Azure 社区支持

提出问题,获取解答,并与 Microsoft 工程师和 Azure 社区专家取得联系

产品

    MSDN 论坛

    Microsoft 对 Azure 技术问题的回应

    1. 最近
    2. 常用
    3. 热门

    Help with charge on billing statment

    Forum: Pricing & Billing

    Different address space for External / Internal Interfaces on NVA

    Forum: Azure Networking (DNS, Traffic Manager, VPN, VNET)

    NSG layers?

    Forum: Azure Networking (DNS, Traffic Manager, VPN, VNET)

    Serverfault

    社区对系统/网络管理员所提出问题的回应

    1. 最近
    2. 常用
    3. 热门

    Pros and Cons of using a private IP address for different applications

    • azure
    • cloud
    • ip-address
    • azure-networking
    • private-ip

    Reporting Azure File Usage

    • azure
    • filesystems

    Convert Azure AD User to Exchange Online MailUser

    • exchange
    • azure
    • azure-active-directory
    • exchangeonline

    Manage external users, subscriptions, access to services

    • azure
    • azure-active-directory
    • microsoft

    Azure 反馈

    基于对 Azure 的体验,你是否有任何想法或建议?

    1. 最近
    2. 常用
    3. 热门

    Conditional Access Policies for Enterprise Applications to apply when there is no User Context

    Conditional Access Policies for Enterprise Applications to apply when there is no User Context. Currently there needs to be a User Context to apply a Conditional Access Control to. This means that if you're actively running daemon applications that require an Application Context token to run autonomously, you cannot enforce CA on those token requests and any subsequent requests from that token because there is no user to apply it to. This can become a serious security concern when auditing and controlling how calls are made to each application, especially when interfacing with external providers and services that use Oauth and application context to run autonomous applications on their side.

    Application Context Authentication and Request Auditing

    Application Context Authentication and Request Auditing. With the rising use of Enterprise Applications as a way for Web Applications to interface with O365 services, one of the main concerns around this Authentication method for Enterprise clients is being able to Monitor and Audit any logins and requests done without a User Context, using the App ID and Secret to request an Application context token to make requests. At the moment, Auditing or Monitoring these requests is not a feature that has been implemented for Enterprise Applications. This is a critical security concern for most Enterprise Clients, as being able to Audit requests done with Application Credentials is integral to any security team. At the moment, you can have Application details be compromised for whatever reason and there would be no direct way to detect that your environment is being a target of unwanted requests which could lead to data breaches.

    Better Scope the access needed to restore a VM from recovery vault

    While our 3rd party MSP was attempting to restore a VM we found that they did not have the required permissions. After reviewing the docs here https://docs.microsoft.com/en-us/azure/backup/backup-rbac-rs-vault we found that they need Contributor access, specifically resourcegroups/write. Creating resources groups is an authorization we need to limit. Requesting the product group remove this authorization from VM restores.

    Add a baseline metrics of avg. response time in Application Insights Metrics Explorer

    We can see the avg. response time in Metrics explorer but we would also like to see the baseline. The baseline would be the average response time in the last 30 days at that specific time.

    提交支持票据

    创建事件

    通过 @AzureSupport 向我们发送推文

    在 Twitter 上联系

    帮助我们改进。此页有帮助吗?

    160 个字符限制