Andy B

My feedback

  1. 3,078 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    188 comments  ·  Signup and Billing  ·  Flag idea as inappropriate…  ·  Admin →

    Quick update,

    We have been considering all of the risks and investigating the steps required to ensure we implement this feature with high positive impact and low to no negative impact.

    After this investigation we have decided we will enable Pay-As-You-Go customers the option to configure a spending limit on a Pay-As-You-Go subscription, with appropriate safeguards and measures to prevent both service abuse and production service failure.

    We have not yet finished determining the details of what this feature will look like, nor do we have a timeline for release, but we have heard your voices and have added this feature to our backlog.

    Thanks for your continued feedback,

    -Adam (Azure Billing Team)

    Andy B supported this idea  · 
    An error occurred while saving the comment
    Andy B commented  · 

    Come on Microsoft, the ability to delegate a capped spend to departments or projects is pretty fundamental to controlling costs & making azure viable in a range of scenarios. You may have bottomless money bags but most of us don't.

    It's clear from the thread that there is customer demand for this feature, so why has there been no response for almost 2 years?

  2. 831 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Andy B supported this idea  · 
    An error occurred while saving the comment
    Andy B commented  · 

    The ability to MFA login into windows workstations & servers, along with offline 2nd factors (e.g. RSA key)is critical for us.

    The Windows Hello option is not a valid solution here. The "PIN is better than password" article suggestion misses the point entirely.

  3. 437 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    21 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Andy B supported this idea  · 
    An error occurred while saving the comment
    Andy B commented  · 

    1 year since the last MS update and no progress (too busy fiddling with the Azure UI?).

    I really need cross-vnet ASG functionality for a current use case.

    Please also correct the text in https://docs.microsoft.com/en-us/azure/virtual-network/security-overview: "f you specify an application security group as the source _AND_ destination in a security rule, the network interfaces in both application security groups must exist in the same virtual network"

    Scenario:
    - NSG is assigned to subnet1 in vnet1
    - server1 exists in subnet1 in vnet1 and has ASG1 assigned to its NIC
    - server2 exists in subnet2 in vnet2 and has ASG2 assigned to its NIC
    - vnet1 and vnet2 are peered.

    - if NSG rule 1 has ASG1 in vnet1 as source AND ASG2 in vnet2 as destination, then the text above correctly states that the NSG rule won't work.

    - If NSG rule 2 has the IP of server1 (which has ASG1 assigned to its NIC) in vnet1 as source and ASG2 in vnet2 as destination, then it no longer meets the conditions of the above text (i.e. does not use ASG as source AND destination), but the NSG still doesn't work, because the destination ASG is still not in the same vnet as the source, or perhaps because the NSG is not attached to the destination vnet too, it's not entirely clear.

    please confirm whether the destination asg must be in the same vnet as the source ip / asg, or the same subnet as the NSG is attached to?

    ASGs are the nearest thing we can get to objects / object groups (e.g. Cisco ASA) to improve the readability of NSG rulesets. please fix them so we can use them in modern multi-vnet designs. As it is, I have to use terraform to make my NSG rules readable to a human that isn't a walking reverse DNS server.

  4. 152 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    20 comments  ·  Azure Active Directory » End user experiences  ·  Flag idea as inappropriate…  ·  Admin →
    Andy B supported this idea  · 
  5. 5,763 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    225 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the feedback! We are interested in collecting feedback on this request – please vote for it if this is something you like to see.

    We’re also interested in learning more what people want to use the SFTP/FTPS for and which protocol they prefer. Please feel free to leave us a comment letting us know more detail!

    Thanks,

    Will Gries
    Program Manager, Azure Files

    An error occurred while saving the comment
    Andy B commented  · 

    Any news on this?
    We need SFTP for in / out transfers with multiple 3rd parties.

    Andy B supported this idea  · 
  6. 340 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    15 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Andy B supported this idea  · 
  7. 91 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    triaged  ·  0 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Andy B supported this idea  · 
  8. 1,302 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    93 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    Hi folks,

    We are evaluating what we can do to address this feedback and would very much appreciate your continued votes and suggestions on it.

    One alternative to mounting the share on-premises over port 445 is Azure File Sync, which enables you to create a cache of an Azure file share on an on-premises Windows Server. Azure File Sync only sends data over the Azure Files HTTPS (using the File REST APIs). You can learn more about Azure File Sync here: https://docs.microsoft.com/en-us/azure/storage/files/storage-sync-files-planning

    Please don’t hesitate to reach out if you have any additional questions!

    Thanks,

    Will Gries
    Program Manager, Azure Files

    Andy B supported this idea  · 
  9. 1,697 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    174 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →
    Andy B supported this idea  · 
  10. 44 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    Andy B supported this idea  · 
    An error occurred while saving the comment
    Andy B commented  · 

    I've just hit this problem too. Microsoft should be able to provide automatic groups of Windows Update and Azure regions for easy inclusion in NSG rulesets.

  11. 626 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    22 comments  ·  Networking » Virtual Network  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Andy B commented  · 

    Any news on this one? The lack of per-subnet DNS settings is a big limitation. I note that https://docs.microsoft.com/en-us/azure/best-practices-network-security suggests putting DMZ & internal subnets in the same VNet, but doesn't cover this point.

    We're about to deploy a DMZ in Azure & it looks like a separate VNet is the only way to get DMZ hosts using a DMZ DNS server.

Feedback and Knowledge Base