Community Update – Introducing the Microsoft Azure Data Community Advisory Board

This article is contributed. See the original author and article here.

Earlier this year, Microsoft launched our Azure Data Community initiative, with assets such as a landing page for the community, a support network for local Community Groups, and Microsoft Teams subscriptions for Community Group leaders. We are following through on our commitment that community should be “Community-Owned, Microsoft-Empowered”.


 


To drive this initiative, we’ve chosen various recognized Community experts from all over the globe to act as an advisory board to Microsoft on community needs. The current members of the Azure Data Advisory Board are Annette Allen, Steve Jones, Wolfgang Strasser, Tillmann Eitelberg, Randolph West, Kevin Kline, Gaston Cruz, Pio Balistoy and Monica Rathbun.


 


These technical professionals are well known for their commitment to the community, getting things done, and being problem solvers.  They are speakers, leaders, organizers, advocates and represent user groups and conferences of all shapes and sizes.  We’re asking them to advise Microsoft on what the data community needs and how we can help.  


 


Since these folks can’t do this job alone, they’ll be tasked with selecting and establishing a larger, diverse advisory committee to collaborate.  Together they’ll decide the guide lines for the board and committee, such as who should be on the advisory board, when to step down from the role, how a replacement is selected, how often they meet, and other general logistics.


 


But it isn’t all just advising.  There’s work to do.  These folks will be among the first people and groups onboarded to the Community Teams Tenant.  They will be pairing up with other groups to help them onboard and to speed up the roll out, just as other user groups will be asked to do the same.  This is a community driven effort.  And Microsoft is listening.  Make sure you reach out to them with ideas, especially if you are a local Community Group leader.


 


This group isn’t advising the Azure Data Community – that’s something the community itself should decide on. We will be holding an Azure Data Community group leaders meeting soon on the Teams channel to discuss community and share best practices with each other. We’re looking forward to seeing the amazing things you do and how you help each other learn and grow.


 

 

 

 

 

The March 12th Weekly Roundup is Posted!

This article is contributed. See the original author and article here.

Pssst! You may notice the Round Up looks different – we’re rolling out a new, concise way to show you what’s been going on in the Tech Community week by week.


 


Top 10 Blogs & Conversations this Week:



  1. Released: March 2021 Exchange Server Security Updates

  2. What’s New in Microsoft Teams | Microsoft Ignite 2021

  3. Microsoft 365 apps say farewell to Internet Explorer 11 and Windows 10 sunsets Microsoft Edge Legacy

  4. Enhanced performance, designed for simplicity – the new Outlook for Mac

  5. Why can’t I see the Microsoft Teams Meeting add-in for Outlook?

  6. Microsoft Teams is now available on Linux



  7.  


  8. Windows 10, version 1909 delivery options

  9. Startup Boost FAQ

  10. Released: December 2020 Quarterly Exchange Updates


Catch up on all blogs here!


 


Important Events:


·       Mar 16th – Microsoft App Assure

Exploring Purview’s REST API with Python

Exploring Purview’s REST API with Python

This article is contributed. See the original author and article here.

Use Spark (Scala) to write data from ADLS to Synapse Dedicated Pool

Use Spark (Scala) to write data from ADLS to Synapse Dedicated Pool

This article is contributed. See the original author and article here.

 


In this article, I would be talking about how can we write data from ADLS to Azure Synapse dedicated pool using AAD . We will be looking at direct sample code that can help us achieve that.


 


1. First step would be to import the libraries for Synapse connector. This is an optional statement.


 


  Mukund_Bhashkar_0-1615791313561.png


2. Next step is to initialize variable to create/read data frames


   Mukund_Bhashkar_1-1615791313568.png


Note : Above step can also be written in below format :


 



//val df = spark.read.csv(“abfss://synapse@mukund.dfs.core.windows.net/100SalesRecords.csv”)


 


3. Next step would be to use the write api in below format :


 


Mukund_Bhashkar_3-1615791313576.png


Execute the cell and you will be able to see the new table with data popped up:


Mukund_Bhashkar_4-1615791484065.png


Observation in Driver log with this exercise:


 


Mukund_Bhashkar_5-1615791509190.png


We find external data source, file format and external table created as well as dropped during this automated process.


 


More information about other options for dedicated pool and server less related read/write API’s in SPARK can be found out on this page.


 

App protection policy conditional launch improvements

App protection policy conditional launch improvements

This article is contributed. See the original author and article here.

As mobile usage becomes more prevalent in your organizations, so does the need to protect against data leaks. App protection policies (APP, also known as MAM) help protect work or school account data through data protection, access requirements, and conditional launch settings. For more information, see App protection policies overview


 


Conditional launch settings validate aspects of the app and device prior to allowing the user to access work or school account data, or if necessary, remove the work or school account data. Based on your feedback, we’ve updated an existing conditional launch setting, and are introducing four new management settings.


 


Jailbroken/rooted devices


Status: Jailbroken/rooted devices conditional launch setting was updated in February 2021 and works with both iOS and Android Microsoft apps.


 


To improve the overall security of devices accessing work or school account data using apps with App Protection Policies, the Jailbroken/rooted devices conditional launch setting can no longer be deleted and defaults to block access. Organizations now only have two options for jailbroken or rooted devices:



  • Block access – When the Intune SDK has detected the device is jailbroken or rooted, the app blocks access to work or school data.

  • Wipe data – When the Intune SDK has detected the device is jailbroken or rooted, the app will perform a selective wipe of the users’ work or school account and data.


For organizations that had previously removed the Jailbroken/rooted devices conditional launch setting, this is now enforced in the Intune SDK automatically. If users had been using a jailbroken or rooted device prior to this change, those devices would be blocked.


 


Disabled account


Status: The Disabled account conditional launch setting was released in Q4 2020 and works with both iOS and Android Microsoft apps.


 


When a user account is disabled in Azure Active Directory (Azure AD), customers have an expectation that work or school account data being managed by an APP is removed. Prior to this conditional launch setting, customers had to rely on the Offline grace period timer to remove the data after the token expired.


 


The Disabled account conditional launch setting works by having the Intune SDK check the state of the user account in Azure Active Directory when the app cannot acquire a new token for the user. If the account is disabled, then the Intune SDK will perform the following based on the policy configuration:



  • Block access – When Intune has confirmed the user has been disabled in Azure Active Directory, the app blocks access to work or school data.

  • Wipe data – When Intune has confirmed the user has been disabled in Azure Active Directory, the app will perform a selective wipe of the users’ work or school account and data.


If Disabled account is not configured, then no action is taken. The user continues to access the data in an offline manner until the Offline grace period wipe timer has expired with data access being wiped after 90 days (assuming default settings).


 


Important: The Disabled account setting does not detect account deletions. If an account is deleted, the user continues to access data in an offline manner until the Offline Grace Period wipe timer has expired.


 


The time taken between disabling an Azure Active Directory user account and the Intune SDK wiping the data varies. There are several components that impact the time to initiate the data wipe:


 


[Max time to wipe] = [Azure AD connect sync time] + [APP access token lifetime] + [APP check-in time]



  1. Azure AD Connect sync defaults to 30 minutes. See Azure AD Connect sync: Scheduler for more information.

  2. Azure AD access token for the APP service is hard coded to 120 minutes.

  3. Intune APP check-in time is hard coded to 30 minutes. For more information, see Understand App Protection Policy delivery timing


The selective wipe will be executed the next time that the app is active after the max time to wipe has passed.


 


Max OS version


Status: The Max OS version conditional launch is supported with the March 2021 (Company Portal version 5.0.5084.0) release for Android Microsoft apps and the Intune SDK will be available for consumption by iOS Microsoft apps in April 2021.


 


The Max OS version conditional launch setting operates like the Min OS version setting. When the app launches, the operating system version is checked. The primary use case for the Max OS version conditional launch setting is to ensure that users don’t use unsupported operating system versions to access work or school account data. An unsupported version could be beta versions of next generation operating systems, or versions that you have not tested.


 


If the operating system version is greater than the value specified in the Max OS version, then the Intune SDK will perform the following based on the policy configuration:



  • Warn – The user sees a dismissible notification if the operating system version on the device doesn’t meet the requirement.

  • Block access – The user is blocked from accessing work or school account data if the operating system version on the device doesn’t meet the requirement.

  • Wipe data – The app performs a selective wipe of the users’ work or school account and data if the operating system version doesn’t meet the requirement.


Figure 1: Access is blocked due to OS versionFigure 1: Access is blocked due to OS version


Require device lock


Status: The Require device lock Android conditional launch setting was released in January 2021 and works with Android Microsoft apps.


 


The Require device lock conditional launch setting determines if the Android device has a device PIN, password, or pattern set. It cannot distinguish between the lock options or complexity, for that, device enrollment is required. If the device lock is not enabled on the device, then the Intune SDK will perform the following based on the policy configuration:



  • Warn – The user sees a dismissible notification if the device lock is not enabled.

  • Block access – The user is blocked from accessing work or school account data if the device lock is not enabled.

  • Wipe data – The app performs a selective wipe of the users’ work or school account and data if the device lock is not enabled.


Figure 2: Access is blocked until device lock is enabledFigure 2: Access is blocked until device lock is enabled


With this conditional launch setting, there is parity both mobile operating system platforms whereby app protection policies can enforce a device PIN (on iOS, device lock is required when encryption is required) on devices that are not enrolled.


 


SafetyNet Hardware Backed Attestation


Status: The SafetyNet hardware backed attestation conditional launch setting for Android will be supported in Q2 2021.


 


App protection policies provide the capability for admins to require end-user devices to pass Google’s SafetyNet Attestation for Android devices. Administrators can validate the integrity of the device (which blocks rooted devices, emulators, virtual devices, and tampered devices), as well as require that unmodified devices that have been certified by Google. Within APP, this is configured by setting SafetyNet device attestation to either Check basic integrity or Check basic integrity & certified devices.


 


Hardware backed attestation enhances the existing SafetyNet attestation service check by leveraging a new evaluation type called Hardware Backed, providing a more robust root detection in response to newer types of rooting tools and methods, such as Magisk, that cannot always be reliably detected by a software only solution. Within APP, hardware attestation will be enabled by setting Required SafetyNet evaluation type to Hardware-backed key once SafetyNet device attestation is configured.


 


As its name implies, hardware backed attestation leverages a hardware-based component which shipped with devices installed with Android 8.1 and later. Devices that were upgraded from an older version of Android to Android 8.1 are unlikely to have the hardware-based components necessary for hardware backed attestation. While this setting should be widely supported starting with devices that shipped with Android 8.1, Microsoft strongly recommends testing devices individually before enabling this policy setting broadly.


 


Important: Devices that do not support this evaluation type will be blocked or wiped based on the SafetyNet device attestation action. Organizations wishing to use this functionality will need to ensure users have supported devices. For more information on Google’s recommended devices, see Android Enterprise Recommended requirements.


 


If the device fails the attestation query, then the Intune SDK will perform the following based on the policy configuration:



  • Warn – The user sees a dismissible notification if the device does not meet Google’s SafetyNet Attestation scan based on the value configured.

  • Block access – The user is blocked from accessing work or school account data if the device does not meet Google’s SafetyNet Attestation scan based on the value configured.

  • Wipe data – The app performs a selective wipe of the users’ work or school account and data.


Figure 3: Access is blocked with a rooted deviceFigure 3: Access is blocked with a rooted device


We hope you find these enhancements to our Conditional launch capabilities useful. The Data Protection Framework has been updated for the settings that have been released and changes will be introduced as the new settings are released in the future.


 


Ross Smith IV
Principal Program Manager
Customer Experience Engineering