Microsoft Support & Discussions
Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product discussions and help.
85810 topics in this forum
-
Before we start, please note that if you want to see a table of contents for all the sections of this blog, you can locate them at the following URL: Microsoft Purview and Modern Work (Part 1) - Overview Disclaimer This document is not meant to replace any official documentation, including those found at docs.microsoft.com. Those documents are continually updated and maintained by Microsoft Corporation. If there is a discrepancy between this document and what you find in the Compliance User Interface (UI) or inside of a reference in docs.microsoft.com, you should always defer to that official documentation and contact your Microsoft Account team as ne…
-
Before we start, please note that if you want to see a table of contents for all the sections of this blog, you can locate them at the following URL: Microsoft Purview and Modern Work (Part 1) - Overview Disclaimer This document is not meant to replace any official documentation, including those found at docs.microsoft.com. Those documents are continually updated and maintained by Microsoft Corporation. If there is a discrepancy between this document and what you find in the Compliance User Interface (UI) or inside of a reference in docs.microsoft.com, you should always defer to that official documentation and contact your Microsoft Account team as ne…
-
Before we start, please note that if you want to see a table of contents for all the sections of this blog, you can locate them at the following URL: Microsoft Purview and Modern Work (Part 1) - Overview Disclaimer This document is not meant to replace any official documentation, including those found at docs.microsoft.com. Those documents are continually updated and maintained by Microsoft Corporation. If there is a discrepancy between this document and what you find in the Compliance User Interface (UI) or inside of a reference in docs.microsoft.com, you should always defer to that official documentation and contact your Microsoft Account team as ne…
-
Before we start, please note that if you want to see a table of contents for all the sections of this blog, you can locate them at the following URL: Microsoft Purview and Modern Work (Part 1) - Overview Disclaimer This document is not meant to replace any official documentation, including those found at docs.microsoft.com. Those documents are continually updated and maintained by Microsoft Corporation. If there is a discrepancy between this document and what you find in the Compliance User Interface (UI) or inside of a reference in docs.microsoft.com, you should always defer to that official documentation and contact your Microsoft Account team as needed…
-
Before we start, please note that if you want to see a table of contents for all the sections of this blog, you can locate them at the following URL: Microsoft Purview and Modern Work (Part 1) - Overview Disclaimer This document is not meant to replace any official documentation, including those found at docs.microsoft.com. Those documents are continually updated and maintained by Microsoft Corporation. If there is a discrepancy between this document and what you find in the Compliance User Interface (UI) or inside of a reference in docs.microsoft.com, you should always defer to that official documentation and contact your Microsoft Account team as needed…
-
Before we start, please note that if you want to see a table of contents for all the sections of this blog, you can locate them at the following URL: Microsoft Purview and Modern Work (Part 1) - Overview Disclaimer This document is not meant to replace any official documentation, including those found at docs.microsoft.com. Those documents are continually updated and maintained by Microsoft Corporation. If there is a discrepancy between this document and what you find in the Compliance User Interface (UI) or inside of a reference in docs.microsoft.com, you should always defer to that official documentation and contact your Microsoft Account team as ne…
-
Join us as Microsoft Teams Engineering reviews the Microsoft Company Communicator and Teams Emergency Options Center (TECO) apps. Microsoft Company Communicator app enables corporate teams to create and send messages intended for multiple teams or large number of employees over chat allowing organization to reach employees right where they collaborate. Utilize this template for multiple scenarios such as new initiative announcements, employee onboarding, modern learning, and development or organization-wide broadcasts. The app provides an easy interface for designated users to create, preview, collaborate, and send messages. Facilitate accelerated deployment of …
-
Microsoft365 is the default productivity service for enterprises. These applications (Word, Excel, PowerPoint, etc) and services (Exchange, SharePoint, Teams, etc) contain one of the world’s largest databases about how work gets done. More importantly, this data reflects the changing nature of work and the hybrid transformation. Join this session to learn how you can readily access your own organization’s data to inform a wide variety of analytical scenarios, from Security and Compliance to Supply Chain and Customer Relationships. Session includes overviews, examples from current customers, available solution accelerators and demo. Target Audience: IT Professionals…
-
Microsoft partners like Dig Security, Qumulo, and Zabbix deliver transact-capable offers, which allow you to purchase directly from Azure Marketplace. Learn about these offers below: [attachment=27839:name] Multi-cloud Data Security Platform: Dig Security's agentless platform quickly discovers, classifies, and protects your sensitive data, including structured and unstructured data assets, to provide full data security posture management (DPSM) capabilities. [attachment=27840:name] Qumulo on Azure: Qumulo's high-performance file system scales to billions of files in a single namespace, allowing you to replicate or shift file-hungry workloads to Azure wi…
-
Pre-requisite: Before diving in, please read through Creating FHIR Objects Using Power Apps and FHIRPower a Custom Connector. This previous blog article highlights a low code version of the concepts we will address in the following article. Another key component of FastPass is Microsoft's Text Analytics for Health cognitive service. David on the HLS Emerging Opportunities Team has written a fantastic article delving into the Text Analytics for Health Use Cases. Beyond that there will be an emphasis on Azure Functions, Azure Static Web Apps, DOTNET version 7, and Azure API for FHIR. Why: We built this project over two different phases, e…
-
Disclaimer This document is not meant to replace any official documentation, including those found at docs.microsoft.com. Those documents are continually updated and maintained by Microsoft Corporation. If there is a discrepancy between this document and what you find in the Compliance User Interface (UI) or inside of a reference in docs.microsoft.com, you should always defer to that official documentation and contact your Microsoft Account team as needed. Links to the docs.microsoft.com data will be referenced both in the document steps as well as in the appendix. All the following steps should be done with test data, and where possible, testing should be perf…
-
Many customers work in environments with security and compliance concerns requiring authenticators to use cryptography validated by the Federal Information Processing Standards (FIPS) 140 (reference NIST SP 800-63B). We're excited that Microsoft Authenticator on iOS is now FIPS 140 compliant (Android coming soon). Authenticator version 6.6.8 and higher on iOS is FIPS 140 compliant for all Azure Active Directory (Azure AD) authentications using push multifactor authentications (MFA), Passwordless Phone Sign-In (PSI), and time-based one-time passcodes (TOTP). FIPS 140 compliance for Authenticator also helps federal agencies meet the requirements of Executive Orde…
-
The existence of a variety of products catering to different needs across a customer's digital estate pose a unique challenge for Security Operations' coverage in not only protecting the environment but detecting and responding to threats as well. Now, with more than 250 out-of-the-box (OOTB) solutions (integrations and packaged content), an additional 240+ standalone OOTB content items, totaling the overall content inventory to 2500+ content items that SOC teams can use immediately, Microsoft Sentinel Content Hub makes the onboarding journey and increasing coverage for Security Operations more efficient. With packaged solutions and standalone content in Content Hub, cust…
-
This post presents a shared effort which includes @SebastianMolendijk , @Ely_Abramovitch, @Lior Tamir. Case Management is an important activity for any SOC team. Seamless integration of SIEM and ITSM applications enables easier case management. We are announcing public preview of our new integration between Microsoft Sentinel and ServiceNow, which provides bi-directional sync between both products. This integration available as a Microsoft Sentinel solution for ServiceNow in content hub enables analysts and SOC managers to utilize both tools as part of their incident handling workflows while maintaining bi-directional sync between the products. Microsoft Senti…
-
The Copy Data activity in Azure Data Factory/Synapse Analytics allows data to be moved from a source table to sink destination in parallel, allowing for better performance versus single threaded operations. Non-file source connectors such as Azure SQL DB, SQL Server, Oracle and others have an option to pull data in parallel by source data partition, potentially improving performance by extracting your source data with a thread for each source table partition. The Copy Data activity can take advantage of partitions built into your source table. Partitions can also be defined on the fly with Dynamic Partition Ranges. In this blog post, I will illustrate how t…
-
Through volatile markets, economic uncertainty, and supply chain disruption, companies in a wide variety of industries are learning to adapt quickly, innovate sustainably, and speak to customers in more engaging and personalized ways. Organizations that aren’t actively working to modernize their data management, automation, and security processes are at risk of falling behind with 95% of the top 100 largest enterprise software companies reporting the integration of "smart" tech into their products in 2020. But it can be challenging to know where to start. As a resource for individuals and organizations looking to solve complex business issues, Microsoft Assessments…
-
Firstly, I would like to thank Benjamin Kovacevic for his help with this article. In this blog post, I will try to simplify one of the confusions and a popular question seen by many organizations around the ability to use private links together with Microsoft Sentinel. Starting with basics: Microsoft Sentinel Microsoft Sentinel is a cloud-native SIEM solution that is built on top of the log analytics workspace and hence, Microsoft Sentinel requires data to be ingested into that same log analytics workspace for its operation. Log analytics workspace Log analytics workspace is a native Azure monitoring resource that is part of Azure monito…
-
The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. Long-term security expert, Lauren Podber, who recently joined Microsoft, sat down with us to share her views on how she has used threat intelligence throughout her career and offer perspectives on some current threats. Brooke: How do you operationalize threat intelligence? Lauren: Threat intelligence is a way to bound uncertainty. At a high level, the first thing to do is to identify and prioritize customers. These might be internal, such as your internal detection engineering or risk teams or an executive, or external cust…
-
The connections established to Azure SQL Database from applications or client tools may be unexpectedly terminated and impact user environments due to internal (System) maintenance work, client networking, application-related or other health-related issues. In this episode with Anna Hoffman and Subbu Kandhaswamy, we will cover recommended steps to identify connection failures to your database and best practices to handle these failures using resources & tools available for Azure SQL Database. Resources: Troubleshoot common errors Resource health Connectivity Architecture Azure SQL Connectivity Checker tool Continue reading...
-
The 5G User Plane Function (UPF) is a fundamental component of the 3GPP’s New Radio (NR) mobile core infrastructure system architecture. The UPF represents the data plane evolution of a Control and User Plane Separation (CUPS) strategy, first introduced as an extension to existing 4G/LTE Evolved Packet Cores (EPCs) by the 3GPP in their Release 14 specifications. CUPS decouples Packet Gateway (PGW) control and user plane functions, enabling the data forwarding component (PGW-U) to be decentralized. This allows packet processing and traffic aggregation to be performed closer to the network edge, increasing bandwidth efficiencies while reducing network. The PGW’s handling si…
-
The connections established to Azure SQL Database from applications or client tools may be unexpectedly terminated and impact user environments due to internal (System) maintenance work, client networking, application-related or other health-related issues. In this episode with Anna Hoffman and Subbu Kandhaswamy, we will cover recommended steps to identify connection failures to your database and best practices to handle these failures using resources & tools available for Azure SQL Database. Resources: Troubleshoot common errors Resource health Connectivity Architecture Azure SQL Connectivity Checker tool View/share our latest episo…
-
Personal Data Encryption (PDE) is a security feature introduced in Windows 11 22H2. PDE provides an easy to manage, simple to use, user authenticated data encryption mechanism. PDE relies on Windows Hello for Business for user authentication, this eliminates the need for IT Admins to manage another set of login credentials for encryption, thereby reducing the overall burden for Enterprise IT admins. PDE utilizes Windows Hello for Business to link data encryption keys with user credentials. PDE, although an encryption solution, is an independent solution from Bitlocker. Bitlocker provides full volume encryption and Bitlocker protected data is available when the devi…
-
In this episode of the Azure Enablement Show, David Blank-Edelman talks to our Armchair Architects, Uli Homann and Eric Charran about what architects think about different platforms: What are the different kinds of platforms? When should you build one? What factors should be considered when designing them? What business problems can they solve? What do we mean when we say platforms? We get a lot of questions about platforms. We’ll start off our conversation with a level set about what we mean when we talk about building a platform. A platform is a collection of technical capabilities that organizations have, which are intended to solve line-…
-
Table of Contents Abstract Introduction Supported SAP HANA deployment scenarios Example deployments Azure NetApp Files application volume group, introduction, and overview Demo part 1: Volume provisioning HANA single host system on Azure NetApp Files Demo part 2: Volume provisioning HANA multiple host system on Azure NetApp Files Demo part 3: Volume provisioning HANA system replication on Azure NetApp Files Summary Additional Information Abstract This article describes the value and use cases for Azure NetApp Files (ANF) volume provisioning using Azure NetApp Files application volume group (AVG) for SAP HANA. The article…
-
Author(s): Giuliano Rapoz and Arshad Ali are Program Managers in Azure Synapse Customer Success Engineering (CSE) team. Introduction As a data engineer, we often hear terms like Data Lake, Delta Lake, and Data Lakehouse, which might be confusing at times. In this blog we’ll demystify these terms and talk about the differences of each of the technologies and concepts, along with scenarios of usage for each. Data Lake A Data Lake is storage layer or centralized repository for all structured and unstructured data at any scale. In Synapse, a default or primary data lake is provisioned when you create a Synapse workspace. Additionally, you can mount s…