Microsoft Support & Discussions
Free PC Help Forum microsoft products support and discussions. If you need help with Microsoft Windows, Windows Server software, Microsoft 365, Microsoft Azure or any other Microsoft product you can post here. If you want to discuss Microsoft and their line of products you can do that here also.
84,928 topics in this forum
-
Azure DMS - MySQL Replicate Changes now in preview
by Guest SriniKdata- 0 replies
- 0 views
We're pleased to announce preview of MySQL Server - Replicate Changes in Azure Database Migration Service. With a replicate changes migration, in conjunction with our offline scenario with “Enable Transactional Consistency", businesses can migrate their databases to Azure while the databases continue to be operational. In other words, migrations can be completed with minimum downtime for critical applications, limiting the impact to service level availability and inconvenience to their end customers. How the Replicate Changes scenario works The current implementation is based on streaming binlog changes from the source server and applying them to the targe…
-
Containers Security Mapping Dashboard
by Guest Safeena Begum Lepakshi- 0 replies
- 0 views
Microsoft Defender for Containers merges the capabilities of the two previously offered Microsoft Defender for Cloud plans, Microsoft Defender for Kubernetes and Microsoft Defender for Container registries, and adds a new set of critical features on top of the previously offered ones. Make sure to read this article for more details. Multi-cloud support: AKS and any Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters (through Azure Arc) Kubernetes-native deployment: automatic deployment using DaemonSet Advanced Threat Detection: deterministic, AI, and anomaly-based detection Vulnerability assessment: continuous scan for running images Ma…
-
How to change the user account for Windows Containers
by Guest Vinicius Apolinario- 0 replies
- 0 views
Containers in general are seen as a turnkey solution to run applications. Once the app has been finalized, you expect the container to run the same way regardless of the environment. However, just like any other platform, there are some important aspects that need to change between development and production – especially when it comes to identity and security. By default, Windows containers run with a user account called ContainerAdmintrator which has admin access inside the container instance. If compromised, this container instance will allow an attacker to take control over shared resources – such as, but not limited to, mounted volumes. For that reason, wheneve…
-
Call Microsoft Graph API in Power Automate using custom connector
by Guest Jingyi2419- 0 replies
- 0 views
Credits- Welcome Now that we are well acquainted with power apps and creating a microsoft graph custom connector in it, let us familiarize ourselves with the following terms once so that we can proceed to call Microsoft graph API in Power Automate using custome connectors for which we will require to set the criteria in authentication. Azure API Management Gateway Custom connectors are supported by Microsoft Azure API Management infrastructure. When a connection to the underlying API is created, the API Management gateway stores the API credentials or tokens, depending on the type of authentication used, on a per-connection basis in a token store. This solu…
-
Creating Microsoft Graph custom connector in Power Apps
by Guest Jingyi2419- 0 replies
- 0 views
Credit- Welcome To create a Microsoft Graph custom connector in Power Apps, let us get acquainted with some important terms first. What are Power Apps? Power Apps is a suite of apps, services, connectors, and a data platform, that provides a rapid development environment to build custom apps for business needs. Using Power Apps, one can quickly build custom business apps that connect to data stored either in the underlying data platform (Microsoft Dataverse) or in various online and on-premises data sources (such as SharePoint, Microsoft 365, Dynamics 365, SQL Server). One can create three types of apps using this service: canvas, model-driven, and portal.…
-
Access User Data from Microsoft Graph
by Guest Jingyi2419- 0 replies
- 0 views
In the previous blog post, you have learned about the basics of Power Platform and Microsoft Graph. In this one, we will elaborate more on Graph specifically and provide examples in the field of education regarding how to access user data. After reading this, you will get an idea about how to use Graph to work with users in MS 365 including the required permissions. Objectives and Prerequisites Users are the core of most operations in Microsoft 365. Microsoft Graph enables developers full control over the lifecycle of users in Microsoft 365 including creating, updating, and deleting users and listing users in the organization. Thus, are you interested in...…
-
Power Platform + MS Graph
by Guest Jingyi2419- 0 replies
- 0 views
Through our roles as Microsoft Learn Student Ambassadors, we have actively been part of the Microsoft Learn Student Ambassadors, social impact project, where a group of ambassadors from across the globe work together on a project. Our project team consisted of the following Ambassadors Gayatri Prabhu, Muhammad Qasim, and me, Jingyi Zhu. This blog series introduces the Power platform ecosystem with Microsoft Graph with use cases for people from the field of education. Our goal is to empower readers to build solutions easily and identify undiscovered resources! Blog 1: Introduction to Power Platform and Microsoft Graph Blog 2: Access User Data from Mi…
-
Sysmon v14.0, AccessEnum v1.34, and Coreinfo v3.53
by Guest Alex_Mihaiuc- 0 replies
- 0 views
Sysmon v14.0 This major update to Sysmon, an advanced host monitoring tool, adds a new event type, FileBlockExecutable that prevents processes from creating executable files in specified locations. It also includes several performance improvements and bug fixes. AccessEnum v1.34 AccessEnum, a tool for enumerating file system and registry permissions, now supports paths longer than MAX_PATH characters. Coreinfo v3.53 This update to Coreinfo, a utility that reports system CPU, memory and cache topology and information, now handles NUMA nodes with more than 64 processors. Continue reading...
-
TOTP based MFA for Azure AD is now Generally Available!
by Guest Robin Goldstein- 0 replies
- 0 views
Hello friends, Today I have news to share about another great new feature in Microsoft Entra. Time-based one-time passcode (TOTP) as an MFA option is now generally available for Azure Active Directory (Azure AD)! In this release, we fixed some accessibility issues to provide customers with a reliable and secure MFA option that works for all users and devices. Huge thanks to our customers who rolled this out and gave us feedback during the public preview. Integrating a time-based OTP with an authenticator app as a second factor in B2C scenarios user flows enables a higher level of security compared to existing email and phone factors. In my previous…
-
Mainframe Dataset (Files) Transfer to Azure Storage (Blob) using Mainframe JCL
by Guest Ramanath_Nayak- 0 replies
- 0 views
Introduction This article highlights the steps involved in moving mainframe file data to Azure Blob using Java on Mainframe. Mainframe files are in Extended Binary Coded Decimal Interchange Code (EBCDIC) code page. Making these files readable on Distributed platforms involves transmission of the data out of mainframe and subsequently conversion of data from EBCDIC to American Standard Code for Information Interchange (ASCII) format. Host Integration Server (HIS) can help in the later task of conversion. However, for the first task of transmission of data, you can follow the steps outlined in this blog. Steps Involved High level steps involved in the proc…
-
Microsoft Intelligent Data Platform || real-world demo
by Guest Zachary Cavanell- 0 replies
- 0 views
We're all trying to work faster and smarter to solve today's data-driven challenges. Microsoft's Intelligent Data Platform can help by removing silos around data and providing near real-time insights, augmented with predictive AI and built-in controls that protect your data wherever it goes. Sharieff Mansour, a leader on the Data and AI team at Microsoft, joins Jeremy Chapman for a closer look at how databases, analytics, machine learning, and governance come together in the Intelligent Data Platform. See how you can use these integrated services to build powerful new apps or modernize your current ones. Remove silos between data professionals, d…
-
Updated Synapse Analyzer Report: Workload Management and ability to monitor large data warehouses
by Guest SanjayRaut76- 0 replies
- 0 views
In May 2022 we announced the first version of Synapse Analyzer Report that will help you with table, index, and statistics information and report issues on these topics. With help from Nick Salch, Fretz Nusan, and Synapse CSE team, today we have an update (version 2.0) to the Synapse Analyzer report: The addition of the Workload Management Report page to the existing report A new separate CTAS version of Synapse Analyzer Report for extra-large data warehouses Fixed below error during refresh in Power BI Desktop: "Query 'Query Name’ (step 'Expanded All Tables') references other queries or steps, so it may not directly access a data source. Please rebuild this…
-
Azure Storage - Permanent Delete Soft-Deleted objects
by Guest LuisFilipe- 0 replies
- 0 views
Overview This PowerShell script allow you to permanent delete Soft Deleted objects, by Container, by Tier, with Prefix, and considering Last Modified Date. Azure Storage blob objects is defined as Base Blobs, Blob Snapshots or Blob Versions. Parameters: Specify each value in the script under "Parameters - User defined" section. All values are mandatory and some can be empty, as described below and also in the script. Options available are: $storageAccountName - just run the script and the storage account name will be asked. $containerName - specify some Container Name, or empty (default value) to list all containers $prefix - specify some blob…
-
Azure Storage Blob Count & Capacity usage Calculator
by Guest LuisFilipe- 0 replies
- 0 views
Overview This PowerShell script allow you to count and calculate Azure Storage blob usage for Soft Deleted / non-Soft Deleted objects, by Container, by Tier, with Prefix, and considering Last Modified Date. Azure Storage blob objects is defined as Base Blobs, Blob Snapshots or Blob Versions. Parameters: Specify each value in the script under "Parameters - User defined" section. All values are mandatory and some can be empty, as described below and also in the script. Options available are: $storageAccountName - just run the script and the storage account name will be asked. $containerName - specify some Container Name, or empty (default value) …
-
Azure Migrate now supports large-scale migration of ASP.NET web apps to Azure App Service
by Guest Mayunk Jain- 0 replies
- 0 views
Azure is excited to announce the public preview of another key capability in Azure Migrate: unified, at-scale, agentless migration for ASP.NET web apps to Azure App Service. This scenario is in keeping with our vision of Azure Migrate to simplify and accelerate migration and modernization with best-in-class features for all workloads (virtual machines, databases, and apps) to Azure, and our continued investment in helping simplify migration for customers. Our journey to an end-to-end flow for app modernization In August 2021, we announced support for at-scale discovery and assessment of ASP.NET web apps for migration to Azure App Service. Our customers do n…
-
Network ATC: What's coming in Azure Stack HCI 22H2
by Guest Dan Cuomo- 0 replies
- 0 views
When we first released Network ATC, we greatly simplified the deployment and on-going management of host networking in Azure Stack HCI. Whether it was the simple yet powerful deployment experience, a “that was easy” cluster expansion process, or increased reliability helping to avoid support costs, the feedback was unanimous: Network ATC was a hit! Despite the fanfare, there were several improvements we wanted to make once we saw just how valuable this turned out to be to our customers. Some of these improvements, like Auto-IP Addressing for storage adapters, were obvious opportunities for improvement. Others, like the clustering integrations we added, were…
-
-
- FPCH Admin
- 0 replies
- 222 views
The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM, an actor Microsoft has tracked since 2017. SEABORGIUM is a threat actor that originates from Russia, with objectives and victimology that align closely with Russian state interests. Its campaigns involve persistent phishing and credential theft campaigns leading to intrusions and data theft. SEABORGIUM intrusions have also been linked to hack-and-leak campaigns, where stolen and leaked data is used to shape narratives in targeted countries. While we cannot rule out that supporting elements of the group may have current or prior affiliations with cri…
Last reply by AWS, -
-
- 0 replies
- 209 views
Do you ever try to be more optimistic? What do you do to accomplish a brighter feeling? Do you think a person’s predisposition toward optimism or pessimism is because of genetics, life experience or a combination of both? Can optimism be a bad thing? Do you agree that at times it’s better to “fake it until you make it” regarding optimism? When have you ever used such a strategy, if ever? Did it work?
Last reply by Nebulous, -
- 0 replies
- 1 view
The Microsoft Bug Bounty Programs and partnerships with the global security research community are important parts of Microsoft’s holistic approach to defending customers against security threats. Our bounty programs incentivize security research in high-impact areas to stay ahead of the ever-changing security landscapes, emerging technology, and new threats. Security Researchers help us secure millions of … Microsoft Bug Bounty Programs Year in Review: $13.7M in Rewards Read More » Continue reading...
-
-
- FPCH Admin
- 0 replies
- 1 view
The Microsoft Bug Bounty Programs and partnerships with the global security research community are important parts of Microsoft’s holistic approach to defending customers against security threats. Our bounty programs incentivize security research in high-impact areas to stay ahead of the ever-changing security landscapes, emerging technology, and new threats. Security Researchers help us secure millions of customers by discovering and reporting vulnerabilities to Microsoft through Coordinated Vulnerability Disclosure.
Last reply by Cloaked, -
-
- 0 replies
- 1 view
Sharing information through the Security Update Guide (SUG) is an important part of our ongoing effort to help customers manage security risks and keep systems protected. In January 2022 we introduced Phase One of a new way for customers to receive email notifications about new Microsoft product security content using any email address, not just … Security Update Guide Notification System News: Create your profile now Read More » Continue reading...
-
-
- FPCH Admin
- 0 replies
- 1 view
Sharing information through the Security Update Guide (SUG) is an important part of our ongoing effort to help customers manage security risks and keep systems protected. In January 2022 we introduced Phase One of a new way for customers to receive email notifications about new Microsoft product security content using any email address, not just a Microsoft account, or Live ID as it is sometimes known.
Last reply by Cloaked, -
-
IT security: An opportunity to raise corporate governance scores
by Guest Christine Barrett- 0 replies
- 1 view
What is a corporate governance score? Corporate governance scoring is increasingly important to boards of directors, executive leadership, and the investment community. If we want to enlist the support of a stakeholder, we have to talk about the things that are important to them. Sales revenue is important to sellers. Data breach risk gets the attention of the chief information security officer (CISO). Governance scores often affect executive compensation and the way an analyst rates a company’s stock. They are important to the board. If the IT security team communicates in terms of improving a corporate governance score, it will get their attention. Boards h…
-
- 0 replies
- 1 view
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers through discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s top 100 Most Valuable Researchers (MVRs) based on the total number of points earned for each valid report. Congratulations … Congratulations to the MSRC 2022 Most Valuable Researchers! Read More » Continue reading...
-
Microsoft Office to publish symbols starting August 2022
by Guest msrc- 0 replies
- 1 view
We are excited to announce that Microsoft Office will begin publishing Office symbols for Windows via the Microsoft Public Symbol Server on August 9th 2022. The publication of Office symbols is a part of our continuing investment to improve security and performance for customers and partners. Key Advantages for customers, partners, and Microsoft Security: Empowering … Microsoft Office to publish symbols starting August 2022 Read More » Continue reading...