Blog

Next-Gen Governance: Highlights from Power Platform 2024 Release Wave 2

Next-Gen Governance: Highlights from Power Platform 2024 Release Wave 2

As we’ve stepped into 2025, Microsoft Power Platform continues to push the boundaries of innovation with its latest release wave. The 2024 Release Wave 2 introduces a suite of features designed to enhance governance and administration, ensuring that organizations can manage their data and resources more effectively. Here’s a look at some of the most impactful updates:

1. Managed Identities for Dataverse Plug-ins (General availability Mar 2025)

Security is paramount, and the introduction of managed identities for Dataverse plug-ins is a game-changer. This feature allows developers to securely connect to Azure resources without the need to store or expose credentials. By leveraging managed identities, organizations can streamline their security protocols and reduce the risk of credential theft.

2. Setting Up Managed Identity (Public preview Mar 2025, General availability May 2025)

Building on the theme of security, the ability to set up managed identities simplifies the process of managing access to resources. This feature ensures that applications can authenticate securely, providing a seamless and secure user experience. It’s a crucial step towards enhancing the overall security posture of the Power Platform.

3. Instantly Revoke Users and Enforce Restrictions (General availability Mar 2025)

To keep up with security vulnerabilities and new features, the ability to instantly revoke user access and enforce restrictions is critical. This feature allows administrators to quickly respond to security threats by revoking access in real-time. It ensures that sensitive data remains protected and that unauthorized access is promptly addressed.

4. Sharing System Views with Security Roles (Public preview Feb 2025, General availability Apr 2025)

Another significant update is the ability to share system views with specific security roles. This feature allows administrators to assign system views to particular security roles, ensuring that only authorized users can access sensitive data. By aligning system views with security roles, organizations can better manage who sees what information, thereby enhancing data security and compliance.

The following are currently in public preview, with no release date scheduled yet:

5. Encrypt Data at Rest

Data encryption is a cornerstone of data security, and the new capability to encrypt data at rest provides an additional layer of protection. This feature ensures that data stored within the Power Platform is encrypted, safeguarding it from unauthorized access and potential breaches.

6. Secure Data Access Using Filtered Views

Managing data access is simplified with the introduction of filtered views. This feature allows administrators to control data visibility based on user roles and permissions. By using filtered views, organizations can ensure that users only access the data they are authorized to see, enhancing both security and compliance.

These updates reflect Microsoft’s commitment to providing robust governance and administration tools within the Power Platform. By focusing on security, compliance, and streamlined administration, the 2024 Release Wave 2 empowers organizations to manage their data and resources with confidence. As we embrace these new features, the future of digital transformation looks brighter than ever.

Get in touch with the Beringer Team today!

At Beringer, we realize that even the small details, can have a big impact. Our team would be happy to help with any questions you have on Power Platform – no matter how small or large. Give us a call today, to see how our team of experts can help your business keep up with the latest advancements in Microsoft applications and features!

Beringer Technology Group, a Microsoft Solutions Partner for Business Applications, specializing in Microsoft Dynamics 365 and CRM for Distribution also provides expert Managed IT ServicesBackup and Disaster RecoveryCloud Based Computing, Email Security Implementation and TrainingUnified Communication Solutions, and Cybersecurity Risk Assessments.