Good insights start with good data, and knowing what data to pull from your BC / NAV system, and how, makes all the difference. There are a lot of options available – XMLports, RapidStart Services, OData feeds, Excel – but what should you and your users employ for which purposes? We’ll start with real examples of each, then drill down into RapidStart to ensure you have a thorough understanding of this invaluable tool. We’ll address when and when not to use Configuration Packages, a step-by-step guide of how to create and modify Configuration Packages, and how to use the Configuration Worksheet.

Some companies have allowed a large number of workers to work remotely in the past, others have not until the Coronavirus arrived. Security and access to data, like the rest of your business processes in these challenging times, needs to now be looked at a bit differently. In this webinar, we will review the steps you and your company can put in place to ensure application and user security is not compromised with a remote work force. The good news is that more than likely your company probably has many techniques in place already, or in place and ready to easily implement. However, there are some controls that are often overlooked, and a since ‘a chain is only as strong as its weakest link,’ it is critical all security controls are addressed accordingly. We will highlight these commonly overlooked controls as well in this webinar. ​​

Microsoft Power Query is the transformation engine in Power BI. This is the engine that you do all data preparation before loading data into the model. This is the keystone of your Power BI solution. In this session, you will learn what Power Query can do. You will learn how M, the language behind the scene of Power Query, can be more beneficial than the Power Query graphical interface.

We get the most value from Power Platform when we truly embrace it as a platform. In other words, while the component parts — Power BI, PowerApps, Flow, Common Data Service, and even Dynamics — are incredible tools in their own right, the more we knit them together, the more valuable they become.

But how do larger organizations truly adopt that platform at scale? How do we maturely infuse enterprise management, governance, and best practices into our adoption such that we empower our business users to buil

Presented by: @Kristine Dyess
 
As Power Pivot and Power BI consultants at PowerPivotPro, we see a lot of data models. We will review data model best practices and reasons why one approach may be better to adopt versus another approach. We will explore data models built in a traditional database environment like SQL and data models built using Get Data/Power Query. Join me for tips and tricks that will enable you to review your existing data models and ensure you’ve got good data models!#UnifiedOperations#CustomerEngagement#Intermediate

How do you know who has access to what? What are the best practices for managing your BC/NAV security? We’ll discuss how to create a good process to make sure employees can do what they need to and not what they aren’t supposed to. This session will cover the steps required to set up a new user in BC/NAV. We’ll also review the processes to assign permissions, manage user groups, set up warehouse security and how to create customized permission sets including a demonstration of the permissions recorder. Bring your questions, real life stories, and be prepared to share how you manage BC/NAV security in your company. This session will combine How-To presentations with interactive discussions to share best practices and fresh ideas.
Learning Objectives:
How to create a new user.
How to assign permissions to users.
How to create and manage permissions.

Join fellow users in your quest for certification with Microsoft Dynamics 365! Study Group sessions are round table discussions across a variety of topics and themes applicable to the Microsoft Certification listed. Please review the following topics for this week’s discussion on the MB200 Certification (Microsoft Power Platform + Dynamics 365 Core): Implement Security.​​