Our Power BI Tenant Provisioning workshops are designed to help provision your Power BI tenant as per Microsoft best practices and aligned with your organization’s usage scenario. Each workshop covers one primary subject area (see the course outline for details).

Intended Audience

BI Teams, Enterprise Architects (Data, Application, and Security), Lines of Business (LoB) Leads, Network Server Admins, Network Security Architects


Typically 20 days.



Course Outline

Due Diligence

  • Environment Overview – Share vision for Power BI, Data Governance, and end-user enablement
    • Pre-Work – Business value chain map, Azure readiness assessment
    • Session – Common implementation patterns for Power BI and decision criteria
    • Follow Up – Review recommended approach

Tenant Configuration

  • Date Gateway – Setup, high availability, best practices
    • Pre-Work – Identify Server(s) for gateway installation
    • Session – Overview of data gateway, install and configure data gateway
    • Follow Up – Test connections to on-premises data source(s)
  • Security – Service and environment level security
    • Pre-Work – Identify sensitive data assets, define security roles per LoB
    • Session – Overview of tenant workspace and security, guidance on security hardening
    • Follow Up – Adjust tenant security settings as needed
  • Operations – Compute Monitoring and Management
    • Pre-Work – List monitoring needs or areas of focus
    • Session – Demonstrate out-of-the-box monitoring and management functions
    • Follow Up – Review additional questions

Tenant Management

  • SDLC – Best practices for SDLC in a multi-developer scenario
    • Pre-Work – List current SDLC process/ teams/ roles
    • Session – High-level SDLC strategy including source control, development roles, and deployment
    • Follow Up – Review additional questions
  • Dataflows – Usage and best practices
    • Pre-Work – Identify possible enterprise datasets,   prepare sample dataset
    • Session – Overview of dataflows and best practices
    • Follow Up – Prepare sample dataflow
  • Data Security – Enabling data security and considerations
    • Pre-Work – Identify LoB specific security roles
    • Session – Overview of AAD based model security, example of ROLS model, and workspace security.
    • Follow Up – Security use case walkthrough
  • Paginated Reports – Best practices for content creation
    • Pre-Work – Identify need for printed or paginated reports
    • Session – Overview and best practice decision guidance for interactive vs paginated reports
    • Follow Up – Review conversion examples if required
  • Apps – Using apps for content dissemination and management
    • Pre-Work – Identify large user base(s) for consuming content
    • Session – Description of apps and best practices
    • Follow Up – Create sample app

Event Fee

Request for a customized quote: sales@dstrat.com

Go to Top