<
Category: Office 365
Office 365
Enabling Teams Meeting report download capability
Meetings in Teams is one of the most popular functionality that being used by millions across the world. The ability to download reports for meeting attendance would be very useful for meeting organizers to view the attendance of the meeting/s. In the recent Teams update, Microsoft added this functionality to Teams, but it is disabled by default, and you will not be able to use it out-of-the-box unless you enable it (for everyone or a specific target group). This post will guide you to get this done.
Note: There’s a still a limitation to this where you can’t download the report after the meeting ended. You will have to download it while participants are still in the meeting.
Steps:
- Log in to Teams admin centre meeting policies blade and create a new policy using the ‘+’ sign – https://admin.teams.microsoft.com/policies/meetings
Policy Title – MeetingPolicy_ReportsEnabled
Description – Meeting policy with reports download feature enabled
General
Allow Meet now in channels – On
Allow the Outlook add-in – On
Allow channel meeting scheduling – On
Allow scheduling private meetings – On
Audio Video
Allow transcription – On
Allow cloud recording – On
Mode for IP audio – Outgoing and incoming audio enabled
Mode for IP video – Outgoing and incoming video enabled
Allow IP video – On
Allow NDI streaming – Off
Media bit rate (Kbs) – 50000
Content sharing
Screen sharing mode – Entire Screen
Allow a participant to give or request control – On
Allow an external participant to give or request control – On
Allow PowerPoint sharing – On
Allow whiteboard – On
Allow shared notes – On
Participants and Guests
Let anonymous people start a meeting – off
Roles that have presenter rights in meetings – Everyone, but user can override
Automatically admit people – Everyone
Allow dial-in users to bypass the lobby – On
Allow Meet now in private meetings – On
Enable live captions – Disabled but the user can override
Allow chat in meetings – Enabled
Hit save to apply the changes
- Then enable the Meeting reports feature, run the following commands in PowerShell (this requires admin access)
$sfbSession = New-CsOnlineSession
Import-PSSession $sfbSession
Set-CsTeamsMeetingPolicy -Identity “MeetingPolicy_ReportsEnabled” -AllowEngagementReport Enabled
Use this command to verify the settings. Ensure the AllowEngagementReport parameter value is “Enabled”
Get-CsTeamsMeetingPolicy -Identity “MeetingPolicy_ReportsEnabled”
- Finally set this policy to the intended users manually by going to each users Teams profile –> Edit the Meeting Policy for the user –> Change the policy asignment to the new Policy just created (MeetingPolicy_ReportsEnabled) and hit “Save”
During the meeting, you’ll see the following option to download under the “People” section.
Provisioning bulk distribution lists
Its ideal to avoid distribution lists wherever possible and adopt Microsoft 365 groups instead however, we can’t apply it for every scenario as DLs are still very useful and in some cases the only option you have. This post will showcase the steps to provision DLs in bulk (in Exchange Online)
Steps:
1. Create a 3 column simple CSV file as shown below and save it locally in your PC as “DL_Pilot.csv”
2. Login to Exchange online PowerShell module
Connect-ExchangeOnline
3. Run the following command (set the location to match yours) and point the path to your previously created CSV file.
Import-CSV “C:\Official\Mantoso\DL_Pilot.csv” | foreach {New-DistributionGroup -Name $.name -Type $.Type -PrimarySmtpAddress $_.email}
That’s it. It’ll simply provision the DLs defined in the the CSV (sample below)
Fixed: Outlook desktop unable to render SharePoint hosted images embedded in to mail body through PowerAutomate send email action
This post comes out from a recent support experience to one of my clients. He was trying to use Microsoft PowerAutomate flow to embed a SharePoint library hosted image in to an email notification which sent regularly across the organization for all users. Usual way for doing this is using the <img src tag in the send email action but interestingly, these behaviors was a showstopper until I figured out the solution after several hours (described at the end of the article).
Behaviors:
- Embedded images from a SharePoint URL did not render in Outlook desktop App
- Same image renders in OWA (Outlook Web App) however, there was a slight delay in loading the image.
- Same image hosted in public hosting locations rendered nicely as well (e.g – https://www.w3schools.com/, Google etc..)
SharePoint hosted image in Outlook Desktop App: Strange enough !
External hosted image in Outlook Desktop App:
Tried and did not work for my case:
- Change the text format to HTMLOutlook client application (File -> Options -> Mail -> Compose message in HTML format). This was already in place for my scenario.
- Add the domain to safe/trusted sites in the browser settings
- Plethora of other solutions from Microsoft articles and forums
The real solution:
To overcome this issue, you simply have to use these additional lines in your email step. Add a compose action and point it to ‘Get file content using path’ SharePoint action (or you can directly add this line to the mail body HTML)
Add a new Compose action in to the PowerAutomate flow
Set the Expression as below (you can copy and paste this)
dataUri(outputs('Get_file_content_using_path')?['body'])
Amend the Mailbody to reflect the following or add the above mentioned expression directly to the HTML body. Either way should work.
<p><br> File content using path<br> <img src="@{outputs('Compose_2')}"></img> </p>
Full flow: Tested and working perfectly across web client and desktop client of Outlook
Result: SharePoint hosted image is now rendered perfectly in Outlook desktop App.
Root cause analysis:
The key point is the use of dataUri() to convert the file content to the right format that HTML can understand. An image or a file in general from a SharePoint link is not public link. Only authenticated users can view the image which is the root cause of this issue.
If a user logs in into Outlook on the web from a browser, their Microsoft identification data are stored locally within the browser context as cookies. As a result, when opening an email that contains a SharePoint link in HTML image tags, a request will be sent to SharePoint servers with the same identification and the image can be downloaded if the user has enough privilege.
It’s the same way that if you have already logged in into one of the google services, you won’t have to login again when accessing other Google services in deferent tabs.
On the other hand, Outlook client is simply an email application which does not share the same architecture as a browser. Outlook account credentials are stored differently and Outlook does not have mechanism to detect and pass credentials to other Microsoft services. Hence, when it sees a SharePoint link in HTML image tags, a request without any authorization data will be sent to the SharePoint servers and of course, it will be refused. If a hyperlink added to the email, clicking on the link will open a browser and you will need to sign in. In the end, the main purpose of Outlook client is for email-related tasks and it will not handle authentication for other services.
Remove orphaned delegation permissions of a deleted user in Exchange Online mailbox
You might think that a user’s delegate permissions for other mailboxes will be removed up on deleting the account in the Azure Active Directory, apparently it wasn’t in my case.
Scenario:
Location – Calendar folder of ‘manoj@mantoso.live:\Calendar’
Delegated editor permissions to – ‘Marie Jonas’ (Abandoned identity after AD account deletion)
Even though this particular account was permanently deleted from Azure AD after 30 days of marking deletion, the delegation access (editor) to other users’ Exchange mailboxes remained intact which caused the following strange behaviors that I had to get rid of.
- Others can still spot this user’s name in the calendar invites
- Possibly in other various occasions too based on the permissions the user had before deleted
Here’s the PowerShell command to fetch the permissions of a specific location. This will list down all the delegated permissions of ‘Manoj’s’ Exchange calendar. In my case, the abandoned user also popped up in the results.
Get-EXOMailboxFolderPermission "manoj@mantoso.live:\calendar"
Now, to dig further down to be more specific to this mysterious user, let’s run this command
Get-EXOMailboxFolderPermission "manoj@mantoso.live:\calendar" | where {$_.user.tostring() -like "Marie Jonas*"}
This means the permission thumbprint is intact even after the account was permanently deleted which is a mystery. Now to get rid of this, we can use this command below. I tried several other approaches from various Microsoft articles and forum posts but none of them worked but the following.
Get-EXOMailboxFolderPermission "<user@domian.com:\calendar>" | where {$_.user.tostring() -like "<FirstName Last Name>*"} | Remove-MailboxFolderPermission -Confirm:$False
After running that with no errors/warnings. I ran Get command again to verify if it really was a success. And Yes ! Nothing returned, which means the permissions are now cleared for this abandoned identity of ‘Marie Jonas’.
Allowed it a couple of hours, her name disappeared from the calendar invites as well.
Get-EXOMailboxFolderPermission "<user@domian.com:\calendar>" | where {$_.user.tostring() -like "<FirstName Last Name>*"} | Remove-MailboxFolderPermission -Confirm:$False
Enable Microsoft Whiteboard for Teams
Whiteboard in Teams is powered by Whiteboard for the web and this is a very useful feature for collaborating in group meetings. A shared canvas space allows meeting participants to collaborate. In Office 365, Whiteboard feature is enabled by default unless you disabled it manually (mostly customers disable it due to data residency concerns).
Microsoft Note: The ability to start a new whiteboard is currently limited to the Microsoft Teams clients on Windows 10, macOS, and for the web. The Teams apps for iOS and Android cannot initiate sharing a whiteboard, but they can collaborate once a whiteboard is shared.
Now let’s get this configured. Login to Office 365 Admin center using admin credentials and type ‘Whiteboard’ in the global search field. You will get the Whiteboard global settings option in a search result dropdown.
Check the ‘Turn on’’ tick box to enable it globally in your Tenancy. Diagnostic data collection by Microsoft is disclosed via three options here.
Connected experiences and sharing from Surface Hub are two optional settings depending on the organizational requirements. Finally hit ‘Save’ to complete it.
Now the global setting is enabled, we need to ensure the Whiteboard capability is also enabled in the Meeting policies. If you have multiple policies, make sure this is enabled for all of them to affect it to the desired target audiences.
From the Teams admin center, navigate to Meetings –> Meeting policies
Then click on the desired policy (in my case, the ‘Default’ as it affects to all users)
Toggle the ‘Allow Whiteboard’ switch to ‘On’ state to enable it and hit ‘Save’
Notes: This might take a couple of ours to reflect to all users (in my case it took 7+ hours).
Testing the feature.
- Now to try this out, you can create a test meeting with another user and ensure the Whiteboard is appearing once ‘Share’ option is clicked.
- Also, if you login to office.com, you should be able to see the ‘Whiteboard’ App under the Apps list.
Troubleshooting:
If you still don’t see the feature in Teams meetings, try to toggle ‘Off’ the Whiteboard feature from Teams meeting policy. Then turn in it on again and try it in a couple of hours.
Error when accessing Exchange Online classic Admin Center (EAC): 403 Access denied :(
We have been pulling our hair out for several days due to this issue. Office 365 Exchange admin center gives the following error whereas the new admin center worked well.
when you click that “Exchange” blade from the Office 365 admin center, it usually takes you to the classic Admin center which we still need for some functions that new Admin center doesn’t have.
After lots of struggle, we managed to figure out the Root cause and reported to Microsoft through an incident.
Root cause: Group based access assignments in Privileged Identity Management.
Workaround: We had assigned Azure AD Roles such as Global Administrator, Exchange Administrator via Group based PIM which did not work properly with classic EAC. Assigning Direct permissions fixed this and we managed to open the classic console immediately, right after the direct assignment. If you are facing the same, try to get rid of “Group Assignments” for Exchange Admins at least for the time being and go for “Direct Assignments”
Official reference: https://docs.microsoft.com/en-us/azure/active-directory/roles/groups-concept
I will update this post up-on Microsoft’ support responses.
Renew Apple MDM Push Certificate in Microsoft Endpoint Manager (Intune)
Apple MDM Push certificate is the key element for Microsoft EndPoint Manager to manage iOS/iPadOS and macOS devices in the MEM portal. After you add the certificate to EndPoint Manager, your users can enroll their devices using: The Company Portal app or Apple’s bulk enrollment methods such as the Device Enrollment Program (a.k.a DEP), Apple School Manager, or Apple Configurator.
This renewal is crucial: Ensure that you take necessary actions before the expiry date as revoking or allowing this certificate to expire will require existing devices to be re-enrolled with a new push certificate.
Prerequisites for renewal:
- Apple Identity portal account (mostly different from the Apple ID) which was used to setup the integration for your organization. – https://identity.apple.com/pushcert/
-
MFA code (sends to the device registered for MFA under above account)
-
Appropriate access to MEM (Microsoft Endpoint Manager a.k.a Intune portal) – https://endpoint.microsoft.com/
First we need to sign-in to MEM portal using your admin credentials copy paste this link and sign in https://endpoint.microsoft.com/
Navigate to Devices blade from the left panel and go to Apple iOS/iPadOS enrolment section as shown below and then click on ‘apple MDM Push Certificate’ widget
From the screen popped up, simply click on download CSR file on the 2nd option. Save it to a secure/temporarily location as we will delete this after the renewal.
Let’s now switch in to Apple Identity portal. This is where you need the original credentials which was used to setup the integration with Intune. Login from that account to this site – https://identity.apple.com/pushcert/
You can avoid MFA using other options but this may not be the same in your case. Hence make sure you have the device associated to the account to receive the MFA code. Hit ‘Continue“’ to enter the code or go to ‘other options’ to avoid it.
Highly recommended to associate a mobile device for MFA if you haven’t already, or, chose ‘don’t upgrade’ option to avoid it.
Once logged in, you will see all your certificates listed with the expiry date stated.
That little ‘i” button will show you more details of each certificate if you have multiple (mostly used for different tenancies under a single account). Serial Number is the key to identity which is which from the Intune portal. Ensure that you are renewing the correct certificate by cross-checking the Serial No here againts Intune. Once confirmed, simply click on that ‘Renew” button above and you should see a new dialog box prompting.
Add a note to indicate who renew it which might be useful in a organization this will be done by another person next year.
And now choose the CSR file you downloaded from Intune and hit ‘Upload’
That’s it and you can see the green tick indicates everything went well. Simply download the certificate and store in the same secure location you store CSR previously.
You should see the new expiry date for this certificate now.
Let’s head back to MEM (Intune) portal now and upload the new certificate file there. You should also provide the original Apple ID which was used to create the MDM push cert. Once done, hit ‘Upload’ button.
That’s about it and now you will see a green status prompts indicates it went well.
Certificate should now be valid for another year !
Outlook Error: Unable to convert a generic Outlook meeting to a Teams meeting (online meeting)
Article Updated: This issue is now resolved
Due to the popular demand, Microsoft has re-deployed this feature on 14th September 2020. If you restart the Outlook, Teams clients and try to convert a occurrence now, you should be able to do so.
“This is one appointment in a series, To make it an online meeting, open the meeting series and try again”
Did you get this error just out of the blue in Outlook as well ? – If so, this is an ongoing issue with Outlook clients and you are not the only one impacted, and, not everyone impacted either. Recurring meeting in Outlook had the ability to edit one occurrence out of the series and we could convert these generic meetings in to Teams meetings (online meeting) until last week 14-08-2020). However this has somehow changed for some customers probably due to an Outlook/Teams update (not yet confirmed).
In my case, the following version of Outlook 2016 had the issue (and it’s not the only version impacted)
This may not be one of those common features used by majority but, it is indeed an important feature for those who are having busy calendars to manage.
Usually when you try to edit an single occurrence in a series.
It prompts you to choose a one or the entire series. The following steps are captured from my device as it seems not impacted.
The problem starts when you click on “Teams Meeting” icon to convert the meeting to a Teams meeting.
This is how it supposed to look like when it converted. You can simply send the update and the generic meeting will become a “Teams Meeting” and the meeting details will be inserted to the bottom of the screen.
So far I have tried the following but nothing made any difference.
- Clear Outlook cache and restart Outlook and PC
- Clear teams cache and restart
- Disable and enable Teams Add-in for Outlook
Workaround: (this is verified to be working): There is an alternative way of changing meetings using OWA for now. I truly understand this is frustrating but until Microsoft come back to us, perhaps Mary can use this workaround from Outlook Online ? (Web version from https://www.office.com )
Workaround: Outlook on the web is the only workaround as of now. It works well on OWA but if you have shared calendars it may not be the best option. To test it out follow these steps:
From outlook web, go to Calendar tab à from the desired series of events, double click on one of the occurrence in the series
And Edit “This Event”
Go to “More options”
And toggle the “Teams Meeting” switch next to room location
Then Save it. You should be able to see this occurrence has now set to a Teams Meeting.
There are many who impacted as per this forum post and keeps growing. If you are facing the issue as well, just post a comment there – https://answers.microsoft.com/en-us/msoffice/forum/msoffice_outlook-mso_win10-mso_o365b/cannot-add-teams-meeting-to-a-single-occurrence-of/fbf2db7e-e8b3-443f-bed9-ec1f9dd6ce31?messageId=517049e8-c2c4-4ff9-ae55-1a3e778999a2
I am currently working with a Microsoft support engineer to engage the backend team and will keep this post updated as soon as I have an update. If you have faced it too or have found a fix, please reach out to me on manojviduranga@hotmail.com and share the ideas !!
Update: Due to the popular demand, Microsoft has re-deployed this feature on 14th September 2020. If you restart the Outlook, Teams clients and try to convert a occurrence now, you should be able to do so.
Transfer ownership of a PowerApp using PowerShell
- PowerApps administration capabilities have considerably evolved from where it was and now we can easily transfer the ownership of a specific App using a simple PowerShell command. This article will cover that specific task.
However, If you look at the latest Power Platform Admin center (https://admin.powerplatform.microsoft.com/) you’ll figure out there’s nothing much we could do there as admins, so PowerShell comes again for the rescue.
PowerApps offers two separate PowerShell packages for Creators (a.k.a Makers) and Administrators respectively. Before you can do anything, you need this Admin module installed in your machine.
you can download the NUGPKG manually from the first link, or run the command below to install it directly.
- Microsoft.PowerApps.Administration.PowerShell (For Admins)
- Microsoft.PowerApps.PowerShell 1.0.1 (for creators)
Install-Module -Name Microsoft.PowerApps.Administration.PowerShell -RequiredVersion 2.0.1
Once you have the module installed, the following command will give you an idea of the number of apps created in your environment. This is important so that you can standardize the permissions and accessibility for all your Apps via proper governance.
Before we begin, here’s the first command to login to PowerApp service. Run PowerShell as admin and then execute this.
Add-PowerAppsAccount
This command will list-down all the apps in your environment with basic information for you to understand the App Name, Display Name Current Ownership etc..
Get-AdminPowerApp
To retrieve the current permissions for a specific PowerApp:
Get-AdminPowerAppRoleAssignment -AppName <APP ID>
This will list down the deep down information of a specific app including all assigned permissions for that particular app.
So now that we have all the information, to change ownership, we can either run this simple command and input the details as prompted, or use the full command below. To run this, ensure that you login from the new owner.
Set-AdminPowerAppOwner
If you get this error (Conflict) it means that the app is opened and being edited. Close all the session for this app and try to execute the command again.
This is the full command with all the parameters and inputs are predefined. The new Owner must run this command as it uses the current logged in user to execute the change.
Set-AdminPowerAppOwner -AppName '895a38f1-f3c3-4cb6-a2d4-64b199badb3d' -AppOwner $Global:CurrentSession.userId -EnvironmentName 'Default-f50d5133-e13c-4359-85f6-ef76484f4c32'
That should easily run and change the new Owner. However, the previous owner will still remain as a normal user which allows the new Owner to decide whether to keep remove. As new owner can use the User Interface to manage the app, he can simply manage the permission there.
Resources:
- https://docs.microsoft.com/en-us/power-platform/admin/powerapps-powershell
- https://docs.microsoft.com/en-us/power-platform/admin/environments-overview
- https://www.powershellgallery.com/packages/Microsoft.PowerApps.PowerShell/1.0.1
- https://www.powershellgallery.com/packages/Microsoft.PowerApps.Administration.PowerShell/2.0.1