Quantcast
Channel: TechNet Blogs
Viewing all 36188 articles
Browse latest View live

Azure NetApp Files のパブリック プレビューを開始

$
0
0

執筆者: Andrew Chen (Principal PM Manager)

このポストは、2018 年 7 月 12 日に投稿された Azure NetApp files now in public preview の翻訳です。

 

企業の間では、スケーラビリティ、俊敏性、経済性に優れたパブリック クラウドの活用が急速に進んでいます。しかし、エンタープライズ レベルの要件を満たせるパフォーマンスやスケーラビリティの高いクラウド ファイル サービスがほとんどないため、ファイル ベースのアプリケーションをクラウドにデプロイするのは容易ではありません。

マイクロソフトは、ファイル ベースのワークロードのクラウドへのデプロイを実現するために、NetApp と協力して課題の解決に取り組んできました。そしてこのたび、Azure NetApp Files のパブリック プレビューを開始しました。これは、企業が求めるパフォーマンス、スケーラビリティ、データ管理、セキュリティ、ハイブリッドなどの機能要件を満たしてきた実績のある、NetApp の画期的な ONTAP テクノロジを基盤とした Azure ネイティブなサービスです。

プレビュー期間中は、以下の機能をご利用いただけます。

  • 充実したデータ管理: さまざまなプロトコル、プロトコル バージョン、パフォーマンス レベルのサポートに加えて、ポリシー ベースのスナップショット機能が組み込まれているため、他のデータ保護ソリューションをインストールする必要はありません。
  • セキュリティ: ボリューム内のすべてのデータが格納時に暗号化されるようになっており、業界随一の Azure コンプライアンス ポートフォリオを活用することができます。
  • 使いやすさ: 完全な統合型マネージド Azure サービスであるため、Azure Portal からアクセスしたり、Azure SDK やコマンド ライン ツールで管理したりできます。オンプレミス ストレージのようなプロビジョニングや管理の負担がなく、ストレージの専門知識がなくても NetApp の強力な ONTAP テクノロジを活用することができます。

プレビューを開始する

プレビューへの参加をご希望のお客様は、Azure NetApp Files パブリック プレビューのサインアップ ページ (英語) からお申し込みください。プレビューの案内に記載されているリンクからプレビュー ポータルにアクセスして (図 1)、数クリックで Azure NetApp Files NFS v3 ボリューム (図 2) を作成することができます。

図 1: Azure Portal に表示された Azure NetApp Files

図 2: Azure NetApp アカウントのリストに表示された NFS v3 ボリューム

現在 Azure NetApp Files を利用できるのは米国東部のみですが、近日中に米国西部 2 でも提供を開始する予定です。他のプレビュー機能と同様に、このサービスの一般提供が開始されるまでは、運用環境で使用しないようご注意ください。

価格

プレビュー期間中は、Azure NetApp Files を割引価格でご利用いただけます。価格はプレビューのご案内と共にお知らせします。

フィードバックのお願い

マイクロソフトでは、このサービスに関するご意見、ご感想をお待ちしています。お気軽に ANFFeedback@microsoft.com までメールをお送りください。Azure Storage に関するアイデアやご提案は、Azure Storage フィードバック フォーラム (英語) にご投稿ください。

 


IT プロフェッショナルに朗報: Azure File Sync の一般提供を開始

$
0
0

執筆者: Tad Brockway (General Manager, Azure Storage & Azure Stack)

このポストは、2018 7 19 日に投稿された Score one for the IT Pro: Azure File Sync is now generally available! の翻訳です。

 

Azure File Sync は、オンプレミスの Windows Server ファイルを Azure ファイル共有にレプリケートするサービスです。クラウドとオンプレミス ファイル サーバーの両方のメリットが得られるため、どちらかのメリットを諦める必要はありません。Azure File Sync を使用すると、データへのローカル アクセスを維持しながら、Azure 内でファイル サービスを集中管理することができます。

Azure File Sync の詳細については、こちらのプランニング ガイドをご覧ください。

Azure Files は、クラウド ストレージを簡単に利用していただけるようにすることを目的に開発されました。長年にわたる Windows ファイル サーバーの構築経験から、私たちはファイル共有がアプリケーション開発以外にもさまざまな場面で役に立つことを知っています。このため Azure Files の開発では、汎用的なファイル共有を構築し、それを組織内のすべてのファイル サーバーや NAS デバイスの代わりに使用できるようにすることを重視しました。そして本日は、ある重要な節目を迎えたことを発表させていただきます。それは、Azure File Sync の一般提供が開始されたことです!

Azure File Sync を開発するにあたって、マイクロソフトは多くのお客様とさまざまな課題について話し合ってきました。中でも、頻繁に使用するデータにローカルからすぐにアクセスしたいというニーズと、オンプレミス ストレージのメンテナンスや管理にかかる時間やコストとのバランスをどう取るかというのは、難しい問題でした。Azure File Sync では、オンプレミスの Windows Server ファイルを Azure ファイル共有にレプリケートすることができます。これは、DFS-R を使用して Windows Server 間でデータをレプリケートするのと同じような感覚です。Azure 内にデータをコピーした後、Azure File Sync の便利な機能であるクラウドの階層化機能を有効にすると、使用頻度の高いデータや最近アクセスしたデータのみがオンプレミスに保存されるようになります。また、クラウドにはデータの完全なコピーが保存されるため、Azure ファイル共有に必要な数だけサーバーを接続すれば、ユーザーはどこにいても高速データ キャッシュにアクセスすることができます。つまり、Azure File Sync なら、Azure 内でファイル サービスを集中管理しながら、データへのローカル アクセスを維持できるということです。

クラウドにデータのコピーを保存するメリットは他にもあります。たとえば、サーバーが突然利用できなくなっても、高速のディザスター リカバリー機能によってほぼ瞬時にサーバーを復元することができます。また、更新の失敗や物理ディスクの損傷などの障害が起きても、クラウドには回復性の高いデータ コピーがあるため心配無用です。新しい Windows Server を既存の同期グループに接続するだけで名前空間が直ちにプルダウンに表示され、使用可能になります。

昨年の Ignite Azure File Sync を発表した際、Azure Files Azure File Sync はクラウドの利用を推進する多くの組織にとって役立つものだとは考えていましたが、これほど関心が高まっているとは思いもよりませんでした。Azure File Sync の一般提供を前に、私たちはプレビュー中にお客様から寄せられたフィードバックを反映することに多くの時間をかけました。以下は、初期プレビューから改善、強化された重要な点の一部です。

  • 同期とクラウドの階層化に関するパフォーマンス、拡張性、信頼性が向上: 一般提供にあたり、アップロードのパフォーマンスを 2 倍、高速ディザスター リカバリーのパフォーマンスを 4 18 (ハードウェアによって異なる) に引き上げました。また、クラウドの階層化のバックエンドを再構築し、より高速で信頼性の高い階層化をサポートできるようにしました。これにより、使用済みボリューム領域が空きボリューム領域のしきい値 (%) を超えたことが検出された場合、直ちに階層化をサポートできます。
  • Azure File Sync Portal のエクスペリエンスが向上: プレビュー中にお客様から最も多く寄せられた課題の 1 つは、システムの状態がわかりにくいという点でした。マイクロソフトとしては、お客様にシステムの構成を理解してもらったり、コンピューター サイエンスの博士号を取得してまで Azure File Sync サーバー エンドポイントの状態を理解できるようになっていただくようなことは避けなければなりません。そのため私たちは、ポータル エクスペリエンスを改良することにしました。同期アップロードの進行状況がわかりやすく表示されるようにしたほか、エラー メッセージもアクション可能なものだけが表示されるようにしました。これにより、お客様はシステムの状態を理解するよりも、本来の日常業務に多く時間を割けるようになっています。
  • geo 冗長ストレージ (GRS) との統合で全体的なディザスター リカバリーが可能に: 高速ディザスター リカバリーでは、オンプレミス システムが被災した場合にはすばやく復元することができます。しかし、Azure リージョンにサービスを提供しているデータセンターが被災した場合は、簡単に復元することはできません。そこで私たちは、今回の一般提供に合わせて、Azure File Sync GRS の回復性の設定をエンドツーエンドで統合することにしました。これにより、Azure File Sync なら、災害時にも組織の貴重なデータをしっかりと守ることができます。

 

進化はこれから

今回の Azure File Sync の一般提供開始は、Azure Files Azure File Sync のイノベーションを進めていくための出発点にすぎません。マイクロソフトでは、この夏から秋にかけて多くの新機能や機能強化を提供していく予定です。その中には、Windows Server 2019 のサポートや、Windows Server 2019 との統合の強化なども含まれています。どうぞご期待ください。それでは Ignite でお会いしましょう!

Azure File Sync のさらに詳しい情報については、製品ページをご覧ください。

 

Project and Project Server July 2018 Updates Released

$
0
0

This week the Public Update (PU) for Project Server 2013 and 2016 were released for July 2018 . Client updates were released on July 3rd; server updates on July 10th. Typically the client updates release on the first Tuesday of the month and server on the second Tuesday release schedule.

There was a Project Server 2010 Cumulative update package released this month but it did not contain any Project updates - just the SharePoint ones. Mainstream support for Project and Project Server 2010 ended October 13, 2015 - see https://support.microsoft.com/en-us/lifecycle. An SP1 patched 2010 system (with no SP2) is no longer supported - see the Lifecycle site for more information - http://support.microsoft.com/lifecycle/search?sort=PN&alpha=project+2010&Filter=FilterNO

We are now delivering as Public Updates, although Server fixes are shipped just via the Download Center and not via Microsoft Update (Unless there is a security element or a fix deemed essential - this month both SharePoint Server 2016 and 2013 fixes have security fixes - so some may have come down via the update center). These are still all cumulative and include fixes released in all previous updates since the last baseline (Initial release for 2016 and SP1 for 2013).

A note about Click-to-Run (sometimes abbreviated C2R) versions of Project for Office 365. The updates for this version are not included in this blog. For some information about Click-to-Run versions, please see the following site for version numbers and some fix information: https://technet.microsoft.com/office/mt465751. We may have a future blog with additional information about Click-to-Run update channels and methods.

Also a note for users of the Project client connecting to Project Online - see https://blogs.technet.microsoft.com/projectsupport/2016/12/15/using-project-online-time-to-be-sure-you-upgrade-the-client-software/-  you will have needed a '2016' level client to connect starting since the end of June 2017.

Feel free to open a support case if you have any questions around this or need assistance getting these patches deployed.

We should be back to 'normal' install times now (I patched both my 2013 and 2016 systems in a couple of hours) - but leaving this comment here just in case... One point to note is the installation of the Project Server 2016 package (SharePoint Server) for September 2016 and beyond can take longer to install than previous 2016 updates, on my slow server it took several hours, so you should ensure you test installation in a similar environment to production to ensure you allow enough downtime.

The 2013 PU releases also have a real prerequisite of the appropriate Service Pack 1 (SP1), and links for SP1 are given below. SP1 is enforced in this release, so you will find out (as I did) if you really do have SP1 for all your installed components and language packs! This also means RTM is no longer supported! See http://blogs.technet.com/b/stefan_gossner/archive/2015/04/15/common-issue-april-2015-fixes-for-sharepoint-2013-cannot-be-installed-on-sharepoint-2013-sp1-slipstream-builds.aspx too which describes an issue you might see if you don't have the 'right' SP1. Slipstream would work with the original SP1 - but the updates require the re-released SP1. Since the May PU this shouldn't be an issue - but including here just in case.

Another important point to add here is that there was in early 2013 running the SharePoint Configuration Wizard on a server with Project Server 2013 installed -this is fixed by applying the April 2013 or later- so a good practice would be to load SP1, then the current PU and then run the configuration wizard (if you didn't already load the April 2013 through June 2014 CU).

Project and Project Server 2016

An overview of all the Office 2016 releases for July 2018 can be found here -

https://support.microsoft.com/en-us/help/4340798/july-2018-updates-for-microsoft-office - July 2018 updates for Microsoft Office

Project Server 2016

With the 2016 release, we just have a single patch (usually this single patch comes in two parts... a wssloc and sts2016 part - however this month we only have the sts2016 part) - as we have also the single msi for installation of SharePoint Server 2016 (Project Server still needs licensing separately though). Both parts need installing before the configuration wizard is executed. The sts2016 part of the patch also contains security fixes so is released via Microsoft Update, the Update catalog as well as the download center.

Description of the security update for SharePoint Server 2016: July 10, 2018- Includes Project fixes, like the roll-up patch in Project Server 2013.

https://support.microsoft.com/en-us/help/4022228/description-of-the-security-update-for-sharepoint-server-2016

There is a database schema update this month - it changes to 16.0.4717.1000. Remember, Project Server 2016 data is in the content database. The version number 16.0.4717.1000 can be used to control the connecting client to the July 2018 level. For reference - the RTM build number seen for the DB schema would be 16.0.4327.1000.

Project 2016 Client Package:

July 3rd, 2018, update for Project 2016 (KB4022217)

https://support.microsoft.com/en-us/help/4022217/july-3-2018-update-for-project-2016-kb4022217

The version of Project Professional 2016 will be updated to 16.0.4717.1000 in the properties for WinProj.exe. In 2016 we don't do a good job of displaying the version in File, Account, About Project - we only display the MSO version and not the specific Project version (You can confirm this by looking at the version of winproj.exe - in (default for 32 bit) C:Program Files (x86)Microsoft OfficeOffice16)

If you have Click to Run and using Project Pro for Office 365 at the '16' level, then your version will depend on which update frequency you have set. Take a look at https://blogs.office.com/2016/02/09/deferred-channel-build-now-available-for-the-office-365-client-apps/ for a few changes in this area - Current Branch for Business is now called Deferred Channel. We are aware that we don't appear to expose the full change details for Project and are looking into it - you should start seeing more here soon.

Project and Project Server 2013

An overview of all the Office 2013 releases for July 2018 can be found here - https://support.microsoft.com/en-us/help/4340798/july-2018-updates-for-microsoft-office - July 2018, updates for Microsoft Office. This include multiple fixes, so Microsoft strongly recommends that you test this in a test environment based on your production environment before putting this fix live in production. You can read about the fixes included in the Project and Project Server July PUs from the following articles:

Project Server 2013 Server Rollup Package

July 10, 2018, cumulative update for Project Server 2013 (KB4022240)

https://support.microsoft.com/en-us/help/4022240/july-10-2018-cumulative-update-for-project-server-2013-kb4022240

Project Server 2013 Individual Project Package - (cumulative, but only the Project Server fixes):

Description of the security update for Project Server 2013: July 10, 2018 (KB4022245)

https://support.microsoft.com/en-us/help/4022245/july-10-2018-update-for-project-server-2013-kb4022245

There is no database schema update this month - and the dbo.Versions table should show 15.0.5049.1000 after applying the July 2018 PU. The version number 15.0.5049.1000 can be used to control the connecting client to the July 2018 PU level. Project Professional Versions (Project Server 2013 settings)

SP1 for Project Server 2013 can be found here - https://support.microsoft.com/help/2880553

Project 2013 Client Package:

None

Tip o’ the Week 441 – OneNote updates again

$
0
0

As everyone knowsclip_image002

Tips talking about OneNote include coverage of the Modern App version, on ToW’s

#320, #386, #427 among others. The tl;dr version is that OneNote 2016 = great desktop app, OneNote metro/store/modern/whatev = not so functional but simpler and getting better, with a consistent UI across Windows, Mac, mobile & web. The OneNote team has basically said the desktop version is on life support and all new function development effort is going into the Store app version. Here’s a summary of their differences.

clip_image004There have been a variety of updates recently – clip_image006they should make their way to you automagically, or if you want to give your machine a poke to hurry it along, go to the Store app,  click the Ellipsis menu in the top right and choose Downloads and updates.

You might see that the Microsoft Store app itself has had a bit of an overhaul, too…

clip_image008clip_image010The OneNote Store version (sometimes officially referred to as “OneNote for Windows 10”) is a new codebase, which misses some of the more power-user features of OneNote 2016 but at the same time has added some new functionality that doesn’t exist in the desktop version, like ink to shape conversion. While many of the new feature adds are filling in gaps to the desktop release, some are adding new functions altogether.

clip_image012The latest update delivers a mixture of new and old – officially, there are no new features (according to the status page, at least at time of writing) but that’s not what is being reported widely (here, here), and by OneNote program manager @William Devereux, who summarised it nicely on Twitter.

If you’re a OneNote 2016 desktop user, why not set yourself a challenge and try switching to the OneNote for Windows 10 version for a week? Both versions can happily coexist and access the same data files, so you won’t lose any data and can easily switch back and forth between them, even running them both at the same time and perhaps with different notebooks open. To change the default version of OneNote, see here.

「イメージ」リソースをサブスクリプション・リージョン間でコピーする

$
0
0

こんにちは、Azure サポートチームの米田です。
Azure 仮想マシンに管理ディスク(Managed Disks)の機能が登場して1年以上経ちました。管理ディスクの仮想マシンから「イメージ」リソースを作成し、複数仮想マシンを展開するテンプレートとして使用されているお客様も多いのではないでしょうか。以前にAzure サポートチームでは、心血注いで作った仮想マシンのイメージを、是非他のサブスクリプションでも使い倒したい!というお客様向けに、イメージリソースのサブスクリプション間の移動方法について次のような手順をご案内してきました。

サブスクリプション間で「イメージ」リソースをコピーする
https://blogs.technet.microsoft.com/jpaztech/2017/08/25/howtocopyimagebetweensubscriptions/

しかしながら上記の手順は、「イメージ」作成の元ネタとなった 「ディスク」リソースが削除されていない場合にのみ使用が可能でした。今回は、「イメージ」作成の元ネタとなった「仮想マシン」や 「ディスク」が削除されている状態で、他のサブスクリプションへイメージを移動する方法をご案内します。なお、今回ご案内する手順は、サブスクリプション間の移動だけではなく、イメージのリージョン間の移動にも応用できますので、Azure仮想マシンの検証や運用に少しでもお役に立てば幸いです。

■手順

  1. イメージから再度仮想マシンを作成する
  2. 仮想マシンをOS内部で一般化する
  3. 仮想マシンの管理ディスクを別サブスクリプションにコピーする
  4. イメージを再作成する
  5. 不要なリソースを削除する

手順が多くて意外と大変だと思われた方もおられるかと思います。「管理ディスク」や「イメージ」リソースのサブスクリプション間の移動を容易にする手段については現在開発中になります。次のリソース移動の対応が進められておりますが、現時点で移動するための手段と理解ください。

新しいリソース グループまたはサブスクリプションへのリソースの移動
https://docs.microsoft.com/ja-jp/azure/azure-resource-manager/resource-group-move-resources#virtual-machines-limitations

※本手順は ARM (リソースマネージャー モデル / V2)を対象にした記事になります。
※本情報の内容(添付文書、リンク先などを含む)は、作成日時点でのものであり、予告なく変更される場合があります。

1.イメージから再度仮想マシンを作成する


Azureポータルから実施可能です。
[イメージ] リソースを選択し、[+ VM の作成] をクリックし、各種パラメーターを指定し、仮想マシンを作成します

[イメージ]から作成された仮想マシンは、管理ディスクの構成となりますので、仮想マシンデプロイ後は、以下のように”ディスク”リソースが新規作成されています。

このあとの手順は、「ディスク」リソースがあれば完了できます。そのため、1で作成された仮想マシンは、この時点でポータルから停止(割り当て解除)するか、削除ください。

2. 仮想マシンをOS内部で一般化する


手順1で作成した仮想マシンを、OS内部で一般化します。仮想マシン内部で一般化をおこなう方法は、Windows / Linuxで異なりますが、以下の「1. 仮想マシン内部で一般化する」の手順で実施することが可能です。Windowsであればsysprep、Linuxであれば仮想マシンエージェントによるdeprovisionを実行ください。

管理ディスク (Managed Disks) の “イメージ” リソースを使用し、仮想マシンを複数台展開する
https://blogs.technet.microsoft.com/jpaztech/2017/05/10/deployvmsfrommanagedimage/

3. 仮想マシンの管理ディスクを別サブスクリプションにコピーする


管理ディスクのコピーは、次の手順に従います。移行先サブスクリプションのストレージアカウントにディスクのデータ(vhd)をコピーします

管理ディスク (Managed Disks) のサブスクリプション間やリソース グループ間の移行について
https://blogs.technet.microsoft.com/jpaztech/2017/08/17/export-managed-disks-to-vhd/

この時、コピー先ストレージアカウントを元のイメージと別リージョンとしていただくことも可能です。別リージョンにコピーいただいた場合は、次の手順でストレージアカウントと同じリージョンにイメージを作成でき、そのリージョンで仮想マシンを展開することができます。
※リージョン間を跨ぐデータコピーは、データ転送料金が発生するためご注意ください。

3. 仮想マシンの管理ディスクを別サブスクリプションにコピーする


管理ディスクのコピーは、次の手順に従います。移行先サブスクリプションのストレージアカウントにディスクのデータ(vhd)をコピーします

管理ディスク (Managed Disks) のサブスクリプション間やリソース グループ間の移行について
https://blogs.technet.microsoft.com/jpaztech/2017/08/17/export-managed-disks-to-vhd/

この時、コピー先ストレージアカウントを元のイメージと別リージョンとしていただくことも可能です。別リージョンにコピーいただいた場合は、次の手順でストレージアカウントと同じリージョンにイメージを作成でき、そのリージョンで仮想マシンを展開することができます。
※リージョン間を跨ぐデータコピーは、データ転送料金が発生するためご注意ください。

4. イメージを再作成する


手順3でコピーしたvhdファイルから、管理イメージを再作成します

$vmName = "myVM" #仮想マシン名
$rgName = "myResourceGroup" #リソーグループ名
$location = "JapanEast" #リージョン名
$imageName = "myImage" #イメージ名
$osVhdUri = "https://mystorageaccount.blob.core.windows.net/vhdcontainer/osdisk.vhd" #手順3でコピーしたvhdファイルのパス
$osType = "Windows" #OS種別 Windows Or Linux

$imageConfig = New-AzureRmImageConfig -Location $location
$imageConfig = Set-AzureRmImageOsDisk -Image $imageConfig -OsType Windows -OsState Generalized -BlobUri $osVhdUri
$image = New-AzureRmImage -ImageName $imageName -ResourceGroupName $rgName -Image $imageConfig

5. 不要なリソースを削除する


手順1で作成した仮想マシンに紐づくリソースと手順3でコピーしたvhdファイルを削除します。

Updated Skype for Business 2015 (premise) Addendum MP

$
0
0

Updated and completed for Company Knowledge!

 

Many thanks to Nick Wood for his help deciphering user impact for these alerts.

Reach out to Nick on LinkedIn

 

This has been an arduous effort to complete the Skype alerts and components.

 

Gallery Download

 

It's taken a few steps along the way, to get all the content delivered.

 

To read the whole Skype Addendum journey, please read these additional blog posts
June blog
January blog

 

The initial Addendum pack with just service recoveries and Azure overrides

Old pack https://gallery.technet.microsoft.com/Skype-for-Business-2015-b005f49f
This download disabled Azure, set service recovery tasks

 

 

The new Gallery download contains the following:

Skype SCOM Alerts.xls
Microsoft.LS.2015.Monitoring.ComponentAndUser.Addendum.xml
Microsoft.SystemCenter.Notifications.Internal.xml
Skype.for.Business.Server.Management.Pack.Alert.Grooming.xml

 

NOTE The Skype.for.Business.Server.Management.Pack.Install.txt file contains the information as well

 

#############################################################
#
# Breakdown of files
#
#############################################################

#
# Skype SCOM Alerts.xls
# Skype SCOM Alerts XLS is is MP Export excerpt formatted for XLS workbook
#
# Feel free to search this file

# Column D is 'Escalate to Who'
# This has values as SCOM Engineering, Messaging Ops, Telephony, Messaging Engineering
# Column E is impact
# This has values: P3-P5, *Email
# Column F is the Display String for the monitor
# Column H has the User Impact, Cause, and Troubleshooting steps

 

#
# Microsoft.LS.2015.Monitoring.ComponentAndUser.Addendum.xml
# Addendum management pack sets up company knowledge tab for each Skype monitor, with actionable troubleshooting steps.
#

 

#
# Microsoft.SystemCenter.Notifications.Internal.xml
#

# Backup the current MP first, and merge if you are adding this to your environment!
# Use this pack cautiously, as it will replace existing Channels, subscribers, subscriptions.

# On Management server, open PowerShell window as Admin
#
# cd <path>
# Example

cd $HOME/desktop
Get-SCOMManagementPack -Name *Notification* | export-SCOMmanagementpack  -path "C:"

Copy-item .Microsoft.SystemCenter.Notifications.Internal.xml .Original-<CompanyName>-Microsoft.SystemCenter.Notifications.Internal.xml

 

 

# Save the bundled Notifications pack to the same path

# YES it's that important, the file can eliminate any alerts leaving SCOM!
#
# Save file to local drive

# Follow MP Fragment authoring if you need to merge existing Notifications with Skype pack
# https://blogs.technet.microsoft.com/kevinholman/2016/06/04/authoring-management-packs-the-fast-and-easy-way-using-visual-studio/
#

#
# Skype.for.Business.Server.Management.Pack.Alert.Grooming.xml
#
# This file is to set alerts per the XLS, making warnings for P4,P5, email, and P3 for Critical

#
#############################################################

 

 

 

QuickTip–Delay Functionality In Windows Snipping Tool

$
0
0

In current versions of Windows the venerable snipping tool (snippingtool.exe) has been updated with improved functionality.

Windows 7 Snipping Tool

This is the Snipping Tool from a Windows 7 lab machine:

Windows 7 Snipping Tool

Clicking on Options we see:

Windows 7 Snipping Tool Options

 

Windows 10 Snipping Tool

The below were taken from my Windows 10 build 1803 machine. Note that there are now additional buttons present.

Specifically the Mode and Delay buttons as shown below.

Windows 10 Snipping Tool

 

Mode allows you to customise what will be captured.

Windows 10 Snipping Tool - Mode Feature

Delay allows you to delay the capture so you have time to get the exact details ready.

Windows 10 Snipping Tool - Delay Feature

The options are the same as the Windows 7 version:

Windows 10 Snipping Tool Options

Bootnote

Why should you care about the new options?  Have to every had the requirement to capture a pop-up menu, but when you press the key to initiate the screen capture the key press dismisses the very thing you want to capture?

This is the perfect example of when to use the delay feature.  Set the delay, click new snip and then you will be capture the exact detail you want.

 

Happy snipping!!!

 

Cheers,

Rhoderick

Azure News (June 2018)

$
0
0

This newsletter is conceived so that in a few minutes you can get an overview of what has been going on in Azure last month, with a compilation of Azure announcements. My highlight this month is the GA of AKS, followed closely by the innovations in Azure Storage. Which ones are your favorites?

Management

IaaS

Containers

Security and IAM

Apps

Data

IoT

AI

Have fun!
Daniel


Support Tip: New Office .MSI removal feature is now available with Intune and C2R

$
0
0

By Aisha Wang | Intune PM

We received quite a few requests for this feature and we are happy to share it’s now available. As an IT admin, you can now deploy Office 365 apps using Intune, and Intune will take care of removing any other Office .MSI or Intune (C2R) installations. Previously, IT admins would have to manually remove any Office .MSI apps or the installation would fail. Now, using Intune, you can remove Office .MSI apps remotely as part of deploying new Office 365 apps.

One note as you use this updated feature - the remove .MSI feature will remove ALL .MSI Office apps, not just the new Office 365 apps being deployed through Intune.

Microsoft クラウドプラットフォーム ニュースまとめ 2018年7月【7/27 更新】

$
0
0

 

サーバー&クラウド関連の製品やサービスの発表をお伝えする、マイクロソフト マーケティングチームの公式ブログより、最近の更新をご紹介します。
ぜひブログをブックマークして最新情報をご入手ください。

 

Cloud and Server Product Japan Blog はこちらから


 

[最近の更新]

  • MS クラウド ニュースまとめ (2018 年 7 月 25 日)
    • Azure App Service support for Java SE 8 on Linux now in preview
    • Azure Event Grid | Availability in all public regions
    • Azure Event Grid | Development experience enhancements
    • Azure API Management | Integration with Application Insights—GA
    • Availability Zones support for Service Bus Preview
    • User behavior analytics tools in Azure Application Insights—GA
    • System Center 1807 now available
    • Azure security and operations management | The Security Center Adaptive Application Controls—GA
    • Azure Cloud Shell—Browser-based text editor | Preview
    • Azure IoT Hub | Manual failover in preview
    • Azure DNS | Increased SLA—GA
    • Network Performance Monitor (NPM) now available in UK South region
    • Azure Advisor | New recommendations now available
    • Kubernetes made easy with Azure Kubernetes Service (AKS)
    • Azure Database for MySQL | MySQL 4-TB server storage—GA
    • Azure Database for PostgreSQL | PostgreSQL 4-TB server storage—GA
    • Azure Cosmos DB | Change Feed support in preview
    • Azure Cosmos DB | Java Async SDK 2.0—GA
    • Azure DevOps Tool Integrations | Updated Azure support in Ansible 2.6
    • Azure Active Directory (Azure AD) | Combined password reset and Multi-Factor Authentication registration
  • MS クラウド ニュースまとめ – SQL Server 2008 および Windows Server 2008 のサポート終了について、他 (2018 年 7 月 16 日)
    • SQL Server 2008 および Windows Server 2008 のサポート終了について
    • Azure Data Box Disk のプレビュー
    • Azure IoT Central を発表
    • Azure のセキュリティと運用管理 | サブスクリプション エクスペリエンスへの Security Center 統合
    • Azure のセキュリティと運用管理 | Azure Government での Security Center
    • Azure File Sync の一般提供
    • Azure Firewall のプレビュー
    • Virtual WAN のプレビュー
    • Azure Marketplace の各種機能のプレビュー
    • Azure SQL Data Warehouse での高速データ移動
    • Azure SQL Database Managed Instance の Business Critical のプレビュー
    • Azure SQL Database の新しい購入モデル
    • Azure SQL Database のバックアップ長期保持
    • Azure SQL Database の自動フェールオーバー
    • Azure Maps の画像サービスおよび IP 検索サービスの追加
    • Azure SQL Data Warehouse の英国西部での一般提供
    • Azure Service Fabric Mesh のプレビュー
    • Azure Dev Spaces のプレビュー
    • Azure DevOps Projects の一般提供
  • MS クラウド ニュースまとめ – Azure IoT Edge の GA 他 (2018 年 6 月 27 日)
    • Azure Data Lake Storage Gen2 のプレビュー
    • Azure IoT Edge の一般提供
    • Azure App Service でのマネージド サービス ID の一般提供
    • Azure Logic Apps の中国での一般提供
    • Azure Search でオート コンプリートとシノニムをサポート
    • Azure SQL データベース データ同期の一般提供
    • Azure SQL Database ストレージ アドオンの一般提供
    • Azure SQL Database のゾーン冗長構成の一般提供
    • Azure Event Hubs での可用性ゾーンのサポートのプレビュー
    • Azure Database for MySQL および Azure Database for PostgreSQL (オープン ソース データベース サービス) Gen 5 の提供範囲拡大
    • Azure SQL Database のエラスティック ジョブのプレビュー
    • Azure SQL Database での再開可能なインデックス作成のプレビュー
    • Azure Dev Spaces のプレビュー
    • Visual Studio Team Services のナビゲーション エクスペリエンス強化
    • Azure Active Directory (Azure AD) のパスワード保護のプレビュー
    • Azure AD の条件付きアクセスでの VPN 接続
    • Azure AD の条件付きアクセスでの What If ツール
  • SAP on Azure の更新まとめ – 2018 年 6 月

過去のまとめを見るには、Cloud and Server Product Japan Blog タグを参照してください。

製品についての最新情報まとめを見るには最新アップデートタグを参照してください。

 

OSD Video Tutorial: Part 9 – Standalone USMT

$
0
0

This session is part nine of an ongoing series focusing on Operating System Deployment in Configuration Manager. This session discusses the User State Migration Tool that is used to migrate User State Data during imaging. The specific focus is on the tool itself, what it does, how it is used and scenarios for us. The goal of this session is to understand the standalone tool so that a later session discussion can turn to how User State Migration is integrated into Configuration Manager.

The video linked below was prepared by Steven Rachui, a Principal Premier Field Engineer focused on manageability technologies.

This is the last tutorial in the OSD Introduction series.  Join us for the OSD Deeper Dive series next where Steve starts with a look at task sequence variables.

Posts in OSD Introduction Sessions

Go straight to the playlist

OSD Video Tutorial Overview

Updates for Surface Pro (26 July 2018)

$
0
0

On July 26th we released updates for Surface Pro (Model 1796) and Surface Pro with LTE Advanced (Model 1807) devices running Windows 10 Fall Creators Update, version 1709 or greater to Windows Update. These updates are now available in MSI format on the Microsoft Download Center from the following links:

Click Download to download the following files from the Surface Pro Drivers and Firmware page at the Microsoft Download Center:

  • SurfacePro_Win10_16299_1805007_0.msi

Click Download to download the following files from the Surface Pro LTE Drivers and Firmware page at the Microsoft Download Center:

  • SurfacePro_Win10_16299_1805007_0.msi

These updates provide improvements to system stability and reliability, and resolve potential security vulnerabilities including Microsoft security advisory ADV180012 and ADV180013

Important!
Installing these updates to Surface UEFI firmware requires that the device be already updated with a newer Surface System Aggregator firmware (v234.2110.1.0 or greater). Instructions to ensure this are stated below.

If you install these updates using Windows Update, Windows Update will automatically install components in the necessary order. You may need to check for updates, install updates, and restart several times to fully install all these updates.

If you install these updates using the MSI, the MSI will automatically detect if prerequisites have been met and install updates in the correct order. The MSI will first install an updated Surface System Aggregator Firmware and restart to apply that firmware. After restart, a scheduled task will run the MSI again to install an updated Surface UEFI Firmware and restart to apply that firmware. After restart, a scheduled task will run the MSI again to install all the remaining components and restart one more time.

If you use WSUS to install updates and you have turned on automatic approval for all driver updates, you must offline update all Surface Pro (Model 1796) and Surface Pro with LTE Advanced (Model 1807) devices using the July 2018 MSI files unless they already have the required Surface System Aggregator firmware (v234.2110.1.0 or greater). If they do not already have the required Surface System Aggregator firmware (v234.2110.1.0 or greater), do not update these devices using WSUS with automatic approval turned on for driver updates for your Surface devices, as the firmware may not be installed in the required order.

For deployments of new devices, you need to ensure firmware is applied in the correct order. If your new devices already have Surface System Aggregator v234.2110.1.0 or greater installed, you can extract the July 2018 MSI and use that for new deployments. You can check the version installed on a new device by booting into Surface UEFI (Volume Up button + Power button when the device is off) and checking the version for “SAM Controller”.

If your devices have Surface System Aggregator that is lower than v234.2110.1.0, you need to ensure that Surface System Aggregator firmware v234.2237.257.0 (the version in the July 2018 MSI) is installed first. Here are two methods to accomplish that:

1) Turn on the new devices, quickly go through all the steps to get into Windows (you do not need to install updates or connect to a network), then run the July 2018 MSI file and let it automatically update firmware in the correct order. Then you can reimage that device with your normal deployment process.

2) Extract the July 2018 MSI, install only Surface System Aggregator Firmware v234.2237.257.0, and restart before installing any other Surface firmware component updates (Surface UEFI Firmware, Surface Management Engine Firmware, Surface Integrated Sensor Hub Firmware).

For your convenience, the updated components and the improvements they provide:

Surface Pro with LTE Advanced (Model 1807) and Surface Pro (Model 1796):

Note:  Each driver and firmware merges support for both Surface Pro (Model 1796) and Surface Pro with LTE Advanced (Model 1807)

  • Microsoft Surface ACPI-Compliant Control Method Battery v1.2.28.0 improves system stability
  • Intel(R) AVStream Camera 2500 – Camera v30.15063.6.6082) improves system stability
  • Intel(R) HD Graphics 615 – Display adapters v24.20.100.6136 improves system stability
  • Intel(R) HD Graphics 620 – Display adapters v24.20.100.6136 improves system stability
  • Intel(R) HD Graphics 640 – Display adapters v24.20.100.6136 improves system stability
  • Surface Integrated Sensor Hub Firmware v56.747.12.0 improves system stability
  • Surface Management Engine Firmware v11.8.50.3448 improves system stability
  • Surface System Aggregator Firmware v234.2237.257.0 improves system stability
  • Surface UEFI Firmware v234.2278.769.0 improves security
  • HID PCI Minidriver for ISS   – Human Interface Devices v3.1.0.3524 improves system stability
  • Intel(R) Precise Touch Device – Human Interface Devices v1.2.0.100 improves system stability
  • Surface 3 Type Cover Integration – Human Interface Devices v2.0.304.0 improves system stability
  • Surface PTP Filter – Human Interface Devices v1.0.183.0 improves system stability
  • Intel(R) Display Audio – Sound, video and game controllers v10.25.0.8 improves system stability
  • Realtek High Definition Audio(SST) – Sound, video and game controllers v6.0.1.8242 improves system stability
  • Microsoft Control Logic – System devices v30.15063.6.6082 improves system stability
  • Intel(R) CSI2 Host Controller – System devices v30.15063.6.6082 improves system stability
  • Intel(R) Imaging Signal Processor 2500 – System devices v30.15063.6.6082 improves system stability
  • Intel(R) Integrated Sensor Solution – System devices v3.1.0.3524 improves system stability
  • Intel(R) Management Engine Interface – System devices v11.7.0.1057 improves system stability
  • Intel(R) Serial IO GPIO Host Controller – System devices v30.100.1725.1 improves system stability
  • Intel(R) Serial IO 12C Host Controller – System devices v30.100.1725.1 improves system stability
  • Intel(R) Serial IO UART Host Controller – System devices v30.100.1725.1 improves system stability
  • Intel(R) Smart Sound Technology (Intel(R) SST) Audio Controller – System devices v9.21.0.3347 improves system stability
  • Intel(R) Smart Sound Technology (Intel(R) SST) OED – System devices v9.21.0.3347 improves reliability coming out of sleep, and Cortana functionality
  • Microsoft Camera Front– System devices v30.15063.6.6082 improves system stability
  • Microsoft Camera Rear – System devices v30.15063.6.6082 improves system stability
  • Microsoft IR Camera Front – System devices v30.15063.6.6082 improves system stability
  • ISS Dynamic Bus Enumerator – System devices v3.1.0.3524 improves system stability
  • Surface Accessory Device – System devices v1.1.511.0 improves system stability
  • Surface ACPI Notify Driver – System devices v3.1.136.0 improves system stability
  • Surface Display Color – System devices v3.13.136.0 improves system stability
  • Surface Integration Service Device – System devices v3.2.136.0 improves system stability
  • Surface Radio Monitor – System devices v2.10.136.0 improves cellular connection performance and reliability
  • Surface Serial Hub Driver – System devices v4.1.136.0 improves system stability
  • Surface Storage Firmware Update – System devices v1.1.1158.0 improves system stability

IT 部門の進化と変革【7/28更新】

$
0
0

(この記事は2018年5月4日にMicrosoft Partner Network blog に掲載された記事 The (r)evolution of IT の翻訳です。最新情報についてはリンク元のページをご参照ください。)

 

 

 

ここ数年お話ししてきたとおり、企業の IT 部門の役割は変化しつつあります。クラウドの台頭と共に、IT 部門はデータ センター業務から解放され、ビジネスを差別化、推進する重要な役割を担うことが予想されてきました。そして今、この予想が現実になろうとしています。クラウドでデータを利用できるようになったことで、イノベーションは新たな時代を迎え、IT リーダーは長年にわたるビジネスと IT のギャップを埋める方法について検討しています。

お客様の IT 運用モデルは、俊敏性と効率性に優れたビジネス中心のモデルに進化しつつあります。このような現状の中で、パートナー様はどのようにしてお客様をサポートすべきでしょうか。マイクロソフトの新しい電子ブック『Designed to Disrupt (破壊的変革への設計英語)』では、企業が変革し、新たなビジネス モデルを構築するにはどうするか、そして新たなビジネス チャンスを最大限に活用するために、IT 部門は迅速な方向転換を実行するにはどうすればよいかについて紹介しています。

これからは、計画、調達、開発、テスト、展開のリード タイムが短縮されます。テクノロジに精通した従業員が増えたことで、簡単な実験とプロトタイプ作成を行った後、すぐにアプリケーションを稼働できるようになりました。また、IT 部門がビジネス部門にサービスを提供するようになったことで、ビジネス変革の機会に目を光らせることが IT 部門のメンバー全員の義務となります。

成功を測る新たな指標

「従来、IT チームの評価は、アプリケーションを期日までに納品できるかどうかにかかっていました。しかし現在では、アプリケーションによって獲得できるビジネス リードの品質と数が評価基準となっています」

— マイクロソフト、前 CIO、Jim Dubois

 

こうした大きな変化を受けて、パートナー様とお客様は IT 部門に関する考え方を変え、ビジネス プロセスに重点的に取り組む必要があります。最新のクラウド テクノロジを活用すれば、革新的な変化を引き起こすことができます。まずはコンセプトを考案し、実験してみましょう。成功したら、プロトタイプと概念実証 (PoC) を構築し、達成できる成果を示します。実例では、概念実証は通常、短い場合で数日、長くても数週間で完了しました。

ビジネス部門とのパートナーシップが強化されたら、IT チームとビジネス チームの両方に実現できる成果を示し、インスピレーションをもたらす必要があります。インスピレーションはデジタル トランスフォーメーションに不可欠です。私自身、マイクロソフトとパートナー様、そしてお客様がクラウド テクノロジを活用してビジネスを変革した実績から、インスピレーションを受けずにはいられません。

パートナー様のサービスがお客様のデジタル トランスフォーメーションの目標に沿っていることを示すには、サービスの種類ごとにビジネス KPI を定義する方法が有効です。以下の表は、マイクロソフトの IT 部門の 15 のサービス項目について、それぞれの評価基準となる業績を示したものです。この表を IT 部門のリーダーがご覧になれば、自分の役割は IT 部門におけるビジネス リーダーとなることであると認識を変えていただけるでしょう。

 

『Designed to Disrupt』では、従来の役割の変化を解説すると共に、今後ますます戦略的に重要になる企業の IT 部門の新しい役割について、たとえば次のように説明しています。

従来の役割の変化:

  • CIO - データ センター業務やハードウェアの一括購入といった業務から解放され、ビジネス部門のパートナーとしての役割に完全に移行し、新たな収益源となる新しい機能の開発に従事します。
  • エンタープライズ アーキテクト - 拡大した IT エコシステム全体を調査して、機能の重複を最小限に抑えます。
  • エンジニアリング、DevOps - アプリケーション、テスト用スイート、展開スクリプトを開発し、頻繁な変更のニーズに応じてアプリケーションを継続的に開発、更新、展開できるようにします。
  • 情報アーキテクト - IT 部門の各データ モデルの整合性を確保するほか、IT 部門が管理しているデータの信頼性を確認して、アプリケーションとスタッフの両方が利用できるようにします。
  • ネットワーク & セキュリティ チーム - オンプレミスと現場のネットワーク デバイス間の通信の速度と安全性を確保します。

 

新しい役割:

  • リレーションシップ マネージャー - ビジネス部門が IT 部門の業務を完全に把握し、ビジネス部門のニーズが正確に反映されるようにします。
  • ビジネス アーキテクト - ビジネス部門が各アプリケーションを最大限に活用できるようにします。
  • プロセス エンジニア - エンドツーエンドのビジネス プロセスを調査し、効果的かつ最適な設計になるようにします。
  • クラウド アーキテクト - 最適なクラウド コンポーネントを選択し、ビジネス ニーズを満たすアプリケーションまたはアプリケーション システムを設計します。
  • データ サイエンティスト - ビジネス部門が将来を予測できるように、収集した膨大な量のデータからインサイトを抽出します。

デジタル トランスフォーメーションがパートナー様のビジネスとお客様の企業にとって何を意味するかは、パートナー様の新たなビジネス目標と、実装する製品やサービスの性質によって決まります。従来のような製品の販売から、知的財産としてパッケージ化できるデータ駆動型サービスや新たなデジタル テクノロジの提供への移行は大きな変化です。この複雑なプロセスは、私たちの働き方や市場投入の方法を一変させます。

Designed to Disrupt (英語)』は、IT 部門やビジネス部門のリーダーが、デジタル トランスフォーメーションの機会に向けて、ビジネス戦略を調整するために活用できる優れたリソースです。今すぐチェックして、お客様にイノベーションのインスピレーションをもたらすためにご活用ください。

電子ブックをダウンロードのうえ、こちらのマイクロソフト パートナー コミュニティ (英語) で、IT 業界の変化についてご意見をお聞かせください。

 

 

Top Contributors Awards! Deploy a new application in Azure Blockchain Workbench and many more!

$
0
0

Welcome back for another analysis of contributions to TechNet Wiki over the last week.

First up, the weekly leader board snapshot...

 

As always, here are the results of another weekly crawl over the updated articles feed.

 

Ninja Award Most Revisions Award
Who has made the most individual revisions

 

#1 George Chrysovaladis Grammatikos with 47 revisions.

 

#2 Dave Rendón with 37 revisions.

 

#3 karimSP with 29 revisions.

 

Just behind the winners but also worth a mention are:

 

#4 Peter Geelen with 25 revisions.

 

#5 get2pallav with 24 revisions.

 

#6 RajeeshMenoth with 19 revisions.

 

#7 Mohsin_A_Khan with 19 revisions.

 

#8 H Shakir with 12 revisions.

 

#9 Arleta Wanat with 6 revisions.

 

#10 .paul. _ with 6 revisions.

 

 

Ninja Award Most Articles Updated Award
Who has updated the most articles

 

#1 Dave Rendón with 20 articles.

 

#2 karimSP with 17 articles.

 

#3 Mohsin_A_Khan with 13 articles.

 

Just behind the winners but also worth a mention are:

 

#4 RajeeshMenoth with 11 articles.

 

#5 Peter Geelen with 11 articles.

 

#6 get2pallav with 9 articles.

 

#7 George Chrysovaladis Grammatikos with 8 articles.

 

#8 Arleta Wanat with 2 articles.

 

#9 H Shakir with 2 articles.

 

#10 .paul. _ with 2 articles.

 

Ninja Award Most Updated Article Award
Largest amount of updated content in a single article

 

The article to have the most change this week was T-SQL: How to Sort a Column that Contains Character-Separated Numbers, by Saeid Hasani

This week's reviser was Saeid Hasani

 

Ninja Award Longest Article Award
Biggest article updated this week

 

This week's largest document to get some attention is SharePoint Online content types in Powershell: Get, by Arleta Wanat

This week's reviser was karimSP

 

Ninja Award Most Revised Article Award
Article with the most revisions in a week

 

This week's most fiddled with article is Deploy a new application in Azure Blockchain Workbench, by Rebai Hamida Trabelsi. It was revised 10 times last week.

This week's revisers were RajeeshMenoth, Richard Mueller, .paul. _, Rebai Hamida Trabelsi & get2pallav

 

Ninja Award Most Popular Article Award
Collaboration is the name of the game!

 

The article to be updated by the most people this week is TechNet Guru Competitions - July 2018, by Peter Geelen

This week's revisers were Arleta Wanat, George Chrysovaladis Grammatikos, Kareninstructor, DBS14, karimSP & .paul. _

 

Ninja Award Ninja Edit Award
A ninja needs lightning fast reactions!

 

Below is a list of this week's fastest ninja edits. That's an edit to an article after another person

 

Ninja Award Winner Summary
Let's celebrate our winners!

 

Below are a few statistics on this week's award winners.

Most Revisions Award Winner
The reviser is the winner of this category.

George Chrysovaladis Grammatikos

George Chrysovaladis Grammatikos has won 8 previous Top Contributor Awards. Most recent five shown below:

George Chrysovaladis Grammatikos has not yet had any interviews, featured articles or TechNet Guru medals (see below)

George Chrysovaladis Grammatikos's profile page

Most Articles Award Winner
The reviser is the winner of this category.

Dave Rendón

Dave Rendón has been interviewed on TechNet Wiki!

Dave Rendón has won 43 previous Top Contributor Awards. Most recent five shown below:

Dave Rendón has TechNet Guru medals, for the following articles:

Dave Rendón has not yet had any featured articles (see below)

Dave Rendón's profile page

Most Updated Article Award Winner
The author is the winner, as it is their article that has had the changes.

Saeid Hasani

Saeid Hasani has been interviewed on TechNet Wiki!

Saeid Hasani has featured articles on TechNet Wiki!

Saeid Hasani has won 8 previous Top Contributor Awards. Most recent five shown below:

Saeid Hasani has TechNet Guru medals, for the following articles:

Saeid Hasani's profile page

Longest Article Award Winner
The author is the winner, as it is their article that is so long!

Arleta Wanat

Arleta Wanat has been interviewed on TechNet Wiki!

Arleta Wanat has won 34 previous Top Contributor Awards. Most recent five shown below:

Arleta Wanat has TechNet Guru medals, for the following articles:

Arleta Wanat has not yet had any featured articles (see below)

Arleta Wanat's profile page

Most Revised Article Winner
The author is the winner, as it is their article that has ben changed the most

Rebai Hamida Trabelsi

This is the first Top Contributors award for Rebai Hamida Trabelsi on TechNet Wiki! Congratulations Rebai Hamida Trabelsi!

Rebai Hamida Trabelsi has not yet had any interviews, featured articles or TechNet Guru medals (see below)

Rebai Hamida Trabelsi's profile page

Most Popular Article Winner
The author is the winner, as it is their article that has had the most attention.

Peter Geelen

Peter Geelen has been interviewed on TechNet Wiki!

Peter Geelen has featured articles on TechNet Wiki!

Peter Geelen has won 225 previous Top Contributor Awards. Most recent five shown below:

Peter Geelen has TechNet Guru medals, for the following articles:

Peter Geelen's profile page

Ninja Edit Award Winner
The author is the reviser, for it is their hand that is quickest!

.paul. _

.paul. _ has been interviewed on TechNet Wiki!

.paul. _ has featured articles on TechNet Wiki!

.paul. _ has won 15 previous Top Contributor Awards. Most recent five shown below:

.paul. _ has TechNet Guru medals, for the following articles:

.paul. _'s profile page

 

 Says: Another great week from all in our community! Thank you all for so much great literature for us to read this week!

Please keep reading and contributing, because Sharing is caring..!!

 

Best regards,
— Ninja [Kamlesh Kumar]

 

Azure Reserved VM Instances と Server サブスクリプションの併用でコストを大幅に削減【7/29更新】

$
0
0

(この記事は2018年5月10日にMicrosoft Partner Network blog に掲載された記事 Better together: Azure Reserved VM Instances and server subscriptions の翻訳です。最新情報についてはリンク元のページをご参照ください。)

 

お客様にとっての価値を高め、パートナー様のビジネスを拡大

マイクロソフトは先日、クラウド ソリューション プロバイダー (CSP) プログラムで Azure Reserved Virtual Machine Instances (Azure RI) の提供を開始すること、および今後 Windows Server および SQL Server サブスクリプションの提供を予定していることを発表しました。

現在、法人のお客様の間では、予測可能なクラウド ワークロードをサポートする、コスト効率の高いソリューションに対する需要が高まっています。Azure RI により、パートナー様はこの需要に効果的に対応できるようになります。CSP Azure RI Server サブスクリプションにより、お客様には市場トップ レベルの価値がもたらされ、コストを大幅に (最大 80%) 削減できると同時に、他に類を見ない柔軟なデプロイが可能になります。これに加えて、リスクを最小限に抑え、収益性を最大限に高めるという、パートナー様にとって理想的なビジネス モデルが提供されます。

Azure Reserved Virtual Machine Instance とは何ですか。

Azure RI は、1 年または 3 年契約でクラウド コンピューティング リソースを事前購入できるサービスです。

 

 

お客様のメリット

お客様が Azure RI Server サブスクリプションを利用すると、市場で最も魅力的な料金で柔軟なデプロイを行えるようになり、最大限の価値を得ることができます。CSP Azure RI が追加されると、お客様は 1 年または 3 年契約で仮想マシンを購入 (「予約」) することで、Azure VM の従量課金制の料金と比べて最大 72% のコストを削減できます。さらに、ソフトウェア アシュアランス付きの Windows Server をご利用のお客様は、Azure ハイブリッド特典を利用して、従量課金制の料金と比べて最大 80% のコスト削減を達成できます。

マイクロソフトは、大幅なコスト削減、シンプルな調達プロセス、柔軟なデプロイ条件というメリットを同時に実現します。たとえば、Azure RI の使用条件には以下が含まれます。

  • インスタンス、ファミリ、場所、期間をいつでも変更することができます。
  • 予約期間中なら、いつでもキャンセルが可能です。

 

今後 CSP でリリース予定の Windows Server および SQL Server サブスクリプションには Azure ハイブリッド特典が含まれるため、現在ソフトウェア アシュアランスをご利用になれないお客様も、マイクロソフトのサーバー ワークロードのコストを最大限に削減できます。

 

パートナー様のメリット

マイクロソフトでは、Azure RI Server サブスクリプションが総合的に最も高い価値をお客様に提供すると同時に、パートナー様のビジネス モデルの面からも魅力的となるように取り組んでいます。

Azure RI と Server サブスクリプションのライセンスは簡単に取得できるため、手間をかけることなく、コストの予測精度を高め、販売プロセスを合理化できます。また、このビジネス モデルでは、お客様のために Azure RI を調達、管理し、料金設定を行うための複雑なプロセスやツールを導入する必要はありません。パートナー様は IT 管理の付加価値クラウド ソリューションによって拡張されたポートフォリオを活用して、より多くの時間とリソースを新規案件の獲得に費やすことができます。

Azure RI と Server サブスクリプションは、パートナー様が売上を伸ばし、収益性を高めるうえで強固な基盤を構築します。

 

  • Azure クラウド サービスを使用することで、パートナー様は利益率の高い付加価値 IT サービスを開発、提供できます。これにより、追加のソフトウェアやサービスの販売を促進できると共に、管理手数料という収益を継続的に得ることができます。
  • マイクロソフトの明快な Azure インセンティブ モデルにより、パートナー様はクラウド ビジネスの収益性を最大限に高めることができます。
  • 契約ベースのソリューションは、長期的な信頼に基づくビジネス関係を育み、お客様の生涯価値と収益性を向上させることができます。

 

Azure RI と Server サブスクリプションは、CSP プログラムに参加しているパートナー様にご利用いただけます。詳細については、パートナー センター (英語) [Announcements] タブをご覧ください。

Azure RI と Server サブスクリプションに関するご意見は、こちら (英語) のマイクロソフト パートナー コミュニティまでお寄せください。

 

 

 


TechNet Wiki Technical Guru Winners – June 2018

$
0
0

All the votes (for June) are in!

Below are the results for the TechNet Guru Awards, June 2018 !!!!

 

The TechNet Guru Awards celebrate the technical articles on TechNet, contributed from valued wiki authors like YOU!

Each month, the contributions are scored by a panel of judges (5 per category, 2-3 in each are MS experts), and the winners of each category are showered with love and attention from all corners of TechNet.

See the links at the bottom, to find out more about the competition and how to enter.

 

We have picked the top three highest scored contributions for each category to bestow our awards upon.

The awards are in gold, silver and bronze, the gold obviously being the top winner of the category.

The last column is just a few of the comments judges made during the judging process.

In some cases, we have not obtained permission to use the judges names, so they have been reduced to initials.

 

My fellow wiki ninjas will be digging deeper into some of these articles in this blog series, so watch out for those.

 

Any of our judges can exercise their right to veto an article, if they do not feel it meets minimum requirements for a medal.

When this is the case, we will at least give an indication of the reason, so you understand why.

 

A big thank you also to the other authors who did not make the top three of each category.

Some articles only just missed out, so we may be returning to discuss those too, in future blogs.

 

 ASP.NET Technical Guru - June 2018 
Gold Award Winner SYED SHANU ASP.NET Core Blazor Master Detail Grid with Filtering and Sorting using EF and Web API
Khanna Gaurav: "Very well explained"
Sabah Shariq: "Great guideline with detail steps."
Silver Award Winner Vincent Maverick Durano Entity Framework and ASP.NET MVC 5: Building Web Application (Part 1)
Sabah Shariq: "Wow! Looks like going to be a great tutorial series. Nice work."
Khanna Gaurav: "Recommended for someone planning to learn MVC"
Bronze Award Winner AnkitSharma007 ASP.NET Core 2.0: CRUD Using Angular 5 And ADO.NET
Khanna Gaurav: "Great article"
Sabah Shariq: "Good explanation of CRUD operation and all you need to get start."

Also worth a mention were the other entries this month:

 

 BizTalk Technical Guru - June 2018 
Gold Award Winner Mandar Dharmadhikari BizTalk: Deploying WCF Services To IIS under Default InetPub folder using BTDF
Todd Rivers: "NO comments. BTDF-based, so open source"
Ronen Ariely (aka pituach): "Awesome article! Well done"

 

 Microsoft Azure Technical Guru - June 2018 
Gold Award Winner Kapil Kumawat Azure Cosmos DB: Introduction (Part 1)
Robert Smit: "This is very nice"
Afzaal Ahmad Zeeshan: "Great intro Kapil"
Eric Berg: "Thank you"
Silver Award Winner RajeeshMenoth Cognitive Services : Analyze an Image Using Computer Vision API [Missed from voting in May]
Robert Smit: "Thanks Rajeesh"
Eric Berg: "Well done"
Afzaal Ahmad Zeeshan: "Great work"
Bronze Award Winner Pete Laker Postcodes with Bing Maps API
Afzaal Ahmad Zeeshan: "Excellent write up and the good use of graphics make it a clear read."
Robert Smit: "Very good, so hard to choose a winner"
Eric Berg: "Thanks Pete"

Also worth a mention were the other entries this month:

 

 Miscellaneous Technical Guru - June 2018 
Gold Award Winner Leon Laude Windows Admin Center: Adding a server connection
Lasse Wedø: "Can this be expanded to actually tell us about prerequisites, possible errors and solutions?"
Richard Mueller: "Good walk through for this produce. We need a See Also and links to other resources. Let us hope we don't need to enter credentials so often in the future."
Kia Zhi Tang: "Thank you for the Windows Admin Center contribution walk-through with screenshot"

 

 SharePoint Technical Guru - June 2018 
Gold Award Winner Ramakrishnan Raman SharePoint Framework (SPFx) webpart with elevated privileges using MS Flow
Roman Nedzelsky, MVP: "Nice article! perfect explanation. Like it."
John Naguib: "Excellent thanks for sharing"
Silver Award Winner get2pallav SharePoint Framework (SPFx): Microsoft BOT framework integration
John Naguib: "Very nice integrating bots, thanks"
Roman Nedzelsky, MVP: "Good article"

 

 Small Basic Technical Guru - June 2018 
Gold Award Winner Nonki Takahashi Small Basic: Polygon
SYEDSHANU: "Great sample to getting started with using Shapes and Polygon in Small Basic ,Thanks for sharing Nonki Takahashi."

 

 SQL Server General and Database Engine Technical Guru - June 2018 
Gold Award Winner Mohsin_A_Khan SQL Server: All about Detach and Attach operations and common scenarios where they may or may not work
Visakh16: "Another nice article explaining the various scenarios of attach detach operation. Nicely organized into various sections with accompanying code. A good reference article for anyone trying to use the feature"

 

 System Center Technical Guru - June 2018 
Gold Award Winner Leon Laude Orchestrator 1801: Installing SQL Server 2016 remotely
Adam Fowler: "High level of detail, screenshots of every step and well explained - great work!"
Joseph Moody: "Very detailed and I love the screenshot walk-through!!"
Eric Berg: "Thanks"
Silver Award Winner Leon Laude Orchestrator: How to use the Windows native powershell version
Eric Berg: "Well done. Thank you!"
Adam Fowler: "More great work, but the images aren't working on this one for some reason.These instructions fix a common requirement for most SCORCH users"
Joseph Moody: "This is also a very good write up, thank you for contributing!"

 

 Transact-SQL Technical Guru - June 2018 
Gold Award Winner Vishal Jharwade  T-SQL Programming – How to see Query execution time in milliseconds
Diederik Krols: "Very useful, thanks!"
Richard Mueller: "Good to be able to measure performance of queries. We should have a See Also, and links to other resources. Also, the grammar can be improved."
Visakh16: "A quick reference article explaining on client statistics feature which will be helpful for getting query execution time in milliseconds"

 

 Visual C# Technical Guru - June 2018 
Gold Award Winner Emiliano Musso [C#] Permutations in solving Shikaku through bruteforcing
Jaliya Udagedara: "Interesting article, love it!"
Ronen Ariely (aka pituach): "interesting topic, which can help to cheat in Shikaku game. I assume that not many people will implement this specific scenario, but yet you can learn from the code and the procedure a lot. Moreover, the article is written well. It is well formatted and very clear and highly recommended. Having another version in Italian is a big advantage."
Silver Award Winner Karen Payne .NET: Defensive data programming (Part 3)
Jaliya Udagedara: "Nice article."
Ronen Ariely (aka pituach): "It was hard to judge which article is better since we had 5 awesome C# articles this month. Actually I think that all those articles should get gold medal, but "there can be only one". I love series of articles and previous articles in this series already won medals. Therefore, I chose to let other topics their 5 minutes of glory. This article is well written and perfectly formatted for the Wiki"
Bronze Award Winner Karen Payne SQL-Server- C# Find duplicate record with identity
Ronen Ariely (aka pituach): "Nice solution but we can prevent these issue using constraint in the database level. If you are developers and you did not design your database well, then this might help you solve issues. Well written and very clear article"
Jaliya Udagedara: "Nice article."

Also worth a mention were the other entries this month:

  • SQL-Server C# Alternate methods to remove records by Karen Payne
    Ronen Ariely (aka pituach): "I think that the approach presented in the article of "not deleting rows from table" is HIGHLY important! The topic presented here is very important. There was some tiny uses of incorrect terms like using "field" instead of "column" or "records" instead of "rows" (we delete rows from table). With that being said the article is great.It is well written and well formatted."
    Jaliya Udagedara: "Nice article."
  • SQL-Server export to Excel, Access and XML by Karen Payne
    Jaliya Udagedara: "Great article discussing a common requirement."
    Ronen Ariely (aka pituach): "This article brings implementation of T-SQL OPENROWSET using C#. There is no uniqueness in execute these queries over any other queries and I find the value in the SQL Server category mainly. This is article is written well and presents the topic awesome. It's formatted perfectly to the Wiki, but it could be more valuable to the Wiki, to improve existing articles we have regarding OPENROWSET."

 

 Wiki and Portals Technical Guru - June 2018 
Gold Award Winner Dave Rendón Portal - Azure IoT: Survival Guide
Mark Parris: "The one stop shop and gateway to all things IoT."
Richard Mueller: "Excellent use of Wiki guidelines Great collection of links."
Kia Zhi Tang: "Very handy IoT survival guide wiki portal. Thank you for the effort to sum it all up."

 

 Windows Server Technical Guru - June 2018 
Gold Award Winner Subhro Majumder SubInACL: A complete solution to configure security permission
Eric Berg: "Thank you"
Mark Parris: "Excellent foundation, One of my favourite command line tools and not that well known too."
Joseph Moody: "Wonderful guide! I learned quite a few new tricks!"
Richard Mueller: "Lots of good images, and command line examples. This is an important and useful tool. We need a See Also and links to other resources. Also, note that the pronoun "we" is first person."
Kia Zhi Tang: "Very nice detail example of this SubInACL command line tool. It will be great to have some reference to the tool and documentation. Enjoyed reading it"

A huge thank you to EVERYONE who contributed an article to last month's competition.

Submissions for July are about to close, so get your contributions in now!

Best regards,
Pete Laker

 

More about the TechNet Guru Awards:

AIP: I know when you open my document, and I can revoke access! (Compliance + Sales = Seller Hero)

$
0
0

Have you sent an email to someone (perhaps a customer) that contained an important document and wish you could see if they have opened it? What if you accidently sent the document to the wrong audience, wouldn't it be nice to revoke access? Perhaps it's a sales quote and you want it to expire in 30 days? Well the future is here, and this is possible today using Azure Information Protection (AIP), included with Enterprise Mobility + Security, Microsoft 365, or a plan that includes AIP with Office 365. In this blog post we will explore from an end-user perspective how they can see if their recipient has opened the document, and how to revoke it's access.

Azure Information Protection enables your organization to classify it's data and apply security policy to that data, but more importantly gives the end-users visibility and control over how the data is consumed. This tool is extremely powerful for both IT and end-users, because it allows you to not only discover what data is in the organization, but classify it based on some criteria (i.e. Confidential, Secret, Top Secret and risk to organization) and apply policies that govern who can access what data based on the classification assigned.

This can be especially useful when you need help complying with regulations like GDPR. For more information about Azure Information Protection, I suggest reading the IT Pro documentation: What is Azure Information Protection? As I will not be covering full technical details here, such as how to configure the protection policy. I also highly suggest reviewing the AIP client user guide HERE.

You're telling me I can see who has opened my document?

Yes! If I send you a document, spreadsheet, PDF, PowerPoint, etc – I can see if you have opened that file, doesn't matter how it was sent either (email, file transfer over Skype, posted to Teams,etc). I can also see who has opened the file, by their identity, regardless if they were the intended recipient. I simply control this using the site https://track.azumrerms.com

When I browse to the site, and login, I can see a list of the documents I have protected using Azure Information Protection:


Clicking on one of the documents, I have access to see how many views (and by whom), how many (and by whom) were denied access to the document, among other controls. Let's click on the list at the top menu


Here I can see who (by user identity, as signed into the Office applications) have attempted to access the document and whether or not they were successful. This is extremely useful!


Clicking on Map at the top menu I can see where in the world the document has been accessed. If all my users were accessing from the US, and then one user was from outside the US – this could indicate a stolen identity or data breach, and I may want to revoke access to the document.


Clicking on Settings from the top menu, allows me to do something REALLY COOL: Whenever the document is accessed – I can receive an email notification! Why is this really cool? I might be a salesperson and this document might be a proposal to a client. If I never receive an email indicating you never opened the document, then I know you may not be interested and I need to adjust my sales approach. This is one of the features of the product (in my opinion) that sells itself. Having that type of intelligence can be critical to the closure of a deal.


At the bottom of the page, I can revoke everyone's access to the document by the clicking Revoke Access button:


At the bottom, I click Confirm:


All access to the document has now been revoked:


How does this work?

All roads lead to identity:

When a file is protected using Azure Information Protection (AIP), the file is actually encrypted at the file level, and the encryption travels with the file where ever it goes. This encryption is tied to the user's identity in Azure Active Directory (AD). When the file is accessed, they are authenticating to Azure AD, and authorization is checked, the file is de-encrypted and the user can view the file. For more detailed technical information on how this encryption process works see How does Azure RMS work? Under the hood

So, if I give you a super sensitive file that has been protected using AIP, unless you have my identity – or have been granted authorization – you cannot open the file. This is (in my opinion) a game changer, as this means your organization's data can travel from device to device (personal home computer, work computer, mobile devices, USB sticks, etc) and the data will stay encrypted. It doesn't matter if the device is protected or not – because the file is already encrypted. It doesn't matter if I accidently send the file to someone I shouldn't have – because it's already encrypted.

What's required to do this? A few things as outlined in the technical documentation but most importantly: The recipient (inside or outside your organization) needs to have an identity account in Azure Active Directory.

What if the recipient does not have an Azure AD account?

If the file is being sent to someone outside your organization, and that recipient does not have an identity account in Azure Active Directory you have a few options:

  1. The recipient can signup for "Azure RMS for Individuals" by browsing to this website and going through the wizard. Microsoft will check the email address to see if it's associated with an AIP subscription, or an Office 365 subscription that includes AIP. If it is not found, you can register and essentially an account in Azure Active Directory will be created for you. For more information about this process see: RMS for individuals and Azure Information Protection (Note, this DOES NOT sign your company up for anything, this is tied to a single identity so you can use the viewer or sign into a protected file)
  2. If you do not want to go with option 1 (although, it's VERY easy!) then your second option is actually pretty interesting. When AIP is used with Exchange Online – and that document is sent using Office 365 Message Encryption, then you can sign in using a Gmail, Hotmail or Microsoft (Live) account! See New Capabilities Available in Office 365 Message Encryption
  3. The last option, uses the Azure Information Protection client. You can manually specify the recipients who are authorized to access the file (by email address) and their associated permissions using the AIP client:


IMPORTANT: All three options require the user to sign into Office on their device (or use the Azure AIP Viewer) with the identity that is associated with the AIP protected file. So, if I receive a spreadsheet from you sent to johndoe@gmail.com, I need to sign into Excel on my device as johndoe@gmail.com.

NOTE: Notice above, there is an option to Expire Access. I can have the file expire after say, 30 days and no one can open it afterwards. This is again another important feature that adds tremendous value (salesperson that wishes to expire a quote after 30 days).

Conclusion:

As you can see, Azure Information Protection can provide tremendous value back to your organization with empowering employees to take control over their data and ensure it's security. However, this also enables them to be more productive through being able to seamlessly share the sensitive files outside the organization and track it's usage. This used to require different 3rd party products and trying to get them integrated with the environment was a challenge.

It's important to note, I have not shown all the back-end configuration that can be performed by IT to add additional value and to meet organizational requirements. Please review the technical documentation to learn more about the following: trusted domains, permissions based on classification type, Office 365 Message Encryption (and how typing the recipient's email address in the To line in Outlook automatically grants them permissions, etc.)

If you own AIP through Microsoft 365, Office 365 or Enterprise Mobility and Security – give this a try and tell me about your success in the comments below!

Arabic Language Pack for SCSM Self Service Portal

$
0
0

Hi All,

one of the challenges we face in our region is providing users with their native Self Service Portal Language. Since Arabic is not part of built-in languages shipped with Service Manager Self Service Portal, we were looking into different options such as having 3rd party portal but not now 🙂

We spent some time looking into the files that SSP is using and located the language resource files which you can be used not only for Arabic, but for any other language that is not available in SCSM Self Service Portal.

In this post we will show you 2 things. First, how to filter the languages and keep required ones instead of having all languages available in the portal. Second, together we will configure Arabic Language pack for System Center Service Manager Self Service Portal to be such as below screenshot.

First: Show preferred languages (Remove unnecessary ones)

When you click on the language settings (Top Right  Corner) in Self Service Portal, by default 10 or more languages appear to select including Chinese, French, Japanese, ... etc. to make it easier for users, it is preferred to show them the languages that they could use only.Follow the procedure below to make that happen:

0- <<BACKUP BACKUP BACKUP>>

1- Browse to (C:inetpubwwwrootSelfServicePortalViewsShared) folder

2- Edit (_Layput.cshtml) file using notepad or any other tool. (run as administrator) (Don't forgot to backup the file and saving it somewhere else before editing it)

3- Search the file for "<ul class=lang_menu ..."

4- Remove the lines for necessary languages and keep the ones you want your users to see. Remember to remove the whole line (from <li ------- to -------- </li>)

I removed all languages except English, French and Dutch

5- Refresh your portal ...

Completed .... lets see how can we configure a new language pack 🙂

 


 

Second: Configure Arabic Language pack for SSP 

As mentioned before, this is not limited to Arabic as you can use it to configure any language you want but in this example we will talk about configuring Arabic language pack. follow the procedure below

1- Browse to (C:inetpubwwwrootSelfServicePortalViewsShared) folder

2- Edit (_Layput.cshtml) file using notepad or any other tool. (run as administrator) (Don't forgot to backup the file before editing it)

3- Add the following line inside <ul class=”language_mune …

<li value="ar-JO" tabindex="12">Arabic</li>

Note: ar-JO???? this is the Arabic Language code of  Jordan. For more info about different language code for countries read https://www.andiamo.co.uk/resources/iso-language-codes

 

4- Browse to folder (C:inetpubwwwrootSelfServicePortalApp_GlobalResources)

5- Copy file (SelfServicePortalResources.en.resx) to your local machine (where Arabic keyboard supported)

6- Rename file to be (SelfServicePortalResources.ar.resx)

7- Edit the file using any tool (such as notepad++)

8- In the file you can find all words used ... Translate it into Arabic ... or download this translated file SelfServicePortalResources.ar_

 

 

9- Upload the file to the folder (C:inetpubwwwrootSelfServicePortalApp_GlobalResources)

 

10 - Refresh your browser and select Arabic Language from Language Settings tab.

 

NOTE: if you don't have any Service Offering with (Arabic) language selected then you won't see any offering. at least create one service offering and select language as Arabic then add some requests offering for it

Hope this would be useful ... Thanks for reading

Mohamad Damati

How To: Quickly Edit Videos On Windows 10

$
0
0

Teachers often want a quick and simple way to capture, edit and share video moments from their classrooms and the Photos App on Windows 10 allows them to do this very easily.

The above 9 minute video shows how to:

  • Import existing video clips
  • Trim video clips in length and arrange the sequence of video clips
  • Add music and special effects (including pinning effects to objects in the video)
  • Sharing on social media platforms

For further guidance have a look at this link.

Photos

Preventing a data breach, avoiding the news, and keeping your job

$
0
0

With my dog on one side, my green tea on the end table and my tablet in hand, I sift through my Bing news feed on keywords "Cyber Security" as I do every Sunday morning. I come across a few articles that talk about how a company has been breached and tons of intellectual property has been stolen. Sensitive data pertaining to the "secret sauce" of how a company manufactures it's product or it's long term roadmap. The articles talk about how it was an insider job, a supplier/vendor that was breached, and how the company is now going through a PR nightmare. Some of the data breaches were stolen identity via social engineering or email phishing while others were more sophisticated. As I read my emotions are a flutter with sympathy and with anger. One thing is clear, the common denominator in these companies is simple, they have something the bad guys want: information. Whether it's intellectual property so an economy abroad can grow, exploitation, or financial fraud – there is a little something for everyone to go around.

The next day I travel to the Microsoft Inspire partner conference where I work the Microsoft security booth on the expo floor and deliver break out sessions to Microsoft's global partner community. While working the booth, it's not uncommon to talk with 500+ people the first few days. Lots of foot traffic walks by where you are standing, and most want to talk with you and see what it is you are representing. The people that stop by span across the partner ecosystem, from IT consulting companies to companies that create custom software that enable other companies to be successful, and they all have a vested interest in Microsoft and in you. As the week goes on, partner after partner I speak with, I start noticing a theme in my conversations. I heard probably a dozen stories around data breaches, how their customers were recently hacked, and now in damage control mode.

A common theme emerges in these conversations, just like I read the day before in the news. Almost all of the attacks tied back to a user's identity being stolen either through email phishing or social engineering.

Nothing is 100% secure – meaning how much money and time does an attacker have to dedicate to the attack. With that said, I believe that most of the stories I read and heard could have have been prevented by implementing some key technologies. This blog is about those technologies and processes and how they can help to lower your risk and increase your security posture within the organization – some technologies you may already own, and not even realize it.

Note: It is important to implement a defense in-depth strategy inclusive of people, process and technology that spans from the human to the client endpoint, to the network, to the data, identity, etc. While I am only going to cover what I consider "low hanging fruit" in this blog – please understand there is a lot more that can be done!

At the end of the day, all roads lead back to identity

It does not matter how encrypted the data is when at-rest or in-transit, how locked down the computer is, the type of security (i.e. antivirus) software and the type of firewall that is deployed. At the end of the day, if I have your identity, in other words your username and password – it's game over. With your credentials, I have keys to the kingdom (so to speak). If you are an IT administrator and I have your credentials, then it's really game over. With those credentials I can traverse the environment, login to virtually every line of business app from finance to customer databases to email mailboxes. The best part - without the proper technologies in place, you may not know it's happening until it's too late.

Let's face it, times have changed and with it means the way we think about IT security must also change. No longer is our sensitive data and intellectual property stored on servers in a company owned data center, or on company owned computers. The data is stored in 3rd party cloud storage services, personal devices, and who knows where else. So how do you secure access and protect the data if you don't know where it lives? Simple: through a security strategy that incorporates: Identity, access management, and information protection. Identity is the new firewall, and data authorization must be tied to the user's identity.

For this to work, you need a unified set of credentials. You need a single identity. This is where Azure Active Directory comes in. Not only is this single set of credentials used to access Office 365, but it's also used to access your Windows PC and can even be used to access 3rd party cloud apps such as G-Suite, Box and Salesforce. As an example, Azure Active Directory can provide Single Sign On and unified identity management for G-Suite, via a Chromebook – here's a video demonstration

Sign-in to online services:

If using an online service such as Office 365, one of the simplest (and low cost) action you can take immediately is to customize the sign on page. The "human firewall" is the first line, and last line of defense. By customizing the page users sign-in to access corporate resources in Office 365 (or other online applications), when the webpage doesn't have the company's logo or background image this can be a red flag to the user and indicate this could be a bad actor impersonating the company. With a little bit of awareness, if an end user sees this, they know not to type in their credentials.

Standard (non-customized) Office 365 sign-in page:

Customized Office 365 sign-in page (can you tell the difference?):

Awareness and education for end users

The more an employee understands cyber security and how to protect themselves and the organization, the better. One effective way is by simulating phishing attacks within the organization and targeting your employees who are at risk with awareness campaigns. After all, email phishing remains the #1 threat vector we see in our research and telemetry. (Read the Microsoft Security Intelligence Report for more information).

This can be achieved using the Office 365 Attack Simulator, where an IT admin can send a simulated phishing email to a targeted set of employees. These emails can be custom crafted to match the business and difficult to spot, if a user clicks on the link and types in their credentials, IT has reporting to then follow up on those users with targeted training programs. Here's Office 365 Attack Simulator in action:

Launch an attack right from within the Office 365 Security & Compliance Center:

The simulated phishing email looks real, complete with targeting an individual user, and disclaimers at the bottom:

If the user clicks on the link, they are presented with an Office 365 sign in page. Notice the domain in the address bar (it's not an official Microsoft sign in page…) Note: You can customize this page.


If the user types in their credentials, they are presented with a page (that you can customize) instructing them this was only a simulation (but they fell for it) and some general information about email phishing:

The IT admin can then review reporting to discover who clicked on the link, and follow up with additional training:

Multi-factor (two step /two factor) authentication:

The next layer in your defense strategy with identity is multi-factor authentication (MFA). If a bad actor compromises your identity and steals your credentials, MFA makes it more expensive for them to succeed with attempting to use your credentials. For example, if you have my username and password and attempt to login to Office 365, if MFA is enabled on my account you must authenticate using a second factor such as a SMS code, one-time passcode, phone call or mobile app authorization. Without this, you cannot proceed.

Note: If MFA is tied to your cell phone number for a phone call or SMS, beware this is not as safe as you think.

Using Azure Multi-Factor authentication, and the smartphone app is a great way to protect your corporate credentials, and an easy way to access Office 365! Here it is in action:

If using a smart watch, I do not need to fumble for my phone to find a SMS message or one-time passcode. I can simply tap "Approve" as the push notification hits my phone and arrives on my watch!

IMPORTANT:
Also, using Windows Hello for Business makes signing into your Windows PC much easier with a PIN, facial recognition or fingerprint. For more information watch the following video What is Windows Hello?

Note: When Windows Hello for Business is configured, it is multi-factor authentication by default. Something you know is the PIN, facial recognition or fingerprint and something you have is a key tied to the Trusted Protection Module (TPM) in your PC. For more information see Windows Hello for Business
There is a future of going passwordless. (Personally, I almost never have to type in my password in my day job with the exception of a few legacy applications).

An added benefit of using Windows Hello for Business, is that it is Single Sign On to your applications once you are logged into your PC! See this video for more information.

Access to resources based on a set of conditions

Let's take identity to the next level with access management. A key and unique feature of having your identity in Azure Active Directory is being able to take advantage of conditional access. This is an if/then statement that occurs every time a user logs into a resource using their Azure AD credentials.

As an example, if the user is an administrator we may require MFA and require the user access from a specific location (i.e. the office) or a specific device (such as a Privileged Access Workstation). Another example, could be a business scenario such as denying retail workers to access Microsoft Teams when off the clock. As you can see in the figure below, Conditional Access can even allow access (such as from a kiosk PC) but control the user's session and deny the ability to download any data locally.

One of my favorite conditions is deny access if the user's credentials have been discovered for sale on the public internet, user is coming from a known botnet, or even an impossible travel scenario. More on this in the next section.

For more detailed information on Conditional Access see What is conditional access in Azure Active Directory?

 

Here's an example of Conditional Access in action, where an end user is attempting to access corporate email on an iPad. Conditional Access kicks in to require the device to be managed before proceeding:

Protecting the user's identity

What if the user's credentials are stolen? How do we ensure the attacker cannot use the stolen credentials? One effective method is to leverage Conditional Access as I described above and combine it with Azure Active Directory Identity Protection (AADIP). For more information I recommend watching the following video.

What AADIP enables you to do, is when a user signs in to a resource with their Azure AD credentials, Conditional Access and AADIP will assess the likely hood that user's identity has been stolen and associate it with a risk score of high/medium/low. Based on the score, you can decide if you want to allow access, challenge with MFA or a password reset, block access, or allow limited access. This uses machine learning and behavioral analytics to determine abnormal behavior like travel from infrequent locations or impossible travel. This will even look at the dark web to see if a user's credentials are up for sale (more information here)

AADIP also gives you visibility into users that are high risk, so you can then investigate those users to determine if there is a threat or a false positive. With a tool like this, as an IT Pro I can have confidence that we are protecting our environment even if a user's credentials have been compromised (as a result of them clicking on the link in the phishing email).

Here's AADIP in action:

 



What about managing administrators and their access?

Remember, if an administrator's identity is stolen, then an attacker has keys to the kingdom. A good IT security practice is to limit how many administrators you have in the environment. That's all good but what if I have a large environment where I need multiple administrators to perform daily operational tasks? This is where Azure Active Directory Privileged Identity Management (AADPIM) comes in.

Using AADPIM, I can limit the number of global administrators to one or two trusted individuals, then when someone needs elevated access to perform a management task they can request access. When access is requested and approved, a policy is in place that limits the permissions the requester has to that specific task (known as just enough access) and the access is time bound to a time window (known as just in time access). This way, you do not need to grant someone full administrator permissions to perform a simple task such as resetting a password or an administrative task in Office 365 or Azure – you just need to give them the proper role. This limits your risk and increases your posture.

A side benefit – is every access request is audited and logged. You now have an audit trail of when someone requested access, when they were approved access and (if enabled, such as auditing in Office 365) specifically how they used those permissions.

Here's AADPIM in action:

Protecting against email-based threats (attachments and links)

Let's take a detour from identity for a moment and revisit email phishing, the #1 threat vector. Phishing emails can be comprised of attachments that appear legitimate but contain malware under the hood that when executed on your PC, grants the attacker direct access to your computer. The email could also contain a link that takes you to a webpage asking you to sign in to Office 365 (but is really stealing your credentials to be used by the attacker). So how do we protect against these threats and help ensure these emails don't make it to the user's inbox? Simple, Office 365 Advanced Threat Protection (ATP).

Office 365 ATP in a nutshell, detonates attachments and links before they are delivered to the user's inbox. This is done through essentially a virtual environment where the attachment is being executed to understand if it is a legitimate document, or contains malicious code. This is referred to as Safe Attachments. For links, they are rewritten in the email. When the user clicks the link, they are redirected to the ATP service and the URL is checked against the Microsoft Intelligent Security Graph. Links that are embedded in Office documents or files on Microsoft Teams or SharePoint can also be protected.

Here's Safe Attachments and Safe Links in action:

Gaining visibility into file, cloud and logon activities

What if an attacker successfully makes it past the barriers we have talked about up to this point? Having visibility into what data is accessed, how it was accessed, and what was done with it can be powerful. Having policy in place to govern what can be done with that data, can be even more powerful.

Leveraging Microsoft Cloud App Security (MCAS), an IT admin has visibility into what is being accessed across the entire Office 365 tenant. Do you also have G-Suite, Box, Dropbox or SalesForce? You can see what's occurring in those cloud services using this tool as well! For more detailed information see What is Microsoft Cloud App Security.

Here's a look at all the activities occurring across my Office 365 tenant:

Specific file level activity:

Various alerts based on configured policy:

Activity occurring across G-Suite and Box:

Protecting the sensitive data – Not just in Office 365!

What about protecting your actual data? In this new world of storing data on multiple devices, and in multiple cloud services, we need to make sure the data itself is encrypted as it travels from device to device and from cloud to cloud. This is where Azure Information Protection comes in. This tool enables IT to classify data (e.g. Secret, Top Secret, Confidential) and govern access to the data based on it's classification (e.g. read only, or can't copy or can't print). It even enables you to send to someone outside the company and revoke access if needed.

Azure Information Protection (AIP) is built on identity. When I open a document that is protected using AIP, it uses my identity to provide authorization to view the document. When the document is closed, it is encrypted. If I send you the document, it leverages Azure Active Directory to see if you are authorized to view the contents. Unless you have my identity or have been granted permissions – you cannot open the document. AIP also allows IT to automatically classify documents based on keywords and apply security policy. So as an example, if I am working on a customer quote that contains a customer's account number or Personally Identifiable Information – the document is classified appropriately and the appropriate permissions and security policy is also applied.

At the end of the day, I can store sensitive company data on any device/any cloud. With AIP, the data is encrypted and protected, and because it is tied to Azure Active Directory I ensure only the proper recipients can gain access to open it.

Lastly, when Azure Information Protection is integrated into Microsoft Cloud App Security (MCAS), this enables me to discover data across my different clouds (such as G-Suite or Box) and then classify and protect that data, all from a single tool. Here's a policy in MCAS on where that is configured:

Here's the other half of the policy and applying governance actions to data that was discovered by the template, keyword or regular expression:

How does this work?

All roads lead to identity:

When a file is protected using Azure Information Protection (AIP), the file is actually encrypted at the file level, and the encryption travels with the file where ever it goes. This encryption is tied to the user's identity in Azure Active Directory (AD). When the file is accessed, they are authenticating to Azure AD, and authorization is checked, the file is de-encrypted and the user can view the file. For more detailed technical information on how this encryption process works see How does Azure RMS work? Under the hood

So, if I give you a super sensitive file that has been protected using AIP, unless you have my identity – or have been granted authorization – you cannot open the file. This is (in my opinion) a game changer, as this means your organization's data can travel from device to device (personal home computer, work computer, mobile devices, USB sticks, etc) and the data will stay encrypted. It doesn't matter if the device is protected or not – because the file is already encrypted. It doesn't matter if I accidently send the file to someone I shouldn't have – because it's already encrypted.

What's required to do this? A few things as outlined in the technical documentation but most importantly: The recipient (inside or outside your organization) needs to have an identity account in Azure Active Directory.

What if the recipient does not have an Azure AD account?

If the file is being sent to someone outside your organization, and that recipient does not have an identity account in Azure Active Directory you have a few options:

  1. The recipient can signup for "Azure RMS for Individuals" by browsing to this website and going through the wizard. Microsoft will check the email address to see if it's associated with an AIP subscription, or an Office 365 subscription that includes AIP. If it is not found, you can register and essentially an account in Azure Active Directory will be created for you. For more information about this process see: RMS for individuals and Azure Information Protection (Note, this DOES NOT sign your company up for anything, this is tied to a single identity so you can use the viewer or sign into a protected file)
  2. If you do not want to go with option 1 (although, it's VERY easy!) then your second option is actually pretty interesting. When AIP is used with Exchange Online – and that document is sent using Office 365 Message Encryption, then you can sign in using a Gmail, Hotmail or Microsoft (Live) account! See New Capabilities Available in Office 365 Message Encryption
  3. The last option, uses the Azure Information Protection client. You can manually specify the recipients who are authorized to access the file (by email address) and their associated permissions using the AIP client:

IMPORTANT: All three options require the user to sign into Office on their device (or use the Azure AIP Viewer) with the identity that is associated with the AIP protected file. So, if I receive a spreadsheet from you sent to johndoe@gmail.com, I need to sign into Excel on my device as johndoe@gmail.com.

NOTE: Notice above, there is an option to Expire Access. I can have the file expire after say, 30 days and no one can open it afterwards. This is again another important feature that adds tremendous value (salesperson that wishes to expire a quote after 30 days).

 

 

Visibility into your security posture

The last item I want to discuss is around security management, and understanding your all up security posture across Office 365 and your Windows endpoints. Leveraging Microsoft Secure Score I can have such visibility using a scoring system. Immediately upon reviewing I can have a good understanding of my current posture, and an idea of the recommendations and actions I need to perform to raise that posture and lower my risk. I can even see how certain actions will impact my users, and how I compare to my peers in the same industry. This tool enables me to answer the common question "what are the immediately actions I can implement today that are low cost and low impact?'

Here is Secure Score in action:

 

If using Windows Defender Advanced Threat Protection I have visibility (and control) over my Windows 10 environment, and can see which PCs have security controls enabled and are up to date on security patches and the latest Windows 10 build installed. All critical to help protect me from ransomware.

 

Conclusion:

Using the security tools in Microsoft 365, I am able to significantly increase my security posture and lower my overall cyber security risk using technology that I may already own. This enables me to better secure what matters – my organization's data, and as you can see above, enables end users to be more productive. Are you using Microsoft 365, or any of the items above? Let me know in the comments below!

Enjoy!

--Matt

Viewing all 36188 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>