Anonymous

My feedback

  1. 156 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  2. 246 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
    An error occurred while saving the comment
    Anonymous commented  · 

    Is there an update on this?
    SSPR with Hybrid AD and many remote users (no VPN) is almost useless without also updating the local cached credentials! Very poor end-user experience and far too confusing to try to explain.

  3. 57 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  4. 101 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  5. 6 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Active Directory » Reporting  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    Is there an update on this?
    30 days of logs is often not nearly enough. Especially when running a forensic investigation where suspected activites took place several weeks ago.

    Anonymous supported this idea  · 
  6. 108 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
    An error occurred while saving the comment
    Anonymous commented  · 

    The feature in Windows 10 logon should be re-labeld as "Manage Password" or some similar. It absolutely needs to cover both password changes and account unlock functionality.

  7. 164 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    24 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    Is there an ETA on this? Not being able to bulk import for over 700 sites is a big drawback. Being able to bulk import all the various subnets in CIDR form, along with additonal columns for fields like Name, IP Addr or Region, Mark as Trusted (Y or N). Should also show a Preview before applying. Highlight any matches to existing subnets, or which subnets are new, etc.

    Anonymous supported this idea  · 
  8. 26 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  Azure Active Directory » SaaS Applications  ·  Flag idea as inappropriate…  ·  Admin →
    An error occurred while saving the comment
    Anonymous commented  · 

    Absolutely need this feature! So many third-party iDP's don't necessarily align 1to1 with respect to claims attributes. ADFS has had this ability for quite a while now. This is the one missing feature that is keeping us on ADFS for a number of applications.

    Anonymous supported this idea  · 
  9. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  10. 1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous shared this idea  · 
  11. 381 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  Azure AD Team responded

    Our feature team is looking into options for addressing this scenario, but we do not yet have any timelines to share. For now as a workaround, you can manually trigger the reprocessing by updating the membership rule to add a whitespace at the end. We’ve also added the ability to check the membership processing status, to keep track of the status and know if processing is complete.

    Anonymous supported this idea  · 

Feedback and Knowledge Base