Update: Microsoft will be moving away from UserVoice sites on a product-by-product basis throughout the 2021 calendar year. We will leverage 1st party solutions for customer feedback. Learn more here.

(General Feedback)

Do you have an idea or suggestion based on your experience with Azure? We would love to hear it! Please take a few minutes to submit your idea in the one of the forums available on the right or vote up an idea submitted by another Azure customer. All of the feedback you share in these forums will be monitored and reviewed by the Microsoft engineering teams responsible for building Azure.

This forum (General Feedback) is used for any broad feedback related to Azure. If you have feedback on a specific service such as Azure Virtual Machines, Web Apps, or SQL Database, please submit your feedback in one of the forums available on the right.

Remember that this site is only for feature suggestions and ideas!

If you have technical questions or need help with Azure, reach out to us on Microsoft Q&A or try StackOverflow


  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. How To Begin Kodak Verite 55 Driver Download?

    The guidelines below can help to begin Kodak Verite 55 driver download
    1. At first, make a note of the device operating system version
    2. Then visit the appropriate software download portal
    3. The search results will appear, if you provide the device name and version
    4. Extract the setup file to the folder
    5. Tap on the setup file
    6. Then go forward with the on-screen guidelines to complete the software download process
    7. Resolve and fix software download issues, if any
    Need any guidence for printer setup/driver dowload, feel free to contact our customer support team by dialing…

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  2. Add a new property EventDuration to EventData

    In the current EventData schema, there are eventTimestamp and submissionTimestamp. However, I cannot know how long does the event(e.g. power on a vm ) take? I consult the TS from Azure, he suggests me to raise a feed back here.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  3. Include and allow for filtering on "Additional Detail"s in Azure Sign-ins and the exported CSVs.

    It would be very useful if the data visible under "Additional Details" in Azure Sign-ins could be filtered on as well as exported via CSV. Currently, this data is not something you can either filter on in the web UI or included in the exported CSV, but is visible in the JSON export. This enhancement would assist in quick troubleshooting.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  4. I suggest you make monitoring more usable and understandable

    Setting up monitoring is so confusing with different agents overlapping the same thing. Please make it streamlined.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  5. 1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  6. use of azure vault on azure monitoring action group webhook url

    as of now if someone want to send azure alert to third party tools, like opsgenie/slack, so we need to pass the api key in webhook uri available in azure action group which is not a secure way to keep api keys. So suggest you to integrate it with azure vault so that api keys can be fetch from vault.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  7. use of azure vault on azure monitoring action group webhook url

    as of now if someone want to send azure alert to third party tools, like opsgenie/slack, so we need to pass the api key in webhook uri available in azure action group which is not a secure way to keep api keys. So suggest you to integrate it with azure vault so that api keys can be fetch from vault.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  8. use of azure vault on azure monitoring action group webhook url

    as of now if someone want to send azure alert to third party tools, like opsgenie/slack, so we need to pass the api key in webhook uri available in azure action group which is not a secure way to keep api keys. So suggest you to integrate it with azure vault so that api keys can be fetch from vault.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  9. Being able to distinguish multiple authenticator apps for MFA

    If i enter multiple authentication apps (not microsoft authenticator), i want to set a description for those, for being able to distinguish them

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  10. Being able to distinguish multiple authenticator apps for MFA

    If i enter multiple authentication apps (not microsoft authenticator), i want to set a description for those, for being able to distinguish them

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  11. I would like it to be possible to create dynamic groups that can pull in the users who have 2FA turned on

    I would like it to be possible to create a dynamic group in Azure that populates based on users who have 2FA/MFA turned on. This will increase security across our tenant as it will allow us to apply groups of this nature to the self service password reset.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  12. Ability to have each subscription it's own invoice as for a development shop I have mulitple clients needing their own invoices.

    I have multiple clients needing their own invoices and I don't have a way to provide them as I am receiving a single invoice for my one account. I want to keep a single account where all my subscriptions are hosted making it simpler for me but lack of invoices bind with subscriptions is causing a lot of issues.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  13. Ability to split my invoice which is high in value and my CC tranaction is being declined by my bank

    Recently I had a big value on my Azure account which is hosting multiple subscriptions and my bank declined the credit card transaction (high value) so there should be an option for me to pay partial amount or ability to split the invoice. This creates a log of issues with me and I am sure many others must be facing the same issue over an over.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  14. How to delete all photos on iPhone?

    Are you furthermore checking out the question How to delete all photos on iPhone? the subsequent is the some steps to delete all the photos of the iPhone which is reset your iPhone:

    Step: 1 first of all, it's a bit of a recommendation that you simply must backup your iPhone on your google id or apple id.

    Step: 2 then open the Settings app on your iPhone

    Step: 3 then subsequent step is to the choice available within the settings app “factory data reset”. you've got to click on it.

    Step: 4 there are many options available there like…

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  15. More Visibility into the routing table/s for vWAN Hub

    A vWAN setup as a "secure hub" doesn't allow for visibility into the routing table for BGP learned routes over VPN Sites/GW connections. Please add this functionality to be able to confirm routing policy from the Azure-end.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  16. Beirut escorts

    Are you an aspiring gentleman in your late twenties, thirties or forties? You have been away from your wife or girlfriend for a long time? Are you longing for good ? We completely understand your feeling. That’s why we have exclusive Beirut escort girls waiting for you at our pre-booked hotel rooms to give you an erotic company. Please give an opportunity to Beirut escorts to please you to the fullest. We have each and every type of woman one man may need. Our wide diversification of call girls ranges from hot model to gorgeous Lebanese housewives. For your every

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  17. Network Security Group | Virtual Network | Security Rule to Microsoft Network IPs

    Hello!

    Would be great to select "Microsoft Network" in the Network Security rules in firewall rules for VM or other, so then no need to define ourselves all list of Microsoft IPs!

    As an example:
    1. Create Virtual Machine/WVD
    2. In the Network security rule select "Microsoft Network"
    3. The "Microsoft Network" already includes and updates with all Microsoft IP's

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  18. Office 365 Backup tool for the Backup Office 365 Mailboxes

    Office 365 is a cloud-based software as a service which provides services like Share Point Online, One Drive and Skype for business. There may be many reasons for the Backup of Office 365 mailboxes like to reduce the size of Office 365 mailboxes for the smooth run, or to have a backup of Office 365 mailboxes for the unwished time.
    For the Office 365 Mailbox Backup, a professional third-party tool is an essential thing. Shoviv Office 365 Backup and Restore is a best-suited tool for the same. This Shoviv Software comes with the advanced algorithm and provides the best features…

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  19. 1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  20. Privilege access groups for azure role assignments

    Similar to Azure AD role assignment to cloud group and manage group member & owners. the cloud group can also be used to manage group role assignments and manage through PIM.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Other  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

(General Feedback)

Categories

Feedback and Knowledge Base