Implementing Power BI in your organisation is more then allowing people to download Power BI desktop and publish reports to the Power BI Service. People have to be aware of what Power BI is able to achieve for them! But how do you know who is creating what? Using what? Or maybe even more important, sharing (confidential) information with others?
With a Power BI end-to-end monitor you will be able to monitor all Power BI content allover your tenant. These actionable insights will help you to see who needs some extra help, but also in governing your data solutions within your organisation.
In this session I will show you which insights you will get with an end-to-end monitor and how you can monitor your own Power BI environment.
16. What we need to monitor
Content
availability
Usage Performance
17. What we need to monitor
Secure data uploaded to the service
Publish data to the entire organisation
Share content to external users
Publish to web
Custom visuals
Audit logs
18. What objects are available?
Members
Admins
Contributors
Datasets
Reports
Dashboards
Dataflows
App Workspace
App
19. What objects are available?
Members
Admins
Contributors
Datasets
Reports
Dashboards
Dataflows
App Workspace
App
Data sources
Gateways
20. What the Power BI Service provides
Usage Metrics in Power BI Service Audit logs in O365 admin portal (manually)
35. Recap
• Monitoring is more than usage insights.
• Monitor end-to-end, not only individual reports!
• Monitoring is key for a successful implementation of
Power BI within an enterprise environment.
36. Marc Lelijveld
Data & Analytics Consultant
Macaw Netherlands
Download for free!
Https://bit.ly/cheatsheetpbi
Marc.Lelijveld@macaw.nl
@MarcLelijveld
linkedin.com/in/MarcLelijveld
Data-Marc.com
Anecdote:
Client case, issues met HR report
Security breach
Who has viewed the report during this short amount of time.
Looked at usage metrics, but not detailed enough
Contacted the tenant admin to get insights
No time / not available. Single point of failure
ofcouse we all are compliant to the AVG law. we know who has acces to the data