Für ein bestmögliches Web-Erlebnis verwenden Sie IE11+, Chrome, Firefox oder Safari.

Building Approval Processes in Power Apps

Building Approval Processes in Power Apps 40:03
Forms and documents are everywhere in your organization, and a lot of them must go through an approval process. Power Apps is such a flexible platform, it provides us with a blank canvas that can be used to build forms and an approval interface. In this session, you’ll learn how you can build these business processes directly into each Power App, so that the user interface for request submission and approval is seamless. Laura Rogers will teach you how to use logic and Microsoft/SharePoint lists, and present forms and approval buttons in an app, so that approvals and tasks aren’t located in disparate systems. You can use this method across each request form and approval process in your organization! The concepts in this session are applicable to SharePoint Online with Microsoft 365, and Power Apps canvas apps.

Related videos

Teams + Power Platform App Templates: Real World Scenarios to Empower your Business
Teams + Power Platform App Templates: Real World Scenarios to Empower your Business

Microsoft Teams plus the Power Platform can make for some really powerful solutions to help streamline your organization's business processes. You can build apps from scratch or utilize any of the pre-built app templates Microsoft published and made available for free on GitHub. In this session we will walk through the current available Power Platform app templates, as well as demonstrate the most common ones, such as building access to Request-a-Team app and the Incentives app.

Protect Microsoft Teams + SharePoint with Azure Sentinel against Cyber Security Threats
Protect Microsoft Teams + SharePoint with Azure Sentinel against Cyber Security Threats

Microsoft Teams and SharePoint serve central roles in communication and data-sharing in the Microsoft 365 Cloud. Since both workloads touch on so many technologies in the Cloud, it can benefit from human and automated analysis. This applies to both hunting in logs, and real-time monitoring of meetings. Azure Sentinel offers admins these solutions. Topics: Introduction to Azure Sentinel, Setup and Planning, Collecting Data: Connectors for Office 365, Normalizing, Monitoring and Visualizing Data, Investigate threats and Helpful hunting KQL queries, Auditing external users, Bots and Apps, Automate responses, Roadmap

Microsoft 365 DSC: How to Set Up an Office 365 Tenant from Scratch and Stop Configuration Drift
Microsoft 365 DSC: How to Set Up an Office 365 Tenant from Scratch and Stop Configuration Drift

Microsoft 365 can be a challenging task to enforce configuration management across the multiple workloads, whether administrators are only tasked to focus on one workload or multiple workloads. In this session we will be going over the Microsoft 365 Desired State Configuration module, and explain how to set up the module and deploy an initial configuration to a Microsoft 365 tenant. You’ll also see how to extract a backup of the tenant configuration and show how the module works against updated configuration to detect changes in the environment.

Supercharge Your Security Operations with Microsoft Defender for Endpoint
Supercharge Your Security Operations with Microsoft Defender for Endpoint

In this challenging cyberthreat landscape, it’s important to keep control over what's happening in your environment, provide sufficient protection and gain visibility in what's happening across your digital estate. A balanced security approach considers many elements; not in the least your devices and endpoints! In this session, Michael Van Horenbeeck will show how Microsoft Defender for Endpoint is the catalyst for successful security operations. Based on real-world experience and examples, we will walk through the platform, how to best deploy and manage it, and how you can leverage its features to increase identification, protection, detection and response capabilities.

What is Microsoft Teams?
What is Microsoft Teams?

Join Microsoft experts as they explain how Microsoft Teams can take your organization’s collaboration to the next level.

Tips for improving Office 365 security
Tips for improving Office 365 security

Join Susan Bradley, Microsoft Security MVP, as she discusses best practices to improve your O365 security.

Throttling Stinks (And What You Can Do About It)
Throttling Stinks (And What You Can Do About It)

Microsoft uses a variety of techniques to control the load that customers put on their services. Most of these techniques are painful and/or annoying to end users and tenant administrators. Come to this session to learn about MS' throttling mechanisms, what behaviors are likely to trigger them, and practical approaches to lessen the damage they do to your tenant performance during migration, backup, and other common scenarios. Caution: may include spicy language.

The Impact of Microsoft Teams Growth
The Impact of Microsoft Teams Growth

Join Chris McNulty, Sr. Product Manager at Microsoft, and learn how Teams impacts your IT strategy.

The Experts Conference Virtual. December 6-7, 2022
The Experts Conference Virtual. December 6-7, 2022

Access all of the amazing content from THE Microsoft training event of the year – The Experts Conference – in a virtual format. Like all TEC events, our 2022 virtual conference was filled to the brim with practical Active Directory and Office 365 education straight from renowned Microsoft MVPs and industry experts. The live conference has ended, but you can still access any of the sessions from the live event. If there’s anything you missed, or want to watch again, it’s all available now on demand. That’s right, every session – from the in-depth Microsoft 365, Microsoft Infrastructure Security, and On-Premises & Hybrid Management and Migration tracks – is available to watch from the comfort of your home at any time. And as always, this event was brought to you by the leaders who have helped move, manage and secure more than 336 million Active Directory users: Quest Software.

The Experts Conference 2023 Keynote: Alex Crowther
The Experts Conference 2023 Keynote: Alex Crowther

What are the most serious security risks facing your organization? Dr. Alex Crowther, Military and Cyber Strategist & International Affairs Specialist, shares his vision at TEC, Sept 19-20, 2023.

TEC 2022 is returning in person to Atlanta, September 20-21, 2022
TEC 2022 is returning in person to Atlanta, September 20-21, 2022

THE Microsoft training event of the year – The Experts Conference (TEC) – is back in 2022 as an in-person event in Atlanta, September 20-21, 2022. If you’ve been craving face-to-face Microsoft training, TEC 2022 is the answer. Like previous TEC events, our 2022 conference will be filled to the brim with practical Active Directory and Office 365 education straight from renowned Microsoft MVPs, industry experts, and of course, your IT peers. You’ll be able to join in-depth training tracks on Hybrid Active Directory Security, Office 365 and/or Migration & Modernization. And as always, the event is brought to you by the leaders who have helped move, manage and secure more than 336 million Active Directory users: Quest Software.

Successfully Manage Microsoft Teams
Successfully Manage Microsoft Teams

Join Tony Redmond, Microsoft Office Apps & Services MVP, as he shares tips on managing Teams.

Security After Dark: What makes a secure life after you leave the office?
Security After Dark: What makes a secure life after you leave the office?

Our families, friends and neighbors are all refining their hacking skills. But what is this doing to the idea of identity? What is an identity for you and your family in the 2020s? How is identity devolving and creating itself with each new service we sign up for? What about things we use that aren’t tied to our personal identity? What happens when your IOT house plants, lights or home has a service account? Managing identity is more than MFA and complex pass phrases for today’s individuals. In this session, Chris Dancy explains why we must go back and look at the tentacles of personal identity stretching through our devices, apps, services and sensors.

Secure that Active Directory Migration
Secure that Active Directory Migration

Opportunity makes a cybercriminal, and this is truer than ever during a critical and time-sensitive Active Directory migration when a lot of doors are swinging open. Personnel attrition due to an M&A, integrating with legacy systems, and rushed timelines create ample opportunities for attackers to target your organization. Legacy migration methodologies have historically required opening up the environment to significant security risks, including ransomware attacks, SIDHistory injection, elevated permissions, Group policy hijacking and more. This session will focus on the security missteps to avoid before, during, and even after an AD migration project so that it doesn’t become a resume updating project. We’ll look at real-world examples and give helpful advice to: • Avoid M&A IT integration missteps • Protect yourself from security breaches • Achieve data security • Reap the benefits you expect from your M&A • Ransomware attacks • SIDHistory Injection • Elevated permissions • Group Policy hijacking • And more.

Notes from the Field: Microsoft Sentinel in real-life
Notes from the Field: Microsoft Sentinel in real-life

While there is an abundance amount of information about Microsoft Sentinel, it takes time to find out what is marketing speak and how the product actually behaves. With his experience implementing Microsoft Sentinel in multiple organizations, This will walk through real-life scenarios and provide tips and tricks on how to set up your environment. These tips will range from thoughts about the machine learning algorithms, the built-in rule templates and integrations into your day-to-day operations.