Quantcast
Channel: TechNet Blogs
Viewing all 34890 articles
Browse latest View live

Lasst die Kinder an die Tasten

$
0
0

Am Klischee von den IT-Nerds, die den ganzen Tag im dunklen Keller hocken, stur auf den Bildschirm starren und einsam vor sich hin hacken, ist schon seit Langem nichts mehr dran. Coden macht Spaß! Davon konnte ich mich diese Woche im Rahmen der Hour of Code in bei Microsoft Berlin wieder einmal selbst überzeugen.

Besonderen Anklang fand unser Coding Workshop für Familien, bei dem Eltern und Kinder gemeinsam in die Welt des Programmierens eintauchen, zusammen verschiedene Coding-Tools und Programmierumgebungen kennenlernen, und mit Minicomputern und Robotern experimentieren konnten.

Immer mehr Eltern erkennen, dass der souveräne Umgang mit dem Computer sowie Teamfähigkeit oder kreatives Denken in Zukunft entscheidend für die Arbeitswelt sein werden.  Laut einer Forsa-Umfrage im Auftrag der Körber-Stiftung fordern sogar 59 Prozent der Bundesbürger, dass Kinder bereits in der Schule Programmieren lernen sollten.

Hier setzt auch unsere Coding-Initiative Code your Life an. Kinder lernen in spielerischer Atmosphäre zum Beispiel in der Programmiersprache Logo erste Befehle oder entwickeln mit Turtle-Grafiken kreative Kunstwerke und experimentieren mit Minicomputern und Robotern.

Dabei sind die unmittelbaren Ergebnisse nicht nur für die Kinder eine Bestätigung und Motivation. Auch viele Eltern hatten in dieser Woche diesen Aha-Moment, in dem sie gesehen haben, dass es gar nicht nur darum geht, Algorithmen zu schreiben, sondern viel mehr um Abstraktionsfähigkeit, Kreativität, Problemlösungskompetenz und Teamarbeit ihrer Kinder. Und sie konnten wirklich stolz auf ihre Nachwuchs-Entwickler sein, die unter anderem auch kleine winterliche Songs mit Sonic-Pi komponierten.

Weitere Informationen zur Initiative Code your Life und unseren Mitmachangeboten für Lehrer und Schüler finden Sie auch auch in unserem Artikel „Fit in die digitale Zukunft“.

Kinder programmieren_1

 

kinder-programmieren_3

 

kinder-programmieren_4

 

Ein Beitrag von Astrid Aupperle
Leiterin Gesellschaftliches Engagement, Microsoft Deutschland

Astrid-Aupperle-140x140

 

 

 

 

 


Turn off O365 licenses for all users

$
0
0

Hello All,

If you need to turn off O365 licenses for all users currently using an Office 365 E3, E5 subscription plan or etc, you can go through the following steps to disable some plans that you do not wish for them to use. For example, if you want to assign O365 to all your users, but your not comfortable deploying Yammer yet, you can disable the Yammer subscription for all users at once. Another scenario is if Microsoft enables new features in your tenant such as Flow, Microsoft Teams, or Dynamics, you can follow the steps below to remove them from all users.

*Note: Do not run these steps if all your users do not have the same licenses applied. For example if you have some users using Skype for Business but not all of your E3 users are, this will not work for you. The cmdlet below will make changes for All users with that license pack subscribed.*

  1.  Get your license account SKU.
    1. Get-msolaccountSku

  2. Collect a list of users with a license and place them in a variable.
    1. $AllLicensed = Get-MsolUser -All | where {$_.isLicensed -eq $true}

  3. Verify your list.
    1. $AllLicensed

  4. Get a list of license currently assigned and disabled for your users.
    1. (Get-MsolUser -UserPrincipalName user@domain.com).Licenses[0].ServiceStatus

  5. Create a variable of the subscriptions with the disabled plans. Insert the Sku from step2, and replace Domain:enterpisepack with your exact subscription name. Be sure to leave the quotes. If your licenses are named differently you can get the accurate names from step 5.
    1. $LO = New-MsolLicenseOptions -AccountSkuId “[Domain:EnterprisePack]” -DisabledPlans “FLOW_O365_P2”, “POWERAPPS_O365_P2”, “TEAMS1”

  6. Run the script to update the plans. This script will count out each user in progress.
    1. $AllLicensed | foreach {$i; get-msoluser -userprincipalname $_.userprincipalname | Set-MsolUserLicense -LicenseOptions $LO; $i++}

  7. Verify plans have changed. Spot check for a few users, or you can customize a script to output everyone to a CSV.
    1. (Get-MsolUser -UserPrincipalName user@domain.com).Licenses[0].ServiceStatus

 

If you follow the steps correctly, the plans should be disabled for your users. I do recommend testing the new features, as Stream and Teams seem to be nice new features that I use, however I can understand that for security reasons, these need to be investigated prior to releasing to your employees.

-Dom

Windows 10: protection, detection, and response against recent Depriz malware attacks

$
0
0

A few weeks ago, multiple organizations in the Middle East fell victim to targeted and destructive attacks that wiped data from computers, and in many cases rendering them unstable and unbootable. Destructive attacks like these have been observed repeatedly over the years and the Windows Defender and Windows Defender Advanced Threat Protection Threat Intelligence teams are working on protection, detection, and response to these threats.

Microsoft Threat Intelligence identified similarities between this recent attack and previous 2012 attacks against tens of thousands of computers belonging to organizations in the energy sector. Microsoft Threat Intelligence refers to the activity group behind these attacks as TERBIUM, following our internal practice of assigning rogue actors chemical element names.

Although the extent of damage caused by this latest attack by TERBIUM is still unknown, Windows 10 customers are protected. Windows 10 has built-in proactive security components, such as Device Guard, that mitigate this threat; Windows Defender customers are protected through multiple signature-based detections; and Windows Defender Advanced Threat Protection (ATP) customers are provided extensive visibility and detection capabilities across the attack kill chain, enabling security operation teams to respond quickly. Microsoft’s analysis has shown that the components and techniques used by TERBIUM in this campaign trigger multiple detections and threat intelligence alerts in Windows Defender Advanced Threat Protection.

Attack composition

Microsoft Threat Intelligence has observed that the malware used by TERBIUM, dubbed “Depriz” by Microsoft, reuses several components and techniques seen in the 2012 attacks, and has been highly customized for each targeted organization.

We do not see any indicators that a zero-day exploit is being used by TERBIUM.

Step 1: Writing to disk

The initial infection vector TERBIUM uses is unknown. As credentials have been hard-coded in the malware TERBIUM uses, it is suspected that TERBIUM has harvested credentials or infiltrated the target organization previously. Once TERBIUM has a foothold in the organization, its infection chain starts by writing an executable file to disk that contains all the components required to carry out the data-wiping operation. These components are encoded in the executables resources as fake bitmap images.

shamoon-depriz-implants

Figure 1. The components of the Trojan are fake bitmap images

We decoded the components as the following files:

  • PKCS12 – a destructive disk wiper component
  • PKCS7 – a communication module
  • X509 – 64-bit variant of the Trojan/implant

Step 2: Propagation and persistence through the target network

We have seen TERBIUM use hardcoded credentials embedded in the malware to propagate within a local network. The availability of these credentials to the activity group suggests that the attacks are highly targeted at specific enterprises.

The propagation and persistence is carried out as follows:

  1. First, it tries to start the RemoteRegistry service on the computer it is trying to copy itself to, then uses RegConnectRegistryW to connect to it.
  2. Next, it attempts to disable UAC remote restrictions by setting the LocalAccountTokenFilterPolicy registry key value to “1”.
  3. Once this is done, it connects to the target computer and copies itself as %System%ntssrvr32.exe or %System%ntssrvr64.exe before setting either a remote service called “ntssv” or a scheduled task.

Step 3: Wiping the machine

Next, the Trojan installs the wiper component. Note: TERBIUM establishes a foothold throughout the organization and does not proceed with the destructive wiping operation until a specific date/time: November 17, 2016 at 8:45 p.m.

The wiper component is installed as %System%<random name>.exe. During our testing, it used the name “routeman.exe”, but static analysis shows it can use several other names that attempt to imitate file names of legitimate system tools.

The wiper component also contains encoded files in its resources as fake bitmap images.

The first encoded resource is a legitimate driver called RawDisk from the Eldos Corporation that allows a user mode component raw disk access. The driver is saved as %System%driversdrdisk.sys and installed by creating a service pointing to it using “sc create” and “sc start”. This behavior can be observed in the process tree available in the Windows Defender ATP portal. The below alert represents an example of the generic detections in Windows Defender ATP:

Screenshot of Windows Defender ATP alert: Depriz starting ephemeral service to load RawDisk driver "drdisk"

Figure 2. Windows Defender ATP alert: Depriz starting ephemeral service to load RawDisk driver “drdisk”


Screenshot of Windows Defender ATP event tree: Depriz Trojan dropping the wiper component (named “routeman” in this instance), which in turn drops the RawDisk driver “drdisk”

Figure 3. Windows Defender ATP event tree: Depriz Trojan dropping the wiper component (named “routeman” in this instance), which in turn drops the RawDisk driver “drdisk”

 

There are two interesting things worth noting about RawDisk:

  • It requires a valid license key from Eldos Corporation to run. However, the license key included in Depriz is the same as the one used in the 2012 attacks – and this license key was only valid for a short period in 2012. TERBIUM works around this by changing the system time on targeted computers to a valid period in 2012.
  • It is the same as the driver used in the 2012 attacks.

 

Screenshot of Depriz license key (the same as the one used in 2012 attacks) and its limited validity period

Figure 4. Depriz license key (the same as the one used in 2012 attacks) and its limited validity period

 

The wiper component uses an image file to overwrite files in locations listed in the following:

  • Master Boot Records (MBR)
  • HKLMSystemCurrentControlSetControlSystemBootDevice
  • HKLMSystemCurrentControlSetControlFirmwareBootDevice
  • C:WindowsSystem32Drivers
  • C:WindowsSystem32Configsystemprofile
  • Typical user folders like “Desktop”, “Downloads”, “Documents”, “Pictures”, “Videos” and “Music

Microsoft is also aware of a second threat that uses a distinct wiping component. We detect this as Trojan:Win32/Cadlotcorg.A!dha in Defender and generic detections with Defender ATP. Microsoft is continuing to monitor for additional information on this threat.

Step 4: Rendering the machine unusable

Finally, the following command is used to reboot the system into the intended unusable state:

shutdown -r -f -t 2

When the computer attempts to restart after shutting down, it is unable to find the operating system because the MBR was overwritten in step 3. The machine will no longer boot properly.

Mitigation: Multiple layers of protection from Microsoft

Windows 10 protects, detects and responds to this threat. Windows 10 has built-in proactive security components, such as Device Guard, that mitigate this threat by restricting execution to trusted applications and kernel drivers.

In addition, Windows Defender detects and remediates all components on endpoints as Trojan:Win32/Depriz.A!dha, Trojan:Win32/Depriz.B!dha, Trojan:Win32/Depriz.C!dha, and Trojan:Win32/Depriz.D!dha.

Windows Defender Advanced Threat Protection (ATP), our post-breach security service, provides an additional layer of security to enterprise users. With threat intelligence indicators, generic detections, and machine learning models, Windows Defender ATP (trial link) provides extensive visibility and detection capabilities across the attack kill chain of threats like TERBIUM.

Appendix – Indicators of compromise

We discovered the following SHA1s in relation to TERBIUM:

SHA1 hashes for malicious files

  • 5c52253b0a2741c4c2e3f1f9a2f82114a254c8d6
  • e7c7f41babdb279c099526ece03ede9076edca4e
  • a2669df6f7615d317f610f731b6a2129fbed4203
  • 425f02028dcc4e89a07d2892fef9346dac6c140a
  • ad6744c7ea5fee854261efa403ca06b68761e290

SHA1 hashes for legitimate RawDisk drivers

  • 1292c7dd60214d96a71e7705e519006b9de7968f
  • ce549714a11bd43b52be709581c6e144957136ec

Signature names for malicious files

 

Mathieu Letourneau

Windows Defender Advanced Threat Protection Threat Intelligence Team

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 
 

 

Extending UNIX/Linux Computer class from a local file

$
0
0

 

image

 

I recently wrote a blog article on Extending the Windows Computer class from Registry keys on agents.  You can read about that here:  https://blogs.technet.microsoft.com/kevinholman/2016/12/04/extending-windows-computer-class-from-registry-keys-in-scom/

However, what about UNIX/Linux agents?  They don’t have the concept of a Windows Registry.  For those, we can use a file on the filesystem as an example.

 

In this example – we create a new class, “DemoFile.UNIX.Computer.Extended.Class”

We use Microsoft.Unix.Computer as the base class, and we will add three example properties:  TIER, GROUPID, and OWNER.

 

<ClassType ID="DemoFile.UNIX.Computer.Extended.Class" Accessibility="Public" Abstract="false" Base="Unix!Microsoft.Unix.Computer" Hosted="false" Singleton="false" Extension="false"> <Property ID="TIER" Type="string" AutoIncrement="false" Key="false" CaseSensitive="false" MaxLength="256" MinLength="0" Required="false" Scale="0" /> <Property ID="GROUPID" Type="string" AutoIncrement="false" Key="false" CaseSensitive="false" MaxLength="256" MinLength="0" Required="false" Scale="0" /> <Property ID="OWNER" Type="string" AutoIncrement="false" Key="false" CaseSensitive="false" MaxLength="256" MinLength="0" Required="false" Scale="0" /> </ClassType>

 

We will use a file on the filesystem to contain the properties in order.  This will allow individual business units to control their own class properties for grouping purposes.

We will name the file “scom.conf” and place it in /opt/microsoft/ directory

This discovery will discover each custom class property you want, using the three examples above.  My file looks like the following:

image

image

 

In order to discover properties in UNIX/Linux, it is a bit more complicated than under Windows.  We need a discovery, that will call a Command Shell datasource, that will then pass the output (StdOut) to a PowerShell script.  The PowerShell script can then take the comma delimited data, and split it out into individual class properties to add to the discovery.  The last step of the PowerShell script is to output the discovery data.  With UNIX/Linux systems in SCOM – all the workflows run against the management servers, so PowerShell is a perfect option.

Here is the PowerShell discovery script:

param($SourceId,$ManagedEntityId,$TargetSystem,$StdOut) # For testing discovery manually in PowerShell: # $SourceId = '{00000000-0000-0000-0000-000000000000}' # $ManagedEntityId = '{00000000-0000-0000-0000-000000000000}' # $StdOut = "2,LINUX,kevinhol" # $TargetSystem = "ubuntu.opsmgr.net" #================================================================================= # Constants section - modify stuff here: # Assign script name variable for use in event logging $ScriptName = "DemoFile.UNIX.Computer.Extended.Class.Discovery.Datasource.ps1" #================================================================================= # Gather script start time $StartTime = Get-Date # Gather who the script is running as $WhoAmI = whoami # Load MOMScript API $momapi = New-Object -comObject MOM.ScriptAPI # Load SCOM Discovery module $DiscoveryData = $momapi.CreateDiscoveryData(0, $SourceId, $ManagedEntityId) # Log an event for the script starting $momapi.LogScriptEvent($ScriptName,6666,0, "Script is starting. UNIX Computer: ($TargetSystem) StdOut: ($StdOut) Running, as $WhoAmI.") # Clear any previous errors if($Error) { $Error.Clear() } #================================================================================= # MAIN body of your script if($StdOut -ne $null -and $StdOut -ne "0" -and $StdOut -ne "") { # $StdOut = $CmdOutput.Replace([Environment]::newline,":") $Properties = $StdOut.Split(",") $TIER = $Properties[0] $GROUPID = $Properties[1] $OWNER = $Properties[2] # Create discovery data $Inst = $DiscoveryData.CreateClassInstance("$MPElement[Name='DemoFile.UNIX.Computer.Extended.Class']$") $Inst.AddProperty("$MPElement[Name='Unix!Microsoft.Unix.Computer']/PrincipalName$", $TargetSystem) $Inst.AddProperty("$MPElement[Name='DemoFile.UNIX.Computer.Extended.Class']/TIER$", $TIER) $Inst.AddProperty("$MPElement[Name='DemoFile.UNIX.Computer.Extended.Class']/GROUPID$", $GROUPID) $Inst.AddProperty("$MPElement[Name='DemoFile.UNIX.Computer.Extended.Class']/OWNER$", $OWNER) $DiscoveryData.AddInstance($Inst) #================================================================================= # Return Discovery Items Normally $DiscoveryData # Return Discovery Bag to the command line for testing (does not work from ISE): # $momapi.Return($DiscoveryData) } Else { # Log an event the StdOut was NULL $momapi.LogScriptEvent($ScriptName,6667,2, "StdOut was NULL. Did not get any data from UNIX Shell Command") } # End script and record total runtime $EndTime = Get-Date $ScriptTime = ($EndTime - $StartTime).TotalSeconds # Log an event for script ending and total execution time. $momapi.LogScriptEvent($ScriptName,6666,0, "Script has completed. Runtime was $ScriptTime seconds")

 

When I review Discovered Inventory in the console for this class, I can see the properties:

 

image

 

 

 

I am attaching the sample MP file at the following location:

 

https://gallery.technet.microsoft.com/Extend-UNIXLinux-Computer-57284056

Network Policy Server (NPS) Technical Reference for Windows Server 2008 through Windows Server 2012 R2

$
0
0

The Network Policy Server (NPS) Technical Reference is now available in Word format as a download in TechNet Gallery.

This is the Microsoft Network Policy Server (NPS) Technical Reference for Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2, and Windows Server 2008. In these products, NPS is a networking server role that allows you to create and enforce organization-wide network access policies for client health, connection request authentication, and connection request authorization.

You can configure NPS to perform as a Remote Authentication Dial-In User Service (RADIUS) server, RADIUS proxy, Network Access Protection (NAP) policy server, or as any combination of these, for incoming connection requests from virtual private network (VPN), wireless access point, authenticating switch, or dial-in network access servers.

This technical reference includes content that might not be available elsewhere on the Web in the future, including information about registry keys, SQL Server stored procedures, authentication methods and processes, authorization methods and processes, and NPS architecture.

For more information, see the Network Policy Server (NPS) Technical Reference.

BlogMS Microsoft Team Blogs – November 2016 Roll up

[第11回] デジタル指名パートナーの基本 ビデオ公開!【12/10 更新】

$
0
0

Microsoft Partner Network (MPN)の概要についてご説明したビデオシリーズを順次公開しております。

[第11回] DPORの基本  をご紹介いたします。以下よりぜひご覧ください。

 

 

System Center Aralık 2016 Bülten

$
0
0

Configuration Manager (SCCM)

 

Operations Manager (SCOM)

 

Operations Management Suite (OMS)

 

Intune / Enterprise Mobility

 

System Center Service Manager

 

Virtualization

 

Automation

 

System Center Data Protection Manager (DPM)


 


What’s new for US partners the week of December 12, 2016

$
0
0

Find out what’s new for Microsoft partners. We’ll connect you to resources that help you build and sustain a profitable cloud business, connect with customers and prospects, and differentiate your business. Read previous issues of the newsletter and get real-time updates about partner-related news and information on our US Partner Community Twitter channel.

You can subscribe to receive posts from this blog in your email inbox or as an RSS feed.

Looking for partner training courses and community calls? The Hot Sheet training schedule offers a six-week outlook, and is updated regularly as we learn about new offerings. Monthly recaps of the US Partner Community calls and blog posts are also available.

To stay in touch with me and connect with other partners and Microsoft sales, marketing, and product experts, join our US Partner Community on Yammer and see other options to stay informed.

Top stories

Build your team’s cloud skills with new Microsoft Azure training and certification offers

Microsoft Inspire is the new name for our annual partner business and sales conference

Community call schedule for the week

Partner Spotlights: Customer stories of digital transformation, enabled by partners

Unlock additional value by using your Signature Cloud Support benefit

New technical journeys for Microsoft Azure

Introducing Microsoft Teams – the chat-based workspace in Office 365

Microsoft FastTrack: Get your customers to the cloud quickly

Working toward earning a Cloud Competency? The Cloud Enablement Desk can help

Plan ahead for training into January 2017

Microsoft AppSource エコシステムにシステム インテグレーターが参加【12/11 更新】

$
0
0

(この記事は 2016 年 10 月 11日にMicrosoft Partner Network blog に掲載された記事 Systems integrators join the Microsoft AppSource ecosystem の翻訳です。最新情報についてはリンク元のページをご参照ください。)
ron-huddleston-author-block_1

 

テクノロジ投資を担当する役割が IT 部門から業務部門へと移行 (英語) しつつある中、SaaS アプリ市場は爆発的な拡大を見せています (英語)

すばやく利用でき、高性能かつコスト効率に優れた SaaS アプリがあれば、企業はインフラストラクチャへの多大な投資や長期間の導入サイクルを経ることなく、自社にとってまさに必要な機能を構成することが可能になります。

 

こうしたニーズにお応えするために 7 月に立ち上げられたのが、Microsoft AppSource です。

マイクロソフトの ISV パートナー様による世界規模のエコシステムとビジネス ユーザーの皆様とが直接つながる場所として機能しています。今回マイクロソフトでは、その取り組みをさらに推し進めて、お客様が基幹業務 (LOB) SaaS を簡単かつスピーディに導入できるようにするべく、SI パートナー様の専門知識やサービスを取り込んで、AppSource エコシステムを拡大させることになりました。

 

AppSource は、当初の 90 日間で 250 件近いアプリを掲載するまでに成長し、今後も数百件のアプリの追加が見込まれています。Dynamics 365、Power BI、Office をはじめ、幅広いアプリが用意されており、最新のアプリを求めるビジネス ユーザーは AppSource 内でアプリを検索できるだけでなく、試してみることもできます。そして今回の発表に関して、AppSource のアプリに対応する 100 社以上の SI 様が既に準備を終え、お客様からのご連絡をお待ちしているところです。企業の皆様がアプリを検索して、試用、導入するまでの一連の流れをお手伝いできるように万全の体制を整えています。

 

お客様が特定のアプリに関心を持っていると判断された場合、それに関連する経験を持つ適切な SI パートナー様を見つけられるように、そのアプリの独自の要件や業界の専門知識、地理的な場所、その他のさまざまな要因を基に絞り込まれた推奨情報が直ちに表示されます。その中からいずれかの SI パートナー様をクリックすると、Microsoft Partner Network のデータベースから提供されるコンピテンシー情報をはじめ、その SI パートナー様に関する概要を確認できます。

 

AppSource に参加するには

優れたアプリを配信したいとお考えの ISV の皆様や、お客様に必要とされるスキルを備えた SI の皆様にとって、最初の足掛かりとなるのが AppSource です。アプリ掲載にご興味をお持ちのパートナー様は、提出条件や手続きの詳細について、こちらのドキュメント (英語) をご確認ください。

サービス プロバイダーとして参加を希望される SI 様は、Microsoft パートナー センターにご登録いただいたうえで、AppSource にアプリを掲載しているいずれかの ISV 様に保証人になっていただく必要があります。マイクロソフトではこの制度を採用することで、アプリを開発する ISV 様とそれを実装する SI 様との関係強化を図っています。手続きの詳細については、こちらのページ (英語) でご確認いただけます。

 

今後の展望

SI 様が輪に加わったことで、AppSource の当初のビジョンがまた一歩実現へと近付きました。現在の AppSource は、企業のお客様にとって生産性強化に役立つ新しいテクノロジを検索して使用できる大切な場所であり、ISV 様にとっては適切なお客様とつながることができる場所です。そしてこれからは、SI 様にとってソリューションの配信を後押しし、新たな導入を加速させる場所にもなるのです。

今後数か月の間に、さらなる機能を提供すると共に、申請手続きを経て数多くのアプリを発表していく予定です。AppSource は、LoB SaaS アプリ配信の要としてこれからも進化を続けてまいりますので、こまめに足を運んでいただければ幸いです。

 

端的に言えば、AppSource の取り組みはまさに私たちが望んだとおりに進んでいます。しかもまだ始まったばかりです。どうぞ AppSource の今後にご期待ください。

Top Contributors Awards! December Week 2

$
0
0

Welcome back for another analysis of contributions to TechNet Wiki over the last week.

The leaderboard was broken at time of writing, so sorry we’re missing that this week.

As always, here are the results of another weekly crawl over the updated articles feed.

 

Ninja Award Most Revisions Award
Who has made the most individual revisions

 

#1 Edward van Biljon with 73 revisions.

 

#2 Peter Geelen with 67 revisions.

 

#3 Ezgi Can[MVP] with 23 revisions.

 

Just behind the winners but also worth a mention are:

 

#4 Burak Ugur with 20 revisions.

 

#5 Carsten Siemens with 18 revisions.

 

#6 Sabah Shariq with 12 revisions.

 

#7 Ken Cenerelli with 9 revisions.

 

#8 Waqas Sarwar(MCSE 2013) with 8 revisions.

 

#9 Matrix Thet Naing with 8 revisions.

 

#10 Cian Allner with 6 revisions.

 

 

Ninja Award Most Articles Updated Award
Who has updated the most articles

 

#1 Edward van Biljon with 71 articles.

 

#2 Peter Geelen with 46 articles.

 

#3 Carsten Siemens with 18 articles.

 

Just behind the winners but also worth a mention are:

 

#4 Burak Ugur with 12 articles.

 

#5 Sabah Shariq with 12 articles.

 

#6 Ezgi Can[MVP] with 9 articles.

 

#7 Ken Cenerelli with 3 articles.

 

#8 Waqas Sarwar(MCSE 2013) with 3 articles.

 

#9 Sandeep Shekhawat with 2 articles.

 

#10 SYEDSHANU with 2 articles.

 

 

Ninja Award Most Updated Article Award
Largest amount of updated content in a single article

 

The article to have the most change this week was ASP.NET Core Template Pack, by SYEDSHANU

This week’s reviser was SYEDSHANU

It’s NEW! It’s SHINEY! Thanks Syed!

 

 

Ninja Award Longest Article Award
Biggest article updated this week

 

This week’s largest document to get some attention is Building a Real-Time Online Poll System with SignalR 2, jQuery, EF Core, MVC Core and Web API 2, by Vincent Maverick Durano

This week’s reviser was Carsten Siemens

A mammoth article well worth a look at!

 

Ninja Award Most Revised Article Award
Article with the most revisions in a week

 

This week’s most fiddled with article is Logic Apps -Working with Cache and Enterprise Messaging in Logic Apps, by Abhishek0127[Abhishek kumar]. It was revised 10 times last week.

This week’s revisers were Mikael Sand & Abhishek0127[Abhishek kumar]

Busy bees! A great article from Abhishek! Very relevant!

 

Ninja Award Most Popular Article Award
Collaboration is the name of the game!

 

The article to be updated by the most people this week is TechNet Guru Competitions – December 2016, by Peter Geelen

Go Go Guru legends! More awesome incoming!

This week’s revisers were Ken Cenerelli, Ed Price – MSFT, RajeeshMenoth, Emiliano Musso, Abhishek0127[Abhishek kumar], SYEDSHANU & Steef-Jan Wiggers

 

As Guru often wins, the article to be updated by the SECOND most people this week is Office365: how the user gets SMTP addresses when migrated/synced to Office365, by Matrix Thet Naing

A great read from Matrix (cool name too) Thanks to all who helped.

This week’s revisers were Waqas Sarwar(MCSE 2013), Peter Geelen, Burak Ugur & Matrix Thet Naing

 

Ninja Award Ninja Edit Award
A ninja needs lightning fast reactions!

 

Below is a list of this week’s fastest ninja edits. That’s an edit to an article after another person

 

Office 365 Weekly Digest | Week of December 4 – 10, 2016

$
0
0

Welcome to the December 4 – 10, 2016 edition of the O365 Weekly Digest. Interesting updates for Office 365 ProPlus, Yammer and Microsoft MyAnalytics highlight this week’s content. A Microsoft IT Showcase focused on information security and an awesome announcement for Azure Active Directory are noteworthy this week.


MESSAGE CENTER

Note: The information below may not be posted to your Office 365 tenant as not all notifications apply to all tenants.

 

Updated Feature: Improvements to Private Messaging Experience in Yammer

Posted: December 5, 2016 | Urgency: Normal | Category: Stay Informed | Action: Awareness | Beginning January 2017, we will be rolling out a number of improvements to the private messaging experience in Yammer as we combine Private Messages and Online Now (chat) into a single, simpler interface. This rollout is expected to be complete by the end of March, 2017.  Private messages will now be readily accessed from the left navigation bar on the home screen, right below the list of groups. As part of this redesign, the current Online Now (chat) experience will no longer be available, but you’ll be able to quickly message your coworkers using the new experience. Please visit https://techcommunity.microsoft.com/t5/Yammer-Blog/Improvements-to-the-private-messaging-experience-in-Yammer/ba-p/33161 to learn more.

 

Office 365 Auto-expanding Archiving rollout update

Posted: December 5, 2016 | Urgency: Normal | Category: Stay Informed | Action: Awareness | We have paused the rollout of Office 365 Auto-expanding Archiving. We originally announced the rollout of Office 365 Auto-expanding Archiving, in May. This feature is designed to accommodate customers who require very, very large archiving storage. This will allow you to take advantage of a truly bottomless archive without needing to call support or perform any manual steps. To ensure the most stable environment for our customers, we have paused the rollout of this feature. When we resume this rollout, we will communicate again via Message Center. We anticipate that the deployment resuming in the first quarter of 2017. For additional information, please visit https://blogs.office.com/2015/06/03/announcing-auto-expanding-highly-scalable-archives-for-office-365-email.

 

New Feature: All newly created Yammer groups will connect to Office 365 Groups

Posted: December 6, 2016 | Urgency: Normal | Category: Prevent or Fix Issues | Action: Awareness | Beginning January 2017, when a new Yammer group is created, a corresponding Office 365 group will be created in Azure Active Directory, and Office 365 Group resources will be provisioned. This rollout is expected to be completed by the end of March 2017. Going forward, you will be able to manage Office 365 connected Yammer groups in Azure Active Directory, similar to other Office 365 groups. Also, each new group created in Yammer will get an associated SharePoint site, SharePoint document library, OneNote notebook, and a Planner plan. Note that this will only affect customers who have enforced Office 365 identity for Yammer users, and who are in the ‘One Office 365 tenant associated with one Yammer network’ (1 tenant:1 network) configuration. More details are available at https://support.office.com/article/Yammer-groups-are-now-Office-365-Groups-d8c239dc-a48b-47ab-b85e-6b4b8191a869.

 

Updated Feature: Monthly feature updates for Office 2016 for Office 365

Posted: December 7, 2016 | Urgency: Normal | Category: Stay Informed | Action: Awareness | The latest feature updates for Office 2016 for Office 365 are now available. This month’s update includes new feature updates, as well as other security and bug fixes. The December updates include (but not limited to): (1) Insert and edit scalable vector graphics (SVG), (2) Use icons from a standard library of scalable vector graphics (SVG) files, (3) Accessibility improvements, (4) Real-time typing when co-authoring, (5) Improved reading with Learning Tools and (6) Save a file to a recently used folder. If you have users configured for Current Channel release updates, you may want to get up to speed on the new features this month. Other than that, you do not need to do anything to prepare for this change. To see a complete list of all the updates to Office in December, please visit https://technet.microsoft.com/office/mt465751.

 

Reminder: SharePoint Online Public Websites are going away

Posted: December 9, 2016 | Urgency: High | Category: Plan for Change | Action: Required by March 31, 2016 at 5:59 PM UTC | As we originally communicated in March 2015, new Office 365 subscription plans no longer include the SharePoint Online public website feature. We notified Office 365 customers who currently use this feature could continue using this feature for a minimum of two years. Beginning March 2017, existing SharePoint Online organizations may no longer have access to the public website feature. You are receiving this message because our reporting indicates your organization has the SharePoint Online public website feature available. Beginning March 2017, your customers may no longer have access to your public website. In January 2017, we will have a process in place allowing you to postpone the removal of your SharePoint Online public website. We will communicate again in January, via Message Center, with more details. Alternative public website solutions from industry leaders are now available, and you should begin investigating these alternatives to integrate your public presence within the Office 365 environment. Additional information is available at http://aka.ms/spopublicwebsite_mc.

 


UPCOMING EVENTS

Azure Active Directory Webinars for December

When: Multiple sessions currently scheduled through December 14, 2016 | Are you looking to deploy Azure Active Directory quickly and easily? We are offering free webinar briefings on key Azure Active Directory deployment topics! Sessions include: Getting Ready for Azure AD, Streamlining Password Management, Securing Your Identities with Multi-Factor Authentication, Managing Enterprise Applications and Accessing Your Organization’s Internal Apps. Each 1-hour or 75-minute webinar is designed to support IT Pros in quickly rolling out Azure Active Directory features to their organization. All webinars are free of cost and will include an anonymous Q&A session with our Engineering Team. So come with your questions!  Capacity is limited. Sign up for one or all of the sessions today!

 

Office Small Business Academy: New Year Inspiration – Taking the Leap into Entrepreneurship

When: Tuesday, December 13, 2016 @ 9:00am PT | Are you finally ready to be your own boss?  Take the leap into entrepreneurship with advice and business-minded motivation from our team of experts. In this episode, get strategies and expert advice for starting your new business in the new year. Plus, learn how to bring your presentations to life in a fraction of the time with PowerPoint Designer and Zoom—the newest additions to PowerPoint. | Episode Preview | Registration (direct link)

 

FastTrack Webinars: Learn how to do more, together

When: Multiple sessions currently scheduled through December 14, 2016 | Ask questions, learn shortcuts and find out how Office 365 can make you and your team more productive. Each webinar is a live, instructor-led session offered at multiple dates and times. Facilitated discussion follows each session, with opportunities to ask questions and discuss specific scenarios to you. Direct registration links for each webinar are provided below.

 


BLOG ROUNDUP

Learn more about the insights in Microsoft MyAnalytics

On this week’s episode of Microsoft Mechanics, we take a tour of the latest updates to Microsoft MyAnalytics. Catherine Pidgeon shares how to use MyAnalytics to improve work impact and success. From understanding where her time goes, to identifying areas of opportunity and gaining insight into collaboration with her most important groups, Catherine provides a comprehensive tour of current and roadmap features. We are also announcing the availability of external contacts within your MyAnalytics experience. Now you will be able to stay up to date on how you interact with important contacts outside of your organization. Whether they are customers, partners or external staff—sometimes those you work with across organizations are the most important to your success. Now you can quickly add important external contacts to your MyAnalytics dashboard to stay updated with collaboration insights like total collaboration time, time in meetings, read percent and response time.

 

Microsoft IT Showcase: Changing our approach to information security at Microsoft

With collaboration on the rise, Microsoft IT is rethinking information security. Social collaboration, ubiquitous connectivity, and new ways of collecting data and storing content encourage innovation and content sharing—but they also pose potential security risks for organizations. We help protect content through technologies like Microsoft Office Delve, Azure Information Protection, and Microsoft Teams—securing content wherever it exists, and in ways that go beyond traditional IT security.

 

Microsoft Flow: Introducing Guided Learning and more new services

In this week’s post, we’re introducing Guided Learning – start your learning journey through Flow with a sequenced collection of courses, and understand the extensive and powerful capabilities of Flow. The guided learning is divided into four sections – (1) Getting started, (2) Building flows, (3) Managing flows and (4) Environments and Data Loss Prevention. Also, two new premium services – Freshdesk and GoToMeeting – are now integrated with Flow.

 

Visio is coming to the web and iOS

Visio has been a trusted tool in diagramming for more than a decade. And we know its visual communication in the form of diagrams will become more powerful when anyone in the company can consume—regardless of their location or device. We’re excited to announce Visio Viewer for iPad and Visio Online Preview, enabling users to share or access diagrams from nearly anywhere, gain operational insights and explore real-world diagrams easily. As one of the most widely adopted process mapping tools, Visio helps thousands of organizations blueprint the business processes that drive their desired transformation. Using Visio Online Preview and Visio Viewer for iPad, you can securely store your diagrams in OneDrive for Business and SharePoint Online and easily share them with anyone as a link—allowing your colleagues to view and interact with diagrams effortlessly across devices.

 


NOTEWORTHY

Video: Office 365 Update for December 2016

Format: Video (11 minutes) | Jim Naroski covers recent enhancements to Office 365, including Microsoft Teams, scalable graphics in Office, new usage reports, eDiscovery updates and more.

 

Introducing Azure AD Pass-Through Authentication and Seamless Single Sign-on

This news might well be our biggest news of the year. Azure AD Pass-Through Authentication and Seamless Single Sign-on are now both in public preview! When we talk to organizations about how they want to integrate their identity infrastructure to the cloud, we often hear the same set of requirements: “I’ve got to have single sign-on for my users, passwords need to stay on-premises, and I can’t have any un-authenticated end points on the Internet. And make sure it is super easy”. We heard your feedback, and now the wait is over. We’re excited to announce we have added a set of new capabilities in Azure AD to meet all those requirements: Pass-Through Authentication and Seamless Single Sign-on to Azure AD Connect! These new capabilities allow customers to securely and simply integrate their on-premises identity infrastructure with Azure AD.

 

Skype for Business: Meeting Invite Updates (Windows client) – Formatting Dial-In String & Link to Join

Based on feedback we’ve heard from our customers, we’ve made a few updates to Meeting Invites that are generated by the Skype for Business desktop client. In this blog post, we’ll focus on two new additions – the formatting of the dial-in string, and a link to join using the web app. Let’s take a look! In the meeting invite, the “Join by phone” section now creates hyperlinks for the dial-in numbers that includes a pause (the comma) followed by the Conference ID. This is especially useful when a user wants to join the conference using a mobile phone that doesn’t have the Skype for Business mobile app installed. In addition to the formatting for Join by phone, we’ve added a hyperlink that allows joining directly using the Skype Web App. In this instance, the user would be able to participate in the meeting using the web application, even if they have the Skype for Business client installed locally. This is useful if the user is having difficulty joining the meeting using the full client.

 

333 tipů pro Windows 10 (221. – 225.)

$
0
0

221.     Jak otestovat reproduktory?

Ve Windows 10 existuje možnost, jak otestovat reproduktory a jejich funkčnost. Nezáleží na tom, zda máte reproduktory dva, čtyři nebo máte systém 5.1 nebo 7.1. Všechny tyto konfigurace Windows 10 umí otestovat. Rychlý test, který využije aktuální nastavení zvukové karty a reproduktorů najdete v Ovládacích panelech v panelu Zvuk. Zde klikněte pravým tlačítkem na aktivní/výchozí zvukovou kartu a za nabídky vyberte příkaz Test. Systém začne postupně po jednom testovat reproduktory a hrát z nich zvuk.
Podrobnější možností, jak otestovat reproduktory je ve stejném okně, kde v nabídce vyberete příkaz první – Konfigurovat reproduktory. Kromě samotné konfigurace zde hned v prvním kroku průvodce máte také možnost testu reproduktorů. Výhodou je, že při přehrávání vidíte i vizuálně, na jakém reproduktoru systém právě zvuk přehrává a odstranit tak např. chybu špatně zapojeného kabelu od reproduktoru.

222.     Jak nastavit výchozí zařízení pro záznam zvuku?

Podobně jako u přehrávání zvuku i pro záznam zvuku můžete mít v počítači více zařízení pro tuto operaci. Není to sice běžné a většina uživatelů si vystačí s jedním mikrofonem, ale někteří uživatelé si z důvodu kvality pořizují k notebooku, který má integrovaný mikrofon raději mikrofon externí. Poté je tedy nutné nastavit v systému, které zařízení se má pro záznam zvuku používat. To provedete v Ovládacích panelech v panelu Zvuk na kartě Záznam. Zde klikněte pravým tlačítkem na zařízení, které má být výchozí a z nabídky vyberte Nastavit jako výchozí zařízení.

223.     Jak nahrát zvuk z mikrofonu?

Ve Windows 10 existuje nástroj, který vám umožňuje zaznamenat mluvené slovo nebo cokoliv, co lze zaznamenat pomocí mikrofonu. Výsledkem je pak audio soubor ve formátu M4A, který můžete dále použít a zpracovat. Je tak možné si např. nahrát mluvený komentář k videu, které budete vytvářet a v aplikaci pro tvorbu videa pak tento zvukový soubor použít. Ve Windows 10 k tomu slouží nástroj Hlasový záznam. Po jeho spuštění se zobrazí velice jednoduché rozhraní, ve kterém stačí kliknout na tlačítko Spustit záznam. Od této chvíle, cokoliv, co mikrofon bude schopen zaznamenat, se nahraje. Zároveň se spustí časomíra, takže vidíte, jak dlouhá již nahrávka je. Po dokončení nahrávání klikněte na tlačítko Zastavit nahrávání, soubor je uložen a vy s ním můžete dle potřeby dále pracovat.
 

224.     Jak ztlumit hlasitost pouze některé aplikace?

Ve Windows 10 máte možnost si nastavit hlasitost zvukového výstupu nejenom globálně pro celý počítač, ale i pro jednotlivé spuštěné aplikace. Například vám tak může hrát hudba v aplikaci Windows Media Player a zároveň můžete bez rušení hrát internetovou hru v prohlížeči, u které standardním způsobem nelze zvuky vypnout.
Pro konfiguraci nastavení úrovně hlasitosti výstupu jednotlivých aplikací stačí kliknout levým pravým na ikonu reproduktoru v oznamovací oblasti hlavního panelu a kliknout na příkaz Otevřít směšovač hlasitosti. Nyní již posuvníky u jednotlivých aplikací nastavte požadovanou úroveň hlasitosti.
 

225.     Jak nastavit výchozí akci po vložení CD nebo DVD do počítače?

Při vložení média do CD/DVD mechaniky se většinou zobrazí okno s dotazem, jakou akci chcete provést. Pokud jste zobrazování tohoto okna vypnuli nebo chcete změnit, co se standardně bude za akci provádět, postupujte takto:
1.       Ovládacích panelech si otevřete panel Přehrát automaticky.
2.       V otevřeném okně si nastavte dle vašich potřeb, jaká akce se provede při vložení CD/DVD s určitým obsahem.
Autor: Karel Klatovský

Highlights fra 21st skills-konferencen

$
0
0

Den 7. december havde UCC/CFU og Microsoft 250 deltagere til konference om det 21. århundredes kompetencer (også kaldet 21st skills). Fokus på dagen var på måling af disse kompetencer og et praksisperspektiv.

dsc_0012-1

Vi havde talere på plads som repræsenterede et bredt udsnit af professionelle uddannelsesfolk.

Se videoen nedenfor, der koger essensen af konferencen ned til 1,5 minut:

I de kommende dage vil du høre mere om indholdet på konferencen, hvis du ikke var til stede i sidste uge. Vi følger nemlig op med interviews med elever, en professor og vores eget syn på fremtidens kompetencer. Stay tuned!

[Script Of Dec. 12] How to export a list of users assigned a specific license in Office 365


Microsoft Inspire のご紹介: Worldwide Partner Conference が新たな名称に【12/12 更新】

$
0
0

(この記事は 2016 年12 月7 日にMicrosoft Partner Network blog に掲載された記事 Introducing Microsoft Inspire: A New Name for our Worldwide Partner Conference の翻訳です。最新情報についてはリンク元のページをご参照ください。)

gavriella-author-block_1

 

このたび、Microsoft Worldwide Partner Conference の名称が変更されました。新しい名称は、Microsoft Inspire です。今後も、パートナーの皆様にご好評を頂くまでに成長したすばらしいカンファレンスであることには変わりありません。新しい名称は、マイクロソフトとパートナー コミュニティがイノベーションを推し進め、お客様に強力な新しいソリューションを提供するために、お互いに刺激を与える (Inspire する) ようすを表したものです。

Microsoft Inspire という名称は、このイベントが提供する内容をこれまでよりも的確に表現しています。このイベントは、マイクロソフトとパートナー様が協力してお客様に最も優れたソリューションを提供するうえで、パートナー様の目標やビジョンを実現してビジネスを促進できるように、パートナー様どうしがつながり、マイクロソフトとの関係を深め、新しいアイデアを見つけ出すことを目的としています。しかし、このことをよりよく理解していただくためには、過去にイベントに参加したパートナー様からお話を聞くことが一番です。

 

新年の新しいビジネス チャンス

IDC の最近の調査 (英語) によると、デジタル改革の取り組みに対する投資は 2019 年までに 2 兆 2,000 億ドルに達することが見込まれています。これは今年の 1.6 倍近くに上る金額でます。デジタル改革は、あらゆる業界、あらゆる規模の企業で起きています。IT 部門は裏方から前面に出て働くようになり、IT 部門以外のリーダーもビジネスのあらゆる面にテクノロジを活用し始めたことで、新たな収益源が生まれ、効率性が向上し、競争上の優位性が強化されています。今日のニュー エコノミー時代において、すべての企業はデジタル企業へと転換しつつあるのです。この革命により、マイクロソフトとパートナー様とっては、お客様の潜在能力を最大限に発揮できるように支援するうえで、かつてないほど大きなビジネス チャンスが到来しています。

パートナー様がこのビジネス チャンスを活かすには、最新のテクノロジに対応するための技術スキルと、専門分野をアピールするための認定資格が必要です。今後 1 年間、技術スキルの向上に投資することで、パートナー様にとってのビジネス チャンスが大きく広がります。パートナー様がこれを実現できるように、マイクロソフトは現在トレーニングと開発に関するいくつかの大きな取り組みを進めています。

マイクロソフトはこれまでにも Microsoft Virtual Academy、Cloud + Enterprise University Boot Camps、Microsoft Professional Program など、さまざまな技術トレーニング、ツール、リソースを公開しており、よくご存じのパートナー様もいらっしゃるかと思います。

先にお伝えしたように、マイクロソフトは 3 つの新しい Azure トレーニング サービス (英語) をリリースしました。このサービスでは、各自のペースで進められる単元別の対話型オンライン学習を無料で利用できるほか、Azure 認定を大幅な割引価格で受験できます。現時点で 6 つのコースが提供されており、数週間のうちに新たに 6 つのコースが追加されます。今後数か月以内には、さらにコースが増える予定です。

これらのコースの目的は、パートナー様が需要の急増に対応し、莫大な利益を収め、市場機会を拡大できるようにご支援することです。IT プロフェッショナルの皆様は、Azure Fundamentals または Azure for AWS Experts のコースから始めることも、最初から Azure Storage や Azure Networks のコースを受講することもできます。

 

パートナー様の波及効果

私は今後の 1 年間に大いに期待しており、パートナー コミュニティの皆様の多大なご協力に心から感謝しています。パートナー様とマイクロソフトが力を合わせれば、世界中に強力な波及効果を生み出すことができます。ぜひ、パートナー様が推進している優れた改革の事例 (英語) をご確認ください。

改革への取り組みは、目を見張るほどの勢いで拡大しています。わずか 1 年前には Cloud Solution Provider プログラムに参加されていたパートナー様は 3,500 社でしたが、現在では 20,000 社を超えています。

また、ビジネスを変革し、クラウドがもたらすビジネス チャンスを活用するために、クラウド コンピテンシーを取得するパートナー様も増えています。事実、Gold または Silver クラウド コンピテンシーを取得したパートナー様の数は、前年比で 86% も増加しました。さらに、パートナー様は複数のクラウド ソリューションのエキスパートになることの価値を認識しています。3 つ以上のクラウド コンピテンシーを取得したパートナー様の数は前年比で 53% 増加し、これらのパートナー様は真のリーダーとしての地位を確立しています。

しかし、すべてのパートナー様が将来の成功を手に入れられるように後押しするためには、さらに取り組みを推し進めなければなりません。それこそ、私たちがパートナー コミュニティの皆様のために徹底的な取り組みを続けている理由です。パートナー コミュニティなくして、マイクロソフトのミッションを実現することはできません。

 

 

マイクロソフトのパートナー様になるメリットについて詳しく知りたい場合は、Microsoft Partner Network をご覧になり、今すぐご参加ください。パートナー様向けカンファレンスの詳細については、Microsoft Inspire の Web サイトをご確認のうえ、ご興味がおありでしたら参加登録をお済ませください。同イベントは 7 月 9 日から 7 月 13 日までワシントン D.C. で開催されます。期間中、多くのパートナー様にお会いできること、そして両社のお客様のために団結・協力し、ビジネス変革を実現できることを楽しみにしています。

日本のパートナー様向けには例年通りツアーをご準備する予定です。ツアーサイトオープンは3月を予定しております。

 

 

 

 

【Office Icon 免費授權,一鍵搞定!】

$
0
0

還在為了找免費 Icon 而困擾嗎? 在現今強調簡報視覺化的時代,若是能快速地使用扁平化工具讓簡報一目了然,除了讓自己能夠快速做簡報外,還能夠讓觀眾一目了然呢!

以前在網路上尋找免費 Icon 時,常常遇到需要註冊、付費、甚至是浮水印等情況,但現在,只要在 Microsoft Office  (包含WordPowerPointOutlook),也能夠輕鬆使用了!

 

  1. 只要打開 Office 軟體,點擊「插入」功能列中的 「圖示」

 1

  1. 按照分類選擇自己喜歡的圖示

 2

  1. 點選插入後,即可立即使用 (還可以同時插入多個喔!)

 3

 另外,最方便的是,插入圖示後,可以直接更改顏色!

 4

很多人會有個疑問:「到底什麼時候會需要更改 Icon 的顏色呢?」

其實,當我們要去對方公司做提案或簡報的時候,就可以利用對方的公司代表色搭配簡報,讓對方對我們更加有印象,也表示我們的誠意喔!

 5

 

還在為了找尋免費Icon而煩惱嗎? 快來搶先體驗看看吧!

 

*此功能「圖示」,為Office 365 的功能,採地區性推播,台灣地區尚未推播到,使用者可搶先看!

Cyber Angriffe im Unternehmen entdecken und abwehren

$
0
0

defender

Schon im November 2015 bestätigten 71% der IT- Entscheider in Unternehmen, dass die Sicherheit von Endpunkten, also der PCs, ganz oben auf der Liste der sicherheitsrelevanten Themen liegt.

Viele Organisationen wissen bereits, dass ihnen kriminelle Cyber-Angriffe einen erheblichen wirtschaftlichen Schaden durch Diebstahl von Unternehmensdaten oder Beschädigung der Infrastruktur zufügen können.

Vor einigen Jahren waren vor allem größere Konzerne und bestimmte Industrien im Visier der Angreifer, inzwischen hat sich das geändert. Jedes Unternehmen, egal ob groß oder klein, kann für bestimmte kriminelle Organisationen interessant sein.

Aus diesem Grund stellt Microsoft mit dem Windows 10 Anniversary Update den Windows Defender Advanced Threat Protection vor. Windows Defender ATP ist eine neue entwickelte Post-Breach-Schutzebene, die den Windows 10-Sicherheitsstack vervollständigt.

windows-defender-atp

Unternehmen erhalten dadurch die Möglichkeit, komplexe Angriffe und Datenleaks im Netzwerk schneller selbst zu erkennen, zu untersuchen und zu beseitigen.

Windows Defender ATP setzt sich aus 3 Elementen zusammen:

  1. Der Client: Ein in das Betriebssystem integrierter Agent protokolliert, was auf dem Client-Computer passiert, und sendet diese Informationen in die Cloud.
  2. Der Cloud-Analysedienst: Dieser Dienst sorgt für schnelle Einblicke, erkennt Angriffe und nutzt hierfür hoch entwickelte Machine Learning Algorithmen.
  3. Informationen von Microsoft und aus der Community: Unsere Experten und Forscher untersuchen Daten, finden schon bekannte und erkennen neue Verhaltensmuster. Sie setzen diese im Bezug zu den vorhandenen Informationen aus der Sicherheits-Community.

Windows Defender Avanced Threat Protection ist in Windows 10 integriert, nutzt Machine-Learning, um Verhaltensmuster zu erkennen und hilft bei forensischen Untersuchungen sowie Bekämpfung gegen Cyber Angriffe.

Im Schnitt benötigt ein Unternehmen mehr als 200 Tage, um einen Sicherheitsvorfall zu entdecken. Danach dauert es oftmals sehr lange, bis der Schaden vollständig behoben ist. In vielen Fällen brauchen Unternehmen hierzu bis zu 80 Tage.

Während dieser Zeit können Angreifer in dem Unternehmensnetzwerk großen Schaden anrichten, Daten entwenden und den Datenschutz untergraben. Diese Angriffe sind sehr kostenintensiv und haben oftmals weitereichende Auswirkungen auf die Reputation eines Unternehmens. Mit Windows Defender ATP können Unternehmen sich effektiver vor diesen Angriffen und deren Auswirkungen schützen.

Für eine limitierte Zeit haben Unternehmen noch die Möglichkeit, sich für die kostenfreie Windows ATP Preview unter Http://aka.ms/windows-atp zu bewerben.

Cloud4Good: Setting up Infrastructure as code on behalf of Missing Children Society of Canada

$
0
0

Hello Folks,

I don’t normally write posts about specific references to customers. It’s normally something like “I was working with a customer when…” but this time I wanted to highlight some learnings regarding a specific project we took on with the Missing Children Society of Canada.

Team Microsoft Canada

We recently had a Hackfest with them, the City of Calgary and the Calgary Police Services, where we developed an Azure Function to help in the event of a child being in distress. This was a great experience to bring tech to support a worthwhile cause.

My involvement on this project was to support the dev team and to ensure the infrastructure was in place. To do so, we adopted a DevOps practice. Infrastructure as Code.

In this day and age, faster delivery of applications is challenging for both infrastructure and operations (i.e., Ops) professionals and application development and delivery (i.e., Dev) teams. Both are under pressure to increase speed without compromising quality. Looking at the infrastructure as a piece of code allowed us to be able to deploy in multiple environments (dev, test, and prod) without having to rebuild each environment every time we moved from one to the other.

This greatly enhanced our ability to deliver quality applications by allowing testing of our code and a standardized carbon-copy provisioning of the infrastructure across all the environments. Those two points are the ones that introduce the most friction according to a Forrester survey. (you can get a copy of the report here)

clip_image004

We started by meeting as a group to identify the pieces of infrastructure that would be needed in the solution.  Following that we identified the process for taking the code from the Devs to the desired environment. So… We ended up with the following required infrastructure that we deployed using ARM templates

  1. Service Bus
  2. Azure Functions
  3. Azure Web App
  4. DocumentDB database

clip_image008

Build Management

To be able to manage the versioning of our IaC scripts and Azure Resource Manager Templates, we put everything in a Github repo. (You can access it here).

Once we had the overall process and we all knew what parts we needed to work on. I started to work on the IaC.

1. Before I created any code to be checked in to a source control Repo

2. in our case we used Github and created a public repo where we would all put our code.

3. We create a team project in Visual Studio Team Services (VSTS)

4. In the VSTS project we created a connection to the GitHub repo using a personal access token

5. Sign in to GitHub and make sure you have permission to read the repository.

6. In GitHub, create an access token.

7. Select the repo, user, and admin:repo_hook scopes.

8. Copy the token to your clipboard.

clip_image010

9. Sign on to Team Services and create a build definition.

10. On the Repository tab, next to the Connection drop-down, click the Manage link. The Services tab opens as a new tab in your browser.

11. Click New Service Endpoint and choose GitHub.

12. In the Add New GitHub Service Connection dialog box, select Personal access token.

13. Paste the token and give the connection a name.

clip_image012

14. On the Repository tab, select the Connection you created.

15. Select the Repository that contains the code you want to build.

We used VSTS to manage the builds. For the infrastructure templates the Build process was limited to publishing the templates from Github after a commit of the code to the Build server in order for them to be processed by the release management.

16. In the Build Tab, click Add a Build step. And select Publish Build Artifacts

clip_image014

17. In the Copy Publish Artifact: Drop configuration pane, we left the copy root field empty, entered ** (1) in the Contents field to instruct the process to select everything in that repo branch and copy it to a folder called Drop (2) on the Server (3).

clip_image016

That’s it the infrastructure ARM template build process is ready.

Release Management

The release management of the code is the next step.

1. In the Release Tab (1) I created a new Release definition (2) and added a new environment. (3) we selected an empty deployment template.

clip_image018

2. I selected “Automatically Approve” in the next page and clicked Create.

I first created the entire development environment and tested it to ensure the infrastructure would deploy properly. Once the final state of the release was achieved, I created the Production environment by cloning the Development environment and changed the variable and target resource groups.

3. in the empty environment, I clicked Add task. And from the Task catalog I selected the Azure Resource Group Deployment task

clip_image020

4. Once the task is added I entered the following info in the task configuration tab.

clip_image022

Azure Connection Type: Azure resource Manage. (based on if you are using the classic Azure model or the ARM model)

Azure RM Subscription: I selected the target subscription (you will have to click the “Add” link at the end and setup the initial connection)

Action: Create Or Update Resource Group. (select the appropriate action)

Location: Enter the Azure location you want to deploy to. In our case we selected West US.

Template: This is where you select the ARM template you want to deploy. By clicking the “…” you will be able to browse the build server and select the JSON template among all the ones that were copies there by the Build process.

clip_image023

Template Parameters: This is where you select the ARM parameter file used with the template you want to deploy. Here is my template for the Service Bus deployment

{
    "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
    "contentVersion": "1.0.0.0",
    "parameters": {
        "serviceBusNamespaceName": {
            "type": "string",
        },
        "serviceBusQueueName1": {
            "type": "string",
            "defaultValue": "ToStore",
        },
        "serviceBusQueueName2": {
            "type": "string",
            "defaultValue": "ToFilter",
        },
        "serviceBusQueueName3": {
            "type": "string",
            "defaultValue": "ToAugment",
        },
    },
    "variables": {
        "sbVersion": "2015-08-01"
    },
    "resources": [
        {
            "apiVersion": "[variables('sbVersion')]",
            "name": "[parameters('serviceBusNamespaceName')]",
            "type": "Microsoft.ServiceBus/namespaces",
            "location": "[resourceGroup().location]",
            "properties": {},
            "resources": [
                {
                    "apiVersion": "[variables('sbVersion')]",
                    "name": "[parameters('serviceBusQueueName1')]",
                    "type": "Queues",
                    "dependsOn": [
                        "[concat('Microsoft.ServiceBus/namespaces/', parameters('serviceBusNamespaceName'))]"
                    ],
                    "properties": {},
                    "resources": []
                },
                {
                    "apiVersion": "[variables('sbVersion')]",
                    "name": "[parameters('serviceBusQueueName2')]",
                    "type": "Queues",
                    "dependsOn": [
                        "[concat('Microsoft.ServiceBus/namespaces/', parameters('serviceBusNamespaceName'))]"
                    ],
                    "properties": {},
                    "resources": []
                },
                {
                    "apiVersion": "[variables('sbVersion')]",
                    "name": "[parameters('serviceBusQueueName3')]",
                    "type": "Queues",
                    "dependsOn": [
                        "[concat('Microsoft.ServiceBus/namespaces/', parameters('serviceBusNamespaceName'))]"
                    ],
                    "properties": {},
                    "resources": []
                }
            ]
        }
    ],
    "outputs": {}
}

 

Override Template Parameters: this is where you would enter parameters to override the ones in the parameter file. We are using that field in the other environments. For example, the Servicebus.json template uses the ServiceBus.dev.parameters.json for the deployment in the MCSC-ChildFinderBot-dev Resource Group.

The parameters in that file are:

{
	"$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json#",
	"contentVersion": "1.0.0.0",
	"parameters":
	{
		"serviceBusNamespaceName":
		{
			"value": "MCSCChildFinderBotDEV"
		},
		"serviceBusQueueName1":
		{
			"value": "ToStore",
		},
		"serviceBusQueueName2":
		{
			"value": "ToFilter",
		},
		"serviceBusQueueName3":
		{
			"value": "ToAugment",
		},
	}
}

 

But in the production environment I used the Override Template Parameters filed to change the values of the JSON variables with variables from the Release Environment Variable.

clip_image025

Override Template Parameters = -serviceBusNamespaceName $(serviceBusNamespaceName) -serviceBusQueueName1 $(serviceBusQueueName1) -serviceBusQueueName2 $(serviceBusQueueName2) -serviceBusQueueName3 $(serviceBusQueueName3)

That is super cools because you don’t have to write a set of parameter files per Environment you can just write one and overwrite as needed.

Don’t forget to click the save icon to commit your changes.

I created 1 task per section of the environment I wanted to deploy automatically.

Service Bus ServiceBus.json

ServiceBus.dev.parameters.json

Azure Functions functions.json

functions.parameters.json

Azure Web App Webapp.json

Webapp.dev.parameters.json

DocumentDB database documentDB.json

DocumentDB.parameters.json

App Insight AppInsight.json

AppInsight.dev.parameters.json

There are so many benefits to this DevOps practice. Reliability, speed, uniformity, repeatability…. A few years ago when the industry started to gravitate to the DevOps practices I admit I was a sceptic. But no more…. I’m a believer now…

All code created has been stored on GitHub and has been made available to the public and can be accessed here: https://github.com/CDN-Missing-Children-Hack

Take a look at the video below about Missing Children Society of Canada.

Cheers!

Signature

Pierre Roman
@pierreroman

How to Deploy your own Windows 10 Universal Windows Platform Apps (.APPX) with Intune

$
0
0

This post will step through the deployment of Windows 10 Universal Windows Platform Apps (.APPX) using Microsoft Intune. These are the high-level steps:

  1. Create a test app (with Visual Studio)
  2. Upload the APPX bundle (Intune Standalone console)
  3. Deploy the cert chain to Windows 10 devices (only if you are using self-signed cert or internal PKI)
  4. Deploy the APP to a device group
  5. Pat yourself on the back

Step 1 – Create a Test App with Visual Studio

If you focus on Infrastructure and Device Management as a day job, Developing Windows 10 Apps may be unfamiliar ground, and likely not in your job description. I’m going to cover it briefly here though because its handy for testing and troubleshooting purposes and it’s also super easy.

For this step your going to need a copy of Visual Studio installed, you can get a trial version from here. If you just want to test out the Intune Deployment part, skip this step and download my sample app attached to this post.

Launch Visual Studio, Start > New Project and choose the UWP App template to start with (UWP Apps can be written in C#, C++ and Javascript). In my example I’m choosing this template: Javascript>Windows>Univeral> WinJS App (Universal Windows)

Give your project a name and click OK

Choose the Target version and minimum supported version of Windows 10 that this will app is going to be deployed to.


Add any artistic customisations you like to index.html and your sample UWP app is done!


Now the last thing to do is sign the app so that it can be distributed and allowed to run on Windows. You can do this a few ways:

Option 1: Use Visual Studio to issue a self-signed certificate and sign the app with that. (If you do this you also need to remember to deploy the self-signed certificate to the Trusted Root Certificate Authority of the devices where the app will be installed)

Option 2: Sign the App with a code-signing certificate issued from your internal PKI (If you do this you need to deploy the Root CA from your internal PKI to the Trusted Root Certificate Authority store in the way)

Option 3: Purchase a Code-Signing certificate from a vendor. (This is the preferred option as no extra steps are needed at deployment time. The cert chain will already be valid)

*If you are using option 1 or 2, You are going to need an additional step during deployment time – You will need to deploy the Root CA certificate if you signed the APP with an internal code signing certificate or deploy the Self-Signed certificate to the Devices where deploying the app.

For this post, I’m using Option 1 (Self-Signed) as I don’t have a code-signing certificate or PKI.

Select Package.appxmanifest from the Solution Explorer, then Packaging. Select Choose Certificate and select Create a Test Certificate. Provide a publisher name and password for the .pfx then Ok.

When you have finalized your app, Select Project > Store >Create App Package

On the Create your packages screen, select No (As you don’t have a Developer account and we will be distributing the app with Intune as an APPX package, not though the Windows Store).

Choose and output location and change Select Neutral architecture and Release under Solution configuration

Because we chose “Release” version, the next screen will prompt you to run through some app validation tests. You can just close this if your just creating a dodgey sample app).


Step 2 – Upload the APPX bundle (Intune Standalone Mode)

Head to the intune portal and sign in (Manage.microsoft.com)

Select Apps and Add Apps to download and run the Intune Software Publishing Tools

Walk through the Intune Software Publisher Wizard.

  1. Add Software
  2. Next
  3. Choose Software Installer, Windows appx package (*.appx.*.appxbundle) and Browse to the Appx bundle exported from Step 1.
  4. Fill in any optional information and add an icon
  5. Next
  6. Close


Return to the Intune portal, Go to Apps, Apps, then Select the uploaded Windows App to view app information.

Step 3 – Deploy the Root CA to your Windows 10 clients (Only if you are using a self-signed Certificate or internal PKI issued cert)

If you created the appx package with a self-signed certificate (or a code-signing certificate that came from your internal PKI) you have one bonus step. You need to get that Root CA Certificate into the Trusted Certificate store on the Windows 10 devices where you are installing the app. Rather than showing you how to manually copy it and import it, I’ll step you through deploying this with Intune.

In the Intune portal (Manage.microsoft.com) go to Policy and Add Policy


Select Windows > Trusted Certificate Profile (Windows 8.1 and later)


Enter some basic details for the Certificate Deployment, Select the Root CA Certificate from the Visual Studio Output folder (%username%documentsVisual Studio 2015<project name><app name>appPackages<appname>appname.cer on the machine where the appx was generated).


After you click Save Policy, You will be prompted to deploy the policy now. Click Yes and then choose a sensible device collection.


Step 4 – Deploy the App as a required install

In the Intune console, Go to Apps, Apps, Select your APP from list and then select Manage Deployment


Deploy to an appropriate Device group as a Required Install


(Note: In some cases, an appx package may have a dependency on frameworks in the form of .appx bundles to work at all. It is important to upload and deploy these for app to work properly (in the same way described above). With Intune Standalone, there is currently to way configure dependencies so that the UWP app doesn’t attempt installation until the dependency package is installed so you will need to consider and plan for this. For more details around possible work arounds see this post: https://blogs.technet.microsoft.com/tune_in_to_windows_intune/2015/04/02/deploying-appx-package-to-windows-phone-via-microsoft-intune-failes-with-0x0-or-0x87d103e8/)

Step 5 – Pat yourself on the back

So the hard work is done. It’s time to make sure you have the app installed.

Log onto an Intune-enrolled Windows 10 machine

Go to Settings > Accounts > Access Work or School. Select your workplace > Info and Sync now to force an Intune policy sync.

After a successful Sync. Check that the certificate deployed successfully (run Certlm.msc, then go to Trusted Root Certification Authorities)


Check that the App is successfully installed and works:


If it didn’t work…

If it didn’t work, you should definitely not be patting yourself on the back yet. Use these logs to work out what the problem is:

Check Event Logs:

If the appx is not deploying properly, the clue will likely lie in one of these logs:

(Local) > Applications and Services Logs > Microsoft > Windows> AppxPackagingOM > Microsoft-Windows-AppxPackaging/Operational.

(Local) > Applications and Services Logs > Microsoft > Windows> AppXDeployment-Server > Microsoft-Windows-AppXDeploymentServer/Operational.

If there is nothing useful in the appx logs, check the Windows MDM log to ensure policy updates have been received from intune:

(Local) > Applications and Services Logs > Microsoft > Windows> DeviceManagement-Enterprise-Diagnostics-Provider > Admin

Check Intune console:

The Intune portal will also highlight any issues with the app deployment. In the case below there is an error 0x800B0109: Certificate chain led to untrusted root certificate.

If you see this, It is likely that the Root CA cert (Step 3) has not been deployed successfully – go to certlm.msc as above and verify.

Quick note on SideLoading:

The process of installing UWP apps in this way is called “Sideloading”. If you are familiar with SideLoading in previous OS’s you may have noticed that there are no steps above to enable Side-loading on the Windows 10 device. That’s because it gets automatically enabled on the device when enrolled in Management (intune). You don’t need to push out any settings to configure it.

Viewing all 34890 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>