Microsoft
414 TopicsModern Authentication (Oauth/OIDC)
The Significance of OAuth 2.0 and OIDC in Contemporary Society. In today's digital landscape, securing user authentication and authorization is paramount. Modern authentication protocols like OAuth 2.0 and OpenID Connect (OIDC) have become the backbone of secure and seamless user experiences. This blog delves into the roles of OAuth 2.0 and OIDC, their request flows, troubleshooting scenarios and their significance in the modern world. Why Oauth 2.0? What problem does it solve? Let's compare Oauth to traditional Forms based Authentication. Aspect OAuth Forms Authentication Password Sharing Eliminates the need for password sharing, reducing credential theft risk. Requires users to share passwords, increasing the risk of credential theft. Access Control Provides granular access control, allowing users to grant specific access to applications. Limited access control, often granting full access once authenticated. Security Measures Enhanced security measures, creating a safer environment for authentication. Susceptible to phishing attacks and credential theft. User Experience Simplifies login processes, enhancing user experience. Can lead to user password fatigue and weak password practices. Credential Storage Does not require storing user credentials, reducing the risk of breaches. Requires secure storage of user credentials, which can be challenging. Session Hijacking Provides mechanisms to prevent session hijacking. Vulnerable to session hijacking, where attackers steal session cookies. OAuth 2.0 Overview OAuth 2.0 is an authorization framework that allows third-party applications to obtain limited access to user resources without exposing user credentials. It provides a secure way for users to grant access to their resources hosted on one site to another site without sharing their credentials. OAuth 2.0 Request Flow Here’s a simplified workflow: Authorization Request: The client application redirects the user to the authorization server, requesting authorization. User Authentication: The user authenticates with the authorization server. Authorization Grant: The authorization server redirects the user back to the client application with an authorization code. Token Request: The client application exchanges the authorization code for an access token by making a request to the token endpoint. Token Response: The authorization server returns the access token to the client application, which can then use it to access protected resources. Let’s take an Example to depict the above Authorization code flow. Consider a front-end .NET core application which is built to make a request to Auth server to secure the token. (i.e. Auth token) the token then will be redeemed to gain access token and passed on to an API to get simple weather details. 1. In program.cs we will have the following code. builder.Services.AddAuthentication(OpenIdConnectDefaults.AuthenticationScheme) .AddMicrosoftIdentityWebApp(builder.Configuration.GetSection("AzureAd")) .EnableTokenAcquisitionToCallDownstreamApi(new string[] { "user.read" }) .AddDownstreamApi("Weather", builder.Configuration.GetSection("Weather")) .AddInMemoryTokenCaches(); The above code configures the application to use Microsoft Identity for authentication, acquire tokens to call downstream APIs, and cache tokens in memory. AddMicrosoftIdentityWebApp This line Registers OIDC auth scheme. It reads the Azure AD settings from the AzureAd section of the configuration file (e.g., appsettings.json). This setup allows the application to authenticate users using Azure Active Directory. EnableTokenAcquisitionToCallDownstreamApi This line enables the application to acquire tokens to call downstream APIs. The user.read scope is specified, which allows the application to read the user's profile information. This is essential for accessing protected resources on behalf of the user. AddDownstreamApi This line configures a downstream API named "Weather". It reads the configuration settings for the Weather API from the Weather section of the configuration file. This setup allows the application to call the Weather API using the acquired tokens. AddInMemoryTokenCaches This line adds an in-memory token cache to the application. Token caching is crucial for improving performance and reducing the number of token requests. By storing tokens in memory, the application can reuse them for subsequent API calls without needing to re-authenticate the user. 2. In applicationsettings.json we will have the following. "AzureAd": { "Instance": "https://login.microsoftonline.com/", "Domain": "Domain name", "TenantId": "Add tenant ID", "ClientId": "Add client ID", "CallbackPath": "/signin-oidc", "Scopes": "user.read", "ClientSecret": "", "ClientCertificates": [] }, In the home controller we can inject the IDownstreamApi field into home default constructor. private IDownstreamApi _downstreamApi; private const string ServiceName = "Weather"; public HomeController(ILogger<HomeController> logger, IDownstreamApi downstreamApi) { _logger = logger; _downstreamApi = downstreamApi; } 3. The following section makes an API call. public async Task<IActionResult> Privacy() { try { var value = await _downstreamApi.CallApiForUserAsync(ServiceName, options => { }); if (value == null) { return NotFound(new { error = "API response is null." }); } value.EnsureSuccessStatusCode(); // Throws if response is not successful string jsonContent = await value.Content.ReadAsStringAsync(); return Content(jsonContent, "application/json"); // Sends raw JSON as is } catch (HttpRequestException ex) { return StatusCode(500, new { error = "Error calling API", details = ex.Message }); } } The above code will make sure to capture the token by making call to Identity provider and forward the redeemed access token (i.e. Bearer token) to the backend Api. 4. Now let’s see the setup at the Web Api: In program.cs we will have the following code snippet. var builder = WebApplication.CreateBuilder(args); // Add services to the container. builder.Services.AddControllers(); builder.Services.AddMicrosoftIdentityWebApiAuthentication(builder.Configuration); builder.Services.AddEndpointsApiExplorer(); builder.Services.AddSwaggerGen(); Followed by Appsettings.json. "AzureAd": { "Instance": "https://login.microsoftonline.com/", "Domain": "Domain name", "TenantId": “Add tenant id", "ClientId": "Add client id.", "CallbackPath": "/signin-oidc", "Scopes": "user.read", "ClientSecret": "", "ClientCertificates": [] }, In the controller we can have the following. namespace APIOauth.Controllers { [Authorize(AuthenticationSchemes = "Bearer")] [ApiController] [Route("[controller]")] public class WeatherForecastController : ControllerBase { private static readonly string[] Summaries = new[] { "Freezing", "Bracing", "Chilly", "Cool", "Mild", "Warm", "Balmy", "Hot", "Sweltering", "Scorching" }; To drill down the request flow let’s capture a fiddler: Step 1: First 2 calls are made by the application to openid-configuration and Keys end points. The first step is crucial as the application requires Open id configuration to know what configuration it has and what are the supported types. Example: Claims supported; scopes_supported, token_endpoint_auth_methods_supported, response mode supported etc… Secondly the keys endpoint provides all the public keys which can later be used to Decrypt the token received. Step 2: Once we have the above config and keys the application now Redirects the user to identity provider with the following parameters. Points to be noted in the above screen is the response_type which is code (Authorization code) and the response_mode is Form_post. Step 3: The subsequent request is the Post requests which will have the Auth code in it. Step 4: In this step we will redeem the auth code with access token. Request is made by attaching the auth code along with following parameters. Response is received with an access token. Step 5: Now the final call is made to the Api along with the access token to get weather details. Request: Response: This completes the Oauth Authorization code flow. Let us now take a moment to gain a brief understanding of JWT tokens. JWTs are widely used for authentication and authorization in modern web applications due to their compact size and security features. They allow secure transmission of information between parties and can be easily verified and trusted. Structure A JWT consists of three parts separated by dots (.), which are: Header: Contains metadata about the type of token and the cryptographic algorithms used. Payload: Contains the claims. Claims are statements about an entity (typically, the user) and additional data. Signature: Ensures that the token wasn't altered. It is created by taking the encoded header, the encoded payload, a secret, the algorithm specified in the header, and signing that. Here is an example of a JWT: OpenID Connect. (OIDC) OIDC Overview OpenID Connect is an authentication layer built on top of OAuth 2.0. While OAuth 2.0 handles authorization, OIDC adds authentication, allowing applications to verify the identity of users and obtain basic profile information. This combination ensures both secure access and user identity verification. OIDC Request Flow OIDC extends the OAuth 2.0 authorization code flow by adding an ID token, which contains user identity information. Here’s a simplified workflow: Authorization Request: The client application redirects the user to the authorization server, requesting authorization and an ID token. User Authentication: The user authenticates with the authorization server. Authorization Grant: The authorization server redirects the user back to the client application with an authorization code. Token Request: The client application exchanges the authorization code for an access token and an ID token by making a request to the token endpoint. Token Response: The authorization server returns the access token and ID token to the client application. The ID token contains user identity information, which the client application can use to authenticate the user. Example: Consider .Net core application which is setup for user Authentication. Let’s see the workflow. Let’s capture a fiddler once again to see the authentication flow: Step 1: & Step 2: would remain same as we saw in Authorization code flow. Making a call to OpenID configuration & making a call to Keys Endpoint. Step 3: Response type here is “ID token” and not a Auth code as we saw in Authorization code flow. This is an implicit flow since we are not redeeming or exchanging an Auth code. Also, an Implicit flow doesn't need a client secret. Step 4: In a post request to browser, we will receive an ID token. This completes the implicit code flow which will result in getting the ID token to permit the user to the application. Common Troubleshooting Scenarios Implementing OAuth in ASP.NET Core can sometimes present challenges. Here are some common issues and how to address them: 1. Misconfigurations Misconfigurations can lead to authentication failures and security vulnerabilities. For example, loss of internet connection or incorrect settings in the OAuth configuration can disrupt the authentication process. One example which we have faced is servers placed in “DMZ” with no internet access. Server need to make an outbound call to login.microsoft.com or identity provider for getting the metadata for openId/Oauth. 2. Failures due to server farm setup. Loss of saving Data protection keys on different workers. Data protection is used to protect Cookies. For server farm the data protection keys should be persisted and shared. One common issue with data protection keys in OAuth flow is the synchronization of keys across different servers or instances. If the keys are not synchronized correctly, it can result in authentication failures and disrupt the OAuth flow. In memory token caches can also cause re-authentication since the user token might exist in other workers or get purged after a restart. 3. Token Expiration Token expiration can disrupt user sessions and require re-authentication, which can frustrate users. It's essential to implement token refresh functionality to enhance user experience and security. 4. Redirect URI Mismatches Redirect URI mismatches can prevent applications from receiving authorization cods, causing login failures. Ensure that the redirect URI specified in the identity provider’s settings matches the one in your application. 5. Scope Misconfigurations Improperly configured scopes can result in inadequate permissions and restrict access to necessary resources. It's crucial to define the correct scopes to ensure that applications have the necessary permissions to access resources. By understanding these common pitfalls and implementing best practices, developers can successfully integrate OAuth into their ASP.NET Core applications, ensuring a secure and seamless user experience. References: Call a web API from a web app - Microsoft identity platform | Microsoft Learn Microsoft identity platform and OAuth 2.0 authorization code flow - Microsoft identity platform | Microsoft Learn OpenID Connect (OIDC) on the Microsoft identity platform - Microsoft identity platform | Microsoft Learn I hope it helps!219Views1like0CommentsExploring Azure OpenAI Assistants and Azure AI Agent Services: Benefits and Opportunities
In the rapidly evolving landscape of artificial intelligence, businesses are increasingly turning to cloud-based solutions to harness the power of AI. Microsoft Azure offers two prominent services in this domain: Azure OpenAI Assistants and Azure AI Agent Services. While both services aim to enhance user experiences and streamline operations, they cater to different needs and use cases. This blog post will delve into the details of each service, their benefits, and the opportunities they present for businesses. Understanding Azure OpenAI Assistants What Are Azure OpenAI Assistants? Azure OpenAI Assistants are designed to leverage the capabilities of OpenAI's models, such as GPT-3 and its successors. These assistants are tailored for applications that require advanced natural language processing (NLP) and understanding, making them ideal for conversational agents, chatbots, and other interactive applications. Key Features Pre-trained Models: Azure OpenAI Assistants utilize pre-trained models from OpenAI, which means they come with a wealth of knowledge and language understanding out of the box. This reduces the time and effort required for training models from scratch. Customizability: While the models are pre-trained, developers can fine-tune them to meet specific business needs. This allows for the creation of personalized experiences that resonate with users. Integration with Azure Ecosystem: Azure OpenAI Assistants seamlessly integrate with other Azure services, such as Azure Functions, Azure Logic Apps, and Azure Cognitive Services. This enables businesses to build comprehensive solutions that leverage multiple Azure capabilities. Benefits of Azure OpenAI Assistants Enhanced User Experience: By utilizing advanced NLP capabilities, Azure OpenAI Assistants can provide more natural and engaging interactions. This leads to improved customer satisfaction and loyalty. Rapid Deployment: The availability of pre-trained models allows businesses to deploy AI solutions quickly. This is particularly beneficial for organizations looking to implement AI without extensive development time. Scalability: Azure's cloud infrastructure ensures that applications built with OpenAI Assistants can scale to meet growing user demands without compromising performance. Understanding Azure AI Agent Services What Are Azure AI Agent Services? Azure AI Agent Services provide a more flexible framework for building AI-driven applications. Unlike Azure OpenAI Assistants, which are limited to OpenAI models, Azure AI Agent Services allow developers to utilize a variety of AI models, including those from other providers or custom-built models. Key Features Model Agnosticism: Developers can choose from a wide range of AI models, enabling them to select the best fit for their specific use case. This flexibility encourages innovation and experimentation. Custom Agent Development: Azure AI Agent Services support the creation of custom agents that can perform a variety of tasks, from simple queries to complex decision-making processes. Integration with Other AI Services: Like OpenAI Assistants, Azure AI Agent Services can integrate with other Azure services, allowing for the creation of sophisticated AI solutions that leverage multiple technologies. Benefits of Azure AI Agent Services Diverse Use Cases: The ability to use any AI model opens a world of possibilities for businesses. Whether it's a specialized model for sentiment analysis or a custom-built model for a niche application, organizations can tailor their solutions to meet specific needs. Enhanced Automation: AI agents can automate repetitive tasks, freeing up human resources for more strategic activities. This leads to increased efficiency and productivity. Cost-Effectiveness: By allowing the use of various models, businesses can choose cost-effective solutions that align with their budget and performance requirements. Opportunities for Businesses Improved Customer Engagement Both Azure OpenAI Assistants and Azure AI Agent Services can significantly enhance customer engagement. By providing personalized and context-aware interactions, businesses can create a more satisfying user experience. For example, a retail company can use an AI assistant to provide tailored product recommendations based on customer preferences and past purchases. Data-Driven Decision Making AI agents can analyze vast amounts of data and provide actionable insights. This capability enables organizations to make informed decisions based on real-time data analysis. For instance, a financial institution can deploy an AI agent to monitor market trends and provide investment recommendations to clients. Streamlined Operations By automating routine tasks, businesses can streamline their operations and reduce operational costs. For example, a customer support team can use AI agents to handle common inquiries, allowing human agents to focus on more complex issues. Innovation and Experimentation The flexibility of Azure AI Agent Services encourages innovation. Developers can experiment with different models and approaches to find the most effective solutions for their specific challenges. This culture of experimentation can lead to breakthroughs in product development and service delivery. Enhanced Analytics and Insights Integrating AI agents with analytics tools can provide businesses with deeper insights into customer behavior and preferences. This data can inform marketing strategies, product development, and customer service improvements. For example, a company can analyze interactions with an AI assistant to identify common customer pain points, allowing them to address these issues proactively. Conclusion In summary, both Azure OpenAI Assistants and Azure AI Agent Services offer unique advantages that can significantly benefit businesses looking to leverage AI technology. Azure OpenAI Assistants provide a robust framework for building conversational agents using advanced OpenAI models, making them ideal for applications that require sophisticated natural language understanding and generation. Their ease of integration, rapid deployment, and enhanced user experience make them a compelling choice for businesses focused on customer engagement. Azure AI Agent Services, on the other hand, offer unparalleled flexibility by allowing developers to utilize a variety of AI models. This model-agnostic approach encourages innovation and experimentation, enabling businesses to tailor solutions to their specific needs. The ability to automate tasks and streamline operations can lead to significant cost savings and increased efficiency. Additional Resources To further explore Azure OpenAI Assistants and Azure AI Agent Services, consider the following resources: Agent Service on Microsoft Learn Docs Watch On-Demand Sessions Streamlining Customer Service with AI-Powered Agents: Building Intelligent Multi-Agent Systems with Azure AI Microsoft learn Develop AI agents on Azure - Training | Microsoft Learn Community and Announcements Tech Community Announcement: Introducing Azure AI Agent Service Bonus Blog Post: Announcing the Public Preview of Azure AI Agent Service AI Agents for Beginners 10 Lesson Course https://aka.ms/ai-agents-beginners524Views0likes2CommentsAssistance on Microsoft Townhalls, Live events and Webinars
Dear All, We hope you're enjoying our new Teams Town Halls! To further support your event experience, we’re excited to introduce the Microsoft Live Event Assistance Program (LEAP)—a complimentary service designed to help you seamlessly plan and execute your events (New Teams Townhalls, Live events, Webinars) What Does LEAP Offer? This free program connects you with Microsoft event experts who can assist with: Training and demos Configuration support Assistance before, during, and after your Town Halls, webinars, or live events Whether you're transitioning from Teams Live Events to Town Halls or planning future events, our team is here to guide you every step of the way. How to Access Free Support To receive assistance for your Microsoft events, simply log a support case with our experts. Please bookmark or update the following links to submit your request: Microsoft events assist portal (LEAP) Microsoft free support for your events (LEAP) Important Notes for First-Time Users Profile Creation: On your first visit, you may be prompted to create a profile. If redirected to a form that doesn’t mention LEAP, simply revisit Live Event Assist after profile creation. When submitting your support request, please follow these guidelines: Product Family: Cloud and Online Services Product: Live Events Assistance Program (LEAP) Support Type: Professional No Charge Issue Description: Title: Live Events Assistance Request Event Date and Duration Event Location Note: Use your work contact details (corporate email). Personal accounts such as Outlook or Gmail are not supported. If you're an event attendee, please contact your event host for assistance. Additionally, our team can assist with Microsoft eCDN-related queries. Learn More To explore the full benefits of the LEAP program, visit: Microsoft Virtual Event Guidance We look forward to helping you make your events a success!154Views0likes0CommentsMondays at Microsoft | Episode 44
Busy last few weeks, with the SharePoint Hackathon and planning for the Microsoft 365 Community Conference. Stay in the know with Mondays at Microsoft. Karuana Gatimu and Heather Cook keep you grounded with the latest in #AI, broader Microsoft 365 product awareness, community activities and events, and more. Join live on Monday, March 10th, 8:00am PT. #CommunityLuv 💖 Resource links mentioned during the episode: (Note: Coming soon | We add all links and show notes at the completion of the live episode)369Views0likes26CommentsSurface Hub 3
Good afternoon I ran into an issue with the surface hub; so I'm attempting to cast the screen from my surface hub to multiple monitors (TV/Displays) and I'm not finding an option to. Where can I find the options menu to cast to an external display? I've found that there's an accessory that does it (I think a wireless adapter?) is there a way to connect without the need to cord connections? Thank you!46Views0likes1CommentExpert Insights: AI PCs and your technology strategy with Microsoft, Intel, and Forrester
Workplace AI is becoming as common as word processors and spreadsheets. And tangible AI benefits like better decision-making, increased productivity, and better security will soon become must-haves for every business. Early movers have an opportunity to gain a competitive advantage with AI adoption. But doing so requires a strategic approach to device choice that leverages technological advancements early—such as laptops and 2-in-1s with breakthrough AI capabilities. These devices are now easy for any business to obtain in the form of AI PCs from Microsoft Surface. Because they contain a new kind of processor called an NPU, they can run AI experiences directly on the device. Just as CPU and GPU work together to run business applications, the NPU adds power-efficient AI processing for new and potentially game-changing experiences that complement those delivered from the cloud. In a recent Microsoft webinar with experts from Forrester and Intel, leaders discussed how a thoughtful AI device strategy fuels operational success and positions organizations for sustained growth. In this blog post, we’ll examine a few key areas of AI device strategy. For more, watch the full webinar here: How device choice impacts your AI adoption strategy Focusing on high-impact roles An effective AI device strategy requires organizations to identify roles that gain the most value from AI capabilities. Data-centric functions—such as developers, analysts, and creative teams—depend on high-speed data processing, and AI-ready devices help these employees manage complex workflows, automate repetitive tasks, and visualize data-driven insights in real time. Choosing AI-enabled endpoints is not just about the NPU. High-resolution displays and optimized screen ratios, for example, support high-impact roles by providing ample workspace for AI-assisted analysis, modeling, and design work. Starting with on-device AI for these functions helps drive rapid value and motivates other teams to see the potential in AI-powered workflows. The phased rollout of AI devices builds a foundation for broader AI integration. Data governance remains central to technology’s advantage Data privacy and security enable confident adoption of AI tools. One benefit of devices with NPUs is that they allow AI to be used in scenarios where sending data to the cloud is not feasible. It’s also important to consider the general security posture enabled by a device. Hardware-based security features such as TPM 2.0 and biometric authentication help protect device integrity, supporting AI usage within a secure framework. With built-in protections that include hardware encryption, secure user authentication options, and advanced firmware defenses, AI-enabled devices create a trusted environment that upholds privacy standards and aligns with organizational compliance requirements. Choosing devices like Microsoft Surface that fit seamlessly into a wide range of device management setups supports faster adoption and reduces risk. Balancing advanced AI features with stable performance AI-enabled devices bring unique processing capabilities that don’t compromise the reliability of core functions. Specialized processors dedicated to AI workloads manage intensive tasks without drawing from the main CPU, preserving battery life and maintaining consistent performance. This balanced approach supports both advanced AI capabilities and essential day-to-day operations, providing employees with stable, responsive tools that adapt to their needs. AI-driven interactions, like responsive touch, intuitive inking, and enhanced image processing, further improve user experience. High-quality cameras and intelligent audio capture, for instance, optimize interactions in virtual meetings and collaboration, making these devices versatile and effective across different work scenarios. By focusing on the user experience, organizations empower teams to take full advantage of technology without a steep learning curve. Aligning IT and business goals for an effective AI strategy A strong AI device strategy brings together IT priorities and broader business objectives. While IT teams focus on security, manageability, and integration with existing infrastructure, business leaders aim to increase efficiency and support innovation. Aligning these goals enables a smooth AI adoption process, allowing organizations to leverage AI’s capabilities while meeting essential technical requirements. Strategically investing in devices with integrated security and manageability features, such as remote management of device settings and firmware updates, gives IT greater control over deployment and maintenance. This integrated approach allows organizations to keep their AI device strategy aligned with long-term goals, reducing the need for costly upgrades and enabling teams to work within a secure, adaptable tech environment. Supporting employee workflows with AI tools AI-enabled devices enhance productivity by automating repetitive tasks and giving employees more time to focus on high-value work. Tools like intelligent personal assistants and voice-driven commands support employees by streamlining tasks that would otherwise require manual effort. Enhanced typing experiences and personalized touch interactions improve user engagement, making AI tools easier to integrate into everyday workflows. With customizable features and inclusive design options, AI-enabled devices make advanced technology accessible to all team members, increasing satisfaction and reducing turnover. By enabling employees to focus on higher-level work, organizations can create an environment that supports meaningful productivity and helps retain talent. Proactive IT management with AI-driven insights Beyond the device, AI also offers new capabilities for device management, allowing IT teams to proactively monitor and resolve potential issues. By analyzing device usage patterns, AI can detect anomalies early, enabling IT to address risks before they impact employees. This shift from reactive to proactive management improves device reliability and reduces downtime, freeing IT resources to focus on broader strategic initiatives. Integrated AI security tools also improve protection, identifying threats as they emerge and securing devices with minimal manual intervention. With insights derived from AI-driven monitoring, IT teams can maintain secure, reliable systems that enhance overall operational stability. Crafting a forward-looking AI device strategy A structured AI device strategy prioritizes both immediate and long-term ROI by examining where new technology can have the greatest impact while also enhancing existing capabilities. By acting early, organizations position themselves to gain speed with AI and adopt the latest advancements as they are released. Whether you’re beginning with AI or looking to expand its role, a well-designed AI device strategy keeps your organization prepared for growth. To explore how AI-enabled devices can drive your team’s success, gain insights from experts at Forrester and Intel by watching the webinar: How device choice impacts your AI adoption strategy.285Views1like0CommentsMicrosoft 365 Champions community call | October 2024 | AM
Get up-to-speed on the latest Microsoft Lists innovation and how it helps keep your sanity intact when tracking information. Be it in the early creation phase or in an ongoing flow of managing status and keeping everyone in sync - learn how to go from not-in-the-know to PRO! We'll cover updates and insights across the Lists app, mobile value, Power Platform integration, within Teams collab, and more. Expect lots of demos of the latest features grounded in scenarios that resonate with everyone. Plus, lots of time for Q&A throughout + updated roadmap info on what's coming next. Learn more about Microsoft Lists: https://aka.ms/MSLists. Host: Tiffany Lee Guests: Mark Kashman and Nate Tennant Moderator: Jessie Hwang Each call includes live Q&A, where you can ask questions about Microsoft 365. To ask questions during the call, post them via "Comments" on this page below. There, too, was the PM option: https://aka.ms/M365ChampionCallPM. Champions combine technical acumen with people skills to drive meaningful change. Join the Microsoft 365 Champion program today: https://aka.ms/M365Champions. Note: If you are unable to watch the recording on YouTube, try watching it here.5.7KViews2likes37CommentsMicrosoft 365 Champions community call | October 2024 | PM
Get up-to-speed on the latest Microsoft Lists innovation and how it helps keep your sanity intact when tracking information. Be it in the early creation phase or in an ongoing flow of managing status and keeping everyone in sync - learn how to go from not-in-the-know to PRO! We'll cover updates and insights across the Lists app, mobile value, Power Platform integration, within Teams collab, and more. Expect lots of demos of the latest features grounded in scenarios that resonate with everyone. Plus, lots of time for Q&A throughout + updated roadmap info on what's coming next. Learn more about Microsoft Lists: https://aka.ms/MSLists. Host: Tiffany Lee Guests: Mark Kashman and Nate Tennant Moderator: Jessie Hwang Each call includes live Q&A, where you can ask questions about Microsoft 365. To ask questions during the call, post them via "Comments" on this page below. You can now review and engage within questions that were posted during the event; new comments are now off for this past event. Champions combine technical acumen with people skills to drive meaningful change. Join the Microsoft 365 Champion program today: https://aka.ms/M365Champions. Note: If you are unable to watch the recording on YouTube, try watching it here.2.4KViews0likes22CommentsUnlock Outlook Productivity with Snooze and new Calendar Scheduling with Copilot
Hey everyone, welcome back! If you're looking to supercharge your productivity, especially with Outlook, you're in the right place. Today, we're diving into some really cool and amazing features in Outlook that can help you stay on top of your game. Snooze Feature in Outlook First up, let's explore the Snooze feature in Outlook. This feature has been around for a while, but it's perfect for those moments when you need to temporarily set aside emails. Whether you're at an event and need to push emails back until you return, or you just need to prioritize your inbox, the Snooze feature is incredibly useful. For example, I often use it when my workload is packed. I can snooze an email until next Monday at 9:00 a.m., which is my focus time. This way, the email is removed from my inbox, helping me stay focused on my current tasks. If you're wondering where the email goes, it will pop back into your inbox at the scheduled time. You can also view all your snoozed emails in the Snooze folder and unsnooze them if needed. This feature is great for maintaining an organized and prioritized inbox. How to Use the Snooze Feature: Open Outlook and go to your inbox. Select the email you want to snooze. Click the Snooze button (clock icon) at the top of the ribbon. Choose a predefined time or select Pick a date to set a custom time. The email will be removed from your inbox and reappear at the scheduled time. To view snoozed emails, go to the Snoozed folder on the left sidebar. Scheduling with Copilot Next, let's talk about scheduling with Copilot. This feature is a game-changer for managing your calendar. When I first joined Microsoft, I found it overwhelming to network and establish new relationships. That's when I discovered this powerful tool. For instance, if I receive an email from a colleague and need to have a broader conversation, I can use the "Schedule with Copilot" feature. It automatically schedules time with the colleague, finds available slots, and even creates an agenda for the meeting. This helps ensure that everyone is prepared and knows what to expect. It's a fantastic way to streamline scheduling and make meetings more efficient. How to Schedule with Copilot: Open the email from the person you want to schedule a meeting with. Click the Schedule with Copilot button at the top of the ribbon. Select Schedule with Copilot. Copilot will find available times for both you and the other person. Review the suggested times and agenda, then click Send to schedule the meeting. Upcoming Feature: Scheduling 1-on-1 Meetings with Copilot Lastly, I want to give you a sneak peek at an exciting upcoming feature: scheduling 1-on-1 meetings with Copilot. This feature is expected to roll in December and January and will make scheduling individual meetings even easier. Copilot understands the context of your emails and can look at both your calendar and the other person's calendar to find the best time for a meeting. After opening the event Copilot created you can even use Copilot to draft an agenda based on the email content, ensuring that your meetings are productive and focused. This feature is particularly useful for maintaining regular check-ins and building strong working relationships. How to Schedule 1-on-1 Meetings with Copilot: Open Outlook and select the Copilot icon at the top right. Enter your prompt to Schedule a 1-on-1 meeting. Enter the name of the person you want to meet with. Copilot will find available times for both of you. Review the suggested times and agenda, then click Send to schedule the meeting. I hope you find these features as exciting and useful as I do. They have certainly helped me become more efficient and organized in my daily work. Whether you're looking to prioritize your inbox, streamline your scheduling, or prepare for upcoming features, Outlook has the tools you need to boost your productivity. Thanks for reading, and I hope these tips help you make the most of Outlook. Have a great day, and I'll talk to you later!🎙️Podcast: Microsoft Ignite E03
🎙️#Podcast: Microsoft Ignite E03 I had an incredible time chatting with @liorbela.bsky.social in my latest #MSignite podcast episode, where we delved into key highlights from Microsoft Ignite 2024 and exciting developments in the Intune world #msintune Youtube: https://youtu.be/mnxHRLz3EMg?si=pab6wByZpQ2tnf5P7Views0likes0Comments