Tim Lourey

My feedback

  1. 485 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    60 comments  ·  Azure Active Directory » Application Proxy  ·  Flag idea as inappropriate…  ·  Admin →
    Tim Lourey supported this idea  · 
  2. 28 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Active Directory » Azure AD Connect  ·  Flag idea as inappropriate…  ·  Admin →
    Tim Lourey supported this idea  · 
  3. 163 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    34 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for your feedback. Microsoft is currently working with third party MDM providers to enable this scenario. We will update this thread once we have more information to share.

    Tim Lourey supported this idea  · 
  4. 1,919 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    409 comments  ·  Azure Active Directory » SaaS Applications  ·  Flag idea as inappropriate…  ·  Admin →

    We’re currently evaluating an option that will provide the functionality offered by nested groups, but removes the complexity nested groups adds. We appreciate your patience on this ask and want to ensure we deliver a solution that benefits all of our customers. Below are use cases that we’d like for you to stack rank, with #1 being priority for you. We thank you for the continued comments and feedback.

    Use case A: nested group in a cloud security group inherits apps assignment
    Use case B: nested group in a cloud security group inherits license assignment
    Use case C: nesting groups under Office 365 groups

    An error occurred while saving the comment
    Tim Lourey commented  · 

    1. C
    2. A
    3. B

    Tim Lourey supported this idea  · 
  5. 711 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Tim Lourey supported this idea  · 
  6. 634 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Tim Lourey supported this idea  · 
  7. 1,609 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    27 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    Tim Lourey supported this idea  · 
  8. 25 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Database for PostgreSQL » Roadmap  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Tim Lourey commented  · 

    Should be a way to upgrade to latest version without full dump and restore as per https://docs.microsoft.com/en-us/azure/postgresql/concepts-supported-versions#managing-upgrades

    Tim Lourey supported this idea  · 
  9. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Identity Protection  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Tim Lourey commented  · 

    The above idea could throw a spanner in the works for the impossibile traveller alerts, but it might also reduce the amount of false positive impossibile travellers. Or at least make it clear that the actual risk of a particular impossibile traveller event may be lower.

    Tim Lourey shared this idea  · 
  10. 48 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    12 comments  ·  Azure Active Directory » Identity Protection  ·  Flag idea as inappropriate…  ·  Admin →
    started  ·  Azure AD Team responded

    Thanks for your feedback, folks. We have been working towards resolving the locations for IPv6 logins. Currently, a subset of such logins are getting resolved for location and the % will gradually go up. Are you seeing some of your IPv6 logins with resolved location?

    An error occurred while saving the comment
    Tim Lourey commented  · 

    Agreed with Idea and comment below. It works in MCAS. why not here as well.

    Tim Lourey supported this idea  · 
  11. 601 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    65 comments  ·  Azure Active Directory » Azure AD Connect  ·  Flag idea as inappropriate…  ·  Admin →
    started  ·  Azure AD Team responded

    We’re working on a solution and will update you when we know more.

    Tim Lourey supported this idea  · 

Feedback and Knowledge Base