This virtual panel discussion series will feature brief, informative yet interactive discussions in a 30 minute or less format to help you take in and learn some key features and best practices while using Dynamics 365 and CRM. These panels will consist of Dynamics 365 CRM end-using members and subject matter experts across the Dynamics 365 and CRM Community who will share a tip or best practice and field your questions thereafter.

In this webinar, we are going to see how you can store documents in SharePoint Online and how we can secure those documents through its security features. To use the document management functionality, you need to enable the server-based SharePoint integration on a site collection in SharePoint Online. Note that installing the Dynamics 365 list component was previously used for earlier versions of SharePoint on-premises and is not required for SharePoint Online and later versions of SharePoint on-premises. ​

With defensive programming, the main idea is that if a function is passed bad data it won’t be hurt, even if the bad data is another function’s fault. More generally, it’s the recognition that programs will be modified later on and will have problems, and that a smart developer will write their code to account for this. In this session you’ll learn how to protect yourself from the cold, cruel world of invalid data, events that can “never” happen, and other developers’ mistakes.

Join fellow users in your quest for certification with Microsoft Dynamics 365! Study Group sessions are round table discussions across a variety of topics and themes applicable to the Microsoft Certification listed. Please review the following topics for this week’s discussion on the MB200 Certification (Microsoft Power Platform + Dynamics 365 Core): Manage Entities 

There are a TON of hidden treasures in the Role Center in Business Central! Learn how to use Profiles correctly to suit the job you do every day. Understand how personalization can make you incredibly efficient. Get rid of all the things you really don’t need, and highlight the things you use daily in a way to get to them with a single click. Ready to reduce the complexity in your Role Center? This session will make it SIMPLE!

This link to the Microsoft Community site will show you how to configure your systems to protect your Microsoft 365 cloud environment from on-premises compromise. The author, Alex Weinert of Microsoft, primarily focuses on Azure AD tenant configuration settings, the ways Azure AD tenants can be safely connected to on-premises systems, and the tradeoffs required to operate your systems in ways that protect your cloud systems from on-premises compromise.

In this session, we’ll show you how easy it can be to mistakenly create what seems to be a useful dashboard in Excel or Power BI, but isn’t truly relevant due to poor data management. Then we’ll walk through best practices and tools for effective data organization and governance processes so you can ensure you’ll always walk away with what are helpful, accurate dashboards that will drive competitive, stellar results.​​

So your organization has decided to take the plunge and invest in a cloud service provider (CSP): Microsoft Azure. Maybe this is voluntary or alternatively through mergers and acquisitions, but the fact remains the same: Azure is likely an extension to your organizations’ on-premises enterprise network. Whether your organization is configured for a hybrid (cloud/on-premises) or completely cloud-native architecture, there are extensive security considerations. Azure is a fast-moving train; the technologies, services and integrations are constantly changing. Cloud service adoption rates are increasing, and an understanding of the Azure services, architecture, and security is critical. We’ll discuss many of the core security features and considerations that are fundamental tenets of a secure Azure environment.  Additionally, we will touch on a business continuity strategy in the event federation fails or on-premises service is no longer available. It is an ambitious topic, but one that will help you better approach and prioritize your Azure hardening initiatives.                                                                                                                                

Role-based security and the concept of “Teams” are two of the powerful building blocks provided by D365 CE for a successful security design. Proper utilization of security roles requires an understanding of privileges, access levels, and how to properly setup your system organization hierarchy to serve as the dependable foundation. In this presentation, we will discuss how to modify out-of-box roles to create custom security roles tailored for your organization and how to utilize “Teams” for improved flexibility within your security hierarchy.The content of this session is geared toward an audience with beginner-level knowledge of the subject area.

Do you really know what’s going on in your database? Are you sure you’re not affected by some of the most common data quality & integrity problems?

In this session, I’ll present some free tools and queries to find some of the less visible data quality problems and discuss how to fix and prevent them.

The content of this session is geared toward an audience with intermediate-level knowledge of the subject area.

We will discuss the myriad ways to do data repair in GP, we’ll cover normal repair scenarios and go through the best practices for advanced or complex data repair in GP.  We will also be reviewing the myriad tools at your disposal for ensuring you efficiently and accurately get the data repaired with low risk to your employer or client.  Some little known tools will also be shown (free tools) that you can use to your advantage for accurately repairing or cleaning up data!  Some of these tools will be given to you! Tons of tips, tricks and resources to help.

This session is geared for an audience with an intermediate skill set.

This session will be available for CPE credits pending completion of session survey post event.

With the release of Azure Data Lake and surrounding technologies, it is easy to see why there is hope within the AX and F&SCM communities for a better reporting solution than BYOD. Attend this session to gain a fundamental understanding of what an ADL project may entail, its time frame, estimated cost, and the resulting reporting options available to finance teams to make meaningful business decisions. It’s always best to have clear visibility and understanding of the full implementation cycle before making an investment in a new technology.