by Contributed | Oct 6, 2023 | Technology
This article is contributed. See the original author and article here.
We are excited to announce the availability of Azure AI Language Summarization Container! It comes with both Disconnected and Connected options, along with Commitment Tier pricing. Summarization in Azure AI Language provides ready-for-use solutions with task-oriented and -optimized LLM-powered models to summarize documents and conversation transcripts.
All resources are now LIVE and ready for use. Customers interested in the Disconnected container should go through the gating process to get approved.
This release is a significant step toward democratizing Generative AI and Large Language Models, offering key benefits to our customers:
- With disconnected container, customers with high demands for data security and confidentiality are unblocked to bring the value of summarization to scenarios in a fully disconnected secure environment.
- It is ideal for sensitive use cases where data isolation is critical, such as defense, legal, healthcare, financial industries, intelligence agencies.
- Customers have full control over their environment, minimizing data exposure.
- Organizations is empowered to harness the Cloud summarization capabilities in secure and confidential settings.
- With container, both disconnected and connected option, customers will utilize summarization AI now in more regions and countries, beyond what is supported by the Cloud offering today.
- With Commitment Tier pricing, customers will benefit from
- Cost savings based on their commitment level, making it a cost-effective choice for long term usage.
- Predictability in pricing, making budge planning more straightforward
- Flexible commitment tiers, accommodating the specific needs and usage patterns.
These benefits cater to a wide range of customer needs, ensuring that they can choose the option that best aligns their requirements and preferences.
Please find below for more details and resources about the launch:
by Contributed | Oct 5, 2023 | Technology
This article is contributed. See the original author and article here.
Hi, I’m Jaime Gonzales and I lead the Viva People Science R&D team. Our goal is to enrich the Viva journey with the science of employee happiness and success, to deliver exceptional and impactful experiences for humans at work.
As People Science experts, we are consultants, researchers, analysts, content authors, product consultants, and customer advocates with deep expertise in engagement and employee experience. I’ve worked in HR and OD roles for many years and now love sitting in a product team where we have the scale and reach to improve the lives of millions of people at work.
What is People Science?
I’ve always been fascinated with the idea that businesses win or lose based on the strength of their people. The better the connection between the two, the greater likelihood of success. As organizations seek any advantage to overcome strong economic headwinds, I think this notion is more important than ever. Those who prioritize what makes people feel happy, successful, and motivated to do their best work will find a competitive leg up. This is what People Science is all about – finding the intersection between people’s engagement and business performance.
People Science: our definition at Microsoft Viva
Let’s start with how we at Microsoft Viva think about People Science, and what it means for our customers. People Science is a research-backed and people-centric approach to the study and practice of happiness and success at work. It integrates fields of study like industrial-organizational psychology, organizational development, and occupational psychology with increasingly relevant fields like data science, product management, and design to reimagine an employee experience that drives better individual and organizational outcomes.
How Viva People Science creates value
Viva People Science transforms how people and organizations succeed by building new habits and mindsets. We help people bring their best selves to work so that they can do their best work. First, we invest in building a team of intellectually curious People Scientists who can transform themselves and their customers into People Science pros. We produce industry-leading research that challenges conventional HR practices, leveraging our unique data and expertise. We weave this research into our product and marketing outreach to design a human-centric Viva experience that improves employee engagement and ultimately business performance. As a team, we work to continuously evolve our skills, procedures, services, and toolkits to delight more and more customers and make People Science accessible to everyone.
For customers, we offer professional services to deliver connected insights and enable change
in three key ways:
1. We help customers shape and get buy-in on a tailored strategy that measures and improves aspects of their employee experience most related to engagement and business performance.
2. We help customers become People Science pros, elevating them in their roles and ensuring the partnership’s success.
3. We alleviate customer pain points by infusing our product with deep user empathy and our experience as People Scientists.
My colleagues and I will continue to explore the foundations of People Science with you over the coming months through this blog. But in the meantime, take a minute to watch this video that looks at People Science working with Viva Glint customers. I think it captures the essence of People Science at Microsoft.
Interested in how Viva People Science can support your organization’s success? Learn more here.
by Contributed | Oct 4, 2023 | Technology
This article is contributed. See the original author and article here.
In today’s digital age, collaboration platforms like Microsoft Teams have become the norm for businesses to communicate, stay connected, and share information. However, as organizations increasingly rely on these platforms, there has also been a surge in regulatory compliance and business conduct violations that occur on these platforms. Collaboration and messaging apps are one of the top three sources and that’s concerning. Many organizations, particularly financial institutions, healthcare providers, and other regulated industries face significant legal and reputational risks if non-compliant messages are shared during meetings.
Across Microsoft Teams, Outlook, and third-party apps like Instant Bloomberg, Microsoft Purview Communication Compliance provides the tools to help organizations detect regulatory (e.g. SEC or FINRA) and business conduct compliance violations, such as sensitive or confidential information, harassing or threatening language, and sharing of adult content. Built with privacy by design, usernames are pseudonymized by default, role-based access controls are built in, investigators are opted in by an admin, and audit logs are in place to help ensure user-level privacy.
We continue to invest in Communication Compliance and Microsoft Teams integrations to ensure compliant collaboration, including our existing capabilities like the ability to detect regulatory compliance or business conduct violations in a Teams chat, channel, and more.
Live transcription of Microsoft Teams meetings not only makes your meetings more productive and inclusive for participants but they are also official documentation, putting emphasis on detecting potential regulatory and business conduction violations all the more critical. With Teams supporting up to 34 language options for transcription, Communication Compliance is able to detect potential violations in all 34 languages.
This feature is only available for Teams meetings that attendees have opted in to record.
Communication Compliance Investigators with designated role-based access control permissions can then review the policy match in the meeting transcript alongside the video snippet feature that will be rolled out in October.
Additionally, Advanced eDiscovery can collect & review critical metadata associated to Teams meeting recordings and video files in OneDrive and SharePoint, including transcripts/captions, chapters, and custom thumbnails. This metadata can be used to identify the critical data within a Teams meeting more efficiently, especially with the ability to view the transcripts right within the review set.
Figure 1: View of meeting transcript shown alongside video snippet of regulatory compliance violation that occurred
Learn more about detecting communication in Microsoft Teams
Watch our latest video to learn how Microsoft Purview Communication Compliance can help safeguard Microsoft Teams data and ensure communications meet regulatory and business conduct requirements.
Get started
You can get status updates for this and other Communication Compliance features at Microsoft 365 Roadmap | Microsoft Purview Communication Compliance.
We also are happy to share that there is an easier way for you to try Microsoft Purview solutions directly in the Microsoft Purview compliance portal with a free trial (an active Microsoft 365 E3 subscription is required as a prerequisite). By enabling the trial in the compliance portal, you can quickly start using all capabilities of Microsoft Purview, including Insider Risk Management, Communication Compliance, Records Management, Audit, eDiscovery, Information Protection, Data Lifecycle Management, Data Loss Prevention, and Compliance Manager.
Visit your Microsoft Purview compliance portal for more details or check out the Microsoft Purview solutions trial (an active Microsoft 365 E3 subscription is required as a prerequisite).
If you are a current Communication Compliance customer and are interested in learning more about how Communication Compliance can help safeguard sensitive information and detect potential regulatory or business conduct violations, check out the resources available on our “Become a Communication Compliance Ninja” resource page.
Thank you,
Ahmed Mahmood, Senior Product Marketing Manager
Christophe Fiessinger, Principal Product Manager
by Contributed | Oct 3, 2023 | Technology
This article is contributed. See the original author and article here.
The use of SaaS applications has become widespread in businesses of all sizes. With more SaaS apps in use, there are more potential targets for attackers. They frequently exploit centralized user authentication systems targeting unaware users with phishing attacks. Attackers can take advantage of this lack of awareness to trick users into authorizing malicious apps, steal credentials and gain access to multiple services. Attack techniques are getting more sophisticated and frequent exploits of poorly designed of SaaS applications are on the rise.
In this blog, we’ll demonstrate how SOC teams can benefit from App governance and its integration with Advanced Hunting to better secure SaaS apps.
Why use advanced hunting?
Advanced hunting uses a powerful query language called Kusto Query Language (KQL). KQL allows security analysts to create complex queries that can filter, aggregate, and analyze large volumes of data collected from endpoints, such as security events, process data, network activity, and more. However, this can be challenging for new security analysts who may not be familiar with writing queries in KQL. By using the pre-defined KQL queries and app signals collected in Microsoft 365 Defender, security analysts can immediately benefit from hunting capabilities to investigate app alert insights without having to use any KQL.
A real-life example of threat investigation
Let’s investigate a real-life incident triggered by a built-in threat detection policy in App governance. In our case, the “App impersonating a Microsoft logo” alert was triggered. Using our unified XDR platform, Microsoft 365 Defender, a SOC analyst can access all defender alerts in one place via the incidents view. The SOC analyst can filter on status, severity, incident assignment, service sources and other categories. In Figure 1, the Filter Service source = App Governance, Status = New, Severity= High, was applied to help with incident detection and prioritization.
Note: To learn more about App governance built in policies, check out our documentation.

Figure 1. Selecting incidents.
The incident (Figure 1) consists of four alerts that the SOC analyst can review to verify if they are true positives (TP) or false positives (FP) and act accordingly. The SOC analyst can click on the incident and access the attack story (Figure 2), where the alerts can be reviewed in chronological order. They can also view additional information in “What happened” and “Recommended actions” sections which gives the analyst a much better understanding as to why the alert was triggered in the first place with a path forward to remediate.

Figure 2. Reviewing the attack story.
Let’s learn more about the application, by selecting view app details (Figure 3).

Figure 3. Selecting View app details.
Usually, malicious apps will not have any certification or publisher verification because of the app nature community verification would be rare. The combination of all those attributes (highlighted at Figure 4) raise red flags.
Because the app is registered in Azure AD, the SOC team can easily access additional information available in the Azure portal which may help with providing additional context that may help with the incident resolution.

Figure 4. The malicious O365 Outlook Application card, Highlighted red flags and links to Azure AD and App activities in hunting.
In Figure 5, we can see why the machine learning algorithm highlighted the app as malicious, the logo impersonates the original Outlook logo, but the publisher domain does not match the Microsoft domain. The SOC analyst can now follow their company guidelines to disable the app (this can be completed directly in AAD or in App governance app details window – Figure 4)

Figure 5. View of app details in Azure Portal.
Use of Advanced Hunting as part of incident investigation.
After disabling the malicious app, the SOC analyst should investigate further the app activity by selecting, “View app activities” (option highlighted in Figure 4), which will generate the Query 1 also visible in Figure 6. The results visible in Figure 7&8 will include all graph API activities the app preformed on SharePoint Online, Exchange Online, One Drive for Business and Teams workloads.

Figure 6. Advanced hunting query.
Query 1:
// Find all the activities involving the cloud app in last 30 days
let appid = (i : dynamic )
{
case
(
i.Workload == “SharePoint”, i.ApplicationId,
i.Workload == “Exchange”, iff(isempty(i.ClientAppId), i.AppId, i.ClientAppId),
i.Workload == “OneDrive”, i.ApplicationId,
i.Workload == “MicrosoftTeams”, i.AppAccessContext.ClientAppId,
“Unknown”
)
};
CloudAppEvents
| where ((RawEventData.Workload == “SharePoint” or RawEventData.Workload == “OneDrive”) and (ActionType == “FileUploaded” or ActionType == “FileDownloaded”)) or (RawEventData.Workload == “Exchange” and (ActionType == “Send” or ActionType == “MailItemsAccessed”)) or (RawEventData.Workload == “MicrosoftTeams” and (ActionType == “MessagesListed” or ActionType == “MessageRead” or ActionType == “MessagesExported” or ActionType == “MessageSent”))
| extend AppId = appid(RawEventData)
| where AppId == “Paste your app Id“
| where Timestamp between (datetime(“2023-08-08 00:00:00Z”)..30d)
| extend tostring(RawEventData.Id)
| summarize arg_max(Timestamp, *) by RawEventData_Id
| sort by Timestamp desc
| project Timestamp, OAuthApplicationId = AppId, ReportId, AccountId, AccountObjectId, AccountDisplayName, IPAddress, UserAgent, Workload = tostring(RawEventData.Workload), ActionType, SensitivityLabel = tostring(RawEventData.SensitivityLabelId), tostring(RawEventData)
| limit 1000
In the query results, the analyst can see the IP address which could be an indicator of malicious activity, attackers frequently use IP of bad reputation, blacklisted, Tor exit nodes. Analyzing historical data can reveal patterns of malicious behavior associated with specific IP addresses. This can be useful for threat intelligence and proactive threat hunting. The analyst can also see impacted workloads and action types which are crucial for them to understand hacker actions.
By analyzing these actions, security analysts can trace the steps of the attacker to determine the scope of the breach, how the attacker gained access, and what data or systems may have been compromised. MailItemsAccessed action suggests that an unauthorized user or hacker has accessed the contents of one or more email messages within an email account and UpdateInboxRules can be a sign of an attacker attempting to manipulate email traffic by diverting, filtering, or forwarding messages to their advantage.

Figure 7. Advanced hunting query results.
The analyst may want to create a detection rule (option visible on Figure 6) to proactively identify and alert on similar suspicious activities in the future, which is essential for enhancing an organization’s ability to detect and respond to security threats effectively, automate alerts, reduce false positives, and stay ahead of evolving cyber threats. Learn more about custom detections rules and how to create them here.
By selecting one of the records (Figure 8), the SOC analyst can get more information about the impacted user to act accordingly and “stop the bleeding.” They can take immediate action to halt or mitigate the security breach, prevent further access (changing passwords, revoking access privileges or even disabling the compromised account), all result in minimizing the damage. After the bleeding has stopped, the data helps security teams conduct a thorough investigation to determine the root cause of the incident. Understanding how the breach occurred is essential for preventing similar incidents in the future.

Figure 8. Advanced hunting inspected record details.
The app impersonation security incident shows the benefits of app governance machine learning in detecting malicious applications which offers additional layer of protection for your users and organization. The integration of app governance with advanced hunting capabilities provides SOC teams with the tools and insights needed to proactively detect, respond to, and mitigate security threats in SaaS OAuth applications. It allows for a more comprehensive and data-driven approach to SaaS app security, helping organizations protect their critical data and assets.
by Contributed | Oct 2, 2023 | Technology
This article is contributed. See the original author and article here.
Azure Container Apps is now eligible for Azure savings plan for compute! With Azure Container Apps you can build and deploy fully managed, cloud-native apps and microservices using serverless containers. All Azure Container Apps regions and plans are eligible to receive 15% savings (1 year) and 17% savings (3 years) compared to pay-as-you-go when you commit to an Azure savings plan.
Learn about Azure Savings Plan for Compute
The Azure savings plan for compute unlocks lower prices on select compute services when you commit to spend a fixed hourly amount for 1 or 3 years. You choose whether to pay all upfront or monthly at no extra cost. As you use select compute services across the world, your usage is covered by the plan at reduced prices, helping you get more value from your cloud budget. During the times when your usage is above your hourly commitment, you’ll simply be billed at your regular pay-as-you-go prices. With savings automatically applying across compute usage globally, you’ll continue saving even as your usage needs change over time.
Here is an example of how Azure savings plan for compute works. If you buy a 1-year savings plan and commit to $5 USD of spend per hour, Azure automatically applies the savings plan to compute usage globally on an hourly basis up to the example $5 hourly commitment. Hourly Consumption plan vCPU usage for Azure Container Apps in West US would be billed at the lower savings plan price of $0.07344 instead of $0.0864 for active usage as follows:
- Usage at or below $5 USD for the hour is billed at lower savings plan prices and covered by the savings plan hourly commitment. Note that you would pay the $5 USD amount every hour, even if usage is less.
- For usage above $5 USD for any given hour, the first $5 USD of usage is billed at lower savings plan prices and covered by the savings plan hourly commitment. The amount above $5 USD is billed at pay-as-you-go prices and will be added to the invoice separately.
- Azure savings plan for compute is first applied to the product that has the greatest savings plan discount when compared to the equivalent pay-as-you-go rate (see your price list for savings plan pricing). The application prioritization is done to ensure that you receive the maximum benefit from your savings plan investment.

Source: Azure savings plan for compute
Get Started Today
Start saving now and do more with less. Learn more about Azure Container Apps with these resources:
Learn more about Azure savings plan for compute with these resources:
Already taking advantage of Azure Container Apps and the Azure savings plan for compute? Tell us what you think so far in the comments.
Recent Comments