# Azure Governance āļø & Management šØ

- by BrunoGabrielliHello AMBA-ALZ customers, after some time since our last Time for new exciting news about AMBA-ALZ pattern!Ā blog post it again time for some exciting news. We are very thrilled to share that in September 2025 we were able to reach […]
- by Fernando_VasconcellosWhy cost efficiency matters more than ever In todayās digital-first economy, cost efficiency is top of mind for organizations worldwide. As businesses increasingly rely on cloud and AI technologies to drive innovation, streamline operations, and deliver customer value, the pressure […]
- by AmirBWeāre thrilled to announce the General Availability (GA) of the Enhanced Azure Security Baseline for Linuxāa major milestone in cloud-native security and compliance. This release brings powerful, audit-only capabilities to overĀ 1.6 million Linux devices across all Azure regions, helping enterprise […]
- by Goutham_BandapatiWhy capacity reservations matter now Cloud isnāt running out of metal, but demand is compounding and often spikes. Resource strain shows up in specific regions, zones, and VM SKUs, especially for popular CPU families, memory-optimized sizes, and anything involving GPUs. […]
- by mutemwamashekeBackground: Azure Machine Configuration remains committed to enabling greater security and simplicity in at-scale server management for all Azure customers. Machine Configuration (previously known as Azure Policy Guest Configuration) enables both built-in and custom configuration as code allowing you to […]
- by kenievaWhat are Service groups? Service Groups are a new resource container enabling management and observability scenarios where flexibility in hierarchy and membership is needed. Service Groups are tenant level resources so they can have members across the tenant but do […]
- by Sydney SmithBicep Local Deploy can be used to author Bicep files which use Bicep extensions that are designed to run fully locally, without the need for an Azure connection. This quick start guide provides guidance for creating your own Bicep Local […]
- by Dan_KershawWe're thrilled to announce that Bicep templates for Microsoft Entra ID resources is generally available from July 29th, 2025. Bicep templates bring declarative infrastructure as code (IaC) capabilities to Microsoft Graph resources. This new capability will initially be available for […]
# Azure Infrastructure šļø

- by Rama_BhimanadhuniCo-authors: Choudary Maddukuri and Bhushan Mehendale AI infrastructure is scaling at an unprecedented pace, and the complexity of managing it is growing just as quickly. Onboarding new hardware into hyperscale fleets can take months, slowed by fragmented tools, vendor-specific firmware, […]
- by EhsanNasrEhsan Nasr, Director, Energy Technology, Microsoft Ā What if the density of IT equipment surged dramatically due to AI acceleration? Would our existing power conversion and distribution systems be enough to support the next generation of GPU racks? As AI […]
- by BryankelĀ Today at the Open Compute Project Global Summit, we introduced Caliptra 2.1, an open-source silicon Root of Trust (RoT) security subsystem designed for seamless integration into secure devices.Ā Building upon Caliptra 1.0, which included capabilities for identity and measurement, […]
- by andy_regNext Generation HXU: Doubling Cooling Power for the AI Era AI is rewriting the rules of computing, and datacenter cooling is no exception. As workloads grow hotter and more dense, traditional air cooling simply canāt keep up. Enter our next […]
- by RavinderGuptaThe Context Retention Challenge in Agentic AI Agentic AI systems often involve multiple agents collaborating on complex tasks, such as a research agent gathering data and a summarizer agent generating reports. Without proper context retention, agents may: Lose Track of […]
- by prjelesi-msftUsing Azure as a cloud, not as a region As Mark Russinovich stated in hisĀ blog post we want to empower customers and partners to build and run applications and data with the highest performance, availability, and security possible. Thatās why […]
- by lakshaymalikArchitecture at a glance Diagram: āAGC with AKS Networking Models (Overlay & Flat)ā ā attached below. Left: internet ā¦Ā AGC Frontend (Public/Private) Middle: AGC (Gateway) ⦠AGC Subnet (/24) ⦠AKS Node Subnet(s) Right (two options): Overlay: Pods use Overlay CIDR […]
- by lakshaymalikMultiāagent systems turn complex, crossādepartment processes into reliable, scalable AI workflows. Hereās a practical guide to designing, wiring, and shipping them with Azure AI Foundryāplus three realāworld scenarios you can take to production. Why multiāagentāand why now? Modern business workflows […]
# Azure Network Securityš

- by surenjamiyanaaAzure Firewall protects your applications and workloads with cloud-native network security that automatically scales based on your traffic needs. Today, weāre excited to announce the general availability of prescaling in Azure FirewallĀ ā a new capability that gives you more control […]
- by SaleemBseeuWith the adoption of the NIS2 Directive EU 2022 2555, cybersecurity obligations for both public and private sector organizations have become more strict and far reaching. NIS2 aims to establish a higher common level of cybersecurity across the European Union […]
- by ShabazShaikThe internetās transport layer is undergoing one of its most significant evolutions in decades.Ā QUIC (Quick UDP Internet Connections) ā the protocol underpinning HTTP/3 ā is rapidly becoming the default for high performance, secure communication on the web. From YouTube streaming […]
- by andrewmathuIntroduction Azure Web Application Firewall (WAF) is a cloud-native service that actively protects web applications from common vulnerabilities and exploits. It also supports custom rules that allow fine-grained control over traffic. Among these custom rules is the rate-limiting feature available […]
- by surenjamiyanaaBackground: Since its launch in 2020, Azure Firewall Manager has supported customers in securing their networks. But the role of network security has since evolved, from a foundational requirement to a strategic priority for organizations. Today, organizations must protect every […]
- by yuvalperyA new HTTP/2 vulnerability, CVE-2025-8671 (MadeYouReset), was recently disclosed on August 13, 2025. This attack leverages carefully crafted protocol frames to force servers into repeatedly resetting streams on a single connection, which can lead to high resource consumption and denial […]
- by yuvalperyA new HTTP/2 vulnerability, CVE-2025-8671 (MadeYouReset), was recently disclosed on August 13, 2025. This attack leverages carefully crafted protocol frames to force servers into repeatedly resetting streams on a single connection, which can lead to high resource consumption and denial […]
- by yuvalperySummary Microsoft recently disclosed CVE-2025-53770, a critical vulnerability affecting on-premises SharePoint Server versions 2016, 2019, 2010, 2013, and Subscription Edition (SE). The vulnerability allows unauthenticated remote code execution (RCE) by chaining two separate CVEs: CVE-2025-49706 ā Authentication Bypass CVE-2025-49704 ā […]
# Azure Virtual Desktop (AVD) š„ļø

- by Ron_ColemanAzure Virtual Desktop continues to evolve with features that simplify deployment and management of session hosts for our customers. Today, weāre excited to announce the public preview of Ephemeral OS disk support, the latest milestone in our Enhanced Host Pool […]
- by ivaylo_ivanovWindows 10 reaches end of support on October 14, 2025. A great place to learn about all the Windows 10 Extended Security Updates (ESU) options is in our blog post, When to use Windows 10 Extended Security Updates. In this […]
- by Ron_ColemanWeāre pleased to announce that the Azure Virtual Desktop metadata database is now available in the Korea Central region. This release is part of our ongoing global expansion, following our rollout earlier this year in Southeast Asia. By extending regional […]
- by Rinku_DalwaniWe are excited to announce the public preview of Remote Desktop Protocol (RDP) Multipath for Azure Virtual Desktop. This new feature is designed to enhance remote desktop connectivity and reliability without requiring configuration changes from IT admins and users. By […]
- by JimMoyleWe're excited to announce the general availability of two enhancements to App attach in Azure Virtual Desktop: Support for Microsoft Application Virtualization (App-V) packages, and integration with leading third-party application delivery platforms Liquidware, Numecent, and Omnissa. App attach is a […]
- by femi_adebayoWe are thrilled to announce the general availability of a new Azure Virtual Desktop capability that allows multiple personal desktops to be assigned to a single user within one host pool. This update, previously in public preview, improves upon the […]
- by Derek_SuAs part of the Microsoft Secure Future Initiative (SFI), Azure Virtual Desktop is enhancing its default security by disabling clipboard, drive, USB, and printer redirections for all newly created host pools. This change minimizes the risk of data exfiltration and […]
- by Ron_ColemanWe are pleased to announce that the Azure Virtual Desktop metadata database is now generally available in Southeast Asia. This extends our regional database capability to meet your organization's requirements. We are constantly expanding the footprint of the Azure Virtual […]