Category: Skype for Business

April 21st, 2021 by Luise

3 Tipps to beautify your Power Apps

Your Canvas apps can look beautiful! I want to show you three 5 minute tricks to make your Power Apps prettier.

Fluent UI icons

Power Apps offers you a variety of icons - and recently, there were nice additions announced and rolled out. But if we want to create even more appealing apps, it makes sense to extend our pretty little icon library. Microsoft provides us with Fluent UI.

Fluent UI is a collection of UX frameworks for creating beautiful, cross-platform apps that share code, design, and interaction behavior

One part of Fluent UI is the iconography

Fluient UI overview

How to get Fluent UI icons

You can browse through the icons in the Fluent UI icons tool, but there is right-click download option. As a developer, you can import Fluent UI iconography (and more) into your applications; for Power Apps, there a different way how to use them:

Use a community-driven tool to import icons to Power Apps

there are several tools available to get Fluent UI icons into Power Apps; find two of them here:

However, if you only want to use a few specific icons for an app or would like to try them out, you can head over to the Fluent UI repository on GitHub and right-click-download the icons. After that, you upload them to your Power App and can use them like any other image. Super cool: You get all icons as .svg files, which have three significant advantages:

  • .svg are transparent, which means you have no extra work to remove any background

  • .svg are lossless scalable, which means that you blow them up as you like it

  • .svg have are usually smaller than .jpg files of the same quality - this will have an excellent effect on the performance of your app


Screens in Power Apps are perfect for displaying information that should always be shown. But what if we only want to show some more content occasionally? Pop up to the rescue!

Lightbox Popup

To create a pop up effect, create:

controls we need

  • a rectangle that overlays the content that our user now should not focus on - good idea to have it filled grey and semi-transparent

  • a rectangle, smaller than the GreyOutRectangle, filled in in brighter background-color

  • a text label which shows the information

  • a cancel icon

Group these controls; it's easier to work with them then.

  • Now create a textlabel (or a button, or an image... something that our user will click on to see the pop up).

  • Set the .onSelect property of this label to UpdateContext({isShowPopUp:true})

  • Set the .onSelect propert of the cancel icon to UpdateContext({isShowPopUp:false})

  • Set the .visible property of the whole PopUp Group tp isShowPopUp

This way, we set the isShowPopUp variable to true, if the user clicks the label, which will make the PopUp visible. As soon as the user clicks the cancel icon, the isShowPopUp variable is set to false, which means that the group will not be shown anymore!

Create an expand- and collapse able menu

As we need to deal with all screen estate carefully, it is a fantastic idea to have a menu that can expand and collapse. To create this, we need

  • a collection that holds the screens that we want our users to allow to navigate to

  • a gallery, which displays the items of our collection

  • a Hamburger Menu icon, which sets a variable to control the width of the gallery

  1. collection

To have icons (which will show while the menu is collapsed) and text (that will show up right next to our icons when the menu is expanded), we will first upload a few svgs (see above) and then refer to them in our collection:




Row: 1,

Title: "About",

Image: ic_fluent_lightbulb_24_regular



Row: 2,

Title: "Flights",

Image: ic_fluent_airplane_take_off_24_regular



Row: 3,

Title: "Hotels",

Image: ic_fluent_bed_24_regular


Row: 4,

Title: "People",

Image: ic_fluent_people_32_regular



  1. Gallery

We create a gallery and set the .items property to our collection

We set the .width property to If(!IsExpand, 200, 50) or similar - first value is the expanded width, second is the non-expanded (collapsed) width.

As we want to pretty things up a little bit,

  • add a small rectangle to your gallery

  • add a rectangle (width = 1) to the right of your gallery

  1. Hamburger menu

we add a hamburger menu icon and set its .onSelect property to Set(IsExpand, !IsExpand)

  1. adjust all other controls on the screens

Now work on the .X property of all labels, buttons, images, etc. Set it to

If(!IsExpand, <original value>,<originalvalue>-150)

Our result should look something like this:

expand menu

Feedback and what's next?

What are your little tricks to make apps look more beautiful? I am curious to learn from you! Please comment below!

Posted in Skype for Business

April 21st, 2021 by Emma Jones

For the third year in a row, Microsoft successfully demonstrated industry-leading defense capabilities in the independent MITRE Engenuity ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Evaluations.

As the attack surface evolves on a near-daily basis, threat actors are creating more advanced techniques targeted across domains such as endpoints, identities, emails, documents, and cloud apps, requiring security solutions with the capability to automatically analyze threat data across these domains and build a complete picture of the attacks. The 2020 ATT&CK Evaluations concentrated on advanced threat actors known to the industry as FIN7 and Carbanak (also called Carbon Spider). This year’s rigorous evaluation included new benchmarks of detection and protection simulations of more than 174 steps across the attack chain, affecting both Windows client endpoints, servers, and, for the first time, Linux devices.

This cross-platform, sophisticated attack simulation significantly elevated the stakes for detection and protection, and we are proud to report that results showed Microsoft Defender for Endpoint effectively detected and prevented malicious activity at every major attack stage. In this evaluation, we were able to put Microsoft Defender for Endpoint’s Linux capabilities to the test. MITRE Engenuity ran the simulated Carbanak and FIN7 attack end-to-end and across multiple attack domains, meaning defenders benefited from the added capabilities in Microsoft 365 Defender and got visibility beyond just endpoint protection. MITRE Engenuity’s ATT&CK Evaluations results showed that Microsoft provides:

  • Industry-leading protection: Microsoft’s industry-leading capabilities quickly identified suspicious activity and offered real-time containment to rapidly stop the attack.
  • Superior detection and protection on Linux: Microsoft Defender for Endpoint blocked everything on Linux, providing exceptional detection, protection, and visibility that comprehensively captured Linux file server activity.
  • Excellent detection and visibility across the attack chain: Our world-class SecOps experience and Microsoft 365 Defender capabilities showed the full attack story across domains and quickly correlated all activity down to two incidents.

Three circular icon graphics depicting that Microsoft offers industry-leading protection, superior detection and protection on Linux, and excellent detection and visibility across the attach chain.

Figure 1. MITRE Engenuity’s ATT&CK Evaluation results demonstrated that Microsoft provides industry-leading protection, superior detection and protection on Linux, and excellent detection and visibility across the attack chain. 

Microsoft participated in the ATT&CK Evaluations because we believe it is the most comprehensive testing environment that most closely mirrors real-world attacks. Our mission is to empower world-class defenders by continuing to drive product excellence, listening to customers, and investing in research to deliver intelligent solutions. We attribute this success to these investments and our customer-first approach.

Microsoft Defender once again prevails over the adversary

Microsoft’s massive depth and breadth of security optics and threat intelligence is integrated into Microsoft Defender products and uniquely enables us to stand out in complex attack scenarios.

Industry-leading protection

Microsoft Defender for Endpoint blocked the attack at the earliest stage, providing containment in real-time. Defender for Endpoint quickly identified the suspicious activity and incriminated it as malicious. This prevented the attacker from taking actions that may have had a negative impact on the device, such as shell execution, discovery, persistence, or exfiltration, effectively blocking the simulation and stopping the attack from proceeding.

Defender for Endpoint alert page: SystemPropertiesAdvanced.exe attempts to execute code in the illegitimate srrstr.dll and being blocked by Defender for Endpoint.

Figure 2. Defender for Endpoint alert page: SystemPropertiesAdvanced.exe attempts to execute code in the illegitimate srrstr.dll and is blocked by Defender for Endpoint.

Microsoft Defender for Endpoint provided extensive visibility and coverage for the attack chain on Linux.

Superior detection and protection on Linux

Our endpoint security capabilities for Linux fit seamlessly into the attack story, and Microsoft Defender for Endpoint was able to provide extensive visibility and coverage for the attack chain, which indicates how essential endpoint detection and response (EDR) detection, protection, and visibility are for navigating today’s Linux threat landscape. Defender for Endpoint was able to completely capture Linux file server activity, including sign-in, connections, read and copied files, various discovery activities, and Pass-the-Hash (PtH). We are proud to offer this kind of coverage on Linux as we continue to extend endpoint security capabilities across all the major platforms (Windows, Linux, macOS, Android, and iOS).

Defender for Endpoint alert page on a Linux device: Lateral movement attack story, from remote system discovery, suspicious login and remote code execution using Python from Linux device to endpoint.

Figure 3. Defender for Endpoint alert page on a Linux device: Lateral movement attack story, from remote system discovery, suspicious login, and remote code execution using Python from Linux device to endpoint.

Microsoft 365 Defender dramatically reduced alert noise from over 1,000 alerts down to just two incidents.

Excellent detection and visibility across the attack chain

The results of the ATT&CK Evaluation highlighted our deep detection capabilities and the comprehensive optics across the attack chain, including:

  • Detecting advanced attack techniques on endpoints: Microsoft Defender for Endpoint recorded and alerted on all malicious activities across the attack chain, including advanced attack techniques such as injections, shellcode execution, execution using scheduled tasks, UAC bypass, web browser and OS credentials collection, screen and keystroke collection, and persistence using application shimming.
  • Providing deep visibility into the timeline of events on devices: Microsoft 365 Defender presented a detailed view of the events taking place on the device through the device timeline. The device timeline also provided a new capability to surface attack techniques: a specific sequence of standalone events is combined to build a more meaningful representation of identified attack technique. This recent addition to the device timeline empowers Security Operations Center (SOC) analysts to glean more insight into the activities on the device, as well as the potential reason for their execution.

Defender for Endpoint device timeline on a Linux device: Lateral movement technique for remote code execution from Linux device to endpoint is highlighted.

Figure 4. Defender for Endpoint device timeline on a Linux device: Lateral movement technique for remote code execution from Linux device to endpoint is highlighted. 

  • Identifying activities associated with compromised identities: Leveraging both device and identity signals, Microsoft 365 Defender provided deep visibility and alerting for actions taking place on a device by what’s known as a compromised account. Microsoft 365 Defender used sophisticated techniques, such as pass-the-hash and pass-the-ticket. Microsoft Defender for Identity analyzed and detected account compromise at the domain level, tracking and alerting account activity for lateral movement using remote service creation. Having this view beyond endpoint and across other domains, such as identities, is a unique advantage of Microsoft 365 Defender, giving customers more robust security against today’s modern, multifaceted threats.

Defender for Identity alert page: Lateral movement using remote code execution from Windows server to endpoint detected by Defender for Identity as a suspicious identity behavior for user kmitnick.

Figure 5. Defender for Identity alert page: Lateral movement using remote code execution from Windows server to endpoint detected by Defender for Identity as a suspicious identity behavior for user kmitnick.

With this depth of detection capabilities and breadth of visibility, Microsoft 365 Defender provided a unified view of the attack and empowered SOCs to respond by delivering:

  • A detailed attack story of alerted activities is linked together, tagged with the appropriate MITRE ATT&CK techniques, and included every needed piece of data. This was achieved through our massive optics and unique native integration of signal, sources, and capabilities, enabling the SOC analyst to arrive at an accurate conclusion and act effectively.

Defender for Endpoint alert page: Lateral movement using remote desktop connection, script execution via Registry run key, and suspicious script execution being detected.

Figure 6. Defender for Endpoint alert page: Lateral movement using remote desktop connection, script execution via Registry run key, and suspicious script execution being detected.

  • Two meaningful incidents generated from over 1,000 alerts, bringing together the rich information and context necessary for SOCs to effectively evaluate the scope of the attack, without the volume of triage and investigation work that is normally needed. With today’s limited time and resources, security teams need tools that rapidly and effectively investigate challenging scenarios, such as lateral movement from Windows to Linux and suspicious behavior across the organization by a compromised identity.

Microsoft 365 Defender incident page correlating all the devices, users, alerts, and evidence that describe the first attack simulated by MITRE Engenuity.

Figure 7. Microsoft 365 Defender incident page correlating all the devices, users, alerts, and evidence that describe the first attack simulated by MITRE Engenuity.  

MITRE Engenuity Carbanak and FIN7 Evaluation details

The 2020 MITRE Engenuity ATT&CK Evaluations reflect an evolution of industry testing that Microsoft supports and is happy to contribute to. Our participation demonstrates our commitment to work with the industry to evaluate our capabilities using modern approaches that simulate real-world attack scenarios and that allow participants to learn from each other.

  1. In this evaluation, MITRE Engenuity expanded the scope to evaluate protection and detection capabilities on Linux, as well as Windows, as the Carbanak and FIN7 attacker groups used tools that interacted with both platforms, including point of sale specific technologies. We were excited to put our Linux capabilities to the test in this evaluation as we’ve continued to extend endpoint security across all the major platforms (Linux, macOS, Android, and iOS).
  2. This year, MITRE Engenuity did not include managed security service providers (MSSP) in the evaluation. This means that all the protection and detection value presented by Microsoft Defender for Endpoint is the result of fully automated, AI-driven advanced algorithms meant to protect organizations from advanced attacks with no additional services needed.
  3. Finally, for the first time, MITRE Engenuity executed two evaluations. The first was a detection evaluation, which tested our visibility and awareness of an ongoing attack and its techniques. The second was a protection evaluation, which tested our capabilities to block the attack at an early stage.

To fully execute the end-to-end detection and protection simulations of Carbanak and FIN7, MITRE Engenuity required participants to provide two different environments:

  • Detection environment: MITRE Engenuity asked participants to turn off all proactive protection and blocking capabilities. For Microsoft Defender for Endpoint and the additional value of Microsoft 365 Defender, this meant all capabilities that normally block this kind of attack, such as automatic remediation flows, application isolation, attack surface reduction, network protection, exploit protection, controlled folder access, and next-gen antivirus prevention were turned off.
  • Protection environment: All proactive protection and blocking capabilities are turned on. Some steps executed in the detection evaluation were chosen by MITRE Engenuity to be tested in a protection setup. That enabled Microsoft 365 Defender to prove its blocking abilities for a variety of steps, where it prevented and blocked execution at a very early stage of each step.

Real-world testing is critical to detection and prevention

As the security landscape changes, we are on a mission to help defenders solve the toughest and most critical problems. Coordinated, targeted, and advanced attacks carried out by sophisticated adversaries are some of the most complex threats that security teams encounter. This is why participating in evaluations such as MITRE ATT&CK is so important in ensuring we’re delivering solutions that empower defenders to protect their organizations. Our vision with our Microsoft Defender products is to provide industry-leading, best-of-breed, cross-domain security for the modern workplace. Microsoft 365 Defender is designed to provide extended detection and response (XDR) by combining protection for endpoints (Microsoft Defender for Endpoint), email and productivity tools (Microsoft Defender for Office 365), identities (Microsoft Defender for Identity), and cloud applications (Microsoft Cloud App Security). This unique combination helps to stop attacks before they happen, enables a rapid and complete response, and gives back time to the security team to focus on their most critical priorities.

In response to MITRE Engenuity’s call for community contribution related to the Carbanak and FIN7 actor groups, Microsoft researchers worked to consolidate and share threat intelligence with MITRE Engenuity. Microsoft shared key similarities and differences in focus, tooling, and operations observed for these two groups, as well as shared evidence for known and new tactics, techniques, and procedures (TTPs). This year, MITRE Engenuity elevated their attack scenarios, starting from gathering threat intelligence and then through the implementation of sophisticated and realistic attack chains. We’re delighted to see that MITRE Engenuity incorporated the feedback Microsoft shared from previous rounds and that this evaluation continues to evolve with each year. This kind of collaboration and continued evolution is of benefit to all in the security community. We thank MITRE Engenuity for the opportunity to contribute to and participate in this year’s evaluation.

Learn more

Microsoft Defender for Endpoint is an industry-leading, cloud-powered endpoint security solution offering vulnerability management, endpoint protection, endpoint detection and response, and mobile threat defense. With our solution, threats are no match. Take advantage of Microsoft’s unrivaled threat optics and proven capabilities. Learn more about Microsoft 365 Defender or Microsoft Defender for Endpoint, and sign up for a trial today.

To learn more about Microsoft Security solutions visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity.

The post MITRE Engenuity ATT&CK® Evaluation proves Microsoft Defender for Endpoint stops advanced attacks across platforms appeared first on Microsoft Security.

Posted in Skype for Business

April 21st, 2021 by Mark Kashman

Attendees, to the starting line!


Get those electrolytes flowing, the Microsoft 365 Virtual Marathon is coming to Onlinetown. Speakers are prepping content, ready to coach you through each mile. And the content, the content is what’ll get you across the finish line. A lot of great sessions on all types of products and solutions.


Jeff Teper (CVP), Karuana Gatimu (Principal manager), Heather Newman (Principal PM manager), and Laurie Pottmeyer (Community lead) will be giving Microsoft keynote and overview sessions that’ll get you up-to-speed across our most recent updates and announcements. Plus, we’ll have Microsoft speakers delivering breakout sessions among thought leaders and community members from around the world.


What: Microsoft 365 Virtual Marathon to lean more | Register today

When: April 26 – 28, 2021 (60-hours / 3 days)

Presenters: 240+ speakers speaking in 7 different languages; view all sessions

Cost: Free

Primary Twitter hashtag: #M365VM

Microsoft 365 Virtual Marathon – April 26-28, 2021 (online training – keynotes and breakout sessions)Microsoft 365 Virtual Marathon – April 26-28, 2021 (online training – keynotes and breakout sessions)

The Marathon event team has content going the whole time with speakers from around the globe. This event is free for all wanting to attend. Join in to learn about the many different pieces of Microsoft 365, including Azure.


Below is a list of the Microsoft sessions and presenters – including Jeff’s keynote:


  • Keynote | “Update on Roadmap and Plans for Teams, SharePoint, OneDrive and Viva” by Jeff Teper
  • Microsoft 365 adoption best practices” by Karuana Gatimu
  • Introducing Microsoft Viva Connections” by Adam Harmetz
  • Microsoft Viva Topics:  Put knowledge to work with content and AI” by Chris McNulty and Naomi Moneypenny
  • Improve IT efficiency and agility and stay informed as you enable self-service tasks” by Karissa Larson
  • Microsoft 365 Groups overview and architecture deep dive” by Arunkumaran Varadharajan
  • Microsoft 365 network connectivity for remote users” by Roshan Padmanabhan Kanaka Sabapaty
  • Metadata Services in Microsoft 365: Deep Dive with the Product Team” by Anupam Francis
  • Build a Beautifully Designed Intranet: Tips and Tricks from the Product Team” by Katie Swanson and Cathy Dew
  • Make data-driven decisions with Power BI and Visio” by Mukul Kumar and Shilpa Goyal
  • Liven up your Intranet with SharePoint Spaces: Be there virtually with 360° virtual tours” by Matt Crisler
  • Make Microsoft Search uniquely yours with new customization options” by Roshan Dheram and Ram Poornalingam
  • Video in Microsoft 365” by Segun Bright and Struan Robertson

Shout out to community members @Joel Oleson@Galen Keene@Ryan Schouten, and @Jeff Willinger and the #M365VM team for putting together the online race, mapping the course and for supporting and promoting the knowledge and expertise that reaffirms this: Microsoft 365 has the best tech community in the world – with the endurance to prove it.



Mark “Huffin’ and Puffin’” Kashman 🏃🏻‍

Posted in Skype for Business

April 21st, 2021 by Author

Additions : 0
Updates : 8

Updated FeaturesCurrent StatusUpdate Type
Microsoft Search: Search across images in Microsoft SearchIn DevelopmentTitle, Description
Outlook for Mac: IMAP account type supportLaunchedStatus
Outlook for Mac: DelegationLaunchedStatus
Outlook for Mac: Ability to import and save ICS filesLaunchedStatus
Outlook for Mac: Shared CalendarsLaunchedStatus
Outlook for Mac: Shared MailboxesLaunchedStatus
Forms: Text Formatting (Bold, Italicize, and Underline) in Forms and QuizzesRolling OutStatus
Outlook and Exchange for Business: Shorten all events in an organization by defaultLaunchedStatus

The Author – Blogabout.Cloud

Posted in Skype for Business

April 21st, 2021 by johnacook

Since we announced in 2019 that we would be retiring Basic Authentication for legacy protocols we have been encouraging our customers to switch to Modern
— Read on

Posted in Skype for Business

April 20th, 2021 by YammerTeam

A lot has changed in Yammer over the past year and we continue to see new growth, new communities, and new users getting started with Yammer. With this in mind, we are excited to share training videos that you can use to share within your own organization. 


Use these training videos to build momentum in your Yammer communities.  



Videos for everyone…  


Microsoft Yammer conversations and discovery


In this video you’ll learn how to…  

  • Discover and join new communities  
  • Understand what’s in your Yammer feed  
  • Favorite communities for quick access 
  • Start a conversation, ask a question, post a poll, react and @mention a co-worker. 
  • Share conversations  
  • Mark best answer to a question you’ve asked 
  • Search Yammer for previous conversations 





Microsoft Yammer notifications and announcements 


In this video you’ll learn how to…  

  • Stay on top of your notifications in Yammer 
  • Receive announcements and react and reply directly in Microsoft Teams, Outlook, Yammer 
  • Adjust your email notification settings in Yammer  


Resource: What’s new in Yammer 

Resource: End User Training Guide 





Training for Yammer community admins…  


Microsoft Yammer communities overview 


In this video you’ll learn how to … 

  • create and brand a community 
  • Post an announcement  
  • Moderate conversations including how to feature a conversation, pin conversation, close the conversation, and how to mark best answer to a question.  
  • Host a virtual event  
  • Evaluate your community by looking at the analytics and insights for the conversations, questions, and events.

Resource: Community Management for Yammer  

Resource: Build Yammer Communities 

Related blog post: How to create a sustainable Yammer community  




Training for Yammer network Admins…  


Microsoft Yammer network admin highlights 


In this video you’ll learn how to…  

  • Set up usage policy 
  • Add your company’s logo to the emails 
  • Set up Report Conversations process 
  • Mute a community from the feed 
  • Configure and customize All Company branding and naming 
  • Pin Yammer Communities App to Microsoft Teams  


More Support: Admin key concepts  





Find more Yammer resources  

Yammer Support & Help  

Yammer Adoption & Resources  

Yammer Online Training 




Posted in Skype for Business

April 20th, 2021 by Rudy Mens

A long-requested feature to send emails from an alias in Office 365 seems to be finally released. The feature has not been announced yet, but it’s already documented in the service description and seems to work fine. This new feature should become available for Outlook ... Read moreHow-to Send email from Alias in Microsoft Office 365

The post How-to Send email from Alias in Microsoft Office 365 appeared first on LazyAdmin.

Posted in Skype for Business

April 20th, 2021 by Jared Spataro, Corporate Vice President for Microsoft 365

One thing is certain: hybrid work is the future of work. People want increased flexibility and a blended work model that grants them the freedom to work when and where it’s most comfortable for them. Hybrid work can deliver a future that people want and a future that I think will be better—but that doesn’t…

The post Research shows your brain needs breaks—Outlook and Microsoft Teams can help appeared first on Microsoft 365 Blog.

Posted in Skype for Business

April 20th, 2021 by johnacook

In this article we will help you creating the building file required to run CQD effectively.
— Read on

Posted in Skype for Business

April 20th, 2021 by Jeff Brown Tech

A Cloud Guru Associate Community Training Architect Gwyneth Pena-Siguenza recently launched the #CloudGuruChallenge: Your resume in Azure challenge. The goal is to create an online version of your resume in Azure to build your cloud skills. Gwyn talks more about the challenge on her YouTube channel.

I decided to take this challenge on as a way to bolster my Azure skills. Working with a project is the best way to build skills. You often run into problems or challenges that require diving deeper into the technology, thereby building knowledge.

I’m not sure how many parts this series will end up being, but here in part 1 I will cover:

  • Storing the project in GitHub
  • Building the website
  • Creating the Azure resources
  • Deploying the website

I won’t be going into step-by-step detail of how I built everything, but I will link to resources that I used along the way.

Storing the Project in GitHub

At the end of this project, I want to deploy website updates automatically out to Azure. With this in mind, I created a repository out in GitHub to store the project artifacts. I cloned the empty repository to my laptop. You can view the repository here:

JeffBrownTech / azure-resume-project

Building the Website

Following Gwen’s advice in the announcement post, I copied this free resume template to a folder named website in my project repo. I began customizing the text to put some information about myself, certifications, and previous experience.

A few years ago, I had the idea of moving to web app development. I began working through several courses at Codecademy on HTML, CSS, and JavaScript. While I ended up not pursuing that, those skills came in handy in customizing the template to my liking.

Creating the Azure Resources

You can use Azure Storage for hosting a static website (HTML, CSS, JavaScript) directly from a storage container. Using Azure Storage to host a website as it doesn’t require a web server to render the content.

There is a new Azure service call Azure Static Web Apps that automatically builds and deploys full stack web apps from a code repository. While this service is purpose built for this project, Azure Static Web Apps is still in public preview at the time of this writing. That will be another project for the future.

Using the Azure CLI, I created a resource group and storage account. In the storage account, I enabled the static website hosting and uploaded the website content to the storage account. Finally, I retrieved the default website URL to verify the site loads.

I wrote a PowerShell script to deploy the resources. The script is basic and doesn’t have any error handling, but it deploys all the resources that I need so far. You can view the script in the project repo:

JeffBrownTech / azure-resume-project / Build-AzureResources.ps1

Deploying the Website

As part of the build script, I uploaded the website files from my local system to the $web container in the storage account. The script ends with displaying the default URL for the website in the storage account. You can view my site so far here.

azure static website
Viewing Azure static website using default URL

If you don’t use the above script to display the website URL, navigate to your storage account to Settings > Static website. Here you enable or disable the static website using the blob service, retrieve the primary endpoint URL, and configure the index and error document names.

Viewing storage account static website URL
Viewing storage account static website URL

Next Steps

I need to enable HTTPs and custom domain support. Given I already have a domain, I may just put a CNAME record to point to the default website URL. It probably depends on how much a new domain is going to cost. I also need to implement the visitor counter using an Azure Function and Cosmos DB.

The post Azure Cloud Resume Challenge – Part 1 appeared first on Jeff Brown Tech.

Posted in Skype for Business