Brian “B” Laws

My feedback

  1. 59 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    Brian “B” Laws supported this idea  · 
  2. 424 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    33 comments  ·  Site Recovery  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws commented  · 

    This feature is critically needed. My customer has one SQL Server VM with 17+ TB of disk and another with 8.5 TB with only a 1 Gbps uplink. We tried ASR protection but found that the storage array would run out of space, crashing the server. We would like to use ASR as the single solution for their entire DR, but large VMs like this make that impossible. Being able to seed huge VMs like this using offline replication could enable these scenarios.

    Brian “B” Laws supported this idea  · 
  3. 45 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    9 comments  ·  Azure mobile app  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws supported this idea  · 
  4. 5 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Government » Feature Request  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws supported this idea  · 
  5. 68 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Azure Stack » Network  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws supported this idea  · 
  6. 151 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Site Recovery  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws supported this idea  · 
  7. 382 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    15 comments  ·  Azure Stack » Network  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws supported this idea  · 
  8. 22 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Azure Stack » ARM  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws supported this idea  · 
  9. 113 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    40 comments  ·  Azure Government » Service Request  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws commented  · 

    This will be incredibly useful, too, when agencies share a single AD for identities. Say Department X owns the identities for itself and its sub-agencies. The sub agencies join their machines to Dept. X's domain and uses the identities from Dept. X's AD for access. Dept. X then synchronizes identities to their AAD tenant (such as for O365). If a sub-agency stands up their own Azure subscription and thus has their own AAD tenant, they would be unable to use their own identities in their own tenant without AAD B2B (because the identities live in another tenant). If they could add identities from Dept. X to their sub-agency AAD, then they could use SSO the same as they do on-premises. Otherwise, they'd have to use cloud-only accounts (and thus remember another login and password) or deploy a new AD that they sync. I'm currently trying to design a solution around this and am hitting a dead-end.

    Brian “B” Laws supported this idea  · 
  10. 7 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    under review  ·  0 comments  ·  Azure Backup » IaaS VM  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws shared this idea  · 
  11. 296 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    planned  ·  5 comments  ·  Azure Backup » MARS  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws supported this idea  · 
  12. 10 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Virtual Machines  ·  Flag idea as inappropriate…  ·  Admin →
    Brian “B” Laws supported this idea  · 
  13. 3,091 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    125 comments  ·  Storage » Files  ·  Flag idea as inappropriate…  ·  Admin →

    Hi everyone,

    We recently announce the General Availability of Azure Active Directory Domain Services (Azure AD DS) authentication for Azure Files! By enabling integration with Azure AD DS, you can mount your Azure file share over SMB using Azure AD credentials from Azure AD DS domain joined Windows VMs with NTFS ACLs enforced. For more details, please refer to our blog post:http://aka.ms/azure-file-aadds-authentication-ga-blog.

    A part of the GA announcement, we shared the upcoming plan to extend the authentication support to Active Directory (AD) either hosted on-premises or in cloud. If you need an Azure Files solution with AD authentication today, you can consider installing Azure File Sync (AFS) on your Windows File Servers where AD integration is fully supported.

    If you are interested to hear future updates on Azure Files Active Directory Authentication, please complete this sign-up survey:https://aka.ms/AzureFilesADAuthPreviewSurvey.

    Thanks,
    Azure Files Team

    Brian “B” Laws commented  · 

    Being able to access Azure Files via a UNC would make the service vastly more useful. We could at that point use it like a traditional NAS for accessing common files and for automated processes. Like Eric said, non-interactive services are unable to access the Azure Files shares since they are unable to map the drive (that is, without a lot of complicated configuration). This would enable us to use it as a backup target for SQL Server, SharePoint, etc. Yes, SQL Server backups can write to an Azure Storage account, but this option is not available in Maintenance Plans (at least as of SQL 2012). We could abandon Maintenance Plans but that would require a higher level of complexity and management.

    Brian “B” Laws supported this idea  · 

Feedback and Knowledge Base