Mike

My feedback

  1. 4 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  (General Feedback) » azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 

    yes - we need specific access to o365 psh and graph api endpoints https://docs.microsoft.com/en-us/graph/overview-major-services

    Mike supported this idea  · 
  2. 18 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 

    just basic conditional access applied against specific subscriptions; not necessarily device state

    Mike supported this idea  · 
  3. 793 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    42 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
  4. 31 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Automation » Start / Stop VM  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote & comment on. This allows us to effectively prioritize your request against our existing feature backlog and also gives us insight into the potential impact of implementing the suggested feature.

    An error occurred while saving the comment
    Mike commented  · 

    we use a single azure monitor and log analytics for all our subscriptions. having multiple workspaces causes confusion for some.
    simplifying this to support a single location for dev/test subscriptions would be good

    Mike supported this idea  · 
  5. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Automation » Bug  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
    An error occurred while saving the comment
    Mike commented  · 

    this requires targeted subscription capability

  6. 31 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Mike supported this idea  · 
  7. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Other  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 

    yes - as service principals are used for and by deployed resources - they should have the ability to be Tagged to support identification, management and incident response.

    Mike supported this idea  · 
  8. 1,359 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  Azure AD Team responded

    Thank you for your feedback! The feature team is aware of this suggestion and will keep it under consideration. There are technical challenges to overcome in order to make this happen. Please keep the votes coming if this feature matters to you.

    Chen

    Mike supported this idea  · 
    An error occurred while saving the comment
    Mike commented  · 

    any update?

  9. 2,319 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    467 comments  ·  Azure Active Directory » SaaS Applications  ·  Flag idea as inappropriate…  ·  Admin →

    We’re currently evaluating an option that will provide the functionality offered by nested groups, but removes the complexity nested groups adds. We appreciate your patience on this ask and want to ensure we deliver a solution that benefits all of our customers. Below are use cases that we’d like for you to stack rank, with #1 being priority for you. We thank you for the continued comments and feedback.

    Use case A: nested group in a cloud security group inherits apps assignment
    Use case B: nested group in a cloud security group inherits license assignment
    Use case C: nesting groups under Office 365 groups

    An error occurred while saving the comment
    Mike commented  · 

    #1 Case A
    #2 Case C
    #3 Case B

    Mike supported this idea  · 
  10. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Admin Portal  ·  Flag idea as inappropriate…  ·  Admin →
    Mike shared this idea  · 
  11. 19 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Key Vault » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
  12. 1,381 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    68 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →
    Mike supported this idea  · 
  13. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    triaged  ·  0 comments  ·  Networking » ExpressRoute  ·  Flag idea as inappropriate…  ·  Admin →
    Mike shared this idea  · 
  14. 90 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  Azure Active Directory » B2B  ·  Flag idea as inappropriate…  ·  Admin →

    We’re working on a few features in this space that will likely help address this scenario but don’t have an ETA yet to share. Thanks to the folks who have added additional details of what they’re looking for, and if you have more scenarios for how this capability could help you please do add them as comments.

    Thanks,
    Elisabeth

    An error occurred while saving the comment
    Mike commented  · 

    Being able to Trust another AAD would allow trust of that Tenants Registered devices
    which means Conditional Access in M&A scenarios and Corporate User v Hosting Azure AD tenants ibecomes sooo much easier.

    Mike supported this idea  · 
  15. 6 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Other  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Mike commented  · 

    nearly 2 years...... ready yet?

  16. 34 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Mike supported this idea  · 
  17. 5 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Mike supported this idea  · 
  18. 209 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    22 comments  ·  Azure Active Directory » B2B  ·  Flag idea as inappropriate…  ·  Admin →

    We do have some capabilities in this space by using either Access Reviews (https://docs.microsoft.com/en-us/azure/active-directory/governance/manage-guest-access-with-access-reviews) or the newly-released-to-preview Entitlement Management feature (https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-management-overview).

    If neither of those fulfill your requirements, please add a comment with your scenario for the feature to help us prioritize and design it better.

    /Elisabeth

    An error occurred while saving the comment
    Mike commented  · 

    Access reviews and entitlements are poorly planned and require too much operational overhead for on demand access for external guests for spo, teams etc
    You need to scale it back to basic account expiry and attestation.

    An error occurred while saving the comment
    Mike commented  · 

    audit are having a field day with guest accounts and mgmt procedures...

    Mike supported this idea  · 
  19. 194 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    unplanned  ·  Azure AD Team responded

    Thank you for your feedback! We have heard you and are considering future implementation options. There is no timeline yet for implementation. If this feature matters to you, keep voting as it will help us prioritize.

    An error occurred while saving the comment
    Mike commented  · 

    Would support office group /teams governance.

    Mike supported this idea  · 
  20. 651 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    72 comments  ·  Azure Active Directory » Azure AD Connect  ·  Flag idea as inappropriate…  ·  Admin →
    started  ·  Azure AD Team responded

    We’re working on a solution and will update you when we know more.

    Mike supported this idea  · 
← Previous 1 3

Feedback and Knowledge Base