Azure Epics🔝

# Azure Governance ⚖️ & Management 🔨

Azure Governance & Management
  • by mutemwamasheke
    Background: Azure Machine Configuration remains committed to enabling greater security and simplicity in at-scale server management for all Azure customers. Machine Configuration (previously known as Azure Policy Guest Configuration) enables both built-in and custom configuration as code allowing you to […]
  • by Fernando_Vasconcellos
    This curated series of modules is designed to equip technical and business decision-makers, including IT, developers, engineers, AI engineers, administrators, solution architects, business analysts, and technology managers, with the practical knowledge and guidance needed to make cost-conscious decisions at every […]
  • by BrunoGabrielli
    Hello AMBA-ALZ customers, after some time since our last Time for new exciting news about AMBA-ALZ pattern! blog post it again time for some exciting news. We are very thrilled to share that in September 2025 we were able to reach […]
  • by Fernando_Vasconcellos
    Why cost efficiency matters more than ever In today’s digital-first economy, cost efficiency is top of mind for organizations worldwide. As businesses increasingly rely on cloud and AI technologies to drive innovation, streamline operations, and deliver customer value, the pressure […]
  • by AmirB
    We’re thrilled to announce the General Availability (GA) of the Enhanced Azure Security Baseline for Linux—a major milestone in cloud-native security and compliance. This release brings powerful, audit-only capabilities to over 1.6 million Linux devices across all Azure regions, helping enterprise […]
  • by Goutham_Bandapati
    Why capacity reservations matter now Cloud isn’t running out of metal, but demand is compounding and often spikes. Resource strain shows up in specific regions, zones, and VM SKUs, especially for popular CPU families, memory-optimized sizes, and anything involving GPUs. […]
  • by mutemwamasheke
    Background: Azure Machine Configuration remains committed to enabling greater security and simplicity in at-scale server management for all Azure customers. Machine Configuration (previously known as Azure Policy Guest Configuration) enables both built-in and custom configuration as code allowing you to […]
  • by kenieva
    What are Service groups? Service Groups are a new resource container enabling management and observability scenarios where flexibility in hierarchy and membership is needed. Service Groups are tenant level resources so they can have members across the tenant but do […]

# Azure Infrastructure 🏗️

Azure Infrastructure
  • by dhaneshuk
    1. Overview of Shared AKS Architecture 1.1 Goals Accelerate application delivery by providing a hardened shared Kubernetes platform per environment (prod / test / dev). Enable safe multi-tenancy using namespace, RBAC, NetworkPolicy, quotas, and pod security. Enforce consistency (standards, guardrails) […]
  • by singhshub
    In our previous article Microsoft Dev Box Creation using Terraform, we explored how to create Microsoft Dev Boxes using Terraform. Now, we’ll take the next step: **deploying Dev Box catalogs and synchronizing them with a GitHub repository**. This ensures that […]
  • by ibrahimbaig
      Migrating from NSG Flow Logs to VNet Flow Logs in Azure: Implementation with Terraform Author: Ibrahim Baig (Consultant) Executive Summary Microsoft is retiring Network Security Group (NSG) flow logs and recommends migrating to Virtual Network (VNet) flow logs. After […]
  • by AbhishekShaw
    Why Use Terraform and CSV for Azure Rule Management? When handling numerous input rules—often sourced from locals or auto.tfvars files—Terraform configurations can become unwieldy. By leveraging CSV files for rule definitions and automating their integration with Terraform, you can: Reduce […]
  • by Sunip
    Mastering Kafka Consumer Lag Monitoring in Azure Event Hubs Introduction Kafka consumer lag is a vital metric for streaming architectures, indicating how far behind consumers are in processing messages. While Apache Kafka provides persistent offset storage and straightforward lag monitoring, […]
  • by divyaan
    Admission controllers act as Kubernetes’ built-in gatekeepers that intercept API requests after authentication/authorization but before they're persisted to etcd. They can validate or mutate incoming objects, ensuring everything that enters your cluster meets defined policies. We strengthen this mechanism with […]
  • by gwaqar
    By Gohar Waqar, CVP of Cloud Hardware Infrastructure Engineering, Microsoft   Microsoft was the first hyperscaler to deploy the NVIDIA GB300 NVL72 infrastructure at scale – with a fully integrated platform engineered to deliver unprecedented compute density in a single rack […]
  • by Sakshi_Gupta22
    Accidental secret commits are one of the most common and most dangerous security mistakes in modern development. A single leaked API key or connection string can give attackers persistent access long after you’ve deleted the file. The real challenge isn’t […]

# Azure Network Security🔐

Azure Network Security
  • by andrewmathu
    We are pleased to announce the General Availability (GA) of the JavaScript Challenge feature for Azure Web Application Firewall (WAF) on Azure Front Door. This capability equips organizations with a seamless, invisible anti-bot verification layer that distinguishes legitimate users from […]
  • by surenjamiyanaa
    Background Azure Firewall helps secure your network by filtering traffic and enforcing policies for your workloads and applications. DNS Proxy, a key capability in Azure Firewall, enables the firewall to act as a DNS forwarder for DNS traffic. Today, we’re […]
  • by ShabazShaik
    This blog is written in collaboration with @GustavoModena Introduction Azure Firewall is a cloud-native and intelligent network firewall security service that provides best of breed threat protection for your cloud workloads running in Azure. It’s a fully stateful firewall as […]
  • by SaleemBseeu
    Introduction Azure Application Gateway Web Application Firewall (WAF) now supports custom HTTP status codes and custom response bodies for blocked requests. This Public Preview feature gives you more control over user experience and client-side handling, aligning with capabilities already available […]
  • by andrewmathu
    We are excited to announce the General Availability (GA) of the Azure Web Application Firewall (WAF) CAPTCHA challenge for Azure Front Door, empowering customers to better defend their web applications against automated bot attacks while ensuring legitimate users can still […]
  • by surenjamiyanaa
    Azure Firewall protects your applications and workloads with cloud-native network security that automatically scales based on your traffic needs. Today, we’re excited to announce the general availability of prescaling in Azure Firewall – a new capability that gives you more control […]
  • by SaleemBseeu
    With the adoption of the NIS2 Directive EU 2022 2555, cybersecurity obligations for both public and private sector organizations have become more strict and far reaching. NIS2 aims to establish a higher common level of cybersecurity across the European Union […]
  • by ShabazShaik
    The internet’s transport layer is undergoing one of its most significant evolutions in decades. QUIC (Quick UDP Internet Connections) — the protocol underpinning HTTP/3 — is rapidly becoming the default for high performance, secure communication on the web. From YouTube streaming […]

# Azure Virtual Desktop (AVD) 🖥️

Azure Virtual Desktop (AVD)
  • by ivaylo_ivanov
    Windows 10 reaches end of support on October 14, 2025. A great place to learn about all the Windows 10 Extended Security Updates (ESU) options is in our blog post, When to use Windows 10 Extended Security Updates. In this […]
  • by Ron_Coleman
    Azure Virtual Desktop continues to evolve with features that simplify deployment and management of session hosts for our customers. Today, we’re excited to announce the public preview of Ephemeral OS disk support, the latest milestone in our Enhanced Host Pool […]
  • by Ron_Coleman
    We’re pleased to announce that the Azure Virtual Desktop metadata database is now available in the Korea Central region. This release is part of our ongoing global expansion, following our rollout earlier this year in Southeast Asia. By extending regional […]
  • by Rinku_Dalwani
    We are excited to announce the public preview of Remote Desktop Protocol (RDP) Multipath for Azure Virtual Desktop. This new feature is designed to enhance remote desktop connectivity and reliability without requiring configuration changes from IT admins and users. By […]
  • by JimMoyle
    We're excited to announce the general availability of two enhancements to App attach in Azure Virtual Desktop: Support for Microsoft Application Virtualization (App-V) packages, and integration with leading third-party application delivery platforms Liquidware, Numecent, and Omnissa. App attach is a […]
  • by femi_adebayo
    We are thrilled to announce the general availability of a new Azure Virtual Desktop capability that allows multiple personal desktops to be assigned to a single user within one host pool. This update, previously in public preview, improves upon the […]
  • by Derek_Su
    As part of the Microsoft Secure Future Initiative (SFI), Azure Virtual Desktop is enhancing its default security by disabling clipboard, drive, USB, and printer redirections for all newly created host pools. This change minimizes the risk of data exfiltration and […]
  • by Ron_Coleman
    We are pleased to announce that the Azure Virtual Desktop metadata database is now generally available in Southeast Asia. This extends our regional database capability to meet your organization's requirements. We are constantly expanding the footprint of the Azure Virtual […]
Scroll to Top