replies
- 0 views
Today, we got a service request where our customer got the following error message: The server principal 'XXX' is not able to access the database 'master' under the current security context Our customer is implementing a geo-replication and when they try to connect and following the Configure security for disaster recovery - Azure SQL Database | Microsoft Learn they got this error message. We were able to identify the issue and fix it. The issue is with the login created on secondary SQL server with wrong SID, and after matching SIDs, issue resolved. Following the steps explained in this link Configure security for disaster recovery - Azure SQL Datab…
-
Lesson Learned #287: Contains an unresolved reference to an object due to database collation
by Guest Jose_Manuel_Jurado- 0 replies
- 0 views
Today, we worked on a new service request that our customer got the following error message exporting the database to a BacPac: One or more unsupported elements were found in the schema used as part of a data package. Error SQL71501: Error validating element [dbo].[Example]: View: [dbo].[Example] contains an unresolved reference to an object. Either the object does not exist or the reference is ambiguous because it could refer to any of the following objects: [schema1].[Table1] Following I would like to share the troubleshooting steps done to find out this issue. We've published several articles about this error Lesson Learned #198: Getting the error "has …
-
New Automation Kit, Process Advisor app, & SAP integration in Power Automate
by Guest Zachary Cavanell- 0 replies
- 0 views
Prioritize, analyze, and automate business processes faster and more effectively with updates to Power Automate. Get end-to-end visibility over automation projects that will yield the best financial return for your organization with the Automation Kit. Locate bottlenecks and inefficiencies in existing processes, and take corrective action with the Minit desktop app and process advisor. See how to automate more business processes with deeper SAP integration. Ashvini Sharma, Partner GPM from the Power Automate engineering team, joins Jeremy Chapman to walk through the latest updates. End-to-end visibility of automated projects. Locate…
-
Authentication with Azure Load Testing series : Azure Active Directory
by Guest Sachidanand_Sharma- 0 replies
- 0 views
Authentication is a key step in the user journey of any application. Going about designing the authentication flow can be confusing and not straightforward. When load testing an application, this generally is the first step in the user journey. Supplying client credentials through a UI is not possible when load testing an application, so is evaluating how to implement specific authentication flows available on Azure, as they can be tedious and time consuming as well. Within this series, we will cover the authentication flows and scenarios that are possible with Azure Active Directory (Azure AD) as the identity provider. At the end of the blog, you will be able to …
-
Microsoft 365 Government price updates - into effect March 1st 2023
by Guest Dan Narloch- 0 replies
- 0 views
On August 2021 we announced an update to our pricing for Microsoft 365 (which applies to all commercial customers: Enterprise, US Government, and Business). You can find the full blog from our initial announcement here: New pricing for Microsoft 365 | Microsoft 365 Blog. In the case of Microsoft 365 Government, due to local regulations, the price update was planned in a phased manner. Therefore, on March 1, 2023, the updated prices will be effective for the following suites: Office 365 G1 (+10%), Office 365 G3 (+5%), and Microsoft 365 G3 (+2%) This price update builds on the product innovation we’ve delivered over the past several years to mee…
-
How to implement proactive notifications in Microsoft Teams using Power Automate or Azure Logic App
by Guest Alexis Kinzelin- 0 replies
- 0 views
Proactive notifications, such as sending updates or announcements to specific users or groups via Teams chat, are an important feature for many applications. However, sending messages to a large audience can be a bit more complex compared to sending an email. One solution is to use a Power Automate flow, or Azure Logic App, with the Teams connector "Post a message in chat of channel" to loop through a list of users. However, this approach may hit the connector's throttling limit of 300 calls per 3600 seconds if the audience is too large. To overcome this, here are three options for sending proactive messages from Power Automate or Azure Logic App: Option 1 - Pow…
-
Skype for Business Server TAP is now recruiting new customers
by Guest Rick Varvel- 0 replies
- 0 views
The Skype for Business Server team is looking for new members to join our Technology Adoption Program (TAP). TAP is an established program designed to validate updates to Skype for Business Server by asking customers to test them in their own lab or production environments. Program participants have the opportunity to assess and validate upcoming features and enhancements before they are generally available, and provide feedback directly to the Skype for Business product development team. New feature announcements will be communicated to participants through email and a Teams channel dedicated to Skype for Business 2015/2019 discussion. Program Benefi…
-
Audit Logging and Azure Active Directory in Azure Database for PostgreSQL Flexible servers.
by Guest HamzaAqel- 0 replies
- 0 views
Database audits are one of the important components that need to be set up based on your organization’s compliance requirements, where you can monitor the targeted activities to achieve your security baseline. In Azure database for PostgreSQL flexible server, you can achieve that by using pgaudit PG extension as described in Audit logging in Azure Database for PostgreSQL - Flexible server. One of the challenges is utilizing auditing feature alongside PostgreSQL flexible server Azure Active Directory authentication when you are using Azure AD groups and want to audit the actions of AD groups members. This is because when group members sign in, they use their person…
-
AKS com Windows
by Guest wdossantos- 0 replies
- 0 views
Hoje em dia é muito comum ouvirmos falar de kubernetes, essa tecnologia é uma resposta para a grande adoção de aplicações baseadas em containers com arquiteturas como micro serviço ou Service Oriented Architectures (SOA), no entanto a criação de um cluster de kubernetes não gerenciado dentro da nossa infraestrutura (on-premises) é uma tarefa bem complexa e demanda uma equipe experiente para manter tudo rodando. Assim o AKS (Serviço de Kubernetes do Azure) se torna uma excelente opção para implantação de um cluster de Kubernetes de forma gerenciada na nuvem Azure. Podemos usar o AKS para simplificar a implantação e o gerenciamento de aplicativos nativos de nuvem, arquitetu…
-
Capturing MDE Client Analyzer Results to Azure Log Analytics Workspace
by Guest CurtisRicard- 0 replies
- 0 views
Hello readers! This is an update from Todd Linke and Curtis Ricard, both Cloud Solution Architects, based in the United States. We’re excited to write this post because we (well…mostly Todd) wrote a script that was helpful in debugging Windows Defender onboarding issues for a customer we work with. The script was written because the customer was having difficulty understanding why specific devices failed to onboard, and it was helpful in gathering data from multiple devices so that the customer could identify trends, common failures, etc. and address them at greater scale. The script may be used to capture output results of the Microsoft Defender fo…
-
Security baseline for Microsoft Edge version 109
by Guest Rick_Munck- 0 replies
- 0 views
We are pleased to announce the security review for Microsoft Edge, version 109! We have reviewed the new settings in Microsoft Edge version 109 and determined that there are no additional security settings that require enforcement. The Microsoft Edge version 107 package continues to be our recommended baseline. That baseline package can be downloaded from the Microsoft Security Compliance Toolkit. Microsoft Edge version 109 introduced 7 new computer settings and 7 new user settings. We have included a spreadsheet listing the new settings in the release to make it easier for you to find them. As a friendly reminder, all available settings for Microsoft…
-
Plotly visualizations in Azure Data Explorer
by Guest adieldar- 0 replies
- 0 views
Azure Data Explorer (ADX) supports various types of data visualizations including time, bar and scatter charts, maps, funnels and many more. The chosen visualization can be specified as part of the KQL query using ‘render’ operator, or interactively selected when building ADX dashboards. Today we extend the set of visualizations, supporting advanced interactive visualizations by Plotly graphics library. Plotly supports ~80 chart types including basic charts, scientific, statistical, financial, maps, 3D, animations and more. There are two methods for creating Plotly visuals: Write your own visualization in Python In this method the Python script is run on the e…
-
- 0 replies
- 0 views
Windows Authentication for SQL Managed Instance has been released in August 2022. Windows Authentication for Azure AD principals for SQL Managed Instance is now Generally Available - Microsoft Community Hub One of the two options available to achieve this is “Incoming trust-based authentication flow”. How to set up Windows Authentication for Azure Active Directory with the incoming trust-based flow - Azure SQL Managed Instance | Microsoft Learn When executing Set-AzureAdKerberosServer command to add the Trusted Domain Object, you may get below error message. Set-AzureAdKerberosServer -Domain $domain ` -DomainCredential $domainCred ` -Use…
-
- 0 replies
- 1 view
Summary Microsoft recently fixed a set of Server-Side Request Forgery (SSRF) vulnerabilities in four Azure services (Azure API Management, Azure Functions, Azure Machine Learning, and Azure Digital Twins) reported by Orca Security. These SSRF vulnerabilities were determined to be low risk as they do not allow access to sensitive information or Azure backend services. Once … Microsoft resolves four SSRF vulnerabilities in Azure cloud services Read More » Continue reading...