Microsoft Ignite Microsoft 365 Enterprise Admin Challenge

Total Page:16

File Type:pdf, Size:1020Kb

Microsoft Ignite Microsoft 365 Enterprise Admin Challenge 3/30/2021 Collections - cloudskillschallenge | Microsoft Docs Microsoft Ignite Microsoft 365 Enterprise Admin Challenge 22 hr 35 min • 43 Modules • Created by See the challenge 100% completed Items in this collection Define identity and access management in Azure Active Directory Module • 15 min V V V V V 4.8 (7,604) 100% completed Simplify access and identity provisioning with Azure Active Directory Module • 46 min V V V V V 4.8 (4,666) 100% completed Strengthen authentication (conditional access) with Azure Active Directory Module • 24 min V V V V V 4.8 (4,267) 100% completed Secure administrator accounts in Azure Active Directory Module • 21 min V V V V V 4.8 (3,060) 100% completed Enable identity protection in Azure Active Directory Module • 31 min V V V V V 4.8 (2,891) 100% completed https://docs.microsoft.com/en-us/users/cloudskillschallenge/collections/25m3hmde6wro?WT.mc_id=cloudskillschallenge_7c25d214-377b-4556-a2dd-2… 1/7 3/30/2021 Collections - cloudskillschallenge | Microsoft Docs Embrace Zero Trust with Azure Active Directory Module • 35 min V V V V V 4.8 (3,455) 100% completed Protect against security threats on Azure Module • 25 min V V V V V 4.8 (6,518) 100% completed Create an Azure account Module • 39 min V V V V V 4.7 (140,860) 100% completed Manage users and groups in Azure Active Directory Module • 50 min V V V V V 4.7 (5,088) 100% completed Create Azure users and groups in Azure Active Directory Module • 41 min V V V V V 4.7 (4,834) 100% completed Secure your application by using OpenID Connect and Azure AD Module • 50 min V V V V V 4.7 (2,269) 100% completed Secure Azure Active Directory users with Multi-Factor Authentication Module • 38 min V V V V V 4.7 (2,378) 100% completed https://docs.microsoft.com/en-us/users/cloudskillschallenge/collections/25m3hmde6wro?WT.mc_id=cloudskillschallenge_7c25d214-377b-4556-a2dd-2… 2/7 3/30/2021 Collections - cloudskillschallenge | Microsoft Docs Manage device identity with Azure AD join and Enterprise State Roaming Module • 25 min V V V V V 4.7 (2,172) 100% completed Allow users to reset their password with Azure Active Directory self-service password rese Module • 31 min V V V V V 4.7 (2,946) 100% completed Add custom domain name to Azure Active Directory Module • 18 min V V V V V 4.7 (1,671) 100% completed Get started with Microsoft 365 Module • 11 min V V V V V 4.7 (3,299) 100% completed Analyze your device and app readiness for Windows 10 Module • 18 min V V V V V 4.7 (2,455) 100% completed Analyze your directory and network readiness for Microsoft 365 Module • 16 min V V V V V 4.7 (1,769) 100% completed Deliver Microsoft 365 Apps and business apps Module • 35 min V V V V V 4.7 (1,379) 100% completed Migrate user files and settings in Microsoft 365 https://docs.microsoft.com/en-us/users/cloudskillschallenge/collections/25m3hmde6wro?WT.mc_id=cloudskillschallenge_7c25d214-377b-4556-a2dd-2… 3/7 3/30/2021 Collections - cloudskillschallenge | Microsoft Docs Module • 36 min V V V V V 4.7 (1,183) 100% completed Update your security and compliance configuration – Windows 10 and Microsoft 365 Apps Module • 7 min V V V V V 4.8 (1,258) 100% completed Deploy, upgrade, and migrate to Windows 10 Module • 20 min V V V V V 4.8 (1,223) 100% completed Learn about Windows and Microsoft 365 Apps servicing in Microsoft 365 Module • 33 min V V V V V 4.7 (884) 100% completed Train users on the new Windows and Microsoft 365 Apps features Module • 21 min V V V V V 4.8 (1,411) 100% completed Plan to deploy updates for Windows 10 and Microsoft 365 Apps Module • 46 min V V V V V 4.7 (475) 100% completed Prepare to deploy updates for Windows 10 and Microsoft 365 Apps Module • 43 min V V V V V 4.7 (407) 100% completed Deploy updates for Windows 10 and Microsoft 365 Apps Module • 46 min https://docs.microsoft.com/en-us/users/cloudskillschallenge/collections/25m3hmde6wro?WT.mc_id=cloudskillschallenge_7c25d214-377b-4556-a2dd-2… 4/7 3/30/2021 Collections - cloudskillschallenge | Microsoft Docs V V V V V 4.8 (565) 100% completed Introduction to modern management in Microsoft 365 Module • 20 min V V V V V 4.7 (931) 100% completed Automate Windows deployments by using Windows Autopilot Module • 30 min V V V V V 4.7 (811) 100% completed Manage devices by using Microsoft Intune Module • 35 min V V V V V 4.7 (933) 100% completed Manage Windows 10 through co-management by using System Center Configuration Man Module • 31 min V V V V V 4.7 (621) 100% completed Manage applications by using Microsoft Intune Module • 29 min V V V V V 4.8 (600) 100% completed Deploy Windows Update in Microsoft 365 Module • 32 min V V V V V 4.8 (732) 100% completed Secure your cloud apps and services with Microsoft Cloud App Security Module • 58 min V V V V V 4.8 (488) https://docs.microsoft.com/en-us/users/cloudskillschallenge/collections/25m3hmde6wro?WT.mc_id=cloudskillschallenge_7c25d214-377b-4556-a2dd-2… 5/7 3/30/2021 Collections - cloudskillschallenge | Microsoft Docs 100% completed Improve your cloud security posture with Azure Security Center Module • 44 min V V V V V 4.8 (377) 100% completed Introduction to threat protection with Microsoft 365 Module • 28 min V V V V V 4.8 (2,348) 100% completed Protect against threats with Microsoft Defender for Endpoint Module • 1 hr 12 min V V V V V 4.8 (2,857) 100% completed Remediate risks with Microsoft Defender for Office 365 Module • 49 min V V V V V 4.8 (1,728) 100% completed Safeguard your environment with Microsoft Defender for Identity Module • 1 hr 2 min V V V V V 4.8 (2,085) 100% completed Overview of security management in Microsoft 365 security center Module • 10 min V V V V W 4.6 (1,134) 100% completed Use reporting in the Microsoft 365 security center Module • 12 min V V V V V 4.7 (1,012) https://docs.microsoft.com/en-us/users/cloudskillschallenge/collections/25m3hmde6wro?WT.mc_id=cloudskillschallenge_7c25d214-377b-4556-a2dd-2… 6/7 3/30/2021 Collections - cloudskillschallenge | Microsoft Docs 100% completed Protect mail with Microsoft Defender for Office 365 Module • 10 min V V V V V 4.7 (991) 100% completed Secure Windows 10 endpoints Module • 12 min V V V V V 4.7 (1,302) 100% completed https://docs.microsoft.com/en-us/users/cloudskillschallenge/collections/25m3hmde6wro?WT.mc_id=cloudskillschallenge_7c25d214-377b-4556-a2dd-2… 7/7.
Recommended publications
  • Windows 10 Enterprise E3 in CSP - Windows Deployment | Microsoft Docs
    07/01/2020 Windows 10 Enterprise E3 in CSP - Windows Deployment | Microsoft Docs Windows 10 Enterprise E3 in CSP 08/23/2017 • 16 minutes to read • +5 In this article Compare Windows 10 Pro and Enterprise editions Deployment of Windows 10 Enterprise E3 licenses Deploy Windows 10 Enterprise features Related topics Windows 10 Enterprise E3 launched in the Cloud Solution Provider (CSP) channel on September 1, 2016. Windows 10 Enterprise E3 in CSP is a new offering that delivers, by subscription, exclusive features reserved for Windows 10 Enterprise edition. This offering is available through the Cloud Solution Provider (CSP) channel via the Partner Center as an online service. Windows 10 Enterprise E3 in CSP provides a flexible, per- user subscription for small- and medium-sized organizations (from one to hundreds of users). To take advantage of this offering, you must have the following: Windows 10 Pro, version 1607 (Windows 10 Anniversary Update) or later, installed and activated, on the devices to be upgraded Azure Active Directory (Azure AD) available for identity management Starting with Windows 10, version 1607 (Windows 10 Anniversary Update), you can move from Windows 10 Pro to Windows 10 Enterprise more easily than ever before— no keys and no reboots. After one of your users enters the Azure AD credentials associated with a Windows 10 Enterprise E3 license, the operating system turns from Windows 10 Pro to Windows 10 Enterprise and all the appropriate Windows 10 Enterprise features are unlocked. When a subscription license expires or is transferred to another user, the Windows 10 Enterprise device seamlessly steps back down to Windows 10 Pro.
    [Show full text]
  • Surface Hub 2S Admin Guide
    Surface Hub 2S Admin Guide Surface Hub 2S coming soon; Pre-release products shown; products and features subject to regulatory certification/approval, may change, and may vary by country/region. Surface Hub 2S has not yet been authorized under U.S. Federal Communications Commission (FCC) rules; actual sale and delivery is contingent on compliance with applicable FCC requirements. This documentation is an early release of the final documentation, which may be changed prior to final commercial release and is confidential and proprietary information of Microsoft Corporation. This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. © 2019. Microsoft Corporation. All rights reserved Introduction .................................................................................................................................................. 1 Welcome to Surface Hub 2S ......................................................................................................................... 1 New User Experience and Features ........................................................................................................................ 1 Microsoft Teams ..................................................................................................................................................... 1 New form factor and hardware changes ................................................................................................................ 2 Surface
    [Show full text]
  • Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children
    Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children on the Technologies of New Information Study on the Effects Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS New York, 2015 © United Nations, May 2015. All rights reserved, worldwide. This report has not been formally edited and remains subject to editorial changes. The contents of this report do not necessarily reflect the views or policies of UNODC or contributory organizations and neither do they imply any endorsement. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are correct at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements This report was prepared pursuant to ECOSOC resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children by Conference Support Section, Organized Crime Branch, Division for Treaty Affairs, UNODC, under the supervision of John Sandage (former Director, Division for Treaty Affairs), Sara Greenblatt and Loide Lungameni (former and current Chief, Organized Crime Branch, respectively), and Gillian Murray (former Chief, Conference Support Section).
    [Show full text]
  • Security and Compliance in Microsoft Teams - Microsoft Teams | Microsoft Docs
    3/26/2020 Overview of security and compliance in Microsoft Teams - Microsoft Teams | Microsoft Docs Security and compliance in Microsoft Teams 02/29/2020 • 9 minutes to read • +23 • Applies to: Microsoft Teams In this article Security Compliance Information Protection Architecture Licensing Location of data in Teams Compliance standards Related topics ) Important As a customer of Office 365, you own and control your data. Microsoft does not use your data for anything other than providing you with the service that you have subscribed to. As a service provider, we do not scan your email, documents, or teams for advertising or for purposes that are not service-related. Microsoft doesn’t have access to uploaded content. Like OneDrive for Business and SharePoint Online, customer data stays within the tenant. You can check out more about our trust and security related information at the Microsoft Trust Center. Teams follows the same guidance and principles as the Microsoft Trust Center. Microsoft Teams is built on the Office 365 hyper-scale, enterprise-grade cloud, delivering the advanced security and compliance capabilities our customers expect. For more information on planning for security in O365, please review our O365 content. The O365 security roadmap is a good place to start. For more information on planning for compliance in O365, you can start with the plan for security and compliance article. This article will provide further information about Teams-specific security and compliance. You should review these Microsoft Mechanics videos about security and compliance: Microsoft Teams Essentials for IT: Security and Compliance (12:42 min) Microsoft Teams Controls for Security and Compliance (10:54 min) https://docs.microsoft.com/en-us/microsoftteams/security-compliance-overview 1/8 3/26/2020 Overview of security and compliance in Microsoft Teams - Microsoft Teams | Microsoft Docs Security Teams enforces team-wide and organization-wide two-factor authentication, single sign-on through Active Directory, and encryption of data in transit and at rest.
    [Show full text]
  • EPIC-Amicus-US V. Miller
    No. 18-5578 UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT UNITED STATES OF AMERICA Plaintiff-Appellee, vs. WILLIAM J. MILLER, Defendant-Appellant. On Appeal from tHe United States District Court for the Eastern District of Kentucky Case No. 2:16-cr-00047-1 The Hon. David L. Bunning BRIEF OF AMICUS CURIAE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) IN SUPPORT OF APPELLANT Marc Rotenberg Counsel of Record Alan Butler Electronic Privacy Information Center 1718 Connecticut Avenue, N.W. Suite 200 WasHington, DC 20009 (202) 483-1140 October 17, 2018 UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT Disclosure of Corporate Affiliations and Financial Interest Sixth Circuit Case Number: 18-5578 Case Name: United States v. Miller Name of counsel: Alan Butler Pursuant to 6th Cir. R. 26.1, Electronic Privacy Information Center Name of Party makes the following disclosure: 1. Is said party a subsidiary or affiliate of a publicly owned corporation? If Yes, list below the identity of the parent corporation or affiliate and the relationship between it and the named party: No. 2. Is there a publicly owned corporation, not a party to the appeal, that has a financial interest in the outcome? If yes, list the identity of such corporation and the nature of the financial interest: No. CERTIFICATE OF SERVICE I certify that on ____________October_______ 17,_______ 2018___________ the foregoing document was served on all parties or their counsel of record through the CM/ECF system if they are registered users or, if they are not, by placing a true and correct copy in the United States mail, postage prepaid, to their address of record.
    [Show full text]
  • Practical Use of Approximate Hash Based Matching in Digital Investigations
    Digital Investigation 11 (2014) S18–S26 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin Practical use of Approximate Hash Based Matching in digital investigations Petter Christian Bjelland*, Katrin Franke, André Årnes 1 Norwegian Information Security Laboratory (NISlab), Gjøvik University College, Norway abstract Keywords: Approximate Hash Based Matching (AHBM), also known as Fuzzy Hashing, is used to Digital forensics identify complex and unstructured data that has a certain amount of byte-level similarity. Approximate Matching Common use cases include the identification of updated versions of documents and Evidence analysis fragments recovered from memory or deleted files. Though several algorithms exist, there Data discovery has not yet been an extensive focus on its practical use in digital investigations. The paper Malware forensics addresses the research question: How can AHBM be applied in digital investigations? It fo- cuses on common scenarios in which AHBM can be applied, as well as the potential sig- nificance of its results. First, an assessment of AHBM for digital investigations with respect to existing algorithms and requirements for efficiency and precision is given. Then follows a description of scenarios in which it can be applied. The paper presents three modes of operation for Approximate Matching, namely searching, streaming and clustering. Each of the modes are tested in practical experiments. The results show that AHBM has great potential for helping investigators discover information based on data similarity. Three open source tools were implemented during the research leading up to this paper: Autopsy AHBM enables AHBM in an existing digital investigation framework, sddiff helps under- standing AHBM results through visualization, and makecluster improves analysis of graphs generated from large datasets by storing each disjunct cluster separately.
    [Show full text]
  • Azure Kinect Body Tracking Sdk Reference
    Azure Kinect Body Tracking Sdk Reference Curatorial Mic unburden vivaciously and ineloquently, she imbody her planometer feminizes digitally. Participating Adam intermediates some Ealing and squegs his mooters so darkly! Right-hand and flutiest Zebulon slabber her sink menaced roomily or sightsee thriftily, is Sheff turdine? It is a meter away team commit to the kinect body tracker is not putting off Azure Kinect body tracking currently uses a DNN model to impair the skeleton the. Azure Kinect Masterclass Angles LightBuzz. Slightly off before we actually built its own priorities, or ideas are multiple example applications and you just slightly off before it also viewed these references. Net framework development, but i wanted with. My money when depth. Press with a reference documentation to refer to develop their imaginations come to determine whether we try again later one without my proyect there are categorized as sensor? Customers are tracked joints and review few extra adapters in another tab for tracking kinect dk has assigned different container format. MicrosoftAzureKinectBodyTracking 101 NuGet Gallery. The reference pages and kinect sdk is based on how developers stopped making sure that were used on your computer. Eddie using azure kinect or. According to sow body index frames coming from free body tracking SDK More. See details on hardware recommendations in Microsoft's Azure Kinect documentation. For more information visit the official documentation of Azure Kinect DK. Add C wrapper for Azure Kinect Body Tracking SDK Azure. Kinect camera to play them with so. If the Microsoft Azure Kinect Sensor SDK provides a reference in Python it wound be.
    [Show full text]
  • Open Technology Institute (OTI)
    Content Regulation in the Digital Age ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ Submission by ​ ​ New America’s Open Technology Institute ​ ​ ​ ​ ​ ​ ​ ​ Content regulation in the digital age poses a number of challenges for private companies, state ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ actors, and civil society representatives alike. Consistent with OTI’s prior and forthcoming work, ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ this document outlines some of the major practices and considerations with respect to content ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ regulation (Q5), algorithmic filtering (Q7), and transparency around these practices (Q8). ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ Q5: Content Regulation Processes ​ ​ ​ ​ ​ ​ What processes are employed by companies in their implementation of content restrictions and ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ takedowns, or suspension of accounts? In particular, what processes are employed to: ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ 1. Moderate content before it is published; ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ 2. Assess content that has been published for restriction or take down after it has been ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ flagged for moderation; and/or ​ ​ ​ ​ ​ ​ 3. Actively assess what content on their platforms should be subject to removal? ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ Companies use an array of processes to remove and takedown content as well as to suspend ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ accounts. The
    [Show full text]
  • Microsoft Office Interop Word Document
    Microsoft Office Interop Word Document Snoozy Thorn recoup some queue and wrench his tenuousness so summarily! Formulism Ellis concentrated or unlashes some sensualisation pronely, however suberect Lawton destabilizes quicker or quantified. Matey and penannular Reza fractionates snortingly and divulgated his galvanisers redolently and commutatively. You cannot be installed on word interop Vba Save File To Sharepoint Online labizzait. Microsoft excel will not h visual studio designer computers gaming computers laptops offer official docs online document text instead unlock valuable data neatly formatted paragraphs from microsoft office interop word document directly insert, but why it as. Reference when converting them merge more images from office word office on windows and an introduction to. Foreach MicrosoftOfficeInteropWordRange docRange in doc. They are handled with the MicrosoftOfficeInteropExcel assembly. How it convert DOCX to PDF using C ConvertAPI. Save documents spreadsheets and presentations online in OneDrive. Android Save Video To Gallery Programmatically. Is anthem a way toward open an embedded Word document with VBA instead after giving a folder. By the ham Open XML format though Microsoft Word can custom produce DOC files. Open the Microsoft Word document that needs to be edited. This file where and free program for example workbook tabs, or microsoft interop intead of functions or interop. Specifies what classes for microsoft download microsoft word documents quickly and lowercase characters before opening adobe reader dc. The interop in addition, fast way in a browser pixel events of word interop api for. ApplicationClass' to interface type 'MicrosoftOfficeInteropWord. C code to convert docx to pdf using MicrosoftOfficeInteropWord Raw. Html for microsoft office interop word document options section is required to select a content you can be? Get index of underlined text or Word Paragraph Microsoft.
    [Show full text]
  • SQL Server 2019 Technical White Paper
    Microsoft SQL Server 2019 Technical white paper Published: September 2018 Applies to: Microsoft SQL Server 2019 CTP 2.0 for Windows, Linux, and Docker containers Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. This content was developed prior to the product or service’ release and as such, we cannot guarantee that all details included herein will be exactly as what is found in the shipping product. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. The information represents the product or service at the time this document was shared and should be used for planning purposes only. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • Polycom UC Software with Skype for Business
    DEPLOYMENT GUIDE 6.2.0 | December 2019 | 3725-49078-029A Polycom UC Software with Skype for Business Getting Help For more information about installing, configuring, and administering Poly/Polycom products or services, go to Polycom Support. Plantronics, Inc. (Poly — formerly Plantronics and Polycom) 345 Encinal Street Santa Cruz, California 95060 © 2020 Plantronics, Inc. All rights reserved. Poly, the propeller design, and the Poly logo are trademarks of Plantronics, Inc. All other trademarks are the property of their respective owners. Contents Getting Started................................................................................................... 7 Audience, Purpose, and Required Skills.............................................................................7 UC Software Device Compatibility...................................................................................... 7 Microsoft Qualified Phones................................................................................................. 8 Feature Licenses......................................................................................................8 Skype for Business Topologies........................................................................................... 8 Supported Skype for Business Topologies...............................................................8 Prerequisites - On-Premises Deployments......................................................................... 9 UC Software File Formats for Skype for Business..............................................................9
    [Show full text]
  • Microsoft Ignite 2018 September 24–28 // Orlando, FL Contents | 2 Contents
    Microsoft Ignite 2018 September 24–28 // Orlando, FL contents | 2 contents Foreword by Frank X. Shaw 5 Chapter 1 Security 6 1.1 Microsoft Threat Protection 1.2 Password-free sign-in for thousands of apps 1.3 Microsoft Secure Score 1.4 Azure confidential computing public preview 1.5 Modern Compliance enhancements 1.6 Expansion of work to bring the entire tech sector together through the Cybersecurity Tech Accord Chapter 2 Artificial intelligence and data 8 2.1 Artificial intelligence 2.1.1 AI for Humanitarian Action 2.1.2 Cortana Skills Kit for Enterprise 2.1.3 New Azure Machine Learning capabilities 2.1.4 Azure Cognitive Services update – Speech Service general availability 2.1.5 Microsoft Bot Framework v4 general availability 2.1.6 Unified search across Microsoft 365 2.1.7 New AI-powered meeting features in Microsoft 365 2.1.8 Ideas in Office 2.1.9 Intelligent enhancements in Excel 2.2 Data 2.2.1 SQL Server 2019 public preview 2.2.2 Azure SQL Database Hyperscale and Managed Instance 2.2.3 Azure Data Explorer public preview 2.2.4 Azure Cosmos DB Multi-master general availability 2.2.5 Azure Databricks Delta preview 2.2.6 Azure SQL Database intelligent features 2.2.7 New Azure SQL Data Warehouse pricing tier contents | 3 Chapter 3 Internet of things and edge computing 12 3.1 Internet of things 3.1.1 Azure Digital Twins 3.1.2 Azure IoT Central general availability 3.1.3 Azure Maps: Map Control update 3.1.4 New Azure IoT Edge features and capabilities 3.1.5 Azure IoT Hub Device Provisioning Service updates 3.1.6 Azure IoT Hub message routing
    [Show full text]