(General Feedback)

Do you have an idea or suggestion based on your experience with Azure? We would love to hear it! Please take a few minutes to submit your idea in the one of the forums available on the right or vote up an idea submitted by another Azure customer. All of the feedback you share in these forums will be monitored and reviewed by the Microsoft engineering teams responsible for building Azure.

This forum (General Feedback) is used for any broad feedback related to Azure. If you have feedback on a specific service such as Azure Virtual Machines, Web Apps, or SQL Database, please submit your feedback in one of the forums available on the right.

Remember that this site is only for feature suggestions and ideas!

If you have technical questions or need help with Azure, please try StackOverflow or visit our MSDN forums

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Make DomainDNSName,NetbiosName & Samaccountname attributes avaialble to public to use AAD Join without AAD Connect

    We use okta for synchronizing accounts to Azure AD.

    We plan to use AAD Join for our windows10 devices, it works well with AAD Connect(As AAD Connect synchronizes attributes DomainDNSName, NetBIOS name & Onpremisesamaccoutnanme)

    Okta could not update these attributes, I want to find a way to update the attributes(by using PowerShell or GraphAPI?).

    And also would like to know if there is any possibility to sync MSDS-Keycredentiallink attribute to on-premise without using AAD Connect so that I can use windows hello.

    70 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  2. show the Cognitive Services free tier in its Pricing page

    The Cognitive Services pricing page shows that every Cognitive Service call is chargeable https://azure.microsoft.com/en-us/pricing/details/cognitive-services/. But the Pricing Calculator at https://azure.microsoft.com/en-us/pricing/calculator/ shows that there is a Free tier. Please standardise your documentation.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  3. Azure MFA needs anti-phishing features such as include location details and notification to users about new devices

    Users can sometimes approve MFA notifications on their device because they do not know whether it is their device authenticating or a hacker who has phished their credentials. Therefore, to help users know why they are being asked to accept authentication include additional details such as the application name, IP address and location in the MFA prompt. Apple includes the location and a map of the location in their own two-factor implementation.

    Additionally, users should be notified with an email any time a new device is used to authenticate to their account.

    38 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  4. Make it easy to create virtual desktops for SMBs

    The number and complexity of the steps for a new MVD is mind blowing. Need to reduce and make it simple to create and access a virtual desktop with an existing ms account if you want to open up the market.

    2 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature

  5. RBAC Role for Reserved Instance creation WITHOUT Owner role on the Subscription

    RBAC role created so a group can be added for the single purpose of Reserved Instance creation, without keys to the kingdom (Owner rights). Capacity and Procurement would not need such keys as they would only be creating RI’s, following Least Privilege Access.

    40 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  6. Add SQL Database & Data Warehouse as trusted Microsoft services in Azure Storage firewall settings

    When we enable auditing & threat detection on SQLDB or SQLDW, we should be able to set up the firewall setting of Azure Storage. SQLDB & SQLDW is not included in the trusted Microsoft services now.

    57 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  7. Set TLS 1.2 or 1.3 as default for Azure Automation Account

    Currently Azure Automation runbooks start a powershell session that has Its security protocol set to SSL3 and TLS 1.0 by default.

    Since there are alot of security risks involved with using TLS 1.0 we would like to have this version set to 1.2 or even 1.3 by default.

    Since Okta has disabled TLS 1.0 and 1.1 per 1st of August 2018 this is also causing errors in Azure Automation runbooks, where we specifically need to specify a later version in each runbook.

    PCI DSS 3.2 also prohibits the use of TLS 1.0 after June 30, 2018.
    Source: https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet

    26 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  8. Allow Comments to be maintained in Create View Syntax

    currently header comments are not maintained in Create View statements in DW. Please update the functionality so that this will remain and allow one to script out the objects with the comments and provide comments for development and re-use.

    Create View vw_Name
    -- Comment
    -- Comment
    AS
    Select *
    From Object

    22 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  9. CDN

    There needs to be a way to apply service tags to Azure CDN. When applying NSGs or firewall rules it would be beneficial to be able to use Service Tags to target the CDNs.

    Marc

    19 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  10. In India there is strong demand for reserved Azure price

    Please enable option of reserved Azure price in India and Saudi Arabia. Market is demanding the same.

    21 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  11. Application Gateway Web App Slot Support as Backend Pool

    We would like to protect our staging environment (Web App Slots) the same way we protect our production environment (Web App) by putting the Slot Deployments behind the Application Gateway.

    16 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  12. ADB2C - MFA - Text messages and Source Number

    Azure ADB2C - MFA allow to modify text messages sent to send more user friendly messages.And allow source number to be fixed by adb2c admin.

    18 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  13. NSG/ASG management and monitoring

    add capability to modify and monitor NSGs and ASGs.

    34 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  14. Provide advanced planned maintenance notifications for VPN

    For planned VPN maintenance updates, it would be nice if you provided advanced notification. Your VPN failover did not work and our VPN was down. Advanced notification would have allowed us to be better prepared. I was informed that you have no way on your side to determine if the failover was successful or not. That is also something that should be in place.

    11 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  15. Modify QnA Maker provisioning process to support selection of an existing App Service Plan instead of a new App Service Plan being created

    Provisioning a QnA Maker Service provisions a Public App Service App <yourAppsName>.azurewebsites.net, but you are not given any control over the App Service Plan for which the App Service resides. My first choice would actually be an App Service Plan in our ASE environment, but if that isn’t doable at least let us select one of our existing public App Service plans to host this in.

    A 1-1 ratio of App Service Plan to App Service is extremely inefficient.

    25 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  16. Add the ability to modify the User risk levels for different sign in scenarios in Azure AD Identity Protection

    Currently risk events such as unfamiliar location are classified as medium and impossible travel is also classified as medium. it would be great if we were able to modify risk scenarios so that we could move what we deem as a higher risk into a high risk or lower the risk of something that we deem as lower risk. A scenario for why you would want this would be if you have users that travel and are not always coming in from the same location but are legitimate traffic. This would be a low risk scenario where as if a…

    9 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  17. enforce multi-factor authentication on all accounts, including any new account

    We've enabled multi-factor authentication on our account, but new users created do not have this enabled or enforced by default. There should be some global setting that automatically enforces multi-factor authentication for all accounts, including newly created ones. Admins should not have to go through a multi-step process to ensure this is complete. There is too much room for error, especially in a HIPAA environment.

    7 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  18. Enable Auto-Renew for Automation Run As Account certificates

    Enable Auto-Renew for Automation Run As Account certificates. Right now they expire 1 year after creation and cannot be set to automatically renew.

    29 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  19. Real time alerts risky sign ins

    As it stands we are only able to have weekly Digests sent with Risky Sign ins, At risk accounts.

    To me this is not good enough, support says pin it to your dashboard and log on and look? I do but cant log on every minute of every day.

    Real-time email alerts or at worst daily email alerts must be implemented for risky sign ins and users at risk.

    8 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
  20. Azure SQL Data Sync - 500 tables limitation

    We are looking to use Azure SQL Data Sync as a solution to deliver our database to our customers. But we have 845 tables in our database which are dependent on each other with referential integrity.

    We are not able to split the tables into two groups with their dependencies.

    We have contacted Microsoft Support team and they confirmed that we need to have all the dependent tables in one group or change the PK / FK rules. It is difficult to change our data model considering many customers are using it for many years.

    Can you please consider to…

    18 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
← Previous 1 3 4 5 55 56
  • Don't see your idea?

(General Feedback)

Feedback and Knowledge Base