blog.atwork.at

news and know-how about microsoft, technology, cloud and more.

How to enable Copilot in Power BI

In today's data-driven world, the ability to quickly analyze and visualize data is crucial for making informed decisions. Microsoft Power BI has long been a powerful tool for business intelligence, and with the introduction of Copilot, it has become even more versatile. See the following resources for activating Copilot for Power BI in your organization.

TechCon365 Dallas: A Hub of Technology and Collaboration

We enjoyed being part of this year´s TechCon 365 conference in Dallas, Texas. From November 3-7, 2024, the conference center in Dallas Irving became the center of Microsoft 365 and Power Platform Know How as more than 500 tech enthusiasts gathered for the TechCon 365 event. This year’s conference was a melting pot of knowledge, and networking opportunities, featuring over 130 sessions and 25 workshops led by top experts in Microsoft 365, Power Platform, Azure, AI, and more.

Introducing the new and improved Delegate365: A modern SaaS solution for efficient, delegated management of an M365 tenant

We are thrilled to announce the launch of the latest version of our Software-as-a-Service solution, Delegate365 (delegate365.com). This brand-new iteration is designed to provide a faster, more modern, and highly efficient delegated management experience. Available now for testing, Delegate365 is here to transform how you manage and delegate your Microsoft 365 environment.

Setup the CoE using Azure Key Vault

In today’s rapidly evolving digital landscape, maintaining visibility and control over your organization’s M365 Power Platform environment is crucial. The Center of Excellence (CoE) for the Microsoft 365 Power Platform serves as a vital tool for organizations to monitor, manage, and optimize your Power Platform resources effectively. In this article, we will guide you through the process of setting up the current version of the CoE Core solution using Azure Key Vault for secure and efficient Audit Log access.

Unlocking Secrets: The Key Vault Role You Need

In my use of Azure Key Vault with code and flows with Managed Identities, I moved to role-based access control (RBAC) to manage access to secrets and certificates. However, I encountered a problem when using the Key Vault Reader” role as it denied me the required access to secret content. This experience highlighted the importance of understanding the specific roles within Azure Key Vault, and I want to share this insight to help others avoid similar pitfalls.

Use Delegate365 with Privileged Identity Management (PIM)

In today’s digital landscape, managing privileged access to applications is crucial for maintaining security and compliance. Microsoft Entra Privileged Identity Management (PIM) offers a robust solution to manage, control, and monitor access within your organization. In this guide, we’ll walk you through the process of configuring Microsoft Entra PIM for your application, Delegate365, ensuring that only authorized users can access it through a security group.

Why Only Users Can Apply Sensitivity Labels in Microsoft 365

Sensitivity labels in Microsoft 365 are a crucial feature for organizations to protect and manage their data. These labels allow organizations to classify and safeguard sensitive information based on its level of confidentiality. By applying sensitivity labels, organizations can control access, encrypt data, apply policies, and track and monitor on sensitive information. Users can apply sensitivity labels to classify and protect their data. However, applications unfortunately cannot currently assign sensitivity labels.

Grant permissions to the GT365 app

Our Governance Toolkit 365 (GT365) provides information and automation solutions for a Microsoft 365 tenant. In order to use the functions, this app must be approved by an administrator. In addition, new solutions are constantly being added. Some of these also require new permissions. You can find out how you as an administrator can grant and renew these permissions here.

Retrieve User PIM Role Assignments and History with Microsoft Graph REST API

Microsoft Entra Privileged Identity Management (PIM) allows administrators to manage role assignments efficiently, ensuring that users have the necessary permissions only when needed. By following a few simple steps, administrators can make users eligible for specific roles, activate roles as required, and manage both built-in and custom roles. This process enhances security by minimizing the duration and scope of privileged access, making it a crucial tool for maintaining a secure and compliant environment. In this article, we explore how to read a user's Microsoft Entra roles and history using PIM and the Microsoft Graph REST API.