MikeN

My feedback

  1. 1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature backlog and also gives us insight into the potential impact of implementing the suggested feature.

    MikeN shared this idea  · 
  2. 378 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Networking » Bastion  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN supported this idea  · 
  3. 387 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    22 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →

    We have raised the limit to 100 recently. We are regularly reviewing the limits and will continue to look for opportunities to raise the limits even further. If you have scenarios requiring limits higher than what is supported, please add your scenario details here (if you are comfortable with that) or raise an issue with Azure support and we will get back to you.

    MikeN commented  · 

    100 is a step in the right direction, however honestly there should be no limits at all. It should be up to your customers and their workload as to how many sites should be published behind application gateway. Most websites require a total of 4 listeners. domain.com (HTTP) domain.com (HTTPS), www.domain.com (HTTP), www.domain.com (HTTPS). The HTTP listeners are just a redirect to HTTPS and they are not really used. It doesn't make sense to be limited to only publishing 25 websites if they are mostly idle and in turn you're not even coming close to maxing out the performance capabilities of the app gateway.

    MikeN commented  · 

    I agree with this. Given that most sites will require a HTTP listener to redirect to HTTPS, this limits you to only publishing 10 sites behind each application gateway. If your sites are relatively low traffic, this is a waste of resources to have many application gateways that are mostly idle. There should be no limit on this and it should be up to administrators to decide how many application gateways are needed to support the workload.

    MikeN supported this idea  · 
  4. 80 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN commented  · 

    +1 for this. Many organizations are using a 3rd party virtual security appliance and all inbound traffic must go through the security appliance due to security requirements. This makes V2 of the application gateway useless. It would be beneficial to be able to use V2 so you can terminate TLS at the app gateway and still do HSTS.

    MikeN supported this idea  · 
  5. 127 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    11 comments  ·  Support Feedback  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN commented  · 

    I agree. Support doesn't even listen when you add a message saying that the ticket can be closed, they try to follow up anyway. It seems Microsoft likes to waste money by having their employees needlessly respond to tickets that can be closed.

    MikeN supported this idea  · 
  6. 50 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN supported this idea  · 
  7. 610 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    31 comments  ·  Web Apps  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN supported this idea  · 
    MikeN commented  · 

    I would suggest that the vNET integration needs to support inbound traffic. The current vNET integration is outbound only. A couple of reasons for this is we would like to require that developers connect to a VPN in order to connect to FTP to satisfy a MFA requirement. IP restrictions do not work as there is no way to restrict FTP access to particular IP addresses while allowing HTTP access from the internet. Additionally we'd like to inspect HTTP traffic by routing it through a network security virtual appliance. Ideally the app service should be assigned an internal IP address on your vNET so you can do both of those things as if they were running on a virtual machine within the vNET.

  8. 3,091 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    125 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    Hi everyone,

    We recently announce the General Availability of Azure Active Directory Domain Services (Azure AD DS) authentication for Azure Files! By enabling integration with Azure AD DS, you can mount your Azure file share over SMB using Azure AD credentials from Azure AD DS domain joined Windows VMs with NTFS ACLs enforced. For more details, please refer to our blog post:http://aka.ms/azure-file-aadds-authentication-ga-blog.

    A part of the GA announcement, we shared the upcoming plan to extend the authentication support to Active Directory (AD) either hosted on-premises or in cloud. If you need an Azure Files solution with AD authentication today, you can consider installing Azure File Sync (AFS) on your Windows File Servers where AD integration is fully supported.

    If you are interested to hear future updates on Azure Files Active Directory Authentication, please complete this sign-up survey:https://aka.ms/AzureFilesADAuthPreviewSurvey.

    Thanks,
    Azure Files Team

    MikeN commented  · 

    Is there any rough estimate for a roadmap goal of when you'll be able to mount a drive from user endpoints running Windows and MacOS that are not Virtual Machines running in Azure? This is a requirement to seriously consider using Azure Files to replace on-premises SMB/CIFS shares.

    MikeN supported this idea  · 
    MikeN commented  · 

    I agree, also security logs for this should be able to sent over to Azure Log Analytics. This prevents organizations that have strict security requirements from using Azure Files. Many organizations have a security requirement to maintain access logs to all files to have an audit trail of what user accounts are accessing what data.

  9. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Storage  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN shared this idea  · 
  10. 13 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN supported this idea  · 
    MikeN commented  · 

    This is now available in Preview for Windows computers, it requires a registry edit on the client side to enable it. Still no support for controlling the OneDrive Sync client via conditoinal access for MacOS. https://docs.microsoft.com/en-us/onedrive/enable-conditional-access

  11. 896 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    MikeN commented  · 

    It would be good for the Azure AD team to provide an official update on this. Some users are stating that "Authentication Administrator" works, others say it does not.

    MikeN supported this idea  · 
  12. 1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote which allows us to effectively prioritize your request against our existing feature list and also gives us insight into the potential impact of implementing the suggested feature

    MikeN shared this idea  · 
  13. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to up-vote & comment on. This allows us to effectively prioritize your request against our existing feature backlog and also gives us insight into the potential impact of implementing the suggested feature.

    MikeN shared this idea  · 
  14. 308 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    MikeN commented  · 

    I just wanted to provide feedback that this is very much a needed feature.
    It seems like a pretty bad engineering oversight when the service was first designed.

    Best practices 101 says that you should never assign permissions to individual users, you assign permissions to groups and add users to the groups.

    MikeN supported this idea  · 
  15. 3,630 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    141 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN supported this idea  · 
  16. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Azure Monitor-Log Analytics  ·  Flag idea as inappropriate…  ·  Admin →

    Thanks for the valid suggestion. Your feedback is now open for the user community to upvote & comment on. This allows us to effectively prioritize your request against our existing feature backlog and also gives us insight into the potential impact of implementing the suggested feature.

    MikeN shared this idea  · 
  17. 33 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Networking » DNS  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN supported this idea  · 
  18. 800 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    120 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN supported this idea  · 
  19. 563 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    21 comments  ·  Networking » Load Balancer  ·  Flag idea as inappropriate…  ·  Admin →
  20. 21 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Networking » Virtual WAN  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN shared this idea  · 
← Previous 1

Feedback and Knowledge Base