Sean McNellis

My feedback

  1. 17 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  Virtual Machines » Bugs  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature

    Sean McNellis shared this idea  · 
  2. 112 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    Sean McNellis supported this idea  · 
  3. 246 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    33 comments  ·  Azure mobile app  ·  Flag idea as inappropriate…  ·  Admin →
    Sean McNellis supported this idea  · 
  4. 14 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure mobile app  ·  Flag idea as inappropriate…  ·  Admin →
    Sean McNellis supported this idea  · 
  5. 12 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure mobile app  ·  Flag idea as inappropriate…  ·  Admin →
    Sean McNellis supported this idea  · 
  6. 484 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    10 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Sean McNellis commented  · 
    An error occurred while saving the comment
    Sean McNellis commented  · 

    Please please please - those of us using DNS services (even large scale like cloudflare) could benefit from using FQDN based rules as sources. Additionally it helps secure RDP and VPN Services for clients that may be located at sites with Dynamic DNS.

    Sean McNellis supported this idea  · 
  7. 137 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    3 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment An error occurred while saving the comment
    Sean McNellis commented  · 

    DNS/FQDN Based Rules - please! Entering an FQDN as the firewall / NSG source network would be super. If it were my choice I'd choose a pattern like PFSense where you can create aliases/groups which include FQDN's, host IP's, and/or CIDR notation. This just makes good 'ole sense in my opinion.

    Sean McNellis supported this idea  · 
  8. 381 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    18 comments  ·  Networking » Network Security Groups  ·  Flag idea as inappropriate…  ·  Admin →
    Sean McNellis supported this idea  · 
    An error occurred while saving the comment
    Sean McNellis commented  · 

    Yes please! Not sure, but it would make sense to include FQDN based sources so those of us using any type of dynamic DNS for server RDP, VPN access, etc. This could make life a lot easier for me :)

Feedback and Knowledge Base