How can partners add permission sets?

Microsoft partners who build solutions based on Business Central need a way to expose access to their custom objects through so-called System permission sets. These permission sets are read-only, but users can copy them to create User-Defined permission sets with different permissions. All permission sets released by Microsoft are also of type System. Note that…


SQL Audit logs in Azure Log Analytics and Azure Event Hubs

We are pleased to announce that Azure SQL Database Audit logs can now be written directly to Azure Log Analytics or Azure Event Hubs. This ability, now available in public preview, provides SQL Database Auditing customers with an easy way to centrally manage all of their log data, along with a rich set of tools…


A decision tree for Azure Networking

Whether you are planning to use Express Route or VPN tunnels to connect your data centers to Azure, and you want to use a co-location provider in your region to reach Azure or extend your MPLS network to Microsoft. Are you also thinking what is the optimal route to connect your regions? These are the…


Microsoft Threat Modeling Tool GA Release

Microsoft Threat Modeling Tool GA Release We are excited to announce the Microsoft Threat Modeling Tool is now available to download as a supported generally available (GA) release. This release contains important privacy and security updates as well as bug fixes, feature updates, and stability improvements. Existing users of the 2017 Preview version will be…


How to create a read only user for a SQL Azure database

I am updating, or should I say, re-coding a website I have from ASP.NET Web Forms (aspx) to ASP.NET Core Razor Pages (chtml).  The database it connects to only has a global admin, full access user identity.  So I thought that I would fix that and create a need account for read only access.  This…


How to configure TLS versions in App Service and Functions apps in Azure Government

TLS (Transport Layer Security) protocols provide privacy and data integrity for establishing secured connections between applications. Over the period of time TLS has evolved and new versions have continued to fix vulnerabilities in older versions and also add newer capabilities. As Azure Government customers continue to optimize security of their cloud based applications and solutions,…


Online Safety and Security in a post

Mark Anderson is a former teacher and school leader and now award-winning author, blogger, speaker, thought-leader and trainer around all things to do with teaching, learning and effective use of technology in the classroom. Mark firmly believes that education is a force for good and under his moniker of the ICT Evangelist he strives to…


Private preview: Now access the Managed Access to Microsoft Graph Data

Now you can access the Managed Access to Microsoft Graph Data – Yes, you heard it correct. So you can use, Managed Access to Microsoft Graph Data is designed to give administrators new controls over the Office 365 data they provide to application developers who forge insights with that data. It include scenarios for Enterprises…

1

RSVP and join us for our Aug. 29 Meetup: Future of Gov Security – Automated ATOs, Revamped TIC & Beyond

The President’s Management Agenda (PMA) is calling on agencies to accelerate their IT modernization efforts with a continued focus on security. At this month’s meetup, we will discuss how agencies can navigate ATOs and TIC compliance, so they can realize the benefits of the cloud and achieve greater agility while strengthening their security posture. To…