Update: Microsoft will be moving away from UserVoice sites on a product-by-product basis throughout the 2021 calendar year. We will leverage 1st party solutions for customer feedback. Learn more here.

Anonymous

My feedback

  1. 51 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Update Management » Deployments  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  2. 124 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    triaged  ·  0 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  3. 472 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    101 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  4. 111 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    triaged  ·  2 comments  ·  Networking » VPN Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  5. 360 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    12 comments  ·  Networking » VPN Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  6. 37 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    started  ·  2 comments  ·  Networking » VPN Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  7. 215 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    7 comments  ·  SQL Database  ·  Flag idea as inappropriate…  ·  Admin →
  8. 1,002 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    50 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    This is a phenomenal hole. Forcing storage containers for application logs to be publicly reachable from the internet is such a security page 1 fail that I can't even begin to comprehend it.

    How are we meant to design secure system if the architecture is working against you in such a fundamental way???

    At least MS should document any workarounds that exist, until they do the job properly..

    Anonymous supported this idea  · 
  9. 12 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Update Management » General  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  10. 164 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    35 comments  ·  Update Management » Scheduling  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    or if not explicit "patch tuesday" support, a patch on release day + N or weekend +N from the release day.

    We like to patch test and UAT on the day or so after release, then production a week or two later at the weekend. Impossible to achieve under the current mechanism

    This allows for any post-patch tuesday fixed to be picked up and attended to in a timely and safe (i.e. non production first) manner

    Anonymous supported this idea  · 
  11. 14 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  3 comments  ·  System Center Data Protection Manager  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    Or alternatively, restore to SQL server on a VM that is in a different subscription. The use case here is validating our production system backup - we don't have any non-production SQL servers in the same location/subscription.

    We do have some in a different Dev/test subscription because of our Visual Studio/MSDN licencing - they're all on connected VNETs and the subscriptions are linked so all managed through the same portal login. I don't really want to spin up a new SQL server just for a test restore and not in my production subscription. Is there a way around this?

    Thanks

    Anonymous supported this idea  · 
  12. 127 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    unplanned  ·  15 comments  ·  Azure Portal » Search + navigation  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  13. 130 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Update Management » Scheduling  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  14. 963 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    62 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  15. 52 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    Same question - allowing ICMP echo is critical for us. If you have a complex NSG in place, not being able to permit echo is like troubleshooting with one hand behind your back

    Anonymous supported this idea  · 
  16. 331 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    19 comments  ·  Networking » VPN Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  17. 379 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    18 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  18. 775 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    6 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  19. 462 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    19 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
    An error occurred while saving the comment
    Anonymous commented  · 

    An update would be much appreciated. Suffering with multiple identical source/destination networks in NSG rules that we would like to manage as a set. Current process is dangerously unwieldy

Feedback and Knowledge Base