D365Hub
Your learning hub for Microsoft Dynamics 365, Power Platform and related technologies
Popular posts
-
Power Virtual Agents: Creating adaptive cards with... If you're a Power Virtual Agents user, this article provides a tutorial on creating adaptive cards w...
-
How to Disable Copilot in Dynamics 365 CE | User G... Copilot is a popular and powerful feature in Dynamics 365 Customer Engagement that offers assistance...
-
D365 F&O - Create custom workflow in Dynamics 365 This guide will explain every step needed to create your custom workflow in Dynamics 365. Create ...
-
Create Generative AI solutions with Power Virtual ... If you're looking to integrate generative AI solutions into your business operations, the integratio...
From code to cloud: Deploy an AI agent to Mic...
Deploy and monitor an AI agent on Microsoft Foundry using the Azure Developer CLI (azd). T...
How to Use Static Results to Test Power Autom...
When you work with Power Automate, you’ll eventually run into situations where testing you...
2026 Wave 1 D365 Field Service is Here brings...
The Field Service product team has been absolutely cooking of late, with a host of new PCF...
Take Action: Out-of-band update released to a...
Microsoft has identified an issue affecting signing in to apps using a Microsoft account. ...
Microsoft Purview: Data Security Investigatio...
Microsoft Purview’s Data Security Investigations will include endpoint Data Loss Preventio...
Microsoft Purview DLP: Unmanaged cloud app di...
Microsoft Purview now integrates with Palo Alto Prisma Access to extend data loss preventi...
Low-Key Debut for Entra ID Backup and Recover...
Microsoft released the preview of the Entra ID Backup and Recovery solution to tenants on ...
Business Central 2026 release wave 1 (BC28): ...
Hi, Readers.The public preview for Dynamics 365 Business Central 2026 release wave 1 (BC28...
Video: Computer Use Agent – Extract Web Page ...
In this video we are going to use the computer use tool to extract data ... The post Video...
Query Folding And Staging In Fabric Dataflows...
A few years ago I wrote this post on the subject of staging in Fabric Dataflows Gen2. In i...
Automate Data Security Triage & Posture | Age...
Cut through alert noise and focus on the risks that matter with Agents in Microsoft Purvie...
Will machines ever be intelligent?
Are machines truly intelligent? AI researchers Subutai Ahmad and Nicolò Fusi join Doug Bur...
Code War with Allie Mellen
Allie Mellen, cybersecurity analyst and author, joins Ann on this week’s episode of Aftern...
Episode 142 – Retirement of the semi-annual e...
https://www.youtube.com/embed/E80grMry84s
Episode 423 – Non-Human Identities in Microso...
Welcome to Episode 423 of the Microsoft Cloud IT Pro Podcast. In this episode, Ben is l...
Microsoft Defender Experts for XDR | Always-o...
Stay ahead of real-world threats without overwhelming your team using Microsoft Defender E...
Trailer: The Shape of Things to Come
Microsoft research lead Doug Burger introduces his new podcast series, The Shape of Things...
Why Cybersecurity Fails Without Trust
Cybersecurity leader and author George Finney joins Ann on this week’s episode of Afternoo...
Episode 422: Back to the Terminal: The Rise o...
Welcome to Episode 422 of the Microsoft Cloud IT Pro Podcast. In this episode, Scott and...