#M365GovCommunityCall November 2021: Teach a Govie to Fish (through MSFT updates)

This article is contributed. See the original author and article here.

 


https://www.youtube-nocookie.com/embed/hsNc_QjYwfw


 


At the beginning of November, Microsoft had their second Ignite of the year, announcing or further clarifying details around many of the latest and near-immediate future features expected to rollout to Microsoft 365. However, as many of the US Federal cloud tenants see features months (if not longer) after they hit the commercial tenant, these users are often left wondering “what’s next for us” instead of having the same excitement commercial tenant owners have coming out of these conferences.


 


In this episode, we meet with Microsoft architect John Moh (LinkedIn) to discuss our favorite ways to stay up to date on what’s available to us in the GCC, GCC-H, and DOD tenants!


Government Community Events



In the News



Roadmap Update



Today’s Discussion






Today’s Panelists


 


Today’s panelists can be found on Twitter if you want to connect with them further!


 






 

Get started with minimal API for .NET 6

This article is contributed. See the original author and article here.

TLDR; Using minimal API, you can create a Web API in just 4 lines of code by leveraging new features like top-level statements and more.



 Why Minimal API


There are many reasons for wanting to create an API in a few lines of code:



  • Create a prototype. Sometimes you want a quick result, a prototype, something to discuss with your colleagues. Having something up and running quickly enables you to quickly do changes to it until you get what you want.

  • Progressive enhancement. You might not want all the “bells and whistles” to start with but you may need them over time. Minimal API makes it easy to gradually add what you need, when you need it.


How is it different from a normal Web API?


There are a few differences:



  • Less files. Startup.cs isn’t there anymore, only Program.cs remains.

  • Top level statements and implicit global usings. Because it’s using top level statements, using and namespace are gone as well, so this code:


 

 using System;
   namespace Application
   {
        class Program
        {
            static void Main(string[] args)
            {
                Console.WriteLine("Hello World!");
            }
        }
   }

 


 

is now this code:


 

 Console.WriteLine("Hello World!");

 


 


  • Routes Your routes aren’t mapped to controller classes but rather setup with a Map[VERB] function, like you see above with MapGet() which takes a route and a function to invoke when said route is hit.


 Your first API


To get started with minimal API, you need to make sure that .NET 6 is installed and then you can scaffold an API via the command line, like so:


 

dotnet new web -o MyApi -f net6.0

 


 

Once you run that, you get a folder MyApi with your API in it.


What you get is the following code in Program.cs:


 

var builder = WebApplication.CreateBuilder(args);
var app = builder.Build();

if (app.Environment.IsDevelopment())
{
    app.UseDeveloperExceptionPage();
}

app.MapGet("/", () => "Hello World!");

app.Run();

 


 

To run it, type dotnet run. A little difference here with the port is that it assumes random ports in a range rather than 5000/5001 that you may be used to. You can however configure the ports as needed. Learn more on this docs page


 Explaining the parts


Ok so you have a minimal API, what’s going on with the code?


 Creating a builder


 

var builder = WebApplication.CreateBuilder(args);

 


 

On the first line you create a builder instance. builder has a Services property on it, so you can add capabilities on it like Swagger Cors, Entity Framework and more. Here’s an example where you set up Swagger capabilities (this needs install of the Swashbuckle NuGet to work though):


 

builder.Services.AddEndpointsApiExplorer();
builder.Services.AddSwaggerGen(c =>
    {
        c.SwaggerDoc("v1", new OpenApiInfo { Title = "Todo API", Description = "Keep track of your tasks", Version = "v1" });
    });

 


Creating the app instance


Here’s the next line:


 

var app = builder.Build();

 


 

Here we create an app instance. Via the app instance, we can do things like:



  • Starting the app, app.Run()

  • Configuring routes, app.MapGet()

  • Configure middleware, app.UseSwagger()


Defining the routes


With the following code, a route and route handler is configured:


 

app.MapGet("/", () => "Hello World!");

 


The method MapGet() sets up a new route and takes the route “/” and a route handler, a function as the second argument () => “Hello World!”.


Starting the app


To start the app, and have it serve requests, the last thing you do is call Run() on the app instance like so:


 

app.Run();

 


 Add routes


To add an additional route, we can type like so:


 

public record Pizza(int Id, string Name); 
app.MapGet("/pizza", () => new Pizza(1, "Margherita"));

 


 

Now you have code that looks like so:


 

var builder = WebApplication.CreateBuilder(args);
var app = builder.Build();

if (app.Environment.IsDevelopment())
{
    app.UseDeveloperExceptionPage();
}

app.MapGet("/pizza", () => new Pizza(1, "Margherita"));
app.MapGet("/", () => "Hello World!");

public record Pizza(int Id, string Name); 

app.Run();

 


 

Where you to run this code, with dotnet run and navigate to /pizza you would get a JSON response:


 

{
  "pizza" : {
    "id" : 1,
    "name" : "Margherita"
  }
}

 


 

Example app


Let’s take all our learnings so far and put that into an app that supports GET and POST and lets also show easily you can use query parameters:


 

var builder = WebApplication.CreateBuilder(args);
var app = builder.Build();

if (app.Environment.IsDevelopment())
{
    app.UseDeveloperExceptionPage();
}

var pizzas = new List<Pizza>(){
   new Pizza(1, "Margherita"),
   new Pizza(2, "Al Tonno"),
   new Pizza(3, "Pineapple"),
   new Pizza(4, "Meat meat meat")
};

app.MapGet("/", () => "Hello World!");
app.MapGet("/pizzas/{id}", (int id) => pizzas.SingleOrDefault(pizzas => pizzas.Id == id));
app.MapGet("/pizzas", (int ? page, int ? pageSize) => {
    if(page.HasValue && pageSize.HasValue) 
    {
        return pizzas.Skip((page.Value -1) * pageSize.Value).Take(pageSize.Value);
    } else {
        return pizzas;
    }
});
app.MapPost("/pizza", (Pizza pizza) => pizzas.Add(pizza));

app.Run();

public record Pizza(int Id, string Name);

 


 

Run this app with dotnet run


In your browser, try various things like:



 Learn more


Check out these LEARN modules on learning to use minimal API


Azure Video Analyzer – Ignite Nov 2021

Azure Video Analyzer – Ignite Nov 2021

This article is contributed. See the original author and article here.

Intelligent video applications built using existing cameras or newer smart cameras, and edge gateways are at the core of a massive wave of innovation benefiting our customers.


According to the IoT Signals report, the vast majority of companies with a video AI solution strategy see it as an integral part of their IoT solution. Yet, the reality is that building such a solution can be complicated. Azure Video Analyzer is an Azure Applied AI service that greatly reduces the effort needed to build intelligent video applications by capturing, analyzing, and publishing video & inference on the edge or the cloud.


 


“Vision and AI capabilities on edge devices are helping companies create companies create breakthrough applications,” said Moe Tanabian, Vice President, and General Manager of Azure Edge Devices, Platform & Services, Microsoft. With the latest updates to Azure Video Analyzer, we are making it easier than ever for our customers to build comprehensive AI-powered solutions with actionable insights from videos”


  


KishorIoT_12-1635625179581.png


Figure 1: Azure Video Analyzer overview


 


New Azure Video Analyzer innovations available as of Microsoft Ignite 2021


 


Since its introduction earlier this year, Azure Video Analyzer capabilities have grown significantly to meet your  needs. The Ignite 2021 (November) release provides you with the following new capabilities and enhancements:



  1. Cloud-native video management solutions

  2. Visualization of insights from intelligent video applications

  3. Windows devices optimized for Video AI


The following illustration provides an overview of both existing Azure Video Analyzer capabilities and the new capabilities made available for Ignite 2021. 


 


KishorIoT_13-1635625179595.png


Figure 2: Azure Video Analyzer capabilities


 


1.   Cloud-native video management solutions


Video Surveillance as a Service (VSaaS) solutions have the convenience of ease of use coupled with the scalability and manageability of cloud computing, making them attractive to enterprises adopting cloud-native solutions. Such solutions offer the same benefits as other cloud services, such as managed infrastructure for IT teams, easy customization, and integration, and remote access from anywhere. Our customers can take advantage of the following features to achieve the desired outcome in these areas.



  • Azure Video Analyzer enables you to build a VSaaS system to record, store, view, and export video clips from cameras. You can connect RTSP cameras directly to the cloud or via a lightweight gateway device for network isolation. There’s no need to be on-site to view footage and investigate issues; end users can simply log into a cloud-based dashboard via a web browser or mobile app and view the video stream in near real-time (~2 sec latency).


KishorIoT_14-1635625179602.png


Figure 3: Camera to Azure Video Analyzer Cloud (with or without gateway)


 



  • Azure Video Analyzer makes it effortless to create actionable events along with video clips that can be shared with relevant end users quickly & securely via the cloud. Customers are always in control of the video by defining access policies to meet regulatory requirements.

  • Not every video needs to be processed in real-time at the edge or cloud. With the recent updates to the platform, customers can export a portion of the pre-recorded video stream. This enables scenarios related to long-term storage of relevant snippets, exported clips for AI model training, and video evidence management scenarios.


 


KishorIoT_15-1635625179607.png


Figure 4: Azure Video Analyzer low latency video playback 


 


 “Safety, security and productivity are essential elements for the growth and sustainability of every society and business. Together Axis Communications and Azure Video Analyzer are empowering developers with the tools to rapidly build and deploy AI-powered solutions that improve operational agility, optimize business efficiency and enhance safety and security”  Fredrik Nilsson, Vice President, Americas, Axis Communications


 


2.  Visualization of insights from Intelligent video application


Visualization of AI inference data is necessary to make sense of data generated from Video AI systems. Customers need data visualization to detect anomalies or trends, and so on.  With this objective in mind:



  • You can use widget player npm (node package manager) to customize and readily embed into Power BI or other business intelligence systems or Power Apps or custom applications.

  • It can be time-consuming to obtain coordinates required to build an intelligent video application (i.e., crossing line, zone). The video player widget also provides an easy tool to draw lines and zones.

  • This release also marks a significant milestone in our innovations with Azure’s Computer Vision for spatial analysis. Customers can leverage new capabilities like tracking a person’s speed and ground orientation and display them with our widget player.

  • During upcoming updates, we will enable customers

    • To overlay lines/zones for easy visualization while viewing the video from the camera

    • To define user attributes (i.e., vests, helmets, bags) and use them with the spatial analysis AI service.




These product investments in Azure Video Analyzer will enable you to visualize actionable insights quickly.


 


KishorIoT_16-1635625179622.png


Figure 5: Azure Video Analyzer insights visualization 


 


“We were impressed with the comprehensiveness of the Azure Video Analyzer to build out solutions quickly. The integrations between the Azure Video Analyzer and Scenera’s Platform as a Service will help our customers gain valuable business insights using the solution’s scene-based event analytics..” Andrew Wajs, CTO & Founder of Scenera


 


3.  Windows devices optimized for Video analytics


Manageability of Windows devices and the necessity to run Linux-based containers are key drivers for our investments with “Edge For Linux On Windows”  EFLOW. We now guide our developer ecosystem through the PowerShell experience of running EFLOW with Azure Video Analyzer to strengthen this commitment further.


 


KishorIoT_0-1635966838910.png


Figure 6: Azure Video Analyzer + EFLOW powering inventory management solution  


                


Finally, use the following resources to learn more about the overall product and services capabilities.



Please contact the Azure Video Analyzer product team at videoanalyzerhelp@microsoft.com  for feedback and deeper engagement discussions.

Introducing Private Link in Hyperscale (Citus) for Postgres on Azure

Introducing Private Link in Hyperscale (Citus) for Postgres on Azure

This article is contributed. See the original author and article here.

We recently announced the preview of Azure Private Link support for the Hyperscale (Citus) option in our Azure Database for PostgreSQL managed service.


 


Private Link enables you to create private endpoints for Hyperscale (Citus) nodes, which are exhibited as private IPs within your Virtual Network. Private Link essentially brings Hyperscale (Citus) inside your Virtual Network and allows you to have direct connectivity from your application to the managed database service.


 


With Private Link, communications between your Virtual Network and the Hyperscale (Citus) service travel over the Microsoft backbone network privately and securely, eliminating the need to expose the service to the public internet.


 


If you’re not familiar, Hyperscale (Citus) is an option in the Azure Database for PostgreSQL managed service that enables you to scale out your Postgres database horizontally. Hyperscale (Citus) leverages the Citus open source extension to Postgres, effectively transforming Postgres into a distributed database.


 


Blog-post-graphic-purple-background-with-big-private-link-1920x1080.jpg


 


As with all the other Azure PaaS services that support Azure Private Link, the Private Link integration with Hyperscale (Citus) in our PostgreSQL managed service implements the same battle-tested Azure Private Link technology, provides the same consistent experiences, and has the following features:


 



  • Private access from Virtual Network resources, peered networks, and on-premise networks.

  • In-built data exfiltration protection for Azure resources.

  • Predictable private IP addresses for PaaS resources.

  • Consistent and unified experience across PaaS services.


 


To learn more about Private Link technology and PaaS services that support Private Link functionality, you can review the general Azure Private Link documentation.


 


Figure 1: Architecture diagram depicting the secure and private connectivity to Hyperscale (Citus) in the Azure Database for PostgreSQL managed service—when using Private LinkFigure 1: Architecture diagram depicting the secure and private connectivity to Hyperscale (Citus) in the Azure Database for PostgreSQL managed service—when using Private Link


 


In this “how to” blog post about the Private Link preview1 for Hyperscale (Citus), you can learn how to bring your Hyperscale (Citus) server groups inside your Virtual Network, by creating and managing private endpoints on your server groups. You will also get to know some of the details to be aware of when using Private Link with Hyperscale (Citus).


 


Let’s take a walk through these 4 scenarios for using Azure Private Link with Hyperscale (Citus):


 



 


Prerequisites


 


Before you can create a Hyperscale (Citus) server group with a private endpoint—or add a private endpoint for an existing Hyperscale (Citus) server group—you first need to setup a resource group and a virtual network with a subnet that has enough available private IPs:


 



  • The resource group will hold your Hyperscale (Citus) server group.

  • The virtual network is used to allocate private IPs for your private endpoints.


 


How to create a Hyperscale (Citus) server group with a Private Endpoint


 


As the database admin or owner, you can create a private endpoint on the coordinator node when you are provisioning a new Hyperscale (Citus) server group. For help on how to provision a Hyperscale (Citus) server group, take a look at this tutorial.


 


In the “Networking” tab (Figure 2 below), select by clicking the “Private access” radio button for the “Connectivity method”.


 


 


Figure 2: Screen capture from the Azure portal showing the option to create a Hyperscale (Citus) server group with private access connectivityFigure 2: Screen capture from the Azure portal showing the option to create a Hyperscale (Citus) server group with private access connectivity


 


A “Create private endpoint” screen will appear (Figure 3 below). If this screen doesn’t appear, or you close it accidentally, you can manually re-open it by clicking “+ Add private endpoint” in the “Networking” tab showing above.


 


 


Figure 3: Screen capture from the Azure portal showing the “Create private endpoint” screen when “Private access” is selected as the connectivity methodFigure 3: Screen capture from the Azure portal showing the “Create private endpoint” screen when “Private access” is selected as the connectivity method


 


Select appropriate resource group, location, name, and networking values for your private endpoint.  If you are just experimenting with Citus on Azure, the default values should work for most cases.


 


Please pay special attention to the Networking configurations. The networking configurations specify the Virtual Network and Subnet for the private IP from which the new private endpoint will be allocated. For example, you need to make sure there are enough private IPs available in the selected subnet.


 


The rest of the steps are exactly the same as in the tutorial for creating a Hyperscale (Citus) server group.


 


How to add a Private Endpoint for an existing server group via the Networking blade


 


You can also create a private endpoint on a node in an existing Hyperscale (Citus) server group.


 


In fact, if you need to create a private endpoint on a worker node in a cluster, you must first create the database cluster and then subsequently add the private endpoint to the worker node.


 


There are two places you can do this, and the first place is through the “Networking” blade for the Hyperscale (Citus) server group.


 


1. Navigate to the “Networking” blade for the Hyperscale (Citus) server group (Figure 4 below), click “+ Add private endpoint”.


 


 


Figure 4: Screen capture from the Azure portal showing the “+ Add Private Endpoint” button in the Networking blade for Hyperscale (Citus) in the Azure Database for PostgreSQL managed serviceFigure 4: Screen capture from the Azure portal showing the “+ Add Private Endpoint” button in the Networking blade for Hyperscale (Citus) in the Azure Database for PostgreSQL managed service


 


2. In the “Basics” tab (Figure 5 below), select the appropriate “Subscription”, “Resource group”, and “Region” information where you want your private endpoint to be created, and enter a meaningful “Name” for the private endpoint, e.g., you can use a naming convention like “ServerGroupName-NodeName-pe”. Select “Next: Resource >”.


 


 


Figure 5: Screen capture from the Azure portal showing the “Basics” tab for the “Create a private endpoint” flowFigure 5: Screen capture from the Azure portal showing the “Basics” tab for the “Create a private endpoint” flow


 


3. In the “Resource” tab in the screenshot below (Figure 6 below), choose the target node of the Hyperscale (Citus) server group. Generally, “coordinator” is the desired node unless you have reasons to access to the Hyperscale (Citus) worker nodes. (If you need private endpoints for all the worker nodes, you will need to repeat this process for all target sub-resources). Select “Next: Configuration >”.


 


 


Figure 6: Screen capture from the Azure portal showing the “Resource” tab for the “Create a private endpoint” flowFigure 6: Screen capture from the Azure portal showing the “Resource” tab for the “Create a private endpoint” flow


 


4. In the “Configuration” tab below (Figure 7 below), choose the “Virtual network” and “Subnet” from where the private IP for the private endpoint will be allocated.



It’s not required, but highly recommended to create all your private endpoints for the same Hyperscale (Citus) server group using the same Virtual Network / Subnet.



Select the “Yes” radio button next to “Integration with private DNS zone” to have private DNS integration.


 


 


Figure 7: Screen capture from the Azure portal showing the “Configuration” tab for the “Create a private endpoint” flowFigure 7: Screen capture from the Azure portal showing the “Configuration” tab for the “Create a private endpoint” flow


 


5. Finish the rest of the steps by adding any tags you want, reviewing the settings and selecting “Create” to create the private endpoint.


 


How to add a Private Endpoint for an existing server group via Private Endpoint resource creation


 


If you need to create private endpoints for more than one Hyperscale (Citus) server group—or for multiple Azure managed services, perhaps you also manage other databases besides Postgres—you can choose to create a private endpoint using the generic private endpoint creation process provided by the Azure Networking team.


 


You might also want to use generic private endpoint resource creation if you don’t have access to the Hyperscale (Citus) server group, e.g., you are network admin instead of database admin, or you need to create a private endpoint to a database in another subscription you don’t have access to.


 


1. From the home page of Azure portal, select the “Create a resource” button and search for “Private Endpoint”. Click “Create” button (Figure 8 below) to start creating a private endpoint.


 


 


Figure 8: Screen capture from the Azure portal showing the “Create” page for “Create a resource” of Private EndpointFigure 8: Screen capture from the Azure portal showing the “Create” page for “Create a resource” of Private Endpoint


 


2. All the rest of the steps should be the same as illustrated in the section above, except for the “Resource” tab step (Figure 9 below).



For the “Resource” tab step, you will need to select the “Connection method” based on your permission to the Hyperscale (Citus) server group on which you want to create a private endpoint. You can learn more in the “Access to a private link resource using approval workflow” docs.


 



  • Connect to an Azure resource in my directory: if you own or have access to the Hyperscale (Citus) server group (e.g., you are the server group admin), you can choose “Connect to an Azure resource in my directory”. For the “Resource Type” field, please select “Microsoft.DBforPostgreSQL/serverGroupsv2” from the dropdown; for the “Resource” field, you can browse to find the server group on which you want to create a private endpoint.


  • Connect to an Azure resource by resource ID or alias”: if you don’t own or don’t have access to the Hyperscale (Citus) server group, you will need to choose “Connect to an Azure resource by resource ID or alias.” Please obtain the resource ID for the Hyperscale (Citus) server group from the Hyperscale (Citus) server group owner.


 


 


Figure 9: Screen capture from the Azure portal showing the “Resource” tab for the “Create a private endpoint” flow when you are using Private Endpoint resource creationFigure 9: Screen capture from the Azure portal showing the “Resource” tab for the “Create a private endpoint” flow when you are using Private Endpoint resource creation


 


How to manage a Private Endpoint Connection


 


As mentioned above, there are different connection and approval methods based on your permission on the Hyperscale (Citus) server group.


 



  • Automatic approval: the private endpoint connection will be approved automatically if you own or have permission on the server group.

  • Manual approval: the private endpoint connection request will go through the manual-approve workflow, if you don’t have the permission required and would like to connect to the server group.


 


As the Hyperscale (Citus) server group owner or admin, you can manage all the private endpoint connections created on your server group.


 



  • Pending connections: if the “Connection state” for a private endpoint connection is “Pending”, you will be able to “Approve”, “Reject”, or “Remove” the connection.

  • Approved connections: if the “Connection state” for a private endpoint connection is “Approved”, you will be able to “Reject” or “Remove” the connection.


 


Just like adding a Private Endpoint for an existing server group, there are two places you as the Hyperscale (Citus) server group admin can manage the private endpoint connections.


 


The 1st place is again using the Hyperscale (Citus) server group’s “Networking” blade (Figure 10 below).


 


 


Figure 10: Screen capture from the Azure portal showing management options for a Private Endpoint Connection in the Networking blade for Hyperscale (Citus) in the Azure Database for PostgreSQL managed serviceFigure 10: Screen capture from the Azure portal showing management options for a Private Endpoint Connection in the Networking blade for Hyperscale (Citus) in the Azure Database for PostgreSQL managed service


 


The 2nd place you can manage the private endpoint connections is the “Private Link Center”. Search “Private Link” services from the Azure portal, and you will be navigated to the “Private Link Center”.


 


1. The “Pending connections” blade (Figure 11 below) in the “Private Link Center” lists all the private endpoints that are in “Pending” state. You can filter based on “Subscription”, “Name”, and “Resource Type” to the private endpoints you want to manage.


 


 


Figure 11: Screen capture from the Azure portal showing all “Pending connections” in the “Private Link Center”Figure 11: Screen capture from the Azure portal showing all “Pending connections” in the “Private Link Center”


 


2. The “Private endpoints” blade (Figure 12 below) in the “Private Link Center” lists all the private endpoints in all connection state. Again, you can filter based on “Subscription”, “Name”, and “Resource Type” to the private endpoints you want to manage.


 


 


Figure 12: Screen capture from the Azure portal showing all “Private endpoints” in the “Private Link Center”Figure 12: Screen capture from the Azure portal showing all “Private endpoints” in the “Private Link Center”


 


Private Link is now in preview for Hyperscale (Citus) in our PostgreSQL managed service


 


With the preview of the Azure Private Link for Hyperscale (Citus), you are now empowered to bring your Hyperscale (Citus) server groups—new or existing—into your private Virtual Network space. You can create and manage private endpoints for any of or all the Hyperscale (Citus) database nodes.


 


If you want to learn more about using Hyperscale (Citus) to shard Postgres on Azure, you can:


 



 


Your feedback and questions are welcome. You can always reach out to our team of Postgres experts at Ask Azure DB for PostgreSQL.


 




Footnotes




  1. At the time of publication, Private Link is in preview in many Hyperscale (Citus) regions and will be rolling out to the rest of the Hyperscale (Citus) in the upcoming months.


A data-driven approach to managing devices in your organization

A data-driven approach to managing devices in your organization

This article is contributed. See the original author and article here.

The recent shift to hybrid and remote work is changing the way organizations manage enterprise devices. Many organizations are moving to modern cloud management solutions. IT Pros tell us that most have become familiar with the Windows servicing model and the deployment of regular feature updates and are using – or planning to use – Windows Update for Business to automate updates. We also hear that application compatibility is less of a concern for most organizations as it was when Windows 10 was introduced.


We’re working to make Windows update readiness insights more accessible with the goal to provide you with the insights you need to confidently deploy Windows without adding any unnecessary complexity. To align our investments with this goal and the shift we have been seeing, we are announcing that we will retire Desktop Analytics on November 30, 2022. Over the next year, we will begin incorporating the types of insights found in Desktop Analytics directly into the Microsoft Endpoint Manager admin center, making them available for PCs that are managed via Intune-only, co-managed, and Configuration Manager with tenant attach.


We have already started this work with the addition of Windows 11 hardware readiness insights in Endpoint analytics as a part of Microsoft Endpoint Manager. These insights help you quickly determine which of your managed PCs meet the minimum system requirements for Windows 11 and the top hardware blockers both at the device level and across your organization. By building these insights in Endpoint analytics, they’re now available for Intune-managed and co-managed devices, in addition to Configuration Manager devices with tenant attach enabled.


Device-level Windows 11 readiness details in Endpoint analyticsDevice-level Windows 11 readiness details in Endpoint analytics


New Reports in Microsoft Endpoint Manager admin center


In the coming months, we’ll be releasing device-level upgrade and update readiness insights directly in the Reports node of the Microsoft Endpoint Manager admin center, giving you insights for all your Endpoint Manager-managed devices. These reports will tell you if any of your Windows devices have application or driver compatibility risks or Safeguard holds that will prevent an upgrade from Windows 10 to Windows 11 – or a feature update from one version of Windows to another. We will also show you the top compatibility risks across your organization making it easy to see which impact the largest number of devices so that you can prioritize fixes effectively.


We’ll be moving away from the workflow-based model of Desktop Analytics toward a data-first approach. Many IT Pros have provided feedback that the data in Desktop Analytics is what they find most valuable, but the tool comes with a steep learning curve before they can access the data. We’re looking forward to improving this by making compatibility insights simpler and more accessible without the need to manage another workload, while making them ready to use with modern Windows servicing tools.


Additional devices in scope


While the insights in our new reports will be similar to what was available in Desktop Analytics, our approach is evolving based on your feedback and years’ worth of learnings to make Windows updates easier than ever before. We’re committed to helping you adopt a modern management approach for your organization. By making Windows 10 and 11 insights available in the Microsoft Endpoint Manager admin center, they’ll soon be available for all MEM-managed PCs – including Intune-only, co-managed, and Configuration Manager with tenant attach.


Simplified Configuration Manager cloud attach story


This change also allows us to simplify your overall Configuration Manager cloud management strategy. Historically, there have been very similar, but separate processes for configuring Desktop Analytics and tenant attach which created additional overhead. With these new investments, you’ll no longer need to maintain separate configurations. Instead, simply tenant attach or co-manage your devices to take advantage of all the additional cloud-powered capabilities available to you in the cloud console.


Our application compatibility promise


Windows 11 continues Microsoft’s strong commitment to app compatibility. Our goal is to ensure that apps will work after an upgrade to Windows 11, with no changes required. In the years that our App Assure service has been working with organizations to help them resolve app compat issues, they have seen a 99.6% app compatibility rate. For organizations where application compatibility is still a concern, such as those with many highly specialized or custom line of business (LOB) applications, don’t worry! App Assure is ready to assist, and you can also use Test Base for Microsoft 365 to onboard and validate apps for Windows 11 in a Microsoft managed environment. For more information, see Microsoft extends application compatibility promise to Windows 11.


What should I do now?


We’ll have more information about our investments in this area over the next several months. In the meantime, there are several steps you can take today to prepare. First, ensure that your PCs are on a supported version of Windows 10. You’ll be able to leverage Desktop Analytics for Windows 10 feature updates until November 30, 2022. Next, if you’re using Configuration Manager, enable tenant attach and integrate your site with your Azure Active Directory (Azure AD) tenant. You’ll get several immediate benefits – such as access to the cloud console – and this will leave you well-positioned to benefit from our upgrade and update readiness insights as soon as they’re available.


After enabling tenant attach, or if you’re using Intune to manage PCs, onboard to Endpoint analytics to take advantage of Windows 11 hardware readiness insights. Understanding which managed devices meet the minimum system requirements is one of the first steps in planning for a Windows 11 upgrade.


We’re looking forward to helping you along your modern management journey and making it simple for you to upgrade to and manage Windows 11.




Continue the conversation. Find best practices. Visit the Windows Tech Community.


Stay informed. For the latest updates on new releases, tools, and resources, stay tuned to this blog and follow us @MSWindowsITPro on Twitter.