Microsoft Fabric Updates Blog

Secure, comply, collaborate: Item Permissions in Fabric Data Warehouse

In today’s data-driven world, managing access to data is crucial for maintaining security, ensuring compliance, and optimizing collaboration. Item permissions play a vital role in controlling who can access, modify, and share data within an organization. This blog post will delve into the rationale behind the need for item permissions, what permissions can be assigned … Continue reading “Secure, comply, collaborate: Item Permissions in Fabric Data Warehouse”

Introducing SQL Audit Logs for Fabric Data Warehouse

Introducing SQL Audit Logs for Fabric Data Warehouse, a powerful new feature designed to enhance security, compliance, and operational insights for our users. The Role of SQL Audit Logs in Fabric Data Warehouse Security SQL Audit Logs in Microsoft Fabric Data Warehouse provide a comprehensive and immutable record of all database activities, capturing critical details … Continue reading “Introducing SQL Audit Logs for Fabric Data Warehouse”

Assigning default schemas to users in Fabric Warehouse

You can now assign default schema to your users on Fabric Data Warehouse and to Analytics SQL Endpoints. This means you can now combine the ability to create schemas on Fabric Lakehouse and benefit from this enhancement for SQL Endpoints,. A default schema defines how database objects—like tables, views, and procedures—are organized and associated with … Continue reading “Assigning default schemas to users in Fabric Warehouse”

COPY INTO support for secure storage with granular permissions

Introduction COPY INTO statement for Fabric Data Warehouse enables high-throughput data ingestion from various external sources like ADLS Gen 2 and Blob storage accounts protected by firewall. Additionally, it supports flexible configuration options, such as specifying source file formats, handling rejected rows, and skipping header rows, which enhances data management and ensures smooth, secure operations … Continue reading “COPY INTO support for secure storage with granular permissions”