Azure Community Support
Ask questions, get answers and connect with Microsoft engineers and Azure community experts
Introducing Azure on Q and A
Find answers to your technical questions about Azure products and services. Connect with Microsoft and community experts, share feedback and learn from others. Azure on Q and A, on the Microsoft Q and A site, is replacing the MSDN forum. But you can still browse the forum archives.
Microsoft and community responses to older Azure technical questions
Forum: Azure Networking (DNS, Traffic Manager, VPN, VNET)
Forum: Azure N-Series Virtual Machines
Forum: Microsoft Azure Site Recovery
Forum: Azure Active Directory
Community responses to development questions
Community responses to Sys/Net admin questions
Post ideas or suggestions based on your experience with Azure
Owner Name:Patricia TerryAdress:2807 Hwy 138 Jonesboro Ga 30236Phone:770-892-1677Website:https://www.touchedbyanangelbeautyschool.comBusiness Email:email@example.com:Affordable, nails Program, Esthectian , south side , Atlanta , best beauty schoolDescription:Touched By An Angel Beauty School’s goal is to transform our students’ dream into a professional reality. Through our education, we strive to instill pride in our graduates and we aim to be the leading employment source for the beauty and wellness industry. The salon and spa industry is a vibrant and growing component of the U.S. economy, with more than 974,000 total establishments and annual sales of more than $40 billion. Touched By An Angel graduates will belong to an elite group of graduates that will expand beyond and into the new millennium as beauty educators. Our school, like our salons will be recognized and respected in the beauty and wellness industry. We invite our graduates and fellow salon colleagues to remain actively involved with us after graduation.Social Link:https://www.instagram.com/tba_beauty_school/
Webroot antivirus is one in all the simplest code to safeguard all digital devices one will get additional details on www webroot com secureanywhere. https://websafeus.com
https://mysignins.microsoft.com/When I look at the recent sign in activity for my account I see many attempts to sign in to my office 365 account from states far away from me. All the login attempts are unsuccessful, originate from the same IP address, and have a recurring time period (usually every 15 or 30 minutes). There is a link on the login attempts to allow me to mark the login as unsafe but the login attempts continue to happen.I believe the hacker cannot get in to my account because they do not have my password. I also have Multifactor Authentication enabled for further protection. Since I can login to the MySignin page with MFA enabled, I do indeed have control of the account. I should therefore be able to have the IP address of this hacker blacklisted from even attempted to login to my account. Even if this blacklisting was only for a certain amount of days 30, 60, 90 days, whatever. There is obviously something happening from this IP address that is not right. Blacklisting it will not affect my legitimate use of my office 365 account. There are literally hundreds of failed login attempts from the same two IP addresses.I would settle for blacklisting My Microsoft account from logging in from those IP addresses. Anybody else could be able to login from those IP addresses with their Microsoft accounts.
Currently we had a customer reported a issue that when they created a Private DNS zone for "privatelink.monitor.azure.com" before created the actual private endpoint for Azure monitor service, they were not able to resolve the FQDN "dc.services.visualstudio.com" any more.The investigation showed that the FQDN "dc.services.visualstudio.com" had a CNAME record to "global.in.ai.privatelink.monitor.azure.com". Thus the empty private DNS zone led to the DNS issue.But if we create the private endpoint for Azure monitor service and let Azure create the related private DNS zone, Azure will automatically create the A record for "global.in.ai" along with other 4 A records.So to avoid the issue, we have feedback as:1) Create a notification if any private endpoint need some Azure managed A record in Private DNS zone2) provide a list for Azure services which require to have the Azure managed A record in private DNS zone once private Endpoint created. This is in case customer need to create the private DNS zone before create the Private Endpoint.Thanks!
After February 1st 2010, it's going to be tough for developers/freelancers/hobbiest to learn, test and deploy azure applications as it's going to be billed for everything. Like Google AppEngine (http://code.google.com/appengine/whyappengine.html#norisk) Azure should provide free offering for developers with some similar limitations and if the usage goes beyond, one can enter in billing.
The option of using Azure Data Factory v2 to migrate data to the Power Platform / CDS / D365 is good, although there are a few features that are missing that almost negate considering the tool as a viable option. Two such examples are:-1. You cannot write to the createdby field on any entity as the createdby is always set in the context of the user in the Linked Service and does not respect the data that is passed to it as part of the Sink data source2. There is no way to migrate data into the native CDS / D365 many-to-many entities (aka mapping table / entity), despite these only consisting of 3 fields (a unique ID and the 2 Foreign Keys of the related entities).3. No support for PartyList type fields
Hello Team,Customer is having high distress in regard to the RBAC Role Assignments 2000 grant limitation. Customer is using Managed Identity and Storage access patterns relying on RBAC grants, it worried customer that it’s a trap and customer will hit that limit in a very short time. These RBAC roles are so useful for the customer but it’s only a matter of time before it hits the limit. Thank you for your consideration.
When you create a custom error page in Application Gateway, the storage blob stored the error page file needs to be accessible publicly now.It would be nice to be able to limit access to the storage blob so that we can make sure our data is secure.
I want to transfer a client certificate to the backend with Azure Front Door.However, Azure Front Door doesn't support the SSL passthrough function.I would like to support transferring the client certificate used in the TLS session established between Azure Front Door and the client to the backend.