August 2021 Weekly Newsletter – Week 2

August 2021 Weekly Newsletter – Week 2

Weekly Newsletter

“Start the week with the best way!

Get our Weekly Newsletter and stay Up-To-Date!”

Contact Us 


This new group policy, AllowNonAdminUserInstallLAPs, setting controls whether users can install language accessory packs for Office even if they don’t have local administrator permissions on their devices. By default, Office users must have local administrator permissions on their devices to install language accessory packs. This policy will be applicable to the following products:

Microsoft Teams: Introducing background effects on web. If you want to change what appears behind you in your video meeting or call, you can either blur your background or replace it entirely with any image you want.

As organizations embark on cloud-centric business transformation to become more agile and operationally efficient, application modernization is fast becoming a cornerstone to realize these goals. In this blog, we will see how the Azure Migrate: App Containerization tool helps you accelerate application modernization as you migrate applications to Azure.

We will soon begin redirecting users from the legacy Office 365 Security and Compliance center ( to Microsoft 365 Defender portal (, for all security workflows including: Alerts, Threat Management and Reports.

Azure DDoS Protection Standard provides enhanced DDoS mitigation features to defend against DDoS attacks. It is automatically tuned to protect all public IP addresses in virtual networks. Protection is simple to enable on any new or existing virtual network and does not require any application or resource changes. Our recently released Azure built-in policies allow for better management of network security compliance by providing great ease of onboarding across all your virtual network resources and configuration of logs.

Coming soon to preview, Communication compliance policies that detect violations in Microsoft Teams will now analyze the content of documents shared in chat for potential policy match.

As customers adopt and scale their applications in Azure, they constantly need to grow or resize their networks in the cloud. Virtual networks in Azure have had a long-standing constraint where any address space change is only allowed if the virtual network does not have any peerings. Today, we are announcing that this limitation has been lifted, and customers can freely resize their virtual networks without incurring any downtime. With this feature, existing peerings on the Azure virtual network do not need to be deleted prior to adding or deleting an address prefix on the virtual network.

No Comments

Sorry, the comment form is closed at this time.