MikeN

My feedback

  1. 20 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    MikeN commented  · 

    I agree that this would improve the overall security posture of Microsoft MFA. Various 3rd party MFA solutions do require that you unlock the device in order to approve a notification. A scenario would be an employee walks away from their computer, doesn't lock the OS and they also leave their phone on their desk. Someone could walk up to an app that does Single Sign On but it also requires MFA, the unauthorized user is then able to access the MFA protected app without proving that they are authorized to use the mobile device.

    MikeN supported this idea  · 
  2. 49 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    MikeN commented  · 
    MikeN supported this idea  · 
  3. 7 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory » PowerShell  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN shared this idea  · 
  4. 360 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    21 comments  ·  Networking » Application Gateway  ·  Flag idea as inappropriate…  ·  Admin →

    We have raised the limit to 100 recently. We are regularly reviewing the limits and will continue to look for opportunities to raise the limits even further. If you have scenarios requiring limits higher than what is supported, please add your scenario details here (if you are comfortable with that) or raise an issue with Azure support and we will get back to you.

    MikeN commented  · 

    I agree with this. Given that most sites will require a HTTP listener to redirect to HTTPS, this limits you to only publishing 10 sites behind each application gateway. If your sites are relatively low traffic, this is a waste of resources to have many application gateways that are mostly idle. There should be no limit on this and it should be up to administrators to decide how many application gateways are needed to support the workload.

    MikeN supported this idea  · 
  5. 17 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  1 comment  ·  Azure Active Directory » Domain Services  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN shared this idea  · 
  6. 1,466 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    90 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    As you mentioned, we initiate a change detection job once every 24 hours to enumerate the Azure file share and scan for changes. This is required for the Azure file share because Azure Files currently lacks a change notification mechanism like Windows Server has. Long term we will add this capability and have automatic immediate sync.

    There is now a way to trigger sync to happen on files that are placed directly in the Azure File share. With this new cmdlet you can point sync to particular files or directories and have it look for changes right then. This is intended for scenarios where some type of automated process in Azure is doing the file edits or migrations are done by an admin (like moving a new directory of files into the share). For end-user changes, the best thing to do is install Azure File Sync in an IaaS VM…

    MikeN commented  · 

    I agree with this.
    In the current state, this is basically useless for production scenarios.

    Real-time syncing would be ideal.
    At a minimum it needs to be every 15 minutes if you really want to market this as being a managed service alternative to DFS.

    MikeN supported this idea  · 
  7. 206 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    38 comments  ·  Azure Active Directory » Azure AD Join  ·  Flag idea as inappropriate…  ·  Admin →
    MikeN supported this idea  · 
2 Next →

Feedback and Knowledge Base