scanner
3 TopicsLineage Limitation on Wide Power BI Semantic Models & Built-in Classification Rule Sets
Hello everyone, I’m evaluating the new Microsoft Purview Governance Portal for our finance data governance needs. Previously with the Azure Purview classic version we had a couple of blocking issues such as it failed to scan wide semantic models. But now we're migrating to Fabric and we'd like to try the new Microsoft Purview Governance Portal. I’d appreciate any insights or confirmation from the product team or the community. Lineage Limitation on Wide Power BI Semantic Models Background: When we first ran the Purview Data Map Scanner against our finance semantic model, it failed once the total column count across all tables exceeded roughly 500 columns. In our case, a single SAP table alone has about 450 columns—so the scan wouldn’t complete, and we couldn’t capture any lineage. Questions: Has Purview removed or raised any “hidden” column-count limits for Power BI semantic models? Is there any official documentation on maximum supported column counts (e.g. 200, 500, or otherwise)? Are there recommended workarounds for very wide models—such as splitting into sub-datasets, using incremental scans, etc. to get full lineage? 2. Built-in Classification Rule Sets Background: Purview ships with a set of Microsoft-provided “Sensitive Information Types” that appear in every scan rule set. In many of our scans these defaults aren’t needed, and they clutter the results. Questions: Can we delete or permanently disable the built-in classification rules? If not, what’s the best way to ensure they’re not applied during a full scan? Are there any APIs or PowerShell commands that let us automate the exclusion of Microsoft’s defaults from our scan rule sets? Thank you in advance for any pointers, documentation links, or best-practice advice!127Views0likes1CommentRemoval of temporary mitigation in Windows updates for printing and scanning devices
A quick reminder that as of August 9, 2022, the security Windows updates removes all temporary mitigation released to all Windows updates between July 27, 2021 and July 26, 2022 for smart card authenticating printers, scanners, and multifunction devices that don’t support either: Diffie-Hellman (DH) for key exchange during PKINIT Kerberos authentication, Or, don’t advertise support for des-ede3-cbc ("triple DES”) during the Kerberos AS request Without this mitigation, smart card authentication (PIV) might fail on non-compliant devices and cause print and scan failures. Firmware on Smartcard-authenticating printers and scanners must be compatible with section 3.2.1 of the https://www.ietf.org/rfc/rfc4556.txt required for https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33764 prior to installing Windows updates released on August 9, 2022 or later on Active Directory domain controllers. Go to https://support.microsoft.com/en-us/topic/kb5005408-smart-card-authentication-might-cause-print-and-scan-failures-514f0bc5-ecde-4e5e-8c5a-2a776d7fb89a for more information.1.1KViews0likes0CommentsWin 10 - printers and scanners
Hi folks, i'm wondering how i can change the printers name, which is shown in this dialogue: In our companys network there are several printers which are listed here, too. But: The shown names are not ideal, because they are always like "HP XY123-DN series", no meaningful names like the printers location. We manage our printers on an Windows Server 2019 print server. Any ideas are highly appreciated.1.4KViews0likes3Comments