TechCon365 Dallas A Hub of Technology and Collaboration

TechCon365 Dallas A Hub of Technology and Collaboration

We enjoyed being part of this year´s TechCon 365 conference in Dallas, Texas. From November 3-7, 2024, the conference center in Dallas Irving became the center of Microsoft 365 and Power Platform Know How as more than 500 tech enthusiasts gathered for the TechCon 365 event. This year’s conference was a melting pot of knowledge, and networking opportunities, featuring over 130 sessions and 25 workshops led by top experts in Microsoft 365, Power Platform, Azure, AI, and more. ...

November 22, 2024 · 3 min · Toni Pohl
How to Use Power BI REST API as an Admin

How to Use Power BI REST API as an Admin

Accessing the Power BI REST API with an application is crucial for efficiently managing and monitoring your Power BI environment. This guide will walk you through using the Power BI REST API with an app as an admin. By leveraging a service principal, your app can seamlessly authenticate and interact with Power BI resources. This allows our app to read Power BI workspaces and usage data automated to streamlines administrative tasks in Power BI. A Service Principal Name (SPN) is an authentication method that enables a Microsoft Entra application to access Microsoft Fabric content and APIs. When you create a Microsoft Entra app, a service principal object is automatically generated. This object, commonly referred to as the Service Principal, allows Microsoft Entra ID to authenticate your app. Once authenticated, the app can access resources within the Microsoft Entra tenant. See more at Service principals can access read-only admin APIs. and Tenant settings index. ...

November 1, 2024 · 5 min · Toni Pohl
Introducing the new and improved Delegate365 A modern SaaS solution for efficient, delegated management of an M365 tenant

Introducing the new and improved Delegate365 A modern SaaS solution for efficient, delegated management of an M365 tenant

We are thrilled to announce the launch of the latest version of our Software-as-a-Service solution, Delegate365 (delegate365.com). This brand-new iteration is designed to provide a faster, more modern, and highly efficient delegated management experience. Available now for testing, Delegate365 is here to transform how you manage and delegate your Microsoft 365 environment. For the past decade, we have consistently updated Delegate365 to ensure it remains at the forefront of IT management solutions. Our commitment to security has been unwavering, with regular updates to protect against emerging threats and vulnerabilities and to enhance the platform’s security and functionality. We have continually introduced new features to meet the evolving needs of our users. From integrating advanced functionalities to improving user experience, our updates have always aimed to make Delegate365 more powerful and user-friendly. This dedication to innovation and security has made Delegate365 a trusted solution for IT management over the years. ...

October 31, 2024 · 5 min · Toni Pohl

Setup the CoE using Azure Key Vault

In today’s rapidly evolving digital landscape, maintaining visibility and control over your organization’s M365 Power Platform environment is crucial. The Center of Excellence (CoE) for the Microsoft 365 Power Platform serves as a vital tool for organizations to monitor, manage, and optimize your Power Platform resources effectively. In this article, we will guide you through the process of setting up the current version of the CoE Core solution using Azure Key Vault for secure and efficient Audit Log access. ...

October 17, 2024 · 5 min · Toni Pohl
Useful SharePoint search expressions

Useful SharePoint search expressions

When working with files in SharePoint document libraries, there are many ways to filter files. Since I keep forgetting the syntax for the search queries, I have summarized the most important filter expressions here. Here are some useful filter expressions for Microsoft 365 Search: Upper and lower case letters are not taken into account (except the operators, these must be capitalized). Wildcard * is supported for searching for a part of a word. ...

September 4, 2024 · 2 min · Toni Pohl

Unlocking Secrets The Key Vault Role You Need

In my use of Azure Key Vault with code and flows with Managed Identities, I moved to role-based access control (RBAC) to manage access to secrets and certificates. However, I encountered a problem when using the “Key Vault Reader” role as it denied me the required access to secret content. This experience highlighted the importance of understanding the specific roles within Azure Key Vault, and I want to share this insight to help others avoid similar pitfalls. ...

August 26, 2024 · 4 min · Martina Grom
Use Delegate365 with Privileged Identity Management PIM

Use Delegate365 with Privileged Identity Management PIM

In today’s digital landscape, managing privileged access to applications is crucial for maintaining security and compliance. Microsoft Entra Privileged Identity Management (PIM) offers a robust solution to manage, control, and monitor access within your organization. In this guide, we’ll walk you through the process of configuring Microsoft Entra PIM for your application, Delegate365, ensuring that only authorized users can access it through a security group. Delegate365 is equipped with robust security features and offers seamless integration with Microsoft Entra Privileged Identity Management right out of the box. This integration ensures that administrators can only access Delegate365 using their standard work accounts when the PIM role is activated. Without activating the PIM role, access to Delegate365 is denied. ...

August 19, 2024 · 6 min · Toni Pohl
Why Only Users Can Apply Sensitivity Labels in Microsoft 365

Why Only Users Can Apply Sensitivity Labels in Microsoft 365

Sensitivity labels in Microsoft 365 are a crucial feature for organizations to protect and manage their data. These labels allow organizations to classify and safeguard sensitive information based on its level of confidentiality. By applying sensitivity labels, organizations can control access, encrypt data, apply policies, and track and monitor on sensitive information. Users can apply sensitivity labels to classify and protect their data. However, applications unfortunately cannot currently assign sensitivity labels. ...

August 15, 2024 · 4 min · Toni Pohl
Grant permissions to the GT365 app

Grant permissions to the GT365 app

Our Governance Toolkit 365 (GT365) provides information and automation solutions for a Microsoft 365 tenant. In order to use the functions, this app must be approved by an administrator. In addition, new solutions are constantly being added. Some of these also require new permissions. You can find out how you as an administrator can grant and renew these permissions here. GT365 requires an app “Governance Toolkit 365” that reads the data from the M365 tenant and collects it for further actions. An administrator must approve this app so that the functions can be used. There are the following functions that administrators can perform: ...

August 7, 2024 · 7 min · Toni Pohl
Retrieve User PIM Role Assignments and History with Microsoft Graph REST API

Retrieve User PIM Role Assignments and History with Microsoft Graph REST API

Microsoft Entra Privileged Identity Management (PIM) allows administrators to manage role assignments efficiently, ensuring that users have the necessary permissions only when needed. By following a few simple steps, administrators can make users eligible for specific roles, activate roles as required, and manage both built-in and custom roles. This process enhances security by minimizing the duration and scope of privileged access, making it a crucial tool for maintaining a secure and compliant environment. In this article, we explore how to read a user’s Microsoft Entra roles and history using PIM and the Microsoft Graph REST API. ...

August 3, 2024 · 5 min · Toni Pohl