Using BitLocker recovery keys with Microsoft Endpoint Manager – Microsoft Intune

Using BitLocker recovery keys with Microsoft Endpoint Manager – Microsoft Intune

This article is contributed. See the original author and article here.

By Luke Ramsdale – Service Engineer | Microsoft Endpoint Manager – Intune


 


This is the fourth blog in our series on using BitLocker with Intune. In the first post, we described occasions when a BitLocker-enabled device enters recovery mode. You can read about the reasons a device enters recovery mode in the documentation under What causes BitLocker recovery. This post walks you through BitLocker recovery options with Windows devices managed with Intune.


 


BitLocker recovery functionality


Since the inception of the BitLocker configuration service provider (CSP) in Windows 10, version 1703, there’s been an option to configure BitLocker recovery on protected operating system (OS) drives. This option provides a method to back up recovery information to Microsoft Azure Active Directory (Azure AD) or Azure Active Directory Domain Services (Azure AD DS).


 


Additionally, new password rotation functionality added in Windows 10, version 1909, allows the recovery key to refresh automatically after it is used to recover a BitLocker enabled device. Only the key used for recovery is refreshed.


 


An administrator can initiate BitLocker key rotation remotely from the Microsoft Endpoint Manager admin center by navigating to Devices > Windows to select the device for the BitLocker key rotation.

Note


There are prerequisites that devices must meet to support rotation. Read this article to discover how to support rotation of the BitLocker recovery key. 


 


BitLocker key rotation remote action in the Microsoft Endpoint Manager admin centerBitLocker key rotation remote action in the Microsoft Endpoint Manager admin center


 


This method will remove all the keys on the device and back up a single key to either Azure AD or on-premises Active Directory.


 


Configuring BitLocker recovery settings


 


Recovery options for an Azure AD joined device


In this scenario, the BitLocker policy is configured to silently encrypt an Azure AD joined device and is set with the following system drive recovery options:


 


Azure AD joined device system drive recovery settingsAzure AD joined device system drive recovery settings


 


1. BitLocker recovery key and package


This setting will configure whether the device will back up the password and key or just the key in Azure AD DS. 



  • The recovery password is a 48-digit recovery password that is used to unlock a volume when the device enters recovery mode. 

  • The key package and password will help decrypt the encrypted volume if the disk becomes corrupted or damaged.


 


For more information on BitLocker recovery, review this article, especially the Recovery password retrieval, BitLocker key package, and Retrieving the BitLocker key package sections.




Configure BitLocker recovery package settingsConfigure BitLocker recovery package settings


 


2. Require device to back up recovery information to Azure AD


If configured to Yes, BitLocker will not complete until the recovery key has been saved to Azure AD. Setting this to Not configured means that BitLocker encryption will complete even if the recovery key backup to Azure AD fails.


 


3. Recovery password creation


Setting this to Allowed or Required will generate a 48-digit recovery password during BitLocker initialization and send it to Azure AD if the policy Require device to back up recovery information to Azure Active Directory is set to Yes. Administrative users will be allowed to create new recovery passwords manually on the device.


 


Setting this option to Deny prevents BitLocker encryption from creating a recovery password and sending it to Azure AD. It will disallow users from generating new recovery passwords manually.


 


Note
For BitLocker silent encryption to succeed, this setting should be configured to Allowed or Required.


 


4. Hide recovery options during BitLocker setup 


Setting this option to Yes will prevent the end user from accessing recovery options such as saving the key to file or printing it out during the BitLocker setup process. This setting does not apply to silent encryption.


 


5. Enable BitLocker after recovery information to store


When this option is set to Yes, the recovery key will be backed up to Azure AD DS. This setting is only required in an Azure hybrid services joined scenario.


 


6. Block the use of certificate-based data recovery agent (DRA)


Setting this option to Yes blocks the ability to use a data recovery agent (DRA) to recover BitLocker enabled drives. Selecting Not Configured will allow the DRA to be set up.


 


Note
Setting up a DRA requires an enterprise PKI infrastructure to deploy the DRA agent and certificates. A DRA agent gives administrators another method to recover encrypted drives if the recovery key is not available. However, configuring DRA using Intune is not currently supported.


 


Creating a recovery key text file on the device


After configuring the recovery options in the BitLocker policy, it’s important that the end user can easily access the recovery key on their device. Using the following BitLocker drive encryption settings, you can create a recovery key file manually (as an administrative user) and save the BitLocker recovery key to a local drive as a text file.


 



  1. Navigate to Control Panel > System and Security > BitLocker Encryption.

  2. Select Save to a file if the drive has been encrypted silently.



BitLocker Drive Encryption windowBitLocker Drive Encryption window


 


Note
We don’t recommend printing recovery keys or saving them to a file. Instead, use Active Directory backup or a cloud-based backup. Cloud-based backup includes Azure AD and a Microsoft Account.


 


Scenario—Troubleshooting an Azure AD joined device


 


Step 1. Examining recovery settings in mobile device management (MDM) logs


As we discussed in the blog post, Troubleshooting BitLocker from the Microsoft Endpoint Manager admin center, the first step in troubleshooting is examining the encryption report in the Microsoft Endpoint Manager admin center. If that doesn’t help, your next step is to examine the MDM logs on the device to see if the policy has applied successfully. There are many ways to collect event logs from a Windows device. You can read this article to learn about the procedures for collecting logs. 


 


When you enroll a device or change policy settings, you should see similar information for recovery settings in the DeviceManagement-Enterprise-Diagnostic-Provider event log. If there are problems applying the policy from an MDM agent perspective, errors will show up in this log.


 


The following example showtroubleshooting an Azure AD joined device viewing this event log and the MDMDiagnostics report. The deployment is successful, and you can see that there are two ways to view the same settings.


 


DeviceManagement-Enterprise-Diagnostic-Provider event logDeviceManagement-Enterprise-Diagnostic-Provider event log


 


DeviceManagement-Enterprise-Diagnostic-Provider output from the general tabDeviceManagement-Enterprise-Diagnostic-Provider output from the general tab


 


MDMDiagnostics report entryMDMDiagnostics report entry


 


 


 


 


 


 

<data id="OSAllowDRA_Name" value="true"/> 

<data id="OSRecoveryPasswordUsageDropDown_Name" value="1"/> 

<data id="OSRecoveryKeyUsageDropDown_Name" value="2"/> 

<data id="OSHideRecoveryPage_Name" value="false"/> 

<data id="OSActiveDirectoryBackup_Name" value="true"/> 

<data id="OSActiveDirectoryBackupDropDown_Name" value="1"/> 

<data id="OSRequireActiveDirectoryBackup_Name" value="true"/> 

 


 


 


 


 


 


Step 2. Checking the BitLocker-API event log


 


If the report confirms that there were no errors applying the policy in the DeviceManagement-Enterprise-Diagnostic-Provider event log, the next step is to check event logs in the BitLocker-API folder to see how the recovery information was processed. (The Management log, Operational log and other logs are generated in this folder.)  To review the event log, right-click on Start > Event Viewer Applications and Services Logs > Microsoft Windows > BitLockerAPI.


 


This example displays the Management log and shows that the key was successfully backed up to Azure AD.


Successful back-up to Azure ADSuccessful back-up to Azure AD


 


In the following example, backing up the key failed because the device was Azure AD joined but the policy specified backing up to Azure AD DS.


Policy causes back-up errorPolicy causes back-up error


 


After the key is backed up, BitLocker encryption will start immediately.


Encryption begins after back-upEncryption begins after back-up


 


Important 
For Windows Autopilot devices, follow these instructions on configuring the BitLocker policy assignment to avoid starting automatic encryption before the Intune policy is applied.


 


Scenario – Troubleshooting an Azure hybrid joined device


In this scenario, the same policy and settings are used to silently encrypt an Azure hybrid services joined Windows 10 device. (See the above scenario for the event text and settings).


 


Step 1. Examining the event log


The policy settings are picked up in the DeviceManagement-Enterprise-Diagnostic-Provider event log:


Policy settings in the DeviceManagement-Enterprise-Diagnostic-Provider event logPolicy settings in the DeviceManagement-Enterprise-Diagnostic-Provider event log


 


Step 2. Checking the BitLocker-API event log


In the BitLocker-API event log, you see the following events:



  • First, recovery information is backed up to Azure AD.
    Recovery information is backed up to Azure ADRecovery information is backed up to Azure AD

  • Then recovery information is backed up to Active Directory Domain Services.
    Backup to Azure AD DSBackup to Azure AD DS

  • As soon as the keys have been backed up to both Azure AD and Azure AD DS, encryption begins:
    Encryption begins after the backup process is complete.Encryption begins after the backup process is complete.

  • The recovery key is now visible in the Microsoft Endpoint Manager admin center. To view the recovery key:


    1. Open the Microsoft Endpoint Manager admin center.




    2. Select Devices > All devices.




    3. Select your device from the list and then select Monitor > Recovery keys.
      Recovery key in the MEM admin centerRecovery key in the MEM admin center






 


Additional viewing and troubleshooting tools


 


BitLocker Recovery Password Viewer tool


You can also see the recovery key in the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in. Select the BitLocker Recovery tab in the Properties dialog box of a device to view the BitLocker recovery passwords. You must have the BitLocker Recovery Password Viewer — an optional tool included with the Remote Server Administration Tools (RSAT) — to see the tab in the dialog box. Find out more in the Recovery password retrieval section of this article.


 


BitLocker Recovery tab in the Properties dialog boxBitLocker Recovery tab in the Properties dialog box


 


Active Directory Service Interface Editor (ADSI Edit) tool


ADSI Edit is an MMC snap-in that lets you connect to Active Directory database partitions or to an LDAP server. If you view the device using this tool, you can see additional full volume encryption (FVE) attributes stored in Azure AD DS. In the example below, you see the key package, recovery GUID, recovery password and volume GUID.


 


Additional FVE attributes stored in Azure AD DSAdditional FVE attributes stored in Azure AD DS


 


Note
If you are deploying an Azure hybrid services joined device with Autopilot and you have configured the policy to back up to Azure AD and Azure AD DS, it is possible that the key will only back up to Azure AD DS. BitLocker might start encrypting when the device is joined to Azure AD DS but not when it’s added to Azure AD.


 


Manage-bde command line tool


Manage-bde is a command-line tool useful for scripting BitLocker operations. Use the  managebde -protectors -get command to view and verify the current key protector for the specified volume. (You must run the command line as an administrator.)


 


For example, using the following command will list all the key protectors in use and display the password protector that was created on the device:


 


Manage-bde -protectors – get c:


 


Manage-bde command prompt showing key protectorsManage-bde command prompt showing key protectors


 


When you’re troubleshooting, check to see that the operating system (OS) volume is configured to use the password protector and that the protector and identification GUIDs matches the BitLocker-API event log.


 


Recovery Key Rotation


 


Automatic password rotation


Windows 10, version 1909 introduced new BitLocker CSP settings to configure recovery password rotation. Password rotation helps increase the security of a device by rotating the password once it has been used for recovery, which prevents re-use of the same password.


 


You can select Configure client-driven recovery password rotation as an option in Endpoint security settings. Navigate to Microsoft Endpoint Manager admin center and select Endpoint security > Disk encryption.


 


Client-driven password rotation optionsClient-driven password rotation options


 


In the above example, the rotation option is set to Enable rotation on Azure AD and Hybrid-joined devices. It will automatically change the key when an end user enters it to recover a device.



  • If a device requires recovery after rebooting, the user will see a blue screen prompting the recovery key password.

  • Once the key has been entered and the device boots, you (as the administrator) will see the following information logged in the BitLocker-API event log:
    BitLocker-API event logBitLocker-API event log

  • Then when the password rotation and Active AD deletion requests have completed, you can view the event in the log:
    Successful processing of < > requestsSuccessful processing of < > requests

  • This will be followed by a series of events stating the recovery information is backed up successfully to Azure AD and Azure AD DS, which you saw in the earlier example.

  • After the keys have been stored, you should see that the new key has been deposited in Azure AD and the old key has been removed from the device and Azure AD.
    Successful recovery password rotation and Azure AD deletion requestSuccessful recovery password rotation and Azure AD deletion request


 


Remote rotation of recovery passwords for individual devices


It’s also possible to initiate the rotation of recovery passwords for individual devices remotely.




  1. Navigate to the Microsoft Endpoint Manager admin center.




  2. Select Devices > Windows.




  3. Select a device from the list of devices, select Overview > ellipses (…), and then select BitLocker key rotation.

    Option for remote BitLocker key rotationOption for remote BitLocker key rotation




 


After selecting this option, you will receive an additional prompt to make sure you understand the implications:


 


BitLocker key rotation confirmation screenBitLocker key rotation confirmation screen


 


All the existing keys will be removed from the device and the new recovery key will be stored in Azure AD or Azure AD DS . The key that was deleted from the device and stored in Azure AD will be removed.


 


Summary of BitLocker recovery options with Intune managed devices



  • You can store recovery keys in Azure AD before initiating the encryption of a device if the device is Azure AD joined.

  • Recovery keys can also be stored in Azure AD and on-premises Active directory (if required) for Azure hybrid services joined devices.

  • For increased security you can rotate a device’s recovery keys automatically or manually through the Microsoft Endpoint Manager admin center.

  • For troubleshooting recovery key policy processing, examine the DeviceManagement-Enterprise-Diagnostic-Provider event log and MDMDiagnostic report.

  • For troubleshooting recovery key implementation, examine the BitLocker-API event log and use the manage-bde -protectors command.


 


Note
DRA is not currently supported for Intune managed devices.


 


Frequently asked questions (FAQs)



  1. What happens if a device is removed from Intune? Will I still have access to the recovery keys?
    Answer: If the device is backed up to Microsoft Azure Active Directory (Azure AD) or on-premises Active Directory and the device object is not removed from those directories, then the key will still accessible.

  2. Does Intune store recovery keys for removable storage devices?
    Answer: Currently there is no way to store the recovery key for removable storage devices in Azure AD or on-premises Active Directory.

  3. What are the minimum role-based access control (RBAC) rights required to access the recovery key in the Intune console?
    Answer: To be able to access the recovery keys, an administrator must be granted Helpdesk Administrator permissions. Find out more about Azure AD roles in this article.

  4. If my device is already encrypted before enrolling into Intune, how do I back up the recovery key?
    Answer: Use the BackupToAAD-BitLockerKeyProtector PowerShell Cmdlet or rotate the key from the Microsoft Endpoint Manager admin center.



More info and feedback


For further resources on this subject, please see the links below.


BitLocker recovery guide (Windows 10)


BitLocker CSP documentation


Setting the BitLocker encryption algorithm for Autopilot devices


Encrypt Windows 10 devices with BitLocker in Intune – Microsoft Intune


Guidelines for troubleshooting BitLocker


 


The last post in this series will cover recommended settings for configuring BitLocker encryption with Endpoint security. Stay tuned! Check out other blogs in this series:



  1. Enabling BitLocker with Microsoft Endpoint Manager – Microsoft Intune – Microsoft Tech Community

  2. Troubleshooting BitLocker from the Microsoft Endpoint Manager admin center – Microsoft Tech Community

  3. Troubleshooting BitLocker policies from the client side – Microsoft Tech Community


 


Let us know if you have any additional questions by replying to this post or reaching out to @IntuneSuppTeam on Twitter.

Convert your favorite App Insights Workbooks

Convert your favorite App Insights Workbooks

This article is contributed. See the original author and article here.

Workbooks in Application Insights are a powerful tool for guided investigations, data analysis, & rich visualizations.


 


We’ve updated the Application Insights Workbooks resource type to match the resource type used by all other Azure Workbooks so our users can take full advantage of all the functionality provided by Workbooks. The new Workbook resources can be queried via Azure Resource Graph, support ARM templates, saved in the region of your choice, & more!


 


To take advantage of these new features & preserve your favorite reports please convert your existing workbooks by June 30, 2021.


 


workbook_update.gif


 


Conversion steps to take:



  • Open the desired workbook

  • Select the ‘Edit’ option

  • Then click ‘Save as’

  • Enter the workbook’s name

  • Select a subscription, resource group, & region where you have write access

  • Delete the legacy workbook


(Optional)



  • Update links in other workbooks to use your new version


See this documentation for in-depth conversion guidance and more information about the upcoming change!

SQL Server 2019 on Ubuntu 20.04,python2 dependency removed for SQL Server 2019 across distributions.

This article is contributed. See the original author and article here.

 


SQL Server 2019 on Ubuntu 20.04


We are happy to announce the official production support and availability of SQL Server 2019 package native to Ubuntu 20.04 distribution starting with CU 10. You can read more about the SQL Server 2019 CU 10 release here.


 


You can follow the below link to get started with SQL Server 2019 on Ubuntu 20.04: 


https://docs.microsoft.com/en-us/sql/linux/quickstart-install-connect-ubuntu?view=sql-server-ver15#install 


 


SQL Server 2019 on Ubuntu 20.04 based containers


We are glad to announce the availability of SQL Server 2019 CU 10 container image built on ubuntu 20.04. It is fully supported for production use. The tag for the container image is : ‘2019-CU10-ubuntu-20.04’ and you can pull the image using the command below:


docker pull mcr.microsoft.com/mssql/server:2019-CU10-ubuntu-20.04

 


No more python 2 dependency across all supported distributions, starting from SQL Server 2019 CU 10.


As we all are aware that python 2 is no longer supported and has reached end of life, starting SQL Server 2019 CU 10 we have also moved away from python 2 dependency to python 3 for all supported SQL Server 2019 distributions.


 


Thanks!


Mike Habben (Principal Software Engineering Manager)


Pat Schaefer (Senior Software Engineer)
Pranav Raj (Software Engineer)


Tejas Shah (Principal Program Manager)


Amit Khandelwal (Senior Program Manager) 


 

 

 

 

Teams Apps and Bots in GCC, Oh My!

This article is contributed. See the original author and article here.

Now available for Teams in GCC – AtBot is the premiere bot-as-a-service platform for the Microsoft cloud. AtBot is a no-code, easy-to-configure platform to create customized chatbots for Teams as well as the web. AtBot gets its intelligence from Azure cognitive services and its power to “do things” from Power Automate or from Logic apps. These bots transform Teams into a single pane of glass enabling your organization to get information and perform any line of business functions without leaving Teams.


 


This video shares the art of the possible and behind the scenes on how to build them, including automating IT Tier 1 level support in ServiceNow and only engage a person when needed.


 


Thank you to Joe Herres and Lisa Ruff for sharing about this powerful tool that is available in GCC now!


 


M365 for Government March 2021 Video Replay


 


 


https://www.youtube-nocookie.com/embed/eeWM-slCJUg


 

 

Azure SQL News Update: April 2021

This article is contributed. See the original author and article here.

Today and every Wednesday Data Exposed goes live at 9AM PT on LearnTV. Every 4 weeks, we’ll do a News Update. We’ll include product updates, videos, blogs, etc. as well as upcoming events and things to look out for. We’ve included an iCal file, so you can add a reminder to tune in live to your calendar. If you missed the episode, you can find them all at https://aks.ms/AzureSQLYT.


 


You can read this blog to get all the updates and references mentioned in the show. Here’s the April  2021 update:


 


Product updates


In the last news update, I covered what happened at Ignite. I won’t duplicate here, but check it out here, there are some things you won’t want to miss!


 


In mid-March, there were several exciting announcements and releases. First, dynamic data masking (DDM) became generally available with the specific capability that allows you to grant and deny UNMASK permissions at the schema-level, table-level, and column-level, providing a more granular way to manage control and limit access.


 


Machine Learning Services on Azure SQL Managed Instance also recently became generally available with the capability to operate your own R or Python runtime with increased performance and do things like in-database machine learning. Michelle Wallig came on the show to talk more about these investments and the future of ML with Azure SQL and SQL Server.


 


There are other Azure SQL Managed Instance capabilities that landed recently in public preview. The first is support for cross-instance message exchange with Service Broker, allowing you to host a data tier of applications that distribute work across multiple instances (think: different regions, subscriptions, tenants!). Azure SQL Managed Instance also released Long-term backup retention (LTR) in public preview. This capability has been much anticipated since it is already available in Azure SQL Database. It allows you to retain database backups for up to 10 years.


 


The next announcement is a big one – Azure Monitor SQL insights for Azure SQL was announced in public preview! As someone who’s gotten to see this get built, it’s so exciting and I think you’ll find it exciting too – monitor all your SQL resources from one place, with easily accessible insights and drill downs so you can troubleshoot issues quickly. Bob Ward came on to demo it, you’ll want to check it out for yourself though. Additionally, Alain Dormehl, the PM behind it, will be coming on Data Exposed Live in May, so be sure to subscribe!


Finally, the public preview of a zone redundant configuration for Azure SQL Database serverless was announced last week. This update means all General purpose and Business critical Azure SQL Database customers can now opt for a zone redundant configuration. Learn more about the latest zone redundancy announcement here.


 


While it may not seem directly related to Azure SQL at first glance, I wanted to also call out that Azure Resource Mover recently became generally available. This service greatly simplifies how you move multiple resources between Azure regions. Learn more here.


 


Azure Data Factory product updates


We had a special guest, product leader of Azure Data Factory, Wee Hyong Tok, on the show to talk about the latest updates in Azure Data Factory. These updates include new regions, new Azure Data Factory and Azure Purview integrations, new connectivity and data flow improvements, and more! To get more information, refer to the Azure Data Factory April product updates blog.


 


Videos


We continued to release new and exciting Azure SQL episodes this month. Here is the list, or you can just see the playlist we created with all the episodes!



  • Mohamed Kabiruddin: Get Started with the New Database Migration Guides to Migrate your Databases to Azure

  • David Trigano: Granular Permissions for Azure SQL Dynamic Data Masking

  • [MVP Edition] Gaston Cruz: Easy Ways to Refresh Tabular Models

  • Amit Khandelwal: How to Enable AD Authentication for SQL 2019 Containers in Less than 5 Minutes

  • David Trigano: What’s New in Azure SQL Auditing

  • Aaron Nelson: How to Run SQL Assessment Checks in Azure SQL MI

  • Silvano Coriani: How to Create Operational Analytics with Window Functions in Azure SQL, Part 3


We’ve also had some great Data Exposed Live sessions. Subscribe to our YouTube channel to see them all and get notified when we stream. Here are some of the recent live streams.



  • Ask the Experts: SQL Edge to Cloud

  • Something Old, Something New: You have to draw the line somewhere

  • Deep Dive: The Architecture of Azure SQL

  • Deep Dive: Azure SQL Virtual Machine Sizing

  • Discover & Assess SQL Server Data Estate Migrating to Azure SQL Using Azure Migrate


 


Blogs


As always, our team is busy writing blogs to share with you all. Blogs contain announcements, tips and tricks, deep dives, and more. Here’s the list I have of SQL-related topics you might want to check out.



 


Upcoming events


As always, there are lots of events coming up this month. Here are a few to put on your calendar and register for:


4/7: South Florida SQL Server User Group
SQL Edge to Cloud, Bob Ward

4/8: Azure Migration Virtual Event
 .NET App Modernization and Migration from End to end, using data migration tools and Azure SQL, Raj Pochiraju

4/12: Azure SQL Fundamentals (Ep.5)
 Deliver Consistent Performance with Azure SQL, Anna Hoffman and Bob Ward

4/19: Azure SQL Fundamentals (Ep. 6)
Putting it All Together with Azure SQL, Anna Hoffman and Bob Ward

4/28: Database Administration Virtual Group
SQL Edge to Cloud, Bob Ward


Coming May 4, learn how to build scalable and intelligent apps on Azure SQL faster with this free digital event. Register today!

In addition to these upcoming events, here’s the schedule for Data Exposed Live:
4/7: Azure SQL April 2021 News Updates 
4/21: Azure SQL Security Series
4/28: Something Old, Something New: Do Kangaroos Prefer Cake Or Frosting, Generally Speaking?


Plus find new, on-demand Data Exposed episodes released every Thursday, 9AM PT at aka.ms/DataExposedyt


Featured Microsoft Learn Module


Learn with us! This month I highlighted the Optimize performance with Azure SQL Check it out!


 


Anna’s pick of the month: Learn Live! Azure SQL Fundamentals


On March 15th, Bob Ward and I started delivering one module per week from the Azure SQL Fundamentals learning path (https://aka.ms/azuresqlfundamentals ). This week we did the performance module which is also the module of the month! Head over to https://aka.ms/learnlive to watch the on-demand episodes, but join us every Monday LIVE on https://aka.ms/LearnTV at 2PM for a few more weeks!


 


Until next time…


That’s it for now! Be sure to check back next month for the latest updates, and tune into Data Exposed Live every Wednesday at 9AM PST on LearnTV. We also release new episodes on Thursdays at 9AM PST and new #MVPTuesday episodes on the last Tuesday of every month at 9AM PST at aka.ms/DataExposedyt.


 


Having trouble keeping up? Be sure to follow us on twitter to get the latest updates on everything, @AzureSQL. You can also download the iCal link with a recurring invite!


 


We hope to see you next time, on Data Exposed :)


–Anna and Marisa