Azure Epics🔝

# Azure Governance ⚖️ & Management 🔨

Azure Governance & Management
  • by Fernando_Vasconcellos
    Why cost efficiency matters more than ever In today’s digital-first economy, cost efficiency is top of mind for organizations worldwide. As businesses increasingly rely on cloud and AI technologies to drive innovation, streamline operations, and deliver customer value, the pressure […]
  • by AmirB
    We’re thrilled to announce the General Availability (GA) of the Enhanced Azure Security Baseline for Linux—a major milestone in cloud-native security and compliance. This release brings powerful, audit-only capabilities to over 1.6 million Linux devices across all Azure regions, helping enterprise […]
  • by Goutham_Bandapati
    Why capacity reservations matter now Cloud isn’t running out of metal, but demand is compounding and often spikes. Resource strain shows up in specific regions, zones, and VM SKUs, especially for popular CPU families, memory-optimized sizes, and anything involving GPUs. […]
  • by mutemwamasheke
    Background: Azure Machine Configuration remains committed to enabling greater security and simplicity in at-scale server management for all Azure customers. Machine Configuration (previously known as Azure Policy Guest Configuration) enables both built-in and custom configuration as code allowing you to […]
  • by kenieva
    What are Service groups? Service Groups are a new resource container enabling management and observability scenarios where flexibility in hierarchy and membership is needed. Service Groups are tenant level resources so they can have members across the tenant but do […]
  • by Sydney Smith
    Bicep Local Deploy can be used to author Bicep files which use Bicep extensions that are designed to run fully locally, without the need for an Azure connection. This quick start guide provides guidance for creating your own Bicep Local […]
  • by Dan_Kershaw
    We're thrilled to announce that Bicep templates for Microsoft Entra ID resources is generally available from July 29th, 2025. Bicep templates bring declarative infrastructure as code (IaC) capabilities to Microsoft Graph resources. This new capability will initially be available for […]
  • by Nikita_Bajaj
    Azure Automation continues to evolve as a robust platform to address the dynamic needs of modern enterprises. In alignment with our commitment to provide business continuity and enhance security of our customers, we are pleased to announce a series of powerful releases. […]

# Azure Infrastructure 🏗️

Azure Infrastructure

# Azure Network Security🔐

Azure Network Security
  • by SaleemBseeu
    With the adoption of the NIS2 Directive EU 2022 2555, cybersecurity obligations for both public and private sector organizations have become more strict and far reaching. NIS2 aims to establish a higher common level of cybersecurity across the European Union […]
  • by ShabazShaik
    The internet’s transport layer is undergoing one of its most significant evolutions in decades. QUIC (Quick UDP Internet Connections) — the protocol underpinning HTTP/3 — is rapidly becoming the default for high performance, secure communication on the web. From YouTube streaming […]
  • by andrewmathu
    Introduction Azure Web Application Firewall (WAF) is a cloud-native service that actively protects web applications from common vulnerabilities and exploits. It also supports custom rules that allow fine-grained control over traffic. Among these custom rules is the rate-limiting feature available […]
  • by surenjamiyanaa
    Background: Since its launch in 2020, Azure Firewall Manager has supported customers in securing their networks. But the role of network security has since evolved, from a foundational requirement to a strategic priority for organizations. Today, organizations must protect every […]
  • by yuvalpery
    A new HTTP/2 vulnerability, CVE-2025-8671 (MadeYouReset), was recently disclosed on August 13, 2025. This attack leverages carefully crafted protocol frames to force servers into repeatedly resetting streams on a single connection, which can lead to high resource consumption and denial […]
  • by yuvalpery
    A new HTTP/2 vulnerability, CVE-2025-8671 (MadeYouReset), was recently disclosed on August 13, 2025. This attack leverages carefully crafted protocol frames to force servers into repeatedly resetting streams on a single connection, which can lead to high resource consumption and denial […]
  • by yuvalpery
    Summary Microsoft recently disclosed CVE-2025-53770, a critical vulnerability affecting on-premises SharePoint Server versions 2016, 2019, 2010, 2013, and Subscription Edition (SE). The vulnerability allows unauthenticated remote code execution (RCE) by chaining two separate CVEs: CVE-2025-49706 – Authentication Bypass CVE-2025-49704 – […]
  • by saikishor
    In Part I of this series, we explored how to interact with Azure’s REST APIs using Bruno.  We laid the foundation for provisioning and managing Azure Firewall using REST API, covering the core setup tasks such as creating the firewall […]

# Azure Virtual Desktop (AVD) 🖥️

Azure Virtual Desktop (AVD)
  • by Ron_Coleman
    We’re pleased to announce that the Azure Virtual Desktop metadata database is now available in the Korea Central region. This release is part of our ongoing global expansion, following our rollout earlier this year in Southeast Asia. By extending regional […]
  • by Rinku_Dalwani
    We are excited to announce the public preview of Remote Desktop Protocol (RDP) Multipath for Azure Virtual Desktop. This new feature is designed to enhance remote desktop connectivity and reliability without requiring configuration changes from IT admins and users. By […]
  • by JimMoyle
    We're excited to announce the general availability of two enhancements to App attach in Azure Virtual Desktop: Support for Microsoft Application Virtualization (App-V) packages, and integration with leading third-party application delivery platforms Liquidware, Numecent, and Omnissa. App attach is a […]
  • by femi_adebayo
    We are thrilled to announce the general availability of a new Azure Virtual Desktop capability that allows multiple personal desktops to be assigned to a single user within one host pool. This update, previously in public preview, improves upon the […]
  • by Derek_Su
    As part of the Microsoft Secure Future Initiative (SFI), Azure Virtual Desktop is enhancing its default security by disabling clipboard, drive, USB, and printer redirections for all newly created host pools. This change minimizes the risk of data exfiltration and […]
  • by Ron_Coleman
    We are pleased to announce that the Azure Virtual Desktop metadata database is now generally available in Southeast Asia. This extends our regional database capability to meet your organization's requirements. We are constantly expanding the footprint of the Azure Virtual […]
  • by EricOrman
    Are you prepared to explore the capabilities of Azure Virtual Desktop with a streamlined setup process? We are thrilled to announce the general availability of Quickstart, which helps you quickly deploy a sample environment and makes it easy to familiarize […]
  • by Seneca_Friend
    In the dynamic world of virtual desktop infrastructure (VDI), it's essential to streamline resource management. That's why we're excited to announce that the ability to allow multiple personal desktops to be assigned to a single user within a single host […]
Scroll to Top