# Azure Governance âď¸ & Management đ¨

- by Fernando_VasconcellosWhy cost efficiency matters more than ever In todayâs digital-first economy, cost efficiency is top of mind for organizations worldwide. As businesses increasingly rely on cloud and AI technologies to drive innovation, streamline operations, and deliver customer value, the pressure […]
- by AmirBWeâre thrilled to announce the General Availability (GA) of the Enhanced Azure Security Baseline for Linuxâa major milestone in cloud-native security and compliance. This release brings powerful, audit-only capabilities to over 1.6 million Linux devices across all Azure regions, helping enterprise […]
- by Goutham_BandapatiWhy capacity reservations matter now Cloud isnât running out of metal, but demand is compounding and often spikes. Resource strain shows up in specific regions, zones, and VM SKUs, especially for popular CPU families, memory-optimized sizes, and anything involving GPUs. […]
- by mutemwamashekeBackground: Azure Machine Configuration remains committed to enabling greater security and simplicity in at-scale server management for all Azure customers. Machine Configuration (previously known as Azure Policy Guest Configuration) enables both built-in and custom configuration as code allowing you to […]
- by kenievaWhat are Service groups? Service Groups are a new resource container enabling management and observability scenarios where flexibility in hierarchy and membership is needed. Service Groups are tenant level resources so they can have members across the tenant but do […]
- by Sydney SmithBicep Local Deploy can be used to author Bicep files which use Bicep extensions that are designed to run fully locally, without the need for an Azure connection. This quick start guide provides guidance for creating your own Bicep Local […]
- by Dan_KershawWe're thrilled to announce that Bicep templates for Microsoft Entra ID resources is generally available from July 29th, 2025. Bicep templates bring declarative infrastructure as code (IaC) capabilities to Microsoft Graph resources. This new capability will initially be available for […]
- by Nikita_BajajAzure Automation continues to evolve as a robust platform to address the dynamic needs of modern enterprises. In alignment with our commitment to provide business continuity and enhance security of our customers, we are pleased to announce a series of powerful releases. […]
# Azure Infrastructure đď¸

- by prjelesi-msftUsing Azure as a cloud, not as a region As Mark Russinovich stated in his blog post we want to empower customers and partners to build and run applications and data with the highest performance, availability, and security possible. Thatâs why […]
- by lakshaymalikArchitecture at a glance Diagram: âAGC with AKS Networking Models (Overlay & Flat)â â attached below. Left: internet âŚÂ AGC Frontend (Public/Private) Middle: AGC (Gateway) ⌠AGC Subnet (/24) ⌠AKS Node Subnet(s) Right (two options): Overlay: Pods use Overlay CIDR […]
- by lakshaymalikMultiâagent systems turn complex, crossâdepartment processes into reliable, scalable AI workflows. Hereâs a practical guide to designing, wiring, and shipping them with Azure AI Foundryâplus three realâworld scenarios you can take to production. Why multiâagentâand why now? Modern business workflows […]
- by Sakshi_Gupta22đ Pipeline Overview    The Pipeline consists of the following key stages:                 Install Dependencies â Ensure Angular CLI and required npm packages are […]
- by ravishaIn our journey building and operating Azure PaaS solutions under real-world pressure, weâve encountered concurrency bugs, messaging quirks, and performance bottlenecks that only show up at scale. When cloud applications scale, they stretch the limits and sometimes break in unexpected […]
- by Devi_PriyaThis guide provides instructions for creating a sample Standard logic app workflow locally using Visual Studio Code and the Azure Logic Apps (Standard) extension, intended for use with single-tenant Azure Logic Apps. Throughout this guide, you'll create a Standard logic […]
- by Gopikrishna Kannan Azure Firewall Premium has included protections against Lumma Stealer since 2022, with over 2,700 intrusion detection and prevention (IDPS) signatures specifically designed to identify and block Lumma-related activity. Backed by Microsoftâs global threat intelligence, our firewall telemetry confirms that […]
- by Max_UritskyAzure Boost: leading cloud performance innovation Azureâs proprietary system Azure Boost announced has driven new industry records in storage performance in 2025. This system enables effective and efficient offloading of virtualization processes onto accelerated hardware enabling Azure Compute offerings to […]
# Azure Network Securityđ

- by SaleemBseeuWith the adoption of the NIS2 Directive EU 2022 2555, cybersecurity obligations for both public and private sector organizations have become more strict and far reaching. NIS2 aims to establish a higher common level of cybersecurity across the European Union […]
- by ShabazShaikThe internetâs transport layer is undergoing one of its most significant evolutions in decades. QUIC (Quick UDP Internet Connections) â the protocol underpinning HTTP/3 â is rapidly becoming the default for high performance, secure communication on the web. From YouTube streaming […]
- by andrewmathuIntroduction Azure Web Application Firewall (WAF) is a cloud-native service that actively protects web applications from common vulnerabilities and exploits. It also supports custom rules that allow fine-grained control over traffic. Among these custom rules is the rate-limiting feature available […]
- by surenjamiyanaaBackground: Since its launch in 2020, Azure Firewall Manager has supported customers in securing their networks. But the role of network security has since evolved, from a foundational requirement to a strategic priority for organizations. Today, organizations must protect every […]
- by yuvalperyA new HTTP/2 vulnerability, CVE-2025-8671 (MadeYouReset), was recently disclosed on August 13, 2025. This attack leverages carefully crafted protocol frames to force servers into repeatedly resetting streams on a single connection, which can lead to high resource consumption and denial […]
- by yuvalperyA new HTTP/2 vulnerability, CVE-2025-8671 (MadeYouReset), was recently disclosed on August 13, 2025. This attack leverages carefully crafted protocol frames to force servers into repeatedly resetting streams on a single connection, which can lead to high resource consumption and denial […]
- by yuvalperySummary Microsoft recently disclosed CVE-2025-53770, a critical vulnerability affecting on-premises SharePoint Server versions 2016, 2019, 2010, 2013, and Subscription Edition (SE). The vulnerability allows unauthenticated remote code execution (RCE) by chaining two separate CVEs: CVE-2025-49706 â Authentication Bypass CVE-2025-49704 â […]
- by saikishorIn Part I of this series, we explored how to interact with Azureâs REST APIs using Bruno. Â We laid the foundation for provisioning and managing Azure Firewall using REST API, covering the core setup tasks such as creating the firewall […]
# Azure Virtual Desktop (AVD) đĽď¸

- by Ron_ColemanWeâre pleased to announce that the Azure Virtual Desktop metadata database is now available in the Korea Central region. This release is part of our ongoing global expansion, following our rollout earlier this year in Southeast Asia. By extending regional […]
- by Rinku_DalwaniWe are excited to announce the public preview of Remote Desktop Protocol (RDP) Multipath for Azure Virtual Desktop. This new feature is designed to enhance remote desktop connectivity and reliability without requiring configuration changes from IT admins and users. By […]
- by JimMoyleWe're excited to announce the general availability of two enhancements to App attach in Azure Virtual Desktop: Support for Microsoft Application Virtualization (App-V) packages, and integration with leading third-party application delivery platforms Liquidware, Numecent, and Omnissa. App attach is a […]
- by femi_adebayoWe are thrilled to announce the general availability of a new Azure Virtual Desktop capability that allows multiple personal desktops to be assigned to a single user within one host pool. This update, previously in public preview, improves upon the […]
- by Derek_SuAs part of the Microsoft Secure Future Initiative (SFI), Azure Virtual Desktop is enhancing its default security by disabling clipboard, drive, USB, and printer redirections for all newly created host pools. This change minimizes the risk of data exfiltration and […]
- by Ron_ColemanWe are pleased to announce that the Azure Virtual Desktop metadata database is now generally available in Southeast Asia. This extends our regional database capability to meet your organization's requirements. We are constantly expanding the footprint of the Azure Virtual […]
- by EricOrmanAre you prepared to explore the capabilities of Azure Virtual Desktop with a streamlined setup process? We are thrilled to announce the general availability of Quickstart, which helps you quickly deploy a sample environment and makes it easy to familiarize […]
- by Seneca_FriendIn the dynamic world of virtual desktop infrastructure (VDI), it's essential to streamline resource management. That's why we're excited to announce that the ability to allow multiple personal desktops to be assigned to a single user within a single host […]