SWIFT Message Pack for BizTalk Server

This article is contributed. See the original author and article here.

I am starting a conversation here for us to stay engaged around SWIFT Message Pack for BizTalk Server.


 


Firstly, the updates for 2020 are available to download at:


https://www.microsoft.com/en-us/download/details.aspx?id=102265


 


In view of the Pandemic, SWIFT reduced the scope of changes applicable this year (from what was initially proposed).


https://www.swift.com/standards/standards-releases/release-highlights#:~:text=In%20recognition%20of%20the%20operational%20stresses%20that%20the,Regulation%20%28CSDR%29%20and%20Shareholder%20Rights%20Directive%20%28SRD%29%20II.


 


Accordingly, we have released a patch that can be installed on top of SWIFT Message Pack 2019 for BizTalk Server.  This is a change from previous years, where the message pack has been a full installation (and not an update/patch).


 


We have also made the code for message pack publicly available on GitHub.


https://github.com/microsoft/Integration/tree/master/BizTalk%20Server/Swift


 


With respect to the annual updates to SWIFT Message Pack, we believe there are 3 categories of the effort:


1) Understanding the changes proposed by SWIFT and incorporating that into schemas and rules


2) Testing the changes


3) Building and distribution of the message pack


 


With all the application knowledge and financial expertise concentrated outside of Microsoft, we request BizTalk community to own and drive the changes to schemas and rules going forward and help each other by reviewing and testing the changes. We will closely work with


all of you throughout and help in driving the builds and distribution of the message pack.


 


We fully understand that this is a CHANGE. Our intension here is to create and help drive a process in the community that can be eternal and is sustained as long as there is a need.


 


Let us embrace this change and we assure you that we will work together to iron out any wrinkles that we encounter. I am starting this discussion so we have ample time to understand each other and converge on something that works and is seamless and without disruption to the updates in 2021 by the time they are due.

Automate Backups from Azure Database for PostgreSQL Server to Azure Storage for Long Term retention

Automate Backups from Azure Database for PostgreSQL Server to Azure Storage for Long Term retention

This article is contributed. See the original author and article here.

You can perform logical backups of your database from Azure Database for PostgreSQL to azure storage accounts for long term retention. These backups can be restored to your on-prem environment or to another PostgreSQL instance on a Virtual Machine.


 


Follow the steps below to extract a backup from Azure Database for PostgreSQL to a Storage Account.


Screenshot 2020-11-09 124525.jpg


In an nutshell, what we will need to do is the following:



  1. Use an existing VM or spin a Linux VM in the same region as the database (we use Ubuntu Server for this example).

  2. Mount your storage account as file share in the VM.

  3. Create a bash script that uses pg_dump to create a backup from your database.

  4. Schedule a task to run this script using crontab and to deallocate the VM when completed.

  5. Schedule the VM to start before the selected backup time using Logic Apps.


Prerequisites:



  1. Blob storage account with a File Share

  2. A Virtual Machine

  3. A Logic Apps instance.


 


Let’s break down each step.


 



  1. Spin up or use an existing Virtual Machine and configure it:



  1. Create a VM from the Azure portal. Refer to this QuickStart guide if needed.

  2. Start a remote session to your VM and install the following required packages:

    sudo apt install postgresql-client-10 # installs PostgreSQL client utilities
    sudo apt install cifs-utils # installs the Common Internet File System utilities
    curl -sL https://aka.ms/InstallAzureCLIDeb | sudo bash # installs Azure CLI


  3. If your PostgreSQL server is version 11 or above, please install the client tools with the following commands:

    sudo apt install wget ca-certificates
    wget --quiet -O - https://www.postgresql.org/media/keys/ACCC4CF8.asc | sudo apt-key add -
    sudo sh -c 'echo "deb http://apt.postgresql.org/pub/repos/apt/ `lsb_release -cs`-pgdg main" >> /etc/apt/sources.list.d/pgdg.list'
    sudo  apt update
    sudo apt-get install postgresql-client-11 #Or the required version above 10






    1.  


     



  1. Mount your storage account as a File Share.


 



  1. Create a File Share in your storage account

    1.  




Screenshot 2020-11-09 124548.jpgScreenshot 2020-11-09 124605.jpg




  1. If needed you can refer to this document on how to create an Azure File Share.



  2. Collect the following details from the Azure Portal: Resource Group, Storage Account Name and File Share Name.

  3. Log into your VM and declare the following variables:

    resourceGroupName="myResourceGroup"
    storageAccountName="myStorageAccount"
    fileShareName="myFileShare"
    mntPath="/home/azureuser/myfolder/"#File share needs to be mounted in the home directory rather than the mnt directory. Otherwise, folder will be deleted after VM deallocation.​


  4. Create a folder where the storage account will be mounted:

    mkdir  /home/azureuser/myfolder​


  5. Login to your Azure subscription from the VM:

    az login​


  6. Check that connection to the storage account through port 445 is possible:

    httpEndpoint=$(az storage account show 
        --resource-group $resourceGroupName 
        --name $storageAccountName 
        --query "primaryEndpoints.file" | tr -d '"')
    smbPath=$(echo $httpEndpoint | cut -c7-$(expr length $httpEndpoint))
    fileHost=$(echo $smbPath | tr -d "/")
     
    nc -zvw3 $fileHost 445​


  7. Storage account credentials are stored in the VM:

    sudo mkdir /etc/smbcredentials
    
    storageAccountKey=$(az storage account keys list 
        --resource-group $resourceGroupName 
        --account-name $storageAccountName 
        --query "[0].value" | tr -d '"')
    
    smbCredentialFile="/etc/smbcredentials/$storageAccountName.cred"
    
    if [ ! -f $smbCredentialFile ]; then
        echo "username=$storageAccountName" | sudo tee $smbCredentialFile > /dev/null
        echo "password=$storageAccountKey" | sudo tee -a $smbCredentialFile > /dev/null
    else 
        echo "The credential file $smbCredentialFile already exists, and was not modified."
    fi​


  8. Change permissions so only root can read and modify the password file:

    sudo chmod 600 $smbCredentialFile​


  9. Append mount point to /etc/fstab:

    httpEndpoint=$(az storage account show 
        --resource-group $resourceGroupName 
        --name $storageAccountName 
        --query "primaryEndpoints.file" | tr -d '"')
    smbPath=$(echo $httpEndpoint | cut -c7-$(expr length $httpEndpoint))$fileShareName
     
    if [ -z "$(grep $smbPath $mntPath /etc/fstab)" ]; then
        echo "$smbPath $mntPath cifs $nofail,vers=3.0,credentials=$smbCredentialFile,serverino,dir_mode=0777,file_mode=0$777" | sudo tee -a /etc/fstab > /dev/null
    else
        echo "/etc/fstab was not modified to avoid conflicting entries as this Azure file share was already present. You may want to double check /etc/fstab to ensure the configuration is as desired."
    fi​


  10. Mount the storage account:

    sudo mount -a​



 


3. Create a bash script that uses pg_dump to create a backup from your database. You can write something like this:


 


 

#!bin/bash
cd /home/azureuser/<folder to mount storage account>/
export PGPASSWORD="password"
date=$(date +%s)
echo $date
pg_dump -Fc -v --host=dbservername.postgres.database.azure.com --dbname=dbname --username=user@dbservername -f dbtest$date.dump
az vm deallocate -g MyResourceGroup -n MyVm #This deallocates the VM after the backup has been saved to the storage account

 


 


 


4. Schedule a task to run this script using crontab and to deallocate the VM when completed.


 

crontab -e

 


 


Screenshot 2020-11-09 124648.jpg


For example, use the following line if you would like to have the backup run every Friday at midnight (VM time zone is UTC):
0 0 * * 5 /home/azureuser/backup_script.sh


 


5. Schedule the VM to start before the selected backup time using Logic Apps.  


Screenshot 2020-11-09 124707.jpg

Topics and Hashtags in Yammer

Topics and Hashtags in Yammer

This article is contributed. See the original author and article here.

Intro


Yammer powers communities, knowledge, and employee engagement in Microsoft 365. At Microsoft Ignite, we shared how Yammer is investing in three areas for knowledge: capturing knowledge with questions and answers, organizing it using topics, and spreading it across the organization with Project Cortex.


 


Today, we are sharing the first updates to our new topics experience—which lays the foundation for future improvements and the greater distinction between topics and hashtags.


 


Topics and Hashtags today


Currently, Yammer has two related features available for categorizing knowledge: topics and hashtags.


Topics are a useful tool to organize, curate, and reference knowledge within and across communities. Anyone can affix a topic to a conversation by using the “Add Topics” option during or after posting. If a topic exists already, it is presented as a suggestion. Topics are metadata that apply to the thread, not individual messages, whereas hashtags are part of the message itself. Clicking a topic takes you to that specific topic’s page.


 


Hashtags are a great way to encourage and promote participation in campaigns and conversations across communities. They also provide a creative way to express yourself. You can include a hashtag in a message by simply adding the ‘#’ symbol before the text. Posting a message with a hashtag automatically adds a topic of the same name to the thread. Clicking a hashtag takes you to the topic page of the same name.


 


What’s changing


While topics and hashtags each have many uses, organizations have been eager for a clearer distinction between the two. The current behavior of automatically adding a topic when posting a hashtag can lead to confusion.


 


Moving forward, we are drawing a sharper distinction between these features so that topics power knowledge curation, management, and referencing while hashtags continue to be used to support campaigns and user expression.


 


This means the following changes in the coming weeks:



  • Topics will no longer include the ‘#’ symbol before the topic making them visually distinct from hashtags. This should make topics in Yammer easier to scan for in a feed, and match how topics look across Microsoft 365. Hashtags will continue to look the same.

  • Posting a hashtag will no longer automatically add a topic to the thread. One can continue to manually add a topic to a thread.

  • Clicking a topic will open the topic page. Clicking a hashtag will initiate a search for all messages that include that hashtag.


But don’t worry — all threads that have been marked with topics will continue to be marked with topics. And all messages that include a hashtag will continue to have that hashtag.


 


YammerHashtags.png


 


Future of topics


We intend for topics to be an excellent tool for organizing, curating, and connecting knowledge across communities in Yammer, and even beyond in Microsoft 365. In the future, you will see these updates to topics in Yammer:



  • Create descriptions for topics that show on the topic page and topic picker

  • Add a filter to topic pages to see all questions marked with the topic

  • See the most used topics within a community

  • Ability to delete topics


 


To make the community knowledge from Yammer broadly accessible and support a cohesive experience across Microsoft 365, Yammer and Project Cortex will be tightly integrated. This means:



  • Topics will mean and refer to the same thing whether in Yammer, Project Cortex and elsewhere across Microsoft 365

  • Project Cortex topic cards will surface when hovering over topics within Yammer

  • Project Cortex topic cards will include content from Yammer such as question and answers, and conversations

  • Project Cortex topic pages will gather content from across Microsoft 365 including Yammer questions and answers, and conversations marked with that topic


Future of hashtags


We will continue to evolve hashtags to support organic expression and internal campaigns as part of larger conversations at the organization.


For more details on topics and hashtags, please see this support article.


 

OneNote on Microsoft Surface Duo, the perfect match!

OneNote on Microsoft Surface Duo, the perfect match!

This article is contributed. See the original author and article here.

Now that Microsoft Surface Duo has been released you can experience it with its ideal companion, OneNote.  The dual screens help make your note-taking experience even better. OneNote helps make working on Surface Duo easy and productive, giving you the power to create notes more effectively than ever before. Read on for an in-depth look at how OneNote on Surface Duo is crafted to optimize your efficiency.

 

App groups

You are likely used to juggling between apps – like OneNote and Teams to take meeting notes or OneNote and Edge to capture something interesting while surfing the internet. OneNote on Surface Duo is here to the rescue! It gives you the power to optimize taking notes using app groups. Check out this article on how to add OneNote to an app group.

 

OneNote as part of App Groups on Surface DuoOneNote as part of App Groups on Surface Duo

 

The power of the dual screen

With Surface Duo you can expand your creativity across two screens, giving OneNote a more flexible experience. You can do things like view your navigation pane on one screen and open a notebook page on the other screen. This enables you to organize your notes or easily reference a note which is on one screen, while you keep working on the other screen. You can also expand your notebook across the dual-screen for easier viewing.

 

Utilize Surface Duo's dual screens for working in OneNoteUtilize Surface Duo’s dual screens for working in OneNote

 

Drag and Drop

With OneNote on Surface Duo, say goodbye to copy and paste! Now you can simply drag and drop content. So when you are browsing your favorite blog on Edge, just drag and drop interesting content on a OneNote page. This helps save you time while you create content rich notes!

 

Drag and drop content right onto a OneNote pageDrag and drop content right onto a OneNote page

 

Inking with Microsoft Surface Pen

If you have a Microsoft Surface Pen, you can draw on the OneNote canvas like never before. It brings all the power and goodness of OneNote for Android to your Surface Duo. With an improved selection of colors and sizes of pens and highlighters, inking is better than ever! The lasso tool enables you to move and resize objects easily. Other tools, like eraser and undo/redo, make editing notes simple.

 

Ink tools in OneNote on Surface DuoInk tools in OneNote on Surface Duo

 

Landscape Mode

You can change the orientation of your screen to optimize your OneNote experience on Surface Duo. Rotate your device for landscape mode to expand OneNote across the two screens. When you are editing in landscape mode, the keyboard occupies one screen, giving you space on the other screen.

 

This was just a glimpse of how we have optimized your OneNote experience on Surface Duo. Surface Duo’s two screens provide an opportunity to organize your notes on the go with the Navigation Pane on the left screen for both Sections and Pages and the Page view on the right screen. Also, it comes with Dark Mode to enable users to use OneNote in any mode they like.

 

We would love to hear from you. Please keep providing your feedback right from the OneNote app or Playstore. We are working hard to keep improving OneNote and make it the place for all your notes. Be sure to join our Tech Community to stay up to date with the latest!

 

 

 

 

 

 

What’s new: Microsoft 365 Defender connector now in Public Preview for Azure Sentinel

What’s new: Microsoft 365 Defender connector now in Public Preview for Azure Sentinel

This article is contributed. See the original author and article here.

This installment is part of a broader series to keep you up to date with the latest features in Azure Sentinel. The installments will be bite-sized to enable you to easily digest the new content.


 


NOTE: Microsoft 365 Defender was formerly known as Microsoft Threat Protection or MTP. Microsoft Defender for Endpoint was formerly known as Microsoft Defender Advanced Threat Protection or MDATP.


 


We’re very pleased to announce that the public preview of the new Microsoft 365 Defender connector is now available, alongside a new Azure Sentinel benefit for Microsoft 365 E5 customers! The M365 Defender connector lets you stream advanced hunting logs – a type of raw event data – from Microsoft 365 Defender into Azure Sentinel. Click here to look at Microsoft documentation page on this connector.


 


With the integration of Microsoft Defender for Endpoint (MDATP) into the Microsoft 365 Defender security umbrella, you can now collect your Microsoft Defender for Endpoint advanced hunting events using the Microsoft 365 Defender connector, and stream them straight into new purpose-built tables in your Azure Sentinel workspace. These tables are built on the same schema that is used in the Microsoft 365 Defender portal, giving you complete access to the full set of advanced hunting logs, and allowing you to do the following:


 



  • Easily copy your existing Microsoft Defender ATP advanced hunting queries into Azure Sentinel.

  • Use the raw event logs to provide additional insights for your alerts, hunting, and investigation, and correlate events with data from additional data sources in Azure Sentinel.

  • Store the logs with increased retention, beyond Microsoft Defender for Endpoint or Microsoft 365 Defender’s default retention of 30 days. You can do so by configuring the retention of your workspace or by configuring per-table retention in Log Analytics.


2020-11-04_11-04-28.png


 


How to enable the Microsoft 365 Defender connector in Azure Sentinel


 


Prerequisites



  • You must have a valid license for Microsoft Defender for Endpoint, as described in Set up Microsoft Defender for Endpoint deployment.

  • Your user must be assigned the Global Administrator role on the tenant (in Azure Active Directory).


 



  1. From the Azure Sentinel navigation menu, select Data connectors.2020-09-07_13-51-38.png

  2. Select Microsoft 365 Defender from the data connectors gallery, and then select Open Connector Page on the preview pane.2020-11-04_11-02-11.png

  3. On the Microsoft 365 Defender connector page, under Connect events and Microsoft Defender for Endpoint tick the boxes for the types of logs you would like to be sent to Azure Sentinel and select Apply Changes.2020-11-04_11-04-28.png


 


And that’s it! You will now have Microsoft Defender for Endpoint logs connected to your Sentinel workspace.


 


 


A new Azure Sentinel benefit for Microsoft 365 E5 customers


 


With this new offer, you can take advantage of end-to-end integrated security and save significant costs when ingesting Microsoft 365 data into Azure Sentinel. From November 1, 2020 through May 1, 2021, Microsoft 365 E5 and Microsoft 365 E5 Security customers can receive a data grant of up to 100 MB per user/month to ingest Microsoft 365 data, including Microsoft 365 advanced hunting data (including Microsoft Defender for Endpoint logs) described in this blog. For more details, please visit the M365 E5 Sentinel benefit website.


 


 


Get started today!


 


Try out the new connector and let us know your feedback using any of the channels listed in the Resources.


 


You can also contribute new connectors, workbooks, analytics and more in Azure Sentinel. Get started now by joining the Azure Sentinel Threat Hunters GitHub community!