Anonymous

My feedback

  1. 47 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  2. 78 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
  3. 6 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Active Directory » Reporting  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous commented  · 

    Is there an update on this?
    30 days of logs is often not nearly enough. Especially when running a forensic investigation where suspected activites took place several weeks ago.

    Anonymous supported this idea  · 
  4. 96 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous supported this idea  · 
    Anonymous commented  · 

    The feature in Windows 10 logon should be re-labeld as "Manage Password" or some similar. It absolutely needs to cover both password changes and account unlock functionality.

  5. 109 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Anonymous commented  · 

    Very much looking forward to more accurate reporting on SSPR activities.! Right now if a new user registers or an existing user updates their registration in anyway, the events in the logs are exactly the same. There is no way to generate reports differentiating New vsa Existing.

    Anonymous supported this idea  · 
  6. 119 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    12 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous commented  · 

    Is there an ETA on this? Not being able to bulk import for over 700 sites is a big drawback. Being able to bulk import all the various subnets in CIDR form, along with additonal columns for fields like Name, IP Addr or Region, Mark as Trusted (Y or N). Should also show a Preview before applying. Highlight any matches to existing subnets, or which subnets are new, etc.

    Anonymous supported this idea  · 
  7. 11 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    3 comments  ·  Azure Active Directory » SaaS Applications  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous commented  · 

    Absolutely need this feature! So many third-party iDP's don't necessarily align 1to1 with respect to claims attributes. ADFS has had this ability for quite a while now. This is the one missing feature that is keeping us on ADFS for a number of applications.

    Anonymous supported this idea  · 
  8. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous supported this idea  · 
  9. 1 vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory » Conditional Access  ·  Flag idea as inappropriate…  ·  Admin →
    Anonymous shared this idea  · 
  10. 207 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Our feature team is looking into options for addressing this scenario, but we do not yet have any timelines to share. For now as a workaround, you can manually trigger the reprocessing by updating the membership rule to add a whitespace at the end. We’ve also added the ability to check the membership processing status, to keep track of the status and know if processing is complete.

    Anonymous supported this idea  · 

Feedback and Knowledge Base