Click Here to be taken to the LDI Quizzes and Courses for this syllabus

LDI Content

LDI Power BI Governance

This course is aimed at those with a Power BI Administrator role in their organsiation, or those who are working closely with Power BI admins, to drive adoption with appropriate Governance and controls for Power BI. As a self-service BI tool, It is not uncommon for adoption to grow rapidly at a grassroots level, with little or no central oversight of what’s been developed, what content is being consumed and who it’s been shared with.  This course will look at how to provide the right level of training/support, manage licences and understand how to manage and monitor your Power BI estate.

See the session at the London Power BI Group in July 2021 for a high level overview of the content covered in this course.

Introduction and Licencing

  • Understand the various licence options in Power BI and in which scenarios each is most appropriate
  • Review the Power BI Adoption Roadmap and the maturity levels under each topic that is covered
  • Consider how self-service BI works and the difference between Personal, Departmental, Team and Enterprise BI
  • Review the areas covered in the rest of the course

Workspace Scope and Creation

  • Understand the uses and features of workspaces
  • Learn the different approaches to catalogue the workspaces and all the artefacts within them across your Power BI environment (e.g. automated solutions based on the APIs and Azure Purview)
  • Identify how to differentiate between Managed and Unmanaged workspaces and how to treat the content/management of them.
  • Consider the workspace creation process and how this can be automated

Tenant Admin and Security

  • Understand the role of Tenant Admin settings with key examples of their impact
  • Design an approach to decide on how to set each of the tenant settings according to your organisation’s risk appetite according to security requirements
  • Consider the various Governance models for the settings (E.g. Enabled for all, Enabled for a subset, Enabled on a use case basis or Disabled) and design a process flow/approach for implementing the various models
  • Learn about the role of Sensitivity Labels in Power BI and learn how to apply them
  • Consider the overall management of Power BI security and data access through the use of Azure Active Directory (AAD) groups

Managed Workspace Architecture

  • Understand the components of a Managed Workspace architecture (including Gateways, Dataflows, Shared Datasets and Apps) including how to manage which artefacts sit in which workspaces.
  • Understand the role of Gateways and how to configure them
  • Learn how to create dataflows and Shared Datasets
  • Consider the role of artefact endorsement and data discoverability
  • Understand the various Power BI connection modes (e.g. Direct Query vs Import Mode/Aggregations) and how these relate to the managed workspace architecture components

Roles & Responsibilities

  • Understand the role of a Centre of Excellence and individual roles within it that are required for user enablement/adoption
  • Identify the various User/Developer roles – how the individuals within your organisation can be categorised according to Power BI usage and skill level in order to determine roles & responsibilities as well as potential access permissions
  • Consider how to design training needs for the various roles, including end user training and developer productivity (e.g. external tools, Power BI desktop rollout)
  • Understand how the various licencing options map onto user roles

Monitoring and Support

  • Differentiate between the types of support individuals need (e.g. content vs technical) and the various sources for this (e.g. internal/external community, helpdesk, COE)
  • Look at the various options for monitoring include usage metrics reports, Premium Capacity monitoring, audit logs and Bring Your Own Log Analytics (BYOLA)
  • Learn how to monitor the performance of Gateways
  • Consider security monitoring through tools such as Microsoft Cloud App Security (MCAS) and Azure Purview.