This is the 900th post on SharePains.com and I thought this would be a good moment to celebrate that milestone. Ok, it is not the 1000th post but 900 is still quite a lot.
The 900th Post Quiz
With posts about many of the Microsoft Technologies, SharePains has grown from just a few posts in the beginning to multiple posts per week in the recent years. SharePains has helped with user pains related to SharePoint, Power Platform, Azure, Teams and Dynamics and so much more.
To help me celebrate my 900th post on SharePains.com, please complete the following 900th post quiz by clicking on the image below and the winners will be announced on Twitter and LinkedIn soon.
Thank you!
Then I would like to complete this post by thanking you all for your support through out the years. You have shared your so many of your pains and given me my blog post ideas.
As long as there are pains to share, the SharePains post will keep coming.
The transition to a remote and hybrid workforce happened fast during a time of uncertainty, and IT professionals rose to the challenge with ingenuity and dedication. But two years in, many IT teams are still responding with patchwork solutions to enforce identity and access management (IAM) across a newly decentralized, multiple-endpoint ecosystem. It’s clear that new IAM strategies are needed to accommodate these major shifts in the workplace, as well as meet new organizational priorities and user expectations.
In that spirit of discovery, we’re looking forward to joining the IAM community at the Gartner Identity & Access Management Summit, August 22 to 24, 2022, in Las Vegas, Nevada. We’ll be sharing some of Microsoft’s recent insights about strengthening lifecycle and permissions management, stopping attacks on identity infrastructure, and moving to a cloud-based identity platform. With the recently announced Microsoft Entra, identity threat detection and response (ITDR), and our security information and event management (SIEM) and extended detection and response (XDR) solutions, we’re committed to providing end-to-end protection for your organization. Be sure to visit Microsoft Booth #304 and connect with our frontline defenders.
Gartner IAM Summit—Microsoft sessions
We’re excited to meet with our customers, colleagues, and peers at the 2022 Gartner Identity & Access Management Summit. Microsoft will present three research-backed sessions led by senior product managers, including a special look at ITDR led by Alex Weinert, Director of Identity Security at Microsoft.
Title: Manage, Secure, and Govern Identities Across Multicloud Infrastructures Speaker: Balaji Parimi, Partner General Manager Date/Time: Monday, August 22, 2022 | 11:45 AM to 12:15 PM PT Synopsis: Going multicloud makes you more agile and resilient. But it also creates more complexity and blind spots for your security and identity teams. It’s time to reimagine how we manage, secure, and govern identities, and enforce least-privileged access consistently across cloud platforms. In this session, we’ll explore how cloud infrastructure entitlement management (CIEM) can strengthen your Zero Trust security in a multicloud world.
Title: Beyond the Firewall: Upgrading from On-Premises to the Microsoft Cloud Identity Speaker: Brjann Brekkan, Group Program Manager, Identity and Network Access Date/Time: Monday, August 22, 2022 | 1:15 PM to 1:35 PM PT Synopsis: Today’s new normal of “work from anywhere” and “on any device” has exposed the challenges of using on-premises authentication technologies and platforms as the control plane for enterprise applications and collaboration. You’re invited to join the Microsoft Identity product group for this interactive session. We’ll discuss the latest trends and platform capabilities to accelerate and simplify the journey of adopting a modern cloud-based identity platform.
Title: Identity Threat Prevention, Detection, and Response—Essential Defenses for a New Generation of Attacks Speaker: Alex Weinert, Director of Identity Security Date/Time: Tuesday, August 23, 2022 | 11:15 AM to 11:45 AM PT Synopsis: Attacks against identity infrastructure are accelerating. Instead of trying to compromise individual accounts, today’s attackers seek to gain unrestricted access to multicloud environments and workloads wherever they’re deployed. For that reason, protecting accounts is not enough—organizations need robust protections for the identity infrastructure itself. In this session, we’ll share how Microsoft envisions the future of ITDR, including what an effective identity and security collaboration should look like to help your organization grow fearlessly.
Bridging the IAM and SOC divide
Even as we approach another IAM summit, many organizations are still shocked to learn the reality of how most identity breaches occur. According to the 2022 Verizon Data Breach Investigations Report, 65 percent of breaches are caused by credential misuse, while only 4 percent caused are by system vulnerabilities.1 A full 82 percent of breaches involve the human element, including social engineering attacks, user errors, and data misuse.
As I will discuss in my Tuesday session, ITDR offers a way of reimagining the scope and collaboration between the SOC and identity admins that can help stop more of these credential-based attacks. IAM requires a lot of the same telemetry and inventory that SOC teams have, but the two groups rarely share tools. That’s because each team buys tools for different reasons. Operations and identity admins want stable, predictable operations and high uptime. Security analysts aren’t concerned with uptime; they care about identifying threats. In other words, IAM is mostly focused on letting only the good guys in, but it also needs an equal capability for keeping the bad guys out.
So, how do we reduce that staggering 65 percent of breaches that result from account-takeover attacks? And how do we know if and when the architecture itself is faulty? The solution lies in unifying more signals and more controls into a holistic solution. Microsoft is positioned to bridge the chasm between SOC and IAM because Microsoft Azure Active Directory (Azure AD) is already the foundation identity that so many organizations rely on. In addition, Microsoft Sentinel provides a cloud-native SIEM and SOAR solution with built-in user entity and behavior analytics (UEBA), while Microsoft Defender provides XDR capabilities for user environments, and Microsoft Defender for Cloud provides XDR for infrastructure and multicloud platforms.
Microsoft Entra: The way in is the way forward
Along with bridging the SOC and IAM relationship, Microsoft Entra is a vital component of Microsoft’s approach to ITDR. The products in the Entra family help provide secure access by providing IAM, CIEM, and identity verification in one solution.
Entra encompasses all of Microsoft’s existing IAM capabilities and integrates two new product categories: Microsoft Entra Permissions Management is a CIEM solution that empowers customers to discover, remediate, and monitor permission risks across all major public cloud platforms (such as Amazon Web Services, Azure, and Google Cloud Platform) from a unified interface. Microsoft Entra Verified ID provides a decentralized identity service based on open standards, safeguarding your organization by allowing admins to seamlessly customize and issue verifiable credentials in all your apps and services.
Microsoft is working with our customers to reimagine IAM for our new decentralized workplace, and we’re committed to providing end-to-end protection for your organization with Microsoft Entra and SIEM and XDR. We look forward to meeting with you at Gartner Identity & Access Management Summit, August 22 to 24, 2022, in Las Vegas, Nevada. Be sure to stop and chat with us at Microsoft Booth #304.
To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Power Automate for desktop comes with new additions in August 2022 release, including the preview of SharePoint connector actions in desktop flows and the introduction of two new actions.
Power Automate for desktop comes with new additions in August 2022 release, including the preview of SharePoint connector actions in desktop flows and the introduction of two new actions.
I love Microsoft Forms more and more lately. What’s not to love? What used me to take hours previously with custom list forms and possible customization with InfoPath and SharePoint Designer, now takes me just minutes. Any business user can produce a nice-looking input form or survey, but using an out-of-the-box form builder wizard. And Forms, just like wine, gets better and better with age – Microsoft is constantly adding new features and functionality to it. I blogged previously about Forms, but what I would like to do in this post is document what are, in my opinion, the top 10 advanced features of MS Forms, that will help you optimize the experience for your users and make them slick and user-friendly. Here we go.
1. Attach files
One of the relatively recent additions to MS Forms is the ability to attach files to the form. This is, of course, is a pretty common requirement when you need to submit supporting documentation as part of the submissions.
The forms reside within the Apps folder in OneDrive for Forms created within a user account and in the Apps folder on a SharePoint site connected to a group for the Group forms.
Also worth noting is that the ability to attach files is not available on the forms that are going to be shared outside of the organization.
This is a really cool feature. Say, you have a training video in MS Stream and want to insert a quiz or feedback survey in the middle of the video. You can easily do that in Stream now, thanks to its integration with MS Forms.
3. Integration with Outlook
You can also embed a quick Form/Poll straight from an Outlook email! Clicking on a Poll button will create a non-editable Form in MS Forms automatically!
4. Anonymous submissions
Sometimes you need to collect feedback without knowing who submitted it. Perhaps you are collecting feedback from training or an event, or lessons learned from a project. Forms allow you to do that too.
Please note that if you opt for File Attachments on your Forms, you will not be able to have anonymous entries on your Form, as it will record the name of the submitter in the Modified By Column in a library/folder where the attachment will be uploaded to.
5. Receive submissions outside of the organization
This one is huge. Previously, before having Forms, we used Lists to collect feedback from the users. However, lists reside in SharePoint sites, and external sharing of a list meant you had to share the site first and have users authenticate – long story short, it was easier and mentally more pleasing to have a proctologist exam than share the list/form externally. With Forms, you can easily generate a link that will work outside of the organization – just a click of a button, really!
6. Sections
If you have a long questionnaire, you might want to separate it into logical sections (pages), so the survey won’t seem overwhelming to those who fill it out. Such functionality is also available as well.
7. Integration with SharePoint pages
Once you create your Form, you can also integrate it with SharePoint quite easily. There is a web part that allows you to embed the survey itself or its results.
8. Branching
You can also build some logic into your Forms. For example, you want users to skip certain questions based on the response to a given question. Forms allow for that as well. Click here for instructions.
9. Integration with Power Automate workflow
You can take your forms to the next level if you also integrate them with Power Automate. This will allow you to submit the form for approval or populate its values in a Custom list, among other capabilities.
10. Multilingual Support
The last of the advanced features of MS Forms I would like to cover is related to the MS Forms multi-language support. You can customize your Form in multiple languages. System fields get translated automatically, while you can provide translation for the fields you manually created as well.
Shared mailboxes in Microsoft 365 can be converted (back) to a user mailbox. This can be necessary when you need to access the mailbox directly (from an application or specific device) or accidentally convert the wrong user mailbox to a shared mailbox. Keep in mind ... Read moreHow to Convert Shared Mailbox to User Mailbox
The variables or compose question is quite an old question in the Power Automate world. The main issue with variables is that inside an apply to each variables lock the processing of items by the Apply to each. This disables the possibility to run the processing in parallel using the Concurrency settings on an apply to each.
And when when I looked at some forum posts the only solution given was to use variables.
As also mentioned in the above community forum post using variables is the only known option. (up to now! Just keep reading). But we want to avoid variable when performance is important and we have a lot of items to process. Make that flow that runs for hours run within seconds!
Avoid variables
A couple of approaches that you could consider:
The function iterationIndex does exist but that only works on Do until loops and not on apply to each loops.
Adding a column to each item you can’t do as there is no other way of counting the items while processing the items
Making it all work!
I’m going to start with a simple flow. In my case I use a Compose action to build an array.
And as I run the flow, I can see the objects in my array:
If I process this array in an apply to each, I will have the starting point of my problem. I will not be able to get to the 1 – 4 number as displayed in the apply to each step:
But how about if I processed the IDs? So I would create an array that just contains the IDs using the range function.
range(0,length(outputs('Compose')))
When I run the above flow I will find a list of numbers. In my case I generated the numbers 0-3. The ID that I want is 1-4. But you will find out shortly why I’m doing this.
In my apply to each I will now take the array of IDs rather than the items that I want to add the ID to.
Notice that the ID is created using the following expression:
Add(items('Apply_to_each_2'),1)
And the item is selected form my array of items with the following line:
outputs('Compose')[items('Apply_to_each_2')]
The arrays start with item 0 hence the list of IDs starting with 0 as well.
And now finally, I could take the list of items using Pieter’s method so that I get a single array with IDs:
When a user leaves the organization you might want to keep the mailbox available so other users can access it. Leaving a user mailbox active requires an Exchange Online license, but when you convert the mailbox to a shared mailbox, a license is not needed. ... Read moreHow to Convert to Shared Mailbox