Enable Spatial annotations for your frontline technicians using Dynamics 365 Field Service & Teams

Enable Spatial annotations for your frontline technicians using Dynamics 365 Field Service & Teams

This article is contributed. See the original author and article here.

[Available for iOS only, Android support coming soon]

If you already have a Dynamics 365 Field Service, Dynamics 365 Guides, and/or Dynamics 365 Remote Assist license, you can access the new remote assistance capabilities in your mobile Teams app automatically upon release at no additional cost.

Previously, Remote Assist capabilities required a standalone mobile app or a HoloLens 2 device. Now frontline workers can benefit from using the Spatial Annotations feature inside their Teams mobile app.  

Turn any mobile device into a mixed reality collaboration platform

Today, frontline workers use Teams within the Microsoft Dynamics 365 Remote Assist and Guides applications to collaborate with spatial annotations. The Remote Assist mobile app is a popular choice for workers on the go because it’s fast and easy to get anyone on a call, show the task in front of you, and ink your space.

Now, those same workers can quickly access this core functionality directly from the Teams mobile app as long you have Dynamics 365 Field Service license. For workers who are often on the move, having all their core collaboration capabilities in a single app makes the job easier. It eliminates the need to switch apps, while making sure all your collaboration capabilities from Teams are at your fingertips.

No more context switching—stay within the flow of work 

Using this feature is as straightforward as joining a Teams meeting or making a call. With the front-facing camera, users can share their view with remote participants. This allows real-time collaboration relying on 3D annotations overlayed on physical objects to enhance comprehension.

Just like with the Remote Assist app, users can move and change angles without losing track of annotations anchored to their environment. This advanced level of interaction empowers Teams mobile users to share insights and reduce miscommunications that could lead to rework.

Reduce app sprawl by eliminating the need to manage another app

If your company already leverages Teams to facilitate communication and collaboration, why not make it cover more collaborative use cases for frontline workers too? IT administrators don’t need to manage another app to enable remote assistance capabilities for their mobile workforce. 

Bringing Spatial Annotations to the Teams mobile app means fewer apps for IT teams to provision, update, and audit. Companies can benefit from Teams’ ability to support end-to-end encryption, data loss prevention, and compliance certifications, adding additional security measures protecting against unauthorized access to confidential company information. 

How can I access Spatial Annotations on my mobile Teams app? 

The public preview for iOS users is currently rolling out, with public preview for Android users coming later this summer. General availability will come later in 2024.   

Infusing mixed reality capabilities into apps workers are already using, on devices they already have in their pockets, is just one way we’re working to bring mixed reality to frontline workers. We’re excited with this next step democratizing mixed reality and bringing leading-edge mixed reality solutions to more people across industries. 

Copyright © 2024 Microsoft Corporation. All rights reserved. 

The post Enable Spatial annotations for your frontline technicians using Dynamics 365 Field Service & Teams appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Learn how to customize and optimize Copilot for Security with the custom Data Security plugin

Learn how to customize and optimize Copilot for Security with the custom Data Security plugin

This article is contributed. See the original author and article here.

This is a step-by-step guided walkthrough of how to use the custom Copilot for Security pack for Microsoft Data Security and how it can empower your organization to understand the cyber security risks in a context that allows them to achieve more. By focusing on the information and organizational context to reflect the real impact/value of investments and incidents in cyber. We are working to add this to our native toolset as well, we will update once ready.


 


Prerequisites



  • License requirements for Microsoft Purview Information Protection depend on the scenarios and features you use. To understand your licensing requirements and options for Microsoft Purview Information Protection, see the Information Protection sections from Microsoft 365 guidance for security & compliance and the related PDF download for feature-level licensing requirements. You also need to be licensed for Microsoft Copilot for Security, more information here.

  • Consider setting up Azure AI Search to ingest policy documents, so that they can be part of the process.


 


Step-by-step guided walkthrough


In this guide we will provide high-level steps to get started using the new tooling. We will start by adding the custom plugin.



  1. Go to securitycopilot.microsoft.com

  2. Download the DataSecurityAnalyst.yml file from here.

  3. Select the plugins icon down in the left corner.


JonNordstrm_0-1713791147737.png


 



  1. Under Custom upload, select upload plugin.


JonNordstrm_1-1713791147745.png


 



  1. Select the Copilot for Security plugin and upload the DataSecurityAnalyst.yml file.


JonNordstrm_2-1713791147749.png


 



  1. Click Add

  2. Under Custom you will now see the plug-in


JonNordstrm_3-1713791147750.png


 


 


 The custom package contains the following prompts


 Under DLP you will find this if you type /DLP


 


JonNordstrm_4-1713791147758.png


 


 


Under Sensitive you will find this if you type sensitive


 


JonNordstrm_5-1713791147767.png


 


Let us get started using this together with the Copilot for Security capabilities



Anomalies detection sample


The DLP anomaly is checking data from the past 30 days and inspect on a 30m interval for possible anomalies. Using a timeseries decomposition model.


 


JonNordstrm_0-1713794451225.png


 


The sensitivity content anomaly is using a slightly different model due to the amount of data. It is based on the diffpatterns function that compares week 3,4 with week 1,2.


 


JonNordstrm_1-1713794620074.png


 


Access to sensitive information by compromised accounts.


This example is checking the alerts reported against users with sensitive information that they have accessed.


 


JonNordstrm_2-1713794838205.png


 


Who has accessed a Sensitive e-mail and from where?


We allow for organizations to input message subject or message Id to identify who has opened a message. Note this only works for internal recipients.


 


JonNordstrm_3-1713794932861.png


 


You can also ask the plugin to list any emails classified as Sensitive being accessed from a specific network or affected of a specific CVE.


 


JonNordstrm_10-1713791147801.png


 


Document accessed by possible compromised accounts.


You can use the plugin to check if compromised accounts have been accessing a specific document.


 


JonNordstrm_11-1713791147806.png


 


CVE or proximity to ISP/IPTags


This is a sample where you can check how much sensitive information that is exposed to a CVE as an example. You can pivot this based on ISP as well.


 


JonNordstrm_0-1713795319975.png


 


Tune Exchange DLP policies sample.


If you want to tune your Exchange, Teams, SharePoint, Endpoint or OCR rules and policies you can ask Copilot for Security for suggestions.


 


JonNordstrm_13-1713791147819.png


 


Purview unlabelled operations


How many of the operations in your different departments are unlabelled?  Are any of the departments standing out?


 


JonNordstrm_14-1713791147842.png


 


In this context you can also use Copilot for Security to deliver recommendations and highlight what the benefit of sensitivity labels are bringing.


 


JonNordstrm_15-1713791147861.png


 


 


Applications accessing sensitive content.


What applications have been used to access sensitive content? The plugin supports asking for applications being used to access sensitive content. This can be a fairly long list of applications, you can add filters in the code to filter out common applications.


 


JonNordstrm_16-1713791147868.png


 


If you want to zoom into what type of content a specific application is accessing.


 


JonNordstrm_17-1713791147876.png


 


What type of network connectivity has been made from this application?


 


JonNordstrm_1-1713795957292.png


 


Or what if you get concerned about the process that has been used and want to validate the SHA256?


 


JonNordstrm_19-1713791147887.png


 


 


Hosts that are internet accessible accessing sensitive content


Another threat vector could be that some of your devices are accessible to the Internet and sensitive content is being processed. Check for processing of secrets and other sensitive information.


 


JonNordstrm_2-1713796212776.png


 


 


Promptbooks


Promptbooks are a valuable resource for accomplishing specific security-related tasks. Consider them as a way to practically implement your standard operating procedure (SOP) for certain incidents. By following the SOP, you can identify the various dimensions in an incident in a standardized way and summarize the outcome. For more information on prompt books please see this documentation.


 


Exchange incident sample prompt book


 


JonNordstrm_21-1713791147894.png


 


JonNordstrm_0-1713855135569.png


 


JonNordstrm_1-1713855341307.png


 


Note: The above detail is currently only available using Sentinel, we are working on Defender integration.


 


JonNordstrm_3-1713855588028.png


 


 


JonNordstrm_4-1713855701088.png


 


JonNordstrm_5-1713855792749.png


 


JonNordstrm_6-1713855936122.png


 


SharePoint sample prompt book


JonNordstrm_28-1713791147951.png


 


JonNordstrm_7-1713856107627.png


 


JonNordstrm_8-1713856185445.png


 


JonNordstrm_9-1713856281126.png


 


JonNordstrm_32-1713791147978.png


 


JonNordstrm_10-1713856446267.png


 


JonNordstrm_11-1713856606803.png


 


JonNordstrm_12-1713856723307.png


 


Posts part of this series


Comprehensive coverage and cost-savings with Microsoft Sentinel’s new data tier

Comprehensive coverage and cost-savings with Microsoft Sentinel’s new data tier

This article is contributed. See the original author and article here.

As digital environments grow across platforms and clouds, organizations are faced with the dual challenges of collecting relevant security data to improve protection and optimizing costs of that data to meet budget limitations. Management complexity is also an issue as security teams work with diverse datasets to run on-demand investigations, proactive threat hunting, ad hoc queries and support long-term storage for audit and compliance purposes. Each log type requires specific data management strategies to support those use cases. To address these business needs, customers need a flexible SIEM (Security Information and Event Management) with multiple data tiers.


 


Microsoft is excited to announce the public preview of a new data tier Auxiliary Logs and Summary Rules in Microsoft Sentinel to further increase security coverage for high-volume data at an affordable price.  


 


Auxiliary Logs supports high-volume data sources including network, proxy and firewall logs. Customers can get started today in preview with Auxiliary Logs today at no cost. We will notify users in advance before billing begins at $0.15 per Gb (US East). Initially Auxiliary Logs allow long term storage, however on-demand analysis is limited to the last 30 days.  In addition, queries are on a single table only.  Customers can continue to build custom solutions using Azure Data Explorer however the intention is that Auxiliary Logs cover most of those use-cases over time and are built into Microsoft Sentinel, so they include management capabilities. 


 


Summary Rules further enhance the value of Auxiliary Logs. Summary Rules enable customers to easily aggregate data from Auxiliary Logs into a summary that can be routed to Analytics Logs for access to the full Microsoft Sentinel query feature set. The combination of Auxiliary logs and Summary rules enables security functions such as Indicator of Compromise (IOC) lookups, anomaly detection, and monitoring of unusual traffic patterns. Together, Auxiliary Logs and Summary Rules offer customers greater data flexibility, cost-efficiency, and comprehensive coverage. 


 


Some of the key benefits of Auxiliary Logs and Summary Rules include: 



  • Cost-effective coverage: Auxiliary Logs are ideal for ingesting large volumes of verbose logs at an affordable price-point. When there is a need for advanced security investigations or threat hunting, Summary Rules can aggregate and route Auxiliary Logs data to the Analytics Log tier delivering additional cost-savings and security value.  



  • On-demand analysis: Auxiliary Logs supports 30 days of interactive queries with limited KQL, facilitating access and analysis of crucial security data for threat investigations. 



  • Flexible retention and storage: Auxiliary Logs can be stored for up to 12 years in long-term retention. Access to these logs is available through running a search job. 


 


Microsoft Sentinel’s multi-tier data ingestion and storage options 


Microsoft is committed to providing customers with cost-effective, flexible options to manage their data at scale. Customers can choose from the different log plans in Microsoft Sentinel to meet their business needs. Data can be ingested as Analytics, Basic and Auxiliary Logs. Differentiating what data to ingest and where is crucial. We suggest categorizing security logs into primary and secondary data.  



  • Primary logs (Analytics Logs): Contain data that is of critical security value and are utilized for real-time monitoring, alerts, and analytics. Examples include Endpoint Detection and Response (EDR) logs, authentication logs, audit trails from cloud platforms, Data Loss Prevention (DLP) logs, and threat intelligence.  

    • Primary logs are usually monitored proactively, with scheduled alerts and analytics, to enable effective security detections.  

    • In Microsoft Sentinel, these logs would be directed to Analytics Logs tables to leverage the full Microsoft Sentinel value. 

    • Analytics Logs are available for 90 days to 2 years, with 12 years long-term retention option. 





  • Secondary logs (Auxiliary Logs): Are verbose, low-value logs that contain limited security value but can help draw the full picture of a security incident or breach. They are not frequently used for deep analytics or alerts and are often accessed on-demand for ad-hoc querying, investigations, and search.  

    • These include NetFlow, firewall, and proxy logs, and should be routed to Basic Logs or Auxiliary Logs. 

      • Auxiliary logs are appropriate when using Log Stash, Cribl or similar for data transformation. 

      • In the absence of transformation tools, Basic Logs are recommended.  



    • Both Basic and Auxiliary Logs are available for 30 days, with long-term retention option of up to 12 years. 

    • Additionally, for extensive ML, complex hunting tasks and frequent, extensive long-term retention customers have the choice of ADX. But this adds additional complexity and maintenance overhead. 




Microsoft Sentinel’s native data tiering offers customers the flexibility to ingest, store and analyze all security data to meet their growing business needs.  


 


Use case example: Auxiliary Logs and Summary Rules Coverage for Firewall Logs 


Firewall event logs are a critical network log source for threat hunting and investigations. These logs can reveal abnormally large file transfers, volume and frequency of communication by a host, and port scanning. Firewall logs are also useful as a data source for various unstructured hunting techniques, such as stacking ephemeral ports or grouping and clustering different communication patterns.  


In this scenario, organizations can now easily send all firewall logs to Auxiliary Logs at an affordable price point. In addition, customers can run a Summary Rule that creates scheduled aggregations and route them to the Analytics Logs tier. Analysts can use these aggregations for their day-to-day work and if they need to drill down, they can easily query the relevant records from Auxiliary Logs. Together Auxiliary Logs and Summary Rules help security teams use high volume, verbose logs to meet their security requirements while minimizing costs. 


 


Yael_Bergman_0-1724143656000.png


Figure 1: Ingest high volume, verbose firewall logs into an Auxiliary Logs table. 


 


Yael_Bergman_1-1724143656002.png


Figure 2: Create aggregated datasets on the verbose logs in Auxiliary Logs plan.  


 


Customers are already finding value with Auxiliary Logs and Summary Rules as seen below: 


“The BlueVoyant team enjoyed participating in the private preview for Auxiliary logs and are grateful Microsoft has created new ways to optimize log ingestion with Auxiliary logs. The new features enable us to transform data that is traditionally lower value into more insightful, searchable data.” 


Mona Ghadiri 


Senior Director of Product Management, BlueVoyant 


 


“The Auxiliary Log is a perfect fusion of Basic Log and long-term retention, offering the best of 
both worlds. When combined with Summary Rules, it effectively addresses various use cases for ingesting large volumes of logs into Microsoft Sentinel.” 


Debac Manikandan 


Senior Cybersecurity Engineer, DEFEND 


 


Looking forward 


Microsoft is committed to expanding the scenarios covered by Auxiliary Logs over time, including data transformation and standard tables, improved query performance at scale, billing and more. We are working closely with our customers to collect feedback and will continue to add more functionality. As always, we’d love to hear your thoughts.  


 


Learn more 










 

OneDrive community call | August 2024 | Join in

OneDrive community call | August 2024 | Join in

This article is contributed. See the original author and article here.

Are you ready to connect with OneDrive product makers this month? We’re gearing up for the next call. And a small FYI, we are approaching production a little different: The call broadcasts from the Microsoft Tech Community, within the OneDrive community hub. Same value. Same engagement. New and exciting home.


 


Join the OneDrive product team live each month on our monthly OneDrive Community Call (previously ‘Office Hours’) to hear what’s top of mind, get insights into roadmap updates, and dig into a special topic. Each call includes live Q&A where you’ll have a chance to ask the OneDrive product team any question about OneDrive – The home of your files.


 


:cool: Use this link to register and join live: https://aka.ms/OneDriveCommunityCall. Each call is recorded and made available on demand shortly after. Our next call is Wednesday, August 21st, 2024, 8:00am – 9:00am PDT. This month’s special topic: “Copilot in OneDrive” with @Arjun Tomar, Senior Product Manager on the OneDrive team at Microsoft. “Add to calendar” (.ics file) and share the event page with anyone far and wide.


 


OneDrive Community Call – August 21, 2024, 8am PDT. Special guest, Arjun Tomar, to share more about our special topic this month: “Copilot in OneDrive.”


Our goal is to simplify the way you create and access the files you need, get the information you are looking for, and manage your tasks efficiently. We can’t wait to share, listen, and engage – monthly! Anyone can join this one-hour webinar to ask us questions, share feedback, and learn more about the features we’re releasing soon and our roadmap.


 


Note: Our monthly public calls are not an official support tool. To open support tickets, go to see Get support for Microsoft 365; distinct support for educators and education customers is available, too.


 


Stay up to date on Microsoft OneDrive adoption on adoption.microsoft.com. Join our community to catch all news and insights from the OneDrive community blog. And follow us on Twitter: @OneDrive. Thank you for your interest in making your voice heard and taking your knowledge and depth of OneDrive to the next level.


 


You can ask questions and provide feedback in the event Comments below and we will do our best to address what we can during the call. 
:cool: Register and join live: https://aka.ms/OneDriveCommunityCall 


 


See you there, Irfan Shahdad (Principal Product Manager – OneDrive, Microsoft) 

Generative AI in ERP means more accurate planning across the organization  

Generative AI in ERP means more accurate planning across the organization  

This article is contributed. See the original author and article here.

Enterprise Resource Planning (ERP) is about knowing today the best way to approach tomorrow. It’s about collecting accurate snapshots of various business functions at any point in time, so leaders can make clear, careful decisions that poise the organization to thrive in the future.    

ERP sprang from systems designed to help manufacturers track inventory and raw material procurement. As businesses have become more complex and computing more ubiquitous, ERP platforms have grown into aggregated tech stacks or suites with vertical extensions that track data from supply chain, logistics, asset management, HR, finance, and virtually every aspect of the business. But adding all those facets—and their attendant data streams—to the picture can clutter the frame, hampering the agility of an ERP platform. 

Generative AI helps restore clarity. One of the animating features of AI lies in its ability to process data that lives outside the ERP—all the data an organization can access, in fact—to output efficient, error-free information and insights. AI-enabled ERP systems increase business intelligence by aggregating comprehensive data sets, even data stored in multiple clouds, in seconds, then delivering information from them securely, wherever and whenever they may be needed.  

Today we’ll examine a few of the many ways AI elevates ERP functionality. 

manufacturer working

Transform your business

Perform better with AI-powered ERP.

AI tailored to modern business needs

ERPs began as ways to plan material flow to ensure smooth manufacturing runs. Today’s supply chains remain as vulnerable as ever to price fluctuations, political turmoil, or natural disasters. In many firms, buyers and procurement teams must handle fluctuations and change response in large volumes of purchase orders involving quantities and delivery dates. They frequently have to examine these orders individually and assess risk to plans and downstream processes. 

Now, ERPs can use AI to quickly assess and rank high- and low-impact changes, allowing teams to rapidly take action to address risk. AI-enabled ERPs like Microsoft Dynamics 365 allow users to handle purchase order changes at scale and quickly communicate with internal and external stakeholders.  

Using natural language, an AI-assistant can bring relevant information into communications apps, keeping all parties apprised of, say, unexpected interruptions in supply due to extreme climate events or local market economics—and able to collaborate to find a rapid solution.  

Planners can proactively stress-test supply chains by simply prompting the AI Assistant with “what-if?” scenarios. Risk managers might ask, “If shipping traffic in the Persian Gulf is interrupted, what are our next fastest supply routes for [material] from [country]?” Empowered with AI’s ability to reason over large volumes of data, make connections, and then deliver recommendations in clear natural language, the right ERP system could help provide alternatives for planners to anticipate looming issues and downgrade risk. 

Learn more about Copilot for Microsoft Dynamics 365 Supply Chain Management.

AI enables better project management 

Supply chain may be where ERPs were born, but we’ve come a long way. ERPs now contribute to the run of business across the organization—and AI can make each of these more powerful.  

Whether you call them project managers or not, every organization has people whose job it is to manage projects. The chief obstacles for project managers typically involve completing projects on time and on budget. An AI-enabled ERP can cut the time project managers spend compiling status reports, planning tasks, and running risk assessments.  

Take Microsoft Copilot for Dynamics 365 Project Operations, for instance. With Copilot, creating new project plans—a task that used to take managers hours to research and write—now takes minutes. Managers can type in a simple description of the project, details of the timeline, budget, and staff availability. Then, Copilot generates a plan. Managers can fine-tune as necessary and launch the project. Along the way, Copilot automatically produces real-time status reports in minutes, identifies risks, and suggests mitigation plans—all of which is updated and adjusted on a continuous basis as the project progresses and new data becomes available. 

Learn more about Copilot for Dynamics 365 for Project Operations.

Follow the money: AI streamlines financial processes  

Timely payments, healthy cash flow, accurate credit information, successful collections—all of these functions are important for competitive vigor. All are part of a robust ERP, and all can be optimized by AI.  

At the top of the organization, real-time, comprehensive snapshots of the company’s financial positions enable leadership agility. But at an ongoing, operational level, AI can improve financial assessments for every department as well. By accessing data streams from across the organization—supply chain, HR, sales, accounts payable, service—AI provides financial planners with the ability to make decisions about budgets, operations planning, cash flow forecasting, or workforce provisioning based on more accurate forecasts and outcomes.  

AI can help planners collaboratively align budgets with business strategy and engage predictive analytics to sharpen forecasts. Anywhere within an ERP enhanced visibility is an advantage, AI provides it—and more visibility enables greater agility. AI can, for instance, mine processes to help optimize operations and find anomalies the human eye might fail to catch.  

An AI-enabled ERP system also elevates the business by closing talent gaps across the organization.  

Learn more about Microsoft Dynamics 365 ERP.

The future of smarter: Finding new workflows with generative AI  

These are just a few of the ways AI eases current workflows. The untapped strength of AI in an ERP lies in companies finding new workflows enabled by AI that add value—like predictive maintenance algorithms for machines on a factory floor, or recommendation engines to find new suppliers or partners, or modules that aid in new product design enhanced by customer feedback. 

The future rarely looks simpler than the past. When faced with increasing complexity, a common human adaptation is to compartmentalize, pack information into silos that we can shuffle around in our minds. In a business context, ERP platforms were conceived to integrate those silos with software, so people can manage the individual streams of information the way a conductor brings the pieces of a symphony together, each instrument at the right pitch and volume, in the right time.   

Generative AI helps us to do just that, collecting all the potential inputs and presenting them in a relationship to each other. This frees planners to focus on the big picture and how it all comes together, so we can decide which elements to adjust and where it all goes next.   

Learn more about Microsoft Copilot in Dynamics 365.


Using generative AI responsibly is critical to the continued acceptance of the technology and the maximizing of its potential. Microsoft has recently released its Responsible AI Transparency Report for 2024. This report details the criteria for how we build applications responsibly, decide when to release generative applications, support our customer in building responsibly, and learn, grow, and evolve our generative AI offerings.   

The post Generative AI in ERP means more accurate planning across the organization   appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.