Richard

My feedback

  1. 42 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  Azure Active Directory » Application Proxy  ·  Flag idea as inappropriate…  ·  Admin →
    Richard commented  · 

    I would like this feature for the MS Remote Desktop Web Client

    Richard supported this idea  · 
  2. 212 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    22 comments  ·  Azure Active Directory » Application Proxy  ·  Flag idea as inappropriate…  ·  Admin →
    Richard commented  · 

    Providing this feature would enable proper MFA logon and the other inbuilt Azure / ADFS DoS mitigation across platforms.

    The only other alternative solutions I have found (both depend on RDP client):
    RD Gateway over App Proxy or ADFS - Must use Internet Explorer and ActiveX
    RD Gateway with NPS / Radius extension to provide MFA - Bad user experience and vulnerable to DoS attack

    The Remote Web Client appears to look and function identically to WVD and that has MFA.

    Richard supported this idea  · 
  3. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Richard shared this idea  · 
  4. 8 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Richard commented  · 

    For example Event 4724 - an attempt to reset a password - can be a success audit or a failure.
    Log Analytics doesn't appear to bring through this information.

    Richard supported this idea  · 
  5. 17 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    9 comments  ·  Azure Active Directory » Identity Protection  ·  Flag idea as inappropriate…  ·  Admin →
    Richard commented  · 

    Under new GDPR rules only risk events are shown for the last 30 days (instead of 90) however the user is still displayed in the Users flagged for risk section.
    We now have nearly 500 users displayed with zero risks displayed for each user.
    We could dismiss all events for each user (even though no risks displayed) and the user will be removed from the list. But this isn't practical in the UI for nearly 500 users.

    Richard supported this idea  · 
  6. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  (General Feedback) » azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
    Richard shared this idea  · 
  7. 244 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    20 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    Richard supported this idea  · 
  8. 17 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    Richard supported this idea  · 

Feedback and Knowledge Base