Martin Edelius

My feedback

  1. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Azure Governance » Azure Blueprints  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Edelius shared this idea  · 
  2. 6 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  (General Feedback) » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Edelius shared this idea  · 
  3. 107 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  8 comments  ·  Lab Services  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Edelius supported this idea  · 
  4. 1,237 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    unplanned  ·  29 comments  ·  Azure Backup » IaaS VM  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Edelius supported this idea  · 
  5. 20 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Storage » General  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Edelius shared this idea  · 
  6. 237 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    36 comments  ·  Azure Resource Manager  ·  Flag idea as inappropriate…  ·  Admin →

    Thank you for voting on this suggestion. It is now completed and can be done via custom Azure Policy. Here is a sample custom policy to apply a specific tag at the RG and have them inherited by the Resources in that RG: https://github.com/Azure/azure-policy/tree/master/samples/ResourceGroup/copy-resourcegroup-tag

    Tag inheritance for existing resources is something that we plan to add support for in 2019.

    Martin Edelius supported this idea  · 
  7. 78 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    Thank you for this feedback!

    We’re working on or have shipped several features that we think will satisfy this request.

    First, we have shipped the share snapshot feature, which enables you to protect a point-in-time for a file share. If a user were to delete a file, you can restore from the previous snapshot. To make this easier, Azure Backup will soon support scheduling share snapshot.

    Second, and more to the specific ask in the initial post, we are working on AAD authentication and authorization for Azure file shares. When we ship this feature, you will have the ability to set share ACLs that prevent deletes or modifications.

    Thanks,

    Will Gries
    Program Manager, Azure Files

    Martin Edelius shared this idea  · 
  8. 469 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    42 comments  ·  Azure Backup » PaaS Backup  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Edelius commented  · 

    We're in the process of offering Azure File Services for our end user as this would allow them to distribute files all over the world in a controlled, reliable manner.

    In order to provide this as a service we need to be able to provide more protection than the DR-capabilities built into Azure, for example if a user by mistake deletes a file or folder.

    I'm thinking that there'd be a backup operator role in the RBAC that we can assign to the resource group containing the Azure File Service. Users with this role can through the Azure Backup UI configure backup and restore policies for objects in the Azure File Service and also backup and restore the actual objects. No direct access to the objects is given through this role though.

    Martin Edelius supported this idea  · 
  9. 58 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  4 comments  ·  Azure Backup » Performance  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Edelius supported this idea  · 
  10. 15 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  0 comments  ·  Azure Backup » Reporting  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Edelius supported this idea  · 
  11. 195 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    7 comments  ·  Azure Backup » Azure Stack  ·  Flag idea as inappropriate…  ·  Admin →
    Martin Edelius supported this idea  · 
  12. 9 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Martin Edelius supported this idea  · 

Feedback and Knowledge Base