Microsoft Support & Discussions
Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product discussions and help.
85810 topics in this forum
-
We are excited to announce the release of the new Microsoft Security Response Center (MSRC) blog site. Please visit msrc.microsoft.com/blog/ starting February 9th, 2023, for all past and future MSRC blog content. In addition to the new URL, we have refreshed the site with a new look and improved site performance, search, categories, and tags to help users easily find content.
-
- 0 replies
- 8 views
-
-
Join us in February 2023 for the next "What's New in Microsoft EDU" webinar! These 30 minute webinars are put on by the Microsoft Education Product Management group and happen once per month, at both 8:00am Pacific Time and 4:00pm Pacific time to cover as many global time zones as possible around the world. And don’t worry – we’ll be recording these and posting on our Microsoft Education YouTube channel in the new “ , so you’ll always to able to watch later or share with others! Here is our February 2023 webinar agenda: Reimagine Education recap What’s new in Microsoft Teams for EDU What’s new in M365 EDU AMA - Ask Microsoft EDU Anything (Q&A) How…
-
We are excited to announce the latest version of the Azure Immersion Workshop - Modernize Java Apps. The enhanced version provides a comprehensive overview of Azure destinations for Java applications and a hands-on experience with Azure Spring Apps Enterprise, a fully managed service for Spring Boot apps. In this workshop you will: Discover the range of hosting options for Java applications on Azure, with support for popular application servers and frameworks like Red Hat JBoss EAP, Oracle WebLogic, IBM WebSphere, Java SE, Tomcat, and Spring. Design solutions that incorporate DevOps tooling and CI/CD, secrets management, virtual networks, authentication and authori…
-
Azure Cost Management Microsoft Cost Management is a suite of tools that help you manage, monitor, allocate, and optimize the cost of your Microsoft Cloud Azure for Student Subscription. A few examples of what you can do in Cost Management and Billing include: Report on and analyze costs in the Azure portal. Monitor costs proactively with budget, anomaly, and scheduled alerts. Plan with cost in mind Before you deploy cloud resources, assess the following items: The Azure offer that best meets your needs The resources you plan to use How much they might cost Azure provides tools to assist you in the assessment process. The tools can gi…
-
Yesterday, we got a new service request where our customer faced the following error message: Cannot open Failover Group 'xyz.database.windows.net' requested by the login. The login failed with the additional information: Error Number: 40971 - Severity: 20 State: 1 This error happens when you specify a database in the connection string that is not part of the failover group (primary or secondary replica) when Azure SQL receives the request needs to resolve internally and it is not able to find the database and you got this login failed. In this situation, please, check the name of the database that you specified in the connectionstring or, for example, the…
-
Azure Static Web Apps provides 2 mechanisms for authentication: built-in authentication and custom authentication. It enables the authentication by simply defining the routing rules and the roles in the configuration file staticwebapp.config.json. In this blog, we are going to introduce how to enable built-in authentication for Azure Static Web Apps with Azure Active Directory step by step. Pre-requires 1. Create a Static Web App from the Azure Portal 2. Check workflow file for the app_location setting. The default path of app_location in the workflow file should be defined as "/". 3. Manually create the configuration file staticwebapp.config.…
-
We’re excited to welcome more than 400 members of the security research community from around the world to Redmond, Washington for BlueHat 2023. Hosted by the Microsoft Security Response Center (MSRC), BlueHat is where the security research community, and Microsoft security professionals, come together as peers to connect, share, learn, and exchange ideas in the … BlueHat 2023: Connecting the security research community with Microsoft Read More » Continue reading...
-
Recently I worked with a customer on building a canvas Power App embedded in Microsoft Teams. The application acts as a catalogue and one of the requested features was enabling users to share an item from the catalogue to another user in Teams, with a deep link to open the application directly on the selected item. The scenario seemed quite straight forward at first, but I had to do a few research to implement it, especially for the first task, which is sharing the link over Teams. As such, I've decided to document my findings in this blog post. Let's start! Sharing a link to Teams from a Power App Out of the box, searching on the Internet I couldn't fi…
-
Adjust the strength of your data protection automatically based on the calculated data security risk levels of users. Stringent controls are applied to high risk users, while low risk users continue to work productively with the right controls in place — all done automatically. Alleviate your security team’s burden from manually fine tuning policies. Elevate your existing Data Loss Prevention controls for content. Talhah Mir, Principal PM for Insider Risk Solutions, shares how to use Adaptive Protection to address the most critical risks, while saving time. Balance data security and productivity with the Adaptive Protection capability in Microsoft Purview. …
-
Welcome back to the Azure Enablement Show with the Armchair Architects. So, do you know who Melvin Conway is? If you don't, you should. He came up with something called Conway’s Law, which talks about how the organizational structure could impact the things you build. So, the question that we're going to try to answer today is, can architecture prevent you from shipping your org chart? One thing you may not know about this series is once upon a time, we wanted to call it “Arguing Architects” because we thought there'd be all these cool arguments that we would get into. It turns out that we have done some arguing, but it hasn't been all that. The good news for you i…
-
Table of Contents Abstract Introduction Scenario Installing Artifactory Protecting Artifactory with Astra Control Service Execution hooks for PostgreSQL database Protecting the application Simulating disaster and recover the application to another cluster in a different region Summary Additional information Abstract We describe how to protect a multi-tier application with multiple components (like JFrog Artifactory) on Azure Kubernetes Service against disasters like the complete loss of a region with NetApp® Astra™ Control Service and Azure NetApp Files. We demonstrate how the use of pre- and post-snapshot execution hooks i…
-
I just completed work on the digital transformation, design, development, and delivery of a cloud native data solution for one of the biggest professional sports organizations in north America. In this post, I want to share some thoughts on the selected architecture and why we settled on it. This Architecture was chosen to meet the following requirements gathered through a very involved and collaborative process with the customer: It should be open and flexible. Allowing for the ability to build and deliver solutions using the best services and cloud native products available. The architecture should enable secure integration between products/tools/…
-
How to detect, investigate and prevent blob-hunting Why is it important to understand blob-hunting? 1. Exfiltrating sensitive information from misconfigured resources is one of the top 3 cloud storage services* threats, and threat actors are continuously hunting storage objects because it’s easy, cheap, and there’s much to find. In some cases, they target your storage accounts. 2. Most people think they don’t have misconfigured storage resources. Most people do. Misconfiguration by end-users is a common problem; if you are safe today, there might still be a mistake tomorrow. 3. There are quick and effective ways to harden your s…
-
Issue: ARM (Azure Resource Manager) API does not support specific T-SQL resource naming formats and that's why when Databases are created using T-SQL/SSMS, unsupported characters could get allowed into the names. Azure Portal UI does not have this issue, because when you use Portal UI for creating a Database, the creation goes through ARM, and hence when unsupported characters are entered in the Name field, it immediately throws error, as shown in the below image. Therefore, this issue of allowing unsupported characters in the DB name is present in one specific create scenario: i.e., when customer creates database using SSMS/T-SQL command. As this create does n…
-
How Microsoft keeps its Microsoft Azure costs down as the company’s ‘customer zero’ Microsoft kept its Microsoft Azure costs flat while its workload footprint grew by 20 percent. Here at Microsoft, we’re a customer of Microsoft Azure, and just like our external customers, we’re trying to keep our cloud costs down. “When I talk to customers, they're always a little bit surprised to hear that we pay the same rates for Azure that they do,” says Heather Pfluger, the general manager of Infrastructure and Engineering Services in Microsoft Digital Employee Experience, Microsoft’s internal IT organization. “We operate with the same licensing, the same pric…
-
Protect sensitive data everywhere you create, view, and access information with one Data Loss Prevention policy in Microsoft Purview. From email, SharePoint and OneDrive accounts, to Microsoft 365 apps including Microsoft Teams, files managed on device endpoints for both Windows and macOS, as well as non-Microsoft cloud apps and services, and file share servers running on-premises or in the cloud. One policy protects data across all these locations and services. Cloud-native protection is built into apps, services, and devices, eliminating the need to add solutions, deploy agents, or configure policies in multiple locations. Shilpa Bothra, Product Ma…
-
**We want to hear from you! If you have tested Microsoft Defender for DevOps, please fill out this survey to provide feedback on the Pull Request Annotations feature.** Written by: Lara Goldstein, Safeena Begum Lepakshi, Charles Oxyer Introduction: It is no secret that security and development teams operate in silos. Security administrators often struggle with getting developers to remediate vulnerabilities in code because they are not able to provide remediation guidance and feedback directly within the tools are most familiar with (e.g., GitHub and Azure DevOps). Additionally, for developers that embrace the practice of DevOps, they are used to movi…
-
The Microsoft Intelligent Security Association (MISA) is an ecosystem of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats. Learn more about an offer from MISA partner 42Crunch in the Azure Marketplace: [attachment=31869:name] 42Crunch Developer-First API Security Platform: Enjoy of a shared view of API security and enable a collaborative DevSecOps approach with 42Crunch Developer-First API Security Platform. It implements security as code, automates manual tasks, and eliminates false positives while scaling API delivery. Continue reading...
-
No último trimestre realizei algumas análises de performance em Web API'S desenvolvidas utilizando o ASP.NET Core, e a maioria estava com o mesmo problema: O uso incorreto dos objetos de tipo HttpClient. Percebi então que havia um padrão problemático na sua utilização. Portanto resolvi escrever este artigo, com o intuito de ajudar os desenvolvedores a utilizarem corretamente esse tipo de objeto. O problema Realizar chamadas HTTP é uma tarefa simples, você só precisa criar instanciar de um objeto do tipo HttpClient, configurar algumas propriedades e pronto, você está apto a realizar sua chamada HTTP. A classe HttpClient implementa a interface IDisposable, o…
-
Over the past few months, we’ve been working hard to expand and improve the features and usability of the Azure Communication Services calling tools. This blog provides a quick summary of the key calling features released recently. We will focus on: Raw media access Additional browser support for JS Calling SDK Call readiness tools, and Simulcast Raw Media Access Public preview of audio media access is now complemented by the availability of video media access in public preview. Developers can now access the full raw media stream for incoming and outgoing audio and video media content during a call. The video media access API provides…
-
This article is brought to you by the Nonprofit Tech Acceleration (NTA) for Black and African American Communities Program Technical Team. For information on how to take advantage of the granted offerings or free technical consultation, please visit: Supporting Black Community Nonprofits | Microsoft Nonprofits In this article you'll use the Azure portal to create a key vault for the storage of encryption keys and encrypt an existing virtual machine (VM). To create a new virtual machine, you can refer to my last blog How to Create Azure VM (Virtual Machine). Once you create an Azure VM (Virtual Machine), you can follow the below steps to use the encryption option…
-
One of the key benefits of Microsoft Purview is the ability to classify and govern data in Microsoft 365 automatically. One way we can do this is by auto-applying retention labels in Microsoft Purview Data Lifecycle and Records Management. Auto-applying retention labels is powerful because: You don't need to train your users or rely on them to classify data manually. The lifecycle of your data, including retention and deletion, is automatically governed without manual work from admins. It helps you to comply with data regulations and company policies efficiently and at scale. You can automatically classify and manage data in Data Lifecycle and Records Ma…
-
This guide covers the top-of-mind FAQs on Microsoft Purview Data Loss Prevention for endpoints (referred to as Endpoint DLP in this post). We have collaborated with engineers, designers, and Endpoint DLP experts to increase your confidence in the Endpoint DLP capabilities, and to help you learn more about your setup. We hope you enjoy these guidelines to troubleshoot your most common issues with deployment, if any! Licensing and supported platforms What are the license requirements and supported OS? Endpoint DLP is supported on Windows 10 1809 or higher and Windows 11 and the three latest released versions of MacOS. Endpoint DLP is included with the fo…
-
This is step-by-step guided walkthrough of the Microsoft 365 Defender Analyst experience for Microsoft Purview Data Loss Prevention (DLP) incident management. This is the Microsoft-recommended experience for investigation and remediation of Data Loss Prevention incidents. Prerequisites Licensing Requirements To investigate Microsoft Purview DLP incidents in the Microsoft 365 Defender portal, you need a license from one of the following subscriptions mentioned here: Microsoft Office 365 E5/A5 Microsoft 365 E5/A5 Microsoft 365 E5/A5 Compliance Microsoft 365 E5/A5 Security Microsoft 365 E5/A5 Information Protection and Governance [*]Note: When you are licens…
-
Over the past few years, hybrid workspaces with information workers collaborating across various environments have become more common than ever. And with this comes the likelihood of data security incidents – such as data exposure, leak, or theft – that can happen anytime, anywhere. According to recent research, 20% of data breaches are due to internal actors*, and costs businesses an average of $7.5 million annually**. Because not all the potential insider risks become incidents or breaches, quickly identifying the most critical insider risks and prioritizing resources to investigate and mitigate them is crucial to reducing impact from incidents. We are excited…