Community
-
Announcing Microsoft Defender for Cloud: Virtual Training Day on Cloud Security
ShirleyseHaley announces a new Microsoft Security Virtual Training Day designed to help professionals build expertise in cloud security using Microsoft Defender for Cloud, with practical sessions on DevOps integration and workload protection.
-
Weekly Microsoft Learning Rooms Community Roundup (8/7)
JulieSirrine shares a curated summary of activities from Microsoft Learning Rooms, spotlighting hands-on community events and technical discussions covering Azure, AI, Fabric, Power BI, cloud security, and coding topics for Microsoft professionals.
-
Securing Your Pro-Code Custom Engine Agent for Microsoft 365 Copilot: Endpoint Protection Guide
daisami presents a practical guide on securing pro-code custom engine agent endpoints for Microsoft 365 Copilot, detailing application-level controls, code samples, and Azure integration strategies.
-
Architecting Azure VPN P2S and ExpressRoute Coexistence in a Hub & Spoke Topology
tampasmix explores approaches for connecting Azure VPN P2S remote users to on-premises networks via ExpressRoute in a hub-and-spoke architecture, discussing routing, gateway setup, and practical options for solving connectivity challenges.
-
Securing Azure Bot Service Endpoints for Teams Channel Integration
daisami guides developers through securing Azure Bot Service endpoints for Microsoft Teams, focusing on application-level protections, token validation, and tenant restrictions to safeguard accessible endpoints in ASP.NET Core bots.
-
What Senior Engineers Earning 150k+ Work On: Tech and Business Realities
Legitimate-School-59 shares a behind-the-scenes look at the technical and business realities for senior engineers earning over 150k, focusing on Azure migrations, large-scale codebase management, security enhancements, and more.
-
Resolving Orphaned Azure Subscription Access When No Owner Is Reachable
GelatinousCubeZantar details the process and obstacles in recovering access to an orphaned Azure subscription, including real-world escalation attempts and technical suggestions based on Microsoft’s documentation.
-
What’s New in FinOps Toolkit 12 – July 2025
Michael Flanakin explores the major updates in FinOps Toolkit 12 for Azure, focusing on cost management, new data schemas, Power BI reporting, network and security improvements, and automation tools to streamline financial operations in the cloud.
-
Passwordless Sign-On and MFA in Microsoft Hybrid Environments
SmoothRunnings discusses Microsoft’s move toward passwordless sign-on and the potential changes for MFA in hybrid scenarios, featuring community input on Cloud Kerberos Trust and the continuity of the Authenticator app.
-
Evaluating Azure Application Gateway and WAF Placement in API Architectures
TheCitrixGuy and members of the Azure community explore the architectural and cost considerations of using Azure Application Gateway with WAF in front of APIM. They share alternative solutions including Azure Front Door and Cloudflare, offering deployment insights and practical recommendations.
-
Decoding On-Premises ADC Rules: Migration to Azure Application Gateway
vnamani delivers a comprehensive walkthrough on migrating on-premises ADC rules to Azure Application Gateway, breaking down feature mapping, Azure-native alternatives, and how to leverage infrastructure-as-code and cloud security best practices.
-
Azure Innovations and AKS Advancements Showcased at KubeCon India 2025
Coryskimming delivers an in-depth look at Microsoft’s announcements from KubeCon India 2025, highlighting significant AKS improvements, AI integration, security advancements, and operational best practices for the Azure Kubernetes Service community.
-
Managing First Login Password Change for Hybrid Users on Entra Joined Laptops
Author simdre79 explores the difficulties of enforcing password changes at first login for hybrid users on Entra joined laptops, especially after transitioning from hybrid to Entra join. This article offers insights and practical issues encountered during device enrollment and user onboarding.
-
Azure Workbook for Monitoring ACR Token Expiration Dates
Jamesdld23 explains how to monitor Azure Container Registry token expiration dates through Azure REST API, Azure Workbooks, and automation techniques.
-
Terraform Module for Azure Service Principal with Flexible Authentication
In this community post, Unlikely-Ad4624 shares a Terraform module for provisioning Azure service principals with versatile authentication options and secure secret storage.
-
AI Data Governance Made Easy: How Microsoft Purview Tackles GenAI Risks and Builds Trust
Authored by vicperdana, this article explores how Microsoft Purview streamlines AI data governance and compliance, mitigating GenAI risks for enterprises.
-
File Share Access for SYSTEM User with PowerShell Across Multiple Devices
LordLoss01 seeks advice on creating a file share that allows Windows SYSTEM user access for PowerShell-automated data transfer across thousands of devices.
-
New Tools for Hybrid Access and Identity Verification in Microsoft Entra ID Governance
In this article, Joseph Dadzie introduces new Microsoft Entra ID governance tools for hybrid environments, detailing features like Group SOA conversion and Face Check for secure, auditable access management.
-
Expanded Protection with Microsoft Defender Experts: Enhanced Coverage and 24/7 Threat Hunting
Authored by henryyan, this article covers the latest enhancements to Microsoft Defender Experts, focusing on 24/7 protection, threat hunting, and enriched detection capabilities for hybrid and multicloud environments.
-
Group Source of Authority Conversion: Shifting from AD to Entra ID
In this community contribution, JohnSavill discusses group source of authority conversion from Active Directory to Entra ID, offering practical steps and critical considerations for a successful identity shift.
-
(Blog) Testing protected endpoints using fake JWTs
In this post, Kralizek82 explores methods to test protected endpoints in C# applications using fake JWT tokens, providing practical guidance for .NET developers.
-
InvalidAuthenticationToken in CI-CD Pipeline But Working Fine in Postman
Authored by sayytoabhishekkumar, this post explores an ‘InvalidAuthenticationToken’ issue encountered during Azure REST API calls from a CI-CD pipeline—even though the equivalent request functions as expected in Postman.
-
Our Infra Was Fine. The AI Pipeline Wasn’t — 3 Silent Crashes We Kept Missing
wfgy_engine highlights persistent DevOps challenges in AI pipelines, describing how classic infrastructure issues led to subtle, production-breaking failures and how their team created a problem map and lightweight controls to address them.
-
How we solved environment variable chaos for 40+ microservices on ECS/Lambda/Batch with AWS Parameter Store
In this post, compacompila describes how their team centralized environment variable management for over 40 AWS-based microservices using AWS Parameter Store, leading to enhanced security and streamlined operations.
-
SchemaNest: A Fast, Team-Friendly CI/CD-Ready JSON Schema Registry
Authored by R3ym4nn, this article introduces SchemaNest—a fast, DevOps-ready registry for managing JSON Schemas, highlighting its features, team focus, and open-source availability.
-
Announcing a Flexible, Predictable Billing Model for Azure SRE Agent
Authored by Mayunk_Jain, this article presents the upcoming billing structure for Azure SRE Agent and provides an in-depth look at its AI-driven incident management capabilities and cost models tailored for cloud reliability engineering.
-
AspNetCore.SecurityKey: API Key Authentication for ASP.NET Core Applications
Authored by pwelter34, this article introduces AspNetCore.SecurityKey, a robust API key authentication library for ASP.NET Core. It examines installation steps, configuration options, and advanced customization for securing .NET applications.
-
10 Creative Use Cases for Azure Communication Services
In this article, Sean Keegan shares ten innovative ways to leverage Azure Communication Services, combining ACS with tools like Azure OpenAI and Event Grid to build intelligent, real-time, and secure communication solutions.
-
How to integrate ASP.NET Core Identity in Clean Architecture (DDD) without breaking domain independence?
Successful_Cycle_465 asks about integrating ASP.NET Core Identity into a Clean Architecture (DDD) app while keeping the domain layer independent, and requests best practices and examples.
-
Federated Identity in Azure: Seamless Access with External Identity Providers
Authored by JohnNaguib, this article delves into how Microsoft Azure facilitates seamless access and secure authentication using the Federated Identity pattern with external identity providers.
-
Building an AI Extension to Enhance Azure DevOps Pull Request Reviews
TechieRedditer introduces a home-built AI assistant for Azure DevOps, offering automated PR reviews, instant work item queries, and honest insights into its capabilities and limitations.
-
Ansys Minerva Simulation & Process Data Management Architecture on Azure
Sunita_AZ0708 examines the technical architecture and deployment strategies of Ansys Minerva’s Simulation and Process Data Management platform on Azure, addressing reliability, security, backup, and VM recommendations.
-
Build. Secure. Launch Your Private MCP Registry with Azure API Center.
In this article, JuliaKa explores how organizations can harness Azure API Center to build secure and governed private MCP registries, supporting enterprise AI development.
-
Announcing GA of Bicep Templates for Microsoft Entra ID Resources
Dan_Kershaw introduces the general availability of Bicep templates for Microsoft Entra ID, highlighting improved IaC workflows and new deployment integrations.
-
Mastering Agent Governance in Microsoft 365
In this comprehensive guide, Chad Stout walks IT leaders and compliance officers through a practical, phased approach to governing AI agents in Microsoft 365, especially in regulated industries.
-
Determine Onboarding Methods in Defender for Endpoint - Part 1
edgarus71 details approaches for onboarding devices to Defender for Endpoint, distinguishing between methods like Intune, GPO, and MCM, and providing troubleshooting advice.
-
Azure Automation Introduces PowerShell 7.4, Python 3.10, and New Runtime Environment
Nikita_Bajaj announces major enhancements to Azure Automation, including support for PowerShell 7.4, Python 3.10, and a new Runtime Environment. The update boosts security, script modernization, control, and operational flexibility for enterprise automation.
-
Comprehensive Guide to Seamless File Synchronization Between On-Premises Servers and Azure
Authored by Maria-Rezapour, this article explores Azure File Sync, guiding readers in synchronizing on-premises file servers with Azure for a hybrid cloud storage approach.
-
Inherited a Large Azure Environment: Seeking Guidance as a New Cloud Architect
Cybertron2600 discusses inheriting a sprawling Azure environment as a cloud architect and asks for advice on managing and understanding it.
-
Azure Tag Best Practice: Staging Tags Before Server Onboarding
Author jyoungii asks the community about best practices for staging and managing Azure tags for patching and onboarding servers, specifically in the context of Azure Arc.
-
Dynamic Azure DevOps MCP Server for Seamless Context Switching in Claude Code
OkAdministration2514 details how they built a dynamic MCP server that empowers Claude Code users to seamlessly switch Azure DevOps contexts by project directory, offering robust DevOps automation for multi-client work.
-
Managing Key Vault URIs Across Environments in GitHub Actions and Azure DevOps Pipelines
Azure DevOps shares practical advice on securely managing Key Vault URIs in CI/CD pipelines across dev and prod environments, highlighting different approaches for Azure DevOps and GitHub Actions.
-
Microsoft at Black Hat USA 2025: A unified approach to modern cyber defense
Authored by Elliot Volkman, this article highlights Microsoft’s plans for Black Hat USA 2025, focusing on their AI-driven security platform.
-
From Vibe Coding to Vibe Engineering: It's Time to Stop Riffing with AI
Tammuz Dubnov, Founder and CTO of AutonomyAI, explores the evolution from unstructured “vibe coding” with AI to systematic “vibe engineering” practices that embed AI within proper constraints and architectural standards.
-
Zero-Trust Agents: Adding Identity and Access to Multi-Agent Workflows
Thia details how zero-trust security and identity management can empower secure, autonomous AI agents by utilizing Azure OpenAI, AutoGen, and WSO2 Asgardeo.