Soporte técnico de la comunidad de Azure
Formule preguntas, obtenga respuestas y comuníquese con los ingenieros de Microsoft y los expertos de la comunidad de Azure
Introducción a Azure en Q&A
Obtenga respuestas a sus preguntas técnicas sobre los servicios y productos de Azure. Conéctese con expertos de Microsoft y de la comunidad, comparta sus comentarios y aprenda de otras personas. Azure en Q&A, en el sitio de Microsoft Q&A, va a reemplazar al foro de MSDN. Sin embargo, todavía puede examinar los archivos del foro.
Respuestas de Microsoft y de la comunidad a preguntas técnicas anteriores de Azure
Forum: Azure Networking (DNS, Traffic Manager, VPN, VNET)
Forum: Azure N-Series Virtual Machines
Forum: Microsoft Azure Site Recovery
Forum: Azure Active Directory
Respuestas de la comunidad a las preguntas de desarrollo
Respuestas de la comunidad a las preguntas de administración de Sys/Net
Publique ideas o sugerencias basas en su experiencia con Azure
It would be really helpful to be able to see in Azure AD and B2C failed sign in attempts from users that does not exist in the tenant directory. I can only see sign in attempts from users that exist on my tenant but how about if someone is trying to force a login multiple times from a users that doesn't exist?
Why does Azure not offer customers a decent browser that can be used out-of-the-box after provisioning a Win server VM on Azure instead of Internet Explorer ? It would be nice to ship a default browser that works (instead of having customers grapple with this as the first thing to fix post provisioning) as most often, it’s the first thing needed to download additional software etc. Thanks!
Right now any values entered in Azure portal passed as strings to backend which prevents scenarios where underlying infrastructure expects integers for enforcement. Additional details can be found here https://stackoverflow.com/questions/64465509/how-do-you-policy-enforce-integer-number-of-tag-value-in-azure/64481229?noredirect=1#comment114021208_64481229
Not sure if it possible to route a traffic to one of the instance and separate the traffic in between VPN gateway Instances. If that becomes possible it would be most effective way to segregate the routing and packets
After February 1st 2010, it's going to be tough for developers/freelancers/hobbiest to learn, test and deploy azure applications as it's going to be billed for everything. Like Google AppEngine (http://code.google.com/appengine/whyappengine.html#norisk) Azure should provide free offering for developers with some similar limitations and if the usage goes beyond, one can enter in billing.
The option of using Azure Data Factory v2 to migrate data to the Power Platform / CDS / D365 is good, although there are a few features that are missing that almost negate considering the tool as a viable option. Two such examples are:-1. You cannot write to the createdby field on any entity as the createdby is always set in the context of the user in the Linked Service and does not respect the data that is passed to it as part of the Sink data source2. There is no way to migrate data into the native CDS / D365 many-to-many entities (aka mapping table / entity), despite these only consisting of 3 fields (a unique ID and the 2 Foreign Keys of the related entities).3. No support for PartyList type fields
When you create a custom error page in Application Gateway, the storage blob stored the error page file needs to be accessible publicly now.It would be nice to be able to limit access to the storage blob so that we can make sure our data is secure.
I want to transfer a client certificate to the backend with Azure Front Door.However, Azure Front Door doesn't support the SSL passthrough function.I would like to support transferring the client certificate used in the TLS session established between Azure Front Door and the client to the backend.
For now,when customers want to disassociate WAF policy from Application Gateway,we have to change Application Gateway from WAF SKU to Standard SKU.When we changed to Standard SKU,system can be exposed to threats.Please redesign this just like that disassociating WAF policy from listener.