Enable the Dynamics 365 Sales Preview mobile app in Advanced Settings

Enable the Dynamics 365 Sales Preview mobile app in Advanced Settings

This article is contributed. See the original author and article here.

Although it may seem counter-intuitive, now that many people are working from home at least some of the time, having a streamlined mobile app for your sales team has become critically important. Whether they’re in the office, in their car, or just moving around their houses, sellers need to stay on top of their deals and get daily sales tasks done quickly. Being able to get work done on a phone is a huge time-saver.

The new Dynamics 365 Sales mobile app, now available for preview, is optimized to help your sales team stay productive wherever they’re working. The key capabilities of the mobile app enable sellers to prepare for customer engagements, log and share information quickly, and find the information they need.

Phone screens for Dynamics 365 Sales mobile app

Mobile app highlights

The Sales mobile app helps your sales team:

  • Prepare for customer engagements. As a seller prepares for a meeting, they see the meeting details, attendees, and their responses from Outlook along with the related data for which the appointment is tracked, such as opportunity title, estimated revenue, estimated closed date, pipeline phase, notes, and AI-generated reminders.
  • Log and share information using native device capabilities and simplified forms. Details can be captured in notes using the device’s keyboard or voice-to-text capabilities, and can include attachments and images taken with the device’s camera. To streamline updating information, sellers use a lightweight, customizable form that allows them to edit the most important fields. Or if sellers need more info, they can access the full record with a single tap.
  • Find and interact with sales data from an optimized home screen and with relevance search. The home page is optimized to display upcoming meetings and recently viewed records. Additionally, with relevance search, sellers can find the info they need, faster and more efficiently.

Get your sales organization started

The Dynamics 365 Sales Preview mobile app is available for public preview. Before sellers can use the app, admins need to take the following steps for their organization:

graphical user interface, application, Teams

  • Enable relevance search in the Power Platform admin center. Enabling relevance search is required for your sales team to use the mobile app and will also be available to all members of your organization.
  • After you’ve enabled the mobile app and relevance search, let your sellers know they can install and start using the Dynamics 365 Sales mobile app.

Next steps and continued learning

To learn more about the Dynamics 365 Sales mobile app:

We’d like to hear your feedback, please share your ideas.

The post Enable the Dynamics 365 Sales Preview mobile app in Advanced Settings appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Stimulus payments for people, not nursing homes

Stimulus payments for people, not nursing homes

This article was originally posted by the FTC. See the original article here.

If you, or someone you care about, lives in an assisted living facility or nursing home, read on. Because the bill funding the second round of Economic Impact Payments (EIPs) has now been signed into law. The money — right now, $600 per person who qualifies — will be sent out over the next few weeks. And, like last time, the money is meant for the PERSON, not the place they might live.

In the first round, which I’ll call EIP 1.0, we know that some nursing facilities tried to take the stimulus payments intended for their residents…particularly those on Medicaid. Which wasn’t, shall we say, legal, and kept some attorneys general busy recovering those funds for people.

Now, with EIP 2.0, we would hope those facilities have learned their lesson. But, just in case, let’s be clear: If you qualify for a payment, it’s yours to keep. If a loved one qualifies and lives in a nursing home or assisted living facility, it’s theirs to keep. The facility may not put their hands on it, or require somebody to sign it over to them. Even if that somebody is on Medicaid.

It would be worth a quick chat with management of the facility in question, just to remind them that the rules are the same this time through. And if you hear about a nursing home or assisted living facility being grabby about Economic Impact Payments, tell your state attorney general right away. And then tell the FTC at www.ReportFraud.ftc.gov.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Released: SSRS and SSAS Management Packs (7.0.29.0)

This article is contributed. See the original author and article here.

There is a new release of SQL Server Analysis and Reporting Services Management Packs (7.0.29.0). These management packs can be used to monitor SQL Server Analysis Services and SQL Server Reporting Services versions 2012 and up as well as Power BI Report Server.


 


Please download at:


Microsoft System Center Management Pack for SQL Server Analysis Services


Microsoft System Center Management Pack for SQL Server Reporting Services


 


 


SSAS MP Changelog



  • Improved performance of partition discovery for multidimensional databases

  • Updated and improved SCOM 2019 HTML Dashboards to represent SSAS objects


 


SSRS MP Changelog



  • Updated and improved SCOM 2019 HTML Dashboards to represent SSRS objects

  • Updated alert description of Report Manager Accessible & Web Service Accessible monitors

Azure Sentinel: Using rule templates

Azure Sentinel: Using rule templates

This article is contributed. See the original author and article here.

Microsoft’s Azure Sentinel, our Security Incident and Event Management (SIEM) solution, enables you to connect activity data from different sources into a shared workspace. That data ingestion is just the first step in the process though. The power comes from what you can now do with that data, including investigating incident alerts, building your own dashboards with workbooks, responding to threats with security playbooks and hunting for security threats.


 


Let’s take a look at some of the built-in rule templates that you can activate, to query and alert on that data.


 


Built-in rule templates
Your active rules and the list of available rule templates can be found in Azure Sentinel under ConfigurationAnalytics:


Azure Sentinel Analytics menuAzure Sentinel Analytics menu


The rule templates are published by Microsoft and are updated and added to as new events and threats are detected, classified as low, medium or high severity. There are currently just under 200 rule templates covering 38 different data sources, both from Microsoft and third parties.


 


Some of the rule templates in Azure SentinelSome of the rule templates in Azure Sentinel


 


Examples


There are rule templates to create incidents in Azure Sentinel based on alerts from Azure Security Center, Office 365 Advanced Threat Protection (Preview) and Microsoft Defender Advanced Threat Protection. This helps you build one place to manage and investigate threats across different Microsoft products.


 


There are individual rules for Microsoft and non-Microsoft products:













































High First access credential added to Application or Service Principal where no credential was present Azure Active Directory
Medium Rare application consent  Azure Active Directory
Medium Full Admin policy created and then attached to Roles, Users or Groups Amazon Web Services
Low Changes to AWS Security Group ingress and egress settings Amazon Web Services
Medium Known Malware Detected VMWare Carbon Black Endpoint Standard (preview)
Medium Port scan detected Sophos XG Firewall (preview)
Medium New internet-exposed SSH endpoints Syslog
Low Request for single resource on domain Zscaler

 


There are also rules that combine more than one product, linking events that could indicate a possible incident: 















High Anomalous login followed by Teams action Office 365 + Azure Active Directory
High Multiple password reset by user Azure Active Directory + Security Events + Syslog + Office 365

 


And there are rules that detect a known threat from different data sources:















High Known IRIDIUM IP Office 365, DNS (preview), Cisco ASA, Palo Alto Networks, Security Events, Azure Active Directory, Azure Activity, Amazon Web Services
High THALLIUM domains included in DCU takedown DNS (preview), Cisco ASA, Palo Alto Networks

 


Anatomy of a rule template
As well as a severity and a list of the data source/s for this rule, a description tells you why this rule is important and may give you links to other relevant information.


 


Azure Sentinel rule template descriptionAzure Sentinel rule template description


 


The rule type can be:
Microsoft Security – these rules automatically create Azure Sentinel incidents from alerts generated in other Microsoft security products, in real time.
Scheduled – these run periodically based on the settings you configure and allow you to alter the query logic.
ML Behaviour Analytics – these are based on proprietary Microsoft machine learning algorithms, so you can’t see of change the query logic.
Fusion – this detects multistage attacks by identifying combinations of anomalous behaviors and suspicious activities observed at various stages of the kill chain. By design, these incidents are low-volume, high-fidelity, and high-severity, which is why this detection is turned ON by default. For more information on Fusion incident types, visit Advanced multistage attack detection in Azure Sentinel. 


The tactics icons show what kind of threat this rule is related to:
Credential access, command and control, initial access, impact, defence evasion, collection, persistence, lateral movement, privilege escalation.


 


You can also see the details of the rule query, written in Kusto Query Language (KQL).


Azure Sentinel-Rule query.PNG


 


Scheduled rules have a frequency, a rule period and a rule threshold, and may allow event grouping, suppression, the creation of incidents from this alert and alert grouping.


Rule template settings for a scheduled ruleRule template settings for a scheduled rule


 


Creating a rule from a rule template
To turn a rule template into an active rule for your environment, you just select the Create rule button. With the wizard, you can then customize any rule settings or the rule logic itself (if appropriate) and you will be warned if you don’t have the required data sources connected.


 


Choosing your rules


Azure Sentinel gives you a very powerful security capability, but it’s up to you to decide how to apply it to your organization. The built-in rule templates are a great start, or you may also choose to build your own queries. Take a look at the data sources across your environment and what security incident and event monitoring tools and processes you already have in place. What in particular do you need to monitor – network attacks? logins of administrative accounts? events from different systems that may be related?


 


In addition, the Azure security baseline for Azure Sentinel takes guidance from the Azure Security Benchmark‘s security controls.   


 


 


Learn more:


MS Learn – Cloud-native security operations with Azure Sentinel


Docs – Tutorial: Detect threats out of the box


Docs – Tutorial: Create custom analytics rules to detect threats


Docs – Extend Azure Sentinel across workspaces and tenants


 


 


 


 


 

Certificate rotation Azure Service Fabric Standalone cluster

Certificate rotation Azure Service Fabric Standalone cluster

This article is contributed. See the original author and article here.

To keep Service Fabric cluster running the old certificate are needed to be replaced with new certificates the below steps can help you rotate the old certificate with new certificates. This article assumes you are running cluster with thumbprint approach. In general the common name approach is recommended for easy certificate management. More information about certificate on Standalone cluster refer to Secure a cluster on Windows by using certificates – Azure Service Fabric | Microsoft Docs


Service Fabric with certificates that aren’t expired (cluster running with near expiry or non-expired certificates) 


Important Note: Before you change below config, you should install all certificate on all nodes i.e. New certificate should be present and acled to Network Service before you start this operation on all nodes.


 


1. Open the Clusterconfig.json file for editing, and find the following section. If a secondary thumbprint is defined, you need to clean up old Service Fabric certificates before you go any further. i.e. trigger an upgrade to remove secondary certificate section first.  


 

"security": {
    "metadata":  "The Credential type X509 indicates this cluster is secured using X509 Certificates. 
    The thumbprint format is - d5 ec 42 3b 79 cb e5 07 fd 83 59 3c 56 b9 d5 31 24 25 42 64.",
    "ClusterCredentialType":  "X509",
    "ServerCredentialType":  "X509",
    "CertificateInformation":  {
        "ClusterCertificate":  {
                                   "X509StoreName":  "My",
                                    "Thumbprint": "*Old server thumbprint(Star/SF)*"
                               },
        "ServerCertificate":   {
                                    "X509StoreName":  "My",
 									"Thumbprint": "*Old server thumbprint(Star/SF)*"
                               },
        "ClientCertificateThumbprints":  [
                                   {
                                        "CertificateThumbprint": "*Old client thumbprint*",
                                        "IsAdmin":  true
                                   }
                                         ]
                               }
            },

 


     


2.  Replace that section in the file with following section.


 


 

"security":  {
    "metadata":  "The Credential type X509 indicates this cluster is secured using X509 Certificates. 
    The thumbprint format is - d5 ec 42 3b 79 cb e5 07 fd 83 59 3c 56 b9 d5 31 24 25 42 64.",
    "ClusterCredentialType":  "X509",
    "ServerCredentialType":  "X509",
    "CertificateInformation":  {
        "ClusterCertificate":  {
                                   "X509StoreName":  "My",
                                    "Thumbprint": "*New server thumbprint(Star/SF)*",
                                    "ThumbprintSecondary": "Old server thumbprint(Star/SF)"
                               },
        "ServerCertificate":   {
                                    "X509StoreName":  "My",
 									"Thumbprint": "*New server thumbprint(Star/SF)*",
                                    "ThumbprintSecondary": "Old server thumbprint(Star/SF)"
                               },
        "ClientCertificateThumbprints":  [
                                   {
                                        "CertificateThumbprint": "*Old client thumbprint*",
                                        "IsAdmin":  false
                                   },
                                   {
                                        "CertificateThumbprint": "*New client thumbprint*",
                                        "IsAdmin":  true
                                   }
                                         ]
                               }
            },

 


 


3. Edit the new and old thumbprint values.

4. Change clusterConfigurationVersion to the new version, for example 2.0.0.

{
"name": "myclustername",
"clusterConfigurationVersion": "2.0.0",

5. Save the new ClusterConfig.json file.


6. Run the following PowerShell command. 

# Connect to the Service Fabric cluster
Connect-ServiceFabricCluster

# Get path of ClusterConfig.json for following command
# Note that after running the following command, you need to manually cancel using the red button (Stop Operation) in Windows PowerShell ISE or Ctrl+C in Windows PowerShell, otherwise you will receive the following notification, "Start-ServiceFabricClusterConfigurationUpgrade : Operation timed out.". Be aware that the upgrade will proceed.
Start-ServiceFabricClusterConfigurationUpgrade -ClusterConfigPath ClusterConfig.json

# To monitor the status of the upgrade, run the following 
Get-ServiceFabricClusterUpgrade

 

Clean up steps: 


Once above upgrade have been completed you have to trigger another upgrade to remove the old thumbprint which is secondary now. Post this cluster is ready to use. Remove the old/secondary thumbprints from the cluster configuration. After you’ve removed them, the appropriate section should resemble the following example.


rototatefinal.PNG