Azure EpicsšŸ”

# Azure Governance āš–ļø & Management šŸ”Ø

Azure Governance & Management
  • by BrunoGabrielli
    Hello AMBA-ALZ customers, after some time since our last Time for new exciting news about AMBA-ALZ pattern!Ā blog post it again time for some exciting news. We are very thrilled to share that in September 2025 we were able to reach […]
  • by Fernando_Vasconcellos
    Why cost efficiency matters more than ever In today’s digital-first economy, cost efficiency is top of mind for organizations worldwide. As businesses increasingly rely on cloud and AI technologies to drive innovation, streamline operations, and deliver customer value, the pressure […]
  • by AmirB
    We’re thrilled to announce the General Availability (GA) of the Enhanced Azure Security Baseline for Linux—a major milestone in cloud-native security and compliance. This release brings powerful, audit-only capabilities to overĀ 1.6 million Linux devices across all Azure regions, helping enterprise […]
  • by Goutham_Bandapati
    Why capacity reservations matter now Cloud isn’t running out of metal, but demand is compounding and often spikes. Resource strain shows up in specific regions, zones, and VM SKUs, especially for popular CPU families, memory-optimized sizes, and anything involving GPUs. […]
  • by mutemwamasheke
    Background: Azure Machine Configuration remains committed to enabling greater security and simplicity in at-scale server management for all Azure customers. Machine Configuration (previously known as Azure Policy Guest Configuration) enables both built-in and custom configuration as code allowing you to […]
  • by kenieva
    What are Service groups? Service Groups are a new resource container enabling management and observability scenarios where flexibility in hierarchy and membership is needed. Service Groups are tenant level resources so they can have members across the tenant but do […]
  • by Sydney Smith
    Bicep Local Deploy can be used to author Bicep files which use Bicep extensions that are designed to run fully locally, without the need for an Azure connection. This quick start guide provides guidance for creating your own Bicep Local […]
  • by Dan_Kershaw
    We're thrilled to announce that Bicep templates for Microsoft Entra ID resources is generally available from July 29th, 2025. Bicep templates bring declarative infrastructure as code (IaC) capabilities to Microsoft Graph resources. This new capability will initially be available for […]

# Azure Infrastructure šŸ—ļø

Azure Infrastructure
  • by Rama_Bhimanadhuni
    Co-authors: Choudary Maddukuri and Bhushan Mehendale AI infrastructure is scaling at an unprecedented pace, and the complexity of managing it is growing just as quickly. Onboarding new hardware into hyperscale fleets can take months, slowed by fragmented tools, vendor-specific firmware, […]
  • by EhsanNasr
    Ehsan Nasr, Director, Energy Technology, Microsoft Ā  What if the density of IT equipment surged dramatically due to AI acceleration? Would our existing power conversion and distribution systems be enough to support the next generation of GPU racks? As AI […]
  • by Bryankel
    Ā  Today at the Open Compute Project Global Summit, we introduced Caliptra 2.1, an open-source silicon Root of Trust (RoT) security subsystem designed for seamless integration into secure devices.Ā  Building upon Caliptra 1.0, which included capabilities for identity and measurement, […]
  • by andy_reg
    Next Generation HXU: Doubling Cooling Power for the AI Era AI is rewriting the rules of computing, and datacenter cooling is no exception. As workloads grow hotter and more dense, traditional air cooling simply can’t keep up. Enter our next […]
  • by RavinderGupta
    The Context Retention Challenge in Agentic AI Agentic AI systems often involve multiple agents collaborating on complex tasks, such as a research agent gathering data and a summarizer agent generating reports. Without proper context retention, agents may: Lose Track of […]
  • by prjelesi-msft
    Using Azure as a cloud, not as a region As Mark Russinovich stated in hisĀ blog post we want to empower customers and partners to build and run applications and data with the highest performance, availability, and security possible. That’s why […]
  • by lakshaymalik
    Architecture at a glance Diagram: ā€œAGC with AKS Networking Models (Overlay & Flat)ā€ – attached below. Left: internet ↦ AGC Frontend (Public/Private) Middle: AGC (Gateway) ↦ AGC Subnet (/24) ↦ AKS Node Subnet(s) Right (two options): Overlay: Pods use Overlay CIDR […]
  • by lakshaymalik
    Multi‑agent systems turn complex, cross‑department processes into reliable, scalable AI workflows. Here’s a practical guide to designing, wiring, and shipping them with Azure AI Foundry—plus three real‑world scenarios you can take to production. Why multi‑agent—and why now? Modern business workflows […]

# Azure Network SecurityšŸ”

Azure Network Security
  • by surenjamiyanaa
    Azure Firewall protects your applications and workloads with cloud-native network security that automatically scales based on your traffic needs. Today, we’re excited to announce the general availability of prescaling in Azure Firewall – a new capability that gives you more control […]
  • by SaleemBseeu
    With the adoption of the NIS2 Directive EU 2022 2555, cybersecurity obligations for both public and private sector organizations have become more strict and far reaching. NIS2 aims to establish a higher common level of cybersecurity across the European Union […]
  • by ShabazShaik
    The internet’s transport layer is undergoing one of its most significant evolutions in decades.Ā QUIC (Quick UDP Internet Connections) — the protocol underpinning HTTP/3 — is rapidly becoming the default for high performance, secure communication on the web. From YouTube streaming […]
  • by andrewmathu
    Introduction Azure Web Application Firewall (WAF) is a cloud-native service that actively protects web applications from common vulnerabilities and exploits. It also supports custom rules that allow fine-grained control over traffic. Among these custom rules is the rate-limiting feature available […]
  • by surenjamiyanaa
    Background: Since its launch in 2020, Azure Firewall Manager has supported customers in securing their networks. But the role of network security has since evolved, from a foundational requirement to a strategic priority for organizations. Today, organizations must protect every […]
  • by yuvalpery
    A new HTTP/2 vulnerability, CVE-2025-8671 (MadeYouReset), was recently disclosed on August 13, 2025. This attack leverages carefully crafted protocol frames to force servers into repeatedly resetting streams on a single connection, which can lead to high resource consumption and denial […]
  • by yuvalpery
    A new HTTP/2 vulnerability, CVE-2025-8671 (MadeYouReset), was recently disclosed on August 13, 2025. This attack leverages carefully crafted protocol frames to force servers into repeatedly resetting streams on a single connection, which can lead to high resource consumption and denial […]
  • by yuvalpery
    Summary Microsoft recently disclosed CVE-2025-53770, a critical vulnerability affecting on-premises SharePoint Server versions 2016, 2019, 2010, 2013, and Subscription Edition (SE). The vulnerability allows unauthenticated remote code execution (RCE) by chaining two separate CVEs: CVE-2025-49706 – Authentication Bypass CVE-2025-49704 – […]

# Azure Virtual Desktop (AVD) šŸ–„ļø

Azure Virtual Desktop (AVD)
  • by Ron_Coleman
    Azure Virtual Desktop continues to evolve with features that simplify deployment and management of session hosts for our customers. Today, we’re excited to announce the public preview of Ephemeral OS disk support, the latest milestone in our Enhanced Host Pool […]
  • by ivaylo_ivanov
    Windows 10 reaches end of support on October 14, 2025. A great place to learn about all the Windows 10 Extended Security Updates (ESU) options is in our blog post, When to use Windows 10 Extended Security Updates. In this […]
  • by Ron_Coleman
    We’re pleased to announce that the Azure Virtual Desktop metadata database is now available in the Korea Central region. This release is part of our ongoing global expansion, following our rollout earlier this year in Southeast Asia. By extending regional […]
  • by Rinku_Dalwani
    We are excited to announce the public preview of Remote Desktop Protocol (RDP) Multipath for Azure Virtual Desktop. This new feature is designed to enhance remote desktop connectivity and reliability without requiring configuration changes from IT admins and users. By […]
  • by JimMoyle
    We're excited to announce the general availability of two enhancements to App attach in Azure Virtual Desktop: Support for Microsoft Application Virtualization (App-V) packages, and integration with leading third-party application delivery platforms Liquidware, Numecent, and Omnissa. App attach is a […]
  • by femi_adebayo
    We are thrilled to announce the general availability of a new Azure Virtual Desktop capability that allows multiple personal desktops to be assigned to a single user within one host pool. This update, previously in public preview, improves upon the […]
  • by Derek_Su
    As part of the Microsoft Secure Future Initiative (SFI), Azure Virtual Desktop is enhancing its default security by disabling clipboard, drive, USB, and printer redirections for all newly created host pools. This change minimizes the risk of data exfiltration and […]
  • by Ron_Coleman
    We are pleased to announce that the Azure Virtual Desktop metadata database is now generally available in Southeast Asia. This extends our regional database capability to meet your organization's requirements. We are constantly expanding the footprint of the Azure Virtual […]
Scroll to Top