Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
À partir d’avant-hierFlux principal

Rules in SharePoint Online/Microsoft Lists

Microsoft is rolling out a feature using which you can create rules in SharePoint Online and Microsoft lists to set reminders and send notifications to users based on changes to list information, Roadmap. In this blog I will explain how to create a rule in SharePoint Online modern list or Microsoft lists.

Previous options to send notifications

Before this feature, if you wanted to send notifications about changes in a SharePoint Online or Microsoft List, you had below two options:

Create an alert

SharePoint alerts are email notifications that are sent to SharePoint users when something changes in a list or library. You can create an alert for:

  • Whole list or library
  • Folder, file, or list item
  • SharePoint search criteria

However It doesn’t provide the ability to send notifications for column level changes. This is where you will find list rules very helpful.

Create a Power Automate/Microsoft Flow

Another way of getting notifications for file or list item changes is to use Power Automate with the SharePoint connector.

Using Power Automate, users can create simple change notifications as well complex, multiple condition-based notifications. However, some users may find it difficult to create a Power Automate flow from scratch without any development experience or assistance.

Creating list rules

Creating list rules is very easy as compared to creating power automate flow and you have much more control using list rules compared to the existing alerts functionality.

With this feature update, SharePoint users with edit permissions on a list can create and manage simple if/then rules based on changes to list information, to set reminders and send notifications. Users with read-only permissions will not be able create or manage rules.

Follow below steps to create rules in SharePoint online/Microsoft lists:

  • Go to SharePoint Online/Microsoft list where you want to create a rule.
  • Click on the Automate option from command bar and then select Create a rule.
Create a list rule in SharePoint online/Microsoft lists
Create a list rule

There are four different conditions that triggers the rule as shown in the below image:

List rule conditions in SharePoint online/Microsoft lists
List rule conditions
  • Under Notify someone when, select a condition that will trigger the rule. For example, A column changes.
  • Creating rule is like writing a sentence. Select each of the underlined portions of the rule statement to customize the condition by choosing a column, the value of the column, and who to notify.
SharePoint online list rule to notify author when the Status column changes
Rule to notify Author when the Status column changes

For example, to notify Author when a Status column changes, you need to choose the Status column, and then select Author from Suggestions list. Suggestions from this list shows the Person or Group columns from the list.

If you want to notify yourself, you could select Me from Other suggestions. You can also select the users by using Enter a name or email address option.

  • When you’re finished customizing the statement, select Create. You’ll see your rule on the Manage rules page and the rule will be turned on by default.

Now when Status column changes, list rule will send notification email to Author. The notification email will contain a link to display/view form of SharePoint list item. These notification emails will be sent from Microsoft 365. Check below image for reference:

Email notification send by using SharePoint online list rules
Email notification send by using list rules
Notes:
  • Users will be able to create a maximum of 15 rules per list.
  • Currently it is not possible to customize the email notification template

Editing a list rule

You can edit a list rule from the Manage rules page. Follow below steps to edit a rule for a list:

  • Go to SharePoint Online/Microsoft list, select Automate from command bar and then Manage rules.
Go to Manage rules in SharePoint Online
Go to Manage rules page
  • From manage rules page, you can create/edit/delete a rule. You can also turn off the rule by changing the slider to Off.
  • To edit the rule, click on the rule and then change the underlined portions of the rule statement.
Manage rules in SharePoint Online
Manage rules page
  • After making all changes, Click Save.

Deleting a list rule

When you no longer need a rule, you can either turn it off or delete it from the Manage rules page. Follow below steps to delete a rule for a list:

  • Go to SharePoint Online/Microsoft list, select Automate from command bar and then Manage rules.
  • Select the rule you want to delete and click Delete rule at the bottom of the Edit rule page, .
Deleting a list rule in SharePoint Online list
Deleting a list rule

Supported/Unsupported column types

List rules allow sending notifications when a column or it’s value changes. However, it does not support all column types currently.

Supported column types

Currently below column types are supported while using when a column changes and when a column value changes conditions:

  • Single line of text
  • Choice (single & multiple selection)
  • Number
  • Date and Time
  • Yes/No
  • Person or Group (single & multiple selection)
  • Created By & Modified By (while using when a column value changes condition)
Unsupported column types

Below column types are not supported currently:

  • Multiple lines of text
  • Currency ($, ¥, €)
  • Lookup
  • Hyperlink or Picture
  • Calculated
  • Image
  • Managed Metadata

I hope you liked this blog. Give your valuable feedback & suggestions in the comments section below and share this blog with others.

Microsoft Pushes Deprecation of Some Client Access Rules to September 2024

Extra Year to Give Tenants Time to Overcome Technical Limitations that Prevent Migration

Without much fanfare, the Exchange Online team decided to give tenants that use client access rules an extra year to make the transition to Azure AD conditional access policies. The original deprecation date of September 2023 is now September 2024. The kicker in this statement is that only rules that cannot be migrated to conditional access policies because of a “technical limitation” can continue working for the extra year.

First announced at the Microsoft Ignite 2017 conference, client access rules are only available in Exchange Online and exist to control connections coming into Exchange Online. You can do things like block POP3 and IMAP4 connections or restrict access to these protocols from specific IP addresses.

Client access rules are a solution created by Exchange Online for an environment that was very different to today. In 2017, customers wanted help to control inbound connections to Exchange Online. Azure AD conditional access policies didn’t have the feature set that’s available now and Exchange Online still supported basic authentication across all its connectivity protocols.

The Current State of Microsoft 365 Connection Management

Moving forward to today, Microsoft has largely eliminated basic authentication from Exchange Online to cut off techniques like password sprays that attackers heavily depended on to retrieve user account credentials. Attackers still try, but attempts to use basic authentication to check username/password combinations fail at the first hurdle. Apart from keeping access to SMTP AUTH, there’s no further need for authentication policies.

Deprecating client access rules could be construed as another side effect of modern authentication becoming the norm in Exchange Online. But the more important factor is that Microsoft 365 favors features that function across the entire ecosystem instead of being tied to a single workload. Azure AD is the directory of record and conditional access policies are how Azure AD controls inbound connections. Dropping client access rules (specific to Exchange Online) to embrace conditional access policies is evidence of that trend. We see the same in the compliance and information protection areas where Microsoft 365 policies take prime position.

Microsoft is pouring engineering effort into Azure AD conditional access policies. In the last year alone, Microsoft has added features such as:

Conditional access policies are closely associated with multi-factor authentication and are often configured to ensure that inbound user connections use MFA, especially for administrator accounts.

Migration Away from Workload-Specific Implementations Can be Problematic

Moving from a workload-specific implementation to a platform-wide implementation can be problematic. It’s likely that the workload-specific code covers narrower use cases that only occur within a workload. For example, Exchange Online mailbox retention policies can process items at a folder level and move items to the online archive when their retention period expires. By comparison, Microsoft 365 retention polices process mailboxes as a single unit and don’t go to folder level and can only delete or keep items instead of being able to move them to the archive. Then again, because Microsoft is actively developing Microsoft 365 retention policies, they benefit from recent innovations like adaptive scopes and disposition reviews, neither of which are available for Exchange mailbox retention policies.

In the case of client access rules, Microsoft acknowledges that they “have encountered a few scenarios where it’s not possible to migrate current rules” and say that they will allow the ongoing use of client access rules “until we can support them” (presumably the scenarios that migration is not currently possible).

Microsoft doesn’t describe what scenarios are problematic. They also don’t say how customers can discover if their client access rules fall into the category of those that Microsoft consider to have a technical limitation that prevents migration. Microsoft plans to disable client access rules that they consider can be migrated to conditional access policies in September 2023. Only rules that receive Microsoft approval can continue running until September 2024, at which point the curtain descends for all client access rules (Figure 1).

Microsoft timeline for deprecation of client access rules
Figure 1: Microsoft timeline for deprecation of client access rules

Apart from not documenting the technical limitations that get in the way of migration, Microsoft also doesn’t say how customers receive approval for the one-year extension for client access rules. The blog says that customers should “open a support ticket so we can investigate and understand your needs,” but doesn’t explain how this process results in a rule being allowed to continue running past September 2023.

The Filtering Issue

Browsing the documentation for client access rules, the obvious issue appears to be in the areas of filtering. Like in other areas (like dynamic distribution lists), Exchange Online supports recipient filters for client access rules in a different manner than operated for conditional access policies. You can assign conditional access policies to specific users and groups (including dynamic Microsoft 365 groups), but that’s not quite the same as using a recipient filter. I’m sure that I am missing something else, but recipient filtering seems like the big obstacle for migration.

I strongly support moving away from client access rules to embrace more secure implementations like conditional access policies that operate across the complete Microsoft 365 ecosystem. Microsoft throws continuous access evaluation (CAE) into the pot. Although CAE is a very good innovation to revoke access from accounts immediately important events like password changes occur, the issue here is all about migration.

Client Access Rules Migration Might Need Updates to Conditional Access Policies

If you’re using client access rules, it’s time to review the state of the migration.

  • Remove client access rules that are no longer necessary.
  • Migrate the remaining rules to conditional access policies.
  • If any rules cannot be migrated, contact Microsoft Support to discover if a technical limitation exists to prevent migration. If it does, the rules can continue working until September 2024. If not, Microsoft Support should be able to tell you how to migrate to conditional access policies before September 2023.

Microsoft doesn’t say how they will address the technical limitations that allow some client access rules to remain operational until September 2024. This might be because the Exchange Online team is waiting for their Azure AD colleagues to implement some features in conditional access policies. At least, I hope that’s what’s happening.


Insight like this doesn’t come easily. You’ve got to know the technology and understand how to look behind the scenes. Benefit from the knowledge and experience of the Office 365 for IT Pros team by subscribing to the best eBook covering Office 365 and the wider Microsoft 365 ecosystem.

How to Run the Test-Message Cmdlet

Use Test-Message to Validate Exchange Online Rules Processing Against Email

Announced in Microsoft 365 message center notification MC503297 (26 January 2023, roadmap item 100494), the Exchange Online Test-Message cmdlet is now generally available. The purpose of the cmdlet is very simple: it tests the path of a message through the rules applied by the Exchange Online transport service to reveal what actions those rules take. The intention is to help tenant administrators understand why a rule doesn’t function as expected without having to ask Microsoft support for assistance.

The set of tested rules include:

  • Exchange Online transport rules (ETRs, also known as mail flow rules). Up to 300 ETRs can exist in an Exchange Online organization to do anything from automatically copying messages sent to a certain domain to applying disclaimers to outbound messages (here’s an example of using an ETR to apply a special disclaimer for calendar meeting notifications.
  • Rules created to enforce actions from Microsoft 365 DLP policies. For example, to stop people sharing confidential information with external recipients.
  • Rules created to apply Microsoft Purview retention or sensitivity labels.

Over time, my small tenant has accumulated 25 different transport rules plus a set of DLP policies and some auto-label policies. The permutations and combinations involved in rule processing within the transport service can become very complex indeed. ETRs have a priority order to determine how the transport service runs the rules. A rule can force processing to stop if necessary. DLP policies run after ETRs, and auto-labeling then kicks in if a message is allowed to proceed by ETRs and DLP.

Test-Message Examples

Here’s a simple example of the Test-Message cmdlet in action:

Test-Message -Sender Lotte.Vetler@office365itpros.com -Recipients Flayosc@outlook.com -SendReportTo Jim.Flynn@office365itpros.com -TransportRules -UnifiedDlpRules

This kind of test runs rules against a sample message. It can only check the message sender and recipients, so apart from cycling through all the available rules, it’s not a very extensive test.

A slightly more complicated example uses a test message that I created with Outlook and saved as a message file. Using a test message makes sure that rules run against precisely the kind of traffic that you expect the rule to detect and process. For instance, you might want to include some specific keywords in the message subject or body text, or an attachment of a certain type.

To pass the message to Test-Message, it must first be encoded and stored in a variable, which is then specified in the MessageFileData parameter.

$EncodedText = ([System.IO.File]::ReadAllBytes('c:\temp\TestMessage.msg'))

Test-Message -MessageFileData  $EncodedText -Sender Lotte.Vetler@office365itpros.com -Recipients Flayosc@outlook.com -SendReportTo Jim.Flynn@office365itpros.com -TransportRules -UnifiedDlpRules

Server                                  MessageId
------                                  ---------
PAXPR04MB8095.EURPRD04.PROD.OUTLOOK.COM 626b8a86-c262-4457-911b-641a027989d7@DB9PR04MB8445.eurprd04.prod.outlook.com

The server information reported by the cmdlet is the Exchange Online mailbox server where the transport rules run. Given the massive pool of Exchange Online servers, it’s likely that Test-Message will use a different server each time it runs.

Test-Message Output

The output is in messages delivered to the address specified in the SendReportTo parameter for each type of rule processed by the test. In my case, the test generated three messages (DLP, auto-label, and ETR). Figure 1 shows the results for the ETR test. We can see that a match occurred for the Office 365 Message Encryption for selected external domains rule, which executed two actions to apply rights management protection to the message with custom branding. After executing the two actions, the transport service stopped processing further rules because the rule settings forced an exit.

Exchange transport rules report generated by the Test-Message cmdlet
Figure 1: Exchange transport rules report generated by the Test-Message cmdlet

Steps to Follow for Rule Creation

Nice as it is to have a cmdlet to help test rules processing, it won’t replace the simple rules that experienced administrators follow when setting up new ETRs or DLP policies.

  • Know what your rule should do (the actions).
  • Know what conditions the rule needs to detect before it runs.
  • Know what exceptions (if any) exist.
  • Start with a simple rule and build complexity gradually.
  • Always ask if your rule is likely to interfere with another rule before enabling it. You might be able to make a small adjustment to an existing rule to do what you want instead of creating a brand-new rule.

The last point is the most important.


Insight like this doesn’t come easily. You’ve got to know the technology and understand how to look behind the scenes. Benefit from the knowledge and experience of the Office 365 for IT Pros team by subscribing to the best eBook covering Office 365 and the wider Microsoft 365 ecosystem.

Creating Rules for Microsoft Lists – A Simple Alternative to Power Automate Flows

Somewhere between the classic Alerts functionality and Power Automate flows, we find the ability in Microsoft Lists to create rules for lists. Rules allow us to do some pretty basic – but VERY common things.

Creating a rule for a list is fairly straightforward. In the toolbar at the top of the list view, click on automate, and Create a rule.

There are only four options right now, but I expect this will expand. Microsoft is getting better at building what I think of as “bridging functionality”. Rather than the old days, where almost everything useful required a developer, there are now multiple options along a spectrum to accomplish many things.

The four options today are Notify someone when…

  1. A column changes
  2. A column value changes
  3. A new item is created
  4. An item is deleted

Note that #2 and #4 weren’t even possible not that long ago. We had to do all kinds of hocus-pocus for #2 and there simply wasn’t a “hook” for #4.

If you think about it, a huge number of SharePoint Designer workflows were built over the years JUST to send email notifications. This applies the 80/20 rule (one of my favorite rules – aka the Pareto Principle) to those use cases.

When you choose which rule you’d like to use – and I love how the graphics make it much easier to decide – you land on a screen where you just need to select a few values to set things up. If you’ve ever created a rule in Outlook to shuffle emails from specific sources into folders, you’ll recognize this type of logic.

The screen is also “list aware” – it knows which columns might make sense for each slot and what its possible values are. Here, I’m asking the list to notify me when the Category column is (equals) “(1) Category1”.

For the notification, all Person columns in the list are available.

As you can see, there’s little thinking involved: the columns are available in a dropdown when you need them.

Once you’ve set up a rule or rules, you can manage them from the same dropdown.

The ensuing screen shows you all the rules you have created, allowing you to delete them or just turn them off. The “Off” toggle is excellent to have when you’re loading content or making bulk metadata changes. You can stop the flood of notifications easily but equally easily turn the rule(s) back on.

Under the covers, this capability undoubtedly uses the web hooks for list items. This means the notifications will be fast and painless.

By the way, you may be wondering what those notifications look like. Truth is, they are nothing fancy. But they probably look better than 80% of the notifications you ever built in SharePoint Designer workflows over the years. This is another area where I expect the capability will expand, allowing some level of customization for the emails.

So the next time someone asks you to write a flow just to send an email when list items change, make sure to think about using rules instead. They will be amazed how fast you solve the problem.

❌
❌