tag:blogger.com,1999:blog-37847015490388384062024-03-05T00:41:07.374-05:00Advanced Data Solutions By Ron Oberjohann, is a mindset as much as an organization. ADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comBlogger6971125tag:blogger.com,1999:blog-3784701549038838406.post-90303795283938777932024-02-10T13:35:00.000-05:002024-02-10T13:35:21.089-05:00<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://www.provectus.rocks" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1424" data-original-width="3204" height="174" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUYplGSpYYBW-wG4UB6xO-HAJpqpUZwVa2A44CxZ4OzY5VqWc5gzvzHhyD3lSgpJVDIoQDsYGtZXFL-qnu6zWEFQZaeFyHwpfEUzif9bHiT3siMZ7OyRtLTaW3jtfCtdhNo21MhN4rE8K0AjZnvLsEM3Ez-FJK6vPTHeSAgRlpgOy1cN3of9kU96qPIVE/w392-h174/page09_T.png" width="392" /></a></div> In March of 2022, this site ceased to be regularly maintained so that our focus may be directed to our new business venture... <i>Provectus Innovative Solutions LLC</i>. Our <a href="https://www.provectus.rocks/consulting-services">mission</a> is to provide affordable technology solutions to home and small businesses. Visit us at <a href="Https://www.Provectus.Rocks">Https://www.Provectus.Rocks</a> to see how we will help you by Sharing Knowledge. Empowering People. Enabling Success.<p></p><br /><p><br /></p>ADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-3478339476074393932022-05-12T18:58:00.001-04:002022-05-12T18:58:02.733-04:00Guest Users and Project for the web<P>We now have guest access in Project for the web, but in the early testing we have seen some anomalies raised by customers (and MVPs - thanks Erik and Paul). There are a lot of settings across M365 that control what guests can do - but none appeared to explain the difference we were seeing from tenant to tenant. So, what was different and what can you do about it? First, I'll explain the difference I was seeing.</P>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot showing a correclty assigned guest user who was also added as a member of the group" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371296iCE9F570CD15116E7/image-size/large?v=v2&px=999" role="button" title="Guests1.PNG" alt="Guests1.PNG" /></span></P>
<P> </P>
<P>In one tenant (see screenshot above) I could add an existing guest (you can't invite new guests from Project - that is expected) and it allowed me to choose between adding them to the group or just making an assignment. I could also add them manually to the members list. All good! In my other test tenant, I could add them to a task, and they were assigned - but not added to the group - and listed instead as "other people" - and I couldn't see them listed to add them to a group - at least in Project (I could in Outlook or AAD).</P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="A screenshot showing a guest assigned but not added as a member, but showing as an other people in the members area" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371287iA08D9EDFF7D7B07E/image-size/large?v=v2&px=999" role="button" title="OtherPeople.PNG.jpg" alt="OtherPeople.PNG.jpg" /></span></P>
<P> </P>
<P>On the face of it everything looked the same about the guest user (it was the same account) and even the tenant. A quick play around with F12 developer tools and I could see when I browsed to add a new member and it was not finding the guest, the actual query had a filter - "<SPAN>userType%20ne%20%27Guest%27" - so not suprising that my guest wasn't found! I then tried Ctrl-F5 to fully refresh the page and look through the other calls going to the service, to see if there was any clue to why it wasn't looking for guests. These few calls looked like they were getting various settings that might impact the page:</SPAN></P>
<P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="A view of some of the network page in F12 dev tools, showing some of the early calls when loading the page" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371288i6367AB18CF76E2D7/image-size/large?v=v2&px=999" role="button" title="F12_1.jpg" alt="F12_1.jpg" /></span></SPAN></P>
<P> </P>
<P><SPAN>and without too much looking I found that "GroupSettings" looked interesting. It was calling out to an API to get TenantSetting/GroupSettings. The response it got was <STRONG>{"value":[]}</STRONG> - basically a NULL array. Odd. I tried the same thing on my working tenant and saw the response as this:</SPAN></P>
<P> </P>
<P style=" padding-left : 30px; "><SPAN>{"value":[{"displayName":"Group.Unified","templateId":"62375ab9-6b52-47ed-826b-58e47e0e304b","id":"3c4adb15-25c8-48a5-b060-106e025803a2","values":[{"name":"NewUnifiedGroupWritebackDefault","value":"True"},{"name":"EnableMIPLabels","value":"True"},{"name":"CustomBlockedWordsList","value":""},{"name":"EnableMSStandardBlockedWords","value":"False"},{"name":"ClassificationDescriptions","value":""},{"name":"DefaultClassification","value":""},{"name":"PrefixSuffixNamingRequirement","value":""},{"name":"AllowGuestsToBeGroupOwner","value":"False"},{"name":"AllowGuestsToAccessGroups","value":"True"},{"name":"GuestUsageGuidelinesUrl","value":""},{"name":"GroupCreationAllowedGroupId","value":""},{"name":"AllowToAddGuests","value":"True"},{"name":"UsageGuidelinesUrl","value":"<A href="https://guideline.example.com" target="_blank" rel="noopener nofollow noreferrer">https://guideline.example.com</A>"},{"name":"ClassificationList","value":""},{"name":"EnableGroupCreation","value":"True"}]}]}</SPAN></P>
<P style=" padding-left : 30px; "> </P>
<P><SPAN>This looked familiar as I'd set some of these values in the past using PowerShell. A great article that describes all this can be found at <A title="Azure Active Directory cmdlets for configuring group settings" href="https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/groups-settings-cmdlets" target="_blank" rel="noopener noreferrer">Azure Active Directory cmdlets for configuring group settings</A> . I looked at both of my tenants to see what settings were present, using Get-AzureADDirectorySetting -All $true. My tenant that didn't resolve the guest came back empty:</SPAN></P>
<P> </P>
<P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Get-AzureADDirectorySetting was executed in PowerShell but returned no results" style="width: 570px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371293iFCBB35FA1528F552/image-size/large?v=v2&px=999" role="button" title="NoSettings.jpg" alt="NoSettings.jpg" /></span></SPAN></P>
<P> </P>
<P><SPAN>In my tenant that did show some settings I saw what I expected:</SPAN></P>
<P> </P>
<P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Get-AzureADDirectorySetting was executed on a different tenant and I see settings returned" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371294iC165FEDE4A433572/image-size/large?v=v2&px=999" role="button" title="SomeSettings.jpg" alt="SomeSettings.jpg" /></span></SPAN></P>
<P> </P>
<P><SPAN>It appeared that I had no specific settings configured, and in that case the NULL array returned didn't give Project the information it needed to know that guests were ok to resolve. I'm not sure at this point whose bug this is - Azure AD for not having any defaults show up - or Project for not filling in the gaps. We will see who gets to fix it. But to fix it yourself you just need your tenant admin to follow steps in the article listed above to set the settings they want - and assuming they don't block guests you should then be able to assign and add guests to your projects and they will be members. CTRL-F5 once the Group Settings are present, and then I can add my guest to members:</SPAN></P>
<P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="A screenshot showing that my tenant now resolves my guest user and they can be added to the group members" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371295i3F8706A40FF75747/image-size/large?v=v2&px=999" role="button" title="Fixed.jpg" alt="Fixed.jpg" /></span></SPAN></P>
<P> </P>
<P> </P>
Posted at <a href="">https://sl.advdat.com/37Lfp4k</a>https://sl.advdat.com/37Lfp4kADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-73007715512261938732022-05-12T17:27:00.001-04:002022-05-12T17:27:59.670-04:00Experiencing Data Access Issue for Log Analytics in North Central US - 05/12 - Resolved<DIV style="font-size:14px;"><DIV style="font-size:14px;"><U>Final Update</U>: Thursday, 12 May 2022 20:53 UTC<BR /><BR />We've confirmed that all systems are back to normal with no customer impact as of 05/12, 19:48 UTC. Our logs show the incident started on 05/12, 19:11 UTC and that during the 37 minutes that it took to resolve the issue some of the customers using Log Analytics in North Central US Region may have experienced issues accessing data as well as missed or delayed Alerts.<BR /><UL><LI><U>Root Cause</U>: The failure was due to issues with one of the backend Services.</LI><LI><U>Incident Timeline</U>: 37 minutes - 05/12, 19:11 UTC through 05/12, 19:48 UTC</LI></UL>We understand that customers rely on Azure Log Analytics as a critical service and apologize for any impact this incident caused.<BR /><BR />-Jayadev<BR /></DIV><HR style="border-top-color:lightgray" /></DIV>
Posted at <a href="">https://sl.advdat.com/3FJCSzu</a>https://sl.advdat.com/3FJCSzuADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-26242132720274182972022-05-12T16:27:00.001-04:002022-05-12T16:27:57.767-04:00New Release: SharePointDsc v5.2 has been published!<P>This new release of SharePointDsc includes one new resource (SPSearchCrawlDatabase), improved logging and several bugfixes. It also includes a fix for a bug introduced in v5.1, where the SPSearchIndexPartition would only return the first server running the index partition. Checkout the change log below for more information about all changes.</P>
<P> </P>
<P>You can find the <A title="SharePointDsc v5.2" href="https://www.powershellgallery.com/packages/SharePointDSC/5.2.0" target="_blank" rel="noopener nofollow noreferrer">SharePointDsc v5.2</A> in the PowerShell Gallery.</P>
<P> </P>
<P>NOTE: We can always use additional help in making SharePointDsc even better. So, if you are interested in contributing to SharePointDsc, check-out the open issues in the issue list, check-out this post in our Wiki or leave a comment on this blog post.</P>
<P> </P>
<P>Improvement/Fixes in v5.2:</P>
<P><BR /><STRONG>Added</STRONG></P>
<UL>
<LI>SharePointDsc
<UL>
<LI>Added the SPShellAdmin resource to the ReverseDsc export</LI>
<LI>Updated ReverseDsc version requirement to 2.0.0.11</LI>
</UL>
</LI>
<LI>SPFarmPropertyBag
<UL>
<LI>Added support for boolean and int32 data types</LI>
</UL>
</LI>
<LI>SPInstall
<UL>
<LI>Added additional ExitCode for incorrect license key</LI>
</UL>
</LI>
<LI>SPSearchCrawlDatabase
<UL>
<LI>New resource</LI>
</UL>
</LI>
<LI>SPSearchIndexPartition
<UL>
<LI>Added additional logging to improve troubleshooting</LI>
</UL>
</LI>
<LI>SPShellAdmin
<UL>
<LI>Added additional logging to improve troubleshooting</LI>
<LI>Added Export logic</LI>
</UL>
</LI>
<LI>SPWebAppPeoplePickerSettings
<UL>
<LI>Added the CustomFilter parameter to the resource</LI>
<LI>Added the ShortDomainName parameter to the resource</LI>
</UL>
</LI>
</UL>
<P><STRONG>Fixed</STRONG></P>
<UL>
<LI>SharePointDsc
<UL>
<LI>Fixed incorrect table formatting in the resource table of the Wiki</LI>
</UL>
</LI>
<LI>SPSearchIndexPartition
<UL>
<LI>Fixed issue where only one index component was returned after a regression issue in v5.1</LI>
</UL>
</LI>
<LI>SPSearchServiceApp
<UL>
<LI>Fixed issue where the database permissions were not corrected for new search service applications.</LI>
</UL>
</LI>
<LI>SPShellAdmin
<UL>
<LI>Fixed issue where the farm account was the owner of the database. Now including the farm account in those cases.</LI>
</UL>
</LI>
<LI>SPWebApplication
<UL>
<LI>Fixed an issue where the Set method tried to use the Parameter SecureSocketsLayer with Set-SPWebApplication on SharePoint Server older than Subscription Edition.</LI>
</UL>
</LI>
<LI>SPWebAppPeoplePickerSettings
<UL>
<LI>Fixed an issue where the Set method would not update a non-mandatory parameter on an existing SPWebAppPPSearchDomain</LI>
</UL>
</LI>
</UL>
<P> </P>
<P>A huge thanks to the following guys helping with submitting Pull Requests, testing deployments and submitting issues:<BR />Christoph Hannappel and Bart Vermeersch!</P>
<P> </P>
<P>Also, a huge thanks to everybody else who submitted issues and all that support this project. It wasn’t possible without all of your help!</P>
<P> </P>
<P>For more information about how to install and use SharePointDsc, check our <A title="SharePointDsc Wiki" href="https://github.com/dsccommunity/SharePointDsc/wiki" target="_blank" rel="noopener noreferrer">Wiki</A>.</P>
<P> </P>
<P>Let us know in the comments what you think of this release! If you find any issues, please submit them in the <A title="SharePointDsc Issue List" href="https://github.com/dsccommunity/SharePointDsc/issues" target="_blank" rel="noopener noreferrer">issue list on GitHub</A>.</P>
<P> </P>
<P>Happy SharePointing!!</P>
Posted at <a href="">https://sl.advdat.com/37Fy5lZ</a>https://sl.advdat.com/37Fy5lZADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-50222579053864029302022-05-12T14:26:00.001-04:002022-05-12T14:26:04.346-04:00Zyxel silently fixes critical RCE vulnerability in firewall productsThreat analysts who discovered a vulnerability affecting multiple Zyxel products report that the network equipment company fixed it via a silent update pushed out two weeks ago. [...]
Posted at <a href="https://sl.advdat.com/3wkVH7L">https://sl.advdat.com/3wkVH7L</a>ADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-74421264606871831272022-05-12T13:57:00.003-04:002022-05-12T13:57:52.753-04:00Azure Marketplace new offers – May 11, 2022<P>We continue to expand the Azure Marketplace ecosystem. For this volume, 92 new offers successfully met the onboarding criteria and went live. See details of the new offers below:</P>
<P> </P>
<TABLE style="width: 95%;" border="0" summary="Table with 3 headers. After the first and second header there are two columns, the first has the logo of the partner and the second has a description of the partner offering. After the third heading the table only has one column with links to contact our partners" width="95%" cellspacing="0" cellpadding="0">
<TBODY>
<TR>
<TH style="width: 100%; border-bottom: solid black 5px; padding: 20px 0px 20px 0px;" colspan="2" width="100%" height="101px">
<H3 id="toc-hId--1401404034"><SPAN>Get it now in our marketplace</SPAN></H3>
</TH>
</TR>
<TR>
<TD width="20%" height="139px" style="width: 20%; padding: 10px; border-right: none;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Activity-Based Intelligence with Video Analytics.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368528i0355CD88B770255A/image-size/large?v=v2&px=999" role="button" title="Activity-Based Intelligence with Video Analytics.png" alt="Activity-Based Intelligence with Video Analytics.png" /></span></TD>
<TD width="80%" height="139px" style="width: 80%; border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/blueprint-consulting-services-llc.activity_based_intelligence_with_video_analytics?ocid=GTMRewards_WhatsNewBlog_activity_based_intelligence_with_video_analytics_051122" target="_blank" rel="noopener noreferrer">Activity-Based Intelligence with Video Analytics</A>: NASH from Blueprint Technologies harnesses the power of Microsoft Azure Databricks to perform pattern-of-life analysis from within your video assets. Identify patterns in object movement, detect anomalies, and recommend other areas of interest where observed behaviors match.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Alfresco Content Services Community Dev.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368529i28AF48E3AAD885EA/image-size/large?v=v2&px=999" role="button" title="Alfresco Content Services Community Dev.png" alt="Alfresco Content Services Community Dev.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/tenthlineinc.alfresco-content-services-community-dev?ocid=GTMRewards_WhatsNewBlog_alfresco-content-services-community-dev_051122" target="_blank" rel="noopener noreferrer">Alfresco Content Services Community Dev</A>: This offer from Tenthline provides a virtual machine containing Alfresco Content Services, an open-source enterprise content management system. System administrators and developers can use it to quickly test and develop modules for Alfresco Content Services.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Arcoda Next.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368530i175EC2A7F3AEA9E4/image-size/large?v=v2&px=999" role="button" title="Arcoda Next.png" alt="Arcoda Next.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;"><A href="https://azuremarketplace.microsoft.com/marketplace/apps/terranovasrl1600959934825.next?ocid=GTMRewards_WhatsNewBlog_next_051122" target="_blank" rel="noopener noreferrer">Arcoda Next</A>: Next, from Terranova subsidiary Arcoda, is a field-based information management system for utilities. The mobile application enables access to GIS layers, metadata, and documentation formats, and it offers powerful network analysis features.</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AWX 20.0.0 on Ubuntu- Alternative to Ansible Tower.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368531i122CC0D9ABF2989A/image-size/large?v=v2&px=999" role="button" title="AWX 20.0.0 on Ubuntu- Alternative to Ansible Tower.png" alt="AWX 20.0.0 on Ubuntu- Alternative to Ansible Tower.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/solvedevops1643693563360.awe-20-ubuntu-20-04-12042022?ocid=GTMRewards_WhatsNewBlog_awe-20-ubuntu-20-04-12042022_051122" target="_blank" rel="noopener noreferrer">AWX 20.0.0 on Ubuntu: Alternative to Ansible Tower</A>: This image offered by Solve DevOps contains AWX 20.0.0 and Ansible Execution Environment 0.6.0 on Ubuntu 20.04. AWX is an IT automation platform that provides a web user interface to run Ansible playbooks. Automate your Windows and Linux deployment and configuration.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DataOps-Suite.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368532iB469AC2418D991FB/image-size/large?v=v2&px=999" role="button" title="DataOps-Suite.png" alt="DataOps-Suite.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/datagapsinc1585348463636.dataops?ocid=GTMRewards_WhatsNewBlog_dataops_051122" target="_blank" rel="noopener noreferrer">DataOps-Suite</A>: DataOps Suite from Datagaps combines the testing automation of ETL with data integration and data management capabilities. With the DataOps Suite, you can achieve CI/CD automation and provision test data so that software rollouts are fast and continuous.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DeepInsights Branch Location Predictor.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368533i0EA91D2BF1F099DF/image-size/large?v=v2&px=999" role="button" title="DeepInsights Branch Location Predictor.png" alt="DeepInsights Branch Location Predictor.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/mphasis.deepinsights_branch_location_predictor?ocid=GTMRewards_WhatsNewBlog_deepinsights_branch_location_predictor_051122" target="_blank" rel="noopener noreferrer">DeepInsights Branch Location Predictor</A>: The Branch Location Predictor of DeepInsights, a cloud-based cognitive computing platform from Mphasis, uses data extraction and predictive analytics to help financial service companies determine the best locations for opening bank branches.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Duck Creek OnDemand (Transact).png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368534i295BF6DDBF22F917/image-size/large?v=v2&px=999" role="button" title="Duck Creek OnDemand (Transact).png" alt="Duck Creek OnDemand (Transact).png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/duckcreektechnologies.duck_creek_ondemand_transact?ocid=GTMRewards_WhatsNewBlog_duck_creek_ondemand_transact_051122" target="_blank" rel="noopener noreferrer">Duck Creek OnDemand (Transact)</A>: Duck Creek OnDemand is a low-code solution for property and casualty insurance carriers. Duck Creek OnDemand enables a carriers’ business users to make changes to products and rules to keep pace with business requirements and pursue market opportunities.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EDUardo Business Simulation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368535iEFC181283338209C/image-size/large?v=v2&px=999" role="button" title="EDUardo Business Simulation.png" alt="EDUardo Business Simulation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/eduardozrt1632489189969.eduardo_catalogue?ocid=GTMRewards_WhatsNewBlog_eduardo_catalogue_051122" target="_blank" rel="noopener noreferrer">EDUardo Business Simulation</A>: EDUardo provides business training through modules, simulations, and interactive case studies. These can easily be integrated into learning projects at corporations, colleges, and business schools. Users can explore options and understand the impact of their decisions.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EDUardo Business Simulation (Limited).png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368536iE8D69BCDFD711CF6/image-size/large?v=v2&px=999" role="button" title="EDUardo Business Simulation (Limited).png" alt="EDUardo Business Simulation (Limited).png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/eduardozrt1632489189969.eduardo_catalogue_limited?ocid=GTMRewards_WhatsNewBlog_eduardo_catalogue_limited_051122" target="_blank" rel="noopener noreferrer">EDUardo Business Simulation (Limited)</A>: EDUardo provides business training through modules, simulations, and interactive case studies. These can easily be integrated into learning projects at corporations, colleges, and business schools. Users can explore options and understand the impact of their decisions.</P>
</TD>
</TR>
<TR>
<TD style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="effie logo.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368683i84323F7ED759696E/image-size/large?v=v2&px=999" role="button" title="effie logo.png" alt="effie logo.png" /></span></TD>
<TD style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/ipland.effie_mt?ocid=GTMRewards_WhatsNewBlog_effie_mt_051122" target="_blank" rel="noopener noreferrer">effie> Modern Trade</A>: The multi-level analytics of effie> help fast-moving consumer goods (FMCG) suppliers plan and execute trade marketing and sales strategies in modern retail environments. Using point-of-sale data, suppliers can monitor performance and adjust strategies to increase sales.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EZMonitor.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368537i9DB2C51626958A63/image-size/large?v=v2&px=999" role="button" title="EZMonitor.png" alt="EZMonitor.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/keytosllc1616432875894.ezmonitor?ocid=GTMRewards_WhatsNewBlog_ezmonitor_051122" target="_blank" rel="noopener noreferrer">EZMonitor</A>: EZMonitor monitors your domains for known misconfigurations that could open the door for an attacker. Protect your organization from phishing and man-in-the-middle attacks with EZMonitor's intelligent alerting, and get full visibility into all your SSL certificates in one convenient dashboard.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GLens- Climate Accounting (Knowledge Lens).png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368538i2D3979E2988BE16E/image-size/large?v=v2&px=999" role="button" title="GLens- Climate Accounting (Knowledge Lens).png" alt="GLens- Climate Accounting (Knowledge Lens).png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/knowledgelens1591334415709.knowledgelens_glens_climate_accounting?ocid=GTMRewards_WhatsNewBlog_knowledgelens_glens_climate_accounting_051122" target="_blank" rel="noopener noreferrer">GLens- Climate Accounting (Knowledge Lens)</A>: GLens provides up-to-the-minute information on emissions, effluent discharges, and ambient air quality. This enables manufacturers, mining operations, and others in the industrial sector to control pollution and meet regulatory standards.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Grafana Statistics Dashboard on Linux CentOS 7.9.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368539iC8854C58BEACAB7F/image-size/large?v=v2&px=999" role="button" title="Grafana Statistics Dashboard on Linux CentOS 7.9.png" alt="Grafana Statistics Dashboard on Linux CentOS 7.9.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/tidalmediainc.grafana-centos-7?ocid=GTMRewards_WhatsNewBlog_grafana-centos-7_051122" target="_blank" rel="noopener noreferrer">Grafana Statistics Dashboard on CentOS 7.9</A>: This ready-to-run image from Tidal Media provides Grafana on CentOS 7.9. Grafana is an open-source analytics and visualization application. From heatmaps to histograms, Grafana lets you visualize your data any way you want.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Grafana Statistics Dashboard on Linux CentOS 8.4.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368540iD027629898CB3BBB/image-size/large?v=v2&px=999" role="button" title="Grafana Statistics Dashboard on Linux CentOS 8.4.png" alt="Grafana Statistics Dashboard on Linux CentOS 8.4.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/tidalmediainc.grafana-centos-8?ocid=GTMRewards_WhatsNewBlog_grafana-centos-8_051122" target="_blank" rel="noopener noreferrer">Grafana Statistics Dashboard on CentOS 8.4</A>: This ready-to-run image from Tidal Media provides Grafana on CentOS 8.4. Grafana is an open-source analytics and visualization application. From heatmaps to histograms, Grafana lets you visualize your data any way you want.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Grafana Statistics Dashboard on Ubuntu 20.04 LTS.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368541i71D0DE89E152C055/image-size/large?v=v2&px=999" role="button" title="Grafana Statistics Dashboard on Ubuntu 20.04 LTS.png" alt="Grafana Statistics Dashboard on Ubuntu 20.04 LTS.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/tidalmediainc.grafana-ubuntu-20-04?ocid=GTMRewards_WhatsNewBlog_grafana-ubuntu-20-04_051122" target="_blank" rel="noopener noreferrer">Grafana Statistics Dashboard on Ubuntu 20.04 LTS</A>: This ready-to-run image from Tidal Media provides Grafana on Ubuntu 20.04 LTS. Grafana is an open-source analytics and visualization application. From heatmaps to histograms, Grafana lets you visualize your data any way you want.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Hardened WordPress with support from Hossted.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368543i62E0265B81D9BB4E/image-size/large?v=v2&px=999" role="button" title="Hardened WordPress with support from Hossted.png" alt="Hardened WordPress with support from Hossted.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/meanio.linnovate-wph?ocid=GTMRewards_WhatsNewBlog_linnovate-wph_051122" target="_blank" rel="noopener noreferrer">Hardened WordPress with Support from Hossted</A>: This offer from Hossted provides a hardened image of WordPress, an open-source content management system. The image is compliant with the Microsoft Azure Security Benchmark and with Cloud Native Computing Foundation (CNCF) standards.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Marketing Mix Planner for CPG.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368544i6804266F802DFBE1/image-size/large?v=v2&px=999" role="button" title="Marketing Mix Planner for CPG.png" alt="Marketing Mix Planner for CPG.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/themathcompany1629354633640.marketing_planner_codx?ocid=GTMRewards_WhatsNewBlog_marketing_planner_codx_051122" target="_blank" rel="noopener noreferrer">Marketing Mix Planner for CPG</A>: Co.dx is an AI-powered platform built under TheMathCompany's product division. Marketing Mix Wizard, part of Co.dx's marketing suite of apps, lets consumer packaged goods companies optimize marketing ROI and efficiently allocate funds across offline and online touchpoints.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MidVision RapidDeploy for Ent. App. Connector 12.0.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368545i636DE1F6D1C0F639/image-size/large?v=v2&px=999" role="button" title="MidVision RapidDeploy for Ent. App. Connector 12.0.png" alt="MidVision RapidDeploy for Ent. App. Connector 12.0.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/midvision.ibm-app-connect-enterprise-edition-12?ocid=GTMRewards_WhatsNewBlog_ibm-app-connect-enterprise-edition-12_051122" target="_blank" rel="noopener noreferrer">MidVision RapidDeploy for Ent. App. Connector 12.0</A>: This offer from MidVision provides RapidDeploy for Enterprise App Connector on a Microsoft Azure virtual machine. The MidVision RapidDeploy interface lets you easily upgrade products and deploy, roll back, or redeploy application and configuration changes.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Node.js on CentOS 7.9.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368549i337A5041D0E2DBF5/image-size/large?v=v2&px=999" role="button" title="Node.js on CentOS 7.9.png" alt="Node.js on CentOS 7.9.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/apps-4-rent.nodejs-on-centos79?ocid=GTMRewards_WhatsNewBlog_nodejs-on-centos79_051122" target="_blank" rel="noopener noreferrer">Node.js on CentOS 7.9</A>: This image from Apps4Rent provides Node.js on CentOS 7.9. Node.js is built on an architecture that allows event-driven programming on web servers, which lets developers create scalable servers without threading.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Node.js on CentOS 8.5.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368550i762AE5F9D8389CC8/image-size/large?v=v2&px=999" role="button" title="Node.js on CentOS 8.5.png" alt="Node.js on CentOS 8.5.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/apps-4-rent.nodejs-on-centos85?ocid=GTMRewards_WhatsNewBlog_nodejs-on-centos85_051122" target="_blank" rel="noopener noreferrer">Node.js on CentOS 8.5</A>: This image from Apps4Rent provides Node.js on CentOS 8.5. Node.js is built on an architecture that allows event-driven programming on web servers, which lets developers create scalable servers without threading.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Playwright on Azure Functions.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368551i8F7DB95EDA8BDA9F/image-size/large?v=v2&px=999" role="button" title="Playwright on Azure Functions.png" alt="Playwright on Azure Functions.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/noricumcloudsolutions1600524477681.playwright-function?ocid=GTMRewards_WhatsNewBlog_playwright-function_051122" target="_blank" rel="noopener noreferrer">Playwright on Azure Functions</A>: This offer from SilverLining.cloud provides a framework to deploy your Playwright scripts to Microsoft Azure Functions and scale your browser automation tasks. A zipped archive is included with the files to configure Azure and to deploy serverless Chromium by using Visual Studio Code.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Portainer with support from Hossted.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368552i6F961156F8549A46/image-size/large?v=v2&px=999" role="button" title="Portainer with support from Hossted.png" alt="Portainer with support from Hossted.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/meanio.linnovate-portainer?ocid=GTMRewards_WhatsNewBlog_linnovate-portainer_051122" target="_blank" rel="noopener noreferrer">Portainer with Support from Hossted</A>: This offer from Hossted provides version 2.11.1 of Portainer, an open-source container management system for Docker environments. Authenticate users, view containers' logs, execute commands in the console of running containers, and manage the creation and deletion of swarm services.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Red Hat Enterprise Linux (RHEL) 7.9 LVM.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368553iBD8E5193F1A37279/image-size/large?v=v2&px=999" role="button" title="Red Hat Enterprise Linux (RHEL) 7.9 LVM.png" alt="Red Hat Enterprise Linux (RHEL) 7.9 LVM.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/procomputers.rhel-7-9-lvm?ocid=GTMRewards_WhatsNewBlog_rhel-7-9-lvm_051122" target="_blank" rel="noopener noreferrer">Red Hat Enterprise Linux (RHEL) 7.9 LVM</A>: This ready-to-use image from ProComputers.com provides a minimal installation of Red Hat Enterprise Linux 7.9 with a 30-GiB OS disk managed with Logical Volume Manager. The OS disk is partitioned using the GUID Partition Table standard instead of a master boot record.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Selenium on Azure Functions.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368555i00B2F88D0380CE17/image-size/large?v=v2&px=999" role="button" title="Selenium on Azure Functions.png" alt="Selenium on Azure Functions.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/noricumcloudsolutions1600524477681.selenium-functions?ocid=GTMRewards_WhatsNewBlog_selenium-functions_051122" target="_blank" rel="noopener noreferrer">Selenium on Azure Functions</A>: This offer from SilverLining.cloud provides a framework to deploy your Selenium Python scripts to Microsoft Azure Functions and scale your browser automation tasks. A zipped archive is included with the files to configure Azure and to deploy serverless Chromium by using Visual Studio Code.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Staff Check In-Out.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368556iF93E69DDF655EA04/image-size/large?v=v2&px=999" role="button" title="Staff Check In-Out.png" alt="Staff Check In-Out.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;"><A href="https://azuremarketplace.microsoft.com/marketplace/apps/ltappssoftwarecoltd1586198023679.ltapps_staff_check_in_out?ocid=GTMRewards_WhatsNewBlog_ltapps_staff_check_in_out_051122" target="_blank" rel="noopener noreferrer">Staff Check In-Out</A>: Staff Check In-Out from LTAPPs offers timekeeping functionality from within Microsoft Teams and Microsoft SharePoint. Staff members can check in or check out and include GPS coordinates, and managers can schedule tasks and export to Microsoft Excel.</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Vnomic's SAP Landscape Deployment Service.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368557iCD2B4EB316D37E78/image-size/large?v=v2&px=999" role="button" title="Vnomic's SAP Landscape Deployment Service.png" alt="Vnomic's SAP Landscape Deployment Service.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;"><A href="https://azuremarketplace.microsoft.com/marketplace/apps/vnomicinc.vnomic-sap-delivery-server?ocid=GTMRewards_WhatsNewBlog_vnomic-sap-delivery-server_051122" target="_blank" rel="noopener noreferrer">Vnomic's SAP Landscape Deployment Service</A>: Vnomic's automated and engineered SAP landscape delivery and governance platform as a service eliminates manual processes while meeting SAP and Microsoft performance, security, governance, and compliance requirements.</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Windows Server 2022 with FTP.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368558iB592C1ED520DD13F/image-size/large?v=v2&px=999" role="button" title="Windows Server 2022 with FTP.png" alt="Windows Server 2022 with FTP.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/belindaczsro1588885355210.belvmsrvftp02?ocid=GTMRewards_WhatsNewBlog_belvmsrvftp02_051122" target="_blank" rel="noopener noreferrer">Windows Server 2022 with FTP</A>: This offer from Belinda CZ s.r.o. provides Windows Server 2022 with FileZilla, an open-source, cross-platform FTP application. Features include IP address restrictions, disk quota limits, virtual folders, user groups, and support for log saving.</P>
</TD>
</TR>
<TR>
<TH style="padding: 20px 0px 20px 0px;" colspan="2" width="100%" height="98px">
<H3 id="toc-hId-1086108799">Go further with workshops, proofs of concept, and implementations</H3>
</TH>
</TR>
<TR>
<TD width="20%" height="137px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AI and ML- 2-Day Proof of Concept.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368559iAC362BA1BC9736E8/image-size/large?v=v2&px=999" role="button" title="AI and ML- 2-Day Proof of Concept.png" alt="AI and ML- 2-Day Proof of Concept.png" /></span></TD>
<TD width="80%" height="137px" style="border-left: none;"><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/crayonus.aimlproofofconcept?ocid=GTMRewards_WhatsNewBlog_aimlproofofconcept_051122" target="_blank" rel="noopener noreferrer">AI and ML: 2-Day Proof of Concept</A>: In this proof of concept, Crayon will walk through Microsoft Azure HDInsight and Azure Databricks, then collaborate with your organization on a strategic use case to justify larger initiatives.</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AI-Enabled Chatbot- 12-Month Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368560i9A59D468FE8A3E50/image-size/large?v=v2&px=999" role="button" title="AI-Enabled Chatbot- 12-Month Implementation.png" alt="AI-Enabled Chatbot- 12-Month Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/agileapplications1634647541100.test1234?ocid=GTMRewards_WhatsNewBlog_test1234_051122" target="_blank" rel="noopener noreferrer">AI-Enabled Chatbot: 12-Month Implementation</A>: Agile Applications will deploy the Microsoft Bot Framework so your local government or council can set up an AI-enabled chatbot. By using decision trees, the chatbot will be able to answer complex queries from the public.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="App Enhancements Using AI- 12-Week Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368561i927238E9F289ADD1/image-size/large?v=v2&px=999" role="button" title="App Enhancements Using AI- 12-Week Implementation.png" alt="App Enhancements Using AI- 12-Week Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/risetechnology1582398891626.rise_ai_app_enhancements?ocid=GTMRewards_WhatsNewBlog_rise_ai_app_enhancements_051122" target="_blank" rel="noopener noreferrer">App Enhancements Using AI: 12-Week Implementation</A>: Rise Technology will use Microsoft Azure Cognitive Services and Azure Machine Learning studio to enrich your application capabilities. Take your apps to the next level with content analysis, advanced language models, speech-to-text services, and more.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Analytics Solution- 5-Month Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368562i5E3FE7B61E1370F6/image-size/large?v=v2&px=999" role="button" title="Azure Analytics Solution- 5-Month Implementation.png" alt="Azure Analytics Solution- 5-Month Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/pscinc.psc_analytics?ocid=GTMRewards_WhatsNewBlog_psc_analytics_051122" target="_blank" rel="noopener noreferrer">Azure Analytics Solution: 5-Month Implementation</A>: PSC will use Microsoft Power BI and Azure Synapse to analyze and visualize your company's distributed data. Support business growth by realizing your data analysis work in a seamless cloud environment. This service is available only in Japanese.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Application- 8-Week Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368563iF4F62BE3DE685FE3/image-size/large?v=v2&px=999" role="button" title="Azure Application- 8-Week Implementation.png" alt="Azure Application- 8-Week Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/oxwaretechnologiesltd1634573396051.oxware-proof-of-concept-1?ocid=GTMRewards_WhatsNewBlog_oxware-proof-of-concept-1_051122" target="_blank" rel="noopener noreferrer">Azure Application: 8-Week Implementation</A>: Oxware Technologies will implement, deploy, and integrate a Microsoft Azure-native application or service customized to fit your unique business requirements and environment.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Arc for Server Pilot- 4-Week Proof of Concept.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368564i3C8F9CBF6EABE689/image-size/large?v=v2&px=999" role="button" title="Azure Arc for Server Pilot- 4-Week Proof of Concept.png" alt="Azure Arc for Server Pilot- 4-Week Proof of Concept.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/devoteamsa1589968240572.dvtb_azurearcserver?ocid=GTMRewards_WhatsNewBlog_dvtb_azurearcserver_051122" target="_blank" rel="noopener noreferrer">Azure Arc for Server Pilot: 4-Week Proof of Concept</A>: This proof of concept from Devoteam will provide an end-to-end implementation of Microsoft Azure Arc-enabled servers, from onboarding to installing various Azure services, like Microsoft Defender for Cloud.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Arc for Servers Enabled- 4-Week Proof of Concept.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368565iCEF40F29AD85625A/image-size/large?v=v2&px=999" role="button" title="Azure Arc for Servers Enabled- 4-Week Proof of Concept.png" alt="Azure Arc for Servers Enabled- 4-Week Proof of Concept.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/softserveinc1605804530752.azure_arc_for_servers_enabled_4_week_poc?ocid=GTMRewards_WhatsNewBlog_azure_arc_for_servers_enabled_4_week_poc_051122" target="_blank" rel="noopener noreferrer">Azure Arc for Servers Enabled: 4-Week Proof of Concept</A>: Softserve's proof of concept will bring your server-based infrastructure to Microsoft Azure Arc and enable Azure hybrid security, compliance, logging, and monitoring services.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Databricks- 1-Day CX Workshop.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368567i8764E61FEEE7DECA/image-size/large?v=v2&px=999" role="button" title="Azure Databricks- 1-Day CX Workshop.png" alt="Azure Databricks- 1-Day CX Workshop.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/blueprint-consulting-services-llc.one_day_databricks_workshop_for_realtime_cx?ocid=GTMRewards_WhatsNewBlog_one_day_databricks_workshop_for_realtime_cx_051122" target="_blank" rel="noopener noreferrer">Azure Databricks: 1-Day CX Workshop</A>: Blueprint Technologies and its different accelerators will help you develop a solid internal culture around Microsoft Azure Databricks. This workshop can be held on-site or virtually for teams with a minimum of five members. A basic knowledge of Azure Databricks is recommended.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Databricks- 1-Day Retail Automation Workshop.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368568iBB880E7AA2812D10/image-size/large?v=v2&px=999" role="button" title="Azure Databricks- 1-Day Retail Automation Workshop.png" alt="Azure Databricks- 1-Day Retail Automation Workshop.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/blueprint-consulting-services-llc.one_day_databricks_hackathon_for_retail_automation?ocid=GTMRewards_WhatsNewBlog_one_day_databricks_hackathon_for_retail_automation_051122" target="_blank" rel="noopener noreferrer">Azure Databricks: 1-Day Retail Automation Workshop</A>: Accelerate your retail automation analytics with an Azure Databricks hackathon facilitated by Blueprint Technologies. The curriculum will provide immediate value for developers, designers, and technical product managers.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Databricks- 1-Day Workshop for Flexible Supply Chain.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368569i2F9BFD990B6DEAED/image-size/large?v=v2&px=999" role="button" title="Azure Databricks- 1-Day Workshop for Flexible Supply Chain.png" alt="Azure Databricks- 1-Day Workshop for Flexible Supply Chain.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/blueprint-consulting-services-llc.one_day_azure_databricks_for_retail_supply_chain?ocid=GTMRewards_WhatsNewBlog_one_day_azure_databricks_for_retail_supply_chain_051122" target="_blank" rel="noopener noreferrer">Azure Databricks: 1-Day Workshop for Flexible Supply Chain</A>: Blueprint Technologies' specialists in Azure Databricks will lead a hackathon to accelerate your retail supply chain analytics. Quickly generate solutions with nearly 30 different accelerators from Blueprint.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Databricks- 2-Week Advertising Upselling Proof of Concept.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368570i6296DBB7864137B3/image-size/large?v=v2&px=999" role="button" title="Azure Databricks- 2-Week Advertising Upselling Proof of Concept.png" alt="Azure Databricks- 2-Week Advertising Upselling Proof of Concept.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/blueprint-consulting-services-llc.optimizing_ad_spend_for_real_time_upselling?ocid=GTMRewards_WhatsNewBlog_optimizing_ad_spend_for_real_time_upselling_051122" target="_blank" rel="noopener noreferrer">Azure Databricks: 2-Week Advertising Upselling Proof of Concept</A>: Blueprint Technologies will deliver a proof of concept of an advertising accelerator using Azure Databricks. The accelerator provides a fully functional data science notebook designed to save your data engineers and data scientists weeks or months of development time.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Databricks- 2-Week Threat Detection Proof of Concept.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368572iE5B46E41B5A08396/image-size/large?v=v2&px=999" role="button" title="Azure Databricks- 2-Week Threat Detection Proof of Concept.png" alt="Azure Databricks- 2-Week Threat Detection Proof of Concept.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/blueprint-consulting-services-llc.threat_detection_with_dns_data_azure_databricks?ocid=GTMRewards_WhatsNewBlog_threat_detection_with_dns_data_azure_databricks_051122" target="_blank" rel="noopener noreferrer">Azure Databricks: 2-Week Threat Detection Proof of Concept</A>: Blueprint Technologies will deliver a proof of concept of its anomaly detection module. Uncover unknown threat patterns using the scalability of Azure Databricks, and jump-start your threat detection experimentation with prebuilt code and sample data.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Databricks for Retail SKU Item Mix- 1-Day Workshop.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368573i1604947D7C4C29D1/image-size/large?v=v2&px=999" role="button" title="Azure Databricks for Retail SKU Item Mix- 1-Day Workshop.png" alt="Azure Databricks for Retail SKU Item Mix- 1-Day Workshop.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/blueprint-consulting-services-llc.one_day_databricks_hackathon_for_retail_sku_item?ocid=GTMRewards_WhatsNewBlog_one_day_databricks_hackathon_for_retail_sku_item_051122" target="_blank" rel="noopener noreferrer">Azure Databricks for Retail SKU Item Mix: 1-Day Workshop</A>: Blueprint Technologies' hackathons accelerate the training of your workforce and drive the creation of solutions powered by Azure Databricks. In this one, Blueprint will focus on analytics pertaining to retail and stock-keeping units (SKUs).</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Disaster Recovery as a Service- 1-Week Proof of Concept.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368574i0064A80C9D79CE8E/image-size/large?v=v2&px=999" role="button" title="Azure Disaster Recovery as a Service- 1-Week Proof of Concept.png" alt="Azure Disaster Recovery as a Service- 1-Week Proof of Concept.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/ccstechnologiespltd1648207419171.disasterrecovery_asr?ocid=GTMRewards_WhatsNewBlog_disasterrecovery_asr_051122" target="_blank" rel="noopener noreferrer">Azure Disaster Recovery as a Service: 1-Week Proof of Concept</A>: CCS Technologies will help you design a low-cost model to replicate your IT setup and its data and minimize downtime in the event of a site failure. This offer includes a proof of concept and a cost analysis for up to five systems.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Foundation- 4-Week Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368575i0FAEAE12E1D9B778/image-size/large?v=v2&px=999" role="button" title="Azure Foundation- 4-Week Implementation.png" alt="Azure Foundation- 4-Week Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/devoteamsa1589968240572.dvtb_azurefoundation?ocid=GTMRewards_WhatsNewBlog_dvtb_azurefoundation_051122" target="_blank" rel="noopener noreferrer">Azure Foundation: 4-Week Implementation</A>: Let Devoteam provide you with a solid foundation for your cloud journey. In this implementation, Devoteam will build an Azure landing zone aligned with best practices and the Microsoft Cloud Adoption Framework.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Foundations- 3-Week Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368576iFE22857196F85C4F/image-size/large?v=v2&px=999" role="button" title="Azure Foundations- 3-Week Implementation.png" alt="Azure Foundations- 3-Week Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/insight-5305567.azure_foundations_3wk_implementation?ocid=GTMRewards_WhatsNewBlog_azure_foundations_3wk_implementation_051122" target="_blank" rel="noopener noreferrer">Azure Foundations: 3-Week Implementation</A>: Insight's accelerated foundation approach incorporates a bespoke design that maps the governance principles and capabilities of the Microsoft Azure enterprise scaffold with the specific needs of your business.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Immersion Workshop- Infrastructure Migration.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368577iB3C8F4331B534F23/image-size/large?v=v2&px=999" role="button" title="Azure Immersion Workshop- Infrastructure Migration.png" alt="Azure Immersion Workshop- Infrastructure Migration.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/devoteamsa1589968240572.dvtb_aiw_inframigration?ocid=GTMRewards_WhatsNewBlog_dvtb_aiw_inframigration_051122" target="_blank" rel="noopener noreferrer">Azure Immersion Workshop: Infrastructure Migration</A>: Devoteam's hands-on workshop for IT project managers and IT pros focuses on the value, process, and tools involved in migrating on-premises infrastructure and line-of-business applications to Microsoft Azure.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Kickstart Program- 2-Week Workshop.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368578iF7DB0F724E423873/image-size/large?v=v2&px=999" role="button" title="Azure Kickstart Program- 2-Week Workshop.png" alt="Azure Kickstart Program- 2-Week Workshop.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/cdi1642603601409.cloud_kickstart_program?ocid=GTMRewards_WhatsNewBlog_cloud_kickstart_program_051122" target="_blank" rel="noopener noreferrer">Azure Kickstart Program: 2-Week Workshop</A>: Accelerate your cloud initiatives with the help of CDI. CDI will implement a cloud solution that's either native to Microsoft Azure or an extension of your on-premises environment.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Kubernetes- 60-Day Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368579i1EE90A209FDD681F/image-size/large?v=v2&px=999" role="button" title="Azure Kubernetes- 60-Day Implementation.png" alt="Azure Kubernetes- 60-Day Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/long_view_systems.azurekubernetes?ocid=GTMRewards_WhatsNewBlog_azurekubernetes_051122" target="_blank" rel="noopener noreferrer">Azure Kubernetes: 60-Day Implementation</A>: In this implementation, Long View Systems will facilitate the design and deployment of an Azure Kubernetes environment. This service accelerates application development and helps clients gain value from their Azure investment using a phased approach to containerization adoption.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Networking CMMC-Compliant Configuration.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368580iDC9CACDF9978C7C7/image-size/large?v=v2&px=999" role="button" title="Azure Networking CMMC-Compliant Configuration.png" alt="Azure Networking CMMC-Compliant Configuration.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/summit7systemsinc1588875429764.summit7_azure_networking?ocid=GTMRewards_WhatsNewBlog_summit7_azure_networking_051122" target="_blank" rel="noopener noreferrer">Azure Networking CMMC-Compliant Configuration</A>: Summit 7 will simplify the deployment of your Microsoft Azure landing zone to meet Level 2 requirements of the U.S. Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) program.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Platform Solution- 12-Month Managed Service.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368581i991578B02C6D08B2/image-size/large?v=v2&px=999" role="button" title="Azure Platform Solution- 12-Month Managed Service.png" alt="Azure Platform Solution- 12-Month Managed Service.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/inetumrealdolmen_apps-infra.aps?ocid=GTMRewards_WhatsNewBlog_aps_051122" target="_blank" rel="noopener noreferrer">Azure Platform Solution: 12-Month Managed Service</A>: In this managed service, Inetum-Realdolmen will ensure your Microsoft Azure environment stays in good shape. Benefit from a combination of automation, reactive services, and proactive services, backed by a highly specialized customer team.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Stack HCI- 3-Hour Workshop.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368582iE50220FECFCBA965/image-size/large?v=v2&px=999" role="button" title="Azure Stack HCI- 3-Hour Workshop.png" alt="Azure Stack HCI- 3-Hour Workshop.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/moveas1585826200973.move_azure_stack_hci?ocid=GTMRewards_WhatsNewBlog_move_azure_stack_hci_051122" target="_blank" rel="noopener noreferrer">Azure Stack HCI: 3-Hour Workshop</A>: Move AS will conduct a comprehensive walkthrough of Azure Stack HCI, how it differs from Azure and Azure Stack Hub, and how it can be used in your organization. You'll also get a breakdown of the pros and cons of choosing this solution over other hyperconverged solutions.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Virtual Desktop- 4-Week Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368583i26C84AB2F71AD9AC/image-size/large?v=v2&px=999" role="button" title="Azure Virtual Desktop- 4-Week Implementation.png" alt="Azure Virtual Desktop- 4-Week Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/devoteamsa1589968240572.dvtb_azurevirtualdesktop?ocid=GTMRewards_WhatsNewBlog_dvtb_azurevirtualdesktop_051122" target="_blank" rel="noopener noreferrer">Azure Virtual Desktop: 4-Week Implementation</A>: In this offer, Devoteam will provide assistance for migration scenarios involving other virtual desktop infrastructure solutions, like Citrix or RDS. Each Azure Virtual Desktop implementation is different in terms of complexity, scale, cost, and duration.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure VMware Solution- 6-Week Proof of Concept.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368584iCE48C1139D1C8348/image-size/large?v=v2&px=999" role="button" title="Azure VMware Solution- 6-Week Proof of Concept.png" alt="Azure VMware Solution- 6-Week Proof of Concept.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/brainscaleinc1586814509009.avs_poc_brainscale?ocid=GTMRewards_WhatsNewBlog_avs_poc_brainscale_051122" target="_blank" rel="noopener noreferrer">Azure VMware Solution: 6-Week Proof of Concept</A>: In this proof of concept, Brainscale will assess your digital estate and set up a landing zone for a Microsoft Azure VMware Solution environment. Five test virtual machines will be migrated using live migration (vMotion) and bulk migration (replication-based) methods.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cloud Modernization for Monolithic Apps- 6-Week Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368585i63BEFE7CF711833A/image-size/large?v=v2&px=999" role="button" title="Cloud Modernization for Monolithic Apps- 6-Week Implementation.png" alt="Cloud Modernization for Monolithic Apps- 6-Week Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/opensistemas.cloud_modernization_for_monolithic_apps_six_weeks?ocid=GTMRewards_WhatsNewBlog_cloud_modernization_for_monolithic_apps_six_weeks_051122" target="_blank" rel="noopener noreferrer">Cloud Modernization for Monolithic Apps: 6-Week Implementation</A>: This modernization plan from OpenSistemas, intended for monolithic customer applications without dependencies, will take your website, database, or mobile app back end and build or modify existing cloud infrastructure to accommodate it. This service is available only in Spanish.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Data Engineering and Data Analytics- 4-Week Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368586i10DCAA65ABB55352/image-size/large?v=v2&px=999" role="button" title="Data Engineering and Data Analytics- 4-Week Implementation.png" alt="Data Engineering and Data Analytics- 4-Week Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/i2econsultingllc.analytics_services_draft1?ocid=GTMRewards_WhatsNewBlog_analytics_services_draft1_051122" target="_blank" rel="noopener noreferrer">Data Engineering and Data Analytics: 4-Week Implementation</A>: Get insights into your data with intuitive visuals. I2e Consulting will determine your Azure data sources and reporting needs, then integrate data from multiple cloud sources and load it into a staging area for use by a downstream Power BI dashboard.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Digital Transformation- 6-Week Implementation.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368587i014EF98A9052AD0D/image-size/large?v=v2&px=999" role="button" title="Digital Transformation- 6-Week Implementation.png" alt="Digital Transformation- 6-Week Implementation.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/jscsoftlinetrade.sol-52614-jwm?ocid=GTMRewards_WhatsNewBlog_sol-52614-jwm_051122" target="_blank" rel="noopener noreferrer">Digital Transformation: 6-Week Implementation</A>: Following Microsoft best practices, Softline will help customers migrate servers, applications, and data to Microsoft Azure Infrastructure as a Service (IaaS) and Azure Platform as a Service (PaaS).</P>
</TD>
</TR>
<TR>
<TD style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IBM Fraud and Abuse Management System on Azure.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368588iF77438F67B2586A9/image-size/large?v=v2&px=999" role="button" title="IBM Fraud and Abuse Management System on Azure.png" alt="IBM Fraud and Abuse Management System on Azure.png" /></span></TD>
<TD style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/ibm-alliance-usa-ny-armonk-dtt-6418595.ibm_fraud_and_abuse_management_on_azure?ocid=GTMRewards_WhatsNewBlog_ibm_fraud_and_abuse_management_on_azure_051122" target="_blank" rel="noopener noreferrer">IBM Fraud and Abuse Management System on Azure</A>: IBM will deliver a proof of concept of its FAMS NextGen solution, which helps federal clients and private companies detect various kinds of fraud, calculate risk scores, and monitor compliance.</P>
</TD>
</TR>
<TR>
<TD style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Azure Sentinel- 1-Day Workshop.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368589iEC0C49A310596883/image-size/large?v=v2&px=999" role="button" title="Azure Sentinel- 1-Day Workshop.png" alt="Azure Sentinel- 1-Day Workshop.png" /></span></TD>
<TD style="border-left: none;">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/crayonus.azuresentinel?ocid=GTMRewards_WhatsNewBlog_azuresentinel_051122" target="_blank" rel="noopener noreferrer">Microsoft Sentinel: 1-Day Workshop</A>: In this workshop from Crayon, you'll discover threats to your Microsoft 365 environments, learn how to mitigate them, and build a business case for a production deployment of Microsoft Sentinel, including a technical road map.</P>
</TD>
</TR>
<TR>
<TD width="20%" height="48px" style="border-right: none; padding: 10px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MLOps Accelerator.png" style="width: 216px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368546iCCE2745F13B948C5/image-size/large?v=v2&px=999" role="button" title="MLOps Accelerator.png" alt="MLOps Accelerator.png" /></span></TD>
<TD width="80%" height="48px" style="border-left: none;"><A href="https://azuremarketplace.microsoft.com/marketplace/apps/neal_analytics.mlops_accelerator?ocid=GTMRewards_WhatsNewBlog_mlops_accelerator_051122" target="_blank" rel="noopener noreferrer">MLOps Accelerator</A>: The MLOps Accelerator team at Neal Analytics will deliver a comprehensive AI proof of concept in about two months. The MLOps Accelerator supports experimentation, helping organizations like yours rapidly transform your model lifecycle management process.</TD>
</TR>
<TR>
<TH style="padding: 20px 0px 20px 0px;" colspan="2" width="100%" height="99px">
<H3 id="toc-hId--721345664"><SPAN>Contact our partners</SPAN></H3>
</TH>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px"><A href="https://azuremarketplace.microsoft.com/marketplace/apps/media3-technologies-llc.adobecf2021w?ocid=GTMRewards_WhatsNewBlog_adobecf2021w_051122" target="_blank" rel="noopener noreferrer">Adobe ColdFusion 2021 (Enterprise Version Trial)</A></TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/advantech.fems_on_windows?ocid=GTMRewards_WhatsNewBlog_fems_on_windows_051122" target="_blank" rel="noopener noreferrer">Advantech FEMS: Facility Energy Management Solution</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/gettechkft1588771927555.app_modernization_2d_assessment_and_briefing?ocid=GTMRewards_WhatsNewBlog_app_modernization_2d_assessment_and_briefing_051122" target="_blank" rel="noopener noreferrer">App Modernization: 2-Day Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/gettechkft1588771927555.app_modernization_2h_assessment_and_briefing?ocid=GTMRewards_WhatsNewBlog_app_modernization_2h_assessment_and_briefing_051122" target="_blank" rel="noopener noreferrer">App Modernization: 2-Hour Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/apty.apty_dap_client?ocid=GTMRewards_WhatsNewBlog_apty_dap_client_051122" target="_blank" rel="noopener noreferrer">Apty for Microsoft Dynamics 365</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/oakwood-systems-group-1018430.azure_active_directory_assessment?ocid=GTMRewards_WhatsNewBlog_azure_active_directory_assessment_051122" target="_blank" rel="noopener noreferrer">Azure Active Directory: 5-Day Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/zonesinc.assessment_00004?ocid=GTMRewards_WhatsNewBlog_assessment_00004_051122https://azuremarketplace.microsoft.com/marketplace/consulting-services/zonesinc.assessment_00004?ocid=GTMRewards_WhatsNewBlog_assessment_00004_051122" target="_blank" rel="noopener noreferrer">Azure Foundation: 1-Month Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/bitscape.bi-inf-az-ms02?ocid=GTMRewards_WhatsNewBlog_bi-inf-az-ms02_051122" target="_blank" rel="noopener noreferrer">Azure Managed Service</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/pexonconsultinggmbh1648642803504.migration-azure?ocid=GTMRewards_WhatsNewBlog_migration-azure_051122" target="_blank" rel="noopener noreferrer">Azure Migration Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/projetlys1588236038743.plys_azure_vdi?ocid=GTMRewards_WhatsNewBlog_plys_azure_vdi_051122" target="_blank" rel="noopener noreferrer">Azure VDI: 2-Week Implementation</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/bextechnology.bextdocs?ocid=GTMRewards_WhatsNewBlog_bextdocs_051122" target="_blank" rel="noopener noreferrer">BestDoc</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/casanetsa1605107614017.business_applications_modernization?ocid=GTMRewards_WhatsNewBlog_business_applications_modernization_051122" target="_blank" rel="noopener noreferrer">Business Application Modernization</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/syncfishptyltd1636006532924.cisyncee-ls-sn?ocid=GTMRewards_WhatsNewBlog_cisyncee-ls-sn_051122" target="_blank" rel="noopener noreferrer">CI Synchronizer (Enterprise Edition) for Lansweeper to ServiceNow</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/adaquestinc1589508805668.c_socaas?ocid=GTMRewards_WhatsNewBlog_c_socaas_051122" target="_blank" rel="noopener noreferrer">C-SOCaaS: 12-Month Cyber Security Operations Center</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/syone1617042241635.dahsboard_reporting?ocid=GTMRewards_WhatsNewBlog_dahsboard_reporting_051122" target="_blank" rel="noopener noreferrer">Dashboard Reporting</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/globalbrands1583918039184.desk_reservation_application?ocid=GTMRewards_WhatsNewBlog_desk_reservation_application_051122" target="_blank" rel="noopener noreferrer">Desk Reservation Application</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/ey_global.ey_smart_health_analytics?ocid=GTMRewards_WhatsNewBlog_ey_smart_health_analytics_051122" target="_blank" rel="noopener noreferrer">EY Smart Health Analytics</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/cleverit1635963866579.groowcity?ocid=GTMRewards_WhatsNewBlog_groowcity_051122" target="_blank" rel="noopener noreferrer">Groowcity</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/itcsecureltd.itc_id_comidmatassess?ocid=GTMRewards_WhatsNewBlog_itc_id_comidmatassess_051122" target="_blank" rel="noopener noreferrer">IAM for Success: 7-Day Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/mindtree-ltd.innoappconsultingoffer?ocid=GTMRewards_WhatsNewBlog_innoappconsultingoffer_051122" target="_blank" rel="noopener noreferrer">Inno-App: 5-Week Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/brqsolueseminformticasa1615576195192.brq_ms_002?ocid=GTMRewards_WhatsNewBlog_brq_ms_002_051122" target="_blank" rel="noopener noreferrer">Managed Service by BRQ</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/tataconsultancyservicesltd-security.msp-umbrella-001?ocid=GTMRewards_WhatsNewBlog_msp-umbrella-001_051122" target="_blank" rel="noopener noreferrer">Microsoft Security Identity and Compliance: 2-Hour Briefing</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/bosch.bosch_mobility_cloud_platform?ocid=GTMRewards_WhatsNewBlog_bosch_mobility_cloud_platform_051122" target="_blank" rel="noopener noreferrer">Mobility Cloud Platform</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/devoteamsa1589968240572.dvtb_cloudmaturityassessment?ocid=GTMRewards_WhatsNewBlog_dvtb_cloudmaturityassessment_051122" target="_blank" rel="noopener noreferrer">Navigate Cloud Journey: 3-Week Maturity Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/energyexemplar1645641989665.plcmsascm?ocid=GTMRewards_WhatsNewBlog_plcmsascm_051122" target="_blank" rel="noopener noreferrer">PLEXOS Cloud</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/profisee.profisee_paas?ocid=GTMRewards_WhatsNewBlog_profisee_paas_051122" target="_blank" rel="noopener noreferrer">Profisee Master Data Management (PaaS)</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/profisee.profisee_saas?ocid=GTMRewards_WhatsNewBlog_profisee_saas_051122" target="_blank" rel="noopener noreferrer">Profisee Master Data Management (SaaS)</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/logicai1620589834250.recoai?ocid=GTMRewards_WhatsNewBlog_recoai_051122" target="_blank" rel="noopener noreferrer">RecoAI: AI-Powered Recommendation System</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/rtgsltd1597660566673.network-connector?ocid=GTMRewards_WhatsNewBlog_network-connector_051122" target="_blank" rel="noopener noreferrer">RTGS Network Connector</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/yashtechnologiespltd1582216215552.sap_on_azure?ocid=GTMRewards_WhatsNewBlog_sap_on_azure_051122" target="_blank" rel="noopener noreferrer">SAP on Azure: 2-Week Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/1602655969010.secure_congestion_count?ocid=GTMRewards_WhatsNewBlog_secure_congestion_count_051122" target="_blank" rel="noopener noreferrer">Secure Congestion Count</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/zonesinc.assessment_00006?ocid=GTMRewards_WhatsNewBlog_assessment_00006_051122" target="_blank" rel="noopener noreferrer">Security: 1-Month Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/consulting-services/synoptek.synoptek-application-modernization-services?ocid=GTMRewards_WhatsNewBlog_synoptek-application-modernization-services_051122" target="_blank" rel="noopener noreferrer">Synoptek Application Modernization: 2-Week Assessment</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px">
<P><A href="https://azuremarketplace.microsoft.com/marketplace/apps/techwaveconsultingindiapvtltd1645349161906.twcmp01?ocid=GTMRewards_WhatsNewBlog_twcmp01_051122" target="_blank" rel="noopener noreferrer">TW Cloud Management Platform - Unity</A></P>
</TD>
</TR>
<TR>
<TD colspan="2" width="100%" height="30px"><A href="https://azuremarketplace.microsoft.com/marketplace/apps/vidigamimediainc.sol-49310-gav?ocid=GTMRewards_WhatsNewBlog_sol-49310-gav_051122" target="_blank" rel="noopener noreferrer">V Photo Selector Add-In for Office 365</A></TD>
</TR>
</TBODY>
</TABLE>
Posted at <a href="">https://sl.advdat.com/38ii1qI</a>https://sl.advdat.com/38ii1qIADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-40360742614192274792022-05-12T13:57:00.001-04:002022-05-12T13:57:14.414-04:00Citrix Features Explained: Increase app security with Citrix Secure Private Access<p>For your hybrid workers to do their best, most productive work, they need anywhere access to a wide variety of SaaS and web applications. But today <a rel="NOFOLLOW" href="https://www.okta.com/businesses-at-work/2021/" target="_blank" rel="noopener noreferrer">the average business relies on 88 different apps</a>, creating a larger-than-ever attack surface …</p>
<p>The post <a rel="NOFOLLOW" href="https://feeds.feedblitz.com/~/695717340/0/citrix/" target="_blank">Citrix Features Explained: Increase app security with Citrix Secure Private Access</a> first appeared on <a rel="NOFOLLOW" href="https://www.citrix.com/blogs/" target="_blank">Citrix Blogs</a>.</p> <a rel="NOFOLLOW" title="View Comments" href="https://www.citrix.com/blogs/2022/05/12/citrix-features-explained-increase-app-security-with-citrix-secure-private-access/#respond"><img height="20" style="border:0;margin:0;padding:0;" src="https://assets.feedblitz.com/i/comments20.png"></a> <a title="Follow Comments via RSS" href="https://www.citrix.com/blogs/2022/05/12/citrix-features-explained-increase-app-security-with-citrix-secure-private-access/feed/"><img height="20" style="border:0;margin:0;padding:0;" src="https://assets.feedblitz.com/i/commentsrss20.png"></a><h3 style="clear:left;padding-top:10px">Related Stories</h3><ul><li><a rel="NOFOLLOW" href="https://www.citrix.com/blogs/2022/05/04/improving-user-experience-citrix-secure-private-access/">Citrix Features Explained: Improving user experience with Citrix Secure Private Access</a></li><li><a rel="NOFOLLOW" href="https://www.citrix.com/blogs/2022/05/09/adaptive-authentication-access-citrix-secure-private-access/">Citrix Features Explained: Adaptive authentication and access in Citrix Secure Private Access</a></li><li><a rel="NOFOLLOW" href="https://www.citrix.com/blogs/2022/04/12/flexibility-remote-work-citrix-adc-jp/">Citrix ADCとパブリッククラウドでリモートワークに柔軟性を</a></li></ul>
Posted at <a href="https://sl.advdat.com/3FIWfZu">https://sl.advdat.com/3FIWfZu</a>ADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-9742368352184779222022-05-12T13:27:00.001-04:002022-05-12T13:27:52.725-04:00Lesson Learned #204: Elastic Query and firewall issues<P>Today, I worked on a service request that our customer needs to add the IP for Azure SQL node that is executing any elastic query. </P>
<P> </P>
<P><STRONG>We have the following situation:</STRONG></P>
<P> </P>
<UL>
<LI>In the server <STRONG>$serverSource</STRONG> and database <STRONG>$DbSource</STRONG> we have a table called <STRONG>dummy</STRONG> that is an external table that, using elastic query is connecting to <STRONG>$serverTarget</STRONG> and other database.</LI>
<LI>As the Azure SQL firewall has not defined the IP address of the SQL Azure node that is running the query they are getting the following error: "Exception calling "ExecuteNonQuery" with "0" argument(s): "An error occurred while establishing connection to remote data source: [Microsoft][ODBC Driver17 for SQL Server][SQL Server]<STRONG>Cannot open server 'servername' requested by the login. Client with IP address 'xxx.xxx.xxx.xxx'</STRONG> is not allowed to access the server. To enable access, use the Windows Azure Management Portal or run sp_set_firewall_rule on the master database to create a firewall rule for this IP address or address range. It may take up to five minutes for this change to take effect.[Microsoft][ODBC Driver 17 for SQL Server][SQL Server]Cannot open server 'servername' requested by the login. Client with IP address 'xxx.xxx.xxx.xxx' is not allowed to access the server. To enable access, use the Windows Azure Management Portal or run sp_set_firewall_rule on the master database to create a firewall rule for this IP address or address range. It may take up to five minutes for this change to take effect."</LI>
</UL>
<P><STRONG style="font-family: inherit;">Why?:</STRONG></P>
<P> </P>
<UL>
<LI>This issue is explained in this <A href="https://techcommunity.microsoft.com/t5/azure-database-support-blog/lesson-learned-151-external-tables-and-private-link-connectivity/ba-p/1946095" target="_self">article</A></LI>
</UL>
<P> </P>
<P><STRONG>Solution proposed as an example: </STRONG></P>
<P> </P>
<UL>
<LI>Connect to the server <STRONG>$ServerSource</STRONG> and database <STRONG>$DbSource</STRONG></LI>
<LI>Run the query <STRONG>"select * from dummy"</STRONG>. This table is the external table that makes a reference.</LI>
<LI>If we obtain an error:
<UL>
<LI>Obtain the <STRONG>IP of the SQL Azure Node. </STRONG></LI>
<LI>Connect to the server <STRONG>$ServerTarget</STRONG> and database master</LI>
<LI>Run <STRONG>sp_set_firewall_rule</STRONG> to add this IP</LI>
</UL>
</LI>
<LI>The next connection will be fine and it won't return any error.</LI>
<LI>As a note, of course, we need to maintain the number of IP added.</LI>
</UL>
<pre class="lia-code-sample language-powershell"><code>
$serverTarget = "ServerNameThatHasTheReferenceTable.database.windows.net"
$userTarget = "UserNameThatHasTheReferenceTable" #UserName parameter to connect
$passwordTarget = "PasswordThatHasTheReferenceTable" #Password Parameter to connect
$DbTarget = "master" #DBName Parameter to connect
$serverSource = "ServerNameThatHasDefinedExternalTable.database.windows.net"
$userSource = "UserNameThatHasDefinedExternalTable" #UserName parameter to connect
$passwordSource = "PasswordThatHasDefinedExternalTable" #Password Parameter to connect
$DbSource = "DBNameThatHasDefinedExternalTable" #DBName Parameter to connect
#----------------------------------------------------------------
#Function to connect to the target database using a retry-logic
#----------------------------------------------------------------
Function GiveMeConnectionTarget()
{
for ($i=1; $i -lt 10; $i++)
{
try
{
logMsg( "Connecting to the database...Attempt #" + $i) (1)
logMsg( "Connecting to server: " + $serverTarget + " - DB: " + $DbTarget) (1)
$SQLConnection = New-Object System.Data.SqlClient.SqlConnection
$SQLConnection.ConnectionString = "Server="+$serverTarget+";Database="+$dbTarget+";User ID="+$userTarget+";Password="+$passwordTarget+";Connection Timeout=60;Application Name=Tester;Pooling=True"
$SQLConnection.Open()
logMsg("Connected to the database...") (1)
return $SQLConnection
break;
}
catch
{
logMsg("Not able to connect - Retrying the connection..." + $Error[0].Exception) (2)
Start-Sleep -s 5
}
}
}
#----------------------------------------------------------------
#Function to connect to the source database using a retry-logic
#----------------------------------------------------------------
Function GiveMeConnectionSource()
{
for ($i=1; $i -lt 10; $i++)
{
try
{
logMsg( "Connecting to the database...Attempt #" + $i) (1)
logMsg( "Connecting to server: " + $serverSource + " - DB: " + $DbSource ) (1)
$SQLConnection = New-Object System.Data.SqlClient.SqlConnection
$SQLConnection.ConnectionString = "Server="+$serverSource+";Database="+$dbSource+";User ID="+$userSource+";Password="+$passwordSource+";Connection Timeout=60;Application Name=Tester;Pooling=True"
$SQLConnection.Open()
logMsg("Connected to the database...") (1)
return $SQLConnection
break;
}
catch
{
logMsg("Not able to connect - Retrying the connection..." + $Error[0].Exception) (2)
Start-Sleep -s 5
}
}
}
#----------------------------------------------------------------
#Function to execute any elastic query using a command retry-logic
#----------------------------------------------------------------
Function ExecuteQuerySource($query)
{
for ($i=1; $i -lt 3; $i++)
{
try
{
$SQLConnectionSource = GiveMeConnectionSource
$command = New-Object -TypeName System.Data.SqlClient.SqlCommand
$command.CommandTimeout = 6000
$command.Connection=$SQLConnectionSource
$command.CommandText = $query
$command.ExecuteNonQuery() | Out-Null
break;
}
catch
{
$ErrorMsg = $Error[0].Exception
return $ErrorMsg
}
}
}
#----------------------------------------------------------------
#Function to add the firewall rule
#----------------------------------------------------------------
Function ExecuteQueryTarget( $IP)
{
for ($i=1; $i -lt 3; $i++)
{
try
{
$SQLConnectionSource = GiveMeConnectionTarget
$commandText = "EXECUTE sp_set_firewall_rule @name = N'TestContosoFirewallRule"+ $IP + "',"
$commandText = $commandText + "@start_ip_address = '" + $IP+ "',"
$commandText = $commandText + "@end_ip_address = '" + $IP+ "'"
$command = New-Object -TypeName System.Data.SqlClient.SqlCommand
$command.CommandTimeout = 6000
$command.Connection=$SQLConnectionSource
$command.CommandText = $commandText
$command.ExecuteNonQuery() | Out-Null
break;
}
catch
{
logMsg("Not able to run the query - Retrying the operation..." + $Error[0].Exception) (2)
Start-Sleep -s 2
}
}
}
#--------------------------------
#Log the operations
#--------------------------------
function logMsg
{
Param
(
[Parameter(Mandatory=$true, Position=0)]
[string] $msg,
[Parameter(Mandatory=$false, Position=1)]
[int] $Color
)
try
{
$Fecha = Get-Date -format "yyyy-MM-dd HH:mm:ss"
$msg = $Fecha + " " + $msg
$Colores="White"
$BackGround =
If($Color -eq 1 )
{
$Colores ="Cyan"
}
If($Color -eq 3 )
{
$Colores ="Yellow"
}
if($Color -eq 2)
{
Write-Host -ForegroundColor White -BackgroundColor Red $msg
}
else
{
Write-Host -ForegroundColor $Colores $msg
}
}
catch
{
Write-Host $msg
}
}
#--------------------------------
#Empty?
#--------------------------------
function TestEmpty($s)
{
if ([string]::IsNullOrWhitespace($s))
{
return $true;
}
else
{
return $false;
}
}
#--------------------------------
#Give the IP that is trying to connect
#--------------------------------
function GiveMeIP
{
Param([Parameter(Mandatory=$true)]
[System.String]$Text)
try
{
$Pos = $Text.IndexOf("Client with IP address '")
$return= $Text.substring( $Pos+24)
$PosUntil = $Return.IndexOf("'")
$return = $Return.substring(0,$PosUntil )
return $Return
}
catch
{
$return= $Text
return $Return
}
}
cls
logMsg("Starting the process") (2)
$ErrorMsg = ExecuteQuerySource("Select * from dummy")
if(TestEmpty($ErrorMsg) -eq $true)
{
}
else
{
logMsg("Adding the IP.." + $IP) (2)
$IP = GiveMeIP($ErrorMsg)
ExecuteQueryTarget($IP)
logMsg("Added the IP.." + $IP) (2)
}
logMsg("Finished the process") (2)
</code></pre>
<P> </P>
<P> Enjoy!</P>
Posted at <a href="">https://sl.advdat.com/3FFRuzI</a>https://sl.advdat.com/3FFRuzIADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-80575799875621451892022-05-12T13:26:00.001-04:002022-05-12T13:26:03.060-04:00BPFdoor: Stealthy Linux malware bypasses firewalls for remote accessA recently discovered backdoor malware called BPFdoor has been stealthily targeting Linux and Solaris systems without being noticed for more than five years. [...]
Posted at <a href="https://sl.advdat.com/3FGWQKZ">https://sl.advdat.com/3FGWQKZ</a>ADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-31428034897494724962022-05-12T12:57:00.003-04:002022-05-12T12:57:51.528-04:00Detecting and Remediating Impossible Travel<H1 id="toc-hId--2076496747">Overview</H1>
<P>“Impossible travel” is one of the most basic anomaly detections used to indicate that a user is compromised. The logic behind impossible travel is simple. If the same user connects from two different countries and the time between those connections can’t be made through conventional air travel, it’s an impossible travel.</P>
<P>Although the principle of detecting impossible travel is straightforward, the how, when, and where we work has made it more challenging to correctly identify an impossible travel event. Employees can connect to your corporate network and resources practically at the same time from multiple devices, using multiple applications, from multiple IP addresses. To address these problems, Microsoft implemented a comprehensive mechanism to</P>
<P>For example, an employee works from a laptop from their home, but the laptop has a VPN connection to the corporate network with split tunnels such as Microsoft Office 365 going directly from the home IP address, while activity using GitHub goes out through the VPN in a different country. Simultaneously, they are connected to the Microsoft Teams app from their smartphone and the IP address can switch in a matter of seconds between the home Wi-Fi and the cellular network’s ISP.</P>
<P>Another example is when an employee is traveling and working from a remote location. Their smartphone can jump between their cellular network provider that’s connected using roaming from their home country and Wi-Fi located on a different continent.</P>
<P> </P>
<H1 id="toc-hId-411016086">Technical details</H1>
<P> </P>
<P>To handle such cases, processing job that consumes, enriches, and aggregates several billion activities per day to detect suspicious actions. For each country the user was active in during the last couple of days, the visit details are stored as part of an aggregation of visit activities such as the user agents and ISPs that appeared during that visit. When a new event is triggered, we correlate the event with the stored visits to see if the activity potentially causes an impossible travel incident. This reduces the number of false positives and investigations.</P>
<P>Each impossible travel incident is based on two visits. Each visit represents an aggregation of user log activities during a session in a single country. The visit contains information such as user agent, IP address etc., that can be analyzed to determine if the visit was legitimate. Additionally, all the aggregated properties are saved - enabling us to compare them to the other visit. If they are similar enough, we avoid raising an unnecessary alert.</P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="assafyatziv_0-1652371572675.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371220i344399A0E453E633/image-size/large?v=v2&px=999" role="button" title="assafyatziv_0-1652371572675.png" alt="assafyatziv_0-1652371572675.png" /></span></P>
<P><STRONG><EM>A flowchart graphic that goes from left to right. It shows several events happening almost simultaneously with attempts to connect to resources in the cloud. The events are analyzed by reviewing a user’s historical behavior and comparing it with a stream processing job that consumes, enriches, and aggregates several billion activities per day to detect suspicious actions. If the events appear normal based on information on the user’s historical activity, no action is taken. If the events appear suspicious, an alert for an impossible travel incident is triggered and the information is logged.</EM></STRONG></P>
<P> </P>
<P>We add a visit to the visits store only when the location of the user is from a valid user location that represents a physical location. If we indicate, according to the tenant's IP ranges configuration or according to our geo-IP data that the IP doesn't represent a physical location, such as an IP used by a VPN service or a cloud provider, it will not participate in an impossible travel incident. Additionally, we avoid raising alerts on neighboring countries, while using smaller resolutions when it is required.</P>
<P>After an impossible travel incident is created, we classify each visit as suspicious or normal. If both visits are labeled as to avoid triggering an alert on false positive scenarios. If a visit is labeled suspicious, an alert is raised.</P>
<P>To classify a visit as normal we use different methods. The algorithm ensembles two logics, one is based on the user’s learned baseline while the other is based on security attributes that we consume from the identity provider service (AAD).</P>
<P>For the first part, we have a profile service which learns the common properties of each user, such as location, what devices are normally active, and common activities that are performed. The user profile is updated after each new activity. If the visit shares properties that are typical for that particular user, we will likely label it as a normal visit. For roaming scenarios, we combine profile-based data with the device information knowledge, avoiding the creation of alert for these cases.</P>
<P>The other part of the algorithm takes signals from AAD that indicates if the activities were really made by the user, such as MFA and registered device information. Those signals are highly accurate indicators and we found integrating them into our process decreased the number of false positives dramatically.</P>
<P>Using these signals, we can correlate between the login made by the user to the other activities during the visit. This sheds light on the visit itself, and enables us to clear activities that otherwise would have appeared suspicious.</P>
<P>When we surface the alert to the we also look for additional insights we can share related to other activities that happened during the time that triggered the event. We access metadata and statistical enrichments, such as in the example below.</P>
<P style=" text-align: center; "><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="assafyatziv_1-1652371696365.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371222iDE531C00A3D7546D/image-size/large?v=v2&px=999" role="button" title="assafyatziv_1-1652371696365.png" alt="assafyatziv_1-1652371696365.png" /></span></P>
<P> </P>
<P><STRONG><EM>A graphic with three bullets that shows an example of the metadata that is provided in an alert in the Microsoft Defender for Cloud Apps, and soon, the Microsoft 365 Defender portals. Example, important information: This user is an administrator in Office 365 (Default). Microsoft Azure (Default) was accessed from IP address 73.42.222.55 for the first time in 180 days. Microsoft Azure (Default) was accessed from the ISP Comcast for the first time in 44 days.</EM></STRONG></P>
<P> </P>
<H1 id="toc-hId--1396438377">Conclusion</H1>
<P> </P>
<P>When we look at the detections as a whole set, Microsoft has the power to move a non-focused and noisy scenario from a single detection to a significantly more accurate signal in the context of a different detection. For example, making a detection that profiles IP addresses that are involved in a password spray attempt enabled us to remove the failed logins from being considered as part of “impossible travel.” By removing failed logins from the detection’s logic, VPN suppression, and other changes, Microsoft has decreased false positives by almost 75%</P>
<P>An impossible travel event is triggered only when there is a successful activity performed from an IP address where the scenario should catch the SOC’s attention.</P>
<P>Microsoft is committed to keep working with our engineering, data science, and security research team to build the next generation of alerting experiences. Alerts that are more precise and tuned to identify real attack scenarios. By leveraging Microsoft 365 Defender incidents concept and correlations capabilities, we will alert on correlated actions when they have meaning as part of a complete security scenario.</P>
<P>For more details about incidents, you can read this blog: <A href="https://www.microsoft.com/security/blog/2020/07/09/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents/" target="_blank" rel="noopener noreferrer">Inside Microsoft 365 Defender: Correlating and consolidating attacks into incidents - Microsoft Security Blog</A></P>
<P>Safe travels!</P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
<P> </P>
Posted at <a href="">https://sl.advdat.com/39WC9yZ</a>https://sl.advdat.com/39WC9yZADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-47573298630939671852022-05-12T12:57:00.001-04:002022-05-12T12:57:51.207-04:00Join Microsoft Security at RSA 2022 Conference in San Francisco<P><FONT size="4"><SPAN>We want to invite our technical community to </SPAN><A href="https://microsoft.eplannerpro.com/msrsa2022/predayreg" target="_blank" rel="noopener nofollow noreferrer"><STRONG>join us</STRONG></A><SPAN> at the <STRONG>Microsoft Security Hub at Bespoke Westfield San Francisco Centre</STRONG> to start your week <STRONG>at RSA Conference 2022 on Sunday, June 5, 2022</STRONG>. There will be information, networking opportunities, and exclusive swag</SPAN><A href="#_ftn1" target="_blank" rel="noopener nofollow noreferrer" name="_ftnref1"><SPAN>[1]</SPAN></A><SPAN> for our community. Simply stop by the Microsoft hub and provide the code: <STRONG>FEARLESS </STRONG></SPAN></FONT></P>
<P><FONT size="4"><SPAN> </SPAN></FONT></P>
<P><FONT size="4"><SPAN>During this pre-day event you’ll connect with peers and Microsoft security experts and discuss ways you can turn your vision into reality with the latest in comprehensive security.</SPAN></FONT></P>
<P> </P>
<H1 id="toc-hId--2076671436"><FONT size="5">Agenda pre-day:</FONT></H1>
<P> </P>
<UL>
<LI><FONT size="4">2:00 PM – 3:25 PM<STRONG> - Keynote </STRONG>“What’s next in Security”</FONT></LI>
<LI><FONT size="4">3:25 PM – 4:10 PM <STRONG>- Innovation Break</STRONG></FONT></LI>
<LI><FONT size="4">4:10 PM – 5:55 PM<STRONG> - Breakout session and immersive experiences:</STRONG> on topics including Zero Trust, Multi-cloud Security, Identity and Threat Intelligence/ Hands-on Microsoft Immersion Experience: Secure Hybrid Cloud. </FONT></LI>
<LI><FONT size="4">6:00 PM – 9:00 PM<STRONG> - Evening Reception</STRONG></FONT></LI>
</UL>
<H1 id="toc-hId-410841397"><FONT size="5">More to do at RSA:</FONT></H1>
<P> </P>
<P><FONT size="4"><STRONG>Immersive experiences:</STRONG> Have lunch with Microsoft during RSA and join a specialized partner for a comprehensive overview of Microsoft Defender for Cloud and Azure network security products at the Microsoft Immersion Experience: Secure Hybrid Cloud.</FONT></P>
<UL>
<LI><FONT size="4"><STRONG>Location:</STRONG> <SPAN>Microsoft Security Hub at Bespoke Westfield San Francisco Centre.</SPAN></FONT></LI>
<LI><FONT size="4"><STRONG>Date and time:</STRONG> <SPAN>M</SPAN><SPAN>onday June 6<SUP>th</SUP> and Tuesday June 7<SUP>th</SUP> at noon</SPAN><SPAN>. </SPAN></FONT></LI>
<LI><FONT size="4"><SPAN>Boxed lunch</SPAN> will be provided, and seats are limited so <A href="https://microsoft.eplannerpro.com/msrsa2022/CIELunch" target="_blank" rel="noopener nofollow noreferrer"><STRONG>reserve your spot now</STRONG></A><STRONG>!</STRONG></FONT></LI>
</UL>
<H1 id="toc-hId--1396613066"><FONT size="5">Featured Speakers:</FONT></H1>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Trevor_Rusher_0-1652374336213.png" style="width: 801px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371236i3E6405581AAC645A/image-dimensions/801x410?v=v2" width="801" height="410" role="button" title="Trevor_Rusher_0-1652374336213.png" alt="Trevor_Rusher_0-1652374336213.png" /></span></P>
<P> </P>
<P><FONT size="4"><SPAN>RSA registration is required for all Microsoft-sponsored events, so please bring your badge and if you haven’t registered yet, </SPAN><A href="https://path.rsaconference.com/flow/rsac/us22/us22regdefault/login" target="_blank" rel="noopener nofollow noreferrer"><SPAN><STRONG>register</STRONG></SPAN></A><SPAN> for RSA Conference 2022. Us</SPAN><SPAN>e</SPAN><SPAN> code <STRONG>54SMICROSXP</STRONG> <STRONG>to receive a complimentary Expo pass.</STRONG></SPAN><SPAN><STRONG> </STRONG></SPAN></FONT></P>
<P> </P>
<P><FONT size="4"><SPAN>We are excited to see you in person and share new innovations that work together across platforms and clouds to safeguard your entire organization.</SPAN></FONT></P>
<P> </P>
<P><FONT size="4">Safeguard your future. Be fearless.</FONT></P>
<P><FONT size="4"><SPAN> </SPAN></FONT></P>
<P><FONT size="4"><SPAN>If you prefer, I not forward you these types of communications, just let me know. To learn how to manage your contact preferences for other parts of Microsoft, please read our </SPAN><A href="https://privacy.microsoft.com/en-US/privacystatement" target="_blank" rel="noopener noreferrer">Privacy Statement</A><SPAN>.</SPAN></FONT></P>
<P> </P>
<P><EM><A href="#_ftnref1" target="_blank" rel="noopener nofollow noreferrer" name="_ftn1">[1]</A> Swag is limited and will be distributed on a first-come, first-served basis.</EM></P>
Posted at <a href="">https://sl.advdat.com/3M9kKRH</a>https://sl.advdat.com/3M9kKRHADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-40318722719842248632022-05-12T12:27:00.005-04:002022-05-12T12:27:51.181-04:00SQL Insider Series: Restoring a backup from LTR in Azure SQL DB | Data Exposed<P>In this episode of Data Exposed: SQL Insider Series, Laura Grob and Anna Hoffman will take a look at how you can restore an Azure SQL DB database from the long-term retention (LTR) backups when the logical server and online database have been deleted.</P>
<P> </P>
<P><FONT size="5"><A href="https://youtu.be/XFtAkf2DrmQ?WT.mc_id=dataexposed-c9-niner" target="_blank" rel="nofollow noopener noreferrer">Watch on Data Exposed</A></FONT></P>
<P> </P>
<P><EM>Resources:</EM><BR /><A href="https://docs.microsoft.com/en-us/powershell/module/az.sql/get-azsqldatabaselongtermretentionbackup?msclkid=cef0c7f1b1df11ecaf186089f5478969&view=azps-7.3.2Restore-AzSqlDatabase:%20https://docs.microsoft.com/en-us/powershell/module/az.sql/restore-azsqldatabase?msclkid=337d7c3cb1e811ec9518fe76ab06dcd7&view=azps-7.3.2" target="_blank" rel="noopener noreferrer">Get-AzSqlDatabaseLongTermRetentionBackup</A></P>
<P><A href="https://aka.ms/sqlinsiderseries" target="_blank" rel="noopener noreferrer"><SPAN>SQL Insider Series Playlist</SPAN></A></P>
<P> </P>
<P><SPAN>View/share our latest episodes on </SPAN><A href="https://channel9.msdn.com/Shows/Data-Exposed?WT.mc_id=dataexposed-c9-niner" target="_blank" rel="noopener noreferrer">Microsoft Docs</A><SPAN> and </SPAN><A href="https://www.youtube.com/playlist?list=PLlrxD0HtieHieV7Jls72yFPSKyGqycbZR&WT.mc_id=dataexposed-c9-niner" target="_blank" rel="noopener nofollow noreferrer">YouTube</A><SPAN>!</SPAN></P>
Posted at <a href="">https://sl.advdat.com/3FHwEQg</a>https://sl.advdat.com/3FHwEQgADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-4373640768386914222022-05-12T12:27:00.003-04:002022-05-12T12:27:50.773-04:00Simplifying the Quarantine Experience - Part Two<H2 id="toc-hId-420542070">Managing false positives should be easy</H2>
<P>In the <A href="https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/simplifying-the-quarantine-experience/ba-p/2676388" target="_blank">previous blog</A> we talked about some of the key steps we took to make the quarantined experience simpler for our end users and admins. Here in part two, we will be highlighting additional features we’re introducing to make the quarantine experience even more easy to use.</P>
<P> </P>
<H2 id="toc-hId--1386912393">Exciting new updates are coming soon!</H2>
<P>Microsoft Defender for Office 365 is rolling out key quarantine management features that will help empower SecOps professionals and end user when triaging emails:</P>
<UL>
<LI>Hourly option for notifications</LI>
<LI>Password protected download of quarantined messages</LI>
<LI>Asynchronous quarantine experience – database migration.</LI>
</UL>
<P> </P>
<H2 id="toc-hId-1100600440">Hourly option for notifications</H2>
<P>We have heard from customers that they desire granular options when it comes to end user email notifications. We’re adding a new hourly option to end user notifications, allowing users to be able to rely on prompt notification about quarantined items when appropriate. With this feature users can be rest assured that they will be updated frequently once new items lands on their quarantine folder. </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FaithEbenezer_Oquong_0-1652231981928.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370633i82A53094F9D96E67/image-size/large?v=v2&px=999" role="button" title="FaithEbenezer_Oquong_0-1652231981928.png" alt="FaithEbenezer_Oquong_0-1652231981928.png" /></span></P>
<P> </P>
<P> </P>
<H2 id="toc-hId--706854023">Password protected download of quarantined messages</H2>
<P>With this change we’re giving the ability to password protects items they download from quarantine. We want users to be confident that the items they are downloading to their systems will not execute involuntarily without their consent, and this capability will allow them to safely transport the items to external analysis tools. </P>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FaithEbenezer_Oquong_1-1652231981940.png" style="width: 400px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370634i2BBEF499E5DEE829/image-size/medium?v=v2&px=400" role="button" title="FaithEbenezer_Oquong_1-1652231981940.png" alt="FaithEbenezer_Oquong_1-1652231981940.png" /></span></P>
<H2 id="toc-hId-1780658810"> </H2>
<P> </P>
<H2 id="toc-hId--26795653">Additional updates to support search and larger bulk operations</H2>
<P> </P>
<P>Microsoft Defender for Office 365 is working to enable additional quarantine enhancements, like partial string search functionality and 1,000 message bulk operation support in quarantine. As a result, we'll be making adjustments to the release process through an asynchronous approach.</P>
<P> </P>
<H3 id="toc-hId-663765821">What does an asynchronous approach mean for me?</H3>
<P>With the asynchronous approach, we're able to support bulk operations up to 1,000 messages, and these larger requests may take longer to process. As a result, we'll be introducing additional statuses for quarantined messages, like “Preparing to release” and “Error”. The “Preparing to release” status will indicate that the messages is in the process of being released while the “Error” status will indicate that a message release has failed, and the user needs to retry.</P>
<P><SPAN> </SPAN></P>
<H2 id="toc-hId-653262717">Let us know what you think!</H2>
<P>Test out these new capabilities when they begin rolling out in the next couple months and let us know any feedback you may have. We’re always looking for ways to improve the quarantine experience for users and admins.</P>
<P> </P>
<P> </P>
<P>Do you have questions or feedback about Microsoft Defender for Office 365? Engage with the community and Microsoft experts in the <A href="https://aka.ms/MDOForum" target="_blank" rel="noopener noreferrer">Defender for Office 365 forum</A>.</P>
<P> </P>
<P> </P>
Posted at <a href="">https://sl.advdat.com/3L2wLXS</a>https://sl.advdat.com/3L2wLXSADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-12303080097182975762022-05-12T12:27:00.001-04:002022-05-12T12:27:50.507-04:00SQL Insider Series: Restoring a backup from LTR in Azure SQL DB | Data Exposed<P>In this episode of Data Exposed: SQL Insider Series, Laura Grob and Anna Hoffman will take a look at how you can restore an Azure SQL DB database from the long-term retention (LTR) backups when the logical server and online database have been deleted.</P>
<P> </P>
<P><EM>Resources:</EM><BR /><A href="https://docs.microsoft.com/en-us/powershell/module/az.sql/get-azsqldatabaselongtermretentionbackup?msclkid=cef0c7f1b1df11ecaf186089f5478969&view=azps-7.3.2Restore-AzSqlDatabase:%20https://docs.microsoft.com/en-us/powershell/module/az.sql/restore-azsqldatabase?msclkid=337d7c3cb1e811ec9518fe76ab06dcd7&view=azps-7.3.2" target="_blank" rel="noopener noreferrer">Get-AzSqlDatabaseLongTermRetentionBackup</A></P>
Posted at <a href="">https://sl.advdat.com/3wmWRj8</a>https://sl.advdat.com/3wmWRj8ADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-45349609552623947052022-05-12T11:57:00.001-04:002022-05-12T11:57:49.643-04:00Announcing Microsoft Defender Vulnerability Management in public preview<P>According to the <A href="https://nvd.nist.gov/general/visualizations/vulnerability-visualizations/cvss-severity-distribution-over-time" target="_blank" rel="noopener nofollow noreferrer">National Institute of Standards and Technology</A>, 21,957 vulnerabilities were published in 2021 alone. The challenge facing customers when securing their environments begins with the sheer volume and complexity of vulnerabilities and misconfigurations. Microsoft is committed to helping organizations reduce cyber risk with continuous vulnerability and misconfiguration assessment, risk-based prioritization, and built-in remediation tools.</P>
<P> </P>
<P><A href="https://www.microsoft.com/security/blog/2019/07/02/microsofts-threat-vulnerability-management-now-helps-thousands-of-customers-to-discover-prioritize-and-remediate-vulnerabilities-in-real-time/" target="_blank" rel="noopener noreferrer">In 2019</A>, we announced core threat and vulnerability management tools to increase visibility and agility in managing vulnerabilities. Since then, we’ve collaborated closely with customers and design partners to better address needs spanning continuous visibility, centralized asset inventories, managing compliance with industry benchmarks, and additional mitigation activities to reduce risk during remediation.</P>
<P> </P>
<P>Today, we are thrilled to announce <STRONG>the public preview of Microsoft Defender Vulnerability Management</STRONG>, a single solution offering the full set of Microsoft’s vulnerability management capabilities to help take your threat protection to the next level.</P>
<P> </P>
<P>In addition to all the existing vulnerability management capabilities currently available, Defender Vulnerability Management will provide consolidated asset inventories, expanded coverage, and critical new capabilities including:</P>
<UL>
<LI>Security baseline assessments </LI>
<LI>Browser extension assessments</LI>
<LI>Digital certificate assessments</LI>
<LI>Network shares analysis</LI>
<LI>Blocking vulnerable applications </LI>
<LI>Vulnerability assessment for unmanaged endpoints</LI>
</UL>
<P>Microsoft Defender Vulnerability Management will be available in public preview as a standalone and as an add-on for Microsoft Defender for Endpoint Plan 2 customers.</P>
<P> </P>
<P><STRONG>For customers looking for a proactive, risk-based vulnerability management solution</STRONG>, <STRONG>Microsoft Defender Vulnerability Management</STRONG> helps you efficiently discover, assess, and remediate vulnerabilities and misconfigurations in one place<STRONG>. </STRONG>Get continuous asset visibility, consolidated inventories, intelligent assessment tools, risk-based prioritization, and built-in remediation workflows.</P>
<P><STRONG><A href="https://go.microsoft.com/fwlink/?linkid=2195338" target="_blank" rel="noopener noreferrer">Sign up</A> for the free 120-day public preview.</STRONG></P>
<P> </P>
<P> </P>
<P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Figure 1: Microsoft Defender Vulnerability Management provides all of Microsoft’s vulnerability management capabilities in a single solution." style="width: 936px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371189i17E480267E80BEA5/image-size/large?v=v2&px=999" role="button" title="Picture2.png" alt="Figure 1: Microsoft Defender Vulnerability Management provides all of Microsoft’s vulnerability management capabilities in a single solution." /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Figure 1: Microsoft Defender Vulnerability Management provides all of Microsoft’s vulnerability management capabilities in a single solution.</span></span></STRONG></P>
<P> </P>
<P><STRONG>For Microsoft Defender for Endpoint Plan 2 customers,</STRONG> seamlessly enhance your vulnerability management program with the <STRONG>Microsoft Defender Vulnerability Management add-on</STRONG>. Get consolidated inventories, expanded asset coverage, cross-platform support, and new assessment and mitigation tools. </P>
<P><STRONG><A href="https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2" target="_blank" rel="noopener noreferrer">Sign up</A> for the free 120-day public preview.</STRONG></P>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Figure 2: Microsoft Defender for Endpoint Plan 2 customers retain existing generally available vulnerability management tools, and can enhance their vulnerability management program with the Defender Vulnerability Management add-on." style="width: 936px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371215i46A6F0405208EE1D/image-size/large?v=v2&px=999" role="button" title="Picture3.png" alt="Figure 2: Microsoft Defender for Endpoint Plan 2 customers retain existing generally available vulnerability management tools, and can enhance their vulnerability management program with the Defender Vulnerability Management add-on." /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Figure 2: Microsoft Defender for Endpoint Plan 2 customers retain existing generally available vulnerability management tools, and can enhance their vulnerability management program with the Defender Vulnerability Management add-on.</span></span></P>
<H4 id="toc-hId-1122434778"> </H4>
<H4 id="toc-hId--685019685"><STRONG>The following capabilities are now available through public preview:</STRONG></H4>
<H3 id="toc-hId--695522789"> </H3>
<H3 id="toc-hId-1791990044"><STRONG><A href="https://docs.microsoft.com/microsoft-365/security/defender-vulnerability-management/tvm-security-baselines" target="_blank" rel="noopener noreferrer">Security baselines assessments</A></STRONG></H3>
<P>It’s critical to proactively manage your security posture and measure risk compliance. Instead of relying on point-in-time compliance scans, continuously monitor endpoints and assess customizable baselines against industry security benchmarks in real-time. At public preview, access Center for Internet Security (CIS) benchmarks and Security Technical Implementation Guides (STIG) benchmarks. Additional support for Microsoft security benchmarks will be coming soon.</P>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Figure 3: Review security baseline assessment results, identify non-compliant devices, top failing configurations, and the compliance level of each profile you create." style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371199i07076F363694B8F1/image-size/large?v=v2&px=999" role="button" title="Baseline assessment Tomer.jpg" alt="Figure 3: Review security baseline assessment results, identify non-compliant devices, top failing configurations, and the compliance level of each profile you create." /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Figure 3: Review security baseline assessment results, identify non-compliant devices, top failing configurations, and the compliance level of each profile you create.</span></span></P>
<P> </P>
<H3 id="toc-hId--15464419"><STRONG><A href="https://docs.microsoft.com/microsoft-365/security/defender-vulnerability-management/tvm-browser-extensions" target="_blank" rel="noopener noreferrer">Browser extension inventory and assessments</A></STRONG></H3>
<P>Browser extensions are software applications that add functionality to web browsers. Extensions usually need different types of permissions to run properly – such as requiring permissions to modify a webpage. Defender Vulnerability Management’s browser extensions inventory provides detailed information on the permissions requested by each extension and identifies those with the highest associated risk levels. Customers can now leverage these risk-based assessments to make informed, contextual decisions on managing extensions in their organization’s environment.</P>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Figure 4: Review all the extensions installed in your organization across Microsoft Edge, Google Chrome, and Mozilla Firefox, and identify those with the highest associated risk." style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371203i3D35430AB7E737AB/image-size/large?v=v2&px=999" role="button" title="Browser extensions base WDG.jpg" alt="Figure 4: Review all the extensions installed in your organization across Microsoft Edge, Google Chrome, and Mozilla Firefox, and identify those with the highest associated risk." /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Figure 4: Review all the extensions installed in your organization across Microsoft Edge, Google Chrome, and Mozilla Firefox, and identify those with the highest associated risk.</span></span></P>
<P> </P>
<H3 id="toc-hId--1822918882"><STRONG><A href="https://docs.microsoft.com/microsoft-365/security/defender-vulnerability-management/tvm-certificate-inventory" target="_blank" rel="noopener noreferrer">Digital certificate inventory and assessments</A></STRONG></H3>
<P>Digital certificates provide data encryption and authentication to ensure the secure transfer of information within your network and over the internet. Expired and misconfigured certificates can leave vulnerabilities in your organization, disrupt service, or cause outages.</P>
<P>The certificates inventory in Defender Vulnerability Management allows customers to easily discover, assess, and manage certificates in a single view:</P>
<UL>
<LI>Identify certificates that are about to expire so you can update them and prevent service disruption</LI>
<LI>Detect potential vulnerabilities due to the use of weak signature algorithms (e.g. SHA-1-RSA), short key size (e.g. RSA 512 bit) or weak signature hash algorithms (e.g. MD5)</LI>
<LI>Ensure compliance with regulatory guidelines and organizational policies </LI>
</UL>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Figure 5: Review all certificate-related assessments in a single location with the option to customize the inventory display using filters." style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371101iF31E63E6F751C102/image-size/large?v=v2&px=999" role="button" title="Certificates high res.jpg" alt="Figure 5: Review all certificate-related assessments in a single location with the option to customize the inventory display using filters." /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Figure 5: Review all certificate-related assessments in a single location with the option to customize the inventory display using filters.</span></span></P>
<P> </P>
<H3 id="toc-hId-664593951"><STRONG><A href="https://docs.microsoft.com/microsoft-365/security/defender-vulnerability-management/tvm-network-share-assessment" target="_blank" rel="noopener noreferrer">Network shares analysis</A></STRONG></H3>
<P>Organizations rely on internal network shares to send resources and provide access to files, documents, and media. As network shares can be easily accessed by network users, small common weaknesses can make network shares vulnerable. These types of misconfigurations are commonly used in the wild by attackers for lateral movement, reconnaissance, data exfiltration, and more. That’s why we built a new category of configuration assessments in Defender Vulnerability Management that identify the common weaknesses that expose your endpoints to attack vectors in Windows network shares.</P>
<P>Starting today, the following recommendations will be available as part of the new assessments:</P>
<UL>
<LI>Disallow offline access to shares</LI>
<LI>Remove shares from the root folder</LI>
<LI>Remove share write permission set to ‘Everyone’</LI>
<LI>Set folder enumeration for shares</LI>
</UL>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Figure 6: Get full visibility into excessive share permissions that allow write access to everyone. This view includes granular list views of the exposed devices and exposed shares across your environment, as well as descriptive remediation guidance." style="width: 936px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370967i7C7346F9BEFEB1EE/image-size/large?v=v2&px=999" role="button" title="Picture7.png" alt="Figure 6: Get full visibility into excessive share permissions that allow write access to everyone. This view includes granular list views of the exposed devices and exposed shares across your environment, as well as descriptive remediation guidance." /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Figure 6: Get full visibility into excessive share permissions that allow write access to everyone. This view includes granular list views of the exposed devices and exposed shares across your environment, as well as descriptive remediation guidance.</span></span></P>
<H3 id="toc-hId--1142860512"> </H3>
<H3 id="toc-hId-1344652321"><STRONG><A href="https://docs.microsoft.com/microsoft-365/security/defender-vulnerability-management/tvm-block-vuln-apps" target="_blank" rel="noopener noreferrer">Block vulnerable applications (Beta)</A></STRONG></H3>
<P>Remediating vulnerabilities in your organization can take time, but security admins can mitigate risk by taking immediate action to block all currently known vulnerable versions of applications. With Defender Vulnerability Management, customers can now block specific app versions for designated device groups, provide users with custom warning messages, and surface links to learn more on how to upgrade to approved versions. </P>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Figure 7: Mitigate risk by blocking vulnerable versions of software applications or warn users before they open identified vulnerable applications. End user messages can be customized for each application block." style="width: 936px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370969i2C503D7F9706F4A9/image-size/large?v=v2&px=999" role="button" title="Picture8.png" alt="Figure 7: Mitigate risk by blocking vulnerable versions of software applications or warn users before they open identified vulnerable applications. End user messages can be customized for each application block." /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Figure 7: Mitigate risk by blocking vulnerable versions of software applications or warn users before they open identified vulnerable applications. End user messages can be customized for each application block.</span></span></P>
<P>With application blocking, admins can rest easy knowing that vulnerable versions known to Microsoft are blocked on their endpoints. Additionally, admins can:</P>
<UL>
<LI>View devices impacted by this vulnerability to allow for device scoping</LI>
<LI>View file indicators created by this mitigation</LI>
<LI>Export the full list of SHA 256 indicators created by a mitigation for internal reporting & validation</LI>
</UL>
<H3 id="toc-hId--462802142"> </H3>
<P> </P>
<H3 id="toc-hId-1329547212"><STRONG>Vulnerability assessments for unmanaged endpoints (coming soon)</STRONG></H3>
<P>Comprehensive vulnerability management requires the assessment of all devices in your organization, including those that don't have Defender Vulnerability Management agents installed. When credentials are provided, Defender Vulnerability Management remotely scans unmanaged Windows devices for vulnerabilities and targets the devices by IP or range.</P>
<P>Capabilities include:</P>
<UL>
<LI>Dedicated scanners to remotely access Windows devices and provide posture assessments</LI>
<LI>Defender Vulnerability Management assessment and posture management tools for newly discovered unmanaged endpoints</LI>
<LI>Different authenticated methods including Azure Key Vault</LI>
</UL>
<P><EM>Note: This new capability is in private preview and will be publicly available in the next couple of weeks. </EM></P>
<P> </P>
<P><EM><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Figure 8: Create an authenticated scan job to detect software vulnerabilities on unmanaged devices." style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370972i2A43963AAC0A3B4A/image-size/large?v=v2&px=999" role="button" title="yossi2.png" alt="Figure 8: Create an authenticated scan job to detect software vulnerabilities on unmanaged devices." /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Figure 8: Create an authenticated scan job to detect software vulnerabilities on unmanaged devices.</span></span></EM></P>
<H3 id="toc-hId--477907251"> </H3>
<P> </P>
<H3 id="toc-hId-2009605582"><STRONG>Learn more & Get started</STRONG><STRONG> </STRONG></H3>
<OL>
<LI>Sign up for public preview.
<UL>
<LI>
<P>For customers interested in the full <STRONG>Defender Vulnerability Management solution</STRONG>, <A href="https://go.microsoft.com/fwlink/?linkid=2195338" target="_blank" rel="noopener noreferrer">sign up here<U>.</U></A></P>
</LI>
<LI>
<P>For Microsoft Defender for Endpoint Plan 2 customers interested in the <STRONG>Defender Vulnerability Management add-on</STRONG>, <A href="https://signup.microsoft.com/get-started/signup?products=5908ecaa-b8a7-4a04-b6c0-d44fd934b6f2" target="_blank" rel="noopener noreferrer">sign up here</A>.</P>
</LI>
</UL>
</LI>
<LI>Learn how to use Defender Vulnerability Management in our <U><A href="https://docs.microsoft.com/en-us/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management?view=o365-worldwide" target="_blank" rel="noopener noreferrer">documentation</A></U>.</LI>
<LI>Visit our webpage and download our solution brief.</LI>
</OL>
<P>We’re excited to hear your feedback and questions! As you explore these new capabilities, please visit us on our new <A href="https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/bg-p/Vulnerability-Management" target="_blank"><U>Tech Community page</U></A>.</P>
<P> </P>
Posted at <a href="">https://sl.advdat.com/38jZH0m</a>https://sl.advdat.com/38jZH0mADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-33668786102853162082022-05-12T11:27:00.001-04:002022-05-12T11:27:49.214-04:00Scale industrial IoT with unified data from industrial assets with Omnio IoT<P>Since 2009 I have been at the forefront of creating value from industrial IoT (IIoT). I have seen first-hand that using asset data to do remote monitoring, predictive maintenance, and energy management across thousands of devices creates significant value and sustainability potential – but the process to go from idea to scaled implementation requires the consistent collection of unified data from industrial assets. This is easier said than done across the multitude of manufacturers, device types, and implementations you find on a typical company site. To manage this, you need a software layer that can remove complexity and allow you to focus on reaping the benefits for your business.</P>
<P> </P>
<P>That is why we have built Omnio Edge: the unified data layer for industrial IoT. Organizations around the world are already using Omnio Edge to connect anything from sensors to more complex devices and all the way to PLCs, CNC machines, and OPC UA servers in a few minutes. Thanks to the unique unification layer, the data delivered from the different assets are always unified to a common model. This allows the data to flow effortlessly into algorithms, applications, and platforms such as Azure IoT Central - while you can focus on getting value from the data.</P>
<P> </P>
<P align="center"><IFRAME src="https://www.youtube.com/embed/5cEJJmQtjps" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen" title="Get unified data from industrial assets in minutes" allow="accelerometer;autoplay;clipboard-write;encrypted-media;gyroscope;picture-in-picture"></IFRAME></P>
<P> </P>
<H2 id="toc-hId-419531033">About Omnio</H2>
<P> </P>
<P>Founded in 2017 and headquartered in Copenhagen, Omnio enables organizations such as ABB, IBM, and RS Components to connect assets and generate value for themselves and their customers. Thanks to our long Industry background, we understand the use-cases and the challenges you face and we build software to solve them best possible.</P>
<P> </P>
<H2 id="toc-hId--1387923430">Unified data is the key to success</H2>
<P> </P>
<P>Whether you are connecting sensors, devices, PLCs, CNCs, or even OPC UA servers, the unification and data quality is paramount to success. Omnio Edge is built for both green and brownfield locations – and handles everything from making it easy to see which data is available in your assets, extracting it, transforming it into a unified data model, and delivering it to where you need it. Together with Microsoft, we have built the simplest way to securely connect all your assets, generate the digital twin device model, and ship data to Azure IoT Edge, IoT Hub, or IoT Central.</P>
<P> </P>
<P align="center"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="mcsomnio_0-1652084406664.png" style="width: 800px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370128i50E3E8DF5E69D659/image-dimensions/800x252?v=v2" width="800" height="252" role="button" title="mcsomnio_0-1652084406664.png" alt="mcsomnio_0-1652084406664.png" /></span></P>
<P> </P>
<P>Using Omnio Edge you can instantly connect any of the 75.000 supported models of Modbus, Ethernet/IP and Profinet devices such as power meters, sensors, drives and many more. You can also connect any BACnet device with the built-in data discovery capability, as well as Siemens S7 PLCs, Allen-Bradley PLCs, CNC machines through MTConnect and of course OPC UA servers you may already have on the location. All data will be extracted and unified at the edge, and delivered straight to where you need it – unified and ready for use.</P>
<P> </P>
<H2 id="toc-hId-1099589403">Ease of use unleashes the potential</H2>
<P> </P>
<P>Let us take an example – connecting a couple of devices to Azure IoT Central, using Omnio Edge. In this case, we will connect a Modbus power meter from IME and a VFD from Schneider Electric.</P>
<P> </P>
<P>First, we create a new configuration in the Omnio Config tool. We add an Azure IoT Central endpoint using the URL of the IoT Central instance and the API key generated in the IoT Central.</P>
<P> </P>
<P align="center"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="mcsomnio_1-1652084406691.png" style="width: 800px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370127i982987BE41197BB0/image-dimensions/800x315?v=v2" width="800" height="315" role="button" title="mcsomnio_1-1652084406691.png" alt="mcsomnio_1-1652084406691.png" /></span></P>
<P> </P>
<P>Next, we add the devices either through scanning the network or adding the details manually if network security does not allow for scanning. Adding devices manually means choosing the device from the library and adding the IP of the device.</P>
<P> </P>
<P align="center"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="mcsomnio_2-1652084406833.png" style="width: 800px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370129i4CD9B83727C5B3C5/image-size/large?v=v2&px=999" role="button" title="mcsomnio_2-1652084406833.png" alt="mcsomnio_2-1652084406833.png" /></span></P>
<P> </P>
<P>Last, we pick the data we want from the devices. Note how the Omnio logo signifies a variable that we have standardized – ensuring that naming, units of measurement and data structure is standardized. Behind the scenes, Omnio Edge fetches all the data and performs any additional calculations needed to deliver the data correctly.</P>
<P> </P>
<P align="center"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="mcsomnio_3-1652084406967.png" style="width: 800px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370131i44D23ACA69E32CAC/image-size/large?v=v2&px=999" role="button" title="mcsomnio_3-1652084406967.png" alt="mcsomnio_3-1652084406967.png" /></span></P>
<P> </P>
<P>And that is it! Once we click Save and deploy, Omnio will automatically create the two devices, including the DTDL Device Model via IoT Central APIs. Omnio Edge will connect and provision the devices with DPS and data will start flowing.</P>
<P> </P>
<P align="center"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="mcsomnio_4-1652084407036.png" style="width: 800px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370130i134520F5ABC58EC3/image-size/large?v=v2&px=999" role="button" title="mcsomnio_4-1652084407036.png" alt="mcsomnio_4-1652084407036.png" /></span></P>
<P> </P>
<P>The device template is fully populated with unified names and semantics – enabling you to quickly build a dashboard such as this:</P>
<P> </P>
<P align="center"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="mcsomnio_5-1652084407128.png" style="width: 800px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370132i2395424C24748AAA/image-size/large?v=v2&px=999" role="button" title="mcsomnio_5-1652084407128.png" alt="mcsomnio_5-1652084407128.png" /></span></P>
<P> </P>
<P>In this dashboard, you can now track the power consumption and other parameters you can use for optimizing energy and ensuring uptime of the equipment.</P>
<P><STRONG> </STRONG></P>
<H2 id="toc-hId--707865060">Scaling from 1 to 100, to 1000 and beyond</H2>
<P> </P>
<P>Connecting your first devices is only the beginning – but the ease and unification stay with you to enable the scalability of your solution. Once you have built an application, which you want to use at scale, connecting more assets to it is simple. If you have connected 1 power meter you will likely connect more and with the unification layer in Omnio Edge you can be sure the data will always be unified to the same model and slot directly into your application – and the same is the case for your other devices, sensors, PLCs and whatever else you want to connect.</P>
<P><STRONG> </STRONG></P>
<H2 id="toc-hId-1779647773">Bottomline</H2>
<P> </P>
<P>Building value-adding IoT applications requires the capability to easily connect unified device data, iterate until you are satisfied – and then connect many more assets to the application. This is only possible with a solution that ensures ease-of-use and unified data across your devices. With Omnio Edge you can get started quickly and scale effortlessly, enabling you to unleash the potential of the data in your assets.</P>
Posted at <a href="">https://sl.advdat.com/3L6n8HF</a>https://sl.advdat.com/3L6n8HFADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-85657090645890890892022-05-12T11:25:00.001-04:002022-05-12T11:25:22.797-04:00Microsoft session highlights from SAP Sapphire 2022Microsoft and SAP are celebrating the one-year anniversary of RISE with SAP on the Microsoft Cloud, which helps organizations of all sizes accelerate their move of SAP solutions to the cloud. As you prepare your agenda for the event, be sure to take in some of the following sessions featuring Microsoft so you can better understand how Microsoft Cloud can help accelerate your SAP transition.
Posted at <a href="https://sl.advdat.com/3Mm1qAI">https://sl.advdat.com/3Mm1qAI</a>ADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-73406425893472265102022-05-12T10:57:00.001-04:002022-05-12T10:57:47.392-04:00Search, Investigate, & Respond to Indicators of Compromise with the Threat Intelligence Workbook<P>How do you handle threat indicators in your workloads? Threat intelligence indicators are often the trigger for incident response investigations, yet many organizations struggle to ingest and make sense of their threat intelligence data. Microsoft Sentinel is a cloud native SIEM that allows customers to import threat intelligence data from various sources, including as paid threat feeds, open-source feeds (including Threat Intelligence Platforms (TIPs) across STIX & TAXII), and threat intelligence sharing communities. Threat intelligence indicators alone don’t provide significant value to security teams without operationalizing the data. As a result, once feeds are onboarded, organizations require a method to evaluate quality, health, and throughput of threat intelligence sources.</P>
<P> </P>
<P>The next evolution of the Threat Intelligence Workbook to provides enhanced capabilities in both indicator ingestion and indicator search, <STRONG>empowering organizations to not only ingest indicators across their workloads, but also to operationalize this data for investigation and response. </STRONG><STRONG>This solution provides a starting point for building threat intelligence programs, which require the ability to both ingest and correlate threat data across cloud workloads.</STRONG></P>
<P> </P>
<P>For example, indicator search provides a free-text search of indicators (IP address, file, hash, email address, username) to determine:</P>
<P> </P>
<UL>
<LI>Indicators in your data</LI>
<LI>Pattern of the indicator over time</LI>
<LI>Reporting threat intelligence feed and details</LI>
<LI>Security Incidents for investigation and response</LI>
</UL>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Search, Investigate, & Respond to Indicators of Compromise" style="width: 977px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371195iEAE2CE0334DB0B1C/image-dimensions/977x486?v=v2" width="977" height="486" role="button" title="Picture1.gif" alt="Search, Investigate, & Respond to Indicators of Compromise" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Search, Investigate, & Respond to Indicators of Compromise</span></span></P>
<P> </P>
<P><FONT size="4" color="#2356EF"><STRONG>Use cases</STRONG></FONT></P>
<P>There are several use cases for the Microsoft Sentinel Threat Intelligence Workbook depending on user roles and requirements. Common use cases include threat hunting, developing alerting, and conducting research with custom reporting.</P>
<P>The workbook is organized into two sections:</P>
<UL>
<LI><STRONG>Indicators Ingestion:</STRONG> Evaluate indicators onboarded, threat feeds, and confidence ratings.</LI>
<LI><STRONG>Indicator Search:</STRONG> Free text search indicators across your cloud workloads.</LI>
</UL>
<P><FONT size="4" color="#2356EF"><STRONG>Benefits</STRONG></FONT></P>
<UL>
<LI>Ingest, analyze, hunt for indicators within cloud, on-premises, multi-cloud, 1<SUP>st</SUP>/3<SUP>rd</SUP> party workloads</LI>
<LI>Free text search to hunt for IPs, hash, user account, emails etc. across your data</LI>
<LI>Investigate and respond to threat intelligence indicators</LI>
</UL>
<P><FONT size="4" color="#2356EF"><STRONG>Audience</STRONG></FONT></P>
<UL>
<LI><EM>Threat Intelligence Professionals: </EM>Investigations</LI>
<LI><EM>SecOps: </EM>Alert/Automation building</LI>
<LI><EM>MSSP: </EM>Consultants, Managed Service Providers</LI>
</UL>
<P> </P>
<P><div class="video-embed-center video-embed"><iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F4Bet2oVODow%3Ffeature%3Doembed&display_name=YouTube&url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D4Bet2oVODow&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F4Bet2oVODow%2Fhqdefault.jpg&key=fad07bfa4bd747d3bdea27e17b533c0e&type=text%2Fhtml&schema=youtube" width="600" height="337" scrolling="no" title="Microsoft Sentinel: Threat Intelligence Workbook Demo" frameborder="0" allow="autoplay; fullscreen" allowfullscreen="true"></iframe></div></P>
<P> </P>
<P><FONT size="4" color="#2356EF"><STRONG>Getting started</STRONG></FONT></P>
<UL>
<LI><A href="https://docs.microsoft.com/azure/sentinel/quickstart-onboard" target="_blank" rel="noopener noreferrer">Onboard Microsoft Sentinel</A></LI>
<LI><A href="https://docs.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-tip" target="_blank" rel="noopener noreferrer">Connect Threat Intelligence Platforms</A></LI>
<LI><A href="https://docs.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-taxii" target="_blank" rel="noopener noreferrer">Connect STIX/TAXII Feeds</A></LI>
<LI>Update Workbook Version
<UL class="lia-list-style-type-circle">
<LI>Microsoft Sentinel > Workbooks > Search “Threat Intelligence” > Select “Update” in bottom right</LI>
</UL>
</LI>
</UL>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Update Your Threat Intelligence Workbook" style="width: 400px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371194i292DA9458AB10CAA/image-size/medium?v=v2&px=400" role="button" title="TJBanasik_2-1652365492776.png" alt="Update Your Threat Intelligence Workbook" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Update Your Threat Intelligence Workbook</span></span></P>
<P> </P>
<UL>
<LI>Access Workbook
<UL class="lia-list-style-type-circle">
<LI>Microsoft Sentinel > Threat Intelligence > Threat Intelligence Workbook</LI>
</UL>
</LI>
</UL>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Access the Threat Intelligence Workbook" style="width: 977px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371191i619E9216BBDA3C44/image-dimensions/977x542?v=v2" width="977" height="542" role="button" title="TJBanasik_1-1652365456449.png" alt="Access the Threat Intelligence Workbook" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Access the Threat Intelligence Workbook</span></span></P>
<P> </P>
<UL>
<LI> Review the content and provide feedback through our <A href="https://forms.office.com/r/n9beey85aP" target="_blank" rel="noopener noreferrer">survey</A></LI>
</UL>
<P> </P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ingest, Search, & Respond to Indicators of Compromise in Workloads" style="width: 977px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371190iC7EE98F5B919C0B5/image-size/large?v=v2&px=999" role="button" title="TJBanasik_0-1652365404014.png" alt="Ingest, Search, & Respond to Indicators of Compromise in Workloads" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Ingest, Search, & Respond to Indicators of Compromise in Workloads</span></span></P>
<P> </P>
<P><FONT size="4" color="#2356EF"><STRONG>Frequently asked questions</STRONG></FONT></P>
<UL>
<LI>Why is Threat Intelligence needed?
<UL class="lia-list-style-type-circle">
<LI>Correlate <A href="https://docs.microsoft.com/en-us/azure/sentinel/understand-threat-intelligence" target="_blank" rel="noopener noreferrer">Cyber Threat Intelligence Indicators (CTI)</A> observed in your workloads</LI>
</UL>
</LI>
<LI>What types of indicators of compromise are included?
<UL class="lia-list-style-type-circle">
<LI><A href="https://docs.microsoft.com/en-us/azure/sentinel/work-with-threat-indicators" target="_blank" rel="noopener noreferrer">IP Addresses, URLs, Domains, Email Senders, File Hashes</A></LI>
</UL>
</LI>
<LI>Is Multi-Subscription & Multi-Tenant supported?
<UL class="lia-list-style-type-circle">
<LI>Yes, via <A href="https://docs.microsoft.com/en-us/azure/azure-monitor/visualize/workbooks-parameters" target="_blank" rel="noopener noreferrer">Workbook Parameters</A> and <A href="https://docs.microsoft.com/en-us/azure/lighthouse/overview" target="_blank" rel="noopener noreferrer">Azure Lighthouse</A></LI>
</UL>
</LI>
<LI>Is custom reporting available?
<UL class="lia-list-style-type-circle">
<LI>Yes, via guide, time, workspace, & subscription parameters</LI>
</UL>
</LI>
<LI>Is 3rd Party integration supported?
<UL class="lia-list-style-type-circle">
<LI>Yes, via TAXII Connectors and Microsoft Sentinel: Incidents</LI>
</UL>
</LI>
<LI>Is this available in government regions?
<UL class="lia-list-style-type-circle">
<LI> Yes, Microsoft Sentinel Threat Intelligence is <A href="https://techcommunity.microsoft.com/t5/azure-sentinel/general-availability-of-azure-sentinel-threat-intelligence-in/ba-p/2525227" target="_blank">Generally Available</A> in Commercial/Government regions</LI>
</UL>
</LI>
<LI>Can this content be exported as a report?
<UL class="lia-list-style-type-circle">
<LI> Yes, via Print Workbooks and Download Artifacts features</LI>
</UL>
</LI>
<LI>Is STIX/TAXI Integrated?
<UL class="lia-list-style-type-circle">
<LI>Yes, the content scales via <A href="https://docs.microsoft.com/en-us/azure/sentinel/threat-intelligence-integration" target="_blank" rel="noopener noreferrer">Connectors</A> which populate in the <A href="https://docs.microsoft.com/en-us/azure/azure-monitor/reference/tables/threatintelligenceindicator" target="_blank" rel="noopener noreferrer">Threat Intelligence Indicator</A> data table</LI>
</UL>
</LI>
<LI>What if a threat indicator is observed in the workbook?
<UL class="lia-list-style-type-circle">
<LI>Guide your investigation to determine where in your data the indicator was observed, determine how the indicator is classified by the threat intelligence feed, and pivot into Microsoft Sentinel Incidents for investigation/response</LI>
</UL>
</LI>
<LI> What rights are required to use this content?
<UL class="lia-list-style-type-circle">
<LI><A href="https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#azure-sentinel-contributor" target="_blank" rel="noopener noreferrer">Microsoft Sentinel Contributor</A> can, create and edit workbooks, analytics rules, and other Microsoft Sentinel resources. <A href="https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#azure-sentinel-reader" target="_blank" rel="noopener noreferrer">Microsoft Sentinel Reader</A> can view data, incidents, workbooks, and other Microsoft Sentinel resources</LI>
</UL>
</LI>
</UL>
<P> </P>
<H3 id="toc-hId--1375459797"><FONT size="4" color="#2356EF"><STRONG>Learn more about Threat Intelligence with Microsoft Security</STRONG></FONT></H3>
<UL>
<LI><A href="https://techcommunity.microsoft.com/t5/azure-sentinel/general-availability-of-azure-sentinel-threat-intelligence-in/ba-p/2525227" target="_blank">General Availability of Microsoft Sentinel Threat Intelligence in Public and Azure Government cloud</A></LI>
<LI><A href="https://docs.microsoft.com/en-us/azure/sentinel/understand-threat-intelligence" target="_blank" rel="noopener noreferrer">Understand threat intelligence in Microsoft Sentinel</A></LI>
<LI><A href="https://www.bing.com/aclk?ld=e8mIHbtaOUdGRIlOCkrqe44jVUCUy8kGGQn-qM3UnAsuf-wHAeYkdkFxzS4vgJKPTAl1q57OJgI0LdZ0VHWDoo1EaLo3PlZ-EcFUo4fmAqpE-8K4VOQD78y65T0_iiZ_9UpL9tD0izWc82xqzAxlTnVP7Mo1E1PiqSSdvqA_qMog2hpwYPL4GyMbDXt2FW05rIuDXKiw&u=aHR0cHMlM2ElMmYlMmZ3d3cubWljcm9zb2Z0LmNvbSUyZmVuLXVzJTJmc2VjdXJpdHklMmZidXNpbmVzcyUyZiUzZmVmX2lkJTNkOWI0MTQ0ZGY2ZTYzMTNhZDE4YTYyNTgzZTFkYjU3ZWYlM2FHJTNhcyUyNk9DSUQlM2RBSUQyMjAwOTM4X1NFTV85YjQxNDRkZjZlNjMxM2FkMThhNjI1ODNlMWRiNTdlZiUzYUclM2FzJTI2bXNjbGtpZCUzZDliNDE0NGRmNmU2MzEzYWQxOGE2MjU4M2UxZGI1N2Vm&rlid=9b4144df6e6313ad18a62583e1db57ef&ntb=1" target="_blank" rel="noopener nofollow noreferrer">Microsoft Threat Intelligence | Unparalleled Threat Detection</A></LI>
</UL>
<P> </P>
Posted at <a href="">https://sl.advdat.com/37ElTlt</a>https://sl.advdat.com/37ElTltADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-38568786212918640992022-05-12T10:27:00.001-04:002022-05-12T10:27:48.319-04:00Security Settings Management in Microsoft Defender for Endpoint is now generally available<P><STRONG><SPAN data-contrast="auto">Security Settings Management in Microsoft Defender for Endpoint is now generally available </SPAN></STRONG><EM>(3 min.)</EM><STRONG><SPAN data-contrast="auto"><BR /></SPAN></STRONG><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"><BR /></SPAN></P>
<P><SPAN data-contrast="none">Preventing data breaches and maintaining compliance are at the top of every organization’s agenda. It is essential for IT and security teams to develop a more cohesive partnership that embraces collaboration to enable business and drive future success.<BR /></SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"><BR /></SPAN></P>
<P><SPAN data-contrast="none">Microsoft is privileged to sit at the intersection of IT and Security and continuously looks for opportunities to advance integration between security and IT management.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-contrast="none"><BR />In late</SPAN><SPAN data-contrast="none"> 2021, we </SPAN><A href="https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/endpoint-security-for-unenrolled-defender-for-endpoint-devices/ba-p/2822656" target="_blank"><SPAN data-contrast="none">announced</SPAN></A><SPAN data-contrast="none"> that</SPAN> <SPAN data-contrast="auto">Microsoft Defender for Endpoint expanded its configuration management capabilities</SPAN><SPAN data-contrast="none">. This release empowered security teams to configure devices with their desired security settings without</SPAN><SPAN data-contrast="none"> needing to deploy and implement additional tools or infrastructure.</SPAN><SPAN data-contrast="none"> </SPAN> <SPAN data-contrast="none">Made possible with Microsoft Endpoint Manager, organizations have been able to manage antivirus (AV), endpoint detection and response (EDR), and firewall (FW) policies from a single view for all enlisted devices.<BR /></SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"><BR /></SPAN></P>
<P><SPAN data-contrast="none">Today, we are announcing that this capability is now generally available for Windows client and Windows server, supporting Windows 10, Windows 11, and Windows Server 2012 R2 or later.<BR /></SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"><BR /></SPAN></P>
<P><FONT size="5"><STRONG><SPAN data-contrast="none">Before you begin</SPAN></STRONG></FONT><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"><BR /></SPAN></P>
<P><SPAN data-contrast="none">This capability was designed for the following use cases:</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<UL>
<LI data-leveltext="" data-font="Symbol" data-listid="4" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><SPAN data-contrast="none">Managing devices traditionally out of scope for management because of support (OS Platform) or use case (servers in a network segment without management presence)</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></LI>
<LI data-leveltext="" data-font="Symbol" data-listid="4" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><SPAN data-contrast="none">Providing management capability to organizations that previously did not have access to tooling</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></LI>
</UL>
<P><FONT size="5"><STRONG style="font-family: inherit;"><SPAN data-contrast="none">Get started</SPAN></STRONG></FONT></P>
<P><SPAN data-contrast="none">Use the following recommended best practices to begin your endpoint security management journey with Microsoft Defender for Endpoint:</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P> </P>
<P><FONT size="5"><STRONG><SPAN data-contrast="auto">Configure your tenant</SPAN></STRONG></FONT></P>
<P><SPAN data-contrast="auto">After verifying the tenant meets the </SPAN><A href="https://docs.microsoft.com/microsoft-365/security/defender-endpoint/security-config-management?view=o365-worldwide#prerequisites" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">pre-requisites</SPAN></A><SPAN data-contrast="auto">, enabling the feature requires turning on relevant toggles both in Microsoft Defender for Endpoint and Microsoft Endpoint Manager. All these steps are </SPAN><A href="https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/security-config-management?view=o365-worldwide#configure-your-tenant-to-support-microsoft-defender-for-endpoint-security-configuration-management" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">documented here</SPAN></A><SPAN data-contrast="auto">.<BR /></SPAN><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"><BR /></SPAN></P>
<P><SPAN data-contrast="auto"><U><STRONG>Note</STRONG></U>: Customers that will leverage Azure Active Directory Hybrid Join for a device identity may need to make updates to Azure Active Directory Connection (AAD Connect). These changes may include ensuring devices are ‘in-scope’ for device join, or additional configuration for Windows Server 2012 R2. Please review the </SPAN><A href="https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/security-config-management?view=o365-worldwide" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">documentation</SPAN></A><SPAN data-contrast="auto"> for more details.<BR /><BR /></SPAN><FONT size="5"><STRONG><SPAN data-contrast="auto">Test the feature end-to-end</SPAN></STRONG></FONT><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"><FONT size="5"> </FONT><BR /></SPAN></P>
<P><FONT size="4"><I><SPAN data-contrast="auto">Step 1: Enable the feature in pilot mode in Microsoft Defender for Endpoint<BR /><BR /></SPAN></I></FONT><I></I><I></I></P>
<P><SPAN data-contrast="auto">Prior to enabling the feature for all OS platforms, we recommend testing the feature on a limited scope of devices by leveraging our “Pilot mode” capability. This will enable you to target specific devices to test Microsoft Defender for Endpoint Security Configuration Settings Management. You will need to tag the devices with the “MDE-Management” tag so that it gets managed by Microsoft Defender for Endpoint.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Caroline_Lee_0-1652362338474.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371164iBDE9419A84388FBB/image-size/large?v=v2&px=999" role="button" title="Caroline_Lee_0-1652362338474.png" alt="Caroline_Lee_0-1652362338474.png" /></span></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><I><SPAN data-contrast="auto"><FONT size="4">Step 2: Create a dedicated Azure Active Directory (AAD) Group</FONT><FONT size="1 2 3 4 5 6 7"><BR /></FONT><BR /></SPAN></I><SPAN data-contrast="auto">As our </SPAN><A href="https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-preview-of-new-security-management-capabilities-for/ba-p/3020514" target="_blank"><SPAN data-contrast="none">preview blog post outlined</SPAN></A><SPAN data-contrast="auto">, devices will first establish a trust with Azure Active Directory. Once the device appears in AAD, it can be added to an AAD group.<BR /><BR /></SPAN></P>
<P><SPAN data-contrast="auto">As part of the testing of MDE Settings Management, our recommendation is that you </SPAN><A href="https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/security-config-management?view=o365-worldwide#create-azure-ad-groups" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">create a dedicated AAD group for all devices enrolled to AAD via Microsoft Defender for Endpoint Security Configuration Settings Management</SPAN></A><SPAN data-contrast="auto">. This can be done by creating an AAD group, using dynamic grouping capabilities, and based on the dedicated System Labels we’re adding to devices.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> <BR /><BR /></SPAN></P>
<P><I><SPAN data-contrast="auto"><FONT size="4">Step 3: Target a security policy from Microsoft Endpoint Manager</FONT><BR /></SPAN></I><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-contrast="auto">Using Microsoft Endpoint Manager admin center, administrators can use the Endpoint Security blade to create antivirus (AV), endpoint detection and response (EDR), and firewall (FW) policies to be enforced on devices via Microsoft Defender for Endpoint Security Settings Management.<BR /></SPAN><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Caroline_Lee_1-1652362338476.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371165i7742231F84376528/image-size/large?v=v2&px=999" role="button" title="Caroline_Lee_1-1652362338476.png" alt="Caroline_Lee_1-1652362338476.png" /></span></P>
<P> </P>
<P><SPAN data-contrast="auto">Create the policy of your choice, and when required to target it to an AAD group, select the AAD group you just created in step 2.<BR /></SPAN><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><FONT size="4"><I><SPAN data-contrast="auto">Step 4: Validate the policy assignment<BR /></SPAN></I><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></FONT></P>
<P><SPAN data-contrast="auto">Wait for the policy to be enforced on the device and view a success indication in the Microsoft Endpoint Manager portal. Note that policies are typically enforced within an hour after configuration. On the client, run the </SPAN><A href="https://docs.microsoft.com/en-us/powershell/module/defender/get-mppreference?view=windowsserver2022-ps#examples" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">Get-MpPreference</SPAN></A><SPAN data-contrast="auto"> command utility to validate the settings have effectively been assigned.</SPAN></P>
<P> </P>
<P><FONT size="5"><STRONG><SPAN data-contrast="auto">Troubleshoot issues</SPAN></STRONG></FONT><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-contrast="auto">Ran into issues? Getting an error in the device page of the Microsoft Defender for Endpoint portal? </SPAN><A href="https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/troubleshoot-security-config-mgt?view=o365-worldwide" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">Our troubleshooting guide</SPAN></A><SPAN data-contrast="auto"> is here to help.<BR /></SPAN><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"><BR /></SPAN></P>
<P><SPAN data-contrast="auto">From the Microsoft Defender for Endpoint portal to the Client analyzer, we have made sure all your favorite troubleshooting tools will point to actionable recommendations so that devices encountering issues will succeed in this flow. We strongly recommend fixing any issues and becoming familiar with our troubleshooting capabilities prior to turning the feature on throughout the tenant.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P> </P>
<P><FONT size="5"><STRONG><SPAN data-contrast="auto">Enable Microsoft Defender for Endpoint Security Settings Management per OS Platform</SPAN></STRONG><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></FONT></P>
<P><SPAN data-contrast="auto">Our end goal has always been for Microsoft Defender for Endpoint to independently identify unmanaged devices and bring them into management automatically thanks to </SPAN><SPAN data-contrast="auto">Security Management for Microsoft Defender for Endpoint</SPAN><SPAN data-contrast="auto">. Once devices are enrolled, refer to the security settings management page located within the Microsoft 365 Defender portal and turn on the feature for the operating system platform you need.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Caroline_Lee_2-1652362338478.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371166i3A6311F939078797/image-size/large?v=v2&px=999" role="button" title="Caroline_Lee_2-1652362338478.png" alt="Caroline_Lee_2-1652362338478.png" /></span></P>
<P><SPAN><BR /></SPAN><SPAN data-contrast="auto">After applying this configuration setting, Microsoft Defender for Endpoint will continuously monitor your environment for unmanaged devices that match the OS selection and target them with security policies.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559685":720,"335559739":160,"335559740":259}"> </SPAN></P>
<P><FONT size="5"><STRONG><SPAN data-contrast="none">What </SPAN></STRONG><STRONG><SPAN data-contrast="none">to expect next</SPAN></STRONG><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></FONT></P>
<P><SPAN data-contrast="auto">We are working on expanding this capability to help cover more use case scenarios. Please reach out if you would like to share your experience or provide feedback regarding Microsoft Defender for Endpoint Security Settings Management!</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
Posted at <a href="">https://sl.advdat.com/38p6827</a>https://sl.advdat.com/38p6827ADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-68860272683285587632022-05-12T09:27:00.001-04:002022-05-12T09:27:46.075-04:00Lesson Learned #203: How do I know that my connection is using Redirect connectivity policy?<P>Today, I worked in a service request that our customer wanted to confirm if effectively they are using redirect connection policy. </P>
<P>Answering this question, we need to know the following terms:</P>
<P> </P>
<UL>
<LI>Redirect means that the application will use as a <A href="https://docs.microsoft.com/en-us/azure/azure-sql/database/connectivity-architecture?view=azuresql" target="_self" rel="noopener noreferrer">destination port</A> within a range between 11000 to 12000 besides the first connection that will use 1433.</LI>
<LI>If you are using Private Link, currently, the connection that will be proxy even if you have in the portal default or redirect setting on in the connection policy. </LI>
</UL>
<P>Second will be, how to know this. Well using a network trace will be the best option, but, we have other ways to confirm it:</P>
<P> </P>
<UL>
<LI>Running the <A href="https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/netstat" target="_self" rel="noopener noreferrer">netstats -anob</A> using a command prompt window with administrative setting, to know the application and ports opened.</LI>
<LI>Using <A href="https://docs.microsoft.com/en-us/sysinternals/downloads/tcpview" target="_self" rel="noopener noreferrer">TCPView</A></LI>
<LI>Running the <A href="https://techcommunity.microsoft.com/t5/azure-database-support-blog/lesson-learned-196-latency-and-execution-time-in-azure-sql/ba-p/3282459" target="_self">PowerShell Script</A> that you could know per application/process the port open. For example, using this tool we could see the following:</LI>
</UL>
<P style=" padding-left : 60px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jose_Manuel_Jurado_0-1652360383430.png" style="width: 595px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/371155i61D81202BCCAF675/image-dimensions/595x198?v=v2" width="595" height="198" role="button" title="Jose_Manuel_Jurado_0-1652360383430.png" alt="Jose_Manuel_Jurado_0-1652360383430.png" /></span></P>
<P> </P>
<P>Enjoy!</P>
Posted at <a href="">https://sl.advdat.com/3w5730I</a>https://sl.advdat.com/3w5730IADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-49056213014769752822022-05-12T06:27:00.001-04:002022-05-12T06:27:40.018-04:00Learn Containers and Kubernetes from Microsoft Learn!<P>If you’re like me a few years ago, just hearing about Containers and Kubernetes or looking at some demos or documentation, would make your head spin. The transition from traditional IT to this new model of running compute resources, is not natural or simple. It requires understanding of another form of thinking about how to allocate resources, how to build the architecture of applications, and how to manage the environment.</P>
<P>With that in mind, I wanted to provide a path for you to start your journey with Containers and Kubernetes by leveraging the content of <A href="https://docs.microsoft.com/learn/" target="_blank" rel="noopener noreferrer">Microsoft Learn</A>.</P>
<P> </P>
<P><FONT size="5">What is Docker and Containers?</FONT></P>
<P>These are some of the modules I’d recommend to better understand what containers are, what Docker has to do with the containers technology, and more specifically, how containers work on Windows:</P>
<UL>
<LI><A href="https://docs.microsoft.com/learn/modules/intro-to-docker-containers/" target="_blank" rel="noopener noreferrer">Introduction to Docker containers</A></LI>
<LI><A href="https://docs.microsoft.com/learn/modules/run-containers-windows-server/" target="_blank" rel="noopener noreferrer">Run containers on Windows Server</A>
<UL>
<LI>This last module is a bit outdated and will feature new content soon!)</LI>
</UL>
</LI>
</UL>
<P> </P>
<P><FONT size="5">Kubernetes and Azure Kubernetes Service</FONT></P>
<P>The next step after understanding containers is to look into container orchestration. Kubernetes is the orchestrator of choice today, and we have tons of content for you:</P>
<UL>
<LI><A href="https://docs.microsoft.com/learn/modules/intro-to-kubernetes/" target="_blank" rel="noopener noreferrer">Introduction to Kubernetes</A>
<UL>
<LI>Teaches what Kubernetes is on a high level, very generic way.</LI>
</UL>
</LI>
<LI><A href="https://docs.microsoft.com/learn/modules/intro-to-azure-kubernetes-service/" target="_blank" rel="noopener noreferrer">Introduction to Azure Kubernetes Service</A>
<UL>
<LI>Introduces you to the Azure managed version of Kubernetes – Azure Kubernetes Service.</LI>
</UL>
</LI>
<LI><A href="https://docs.microsoft.com/learn/modules/manage-azure-kubernetes-service-azure-stack-hci/" target="_blank" rel="noopener noreferrer">Manage Azure Kubernetes Service on Azure Stack HCI</A>
<UL>
<LI>If you’re planning to run Kubernetes on-premises, this course gives you an overview of running AKS on Azure Stack HCI.</LI>
</UL>
</LI>
</UL>
<P> </P>
<P><FONT size="5">Workload deployment and Networking with AKS</FONT></P>
<P>Now that you understand the concepts of containers and Kubernetes, it’s time to look at some more complex activities:</P>
<UL>
<LI><A href="https://docs.microsoft.com/learn/modules/aks-deploy-container-app/" target="_blank" rel="noopener noreferrer">https://docs.microsoft.com/learn/modules/aks-deploy-container-app/</A>
<UL>
<LI>This module provides an example of deploying Windows and Linux nodes on AKS, but only a Linux application. We’ll be adding some Windows examples in the future, but the example does a great job of showing the basics.</LI>
</UL>
</LI>
<LI><A href="https://docs.microsoft.com/learn/modules/choose-network-plugin-aks/" target="_blank" rel="noopener noreferrer">Choose the best networking plugin for AKS</A>
<UL>
<LI>Getting your app up and running in Kubernetes is one thing. It’s whole other to get it with the right networking configuration and this module helps you understand the plugin options in AKS and when to use which.</LI>
</UL>
</LI>
<LI><A href="https://docs.microsoft.com/en-us/learn/modules/aks-network-design-azure-container-network-interface/" target="_blank" rel="noopener noreferrer">Design an Azure Kubernetes Service network with Azure CNI</A>
<UL>
<LI>After you understand the basics of each plugin, this module covers the design options for production workloads with the Azure CNI.</LI>
</UL>
</LI>
</UL>
<P> </P>
<P><FONT size="5">Hands-on exercise!</FONT></P>
<P>The above will give a great view on containers and Kubernetes. However, there’s nothing like running an exercise end-to-end, right? So in this module, you get exactly that:</P>
<UL>
<LI><A href="https://docs.microsoft.com/learn/modules/aks-workshop/" target="_blank" rel="noopener noreferrer">Azure Kubernetes Service Workshop</A></LI>
</UL>
<P> </P>
<P>This is my curated list of modules to get started. There's so much more available at <A href="https://docs.microsoft.com/learn/" target="_blank" rel="noopener noreferrer">Microsoft Learn</A>. It’s a lot of content to get started, but it also just scratches the surface of what is possible with this platform. We have some updates and new content coming your way soon, so keep an eye out for that! In the meantime, let us know what you think about these modules and what you expect to see that would help in your environment needs.</P>
Posted at <a href="">https://sl.advdat.com/3srvS4v</a>https://sl.advdat.com/3srvS4vADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-47441689470144801162022-05-12T03:25:00.001-04:002022-05-12T03:25:55.531-04:00Microsoft: May Windows updates cause AD authentication failuresMicrosoft is investigating a known issue causing authentication failures for some Windows services after installing updates released during the May 2022 Patch Tuesday. [...]
Posted at <a href="https://sl.advdat.com/3FBfPGI">https://sl.advdat.com/3FBfPGI</a>ADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-52771025967940452582022-05-11T18:27:00.001-04:002022-05-11T18:27:16.461-04:00What’s new: Closer integration between Microsoft Sentinel and Microsoft 365 Defender<P><SPAN data-contrast="none">Over a year ago, we first </SPAN><SPAN data-contrast="none">announced </SPAN><SPAN data-contrast="none">the integration between Microsoft </SPAN><SPAN data-contrast="none">Sentinel</SPAN><SPAN data-contrast="none"> and Microsoft 365 </SPAN><SPAN data-contrast="none">Defender</SPAN><SPAN data-contrast="none"> as part of the Microsoft SIEM and XDR story. </SPAN><SPAN data-contrast="none">Combining the breadth of a SIEM with the depth of XDR to give security professionals the integrated toolset they need to fight against attacks that take advantage of today’s diverse, distributed, and complex environments.</SPAN></P>
<P> </P>
<P><SPAN data-contrast="none"> Today, we are happy to share several new preview updates</SPAN><SPAN data-contrast="none">:</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P> </P>
<UL>
<LI data-leveltext="-" data-font="Calibri" data-listid="1" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Calibri","469769242":[8226],"469777803":"left","469777804":"-","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><STRONG>Added</STRONG><SPAN data-contrast="none"><STRONG> new support for six Microsoft 365 Defender ‘Advanced Hunting’ data tables (details about each table below). </STRONG> </SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </SPAN></LI>
<LI data-leveltext="-" data-font="Calibri" data-listid="1" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Calibri","469769242":[8226],"469777803":"left","469777804":"-","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><STRONG><A href="https://docs.microsoft.com/en-us/azure/sentinel/microsoft-365-defender-sentinel-integration#incident-integration" target="_blank" rel="noopener noreferrer">Bi-directional incident integration</A></STRONG><SPAN data-contrast="none"><STRONG> available in Azure Government clouds</STRONG>. </SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </SPAN></LI>
<LI data-leveltext="-" data-font="Calibri" data-listid="1" data-list-defn-props="{"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Calibri","469769242":[8226],"469777803":"left","469777804":"-","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><STRONG>Microsoft Defender for Office 365 (MDO) alerts are now included in Microsoft 365 Defender incidents and are available in Microsoft Sentinel. </STRONG></LI>
</UL>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-contrast="none">Microsoft 365 Defender correlates raw events from all its security components, combining signal and alert data into holistic incidents across endpoints, data, email, identities, applications and IoT. This data enables proactively investigating events in your network to </SPAN><SPAN data-contrast="none">identify</SPAN><SPAN data-contrast="none"> threat indicators and entities and responds to incidents in their entirety from a single portal.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P> </P>
<P><SPAN data-contrast="none">Flexible access to data in Microsoft Sentinel enables unconstrained hunting for both known and potential threats combining Microsoft 365 data with Azure and third-party data sources. Microsoft Sentinel ingests these logs seamlessly from Microsoft 365 Defender and presents all tables </SPAN><STRONG><SPAN data-contrast="none">as is</SPAN></STRONG><SPAN data-contrast="none"> in Microsoft Sentinel with a default retention period of 90 days (which can be extended). Customers can discover new and interesting ways to leverage this data with analytics tools available in our new </SPAN><A href="https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-unified-microsoft-siem-and-xdr-github-community/ba-p/3249533" target="_blank"><SPAN>unified SIEM+XDR GitHub community</SPAN></A><SPAN data-contrast="none">.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><STRONG><FONT size="4">Support for new hunting pages </FONT></STRONG></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><STRONG>Microsoft Defender for Cloud Apps (MDA) and Data Loss Prevention (DLP)</STRONG></P>
<P><SPAN data-contrast="none">Microsoft Defender for Cloud Apps is a Cloud Access Security Broker (CASB) that operates across clouds. It provides rich visibility, policy-based control over data travel, and sophisticated analytics to identify and combat cyber threats across all your cloud services, including DLP data.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<TABLE data-tablestyle="MsoTableGrid" data-tablelook="1184" aria-rowcount="2">
<TBODY>
<TR aria-rowindex="1">
<TD data-celllook="0">
<P><STRONG>Table Name </STRONG></P>
</TD>
<TD data-celllook="0">
<P><STRONG>Description </STRONG></P>
</TD>
</TR>
<TR aria-rowindex="2">
<TD data-celllook="0">
<P><SPAN data-contrast="none">CloudAppEvents</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
<TD data-celllook="0">
<P><SPAN data-contrast="auto">The </SPAN><SPAN data-contrast="none">CloudAppEvents</SPAN><SPAN data-contrast="auto"> table in the </SPAN><A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender%2Fadvanced-hunting-overview%3Fview%3Do365-worldwide&data=05%7C01%7Cshahar.aviv%40microsoft.com%7Cd4c2e83fb3274f9af6d208da26954954%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637864719875674799%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=oTEQwQWvEv%2Fxu7WtHxpTx5hG3hLIzQ5oCcr6Y1ZcMtI%3D&reserved=0" target="_blank" rel="noopener nofollow noreferrer"><SPAN data-contrast="none">advanced hunting</SPAN></A><SPAN data-contrast="auto"> schema contains information about activities in various cloud apps and services covered by Microsoft Defender for Cloud Apps.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
</TR>
</TBODY>
</TABLE>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P> </P>
<P><STRONG>Microsoft Defender for Identity (MDI) </STRONG></P>
<P><SPAN data-contrast="none">Microsoft Defender for Identity uses your on-premises Active Directory Domain Services (AD DS) signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. </SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<TABLE data-tablestyle="MsoTableGrid" data-tablelook="1184" aria-rowcount="5">
<TBODY>
<TR aria-rowindex="1">
<TD width="179.078px" height="30px" data-celllook="0">
<P><STRONG>Table Name </STRONG></P>
</TD>
<TD width="792.922px" height="30px" data-celllook="0">
<P><STRONG>Description </STRONG></P>
</TD>
</TR>
<TR aria-rowindex="2">
<TD width="179.078px" height="57px" data-celllook="0">
<P><SPAN data-contrast="none">IdentityInfo</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
<TD width="792.922px" height="57px" data-celllook="0">
<P><SPAN data-contrast="auto">The </SPAN><SPAN data-contrast="none">IdentityInfo</SPAN><SPAN data-contrast="auto"> table in the</SPAN> <A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender%2Fadvanced-hunting-overview%3Fview%3Do365-worldwide&data=05%7C01%7Cshahar.aviv%40microsoft.com%7Cd4c2e83fb3274f9af6d208da26954954%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637864719875674799%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=oTEQwQWvEv%2Fxu7WtHxpTx5hG3hLIzQ5oCcr6Y1ZcMtI%3D&reserved=0" target="_blank" rel="noopener nofollow noreferrer"><SPAN data-contrast="none">advanced hunting</SPAN></A><SPAN data-contrast="auto"> schema contains information about user accounts obtained from various services, including Azure Active Directory.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
</TR>
<TR aria-rowindex="3">
<TD width="179.078px" height="85px" data-celllook="0">
<P><SPAN data-contrast="none">IdentityLogonEvents</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
<TD width="792.922px" height="85px" data-celllook="0">
<P><SPAN data-contrast="auto">The </SPAN><SPAN data-contrast="none">IdentityLogonEvents</SPAN><SPAN data-contrast="auto"> table in the </SPAN><A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender%2Fadvanced-hunting-overview%3Fview%3Do365-worldwide&data=05%7C01%7Cshahar.aviv%40microsoft.com%7Cd4c2e83fb3274f9af6d208da26954954%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637864719875674799%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=oTEQwQWvEv%2Fxu7WtHxpTx5hG3hLIzQ5oCcr6Y1ZcMtI%3D&reserved=0" target="_blank" rel="noopener nofollow noreferrer"><SPAN data-contrast="none">advanced hunting</SPAN></A> <SPAN data-contrast="auto">schema contains information about authentication activities made through your on-premises Active Directory captured by Microsoft Defender for Identity and authentication activities related to Microsoft online services captured by Microsoft Defender for Cloud Apps.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
</TR>
<TR aria-rowindex="4">
<TD width="179.078px" height="57px" data-celllook="0">
<P><SPAN data-contrast="none">IdentityQueryEvents</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
<TD width="792.922px" height="57px" data-celllook="0">
<P><SPAN data-contrast="auto">The </SPAN><SPAN data-contrast="none">IdentityQueryEvents</SPAN><SPAN data-contrast="auto"> table in the </SPAN><A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender%2Fadvanced-hunting-overview%3Fview%3Do365-worldwide&data=05%7C01%7Cshahar.aviv%40microsoft.com%7Cd4c2e83fb3274f9af6d208da26954954%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637864719875674799%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=oTEQwQWvEv%2Fxu7WtHxpTx5hG3hLIzQ5oCcr6Y1ZcMtI%3D&reserved=0" target="_blank" rel="noopener nofollow noreferrer"><SPAN data-contrast="none">advanced hunting</SPAN></A><SPAN data-contrast="auto"> schema contains information about queries performed against Active Directory objects, such as users, groups, devices, and domains.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
</TR>
<TR aria-rowindex="5">
<TD width="179.078px" height="166px" data-celllook="0">
<P><SPAN data-contrast="none">IdentityDirectoryEvents</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
<TD width="792.922px" height="166px" data-celllook="0">
<P><SPAN data-contrast="auto">The </SPAN><SPAN data-contrast="none">IdentityDirectoryEvents</SPAN><SPAN data-contrast="auto"> table in the </SPAN><A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fdefender%2Fadvanced-hunting-overview%3Fview%3Do365-worldwide&data=05%7C01%7Cshahar.aviv%40microsoft.com%7Cd4c2e83fb3274f9af6d208da26954954%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637864719875674799%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=oTEQwQWvEv%2Fxu7WtHxpTx5hG3hLIzQ5oCcr6Y1ZcMtI%3D&reserved=0" target="_blank" rel="noopener nofollow noreferrer"><SPAN data-contrast="none">advanced hunting</SPAN></A><SPAN data-contrast="auto"> schema contains events involving an on-premises domain controller running Active Directory (AD). This table captures various identity-related events, like password changes, password expiration, and user principal name (UPN) changes. It also captures system events on the domain controller, like scheduling of tasks and PowerShell activity.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559740":259}"> </SPAN></P>
</TD>
</TR>
</TBODY>
</TABLE>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><STRONG>Alert Evidence </STRONG></P>
<P><SPAN data-contrast="none">The</SPAN><I><SPAN data-contrast="none"> </SPAN></I><I><SPAN data-contrast="auto">AlertEvidence</SPAN></I><I><SPAN data-contrast="none"> </SPAN></I><SPAN data-contrast="none">table in the</SPAN><SPAN data-contrast="none"> </SPAN><A href="https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-overview?view=o365-worldwide" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">advanced hunting</SPAN></A><SPAN data-contrast="none"> </SPAN><SPAN data-contrast="none">schema contains information about various entities - files, IP addresses, URLs, users, or devices - associated with alerts from Microsoft 365 Defender, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity. Use this reference to construct queries that return information from this table.</SPAN><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><SPAN data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </SPAN></P>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ShaharAviv_0-1651391180949.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/368270iDD2C00A2AC0DC6FF/image-size/large?v=v2&px=999" role="button" title="ShaharAviv_0-1651391180949.png" alt="ShaharAviv_0-1651391180949.png" /></span></P>
<P> </P>
<P><SPAN data-ccp-props="{"134233117":true,"134233118":true,"201341983":0,"335559740":240}"> </SPAN></P>
<P><SPAN data-ccp-props="{"134233117":true,"134233118":true,"201341983":0,"335559740":240}"> </SPAN></P>
<P><STRONG><FONT size="4">Looking Forward </FONT></STRONG></P>
<P><SPAN data-contrast="none">We are continuously improving this integration by adding more supported data types from Microsoft 365 Defender, such as Threat Vulnerability Management (TVM) data, and additional alert sources, such as DLP alerts and Azure Active Directory Identity Protection (AADIP) alerts, as part of Microsoft 365 Defender incidents.</SPAN><SPAN data-ccp-props="{"134233117":true,"134233118":true,"201341983":0,"335559740":240}"> </SPAN></P>
<P><SPAN data-ccp-props="{"134233117":true,"134233118":true,"201341983":0,"335559740":240}"> </SPAN></P>
<P><SPAN data-ccp-props="{"134233117":true,"134233118":true,"201341983":0,"335559740":240}"> </SPAN></P>
<P><STRONG><FONT size="4">Further reading </FONT></STRONG></P>
<UL>
<LI data-leveltext="-" data-font="Segoe UI" data-listid="7" data-list-defn-props="{"335551671":0,"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Segoe UI","469769242":[8226],"469777803":"left","469777804":"-","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><A href="https://docs.microsoft.com/azure/sentinel/connect-microsoft-365-defender" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">Documentation</SPAN></A><SPAN data-contrast="none"> about how to connect Microsoft 365 Defender incidents and raw data to Microsoft Sentinel. </SPAN><SPAN data-ccp-props="{"134233117":true,"134233118":true,"201341983":0,"335559739":160,"335559740":240}"> </SPAN></LI>
<LI data-leveltext="-" data-font="Segoe UI" data-listid="7" data-list-defn-props="{"335551671":0,"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Segoe UI","469769242":[8226],"469777803":"left","469777804":"-","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><A href="https://docs.microsoft.com/en-us/microsoft-365/security/mtp/microsoft-threat-protection?view=o365-worldwide" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">Documentation</SPAN></A><SPAN data-contrast="none"> for Microsoft 365 Defender. </SPAN><SPAN data-ccp-props="{"134233117":true,"134233118":true,"201341983":0,"335559739":160,"335559740":240}"> </SPAN></LI>
<LI data-leveltext="-" data-font="Segoe UI" data-listid="7" data-list-defn-props="{"335551671":0,"335552541":1,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Segoe UI","469769242":[8226],"469777803":"left","469777804":"-","469777815":"hybridMultilevel"}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><A href="https://docs.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-schema-tables?view=o365-worldwide" target="_blank" rel="noopener noreferrer"><SPAN data-contrast="none">Documentation</SPAN></A> <SPAN data-contrast="none">for all Microsoft 365 Defender raw data schemas.</SPAN><SPAN data-contrast="none"> </SPAN><SPAN data-ccp-props="{"134233117":true,"134233118":true,"201341983":0,"335559739":160,"335559740":240}"> </SPAN></LI>
</UL>
Posted at <a href="">https://sl.advdat.com/39atqsw</a>https://sl.advdat.com/39atqswADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-59331804109649881532022-05-11T17:57:00.001-04:002022-05-11T17:57:15.946-04:00IoT at Microsoft Build 2022<P>It’s Spring! Chery trees are in full bloom (at least in my backyard), weather is warming up (in the northern hemisphere) and Build is just around the corner.</P>
<P>If you have not done so yet, <A href="https://register.build.microsoft.com/" target="_blank" rel="noopener noreferrer">register</A> for free to explore the latest innovations in code and application development.</P>
<P> </P>
<P align="center"><A href="https://register.build.microsoft.com/" target="_blank" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OlivierBloch_0-1652303912348.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370975i2990D32B7E920A33/image-size/large?v=v2&px=999" role="button" title="OlivierBloch_0-1652303912348.png" alt="OlivierBloch_0-1652303912348.png" /></span></A></P>
<P> </P>
<P>This year, Microsoft’s developer event will have a main virtual event as well as regional spotlights in person in France, Germany, Japan, Latin America and UK with keynote analysis, trending news and topics for specific regions to help break down what’s new and what it means to you. As a matter of fact, you might find a session in your native language.</P>
<P> </P>
<P align="center"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OlivierBloch_1-1652303912389.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370974i798F3F25A20918B2/image-size/large?v=v2&px=999" role="button" title="OlivierBloch_1-1652303912389.png" alt="OlivierBloch_1-1652303912389.png" /></span></P>
<P> </P>
<P>As for past events we have put together a series of sessions to update you on the latest on IoT technologies and services. Below is a compilation of all IoT content at the event.</P>
<P>On-Demand sessions are great for you to learn at your own pace, while roundtable and connection zone sessions will be held live allowing you to ask questions and share your feedback with our products teams.</P>
<P>We look forward to connecting with you.</P>
<P>Happy Build and happy Spring!</P>
<P> </P>
<TABLE style="width: 100%;">
<TBODY>
<TR>
<TD width="30%">
<P><STRONG>Title</STRONG></P>
</TD>
<TD width="20%">
<P><STRONG>Speaker(s)</STRONG></P>
</TD>
<TD width="30%">
<P><STRONG>Abstract</STRONG></P>
</TD>
<TD width="20%">
<P><STRONG>Type and timing</STRONG></P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/5b98bede-8634-4cfc-9201-01dfff1f2353?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Create and Connect Secure and Trustworthy IoT Devices</STRONG></A></P>
</TD>
<TD width="20%">
<P>David Glover, Joseph Lloyd, Chirag Shah</P>
</TD>
<TD width="30%">
<P>Azure Sphere is an IoT platform that allow developers, device builders, and system integrators to allocate resources on their application and product differentiation instead of building OS, maintenance, and security expertise. Come learn how customers have used Azure Sphere to unlock efficiency for their businesses, how Azure Sphere can simplify your development, and how you combine Azure Sphere with systems like TinyML to quickly develop secure IoT devices or connect existing devices to Azure.</P>
</TD>
<TD width="20%">
<P>On-Demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/cdbc87ee-6fae-4bd8-ba08-26e0025447d7?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Deploy IoT solutions with Azure SQL Database</STRONG></A></P>
</TD>
<TD width="20%">
<P>Silvano Coriani, Anna Hoffman</P>
</TD>
<TD width="30%">
<P>Many organizations are investing in IoT to increase operational efficiency, deliver better customer experiences, increase levels of security, enhance workplace safety, and reduce costs. Azure SQL Database provides a price-performant backend, including templates that simplify deploying and configuring IoT solutions for any scenario. Learn how Azure SQL Database provides a price-performant backend for IoT applications as well as how to deploy a template that includes Azure SQL Database, Azure VMs, Azure Functions, and Power BI. Interested in learning more right now? Check out the module for this Learn Live session today!</P>
</TD>
<TD width="20%">
<P>Connection Zone<BR />Tuesday, May 24</P>
<P>12:30 PM - 1:30 PM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><STRONG><A href="https://mybuild.microsoft.com/en-US/sessions/38c17127-d84d-4ed6-8be7-6bc75558022c?source=sessions" target="_blank" rel="noopener noreferrer">Data processing challenges in building enterprise grade IoT solutions</A></STRONG></P>
</TD>
<TD width="20%">
<P>Reddy Duggempudi, Sekhar Kutikuppala</P>
</TD>
<TD width="30%">
<P>IoT Solutions are complex with multitude of devices that range from greenfield devices sending simple data to brownfield devices sending complex data structures. Businesses are looking to harness this IoT data to transform their businesses. Building IoT Solutions that accomplish this involves building complex data pipelines to press the data. Join this round table to discuss the scenarios, architectures, and shape future IoT Central product direction.</P>
</TD>
<TD width="20%">
<P>Product roundtable<BR />Tuesday, May 24</P>
<P>12:30 PM - 1:30 PM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/4033ef3b-9802-4e20-bd82-c67117a91e6a?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Prescriptive Architecture guidance for IoT Workloads</STRONG></A></P>
</TD>
<TD width="20%">
<P>Rania Bayoumy, Jomit Vaghela</P>
</TD>
<TD width="30%">
<P>In this session we will review some of the work we are doing in IoT engineering to provide prescriptive guidance and key design considerations around areas like AI + IoT, Industrial IoT, Digital Twins, Observability, HA/DR, for IoT Workloads. Join us to help shape how we can evolve our architecture center guidance by reviewing our future concepts and plans as well as share experiences, challenges and feedback.</P>
</TD>
<TD width="20%">
<P>Product roundtable<BR />Tuesday, May 24</P>
<P>12:30 PM - 1:30 PM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/ab2e7d12-1f20-42c1-b098-de2b62a1b959?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Accelerate Compute on PC class devices with Azure IoT Edge for Linux on Windows (EFLOW)</STRONG></A></P>
</TD>
<TD width="20%">
<P>Francisco Cabrera, Christopher Datsikas, Terry Warwick</P>
</TD>
<TD width="30%">
<P>Retail, industrial manufacturing, medical, hospitality, and many other verticals can now deploy AI on PC class devices with Windows operating systems. In this session discusses step-by-step how to deploy Linux AI Vision on Edge solutions to all your enterprise-grade Windows devices using Azure IoT Edge for Linux on Windows (EFLOW) to manage and deploy the most important AI edge workloads and love your feedback and input.</P>
</TD>
<TD width="20%">
<P>Product roundtable:<BR />Tuesday, May 24</P>
<P>2:30 PM - 3:30 PM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/ae1738fc-ded7-4efa-a7f4-6ad4da60bf49?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Reimagine the future of driving insights and actions from physical world data with Azure IoT, Azure Data, and Power Apps</STRONG></A></P>
</TD>
<TD width="20%">
<P>Eric Charran, Wim Coorevits</P>
</TD>
<TD width="30%">
<P>IoT data is increasingly supporting many organizations' digital transformations. Taking data from the physical world, combining it with digital data from various business systems, and generating the right insights and actions is no easy feat. And yet, it's an absolute requirement to achieve better business outcomes in everything from operations to product design. Your participation in this discussion will help define the future of transforming Azure IoT data into insights and actions and surfacing them where they matter most, through Azure Data and/or Power Apps.</P>
</TD>
<TD width="20%">
<P>Product roundtable:<BR />Tuesday, May 24</P>
<P>2:30 PM - 3:30 PM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/549f932c-12e6-4bad-ab50-c61ed889adf9?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>About Azure IoT Central, Azure IoT Edge</STRONG></A></P>
</TD>
<TD width="20%">
<P>宜憲 林</P>
</TD>
<TD width="30%">
<P>このセッションは、Microsoft Teams 会議でホストされ、イベントの公開 Web サイトでオンデマンド再生できるようにするため録画されます。 Azure IoT CentralやAzure IoT Edgeを使ったデバイスの開発環境や採用事例などの話題をお話しするとともに、参加者の皆さんと .NET nanoFrameworkに関する情報交換を行うTable Talkをお届けいたします。</P>
</TD>
<TD width="20%">
<P>Connection zone:<BR />Tuesday, May 24</P>
<P>11:30 PM - 12:00 AM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/59305e03-59cf-4993-acb8-bdfbef989f3b?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Les outils qui facilitent le travail du développeur IoT</STRONG></A></P>
</TD>
<TD width="20%">
<P>Estelle Auberix</P>
</TD>
<TD width="30%">
<P>Cette session est hébergée dans une réunion Microsoft Teams, et sera enregistrée et publiée pour une consultation à la demande sur le site Web de l’événement public. Pour un projet IoT, la sécurité, le réseau, le système, la programmation cloud et des périphériques doivent être respectivement pris en charge. Dans cette session nous discuterons avec des développeurs spécialistes de l’IoT comment répondre à toutes ces exigences et quels sont les outils ou solutions qui leur facilitent la tâche. Edge computing, jumeaux digitaux, solutions d’administration ou de monitoring… ? Vous pourrez discuter en direct avec ces spécialistes qui partageront des exemples concrets et leurs expériences.</P>
</TD>
<TD width="20%">
<P>Connection zone:<BR />Wednesday, May 25</P>
<P>2:00 AM - 2:30 AM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/5f8efe69-32fe-421d-a981-2844753d1e31?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Azure IoT: Device onboarding experiences for Edge with DPS</STRONG></A></P>
</TD>
<TD width="20%">
<P>Sarah Grover, Krishna Raghavan, Deepika Sadahiro</P>
</TD>
<TD width="30%">
<P>The Azure IoT Platform team would like to discuss device onboarding experiences with Device Provisioning Service - today and how we envision them in the future. This discussion will allow us to better understand customer pain points and inform upcoming investments in the Azure IoT platform.</P>
</TD>
<TD width="20%">
<P>Product Roundtable:<BR />Wednesday, May 25</P>
<P>10:00 AM - 11:00 AM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/ca779dc1-b883-488b-8ead-077fbac6ead5?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Deploy Edge AI and IoT solutions with out-of-band manageability and more</STRONG></A></P>
</TD>
<TD width="20%">
<P>Savitha Gandikota, Matt Primrose, Martin Tuip</P>
</TD>
<TD width="30%">
<P>Need to recover your edge devices from a blue screen? Need to have Linux functionality on a Windows IoT device? In this session you will hear from Intel & Microsoft experts in Open Active Management Technology (Open AMT) and Azure Edge For Linux On Windows (EFLOW) to learn how these technologies can help you deploy and manage devices from the edge to cloud.</P>
</TD>
<TD width="20%">
<P>Connection zone:<BR />Wednesday, May 25</P>
<P>10:00 AM - 10:30 AM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/24299c28-cea4-405a-b28b-2ec22394e3eb?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Well Architected Framework for IoT</STRONG></A></P>
</TD>
<TD width="20%">
<P>Charlie Grabiaud, Phil Meadows, Eric van Uum, Ansley Yeo</P>
</TD>
<TD width="30%">
<P>We would like to share our extension to Azure Well Architected Framework with a new workload - IoT. We want to hear from participants what do they look for and collaborate to make the asset better. Calling all solution architects working on IoT projects to join us and share they design principles for IoT solutions .</P>
</TD>
<TD width="20%">
<P>Product roundtable:<BR />Wednesday, May 25</P>
<P>12:00 PM - 1:00 PM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/5107ccc3-baa0-4dbf-a872-a620c6e7c453?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Ask the Experts: How Vision AI applications use NVIDIA DeepStream and Azure IOT Edge Services</STRONG></A></P>
</TD>
<TD width="20%">
<P>Alvin Clark, Paul DeCarlo, Jaime Flores, Carlos Garcia-Sierra</P>
</TD>
<TD width="30%">
<P>Join experts from NVIDIA and Microsoft where you can ask questions about developing applications Graph Composer and new DeepStream features, deployment via IoT Hub, connecting to other Azure IoT Services, or transmitting inference results to the cloud.</P>
</TD>
<TD width="20%">
<P>Connection zone:<BR />Wednesday, May 25</P>
<P>1:00 PM - 1:30 PM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/4252aa59-bce9-49e0-9602-24f60b405a44?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Azure IoT Central Roadmap</STRONG></A></P>
</TD>
<TD width="20%">
<P>Aaron Bjork</P>
</TD>
<TD width="30%">
<P>Learn how Azure IoT Central can simplify your IoT journey by providing you and your customers a ready-made environment for your next IoT Solution. We'll look at why IoT Central exists, the core problems it solves, and what's up next in the roadmap.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/c8f7d324-61bc-4b3c-be70-ebb35f065f52?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Building the Arm64 ecosystem on Windows IoT Enterprise with the i.MX 8 platform</STRONG></A></P>
</TD>
<TD width="20%">
<P>Anthony Chen</P>
</TD>
<TD width="30%">
<P>Arm yourself with the latest info on the Windows IoT team’s partnership with NXP to build an Arm64 IoT ecosystem starting with the <A href="http://i.mx/" target="_blank" rel="noopener nofollow noreferrer">i.MX</A> 8 family of SoCs.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/ad128663-d039-48bd-a6df-18a2b831d45c?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>From the Edge to the Metaverse, how IoT powers it all</STRONG></A></P>
</TD>
<TD width="20%">
<P>Olivier Bloch</P>
</TD>
<TD width="30%">
<P>This session will give you an insight into Microsoft's vision for IoT, from the Edge all the way up to the Cloud and is a unique opportunity to understand the big picture and how all the technologies and services fit in this big picture.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/a63dc793-4f4e-4dc3-86e5-d1470ec2a363?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Scaling to a Billion Devices - Azure IoT Platform Vision and Roadmap</STRONG></A></P>
</TD>
<TD width="20%">
<P>Joey Lorich</P>
</TD>
<TD width="30%">
<P>Azure IoT is the premier choice for developing large-scale connected device solutions. In this session you'll hear from the Azure IoT Platform product team about forward-thinking strategy and vision, as well as what's coming in the near future. In addition, you'll get to see a demo of a new and easy approach for leveraging IoT Hub, Cosmos DB, Azure Synapse, and Power BI together for data analysis and visualization.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/00acd2c8-66b4-4735-bb1b-e3bae9581ad8?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Connecting MCU-IoT Devices to the Cloud</STRONG></A></P>
</TD>
<TD width="20%">
<P>Jennifer Skinner-Gray, Keiana Snell</P>
</TD>
<TD width="30%">
<P>Learn how we’ve brought IoT Central, Azure RTOS, and the global leading Semiconductor Companies together in this session. We have worked with Microchip, STMicroelectronics, Renesas, and NXP to bring Azure to their boards and meet the customers, Device Builders, where they are at in their journey to connect to the cloud.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/1078bece-8096-40ef-a0db-77fb38859bed?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>IoT Device Developer Experience</STRONG></A></P>
</TD>
<TD width="20%">
<P>Wellington Duraes</P>
</TD>
<TD width="30%">
<P>IoT devices comes in many sizes, shapes, forms, processing power, memory capacity, etc. They all need to be connected to leverage Azure IoT platform and we have a set of device SDKs and tools that can help this journey for all device developers. Come and learn more about our solutions for devices based on MPUs or MCUs, the resources available to you, and our roadmap for new features.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/1e7a86d7-c1ec-4e49-bdac-ccd951800749?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Windows IoT Security</STRONG></A></P>
</TD>
<TD width="20%">
<P>Riddhi Ameser</P>
</TD>
<TD width="30%">
<P>This Windows IoT security session focuses on helping customers build a comprehensive security story for their Windows IoT Enterprise devices. Come learn about all the features and programs available to OEMs today and how to build a resilient security posture for your IoT devices.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/321d919d-3bf4-402e-8c80-32f90246a510?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Dual Operator - Windows IoT</STRONG></A></P>
</TD>
<TD width="20%">
<P>Riddhi Ameser</P>
</TD>
<TD width="30%">
<P>Dual Operator is a new Windows IoT Enterprise feature that allows for two users to run two application experiences simultaneously. Come check out how it all works and how to build solutions that can support this capability.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/b2f6cee3-4cdc-4e41-b4da-8885f9d6f477?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Industrial IoT & Azure IoT Central</STRONG></A></P>
</TD>
<TD width="20%">
<P>Ian Hollier, Sean Parham, Ranga Vadlamudi</P>
</TD>
<TD width="30%">
<P>Learn about how you can enable Industrial IoT (IIoT) scenarios with Azure IoT Central in the cloud along with connectivity solution integration with Microsoft connectivity solutions and partner connectivity solutions.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/b3fab818-ac13-40e9-8304-1d7a426e670c?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Windows IoT Roadmap</STRONG></A></P>
</TD>
<TD width="20%">
<P>Joe Coco</P>
</TD>
<TD width="30%">
<P>Microsoft remains committed to the ongoing success of Windows for IoT, which is deployed on millions of intelligent-edge solutions around the world. Industries such as manufacturing, retail, medical equipment, and public safety choose Windows for IoT to power their edge devices. Join this session to learn all about what the future of Windows IoT will be next.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/8fbcb069-2b52-46ed-bedd-c9e1a9206a26?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Building Industrial Digital Twin Applications</STRONG></A></P>
</TD>
<TD width="20%">
<P>Chafia Aouissi, Adam Lash, <A href="https://mybuild.microsoft.com/en-US/speakers/5666ceaa-ffbf-4268-b415-1fa14e8f69d7?source=sessions" target="_blank" rel="noopener noreferrer">Basak Mutlum</A></P>
</TD>
<TD width="30%">
<P>In this round table, Azure IoT Engineering Strategic Engagements Team will show real life deployments of Azure Digital Twins along with architectural patterns that are used to deliver end to end digital twin applications for different industries.</P>
</TD>
<TD width="20%">
<P>Product roundtable:<BR />Tuesday, May 24</P>
<P>12:30 PM - 1:30 PM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/f5429d2d-4d27-43e5-8fa4-a0d1ec7bca95?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Azure fueled innovation: how a traditional industrial company in Greece accelerated innovation with Azure</STRONG></A></P>
</TD>
<TD width="20%">
<P>Mary Bina, Mitja Kolbe, Vassilis Nikolopoulos</P>
</TD>
<TD width="30%">
<P>As companies continue to ride the digital transformation wave, it's no surprise that innovation can flourish anywhere. Join us in this session to learn how one of the leading industrial companies in Greece is re-imagining the way it operates by leveraging data, adopting services like Azure ML and Azure IoT to streamline and automate complex or manual processes, optimize operations, and transform its business with new services, supported by a strategic partnership with Microsoft.</P>
</TD>
<TD width="20%">
<P>Connection zone:<BR />Wednesday, May 25</P>
<P>4:30 AM - 5:00 AM Pacific Daylight Time</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/00f5cd93-4c02-4d5c-85e6-bfbb1841e05f?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Edge Device Image Builder</STRONG></A></P>
</TD>
<TD width="20%">
<P>Bill Huang</P>
</TD>
<TD width="30%">
<P>Learn how to build, configure and deploy Windows IoT Enterprise images with our new open-source tool. The tool walks you through an easy-to-use UI with pre-built templates, built-in help and documentation support and showcases all the features and configurations available on the platform. Our mission is to make imaging your Windows IoT Enterprise devices simple. Come check it out!</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
<TR>
<TD width="30%">
<P><A href="https://mybuild.microsoft.com/en-US/sessions/2763195d-a0a4-4a9d-9371-41ffd46b58c3?source=sessions" target="_blank" rel="noopener noreferrer"><STRONG>Azure RTOS Product Updates</STRONG></A></P>
</TD>
<TD width="20%">
<P>Liya Du</P>
</TD>
<TD width="30%">
<P>Come and learn what we have been investing on Azure RTOS to further lower the barrier and accelerate the time-to-market for customers build connected IoT devices using Azure RTOS. And our deep integration with our semiconductor partners to integrate Azure RTOS into their device SDK and toolchains.</P>
</TD>
<TD width="20%">
<P>On-demand</P>
</TD>
</TR>
</TBODY>
</TABLE>
<P> </P>
Posted at <a href="">https://sl.advdat.com/39cPzGu</a>https://sl.advdat.com/39cPzGuADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.comtag:blogger.com,1999:blog-3784701549038838406.post-35031157602100092462022-05-11T16:27:00.001-04:002022-05-11T16:27:12.973-04:00Shape data with Power Query Editor in Excel for Mac<H2 id="toc-hId-420692015"><FONT color="#000000">Shape data with Power Query Editor </FONT></H2>
<P> </P>
<P>Power Query is a powerful and time-saving set of tools that help you get and shape data quickly and easily. When this tool was first released in Excel for Mac, there was great excitement around the new capabilities Power Query provides you.</P>
<P> </P>
<P>Once we introduced the capability to refresh data (see previous posts from <A href="https://insider.office.com/blog/you-asked-for-it-a-journey-to-power-query-in-excel-for-mac-starts-now" target="_blank" rel="noopener noreferrer">May 2020</A>, <A href="https://insider.office.com/blog/updates-to-power-query-in-excel-for-mac" target="_blank" rel="noopener noreferrer">July 2020</A>, and <A href="https://insider.office.com/en-us/blog/power-query-excel-mac" target="_blank" rel="noopener noreferrer">October 2020</A>), and import data ( <A href="https://insider.office.com/en-us/blog/import-data-from-local-files-with-power-query-in-excel-for-mac" target="_blank" rel="noopener noreferrer">May 2021</A>), we received a lot of requests to add the ability to transform data using the Query Editor, which would allow users to enjoy the full Power Query experience in Excel for Mac.</P>
<P> </P>
<P>We have heard your feedback and we are happy to let you know that you can now clean and shape your data with hundreds of transformations available in Power Query Editor in Excel for Mac. </P>
<P> </P>
<H3 id="toc-hId-1111253489"><FONT color="#000000">How it works</FONT></H3>
<OL>
<LI class="">On the <SPAN data-contrast="none"><STRONG>Data</STRONG> </SPAN>tab, click the <SPAN data-contrast="none"><STRONG>Get Data (Power Query)</STRONG> button.</SPAN><STRONG><SPAN data-contrast="none"> </SPAN></STRONG><STRONG><SPAN data-contrast="none"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image2_NEW-2048x1277.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370882i62257E579DAD6F2F/image-size/large?v=v2&px=999" role="button" title="Image2_NEW-2048x1277.png" alt="Image2_NEW-2048x1277.png" /></span></SPAN></STRONG></LI>
<LI class="">Click <STRONG>Launch Power Query Editor</STRONG> to open the Query Editor.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image3_NEW-2048x1280.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370884i85708C57CFADF549/image-size/large?v=v2&px=999" role="button" title="Image3_NEW-2048x1280.png" alt="Image3_NEW-2048x1280.png" /></span></LI>
<LI class=""><SPAN>You can </SPAN><A style="font-family: inherit;" href="https://support.microsoft.com/en-us/office/about-power-query-in-excel-7104fbee-9e62-4cb9-a02e-5bfb1a6c536a" target="_blank" rel="noopener noreferrer">shape and transform</A><SPAN> your data using the Query Editor as you do in Excel for Windows. When you’re done, click the </SPAN><STRONG style="font-family: inherit;">Close & Load </STRONG><SPAN>button on the </SPAN><STRONG style="font-family: inherit;">Home </STRONG><SPAN>tab.<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image4-2048x1280.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370885i7D49A7EDA3ED3231/image-size/large?v=v2&px=999" role="button" title="Image4-2048x1280.png" alt="Image4-2048x1280.png" /></span></SPAN></LI>
</OL>
<P><SPAN>The newly imported data appears in a new sheet. <span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image4-2048x1280.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370944i8CB86AD2B333C28D/image-size/large?v=v2&px=999" role="button" title="Image4-2048x1280.png" alt="Image4-2048x1280.png" /></span></SPAN></P>
<H3 id="toc-hId--696200974"><FONT color="#000000">Tips & Tricks</FONT></H3>
<UL>
<LI>Supported data sources are:
<UL>
<LI>text, CSV, XLSX, XML, and JSON files</LI>
<LI>SharePoint, SharePoint Lists, SharePoint Folders, and OData</LI>
<LI>local tables and ranges</LI>
<LI>Microsoft SQL Server</LI>
</UL>
</LI>
<LI class="">You can also access the Query Editor from the data import flow by clicking the <STRONG>Get Data (Power Query) </STRONG>button, choosing a data source, and clicking the <STRONG>Next </STRONG>button.</LI>
</UL>
<P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Image1-2048x1280.png" style="width: 999px;"><img src="https://techcommunity.microsoft.com/t5/image/serverpage/image-id/370887i322AC012552E500C/image-size/large?v=v2&px=999" role="button" title="Image1-2048x1280.png" alt="Image1-2048x1280.png" /></span></P>
<H2 id="toc-hId--706704078"><FONT color="#000000">Availability</FONT></H2>
<P>This feature is available to Beta Channel users running Version 16.61 (Build 22041701) or later. </P>
<H2 id="toc-hId-1780808755"><FONT color="#000000">Don’t have it yet? It’s probably us, not you.</FONT></H2>
<P>We typically release features over some time to ensure that things are working smoothly. This is true for Insiders as well. We highlight features that you may not have because they’re slowly released to larger numbers of Insiders. Sometimes we remove elements to further improve them based on your feedback. Though this is rare, we also reserve the option to pull a feature entirely out of the product, even if you, as Insiders, have had the opportunity to try them. </P>
<H2 id="toc-hId--26645708"><FONT color="#000000">Feedback</FONT></H2>
<P>We’d love to hear from you! Please click <STRONG>Help </STRONG>><STRONG> Feedback</STRONG> to submit your feedback about this feature. </P>
<P>Learn what <A href="https://insider.office.com/blog/your-feedback-makes-office-better" target="_blank" rel="noopener noreferrer">other information you should include in your feedback</A> to ensure it’s actionable and reaches the right people. We’re excited to hear from you! </P>
<P class="">Sign up for the <A href="https://insider.office.com/newsletter" target="_blank" rel="noopener noreferrer">Office Insider newsletter</A> and get the latest information about Insider features in your inbox once a month! </P>
Posted at <a href="">https://sl.advdat.com/37GWVSw</a>https://sl.advdat.com/37GWVSwADVDAT_OHhttp://www.blogger.com/profile/06591759522138096832noreply@blogger.com